WO2020097928A1 - 网络接入方法和设备 - Google Patents

网络接入方法和设备 Download PDF

Info

Publication number
WO2020097928A1
WO2020097928A1 PCT/CN2018/115989 CN2018115989W WO2020097928A1 WO 2020097928 A1 WO2020097928 A1 WO 2020097928A1 CN 2018115989 W CN2018115989 W CN 2018115989W WO 2020097928 A1 WO2020097928 A1 WO 2020097928A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
terminal device
access
information
network element
Prior art date
Application number
PCT/CN2018/115989
Other languages
English (en)
French (fr)
Inventor
唐海
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN201880075565.2A priority Critical patent/CN111448816A/zh
Priority to JP2021525668A priority patent/JP2022515590A/ja
Priority to EP18940269.6A priority patent/EP3846521B1/en
Priority to PCT/CN2018/115989 priority patent/WO2020097928A1/zh
Priority to SG11202104890RA priority patent/SG11202104890RA/en
Priority to KR1020217014919A priority patent/KR20210091716A/ko
Priority to CN202010611566.3A priority patent/CN111757417B/zh
Priority to AU2018449745A priority patent/AU2018449745A1/en
Publication of WO2020097928A1 publication Critical patent/WO2020097928A1/zh
Priority to US17/216,620 priority patent/US11736943B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/005Multiple registrations, e.g. multihoming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • Embodiments of the present application relate to the field of communications, and more specifically, to a network access method and device.
  • VLAN Vertical Local Access Network
  • NPN Non-Public Network
  • Embodiments of the present application provide a network access method and device, which can improve network security and ensure correct operation of services.
  • a network access method including: a terminal device acquiring first information, where the first information is used to indicate whether the terminal device is allowed to access a second network while accessing the first network; When accessing the first network, the terminal device determines whether to initiate an access request to the second network according to the first information.
  • a network access method including: a terminal device that has accessed a first network, and sending an access request message to a first network element of a second network, where the access request message includes indication information, The indication information is used to indicate that the terminal device has accessed the first network; the terminal device receives an access denied message or an access allowed message sent by the first network element.
  • a network access method including: a first network element of a second network receives an access request message sent by a terminal device that has accessed the first network; the first network element determines first information , The first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network; the first network element sends the terminal to the terminal according to the first information The device sends an access denied message or an access allowed message.
  • a network access method which includes: when a first network element of a second network receives an access request message sent by a terminal device that has accessed the first network, the second network element determines the first Information, the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network shares the second network element with the second network.
  • the second network element sends the first information to the first network element, the first information is used by the first network element to determine whether to send an access denied message or an access allowed message to the terminal device .
  • a terminal device which can execute the method in the first aspect or any optional implementation manner of the first aspect.
  • the terminal device may include a functional module for performing the method in the first aspect or any possible implementation manner of the first aspect.
  • a terminal device which can execute the method in the second aspect or any optional implementation manner of the second aspect.
  • the terminal device may include a functional module for performing the method in the second aspect or any possible implementation manner of the second aspect.
  • a network device which can execute the method in the third aspect or any optional implementation manner of the third aspect.
  • the network device may include a functional module for performing the method in the third aspect or any possible implementation manner of the third aspect.
  • a network device which can execute the method in the fourth aspect or any optional implementation manner of the fourth aspect.
  • the network device may include a functional module for performing the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a terminal device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a terminal device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to perform the method in the second aspect or any possible implementation manner of the second aspect.
  • a network device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to perform the method in the third aspect or any possible implementation manner of the third aspect.
  • a network device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to perform the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a chip for implementing the above-mentioned first aspect or the method in any possible implementation manner of the first aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the first aspect or any possible implementation manner of the first aspect.
  • a chip for implementing the method in the second aspect or any possible implementation manner of the second aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the second aspect or any possible implementation manner of the second aspect.
  • a chip for implementing the method in the third aspect or any possible implementation manner of the third aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the third aspect or any possible implementation manner of the third aspect.
  • a chip for implementing the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a computer program product including computer program instructions, which cause the computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer program product including computer program instructions that cause a computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer program product including computer program instructions, which cause the computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
  • a computer program product including computer program instructions, which cause the computer to execute the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
  • a communication system including a terminal device and a network device.
  • the terminal device is configured to: when the first network has been accessed, send an access request message to the first network element of the second network, the access request message includes indication information, and the indication information is used Indicate that the terminal device has accessed the first network; receive an access denied message or an access allowed message sent by the first network element.
  • the network device is the first network element of the second network, and the network device is used for: receiving an access request message sent by a terminal device that has accessed the first network; determining first information, the first information It is used to indicate whether to allow the terminal device to access the second network while accessing the first network; according to the first information, send an access denied message or an access allowed message to the terminal device.
  • the terminal device is used to perform the method in the second aspect or any possible implementation manner of the second aspect
  • the network device is used to perform the third aspect or any possible implementation manner of the third aspect The method.
  • a communication system including a terminal device and a network device.
  • the terminal device is configured to: when the first network has been accessed, send an access request message to the first network element of the second network, the access request message includes indication information, and the indication information is used Indicate that the terminal device has accessed the first network; receive an access denied message or an access allowed message sent by the first network element.
  • the network device is a second network element, and the network device is used to: when the first network element of the second network receives the access request message sent by the terminal device that has accessed the first network, determine the first Information, the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network shares the second network element with the second network Sending the first information to the first network element, the first information is used by the first network element to determine whether to send an access denied message or an access allowed message to the terminal device.
  • the terminal device is used to perform the method in the second aspect or any possible implementation manner of the second aspect
  • the network device is used to perform the fourth aspect or any possible implementation manner of the fourth aspect The method.
  • the terminal device determines whether to initiate an access request to the second network by acquiring the first information, and the first information indicates whether the terminal device is allowed to access while accessing the first network
  • the second network thus ensures the security of the first network and the correct operation of services.
  • the second network determines the first information and denies or permits the access of the terminal device according to the first information, thereby ensuring the first 1. The security of the network and the correct conduct of business.
  • FIG. 1 is a schematic architectural diagram of an application scenario according to an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a network access method according to an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a network access method according to another embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a network access method according to another embodiment of the present application.
  • FIG. 5 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of a terminal device according to another embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a network device according to another embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a network device according to another embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • FIG. 11 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • FIG. 12 is a schematic block diagram of a communication system according to another embodiment of the present application.
  • GSM Global System of Mobile
  • CDMA Code Division Multiple Access
  • WCDMA Broadband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • LTE-A Advanced Long Term Evolution
  • NR New Radio
  • NR NR system evolution system
  • LTE on unlicensed spectrum LTE-based access to unlicensed spectrum, LTE-U
  • NR NR-based access to unlicensed spectrum, NR-U
  • Universal Mobile Telecommunication System Universal Mobile Telecommunication System
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • CA carrier aggregation
  • DC dual connectivity
  • SA standalone
  • the wireless communication system 100 may include an access network device 110.
  • the access network device 110 may be a device that communicates with a terminal device.
  • the access network device 110 can provide communication coverage for a specific geographic area, and can communicate with terminal devices located in the coverage area.
  • the access network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved type in an LTE system
  • BTS Base Transceiver Station
  • NodeB, NB base station
  • the base station (Evolutional Node B, eNB or eNodeB), or the network-side device in the NR system, or the wireless controller in the cloud radio access network (Cloud Radio Access Network, CRAN), or the access network device 110 may be Relay stations, access points, in-vehicle devices, wearable devices, network-side devices in next-generation networks or network-side devices in future public land mobile networks (Public Land Mobile Network, PLMN), etc.
  • PLMN Public Land Mobile Network
  • the communication system 100 also includes at least one terminal device 120 located within the coverage of the access network device 110.
  • the terminal device 120 may be mobile or fixed.
  • the terminal device 120 may refer to an access terminal, user equipment (User Equipment, UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication Device, user agent, or user device.
  • User Equipment User Equipment
  • Access terminals can be cellular phones, cordless phones, Session Initiation Protocol (SIP) phones, wireless local loop (Wireless Local Loop, WLL) stations, personal digital processing (Personal Digital Assistant (PDA), wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future 5G networks or terminal devices in future evolved PLMNs, etc.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • wireless communication Functional handheld devices computing devices or other processing devices connected to wireless modems
  • in-vehicle devices wearable devices
  • terminal devices in future 5G networks or terminal devices in future evolved PLMNs etc.
  • terminal direct connection Device to Device, D2D communication may also be performed between the terminal devices 120.
  • the access network device 110 may provide services for the cell, and the terminal device 120 communicates with the network device 110 through the transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell, and the cell may be the access network device 110 (For example, a base station)
  • the corresponding cell can be a macro base station or a base station corresponding to a small cell (Small cell).
  • the small cell here may include: a metro cell, a micro cell, and a pico cell (Pico), Femtocell, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • the communication system 100 further includes a core network device 130 that communicates with the access network device 110.
  • the core network device 130 may be a core network device of a 5G system.
  • access and mobility management functions (Access and Mobility Management Function, AMF), which are responsible for access and mobility management, have functions such as user authentication, handover, and location update; for example, session management functions (Session Management Function) , SMF), responsible for session management, including the establishment, modification, and release of Packet Data Unit (PDU) sessions; for example, the user plane function (User Plane Function, UPF) is responsible for the forwarding of user data.
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • PDU Packet Data Unit
  • UPF User Plane Function
  • the core network device 130 may also be a core network device of the LTE system or other systems.
  • FIG. 1 exemplarily shows one access network device, one core network device, and three terminal devices, but the present application is not limited to this, and the wireless communication system 100 may further include multiple core network devices, and may also include multiple Access network devices and each access network device may also include other numbers of terminal devices within the coverage area, which is not limited in the embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a network access method according to an embodiment of the present application.
  • the method shown in FIG. 2 may be executed by a terminal device, and the terminal device may be, for example, the terminal device 120 shown in FIG. 1.
  • the embodiment of the present application does not make any limitation on the first network and the second network.
  • the first network may be, for example, NPN
  • the second network may be, for example, PLMN.
  • the NPN can be called a standalone NPN (standalone NPN); when the terminal device accesses the NPN, it allows simultaneous access to the PLMN.
  • the NPN can be called a non-independent NPN (non-independent NPN). standalone NPN).
  • the network access method includes:
  • the terminal device acquires the first information.
  • the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network.
  • the terminal device when accessing the first network, determines whether to initiate an access request to the second network according to the first information.
  • the terminal device when accessing the first network, determines whether it is allowed to access the second network while accessing the first network by acquiring the first information, so as to determine whether The second network initiates an access request.
  • the first information indicates that simultaneous access is not allowed, and after the terminal device that has accessed the first network obtains the first information, then No more access requests will be initiated to the second network, thereby ensuring the security of the first network and the correct execution of services.
  • the access to the second network while accessing the first network described herein includes: the terminal device accesses the first network and the second network respectively, and / or the terminal device accesses the first network and connects via the first network Into the second network.
  • allowing the terminal device to access the second network while accessing the first network is also simply referred to as “allowing access”.
  • networks that allow terminal devices to access at the same time are those networks that allow terminal devices to access other networks while accessing the network.
  • the terminal device When the first information indicates that the terminal device is not allowed to access the second network while accessing the first network, the terminal device will not simultaneously access the two networks; when the first information indicates that the terminal device is allowed to access the second network When one network is connected to the second network at the same time, the terminal device can also access another network when accessing one of the networks.
  • the terminal device acquiring the first information includes: the terminal device acquiring the first information from a global subscriber identity module (Universal Subscriber Identity Module, USIM) of the terminal device or a memory of the terminal device.
  • a global subscriber identity module Universal Subscriber Identity Module, USIM
  • the first information can be stored in the terminal device in advance.
  • the terminal device acquiring the first information includes: before the terminal device accesses the first network, receiving the first information sent by the second network element of the second network.
  • the second network element may be, for example, AMF or Unified Data Management (Unified Data Management, UDM).
  • AMF Unified Data Management
  • UDM Unified Data Management
  • the terminal device may access the second network before accessing the first network, and the second network element of the second network sends the first information to the terminal device.
  • the terminal device disconnects the second network and then accesses the first network, it can determine whether to continue to initiate an access request to the second network while accessing the first network according to the first information.
  • the terminal device acquiring the first information includes: after the terminal device accesses the first network, receiving the first information sent by the first network element of the first network.
  • the first network element may be, for example, AMF, SMF or UPF.
  • the first information is Data Network Name (DNN) or Single Network Slice Selection Assistance Information (S-NSSAI).
  • DNN Data Network Name
  • S-NSSAI Single Network Slice Selection Assistance Information
  • the first information may be carried in a specific DNN or S-NSSAI.
  • the first network can be uniquely determined according to the specific DDN or S-NSSAI. If the terminal device receives the DNN or S-NSSAI corresponding to the first network, it is determined that the first network allows the terminal device to also access other networks when accessing.
  • the first information may be an identifier of the first network.
  • the first information received by the terminal device includes the identifier of the first network, and it is determined that the first network allows the terminal device to access other networks when accessing.
  • the first information may further include an identifier of the first network and a corresponding bit, where the value in the bit is used to indicate whether the first network allows the terminal device to access other networks when accessing, For example, a value of 1 in this bit indicates that simultaneous access is allowed, and a value of 0 in this bit indicates that simultaneous access is not allowed.
  • the content included in the first information may also have other forms, which is not limited in this embodiment of the present application, as long as it can indicate whether the terminal device is allowed to access the second network while accessing the first network.
  • the embodiment of the present application does not make any limitation on the content of the first information, as long as it can indicate whether the terminal device is allowed to access the second network while accessing the first network.
  • the first information may indicate implicitly or explicitly whether the terminal device is allowed to access the second network while accessing the first network.
  • the terminal device determines whether to initiate an access request to the second network according to the first information, including: the terminal device determines whether to request the second network according to whether the first information includes the identifier of the first network The network initiates an access request.
  • the first information includes an identification of at least one network that allows terminal devices to access at the same time. If the first information includes the identifier of the first network, that is, the at least one network includes the first network, the terminal device determines that an access request can be initiated to the second network; if the first information does not include the first network For the identification of the network, the terminal device determines not to initiate an access request to the second network.
  • the first information includes identifications of multiple networks subscribed to by the terminal device, and information on whether each network allows simultaneous access, as shown in Table 1, for example.
  • Table 1 if the first network is network 1, the terminal device can determine that it can access other networks while accessing network 1 according to the first information; if the first network is network 2, the terminal device can determine according to the first information While accessing the network 2, it is not possible to access other networks; if the first network is the network N, the terminal device can determine that it can access other networks while accessing the network N according to the first information.
  • FIG. 3 is a process interaction diagram of a network access method according to an embodiment of the present application.
  • the method shown in FIG. 3 may be executed by a terminal device and a network device, and the terminal device may be, for example, the terminal device 120 shown in FIG. 1.
  • the network device may be, for example, the core network device 130 shown in FIG. 1.
  • the network device is the first network element in the second network.
  • the embodiment of the present application does not make any limitation on the first network and the second network.
  • the first network may be, for example, NPN
  • the second network may be, for example, PLMN.
  • the network access method includes:
  • the terminal device that has accessed the first network sends an access request message to the first network element of the second network.
  • the access request message may be, for example, a registration request (Registration Request), a protocol data unit (Protocol Data Unit, PDU) session establishment request (PDU Session Establishment Request), and the like.
  • the first network element receives the access request message sent by the terminal device.
  • the first network element may be, for example, AMF, SMF or UPF.
  • the first network element determines the first information.
  • the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network.
  • the first network element sends an access denied message or an access allowed message to the terminal device according to the first information.
  • the terminal device receives an access denied message or an access allowed message sent by the first network element.
  • the second network determines the first information and denies or allows the terminal device to access based on the first information.
  • the first information indicates that simultaneous access is not allowed, and the second network will reject the access initiated by the terminal device after acquiring the first information Request, thereby ensuring the security of the first network and the correct conduct of business.
  • the access to the second network while accessing the first network described herein includes: the terminal device accesses the first network and the second network respectively, and / or the terminal device accesses the first network and connects via the first network Into the second network.
  • the terminal device will not simultaneously access the two networks; if the first information indicates that the terminal device is allowed to access the first network When the network accesses the second network at the same time, the terminal device can also access another network when accessing one of the networks.
  • first network and the second network do not share the second network element.
  • first network and the second network share the second network element.
  • whether the first network and the second network share the second network element may inform the terminal device when the terminal device accesses the first network or the second network.
  • the following uses the second network element as UDM as an example for description, but the present application is not limited to this.
  • the second network does not know the current network of the terminal device Access situation.
  • the access request message sent by the terminal device includes indication information, and the indication information is used to indicate that the terminal device has accessed the first network.
  • the indication information may include the identification of the first network.
  • the indication information may include an identifier of the first network and a corresponding bit, where the value in the bit is used to indicate whether the terminal device has accessed the first network, for example, the value in the bit is 0 The terminal device has not accessed the first network, and the value of 1 in this bit indicates that the terminal device has accessed the first network.
  • the first network element determines the first information, including: the first network element receives an identifier of at least one network sent by the second network element of the second network to allow the terminal device to simultaneously access; The first network element determines the first information according to whether the at least one network includes the first network.
  • the first network element determines the first information, including: the first network element obtains an identifier of at least one network that is locally configured to allow the terminal device to simultaneously access; the first network element is based on Whether the first network is included in the at least one network determines the first information.
  • the first network element may obtain the identity of at least one network that allows the terminal device to access simultaneously from the local or from the second network element, and determine the first according to whether the at least one network includes the first network information. If the identification of the at least one network includes the identification of the first network, the first network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; if the identification of the at least one network Excluding the identifier of the first network, the first network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
  • the first network element receives, from the second network element, the identities of multiple networks subscribed to by the terminal device, and whether each network allows simultaneous access, as shown in Table 2.
  • Table 2 when the first network is network 1, terminal devices are allowed to access the second network at the same time; when the first network is network 2, terminal devices are not allowed to access the second network at the same time; when the first network is network 3, The terminal device is allowed to access the second network at the same time; when the first network is the network 4, the terminal device is allowed to access the second network at the same time.
  • the first network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; when the first network is network 2 , The first network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
  • the first network element determines that the first information is that the terminal device is not allowed to While accessing the first network, access the second network.
  • the second network can learn the current network access of the terminal device happening.
  • the access request message sent by the terminal device may not carry indication information for the terminal device to have accessed the first network.
  • the first network element determines the first information, including: the first network element receives the identifier of the first network or the AMF identifier of the first network sent by the second network element; the first network element Obtain the locally configured identifier of at least one network that allows the terminal device to simultaneously access; the first network element determines the first information according to whether the at least one network includes the first network.
  • the AMF identification is used to determine the identification of the first network.
  • the AMF identification of different networks may be different.
  • the second network element may send the first network element an AMF identification of the first network, and the first network element may determine the first network identification according to the ANF identification.
  • the first network element can obtain the identity of the first network from the second network element, and locally obtain the identity of at least one network that allows the terminal device to access at the same time, and according to whether the at least one network includes the first A network to determine the first information. If the identification of the at least one network includes the identification of the first network, the first network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; if the identification of the at least one network Excluding the identifier of the first network, the first network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
  • the first network element determines that the first information is that the terminal device While accessing the first network, access the second network.
  • the first network element may locally obtain the identifiers of multiple networks subscribed to by the terminal device, and information on whether each network allows simultaneous access, as shown in Table 3 for example.
  • Table 3 when the first network is network 1, terminal devices are not allowed to access the second network at the same time; when the first network is network 2, terminal devices are not allowed to access the second network; when the first network is network 3, The terminal device is not allowed to access the second network. Therefore, when the first network is network 1, network 2, or network 3, the first network element determines that the first information is not to allow the terminal device to access the second network while accessing the first network.
  • the first network element determining the first information includes: the first network element receiving the first information sent by the second network element.
  • the second network element determines the first information and sends the first information to the first network element, so that the first network element sends an access permission message or access to the terminal device according to the received first information Reject the message.
  • FIG. 4 is a process interaction diagram of a network access method according to another embodiment of the present application.
  • the network access method includes:
  • the terminal device that has accessed the first network sends an access request message to the first network element of the second network.
  • the first network element receives an access request message sent by the terminal device that has accessed the first network.
  • the first network element requests subscription information of the terminal device from the second network element.
  • the first network element sends a request message to the second network element, where the request message is used to request subscription information of the terminal device.
  • the second network element receives the request message, thereby knowing that the terminal device requests to access the second network, and executes 440.
  • the first network element may also notify the second network element terminal device to request access to the second network through other indication information.
  • the second network element determines the first information.
  • the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network and the second network share the second network element.
  • the second network element sends the first information to the first network element.
  • the first information is used by the first network element to determine whether to send an access denied message or an access allowed message to the terminal device.
  • the first network element receives the first information sent by the second network element.
  • the first network element sends an access denied message or an access allowed message to the terminal device according to the first information.
  • the terminal device receives an access denied message or an access allowed message sent by the first network element.
  • the second network element determines the first information and sends the first information to the first One network element.
  • the second network element determines the first information, including: the second network element obtains an identifier of at least one network locally configured to allow the terminal device to simultaneously access; Whether the first network is included in a network determines the first information.
  • the second network element may locally obtain the identity of at least one network that allows the terminal device to simultaneously access, and determine the first information according to whether the at least one network includes the first network. If the identification of the at least one network includes the identification of the first network, the second network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; if the identification of the at least one network Without including the identifier of the first network, the second network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
  • the second network element may locally obtain the identities of multiple networks subscribed to by the terminal device, and information on whether each network allows simultaneous access, such as the foregoing Table 2.
  • Table 2 when the first network is network 1, terminal devices are allowed to access the second network at the same time; when the first network is network 2, terminal devices are not allowed to access the second network at the same time; when the first network is network 3, The terminal device is allowed to access the second network at the same time; when the first network is the network 4, the terminal device is allowed to access the second network at the same time.
  • the second network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; when the first network is network 2 , The second network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
  • the first network element determines that the first information is that the terminal device is not allowed to access the first network at the same time Access the second network.
  • the first network element or the second network element may also obtain the identifier of the network that does not allow the terminal device to access at the same time, and according to whether these networks include the first The network determines the first information. If the identifiers of these networks do not include the identifier of the first network, it is determined that the first information is to allow the terminal device to access the second network while accessing the first network; , It is determined that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
  • the first information corresponding to the identifier of the first network may be determined in the correspondence between the network identifier shown in Table 2 or Table 3 and the first information according to the identifier of the first network.
  • the embodiment of the present application does not limit the specific implementation process of determining the first information.
  • FIG. 5 is a schematic block diagram of a terminal device 500 according to an embodiment of the present application. As shown in FIG. 5, the terminal device 500 includes:
  • the processing unit 510 is configured to acquire first information, where the first information is used to indicate whether to allow the terminal device to access the second network while accessing the first network;
  • the processing unit 510 is further configured to, when accessing the first network, determine whether to initiate an access request to the second network according to the first information.
  • the terminal device determines whether to initiate an access request to the second network by acquiring first information, and the first information indicates whether the terminal device is allowed to access the first network while accessing the first network. Second network, thus ensuring the security of the first network and the correct operation of the business.
  • the access to the second network while accessing the first network includes: the terminal device accessing the first network and the second network respectively; and / or, the terminal The device accesses the first network and accesses the second network through the first network.
  • the processing unit 510 is specifically configured to: obtain the first information from the USIM of the terminal device or the memory of the terminal device.
  • a receiving unit is further included, wherein the processing unit 510 is specifically configured to: before the terminal device accesses the first network, receive the second network element of the second network through the receiving unit The first information sent.
  • the second network element is AMF or UDM.
  • a receiving unit is further included, wherein the processing unit 510 is specifically configured to: after the terminal device accesses the first network, receive the first network element of the first network through the receiving unit. The first information.
  • the first network element is any one of the following: AMF, SMF, and UPF.
  • the first information is DNN or S-NSSAI.
  • the processing unit 510 is specifically configured to determine whether to initiate an access request to the second network according to whether the first information includes the identifier of the first network.
  • the first network is NPN
  • the second network is PLMN.
  • terminal device 500 may perform the corresponding operations performed by the terminal device in the above method 200, and for the sake of brevity, no further details are provided here.
  • FIG. 6 is a schematic block diagram of a terminal device 600 according to an embodiment of the present application. As shown in FIG. 6, the terminal device has accessed the first network, and the terminal device 600 includes:
  • the sending unit 610 is configured to send an access request message to the first network element of the second network, where the access request message includes indication information, where the indication information is used to indicate that the terminal device has accessed the first network ;
  • the receiving unit 620 is configured to receive an access denied message or an access allowed message sent by the first network element.
  • the terminal device carries indication information in the access request message to indicate that the terminal device has accessed the first network, so that the second network determines the first information according to the indication information and rejects or allows the terminal device according to the first information. Access, thereby ensuring the security of the first network and the correct conduct of services.
  • the indication information includes an identification of the first network.
  • the first network element is any one of the following: AMF, SMF, and UPF.
  • the first network is NPN
  • the second network is PLMN.
  • terminal device 600 may perform the corresponding operations performed by the terminal device in the above method 300, and for the sake of brevity, details are not described herein again.
  • FIG. 7 is a schematic block diagram of a network device 700 according to an embodiment of the present application. As shown in FIG. 7, the network device is the first network element of the second network, and the network device 700 includes:
  • the receiving unit 710 is configured to receive an access request message sent by a terminal device that has accessed the first network;
  • the processing unit 720 is configured to determine first information that is used to indicate whether to allow the terminal device to access the second network while accessing the first network;
  • the sending unit 730 is configured to send an access denied message or an access allowed message to the terminal device according to the first information determined by the processing unit 720.
  • the second network determines the first information and denies or allows the access of the terminal device according to the first information, thereby ensuring the first 1.
  • the access to the second network while accessing the first network includes: the terminal device accessing the first network and the second network respectively; and / or, the terminal The device accesses the first network and accesses the second network through the first network.
  • the access request message includes indication information, and the indication information is used to indicate that the terminal device has accessed the first network.
  • the indication information includes an identification of the first network.
  • the processing unit 720 is specifically configured to: receive, through the receiving unit 610, an identifier of at least one network that is allowed to be simultaneously accessed by the terminal device and sent by the second network element of the second network; It is determined whether the first information is included in at least one network.
  • the processing unit 720 is specifically configured to: obtain an identifier of at least one network locally configured to allow terminal devices to access simultaneously; and determine the first according to whether the at least one network includes the first network information.
  • the processing unit 720 is specifically configured to: receive the identifier of the first network or the AMF identifier of the first network sent by the second network element through the receiving unit 710, where the AMF identifier is used To determine the identity of the first network, the first network and the second network share the second network element; obtain the locally configured identity of at least one network that allows the terminal device to simultaneously access; according to the at least Determine whether the first information is included in a network.
  • the processing unit 720 is specifically configured to: receive, by the receiving unit 710, the first information sent by a second network element, where the first information is obtained locally by the second network element After the identification of the at least one network that the terminal device is allowed to access at the same time is determined according to whether the at least one network includes the first network, the first network shares the second network element with the second network.
  • the second network element is AMF or UDM.
  • the first network element is any one of the following: AMF, SMF, and UPF.
  • the first network is NPN
  • the second network is PLMN
  • the network device 700 may perform the corresponding operations performed by the network device in the above method 300, and for the sake of brevity, no further details are provided here.
  • FIG. 8 is a schematic block diagram of a network device 800 according to an embodiment of the present application. As shown in FIG. 8, the network device 800 includes:
  • the processing unit 810 is configured to determine first information that is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network and the first The second network shares the second network element;
  • the sending unit 820 is configured to send the first information determined by the processing unit 710 to the first network element, and the first information is used to determine that the first network element sends an access denied to the terminal device The message still allows access to the message.
  • the second network determines the first information and denies or allows the access of the terminal device according to the first information, thereby ensuring the first 1.
  • the processing unit 810 is specifically configured to: obtain a locally configured identifier of at least one network that allows terminal devices to simultaneously access; and determine the first according to whether the at least one network includes the first network information.
  • the access to the second network while accessing the first network includes: the terminal device accessing the first network and the second network respectively; and / or, the terminal The device accesses the first network and accesses the second network through the first network.
  • the second network element is AMF or UDM.
  • the first network element is any one of the following: AMF, SMF, and UPF.
  • the first network is NPN
  • the second network is PLMN.
  • the network device 800 may perform the corresponding operations performed by the network device in the above method 400, and for the sake of brevity, no further details are provided here.
  • FIG. 9 is a schematic structural diagram of a communication device 900 provided by an embodiment of the present application.
  • the communication device 900 shown in FIG. 9 includes a processor 910, and the processor 910 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the communication device 900 may further include a memory 920.
  • the processor 910 can call and run a computer program from the memory 920 to implement the method in the embodiments of the present application.
  • the memory 920 may be a separate device independent of the processor 910, or may be integrated in the processor 910.
  • the communication device 900 may further include a transceiver 930, and the processor 910 may control the transceiver 930 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by the device.
  • the transceiver 930 may include a transmitter and a receiver.
  • the transceiver 930 may further include antennas, and the number of antennas may be one or more.
  • the communication device 900 may specifically be the terminal device in the embodiment of the present application, and the communication device 900 may implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application. Repeat.
  • the communication device 900 may specifically be the network device in the embodiment of the present application, and the communication device 900 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. Repeat.
  • FIG. 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 1000 shown in FIG. 10 includes a processor 1010, and the processor 1010 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the chip 1000 may further include a memory 1020.
  • the processor 1010 can call and run a computer program from the memory 1020 to implement the method in the embodiments of the present application.
  • the memory 1020 may be a separate device independent of the processor 1010, or may be integrated in the processor 1010.
  • the chip 1000 may further include an input interface 1030.
  • the processor 1010 can control the input interface 1030 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
  • the chip 1000 may further include an output interface 1040.
  • the processor 1010 can control the output interface 1040 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
  • the chip can be applied to the terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
  • the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • chips mentioned in the embodiments of the present application may also be referred to as system-on-chips, system chips, chip systems, or system-on-chip chips.
  • the processor in the embodiment of the present application may be an integrated circuit chip, which has signal processing capabilities.
  • each step of the foregoing method embodiment may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an existing programmable gate array (Field Programmable Gate Array, FPGA) or other available Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied and executed by a hardware decoding processor, or may be executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a mature storage medium in the art, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, and registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electronically Erasable programmable read only memory (Electrically, EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • Synchlink DRAM SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiments of the present application may also be static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (Synch Link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is to say, the memories in the embodiments of the present application are intended to include but are not limited to these and any other suitable types of memories.
  • FIG. 11 is a schematic block diagram of a communication system 1100 according to an embodiment of the present application. As shown in FIG. 11, the communication system 1100 includes a network device 1110 and a terminal device 1120.
  • the terminal device 1120 is configured to: when the first network has been accessed, send an access request message to the first network element of the second network, where the access request message includes indication information, and the indication information is used to Indicating that the terminal device has accessed the first network; receiving an access denied message or an access allowed message sent by the first network element.
  • the network device 1110 is the first network element of the second network, and the network device 1110 is configured to: receive an access request message sent by a terminal device that has accessed the first network; determine first information, and the first information is used to Indicate whether to allow the terminal device to access the second network while accessing the first network; according to the first information, send an access denied message or an access allowed message to the terminal device.
  • the terminal device 1120 may be used to implement the corresponding functions implemented by the terminal device in the above method 300, and the composition of the terminal device 1120 may be as shown in the terminal device 600 in FIG.
  • the network device 1110 may be used to implement the corresponding functions implemented by the network device in the above method 300, and the composition of the network device 1110 may be as shown in the network device 700 in FIG.
  • FIG. 12 is a schematic block diagram of a communication system 1200 according to an embodiment of the present application. As shown in FIG. 12, the communication system 1200 includes a network device 1210 and a terminal device 1220.
  • the terminal device 1220 is configured to: when the first network has been accessed, send an access request message to the first network element of the second network, where the access request message includes indication information, and the indication information is used to Indicating that the terminal device has accessed the first network; receiving an access denied message or an access allowed message sent by the first network element.
  • the network device 1210 is a second network element, and the network device 1210 is configured to: when the first network element of the second network receives the access request message sent by the terminal device that has accessed the first network, determine the first information, The first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network shares the second network element with the second network; The first network element sends the first information, and the first information is used by the first network element to determine whether to send an access denied message or an access allowed message to the terminal device.
  • the terminal device 1220 may be used to implement the corresponding functions implemented by the terminal device in the above method 400, and the composition of the terminal device 1220 may be as shown in the terminal device 600 in FIG.
  • the network device 1210 may be used to implement the corresponding functions implemented by the network device in the above method 400, and the composition of the network device 1210 may be as shown in the network device 800 in FIG.
  • Embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium may be applied to the network device in the embodiments of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiments of the present application.
  • the computer-readable storage medium may be applied to the terminal device in the embodiments of the present application, and the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. No longer.
  • An embodiment of the present application also provides a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program product can be applied to the terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application. Repeat again.
  • An embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network device in the embodiments of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. , Will not repeat them here.
  • the computer program can be applied to the terminal device in the embodiments of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. , Will not repeat them here.
  • B corresponding to (corresponding to) A means that B is associated with A, and B can be determined according to A.
  • determining B based on A does not mean determining B based on A alone, and B may also be determined based on A and / or other information.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a division of logical functions.
  • there may be another division manner for example, multiple units or components may be combined or may Integration into another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • the functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种网络接入方法和设备,能够提高网络安全性以及业务的正确进行。该方法包括:终端设备获取第一信息,所述第一信息用于指示是否允许所述终端设备在接入第一网络的同时接入第二网络;所述终端设备在接入所述第一网络时,根据所述第一信息确定是否向所述第二网络发起接入请求。

Description

网络接入方法和设备 技术领域
本申请实施例涉及通信领域,并且更具体地,涉及一种网络接入方法和设备。
背景技术
目前,5G系统,或称新无线(New Radio,NR)中引入了垂直产业局域网(Vertical Local Access Network,VLAN)的需求。VLAN网络又叫做非公开网络(Non-Public Network,NPN)。当保密性较高的VLAN网络中接入终端设备时,如何保证该VLAN网络安全和业务的正确进行,就成为亟待解决的问题。
发明内容
本申请实施例提供一种网络接入方法和设备,能够提高网络安全性并保证和业务的正确进行。
第一方面,提供了一种网络接入方法,包括:终端设备获取第一信息,所述第一信息用于指示是否允许所述终端设备在接入第一网络的同时接入第二网络;所述终端设备在接入所述第一网络时,根据所述第一信息确定是否向所述第二网络发起接入请求。
第二方面,提供了一种网络接入方法,包括:已接入第一网络的终端设备,向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;所述终端设备接收所述第一网元发送的拒绝接入消息或者允许接入消息。
第三方面,提供了一种网络接入方法,包括:第二网络的第一网元接收已接入第一网络的终端设备发送的接入请求消息;所述第一网元确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入所述第二网络;所述第一网元根据所述第一信息,向所述终端设备发送拒绝接入消息或允许接入消息。
第四方面,提供了一种网络接入方法,包括:当第二网络的第一网元接收到已接入第一网络的终端设备发送的接入请求消息时,第二网元确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入第二网络,所述第一网络与所述第二网络共用所述第二网元;所述第二网元向所述第一网元发送所述第一信息,所述第一信息用于所述第一网元确定向所述终端设备发送拒绝接入消息还是允许接入消息。
第五方面,提供了一种终端设备,该终端设备可以执行上述第一方面或第一方面的任意可选的实现方式中的方法。具体地,该终端设备可以包括用于执行上述第一方面或第一方面的任意可能的实现方式中的方法的功能模块。
第六方面,提供了一种终端设备,该终端设备可以执行上述第二方面或第二方面的任意可选的实现方式中的方法。具体地,该终端设备可以包括用于执行上述第二方面或第二方面的任意可能的实现方式中的方法的功能模块。
第七方面,提供了一种网络设备,该网络设备可以执行上述第三方面或第三方面的任意可选的实现方式中的方法。具体地,该网络设备可以包括用于执行上述第三方面或第三方面的任意可能的实现方式中的方法的功能模块。
第八方面,提供了一种网络设备,该网络设备可以执行上述第四方面或第四方面的任意可选的实现方式中的方法。具体地,该网络设备可以包括用于执行上述第四方面或第四方面的任意可能的实现方式中的方法的功能模块。
第九方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第一方面或第一方面的任意可能的实现方式 中的方法。
第十方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第二方面或第二方面的任意可能的实现方式中的方法。
第十一方面,提供了一种网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第十二方面,提供了一种网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第四方面或第四方面的任意可能的实现方式中的方法。
第十三方面,提供了一种芯片,用于实现上述第一方面或第一方面的任意可能的实现方式中的方法。具体地,该芯片包括处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行如上述第一方面或第一方面的任意可能的实现方式中的方法。
第十四方面,提供了一种芯片,用于实现上述第二方面或第二方面的任意可能的实现方式中的方法。具体地,该芯片包括处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行如上述第二方面或第二方面的任意可能的实现方式中的方法。
第十五方面,提供了一种芯片,用于实现上述第三方面或第三方面的任意可能的实现方式中的方法。具体地,该芯片包括处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行如上述第三方面或第三方面的任意可能的实现方式中的方法。
第十六方面,提供了一种芯片,用于实现上述第四方面或第四方面的任意可能的实现方式中的方法。具体地,该芯片包括处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行如上述第四方面或第四方面的任意可能的实现方式中的方法。
第十七方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第一方面或第一方面的任意可能的实现方式中的方法。
第十八方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第二方面或第二方面的任意可能的实现方式中的方法。
第十九方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第二十方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第四方面或第四方面的任意可能的实现方式中的方法。
第二十一方面,提供了一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述第一方面或第一方面的任意可能的实现方式中的方法。
第二十二方面,提供了一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述第二方面或第二方面的任意可能的实现方式中的方法。
第二十三方面,提供了一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第二十四方面,提供了一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述第四方面或第四方面的任意可能的实现方式中的方法。
第二十五方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面或第一方面的任意可能的实现方式中的方法。
第二十六方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第二方面或第二方面的任意可能的实现方式中的方法。
第二十七方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第二十八方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第二十九方面,提供了一种通信系统,包括终端设备和网络设备。
其中,所述终端设备用于:在已接入第一网络的情况下,向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;接收所述第一网元发送的拒绝接入消息或者允许接入消息。
其中,所述网络设备为第二网络的第一网元,所述网络设备用于:接收已接入第一网络的终端设备发送的接入请求消息;确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入所述第二网络;根据所述第一信息,向所述终端设备发送拒绝接入消息或允许接入消息。
具体地,所述终端设备用于执行上述第二方面或第二方面的任意可能的实现方式中的方法,以及所述网络设备用于执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第三十方面,提供了一种通信系统,包括终端设备和网络设备。
其中,所述终端设备用于:在已接入第一网络的情况下,向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;接收所述第一网元发送的拒绝接入消息或者允许接入消息。
其中,所述网络设备为第二网元,所述网络设备用于:当第二网络的第一网元接收到已接入第一网络的终端设备发送的接入请求消息时,确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入第二网络,所述第一网络与所述第二网络共用所述第二网元;向所述第一网元发送所述第一信息,所述第一信息用于所述第一网元确定向所述终端设备发送拒绝接入消息还是允许接入消息。
具体地,所述终端设备用于执行上述第二方面或第二方面的任意可能的实现方式中的方法,以及所述网络设备用于执行上述第四方面或第四方面的任意可能的实现方式中的方法。
通过上述技术方案,终端设备在接入第一网络后,通过获取第一信息确定是否向第二网络发起接入请求,该第一信息指示是否允许终端设备在接入第一网络的同时接入所述第二网络,从而保证了第一网络的安全以及业务的正确进行。或者,当终端设备已接入第一网络并尝试向第二网络发起接入时,该第二网络确定第一信息并根据该第一信息拒绝或者允许该终端设备的接入,从而保证了第一网络的安全以及业务的正确进行。
附图说明
图1是本申请实施例的一种应用场景的示意性架构图。
图2是本申请实施例的网络接入方法的示意性流程图。
图3是本申请另一实施例的网络接入方法的示意性流程图。
图4是本申请另一实施例的网络接入方法的示意性流程图。
图5是本申请实施例的终端设备的示意性框图。
图6是本申请另一实施例的终端设备的示意性框图。
图7是本申请另一实施例的网络设备的示意性框图。
图8是本申请另一实施例的网络设备的示意性框图。
图9是本申请实施例的通信设备的示意性结构图。
图10是本申请实施例的芯片的示意性结构图。
图11是本申请实施例的通信系统的示意性框图。
图12是本申请另一实施例的通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、非授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、下一代通信系统或其他通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如设备到设备(Device to Device,D2D)通信、机器到机器(Machine to Machine,M2M)通信、机器类型通信(Machine Type Communication,MTC)、以及车辆间(Vehicle to Vehicle,V2V)通信等,本申请实施例也可以应用于这些通信系统。
另外,本申请实施例中的通信系统例如也可以应用于载波聚合(Carrier Aggregation,CA)场景、双连接(Dual Connectivity,DC)场景、独立(Standalone,SA)布网场景等。
示例性的,本申请实施例应用的通信系统100如图1所示。该无线通信系统100可以包括接入网设备110。接入网设备110可以是与终端设备通信的设备。接入网设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。可选地,接入网设备110可以是GSM系统或CDMA系统中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是NR系统中的网络侧设备,或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者接入网设备110可以为中继站、接入点、车载设备、可穿戴设备、下一代网络中的网络侧设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络侧设备等。
该通信系统100还包括位于接入网设备110覆盖范围内的至少一个终端设备120。终端设备120可以是移动的或固定的。可选地,终端设备120可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、未来5G网络中的终端设备或者未来演进的PLMN中的终端设备等。其中,可选地,终端设备120之间也可以进行终端直连(Device to Device,D2D)通信。
接入网设备110可以为小区提供服务,终端设备120通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备110进行通信,该小区可以是接入网设备110(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。
该通信系统100还包括与接入网设备110进行通信的核心网设备130。可选地,该核心网设备130可以是5G系统的核心网设备。例如,接入与移动性管理功能(Access and Mobility Management Function,AMF),负责接入和移动性管理,具有对用户进行认证、切换、位置更新等功能;又例如,会话管理功能(Session Management Function,SMF),负责会话管理,包括分组数据单元(Packet Data Unit,PDU)会话的建立、修改、释放等;又例如,用户面功能(User Plane Function,UPF),负责用户数据的转发。可选地,核心网设备130也可以为LTE系统或其他系统的核心网设备。
图1示例性地示出了一个接入网设备、一个核心网设备和三个终端设备,但本申请并不限于此,该无线通信系统100还可以包括多个核心网设备,也可以包括多个接入网设备并且每个接入网设备的覆盖范围内还可以包括其它数量的终端设备,本申请实施例对此不做限定。
图2是本申请一个实施例的网络接入方法的示意性流程图。图2所示的方法可以由终端设备执行,终端设备例如可以为图1中所示的终端设备120。
本申请实施例对第一网络和第二网络不做任何限定。第一网络例如可以为NPN,第二网络例如可以为PLMN。其中,终端设备接入NPN时不允许再接入PLMN,该NPN可以称为独立NPN(standalone NPN);终端设备接入NPN时允许同时接入PLMN,该NPN可以称为非独立NPN(non-standalone NPN)。
如图2所示,该网络接入方法包括:
在210中,终端设备获取第一信息。
其中,该第一信息用于指示是否允许终端设备在接入第一网络的同时接入第二网络。
在220中,终端设备在接入第一网络时,根据该第一信息确定是否向第二网络发起接入请求。
该实施例中,终端设备在接入第一网络时,通过获取第一信息来确定是否被允许在接入第一网络的同时还接入第二网络,从而根据该第一信息确定是否向第二网络发起接入请求。当第一网络因为保密等原因不允许接入的终端设备再同时接入其他网络,该第一信息指示不允许同时接入,已接入第一网络的终端设备获取该第一信息后,则不会再向第二网络发起接入请求,从而保证了第一网络的安全以及业务的正确进行。
这里所述的在接入第一网络的同时接入第二网络,包括:终端设备分别接入第一网络和第二网络,和/或,终端设备接入第一网络并通过第一网络接入第二网络。
应理解,本申请实施例中,将“允许终端设备在接入第一网络的同时接入第二网络”也简称为“允许接入”。例如,允许终端设备同时接入的网络,即为允许终端设备在接入该网络的同时也接入其他网络的那些网络。
当该第一信息指示不允许终端设备在接入第一网络的同时接入第二网络时,终端设备不会同时接入这两个网络;当该第一信息指示允许终端设备在接入第一网络的同时接入第二网络时,终端设备才可以在接入其中一个网络时,也接入另一个网络。
可选地,在210中,终端设备获取第一信息,包括:终端设备从终端设备的全球用户身份识别模块(Universal Subscriber Identity Module,USIM)或终端设备的存储器中,获取该第一信息。
也就是说,该第一信息可以事先存储在终端设备中。
可选地,在210中,终端设备获取第一信息,包括:在终端设备接入第一网络之前,接收第二网络的第二网元发送的该第一信息。
其中,该第二网元例如可以是AMF或者统一数据管理(Unified Data Management,UDM)。
终端设备可以在接入第一网络之前接入第二网络,第二网络的第二网元向终端设备发送该第一信息。当终端设备断开第二网络并在之后接入第一网络时,就可以根据该第一信息确定接入第一网络的同时是否还可以继续向第二网络发起接入请求。
可选地,在210中,终端设备获取第一信息,包括:在终端设备接入第一网络之后,接收第一网络 的第一网元发送的该第一信息。
其中,该第一网元例如可以是AMF、SMF或UPF。
可选地,该第一信息为数据网络名称(Data Network Name,DNN)或单网络切片选择辅助信息(Single-Network Slice Selection Assistance Information,S-NSSAI)。
例如,该第一信息可以承载于某一特定的DNN或S-NSSAI中。根据该特定的DDN或S-NSSAI可以唯一确定该第一网络。如果终端设备接收到该第一网络对应的DNN或S-NSSAI,则确定该第一网络允许终端设备在接入时也接入其他网络。
又例如,该第一信息可以为第一网络的标识。终端设备接收到的第一信息中包括第一网络的标识,则确定该第一网络允许终端设备在接入时也接入其他网络。
又例如,该第一信息还可以包括该第一网络的标识和对应的比特位,其中,该比特位上的值用于指示第一网络是否允许终端设备在接入时也接入其他网络,比如,该比特位上的值为1表示允许同时接入,该比特位上的值为0表示不允许同时接入。
或者,该第一信息所包括的内容还可以有其他形式,本申请实施例对此不做限定,只要能够指示是否允许终端设备在接入第一网络的同时接入第二网络即可。
本申请实施例对该第一信息的内容不做任何限定,只要能够指示该是否允许所述终端设备在接入第一网络的同时接入第二网络即可。并且,该第一信息可以隐式或者显示地指示是否允许所述终端设备在接入第一网络的同时接入第二网络。
可选地,在220中,终端设备根据该第一信息确定是否向第二网络发起接入请求,包括:终端设备根据该第一信息中是否包括该第一网络的标识,确定是否向第二网络发起接入请求。
例如,该第一信息包括允许终端设备同时接入的至少一个网络的标识。如果该第一信息中包括该第一网络的标识,即该至少一个网络中包括第一网络,则终端设备确定可以向第二网络发起接入请求;如果该第一信息中不包括该第一网络的标识,终端设备确定不向第二网络发起接入请求。
又例如,该第一信息包括终端设备签约的多个网络的标识、以及各个网络是否允许同时接入的信息,例如表一所示。在表一中,若第一网络为网络1,终端设备根据第一信息可以确定在接入网络1的同时可以接入其他网络;若第一网络为网络2,终端设备根据第一信息可以确定在接入网络2的同时不可以接入其他网络;……;若第一网络为网络N,终端设备根据第一信息可以确定在接入网络N的同时可以接入其他网络。
表一
签约网络的标识 是否允许同时接入
网络1 允许
网络2 不允许
…… …..
网络N 允许
图3是本申请一个实施例的网络接入方法的流程交互图。图3所示的方法可以由终端设备和网络设备执行,该终端设备例如可以为图1中所示的终端设备120。该网络设备例如可以为图1中所示的核心网设备130。该网络设备为第二网络中的第一网元。
本申请实施例对第一网络和第二网络不做任何限定。第一网络例如可以为NPN,第二网络例如可以为PLMN。
如图3所示,该网络接入方法包括:
在310中,已接入第一网络的终端设备,向第二网络的第一网元发送接入请求消息。
该接入请求消息例如可以注册请求(Registration Request)、协议数据单元(Protocol Data Unit,PDU) 会话建立请求(PDU Session Establishment Request)等。
在320中,该第一网元接收该终端设备发送的接入请求消息。
该第一网元例如可以是AMF、SMF或UPF。
在330中,该第一网元确定第一信息。
其中,该第一信息用于指示是否允许该终端设备在接入第一网络的同时接入第二网络。
在340中,该第一网元根据该第一信息,向该终端设备发送拒绝接入消息或允许接入消息。
在350中,该终端设备接收该第一网元发送的拒绝接入消息或者允许接入消息。
该实施例中,当终端设备已接入第一网络并尝试向第二网络发起接入时,第二网络确定第一信息并根据该第一信息拒绝或者允许终端设备的接入。当第一网络因为保密等原因不允许接入的终端设备再同时接入其他网络,该第一信息指示不允许同时接入,第二网络获取该第一信息后会拒绝终端设备发起的接入请求,从而保证了第一网络的安全以及业务的正确进行。
这里所述的在接入第一网络的同时接入第二网络,包括:终端设备分别接入第一网络和第二网络,和/或,终端设备接入第一网络并通过第一网络接入第二网络。
如果该第一信息指示不允许终端设备在接入第一网络的同时接入第二网络,终端设备不会同时接入这两个网络;如果该第一信息指示允许终端设备在接入第一网络的同时接入第二网络时,终端设备才可以在接入其中一个网络时,也接入另一个网络。
以下,基于两种情况进行描述。一种情况是,第一网络和第二网络不共用第二网元。另一种情况是,第一网络和第二网络共用第二网元。其中,第一网络和第二网络是否共用第二网元可以在终端设备接入第一网络或第二网络时告诉终端设备。下面以该第二网元为UDM为例进行描述,但本申请不限于此。
情况1
由于第一网络和第二网络不共用第二网元,即第一网络的第二网元和第二网络的第二网元是独立的,那么,第二网络并不知道终端设备当前的网络接入情况。
因此,可选地,在310中终端设备发送的接入请求消息中包括指示信息,该指示信息用于指示该终端设备已接入第一网络。
例如,该指示信息可以包括第一网络的标识。
又例如,该指示信息可以包括第一网络的标识和对应的比特位,其中,该比特位上的值用于指示终端设备是否已接入第一网络,比如该比特位上的值为0表示终端设备未接入第一网络,该比特位上的值为1表示终端设备已接入第一网络。
可选地,在330中,该第一网元确定第一信息,包括:该第一网元接收第二网络的第二网元发送的允许该终端设备同时接入的至少一个网络的标识;该第一网元根据该至少一个网络中是否包括第一网络,确定该第一信息。
或者,可选地,在330中,该第一网元确定第一信息,包括:该第一网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;该第一网元根据该至少一个网络中是否包括第一网络,确定该第一信息。
也就是说,第一网元可以从本地或者从该第二网元,获取允许终端设备同时接入的至少一个网络的标识,并根据该至少一个网络中是否包括第一网络,确定该第一信息。如果该至少一个网络的标识中包括第一网络的标识,第一网元确定该第一信息为允许终端设备在接入第一网络的同时接入第二网络;如果该至少一个网络的标识中不包括第一网络的标识,第一网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
举例来说,第一网元从第二网元接收终端设备签约的多个网络的标识、以及各个网络是否允许同时接入的信息,例如表二所示。在表二中,第一网络为网络1时,允许终端设备同时接入第二网络;第一网络为网络2时,不允许终端设备同时接入第二网络;第一网络为网络3时,允许终端设备同时接入第 二网络;第一网络为网络4时,允许终端设备同时接入第二网络。因此,第一网络为网络1、网络3或网络4时,第一网元确定该第一信息为允许终端设备在接入第一网络的同时接入第二网络;第一网络为网络2时,第一网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
表二
签约网络的标识 第一信息
网络1 允许
网络2 不允许
网络3 允许
网络4 允许
应理解,当第一网元从本地或从该第二网元获取的允许终端设备同时接入的至少一个网络的标识为无,则第一网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
情况2
由于第一网络和第二网络共用第二网元,即第一网络的第二网元和第二网络的第二网元为同一个,那么,第二网络可以获知终端设备当前的网络接入情况。
因此,在310中终端设备发送的接入请求消息中可以不携带指示信息用来该终端设备已接入第一网络。
可选地,在330中,该第一网元确定第一信息,包括:该第一网元接收第二网元发送的第一网络的标识或第一网络的AMF标识;该第一网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;该第一网元根据该至少一个网络中是否包括第一网络,确定该第一信息。
其中,该AMF标识用于确定第一网络的标识。不同网络的AMF的标识可以不同。第二网元可以向第一网元发送第一网络的AMF的标识,该第一网元可以根据该ANF标识确定第一网络的标识。
也就是说,第一网元可以从该第二网元获取第一网络的标识,并从本地获取允许该终端设备同时接入的至少一个网络的标识,并且根据该至少一个网络中是否包括第一网络,确定该第一信息。如果该至少一个网络的标识中包括第一网络的标识,第一网元确定该第一信息为允许终端设备在接入第一网络的同时接入第二网络;如果该至少一个网络的标识中不包括第一网络的标识,第一网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
应理解,当第一网元从本地或从该第二网元获取的允许终端设备同时接入的至少一个网络的标识为无,则第一网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
举例来说,第一网元可以从本地获取终端设备签约的多个网络的标识、以及各个网络是否允许同时接入的信息,例如表三所示。在表三中,第一网络为网络1时,不允许终端设备同时接入第二网络;第一网络为网络2时,不允许终端设备接入第二网络;第一网络为网络3时,不允许终端设备接入第二网络。因此,第一网络为网络1、网络2或网络3时,第一网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
表三
签约网络的标识 第一信息
网络1 不允许
网络2 不允许
网络3 不允许
可选地,在330中,该第一网元确定第一信息,包括:该第一网元接收第二网元发送的该第一信息。
这时,该第二网元确定该第一信息,并将该第一信息发送给第一网元,从而第一网元根据接收到的 第一信息向终端设备发送接入允许消息或接入拒绝消息。
下面具体结合图4进行说明,图4是本申请另一个实施例的网络接入方法的流程交互图。如图4所示,该网络接入方法包括:
在410中,已接入第一网络的终端设备,向第二网络的第一网元发送接入请求消息。
在420中,该第一网元接收已接入第一网络的该终端设备发送的接入请求消息。
在430中,该第一网元向第二网元请求终端设备的签约信息。
具体地,该第一网元向第二网元发送请求消息,该请求消息用于请求终端设备的签约信息。第二网元接收该请求消息,从而获知终端设备请求接入该第二网络,从而执行440。
当然,该第一网元也可以通过其他指示信息告知第二网元终端设备请求接入第二网络。
在440中,该第二网元确定第一信息。
其中,该第一信息用于指示是否允许该终端设备在接入第一网络的同时接入第二网络,第一网络与第二网络共用该第二网元。
在450中,第二网元向该第一网元发送该第一信息。
其中,该第一信息用于该第一网元确定向该终端设备发送拒绝接入消息还是允许接入消息。
在460中,该第一网元接收第二网元发送的该第一信息。
在470中,该第一网元根据该第一信息,向该终端设备发送拒绝接入消息或允许接入消息。
在480中,该终端设备接收该第一网元发送的拒绝接入消息或者允许接入消息。
该实施例中,当第二网络的第一网元接收到已接入第一网络的终端设备发送的接入请求消息时,第二网元确定第一信息并将该第一信息发送给第一网元。
可选地,在440中,该第二网元确定第一信息,包括:该第二网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;该第二网元根据该至少一个网络中是否包括第一网络,确定该第一信息。
也就是说,第二网元可以从本地获取允许终端设备同时接入的至少一个网络的标识,并根据该至少一个网络中是否包括第一网络,确定该第一信息。如果该至少一个网络的标识中包括第一网络的标识,第二网元确定该第一信息为允许终端设备在接入第一网络的同时接入第二网络;如果该至少一个网络的标识中不包括第一网络的标识,第二网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
举例来说,第二网元可以从本地获取终端设备签约的多个网络的标识、以及各个网络是否允许同时接入的信息,例如前述表二。在表二中,第一网络为网络1时,允许终端设备同时接入第二网络;第一网络为网络2时,不允许终端设备同时接入第二网络;第一网络为网络3时,允许终端设备同时接入第二网络;第一网络为网络4时,允许终端设备同时接入第二网络。因此,第一网络为网络1、网络3或网络4时,第二网元确定该第一信息为允许终端设备在接入第一网络的同时接入第二网络;第一网络为网络2时,第二网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
应理解,当第二网元从本地获取的允许终端设备同时接入的至少一个网络的标识为无,则第一网元确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
还应理解,本申请实施例中,第一网元或第二网元在确定第一信息时,也可以获取不允许终端设备同时接入的网络的标识,并根据这些网络中是否包括第一网络,确定该第一信息。如果这些网络的标识中不包括第一网络的标识,则确定该第一信息为允许终端设备在接入第一网络的同时接入第二网络;如果这些网络的标识中包括第一网络的标识,则确定该第一信息为不允许终端设备在接入第一网络的同时接入第二网络。
或者,也可以根据第一网络的标识,在例如前述表二或表三所示的网络标识与第一信息之间的对应关系中,确定该第一网络的标识对应的第一信息。本申请实施例对确定该第一信息的具体实现过程不做 任何限定。
需要说明的是,在不冲突的前提下,本申请描述的各个实施例和/或各个实施例中的技术特征可以任意的相互组合,组合之后得到的技术方案也应落入本申请的保护范围。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
上文中详细描述了根据本申请实施例的通信方法,下面将结合图5至图12,描述根据本申请实施例的装置,方法实施例所描述的技术特征适用于以下装置实施例。
图5是根据本申请实施例的终端设备500的示意性框图。如图5所示,该终端设备500包括:
处理单元510,用于获取第一信息,所述第一信息用于指示是否允许所述终端设备在接入第一网络的同时接入第二网络;
所述处理单元510还用于,在接入所述第一网络时,根据所述第一信息确定是否向所述第二网络发起接入请求。
因此,终端设备在接入第一网络后,通过获取第一信息确定是否向第二网络发起接入请求,该第一信息指示是否允许终端设备在接入第一网络的同时接入所述第二网络,从而保证了第一网络的安全以及业务的正确进行。
可选地,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
可选地,所述处理单元510具体用于:从所述终端设备的USIM或所述终端设备的存储器中,获取所述第一信息。
可选地,还包括接收单元,其中,所述处理单元510具体用于:在所述终端设备接入所述第一网络之前,通过所述接收单元接收所述第二网络的第二网元发送的所述第一信息。
可选地,所述第二网元为AMF或UDM。
可选地,还包括接收单元,其中,所述处理单元510具体用于:在所述终端设备接入所述第一网络之后,通过接收单元接收所述第一网络的第一网元发送的所述第一信息。
可选地,所述第一网元为以下中的任意一种:AMF、SMF和UPF。
可选地,所述第一信息为DNN或者S-NSSAI。
可选地,所述处理单元510具体用于:根据所述第一信息中是否包括所述第一网络的标识,确定是否向所述第二网络发起接入请求。
可选地,所述第一网络为NPN,所述第二网络为PLMN。
应理解,该终端设备500可以执行上述方法200中由终端设备执行的相应操作,为了简洁,在此不再赘述。
图6是根据本申请实施例的终端设备600的示意性框图。如图6所示,所述终端设备已接入第一网络,该终端设备600包括:
发送单元610,用于向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;
接收单元620,用于接收所述第一网元发送的拒绝接入消息或者允许接入消息。
因此,终端设备在接入请求消息中携带指示信息用来指示终端设备已接入第一网络,从而第二网络根据该指示信息确定第一信息并根据该第一信息拒绝或者允许该终端设备的接入,从而保证了第一网络的安全以及业务的正确进行。
可选地,所述指示信息包括所述第一网络的标识。
可选地,所述第一网元为以下中的任意一种:AMF、SMF和UPF。
可选地,所述第一网络为NPN,所述第二网络为PLMN。
应理解,该终端设备600可以执行上述方法300中由终端设备执行的相应操作,为了简洁,在此不再赘述。
图7是根据本申请实施例的网络设备700的示意性框图。如图7所示,所述网络设备为第二网络的第一网元,该网络设备700包括:
接收单元710,用于接收已接入第一网络的终端设备发送的接入请求消息;
处理单元720,用于确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入所述第二网络;
发送单元730,用于根据所述处理单元720确定的所述第一信息,向所述终端设备发送拒绝接入消息或允许接入消息。
因此,当终端设备已接入第一网络并尝试向第二网络发起接入时,该第二网络确定第一信息并根据该第一信息拒绝或者允许该终端设备的接入,从而保证了第一网络的安全以及业务的正确进行。
可选地,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
可选地,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络。
可选地,所述指示信息包括所述第一网络的标识。
可选地,所述处理单元720具体用于:通过所述接收单元610接收所述第二网络的第二网元发送的允许所述终端设备同时接入的至少一个网络的标识;根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
可选地,所述处理单元720具体用于:获取本地配置的允许终端设备同时接入的至少一个网络的标识;根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
可选地,所述处理单元720具体用于:通过所述接收单元710接收第二网元发送的所述第一网络的标识或所述第一网络的AMF标识,其中,所述AMF标识用于确定所述第一网络的标识,所述第一网络与所述第二网络共用所述第二网元;获取本地配置的允许终端设备同时接入的至少一个网络的标识;根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
可选地,所述处理单元720具体用于:通过所述接收单元710接收第二网元发送的所述第一信息,其中,所述第一信息是所述第二网元获取本地配置的允许终端设备同时接入的至少一个网络的标识后,根据所述至少一个网络中是否包括所述第一网络确定的,所述第一网络与所述第二网络共用所述第二网元。
可选地,第二网元为AMF或UDM。
可选地,所述第一网元为以下中的任意一种:AMF、SMF和UPF。
可选地,所述第一网络为NPN,所述第二网络为PLMN
应理解,该网络设备700可以执行上述方法300中由网络设备执行的相应操作,为了简洁,在此不再赘述。
图8是根据本申请实施例的网络设备800的示意性框图。如图8所示,该网络设备800包括:
处理单元810,用于确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入第二网络,所述第一网络与所述第二网络共用所述第二网元;
发送单元820,用于向所述第一网元发送所述处理单元710确定的所述第一信息,所述第一信息用于所述第一网元确定向所述终端设备发送拒绝接入消息还是允许接入消息。
因此,当终端设备已接入第一网络并尝试向第二网络发起接入时,该第二网络确定第一信息并根据该第一信息拒绝或者允许该终端设备的接入,从而保证了第一网络的安全以及业务的正确进行。
可选地,所述处理单元810具体用于:获取本地配置的允许终端设备同时接入的至少一个网络的标 识;根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
可选地,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
可选地,第二网元为AMF或UDM。
可选地,所述第一网元为以下中的任意一种:AMF、SMF和UPF。
可选地,所述第一网络为NPN,所述第二网络为PLMN。
应理解,该网络设备800可以执行上述方法400中由网络设备执行的相应操作,为了简洁,在此不再赘述。
图9是本申请实施例提供的一种通信设备900示意性结构图。图9所示的通信设备900包括处理器910,处理器910可以从存储器中调用并运行计算机程序以实现本申请实施例中的方法。
可选地,如图9所示,通信设备900还可以包括存储器920。其中,处理器910可以从存储器920中调用并运行计算机程序,以实现本申请实施例中的方法。其中,存储器920可以是独立于处理器910的一个单独的器件,也可以集成在处理器910中。
可选地,如图9所示,通信设备900还可以包括收发器930,处理器910可以控制该收发器930与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。其中,收发器930可以包括发射机和接收机。收发器930还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备900具体可为本申请实施例中的终端设备,并且该通信设备900可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备900具体可为本申请实施例中的网络设备,并且该通信设备900可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
图10是本申请实施例的芯片的示意性结构图。图10所示的芯片1000包括处理器1010,处理器1010可以从存储器中调用并运行计算机程序以实现本申请实施例中的方法。
可选地,如图10所示,芯片1000还可以包括存储器1020。其中,处理器1010可以从存储器1020中调用并运行计算机程序,以实现本申请实施例中的方法。其中,存储器1020可以是独立于处理器1010的一个单独的器件,也可以集成在处理器1010中。
可选地,该芯片1000还可以包括输入接口1030。其中,处理器1010可以控制该输入接口1030与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片1000还可以包括输出接口1040。其中,处理器1010可以控制该输出接口1040与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的终端设备,并且该芯片可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片、系统芯片、芯片系统或片上系统芯片等。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处 理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch Link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
图11是根据本申请实施例的通信系统1100的示意性框图。如图11所示,该通信系统1100包括网络设备1110和终端设备1120。
其中,终端设备1120用于:在已接入第一网络的情况下,向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;接收所述第一网元发送的拒绝接入消息或者允许接入消息。
其中,网络设备1110为第二网络的第一网元,网络设备1110用于:接收已接入第一网络的终端设备发送的接入请求消息;确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入所述第二网络;根据所述第一信息,向所述终端设备发送拒绝接入消息或允许接入消息。
其中,终端设备1120可以用于实现上述方法300中由终端设备实现的相应的功能,以及终端设备1120的组成可以如图6中的终端设备600所示,为了简洁,在此不再赘述。
其中,网络设备1110可以用于实现上述方法300中由网络设备实现的相应的功能,以及网络设备1110的组成可以如图7中的网络设备700所示,为了简洁,在此不再赘述。
图12是根据本申请实施例的通信系统1200的示意性框图。如图12所示,该通信系统1200包括网络设备1210和终端设备1220。
其中,终端设备1220用于:在已接入第一网络的情况下,向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;接收所述第一网元发送的拒绝接入消息或者允许接入消息。
其中,网络设备1210为第二网元,网络设备1210用于:当第二网络的第一网元接收到已接入第一网络的终端设备发送的接入请求消息时,确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入第二网络,所述第一网络与所述第二网络共用所述第二网元;向所述第 一网元发送所述第一信息,所述第一信息用于所述第一网元确定向所述终端设备发送拒绝接入消息还是允许接入消息。
其中,终端设备1220可以用于实现上述方法400中由终端设备实现的相应的功能,以及终端设备1220的组成可以如图6中的终端设备600所示,为了简洁,在此不再赘述。
其中,网络设备1210可以用于实现上述方法400中由网络设备实现的相应的功能,以及网络设备1210的组成可以如图8中的网络设备800所示,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。可选地,该计算机可读存储介质可应用于本申请实施例中的终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。可选地,该计算机程序产品可应用于本申请实施例中的终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。可选地,该计算机程序可应用于本申请实施例中的终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
还应理解,在本发明实施例中,“与A相应(对应)的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,该单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物 理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (74)

  1. 一种网络接入方法,其特征在于,所述方法包括:
    终端设备获取第一信息,所述第一信息用于指示是否允许所述终端设备在接入第一网络的同时接入第二网络;
    所述终端设备在接入所述第一网络时,根据所述第一信息确定是否向所述第二网络发起接入请求。
  2. 根据权利要求1所述的方法,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:
    所述终端设备分别接入所述第一网络和所述第二网络;和/或,
    所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
  3. 根据权利要求1或2所述的方法,其特征在于,所述终端设备获取第一信息,包括:
    所述终端设备从所述终端设备的全球用户身份识别模块USIM或所述终端设备的存储器中,获取所述第一信息。
  4. 根据权利要求1或2所述的方法,其特征在于,所述终端设备获取第一信息,包括:
    在所述终端设备接入所述第一网络之前,接收所述第二网络的第二网元发送的所述第一信息。
  5. 根据权利要求4所述的方法,其特征在于,所述第二网元为接入与移动性管理功能AMF或统一数据管理UDM。
  6. 根据权利要求1或2所述的方法,其特征在于,所述终端设备获取第一信息,包括:
    在所述终端设备接入所述第一网络之后,接收所述第一网络的第一网元发送的所述第一信息。
  7. 根据权利要求6所述的方法,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
  8. 根据权利要求1至7中任一项所述的方法,其特征在于,所述第一信息为数据网络名称DNN或者单网络切片选择辅助信息S-NSSAI。
  9. 根据权利要求1至7中任一项所述的方法,其特征在于,所述终端设备根据所述第一信息确定是否向所述第二网络发起接入请求,包括:
    所述终端设备根据所述第一信息中是否包括所述第一网络的标识,确定是否向所述第二网络发起接入请求。
  10. 根据权利要求1至9中任一项所述的方法,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
  11. 一种网络接入方法,其特征在于,所述方法包括:
    已接入第一网络的终端设备,向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;
    所述终端设备接收所述第一网元发送的拒绝接入消息或者允许接入消息。
  12. 根据权利要求11所述的方法,其特征在于,所述指示信息包括所述第一网络的标识。
  13. 根据权利要求11或12所述的方法,其特征在于,所述第一网元为以下中的任意一种:接入与移动性管理功能AMF、会话管理功能SMF和用户面功能UPF。
  14. 根据权利要求11至13中任一项所述的方法,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
  15. 一种网络接入方法,其特征在于,所述方法包括:
    第二网络的第一网元接收已接入第一网络的终端设备发送的接入请求消息;
    所述第一网元确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入所述第二网络;
    所述第一网元根据所述第一信息,向所述终端设备发送拒绝接入消息或允许接入消息。
  16. 根据权利要求15所述的方法,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:
    所述终端设备分别接入所述第一网络和所述第二网络;和/或,
    所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
  17. 根据权利要求15或16所述的方法,其特征在于,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络。
  18. 根据权利要求17所述的方法,其特征在于,所述指示信息包括所述第一网络的标识。
  19. 根据权利要求17或18所述的方法,其特征在于,所述第一网元确定第一信息,包括:
    所述第一网元接收所述第二网络的第二网元发送的允许所述终端设备同时接入的至少一个网络的标识;
    所述第一网元根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
  20. 根据权利要求17或18所述的方法,其特征在于,所述第一网元确定第一信息,包括:
    所述第一网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;
    所述第一网元根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
  21. 根据权利要求15或16所述的方法,其特征在于,所述第一网元确定第一信息,包括:
    所述第一网元接收第二网元发送的所述第一网络的标识或所述第一网络的接入与移动性管理功能AMF标识,其中,所述AMF标识用于确定所述第一网络的标识,所述第一网络与所述第二网络共用所述第二网元;
    所述第一网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;
    所述第一网元根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
  22. 根据权利要求15或16所述的方法,其特征在于,所述第一网元确定第一信息,包括:
    所述第一网元接收第二网元发送的所述第一信息,其中,所述第一信息是所述第二网元获取本地配置的允许终端设备同时接入的至少一个网络的标识后,根据所述至少一个网络中是否包括所述第一网络确定的,所述第一网络与所述第二网络共用所述第二网元。
  23. 根据权利要求21或22所述的方法,其特征在于,第二网元为AMF或统一数据管理UDM。
  24. 根据权利要求15至23中任一项所述的方法,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
  25. 根据权利要求1至10中任一项所述的方法,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
  26. 一种网络接入方法,其特征在于,所述方法包括:
    当第二网络的第一网元接收到已接入第一网络的终端设备发送的接入请求消息时,第二网元确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入第二网络,所述第一网络与所述第二网络共用所述第二网元;
    所述第二网元向所述第一网元发送所述第一信息,所述第一信息用于所述第一网元确定向所述终端设备发送拒绝接入消息还是允许接入消息。
  27. 根据权利要求26所述的方法,其特征在于,所述第二网元确定第一信息,包括:
    所述第二网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;
    所述第二网元根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
  28. 根据权利要求26或27所述的方法,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:
    所述终端设备分别接入所述第一网络和所述第二网络;和/或,
    所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
  29. 根据权利要求26至28中任一项所述的方法,其特征在于,第二网元为接入与移动性管理功能AMF或统一数据管理UDM。
  30. 根据权利要求26至29中任一项所述的方法,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
  31. 根据权利要求26至30中任一项所述的方法,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
  32. 一种终端设备,其特征在于,所述终端设备包括:
    处理单元,用于获取第一信息,所述第一信息用于指示是否允许所述终端设备在接入第一网络的同时接入第二网络;
    所述处理单元还用于,在接入所述第一网络时,根据所述第一信息确定是否向所述第二网络发起接入请求。
  33. 根据权利要求32所述的终端设备,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:
    所述终端设备分别接入所述第一网络和所述第二网络;和/或,
    所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
  34. 根据权利要求32或33所述的终端设备,其特征在于,所述处理单元具体用于:
    从所述终端设备的全球用户身份识别模块USIM或所述终端设备的存储器中,获取所述第一信息。
  35. 根据权利要求32或33所述的终端设备,其特征在于,还包括接收单元,其中,所述处理单元具体用于:
    在所述终端设备接入所述第一网络之前,通过所述接收单元接收所述第二网络的第二网元发送的 所述第一信息。
  36. 根据权利要求35所述的终端设备,其特征在于,所述第二网元为接入与移动性管理功能AMF或统一数据管理UDM。
  37. 根据权利要求32或33所述的终端设备,其特征在于,还包括接收单元,其中,所述处理单元具体用于:
    在所述终端设备接入所述第一网络之后,通过所述接收单元接收所述第一网络的第一网元发送的所述第一信息。
  38. 根据权利要求37所述的终端设备,其特征在于,所述第一网元为以下中的任意一种:
    AMF、会话管理功能SMF和用户面功能UPF。
  39. 根据权利要求32至38中任一项所述的终端设备,其特征在于,所述第一信息为数据网络名称DNN或者单网络切片选择辅助信息S-NSSAI。
  40. 根据权利要求32至38中任一项所述的终端设备,其特征在于,所述处理单元具体用于:
    根据所述第一信息中是否包括所述第一网络的标识,确定是否向所述第二网络发起接入请求。
  41. 根据权利要求32至10中任一项所述的终端设备,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
  42. 一种终端设备,其特征在于,所述终端设备已接入第一网络,所述终端设备包括:
    发送单元,用于向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;
    接收单元,用于接收所述第一网元发送的拒绝接入消息或者允许接入消息。
  43. 根据权利要求42所述的终端设备,其特征在于,所述指示信息包括所述第一网络的标识。
  44. 根据权利要求42或43所述的终端设备,其特征在于,所述第一网元为以下中的任意一种:
    接入与移动性管理功能AMF、会话管理功能SMF和用户面功能UPF。
  45. 根据权利要求42至44中任一项所述的终端设备,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
  46. 一种网络设备,其特征在于,所述网络设备为第二网络的第一网元,所述网络设备包括:
    接收单元,用于接收已接入第一网络的终端设备发送的接入请求消息;
    处理单元,用于确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入所述第二网络;
    发送单元,用于根据所述处理单元确定的所述第一信息,向所述终端设备发送拒绝接入消息或允许接入消息。
  47. 根据权利要求46所述的网络设备,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:
    所述终端设备分别接入所述第一网络和所述第二网络;和/或,
    所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
  48. 根据权利要求46或47所述的网络设备,其特征在于,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络。
  49. 根据权利要求48所述的网络设备,其特征在于,所述指示信息包括所述第一网络的标识。
  50. 根据权利要求48或49所述的网络设备,其特征在于,所述处理单元具体用于:
    通过所述接收单元接收所述第二网络的第二网元发送的允许所述终端设备同时接入的至少一个网络的标识;
    根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
  51. 根据权利要求48或49所述的网络设备,其特征在于,所述处理单元具体用于:
    获取本地配置的允许终端设备同时接入的至少一个网络的标识;
    根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
  52. 根据权利要求46或47所述的网络设备,其特征在于,所述处理单元具体用于:
    通过所述接收单元接收第二网元发送的所述第一网络的标识或所述第一网络的接入与移动性管理功能AMF标识,其中,所述AMF标识用于确定所述第一网络的标识,所述第一网络与所述第二网络共用所述第二网元;
    获取本地配置的允许终端设备同时接入的至少一个网络的标识;
    根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
  53. 根据权利要求46或47所述的网络设备,其特征在于,所述处理单元具体用于:
    通过所述接收单元接收第二网元发送的所述第一信息,其中,所述第一信息是所述第二网元获取本 地配置的允许终端设备同时接入的至少一个网络的标识后,根据所述至少一个网络中是否包括所述第一网络确定的,所述第一网络与所述第二网络共用所述第二网元。
  54. 根据权利要求52或53所述的网络设备,其特征在于,第二网元为AMF或统一数据管理UDM。
  55. 根据权利要求46至54中任一项所述的网络设备,其特征在于,所述第一网元为以下中的任意一种:
    AMF、会话管理功能SMF和用户面功能UPF。
  56. 根据权利要求46至55中任一项所述的网络设备,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
  57. 一种网络设备,其特征在于,所述网络设备为第二网络的第二网元,所述网络设备包括:
    处理单元,用于确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入第二网络,所述第一网络与所述第二网络共用所述第二网元;
    发送单元,用于向所述第一网元发送所述处理单元确定的所述第一信息,所述第一信息用于所述第一网元确定向所述终端设备发送拒绝接入消息还是允许接入消息。
  58. 根据权利要求57所述的网络设备,其特征在于,所述处理单元具体用于:
    获取本地配置的允许终端设备同时接入的至少一个网络的标识;
    根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
  59. 根据权利要求57或58所述的网络设备,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:
    所述终端设备分别接入所述第一网络和所述第二网络;和/或,
    所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
  60. 根据权利要求57至59中任一项所述的网络设备,其特征在于,第二网元为接入与移动性管理功能AMF或统一数据管理UDM。
  61. 根据权利要求57至60中任一项所述的网络设备,其特征在于,所述第一网元为以下中的任意一种:
    AMF、会话管理功能SMF和用户面功能UPF。
  62. 根据权利要求57至61中任一项所述的网络设备,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
  63. 一种终端设备,其特征在于,所述终端设备包括处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
  64. 一种网络设备,其特征在于,所述网络设备包括处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
  65. 一种芯片,其特征在于,所述芯片包括处理器,所述处理器用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
  66. 一种芯片,其特征在于,所述芯片包括处理器,所述处理器用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
  67. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
  68. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
  69. 一种计算机程序产品,其特征在于,包括计算机程序指令,所述计算机程序指令使得计算机执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
  70. 一种计算机程序产品,其特征在于,包括计算机程序指令,所述计算机程序指令使得计算机执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
  71. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
  72. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
  73. 一种通信系统,其特征在于,包括如权利要求42至45中任意一项所述的终端设备以及如权利 要求46至56中任意一项所述的网络设备。
  74. 一种通信系统,其特征在于,包括如权利要求42至45中任意一项所述的终端设备以及如权利要求57至62中任意一项所述的网络设备。
PCT/CN2018/115989 2018-11-16 2018-11-16 网络接入方法和设备 WO2020097928A1 (zh)

Priority Applications (9)

Application Number Priority Date Filing Date Title
CN201880075565.2A CN111448816A (zh) 2018-11-16 2018-11-16 网络接入方法和设备
JP2021525668A JP2022515590A (ja) 2018-11-16 2018-11-16 ネットワークアクセス方法及びデバイス
EP18940269.6A EP3846521B1 (en) 2018-11-16 2018-11-16 Network access method and device
PCT/CN2018/115989 WO2020097928A1 (zh) 2018-11-16 2018-11-16 网络接入方法和设备
SG11202104890RA SG11202104890RA (en) 2018-11-16 2018-11-16 Network access method and device
KR1020217014919A KR20210091716A (ko) 2018-11-16 2018-11-16 네트워크 액세스 방법 및 디바이스
CN202010611566.3A CN111757417B (zh) 2018-11-16 2018-11-16 网络接入方法和设备
AU2018449745A AU2018449745A1 (en) 2018-11-16 2018-11-16 Network access method and device
US17/216,620 US11736943B2 (en) 2018-11-16 2021-03-29 Network access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/115989 WO2020097928A1 (zh) 2018-11-16 2018-11-16 网络接入方法和设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/216,620 Continuation US11736943B2 (en) 2018-11-16 2021-03-29 Network access method and device

Publications (1)

Publication Number Publication Date
WO2020097928A1 true WO2020097928A1 (zh) 2020-05-22

Family

ID=70731283

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/115989 WO2020097928A1 (zh) 2018-11-16 2018-11-16 网络接入方法和设备

Country Status (8)

Country Link
US (1) US11736943B2 (zh)
EP (1) EP3846521B1 (zh)
JP (1) JP2022515590A (zh)
KR (1) KR20210091716A (zh)
CN (2) CN111757417B (zh)
AU (1) AU2018449745A1 (zh)
SG (1) SG11202104890RA (zh)
WO (1) WO2020097928A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115699979A (zh) * 2020-08-03 2023-02-03 Oppo广东移动通信有限公司 无线通信方法和设备
CN112437456B (zh) * 2020-12-07 2023-05-26 中国联合网络通信集团有限公司 一种非公共网络中的通信方法及设备
CN113489747B (zh) * 2021-08-17 2023-03-24 中国联合网络通信集团有限公司 会话连接方法、装置及终端

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101133618A (zh) * 2005-04-19 2008-02-27 思科技术公司 连接公共网络中的vpn用户
CN104469762A (zh) * 2013-09-12 2015-03-25 西安龙飞网络科技有限公司 一种3g/wifi无线路由器用户分级控制方法
EP2890180A1 (en) * 2013-12-27 2015-07-01 Telefonica S.A. Method for managing a network access user policy for offloading data traffic, using access network discovery and selection function
US20170214682A1 (en) * 2014-08-01 2017-07-27 Applied Electronics Corp. Virtual communication system
WO2018075233A2 (en) * 2016-10-20 2018-04-26 T-Mobile Usa, Inc. Wlan assisted cellular network discovery and selection
CN108323245A (zh) * 2017-06-19 2018-07-24 华为技术有限公司 一种注册及会话建立的方法、终端和amf实体
CN108574969A (zh) * 2017-03-08 2018-09-25 华为技术有限公司 多接入场景中的连接处理方法和装置

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685714B (zh) 2011-03-18 2017-12-15 中兴通讯股份有限公司 一种支持双模双待终端同时通信的方法和系统
WO2013029672A1 (en) * 2011-08-31 2013-03-07 Telefonaktiebolaget L M Ericsson (Publ) Andsf policy controlled access network discovery information
EP2845417B8 (en) * 2012-05-03 2020-06-17 Huawei Technologies Sweden AB Sending access information from physical access control system to user terminal
US9497623B2 (en) * 2012-05-25 2016-11-15 Nokia Technologies Oy Method and apparatus for guest access sharing
EP3111611B1 (en) 2014-02-24 2020-01-01 Telefonaktiebolaget LM Ericsson (publ) A node and a method for enabling network access authorization
US20150326612A1 (en) 2014-05-06 2015-11-12 Qualcomm Incorporated Techniques for network selection in unlicensed frequency bands
US10142994B2 (en) * 2016-04-18 2018-11-27 Electronics And Telecommunications Research Institute Communication method and apparatus using network slicing
CN108024314B (zh) * 2016-11-03 2021-07-16 华为技术有限公司 一种选择网络的方法及装置
WO2018082673A1 (zh) * 2016-11-03 2018-05-11 华为技术有限公司 一种选择网络的方法及装置
WO2020092173A1 (en) * 2018-11-02 2020-05-07 Intel Corporation Systems, methods, and devices for privacy and control of traffic accessing plmn service at a non-public network
CN112970291A (zh) * 2018-11-14 2021-06-15 苹果公司 非公共网络中的网络选择和服务连续性

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101133618A (zh) * 2005-04-19 2008-02-27 思科技术公司 连接公共网络中的vpn用户
CN104469762A (zh) * 2013-09-12 2015-03-25 西安龙飞网络科技有限公司 一种3g/wifi无线路由器用户分级控制方法
EP2890180A1 (en) * 2013-12-27 2015-07-01 Telefonica S.A. Method for managing a network access user policy for offloading data traffic, using access network discovery and selection function
US20170214682A1 (en) * 2014-08-01 2017-07-27 Applied Electronics Corp. Virtual communication system
WO2018075233A2 (en) * 2016-10-20 2018-04-26 T-Mobile Usa, Inc. Wlan assisted cellular network discovery and selection
CN108574969A (zh) * 2017-03-08 2018-09-25 华为技术有限公司 多接入场景中的连接处理方法和装置
CN108323245A (zh) * 2017-06-19 2018-07-24 华为技术有限公司 一种注册及会话建立的方法、终端和amf实体

Also Published As

Publication number Publication date
SG11202104890RA (en) 2021-06-29
JP2022515590A (ja) 2022-02-21
CN111757417A (zh) 2020-10-09
US20210219136A1 (en) 2021-07-15
KR20210091716A (ko) 2021-07-22
AU2018449745A1 (en) 2021-06-10
EP3846521A4 (en) 2021-08-11
CN111448816A (zh) 2020-07-24
US11736943B2 (en) 2023-08-22
EP3846521B1 (en) 2023-04-26
CN111757417B (zh) 2022-01-25
EP3846521A1 (en) 2021-07-07

Similar Documents

Publication Publication Date Title
EP3399830B1 (en) Determination of communication architecture type to be used by a ciot device
US11736943B2 (en) Network access method and device
KR20200089316A (ko) 통신 방법 및 통신 디바이스
WO2020029191A1 (zh) 能力上报的方法和设备
US11252557B2 (en) Capability identifier distribution method and device
WO2020087509A1 (zh) 无线通信方法、终端设备和网络设备
WO2020077577A1 (zh) 数据包传输方法和设备
WO2021232852A1 (zh) 一种终端接入网络的方法及装置
WO2020150876A1 (zh) 会话建立方法、终端设备和网络设备
US20220124500A1 (en) Communication method, terminal device and network device
US10667180B2 (en) Methods and devices for managing access priority of a wireless device
WO2019213951A1 (zh) 下行信道的接收方法和终端设备
US20230337111A1 (en) Terminal device and network device
CN113692033B (zh) 信息传输方法和设备
WO2020258051A1 (zh) 小区接入的方法和设备
WO2022194262A1 (zh) 安全通信的方法和装置
KR20240060670A (ko) 통신 방법 및 장치
WO2022160123A1 (zh) 接入方式选择方法、终端设备和网络设备
WO2022126641A1 (zh) 无线通信方法、终端设备、第一接入网设备以及网元
WO2020087546A1 (zh) 一种网络信息传输方法、获取方法、网络设备及终端设备
JP2023500134A (ja) 通信方法、通信装置、および通信システム
WO2022183317A1 (zh) 一种获取切片信息的方法和终端设备
WO2022141210A1 (zh) 无线通信的方法、终端设备和网络设备
WO2023051428A1 (zh) 信息传输的方法和装置
WO2022151079A1 (zh) 无线通信的方法、终端设备和网络设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18940269

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018940269

Country of ref document: EP

Effective date: 20210402

ENP Entry into the national phase

Ref document number: 2021525668

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018449745

Country of ref document: AU

Date of ref document: 20181116

Kind code of ref document: A