WO2020097928A1 - 网络接入方法和设备 - Google Patents
网络接入方法和设备 Download PDFInfo
- Publication number
- WO2020097928A1 WO2020097928A1 PCT/CN2018/115989 CN2018115989W WO2020097928A1 WO 2020097928 A1 WO2020097928 A1 WO 2020097928A1 CN 2018115989 W CN2018115989 W CN 2018115989W WO 2020097928 A1 WO2020097928 A1 WO 2020097928A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- terminal device
- access
- information
- network element
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 164
- 230000015654 memory Effects 0.000 claims description 64
- 238000004590 computer program Methods 0.000 claims description 63
- 238000004891 communication Methods 0.000 claims description 45
- 230000006870 function Effects 0.000 claims description 40
- 238000012545 processing Methods 0.000 claims description 34
- 238000007726 management method Methods 0.000 claims description 22
- 238000013523 data management Methods 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 20
- 230000008569 process Effects 0.000 description 19
- 230000001360 synchronised effect Effects 0.000 description 9
- 238000001228 spectrum Methods 0.000 description 5
- 230000003068 static effect Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/005—Multiple registrations, e.g. multihoming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
Definitions
- Embodiments of the present application relate to the field of communications, and more specifically, to a network access method and device.
- VLAN Vertical Local Access Network
- NPN Non-Public Network
- Embodiments of the present application provide a network access method and device, which can improve network security and ensure correct operation of services.
- a network access method including: a terminal device acquiring first information, where the first information is used to indicate whether the terminal device is allowed to access a second network while accessing the first network; When accessing the first network, the terminal device determines whether to initiate an access request to the second network according to the first information.
- a network access method including: a terminal device that has accessed a first network, and sending an access request message to a first network element of a second network, where the access request message includes indication information, The indication information is used to indicate that the terminal device has accessed the first network; the terminal device receives an access denied message or an access allowed message sent by the first network element.
- a network access method including: a first network element of a second network receives an access request message sent by a terminal device that has accessed the first network; the first network element determines first information , The first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network; the first network element sends the terminal to the terminal according to the first information The device sends an access denied message or an access allowed message.
- a network access method which includes: when a first network element of a second network receives an access request message sent by a terminal device that has accessed the first network, the second network element determines the first Information, the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network shares the second network element with the second network.
- the second network element sends the first information to the first network element, the first information is used by the first network element to determine whether to send an access denied message or an access allowed message to the terminal device .
- a terminal device which can execute the method in the first aspect or any optional implementation manner of the first aspect.
- the terminal device may include a functional module for performing the method in the first aspect or any possible implementation manner of the first aspect.
- a terminal device which can execute the method in the second aspect or any optional implementation manner of the second aspect.
- the terminal device may include a functional module for performing the method in the second aspect or any possible implementation manner of the second aspect.
- a network device which can execute the method in the third aspect or any optional implementation manner of the third aspect.
- the network device may include a functional module for performing the method in the third aspect or any possible implementation manner of the third aspect.
- a network device which can execute the method in the fourth aspect or any optional implementation manner of the fourth aspect.
- the network device may include a functional module for performing the method in the fourth aspect or any possible implementation manner of the fourth aspect.
- a terminal device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the method in the first aspect or any possible implementation manner of the first aspect.
- a terminal device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to perform the method in the second aspect or any possible implementation manner of the second aspect.
- a network device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to perform the method in the third aspect or any possible implementation manner of the third aspect.
- a network device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to perform the method in the fourth aspect or any possible implementation manner of the fourth aspect.
- a chip for implementing the above-mentioned first aspect or the method in any possible implementation manner of the first aspect.
- the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the first aspect or any possible implementation manner of the first aspect.
- a chip for implementing the method in the second aspect or any possible implementation manner of the second aspect.
- the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the second aspect or any possible implementation manner of the second aspect.
- a chip for implementing the method in the third aspect or any possible implementation manner of the third aspect.
- the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the third aspect or any possible implementation manner of the third aspect.
- a chip for implementing the method in the fourth aspect or any possible implementation manner of the fourth aspect.
- the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the fourth aspect or any possible implementation manner of the fourth aspect.
- a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
- a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
- a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
- a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the fourth aspect or any possible implementation manner of the fourth aspect.
- a computer program product including computer program instructions, which cause the computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
- a computer program product including computer program instructions that cause a computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
- a computer program product including computer program instructions, which cause the computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
- a computer program product including computer program instructions, which cause the computer to execute the method in the fourth aspect or any possible implementation manner of the fourth aspect.
- a computer program which when run on a computer, causes the computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
- a computer program which when run on a computer, causes the computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
- a computer program which when run on a computer, causes the computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
- a computer program which when run on a computer, causes the computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
- a communication system including a terminal device and a network device.
- the terminal device is configured to: when the first network has been accessed, send an access request message to the first network element of the second network, the access request message includes indication information, and the indication information is used Indicate that the terminal device has accessed the first network; receive an access denied message or an access allowed message sent by the first network element.
- the network device is the first network element of the second network, and the network device is used for: receiving an access request message sent by a terminal device that has accessed the first network; determining first information, the first information It is used to indicate whether to allow the terminal device to access the second network while accessing the first network; according to the first information, send an access denied message or an access allowed message to the terminal device.
- the terminal device is used to perform the method in the second aspect or any possible implementation manner of the second aspect
- the network device is used to perform the third aspect or any possible implementation manner of the third aspect The method.
- a communication system including a terminal device and a network device.
- the terminal device is configured to: when the first network has been accessed, send an access request message to the first network element of the second network, the access request message includes indication information, and the indication information is used Indicate that the terminal device has accessed the first network; receive an access denied message or an access allowed message sent by the first network element.
- the network device is a second network element, and the network device is used to: when the first network element of the second network receives the access request message sent by the terminal device that has accessed the first network, determine the first Information, the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network shares the second network element with the second network Sending the first information to the first network element, the first information is used by the first network element to determine whether to send an access denied message or an access allowed message to the terminal device.
- the terminal device is used to perform the method in the second aspect or any possible implementation manner of the second aspect
- the network device is used to perform the fourth aspect or any possible implementation manner of the fourth aspect The method.
- the terminal device determines whether to initiate an access request to the second network by acquiring the first information, and the first information indicates whether the terminal device is allowed to access while accessing the first network
- the second network thus ensures the security of the first network and the correct operation of services.
- the second network determines the first information and denies or permits the access of the terminal device according to the first information, thereby ensuring the first 1. The security of the network and the correct conduct of business.
- FIG. 1 is a schematic architectural diagram of an application scenario according to an embodiment of the present application.
- FIG. 2 is a schematic flowchart of a network access method according to an embodiment of the present application.
- FIG. 3 is a schematic flowchart of a network access method according to another embodiment of the present application.
- FIG. 4 is a schematic flowchart of a network access method according to another embodiment of the present application.
- FIG. 5 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- FIG. 6 is a schematic block diagram of a terminal device according to another embodiment of the present application.
- FIG. 7 is a schematic block diagram of a network device according to another embodiment of the present application.
- FIG. 8 is a schematic block diagram of a network device according to another embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a communication device according to an embodiment of the present application.
- FIG. 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
- FIG. 11 is a schematic block diagram of a communication system according to an embodiment of the present application.
- FIG. 12 is a schematic block diagram of a communication system according to another embodiment of the present application.
- GSM Global System of Mobile
- CDMA Code Division Multiple Access
- WCDMA Broadband Code Division Multiple Access
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- FDD Frequency Division Duplex
- TDD Time Division Duplex
- LTE-A Advanced Long Term Evolution
- NR New Radio
- NR NR system evolution system
- LTE on unlicensed spectrum LTE-based access to unlicensed spectrum, LTE-U
- NR NR-based access to unlicensed spectrum, NR-U
- Universal Mobile Telecommunication System Universal Mobile Telecommunication System
- UMTS Universal Mobile Telecommunication System
- WiMAX Worldwide Interoperability for Microwave Access
- CA carrier aggregation
- DC dual connectivity
- SA standalone
- the wireless communication system 100 may include an access network device 110.
- the access network device 110 may be a device that communicates with a terminal device.
- the access network device 110 can provide communication coverage for a specific geographic area, and can communicate with terminal devices located in the coverage area.
- the access network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved type in an LTE system
- BTS Base Transceiver Station
- NodeB, NB base station
- the base station (Evolutional Node B, eNB or eNodeB), or the network-side device in the NR system, or the wireless controller in the cloud radio access network (Cloud Radio Access Network, CRAN), or the access network device 110 may be Relay stations, access points, in-vehicle devices, wearable devices, network-side devices in next-generation networks or network-side devices in future public land mobile networks (Public Land Mobile Network, PLMN), etc.
- PLMN Public Land Mobile Network
- the communication system 100 also includes at least one terminal device 120 located within the coverage of the access network device 110.
- the terminal device 120 may be mobile or fixed.
- the terminal device 120 may refer to an access terminal, user equipment (User Equipment, UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication Device, user agent, or user device.
- User Equipment User Equipment
- Access terminals can be cellular phones, cordless phones, Session Initiation Protocol (SIP) phones, wireless local loop (Wireless Local Loop, WLL) stations, personal digital processing (Personal Digital Assistant (PDA), wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future 5G networks or terminal devices in future evolved PLMNs, etc.
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- wireless communication Functional handheld devices computing devices or other processing devices connected to wireless modems
- in-vehicle devices wearable devices
- terminal devices in future 5G networks or terminal devices in future evolved PLMNs etc.
- terminal direct connection Device to Device, D2D communication may also be performed between the terminal devices 120.
- the access network device 110 may provide services for the cell, and the terminal device 120 communicates with the network device 110 through the transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell, and the cell may be the access network device 110 (For example, a base station)
- the corresponding cell can be a macro base station or a base station corresponding to a small cell (Small cell).
- the small cell here may include: a metro cell, a micro cell, and a pico cell (Pico), Femtocell, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
- the communication system 100 further includes a core network device 130 that communicates with the access network device 110.
- the core network device 130 may be a core network device of a 5G system.
- access and mobility management functions (Access and Mobility Management Function, AMF), which are responsible for access and mobility management, have functions such as user authentication, handover, and location update; for example, session management functions (Session Management Function) , SMF), responsible for session management, including the establishment, modification, and release of Packet Data Unit (PDU) sessions; for example, the user plane function (User Plane Function, UPF) is responsible for the forwarding of user data.
- AMF Access and Mobility Management Function
- SMF Session Management Function
- PDU Packet Data Unit
- UPF User Plane Function
- the core network device 130 may also be a core network device of the LTE system or other systems.
- FIG. 1 exemplarily shows one access network device, one core network device, and three terminal devices, but the present application is not limited to this, and the wireless communication system 100 may further include multiple core network devices, and may also include multiple Access network devices and each access network device may also include other numbers of terminal devices within the coverage area, which is not limited in the embodiment of the present application.
- FIG. 2 is a schematic flowchart of a network access method according to an embodiment of the present application.
- the method shown in FIG. 2 may be executed by a terminal device, and the terminal device may be, for example, the terminal device 120 shown in FIG. 1.
- the embodiment of the present application does not make any limitation on the first network and the second network.
- the first network may be, for example, NPN
- the second network may be, for example, PLMN.
- the NPN can be called a standalone NPN (standalone NPN); when the terminal device accesses the NPN, it allows simultaneous access to the PLMN.
- the NPN can be called a non-independent NPN (non-independent NPN). standalone NPN).
- the network access method includes:
- the terminal device acquires the first information.
- the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network.
- the terminal device when accessing the first network, determines whether to initiate an access request to the second network according to the first information.
- the terminal device when accessing the first network, determines whether it is allowed to access the second network while accessing the first network by acquiring the first information, so as to determine whether The second network initiates an access request.
- the first information indicates that simultaneous access is not allowed, and after the terminal device that has accessed the first network obtains the first information, then No more access requests will be initiated to the second network, thereby ensuring the security of the first network and the correct execution of services.
- the access to the second network while accessing the first network described herein includes: the terminal device accesses the first network and the second network respectively, and / or the terminal device accesses the first network and connects via the first network Into the second network.
- allowing the terminal device to access the second network while accessing the first network is also simply referred to as “allowing access”.
- networks that allow terminal devices to access at the same time are those networks that allow terminal devices to access other networks while accessing the network.
- the terminal device When the first information indicates that the terminal device is not allowed to access the second network while accessing the first network, the terminal device will not simultaneously access the two networks; when the first information indicates that the terminal device is allowed to access the second network When one network is connected to the second network at the same time, the terminal device can also access another network when accessing one of the networks.
- the terminal device acquiring the first information includes: the terminal device acquiring the first information from a global subscriber identity module (Universal Subscriber Identity Module, USIM) of the terminal device or a memory of the terminal device.
- a global subscriber identity module Universal Subscriber Identity Module, USIM
- the first information can be stored in the terminal device in advance.
- the terminal device acquiring the first information includes: before the terminal device accesses the first network, receiving the first information sent by the second network element of the second network.
- the second network element may be, for example, AMF or Unified Data Management (Unified Data Management, UDM).
- AMF Unified Data Management
- UDM Unified Data Management
- the terminal device may access the second network before accessing the first network, and the second network element of the second network sends the first information to the terminal device.
- the terminal device disconnects the second network and then accesses the first network, it can determine whether to continue to initiate an access request to the second network while accessing the first network according to the first information.
- the terminal device acquiring the first information includes: after the terminal device accesses the first network, receiving the first information sent by the first network element of the first network.
- the first network element may be, for example, AMF, SMF or UPF.
- the first information is Data Network Name (DNN) or Single Network Slice Selection Assistance Information (S-NSSAI).
- DNN Data Network Name
- S-NSSAI Single Network Slice Selection Assistance Information
- the first information may be carried in a specific DNN or S-NSSAI.
- the first network can be uniquely determined according to the specific DDN or S-NSSAI. If the terminal device receives the DNN or S-NSSAI corresponding to the first network, it is determined that the first network allows the terminal device to also access other networks when accessing.
- the first information may be an identifier of the first network.
- the first information received by the terminal device includes the identifier of the first network, and it is determined that the first network allows the terminal device to access other networks when accessing.
- the first information may further include an identifier of the first network and a corresponding bit, where the value in the bit is used to indicate whether the first network allows the terminal device to access other networks when accessing, For example, a value of 1 in this bit indicates that simultaneous access is allowed, and a value of 0 in this bit indicates that simultaneous access is not allowed.
- the content included in the first information may also have other forms, which is not limited in this embodiment of the present application, as long as it can indicate whether the terminal device is allowed to access the second network while accessing the first network.
- the embodiment of the present application does not make any limitation on the content of the first information, as long as it can indicate whether the terminal device is allowed to access the second network while accessing the first network.
- the first information may indicate implicitly or explicitly whether the terminal device is allowed to access the second network while accessing the first network.
- the terminal device determines whether to initiate an access request to the second network according to the first information, including: the terminal device determines whether to request the second network according to whether the first information includes the identifier of the first network The network initiates an access request.
- the first information includes an identification of at least one network that allows terminal devices to access at the same time. If the first information includes the identifier of the first network, that is, the at least one network includes the first network, the terminal device determines that an access request can be initiated to the second network; if the first information does not include the first network For the identification of the network, the terminal device determines not to initiate an access request to the second network.
- the first information includes identifications of multiple networks subscribed to by the terminal device, and information on whether each network allows simultaneous access, as shown in Table 1, for example.
- Table 1 if the first network is network 1, the terminal device can determine that it can access other networks while accessing network 1 according to the first information; if the first network is network 2, the terminal device can determine according to the first information While accessing the network 2, it is not possible to access other networks; if the first network is the network N, the terminal device can determine that it can access other networks while accessing the network N according to the first information.
- FIG. 3 is a process interaction diagram of a network access method according to an embodiment of the present application.
- the method shown in FIG. 3 may be executed by a terminal device and a network device, and the terminal device may be, for example, the terminal device 120 shown in FIG. 1.
- the network device may be, for example, the core network device 130 shown in FIG. 1.
- the network device is the first network element in the second network.
- the embodiment of the present application does not make any limitation on the first network and the second network.
- the first network may be, for example, NPN
- the second network may be, for example, PLMN.
- the network access method includes:
- the terminal device that has accessed the first network sends an access request message to the first network element of the second network.
- the access request message may be, for example, a registration request (Registration Request), a protocol data unit (Protocol Data Unit, PDU) session establishment request (PDU Session Establishment Request), and the like.
- the first network element receives the access request message sent by the terminal device.
- the first network element may be, for example, AMF, SMF or UPF.
- the first network element determines the first information.
- the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network.
- the first network element sends an access denied message or an access allowed message to the terminal device according to the first information.
- the terminal device receives an access denied message or an access allowed message sent by the first network element.
- the second network determines the first information and denies or allows the terminal device to access based on the first information.
- the first information indicates that simultaneous access is not allowed, and the second network will reject the access initiated by the terminal device after acquiring the first information Request, thereby ensuring the security of the first network and the correct conduct of business.
- the access to the second network while accessing the first network described herein includes: the terminal device accesses the first network and the second network respectively, and / or the terminal device accesses the first network and connects via the first network Into the second network.
- the terminal device will not simultaneously access the two networks; if the first information indicates that the terminal device is allowed to access the first network When the network accesses the second network at the same time, the terminal device can also access another network when accessing one of the networks.
- first network and the second network do not share the second network element.
- first network and the second network share the second network element.
- whether the first network and the second network share the second network element may inform the terminal device when the terminal device accesses the first network or the second network.
- the following uses the second network element as UDM as an example for description, but the present application is not limited to this.
- the second network does not know the current network of the terminal device Access situation.
- the access request message sent by the terminal device includes indication information, and the indication information is used to indicate that the terminal device has accessed the first network.
- the indication information may include the identification of the first network.
- the indication information may include an identifier of the first network and a corresponding bit, where the value in the bit is used to indicate whether the terminal device has accessed the first network, for example, the value in the bit is 0 The terminal device has not accessed the first network, and the value of 1 in this bit indicates that the terminal device has accessed the first network.
- the first network element determines the first information, including: the first network element receives an identifier of at least one network sent by the second network element of the second network to allow the terminal device to simultaneously access; The first network element determines the first information according to whether the at least one network includes the first network.
- the first network element determines the first information, including: the first network element obtains an identifier of at least one network that is locally configured to allow the terminal device to simultaneously access; the first network element is based on Whether the first network is included in the at least one network determines the first information.
- the first network element may obtain the identity of at least one network that allows the terminal device to access simultaneously from the local or from the second network element, and determine the first according to whether the at least one network includes the first network information. If the identification of the at least one network includes the identification of the first network, the first network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; if the identification of the at least one network Excluding the identifier of the first network, the first network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
- the first network element receives, from the second network element, the identities of multiple networks subscribed to by the terminal device, and whether each network allows simultaneous access, as shown in Table 2.
- Table 2 when the first network is network 1, terminal devices are allowed to access the second network at the same time; when the first network is network 2, terminal devices are not allowed to access the second network at the same time; when the first network is network 3, The terminal device is allowed to access the second network at the same time; when the first network is the network 4, the terminal device is allowed to access the second network at the same time.
- the first network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; when the first network is network 2 , The first network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
- the first network element determines that the first information is that the terminal device is not allowed to While accessing the first network, access the second network.
- the second network can learn the current network access of the terminal device happening.
- the access request message sent by the terminal device may not carry indication information for the terminal device to have accessed the first network.
- the first network element determines the first information, including: the first network element receives the identifier of the first network or the AMF identifier of the first network sent by the second network element; the first network element Obtain the locally configured identifier of at least one network that allows the terminal device to simultaneously access; the first network element determines the first information according to whether the at least one network includes the first network.
- the AMF identification is used to determine the identification of the first network.
- the AMF identification of different networks may be different.
- the second network element may send the first network element an AMF identification of the first network, and the first network element may determine the first network identification according to the ANF identification.
- the first network element can obtain the identity of the first network from the second network element, and locally obtain the identity of at least one network that allows the terminal device to access at the same time, and according to whether the at least one network includes the first A network to determine the first information. If the identification of the at least one network includes the identification of the first network, the first network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; if the identification of the at least one network Excluding the identifier of the first network, the first network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
- the first network element determines that the first information is that the terminal device While accessing the first network, access the second network.
- the first network element may locally obtain the identifiers of multiple networks subscribed to by the terminal device, and information on whether each network allows simultaneous access, as shown in Table 3 for example.
- Table 3 when the first network is network 1, terminal devices are not allowed to access the second network at the same time; when the first network is network 2, terminal devices are not allowed to access the second network; when the first network is network 3, The terminal device is not allowed to access the second network. Therefore, when the first network is network 1, network 2, or network 3, the first network element determines that the first information is not to allow the terminal device to access the second network while accessing the first network.
- the first network element determining the first information includes: the first network element receiving the first information sent by the second network element.
- the second network element determines the first information and sends the first information to the first network element, so that the first network element sends an access permission message or access to the terminal device according to the received first information Reject the message.
- FIG. 4 is a process interaction diagram of a network access method according to another embodiment of the present application.
- the network access method includes:
- the terminal device that has accessed the first network sends an access request message to the first network element of the second network.
- the first network element receives an access request message sent by the terminal device that has accessed the first network.
- the first network element requests subscription information of the terminal device from the second network element.
- the first network element sends a request message to the second network element, where the request message is used to request subscription information of the terminal device.
- the second network element receives the request message, thereby knowing that the terminal device requests to access the second network, and executes 440.
- the first network element may also notify the second network element terminal device to request access to the second network through other indication information.
- the second network element determines the first information.
- the first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network and the second network share the second network element.
- the second network element sends the first information to the first network element.
- the first information is used by the first network element to determine whether to send an access denied message or an access allowed message to the terminal device.
- the first network element receives the first information sent by the second network element.
- the first network element sends an access denied message or an access allowed message to the terminal device according to the first information.
- the terminal device receives an access denied message or an access allowed message sent by the first network element.
- the second network element determines the first information and sends the first information to the first One network element.
- the second network element determines the first information, including: the second network element obtains an identifier of at least one network locally configured to allow the terminal device to simultaneously access; Whether the first network is included in a network determines the first information.
- the second network element may locally obtain the identity of at least one network that allows the terminal device to simultaneously access, and determine the first information according to whether the at least one network includes the first network. If the identification of the at least one network includes the identification of the first network, the second network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; if the identification of the at least one network Without including the identifier of the first network, the second network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
- the second network element may locally obtain the identities of multiple networks subscribed to by the terminal device, and information on whether each network allows simultaneous access, such as the foregoing Table 2.
- Table 2 when the first network is network 1, terminal devices are allowed to access the second network at the same time; when the first network is network 2, terminal devices are not allowed to access the second network at the same time; when the first network is network 3, The terminal device is allowed to access the second network at the same time; when the first network is the network 4, the terminal device is allowed to access the second network at the same time.
- the second network element determines that the first information is to allow the terminal device to access the second network while accessing the first network; when the first network is network 2 , The second network element determines that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
- the first network element determines that the first information is that the terminal device is not allowed to access the first network at the same time Access the second network.
- the first network element or the second network element may also obtain the identifier of the network that does not allow the terminal device to access at the same time, and according to whether these networks include the first The network determines the first information. If the identifiers of these networks do not include the identifier of the first network, it is determined that the first information is to allow the terminal device to access the second network while accessing the first network; , It is determined that the first information is that the terminal device is not allowed to access the second network while accessing the first network.
- the first information corresponding to the identifier of the first network may be determined in the correspondence between the network identifier shown in Table 2 or Table 3 and the first information according to the identifier of the first network.
- the embodiment of the present application does not limit the specific implementation process of determining the first information.
- FIG. 5 is a schematic block diagram of a terminal device 500 according to an embodiment of the present application. As shown in FIG. 5, the terminal device 500 includes:
- the processing unit 510 is configured to acquire first information, where the first information is used to indicate whether to allow the terminal device to access the second network while accessing the first network;
- the processing unit 510 is further configured to, when accessing the first network, determine whether to initiate an access request to the second network according to the first information.
- the terminal device determines whether to initiate an access request to the second network by acquiring first information, and the first information indicates whether the terminal device is allowed to access the first network while accessing the first network. Second network, thus ensuring the security of the first network and the correct operation of the business.
- the access to the second network while accessing the first network includes: the terminal device accessing the first network and the second network respectively; and / or, the terminal The device accesses the first network and accesses the second network through the first network.
- the processing unit 510 is specifically configured to: obtain the first information from the USIM of the terminal device or the memory of the terminal device.
- a receiving unit is further included, wherein the processing unit 510 is specifically configured to: before the terminal device accesses the first network, receive the second network element of the second network through the receiving unit The first information sent.
- the second network element is AMF or UDM.
- a receiving unit is further included, wherein the processing unit 510 is specifically configured to: after the terminal device accesses the first network, receive the first network element of the first network through the receiving unit. The first information.
- the first network element is any one of the following: AMF, SMF, and UPF.
- the first information is DNN or S-NSSAI.
- the processing unit 510 is specifically configured to determine whether to initiate an access request to the second network according to whether the first information includes the identifier of the first network.
- the first network is NPN
- the second network is PLMN.
- terminal device 500 may perform the corresponding operations performed by the terminal device in the above method 200, and for the sake of brevity, no further details are provided here.
- FIG. 6 is a schematic block diagram of a terminal device 600 according to an embodiment of the present application. As shown in FIG. 6, the terminal device has accessed the first network, and the terminal device 600 includes:
- the sending unit 610 is configured to send an access request message to the first network element of the second network, where the access request message includes indication information, where the indication information is used to indicate that the terminal device has accessed the first network ;
- the receiving unit 620 is configured to receive an access denied message or an access allowed message sent by the first network element.
- the terminal device carries indication information in the access request message to indicate that the terminal device has accessed the first network, so that the second network determines the first information according to the indication information and rejects or allows the terminal device according to the first information. Access, thereby ensuring the security of the first network and the correct conduct of services.
- the indication information includes an identification of the first network.
- the first network element is any one of the following: AMF, SMF, and UPF.
- the first network is NPN
- the second network is PLMN.
- terminal device 600 may perform the corresponding operations performed by the terminal device in the above method 300, and for the sake of brevity, details are not described herein again.
- FIG. 7 is a schematic block diagram of a network device 700 according to an embodiment of the present application. As shown in FIG. 7, the network device is the first network element of the second network, and the network device 700 includes:
- the receiving unit 710 is configured to receive an access request message sent by a terminal device that has accessed the first network;
- the processing unit 720 is configured to determine first information that is used to indicate whether to allow the terminal device to access the second network while accessing the first network;
- the sending unit 730 is configured to send an access denied message or an access allowed message to the terminal device according to the first information determined by the processing unit 720.
- the second network determines the first information and denies or allows the access of the terminal device according to the first information, thereby ensuring the first 1.
- the access to the second network while accessing the first network includes: the terminal device accessing the first network and the second network respectively; and / or, the terminal The device accesses the first network and accesses the second network through the first network.
- the access request message includes indication information, and the indication information is used to indicate that the terminal device has accessed the first network.
- the indication information includes an identification of the first network.
- the processing unit 720 is specifically configured to: receive, through the receiving unit 610, an identifier of at least one network that is allowed to be simultaneously accessed by the terminal device and sent by the second network element of the second network; It is determined whether the first information is included in at least one network.
- the processing unit 720 is specifically configured to: obtain an identifier of at least one network locally configured to allow terminal devices to access simultaneously; and determine the first according to whether the at least one network includes the first network information.
- the processing unit 720 is specifically configured to: receive the identifier of the first network or the AMF identifier of the first network sent by the second network element through the receiving unit 710, where the AMF identifier is used To determine the identity of the first network, the first network and the second network share the second network element; obtain the locally configured identity of at least one network that allows the terminal device to simultaneously access; according to the at least Determine whether the first information is included in a network.
- the processing unit 720 is specifically configured to: receive, by the receiving unit 710, the first information sent by a second network element, where the first information is obtained locally by the second network element After the identification of the at least one network that the terminal device is allowed to access at the same time is determined according to whether the at least one network includes the first network, the first network shares the second network element with the second network.
- the second network element is AMF or UDM.
- the first network element is any one of the following: AMF, SMF, and UPF.
- the first network is NPN
- the second network is PLMN
- the network device 700 may perform the corresponding operations performed by the network device in the above method 300, and for the sake of brevity, no further details are provided here.
- FIG. 8 is a schematic block diagram of a network device 800 according to an embodiment of the present application. As shown in FIG. 8, the network device 800 includes:
- the processing unit 810 is configured to determine first information that is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network and the first The second network shares the second network element;
- the sending unit 820 is configured to send the first information determined by the processing unit 710 to the first network element, and the first information is used to determine that the first network element sends an access denied to the terminal device The message still allows access to the message.
- the second network determines the first information and denies or allows the access of the terminal device according to the first information, thereby ensuring the first 1.
- the processing unit 810 is specifically configured to: obtain a locally configured identifier of at least one network that allows terminal devices to simultaneously access; and determine the first according to whether the at least one network includes the first network information.
- the access to the second network while accessing the first network includes: the terminal device accessing the first network and the second network respectively; and / or, the terminal The device accesses the first network and accesses the second network through the first network.
- the second network element is AMF or UDM.
- the first network element is any one of the following: AMF, SMF, and UPF.
- the first network is NPN
- the second network is PLMN.
- the network device 800 may perform the corresponding operations performed by the network device in the above method 400, and for the sake of brevity, no further details are provided here.
- FIG. 9 is a schematic structural diagram of a communication device 900 provided by an embodiment of the present application.
- the communication device 900 shown in FIG. 9 includes a processor 910, and the processor 910 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the communication device 900 may further include a memory 920.
- the processor 910 can call and run a computer program from the memory 920 to implement the method in the embodiments of the present application.
- the memory 920 may be a separate device independent of the processor 910, or may be integrated in the processor 910.
- the communication device 900 may further include a transceiver 930, and the processor 910 may control the transceiver 930 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by the device.
- the transceiver 930 may include a transmitter and a receiver.
- the transceiver 930 may further include antennas, and the number of antennas may be one or more.
- the communication device 900 may specifically be the terminal device in the embodiment of the present application, and the communication device 900 may implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application. Repeat.
- the communication device 900 may specifically be the network device in the embodiment of the present application, and the communication device 900 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. Repeat.
- FIG. 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
- the chip 1000 shown in FIG. 10 includes a processor 1010, and the processor 1010 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the chip 1000 may further include a memory 1020.
- the processor 1010 can call and run a computer program from the memory 1020 to implement the method in the embodiments of the present application.
- the memory 1020 may be a separate device independent of the processor 1010, or may be integrated in the processor 1010.
- the chip 1000 may further include an input interface 1030.
- the processor 1010 can control the input interface 1030 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
- the chip 1000 may further include an output interface 1040.
- the processor 1010 can control the output interface 1040 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
- the chip can be applied to the terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
- chips mentioned in the embodiments of the present application may also be referred to as system-on-chips, system chips, chip systems, or system-on-chip chips.
- the processor in the embodiment of the present application may be an integrated circuit chip, which has signal processing capabilities.
- each step of the foregoing method embodiment may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
- the above-mentioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an existing programmable gate array (Field Programmable Gate Array, FPGA) or other available Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
- DSP Digital Signal Processor
- ASIC Application Specific Integrated Circuit
- FPGA Field Programmable Gate Array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied and executed by a hardware decoding processor, or may be executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module may be located in a mature storage medium in the art, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, and registers.
- the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
- the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory may be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electronically Erasable programmable read only memory (Electrically, EPROM, EEPROM) or flash memory.
- the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
- RAM static random access memory
- DRAM dynamic random access memory
- DRAM synchronous dynamic random access memory
- SDRAM double data rate synchronous dynamic random access memory
- Double Data Rate SDRAM DDR SDRAM
- enhanced SDRAM ESDRAM
- Synchlink DRAM SLDRAM
- Direct Rambus RAM Direct Rambus RAM
- the memory in the embodiments of the present application may also be static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (Synch Link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is to say, the memories in the embodiments of the present application are intended to include but are not limited to these and any other suitable types of memories.
- FIG. 11 is a schematic block diagram of a communication system 1100 according to an embodiment of the present application. As shown in FIG. 11, the communication system 1100 includes a network device 1110 and a terminal device 1120.
- the terminal device 1120 is configured to: when the first network has been accessed, send an access request message to the first network element of the second network, where the access request message includes indication information, and the indication information is used to Indicating that the terminal device has accessed the first network; receiving an access denied message or an access allowed message sent by the first network element.
- the network device 1110 is the first network element of the second network, and the network device 1110 is configured to: receive an access request message sent by a terminal device that has accessed the first network; determine first information, and the first information is used to Indicate whether to allow the terminal device to access the second network while accessing the first network; according to the first information, send an access denied message or an access allowed message to the terminal device.
- the terminal device 1120 may be used to implement the corresponding functions implemented by the terminal device in the above method 300, and the composition of the terminal device 1120 may be as shown in the terminal device 600 in FIG.
- the network device 1110 may be used to implement the corresponding functions implemented by the network device in the above method 300, and the composition of the network device 1110 may be as shown in the network device 700 in FIG.
- FIG. 12 is a schematic block diagram of a communication system 1200 according to an embodiment of the present application. As shown in FIG. 12, the communication system 1200 includes a network device 1210 and a terminal device 1220.
- the terminal device 1220 is configured to: when the first network has been accessed, send an access request message to the first network element of the second network, where the access request message includes indication information, and the indication information is used to Indicating that the terminal device has accessed the first network; receiving an access denied message or an access allowed message sent by the first network element.
- the network device 1210 is a second network element, and the network device 1210 is configured to: when the first network element of the second network receives the access request message sent by the terminal device that has accessed the first network, determine the first information, The first information is used to indicate whether the terminal device is allowed to access the second network while accessing the first network, and the first network shares the second network element with the second network; The first network element sends the first information, and the first information is used by the first network element to determine whether to send an access denied message or an access allowed message to the terminal device.
- the terminal device 1220 may be used to implement the corresponding functions implemented by the terminal device in the above method 400, and the composition of the terminal device 1220 may be as shown in the terminal device 600 in FIG.
- the network device 1210 may be used to implement the corresponding functions implemented by the network device in the above method 400, and the composition of the network device 1210 may be as shown in the network device 800 in FIG.
- Embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
- the computer-readable storage medium may be applied to the network device in the embodiments of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiments of the present application.
- the computer-readable storage medium may be applied to the terminal device in the embodiments of the present application, and the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. No longer.
- An embodiment of the present application also provides a computer program product, including computer program instructions.
- the computer program product can be applied to the network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program product can be applied to the terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application. Repeat again.
- An embodiment of the present application also provides a computer program.
- the computer program can be applied to the network device in the embodiments of the present application.
- the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. , Will not repeat them here.
- the computer program can be applied to the terminal device in the embodiments of the present application.
- the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. , Will not repeat them here.
- B corresponding to (corresponding to) A means that B is associated with A, and B can be determined according to A.
- determining B based on A does not mean determining B based on A alone, and B may also be determined based on A and / or other information.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are only schematic.
- the division of the unit is only a division of logical functions.
- there may be another division manner for example, multiple units or components may be combined or may Integration into another system, or some features can be ignored, or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- the functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
- the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
签约网络的标识 | 是否允许同时接入 |
网络1 | 允许 |
网络2 | 不允许 |
…… | ….. |
网络N | 允许 |
签约网络的标识 | 第一信息 |
网络1 | 允许 |
网络2 | 不允许 |
网络3 | 允许 |
网络4 | 允许 |
签约网络的标识 | 第一信息 |
网络1 | 不允许 |
网络2 | 不允许 |
网络3 | 不允许 |
Claims (74)
- 一种网络接入方法,其特征在于,所述方法包括:终端设备获取第一信息,所述第一信息用于指示是否允许所述终端设备在接入第一网络的同时接入第二网络;所述终端设备在接入所述第一网络时,根据所述第一信息确定是否向所述第二网络发起接入请求。
- 根据权利要求1所述的方法,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
- 根据权利要求1或2所述的方法,其特征在于,所述终端设备获取第一信息,包括:所述终端设备从所述终端设备的全球用户身份识别模块USIM或所述终端设备的存储器中,获取所述第一信息。
- 根据权利要求1或2所述的方法,其特征在于,所述终端设备获取第一信息,包括:在所述终端设备接入所述第一网络之前,接收所述第二网络的第二网元发送的所述第一信息。
- 根据权利要求4所述的方法,其特征在于,所述第二网元为接入与移动性管理功能AMF或统一数据管理UDM。
- 根据权利要求1或2所述的方法,其特征在于,所述终端设备获取第一信息,包括:在所述终端设备接入所述第一网络之后,接收所述第一网络的第一网元发送的所述第一信息。
- 根据权利要求6所述的方法,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
- 根据权利要求1至7中任一项所述的方法,其特征在于,所述第一信息为数据网络名称DNN或者单网络切片选择辅助信息S-NSSAI。
- 根据权利要求1至7中任一项所述的方法,其特征在于,所述终端设备根据所述第一信息确定是否向所述第二网络发起接入请求,包括:所述终端设备根据所述第一信息中是否包括所述第一网络的标识,确定是否向所述第二网络发起接入请求。
- 根据权利要求1至9中任一项所述的方法,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
- 一种网络接入方法,其特征在于,所述方法包括:已接入第一网络的终端设备,向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;所述终端设备接收所述第一网元发送的拒绝接入消息或者允许接入消息。
- 根据权利要求11所述的方法,其特征在于,所述指示信息包括所述第一网络的标识。
- 根据权利要求11或12所述的方法,其特征在于,所述第一网元为以下中的任意一种:接入与移动性管理功能AMF、会话管理功能SMF和用户面功能UPF。
- 根据权利要求11至13中任一项所述的方法,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
- 一种网络接入方法,其特征在于,所述方法包括:第二网络的第一网元接收已接入第一网络的终端设备发送的接入请求消息;所述第一网元确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入所述第二网络;所述第一网元根据所述第一信息,向所述终端设备发送拒绝接入消息或允许接入消息。
- 根据权利要求15所述的方法,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
- 根据权利要求15或16所述的方法,其特征在于,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络。
- 根据权利要求17所述的方法,其特征在于,所述指示信息包括所述第一网络的标识。
- 根据权利要求17或18所述的方法,其特征在于,所述第一网元确定第一信息,包括:所述第一网元接收所述第二网络的第二网元发送的允许所述终端设备同时接入的至少一个网络的标识;所述第一网元根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
- 根据权利要求17或18所述的方法,其特征在于,所述第一网元确定第一信息,包括:所述第一网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;所述第一网元根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
- 根据权利要求15或16所述的方法,其特征在于,所述第一网元确定第一信息,包括:所述第一网元接收第二网元发送的所述第一网络的标识或所述第一网络的接入与移动性管理功能AMF标识,其中,所述AMF标识用于确定所述第一网络的标识,所述第一网络与所述第二网络共用所述第二网元;所述第一网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;所述第一网元根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
- 根据权利要求15或16所述的方法,其特征在于,所述第一网元确定第一信息,包括:所述第一网元接收第二网元发送的所述第一信息,其中,所述第一信息是所述第二网元获取本地配置的允许终端设备同时接入的至少一个网络的标识后,根据所述至少一个网络中是否包括所述第一网络确定的,所述第一网络与所述第二网络共用所述第二网元。
- 根据权利要求21或22所述的方法,其特征在于,第二网元为AMF或统一数据管理UDM。
- 根据权利要求15至23中任一项所述的方法,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
- 根据权利要求1至10中任一项所述的方法,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
- 一种网络接入方法,其特征在于,所述方法包括:当第二网络的第一网元接收到已接入第一网络的终端设备发送的接入请求消息时,第二网元确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入第二网络,所述第一网络与所述第二网络共用所述第二网元;所述第二网元向所述第一网元发送所述第一信息,所述第一信息用于所述第一网元确定向所述终端设备发送拒绝接入消息还是允许接入消息。
- 根据权利要求26所述的方法,其特征在于,所述第二网元确定第一信息,包括:所述第二网元获取本地配置的允许终端设备同时接入的至少一个网络的标识;所述第二网元根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
- 根据权利要求26或27所述的方法,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
- 根据权利要求26至28中任一项所述的方法,其特征在于,第二网元为接入与移动性管理功能AMF或统一数据管理UDM。
- 根据权利要求26至29中任一项所述的方法,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
- 根据权利要求26至30中任一项所述的方法,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
- 一种终端设备,其特征在于,所述终端设备包括:处理单元,用于获取第一信息,所述第一信息用于指示是否允许所述终端设备在接入第一网络的同时接入第二网络;所述处理单元还用于,在接入所述第一网络时,根据所述第一信息确定是否向所述第二网络发起接入请求。
- 根据权利要求32所述的终端设备,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
- 根据权利要求32或33所述的终端设备,其特征在于,所述处理单元具体用于:从所述终端设备的全球用户身份识别模块USIM或所述终端设备的存储器中,获取所述第一信息。
- 根据权利要求32或33所述的终端设备,其特征在于,还包括接收单元,其中,所述处理单元具体用于:在所述终端设备接入所述第一网络之前,通过所述接收单元接收所述第二网络的第二网元发送的 所述第一信息。
- 根据权利要求35所述的终端设备,其特征在于,所述第二网元为接入与移动性管理功能AMF或统一数据管理UDM。
- 根据权利要求32或33所述的终端设备,其特征在于,还包括接收单元,其中,所述处理单元具体用于:在所述终端设备接入所述第一网络之后,通过所述接收单元接收所述第一网络的第一网元发送的所述第一信息。
- 根据权利要求37所述的终端设备,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
- 根据权利要求32至38中任一项所述的终端设备,其特征在于,所述第一信息为数据网络名称DNN或者单网络切片选择辅助信息S-NSSAI。
- 根据权利要求32至38中任一项所述的终端设备,其特征在于,所述处理单元具体用于:根据所述第一信息中是否包括所述第一网络的标识,确定是否向所述第二网络发起接入请求。
- 根据权利要求32至10中任一项所述的终端设备,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
- 一种终端设备,其特征在于,所述终端设备已接入第一网络,所述终端设备包括:发送单元,用于向第二网络的第一网元发送接入请求消息,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络;接收单元,用于接收所述第一网元发送的拒绝接入消息或者允许接入消息。
- 根据权利要求42所述的终端设备,其特征在于,所述指示信息包括所述第一网络的标识。
- 根据权利要求42或43所述的终端设备,其特征在于,所述第一网元为以下中的任意一种:接入与移动性管理功能AMF、会话管理功能SMF和用户面功能UPF。
- 根据权利要求42至44中任一项所述的终端设备,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
- 一种网络设备,其特征在于,所述网络设备为第二网络的第一网元,所述网络设备包括:接收单元,用于接收已接入第一网络的终端设备发送的接入请求消息;处理单元,用于确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入所述第二网络;发送单元,用于根据所述处理单元确定的所述第一信息,向所述终端设备发送拒绝接入消息或允许接入消息。
- 根据权利要求46所述的网络设备,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
- 根据权利要求46或47所述的网络设备,其特征在于,所述接入请求消息包括指示信息,所述指示信息用于指示所述终端设备已接入所述第一网络。
- 根据权利要求48所述的网络设备,其特征在于,所述指示信息包括所述第一网络的标识。
- 根据权利要求48或49所述的网络设备,其特征在于,所述处理单元具体用于:通过所述接收单元接收所述第二网络的第二网元发送的允许所述终端设备同时接入的至少一个网络的标识;根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
- 根据权利要求48或49所述的网络设备,其特征在于,所述处理单元具体用于:获取本地配置的允许终端设备同时接入的至少一个网络的标识;根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
- 根据权利要求46或47所述的网络设备,其特征在于,所述处理单元具体用于:通过所述接收单元接收第二网元发送的所述第一网络的标识或所述第一网络的接入与移动性管理功能AMF标识,其中,所述AMF标识用于确定所述第一网络的标识,所述第一网络与所述第二网络共用所述第二网元;获取本地配置的允许终端设备同时接入的至少一个网络的标识;根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
- 根据权利要求46或47所述的网络设备,其特征在于,所述处理单元具体用于:通过所述接收单元接收第二网元发送的所述第一信息,其中,所述第一信息是所述第二网元获取本 地配置的允许终端设备同时接入的至少一个网络的标识后,根据所述至少一个网络中是否包括所述第一网络确定的,所述第一网络与所述第二网络共用所述第二网元。
- 根据权利要求52或53所述的网络设备,其特征在于,第二网元为AMF或统一数据管理UDM。
- 根据权利要求46至54中任一项所述的网络设备,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
- 根据权利要求46至55中任一项所述的网络设备,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
- 一种网络设备,其特征在于,所述网络设备为第二网络的第二网元,所述网络设备包括:处理单元,用于确定第一信息,所述第一信息用于指示是否允许所述终端设备在接入所述第一网络的同时接入第二网络,所述第一网络与所述第二网络共用所述第二网元;发送单元,用于向所述第一网元发送所述处理单元确定的所述第一信息,所述第一信息用于所述第一网元确定向所述终端设备发送拒绝接入消息还是允许接入消息。
- 根据权利要求57所述的网络设备,其特征在于,所述处理单元具体用于:获取本地配置的允许终端设备同时接入的至少一个网络的标识;根据所述至少一个网络中是否包括所述第一网络,确定所述第一信息。
- 根据权利要求57或58所述的网络设备,其特征在于,所述在接入所述第一网络的同时接入第二网络,包括:所述终端设备分别接入所述第一网络和所述第二网络;和/或,所述终端设备接入所述第一网络并通过所述第一网络接入所述第二网络。
- 根据权利要求57至59中任一项所述的网络设备,其特征在于,第二网元为接入与移动性管理功能AMF或统一数据管理UDM。
- 根据权利要求57至60中任一项所述的网络设备,其特征在于,所述第一网元为以下中的任意一种:AMF、会话管理功能SMF和用户面功能UPF。
- 根据权利要求57至61中任一项所述的网络设备,其特征在于,所述第一网络为非公共网络NPN,所述第二网络为公共陆地移动网络PLMN。
- 一种终端设备,其特征在于,所述终端设备包括处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
- 一种网络设备,其特征在于,所述网络设备包括处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
- 一种芯片,其特征在于,所述芯片包括处理器,所述处理器用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
- 一种芯片,其特征在于,所述芯片包括处理器,所述处理器用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
- 一种计算机程序产品,其特征在于,包括计算机程序指令,所述计算机程序指令使得计算机执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
- 一种计算机程序产品,其特征在于,包括计算机程序指令,所述计算机程序指令使得计算机执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
- 一种计算机程序,其特征在于,所述计算机程序使得计算机执行权利要求1至10中任一项所述的方法或者权利要求11至14中任一项所述的方法。
- 一种计算机程序,其特征在于,所述计算机程序使得计算机执行权利要求15至25中任一项所述的方法或者权利要求26至31中任一项所述的方法。
- 一种通信系统,其特征在于,包括如权利要求42至45中任意一项所述的终端设备以及如权利 要求46至56中任意一项所述的网络设备。
- 一种通信系统,其特征在于,包括如权利要求42至45中任意一项所述的终端设备以及如权利要求57至62中任意一项所述的网络设备。
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201880075565.2A CN111448816A (zh) | 2018-11-16 | 2018-11-16 | 网络接入方法和设备 |
JP2021525668A JP2022515590A (ja) | 2018-11-16 | 2018-11-16 | ネットワークアクセス方法及びデバイス |
EP18940269.6A EP3846521B1 (en) | 2018-11-16 | 2018-11-16 | Network access method and device |
PCT/CN2018/115989 WO2020097928A1 (zh) | 2018-11-16 | 2018-11-16 | 网络接入方法和设备 |
SG11202104890RA SG11202104890RA (en) | 2018-11-16 | 2018-11-16 | Network access method and device |
KR1020217014919A KR20210091716A (ko) | 2018-11-16 | 2018-11-16 | 네트워크 액세스 방법 및 디바이스 |
CN202010611566.3A CN111757417B (zh) | 2018-11-16 | 2018-11-16 | 网络接入方法和设备 |
AU2018449745A AU2018449745A1 (en) | 2018-11-16 | 2018-11-16 | Network access method and device |
US17/216,620 US11736943B2 (en) | 2018-11-16 | 2021-03-29 | Network access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/115989 WO2020097928A1 (zh) | 2018-11-16 | 2018-11-16 | 网络接入方法和设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/216,620 Continuation US11736943B2 (en) | 2018-11-16 | 2021-03-29 | Network access method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020097928A1 true WO2020097928A1 (zh) | 2020-05-22 |
Family
ID=70731283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/115989 WO2020097928A1 (zh) | 2018-11-16 | 2018-11-16 | 网络接入方法和设备 |
Country Status (8)
Country | Link |
---|---|
US (1) | US11736943B2 (zh) |
EP (1) | EP3846521B1 (zh) |
JP (1) | JP2022515590A (zh) |
KR (1) | KR20210091716A (zh) |
CN (2) | CN111757417B (zh) |
AU (1) | AU2018449745A1 (zh) |
SG (1) | SG11202104890RA (zh) |
WO (1) | WO2020097928A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115699979A (zh) * | 2020-08-03 | 2023-02-03 | Oppo广东移动通信有限公司 | 无线通信方法和设备 |
CN112437456B (zh) * | 2020-12-07 | 2023-05-26 | 中国联合网络通信集团有限公司 | 一种非公共网络中的通信方法及设备 |
CN113489747B (zh) * | 2021-08-17 | 2023-03-24 | 中国联合网络通信集团有限公司 | 会话连接方法、装置及终端 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101133618A (zh) * | 2005-04-19 | 2008-02-27 | 思科技术公司 | 连接公共网络中的vpn用户 |
CN104469762A (zh) * | 2013-09-12 | 2015-03-25 | 西安龙飞网络科技有限公司 | 一种3g/wifi无线路由器用户分级控制方法 |
EP2890180A1 (en) * | 2013-12-27 | 2015-07-01 | Telefonica S.A. | Method for managing a network access user policy for offloading data traffic, using access network discovery and selection function |
US20170214682A1 (en) * | 2014-08-01 | 2017-07-27 | Applied Electronics Corp. | Virtual communication system |
WO2018075233A2 (en) * | 2016-10-20 | 2018-04-26 | T-Mobile Usa, Inc. | Wlan assisted cellular network discovery and selection |
CN108323245A (zh) * | 2017-06-19 | 2018-07-24 | 华为技术有限公司 | 一种注册及会话建立的方法、终端和amf实体 |
CN108574969A (zh) * | 2017-03-08 | 2018-09-25 | 华为技术有限公司 | 多接入场景中的连接处理方法和装置 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102685714B (zh) | 2011-03-18 | 2017-12-15 | 中兴通讯股份有限公司 | 一种支持双模双待终端同时通信的方法和系统 |
WO2013029672A1 (en) * | 2011-08-31 | 2013-03-07 | Telefonaktiebolaget L M Ericsson (Publ) | Andsf policy controlled access network discovery information |
EP2845417B8 (en) * | 2012-05-03 | 2020-06-17 | Huawei Technologies Sweden AB | Sending access information from physical access control system to user terminal |
US9497623B2 (en) * | 2012-05-25 | 2016-11-15 | Nokia Technologies Oy | Method and apparatus for guest access sharing |
EP3111611B1 (en) | 2014-02-24 | 2020-01-01 | Telefonaktiebolaget LM Ericsson (publ) | A node and a method for enabling network access authorization |
US20150326612A1 (en) | 2014-05-06 | 2015-11-12 | Qualcomm Incorporated | Techniques for network selection in unlicensed frequency bands |
US10142994B2 (en) * | 2016-04-18 | 2018-11-27 | Electronics And Telecommunications Research Institute | Communication method and apparatus using network slicing |
CN108024314B (zh) * | 2016-11-03 | 2021-07-16 | 华为技术有限公司 | 一种选择网络的方法及装置 |
WO2018082673A1 (zh) * | 2016-11-03 | 2018-05-11 | 华为技术有限公司 | 一种选择网络的方法及装置 |
WO2020092173A1 (en) * | 2018-11-02 | 2020-05-07 | Intel Corporation | Systems, methods, and devices for privacy and control of traffic accessing plmn service at a non-public network |
CN112970291A (zh) * | 2018-11-14 | 2021-06-15 | 苹果公司 | 非公共网络中的网络选择和服务连续性 |
-
2018
- 2018-11-16 CN CN202010611566.3A patent/CN111757417B/zh active Active
- 2018-11-16 AU AU2018449745A patent/AU2018449745A1/en not_active Abandoned
- 2018-11-16 WO PCT/CN2018/115989 patent/WO2020097928A1/zh unknown
- 2018-11-16 KR KR1020217014919A patent/KR20210091716A/ko unknown
- 2018-11-16 EP EP18940269.6A patent/EP3846521B1/en active Active
- 2018-11-16 CN CN201880075565.2A patent/CN111448816A/zh active Pending
- 2018-11-16 SG SG11202104890RA patent/SG11202104890RA/en unknown
- 2018-11-16 JP JP2021525668A patent/JP2022515590A/ja not_active Withdrawn
-
2021
- 2021-03-29 US US17/216,620 patent/US11736943B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101133618A (zh) * | 2005-04-19 | 2008-02-27 | 思科技术公司 | 连接公共网络中的vpn用户 |
CN104469762A (zh) * | 2013-09-12 | 2015-03-25 | 西安龙飞网络科技有限公司 | 一种3g/wifi无线路由器用户分级控制方法 |
EP2890180A1 (en) * | 2013-12-27 | 2015-07-01 | Telefonica S.A. | Method for managing a network access user policy for offloading data traffic, using access network discovery and selection function |
US20170214682A1 (en) * | 2014-08-01 | 2017-07-27 | Applied Electronics Corp. | Virtual communication system |
WO2018075233A2 (en) * | 2016-10-20 | 2018-04-26 | T-Mobile Usa, Inc. | Wlan assisted cellular network discovery and selection |
CN108574969A (zh) * | 2017-03-08 | 2018-09-25 | 华为技术有限公司 | 多接入场景中的连接处理方法和装置 |
CN108323245A (zh) * | 2017-06-19 | 2018-07-24 | 华为技术有限公司 | 一种注册及会话建立的方法、终端和amf实体 |
Also Published As
Publication number | Publication date |
---|---|
SG11202104890RA (en) | 2021-06-29 |
JP2022515590A (ja) | 2022-02-21 |
CN111757417A (zh) | 2020-10-09 |
US20210219136A1 (en) | 2021-07-15 |
KR20210091716A (ko) | 2021-07-22 |
AU2018449745A1 (en) | 2021-06-10 |
EP3846521A4 (en) | 2021-08-11 |
CN111448816A (zh) | 2020-07-24 |
US11736943B2 (en) | 2023-08-22 |
EP3846521B1 (en) | 2023-04-26 |
CN111757417B (zh) | 2022-01-25 |
EP3846521A1 (en) | 2021-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3399830B1 (en) | Determination of communication architecture type to be used by a ciot device | |
US11736943B2 (en) | Network access method and device | |
KR20200089316A (ko) | 통신 방법 및 통신 디바이스 | |
WO2020029191A1 (zh) | 能力上报的方法和设备 | |
US11252557B2 (en) | Capability identifier distribution method and device | |
WO2020087509A1 (zh) | 无线通信方法、终端设备和网络设备 | |
WO2020077577A1 (zh) | 数据包传输方法和设备 | |
WO2021232852A1 (zh) | 一种终端接入网络的方法及装置 | |
WO2020150876A1 (zh) | 会话建立方法、终端设备和网络设备 | |
US20220124500A1 (en) | Communication method, terminal device and network device | |
US10667180B2 (en) | Methods and devices for managing access priority of a wireless device | |
WO2019213951A1 (zh) | 下行信道的接收方法和终端设备 | |
US20230337111A1 (en) | Terminal device and network device | |
CN113692033B (zh) | 信息传输方法和设备 | |
WO2020258051A1 (zh) | 小区接入的方法和设备 | |
WO2022194262A1 (zh) | 安全通信的方法和装置 | |
KR20240060670A (ko) | 통신 방법 및 장치 | |
WO2022160123A1 (zh) | 接入方式选择方法、终端设备和网络设备 | |
WO2022126641A1 (zh) | 无线通信方法、终端设备、第一接入网设备以及网元 | |
WO2020087546A1 (zh) | 一种网络信息传输方法、获取方法、网络设备及终端设备 | |
JP2023500134A (ja) | 通信方法、通信装置、および通信システム | |
WO2022183317A1 (zh) | 一种获取切片信息的方法和终端设备 | |
WO2022141210A1 (zh) | 无线通信的方法、终端设备和网络设备 | |
WO2023051428A1 (zh) | 信息传输的方法和装置 | |
WO2022151079A1 (zh) | 无线通信的方法、终端设备和网络设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18940269 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2018940269 Country of ref document: EP Effective date: 20210402 |
|
ENP | Entry into the national phase |
Ref document number: 2021525668 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2018449745 Country of ref document: AU Date of ref document: 20181116 Kind code of ref document: A |