WO2020224345A1 - 网络接入控制方法、计算机可读介质及电子设备 - Google Patents
网络接入控制方法、计算机可读介质及电子设备 Download PDFInfo
- Publication number
- WO2020224345A1 WO2020224345A1 PCT/CN2020/080828 CN2020080828W WO2020224345A1 WO 2020224345 A1 WO2020224345 A1 WO 2020224345A1 CN 2020080828 W CN2020080828 W CN 2020080828W WO 2020224345 A1 WO2020224345 A1 WO 2020224345A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- public network
- terminal device
- public
- access control
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
- H04W84/045—Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/005—Multiple registrations, e.g. multihoming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/15—Setup of multiple wireless link connections
- H04W76/16—Involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
Definitions
- This application relates to the field of computer and communication technology, and in particular to a network access control method, computer readable medium and electronic equipment.
- PLMN Public Land Mobile Network, Public Land Mobile Network
- NPN Non-Public Network
- the embodiments of the present application provide a network access control method, a computer-readable medium, and an electronic device, which can effectively implement network access control in an application scenario where a public network and a non-public network coexist.
- a network access control method which is applied to a terminal device, and includes:
- the network connection capability includes the connection capability to mutually independent public and non-public networks; when the terminal device is in a connected state, according to the network service requirements of the terminal device and The network connection capability performs access control on the terminal device.
- a network access control method is provided, which is applied to a network side device, and includes:
- a network access control strategy is generated, the network access control strategy is used to enable terminal devices to perform access control according to network service requirements and network connection capabilities, and the network connection capabilities include connections to mutually independent public and non-public networks Capability; configure the network access control policy to the terminal device.
- a network access control method is provided, which is applied to a network side device, and includes:
- the non-public network is a network formed using network slices of a public network, and the tracking area of the non-public network is different from the tracking area of the public network; in any configuration of the tracking area During the period, the tracking area of the non-public network or the tracking area of the public network is configured to the terminal device, so that the terminal device enters the connected state to obtain network access when the tracking area is updated in the idle state or the inactive state Control information.
- a network access control method is provided, which is applied to a network side device, and includes:
- the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the area where the non-public network is located;
- the identification information of is configured to the terminal device, so that the terminal device determines whether to search for the non-public network according to the identification information of the non-public network in the idle state or the inactive state.
- a network access control method which is applied to a terminal device, and includes:
- Acquiring identification information of a non-public network configured by a network-side device, where the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the area where the non-public network is located;
- the terminal device is in an idle state or an inactive state, it is determined whether to search the non-public network according to the identification information of the non-public network.
- a network access control device including:
- the obtaining unit is used to obtain the network connection capability of the terminal device, where the network connection capability includes the connection capability to mutually independent public and non-public networks;
- the control unit is used to obtain the terminal device in the connected state, Perform access control on the terminal device according to the network service requirements of the terminal device and the network connection capability.
- control unit is configured to: if it is determined according to the network connection capability that the terminal device can support simultaneous connection to the public network and the non-public network, then When the terminal device needs to process public network services and non-public network services at the same time, control the terminal device to access the public network and the non-public network.
- control unit is configured to: if it is determined according to the network connection capability that the terminal device does not support simultaneous connection to the public network and the non-public network, according to The network service to be processed by the terminal device controls the terminal device to access the public network or the non-public network.
- control unit is configured to: if the terminal device needs to process public network services, control the terminal device to access the public network; if the terminal device needs To process non-public network services, control the terminal device to access the non-public network; if the terminal device needs to process both the public network service and the non-public network service at the same time, priority will be given to the services of the public network And the service priority of the non-public network, controlling the terminal device to access the network with the highest service priority.
- control unit is configured to: if it is determined according to the network connection capability that the terminal device does not support simultaneous connection to the public network and the non-public network, then When the network quality of one of the public network and the non-public network cannot meet service requirements, control the terminal device to access the other network.
- control unit is configured to: if the terminal device accesses the first network of the public network and the non-public network, if the The network quality of the first network cannot meet the service requirements, when the service of the first network needs to be processed, the terminal device is controlled to access the second network of the public network and the non-public network, and pass all The second network accesses the first network to process services of the first network.
- control unit is further configured to: if the terminal device accesses the first network of the public network and the non-public network, If the network quality of the second network of the public network and the non-public network cannot meet service requirements or the terminal device cannot connect to the second network, when the service of the second network needs to be processed, The first network accesses the second network to process services of the second network.
- the gateway device of the public network is connected to the gateway device of the non-public network.
- a network access control device including:
- the generating unit is used to generate a network access control strategy, the network access control strategy is used to enable the terminal device to perform access control according to network service requirements and network connection capabilities, and the network connection capabilities include The connection capability of the non-public network; the configuration unit is used to configure the network access control policy to the terminal device.
- the network access control policy includes the service priority of the public network and the service priority of the non-public network; wherein, the service priority is through the network
- the priority of the frequency point information is characterized, or the service priority is characterized by the priority of a network cell in the same frequency band.
- the configuration unit is configured to: when the terminal device is in an idle state or in an inactive state, configure cell reselection parameters or redirection parameters to the terminal The device configures the network access control policy.
- the network access control apparatus further includes: a determining unit, configured to: when it is detected that the terminal device needs to access the non-public network, according to the non-public network The identification information of the public network and the subscription information of the terminal device determine whether the terminal device can access the non-public network.
- a network access control device including:
- a generating unit configured to generate a tracking area of a non-public network, the non-public network is a network formed using network slices of a public network, and the tracking area of the non-public network is different from the tracking area of the public network; configuration unit , Used to configure the tracking area of the non-public network or the tracking area of the public network to the terminal device during any configuration period of the tracking area, so that the terminal device can update the tracking area in the idle state or the inactive state When entering the connected state to obtain network access control information.
- network cells within the same tracking area support the same network slices.
- a network access control device including:
- the obtaining unit is configured to obtain identification information of a non-public network, the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the area where the non-public network is located;
- the unit is configured to configure the identification information of the non-public network to a terminal device, so that the terminal device determines whether to search the non-public network according to the identification information of the non-public network in an idle state or an inactive state.
- the network access control apparatus further includes: a sending unit, configured to access the terminal device after receiving a request sent by the terminal device in an idle or inactive state When indicating information of a non-public network, sending configuration information to the terminal device to control the terminal device's access to the non-public network.
- the identification information of the non-public network includes at least one of the following: location information of a network cell of the non-public network, and geographic location information covered by the non-public network , Frequency point information of the non-public network.
- a network access control device including:
- the obtaining unit is configured to obtain identification information of a non-public network configured by a network side device, the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the non-public network where the non-public network is located Area; a processing unit for determining whether to search for a non-public network according to the identification information of the non-public network when the terminal device is in an idle state or an inactive state.
- the processing unit is configured to: if the identification information of the non-public network is detected, execute the search process of the non-public network; if the non-public network is not detected The identification information of the public network, stop searching the non-public network.
- the processing unit is further configured to: if it is necessary to access the non-public network, send to the network side device instruction information requesting access to the non-public network , And execute the network access process according to the configuration information fed back by the network side device for the indication information.
- a computer-readable medium having a computer program stored thereon, and when the computer program is executed by a processor, the network access performed by the terminal device in each of the foregoing embodiments is implemented.
- the control method or the network access control method executed by the network side device.
- an electronic device including: one or more processors; a storage device, configured to store one or more programs, when the one or more programs are When multiple processors are executed, the one or more processors are caused to implement the network access control method executed by the terminal device or the network access control method executed by the network side device in each of the foregoing embodiments.
- the terminal device when the terminal device is in a connected state, according to the network service requirements and network connection capabilities of the terminal device (that is, the connection between independent public and non-public networks) Ability) to perform access control on terminal equipment, so that in application scenarios where public and non-public networks coexist, network access control can be achieved based on the network service requirements and network connection capabilities of terminal equipment, thereby ensuring that the communication system can support Handling of public network services and non-public network services.
- the network service requirements and network connection capabilities of the terminal device that is, the connection between independent public and non-public networks) Ability
- the tracking area of the non-public network is generated, and the tracking area of the non-public network is different from the tracking area of the public network, and during any configuration period of the tracking area, Configure the tracking area of the non-public network or the tracking area of the public network to the terminal device so that the terminal device updates the tracking area in the idle or inactive state (such as entering the tracking area of the public network from the tracking area of the non-public network, or From the tracking area of the public network to the tracking area of the non-public network), it can enter the connected state to obtain network access control information to achieve network access control, thereby ensuring that the communication system can support public network services and non-public network services Processing.
- the identification information of the non-public network is obtained, and the identification information of the non-public network is used to identify the area where the non-public network is located, and the identification information of the non-public network is configured to
- the terminal device enables the terminal device to determine whether to search for a non-public network according to the identification information of the non-public network in the idle state or in the inactive state.
- the search process of the non-public network can be executed, and When the identification information of the non-public network is not detected, the search for the non-public network is stopped, so that on the premise of realizing network access control, the terminal device can avoid frequently searching for the non-public network and increase the power consumption of the terminal device.
- FIG. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied;
- FIG. 2 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied;
- Fig. 3 shows a flowchart of a network access control method according to an embodiment of the present application
- Fig. 4 shows a flowchart of a network access control method according to an embodiment of the present application
- Figure 5 shows a flowchart of a network access control method according to an embodiment of the present application
- Fig. 6 shows a flowchart of a network access control method according to an embodiment of the present application
- Fig. 7 shows a flowchart of a network access control method according to an embodiment of the present application
- Fig. 8 shows a schematic diagram of the location of a network cell according to an embodiment of the present application.
- Fig. 9 shows a block diagram of a network access control device according to an embodiment of the present application.
- Fig. 10 shows a block diagram of a network access control device according to an embodiment of the present application.
- Fig. 11 shows a block diagram of a network access control device according to an embodiment of the present application.
- Fig. 12 shows a block diagram of a network access control device according to an embodiment of the present application
- Fig. 13 shows a block diagram of a network access control device according to an embodiment of the present application
- Fig. 14 shows a schematic structural diagram of a computer system suitable for implementing an electronic device according to an embodiment of the present application.
- Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied.
- the system architecture may include a terminal device 101, a public network base station 102, and a non-public network base station 103.
- the terminal device 101 may be a smart phone as shown in FIG. 1, or it may be a tablet computer, a portable computer, a desktop computer, etc., which is not limited in this application.
- the public network base station 102 and the non-public network base station 103 are independently deployed, and form a public network and a non-public network respectively.
- terminal devices 101, public network base stations 102, and non-public network base stations 103 in FIG. 1 are merely illustrative. According to implementation requirements, there may be any number of terminal devices 101, public network base stations 102, and non-public network base stations 103.
- the public network base station 102 may generate a network access control policy, which is used to enable the terminal device 101 to perform access control according to network service requirements and network connection capabilities. Including the ability to connect to mutually independent public networks and non-public networks, and then the public network base station 102 can configure the network access control policy to the terminal device 101.
- the terminal device 101 can be connected to the terminal device 101 according to the network service requirements and network connection capabilities of the terminal device 101 when the terminal device 101 is in the connected state. Access control by itself ensures that the communication system can support the processing of public network services and non-public network services.
- Fig. 2 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied.
- the system architecture may include a terminal device 201 and a public network base station 202.
- the terminal device 201 may be a smart phone as shown in FIG. 2, or it may be a tablet computer, a portable computer, a desktop computer, etc., which is not limited in this application.
- the public network base station 202 can construct a non-public network by configuring private slices.
- terminal equipment 201 and public network base stations 202 in FIG. 2 are merely illustrative. According to implementation needs, there may be any number of terminal devices 201 and public network base stations 202.
- the public network base station 202 can generate a tracking area of a non-public network, and the tracking area of the non-public network is different from the tracking area of the public network, and the public network base station 202 can be in any of the tracking areas.
- the non-public network tracking area or the public network tracking area is configured to the terminal device 201, so that the terminal device 201 enters the connected state to obtain network access control information when the tracking area is updated in the idle state or the inactive state.
- the tracking areas of the public network and the non-public network are not configured for the terminal device 201 at the same time, so that the terminal device 201 can enter the connected state to obtain network access when the tracking area update occurs in the idle state or the inactive state.
- Access control information to achieve network access control, thereby ensuring that the communication system can support the processing of public network services and non-public network services.
- the terminal device 201 when the tracking area update occurs, the terminal device 201 enters the tracking area of the public network from the tracking area of the non-public network, or enters the tracking area of the non-public network from the tracking area of the public network. This application does not Do restrictions.
- the public network base station 202 can obtain the identification information of the non-public network, and the identification information of the non-public network is used to identify the area where the non-public network is located; then the public network The base station 202 can configure the identification information of the non-public network to the terminal device 201, and when the terminal device 201 is in the idle state or in the inactive state, it can determine whether to search for the non-public network according to the identification information of the non-public network.
- the terminal device 201 can When the identification information of the non-public network is detected, the search process of the non-public network is executed, and when the identification information of the non-public network is not detected, the search for the non-public network is stopped, so that the network access control can be realized. Avoid frequently searching non-public networks and increasing the power consumption of the terminal device 201.
- FIG. 3 shows a flowchart of a network access control method according to an embodiment of the present application.
- the network access control method may be executed by a terminal device, which may be the terminal device 101 shown in FIG. 1.
- the network access control method includes at least step S310 to step S320, which are described in detail as follows:
- step S310 the terminal device obtains its own network connection capability, where the network connection capability includes connection capability to mutually independent public networks and non-public networks.
- the ability of the terminal device to connect to independent public and non-public networks may include whether it can connect to a public network, whether it can connect to a non-public network, whether it can support simultaneous connection to a public network and Non-public network, this application is not restricted here.
- step S320 when the terminal device is in a connected state, access control is performed according to its own network service requirements and network connection capabilities.
- the process that the terminal device performs access control according to its own network service requirements and network connection capabilities may be: if the terminal device determines that it can support simultaneous connection to the public network according to its own network connection capabilities And non-public networks, when it is necessary to process public network services and non-public network services at the same time, control access to public and non-public networks.
- the technical solution of this embodiment enables simultaneous access to the public network and the non-public network according to the network connection capability of the terminal device, so as to simultaneously process the public network service and the non-public network service.
- the process in which the terminal device performs access control according to its own network service requirements and network connection capability in step S320 may also be: if the terminal device determines that it does not support simultaneous connection to the public according to its own network connection capability Network and non-public network, then according to the network business to be processed by oneself control access to public network or non-public network.
- the terminal device For example, if the terminal device needs to process public network services, the terminal device is controlled to access the public network; if the terminal device needs to process non-public network services, the terminal device is controlled to access the non-public network; if the terminal device needs to process public network services and For non-public network services, according to the service priority of the public network and the service priority of the non-public network, control terminal equipment to access the network with the highest service priority.
- the process in which the terminal device performs access control according to its own network service requirements and network connection capability in step S320 may also be: if the terminal device determines that it does not support simultaneous connection to the public according to its own network connection capability Network and non-public network, when the network quality of one of the public network and non-public network cannot meet the service requirements, control access to the other network.
- the technical solution of this embodiment enables the terminal device to preferentially access a network that meets service requirements when it does not support simultaneous connection to a public network and a non-public network.
- the process in which the terminal device performs access control according to its own network service requirements and network connection capabilities in step S320 may also be: the terminal device is connected to the first of the public and non-public networks.
- the terminal device accesses the second network of the public network and the non-public network, and passes through the second network Visit the first network to process the services of the first network.
- the technical solution of this embodiment enables the terminal device to access the first network, if the network quality of the first network cannot meet the service requirements, when the service of the first network needs to be processed, it can access the second network Indirectly access the first network to process the services of the first network.
- the gateway device of the public network and the gateway device of the non-public network may be connected to facilitate indirect access to the first network through the second network to process services of the first network.
- the terminal device when the terminal device is connected to the first network of the public network and the non-public network, if the network quality of the second network of the public network and the non-public network cannot meet the service requirements or If the terminal device cannot be connected to the second network, when it needs to process the services of the second network, it indirectly accesses the second network through the first network to process the services of the second network.
- the technical solution of this embodiment enables the terminal device to access the second network indirectly through the first network when it is unable to connect to the second network or the network quality of the second network cannot meet service requirements when accessing the first network , To handle the business of the second network.
- the gateway device of the public network and the gateway device of the non-public network may be connected to facilitate indirect access to the second network through the first network to process services of the second network.
- the technical solution of the embodiment shown in FIG. 3 makes it possible to implement network access control based on the network service requirements and network connection capabilities of the terminal device in an application scenario where public and non-public networks coexist, thereby ensuring that the communication system can support Handling of public network services and non-public network services.
- the aforementioned communication system may be a fifth-generation mobile communication technology (5th-Generation, 5G) system.
- FIG. 4 shows a flowchart of a network access control method according to an embodiment of the present application.
- the network access control method may be executed by a network side device, which may be the public network shown in FIG. 1
- the base station 102 may also be a network management device independent of the public network base station 102 and the non-public network base station 103.
- the network access control method includes at least step S410 to step S420, which are described in detail as follows:
- step S410 the network side device generates a network access control strategy, the network access control strategy is used to enable the terminal device to perform access control according to network service requirements and network connection capabilities, and the network connection capabilities include Connectivity between public and non-public networks.
- the network access control policy may include the service priority of the public network and the service priority of the non-public network, so that when the terminal device cannot process the public network service and the non-public network service at the same time, according to The service priority of the public network and the service priority of the non-public network are selected to process the service with the higher priority.
- the service priority may be characterized by the priority of the frequency point information of the network. For example, if the priority of the frequency point information where the public network is located is higher than the priority level of the frequency point information where the non-public network is located, it is determined that the service priority of the public network is higher than the service priority of the non-public network.
- the service priority may be characterized by the priority of the network cell in the same frequency band. For example, when the network cell of the public network and the network cell of the non-public network are in the same frequency band, if the priority of the network cell of the public network is higher than the priority of the network cell of the non-public network, the service of the public network The priority is higher than the business priority of non-public networks.
- step S420 the network side device configures the network access control policy to the terminal device.
- the network side device can directly configure the network access control policy to the terminal device through configuration signaling. If the terminal device is in an idle state or an inactive state, the network side device can configure a network access control strategy for the terminal device by configuring cell reselection parameters or redirection parameters.
- the network side device if it detects that the terminal device needs to access a non-public network, it can determine whether the terminal device can access the non-public network according to the identification information of the non-public network and the contract information of the terminal device . For example, if a terminal device signs an access agreement with a non-public network, the network side device can allow the terminal device to access the non-public network; if the terminal device does not sign an access agreement with a non-public network, the network The side device may refuse the terminal device to access the non-public network.
- the technical solution of the embodiment shown in FIG. 4 also enables in an application scenario where a public network and a non-public network coexist, network access control can be realized based on the network service requirements and network connection capabilities of the terminal device, thereby ensuring that the communication system can support Handling of public network services and non-public network services.
- FIG. 5 shows a flowchart of a network access control method according to an embodiment of the present application.
- the network access control method may be executed by a network side device, which may be the public network shown in FIG. 2 Base station 202.
- the network access control method includes at least step S510 to step S520, which are described in detail as follows:
- step S510 the network side device generates a tracking area of a non-public network
- the non-public network is a network formed using network slices of a public network
- the tracking area of the non-public network is different from the tracking area of the public network .
- network cells in the same tracking area support the same network slices.
- step S520 during any configuration period of the tracking area, the network side device configures the tracking area of the non-public network or the tracking area of the public network to the terminal device, so that the terminal device is in an idle state or The inactive state enters the connected state when the tracking area is updated to obtain network access control information.
- the technical solution of the embodiment shown in FIG. 5 prevents the tracking area of the non-public network and the tracking area of the public network from being configured to the terminal device at the same time. Therefore, the terminal device does not generate tracking area update (Tracking Area Update, in the idle state or the inactive state). TAU), there will be no moving from a non-public network to a public network, and no moving from a public network to a non-public network; and when the terminal device is in the idle or inactive state, the tracking area update occurs, It can enter the connected state to obtain network access control information to implement network access control, thereby ensuring that the communication system can support the processing of public network services and non-public network services.
- TAU Track Area Update
- FIG. 6 shows a flowchart of a network access control method according to an embodiment of the present application.
- the network access control method may be executed by a network side device, which may be the public network shown in FIG. 2 Base station 202.
- the network access control method includes at least step S610 to step S620, which are described in detail as follows:
- step S610 the network side device obtains identification information of a non-public network, which is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the location where the non-public network is located. area.
- the network-side device may obtain the identification information of the non-public network from an application function (AF) entity or a core network entity.
- the identification information of the non-public network may include at least one of the following: the location information of the network cell of the non-public network, the geographic location information covered by the non-public network, and the frequency point information of the non-public network, which is not limited in this application .
- step S620 the network side device configures the identification information of the non-public network to the terminal device, so that the terminal device determines whether to search for the non-public network according to the identification information of the non-public network in the idle state or the inactive state. Public network.
- the terminal device can perform the search process of the non-public network when the identification information of the non-public network is detected, and stop searching the non-public network when the identification information of the non-public network is not detected, Furthermore, on the premise of realizing network access control, it is possible to prevent the terminal device from frequently searching for non-public networks and increasing the power consumption of the terminal device.
- the network side device may send configuration information to the terminal device to connect to the terminal device. Access to non-public networks for control.
- the network side device may send configuration information to the terminal device through RRC (Radio Resource Control) signaling, and the configuration information may include measurement configuration information, etc., which is not limited in this application.
- RRC Radio Resource Control
- Fig. 7 shows a flowchart of a network access control method according to an embodiment of the present application.
- the network access control method may be executed by a terminal device, which may be the terminal device 201 shown in Fig. 2.
- the network access control method includes at least step S710 to step S720, which are described in detail as follows:
- the terminal device obtains the identification information of the non-public network configured by the network side device.
- the non-public network is a network formed by using network slices of the public network, and the identification information of the non-public network is used to identify the non-public network. The area where the public network is located.
- step S720 when the terminal device is in an idle state or an inactive state, it determines whether to search the non-public network according to the identification information of the non-public network.
- the terminal device can perform a search process of the non-public network when the identification information of the non-public network is detected; when the identification information of the non-public network is not detected, stop searching the non-public network Therefore, on the premise of realizing network access control, it is possible to prevent the terminal device from frequently searching for non-public networks and increasing the power consumption of the terminal device.
- the terminal device if it needs to access the non-public network after searching for the non-public network, it sends the instruction information requesting access to the non-public network to the network side device, and the network side device responds to the instruction information
- the feedback configuration information performs the network access process.
- the configuration information fed back by the network side device may include measurement configuration information, etc., which is not limited in this application.
- the deployment mode between PLMN and NPN can include the following two modes:
- Mode 1 Independent deployment of NPN mode.
- mode 1 the core network elements in the NPN are all deployed by the third party, and the third party solves the spectrum problem by itself, and does not rely on the functions provided in the public network.
- This mode is suitable for scenarios and industries that have strong demands for localized networks, and can be strictly isolated from public networks.
- Mode 2 NPN mode integrated with public networks.
- the core network elements (including base stations) in the NPN are shared with the PLMN.
- the NPN implements the isolation of business data from the PLMN through private slicing, and introduces a new user group management mechanism. Realize management. This mode is suitable for scenarios where hardware is not expected to be deployed locally.
- the isolation between NPN and PLMN can be distinguished by network slicing or PDU (Protocol Data Unit) sessions and QoS (Quality of Service) flows.
- PDU Protocol Data Unit
- QoS Quality of Service
- the switching between the PLMN and the NPN needs to consider the network service requirements and network connection capabilities of the terminal device. For example, if it is necessary to support the processing of PLMN services and NPN services at the same time, and the network connection capability of the terminal equipment supports the establishment of connections to the two networks at the same time, the terminal equipment can continuously drop the PLMN service or the NPN service during the handover process, but initiates again One connection means connecting to PLMN and NPN at the same time, unless the coverage of NPN or PLMN can no longer support the network connection of terminal equipment.
- the terminal device does not support simultaneous establishment of connections to the two networks, if the coverage and signal strength of the two networks meet the service requirements, then You can choose to connect to PLMN or NPN based on service priority; if the coverage and signal strength of only one of the two networks meet the business needs, you can connect to that network.
- whether the terminal device can access the NPN can be judged by the network identifier and the user's subscription information.
- the network side device needs to configure corresponding policies for the terminal device in advance, such as service priority, access control policy, etc.
- the service priority can be characterized by location information such as frequency point information or cell identification within the same frequency.
- NPN related priority and location range information can be configured by configuring cell reselection or redirection parameters during the RRC connection release process.
- the access control when the terminal device is in the connected state, the access control can be realized directly through network slicing; when the terminal device is in the idle state and inactive state, the access control problem of the terminal device can be solved by the following methods :
- dedicated TAs can be configured for NPN cells. These TAs can be space division multiplexed, that is, they can appear in different locations and are exclusive to NPN.
- cell 1, cell 2, and cell 3 are PLMN cells, configured with TA1; cell 4 is an NPN cell, configured with TA2.
- Cells in the same TA support the same slices. For example, all three cells in TA1 support slice S1, and the cells in TA2 support slice S2.
- the network side device needs to configure to ensure that the TA of the PLMN cell and the NPN cell will not be configured to the terminal device at the same time.
- the terminal device in the idle state and the inactive state will undergo a TA update process when reselecting from PLMN to NPN or from NPN to PLMN, thereby entering the connected state to obtain NPN-related configuration , To achieve access control; and when the terminal device does not have TAU, there will be no transition from accessing PLMN to accessing NPN, or from accessing NPN to accessing PLMN.
- the terminal device may not use the CAG (Closed Access Group) identification mechanism to perform the access control process.
- CAG Consumer Access Group
- a controllable NPN search can be realized through location information and fingerprints.
- a third-party application server AF can be used to realize a controllable NPN discovery process based on fingerprint information.
- AF or other core network elements can push NPN fingerprint information to terminal devices.
- These fingerprint information can include: location information composed of cell identification, GNSS (Global Navigation Satellite System) geographic location information, Frequency information, etc., and when the terminal device is moving in an idle state or an inactive state, it can be determined whether to search according to the fingerprint information of the NPN, so as to avoid frequent searches by the terminal device and increase the power consumption of the terminal device.
- GNSS Global Navigation Satellite System
- the terminal device can indicate to the network side device that it wants to perform access control and therefore enter the connected state, and the network side device can pass the RRC The signaling performs measurement configuration or other configuration on the terminal equipment to complete the access control process in mode 2.
- Fig. 9 shows a block diagram of a network access control device according to an embodiment of the present application.
- a network access control device 900 includes: an obtaining unit 902 and a control unit 904.
- the obtaining unit 902 is used to obtain the network connection capability of the terminal device, and the network connection capability includes the connection ability to mutually independent public and non-public networks; the control unit 904 is used to obtain the terminal device in the connected state. Next, perform access control on the terminal device according to the network service requirements of the terminal device and the network connection capability.
- control unit 904 is configured to: if it is determined according to the network connection capability that the terminal device can support simultaneous connection to the public network and the non-public network, then the terminal device needs to process simultaneously In the case of public network services and non-public network services, controlling the terminal device to access the public network and the non-public network.
- control unit 904 is configured to: if it is determined according to the network connection capability that the terminal device does not support simultaneous connection to the public network and the non-public network, then according to the requirements of the terminal device The processed network service controls the terminal device to access the public network or the non-public network.
- control unit 904 is configured to: if the terminal device needs to process public network services, control the terminal device to access the public network; if the terminal device needs to process non-public network services , The terminal device is controlled to access the non-public network; if the terminal device needs to process public network services and non-public network services at the same time, according to the service priority of the public network and the service of the non-public network Priority, controlling the terminal device to access the network with the highest service priority.
- control unit 904 is configured to: if it is determined according to the network connection capability that the terminal device does not support simultaneous connection to the public network and the non-public network, then connect to the public network and When the network quality of one of the non-public networks cannot meet service requirements, control the terminal device to access another network.
- control unit 904 is configured to: when the terminal device accesses the first network of the public network and the non-public network, if the network quality of the first network cannot To meet service requirements, when the service of the first network needs to be processed, the terminal device is controlled to access the second network of the public network and the non-public network, and access the second network through the second network A first network to process services of the first network.
- control unit 904 is further configured to: when the terminal device accesses the first network of the public network and the non-public network, if the public network and the If the network quality of the second network in the non-public network cannot meet the service requirements or the terminal device cannot be connected to the second network, then when the service of the second network needs to be processed, access through the first network The second network to process services of the second network.
- the gateway device of the public network is connected to the gateway device of the non-public network.
- the technical solutions of the embodiments of the present application make it possible to implement network access control based on the network service requirements and network connection capabilities of terminal devices in application scenarios where public networks and non-public networks coexist, thereby ensuring that the communication system can support access to public networks Business and non-public network business processing.
- Fig. 10 shows a block diagram of a network access control device according to an embodiment of the present application.
- the network access control apparatus 1000 includes: a generating unit 1002 and a configuration unit 1004.
- the generating unit 1002 is used to generate a network access control strategy, the network access control strategy is used to enable terminal devices to perform access control according to network service requirements and network connection capabilities, and the network connection capabilities include Network and non-public network connection capabilities; the configuration unit 1004 is used to configure the network access control strategy to the terminal device.
- the network access control policy includes the service priority of the public network and the service priority of the non-public network; wherein, the service priority is determined by the frequency point information of the network.
- the priority is characterized, or the service priority is characterized by the priority of a network cell in the same frequency band.
- the configuration unit 1004 is configured to configure the network to the terminal device by configuring cell reselection parameters or redirection parameters when the terminal device is in an idle state or in an inactive state. Access control strategy.
- the network access control apparatus 1000 further includes: a determining unit, configured to: when it is detected that the terminal device needs to access the non-public network, according to the information of the non-public network The identification information and the subscription information of the terminal device determine whether the terminal device can access the non-public network.
- the technical solutions of the embodiments of the present application also make it possible to implement network access control based on the network service requirements and network connection capabilities of terminal devices in application scenarios where public networks and non-public networks coexist, thereby ensuring that the communication system can support public Processing of network services and non-public network services.
- Fig. 11 shows a block diagram of a network access control device according to an embodiment of the present application.
- a network access control apparatus 1100 includes: a generating unit 1102 and a configuration unit 1104.
- the generating unit 1102 is configured to generate a tracking area of a non-public network, the non-public network is a network formed using network slices of a public network, and the tracking area of the non-public network is different from the tracking area of the public network;
- the configuration unit 1104 is used to configure the tracking area of the non-public network or the tracking area of the public network to the terminal device during any configuration period of the tracking area, so that the terminal device can track in the idle state or the inactive state When the zone is updated, it enters the connected state to obtain network access control information.
- network cells within the same tracking area support the same network slices.
- the technical solution of the embodiment of the present application prevents the tracking area of the non-public network and the tracking area of the public network from being configured for the terminal device at the same time. Therefore, when the terminal device does not update the tracking area in the idle state or in the inactive state, there will be no non-public network tracking area.
- the terminal device When the public network is moved to the public network, it will not move from the public network to the non-public network; and the terminal device can enter the connected state to obtain network access control information when the tracking area is updated in the idle or inactive state , In order to realize the access control of the network, and then can ensure that the communication system can support the processing of public network services and non-public network services.
- Fig. 12 shows a block diagram of a network access control device according to an embodiment of the present application.
- a network access control apparatus 1200 includes: an obtaining unit 1202 and a configuration unit 1204.
- the obtaining unit 1202 is configured to obtain identification information of a non-public network
- the non-public network is a network formed by using network slices of a public network
- the identification information of the non-public network is used to identify the area where the non-public network is located
- the configuration unit 1204 is configured to configure the identification information of the non-public network to the terminal device, so that the terminal device determines whether to search the non-public network according to the identification information of the non-public network in an idle state or an inactive state .
- the network access control apparatus 1200 further includes: a sending unit, configured to access the non-public network upon receiving a request sent by the terminal device in an idle or inactive state Sending configuration information to the terminal device to control the terminal device's access to the non-public network.
- the identification information of the non-public network includes at least one of the following: location information of a network cell of the non-public network, geographic location information covered by the non-public network, and Frequency information of public networks.
- the technical solution provided by the embodiments of the application obtains the identification information of the non-public network, and the identification information of the non-public network is used to identify the area where the non-public network is located, and the identification information of the non-public network is configured to the terminal device, so that the terminal device In the idle or inactive state, it can be determined whether to search for non-public networks according to the identification information of the non-public networks. For example, when the identification information of the non-public networks is detected, the search process of the non-public networks can be executed, and the non-public network is not detected.
- the network identification information stop searching for non-public networks, and on the premise of realizing network access control, it is possible to avoid terminal devices from frequently searching for non-public networks and increasing the power consumption of the terminal devices.
- Fig. 13 shows a block diagram of a network access control device according to an embodiment of the present application.
- a network access control apparatus 1300 includes: an obtaining unit 1302 and a configuration unit 1304.
- the obtaining unit 1302 is configured to obtain identification information of a non-public network configured by the network side device.
- the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the non-public network.
- the area where the public network is located; the processing unit 1304 is configured to determine whether to search the non-public network according to the identification information of the non-public network when the terminal device is in an idle state or an inactive state.
- the processing unit 1304 is configured to: if the identification information of the non-public network is detected, execute the search process of the non-public network; if the identification information of the non-public network is not detected , Stop searching the non-public network.
- the processing unit 1304 is further configured to: if it is necessary to access the non-public network, send to the network side device instruction information requesting access to the non-public network, and according to the The network side device executes the network access process with respect to the configuration information fed back by the indication information.
- the technical solution provided by the embodiments of the application obtains the identification information of the non-public network, and the identification information of the non-public network is used to identify the area where the non-public network is located, and the identification information of the non-public network is configured to the terminal device, so that the terminal device In the idle or inactive state, it can be determined whether to search for non-public networks according to the identification information of the non-public networks. For example, when the identification information of the non-public networks is detected, the search process of the non-public networks can be executed, and the non-public network is not detected.
- the network identification information stop searching for non-public networks, and on the premise of realizing network access control, it is possible to avoid terminal devices from frequently searching for non-public networks and increasing the power consumption of the terminal devices.
- Fig. 14 shows a schematic structural diagram of a computer system suitable for implementing an electronic device according to an embodiment of the present application.
- the computer system 1400 includes a central processing unit (Central Processing Unit, CPU) 1401, which can be loaded into a random system according to a program stored in a read-only memory (Read-Only Memory, ROM) 1402 or from the storage part 1408.
- Access memory (Random Access Memory, RAM) 1403 programs to execute various appropriate actions and processing, for example, execute the methods described in the above-mentioned embodiments.
- RAM 1403 various programs and data required for system operation are also stored.
- the CPU 1401, the ROM 1402, and the RAM 1403 are connected to each other through a bus 1404.
- An Input/Output (I/O) interface 1405 is also connected to the bus 1404.
- the following components are connected to the I/O interface 1405: input part 1406 including keyboard, mouse, etc.; output part 1407 including cathode ray tube (Cathode Ray Tube, CRT), liquid crystal display (LCD), etc., and speakers, etc. ; A storage part 1408 including a hard disk, etc.; and a communication part 1409 including a network interface card such as a LAN (Local Area Network) card and a modem.
- the communication section 1409 performs communication processing via a network such as the Internet.
- the driver 1410 is also connected to the I/O interface 1405 as needed.
- a removable medium 1411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1410 as needed, so that the computer program read from it is installed into the storage portion 1408 as needed.
- the process described above with reference to the flowchart can be implemented as a computer software program.
- the embodiments of the present application include a computer program product, which includes a computer program carried on a computer-readable medium, and the computer program includes program code for executing the method shown in the flowchart.
- the computer program may be downloaded and installed from the network through the communication part 1409, and/or installed from the removable medium 1411.
- CPU central processing unit
- the computer-readable medium shown in the embodiments of the present application may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the two.
- the computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above.
- Computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable Erasable Programmable Read Only Memory (EPROM), flash memory, optical fiber, portable compact disk read-only memory (Compact Disc Read-Only Memory, CD-ROM), optical storage device, magnetic storage device, or any suitable of the above The combination.
- the computer-readable storage medium may be any tangible medium that contains or stores a program, and the program may be used by or in combination with an instruction execution system, apparatus, or device.
- a computer-readable signal medium may include a data signal propagated in a baseband or as a part of a carrier wave, and a computer-readable program code is carried therein.
- This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
- the computer-readable signal medium may also be any computer-readable medium other than the computer-readable storage medium.
- the computer-readable medium may send, propagate, or transmit the program for use by or in combination with the instruction execution system, apparatus, or device .
- the program code contained on the computer-readable medium can be transmitted by any suitable medium, including but not limited to: wireless, wired, etc., or any suitable combination of the above.
- each block in the flowchart or block diagram may represent a module, program segment, or part of the code, and the above-mentioned module, program segment, or part of the code includes one or more executables for realizing the specified logic function. instruction.
- the functions marked in the block may also occur in a different order from the order marked in the drawings. For example, two blocks shown in succession can actually be executed substantially in parallel, or they can sometimes be executed in the reverse order, depending on the functions involved.
- each block in the block diagram or flowchart, and the combination of blocks in the block diagram or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or operations, or can be It is realized by a combination of dedicated hardware and computer instructions.
- the units involved in the embodiments described in the present application can be implemented in software or hardware, and the described units can also be provided in a processor. Among them, the names of these units do not constitute a limitation on the unit itself under certain circumstances.
- an electronic device including:
- One or more processors are One or more processors;
- the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 3 The described network access control method.
- an electronic device including:
- One or more processors are One or more processors;
- the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 4 The described network access control method.
- an electronic device including:
- One or more processors are One or more processors;
- the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 5 The described network access control method.
- the technical solution of the embodiment of the present application also provides an electronic device, including: one or more processors;
- the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 6 The described network access control method.
- the technical solution of the embodiment of the present application also provides an electronic device, including: one or more processors;
- the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 7 The described network access control method.
- this application also provides a computer-readable medium.
- the computer-readable medium may be included in the electronic device described in the above-mentioned embodiments; or it may exist alone without being assembled into the electronic device. in.
- the above-mentioned computer-readable medium carries one or more programs.
- the electronic device realizes the network access control method executed by the terminal device in the above-mentioned various embodiments, Or, the network access control method executed by the network side device.
- modules or units of the device for action execution are mentioned in the above detailed description, this division is not mandatory.
- the features and functions of two or more modules or units described above may be embodied in one module or unit.
- the features and functions of a module or unit described above can be further divided into multiple modules or units to be embodied.
- the exemplary embodiments described herein can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , Including several instructions to make a computing device (which can be a personal computer, a server, a touch terminal, or a network-side device, etc.) execute the method according to the embodiments of the present application.
- a computing device which can be a personal computer, a server, a touch terminal, or a network-side device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (26)
- 一种网络接入控制方法,其特征在于,应用于终端设备,包括:获取终端设备的网络连接能力,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;在所述终端设备处于连接态的情况下,根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制。
- 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:若根据所述网络连接能力确定所述终端设备能够支持同时连接至所述公共网络和所述非公共网络,则在所述终端设备需要同时处理公共网络业务和非公共网络业务时,控制所述终端设备接入所述公共网络和所述非公共网络。
- 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:若根据所述网络连接能力确定所述终端设备不支持同时连接至所述公共网络和所述非公共网络,则根据所述终端设备所要处理的网络业务,控制所述终端设备接入所述公共网络或所述非公共网络。
- 根据权利要求3所述的网络接入控制方法,其特征在于,所述根据所述终端设备所要处理的网络业务,控制所述终端设备接入所述公共网络或所述非公共网络,包括:若所述终端设备需要处理公共网络业务,则控制所述终端设备接入所述公共网络;若所述终端设备需要处理非公共网络业务,则控制所述终端设备接入所述非公共网络;若所述终端设备需要同时处理所述公共网络业务和所述非公共网络业务, 则根据所述公共网络的业务优先级和所述非公共网络的业务优先级,控制所述终端设备接入业务优先级最高的网络。
- 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:若根据所述网络连接能力确定所述终端设备不支持同时连接至所述公共网络和所述非公共网络,则在所述公共网络和所述非公共网络中的一个网络的网络质量不能满足业务需求时,控制所述终端设备接入另一个网络。
- 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:在所述终端设备接入了所述公共网络和所述非公共网络中的第一网络的情况下,若所述第一网络的网络质量无法满足业务需求,则在需要处理所述第一网络的业务时,控制所述终端设备接入所述公共网络和所述非公共网络中的第二网络,并通过所述第二网络访问所述第一网络,以处理所述第一网络的业务。
- 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:在所述终端设备接入了所述公共网络和所述非公共网络中的第一网络的情况下,若所述公共网络和所述非公共网络中的第二网络的网络质量无法满足业务需求或所述终端设备无法连接至所述第二网络,则在需要处理所述第二网络的业务时,通过所述第一网络访问所述第二网络,以处理所述第二网络的业务。
- 根据权利要求1至7中任一项所述的网络接入控制方法,其特征在于,所述公共网络的网关设备与所述非公共网络的网关设备相连接。
- 一种网络接入控制方法,其特征在于,应用于网络侧设备,包括:生成网络接入控制策略,所述网络接入控制策略用于使终端设备根据网络业务需求和网络连接能力进行接入控制,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;将所述网络接入控制策略配置给所述终端设备。
- 根据权利要求9所述的网络接入控制方法,其特征在于,所述网络接入控制策略包括所述公共网络的业务优先级和所述非公共网络的业务优先级;其中,所述业务优先级通过网络的频点信息的优先级来表征,或者所述业务优先级通过处于同一频段内的网络小区的优先级来表征。
- 根据权利要求9所述的网络接入控制方法,其特征在于,所述将所述网络接入控制策略配置给所述终端设备,包括:在所述终端设备处于空闲态或非激活态的情况下,通过配置小区重选参数或重定向参数为所述终端设备配置所述网络接入控制策略。
- 根据权利要求9至11中任一项所述的网络接入控制方法,其特征在于,还包括:若监测到所述终端设备需要接入所述非公共网络,则根据所述非公共网络的标识信息和所述终端设备的签约信息,确定所述终端设备是否能够接入所述非公共网络。
- 一种网络接入控制方法,其特征在于,应用于网络侧设备,包括:生成非公共网络的跟踪区,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的跟踪区与所述公共网络的跟踪区不相同;在跟踪区的任一配置期间内,将所述非公共网络的跟踪区或所述公共网络的跟踪区配置给终端设备,以使所述终端设备在空闲态或非激活态发生跟踪区更新时进入连接态,以获取网络接入控制信息。
- 根据权利要求13所述的网络接入控制方法,其特征在于,处于同一跟踪区内的网络小区所支持的网络切片相同。
- 一种网络接入控制方法,其特征在于,应用于网络侧设备,包括:获取非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;将所述非公共网络的标识信息配置给终端设备,以使所述终端设备在空闲态或非激活态根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
- 根据权利要求15所述的网络接入控制方法,其特征在于,还包括:若接收到所述终端设备在空闲态或非激活态发送的请求接入所述非公共网络的指示信息,则向所述终端设备发送配置信息,以对所述终端设备接入所述非公共网络进行控制。
- 根据权利要求15或16所述的网络接入控制方法,其特征在于,所述非公共网络的标识信息包括以下至少之一:所述非公共网络的网络小区的位置信息、所述非公共网络所覆盖的地理位置信息、所述非公共网络的频点信息。
- 一种网络接入控制方法,其特征在于,应用于终端设备,包括:获取网络侧设备配置的非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;在终端设备处于空闲态或非激活态时,根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
- 根据权利要求18所述的网络接入控制方法,其特征在于,所述根据所述非公共网络的标识信息确定是否搜索所述非公共网络,包括:若检测到所述非公共网络的标识信息,则执行所述非公共网络的搜索过程;若未检测到所述非公共网络的标识信息,则停止搜索所述非公共网络。
- 根据权利要求18或19所述的网络接入控制方法,其特征在于,还包括:若需要接入所述非公共网络,则向所述网络侧设备发送请求接入所述非公共网络的指示信息,并根据所述网络侧设备针对所述指示信息反馈的配置信息执行网络接入过程。
- 一种计算机可读介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至8中任一项所述的网络接入控制方法,或实现如权利要求9至12中任一项所述的网络接入控制方法,或实现如权利要求13至14中任一项所述的网络接入控制方法,或实现如权利要求15至17中任一项所述的网络接入控制方法,或实现如权利要求18至20中任一项所述的网络接入控制方法。
- 一种电子设备,其特征在于,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求1至8中任一项所述的网络接入控制方法。
- 一种电子设备,其特征在于,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求9至12中任一项所述的网络接入控制方法。
- 一种电子设备,其特征在于,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求13至14中 任一项所述的网络接入控制方法。
- 一种电子设备,其特征在于,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求15至17中任一项所述的网络接入控制方法。
- 一种电子设备,其特征在于,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求18至20中任一项所述的网络接入控制方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020217022612A KR102443633B1 (ko) | 2019-05-06 | 2020-03-24 | 네트워크 액세스 제어 방법, 컴퓨터 판독 가능 매체 및 전자 디바이스 |
JP2021541594A JP7206399B2 (ja) | 2019-05-06 | 2020-03-24 | ネットワークアクセス制御方法並びにそのコンピュータプログラムおよび電子機器 |
EP20801685.7A EP3968700A4 (en) | 2019-05-06 | 2020-03-24 | METHOD FOR CONTROLLING ACCESS TO NETWORKS, COMPUTER READABLE MEDIUM AND ELECTRONIC DEVICE |
US17/411,510 US20210385739A1 (en) | 2019-05-06 | 2021-08-25 | Network access control method and device, and storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910371818.7 | 2019-05-06 | ||
CN201910371818.7A CN110213808B (zh) | 2019-05-06 | 2019-05-06 | 网络接入控制方法、装置、计算机可读介质及电子设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/411,510 Continuation US20210385739A1 (en) | 2019-05-06 | 2021-08-25 | Network access control method and device, and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020224345A1 true WO2020224345A1 (zh) | 2020-11-12 |
Family
ID=67786878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/080828 WO2020224345A1 (zh) | 2019-05-06 | 2020-03-24 | 网络接入控制方法、计算机可读介质及电子设备 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20210385739A1 (zh) |
EP (1) | EP3968700A4 (zh) |
JP (1) | JP7206399B2 (zh) |
KR (1) | KR102443633B1 (zh) |
CN (2) | CN115484659B (zh) |
WO (1) | WO2020224345A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022214443A3 (en) * | 2021-04-05 | 2022-12-08 | Nokia Technologies Oy | Methods, apparatuses, and computer program products for providing selection of cells serving network slices for an area |
WO2023104573A1 (en) * | 2021-12-06 | 2023-06-15 | Sony Group Corporation | Access restriction based on secondary tracking area |
EP4275450A4 (en) * | 2021-02-08 | 2024-10-23 | Samsung Electronics Co Ltd | METHOD AND COMMUNICATION NETWORK FOR PROVIDING ACCESS TO LOCALIZED SERVICES (PALS) |
Families Citing this family (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11265958B2 (en) | 2019-04-12 | 2022-03-01 | Ofinno, Llc | Access information for node configuration |
CN115484659B (zh) * | 2019-05-06 | 2024-03-22 | 腾讯科技(深圳)有限公司 | 网络接入控制方法、装置、计算机可读介质及电子设备 |
CN114375587B (zh) * | 2019-09-20 | 2024-04-12 | 株式会社Ntt都科摩 | 终端 |
CN113574917A (zh) * | 2019-09-23 | 2021-10-29 | Oppo广东移动通信有限公司 | 无线通信的方法和设备 |
JP2022547503A (ja) | 2019-09-26 | 2022-11-14 | 鴻穎創新有限公司 | ノンパブリックネットワークにおいてセル(再)選択を実行するための方法及び装置 |
CN112956241B (zh) * | 2019-09-26 | 2023-08-25 | Oppo广东移动通信有限公司 | 一种业务请求方法、电子设备及存储介质 |
WO2021059055A1 (en) * | 2019-09-27 | 2021-04-01 | Nokia Solutions And Networks Oy | Filtered authorization list for private networks |
CN114667766B (zh) * | 2019-09-30 | 2023-09-19 | 上海诺基亚贝尔股份有限公司 | 无线电接入网中的网络切片 |
WO2021062664A1 (zh) * | 2019-09-30 | 2021-04-08 | 华为技术有限公司 | 更新配置数据的方法、装置和系统 |
CN112584399B (zh) * | 2019-09-30 | 2022-06-24 | 大唐移动通信设备有限公司 | 一种频点优先级配置方法、终端及网络设备 |
CN113692033B (zh) * | 2019-09-30 | 2023-12-15 | Oppo广东移动通信有限公司 | 信息传输方法和设备 |
US20210105712A1 (en) * | 2019-10-04 | 2021-04-08 | Qualcomm Incorporated | Standalone non-public network access |
TW202126079A (zh) * | 2019-10-29 | 2021-07-01 | 香港商鴻穎創新有限公司 | 用於小區保留與存取限制的方法和裝置 |
CN112822756B (zh) * | 2019-10-30 | 2022-09-06 | 中国电信股份有限公司 | 通信方法、系统以及基站、终端 |
CN112822757B (zh) * | 2019-10-30 | 2022-09-06 | 中国电信股份有限公司 | 通信方法、系统以及基站、终端 |
EP4044642A4 (en) * | 2019-11-06 | 2022-10-19 | Huawei Technologies Co., Ltd. | COMMUNICATION METHOD, COMMUNICATION DEVICE AND COMMUNICATION SYSTEM |
CN112788709B (zh) * | 2019-11-08 | 2022-09-02 | 大唐移动通信设备有限公司 | 一种基于闭合接入组接入控制方法及装置 |
EP4050937A4 (en) * | 2019-11-08 | 2022-11-02 | Huawei Technologies Co., Ltd. | ACCESS CONTROL METHOD AND COMMUNICATION DEVICE |
CN114365523B (zh) * | 2019-11-08 | 2023-09-29 | Oppo广东移动通信有限公司 | Npn网络的远程签约方法、终端、装置及存储介质 |
CN113132968B (zh) * | 2019-12-31 | 2023-01-03 | 大唐移动通信设备有限公司 | 私有网络的指示、接入方法、装置、网络侧设备及终端 |
EP4084533A4 (en) * | 2020-01-17 | 2023-01-04 | Huawei Technologies Co., Ltd. | COMMUNICATION METHOD AND ASSOCIATED DEVICE |
CN113286332B (zh) * | 2020-02-19 | 2022-10-14 | 大唐移动通信设备有限公司 | 一种信息传输方法及设备 |
CN113438196B (zh) * | 2020-03-23 | 2022-10-25 | 华为技术有限公司 | 一种服务授权方法、装置及系统 |
CN115443670B (zh) * | 2020-04-03 | 2024-06-14 | 三星电子株式会社 | 用于管理无线通信网络中的cag相关过程的方法及装置 |
CN113518338B (zh) * | 2020-04-10 | 2022-09-02 | 华为技术有限公司 | 一种通信方法和通信装置 |
CN113556724B (zh) * | 2020-04-16 | 2023-06-23 | 维沃移动通信有限公司 | 网络选择方法及终端 |
CN113573387B (zh) * | 2020-04-28 | 2022-10-11 | 维沃移动通信有限公司 | 接入控制方法、接入网节点及核心网节点 |
CN113709732B (zh) * | 2020-05-21 | 2024-06-25 | 阿里巴巴集团控股有限公司 | 网络接入方法、用户设备、网络实体及存储介质 |
EP4154600A2 (en) * | 2020-05-21 | 2023-03-29 | IDAC Holdings, Inc. | Enabling service continuity between standalone non-public network and plmn |
CN113766500A (zh) * | 2020-05-22 | 2021-12-07 | 华为技术有限公司 | 一种网络的接入方法、装置及系统 |
CN113973344B (zh) * | 2020-07-22 | 2024-10-11 | 中国电信股份有限公司 | 非公共网络接入控制方法、基站和通信系统 |
WO2022027303A1 (en) * | 2020-08-05 | 2022-02-10 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | User equipment and method of operating access control for at least one of onboarding service and/or of npn service |
US11683749B2 (en) * | 2020-08-07 | 2023-06-20 | Mediatek Inc. | Network selection for supported standalone non-public network (S-SNPN) |
CN116097758A (zh) * | 2020-08-11 | 2023-05-09 | Oppo广东移动通信有限公司 | 网络选择方法、装置、设备及存储介质 |
CN114079922B (zh) * | 2020-08-12 | 2024-07-05 | 华为技术有限公司 | 一种终端设备鉴权的方法、终端设备和接入网设备 |
CN114079910B (zh) * | 2020-08-13 | 2024-07-02 | 阿里巴巴集团控股有限公司 | 终端状态控制方法、用户设备、网络实体及存储介质 |
WO2022036336A1 (en) * | 2020-08-13 | 2022-02-17 | Alibaba Group Holding Limited | Network communication method and apparatus |
CN114080003B (zh) * | 2020-08-22 | 2023-06-16 | 华为技术有限公司 | 一种接入网络的方法及装置 |
WO2022067586A1 (en) * | 2020-09-29 | 2022-04-07 | Huawei Technologies Co., Ltd. | Apparatus and method for enabling a user equipment to access one or more second networks |
CN116325937A (zh) * | 2020-12-30 | 2023-06-23 | Oppo广东移动通信有限公司 | 无线通信的方法、终端设备和网络设备 |
WO2022151079A1 (zh) * | 2021-01-13 | 2022-07-21 | Oppo广东移动通信有限公司 | 无线通信的方法、终端设备和网络设备 |
WO2022151050A1 (zh) * | 2021-01-13 | 2022-07-21 | Oppo广东移动通信有限公司 | 一种网络接入方法、电子设备及存储介质 |
CN115835340A (zh) * | 2021-09-16 | 2023-03-21 | 维沃移动通信有限公司 | 网络选择方法、装置、终端及网络侧设备 |
CN114189920B (zh) * | 2021-11-26 | 2024-03-05 | 中国联合网络通信集团有限公司 | 网络切片的载波隔离方法、装置、设备和介质 |
CN117528712A (zh) * | 2022-07-29 | 2024-02-06 | 维沃移动通信有限公司 | 选网方法及终端 |
WO2024029886A1 (en) * | 2022-08-03 | 2024-02-08 | Samsung Electronics Co., Ltd. | Node in wireless communication system and method performed by the same |
WO2024044979A1 (en) * | 2022-08-30 | 2024-03-07 | Zte Corporation | Systems and methods for support of multiple access paths |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107666723A (zh) * | 2016-07-22 | 2018-02-06 | 华为技术有限公司 | 一种信息传输方法、融合网关及系统 |
CN109451829A (zh) * | 2017-12-29 | 2019-03-08 | 北京小米移动软件有限公司 | 小区驻留方法、装置、用户设备及基站 |
CN110213808A (zh) * | 2019-05-06 | 2019-09-06 | 腾讯科技(深圳)有限公司 | 网络接入控制方法、装置、计算机可读介质及电子设备 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
BRPI0720872A2 (pt) * | 2007-01-05 | 2014-03-04 | Ntt Docomo Inc | Equipamento de usuário e método usado em sistema de comunicação móvel. |
US9769855B2 (en) * | 2013-08-28 | 2017-09-19 | Genband Us Llc | Mobility in enterprise networks |
CN106572507B (zh) * | 2015-10-13 | 2019-08-30 | 电信科学技术研究院 | 将终端设备重定向到专用网络的方法、终端设备及基站 |
CN108616955B (zh) * | 2016-12-26 | 2020-06-30 | 中国移动通信集团公司 | 一种网络接入处理方法、基站、mme及系统 |
CN108282840A (zh) * | 2017-01-05 | 2018-07-13 | 中兴通讯股份有限公司 | 一种网络业务实现方法及装置、移动终端 |
US10397855B2 (en) * | 2017-01-12 | 2019-08-27 | Lg Electronics Inc. | Access attempt method and user equipment, and access control method and base station |
CN115695197A (zh) * | 2019-03-27 | 2023-02-03 | 欧芬诺有限责任公司 | 用于接入管理小区信息的方法和系统 |
US20220210635A1 (en) * | 2019-04-29 | 2022-06-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Providing privacy for non-public networks |
-
2019
- 2019-05-06 CN CN202211069831.5A patent/CN115484659B/zh active Active
- 2019-05-06 CN CN201910371818.7A patent/CN110213808B/zh active Active
-
2020
- 2020-03-24 EP EP20801685.7A patent/EP3968700A4/en active Pending
- 2020-03-24 JP JP2021541594A patent/JP7206399B2/ja active Active
- 2020-03-24 KR KR1020217022612A patent/KR102443633B1/ko active IP Right Grant
- 2020-03-24 WO PCT/CN2020/080828 patent/WO2020224345A1/zh unknown
-
2021
- 2021-08-25 US US17/411,510 patent/US20210385739A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107666723A (zh) * | 2016-07-22 | 2018-02-06 | 华为技术有限公司 | 一种信息传输方法、融合网关及系统 |
CN109451829A (zh) * | 2017-12-29 | 2019-03-08 | 北京小米移动软件有限公司 | 小区驻留方法、装置、用户设备及基站 |
CN110213808A (zh) * | 2019-05-06 | 2019-09-06 | 腾讯科技(深圳)有限公司 | 网络接入控制方法、装置、计算机可读介质及电子设备 |
Non-Patent Citations (4)
Title |
---|
ANONYMOUS: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on 5GS Enhanced support of Vertical and LAN Services (Release 16)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 23.734, no. V0.3.0, 31 October 2018 (2018-10-31), pages 1 - 97, XP051487720 * |
ERICSSON: "Feasibility to support a deployment independent solution", 3GPP TSG-SA WG2 MEETING #132 S2-1903383, 12 April 2019 (2019-04-12), XP051719546, DOI: 20200513102809X * |
See also references of EP3968700A4 |
SIEMENS AG ET AL.: "Deployment options for non-public networks", 3GPP TSG-SA WG1 MEETING #83 S1-182676, 24 August 2018 (2018-08-24), XP051503132, DOI: 20200513103009X * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4275450A4 (en) * | 2021-02-08 | 2024-10-23 | Samsung Electronics Co Ltd | METHOD AND COMMUNICATION NETWORK FOR PROVIDING ACCESS TO LOCALIZED SERVICES (PALS) |
WO2022214443A3 (en) * | 2021-04-05 | 2022-12-08 | Nokia Technologies Oy | Methods, apparatuses, and computer program products for providing selection of cells serving network slices for an area |
WO2023104573A1 (en) * | 2021-12-06 | 2023-06-15 | Sony Group Corporation | Access restriction based on secondary tracking area |
Also Published As
Publication number | Publication date |
---|---|
JP7206399B2 (ja) | 2023-01-17 |
CN110213808A (zh) | 2019-09-06 |
CN115484659A (zh) | 2022-12-16 |
EP3968700A4 (en) | 2022-07-13 |
US20210385739A1 (en) | 2021-12-09 |
JP2022531751A (ja) | 2022-07-11 |
CN115484659B (zh) | 2024-03-22 |
KR20210107739A (ko) | 2021-09-01 |
KR102443633B1 (ko) | 2022-09-15 |
CN110213808B (zh) | 2022-08-12 |
EP3968700A1 (en) | 2022-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020224345A1 (zh) | 网络接入控制方法、计算机可读介质及电子设备 | |
EP4191959B1 (en) | Method and system for ensuring service level agreement of an application | |
JP6096836B2 (ja) | ネットワークアクセスを電子デバイスに提供するシステム及び方法 | |
EP2387260B1 (en) | System of wi-fi terminals and channel operation method for the same | |
WO2019137553A1 (zh) | 一种配置ue的策略的方法、装置和系统 | |
TWI682679B (zh) | 行動管理擁塞控制方法及使用者設備 | |
US20230388769A1 (en) | Method, apparatus, and computer program product for service-continuity indication in sidelink user equipment to network relay during path switch | |
WO2023040806A1 (zh) | 网络选择方法、装置、终端及网络侧设备 | |
WO2022068903A1 (zh) | 网络选择方法、信息发送方法、信息获取方法及装置 | |
WO2022069481A2 (en) | Method, apparatus, and computer program product for network slice and frequency band selection configuration | |
CN114501493A (zh) | 网络切片更新方法及系统、存储介质及电子设备 | |
WO2021063909A1 (en) | Apparatus, method and computer program | |
US20240023007A1 (en) | Method, apparatus, and computer program product to support multiple slices in case of overlayunderlay networking | |
WO2024051547A1 (zh) | 网络选择信息配置方法、装置及通信设备 | |
WO2023174154A1 (zh) | 通信方法、装置和系统 | |
WO2024041422A1 (zh) | 通信方法、装置、终端及核心网节点 | |
WO2024032537A1 (zh) | 通信方法、设备及可读存储介质 | |
WO2024051565A1 (zh) | 选网处理方法、装置、终端及可读存储介质 | |
US20230319697A1 (en) | Methods, apparatuses, and computer program products for supporting onboarding and authentication of user equipment for networks and network slices | |
WO2022166891A1 (zh) | 支持网络选择的方法、装置、设备及可读存储介质 | |
WO2023213242A1 (zh) | Ue策略信息的配置方法、装置、第一网络功能及终端 | |
WO2023212889A1 (en) | Enhancements for wireless devices moving from edge to cloud data networks | |
US20230319906A1 (en) | Methods, apparatuses, and computer program products for supporting simultaneous access to mutally isolated network slices | |
WO2023179571A1 (zh) | 非公共网络接入方法、装置及终端 | |
WO2024037512A1 (zh) | 网络接入方法、装置、终端及通信设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20801685 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20217022612 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2021541594 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2020801685 Country of ref document: EP Effective date: 20211206 |