WO2020224345A1 - 网络接入控制方法、计算机可读介质及电子设备 - Google Patents

网络接入控制方法、计算机可读介质及电子设备 Download PDF

Info

Publication number
WO2020224345A1
WO2020224345A1 PCT/CN2020/080828 CN2020080828W WO2020224345A1 WO 2020224345 A1 WO2020224345 A1 WO 2020224345A1 CN 2020080828 W CN2020080828 W CN 2020080828W WO 2020224345 A1 WO2020224345 A1 WO 2020224345A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
public network
terminal device
public
access control
Prior art date
Application number
PCT/CN2020/080828
Other languages
English (en)
French (fr)
Inventor
王涛
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to KR1020217022612A priority Critical patent/KR102443633B1/ko
Priority to JP2021541594A priority patent/JP7206399B2/ja
Priority to EP20801685.7A priority patent/EP3968700A4/en
Publication of WO2020224345A1 publication Critical patent/WO2020224345A1/zh
Priority to US17/411,510 priority patent/US20210385739A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/005Multiple registrations, e.g. multihoming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • H04W76/16Involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer

Definitions

  • This application relates to the field of computer and communication technology, and in particular to a network access control method, computer readable medium and electronic equipment.
  • PLMN Public Land Mobile Network, Public Land Mobile Network
  • NPN Non-Public Network
  • the embodiments of the present application provide a network access control method, a computer-readable medium, and an electronic device, which can effectively implement network access control in an application scenario where a public network and a non-public network coexist.
  • a network access control method which is applied to a terminal device, and includes:
  • the network connection capability includes the connection capability to mutually independent public and non-public networks; when the terminal device is in a connected state, according to the network service requirements of the terminal device and The network connection capability performs access control on the terminal device.
  • a network access control method is provided, which is applied to a network side device, and includes:
  • a network access control strategy is generated, the network access control strategy is used to enable terminal devices to perform access control according to network service requirements and network connection capabilities, and the network connection capabilities include connections to mutually independent public and non-public networks Capability; configure the network access control policy to the terminal device.
  • a network access control method is provided, which is applied to a network side device, and includes:
  • the non-public network is a network formed using network slices of a public network, and the tracking area of the non-public network is different from the tracking area of the public network; in any configuration of the tracking area During the period, the tracking area of the non-public network or the tracking area of the public network is configured to the terminal device, so that the terminal device enters the connected state to obtain network access when the tracking area is updated in the idle state or the inactive state Control information.
  • a network access control method is provided, which is applied to a network side device, and includes:
  • the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the area where the non-public network is located;
  • the identification information of is configured to the terminal device, so that the terminal device determines whether to search for the non-public network according to the identification information of the non-public network in the idle state or the inactive state.
  • a network access control method which is applied to a terminal device, and includes:
  • Acquiring identification information of a non-public network configured by a network-side device, where the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the area where the non-public network is located;
  • the terminal device is in an idle state or an inactive state, it is determined whether to search the non-public network according to the identification information of the non-public network.
  • a network access control device including:
  • the obtaining unit is used to obtain the network connection capability of the terminal device, where the network connection capability includes the connection capability to mutually independent public and non-public networks;
  • the control unit is used to obtain the terminal device in the connected state, Perform access control on the terminal device according to the network service requirements of the terminal device and the network connection capability.
  • control unit is configured to: if it is determined according to the network connection capability that the terminal device can support simultaneous connection to the public network and the non-public network, then When the terminal device needs to process public network services and non-public network services at the same time, control the terminal device to access the public network and the non-public network.
  • control unit is configured to: if it is determined according to the network connection capability that the terminal device does not support simultaneous connection to the public network and the non-public network, according to The network service to be processed by the terminal device controls the terminal device to access the public network or the non-public network.
  • control unit is configured to: if the terminal device needs to process public network services, control the terminal device to access the public network; if the terminal device needs To process non-public network services, control the terminal device to access the non-public network; if the terminal device needs to process both the public network service and the non-public network service at the same time, priority will be given to the services of the public network And the service priority of the non-public network, controlling the terminal device to access the network with the highest service priority.
  • control unit is configured to: if it is determined according to the network connection capability that the terminal device does not support simultaneous connection to the public network and the non-public network, then When the network quality of one of the public network and the non-public network cannot meet service requirements, control the terminal device to access the other network.
  • control unit is configured to: if the terminal device accesses the first network of the public network and the non-public network, if the The network quality of the first network cannot meet the service requirements, when the service of the first network needs to be processed, the terminal device is controlled to access the second network of the public network and the non-public network, and pass all The second network accesses the first network to process services of the first network.
  • control unit is further configured to: if the terminal device accesses the first network of the public network and the non-public network, If the network quality of the second network of the public network and the non-public network cannot meet service requirements or the terminal device cannot connect to the second network, when the service of the second network needs to be processed, The first network accesses the second network to process services of the second network.
  • the gateway device of the public network is connected to the gateway device of the non-public network.
  • a network access control device including:
  • the generating unit is used to generate a network access control strategy, the network access control strategy is used to enable the terminal device to perform access control according to network service requirements and network connection capabilities, and the network connection capabilities include The connection capability of the non-public network; the configuration unit is used to configure the network access control policy to the terminal device.
  • the network access control policy includes the service priority of the public network and the service priority of the non-public network; wherein, the service priority is through the network
  • the priority of the frequency point information is characterized, or the service priority is characterized by the priority of a network cell in the same frequency band.
  • the configuration unit is configured to: when the terminal device is in an idle state or in an inactive state, configure cell reselection parameters or redirection parameters to the terminal The device configures the network access control policy.
  • the network access control apparatus further includes: a determining unit, configured to: when it is detected that the terminal device needs to access the non-public network, according to the non-public network The identification information of the public network and the subscription information of the terminal device determine whether the terminal device can access the non-public network.
  • a network access control device including:
  • a generating unit configured to generate a tracking area of a non-public network, the non-public network is a network formed using network slices of a public network, and the tracking area of the non-public network is different from the tracking area of the public network; configuration unit , Used to configure the tracking area of the non-public network or the tracking area of the public network to the terminal device during any configuration period of the tracking area, so that the terminal device can update the tracking area in the idle state or the inactive state When entering the connected state to obtain network access control information.
  • network cells within the same tracking area support the same network slices.
  • a network access control device including:
  • the obtaining unit is configured to obtain identification information of a non-public network, the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the area where the non-public network is located;
  • the unit is configured to configure the identification information of the non-public network to a terminal device, so that the terminal device determines whether to search the non-public network according to the identification information of the non-public network in an idle state or an inactive state.
  • the network access control apparatus further includes: a sending unit, configured to access the terminal device after receiving a request sent by the terminal device in an idle or inactive state When indicating information of a non-public network, sending configuration information to the terminal device to control the terminal device's access to the non-public network.
  • the identification information of the non-public network includes at least one of the following: location information of a network cell of the non-public network, and geographic location information covered by the non-public network , Frequency point information of the non-public network.
  • a network access control device including:
  • the obtaining unit is configured to obtain identification information of a non-public network configured by a network side device, the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the non-public network where the non-public network is located Area; a processing unit for determining whether to search for a non-public network according to the identification information of the non-public network when the terminal device is in an idle state or an inactive state.
  • the processing unit is configured to: if the identification information of the non-public network is detected, execute the search process of the non-public network; if the non-public network is not detected The identification information of the public network, stop searching the non-public network.
  • the processing unit is further configured to: if it is necessary to access the non-public network, send to the network side device instruction information requesting access to the non-public network , And execute the network access process according to the configuration information fed back by the network side device for the indication information.
  • a computer-readable medium having a computer program stored thereon, and when the computer program is executed by a processor, the network access performed by the terminal device in each of the foregoing embodiments is implemented.
  • the control method or the network access control method executed by the network side device.
  • an electronic device including: one or more processors; a storage device, configured to store one or more programs, when the one or more programs are When multiple processors are executed, the one or more processors are caused to implement the network access control method executed by the terminal device or the network access control method executed by the network side device in each of the foregoing embodiments.
  • the terminal device when the terminal device is in a connected state, according to the network service requirements and network connection capabilities of the terminal device (that is, the connection between independent public and non-public networks) Ability) to perform access control on terminal equipment, so that in application scenarios where public and non-public networks coexist, network access control can be achieved based on the network service requirements and network connection capabilities of terminal equipment, thereby ensuring that the communication system can support Handling of public network services and non-public network services.
  • the network service requirements and network connection capabilities of the terminal device that is, the connection between independent public and non-public networks) Ability
  • the tracking area of the non-public network is generated, and the tracking area of the non-public network is different from the tracking area of the public network, and during any configuration period of the tracking area, Configure the tracking area of the non-public network or the tracking area of the public network to the terminal device so that the terminal device updates the tracking area in the idle or inactive state (such as entering the tracking area of the public network from the tracking area of the non-public network, or From the tracking area of the public network to the tracking area of the non-public network), it can enter the connected state to obtain network access control information to achieve network access control, thereby ensuring that the communication system can support public network services and non-public network services Processing.
  • the identification information of the non-public network is obtained, and the identification information of the non-public network is used to identify the area where the non-public network is located, and the identification information of the non-public network is configured to
  • the terminal device enables the terminal device to determine whether to search for a non-public network according to the identification information of the non-public network in the idle state or in the inactive state.
  • the search process of the non-public network can be executed, and When the identification information of the non-public network is not detected, the search for the non-public network is stopped, so that on the premise of realizing network access control, the terminal device can avoid frequently searching for the non-public network and increase the power consumption of the terminal device.
  • FIG. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied;
  • FIG. 2 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied;
  • Fig. 3 shows a flowchart of a network access control method according to an embodiment of the present application
  • Fig. 4 shows a flowchart of a network access control method according to an embodiment of the present application
  • Figure 5 shows a flowchart of a network access control method according to an embodiment of the present application
  • Fig. 6 shows a flowchart of a network access control method according to an embodiment of the present application
  • Fig. 7 shows a flowchart of a network access control method according to an embodiment of the present application
  • Fig. 8 shows a schematic diagram of the location of a network cell according to an embodiment of the present application.
  • Fig. 9 shows a block diagram of a network access control device according to an embodiment of the present application.
  • Fig. 10 shows a block diagram of a network access control device according to an embodiment of the present application.
  • Fig. 11 shows a block diagram of a network access control device according to an embodiment of the present application.
  • Fig. 12 shows a block diagram of a network access control device according to an embodiment of the present application
  • Fig. 13 shows a block diagram of a network access control device according to an embodiment of the present application
  • Fig. 14 shows a schematic structural diagram of a computer system suitable for implementing an electronic device according to an embodiment of the present application.
  • Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied.
  • the system architecture may include a terminal device 101, a public network base station 102, and a non-public network base station 103.
  • the terminal device 101 may be a smart phone as shown in FIG. 1, or it may be a tablet computer, a portable computer, a desktop computer, etc., which is not limited in this application.
  • the public network base station 102 and the non-public network base station 103 are independently deployed, and form a public network and a non-public network respectively.
  • terminal devices 101, public network base stations 102, and non-public network base stations 103 in FIG. 1 are merely illustrative. According to implementation requirements, there may be any number of terminal devices 101, public network base stations 102, and non-public network base stations 103.
  • the public network base station 102 may generate a network access control policy, which is used to enable the terminal device 101 to perform access control according to network service requirements and network connection capabilities. Including the ability to connect to mutually independent public networks and non-public networks, and then the public network base station 102 can configure the network access control policy to the terminal device 101.
  • the terminal device 101 can be connected to the terminal device 101 according to the network service requirements and network connection capabilities of the terminal device 101 when the terminal device 101 is in the connected state. Access control by itself ensures that the communication system can support the processing of public network services and non-public network services.
  • Fig. 2 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied.
  • the system architecture may include a terminal device 201 and a public network base station 202.
  • the terminal device 201 may be a smart phone as shown in FIG. 2, or it may be a tablet computer, a portable computer, a desktop computer, etc., which is not limited in this application.
  • the public network base station 202 can construct a non-public network by configuring private slices.
  • terminal equipment 201 and public network base stations 202 in FIG. 2 are merely illustrative. According to implementation needs, there may be any number of terminal devices 201 and public network base stations 202.
  • the public network base station 202 can generate a tracking area of a non-public network, and the tracking area of the non-public network is different from the tracking area of the public network, and the public network base station 202 can be in any of the tracking areas.
  • the non-public network tracking area or the public network tracking area is configured to the terminal device 201, so that the terminal device 201 enters the connected state to obtain network access control information when the tracking area is updated in the idle state or the inactive state.
  • the tracking areas of the public network and the non-public network are not configured for the terminal device 201 at the same time, so that the terminal device 201 can enter the connected state to obtain network access when the tracking area update occurs in the idle state or the inactive state.
  • Access control information to achieve network access control, thereby ensuring that the communication system can support the processing of public network services and non-public network services.
  • the terminal device 201 when the tracking area update occurs, the terminal device 201 enters the tracking area of the public network from the tracking area of the non-public network, or enters the tracking area of the non-public network from the tracking area of the public network. This application does not Do restrictions.
  • the public network base station 202 can obtain the identification information of the non-public network, and the identification information of the non-public network is used to identify the area where the non-public network is located; then the public network The base station 202 can configure the identification information of the non-public network to the terminal device 201, and when the terminal device 201 is in the idle state or in the inactive state, it can determine whether to search for the non-public network according to the identification information of the non-public network.
  • the terminal device 201 can When the identification information of the non-public network is detected, the search process of the non-public network is executed, and when the identification information of the non-public network is not detected, the search for the non-public network is stopped, so that the network access control can be realized. Avoid frequently searching non-public networks and increasing the power consumption of the terminal device 201.
  • FIG. 3 shows a flowchart of a network access control method according to an embodiment of the present application.
  • the network access control method may be executed by a terminal device, which may be the terminal device 101 shown in FIG. 1.
  • the network access control method includes at least step S310 to step S320, which are described in detail as follows:
  • step S310 the terminal device obtains its own network connection capability, where the network connection capability includes connection capability to mutually independent public networks and non-public networks.
  • the ability of the terminal device to connect to independent public and non-public networks may include whether it can connect to a public network, whether it can connect to a non-public network, whether it can support simultaneous connection to a public network and Non-public network, this application is not restricted here.
  • step S320 when the terminal device is in a connected state, access control is performed according to its own network service requirements and network connection capabilities.
  • the process that the terminal device performs access control according to its own network service requirements and network connection capabilities may be: if the terminal device determines that it can support simultaneous connection to the public network according to its own network connection capabilities And non-public networks, when it is necessary to process public network services and non-public network services at the same time, control access to public and non-public networks.
  • the technical solution of this embodiment enables simultaneous access to the public network and the non-public network according to the network connection capability of the terminal device, so as to simultaneously process the public network service and the non-public network service.
  • the process in which the terminal device performs access control according to its own network service requirements and network connection capability in step S320 may also be: if the terminal device determines that it does not support simultaneous connection to the public according to its own network connection capability Network and non-public network, then according to the network business to be processed by oneself control access to public network or non-public network.
  • the terminal device For example, if the terminal device needs to process public network services, the terminal device is controlled to access the public network; if the terminal device needs to process non-public network services, the terminal device is controlled to access the non-public network; if the terminal device needs to process public network services and For non-public network services, according to the service priority of the public network and the service priority of the non-public network, control terminal equipment to access the network with the highest service priority.
  • the process in which the terminal device performs access control according to its own network service requirements and network connection capability in step S320 may also be: if the terminal device determines that it does not support simultaneous connection to the public according to its own network connection capability Network and non-public network, when the network quality of one of the public network and non-public network cannot meet the service requirements, control access to the other network.
  • the technical solution of this embodiment enables the terminal device to preferentially access a network that meets service requirements when it does not support simultaneous connection to a public network and a non-public network.
  • the process in which the terminal device performs access control according to its own network service requirements and network connection capabilities in step S320 may also be: the terminal device is connected to the first of the public and non-public networks.
  • the terminal device accesses the second network of the public network and the non-public network, and passes through the second network Visit the first network to process the services of the first network.
  • the technical solution of this embodiment enables the terminal device to access the first network, if the network quality of the first network cannot meet the service requirements, when the service of the first network needs to be processed, it can access the second network Indirectly access the first network to process the services of the first network.
  • the gateway device of the public network and the gateway device of the non-public network may be connected to facilitate indirect access to the first network through the second network to process services of the first network.
  • the terminal device when the terminal device is connected to the first network of the public network and the non-public network, if the network quality of the second network of the public network and the non-public network cannot meet the service requirements or If the terminal device cannot be connected to the second network, when it needs to process the services of the second network, it indirectly accesses the second network through the first network to process the services of the second network.
  • the technical solution of this embodiment enables the terminal device to access the second network indirectly through the first network when it is unable to connect to the second network or the network quality of the second network cannot meet service requirements when accessing the first network , To handle the business of the second network.
  • the gateway device of the public network and the gateway device of the non-public network may be connected to facilitate indirect access to the second network through the first network to process services of the second network.
  • the technical solution of the embodiment shown in FIG. 3 makes it possible to implement network access control based on the network service requirements and network connection capabilities of the terminal device in an application scenario where public and non-public networks coexist, thereby ensuring that the communication system can support Handling of public network services and non-public network services.
  • the aforementioned communication system may be a fifth-generation mobile communication technology (5th-Generation, 5G) system.
  • FIG. 4 shows a flowchart of a network access control method according to an embodiment of the present application.
  • the network access control method may be executed by a network side device, which may be the public network shown in FIG. 1
  • the base station 102 may also be a network management device independent of the public network base station 102 and the non-public network base station 103.
  • the network access control method includes at least step S410 to step S420, which are described in detail as follows:
  • step S410 the network side device generates a network access control strategy, the network access control strategy is used to enable the terminal device to perform access control according to network service requirements and network connection capabilities, and the network connection capabilities include Connectivity between public and non-public networks.
  • the network access control policy may include the service priority of the public network and the service priority of the non-public network, so that when the terminal device cannot process the public network service and the non-public network service at the same time, according to The service priority of the public network and the service priority of the non-public network are selected to process the service with the higher priority.
  • the service priority may be characterized by the priority of the frequency point information of the network. For example, if the priority of the frequency point information where the public network is located is higher than the priority level of the frequency point information where the non-public network is located, it is determined that the service priority of the public network is higher than the service priority of the non-public network.
  • the service priority may be characterized by the priority of the network cell in the same frequency band. For example, when the network cell of the public network and the network cell of the non-public network are in the same frequency band, if the priority of the network cell of the public network is higher than the priority of the network cell of the non-public network, the service of the public network The priority is higher than the business priority of non-public networks.
  • step S420 the network side device configures the network access control policy to the terminal device.
  • the network side device can directly configure the network access control policy to the terminal device through configuration signaling. If the terminal device is in an idle state or an inactive state, the network side device can configure a network access control strategy for the terminal device by configuring cell reselection parameters or redirection parameters.
  • the network side device if it detects that the terminal device needs to access a non-public network, it can determine whether the terminal device can access the non-public network according to the identification information of the non-public network and the contract information of the terminal device . For example, if a terminal device signs an access agreement with a non-public network, the network side device can allow the terminal device to access the non-public network; if the terminal device does not sign an access agreement with a non-public network, the network The side device may refuse the terminal device to access the non-public network.
  • the technical solution of the embodiment shown in FIG. 4 also enables in an application scenario where a public network and a non-public network coexist, network access control can be realized based on the network service requirements and network connection capabilities of the terminal device, thereby ensuring that the communication system can support Handling of public network services and non-public network services.
  • FIG. 5 shows a flowchart of a network access control method according to an embodiment of the present application.
  • the network access control method may be executed by a network side device, which may be the public network shown in FIG. 2 Base station 202.
  • the network access control method includes at least step S510 to step S520, which are described in detail as follows:
  • step S510 the network side device generates a tracking area of a non-public network
  • the non-public network is a network formed using network slices of a public network
  • the tracking area of the non-public network is different from the tracking area of the public network .
  • network cells in the same tracking area support the same network slices.
  • step S520 during any configuration period of the tracking area, the network side device configures the tracking area of the non-public network or the tracking area of the public network to the terminal device, so that the terminal device is in an idle state or The inactive state enters the connected state when the tracking area is updated to obtain network access control information.
  • the technical solution of the embodiment shown in FIG. 5 prevents the tracking area of the non-public network and the tracking area of the public network from being configured to the terminal device at the same time. Therefore, the terminal device does not generate tracking area update (Tracking Area Update, in the idle state or the inactive state). TAU), there will be no moving from a non-public network to a public network, and no moving from a public network to a non-public network; and when the terminal device is in the idle or inactive state, the tracking area update occurs, It can enter the connected state to obtain network access control information to implement network access control, thereby ensuring that the communication system can support the processing of public network services and non-public network services.
  • TAU Track Area Update
  • FIG. 6 shows a flowchart of a network access control method according to an embodiment of the present application.
  • the network access control method may be executed by a network side device, which may be the public network shown in FIG. 2 Base station 202.
  • the network access control method includes at least step S610 to step S620, which are described in detail as follows:
  • step S610 the network side device obtains identification information of a non-public network, which is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the location where the non-public network is located. area.
  • the network-side device may obtain the identification information of the non-public network from an application function (AF) entity or a core network entity.
  • the identification information of the non-public network may include at least one of the following: the location information of the network cell of the non-public network, the geographic location information covered by the non-public network, and the frequency point information of the non-public network, which is not limited in this application .
  • step S620 the network side device configures the identification information of the non-public network to the terminal device, so that the terminal device determines whether to search for the non-public network according to the identification information of the non-public network in the idle state or the inactive state. Public network.
  • the terminal device can perform the search process of the non-public network when the identification information of the non-public network is detected, and stop searching the non-public network when the identification information of the non-public network is not detected, Furthermore, on the premise of realizing network access control, it is possible to prevent the terminal device from frequently searching for non-public networks and increasing the power consumption of the terminal device.
  • the network side device may send configuration information to the terminal device to connect to the terminal device. Access to non-public networks for control.
  • the network side device may send configuration information to the terminal device through RRC (Radio Resource Control) signaling, and the configuration information may include measurement configuration information, etc., which is not limited in this application.
  • RRC Radio Resource Control
  • Fig. 7 shows a flowchart of a network access control method according to an embodiment of the present application.
  • the network access control method may be executed by a terminal device, which may be the terminal device 201 shown in Fig. 2.
  • the network access control method includes at least step S710 to step S720, which are described in detail as follows:
  • the terminal device obtains the identification information of the non-public network configured by the network side device.
  • the non-public network is a network formed by using network slices of the public network, and the identification information of the non-public network is used to identify the non-public network. The area where the public network is located.
  • step S720 when the terminal device is in an idle state or an inactive state, it determines whether to search the non-public network according to the identification information of the non-public network.
  • the terminal device can perform a search process of the non-public network when the identification information of the non-public network is detected; when the identification information of the non-public network is not detected, stop searching the non-public network Therefore, on the premise of realizing network access control, it is possible to prevent the terminal device from frequently searching for non-public networks and increasing the power consumption of the terminal device.
  • the terminal device if it needs to access the non-public network after searching for the non-public network, it sends the instruction information requesting access to the non-public network to the network side device, and the network side device responds to the instruction information
  • the feedback configuration information performs the network access process.
  • the configuration information fed back by the network side device may include measurement configuration information, etc., which is not limited in this application.
  • the deployment mode between PLMN and NPN can include the following two modes:
  • Mode 1 Independent deployment of NPN mode.
  • mode 1 the core network elements in the NPN are all deployed by the third party, and the third party solves the spectrum problem by itself, and does not rely on the functions provided in the public network.
  • This mode is suitable for scenarios and industries that have strong demands for localized networks, and can be strictly isolated from public networks.
  • Mode 2 NPN mode integrated with public networks.
  • the core network elements (including base stations) in the NPN are shared with the PLMN.
  • the NPN implements the isolation of business data from the PLMN through private slicing, and introduces a new user group management mechanism. Realize management. This mode is suitable for scenarios where hardware is not expected to be deployed locally.
  • the isolation between NPN and PLMN can be distinguished by network slicing or PDU (Protocol Data Unit) sessions and QoS (Quality of Service) flows.
  • PDU Protocol Data Unit
  • QoS Quality of Service
  • the switching between the PLMN and the NPN needs to consider the network service requirements and network connection capabilities of the terminal device. For example, if it is necessary to support the processing of PLMN services and NPN services at the same time, and the network connection capability of the terminal equipment supports the establishment of connections to the two networks at the same time, the terminal equipment can continuously drop the PLMN service or the NPN service during the handover process, but initiates again One connection means connecting to PLMN and NPN at the same time, unless the coverage of NPN or PLMN can no longer support the network connection of terminal equipment.
  • the terminal device does not support simultaneous establishment of connections to the two networks, if the coverage and signal strength of the two networks meet the service requirements, then You can choose to connect to PLMN or NPN based on service priority; if the coverage and signal strength of only one of the two networks meet the business needs, you can connect to that network.
  • whether the terminal device can access the NPN can be judged by the network identifier and the user's subscription information.
  • the network side device needs to configure corresponding policies for the terminal device in advance, such as service priority, access control policy, etc.
  • the service priority can be characterized by location information such as frequency point information or cell identification within the same frequency.
  • NPN related priority and location range information can be configured by configuring cell reselection or redirection parameters during the RRC connection release process.
  • the access control when the terminal device is in the connected state, the access control can be realized directly through network slicing; when the terminal device is in the idle state and inactive state, the access control problem of the terminal device can be solved by the following methods :
  • dedicated TAs can be configured for NPN cells. These TAs can be space division multiplexed, that is, they can appear in different locations and are exclusive to NPN.
  • cell 1, cell 2, and cell 3 are PLMN cells, configured with TA1; cell 4 is an NPN cell, configured with TA2.
  • Cells in the same TA support the same slices. For example, all three cells in TA1 support slice S1, and the cells in TA2 support slice S2.
  • the network side device needs to configure to ensure that the TA of the PLMN cell and the NPN cell will not be configured to the terminal device at the same time.
  • the terminal device in the idle state and the inactive state will undergo a TA update process when reselecting from PLMN to NPN or from NPN to PLMN, thereby entering the connected state to obtain NPN-related configuration , To achieve access control; and when the terminal device does not have TAU, there will be no transition from accessing PLMN to accessing NPN, or from accessing NPN to accessing PLMN.
  • the terminal device may not use the CAG (Closed Access Group) identification mechanism to perform the access control process.
  • CAG Consumer Access Group
  • a controllable NPN search can be realized through location information and fingerprints.
  • a third-party application server AF can be used to realize a controllable NPN discovery process based on fingerprint information.
  • AF or other core network elements can push NPN fingerprint information to terminal devices.
  • These fingerprint information can include: location information composed of cell identification, GNSS (Global Navigation Satellite System) geographic location information, Frequency information, etc., and when the terminal device is moving in an idle state or an inactive state, it can be determined whether to search according to the fingerprint information of the NPN, so as to avoid frequent searches by the terminal device and increase the power consumption of the terminal device.
  • GNSS Global Navigation Satellite System
  • the terminal device can indicate to the network side device that it wants to perform access control and therefore enter the connected state, and the network side device can pass the RRC The signaling performs measurement configuration or other configuration on the terminal equipment to complete the access control process in mode 2.
  • Fig. 9 shows a block diagram of a network access control device according to an embodiment of the present application.
  • a network access control device 900 includes: an obtaining unit 902 and a control unit 904.
  • the obtaining unit 902 is used to obtain the network connection capability of the terminal device, and the network connection capability includes the connection ability to mutually independent public and non-public networks; the control unit 904 is used to obtain the terminal device in the connected state. Next, perform access control on the terminal device according to the network service requirements of the terminal device and the network connection capability.
  • control unit 904 is configured to: if it is determined according to the network connection capability that the terminal device can support simultaneous connection to the public network and the non-public network, then the terminal device needs to process simultaneously In the case of public network services and non-public network services, controlling the terminal device to access the public network and the non-public network.
  • control unit 904 is configured to: if it is determined according to the network connection capability that the terminal device does not support simultaneous connection to the public network and the non-public network, then according to the requirements of the terminal device The processed network service controls the terminal device to access the public network or the non-public network.
  • control unit 904 is configured to: if the terminal device needs to process public network services, control the terminal device to access the public network; if the terminal device needs to process non-public network services , The terminal device is controlled to access the non-public network; if the terminal device needs to process public network services and non-public network services at the same time, according to the service priority of the public network and the service of the non-public network Priority, controlling the terminal device to access the network with the highest service priority.
  • control unit 904 is configured to: if it is determined according to the network connection capability that the terminal device does not support simultaneous connection to the public network and the non-public network, then connect to the public network and When the network quality of one of the non-public networks cannot meet service requirements, control the terminal device to access another network.
  • control unit 904 is configured to: when the terminal device accesses the first network of the public network and the non-public network, if the network quality of the first network cannot To meet service requirements, when the service of the first network needs to be processed, the terminal device is controlled to access the second network of the public network and the non-public network, and access the second network through the second network A first network to process services of the first network.
  • control unit 904 is further configured to: when the terminal device accesses the first network of the public network and the non-public network, if the public network and the If the network quality of the second network in the non-public network cannot meet the service requirements or the terminal device cannot be connected to the second network, then when the service of the second network needs to be processed, access through the first network The second network to process services of the second network.
  • the gateway device of the public network is connected to the gateway device of the non-public network.
  • the technical solutions of the embodiments of the present application make it possible to implement network access control based on the network service requirements and network connection capabilities of terminal devices in application scenarios where public networks and non-public networks coexist, thereby ensuring that the communication system can support access to public networks Business and non-public network business processing.
  • Fig. 10 shows a block diagram of a network access control device according to an embodiment of the present application.
  • the network access control apparatus 1000 includes: a generating unit 1002 and a configuration unit 1004.
  • the generating unit 1002 is used to generate a network access control strategy, the network access control strategy is used to enable terminal devices to perform access control according to network service requirements and network connection capabilities, and the network connection capabilities include Network and non-public network connection capabilities; the configuration unit 1004 is used to configure the network access control strategy to the terminal device.
  • the network access control policy includes the service priority of the public network and the service priority of the non-public network; wherein, the service priority is determined by the frequency point information of the network.
  • the priority is characterized, or the service priority is characterized by the priority of a network cell in the same frequency band.
  • the configuration unit 1004 is configured to configure the network to the terminal device by configuring cell reselection parameters or redirection parameters when the terminal device is in an idle state or in an inactive state. Access control strategy.
  • the network access control apparatus 1000 further includes: a determining unit, configured to: when it is detected that the terminal device needs to access the non-public network, according to the information of the non-public network The identification information and the subscription information of the terminal device determine whether the terminal device can access the non-public network.
  • the technical solutions of the embodiments of the present application also make it possible to implement network access control based on the network service requirements and network connection capabilities of terminal devices in application scenarios where public networks and non-public networks coexist, thereby ensuring that the communication system can support public Processing of network services and non-public network services.
  • Fig. 11 shows a block diagram of a network access control device according to an embodiment of the present application.
  • a network access control apparatus 1100 includes: a generating unit 1102 and a configuration unit 1104.
  • the generating unit 1102 is configured to generate a tracking area of a non-public network, the non-public network is a network formed using network slices of a public network, and the tracking area of the non-public network is different from the tracking area of the public network;
  • the configuration unit 1104 is used to configure the tracking area of the non-public network or the tracking area of the public network to the terminal device during any configuration period of the tracking area, so that the terminal device can track in the idle state or the inactive state When the zone is updated, it enters the connected state to obtain network access control information.
  • network cells within the same tracking area support the same network slices.
  • the technical solution of the embodiment of the present application prevents the tracking area of the non-public network and the tracking area of the public network from being configured for the terminal device at the same time. Therefore, when the terminal device does not update the tracking area in the idle state or in the inactive state, there will be no non-public network tracking area.
  • the terminal device When the public network is moved to the public network, it will not move from the public network to the non-public network; and the terminal device can enter the connected state to obtain network access control information when the tracking area is updated in the idle or inactive state , In order to realize the access control of the network, and then can ensure that the communication system can support the processing of public network services and non-public network services.
  • Fig. 12 shows a block diagram of a network access control device according to an embodiment of the present application.
  • a network access control apparatus 1200 includes: an obtaining unit 1202 and a configuration unit 1204.
  • the obtaining unit 1202 is configured to obtain identification information of a non-public network
  • the non-public network is a network formed by using network slices of a public network
  • the identification information of the non-public network is used to identify the area where the non-public network is located
  • the configuration unit 1204 is configured to configure the identification information of the non-public network to the terminal device, so that the terminal device determines whether to search the non-public network according to the identification information of the non-public network in an idle state or an inactive state .
  • the network access control apparatus 1200 further includes: a sending unit, configured to access the non-public network upon receiving a request sent by the terminal device in an idle or inactive state Sending configuration information to the terminal device to control the terminal device's access to the non-public network.
  • the identification information of the non-public network includes at least one of the following: location information of a network cell of the non-public network, geographic location information covered by the non-public network, and Frequency information of public networks.
  • the technical solution provided by the embodiments of the application obtains the identification information of the non-public network, and the identification information of the non-public network is used to identify the area where the non-public network is located, and the identification information of the non-public network is configured to the terminal device, so that the terminal device In the idle or inactive state, it can be determined whether to search for non-public networks according to the identification information of the non-public networks. For example, when the identification information of the non-public networks is detected, the search process of the non-public networks can be executed, and the non-public network is not detected.
  • the network identification information stop searching for non-public networks, and on the premise of realizing network access control, it is possible to avoid terminal devices from frequently searching for non-public networks and increasing the power consumption of the terminal devices.
  • Fig. 13 shows a block diagram of a network access control device according to an embodiment of the present application.
  • a network access control apparatus 1300 includes: an obtaining unit 1302 and a configuration unit 1304.
  • the obtaining unit 1302 is configured to obtain identification information of a non-public network configured by the network side device.
  • the non-public network is a network formed by using network slices of a public network, and the identification information of the non-public network is used to identify the non-public network.
  • the area where the public network is located; the processing unit 1304 is configured to determine whether to search the non-public network according to the identification information of the non-public network when the terminal device is in an idle state or an inactive state.
  • the processing unit 1304 is configured to: if the identification information of the non-public network is detected, execute the search process of the non-public network; if the identification information of the non-public network is not detected , Stop searching the non-public network.
  • the processing unit 1304 is further configured to: if it is necessary to access the non-public network, send to the network side device instruction information requesting access to the non-public network, and according to the The network side device executes the network access process with respect to the configuration information fed back by the indication information.
  • the technical solution provided by the embodiments of the application obtains the identification information of the non-public network, and the identification information of the non-public network is used to identify the area where the non-public network is located, and the identification information of the non-public network is configured to the terminal device, so that the terminal device In the idle or inactive state, it can be determined whether to search for non-public networks according to the identification information of the non-public networks. For example, when the identification information of the non-public networks is detected, the search process of the non-public networks can be executed, and the non-public network is not detected.
  • the network identification information stop searching for non-public networks, and on the premise of realizing network access control, it is possible to avoid terminal devices from frequently searching for non-public networks and increasing the power consumption of the terminal devices.
  • Fig. 14 shows a schematic structural diagram of a computer system suitable for implementing an electronic device according to an embodiment of the present application.
  • the computer system 1400 includes a central processing unit (Central Processing Unit, CPU) 1401, which can be loaded into a random system according to a program stored in a read-only memory (Read-Only Memory, ROM) 1402 or from the storage part 1408.
  • Access memory (Random Access Memory, RAM) 1403 programs to execute various appropriate actions and processing, for example, execute the methods described in the above-mentioned embodiments.
  • RAM 1403 various programs and data required for system operation are also stored.
  • the CPU 1401, the ROM 1402, and the RAM 1403 are connected to each other through a bus 1404.
  • An Input/Output (I/O) interface 1405 is also connected to the bus 1404.
  • the following components are connected to the I/O interface 1405: input part 1406 including keyboard, mouse, etc.; output part 1407 including cathode ray tube (Cathode Ray Tube, CRT), liquid crystal display (LCD), etc., and speakers, etc. ; A storage part 1408 including a hard disk, etc.; and a communication part 1409 including a network interface card such as a LAN (Local Area Network) card and a modem.
  • the communication section 1409 performs communication processing via a network such as the Internet.
  • the driver 1410 is also connected to the I/O interface 1405 as needed.
  • a removable medium 1411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1410 as needed, so that the computer program read from it is installed into the storage portion 1408 as needed.
  • the process described above with reference to the flowchart can be implemented as a computer software program.
  • the embodiments of the present application include a computer program product, which includes a computer program carried on a computer-readable medium, and the computer program includes program code for executing the method shown in the flowchart.
  • the computer program may be downloaded and installed from the network through the communication part 1409, and/or installed from the removable medium 1411.
  • CPU central processing unit
  • the computer-readable medium shown in the embodiments of the present application may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the two.
  • the computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above.
  • Computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable Erasable Programmable Read Only Memory (EPROM), flash memory, optical fiber, portable compact disk read-only memory (Compact Disc Read-Only Memory, CD-ROM), optical storage device, magnetic storage device, or any suitable of the above The combination.
  • the computer-readable storage medium may be any tangible medium that contains or stores a program, and the program may be used by or in combination with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal propagated in a baseband or as a part of a carrier wave, and a computer-readable program code is carried therein.
  • This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the computer-readable signal medium may also be any computer-readable medium other than the computer-readable storage medium.
  • the computer-readable medium may send, propagate, or transmit the program for use by or in combination with the instruction execution system, apparatus, or device .
  • the program code contained on the computer-readable medium can be transmitted by any suitable medium, including but not limited to: wireless, wired, etc., or any suitable combination of the above.
  • each block in the flowchart or block diagram may represent a module, program segment, or part of the code, and the above-mentioned module, program segment, or part of the code includes one or more executables for realizing the specified logic function. instruction.
  • the functions marked in the block may also occur in a different order from the order marked in the drawings. For example, two blocks shown in succession can actually be executed substantially in parallel, or they can sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagram or flowchart, and the combination of blocks in the block diagram or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or operations, or can be It is realized by a combination of dedicated hardware and computer instructions.
  • the units involved in the embodiments described in the present application can be implemented in software or hardware, and the described units can also be provided in a processor. Among them, the names of these units do not constitute a limitation on the unit itself under certain circumstances.
  • an electronic device including:
  • One or more processors are One or more processors;
  • the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 3 The described network access control method.
  • an electronic device including:
  • One or more processors are One or more processors;
  • the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 4 The described network access control method.
  • an electronic device including:
  • One or more processors are One or more processors;
  • the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 5 The described network access control method.
  • the technical solution of the embodiment of the present application also provides an electronic device, including: one or more processors;
  • the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 6 The described network access control method.
  • the technical solution of the embodiment of the present application also provides an electronic device, including: one or more processors;
  • the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the embodiment shown in FIG. 7 The described network access control method.
  • this application also provides a computer-readable medium.
  • the computer-readable medium may be included in the electronic device described in the above-mentioned embodiments; or it may exist alone without being assembled into the electronic device. in.
  • the above-mentioned computer-readable medium carries one or more programs.
  • the electronic device realizes the network access control method executed by the terminal device in the above-mentioned various embodiments, Or, the network access control method executed by the network side device.
  • modules or units of the device for action execution are mentioned in the above detailed description, this division is not mandatory.
  • the features and functions of two or more modules or units described above may be embodied in one module or unit.
  • the features and functions of a module or unit described above can be further divided into multiple modules or units to be embodied.
  • the exemplary embodiments described herein can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , Including several instructions to make a computing device (which can be a personal computer, a server, a touch terminal, or a network-side device, etc.) execute the method according to the embodiments of the present application.
  • a computing device which can be a personal computer, a server, a touch terminal, or a network-side device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种网络接入控制方法、计算机可读介质及电子设备。该网络接入控制方法包括:获取终端设备的网络连接能力,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;在所述终端设备处于连接态的情况下,根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制。本申请实施例的技术方案可以在公共网络和非公共网络共存的应用场景中,有效实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。

Description

网络接入控制方法、计算机可读介质及电子设备
本申请要求于2019年05月06日提交的申请号为201910371818.7、发明名称为“网络接入控制方法、装置、计算机可读介质及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机及通信技术领域,具体而言,涉及一种网络接入控制方法、计算机可读介质及电子设备。
背景技术
PLMN(Public Land Mobile Network,公共陆地移动网络)是为公共提供陆地移动通信业务而建立和经营的公共网络,随着网络业务的发展,也出现了NPN(Non-Public Network,非公共网络),NPN是为部分人群单独建立的网络,在公共网络与非公共网络共存的场景中,如何实现网络的接入控制成为亟待解决的技术问题。
发明内容
本申请实施例提供了一种网络接入控制方法、计算机可读介质及电子设备,可以在公共网络和非公共网络共存的应用场景中,有效实现网络的接入控制。
本申请的其他特性和优点将通过下面的详细描述变得显然,或部分地通过本申请的实践而习得。
根据本申请实施例的一个方面,提供了一种网络接入控制方法,应用于终端设备,包括:
获取终端设备的网络连接能力,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;在所述终端设备处于连接态的情况下,根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制。
根据本申请实施例的一个方面,提供了一种网络接入控制方法,应用于网络侧设备,包括:
生成网络接入控制策略,所述网络接入控制策略用于使终端设备根据网络业务需求和网络连接能力进行接入控制,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;将所述网络接入控制策略配置给所述终端设备。
根据本申请实施例的一个方面,提供了一种网络接入控制方法,应用于网络侧设备,包括:
生成非公共网络的跟踪区,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的跟踪区与所述公共网络的跟踪区不相同;在跟踪区的任一配置期间内,将所述非公共网络的跟踪区或所述公共网络的跟踪区配置给终端设备,以使所述终端设备在空闲态或非激活态发生跟踪区更新时进入连接态获取网络接入控制信息。
根据本申请实施例的一个方面,提供了一种网络接入控制方法,应用于网络侧设备,包括:
获取非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;将所述非公共网络的标识信息配置给终端设备,以使终端设备在空闲态或非激活态根据所述非公共网络的标识信息确定是否搜索非公共网络。
根据本申请实施例的一个方面,提供了一种网络接入控制方法,应用于终端设备,包括:
获取网络侧设备配置的非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;在终端设备处于空闲态或非激活态时,根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
根据本申请实施例的一个方面,提供了一种网络接入控制装置,包括:
获取单元,用于获取终端设备的网络连接能力,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;控制单元,用于在所述终端设备处于连接态的情况下,根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制。
在本申请的一些实施例中,基于前述方案,所述控制单元用于:若根据所 述网络连接能力确定终端设备能够支持同时连接至所述公共网络和所述非公共网络,则在所述终端设备需要同时处理公共网络业务和非公共网络业务时,控制所述终端设备接入所述公共网络和所述非公共网络。
在本申请的一些实施例中,基于前述方案,所述控制单元用于:若根据所述网络连接能力确定所述终端设备不支持同时连接至所述公共网络和所述非公共网络,则根据所述终端设备所要处理的网络业务,控制所述终端设备接入所述公共网络或所述非公共网络。
在本申请的一些实施例中,基于前述方案,所述控制单元用于:若所述终端设备需要处理公共网络业务,则控制所述终端设备接入所述公共网络;若所述终端设备需要处理非公共网络业务,则控制所述终端设备接入所述非公共网络;若所述终端设备需要同时处理所述公共网络业务和所述非公共网络业务,则根据所述公共网络的业务优先级和所述非公共网络的业务优先级,控制所述终端设备接入业务优先级最高的网络。
在本申请的一些实施例中,基于前述方案,所述控制单元用于:若根据所述网络连接能力确定所述终端设备不支持同时连接至所述公共网络和所述非公共网络,则在所述公共网络和所述非公共网络中的一个网络的网络质量不能满足业务需求时,控制所述终端设备接入另一个网络。
在本申请的一些实施例中,基于前述方案,所述控制单元用于:在所述终端设备接入了所述公共网络和所述非公共网络中的第一网络的情况下,若所述第一网络的网络质量无法满足业务需求,则在需要处理所述第一网络的业务时,控制所述终端设备接入所述公共网络和所述非公共网络中的第二网络,并通过所述第二网络访问所述第一网络,以处理所述第一网络的业务。
在本申请的一些实施例中,基于前述方案,所述控制单元还用于:在所述终端设备接入了所述公共网络和所述非公共网络中的第一网络的情况下,若所述公共网络和所述非公共网络中的第二网络的网络质量无法满足业务需求或所述终端设备无法连接至所述第二网络,则在需要处理所述第二网络的业务时,通过所述第一网络访问所述第二网络,以处理所述第二网络的业务。
在本申请的一些实施例中,基于前述方案,所述公共网络的网关设备与所述非公共网络的网关设备相连接。
根据本申请实施例的一个方面,提供了一种网络接入控制装置,包括:
生成单元,用于生成网络接入控制策略,所述网络接入控制策略用于使终 端设备根据网络业务需求和网络连接能力进行接入控制,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;配置单元,用于将所述网络接入控制策略配置给所述终端设备。
在本申请的一些实施例中,基于前述方案,所述网络接入控制策略包括所述公共网络的业务优先级和所述非公共网络的业务优先级;其中,所述业务优先级通过网络的频点信息的优先级来表征,或者所述业务优先级通过处于同一频段内的网络小区的优先级来表征。
在本申请的一些实施例中,基于前述方案,所述配置单元用于:在所述终端设备处于空闲态或非激活态的情况下,通过配置小区重选参数或重定向参数向所述终端设备配置所述网络接入控制策略。
在本申请的一些实施例中,基于前述方案,所述的网络接入控制装置还包括:确定单元,用于在监测到所述终端设备需要接入所述非公共网络时,根据所述非公共网络的标识信息和所述终端设备的签约信息,确定所述终端设备是否能够接入所述非公共网络。
根据本申请实施例的一个方面,提供了一种网络接入控制装置,包括:
生成单元,用于生成非公共网络的跟踪区,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的跟踪区与所述公共网络的跟踪区不相同;配置单元,用于在跟踪区的任一配置期间内,将所述非公共网络的跟踪区或所述公共网络的跟踪区配置给终端设备,以使终端设备在空闲态或非激活态发生跟踪区更新时进入连接态,以获取网络接入控制信息。
在本申请的一些实施例中,基于前述方案,处于同一跟踪区内的网络小区所支持的网络切片相同。
根据本申请实施例的一个方面,提供了一种网络接入控制装置,包括:
获取单元,用于获取非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;配置单元,用于将所述非公共网络的标识信息配置给终端设备,以使所述终端设备在空闲态或非激活态根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
在本申请的一些实施例中,基于前述方案,所述的网络接入控制装置还包括:发送单元,用于在接收到所述终端设备在空闲态或非激活态发送的请求接入所述非公共网络的指示信息时,向所述终端设备发送配置信息,以对所述终 端设备接入所述非公共网络进行控制。
在本申请的一些实施例中,基于前述方案,所述非公共网络的标识信息包括以下至少之一:所述非公共网络的网络小区的位置信息、所述非公共网络所覆盖的地理位置信息、所述非公共网络的频点信息。
根据本申请实施例的一个方面,提供了一种网络接入控制装置,包括:
获取单元,用于获取网络侧设备配置的非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,非公共网络的标识信息用于标识所述非公共网络所在的区域;处理单元,用于在终端设备处于空闲态或非激活态时,根据所述非公共网络的标识信息确定是否搜索非公共网络。
在本申请的一些实施例中,基于前述方案,所述处理单元用于:若检测到所述非公共网络的标识信息,则执行所述非公共网络的搜索过程;若未检测到所述非公共网络的标识信息,则停止搜索所述非公共网络。
在本申请的一些实施例中,基于前述方案,所述处理单元还用于:若需要接入所述非公共网络,则向所述网络侧设备发送请求接入所述非公共网络的指示信息,并根据所述网络侧设备针对所述指示信息反馈的配置信息执行网络接入过程。
根据本申请实施例的一个方面,提供了一种计算机可读介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如上述各个实施例中终端设备执行的所述网络接入控制方法或网络侧设备执行的所述网络接入控制方法。
根据本申请实施例的一个方面,提供了一种电子设备,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如上述各个实施例中终端设备执行的所述网络接入控制方法或网络侧设备执行的所述网络接入控制方法。
在本申请的一些实施例所提供的技术方案中,通过在终端设备处于连接态的情况下,根据终端设备的网络业务需求和网络连接能力(即对相互独立的公共网络和非公共网络的连接能力)对终端设备进行接入控制,使得能够在公共网络和非公共网络共存的应用场景中,基于终端设备的网络业务需求和网络连接能力实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。
在本申请的一些实施例所提供的技术方案中,通过生成非公共网络的跟踪 区,且非公共网络的跟踪区与公共网络的跟踪区不相同,并在跟踪区的任一配置期间内,将非公共网络的跟踪区或公共网络的跟踪区配置给终端设备,使得终端设备在空闲态或非激活态发生跟踪区更新时(如从非公共网络的跟踪区进入公共网络的跟踪区,或者从公共网络的跟踪区进入非公共网络的跟踪区),能够进入连接态获取网络接入控制信息,以实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。
在本申请的一些实施例所提供的技术方案中,通过获取非公共网络的标识信息,且非公共网络的标识信息用于标识非公共网络所在的区域,并将非公共网络的标识信息配置给终端设备,使得终端设备在空闲态或非激活态可以根据非公共网络的标识信息确定是否搜索非公共网络,比如可以在检测到非公共网络的标识信息时,执行非公共网络的搜索过程,而在未检测到非公共网络的标识信息时,停止搜索非公共网络,进而可以在实现网络接入控制的前提下,避免终端设备频繁搜索非公共网络而增加终端设备的功耗。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请实施例,并与说明书一起用于解释本申请的原理。显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。在附图中:
图1示出了可以应用本申请实施例的技术方案的一种示例性系统架构的示意图;
图2示出了可以应用本申请实施例的技术方案的一种示例性系统架构的示意图;
图3示出了根据本申请的一个实施例的网络接入控制方法的流程图;
图4示出了根据本申请的一个实施例的网络接入控制方法的流程图;
图5示出了根据本申请的一个实施例的网络接入控制方法的流程图;
图6示出了根据本申请的一个实施例的网络接入控制方法的流程图;
图7示出了根据本申请的一个实施例的网络接入控制方法的流程图;
图8示出了根据本申请的一个实施例的网络小区的位置示意图;
图9示出了根据本申请的一个实施例的网络接入控制装置的框图;
图10示出了根据本申请的一个实施例的网络接入控制装置的框图;
图11示出了根据本申请的一个实施例的网络接入控制装置的框图;
图12示出了根据本申请的一个实施例的网络接入控制装置的框图;
图13示出了根据本申请的一个实施例的网络接入控制装置的框图;
图14示出了适于用来实现本申请实施例的电子设备的计算机系统的结构示意图。
具体实施方式
现在将参考附图更全面地描述示例实施方式。然而,示例实施方式能够以多种形式实施,且不应被理解为限于在此阐述的范例;相反,提供这些实施方式使得本申请将更加全面和完整,并将示例实施方式的构思全面地传达给本领域的技术人员。
此外,所描述的特征、结构或特性可以以任何合适的方式结合在一个或更多实施例中。在下面的描述中,提供许多具体细节从而给出对本申请实施例的充分理解。然而,本领域技术人员将意识到,可以实践本申请的技术方案而没有特定细节中的一个或更多,或者可以采用其它的方法、组元、装置、步骤等。在其它情况下,不详细示出或描述公知方法、装置、实现或者操作以避免模糊本申请的各方面。
附图中所示的方框图仅仅是功能实体,不一定必须与物理上独立的实体相对应。即,可以采用软件形式来实现这些功能实体,或在一个或多个硬件模块或集成电路中实现这些功能实体,或在不同网络或处理器装置或微控制器装置中的至少一个中实现这些功能实体。
附图中所示的流程图仅是示例性说明,不是必须包括所有的内容和操作(或步骤),也不是必须按所描述的顺序执行。例如,有的操作或步骤还可以分解,而有的操作或步骤可以合并或部分合并,因此实际执行的顺序有可能根据实际情况改变。
图1示出了可以应用本申请实施例的技术方案的一种示例性系统架构的示意图。
如图1所示,系统架构可以包括终端设备101、公共网络基站102和非公共网络基站103。其中,终端设备101可以是图1中所示的智能手机,还可以 是平板电脑、便携式计算机、台式计算机等等,本申请对此不做限制。公共网络基站102和非公共网络基站103独立部署,并分别形成公共网络和非公共网络。
应该理解,图1中的终端设备101、公共网络基站102和非公共网络基站103的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备101、公共网络基站102和非公共网络基站103。
在本申请的一个实施例中,公共网络基站102可以生成网络接入控制策略,该网络接入控制策略用于使终端设备101根据网络业务需求和网络连接能力进行接入控制,该网络连接能力包括对相互独立的公共网络和非公共网络的连接能力,进而公共网络基站102可以将该网络接入控制策略配置给终端设备101。
在本申请的一个实施例中,终端设备101在获取到网络接入控制策略之后,可以在终端设备101处于连接态的情况下,根据终端设备101的网络业务需求和网络连接能力对终端设备101自身进行接入控制,确保了通信系统能够支持对公共网络业务和非公共网络业务的处理。
图2示出了可以应用本申请实施例的技术方案的一种示例性系统架构的示意图。
如图2所示,系统架构可以包括终端设备201和公共网络基站202。其中,终端设备201可以是图2中所示的智能手机,还可以是平板电脑、便携式计算机、台式计算机等等,本申请对此不做限制。公共网络基站202可以通过配置私有的切片来构建非公共网络。
应该理解,图2中的终端设备201和公共网络基站202的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备201和公共网络基站202。
在本申请的一个实施例中,公共网络基站202可以生成非公共网络的跟踪区,并且非公共网络的跟踪区与公共网络的跟踪区不相同,进而公共网络基站202可以在跟踪区的任一配置期间内,将非公共网络的跟踪区或公共网络的跟踪区配置给终端设备201,以使终端设备201在空闲态或非激活态发生跟踪区更新时进入连接态获取网络接入控制信息。即在该实施例中,公共网络和非公共网络的跟踪区不会同时配置给终端设备201,这样使得终端设备201在空闲态或非激活态发生跟踪区更新时,能够进入连接态获取网络接入控制信息,以 实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。
示例性地,发生跟踪区更新,可以是:终端设备201从非公共网络的跟踪区进入公共网络的跟踪区,或者,从公共网络的跟踪区进入非公共网络的跟踪区,本申请对此不做限制。
基于图2所示的系统架构,在本申请的一个实施例中,公共网络基站202可以获取非公共网络的标识信息,非公共网络的标识信息用于标识非公共网络所在的区域;然后公共网络基站202可以将非公共网络的标识信息配置给终端设备201,进而终端设备201在处于空闲态或非激活态时,可以根据非公共网络的标识信息确定是否搜索非公共网络,比如终端设备201可以在检测到非公共网络的标识信息时,执行非公共网络的搜索过程,而在未检测到非公共网络的标识信息时,停止搜索非公共网络,进而可以在实现网络接入控制的前提下,避免频繁搜索非公共网络而增加终端设备201的功耗。
以下对本申请实施例的技术方案的实现细节进行详细阐述:
图3示出了根据本申请的一个实施例的网络接入控制方法的流程图,该网络接入控制方法可以由终端设备来执行,该终端设备可以是图1中所示的终端设备101。参照图3所示,该网络接入控制方法至少包括步骤S310至步骤S320,详细介绍如下:
在步骤S310中,终端设备获取自身的网络连接能力,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力。
在本申请的一个实施例中,终端设备对相互独立的公共网络和非公共网络的连接能力可以包括是否能够连接至公共网络、是否能够连接至非公共网络、是否能够支持同时连接至公共网络和非公共网络,本申请在此不做限制。
在步骤S320中,终端设备在处于连接态的情况下,根据自身的网络业务需求和网络连接能力进行接入控制。
在本申请的一个实施例中,步骤S320中终端设备根据自身的网络业务需求和网络连接能力进行接入控制的过程可以是:若终端设备根据自身的网络连接能力确定能够支持同时连接至公共网络和非公共网络,则在需要同时处理公共网络业务和非公共网络业务时,控制接入公共网络和非公共网络。该实施例 的技术方案使得能够根据终端设备的网络连接能力同时接入公共网络和非公共网络,以同时处理公共网络业务和非公共网络业务。
在本申请的一个实施例中,步骤S320中终端设备根据自身的网络业务需求和网络连接能力进行接入控制的过程还可以是:若终端设备根据自身的网络连接能力确定不支持同时连接至公共网络和非公共网络,则根据自身所要处理的网络业务控制接入公共网络或非公共网络。比如,若终端设备需要处理公共网络业务,则控制终端设备接入公共网络;若终端设备需要处理非公共网络业务,则控制终端设备接入非公共网络;若终端设备需要同时处理公共网络业务和非公共网络业务,则根据公共网络的业务优先级和非公共网络的业务优先级,控制终端设备接入业务优先级最高的网络。
在本申请的一个实施例中,步骤S320中终端设备根据自身的网络业务需求和网络连接能力进行接入控制的过程还可以是:若终端设备根据自身的网络连接能力确定不支持同时连接至公共网络和非公共网络,则在公共网络和非公共网络中的一个网络的网络质量不能满足业务需求时,控制接入另一个网络。该实施例的技术方案使得终端设备在不支持同时连接至公共网络和非公共网络的情况下,能够优先接入满足业务需求的网络。
在本申请的一个实施例中,步骤S320中终端设备根据自身的网络业务需求和网络连接能力进行接入控制的过程还可以是:在终端设备接入了公共网络和非公共网络中的第一网络的情况下,若第一网络的网络质量无法满足业务需求,则在需要处理第一网络的业务时,终端设备接入公共网络和非公共网络中的第二网络,并通过该第二网络访问第一网络,以处理第一网络的业务。该实施例的技术方案使得终端设备在接入第一网络的情况下,若该第一网络的网络质量无法满足业务需求,则在需要处理第一网络的业务时,可以通过接入第二网络间接访问第一网络,以处理第一网络的业务。在该实施例中,公共网络的网关设备与非公共网络的网关设备可以相连接,以便于通过第二网络间接访问第一网络,以处理第一网络的业务。
在本申请的一个实施例中,在终端设备接入了公共网络和非公共网络中的第一网络的情况下,若公共网络和非公共网络中的第二网络的网络质量无法满足业务需求或终端设备无法连接至第二网络,则在需要处理第二网络的业务时,通过第一网络间接访问第二网络,以处理第二网络的业务。该实施例的技术方案使得终端设备在接入第一网络的情况下,可以在无法连接至第二网络或 第二网络的网络质量无法满足业务需求时,能够通过第一网络间接访问第二网络,以处理第二网络的业务。在该实施例中,公共网络的网关设备与非公共网络的网关设备可以相连接,以便于通过第一网络间接访问第二网络,以处理第二网络的业务。
图3所示实施例的技术方案使得在公共网络和非公共网络共存的应用场景中,能够基于终端设备的网络业务需求和网络连接能力实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。示例性地,上述通信系统可以为第五代移动通信技术(5th-Generation,5G)系统。
图4示出了根据本申请的一个实施例的网络接入控制方法的流程图,该网络接入控制方法可以由网络侧设备来执行,该网络侧设备可以是图1中所示的公共网络基站102,也可以是独立于公共网络基站102和非公共网络基站103之外的网络管理设备。参照图4所示,该网络接入控制方法至少包括步骤S410至步骤S420,详细介绍如下:
在步骤S410中,网络侧设备生成网络接入控制策略,所述网络接入控制策略用于使终端设备根据网络业务需求和网络连接能力进行接入控制,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力。
在本申请的一个实施例中,网络接入控制策略可以包括公共网络的业务优先级和非公共网络的业务优先级,以便于终端设备在不能同时处理公共网络业务和非公共网络业务时,根据公共网络的业务优先级和非公共网络的业务优先级来选择处理业务优先级较高的业务。
在本申请的一个实施例中,业务优先级可以通过网络的频点信息的优先级来表征。比如,若公共网络所在的频点信息的优先级高于非公共网络所在的频点信息的优先级,则确定公共网络的业务优先级高于非公共网络的业务优先级。
在本申请的一个实施例中,业务优先级可以通过处于同一频段内的网络小区的优先级来表征。比如,在公共网络的网络小区与非公共网络的网络小区处于同一频段内的情况下,若公共网络的网络小区的优先级高于非公共网络的网络小区的优先级,则说明公共网络的业务优先级高于非公共网络的业务优先级。
在步骤S420中,网络侧设备将所述网络接入控制策略配置给终端设备。
在本申请的一个实施例中,如果终端设备处理连接态,则网络侧设备可以直接通过配置信令将网络接入控制策略配置给终端设备。如果终端设备处于空闲态或非激活态,则网络侧设备可以通过配置小区重选参数或重定向参数为终端设备配置网络接入控制策略。
在本申请的一个实施例中,网络侧设备若监测到终端设备需要接入非公共网络,则可以根据非公共网络的标识信息和终端设备的签约信息,确定终端设备是否能够接入非公共网络。比如,若终端设备与某个非公共网络签订了接入协议,则网络侧设备可以允许该终端设备接入该非公共网络;若终端设备与某个非公共网络未签订接入协议,则网络侧设备可以拒绝该终端设备接入该非公共网络。
图4所示实施例的技术方案同样使得在公共网络和非公共网络共存的应用场景中,能够基于终端设备的网络业务需求和网络连接能力实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。
图5示出了根据本申请的一个实施例的网络接入控制方法的流程图,该网络接入控制方法可以由网络侧设备来执行,该网络侧设备可以是图2中所示的公共网络基站202。参照图5所示,该网络接入控制方法至少包括步骤S510至步骤S520,详细介绍如下:
在步骤S510中,网络侧设备生成非公共网络的跟踪区,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的跟踪区与所述公共网络的跟踪区不相同。
在本申请的一个实施例中,处于同一跟踪区内的网络小区所支持的网络切片相同。
在步骤S520中,在跟踪区的任一配置期间内,网络侧设备将所述非公共网络的跟踪区或所述公共网络的跟踪区配置给终端设备,以使所述终端设备在空闲态或非激活态发生跟踪区更新时进入连接态,以获取网络接入控制信息。
图5所示实施例的技术方案使得非公共网络的跟踪区和公共网络的跟踪区不会同时配置给终端设备,因此终端设备在空闲态或非激活态不发生跟踪区更新(Tracking Area Update,简称TAU)时,不会出现从非公共网络移动到 公共网络的情况,也不会出现从公共网络移动到非公共网络的情况;而终端设备在空闲态或非激活态发生跟踪区更新时,能够进入连接态获取网络接入控制信息,以实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。
图6示出了根据本申请的一个实施例的网络接入控制方法的流程图,该网络接入控制方法可以由网络侧设备来执行,该网络侧设备可以是图2中所示的公共网络基站202。参照图6所示,该网络接入控制方法至少包括步骤S610至步骤S620,详细介绍如下:
在步骤S610中,网络侧设备获取非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域。
在本申请的一个实施例中,网络侧设备可以从应用功能(Application Function,简称AF)实体或核心网实体获取非公共网络的标识信息。其中,非公共网络的标识信息可以包括以下至少之一:非公共网络的网络小区的位置信息、非公共网络所覆盖的地理位置信息、非公共网络的频点信息,本申请对此不做限制。
在步骤S620中,网络侧设备将所述非公共网络的标识信息配置给终端设备,以使所述终端设备在空闲态或非激活态根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
在本申请的一个实施例中,终端设备可以在检测到非公共网络的标识信息时,执行非公共网络的搜索过程,而在未检测到非公共网络的标识信息时,停止搜索非公共网络,进而可以在实现网络接入控制的前提下,避免终端设备频繁搜索非公共网络而增加终端设备的功耗。
在本申请的一个实施例中,网络侧设备如果接收到终端设备在空闲态或非激活态发送的请求接入非公共网络的指示信息,则可以向终端设备发送配置信息,以对终端设备接入非公共网络进行控制。其中,网络侧设备可以通过RRC(Radio Resource Control,无线资源控制)信令来向终端设备发送配置信息,该配置信息可以包括测量配置信息等,本申请对此不做限制。
图7示出了根据本申请的一个实施例的网络接入控制方法的流程图,该网 络接入控制方法可以由终端设备来执行,该终端设备可以是图2中所示的终端设备201。参照图7所示,该网络接入控制方法至少包括步骤S710至步骤S720,详细介绍如下:
在步骤S710中,终端设备获取网络侧设备配置的非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域。
在步骤S720中,终端设备在处于空闲态或非激活态时,根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
在本申请的一个实施例中,终端设备可以在检测到非公共网络的标识信息时,执行非公共网络的搜索过程;在未检测到非公共网络的标识信息时,停止搜索所述非公共网络,进而可以在实现网络接入控制的前提下,避免终端设备频繁搜索非公共网络而增加终端设备的功耗。
在本申请的一个实施例中,若终端设备搜索到非公共网络之后需要接入非公共网络,则向网络侧设备发送请求接入非公共网络的指示信息,并根据网络侧设备针对该指示信息反馈的配置信息执行网络接入过程。其中,网络侧设备反馈的配置信息可以包括测量配置信息等,本申请对此不做限制。
上述实施例分别针对图1所示的系统架构和图2所示的系统架构从终端设备和网络侧设备的角度对本申请实施例的网络接入控制方案进行了阐述,以下将从整个系统(包括终端设备和网络侧设备)的角度对本申请实施例的技术方案的实现细节进行详细说明。
如图1和图2所示,PLMN与NPN之间的部署模式可以包括以下两种模式:
模式1:独立部署NPN的模式。
在模式1中,NPN中的核心网网元均由第三方自行部署,第三方自行解决频谱问题,不依赖于公共网络中提供的功能。这种模式适合于对本地化网络需求强烈的场景和行业,能够严格实现与公共网络的隔离。
模式2:与公共网络集成的NPN模式。
在模式2中,NPN中的核心网网元(包括基站)都是与PLMN共享的,NPN通过私有切片的方式实现与PLMN之间的业务数据的隔离,并且引入新 的用户群组管理机制来实现管理。这种模式适合不希望本地部署硬件的场景,NPN与PLMN的隔离可以使用网络切片或者PDU(Protocol Data Unit,协议数据单元)会话以及QoS(Quality of Service,服务质量)流来区分。
对于模式1而言,当终端设备处于连接态时,可以通过如下方式来解决终端设备的接入控制问题:
在本申请的一个实施例中,当终端设备处于连接态时,在PLMN和NPN之间的切换需要考虑终端设备的网络业务需求和网络连接能力。比如,若需要同时支持PLMN业务和NPN业务的处理、且终端设备的网络连接能力支持同时向两个网络建立连接,则终端设备在切换过程中可以不断掉PLMN业务或者NPN业务,而是再发起一条连接,即同时连接至PLMN和NPN,除非NPN或者PLMN的覆盖已经无法支持终端设备的网络连接。
在本申请的一个实施例中,如果需要同时支持PLMN业务和NPN业务的处理,但终端设备不支持同时向两个网络建立连接,则如果两个网络的覆盖和信号强度都满足业务需要,则可以根据业务优先级选择连接至PLMN或NPN;如果两个网络中仅有一个网络的覆盖和信号强度满足业务需要,则可以连接至该网络。
在本申请的一个实施例中,终端设备是否可以接入NPN,可以通过网络标识和用户的签约信息来进行判断。
在本申请的一个实施例中,网络侧设备需要为终端设备提前配置好相应的策略,比如业务优先级、接入控制策略等。其中,业务优先级可以用频点信息或者同频内的小区标识等位置信息来表征。
在本申请的一个实施例中,对于处于空闲态和非激活态的终端设备,可以通过在RRC连接释放过程中配置小区重选或者重定向的参数来配置NPN相关的优先级和位置范围信息。
对于模式2而言,当终端设备处于连接态时,可以直接通过网络切片来实现接入控制;当终端设备处于空闲态和非激活态时,可以通过如下方式来解决终端设备的接入控制问题:
在本申请的一个实施例中,可以为NPN小区配置专用的TA(tracking area,跟踪区),这些TA可以空分复用,即不同的位置上可以出现,并且为NPN所专有。如图8所示,小区1、小区2和小区3为PLMN小区,配置TA1;小区 4为NPN小区,配置TA2。在同一TA里的小区所支持的切片相同,如TA1里的三个小区都支持切片S1,TA2的小区支持切片S2。同时,网络侧设备需要通过配置保证PLMN小区和NPN小区的TA不会同时配置给终端设备。
通过该实施例的技术方案,使得处于空闲态和非激活态的终端设备在从PLMN重选到NPN或者从NPN重选到PLMN时会发生TA更新过程,从而进入连接态获取到NPN相关的配置,实现接入控制;并且在终端设备不发生TAU的时候,也不会出现从接入PLMN过度到接入NPN,或者从接入NPN过度到接入PLMN的过程。
有以上方案的支持,终端设备可以不使用CAG(Closed Access Group,封闭接入组)标识机制来执行接入控制过程。
对于模式2而言,在本申请的另一个实施例中,可以通过位置信息和指纹实现可控的NPN搜索,比如可以借助第三方的应用服务器AF来实现基于指纹信息的可控式NPN发现过程。详细来说:AF或者其他核心网网元可以向终端设备推送NPN的指纹信息,这些指纹信息可以包括:小区标识构成的位置信息、GNSS(Global Navigation Satellite System,全球导航卫星系统)地理位置信息、频点信息等,进而终端设备在空闲态或者非激活态移动时,可以根据NPN的指纹信息来判断是否要进行搜索,以避免终端设备频繁进行搜索而增加终端设备的功耗。
在本申请的一个实施例中,如果终端设备执行接入认证的过程需要进入连接态,则终端设备可以向网络侧设备指示其希望进行接入控制并因此进入连接态,网络侧设备可以通过RRC信令对终端设备进行测量配置或者其他配置,以完成模式2下的接入控制过程。
以下介绍本申请的装置实施例,可以用于执行本申请上述实施例中的网络接入控制方法。对于本申请装置实施例中未披露的细节,请参照本申请上述的网络接入控制方法的实施例。
图9示出了根据本申请的一个实施例的网络接入控制装置的框图。
参照图9所示,根据本申请的一个实施例的网络接入控制装置900,包括:获取单元902和控制单元904。
其中,获取单元902用于获取终端设备的网络连接能力,所述网络连接能 力包括对相互独立的公共网络和非公共网络的连接能力;控制单元904用于在所述终端设备处于连接态的情况下,根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制。
在本申请的一些实施例中,控制单元904用于:若根据所述网络连接能力确定终端设备能够支持同时连接至所述公共网络和所述非公共网络,则在所述终端设备需要同时处理公共网络业务和非公共网络业务时,控制所述终端设备接入所述公共网络和所述非公共网络。
在本申请的一些实施例中,控制单元904用于:若根据所述网络连接能力确定所述终端设备不支持同时连接至所述公共网络和所述非公共网络,则根据所述终端设备所要处理的网络业务,控制所述终端设备接入所述公共网络或所述非公共网络。
在本申请的一些实施例中,控制单元904用于:若所述终端设备需要处理公共网络业务,则控制所述终端设备接入所述公共网络;若所述终端设备需要处理非公共网络业务,则控制所述终端设备接入所述非公共网络;若所述终端设备需要同时处理公共网络业务和非公共网络业务,则根据所述公共网络的业务优先级和所述非公共网络的业务优先级,控制所述终端设备接入业务优先级最高的网络。
在本申请的一些实施例中,控制单元904用于:若根据所述网络连接能力确定所述终端设备不支持同时连接至所述公共网络和所述非公共网络,则在所述公共网络和所述非公共网络中的一个网络的网络质量不能满足业务需求时,控制所述终端设备接入另一个网络。
在本申请的一些实施例中,控制单元904用于:在终端设备接入了所述公共网络和所述非公共网络中的第一网络的情况下,若所述第一网络的网络质量无法满足业务需求,则在需要处理所述第一网络的业务时,控制所述终端设备接入所述公共网络和所述非公共网络中的第二网络,并通过所述第二网络访问所述第一网络,以处理所述第一网络的业务。
在本申请的一些实施例中,控制单元904还用于:在所述终端设备接入了所述公共网络和所述非公共网络中的第一网络的情况下,若所述公共网络和所述非公共网络中的第二网络的网络质量无法满足业务需求或所述终端设备无法连接至所述第二网络,则在需要处理所述第二网络的业务时,通过所述第一网络访问所述第二网络,以处理所述第二网络的业务。
在本申请的一些实施例中,基于前述方案,所述公共网络的网关设备与所述非公共网络的网关设备相连接。
本申请实施例的技术方案使得在公共网络和非公共网络共存的应用场景中,能够基于终端设备的网络业务需求和网络连接能力实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。
图10示出了根据本申请的一个实施例的网络接入控制装置的框图。
参照图10所示,根据本申请的一个实施例的网络接入控制装置1000,包括:生成单元1002和配置单元1004。
其中,生成单元1002用于生成网络接入控制策略,所述网络接入控制策略用于使终端设备根据网络业务需求和网络连接能力进行接入控制,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;配置单元1004用于将所述网络接入控制策略配置给所述终端设备。
在本申请的一些实施例中,所述网络接入控制策略包括所述公共网络的业务优先级和所述非公共网络的业务优先级;其中,所述业务优先级通过网络的频点信息的优先级来表征,或者所述业务优先级通过处于同一频段内的网络小区的优先级来表征。
在本申请的一些实施例中,配置单元1004用于:在所述终端设备处于空闲态或非激活态的情况下,通过配置小区重选参数或重定向参数向所述终端设备配置所述网络接入控制策略。
在本申请的一些实施例中,所述的网络接入控制装置1000还包括:确定单元,用于在监测到所述终端设备需要接入所述非公共网络时,根据所述非公共网络的标识信息和所述终端设备的签约信息,确定所述终端设备是否能够接入所述非公共网络。
本申请实施例的技术方案同样使得在公共网络和非公共网络共存的应用场景中,能够基于终端设备的网络业务需求和网络连接能力实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。
图11示出了根据本申请的一个实施例的网络接入控制装置的框图。
参照图11所示,根据本申请的一个实施例的网络接入控制装置1100,包 括:生成单元1102和配置单元1104。
其中,生成单元1102用于生成非公共网络的跟踪区,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的跟踪区与所述公共网络的跟踪区不相同;配置单元1104用于在跟踪区的任一配置期间内,将所述非公共网络的跟踪区或所述公共网络的跟踪区配置给终端设备,以使终端设备在空闲态或非激活态发生跟踪区更新时进入连接态,以获取网络接入控制信息。
在本申请的一些实施例中,基于前述方案,处于同一跟踪区内的网络小区所支持的网络切片相同。
本申请实施例的技术方案使得非公共网络的跟踪区和公共网络的跟踪区不会同时配置给终端设备,因此终端设备在空闲态或非激活态不发生跟踪区更新时,不会出现从非公共网络移动到公共网络的情况,也不会出现从公共网络移动到非公共网络的情况;而终端设备在空闲态或非激活态发生跟踪区更新时,能够进入连接态获取网络接入控制信息,以实现网络的接入控制,进而可以确保通信系统能够支持对公共网络业务和非公共网络业务的处理。
图12示出了根据本申请的一个实施例的网络接入控制装置的框图。
参照图12所示,根据本申请的一个实施例的网络接入控制装置1200,包括:获取单元1202和配置单元1204。
其中,获取单元1202用于获取非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;配置单元1204用于将所述非公共网络的标识信息配置给终端设备,以使所述终端设备在空闲态或非激活态根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
在本申请的一些实施例中,所述的网络接入控制装置1200还包括:发送单元,用于在接收到所述终端设备在空闲态或非激活态发送的请求接入所述非公共网络的指示信息时,向所述终端设备发送配置信息,以对所述终端设备接入所述非公共网络进行控制。
在本申请的一些实施例中,所述非公共网络的标识信息包括以下至少之一:所述非公共网络的网络小区的位置信息、所述非公共网络所覆盖的地理位置信息、所述非公共网络的频点信息。
本申请实施例提供的技术方案通过获取非公共网络的标识信息,且非公共 网络的标识信息用于标识非公共网络所在的区域,并将非公共网络的标识信息配置给终端设备,使得终端设备在空闲态或非激活态可以根据非公共网络的标识信息确定是否搜索非公共网络,比如可以在检测到非公共网络的标识信息时,执行非公共网络的搜索过程,而在未检测到非公共网络的标识信息时,停止搜索非公共网络,进而可以在实现网络接入控制的前提下,避免终端设备频繁搜索非公共网络而增加终端设备的功耗。
图13示出了根据本申请的一个实施例的网络接入控制装置的框图。
参照图13所示,根据本申请的一个实施例的网络接入控制装置1300,包括:获取单元1302和配置单元1304。
其中,获取单元1302用于获取网络侧设备配置的非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;处理单元1304用于在终端设备处于空闲态或非激活态时,根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
在本申请的一些实施例中,处理单元1304用于:若检测到所述非公共网络的标识信息,则执行所述非公共网络的搜索过程;若未检测到所述非公共网络的标识信息,则停止搜索所述非公共网络。
在本申请的一些实施例中,处理单元1304还用于:若需要接入所述非公共网络,则向所述网络侧设备发送请求接入所述非公共网络的指示信息,并根据所述网络侧设备针对所述指示信息反馈的配置信息执行网络接入过程。
本申请实施例提供的技术方案通过获取非公共网络的标识信息,且非公共网络的标识信息用于标识非公共网络所在的区域,并将非公共网络的标识信息配置给终端设备,使得终端设备在空闲态或非激活态可以根据非公共网络的标识信息确定是否搜索非公共网络,比如可以在检测到非公共网络的标识信息时,执行非公共网络的搜索过程,而在未检测到非公共网络的标识信息时,停止搜索非公共网络,进而可以在实现网络接入控制的前提下,避免终端设备频繁搜索非公共网络而增加终端设备的功耗。
图14示出了适于用来实现本申请实施例的电子设备的计算机系统的结构示意图。
需要说明的是,图14示出的电子设备的计算机系统1400仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。
如图14所示,计算机系统1400包括中央处理单元(Central Processing Unit,CPU)1401,其可以根据存储在只读存储器(Read-Only Memory,ROM)1402中的程序或者从存储部分1408加载到随机访问存储器(Random Access Memory,RAM)1403中的程序而执行各种适当的动作和处理,例如执行上述实施例中所述的方法。在RAM 1403中,还存储有系统操作所需的各种程序和数据。CPU 1401、ROM 1402以及RAM 1403通过总线1404彼此相连。输入/输出(Input/Output,I/O)接口1405也连接至总线1404。
以下部件连接至I/O接口1405:包括键盘、鼠标等的输入部分1406;包括诸如阴极射线管(Cathode Ray Tube,CRT)、液晶显示器(Liquid Crystal Display,LCD)等以及扬声器等的输出部分1407;包括硬盘等的存储部分1408;以及包括诸如LAN(Local Area Network,局域网)卡、调制解调器等的网络接口卡的通信部分1409。通信部分1409经由诸如因特网的网络执行通信处理。驱动器1410也根据需要连接至I/O接口1405。可拆卸介质1411,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器1410上,以便于从其上读出的计算机程序根据需要被安装入存储部分1408。
特别地,根据本申请实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本申请实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分1409从网络上被下载和安装,和/或从可拆卸介质1411被安装。在该计算机程序被中央处理单元(CPU)1401执行时,执行本申请的系统中限定的各种功能。
需要说明的是,本申请实施例所示的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、闪存、光纤、便携式紧凑磁盘只 读存储器(Compact Disc Read-Only Memory,CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本申请中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本申请中,计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、有线等等,或者上述的任意合适的组合。
附图中的流程图和框图,图示了按照本申请各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。其中,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,上述模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图或流程图中的每个方框、以及框图或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
描述于本申请实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现,所描述的单元也可以设置在处理器中。其中,这些单元的名称在某种情况下并不构成对该单元本身的限定。
即,本申请实施例的技术方案提供了一种电子设备,包括:
一个或多个处理器;
存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如图3所示的实施例所述的网络接入控制方法。
即,本申请实施例的技术方案还提供了一种电子设备,包括:
一个或多个处理器;
存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如图4所示的实施例所述的网络接入控制方法。
即,本申请实施例的技术方案还提供了一种电子设备,包括:
一个或多个处理器;
存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如图5所示的实施例所述的网络接入控制方法。
即,本申请实施例的技术方案还提供了一种电子设备,包括:一个或多个处理器;
存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如图6所示的实施例所述的网络接入控制方法。
即,本申请实施例的技术方案还提供了一种电子设备,包括:一个或多个处理器;
存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如图7所示的实施例所述的网络接入控制方法。
作为另一方面,本申请还提供了一种计算机可读介质,该计算机可读介质可以是上述实施例中描述的电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被一个该电子设备执行时,使得该电子设备实现上述各个实施例中终端设备执行的所述网络接入控制方法,或,网络侧设备执行的所述网络接入控制方法。
应当注意,尽管在上文详细描述中提及了用于动作执行的设备的若干模块或者单元,但是这种划分并非强制性的。实际上,根据本申请的实施方式,上文描述的两个或更多模块或者单元的特征和功能可以在一个模块或者单元中具体化。反之,上文描述的一个模块或者单元的特征和功能可以进一步划分为由多个模块或者单元来具体化。
通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本申请实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、触控终端、或者网络侧设备等)执行根据本申请实施方式的方法。
本领域技术人员在考虑说明书及实践这里公开的实施方式后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。

Claims (26)

  1. 一种网络接入控制方法,其特征在于,应用于终端设备,包括:
    获取终端设备的网络连接能力,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;
    在所述终端设备处于连接态的情况下,根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制。
  2. 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:
    若根据所述网络连接能力确定所述终端设备能够支持同时连接至所述公共网络和所述非公共网络,则在所述终端设备需要同时处理公共网络业务和非公共网络业务时,控制所述终端设备接入所述公共网络和所述非公共网络。
  3. 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:
    若根据所述网络连接能力确定所述终端设备不支持同时连接至所述公共网络和所述非公共网络,则根据所述终端设备所要处理的网络业务,控制所述终端设备接入所述公共网络或所述非公共网络。
  4. 根据权利要求3所述的网络接入控制方法,其特征在于,所述根据所述终端设备所要处理的网络业务,控制所述终端设备接入所述公共网络或所述非公共网络,包括:
    若所述终端设备需要处理公共网络业务,则控制所述终端设备接入所述公共网络;
    若所述终端设备需要处理非公共网络业务,则控制所述终端设备接入所述非公共网络;
    若所述终端设备需要同时处理所述公共网络业务和所述非公共网络业务, 则根据所述公共网络的业务优先级和所述非公共网络的业务优先级,控制所述终端设备接入业务优先级最高的网络。
  5. 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:
    若根据所述网络连接能力确定所述终端设备不支持同时连接至所述公共网络和所述非公共网络,则在所述公共网络和所述非公共网络中的一个网络的网络质量不能满足业务需求时,控制所述终端设备接入另一个网络。
  6. 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:
    在所述终端设备接入了所述公共网络和所述非公共网络中的第一网络的情况下,若所述第一网络的网络质量无法满足业务需求,则在需要处理所述第一网络的业务时,控制所述终端设备接入所述公共网络和所述非公共网络中的第二网络,并通过所述第二网络访问所述第一网络,以处理所述第一网络的业务。
  7. 根据权利要求1所述的网络接入控制方法,其特征在于,所述根据所述终端设备的网络业务需求和所述网络连接能力对所述终端设备进行接入控制,包括:
    在所述终端设备接入了所述公共网络和所述非公共网络中的第一网络的情况下,若所述公共网络和所述非公共网络中的第二网络的网络质量无法满足业务需求或所述终端设备无法连接至所述第二网络,则在需要处理所述第二网络的业务时,通过所述第一网络访问所述第二网络,以处理所述第二网络的业务。
  8. 根据权利要求1至7中任一项所述的网络接入控制方法,其特征在于,所述公共网络的网关设备与所述非公共网络的网关设备相连接。
  9. 一种网络接入控制方法,其特征在于,应用于网络侧设备,包括:
    生成网络接入控制策略,所述网络接入控制策略用于使终端设备根据网络业务需求和网络连接能力进行接入控制,所述网络连接能力包括对相互独立的公共网络和非公共网络的连接能力;
    将所述网络接入控制策略配置给所述终端设备。
  10. 根据权利要求9所述的网络接入控制方法,其特征在于,所述网络接入控制策略包括所述公共网络的业务优先级和所述非公共网络的业务优先级;
    其中,所述业务优先级通过网络的频点信息的优先级来表征,或者所述业务优先级通过处于同一频段内的网络小区的优先级来表征。
  11. 根据权利要求9所述的网络接入控制方法,其特征在于,所述将所述网络接入控制策略配置给所述终端设备,包括:
    在所述终端设备处于空闲态或非激活态的情况下,通过配置小区重选参数或重定向参数为所述终端设备配置所述网络接入控制策略。
  12. 根据权利要求9至11中任一项所述的网络接入控制方法,其特征在于,还包括:
    若监测到所述终端设备需要接入所述非公共网络,则根据所述非公共网络的标识信息和所述终端设备的签约信息,确定所述终端设备是否能够接入所述非公共网络。
  13. 一种网络接入控制方法,其特征在于,应用于网络侧设备,包括:
    生成非公共网络的跟踪区,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的跟踪区与所述公共网络的跟踪区不相同;
    在跟踪区的任一配置期间内,将所述非公共网络的跟踪区或所述公共网络的跟踪区配置给终端设备,以使所述终端设备在空闲态或非激活态发生跟踪区更新时进入连接态,以获取网络接入控制信息。
  14. 根据权利要求13所述的网络接入控制方法,其特征在于,处于同一跟踪区内的网络小区所支持的网络切片相同。
  15. 一种网络接入控制方法,其特征在于,应用于网络侧设备,包括:
    获取非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;
    将所述非公共网络的标识信息配置给终端设备,以使所述终端设备在空闲态或非激活态根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
  16. 根据权利要求15所述的网络接入控制方法,其特征在于,还包括:
    若接收到所述终端设备在空闲态或非激活态发送的请求接入所述非公共网络的指示信息,则向所述终端设备发送配置信息,以对所述终端设备接入所述非公共网络进行控制。
  17. 根据权利要求15或16所述的网络接入控制方法,其特征在于,所述非公共网络的标识信息包括以下至少之一:
    所述非公共网络的网络小区的位置信息、所述非公共网络所覆盖的地理位置信息、所述非公共网络的频点信息。
  18. 一种网络接入控制方法,其特征在于,应用于终端设备,包括:
    获取网络侧设备配置的非公共网络的标识信息,所述非公共网络是使用公共网络的网络切片形成的网络,所述非公共网络的标识信息用于标识所述非公共网络所在的区域;
    在终端设备处于空闲态或非激活态时,根据所述非公共网络的标识信息确定是否搜索所述非公共网络。
  19. 根据权利要求18所述的网络接入控制方法,其特征在于,所述根据所述非公共网络的标识信息确定是否搜索所述非公共网络,包括:
    若检测到所述非公共网络的标识信息,则执行所述非公共网络的搜索过程;
    若未检测到所述非公共网络的标识信息,则停止搜索所述非公共网络。
  20. 根据权利要求18或19所述的网络接入控制方法,其特征在于,还包括:
    若需要接入所述非公共网络,则向所述网络侧设备发送请求接入所述非公共网络的指示信息,并根据所述网络侧设备针对所述指示信息反馈的配置信息执行网络接入过程。
  21. 一种计算机可读介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至8中任一项所述的网络接入控制方法,或实现如权利要求9至12中任一项所述的网络接入控制方法,或实现如权利要求13至14中任一项所述的网络接入控制方法,或实现如权利要求15至17中任一项所述的网络接入控制方法,或实现如权利要求18至20中任一项所述的网络接入控制方法。
  22. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求1至8中任一项所述的网络接入控制方法。
  23. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求9至12中任一项所述的网络接入控制方法。
  24. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求13至14中 任一项所述的网络接入控制方法。
  25. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求15至17中任一项所述的网络接入控制方法。
  26. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求18至20中任一项所述的网络接入控制方法。
PCT/CN2020/080828 2019-05-06 2020-03-24 网络接入控制方法、计算机可读介质及电子设备 WO2020224345A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
KR1020217022612A KR102443633B1 (ko) 2019-05-06 2020-03-24 네트워크 액세스 제어 방법, 컴퓨터 판독 가능 매체 및 전자 디바이스
JP2021541594A JP7206399B2 (ja) 2019-05-06 2020-03-24 ネットワークアクセス制御方法並びにそのコンピュータプログラムおよび電子機器
EP20801685.7A EP3968700A4 (en) 2019-05-06 2020-03-24 METHOD FOR CONTROLLING ACCESS TO NETWORKS, COMPUTER READABLE MEDIUM AND ELECTRONIC DEVICE
US17/411,510 US20210385739A1 (en) 2019-05-06 2021-08-25 Network access control method and device, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910371818.7 2019-05-06
CN201910371818.7A CN110213808B (zh) 2019-05-06 2019-05-06 网络接入控制方法、装置、计算机可读介质及电子设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/411,510 Continuation US20210385739A1 (en) 2019-05-06 2021-08-25 Network access control method and device, and storage medium

Publications (1)

Publication Number Publication Date
WO2020224345A1 true WO2020224345A1 (zh) 2020-11-12

Family

ID=67786878

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/080828 WO2020224345A1 (zh) 2019-05-06 2020-03-24 网络接入控制方法、计算机可读介质及电子设备

Country Status (6)

Country Link
US (1) US20210385739A1 (zh)
EP (1) EP3968700A4 (zh)
JP (1) JP7206399B2 (zh)
KR (1) KR102443633B1 (zh)
CN (2) CN115484659B (zh)
WO (1) WO2020224345A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022214443A3 (en) * 2021-04-05 2022-12-08 Nokia Technologies Oy Methods, apparatuses, and computer program products for providing selection of cells serving network slices for an area
WO2023104573A1 (en) * 2021-12-06 2023-06-15 Sony Group Corporation Access restriction based on secondary tracking area
EP4275450A4 (en) * 2021-02-08 2024-10-23 Samsung Electronics Co Ltd METHOD AND COMMUNICATION NETWORK FOR PROVIDING ACCESS TO LOCALIZED SERVICES (PALS)

Families Citing this family (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11265958B2 (en) 2019-04-12 2022-03-01 Ofinno, Llc Access information for node configuration
CN115484659B (zh) * 2019-05-06 2024-03-22 腾讯科技(深圳)有限公司 网络接入控制方法、装置、计算机可读介质及电子设备
CN114375587B (zh) * 2019-09-20 2024-04-12 株式会社Ntt都科摩 终端
CN113574917A (zh) * 2019-09-23 2021-10-29 Oppo广东移动通信有限公司 无线通信的方法和设备
JP2022547503A (ja) 2019-09-26 2022-11-14 鴻穎創新有限公司 ノンパブリックネットワークにおいてセル(再)選択を実行するための方法及び装置
CN112956241B (zh) * 2019-09-26 2023-08-25 Oppo广东移动通信有限公司 一种业务请求方法、电子设备及存储介质
WO2021059055A1 (en) * 2019-09-27 2021-04-01 Nokia Solutions And Networks Oy Filtered authorization list for private networks
CN114667766B (zh) * 2019-09-30 2023-09-19 上海诺基亚贝尔股份有限公司 无线电接入网中的网络切片
WO2021062664A1 (zh) * 2019-09-30 2021-04-08 华为技术有限公司 更新配置数据的方法、装置和系统
CN112584399B (zh) * 2019-09-30 2022-06-24 大唐移动通信设备有限公司 一种频点优先级配置方法、终端及网络设备
CN113692033B (zh) * 2019-09-30 2023-12-15 Oppo广东移动通信有限公司 信息传输方法和设备
US20210105712A1 (en) * 2019-10-04 2021-04-08 Qualcomm Incorporated Standalone non-public network access
TW202126079A (zh) * 2019-10-29 2021-07-01 香港商鴻穎創新有限公司 用於小區保留與存取限制的方法和裝置
CN112822756B (zh) * 2019-10-30 2022-09-06 中国电信股份有限公司 通信方法、系统以及基站、终端
CN112822757B (zh) * 2019-10-30 2022-09-06 中国电信股份有限公司 通信方法、系统以及基站、终端
EP4044642A4 (en) * 2019-11-06 2022-10-19 Huawei Technologies Co., Ltd. COMMUNICATION METHOD, COMMUNICATION DEVICE AND COMMUNICATION SYSTEM
CN112788709B (zh) * 2019-11-08 2022-09-02 大唐移动通信设备有限公司 一种基于闭合接入组接入控制方法及装置
EP4050937A4 (en) * 2019-11-08 2022-11-02 Huawei Technologies Co., Ltd. ACCESS CONTROL METHOD AND COMMUNICATION DEVICE
CN114365523B (zh) * 2019-11-08 2023-09-29 Oppo广东移动通信有限公司 Npn网络的远程签约方法、终端、装置及存储介质
CN113132968B (zh) * 2019-12-31 2023-01-03 大唐移动通信设备有限公司 私有网络的指示、接入方法、装置、网络侧设备及终端
EP4084533A4 (en) * 2020-01-17 2023-01-04 Huawei Technologies Co., Ltd. COMMUNICATION METHOD AND ASSOCIATED DEVICE
CN113286332B (zh) * 2020-02-19 2022-10-14 大唐移动通信设备有限公司 一种信息传输方法及设备
CN113438196B (zh) * 2020-03-23 2022-10-25 华为技术有限公司 一种服务授权方法、装置及系统
CN115443670B (zh) * 2020-04-03 2024-06-14 三星电子株式会社 用于管理无线通信网络中的cag相关过程的方法及装置
CN113518338B (zh) * 2020-04-10 2022-09-02 华为技术有限公司 一种通信方法和通信装置
CN113556724B (zh) * 2020-04-16 2023-06-23 维沃移动通信有限公司 网络选择方法及终端
CN113573387B (zh) * 2020-04-28 2022-10-11 维沃移动通信有限公司 接入控制方法、接入网节点及核心网节点
CN113709732B (zh) * 2020-05-21 2024-06-25 阿里巴巴集团控股有限公司 网络接入方法、用户设备、网络实体及存储介质
EP4154600A2 (en) * 2020-05-21 2023-03-29 IDAC Holdings, Inc. Enabling service continuity between standalone non-public network and plmn
CN113766500A (zh) * 2020-05-22 2021-12-07 华为技术有限公司 一种网络的接入方法、装置及系统
CN113973344B (zh) * 2020-07-22 2024-10-11 中国电信股份有限公司 非公共网络接入控制方法、基站和通信系统
WO2022027303A1 (en) * 2020-08-05 2022-02-10 Guangdong Oppo Mobile Telecommunications Corp., Ltd. User equipment and method of operating access control for at least one of onboarding service and/or of npn service
US11683749B2 (en) * 2020-08-07 2023-06-20 Mediatek Inc. Network selection for supported standalone non-public network (S-SNPN)
CN116097758A (zh) * 2020-08-11 2023-05-09 Oppo广东移动通信有限公司 网络选择方法、装置、设备及存储介质
CN114079922B (zh) * 2020-08-12 2024-07-05 华为技术有限公司 一种终端设备鉴权的方法、终端设备和接入网设备
CN114079910B (zh) * 2020-08-13 2024-07-02 阿里巴巴集团控股有限公司 终端状态控制方法、用户设备、网络实体及存储介质
WO2022036336A1 (en) * 2020-08-13 2022-02-17 Alibaba Group Holding Limited Network communication method and apparatus
CN114080003B (zh) * 2020-08-22 2023-06-16 华为技术有限公司 一种接入网络的方法及装置
WO2022067586A1 (en) * 2020-09-29 2022-04-07 Huawei Technologies Co., Ltd. Apparatus and method for enabling a user equipment to access one or more second networks
CN116325937A (zh) * 2020-12-30 2023-06-23 Oppo广东移动通信有限公司 无线通信的方法、终端设备和网络设备
WO2022151079A1 (zh) * 2021-01-13 2022-07-21 Oppo广东移动通信有限公司 无线通信的方法、终端设备和网络设备
WO2022151050A1 (zh) * 2021-01-13 2022-07-21 Oppo广东移动通信有限公司 一种网络接入方法、电子设备及存储介质
CN115835340A (zh) * 2021-09-16 2023-03-21 维沃移动通信有限公司 网络选择方法、装置、终端及网络侧设备
CN114189920B (zh) * 2021-11-26 2024-03-05 中国联合网络通信集团有限公司 网络切片的载波隔离方法、装置、设备和介质
CN117528712A (zh) * 2022-07-29 2024-02-06 维沃移动通信有限公司 选网方法及终端
WO2024029886A1 (en) * 2022-08-03 2024-02-08 Samsung Electronics Co., Ltd. Node in wireless communication system and method performed by the same
WO2024044979A1 (en) * 2022-08-30 2024-03-07 Zte Corporation Systems and methods for support of multiple access paths

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666723A (zh) * 2016-07-22 2018-02-06 华为技术有限公司 一种信息传输方法、融合网关及系统
CN109451829A (zh) * 2017-12-29 2019-03-08 北京小米移动软件有限公司 小区驻留方法、装置、用户设备及基站
CN110213808A (zh) * 2019-05-06 2019-09-06 腾讯科技(深圳)有限公司 网络接入控制方法、装置、计算机可读介质及电子设备

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BRPI0720872A2 (pt) * 2007-01-05 2014-03-04 Ntt Docomo Inc Equipamento de usuário e método usado em sistema de comunicação móvel.
US9769855B2 (en) * 2013-08-28 2017-09-19 Genband Us Llc Mobility in enterprise networks
CN106572507B (zh) * 2015-10-13 2019-08-30 电信科学技术研究院 将终端设备重定向到专用网络的方法、终端设备及基站
CN108616955B (zh) * 2016-12-26 2020-06-30 中国移动通信集团公司 一种网络接入处理方法、基站、mme及系统
CN108282840A (zh) * 2017-01-05 2018-07-13 中兴通讯股份有限公司 一种网络业务实现方法及装置、移动终端
US10397855B2 (en) * 2017-01-12 2019-08-27 Lg Electronics Inc. Access attempt method and user equipment, and access control method and base station
CN115695197A (zh) * 2019-03-27 2023-02-03 欧芬诺有限责任公司 用于接入管理小区信息的方法和系统
US20220210635A1 (en) * 2019-04-29 2022-06-30 Telefonaktiebolaget Lm Ericsson (Publ) Providing privacy for non-public networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666723A (zh) * 2016-07-22 2018-02-06 华为技术有限公司 一种信息传输方法、融合网关及系统
CN109451829A (zh) * 2017-12-29 2019-03-08 北京小米移动软件有限公司 小区驻留方法、装置、用户设备及基站
CN110213808A (zh) * 2019-05-06 2019-09-06 腾讯科技(深圳)有限公司 网络接入控制方法、装置、计算机可读介质及电子设备

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on 5GS Enhanced support of Vertical and LAN Services (Release 16)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 23.734, no. V0.3.0, 31 October 2018 (2018-10-31), pages 1 - 97, XP051487720 *
ERICSSON: "Feasibility to support a deployment independent solution", 3GPP TSG-SA WG2 MEETING #132 S2-1903383, 12 April 2019 (2019-04-12), XP051719546, DOI: 20200513102809X *
See also references of EP3968700A4
SIEMENS AG ET AL.: "Deployment options for non-public networks", 3GPP TSG-SA WG1 MEETING #83 S1-182676, 24 August 2018 (2018-08-24), XP051503132, DOI: 20200513103009X *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4275450A4 (en) * 2021-02-08 2024-10-23 Samsung Electronics Co Ltd METHOD AND COMMUNICATION NETWORK FOR PROVIDING ACCESS TO LOCALIZED SERVICES (PALS)
WO2022214443A3 (en) * 2021-04-05 2022-12-08 Nokia Technologies Oy Methods, apparatuses, and computer program products for providing selection of cells serving network slices for an area
WO2023104573A1 (en) * 2021-12-06 2023-06-15 Sony Group Corporation Access restriction based on secondary tracking area

Also Published As

Publication number Publication date
JP7206399B2 (ja) 2023-01-17
CN110213808A (zh) 2019-09-06
CN115484659A (zh) 2022-12-16
EP3968700A4 (en) 2022-07-13
US20210385739A1 (en) 2021-12-09
JP2022531751A (ja) 2022-07-11
CN115484659B (zh) 2024-03-22
KR20210107739A (ko) 2021-09-01
KR102443633B1 (ko) 2022-09-15
CN110213808B (zh) 2022-08-12
EP3968700A1 (en) 2022-03-16

Similar Documents

Publication Publication Date Title
WO2020224345A1 (zh) 网络接入控制方法、计算机可读介质及电子设备
EP4191959B1 (en) Method and system for ensuring service level agreement of an application
JP6096836B2 (ja) ネットワークアクセスを電子デバイスに提供するシステム及び方法
EP2387260B1 (en) System of wi-fi terminals and channel operation method for the same
WO2019137553A1 (zh) 一种配置ue的策略的方法、装置和系统
TWI682679B (zh) 行動管理擁塞控制方法及使用者設備
US20230388769A1 (en) Method, apparatus, and computer program product for service-continuity indication in sidelink user equipment to network relay during path switch
WO2023040806A1 (zh) 网络选择方法、装置、终端及网络侧设备
WO2022068903A1 (zh) 网络选择方法、信息发送方法、信息获取方法及装置
WO2022069481A2 (en) Method, apparatus, and computer program product for network slice and frequency band selection configuration
CN114501493A (zh) 网络切片更新方法及系统、存储介质及电子设备
WO2021063909A1 (en) Apparatus, method and computer program
US20240023007A1 (en) Method, apparatus, and computer program product to support multiple slices in case of overlayunderlay networking
WO2024051547A1 (zh) 网络选择信息配置方法、装置及通信设备
WO2023174154A1 (zh) 通信方法、装置和系统
WO2024041422A1 (zh) 通信方法、装置、终端及核心网节点
WO2024032537A1 (zh) 通信方法、设备及可读存储介质
WO2024051565A1 (zh) 选网处理方法、装置、终端及可读存储介质
US20230319697A1 (en) Methods, apparatuses, and computer program products for supporting onboarding and authentication of user equipment for networks and network slices
WO2022166891A1 (zh) 支持网络选择的方法、装置、设备及可读存储介质
WO2023213242A1 (zh) Ue策略信息的配置方法、装置、第一网络功能及终端
WO2023212889A1 (en) Enhancements for wireless devices moving from edge to cloud data networks
US20230319906A1 (en) Methods, apparatuses, and computer program products for supporting simultaneous access to mutally isolated network slices
WO2023179571A1 (zh) 非公共网络接入方法、装置及终端
WO2024037512A1 (zh) 网络接入方法、装置、终端及通信设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20801685

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 20217022612

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2021541594

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020801685

Country of ref document: EP

Effective date: 20211206