WO2020253385A1 - 一种传输背景流量传输信息的方法、装置及系统 - Google Patents

一种传输背景流量传输信息的方法、装置及系统 Download PDF

Info

Publication number
WO2020253385A1
WO2020253385A1 PCT/CN2020/087301 CN2020087301W WO2020253385A1 WO 2020253385 A1 WO2020253385 A1 WO 2020253385A1 CN 2020087301 W CN2020087301 W CN 2020087301W WO 2020253385 A1 WO2020253385 A1 WO 2020253385A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
terminal
information
policy control
background traffic
Prior art date
Application number
PCT/CN2020/087301
Other languages
English (en)
French (fr)
Inventor
孙海洋
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020253385A1 publication Critical patent/WO2020253385A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1403Architecture for metering, charging or billing
    • H04L12/1407Policy-and-charging control [PCC] architecture
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1485Tariff-related aspects
    • H04L12/1492Tariff-related aspects negotiation of tariff
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/80Rating or billing plans; Tariff determination aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a method, device, and system for transmitting background traffic transmission information.
  • BDT Background Data Transfer
  • a Policy Control Function (PCF) network element can send BDT information to the terminal in the following manner.
  • the PCF network element sends terminal routing selection (Route Selection Descriptor Precedence, URSP) information to the terminal.
  • the URSP can carry routing selection verification conditions (Route Selection Validation Criteria) and BDT information.
  • the routing verification conditions specifically include time window information and location condition information.
  • the PCT network element is not sure whether the BDT information transmitted to the terminal through the URSP will be successfully delivered to the terminal. In addition, even if the BDT information is successfully delivered, whether the terminal can use the BDT information is unknown to the PCF network element.
  • the embodiments of the application provide a method, device, and system for transmitting background flow transmission information, which are used to transmit the background flow transmission information in a transmission mode supported by the terminal according to the terminal capability information, and improve the reliability of the background flow transmission information.
  • an embodiment of the present application provides a method for transmitting background traffic transmission information, including: a first policy control network element obtains terminal capability information of a terminal, and the terminal capability information is used to indicate that the terminal supports in the terminal routing strategy of the terminal Transmission background traffic transmission information.
  • the first strategy control network element determines to transmit the background traffic transmission information in the terminal routing strategy according to the terminal capability information.
  • the embodiment of the application provides a method for transmitting background traffic transmission information.
  • the method obtains terminal capability information of a terminal through a first policy control network element, and determines according to the terminal capability information that the terminal supports the transmission of background traffic in the terminal routing strategy of the terminal.
  • the first policy control network element can determine to adopt the transmission mode supported by the terminal, and use the terminal routing strategy to transmit the background traffic transmission information to the terminal.
  • the terminal routing strategy In order to improve the reliability of background traffic transmission information to the terminal. Avoid that the terminal cannot successfully obtain the background traffic transmission information because the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy and the background traffic transmission information is transmitted in the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes: the first policy control network element receives from the application function network element for instructing the first policy control network element to transmit in the policy and charging control PCC rule The first request message for background traffic transmission information.
  • the first policy control network element sends to the application function network element a first response message for indicating rejection of transmission of background traffic transmission information in the PCC rule. In this way, the application function network element can perceive that the first policy control network element does not transmit the background traffic transmission information in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the first policy control network element sends to the application function network element a first notification message for instructing the transmission of background traffic transmission information in the terminal routing strategy.
  • the first policy control network element application function network element can determine that the first policy control network element transmits the background traffic transmission information in the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes: the first policy control network element receives a first instruction, and the first instruction is used to instruct the terminal to successfully receive the background traffic transmission information through the terminal routing policy.
  • the first policy control network element sends confirmation information to the application function network element, and the confirmation information is used by the application function network element to determine the background traffic transmission information successfully received by the terminal.
  • the first indication facilitates the first policy control network element to determine that the terminal successfully receives the background traffic transmission information through the terminal routing policy. Sending the confirmation information can facilitate the application function network element to determine the background traffic transmission information successfully received by the terminal.
  • the application function network element may issue multiple background traffic transmission information for the terminal, but not all background traffic transmission information of the multiple background traffic transmission information can be successfully received by the terminal. Therefore, the confirmation information can make The application function network element determines which of the multiple background traffic transmission information or several background traffic transmission information is successfully received by the terminal.
  • the confirmation information may be background traffic transmission information successfully received by the terminal.
  • the confirmation information may be an identifier of the background traffic transmission information successfully received by the terminal.
  • the confirmation information may be an identifier of the background traffic transmission information successfully received by the terminal and at least one background traffic transmission information selected by the first policy control network element for the terminal.
  • the background traffic transmission information successfully received by the terminal belongs to at least one background traffic transmission information selected by the first policy control network element for the terminal.
  • the method provided by the embodiment of the present application further includes: the first policy control network element sends identification information of the terminal and a second indication to the application function network element, the second indication is used to indicate that the terminal is successfully routed through the terminal Select a strategy to receive background traffic transmission information.
  • the identification information of the terminal it is convenient for the application function network element to determine the terminal corresponding to the successfully received background traffic transmission information.
  • the application function network element By sending the second instruction, it is convenient for the application function network element to display that it is determined that the terminal has successfully received the background traffic transmission information through the terminal routing strategy. This facilitates the subsequent application function network element to determine that the PCC rule is no longer used to transmit the background traffic transmission information successfully received by the terminal. Or the application function network element determines to transmit other background traffic transmission information to the terminal through the PCC rule. Or the application function network element determines that the background traffic transmission information of the terminal can be transmitted in the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes: the first policy control network element receives a first instruction, and the first instruction is used to instruct the terminal to successfully receive the background traffic transmission information through the terminal routing policy.
  • the first policy control network element sends a third instruction to the user data management network element or the second policy control network element, where the third instruction is used to determine the background traffic transmission information successfully received by the terminal.
  • the content of the third instruction can refer to the specific content of the above confirmation information, which will not be repeated here.
  • the method provided in the embodiment of the present application further includes: the first policy control network element obtains terminal capability information of the terminal, including: the first policy control network element obtains the terminal capability from the second policy control network element information.
  • the second policy control network element is the policy control network element associated with the session management network element.
  • the session management network element can obtain terminal capability information from the terminal, and then transfer the obtained terminal The capability is sent to the second policy control network element. Therefore, it is convenient for the first policy control network element and the second policy control network element to directly interact to obtain terminal capability information.
  • the method provided in the embodiment of the present application further includes: the first policy control network element obtains terminal capability information of the terminal, including: the first policy control network element obtains terminal capability information from the user data management network element .
  • the terminal may be replaced with the first policy control network element that it serves. Therefore, the first policy control network element before the move can store the terminal capability information in the user data management network element.
  • the first policy control network element selected by Zhongxin can obtain the terminal capability information from the user data management network element.
  • the second policy control network element can also be selected from Obtain the terminal capability information from the user data management network element.
  • the first policy control network element before the movement can send the terminal capability information to the user data management network element.
  • the first policy control network element after the movement can obtain the terminal capability information stored by the first policy control network element before the movement from the user data management network element.
  • the method provided in the embodiment of the present application further includes: the first policy control network element obtains terminal capability information of the terminal, including: the first policy control network element obtains the terminal capability information from the terminal. This facilitates the terminal to report the terminal capability information to the first policy control network element during the registration process.
  • the first policy control network element may also report the terminal capability information to the first policy control network element through processes other than the registration process.
  • the method provided in the embodiment of the present application further includes: the first policy control network element adopts a terminal routing strategy to transmit background traffic transmission information to the terminal.
  • the method provided in the embodiment of the present application further includes: the first policy control network element receives a fourth instruction from the application function network element, where the fourth instruction is used to determine background traffic transmission information.
  • the first policy control network element determines the background traffic transmission information according to the fourth instruction.
  • the fourth indication may be the background traffic transmission information itself.
  • the fourth indication may also be an identifier of background traffic transmission information. It should be understood that the first policy control network element may obtain the background traffic transmission information indicated by the identifier of the background traffic transmission information from the user data management network element according to the identifier of the background traffic transmission information.
  • the fourth indication may be carried in the above-mentioned first request message, that is, the application function network element requests the first policy control network element through the first request message for the background traffic transmission information indicated by the fourth indication in the policy and charging control PCC rule .
  • the method provided in the embodiment of the present application further includes: the first policy control network element receives a second request message from the application function network element, and the second request message is used to request that the terminal routing strategy is selected Transmission background traffic transmission information.
  • the first policy control network element can send a second notification message to the application function network element, and the second notification message is used to make the application function network element confirm that the The background traffic transmission information is transmitted in the terminal routing strategy.
  • the second request message may also carry the fourth indication, so that the first policy control network element can determine to transmit the background traffic transmission information indicated by the fourth indication in the terminal routing strategy.
  • an embodiment of the present application provides a method for transmitting background traffic transmission information, including: applying a function network element to determine to transmit the background traffic transmission information in a PCC rule.
  • the application function network element sends a first request message to the first policy control network element, where the first request message is used to instruct the first policy control network element to transmit the background traffic transmission information in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the application function network element receives a first response message from the first policy control network element.
  • the first response message is used to indicate refusal to transmit background traffic transmission information in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the application function network element receives the first notification message from the first policy control network element.
  • the first notification message is used to instruct to transmit background traffic transmission information in the terminal routing strategy.
  • the method provided by the embodiment of the present application further includes: the application function network element receives confirmation information from the first policy control network element, and the confirmation information is used by the application function network element to determine the background of the successful reception of the terminal Traffic transmission information.
  • the confirmation information please refer to the related description in the first aspect, which will not be repeated here.
  • the method provided in the embodiment of the present application further includes: the application function network element receives the terminal identification information and the second indication from the first policy control network element.
  • the second indication is used to indicate that the terminal successfully receives the background traffic transmission information through the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes: the application function network element sends a fourth instruction to the first policy control network element, where the fourth instruction is used to determine background traffic transmission information.
  • the first policy control network element determines the background traffic transmission information according to the fourth instruction.
  • the method provided in the embodiment of the present application further includes: the application function network element sends a second request message to the first policy control network element, and the second request message is used to request transmission in the terminal routing policy Background traffic transmission information.
  • the application function network element receives a second notification message from the first policy control network element, and the second notification message is used to make the application function network element confirm that the background traffic transmission information can be transmitted in the terminal routing strategy.
  • an embodiment of the present application provides a method for transmitting background traffic transmission information, including: a second policy control network element obtains terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal supports the terminal routing strategy in the terminal Transmission background traffic transmission information.
  • the second policy control network element determines not to transmit the background traffic transmission information in the policy and charging control PCC rule according to the terminal capability information.
  • the embodiment of the present application provides a method for transmitting background traffic transmission information.
  • the method obtains terminal capability information of a terminal through a second policy control network element.
  • the second strategy control network element determines, according to the terminal capability information, that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy of the terminal, and then it can be known that the core network (for example, AM-PCF network element) is in the terminal routing selection of the terminal.
  • the background traffic transmission information is transmitted in the strategy to avoid the transmission of the background traffic transmission information in the PCC blindly because the terminal is uncertain whether the terminal supports the transmission of the background traffic transmission information in the terminal routing strategy.
  • the AM-PCF network element transmits in the terminal routing strategy, and the second strategy controls the collision caused by the network element transmission in the PCC rule.
  • the second policy control network element acquiring terminal capability information of the terminal includes: the second policy control network element acquiring terminal capability information from the terminal.
  • the method provided in the embodiment of the present application further includes: the second policy control network element sends the terminal capability information to the first policy control network element or the user data management network element. This is convenient for the first policy control network element to determine based on the terminal capability information that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes: the second policy control network element receives the first request message from the application function network element.
  • the first request message is used to instruct the second policy control network element to transmit background traffic transmission information in the PCC rule.
  • the second policy control network element sends the first response message to the application function network element.
  • the first response message is used to indicate refusal to transmit background traffic transmission information in the PCC rule.
  • the application function network element requests the second policy control network element to use PCC rules to transmit background traffic transmission information, but the terminal supports the transmission of background traffic transmission information in URSP, then the second policy control network element can still be used in PCC rules. Transmission background traffic transmission information.
  • the method provided in the embodiment of the present application further includes: the second policy control network element receives a first request message from the application function network element, and the first request message is used to indicate that the second policy control network element is The background traffic transmission information is transmitted in the PCC rules.
  • the second policy control network element determines not to send the first PCC rule to the session management network element, and the first PCC rule corresponds to the background traffic transmission information successfully received by the terminal. In this way, signaling redundancy caused by repeated transmission of background traffic transmission information successfully received by the terminal can be avoided.
  • the method provided in the embodiment of the present application further includes: the second policy control network element receives the first request message from the application function network element.
  • the first request message is used to instruct the second policy control network element to transmit background traffic transmission information in the PCC rule.
  • the second policy control network element sends a second PCC rule to the session management network element, where the second PCC rule corresponds to the background traffic transmission information that is not transmitted in the terminal routing policy. This can ensure that the terminal can receive the background traffic transmission information in both the PCC rules and the terminal routing strategy, and it also avoids the conflict between the background traffic transmission information transmitted in the PCC rules and the background traffic transmission information transmitted in the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes: the second policy control network element obtains a third indication from the user data management network element, and the third indication is used to determine the background traffic transmission successfully received by the terminal information.
  • the third indication facilitates the second policy control network element to determine the background traffic transmission information successfully received by the terminal.
  • the method provided in the embodiment of the present application further includes: the second policy control network element sends a first notification message to the application function network element, and the first notification message is used to indicate the transmission background in the terminal routing policy Traffic transmission information.
  • the application function network element determines to adopt the terminal routing strategy to transmit the background traffic transmission information.
  • it can avoid triggering the second policy control network element to use the PCC rule to transmit background traffic transmission information.
  • it can avoid repeatedly using PCC rules to transmit background traffic transmission information that has been transmitted using terminal routing strategies.
  • the method provided in the embodiment of the present application further includes: the second policy control network element adopts a terminal routing strategy to transmit background traffic transmission information to the terminal.
  • the method provided in the embodiment of the present application further includes: the second policy control network element determines the background traffic transmission information to be transmitted to the terminal.
  • the second policy control network element may determine the background traffic transmission information to be transmitted to the terminal according to the fourth instruction of the application function network element.
  • an embodiment of the present application provides a method for transmitting background traffic transmission information, including: applying a function network element to determine to transmit the background traffic transmission information in a PCC rule.
  • the application function network element sends the first request message to the second policy control network element.
  • the first request message is used to instruct the second policy control network element to transmit background traffic transmission information in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the application function network element receives the first response message from the second policy control network element.
  • the first response message is used to indicate refusal to transmit background traffic transmission information in the PCC rule. This is convenient for the application function network element to determine that the second policy control network element does not need to be triggered to transmit the background traffic transmission information in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the application function network element receives instruction information from the second policy control network element for instructing not to send the first PCC rule to the session management network element. In this way, the application function network element can determine that the background traffic transmission information successfully received by the terminal is not transmitted using the PCC rule.
  • the method provided in the embodiment of the present application further includes: the application function network element receives instruction information from the second policy control network element for instructing to send the second PCC rule to the session management network element. In this way, it is convenient for the application function network element to determine that the background traffic transmission information that is not transmitted in the terminal routing strategy is transmitted using the PCC rule.
  • the method provided in the embodiment of the present application further includes: the application function network element sends a fourth instruction to the second policy control network element.
  • the fourth aspect may be applicable to the case where the second policy control network element determines that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy.
  • an embodiment of the present application provides a method for transmitting background traffic transmission information, including: a first policy control network element obtains terminal capability information of a terminal, and the terminal capability information is used to indicate that the terminal does not support the terminal routing strategy at the terminal Transmission background traffic transmission information. The first strategy control network element determines not to transmit the background traffic transmission information in the terminal routing strategy according to the terminal capability information.
  • the embodiment of the present application provides a method for transmitting background traffic transmission information.
  • the method obtains terminal capability information of a terminal through a first policy control network element.
  • the first policy control network element can determine that the subsequent transmission of background traffic transmission information to the terminal avoids the terminal routing strategy of the terminal Transmission background traffic transmission information. In this way, it is possible to avoid using a transmission method not supported by the terminal to transmit the background flow transmission information, and improve the reliability of transmitting the background flow transmission information.
  • obtaining the terminal capability information of the terminal by the first policy control network element includes: the first policy control network element obtains the terminal capability information from the second policy control network element. Alternatively, the first policy control network element obtains terminal capability information from the user data management network element; or, the first policy control network element obtains terminal capability information from the terminal.
  • the method provided in the embodiment of the present application further includes: the first policy control network element receives a first request message from the application function network element, where the first request message is used to indicate that the first policy control network element is The background traffic transmission information is transmitted in the terminal routing strategy.
  • the first policy control network element sends a first response message to the application function network element, where the first response message is used to indicate refusal to transmit the background traffic transmission information in the terminal routing policy. Since the application function network element instructs the first strategy control network element to use the terminal routing strategy to transmit background traffic transmission information, but the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy, the application can be made to transmit the first response message.
  • the functional network element timely determines that the first strategy control network element does not transmit the background traffic transmission information in the terminal routing strategy.
  • the application function network element can perform special processing according to its own logic. For example, the application function network element re-triggers the first policy control network element to use the PCC rule to transmit background traffic transmission information.
  • the first response message may further include: a reason value, which is used to indicate that the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy. It is convenient for the application function network element to determine the reason why the first policy control network element refuses to transmit the background traffic transmission information in the terminal routing policy.
  • the method provided in the embodiment of the present application further includes: the first policy control network element sends to the application function network element a first notification message for instructing to transmit background traffic transmission information in the PCC rule.
  • the application function network element sends to the application function network element a first notification message for instructing to transmit background traffic transmission information in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the first policy control network element receives the first request message from the application function network element.
  • the first request message is used to instruct the first policy control network element to transmit the background traffic transmission information in the terminal routing policy.
  • the first strategy control network element sends a terminal routing strategy to the terminal, and the terminal routing strategy does not include background traffic transmission information.
  • the method provided in the embodiment of the present application further includes: the first policy control network element receives a fourth instruction from the application function network element.
  • the first strategy control network element determines, according to the fourth instruction, the background traffic transmission information that needs to be transmitted to the terminal in the terminal routing strategy.
  • an embodiment of the present application provides a method for transmitting background traffic transmission information, including: an application function network element determines to transmit the background traffic transmission information in a terminal routing strategy.
  • the application function network element sends a first request message to the first policy control network element, where the first request message is used to instruct the first policy control network element to transmit the background traffic transmission information in the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes: the application function network element receives a first response message from the first policy control network element.
  • the first response message is used to indicate refusal to transmit the background traffic transmission information in the terminal routing policy.
  • the first response message may further include: a reason value, which is used to indicate that the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes: the application function network element sends a first notification message for instructing the transmission of background traffic transmission information in the PCC rule to the first policy control network element.
  • the method provided in the embodiment of the present application further includes: the application function network element sends a fourth instruction to the first policy control network element. If the fourth instruction is carried in the first request message, it is convenient for the first policy control network element to determine to transmit the background traffic transmission information indicated by the fourth instruction in the terminal routing strategy. If the fourth instruction is sent to the first policy control network element after the application function network element determines that the first policy control network element should transmit the background traffic transmission information in the PCC rule. This facilitates the first policy control network element to determine to transmit the background traffic transmission information indicated by the fourth instruction in the PCC rule.
  • the content of the sixth aspect may be applicable to the case where the first policy control network element determines that the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy of the terminal, and the first policy control network element and the application function network element Interaction between.
  • an embodiment of the present application provides a method for transmitting background traffic transmission information, including: a second policy control network element obtains terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal does not support the terminal routing strategy at the terminal Transmission background traffic transmission information.
  • the second policy control network element determines to transmit the background traffic transmission information in the PCC rule according to the terminal capability information.
  • the second policy control network element acquiring terminal capability information of the terminal includes: the second policy control network element acquiring terminal capability information from the terminal.
  • the method provided in the embodiment of the present application further includes: the second policy control network element receives a first request message from the application function network element, and the first request message is used to indicate that the second policy control network element is The background traffic transmission information is transmitted in the terminal routing strategy.
  • the second policy control network element sends the first response message to the application function network element.
  • the first response message is used to indicate refusal to transmit the background traffic transmission information in the terminal routing policy.
  • the method provided in the embodiment of the present application further includes: the second policy control network element sends to the application function network element a first notification message for instructing the transmission of background traffic transmission information in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the second policy control network element receives a first request message from the application function network element, and the first request message is used to indicate that the first policy control network element is The background traffic transmission information is transmitted in the terminal routing strategy.
  • the second policy control network element sends the PCC rule to the session management network element, and the PCC rule includes background traffic transmission information.
  • an embodiment of the present application provides a method for transmitting background traffic transmission information, including: applying a function network element to determine to transmit the background traffic transmission information in a terminal routing strategy.
  • the application function network element sends the first request message to the second policy control network element.
  • the first request message is used to instruct the second policy control network element to transmit background traffic transmission information in the terminal routing policy.
  • the method provided in the embodiment of the present application further includes: the application function network element receives the first notification message from the second policy control network element.
  • the first notification message is used to instruct to transmit background traffic transmission information in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the application function network element receives an indication from the second policy control network element for indicating that the background traffic transmission information has been sent in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the application function network element sends a fourth instruction to the second policy control network element.
  • the fourth indication is used to determine the background traffic transmission information transmitted in the terminal routing strategy.
  • the fourth indication is used to determine the background traffic transmission information transmitted in the PCC rule.
  • an embodiment of the present application provides an information sending method, including: a first policy control network element obtains terminal capability information.
  • the first policy control network element sends the terminal capability information to the user data management network element/the second policy control network element.
  • the terminal capability information is used to indicate that the terminal supports the background traffic transmission information transmitted in the terminal routing strategy.
  • the terminal capability information is used to indicate that the terminal does not support the background traffic transmission information transmitted in the terminal routing strategy.
  • the specific implementation manner for the first policy control network element to obtain the terminal capability information can refer to the description of the corresponding place above, which will not be repeated here.
  • an embodiment of the present application provides an information sending method, including: the first policy control network element determines the background traffic transmission information successfully received by the terminal.
  • the first policy control network element sends a third instruction to the user data management network element, where the third instruction is used to determine the background traffic transmission information successfully received by the terminal.
  • the specific implementation manner for the first policy control network element to determine the background traffic transmission information successfully received by the terminal may refer to the description of the corresponding place above, which will not be repeated here.
  • the background traffic transmission information successfully received by the terminal may refer to the background traffic transmission information successfully received by the terminal through the terminal routing strategy.
  • an embodiment of the present application provides an information acquisition method, including: a second policy control network element acquires a third indication from a user data management network element, and the third indication is used to determine the background traffic transmission successfully received by the terminal information.
  • the second policy control network element determines the background traffic transmission information successfully received by the terminal according to the third instruction.
  • the method provided in the embodiment of the present application further includes: the second policy control network element makes a policy decision according to the third instruction, and generates a PCC rule.
  • the PCC rule when the terminal supports the transmission of background traffic transmission information in the terminal routing policy, the PCC rule does not include the background traffic transmission information successfully received by the terminal.
  • the method provided in the embodiment of the present application further includes: the second policy control network element obtains terminal capability information, and determines, according to the terminal capability information, that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy.
  • acquiring the terminal capability information by the second policy control network element includes: the second policy control network element acquires the user data management network element. Or the second policy control network element obtains the terminal capability information from the session management network element. The terminal capability information in the user data management network element may be obtained from the first policy control network element or the terminal.
  • the second policy control network element is a policy control network element that provides services for the session of the terminal.
  • the first policy control network element is a policy control network element that transmits background traffic transmission information in a terminal routing strategy.
  • the embodiments of the present application provide a communication device for implementing various possible designs of any one of the first aspect to the eleventh aspect.
  • the communication device may be the aforementioned first policy control network element, or a device including the aforementioned first policy control network element.
  • the communication device may be the aforementioned application function network element, or a device containing the aforementioned application function network element.
  • the communication device may be the aforementioned second policy control network element, or a device including the aforementioned second policy control network element.
  • the communication device includes a module, unit, or means corresponding to the foregoing method, and the module, unit, or means can be implemented by hardware, software, or hardware executing corresponding software.
  • the hardware or software includes one or more modules or units corresponding to the above-mentioned functions.
  • an embodiment of the present application provides a communication device, which includes: at least one processor and a communication interface.
  • the processor executes the computer-executable instructions stored in the communication device, so that the communication device executes various possible designs as in any one of the first aspect to the eleventh aspect described above Any one of the methods.
  • the communication device may be the first policy control network element, or a chip applied in the first policy control network element.
  • the communication device may be a second policy control network element, or a chip applied to the second policy control network element.
  • the communication device may be an application function network element, or a chip applied to an application function network element.
  • the communication device described in the thirteenth aspect may further include a bus and a memory, and the memory is used to store code and data.
  • the memory is used to store code and data.
  • at least one processor communication interface and the memory are coupled with each other.
  • a computer-readable storage medium stores instructions or computer programs, which when run on a computer, enable the computer to execute the first aspect to the eleventh aspect. Any of the various possible designs in any aspect.
  • a computer program product containing instructions or computer programs is provided.
  • the instructions or computer programs are run on a computer, the computer can execute any of the above aspects of the first to eleventh aspects. Any one of the possible design methods.
  • this application provides a chip that is used in a network element.
  • the chip includes at least one processor and a communication interface.
  • the communication interface is coupled to the at least one processor.
  • the processor is used to run a computer program or instruction to execute the first
  • the communication interface is used to communicate with other modules outside the chip.
  • the network element may be the first policy control network element.
  • the network element may be the second policy control network element.
  • the network element may be an application function network element.
  • the chip described above in this application may further include at least one memory, and the at least one memory stores instructions or computer programs.
  • an embodiment of the present application provides a communication system, including: an application function network element, and a first policy control network element communicating with the application function network element.
  • the first policy control network element is used to obtain terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy of the terminal.
  • the first policy control network element is also used to determine the transmission of background traffic transmission information in the terminal routing strategy according to the terminal capability information; the application function network element is used to determine the transmission of background traffic transmission information in the PCC rules, and to The first policy control network element sends a first request message.
  • the first policy control network element is also used to send a first response message to the application function network element.
  • the first response message is used to indicate refusal to transmit background traffic transmission information in the PCC rule.
  • the first policy control network element is also used to send the first notification message to the application function network element.
  • the first notification message is used to instruct to transmit background traffic transmission information in the terminal routing strategy.
  • the first policy control network element is also used to send confirmation information to the application function network element, and the confirmation information is used for the application function network element to determine the background traffic transmission information successfully received by the terminal.
  • the first policy control network element is also used to send the identification information of the terminal and the second indication to the application function network element.
  • the second indication is used to indicate that the terminal successfully receives the background traffic transmission information through the terminal routing strategy.
  • the application function network element is also used to send a fourth instruction to the first policy control network element, where the fourth instruction is used to determine background traffic transmission information.
  • the application function network element is also used to send a second request message to the first policy control network element, where the second request message is used to request transmission of background traffic transmission information in the terminal routing strategy.
  • the first policy control network element is also used to send a second notification message to the application function network element, and the second notification message is used to make the application function network element confirm that the background traffic transmission information can be transmitted in the terminal routing strategy.
  • the communication system may further include: a user data management network element or a second policy control network element.
  • the first policy control network element is also used to receive a first indication, and the first indication is used to indicate that the terminal successfully receives the background traffic transmission information through the terminal routing strategy.
  • the first policy control network element is also used to send a third instruction to the user data management network element or the second policy control network element, and the third instruction is used to determine the background traffic transmission information successfully received by the terminal.
  • the first policy control network element is used to obtain terminal capability information of the terminal, which specifically includes: obtaining terminal capability information from the second policy control network element.
  • the first policy control network element is used to obtain terminal capability information of the terminal, which specifically includes: the first policy control network element is used to obtain terminal capability information from the user data management network element.
  • the communication system may further include: a terminal.
  • the first policy control network element is used to obtain terminal capability information of the terminal, which specifically includes: the first policy control network element is used to obtain terminal capability information from the terminal.
  • the first strategy controls the network element and is also used to adopt the terminal routing strategy to transmit background traffic transmission information to the terminal.
  • an embodiment of the present application provides a communication system, including: an application function network element, and a first policy control network element communicating with the application function network element.
  • the application function network element is used to determine the transmission of background traffic transmission information in the PCC rule.
  • the application function network element is also used to send the first request message to the second policy control network element.
  • the first request message is used to instruct the second policy control network element to transmit background traffic transmission information in the PCC rules;
  • the second policy control network element is used to obtain terminal capability information of the terminal, and the terminal capability information is used to instruct the terminal to support the terminal
  • the background traffic transmission information is transmitted in the terminal routing strategy.
  • the second policy control network element is also used to determine not to transmit the background traffic transmission information in the policy and charging control PCC rule according to the terminal capability information.
  • the second policy control network element is also used to send the first response message to the application function network element.
  • the first response message is used to indicate refusal to transmit background traffic transmission information in the PCC rule.
  • the second policy control network element is also used to send instruction information for instructing not to send the first PCC rule to the session management network element to the application function network element.
  • the second policy control network element is also used to send instruction information for instructing to send the second PCC rule to the session management network element to the application function network element.
  • the second policy control network element is also used to send a fourth instruction to the application function network element.
  • the communication system further includes: a first policy control network element or a user data management network element, a second policy control network element, and a second policy control network element, which is also used to communicate to the first policy control network element or user data management network element Send terminal capability information.
  • the communication system further includes a terminal.
  • the second policy control network element is used to obtain terminal capability information of the terminal, including: the second policy control network element is specifically used to obtain terminal capability information from the terminal.
  • the second policy control network element is also used to obtain a third indication from the user data management network element, and the third indication is used to determine the background traffic transmission information successfully received by the terminal.
  • the second policy control network element is also used to send a first notification message to the application function network element, and the first notification message is used to instruct to transmit background traffic transmission information in the terminal routing strategy.
  • the second strategy controls the network element and is also used to adopt the terminal routing strategy to transmit background traffic transmission information to the terminal.
  • an embodiment of the present application provides a communication system, including: an application function network element, and a first policy control network element communicating with the application function network element.
  • the first strategy control network element is used to obtain terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy of the terminal.
  • the first strategy control network element is used to determine not to transmit the background traffic transmission information in the terminal routing strategy according to the terminal capability information.
  • the application function network element is used to determine the transmission of background traffic transmission information in the terminal routing strategy.
  • the application function network element is further configured to send a first request message to the first policy control network element, where the first request message is used to instruct the first policy control network element to transmit background traffic transmission information in the terminal routing strategy.
  • the application function network element is also used to send the first response message to the first policy control network element.
  • the first response message is used to indicate refusal to transmit the background traffic transmission information in the terminal routing policy.
  • the first response message may further include: a reason value, which is used to indicate that the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy.
  • the application function network element is also used to send a first notification message for instructing the transmission of background traffic transmission information in the PCC rule to the first policy control network element.
  • the application function network element is also used to send a fourth instruction to the first policy control network element.
  • the communication system includes: a terminal.
  • the second policy control network element is used to obtain terminal capability information of the terminal, which specifically includes: the second policy control network element is specifically used to obtain terminal capability information from the terminal.
  • the communication system further includes: a first policy control network element or a user data management network element.
  • the second policy control network element is also used to send terminal capability information to the first policy control network element or the user data management network element.
  • the second policy control network element is also used to determine not to send the first PCC rule to the session management network element, and the first PCC rule corresponds to the background traffic transmission information successfully received by the terminal.
  • the second policy control network element is also used to send a second PCC rule to the session management network element, and the second PCC rule corresponds to background traffic transmission information that is not transmitted in the terminal routing policy.
  • the second policy control network element is also used to obtain the third instruction from the user data management network element.
  • the second policy control network element is also used to send a first notification message to the application function network element, and the first notification message is used to instruct to transmit the background traffic transmission information in the terminal routing strategy.
  • the second strategy controls the network element and is also used to adopt the terminal routing strategy to transmit the background traffic transmission information to the terminal.
  • the second policy control network element is also used to determine the background traffic transmission information to be transmitted to the terminal.
  • an embodiment of the present application provides a communication system, including: an application function network element, and a second policy control network element communicating with the application function network element.
  • the second strategy control network element is used to obtain terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy of the terminal.
  • the second strategy control network element is also used to determine to transmit the background traffic transmission information in the PCC rule according to the terminal capability information.
  • the application function network element is used to determine the transmission of background traffic transmission information in the terminal routing strategy.
  • the application function network element is also used to send the first request message to the second policy control network element.
  • the first request message is used to instruct the second policy control network element to transmit background traffic transmission information in the terminal routing policy.
  • the second policy control network element is used to obtain terminal capability information of the terminal, which specifically includes: the second policy control network element is specifically used to obtain terminal capability information from the terminal.
  • the second policy control network element is also used to send the first response message to the application function network element.
  • the first response message is used to indicate refusal to transmit the background traffic transmission information in the terminal routing policy.
  • the second policy control network element is also used to send a first notification message for instructing the transmission of background traffic transmission information in the PCC rule to the application function network element.
  • the second policy control network element is also used to send PCC rules to the session management network element, and the PCC rules include background traffic transmission information.
  • an embodiment of the present application provides a chip system, including: a memory, configured to store a computer program; a processor, configured to call and run the computer program from the memory, so that a device equipped with the chip system Perform any one of the first aspect and the various possible implementation manners of the first aspect, or any one of the second aspect and the various possible implementation manners of the second aspect, or the third aspect and the third aspect Any one of the various possible implementations of the aspect, or any one of the fourth and various possible implementations of the fourth aspect, or the fifth and the fifth aspect Any one of the sixth aspect and the sixth aspect, or any one of the seventh aspect and the seventh aspect, or the first The eighth aspect and any one of the possible implementation manners of the eighth aspect, or any one of the ninth aspect and the ninth aspect, or each of the eighth aspect and the eighth aspect Any one of the possible implementations, or any one of the tenth aspect and the tenth aspect, or the eleventh aspect and the eleventh aspect Any of the descriptions of the method of transmitting background traffic transmission information.
  • an embodiment of the present application provides a processor configured to execute any one of the first aspect and the various possible implementation manners of the first aspect, or each of the second aspect and the second aspect. Any one of the possible implementation manners, or any one of the third aspect and the various possible implementation manners of the third aspect, or any of the fourth aspect and the various possible implementation manners of the fourth aspect One item, or any one of the fifth aspect and the various possible implementation manners of the fifth aspect, or any one of the sixth aspect and the sixth aspect, or the seventh aspect, and Any one of the various possible implementation manners of the seventh aspect, or any one of the eighth aspect and various possible implementation manners of the eighth aspect, or any one of the ninth aspect and the ninth aspect Any one of the implementation manners, or any one of the eighth aspect and various possible implementation manners of the eighth aspect, or any one of the tenth aspect and the tenth aspect, Or the method for transmitting background traffic transmission information described in any one of the eleventh aspect and various possible implementation manners of the eleventh aspect.
  • the embodiments of the present application provide a method for executing any one of the first aspect and the first aspect, or the second aspect and the second aspect. Any one of the implementation manners, or any one of the third aspect and the various possible implementation manners of the third aspect, or any one of the fourth aspect and the fourth aspect, Or any one of the fifth aspect and the various possible implementation manners of the fifth aspect, or any one of the sixth aspect and the various possible implementation manners of the sixth aspect, or the seventh aspect and the seventh aspect Any of the various possible implementations of the eighth aspect and the eighth aspect, or the ninth and the ninth aspect Any one of the eighth aspect and the eighth aspect, or any one of the tenth aspect and the tenth aspect, or the tenth aspect
  • an embodiment of the present application provides a communication device, including: a memory, configured to store a computer program; a processor, configured to call and run the computer program from the memory to execute the first aspect and Any one of the various possible implementations of the first aspect, or any one of the second and various possible implementations of the second aspect, or the third and various possible implementations of the third aspect Any one of the implementation manners, or any one of the fourth aspect and the various possible implementation manners of the fourth aspect, or any one of the fifth aspect and the fifth aspect, Or any one of the sixth aspect and the various possible implementation manners of the sixth aspect, or any one of the seventh aspect and the seventh aspect, or the eighth aspect and the eighth aspect Any one of the various possible implementation manners of the ninth aspect and the ninth aspect, or the eighth aspect and the eighth aspect Any one of the tenth aspect and any one of the possible implementation manners of the tenth aspect, or any one of the eleventh aspect and the various possible implementation manners of the eleventh aspect.
  • the method of transmitting background traffic information including: a processor, configured
  • an embodiment of the present application provides a communication device, including: a processor and a memory; the memory is used to store computer execution instructions, and when the communication device is running, the processor executes the memory storage
  • the computer executes instructions to make the communication device execute any one of the first aspect and the various possible implementation manners of the first aspect, or the second aspect and the various possible implementation manners of the second aspect Any one of the third aspect and any of the possible implementation manners of the third aspect, or any one of the fourth aspect and the fourth aspect, or the first Any one of the various possible implementation manners of the five aspects and the fifth aspect, or any one of the various possible implementation manners of the sixth aspect and the sixth aspect, or each of the seventh aspect and the seventh aspect Any one of the possible implementation manners of the eighth aspect and the eighth aspect, or any one of the ninth aspect and the ninth aspect One item, or any one of the eighth aspect and the various possible implementation manners of the eighth aspect, or any one of the tenth aspect and the tenth aspect, or the eleventh aspect And the method
  • Figure 1 is a schematic diagram of a PDU session according to an embodiment of the application.
  • FIG. 2a is an architecture diagram of a communication system provided by an embodiment of this application.
  • FIG. 2b is an architecture diagram of another communication system provided by an embodiment of this application.
  • FIG. 3a is a schematic diagram 1 of the application of the communication system in the non-roaming 5G network architecture in an embodiment of this application;
  • 3b is a second schematic diagram of the application of the communication system in the non-roaming 5G network architecture in the embodiment of the application;
  • FIG. 3c is a schematic diagram 1 of application of the communication system in an embodiment of the application in a home routing scenario in a roaming 5G network architecture;
  • FIG. 3d is a second schematic diagram of the application of the communication system in an embodiment of the application in a home routing scenario in a roaming 5G network architecture;
  • FIG. 3e is a schematic diagram 1 of the application of the communication system in an embodiment of the application in a local grooming scenario in a roaming 5G network architecture;
  • Fig. 3f is a second schematic diagram of the application of the communication system in the local grooming in the roaming 5G network architecture in the embodiment of the application;
  • 3g is an architecture diagram of a communication system in a local grooming scenario provided by an embodiment of the application.
  • FIG. 3h is an architecture diagram of a communication system in a home routing scenario provided by an embodiment of the application.
  • FIG. 4 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 5 is a schematic flowchart of a method for transmitting BDT information according to an embodiment of the application
  • Figure 6 is a schematic diagram of a PDU session establishment process provided by an embodiment of the application.
  • FIG. 7 is a schematic flowchart of another method for transmitting BDT information provided by an embodiment of the application.
  • FIG. 8 is a schematic flowchart of yet another method for transmitting BDT information according to an embodiment of this application.
  • FIG. 9 is a schematic flowchart of another method for transmitting BDT information according to an embodiment of the application.
  • FIG. 10 is a schematic structural diagram of a device for transmitting BDT information provided by an embodiment of the application.
  • words such as “first” and “second” are used to distinguish the same items or similar items that have substantially the same function and effect.
  • the first request message and the second request message are only for distinguishing different request messages, and the sequence of them is not limited.
  • words such as “first” and “second” do not limit the quantity and order of execution, and words such as “first” and “second” do not limit the difference.
  • At least one refers to one or more, and “multiple” refers to two or more.
  • “And/or” describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, both A and B exist, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects are in an "or” relationship.
  • "The following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or plural items (a).
  • at least one item (a) of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • the technical solutions of the embodiments of this application can be applied to various communication systems, such as: code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (frequency division multiple access, TDMA) access, FDMA), orthogonal frequency-division multiple access (OFDMA), single carrier frequency-division multiple access (single carrier FDMA, SC-FDMA) and other systems.
  • CDMA code division multiple access
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • OFDMA orthogonal frequency-division multiple access
  • SC-FDMA single carrier frequency-division multiple access
  • 3GPP is a new version of UMTS using E-UTRA in long term evolution (LTE) and various versions based on LTE evolution.
  • LTE long term evolution
  • NR new radio
  • the communication system may also be applicable to future-oriented communication technologies, all of which are applicable to the technical solutions provided in the embodiments of the present application.
  • Packet Data Unit (PDU) session a user plane connection between a terminal and a data network (DN), which is used to provide a PDU connection service.
  • the PDU connection service supported by the 5G core network (core network, CN) refers to a service that provides PDU exchange between a terminal and a DN determined by a data network name (DNN).
  • the user plane connection may include the following network elements: terminal, base station, user plane network element, and DN.
  • Terminal routing policy (UE Route Selection Policy, URSP): It can also be called a user equipment routing policy, which is used to associate an application with an established PDU session or establish a new PDU session for it, or to link it Transfer to non-3GPP access for transmission.
  • Container an information element that carries a certain message.
  • the information element carried in the container is transparently transmitted to other devices in the process of being forwarded from the source device to the target device via other devices. That is, other devices do not parse the information elements in the container, and the target device can parse the information elements in the container.
  • BDT Background Data Transfer
  • the first policy control network element can send a terminal policy (Policy) to the terminal through a non-access stratum (Non-access stratum, NAS) message, which includes the URSP, which is used to select the PDU session.
  • Policy terminal policy
  • NAS non-access stratum
  • URSP an application can be described by application identification. For details, see the structure of URSP below.
  • URSP contains one or more URSP rules (Rules), as shown in Table 1:
  • each terminal routing information in Table 3 has a different priority.
  • the terminal Whenever the terminal detects a new application, the terminal evaluates whether the application matches the Traffic descriptor in the rule according to the order of Rule precedence. When a match is possible, the terminal selects the Route Selection Descriptor in the rule in the order of Route Selection Descriptor Precedence. When there is a PDU session that meets the requirements (the attributes are the same as Route Selection Descriptor), the terminal routes the application data packet to the PDU session (multiple terminals will select one according to the configuration, etc.). If there is no PDU session that meets the requirements For a PDU session, the terminal initiates the establishment of a PDU session and establishes a session with this attribute.
  • the terminal will first detect whether there is a PDU session that meets the requirements of the application (also called a packet) (data network name (DNN), slice, etc.) If yes, map the current application to the PDU session.
  • a PDU session that meets the requirements of the application (also called a packet) (data network name (DNN), slice, etc.)
  • Different patterns in FIG. 1 represent different slices (single network slice selection assistance information (S-NSSAI)).
  • the dotted line represents an unestablished PDU session (for example, the PDU session corresponding to data packet A), and the solid line represents an established PDU session (for example, the PDU session corresponding to data packet B and the PDU session corresponding to data packet C.
  • the session and Business continuity Session and service continuity, SSC.
  • Figure 2a shows a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • the communication system includes: an application function network element 10 and a first policy control network element communicating with the application function network element 10 20.
  • the application function network element 10 and the first policy control network element 20 may communicate directly, or communicate through the forwarding of other devices, which is not specifically limited in the embodiment of the present application.
  • the first policy control network element 20 is used to obtain terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy of the terminal. According to the terminal capability information, the first policy control network element 20 determines to transmit the background traffic transmission information in the terminal routing strategy.
  • the application function network element 10 is used to determine the transmission of background traffic transmission information in the PCC rule.
  • the application function network element 10 is further configured to send a first request message to the first policy control network element 20, where the first request message is used to instruct the first policy control network element 20 to transmit background traffic transmission information in the PCC rule.
  • the control network element determines according to the terminal capability information that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy of the terminal. This can improve the reliability of background traffic transmission information in the terminal routing strategy. Avoid that the terminal cannot successfully obtain the background traffic transmission information because the terminal does not support the transmission of the background traffic transmission information in the terminal routing strategy of the terminal and the background traffic transmission information is transmitted in the terminal routing strategy.
  • the first policy control network element 20 is used to obtain terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy of the terminal.
  • the first strategy control network element 20 is also used to determine not to transmit the background traffic transmission information in the terminal routing strategy according to the terminal capability information.
  • the application function network element 10 is used to determine the transmission of background traffic transmission information in the terminal routing strategy.
  • the application function network element 10 is further configured to send a first request message to the first policy control network element, where the first request message is used to instruct the first policy control network element 20 to transmit background traffic transmission information in the terminal routing strategy.
  • the communication system as shown in FIG. 2a may further include: a second policy control network element communicating with the application function network element 10.
  • the application function network element 10 and the second policy control network element 30 may directly communicate with each other, or communicate through forwarding by other devices, which is not specifically limited in the embodiment of the present application.
  • the communication system as shown in FIG. 2a may further include: a terminal or a user data management network element.
  • the terminal accesses the core network through the access network and can communicate with network elements in the core network.
  • the application function network element, the first policy control network element, the user data management network element, and the second policy control network element belong to the network elements in the core network.
  • the interaction between the first policy control network element 20 and the second policy control network element, the user data management network element, and the terminal may refer to the description of the method part in the following embodiments, which will not be repeated here.
  • Figure 2b shows a schematic structural diagram of another communication system provided by an embodiment of the present application.
  • the communication system includes: an application function network element 10 and a second policy control network communicating with the application function network element 10. Yuan 30.
  • the application function network element 10 and the second policy control network element 30 may directly communicate with each other, or communicate through the forwarding of other devices, which is not specifically limited in the embodiment of the present application.
  • the second policy control network element 30 is used to obtain terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy of the terminal.
  • the second policy control network element 30 is also used for determining not to transmit background traffic transmission information in the policy and charging control PCC rule according to the terminal capability information.
  • the application function network element 10 determines to transmit the background traffic transmission information in the PCC rule.
  • the application function network element 10 sends a first request message to the second policy control network element 30.
  • the first request message is used to instruct the second policy control network element to transmit background traffic transmission information in the PCC rule.
  • the embodiment of the application provides a communication system.
  • the communication system obtains terminal capability information of a terminal through a second policy control network element.
  • the second policy control network element determines that the terminal supports transmission in the terminal routing strategy of the terminal according to the terminal capability information. Under the traffic transmission information, it can be determined to transmit the background traffic transmission information in the terminal routing strategy of the terminal, and avoid transmitting the background traffic transmission information in the PCC rules.
  • the second policy control network element 30 is used to obtain terminal capability information of the terminal, and the terminal capability information is used to indicate that the terminal does not support the transmission of background traffic transmission information in the terminal routing strategy of the terminal.
  • the second policy control network element 30 is also used to determine to transmit the background traffic transmission information in the PCC rule according to the terminal capability information.
  • the application function network element 10 is used to determine the transmission of background traffic transmission information in the terminal routing strategy.
  • the application function network element 10 is configured to send a first request message to the second policy control network element 30.
  • the first request message is used to instruct the second policy control network element 30 to transmit background traffic transmission information in the terminal routing policy.
  • the communication system as shown in FIG. 2b may further include: a first policy control network element communicating with the application function network element 10.
  • the application function network element 10 and the first policy control network element may directly communicate with each other, or communicate through the forwarding of other devices, which is not specifically limited in the embodiment of the present application.
  • the communication system as shown in FIG. 2b may further include: a terminal or a user data management network element.
  • the terminal accesses the core network through the access network and can communicate with network elements in the core network.
  • the application function network element, the second policy control network element, the user data management network element, and the first policy control network element belong to the network elements in the core network.
  • the interaction between the second policy control network element 30 and the first policy control network element, the user data management network element, and the terminal may refer to the description of the method part in the following embodiments, which will not be repeated here.
  • the communication system shown in FIG. 2a or FIG. 2b may be applied to the current 5G network architecture and other network architectures that will appear in the future, which is not specifically limited in the embodiment of the present application.
  • the following will take the communication system shown in Figure 2a or Figure 2b as an example that is suitable for the 5G network architecture.
  • the 5G policy control architecture is part of the 5G communication system architecture.
  • the 5G communication system architecture is shown in Figure 3a- Figure 3f.
  • the session management network element and the mobility management network element can select different strategy control network elements for strategy control.
  • the policy control network element connected to the mobility management network element is referred to as the first policy control network element in the embodiment of the present application.
  • the policy control network element connected to the session management network element is called the second policy control network element. That is, the policy control network element selected by the mobility management network element is called the first policy control network element, and the policy control network element selected by the session management network element is called the second policy control network element).
  • the 5G network architecture in a non-roaming scenario, may be applicable to the interface-based architecture of FIG. 3a, and may also be applicable to the service-based interface-based architecture shown in FIG. In a roaming scenario, the 5G network architecture is not only used for the interface-based architecture shown in FIG. 3c and FIG. 3e, but also applicable to the service-based interface-based architecture shown in FIG. 3d and FIG. 3f.
  • the above-mentioned session management network element may be the non-roaming network element.
  • the network element or entity corresponding to the policy control network element may be a policy control function (Policy Control Function, PCF) network element in the non-roaming 5G network architecture.
  • the network element or entity corresponding to the mobility management network element may be an access and mobility management function (Access and Mobility Management Function, AMF) network element in the non-roaming 5G network architecture.
  • AMF Access and Mobility Management Function
  • the network element or entity corresponding to the application function network element may be an application function (AF) in the non-roaming 5G network architecture. That is, the first policy control network element may be a first PCF network element, and the second policy control network element may be a second PCF network element.
  • AF application function
  • the non-roaming 5G network architecture may also include: access equipment (for example, access network (AN) or radio access network (RAN)), unified database (Unified Data Repository, UDR), Unified Data Management (UDM), or Binding Support Function (BSF), User Plane Function (UPF) network elements, data network (data network) , DN), authentication server function (authentication server function, AUSF) network element, network slice selection function (Network Slice Selection Function, NSSF) network element.
  • Access equipment for example, access network (AN) or radio access network (RAN)
  • UDR Unified Data Repository
  • UDM Unified Data Management
  • BSF Binding Support Function
  • UPF User Plane Function
  • data network data network
  • DN authentication server function
  • AUSF authentication server function
  • NSSF Network Slice Selection Function
  • NEF Network capability exposure function
  • NRF network repository function
  • the user data management network element may correspond to any one or more of UDR and UDM.
  • the terminal communicates with the AMF network element through a next generation network (Next generation, N1) interface (N1 for short).
  • the access device communicates with the AMF network element through the N2 interface (N2 for short).
  • the access device communicates with the UPF network element through the N3 interface (N3 for short).
  • the UPF network element communicates with the DN through the N6 interface (N6 for short).
  • the UPF network element communicates with the SMF network element through the N4 interface (N4 for short).
  • the AMF network element communicates with the SMF network element through the N11 interface (N11 for short).
  • the AMF network element communicates with the UDM network element through the N8 interface (N8 for short).
  • the SMF network element communicates with the PCF network element through the N7 interface (N7 for short).
  • the SMF network element communicates with the UDM network element through the N10 interface (N10 for short).
  • the AMF network element communicates with the AUSF network element through the N12 interface (N12 for short).
  • the AMF network element communicates with the NSSF network element through the N22 interface (N22 for short).
  • the AUSF network element communicates with the UDM network element through the N13 interface (N13 for short).
  • the UDM network element communicates with the UDR network element.
  • the PCF network element communicates with the UDR network element
  • the BSF network element communicates with the PCF network element and the SMF network element.
  • Figure 3b shows an architecture based on a service-based interface in a non-roaming 5G network architecture.
  • the control plane network elements in the 5GC in Figure 3b can also interact with a service-based interface.
  • AMF network elements, AUSF network elements, SMF network elements, UDM network elements, UDR network elements, NRF network elements, NEF network elements, NSSF network elements, or PCF network elements interact with each other using a service interface.
  • the service-oriented interface provided by the AMF network element to the outside may be Namf.
  • the service-oriented interface provided by the SMF network element to the outside may be Nsmf.
  • the service-oriented interface provided by the UDM network element to the outside may be Nudm.
  • the service-oriented interface provided by the UDR network element to the outside may be Nudr.
  • the service-oriented interface provided by the PCF network element to the outside may be Npcf.
  • the service-oriented interface provided by the BSF network element to the outside may be Nbsf.
  • the service-oriented interface provided by the NEF network element to the outside may be Nnef.
  • the service-oriented interface provided by the NRF network element to the outside may be Nnrf.
  • the service-oriented interface provided by the NSSF network element to the outside may be Nnssf.
  • FIG. 3a and FIG. 3b are only examples of an SMF network element and a PCF network element.
  • the non-roaming 5G network architecture may include multiple SMF network elements and PCF network elements, such as SMF network element 1 and SMF network element 2, where SMF network element 1 communicates with PCF network element 1, and SMF network element 2 communicates with PCF network element 2, which is not specifically limited in the embodiment of this application.
  • the connection mode between the various network elements can refer to the non-roaming 5G network architecture shown in FIG. 3a or FIG. 3b, which will not be repeated here.
  • each network element belongs to a home public land mobile network (HPLMN).
  • HPLMN home public land mobile network
  • the network corresponding to the above-mentioned session management network element The element or entity may be a home SMF (home SMF, H-SMF) network element in the home routing scenario.
  • the second policy control network element refers to the SM-PCF network element connected to the H-SMF network element.
  • the network element or entity corresponding to the aforementioned mobility management network element may be an AMF network element in the home routing scenario.
  • the first policy control network element may be a visited AM-PCF network element and a home AM-PCF network element.
  • the network element or entity corresponding to the application function network element 10 may be an AF network element in the home routing scenario.
  • the name of the PCF network element connected to the SMF network element is SM-PCF network element
  • the name of the PCF network element connected to the AMF network element is taken as an example of AM-PCF network element.
  • the PCF network element connected to the SMF network element can also be named another name
  • the PCF network element connected to the AMF network element can be named another name, which is not limited in the embodiment of the application.
  • AM-PCF and SM-PCF can be the same.
  • the home routing scenario may also include terminals, access devices (for example, AN or RAN), AMF network elements, visited SMF (visited SMF, V-SMF) network elements, and home UPF (home UPF, H-UPF) network element, visited UPF (visited UPF, V-UPF) network element, visited PCF (visited PCF, V-PCF) network element, visited NSSF (visited NSSF, V-NSSF) Network element, AUSF network element, DN, AF network element, home NSSF (home NSSF, H-NSSF) network element.
  • AMF home UPF
  • H-UPF home UPF
  • visited UPF visitor PCF
  • V-PCF visited PCF
  • NSSF visited NSSF
  • AUSF DN
  • AF network element home NSSF (home NSSF, H-NSSF) network element.
  • the terminal, access equipment, AMF network element, V-PCF network element, V-SMF network element and V-UPF network element, V-NSSF network element, V-PCF network element belong to the visited public land mobile network ( visited public land mobile network, VPLMN).
  • UDM network elements, UDR network elements, H-PCF network elements, H-NSSF network elements, AF network elements, H-SMF network elements, H-UPF network elements, and BSF network elements belong to HPLMN.
  • the H-PCF network element performs policy control related to session management.
  • the terminal communicates with the AMF network element through N1.
  • the access device communicates with the AMF network element through the N2 interface (N2 for short).
  • the access device communicates with the V-UPF network element through the N3 interface (N3 for short).
  • the V-UPF network element communicates with the H-UPF network element through the N9 interface (N9 for short).
  • the AMF network element communicates with the V-SMF network element through the N11 interface (N11 for short).
  • the AMF network element communicates with the UDM network element through the N8 interface (N8 for short).
  • the AMF network element communicates with the V-NSSF network element through the N22 interface (N22 for short).
  • the V-NSSF network element communicates with the H-NSSF network element through the N31 interface (N31 for short).
  • the AMF network element communicates with the AUSF network element through the N12 interface (N12 for short).
  • the AMF network element communicates with the V-PCF network element through the N15 interface (N15 for short).
  • the V-PCF network element communicates with the H-PCF network element through the N24 interface (N24 for short).
  • the V-SMF network element communicates with the H-SMF network element through the N16 interface (N16 for short).
  • the H-SMF network element communicates with the H-PCF network element through the N7 interface (N7 for short).
  • the H-SMF network element communicates with the H-UPF network element through the N4 interface (N4 for short).
  • the V-SMF network element communicates with the V-UPF network element through the N4 interface (N4 for short).
  • the H-SMF network element communicates with the UDM network element through the N10 interface (N10 for short).
  • the H-UPF network element communicates with the DN through the N6 interface (N6 for short).
  • H-PCF network elements communicate with UDR network elements, and BSF network elements communicate with H-PCF network elements and H-SMF network elements.
  • the H-PCF network element communicates with the AF network element through the N5 interface (N5 for short).
  • Figure 3d shows the architecture based on the service interface in the home routing scenario in the roaming 5G network architecture.
  • the difference between this architecture and Figure 3c is that the control plane network elements in the 5GC in Figure 3d can also interact with the service interface.
  • the service-oriented interface provided by the H-SMF network element to the outside may be Nsmf.
  • the service-oriented interface provided by the V-SMF network element to the outside may be Nsmf.
  • the service-oriented interface provided by the UDM network element to the outside may be Nudm.
  • the service-oriented interface provided by the UDR network element to the outside may be Nudr.
  • the service-oriented interface provided by the V-PCF network element to the outside may be Npcf.
  • the service-oriented interface provided by the H-PCF network element to the outside may be Npcf.
  • the service-oriented interface provided by the BSF network element to the outside may be Nbsf.
  • the service-oriented interface names of other control plane network elements can refer to the description in Figure 3b above, and will not be repeated here.
  • the HPLMN also includes an H-Security Edge Protection Proxy (SEPP), and the HPLMN also includes: V-SEPP.
  • SEPP H-Security Edge Protection Proxy
  • V-SEPP V-SEPP interface
  • the above-mentioned mobility management network element corresponds
  • the network element or entity may be the AMF network element in the local breakout roaming scenario.
  • the network element or entity corresponding to the above-mentioned session management network element may be a V-SMF network element in the local breakout roaming scenario.
  • the local breakout roaming scenario shown in FIG. 3e may also include: access equipment (for example, AN or RAN), AMF network element, SMF network element, UPF network element, DN, H-PCF network element, AUSF Network element, AF network element, NSSF network element.
  • access equipment for example, AN or RAN
  • AMF network element for example, AN or RAN
  • SMF network element for example, SMF
  • UPF network element for example, DN, H-PCF network element
  • AUSF Network element for example, AUSF Network element
  • AF network element for example, AF network element, NSSF network element.
  • the terminal, access equipment, AMF network element, V-PCF network element, V-SMF network element, UPF network element, NSSF network element, BSF, UDR network element, and DN belong to the VPLMN.
  • AUSF network elements, UDM network elements, and H-PCF network elements belong to the HPLMN.
  • V-PCF network elements carry out policy control related to session management.
  • Figure 3f shows the architecture based on the service interface in the local breakout roaming scenario of the 5G network architecture.
  • the difference between this architecture and Figure 3e is that the control plane network element in the 5GC in Figure 3f can also use the service interface. To interact.
  • the specific service-oriented interface name of each network element reference may be made to the description in FIG. 3d, which will not be repeated here.
  • Figures 3c to 3f only schematically show one V-SMF network element, one H-SMF network element, one H-UPF network element, and one V-UPF network element.
  • the home routing scenario or the local breakout roaming scenario may include multiple V-SMF network elements, multiple H-SMF network elements, multiple V-UPF network elements, and multiple H-UPF network elements, such as V-SMF network elements.
  • -SMF network element 1, and H-SMF network element 1 communicating with V-SMF network element 1, V-SMF network element 2, and H-SMF network element 2 communicating with V-SMF network element 2, etc.
  • V-SMF network element 1 communicates with V-UPF network element 1
  • V-SMF network element 2 communicates with V-UPF network element 2.
  • the H-SMF network element 1 communicates with the H-UPF network element 1
  • the H-SMF network element 2 communicates with the H-UPF network element 2, which is not specifically limited in the embodiment of the application.
  • each network element or interface name between each network element in FIGS. 3a to 3f is just an example.
  • the network element name or interface name may be other names, and the embodiment of this application does not make specifics about this limited.
  • the communication system shown in FIG. 2a or FIG. 2b is applied to a local breakout (LBO) roaming scenario in a current roaming scenario as an example.
  • the first policy control network element 20 includes : The first policy control network element in the visited place and the first policy control network element in the home place.
  • the second policy control network element 30 includes: a second policy control network element in the visited place.
  • the first policy control network element in the visited place is connected to the first policy control network element in the home place.
  • the first policy control network element in the visited place is connected to the mobility management network element.
  • the second policy control network element in the visited place is connected with the session management network element in the visited place.
  • the second policy control network element 30 includes: a second policy control network element at the home location.
  • the second policy control network element at the home location is connected to the session management network element at the home location.
  • the home session management network element is connected to the visited session management network element.
  • the visited session management network element is connected to the mobility management network element.
  • the LBO and HR in the roaming scenario both refer to the policy control related to Session Management (SM) and have nothing to do with the Mobility Management (MM) policy and the terminal policy.
  • SM Session Management
  • MM Mobility Management
  • the first policy control network element and the second policy control network element may be the same policy control network element.
  • the first policy control network element shown in Figure 3g and Figure 3h includes: the first policy control network element in the visited place and the first policy control network element in the home location.
  • the visited session management network element is connected to the second policy control network element in the visited place for SM-related policy control.
  • the home session management network element is connected to the home second policy control network element to perform SM-related policy control.
  • the terminals involved in the embodiments of this application may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to wireless modems with wireless communication functions; Including subscriber unit (subscriber unit), cellular phone (cellular phone), smart phone (smart phone), wireless data card, personal digital assistant (PDA) computer, tablet computer, wireless modem (modem), handheld device (handheld), laptop (laptop computer), cordless phone (wireless local loop, WLL) station, machine type communication (MTC) terminal, user equipment (user equipment) , UE), mobile station (mobile station, MS), terminal device (terminal device) or relay user equipment, etc.
  • the relay user equipment may be, for example, a 5G residential gateway (RG).
  • RG 5G residential gateway
  • the access devices involved in the embodiments of this application refer to devices that access the core network, such as base stations, broadband network service gateways (BNG), aggregation switches, and non-third-generation cooperation Partnership project (3rd generation partnership project, 3GPP) access equipment, etc.
  • the base station may include various forms of base stations, such as: macro base stations, micro base stations (also called small stations), relay stations, access points, and so on.
  • the network element for example, NSSF network element
  • 5Gcore network 5Gcore network
  • Each network slice may include one or more of UPF network elements, SMF network elements, NRF network elements, and PCF network elements.
  • UPF network elements include: data packet routing and transmission, packet inspection, service usage reporting, QoS processing, lawful monitoring, uplink packet inspection, downlink packet storage and other user-related functions.
  • AMF network elements include: connection management, mobility management, registration management, access authentication and authorization, reachability management, or, security context management and other access and mobility-related functions.
  • the main functions include: session management (such as session establishment, modification and release, including tunnel maintenance between UPF and AN), UPF network element selection and control, service and session continuity (Service and Session Continuity, SSC) ) Session-related functions such as mode selection, or, roaming.
  • session management such as session establishment, modification and release, including tunnel maintenance between UPF and AN
  • UPF network element selection and control including tunnel maintenance between UPF and AN
  • service and session continuity Service and Session Continuity, SSC)
  • Session-related functions such as mode selection, or, roaming.
  • the main functions of the PCF network element include: unified policy formulation, policy control provision, and policy-related functions such as obtaining contract information related to policy decisions from UDR.
  • NSSF network elements include: selecting a set of network slice instances for the terminal, or determining the allowed NSSAI and determining the set of AMF network elements that can serve the terminal.
  • the main functions of the NRF network element include: service discovery function, maintenance of available network function (Network Function, NF) instances of NF text and services supported by NF instances.
  • Network Function Network Function
  • the AF network element interacts with the 3GPP core network to provide services or services, including interaction with the NEF, or, policy framework interaction.
  • NEF network elements include: safe and open services and capabilities provided by 3GPP network functions, which are internally open or open to third parties.
  • Translate or translate information exchanged with AF and internal network function exchange moral information, such as AF service logo and internal 5G core network information such as DNN, S-NSSAI, etc.;
  • UDM network element supports authentication credential processing, user identity processing, access authorization, registration and mobility management, contract management, or short message management in the 3GPP authentication and key negotiation mechanism.
  • the AUSF network element interacts with the UDM network element to obtain user information and perform authentication-related functions, such as generating intermediate secret keys.
  • UDR is used to store subscription data (Subscribed Data), policy information (Policy Data), application data (Application Data), etc.
  • PCF network elements and NEF can use a data storage architecture to store background traffic transmission information and terminal capability information in the UDR.
  • the PCF network element in the embodiment of the present application may separately store background traffic transmission information and terminal capability information in the UDR through the N3 interface.
  • UDR can store background traffic transmission information and terminal capability information.
  • the terminals involved in the embodiments of this application may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to wireless modems with wireless communication functions; Including subscriber unit (subscriber unit), cellular phone (cellular phone), smart phone (smart phone), wireless data card, personal digital assistant (PDA) computer, tablet computer, wireless modem (modem), handheld device (handheld), laptop (laptop computer), cordless phone (wireless local loop, WLL) station, machine type communication (MTC) terminal, user equipment (user equipment) , UE), mobile station (mobile station, MS), terminal device (terminal device) or relay user equipment, etc.
  • the relay user equipment may be, for example, a 5G residential gateway (RG).
  • RG 5G residential gateway
  • FIG. 4 shows a schematic diagram of the hardware structure of a communication device provided by an embodiment of the application.
  • the structure of the first policy control network element, the second policy control network element, or the application function network element in the embodiment of the present application may refer to the communication device 400.
  • the communication device 400 includes a processor 401, and at least one communication interface (in FIG. 4, it is only an example and the communication interface 404 is included as an example for illustration).
  • the processor 401 may be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of this application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • Communication interface 404 which uses any device such as a transceiver to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
  • RAN radio access network
  • WLAN wireless local area networks
  • the communication device 400 may further include a communication line 402 and a memory 403.
  • the communication line 402 may include a path to transmit information between the aforementioned components.
  • the memory 403 may be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory may exist independently and is connected to the processor through the communication line 402. The memory can also be integrated with the processor.
  • the memory 403 is used to store computer-executed instructions for executing the solution of the present application, and the processor 401 controls the execution.
  • the processor 401 is configured to execute computer-executable instructions stored in the memory 403, thereby implementing the policy control method provided in the following embodiments of the present application.
  • the computer-executable instructions in the embodiments of the present application may also be referred to as application program code, which is not specifically limited in the embodiments of the present application.
  • the processor 401 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 4.
  • the communication device 400 may include multiple processors, such as the processor 401 and the processor 408 in FIG. 4. Each of these processors can be a single-CPU (single-CPU) processor or a multi-core (multi-CPU) processor.
  • the processor here may refer to one or more devices, circuits, and/or processing cores for processing data (for example, computer program instructions).
  • the communication device 400 may further include an output device 405 and an input device 406.
  • the output device 405 communicates with the processor 401 and can display information in a variety of ways.
  • the output device 405 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector) Wait.
  • the input device 406 communicates with the processor 401 and can receive user input in a variety of ways.
  • the input device 406 may be a mouse, a keyboard, a touch screen device, or a sensor device.
  • the aforementioned communication device 400 may be a general-purpose device or a dedicated device.
  • the communication device 400 may be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, or a similar structure in Figure 4 equipment.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the communication device 400.
  • a new Route Selection Validation Criteria can be introduced in the URSP, and the UE will only apply the URSP rule when it meets the route selection verification conditions. Specifically, it contains time window information and location condition information.
  • the method of carrying routing verification conditions in the URSP to send BDT information can be called the xBDT method.
  • the embodiment of the present application provides a method for determining to send BDT information in the URSP when it is determined that the terminal supports sending BDT information in the URSP based on the terminal capability information. Or when it is determined based on the terminal capability information that the terminal does not support sending BDT information in URSP, it is determined not to send BDT information in URSP. This can improve the reliability of BDT information transmission and reduce signaling redundancy.
  • the steps performed by the first policy control network element in a method of transmitting background traffic transmission information may also be performed by the chip in the first policy control network element and controlled by the second policy.
  • the steps executed by the network element may also be executed by the chip in the second policy control network element, the step executed by the application function network element, or the chip in the application function network element.
  • the first policy control network element, the second policy control network element, and the application function network element will be taken as an example of execution subjects.
  • a method for transmitting background traffic transmission information is applied to the communication system shown in FIG. 2a, the first policy control network element is an AM-PCF network element, and the second policy control network element is an SM-PCF network element,
  • the application function network element is an AF network element, and the user data management network element is an UDR as an example.
  • a method for transmitting background traffic transmission information provided by an embodiment of the present application includes the following steps:
  • Step 501 The AM-PCF network element obtains terminal capability information of the terminal.
  • the terminal capability information is used to indicate that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy of the terminal.
  • the terminal in the embodiment of the present application supports the transmission of background traffic transmission information in the terminal routing strategy, which can also be described as: the terminal supports the transmission of background traffic transmission information in the xBDT mode.
  • Step 502 The AM-PCF network element determines to transmit the background traffic transmission information in the terminal routing strategy according to the terminal capability information.
  • the AM-PCF network element can transmit the background traffic transmission information to the terminal in the terminal routing strategy.
  • the AM-PCF network element can transmit part of the background traffic transmission information in the terminal routing strategy, and the other part of the background traffic transmission information can be transmitted in the PCC rules.
  • the embodiment of the application provides a method for transmitting BDT information.
  • the method obtains terminal capability information of a terminal through a first policy control network element, and determines, according to the terminal capability information, that the terminal supports the transmission of BDT information in the terminal routing strategy of the terminal Next, it can be determined to transmit BDT information in the terminal routing strategy. This can improve the reliability of background traffic transmission information in the terminal routing strategy. Avoid that the terminal cannot successfully obtain the BDT information due to the terminal does not support the transmission of BDT information in the terminal routing strategy, but still transmits the BDT information in the terminal routing strategy.
  • the method provided in the embodiment of the present application further includes:
  • Step 503 The AF network element determines that it is necessary to transmit the BDT information in a policy and charging control (PCC) rule.
  • PCC policy and charging control
  • the transmission of BDT information in the PCC rule can also be described as: BDT information is transmitted in a BDT manner.
  • the AF network element may determine whether to use the BDT mode or the xBDT mode to transmit BDT information according to the pre-configuration mode. That is, if the pre-configuration mode is the BDT mode, the AF network element determines to use the BDT mode to transmit BDT information. If the pre-configuration mode is the xBDT mode, the AF network element determines to use the xBDT mode to transmit BDT information.
  • the AF network element may negotiate with the core network in advance to use the xBDT mode or the BDT mode to transmit BDT information.
  • the AF network element can actively request the core network to transmit BDT information. Based on the request of the AF network element, the core network may instruct the AF network element to adopt the BDT mode. Alternatively, the core network may instruct the AF network element to adopt the xBDT mode.
  • the AF network element can notify the core network of the method of transmitting BDT information of its choice, and after obtaining authorization from the core network, it can determine the method of transmitting BDT information of its choice to transmit BDT information.
  • the core network can actively instruct the AF network element to adopt the BDT mode. Or the core network instructs the AF network element to adopt the xBDT mode, which is not limited in the embodiment of the application.
  • the core network may instruct the AF network element to use the BDT.
  • the core network may instruct the AF network element to adopt the BDT method, or instruct the AF network element to use the xBDT method to transmit background traffic transmission information.
  • the core network may instruct the AF network element to use the xBDT mode.
  • the core network may instruct the AF network element to adopt the xBDT mode.
  • the core network may instruct the AF network element to use both the BDT mode and the xBDT mode for the terminal, but ensure that the xBDT mode does not conflict with the BDT mode.
  • Step 504 The AF network element sends a first request message to the AM-PCF network element, so that the AM-PCF network element receives the first request message from the AF network element.
  • the first request message is used to instruct the AM-PCF network element to transmit BDT information in the PCC rule.
  • the AF network element may send the first request message to the AM-PCF network element through the NEF network element.
  • the first request message may be a BDT information command establishment request (Nnef_BDTPNegotiation_Createrequest) service operation sent by the AF network element to the NEF network element.
  • the NEF network element sends a BDT information policy control establishment request (Npcf_BDTPolicyControl_Create request) service operation to the AM-PCF network element.
  • the first request message may also carry a fourth indication.
  • the fourth indication is used by the AM-PCF network element to determine the BDT information to be transmitted.
  • the fourth indication may be the BDT information itself.
  • the fourth indication may also be indication information for determining BDT information.
  • the AM-PCF network element may obtain the BDT information indicated by the AF network element from the UDR according to the indication information used to determine the BDT information.
  • the indication information used to determine the BDT information may be an identifier of the BDT information.
  • the indication information used to determine the BDT information can be the identification information of the AF network element, the number of UEs (Number of UEs), the external group identifier (External Group Identifier), the volume of each terminal (Volume per UE), and the required time. Window (Desired time window), network location information (Network Area Information).
  • the AF network element sends to the NEF network element is the external group identifier, and the NEF network element may process the external group identifier as an internal group identifier and send it to the AM-PCF network element.
  • the first request message may explicitly indicate that the BDT information is transmitted in the PCC rule.
  • the first request message may explicitly indicate that the BDT information determined by the fourth indication is transmitted in the PCC rule.
  • the first request message carries a first field, and the first field is used to instruct the AM-PCF network element to transmit BDT information in the PCC rule.
  • the first request message may implicitly indicate the transmission of BDT information in the PCC rule.
  • the first request message itself may be used to instruct the AM-PCF network element to transmit BDT information in the PCC rule.
  • the first request message itself may be used to instruct the AM-PCF network element to transmit the BDT information determined by the fourth instruction in the PCC rule.
  • the AF network element may also request the transmission of BDT information in the terminal routing strategy before the first time window, and request the PCC within the first time window The BDT information is transmitted in the rules.
  • the AF network element may determine that the time for transmitting the BDT information is about to be reached, and send the first request message to the AM-PCF network element. As another possible implementation manner, the AF network element may determine to send the first request message to the AM-PCF network element upon request of other network elements.
  • the first request message if the first request message carries the fourth indication, the first request message is specifically used to request the AM-PCF network element to determine that the BDT information that needs to be determined for the fourth indication is transmitted in the PCC rule. If the first request message does not carry the fourth indication, the first request message is specifically used to request that the BDT information transmitted to the terminal is transmitted in the PCC rule.
  • Step 505 The AM-PCF network element sends a first response message to the AF network element, so that the AM-PCF network element receives the first response message from the AF network element.
  • the first response message is used to indicate refusal to transmit background traffic transmission information in the PCC rule. Sending the first response message to the AF network element can enable the AF network element to perceive in time that the core network (for example, the SM-PCF network element or the PCF network element) does not transmit background traffic transmission information in the PCC rule.
  • the first response message may carry a second field, and the second field is used to indicate refusal to transmit BDT information in the PCC rule.
  • the first response message itself has the meaning of refusing to transmit BDT information in the PCC rules.
  • the AM-PCF network element determines that only the xBDT mode is used to transmit BDT information
  • the AM-PCF network element sends a first response message to the AF network element.
  • the first response message can be used to indicate The BDT information of the terminal is not transmitted in the PCC rules.
  • the AM-PCF network element determines that only the BDT information indicated by the AF network element is not transmitted in the xBDT mode
  • the first response message is used to indicate that the BDT information indicated by the AF network element is rejected in the PCC rule.
  • the method provided in the embodiment of the present application further includes:
  • Step 506 The AM-PCF network element sends a first notification message to the AF network element, so that the AF network element receives the first notification message from the AM-PCF network element.
  • the first notification message is used to instruct to transmit the BDT information in the terminal routing strategy.
  • step 506 it is convenient for the AF network element to determine according to the first notification message that the AM-PCF network element can transmit BDT information in the terminal routing strategy.
  • the AF network element triggers the AM-PCF network element to transmit BDT information in the terminal routing strategy.
  • step 505 and step 506 in the embodiment of the present application can be executed in parallel, that is, step 505 and step 506 are executed in no order.
  • the first notification message and the first response message may also be information elements carried in the same message.
  • Step 505 and step 506 are carried in different messages as an example.
  • the method provided in the embodiment of the present application further includes:
  • Step 507 The AM-PCF network element sends the terminal routing policy to the terminal through the AMF network element, so that the terminal receives the terminal routing policy from the AM-PCF network element.
  • the terminal routing strategy includes BDT information. Since the terminal supports the transmission of BDT information in the terminal routing strategy, after receiving the terminal routing strategy, the terminal can obtain the BDT information from the terminal routing strategy.
  • the AM-PCF network element sends the terminal routing policy to the AMF network element, so that the AMF network element sends the terminal routing policy to the terminal.
  • the BDT information carried in the terminal routing strategy in step 507 includes one or more BDT information.
  • the one or more BDT information may be indicated by the AF network element to the AM-PCF network element.
  • the AM-PCF network element may need to transmit the BDT to the terminal.
  • the information can be carried in the terminal routing strategy.
  • Step 508 The AM-PCF network element receives the first instruction.
  • the first indication is used to indicate that the terminal successfully receives the BDT information through the terminal routing strategy.
  • the terminal successfully receives the BDT information through the terminal routing policy, it can send the first instruction to the AM-PCF network element through the AMF network element or the SMF network element. It should be understood that, after receiving the first instruction from the terminal, the SMF network element may forward the first instruction to the AMF network element, so that the AMF network element sends the first instruction to the AM-PCF network element.
  • the terminal sends a terminal policy interaction result (Result of the delivery of UE policies) to the AMF network element, where the Result of the delivery of UE policies carries the first indication.
  • the AMF network element sends an N1 message notification (Namf_N1MessageNotify) service operation to the AM-PCF network element.
  • the Namf_N1MessageNotify service operation carries the first indication.
  • the first indication is also used to indicate the BDT information that the terminal has successfully received through the terminal routing strategy.
  • the AM-PCF network element sends BDT information 1 and BDT information 2 to the terminal through the terminal routing strategy. If the terminal successfully selects the BDT information 2, the first indication may also be used to indicate the identity of the BDT information 2.
  • Step 509 The AM-PCF network element sends confirmation information to the AF network element, so that the AF network element receives the confirmation information from the AM-PCF network element.
  • the confirmation information is used by the AF network element to determine the BDT information successfully received by the terminal.
  • the AM-PCF network element may determine the BDT information 1 and the BDT information 2 based on the instructions of the AF network element, but the AM-PCF network element chooses to send the BDT information 2 to the terminal in the URSP after a policy decision. Therefore, if the terminal successfully receives the BDT information 2 through the URSP, the AM-PCF network element can indicate the BDT information 2 to the AF network element through the confirmation information.
  • step 509 in the embodiment of the present application it may further include: the AM-PCF network element determines the AF network element.
  • the AM-PCF network element may determine the AF network element according to the identification of the AF network element (for example, ASP ID).
  • the AM-PCF network element or the SM-PCF network element may directly send information to the AF network element, or may send information to the AF network element through other network elements (for example, NEF network elements).
  • the AM-PCF network element or the communication between the SM-PCF network element and the AF network element are involved, the description here can be referred to, and the details will not be repeated in the following.
  • the AM-PCF network element may perform step 509.
  • the AF network element can indicate one or more BDT information to the AM-PCF network element through the fourth indication.
  • the AM-PCF network element may select at least one BDT information from the multiple BDT information according to a policy decision.
  • the AM-PCF network element can send at least one piece of BDT information to the terminal in the terminal routing strategy. Therefore, exemplary, the confirmation information may be BDT information successfully received by the terminal. Or exemplarily, the confirmation information may be an identifier of the BDT information successfully received by the terminal. Or exemplarily, the confirmation information may be an identifier of the BDT information successfully received by the terminal and at least one piece of BDT information selected by the AM-PCF network element for the terminal.
  • the BDT information successfully received by the terminal belongs to at least one BDT information.
  • the AM-PCF network element may send a second instruction to the AF network element.
  • the method provided in the embodiment of the present application may further include:
  • Step 510 The AM-PCF network element sends the identification information of the terminal and the second instruction to the AF network element, so that the AF network element receives the identification information and the second instruction of the terminal.
  • the second indication is used to indicate that the terminal successfully receives the BDT information through the terminal routing strategy.
  • the identification information of the terminal in the embodiment of this application may be one or more of the following: Internet protocol address (IP), subscription permanent identifier (SUPI), permanent equipment identifier (permanent equipment identifier) , PEI), universal public subscription identifier (generic public subscription identifier, GPSI), international mobile subscriber identifier (international mobile subscriber identifier, IMSI), international mobile equipment identity (international mobile equipment identity, IMEI), IP address, and mobile station international Integrated service digital network number (mobile station international integrated service digital network number, MSISDN).
  • IP Internet protocol address
  • SUPI subscription permanent identifier
  • PEI permanent equipment identifier
  • GPI global information provider
  • GPI global information
  • IMSI international mobile subscriber identifier
  • IMSI international mobile subscriber identifier
  • IMEI international mobile equipment identity
  • IP address mobile station international integrated service digital network number
  • MSISDN mobile station international integrated service digital network number
  • the AF network element can determine, according to the second instruction, that the terminal successfully receives the BDT information through the terminal routing strategy. In addition, the AF network element can determine the correspondence between the successfully received BDT information and the terminal through the identification information of the terminal.
  • the method provided in the embodiment of the present application may further include:
  • Step 511 The AM-PCF network element sends a third instruction to the UDR or SM-PCF network element, so that the UDR or SM-PCF network element receives the third instruction from the AM-PCF network element.
  • the third indication is used to determine the BDT information successfully received by the terminal.
  • the third indication may be BDT information successfully received by the terminal.
  • the third indication may be an identifier of the BDT information successfully received by the terminal.
  • the third indication may be an identifier of the BDT information successfully received by the terminal and at least one piece of BDT information selected by the AM-PCF network element for the terminal.
  • the third instruction is sent to the UDR, so that the newly selected AM-PCF network element during the terminal movement can determine the BDT information successfully received by the terminal from the UDR. Since the AM-PCF network element is selected before the SM-PCF network element, and the AM-PCF network element and SM-PCF network element can share the same UDR, SM-PCF can also determine from the UDR that the terminal has successfully received BDT information.
  • the AM-PCF network element may also notify the SM-PCF network element not to transmit the BDT information in the PCC rule. Or the AM-PCF network element may also notify the SM-PCF network element of which BDT information may not be transmitted in the PCC rule.
  • step 501 in the embodiment of the present application may be specifically implemented in any of the following manners 1 to 3:
  • the AM-PCF network element obtains terminal capability information from the SM-PCF network element.
  • the terminal reports the terminal capability information to the SMF network element. Then when the SMF network element establishes the SM policy association, the SMF network element reports the terminal capability information to the SM-PCF network element so that the SM-PCF network element has the terminal capability information. In this way, the AM-PCF network element can send a capability information acquisition request to the SM-PCF network element to obtain terminal capability information from the SM-PCF network element.
  • Figure 6 shows the specific process of the terminal reporting terminal capability information in the PDU session establishment process:
  • Step 601 The terminal sends a PDU session establishment request (Session Establishment Request) to the AMF network element.
  • the PDU session establishment request includes terminal capability information.
  • the PDU session establishment request may carry N1 SM Container.
  • the N1 SM Container carries terminal capability information, and the AMF forwards the N1 SM Container to the SMF network element without processing the N1 SM Container.
  • Step 602 The AMF network element selects an SMF network element.
  • Step 603 The AMF network element sends a PDU session establishment session management context request (Nsmf_PDU Session_CreateSM Context Request) to the SMF network element.
  • the AMF network element sends the terminal capability information received from the terminal to the SMF network element.
  • Step 604 The SMF network element registers in the UDM network element, and obtains the contract information of the terminal from the UDM network element.
  • Step 605 The SMF network element sends a PDU session establishment request response (Nsmf_PDUSession_CreateSMContextResponse) to the AMF network element.
  • the SMF network element may reject the establishment of the PDU session at this step and carry the reason value.
  • Step 606 Authentication/authorization of the PDU session.
  • the authentication/authorization of the PDU session is completed between the UE and the DN.
  • Step 607 The SMF network element selects the SM-PCF network element, and requests policy rules from the SM-PCF network element. Which can carry terminal capability information.
  • the AM-PCF network element obtains terminal capability information from the UDR.
  • UDR has terminal capability information.
  • the AM-PCF network element can send a capability information acquisition request to the UDR to obtain terminal capability information from the UDR.
  • the terminal capability information possessed by the UDR may be obtained in the following manner: the SM-PCF network element may store the terminal capability information in the UDR after obtaining the terminal capability information, so that the UDR has the terminal capability information. The terminal sends the terminal capability information to the UDR, so that the UDR has the terminal capability information. Alternatively, the AM-PCF network element 1 stores the acquired terminal capability information in the UDR. AM-PCF network element 1 is the AM-PCF network element before the terminal replacement.
  • the terminal reports the terminal capability information to the AM-PCF network element during the initial registration, so that the AM-PCF network element obtains the terminal capability information from the terminal.
  • the terminal sends a registration request (Registration Request) to the RAN.
  • the Registration Request carries terminal capability information.
  • the Registration Request carries a terminal policy container (UE Policy Container).
  • the UE Policy Container carries terminal capability information.
  • the RAN sends a Registration Request to the selected AMF network element.
  • the AMF network element sends Npcf_AMPolicyControl_Get to the AM-PCF network element.
  • Npcf_AMPolicyControl_Get carries terminal capability information.
  • FIG. 7 shows another method for transmitting BDT information provided by an embodiment of the present application, which includes the following steps:
  • Step 701 The SM-PCF network element obtains terminal capability information of the terminal.
  • the terminal capability information is used to indicate that the terminal supports the transmission of BDT information in the terminal routing strategy of the terminal.
  • step 701 in the embodiment of the present application may be specifically implemented in the following manner: the SM-PCF network element obtains terminal capability information from the terminal.
  • the specific implementation of the SM-PCF network element acquiring the terminal capability information from the terminal can refer to the description in the above manner 1, which will not be repeated here.
  • Step 702 The SM-PCF network element determines not to transmit BDT information in the PCC rule according to the terminal capability information.
  • the SM-PCF network element may also determine to transmit the BDT information in the PCC rule.
  • the BDT information transmitted by the SM-PCF network element in the PCC rules of different sessions needs to be the same as the BDT information transmitted in the terminal routing strategy different.
  • the BDT information transmitted in the PCC rules of the same session needs to be the same as the BDT information transmitted in the terminal routing strategy.
  • the embodiment of the present application provides a method for transmitting background traffic transmission information.
  • the method obtains terminal capability information of a terminal through an SM-PCF network element.
  • the SM-PCF network element determines, according to the terminal capability information, that the terminal supports the transmission of background traffic transmission information in the terminal routing strategy of the terminal, and subsequently can know the core network (for example, AM-PCF network element) in the terminal routing strategy of the terminal Transmission background traffic transmits information while avoiding the transmission of BDT information in PCC rules. This is because if you are not sure whether the terminal supports the transmission of background traffic transmission information in the terminal’s terminal routing strategy, and blindly transmit the background traffic transmission information in the PCC, the same background traffic transmission information will be transmitted by the AM-PCF network element.
  • the second strategy controls the conflict caused by the transmission of the network element in the PCC rule.
  • the method provided in the embodiment of the present application further includes:
  • Step 703 The SM-PCF network element sends terminal capability information to the AM-PCF network element or UDR, so that the AM-PCF network element or UDR receives the terminal capability information from the SM-PCF network element.
  • the method provided in the embodiment of the present application further includes: any one of case 1, case 2 or case 3.
  • case 1 includes: step 704 to step 707.
  • Case 2 includes: step 708-step 710.
  • Case 3 includes: step 711-step 713.
  • the method provided in the embodiment of the present application further includes:
  • Step 704 The AF network element determines to transmit the background traffic transmission information in the PCC rule.
  • step 704 For the specific implementation of step 704, reference may be made to the description at step 503, which will not be repeated here.
  • Step 705 The AF network element sends a first request message to the SM-PCF network element, so that the SM-PCF network element receives the first request message from the AF network element to instruct the SM-PCF network element to transmit BDT information in the PCC rule .
  • Step 706 The SM-PCF network element sends a first response message to the AF network element, so that the AF network element receives the first response message from the SM-PCF network element.
  • the first response message is used to indicate refusal to transmit BDT information in the PCC rule.
  • the AF network element can timely sense that the SM-PCF network element does not transmit the background traffic transmission information in the PCC rule, so that the AF network element triggers the SM-PCF network element to transmit the BDT information in the terminal routing policy.
  • the SM-PCF network element can refuse to transmit any BDT information to the terminal not in the PCC rules.
  • the SM-PCF network element may reject certain BDT information of the terminal or the BDT information requested by the AF network element not to be transmitted in the PCC rules. If the SM-PCF network element refuses to transmit some BDT information of the terminal or the BDT information requested by the AF network element is not transmitted in the PCC rules, the first response message may carry the identification of the BDT information refused to be transmitted in the PCC rules , Or rejected BDT information.
  • the method provided in the embodiment of the present application further includes:
  • Step 707 and step 708 are the same as step 704 and step 705, and will not be repeated here.
  • Step 709 The SM-PCF network element determines not to send the first PCC rule to the SMF network element, and the first PCC rule corresponds to the background traffic transmission information successfully received by the terminal. That is, if the SM-PCF network element determines that the BDT information A has been transmitted in the URSP, the first PCC rule carrying the BDT information A may no longer be triggered.
  • Case 1 and Case 2 are parallel solutions.
  • the SM-PCF network element in Case 1 refuses to transmit BDT information in the PCC rule.
  • the SM-PCF network element does not trigger the PCC rule, that is, for the background traffic transmission information that the terminal has not successfully received, or the BDT information that is not transmitted in the URSP, SM- PCF network elements can still be transmitted in the PCC rules.
  • the method provided in the embodiment of the present application further includes:
  • Step 710 and step 711 are the same as step 704 and step 705, and will not be repeated here.
  • Step 712 The SM-PCF network element sends the second PCC rule to the SMF network element. So that the SMF network element receives the second PCC rule from the SM-PCF network element. Wherein, the second PCC rule corresponds to the BDT information not transmitted in the terminal routing strategy.
  • the SM-PCF network element determines that the terminal supports the transmission of BDT information in the xBDT mode, after the SM-PCF network element determines the BDT information transmitted in the xBDT mode, in order to avoid conflicts between the transmission of BDT information in the xBDT mode and the transmission of BDT information in the BDT mode, It is necessary to ensure that the BDT information transmitted in the second PCC rule is not transmitted in the terminal routing strategy. That is, it is necessary to ensure that the BDT information transmitted in the second PCC rule is different from the BDT information transmitted in the terminal routing strategy.
  • the SM-PCF network element may determine the BDT information that has been transmitted in the terminal routing strategy from the AM-PCF network element or the UDR.
  • the SM-PCF network element may transmit the BDT information that is not transmitted in the terminal routing strategy to the terminal in the BDT mode.
  • the SM-PCF network element may send a second PCC rule to the SMF network element, where the second PCC rule includes BDT information 2.
  • step 710-step 712 and step 704-step 706 are parallel solutions.
  • the difference between step 704-step 706 and step 710-step 712 is that the SM-PCF network element in step 704-step 706 refuses to be in the PCC rule Transmission background traffic transmission information.
  • the SM-PCF network element triggers the second PCC rule for the BDT information not transmitted in the terminal routing strategy.
  • the second PCC rule includes BDT information that is not transmitted in the terminal routing strategy.
  • case 1 indicates that the SM-PCF network element does not transmit any BDT information for the terminal in the PCC rule
  • case 3 indicates that the SM-PCF network element does not transmit the BDT information that has been transmitted in the terminal routing policy in the PCC rule.
  • the method provided in the embodiment of the present application further includes: the SM-PCF network element determines the background traffic transmission information successfully received by the terminal.
  • the SM-PCF network element determining the background traffic transmission information successfully received by the terminal can be specifically implemented through step 713:
  • Step 713 The SM-PCF network element obtains the third indication from the UDR.
  • the third indication is used to determine the background traffic transmission information successfully received by the terminal.
  • the method provided in the embodiment of the present application further includes:
  • Step 714 is the same as step 506. Specifically, the AM-PCF network element in step 506 can be replaced with an SM-PCF network element.
  • the method provided in the embodiment of the present application further includes: the SM-PCF network element notifies the AM-PCF network element to adopt a terminal routing strategy to transmit BDT information to the terminal.
  • the SM-PCF network element may determine the BDT information transmitted to the terminal based on the fourth indication of the AF network element.
  • the PCF network element A can either transmit BDT information in the PCC rules, or transmit BDT information in the URSP.
  • FIG. 8 shows a method for transmitting background traffic transmission information provided by an embodiment of the present application, including:
  • Step 801 The AM-PCF network element obtains terminal capability information of the terminal.
  • the terminal capability information is used to indicate that the terminal does not support the transmission of BDT information in the terminal routing strategy of the terminal.
  • step 801 For the specific implementation of step 801, refer to the description in step 501 above, which will not be repeated here. The difference is that the terminal capability information obtained in step 801 is used to indicate that the terminal does not support the transmission of BDT information in the terminal routing strategy of the terminal. .
  • the terminal does not support the transmission of BDT information in the terminal routing strategy of the terminal can also be described as: the terminal does not support the transmission of BDT information in the xBDT mode.
  • Step 802 The AM-PCF network element determines not to transmit BDT information in the terminal routing strategy according to the terminal capability information.
  • the embodiment of the present application provides a method for transmitting background traffic transmission information.
  • the method obtains terminal capability information of a terminal through an AM-PCF network element.
  • the AM-PCF network element determines based on the terminal capability information that the terminal does not support the transmission of BDT information in the terminal routing strategy, it can determine not to transmit the BDT information in the terminal routing strategy of the terminal to avoid blindly adopting the terminal routing strategy to transmit BDT
  • the information causes the terminal to fail to successfully obtain the BDT information from the terminal routing strategy, which improves the reliability of transmitting the BDT information.
  • the AM-PCF network element may also notify the SM-PCF network element to transmit the terminal in the PCC rule BDT information.
  • the method provided in the embodiment of the present application may further include:
  • Step 803 The AF network element determines that the BDT information needs to be transmitted in the terminal routing strategy.
  • step 803 For the specific implementation of step 803, refer to the description at step 503.
  • the difference from step 503 is that the AF network element negotiates with the core network according to the pre-configuration mode, and the purpose is to determine that BDT information needs to be transmitted in the terminal routing strategy.
  • Step 804 The AF network element sends a first request message to the AM-PCF network element, where the first request message is used to instruct the AM-PCF network element to transmit BDT information in the terminal routing strategy.
  • the content of the first request message can refer to the description at step 504 above.
  • the first request message is used to instruct the AM-PCF network element to transmit BDT information in the terminal routing strategy, that is, When implemented through step 804, the transmission of BDT information in the PCC rule involved in the specific implementation of step 504 is replaced with: the transmission of BDT information in the terminal routing strategy.
  • Step 805 The AM-PCF network element sends a first response message to the AF network element, where the first response message is used to indicate refusal to transmit the BDT information in the terminal routing policy.
  • the first response message may carry a third field, and the third field is used to indicate the refusal to transmit the background traffic transmission information in the terminal routing policy.
  • the first response message itself has the meaning of indicating refusal to transmit the background traffic transmission information in the terminal routing policy.
  • the AM-PCF network element determines that the terminal does not support BDT transmission of BDT information, the AM-PCF network element sends a first response message to the AF network element.
  • the AM-PCF network element may also send a first cause value to the AF network element, where the first cause value is used to make the AF network element determine the reason for refusing to transmit BDT information in the terminal routing policy .
  • the first reason value may be that the terminal does not support the transmission of BDT information in the terminal routing strategy.
  • the AF network element can determine in time that the AM-PCF network element refuses to transmit BDT information in the terminal routing strategy. Furthermore, the AF network element can trigger the SM-PCF network element to transmit BDT information in the PCC rule.
  • the method provided in the embodiment of the present application may further include:
  • Step 806 The AM-PCF network element sends a first notification message to the AF network element, so that the AF network element receives the first notification message from the AM-PCF network element.
  • the first notification message is used to indicate the transmission of BDT information in the PCC rule.
  • the AF network element can determine that the SM-PCF network element can be triggered to transmit the BDT information in the PCC rule. It should be understood that the BDT information carried in the PCC rule is to generate the PCC rule based on the BDT information.
  • the method provided in the embodiment of the present application may further include:
  • Step 807 to step 808 are the same as step 803 to step 804, and will not be repeated here.
  • Step 809 The AM-PCF network element sends a terminal routing strategy to the terminal, and the terminal routing strategy does not include BDT information.
  • the terminal since the terminal does not support transmission in the xBDT mode, the BDT information is not included in the terminal routing strategy sent by the AM-PCF network element to the terminal.
  • the AM-PCF network element may also store terminal capability information in the UDR or send the terminal capability information to the SM-PCF network element.
  • step 807 to step 809 and step 803 to step 805 in the embodiment of the present application are parallel solutions.
  • FIG. 9 shows a method for transmitting background traffic transmission information provided by an embodiment of the present application, including:
  • Step 901 The SM-PCF network element obtains terminal capability information of the terminal.
  • the terminal capability information is used to indicate that the terminal does not support the transmission of BDT information in the terminal routing strategy of the terminal.
  • step 901 may be implemented in the following manner: the SM-PCF network element obtains terminal capability information from the terminal.
  • step 901 refers to the description at step 701.
  • the terminal capability information obtained by the SM-PCF network element is used to indicate that the terminal does not support the transmission of BDT information in the terminal routing strategy of the terminal.
  • Step 902 The SM-PCF network element determines to transmit BDT information in the PCC rule according to the terminal capability information.
  • the SM-PCF network element may also notify the AM-PCF network element that it does not need to route at the terminal Select the strategy to transmit BDT information.
  • the SM-PCF network element determines that the terminal does not support the transmission of BDT information in the terminal routing strategy of the terminal according to the terminal capability information, so that it can be determined that the BDT information needs to be transmitted in the PCC rules subsequently, so that the terminal can obtain it from the PCC rules BDT information.
  • the method provided in the embodiment of the present application further includes:
  • Step 903-step 906 are the same as step 803-step 806, except that: when implemented by step 903-step 906, the AM-PCF network element in step 803-step 806 is replaced with: SM-PCF network element.
  • the method provided in the embodiment of the present application further includes:
  • Step 907 to step 908 are the same as step 803 to step 804, except that: when implemented by step 907 to step 908, the AM-PCF network element in step 803 to step 804 is replaced with: SM-PCF network element.
  • Step 909 The SM-PCF network element sends the PCC rule to the SMF network element, where the PCC rule includes BDT information.
  • the SM-PCF network element may also store terminal capability information in the UDR or send the terminal capability information to the AM-PCF network element.
  • the SM-PCF network element may determine the BDT information transmitted in the PCC rule based on the request of the AF network element.
  • the first policy control network element, the application function network element, and the second policy control network element include hardware structures and/or software modules corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
  • the embodiments of the present application can divide the first policy control network element, the application function network element, and the second policy control network element into functional modules according to the foregoing method examples.
  • each functional module can be divided corresponding to each function, or two Or two or more functions are integrated in one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 10 shows a schematic structural diagram of a device for transmitting background traffic transmission information.
  • the device for transmitting background traffic transmission information includes: a processing module 1001 and a communication module 1002.
  • the device for transmitting background traffic transmission information may further include: a storage module 1003 for storing terminal capability information.
  • the device for transmitting background traffic transmission information may be: the first policy control network element, or may be a chip applied to the first policy control network element.
  • the processing module 1001 is configured to support the first policy control network element to perform step 502 in the foregoing embodiment.
  • the communication module 1002 is configured to support the first policy control network element to perform step 501 in the foregoing embodiment.
  • the communication module 1002 is also used to support the first policy control network element to execute step 505, step 506, step 507, step 508, step 509, step 510, and step 511 in the foregoing embodiment.
  • the device for transmitting background traffic transmission information may be an application function network element, or a chip applied to an application function network element.
  • the processing module 1001 is configured to support the application function network element to execute step 503 in the foregoing embodiment.
  • the communication module 1002 is configured to support the application function network element to perform step 504 in the above-mentioned embodiment.
  • the communication module 1002 is also used to support the application function network element, and obtain the confirmation information, the first response message, the terminal identification information, and the first policy control network element from the first policy control network element in the foregoing embodiment. Step two instructions and the first notification message.
  • the device for transmitting background traffic transmission information may be: the second policy control network element, or may be a chip applied to the second policy control network element.
  • the processing module 1001 is configured to support the second policy control network element to perform step 702 in the foregoing embodiment.
  • the communication module 1002 is configured to support the second policy control network element to perform step 701 in the foregoing embodiment.
  • the communication module 1002 is also used to support the second policy control network element to perform step 703, step 706, step 712, step 713, and step 714 in the foregoing embodiment.
  • the processing module 1001 is further configured to support the second policy control network element to perform step 709 in the foregoing embodiment.
  • the device for transmitting background traffic transmission information may be an application function network element, or a chip applied to an application function network element.
  • the processing module 1001 is configured to support the application function network element to perform step 704 in the foregoing embodiment.
  • the communication module 1002 is configured to support the application function network element to perform step 705 in the foregoing embodiment.
  • the processing module 1001 is configured to support the application function network element to execute step 707 in the foregoing embodiment.
  • the communication module 1002 is used to support the application function network element to execute step 708 in the foregoing embodiment.
  • the processing module 1001 is configured to support the application function network element to perform step 710 in the foregoing embodiment.
  • the communication module 1002 is configured to support the application function network element to perform step 711 in the foregoing embodiment.
  • the device for transmitting background traffic transmission information may be: a first policy function network element, or may be a chip applied to the first policy function network element.
  • the processing module 1001 is configured to support the first policy function network element to perform step 802 in the foregoing embodiment.
  • the communication module 1002 is configured to support the first strategy function network element, and execute step 801 in the foregoing embodiment.
  • the communication module 1002 is also used to support the first policy control network element to perform step 805, step 806, and step 809 in the foregoing embodiment.
  • the device for transmitting background traffic transmission information may be an application function network element, or a chip applied to an application function network element.
  • the processing module 1001 is configured to support the application function network element to execute step 803 in the foregoing embodiment.
  • the communication module 1002 is configured to support the application function network element to perform step 804 in the foregoing embodiment.
  • the processing module 1001 is configured to support the application function network element to execute step 807 in the foregoing embodiment.
  • the communication module 1002 is used to support the application function network element to execute step 808 in the above embodiment.
  • the device for transmitting background traffic transmission information may be: the second policy control network element, or may be a chip applied to the second policy control network element.
  • the processing module 1001 is configured to support the second policy control network element to perform step 902 in the foregoing embodiment.
  • the communication module 1002 is configured to support the second policy control network element to perform step 901 in the foregoing embodiment.
  • the communication module 1002 is also used to support the second policy control network element to perform step 905, step 906, and step 909 in the foregoing embodiment.
  • the device for transmitting background traffic transmission information may be an application function network element, or a chip applied to an application function network element.
  • the processing module 1001 is configured to support the application function network element to execute step 903 in the foregoing embodiment.
  • the communication module 1002 is configured to support the application function network element to perform step 904 in the foregoing embodiment.
  • the processing module 1001 is configured to support the application function network element to perform step 907 in the foregoing embodiment.
  • the communication module 1002 is used to support the application function network element to perform step 908 in the foregoing embodiment.
  • the device for transmitting background traffic transmission information is presented in the form of dividing various functional modules in an integrated manner.
  • the "module” here can refer to a specific ASIC, circuit, processor and memory that executes one or more software or firmware programs, integrated logic circuit, and/or other devices that can provide the above-mentioned functions.
  • the device for transmitting background traffic transmission information may adopt the form shown in FIG. 4. That is, the processing module 1001 may be the processor 401 when implemented by hardware.
  • the communication module 1002 may be a communication interface 404 when implemented by hardware.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403, so that the first policy control network element executes steps 501, 502, 505, 506, and 507 in the above method embodiment.
  • Step 508 step 509, step 510, step 511.
  • the first policy control network element provided in this embodiment can execute the above-mentioned corresponding method, the technical effects that can be obtained can refer to the above-mentioned method embodiment, which will not be repeated here.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the application function network element to execute steps 503 and 504 in the foregoing method embodiment.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403, so that the second policy control network element executes steps 701, 702, 703, 706, and 709 in the above method embodiment. Step 712, step 713, step 714.
  • the second policy control network element provided in this embodiment can execute the above-mentioned corresponding method, the technical effects that can be obtained can refer to the above-mentioned method embodiment, which will not be repeated here.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the application function network element to execute steps 704 and 705 in the foregoing method embodiment.
  • processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the application function network element to execute steps 707 and 708 in the foregoing method embodiment.
  • processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the application function network element to execute step 710 and step 711 in the foregoing method embodiment.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the first policy control network element to execute steps 801, 802, 805, 806, and 809 in the foregoing method embodiment.
  • the first policy control network element provided in this embodiment can execute the above-mentioned corresponding method, the technical effects that can be obtained can refer to the above-mentioned method embodiment, which will not be repeated here.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the application function network element to execute step 803 and step 804 in the foregoing method embodiment.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the application function network element to execute step 807 and step 808 in the foregoing method embodiment.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the second policy control network element to execute steps 901, 902, 905, 906, and 909 in the foregoing method embodiment.
  • the second policy control network element provided in this embodiment can execute the above-mentioned corresponding method, the technical effects that can be obtained can refer to the above-mentioned method embodiment, which will not be repeated here.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the application function network element to execute steps 903 and 904 in the foregoing method embodiment.
  • the processor 401 in FIG. 4 may invoke the computer execution instructions stored in the memory 403 to cause the application function network element to execute steps 907 and 908 in the foregoing method embodiment.
  • the function/implementation process of the communication module 1002 and the processing module 1001 in FIG. 10 may be implemented by the processor 401 in FIG. 4 calling a computer execution instruction stored in the memory 403.
  • the function/implementation process of the processing module 1001 in FIG. 10 may be implemented by the processor 401 in FIG. 4 calling computer execution instructions stored in the memory 403, and the function/implementation process of the communication module 1002 in FIG.
  • the communication interface 404 in 4 is implemented.
  • first policy control network element second policy control network element
  • application function network element is only a logical function division. In actual implementation, it can be fully or partially integrated into a physical entity, or Physically separate.
  • the modules in the first strategy control network element, the second strategy control network element, or the application function network element can all be implemented in the form of software calling through processing elements; it can also be implemented in the form of hardware; some modules can also be implemented in the form of The software is implemented in the form of calling processing elements, and some modules are implemented in the form of hardware.
  • each module can be a separately established processing element, or it can be integrated in a certain chip of the device for implementation.
  • each step of the above method or each of the above modules may be implemented by an integrated logic circuit of hardware in a processor element or implemented in a form of software calling through a processing element.
  • the modules or units in any of the above devices may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASICs), or, One or more microprocessors (digital singnal processors, DSP), or, one or more field programmable gate arrays (Field Programmable Gate Array, FPGA), etc.
  • ASICs application specific integrated circuits
  • DSP digital singnal processors
  • FPGA Field Programmable Gate Array
  • the processing element may be a general-purpose processor, such as a central processing unit ( Central Processing Unit (CPU) or other processors that can call programs.
  • CPU Central Processing Unit
  • these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • the above communication module is an interface circuit or communication interface of the device for receiving signals from other devices.
  • the communication module is an interface circuit or communication interface used by the chip to receive signals or send signals from other chips or devices.
  • the hardware can be a CPU, a microprocessor, a digital signal processing (digital signal processing, DSP) chip, a microcontroller unit (MCU), an artificial intelligence processor, an ASIC, Any one or any combination of SoC, FPGA, PLD, dedicated digital circuit, hardware accelerator, or non-integrated discrete device can run necessary software or do not rely on software to perform the above method flow.
  • DSP digital signal processing
  • MCU microcontroller unit
  • an artificial intelligence processor an ASIC
  • Any one or any combination of SoC, FPGA, PLD, dedicated digital circuit, hardware accelerator, or non-integrated discrete device can run necessary software or do not rely on software to perform the above method flow.
  • an embodiment of the present application further provides a communication device (for example, the communication device may be a chip or a chip system), and the communication device includes a processor for implementing the method in any of the foregoing method embodiments.
  • the communication device further includes a memory.
  • the memory is used to store necessary program instructions and data, and the processor can call the program code stored in the memory to instruct the communication device to execute the method in any of the foregoing method embodiments.
  • the memory may not be in the communication device.
  • the communication device is a chip system, it may be composed of a chip, or may include a chip and other discrete devices, which is not specifically limited in the embodiment of the present application.
  • the structure of the communication device can be referred to as shown in FIG. 4, which will not be repeated here.
  • the instructions stored in the memory for execution by the processor may be implemented in the form of a computer program product.
  • the computer program product may be written in the memory in advance, or it may be downloaded and installed in the memory in the form of software.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • Computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • computer instructions can be transmitted from a website, computer, server, or data center through a cable (such as Coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server, or data center.
  • a cable such as Coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk, SSD).
  • a computer storage medium stores instructions.
  • the first policy control network element or the chip applied in the first policy control network element executes the Step 501, Step 502, Step 505, Step 506, Step 507, Step 508, Step 509, Step 510, Step 511.
  • a computer storage medium stores instructions.
  • the application function network element or a chip applied to the application function network element executes the steps in the above method embodiments. 503. Step 504.
  • a computer storage medium stores instructions.
  • the second policy control network element or a chip applied to the second policy control network element executes the foregoing method implementation. Step 701, step 702, step 703, step 706, step 709, step 712, step 713, step 714 in the example.
  • a computer storage medium stores instructions.
  • the application function network element or a chip applied to the application function network element executes the steps in the above method embodiments. 704. Step 705.
  • a computer storage medium stores instructions.
  • the first policy control network element or a chip applied to the first policy control network element executes the foregoing method implementation Step 801, step 802, step 805, step 806, and step 809 in the example.
  • a computer storage medium stores instructions.
  • the application function network element or a chip applied to the application function network element executes the steps in the above method embodiments. 803. Step 804.
  • a computer storage medium stores instructions.
  • the second policy control network element or a chip applied to the second policy control network element executes the foregoing method implementation. Step 901, step 902, step 905, step 906, and step 909 in the example.
  • a computer storage medium stores instructions.
  • the application function network element or a chip applied to the application function network element executes the steps in the above method embodiments. 903. Step 904.
  • the aforementioned readable storage medium may include: U disk, mobile hard disk, read-only memory, random access memory, magnetic disk or optical disk and other media that can store program codes.
  • a computer program product containing instructions.
  • the computer program product stores instructions.
  • the first policy control network element or the chip execution embodiment applied to the first policy control network element is provided Step 501, step 502, step 505, step 506, step 507, step 508, step 509, step 510, step 511 of.
  • a computer program product containing instructions.
  • the computer program product stores instructions.
  • the application function network element or the chip applied to the application function network element executes the above method embodiments Step 503 and step 504.
  • a computer program product containing instructions.
  • the computer program product stores instructions.
  • the second policy control network element or a chip applied to the second policy control network element executes the above method Step 701, step 702, step 703, step 706, step 709, step 712, step 713, step 714 in the embodiment.
  • a computer program product containing instructions.
  • the instructions are stored in the computer program product.
  • the application function network element or the chip applied to the application function network element executes the above method embodiments. Step 704 and step 705.
  • a computer program product containing instructions.
  • the computer program product stores instructions.
  • the first policy control network element or a chip applied to the first policy control network element executes the above method Step 801, step 802, step 805, step 806, and step 809 in the embodiment.
  • a computer program product containing instructions.
  • the instructions are stored in the computer program product.
  • the application function network element or the chip applied to the application function network element executes the above method embodiments. Step 803 and step 804.
  • a computer program product containing instructions.
  • the computer program product stores instructions.
  • the second policy control network element or a chip applied to the second policy control network element executes the above method Step 901, step 902, step 905, step 906, and step 909 in the embodiment.
  • a computer program product containing instructions.
  • the instructions are stored in the computer program product.
  • the application function network element or the chip applied to the application function network element executes the above method embodiments. Step 903 and step 904.
  • a chip is provided.
  • the chip is applied to a first policy control network element.
  • the chip includes at least one processor and a communication interface.
  • the communication interface is coupled to the at least one processor.
  • the processor is used to run instructions to execute the instructions in the embodiments. Step 501, step 502, step 505, step 506, step 507, step 508, step 509, step 510, step 511 of.
  • a chip is provided.
  • the chip is applied to an application function network element.
  • the chip includes at least one processor and a communication interface, and the communication interface is coupled to the at least one processor.
  • the processor is used to run instructions to execute instructions in the embodiments. Step 503 and step 504.
  • a chip is provided, the chip is applied to a second policy control network element, the chip includes at least one processor and a communication interface, the communication interface is coupled with the at least one processor, and the processor is used to run instructions to execute the embodiments Step 701, step 702, step 703, step 706, step 709, step 712, step 713, and step 714 in.
  • a chip is provided.
  • the chip is applied to an application function network element.
  • the chip includes at least one processor and a communication interface, the communication interface is coupled to the at least one processor, and the processor is used to run instructions to execute instructions in the embodiments. Step 704 and step 705.
  • a chip is provided, the chip is applied to a first policy control network element, the chip includes at least one processor and a communication interface, the communication interface is coupled with the at least one processor, and the processor is used to run instructions to execute the embodiments Step 801, step 802, step 805, step 806, step 809 in.
  • a chip is provided.
  • the chip is applied to an application function network element.
  • the chip includes at least one processor and a communication interface, the communication interface is coupled to the at least one processor, and the processor is used to run instructions to execute instructions in the embodiments. Step 803 and step 804.
  • a chip is provided, the chip is applied to a second policy control network element, the chip includes at least one processor and a communication interface, the communication interface is coupled with the at least one processor, and the processor is used to run instructions to execute the embodiments Step 901, step 902, step 905, step 906, and step 909 in.
  • a chip is provided.
  • the chip is applied to an application function network element.
  • the chip includes at least one processor and a communication interface, the communication interface is coupled to the at least one processor, and the processor is used to run instructions to execute instructions in the embodiments. Step 903 and step 904.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种传输背景流量传输信息的方法、装置及系统,涉及通信技术领域,用以根据终端能力信息采用终端支持的传输方式传输背景流量传输信息,提高背景流量传输信息的可靠性。该方法包括:第一策略控制网元获取终端的终端能力信息,所述终端能力信息用于指示所述终端支持在所述终端的终端路由选择策略中传输背景流量传输信息;所述第一策略控制网元根据所述终端能力信息,确定在所述终端路由选择策略中传输背景流量传输信息。

Description

一种传输背景流量传输信息的方法、装置及系统
本申请要求于2019年06月17日提交国家知识产权局、申请号为201910523242.1、申请名称为“一种传输背景流量传输信息的方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,尤其涉及一种传输背景流量传输信息的方法、装置及系统。
背景技术
背景流量传输(Background Data Transfer,BDT)信息指终端中的应用通过和网络侧协商在特定的时间,地点以特殊费率为用户传输数据。
目前,策略控制功能(Policy Control Function,PCF)网元可以通过如下方式向终端发送BDT信息。PCF网元向终端发送终端路由选择(Route Selection Descriptor Precedence,URSP)信息。该URSP中可以携带路由选择校验条件(Route Selection Validation Criteria)和BDT信息。但是,终端只有在符合路由选择校验条件时,才会应用该条URSP中的BDT信息。路由选择校验条件具体包含时间窗信息和位置条件信息。
但是,PCT网元并不确定通过URSP向终端传输的BDT信息否会成功下发至终端。此外,即使BDT信息成功下发,终端能否使用BDT信息对于PCF网元来说也是未知的。
发明内容
本申请实施例提供一种传输背景流量传输信息的方法、装置及系统,用以根据终端能力信息采用终端支持的传输方式传输背景流量传输信息,提高背景流量传输信息的可靠性。
为达到上述目的,本申请采用如下技术方案:
第一方面,本申请实施例提供一种传输背景流量传输信息的方法,包括:第一策略控制网元获取终端的终端能力信息,终端能力信息用于指示终端支持在终端的终端路由选择策略中传输背景流量传输信息。第一策略控制网元根据终端能力信息,确定在终端路由选择策略中传输背景流量传输信息。
本申请实施例提供一种传输背景流量传输信息的方法,该方法通过第一策略控制网元获取终端的终端能力信息,并根据终端能力信息确定终端支持在终端的终端路由选择策略中传输背景流量传输信息的情况下,这样第一策略控制网元可以确定采用终端支持的传输方式,利用终端路由选择策略向终端传输背景流量传输信息。以便提高向终端传输背景流量传输信息的可靠性。避免由于终端不支持在终端路由选择策略中传输背景流量传输信息,而在终端路由选择策略中传输背景流量传输信息导致的终端无法成功获取背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元接收来自应用功能网元的用于指示第一策略控制网元在策略与计费控制PCC规则中传输背 景流量传输信息的第一请求消息。第一策略控制网元向应用功能网元发送用于指示拒绝在PCC规则中传输背景流量传输信息的第一响应消息。这样可以使得应用功能网元感知第一策略控制网元未在PCC规则中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元向应用功能网元发送用于指示在终端路由选择策略中传输背景流量传输信息的第一通知消息。这样可以使得第一策略控制网元应用功能网元确定第一策略控制网元是在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元接收第一指示,该第一指示用于指示终端成功通过终端路由选择策略接收背景流量传输信息。第一策略控制网元向应用功能网元发送确认信息,确认信息用于应用功能网元确定终端成功接收到的背景流量传输信息。通过第一指示一方面便于第一策略控制网元确定终端成功通过终端路由选择策略接收背景流量传输信息。通过发送确认信息可以便于应用功能网元确定终端成功接收到的背景流量传输信息。这是由于应用功能网元可能会为终端下发多个背景流量传输信息,但是该多个背景流量传输信息并非所有的背景流量传输信息均可以被终端成功接收到,因此,通过确认信息可以使得应用功能网元确定多个背景流量传输信息中哪个或哪几个背景流量传输信息被终端成功接收到。
示例性的,确认信息可以为终端成功接收到的背景流量传输信息。或者示例性的,确认信息可以为终端成功接收到的背景流量传输信息的标识。或者示例性的,确认信息可以为终端成功接收到的背景流量传输信息的标识和第一策略控制网元为该终端选择的至少一个背景流量传输信息。该终端成功接收到的背景流量传输信息属于第一策略控制网元为该终端选择的至少一个背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元向应用功能网元发送终端的标识信息和第二指示,第二指示用于指示终端成功通过终端路由选择策略接收背景流量传输信息。通过发送终端的标识信息可以便于应用功能网元确定成功接收到的背景流量传输信息对应的终端。通过发送第二指示可以便于应用功能网元显示确定终端已成功通过终端路由选择策略接收背景流量传输信息。这样便于后续应用功能网元确定不再使用PCC规则传输终端成功接收到的背景流量传输信息。或者应用功能网元确定通过PCC规则向该终端传输其他背景流量传输信息。或者应用功能网元确定该终端的背景流量传输信息均可以在终端路由选择策略中传输。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元接收第一指示,第一指示用于指示终端成功通过终端路由选择策略接收背景流量传输信息。第一策略控制网元向用户数据管理网元或第二策略控制网元发送第三指示,第三指示用于确定终端成功接收到的背景流量传输信息。
具体的,第三指示的内容可以参考上述确认信息的具体内容,此处不再重复赘述。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元获取终端的终端能力信息,包括:第一策略控制网元从第二策略控制网元处获取终端能力信息。这样第二策略控制网元为与会话管理网元关联的策略控制网元,通常情况下,在PDU会话建立过程中,会话管理网元可以从终端处获取终端能力信息,然后将获取到的终端能力发送至第二策略控制网元。因此,便于第一策略控制网元和第二策略控 制网元之间直接交互以获得终端能力信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元获取终端的终端能力信息,包括:第一策略控制网元从用户数据管理网元中获取终端能力信息。一方面,鉴于终端的移动性,终端可能会更换为其服务的第一策略控制网元,所以移动前的第一策略控制网元可以将该终端能力信息存放在用户数据管理网元中,移动中新选择的第一策略控制网元便可以从用户数据管理网元中获取该终端能力信息。由于第一策略控制网元的选择位于选择第二策略控制网元之前,且第二策略控制网元和第一策略控制网元共用用户数据管理网元,则第二策略控制网元也可以从用户数据管理网元中获取该终端能力信息。
当由于终端的移动使得移动前的第一策略控制网元和移动后的第一策略控制网元不一致时,这样移动前的第一策略控制网元可以将终端能力信息发送至用户数据管理网元,以便于移动后的第一策略控制网元可以从用户数据管理网元处获取到移动前的第一策略控制网元存储的终端能力信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元获取终端的终端能力信息,包括:第一策略控制网元从终端处获取终端能力信息。这样便于终端在注册过程时向第一策略控制网元上报终端能力信息。当然,第一策略控制网元还可以通过注册过程以外的其他过程向第一策略控制网元上报终端能力信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元采用终端路由选择策略向终端传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元接收来自应用功能网元的第四指示,该第四指示用于确定背景流量传输信息。第一策略控制网元根据第四指示确定背景流量传输信息。示例性的,该第四指示可以为背景流量传输信息本身。当然该第四指示也可以为背景流量传输信息的标识。应理解,第一策略控制网元可以根据背景流量传输信息的标识从用户数据管理网元中获取背景流量传输信息的标识指示的背景流量传输信息。
该第四指示可以携带在上述第一请求消息中,也即应用功能网元通过第一请求消息请求第一策略控制网元在策略与计费控制PCC规则中第四指示指示的背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元接收来自应用功能网元的第二请求消息,该第二请求消息用于请求在终端路由选择策略中传输背景流量传输信息。这时由于终端支持在终端路由选择策略中传输背景流量传输信息,则第一策略控制网元可以向应用功能网元发送第二通知消息,该第二通知消息用于使得应用功能网元确认在终端路由选择策略中传输背景流量传输信息。当然,该第二请求消息中也可以携带第四指示,这样便于第一策略控制网元确定在终端路由选择策略中传输第四指示指示的背景流量传输信息。
第二方面,本申请实施例提供一种传输背景流量传输信息的方法,包括:应用功能网元确定在PCC规则中传输背景流量传输信息。应用功能网元向第一策略控制网元发送第一请求消息,该第一请求消息用于指示第一策略控制网元在PCC规则中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第一策略控制网元的第一响应消息。该第一响应消息用于指示拒绝在PCC规则中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第一策略控制网元的第一通知消息。该第一通知消息用于指示在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第一策略控制网元的确认信息,该确认信息用于应用功能网元确定终端成功接收到的背景流量传输信息。其中,确认信息的具体内容可以参考第一方面中的相关描述,此处不再赘述。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第一策略控制网元的终端的标识信息和第二指示。其中,第二指示用于指示终端成功通过终端路由选择策略接收背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元向第一策略控制网元发送第四指示,该第四指示用于确定背景流量传输信息。第一策略控制网元根据第四指示确定背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元向第一策略控制网元发送第二请求消息,该第二请求消息用于请求在终端路由选择策略中传输背景流量传输信息。应用功能网元接收来自第一策略控制网元的第二通知消息,该第二通知消息用于使得应用功能网元确认可以在终端路由选择策略中传输背景流量传输信息。
第三方面,本申请实施例提供一种传输背景流量传输信息的方法,包括:第二策略控制网元获取终端的终端能力信息,终端能力信息用于指示终端支持在终端的终端路由选择策略中传输背景流量传输信息。第二策略控制网元根据终端能力信息,确定不在策略与计费控制PCC规则中传输背景流量传输信息。
本申请实施例提供一种传输背景流量传输信息的方法,该方法通过第二策略控制网元获取终端的终端能力信息。然后第二策略控制网元根据终端能力信息确定终端支持在终端的终端路由选择策略中传输背景流量传输信息下,后续便可以知晓核心网(例如,AM-PCF网元)在终端的终端路由选择策略中传输背景流量传输信息,避免由于不确定终端是否支持在终端的终端路由选择策略中传输背景流量传输信息,而盲目在PCC中传输背景流量传输信息,导致的对于同一个背景流量传输信息既由AM-PCF网元在终端路由选择策略中传输,又由第二策略控制网元在PCC规则中传输引起的冲突。
在一种可能的设计中,第二策略控制网元获取终端的终端能力信息,包括:第二策略控制网元从终端处获取终端能力信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元向第一策略控制网元或用户数据管理网元发送终端能力信息。这样便于第一策略控制网元可以基于终端能力信息确定终端支持在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元接收来自应用功能网元的第一请求消息。该第一请求消息用于指示第二策略控制网元在 PCC规则中传输背景流量传输信息。第二策略控制网元向应用功能网元发送第一响应消息。该第一响应消息用于指示拒绝在PCC规则中传输背景流量传输信息。
应理解,如果应用功能网元请求第二策略控制网元采用PCC规则传输背景流量传输信息,但是终端支持在URSP中传输背景流量传输信息,那么第二策略控制网元也依然可以采用在PCC规则中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元接收来自应用功能网元的第一请求消息,第一请求消息用于指示第二策略控制网元在PCC规则中传输背景流量传输信息。第二策略控制网元确定不向会话管理网元发送第一PCC规则,第一PCC规则与终端成功接收到的背景流量传输信息对应。这样可以避免重复发送终端成功接收到的背景流量传输信息导致的信令冗余。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元接收来自应用功能网元的第一请求消息。该第一请求消息用于指示第二策略控制网元在PCC规则中传输背景流量传输信息。第二策略控制网元向会话管理网元发送第二PCC规则,第二PCC规则与未在终端路由选择策略中传输的背景流量传输信息对应。这样可以保证终端可以在PCC规则和终端路由选择策略中均接收到背景流量传输信息,也避免了在PCC规则中传输的背景流量传输信息和在终端路由选择策略中传输的背景流量传输信息冲突。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元从用户数据管理网元中获取第三指示,第三指示用于确定终端成功接收到的背景流量传输信息。通过第三指示便于第二策略控制网元确定终端成功接收到的背景流量传输信息。其中,第三指示的具体内容可以参考第一方面中的相关描述,此处不再赘述。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元向应用功能网元发送第一通知消息,第一通知消息用于指示在终端路由选择策略中传输背景流量传输信息。这样便于应用功能网元确定采用终端路由选择策略传输背景流量传输信息。进而一方面可以避免触发第二策略控制网元采用PCC规则传输背景流量传输信息。另一方面,可以避免重复采用PCC规则传输已采用终端路由选择策略传输的背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元采用终端路由选择策略向终端传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元确定向终端传输的背景流量传输信息。示例性的,第二策略控制网元可以根据应用功能网元的第四指示,确定向终端传输的背景流量传输信息。
第四方面,本申请实施例提供一种传输背景流量传输信息的方法,包括:应用功能网元确定在PCC规则中传输背景流量传输信息。应用功能网元向第二策略控制网元发送第一请求消息。该第一请求消息用于指示第二策略控制网元在PCC规则中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第二策略控制网元的第一响应消息。该第一响应消息用于指示拒绝在PCC规则中传输背景流量传输信息。这样便于应用功能网元确定可以不用触发第二策略控制网元在 PCC规则中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第二策略控制网元的用于指示不向会话管理网元发送第一PCC规则的指示信息。这样可以使得应用功能网元确定对终端成功接收到的背景流量传输信息不采用PCC规则传输。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第二策略控制网元的用于指示向会话管理网元发送第二PCC规则的指示信息。这样便于应用功能网元确定对未在终端路由选择策略中传输的背景流量传输信息采用PCC规则传输。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元向第二策略控制网元发送第四指示。
第四方面可以适用于第二策略控制网元确定终端支持在终端路由选择策略中传输背景流量传输信息的情况。
第五方面,本申请实施例提供一种传输背景流量传输信息的方法,包括:第一策略控制网元获取终端的终端能力信息,终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输背景流量传输信息。第一策略控制网元根据终端能力信息,确定不在终端路由选择策略中传输背景流量传输信息。
本申请实施例提供一种传输背景流量传输信息的方法,该方法通过第一策略控制网元获取终端的终端能力信息。在终端能力信息指示终端不支持在终端路由选择策略中传输背景流量传输信息的情况下,然后第一策略控制网元可以确定后续向终端传输背景流量传输信息时,避免在终端的终端路由选择策略中传输背景流量传输信息。这样可以避免采用终端不支持的传输方式传输背景流量传输信息,提高了传输背景流量传输信息的可靠性。这是由于在终端不支持在终端路由选择策略中传输背景流量传输信息的情况下,若依然采用终端路由选择策略向终端传输背景流量传输信息,可能会导致终端无法从终端路由选择策略中成功获取背景流量传输信息。
在一种可能的设计中,第一策略控制网元获取终端的终端能力信息,包括:第一策略控制网元从第二策略控制网元处获取终端能力信息。或者,第一策略控制网元从用户数据管理网元中获取终端能力信息;或者,第一策略控制网元从终端处获取终端能力信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元接收来自应用功能网元的第一请求消息,第一请求消息用于指示第一策略控制网元在终端路由选择策略中传输背景流量传输信息。第一策略控制网元向应用功能网元发送第一响应消息,第一响应消息用于指示拒绝在终端路由选择策略中传输背景流量传输信息。由于应用功能网元指示第一策略控制网元采用终端路由选择策略传输背景流量传输信息,但是终端并不支持在终端路由选择策略中传输背景流量传输信息,因此通过发送第一响应消息可以使得应用功能网元及时确定第一策略控制网元并未在终端路由选择策略中传输背景流量传输信息。进而使得应用功能网元可以根据自身逻辑作特殊处理。例如,应用功能网元重新触发第一策略控制网元采用PCC规则传输背景流量传输信息。
在一种可能的设计中,第一响应消息中还可以包括:原因值,该原因值用于指示 终端不支持在终端路由选择策略中传输背景流量传输信息。便于应用功能网元确定第一策略控制网元拒绝在终端路由选择策略中传输背景流量传输信息的原因。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元向应用功能网元发送用于指示在PCC规则中传输背景流量传输信息的第一通知消息。这样便于应用功能网元重新触发第一策略控制网元采用PCC规则传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元接收来自应用功能网元的第一请求消息。该第一请求消息用于指示第一策略控制网元在终端路由选择策略中传输背景流量传输信息。第一策略控制网元向终端发送终端路由选择策略,终端路由选择策略不包括背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第一策略控制网元接收来自应用功能网元的第四指示。第一策略控制网元根据第四指示确定需要在终端路由选择策略中向终端传输的背景流量传输信息。
第六方面,本申请实施例提供一种传输背景流量传输信息的方法,包括:应用功能网元确定在终端路由选择策略中传输背景流量传输信息。应用功能网元向第一策略控制网元发送第一请求消息,第一请求消息用于指示第一策略控制网元在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第一策略控制网元的第一响应消息。该第一响应消息用于指示拒绝在终端路由选择策略中传输背景流量传输信息。
在一种可能的实现方式中,第一响应消息中还可以包括:原因值,该原因值用于指示终端不支持在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元向第一策略控制网元发送用于指示在PCC规则中传输背景流量传输信息的第一通知消息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元向第一策略控制网元发送第四指示。如果第四指示携带在第一请求消息中这样便于第一策略控制网元确定在终端路由选择策略传输第四指示指示的背景流量传输信息。如果第四指示在应用功能网元确定第一策略控制网元要在PCC规则中传输背景流量传输信息之后发送给第一策略控制网元。这样便于第一策略控制网元确定在PCC规则中传输第四指示指示的背景流量传输信息。
应理解,第六方面的内容可以适用于第一策略控制网元确定终端不支持在终端的终端路由选择策略中传输背景流量传输信息的情况下,第一策略控制网元与应用功能网元之间的交互。
第七方面,本申请实施例提供一种传输背景流量传输信息的方法,包括:第二策略控制网元获取终端的终端能力信息,终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输背景流量传输信息。第二策略控制网元根据终端能力信息,确定在PCC规则中传输背景流量传输信息。
在一种可能的设计中,第二策略控制网元获取终端的终端能力信息,包括:第二策略控制网元从终端处获取终端能力信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元接收 来自应用功能网元的第一请求消息,第一请求消息用于指示第二策略控制网元在终端路由选择策略中传输背景流量传输信息。第二策略控制网元向应用功能网元发送第一响应消息。该第一响应消息用于指示拒绝在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元向应用功能网元发送用于指示在PCC规则中传输背景流量传输信息的第一通知消息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元接收来自应用功能网元的第一请求消息,第一请求消息用于指示第一策略控制网元在终端路由选择策略中传输背景流量传输信息。第二策略控制网元向会话管理网元发送PCC规则,PCC规则包括背景流量传输信息。
第八方面,本申请实施例提供一种传输背景流量传输信息的方法,包括:应用功能网元确定在终端路由选择策略中传输背景流量传输信息。应用功能网元向第二策略控制网元发送第一请求消息。该第一请求消息用于指示第二策略控制网元在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第二策略控制网元的第一通知消息。该第一通知消息用于指示在PCC规则中传输背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元接收来自第二策略控制网元的用于指示已在PCC规则中发送背景流量传输信息的指示。
在一种可能的设计中,本申请实施例提供的方法还包括:应用功能网元向第二策略控制网元发送第四指示。该第四指示用于确定在终端路由选择策略中传输的背景流量传输信息。或者该第四指示用于确定在PCC规则中传输的背景流量传输信息。
第九方面,本申请实施例提供一种信息发送方法,包括:第一策略控制网元获取终端能力信息。第一策略控制网元向用户数据管理网元/第二策略控制网元发送终端能力信息。其中,终端能力信息用于指示终端支持在终端路由选择策略中传输的背景流量传输信息。或者终端能力信息用于指示终端不支持在终端路由选择策略中传输的背景流量传输信息。
第九方面中第一策略控制网元获取终端能力信息的具体实现方式可以参考上述对应地方的描述,此处不再赘述。
第十方面,本申请实施例提供一种信息发送方法,包括:第一策略控制网元确定终端成功接收到的背景流量传输信息。第一策略控制网元向用户数据管理网元发送第三指示,第三指示用于确定终端成功接收到的背景流量传输信息。
第十方面中第一策略控制网元确定终端成功接收到的背景流量传输信息的具体实现方式可以参考上述对应地方的描述,此处不再赘述。此处终端成功接收到的背景流量传输信息可以指终端通过终端路由选择策略成功接收到的背景流量传输信息。
第十一方面,本申请实施例提供一种信息获取方法,包括:第二策略控制网元从用户数据管理网元处获取第三指示,第三指示用于确定终端成功接收到的背景流量传输信息。第二策略控制网元根据第三指示确定终端成功接收到的背景流量传输信息。
其中,第三指示的内容详见上述描述,此处不再赘述。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元根据第三指示,做策略决策,产生PCC规则。
在一种可能的设计中,在终端支持在终端路由策略中传输背景流量传输信息的情况下,该PCC规则中不包括终端成功接收到的背景流量传输信息。
在一种可能的设计中,本申请实施例提供的方法还包括:第二策略控制网元获取终端能力信息,以及根据终端能力信息确定终端支持在终端路由策略中传输背景流量传输信息。
在一种可能的设计中,第二策略控制网元获取终端能力信息包括:第二策略控制网元从用户数据管理网元处获取。或者第二策略控制网元从会话管理网元处获取终端能力信息。用户数据管理网元中的终端能力信息可以从第一策略控制网元或终端处获取。
在一种可能的设计中,第二策略控制网元为为终端的会话提供服务的策略控制网元。
在一种可能的设计中,第一策略控制网元为在终端路由选择策略中传输背景流量传输信息的策略控制网元。
第十二方面,本申请实施例提供了一种通信装置用于实现上述第一方面至第十一方面中任一方面的各种可能的设计中的各种方法。该通信装置可以为上述第一策略控制网元,或者包含上述第一策略控制网元的装置。或者,该通信装置可以为上述应用功能网元,或者包含上述应用功能网元的装置。或者,该通信装置可以为上述第二策略控制网元,或者包含上述第二策略控制网元的装置。该通信装置包括实现上述方法相应的模块、单元、或手段(means),该模块、单元、或means可以通过硬件实现,软件实现,或者通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。
第十三方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器和通信接口。其中,当该通信装置运行时,该处理器执行该通信装置中存储的该计算机执行指令,以使该通信装置执行如上述第一方面至第十一方面中任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为第一策略控制网元,或者为应用于第一策略控制网元中的芯片。例如,该通信装置可以为第二策略控制网元,或者为应用于第二策略控制网元中的芯片。例如,该通信装置可以为应用功能网元,或者为应用于应用功能网元中的芯片。
应理解,上述第十三方面中描述的通信装置中还可以包括:总线和存储器,存储器用于存储代码和数据。可选的,至少一个处理器通信接口和存储器相互耦合。
第十四方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令或计算机程序,当其在计算机上运行时,使得计算机可以执行上述第一方面至第十一方面中任一方面的各种可能的设计中的任一项的方法。
第十五方面,提供了一种包含指令或计算机程序的计算机程序产品,当指令或计算机程序在计算机上运行时,使得计算机可以执行上述第一方面至第十一方面中任一方面的各种可能的设计中的任一项的方法。
第十六方面,本申请提供一种芯片,应用于网元中,该芯片包括至少一个处理器 和通信接口,通信接口和至少一个处理器耦合,处理器用于运行计算机程序或指令,以执行第一方面至第十一方面中任一方面的各种可能的设计中的任一项的方法,通信接口用于与芯片之外的其它模块进行通信。该网元可以为第一策略控制网元。或者该网元可以为第二策略控制网元。或者该网元可以为应用功能网元。
可选的,本申请中上述描述的芯片还可以包括至少一个存储器,该至少一个存储器中存储有指令或计算机程序。
第十七方面,本申请实施例提供一种通信系统,包括:应用功能网元,以及与应用功能网元通信的第一策略控制网元。其中,第一策略控制网元,用于获取终端的终端能力信息,终端能力信息用于指示终端支持在终端的终端路由选择策略中传输背景流量传输信息。第一策略控制网元,还用于根据终端能力信息,确定在终端路由选择策略中传输背景流量传输信息;应用功能网元,用于确定在PCC规则中传输背景流量传输信息,以及用于向第一策略控制网元发送第一请求消息。
在一种可能的设计中,该第一策略控制网元,还用于向应用功能网元发送第一响应消息。该第一响应消息用于指示拒绝在PCC规则中传输背景流量传输信息。
在一种可能的设计中,该第一策略控制网元,还用于向应用功能网元发送第一通知消息。该第一通知消息用于指示在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,该第一策略控制网元,还用于向应用功能网元发送确认信息,该确认信息用于应用功能网元确定终端成功接收到的背景流量传输信息。
在一种可能的设计中,该第一策略控制网元,还用于向应用功能网元发送终端的标识信息和第二指示。其中,第二指示用于指示终端成功通过终端路由选择策略接收背景流量传输信息。
在一种可能的设计中,该应用功能网元,还用于向第一策略控制网元发送第四指示,该第四指示用于确定背景流量传输信息。
在一种可能的设计中,该应用功能网元,还用于向第一策略控制网元发送第二请求消息,该第二请求消息用于请求在终端路由选择策略中传输背景流量传输信息。该第一策略控制网元,还用于向应用功能网元发送第二通知消息,该第二通知消息用于使得应用功能网元确认可以在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,该通信系统还可以包括:用户数据管理网元或第二策略控制网元。其中,第一策略控制网元,还用于接收第一指示,第一指示用于指示终端成功通过终端路由选择策略接收背景流量传输信息。第一策略控制网元,还用于向用户数据管理网元或第二策略控制网元发送第三指示,第三指示用于确定终端成功接收到的背景流量传输信息。
在一种可能的设计中,第一策略控制网元,用于获取终端的终端能力信息,具体包括:从第二策略控制网元处获取终端能力信息。
在一种可能的设计中,第一策略控制网元,用于获取终端的终端能力信息,具体包括:第一策略控制网元,用于从用户数据管理网元中获取终端能力信息。
在一种可能的设计中,该通信系统还可以包括:终端。其中,第一策略控制网元,用于获取终端的终端能力信息,具体包括:第一策略控制网元,用于从终端处获取终端能力信息。
在一种可能的设计中,该通信系统中,第一策略控制网元,还用于采用终端路由选择策略向终端传输背景流量传输信息。
第十八方面,本申请实施例提供一种通信系统,包括:应用功能网元,以及与应用功能网元通信的第一策略控制网元。其中,应用功能网元,用于确定在PCC规则中传输背景流量传输信息。应用功能网元,还用于向第二策略控制网元发送第一请求消息。该第一请求消息用于指示第二策略控制网元在PCC规则中传输背景流量传输信息;第二策略控制网元,用于获取终端的终端能力信息,终端能力信息用于指示终端支持在终端的终端路由选择策略中传输背景流量传输信息。第二策略控制网元,还用于根据终端能力信息,确定不在策略与计费控制PCC规则中传输背景流量传输信息。
在一种可能的设计中,第二策略控制网元,还用于向应用功能网元发送第一响应消息。该第一响应消息用于指示拒绝在PCC规则中传输背景流量传输信息。
在一种可能的设计中,第二策略控制网元,还用于向应用功能网元发送用于指示不向会话管理网元发送第一PCC规则的指示信息。
在一种可能的设计中,第二策略控制网元,还用于向应用功能网元发送用于指示向会话管理网元发送第二PCC规则的指示信息。
在一种可能的设计中,第二策略控制网元,还用于向应用功能网元发送第四指示。
在一种可能的设计中,该通信系统还包括:第一策略控制网元或用户数据管理网元,第二策略控制网元,还用于向第一策略控制网元或用户数据管理网元发送终端能力信息。
在一种可能的设计中,该通信系统还包括:终端。第二策略控制网元,用于获取终端的终端能力信息,包括:第二策略控制网元具体用于从终端处获取终端能力信息。
在一种可能的设计中,第二策略控制网元,还用于从用户数据管理网元中获取第三指示,第三指示用于确定终端成功接收到的背景流量传输信息。
在一种可能的设计中,第二策略控制网元,还用于向应用功能网元发送第一通知消息,第一通知消息用于指示在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,第二策略控制网元,还用于采用终端路由选择策略向终端传输背景流量传输信息。
第十九方面,本申请实施例提供一种通信系统,包括:应用功能网元,以及与应用功能网元通信的第一策略控制网元。其中,第一策略控制网元,用于获取终端的终端能力信息,终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输背景流量传输信息。第一策略控制网元,用于根据终端能力信息,确定不在终端路由选择策略中传输背景流量传输信息。应用功能网元,用于确定在终端路由选择策略中传输背景流量传输信息。应用功能网元,还用于向第一策略控制网元发送第一请求消息,第一请求消息用于指示第一策略控制网元在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,应用功能网元,还用于向第一策略控制网元发送第一响应消息。该第一响应消息用于指示拒绝在终端路由选择策略中传输背景流量传输信息。
在一种可能的实现方式中,第一响应消息中还可以包括:原因值,该原因值用于指示终端不支持在终端路由选择策略中传输背景流量传输信息。
在一种可能的实现方式中,应用功能网元,还用于向第一策略控制网元发送用于指示在PCC规则中传输背景流量传输信息的第一通知消息。
在一种可能的实现方式中,应用功能网元,还用于向第一策略控制网元发送第四指示。
在一种可能的实现方式中,该通信系统包括:终端。第二策略控制网元,用于获取终端的终端能力信息,具体包括:第二策略控制网元具体用于从终端处获取终端能力信息。
在一种可能的实现方式中,该通信系统还包括:第一策略控制网元或用户数据管理网元。其中,第二策略控制网元,还用于向第一策略控制网元或用户数据管理网元发送终端能力信息。
在一种可能的实现方式中,第二策略控制网元,还用于确定不向会话管理网元发送第一PCC规则,第一PCC规则与终端成功接收到的背景流量传输信息对应。
在一种可能的实现方式中,第二策略控制网元,还用于向会话管理网元发送第二PCC规则,第二PCC规则与未在终端路由选择策略中传输的背景流量传输信息对应。
在一种可能的实现方式中,第二策略控制网元,还用于从用户数据管理网元中获取第三指示。
在一种可能的实现方式中,第二策略控制网元,还用于向应用功能网元发送第一通知消息,第一通知消息用于指示在终端路由选择策略中传输背景流量传输信息。
在一种可能的实现方式中,第二策略控制网元,还用于采用终端路由选择策略向终端传输背景流量传输信息。
在一种可能的实现方式中,第二策略控制网元,还用于确定向终端传输的背景流量传输信息。
第二十方面,本申请实施例提供一种通信系统,包括:应用功能网元,以及与应用功能网元通信的第二策略控制网元。第二策略控制网元,用于获取终端的终端能力信息,终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输背景流量传输信息。第二策略控制网元,还用于根据终端能力信息,确定在PCC规则中传输背景流量传输信息。应用功能网元,用于确定在终端路由选择策略中传输背景流量传输信息。应用功能网元,还用于向第二策略控制网元发送第一请求消息。该第一请求消息用于指示第二策略控制网元在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,第二策略控制网元,用于获取终端的终端能力信息,具体包括:第二策略控制网元具体用于从终端处获取终端能力信息。
在一种可能的设计中,第二策略控制网元,还用于向应用功能网元发送第一响应消息。该第一响应消息用于指示拒绝在终端路由选择策略中传输背景流量传输信息。
在一种可能的设计中,第二策略控制网元,还用于向应用功能网元发送用于指示在PCC规则中传输背景流量传输信息的第一通知消息。
在一种可能的设计中,第二策略控制网元,还用于向会话管理网元发送PCC规则,PCC规则包括背景流量传输信息。
第二十一方面,本申请实施例提供一种芯片系统,包括:存储器,用于存储计算机程序;处理器,用于从存储器调用并运行所述计算机程序,使得安装有所述芯片系 统的设备执行如第一方面以及第一方面的各种可能的实现方式中的任一项,或第二方面以及第二方面的各种可能的实现方式中的任一项,或第三方面以及第三方面的各种可能的实现方式中的任一项,或第四方面以及第四方面的各种可能的实现方式中的任一项,或第五方面以及第五方面的各种可能的实现方式中的任一项,或第六方面以及第六方面的各种可能的实现方式中的任一项,或第七方面以及第七方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第九方面以及第九方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第十方面以及第十方面的各种可能的实现方式中的任一项,或第十一方面以及第十一方面的各种可能的实现方式中的任一项描述的传输背景流量传输信息的方法。
第二十二方面,本申请实施例提供一种处理器,用于执行如第一方面以及第一方面的各种可能的实现方式中的任一项,或第二方面以及第二方面的各种可能的实现方式中的任一项,或第三方面以及第三方面的各种可能的实现方式中的任一项,或第四方面以及第四方面的各种可能的实现方式中的任一项,或第五方面以及第五方面的各种可能的实现方式中的任一项,或第六方面以及第六方面的各种可能的实现方式中的任一项,或第七方面以及第七方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第九方面以及第九方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第十方面以及第十方面的各种可能的实现方式中的任一项,或第十一方面以及第十一方面的各种可能的实现方式中的任一项描述的传输背景流量传输信息的方法。
第二十三方面,本申请实施例提供一种用来执行如第一方面以及第一方面的各种可能的实现方式中的任一项,或第二方面以及第二方面的各种可能的实现方式中的任一项,或第三方面以及第三方面的各种可能的实现方式中的任一项,或第四方面以及第四方面的各种可能的实现方式中的任一项,或第五方面以及第五方面的各种可能的实现方式中的任一项,或第六方面以及第六方面的各种可能的实现方式中的任一项,或第七方面以及第七方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第九方面以及第九方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第十方面以及第十方面的各种可能的实现方式中的任一项,或第十一方面以及第十一方面的各种可能的实现方式中的任一项描述的传输背景流量传输信息的方法的装置。
第二十四方面,本申请实施例提供一种通信装置,包括:存储器,用于存储计算机程序;处理器,用于从所述存储器调用并运行所述计算机程序,以执行如第一方面以及第一方面的各种可能的实现方式中的任一项,或第二方面以及第二方面的各种可能的实现方式中的任一项,或第三方面以及第三方面的各种可能的实现方式中的任一项,或第四方面以及第四方面的各种可能的实现方式中的任一项,或第五方面以及第五方面的各种可能的实现方式中的任一项,或第六方面以及第六方面的各种可能的实现方式中的任一项,或第七方面以及第七方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第九方面以及第九方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式 中的任一项,或第十方面以及第十方面的各种可能的实现方式中的任一项,或第十一方面以及第十一方面的各种可能的实现方式中的任一项描述的传输背景流量传输信息的方法。
第二十五方面,本申请实施例提供一种通信装置,包括:处理器和存储器;所述存储器用于存储计算机执行指令,当所述通信装置运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述通信装置执行如第一方面以及第一方面的各种可能的实现方式中的任一项,或第二方面以及第二方面的各种可能的实现方式中的任一项,或第三方面以及第三方面的各种可能的实现方式中的任一项,或第四方面以及第四方面的各种可能的实现方式中的任一项,或第五方面以及第五方面的各种可能的实现方式中的任一项,或第六方面以及第六方面的各种可能的实现方式中的任一项,或第七方面以及第七方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第九方面以及第九方面的各种可能的实现方式中的任一项,或第八方面以及第八方面的各种可能的实现方式中的任一项,或第十方面以及第十方面的各种可能的实现方式中的任一项,或第十一方面以及第十一方面的各种可能的实现方式中的任一项描述的传输背景流量传输信息的方法。
可以理解地,上述提供的计算机存储介质,通信系统,以及计算机程序产品均用于执行上文所提供的对应的方法,因此,其所能达到的有益效果可参考上文所提供的对应的方法中的有益效果,此处不再赘述。
附图说明
图1为本申请实施例PDU会话示意图;
图2a为本申请实施例提供的一种通信系统的架构图;
图2b为本申请实施例提供的另一种通信系统的架构图;
图3a为本申请实施例中的通信系统在非漫游5G网络架构中的应用示意图一;
图3b为本申请实施例中的通信系统在非漫游5G网络架构中的应用示意图二;
图3c为本申请实施例中的通信系统在漫游5G网络架构中的归属路由场景中的应用示意图一;
图3d为本申请实施例中的通信系统在漫游5G网络架构中的归属路由场景中的应用示意图二;
图3e为本申请实施例中的通信系统在漫游5G网络架构中的本地疏导场景中的应用示意图一;
图3f为本申请实施例中的通信系统在漫游5G网络架构中的本地疏导中的应用示意图二;
图3g为本申请实施例提供的一种本地疏导场景下通信系统的架构图;
图3h为本申请实施例提供的一种归属路由场景下通信系统的架构图;
图4为本申请实施例提供一种通信设备的结构示意图;
图5为本申请实施例提供的一种传输BDT信息的方法流程示意图;
图6为本申请实施例提供的一种PDU会话建立流程示意图;
图7为本申请实施例提供的另一种传输BDT信息的方法流程示意图;
图8为本申请实施例提供的再一种传输BDT信息的方法流程示意图;
图9为本申请实施例提供的又一种传输BDT信息的方法流程示意图;
图10为本申请实施例提供的一种传输BDT信息的装置的结构示意图。
具体实施方式
为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。例如,第一请求消息和第二请求消息仅仅是为了区分不同的请求消息,并不对其先后顺序进行限定。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
需要说明的是,本申请中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其他实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
本申请实施例的技术方案可以应用于各种通信系统,例如:码分多址(code division multiple access,CDMA)、时分多址(time division multiple access,TDMA)、频分多址(frequency division multiple access,FDMA)、正交频分多址(orthogonal frequency-division multiple access,OFDMA)、单载波频分多址(single carrier FDMA,SC-FDMA)和其它系统等。术语“系统”可以和“网络”相互替换。3GPP在长期演进(long term evolution,LTE)和基于LTE演进的各种版本是使用E-UTRA的UMTS的新版本。5G通信系统、新空口(new radio,NR)是正在研究当中的下一代通信系统。此外,通信系统还可以适用于面向未来的通信技术,都适用本申请实施例提供的技术方案。
本申请实施例描述的系统架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。本申请实施例中以提供的方法应用于NR系统或5G网络中为例进行说明。
在介绍本申请实施例之前,首先解释本申请实施例涉及到的相关名词:
1、分组数据单元(Packet Data Unit,PDU)会话:终端和数据网络(data network, DN)之间的用户面连接,用于提供一个PDU连接服务。其中,5G核心网(core network,CN)支持的PDU连接服务,是指提供终端和由数据网络名称(data network name,DNN)确定的DN之间PDU交换的服务。例如,用户面连接可以包括如下网元:终端、基站、用户面网元以及DN。
2、终端路由选择策略(UE Route Selection Policy,URSP):也可以称为用户设备路由选择策略,用于将应用关联到一个已经建立的PDU会话或为其建立一个新的PDU会话,或者将其转移到非3GPP接入进行传输。
3、容器(Container):携带某种消息的信息元。该容器中携带的信息元在由源设备经其他设备转发至目标设备的过程中,对其他设备透传。也即其他设备不解析容器中的信息元,目标设备可以解析容器中的信息元。
4、背景流量传输(Background Data Transfer,BDT)信息:应用通过和网络侧协商在特定的时间,地点以特殊费率传输数据。
目前,第一策略控制网元可以通过非接入层(Non-access stratum,NAS)消息向终端发送终端策略(Policy),其中包含URSP,用作选择PDU会话。URSP中可以通过应用标识来描述一个应用,具体详见下述URSP的结构。
其中,URSP中包含一条或多条URSP规则(Rules),如表1所示:
表1 URSP结构
Figure PCTCN2020087301-appb-000001
表2 URSP规则
Figure PCTCN2020087301-appb-000002
Figure PCTCN2020087301-appb-000003
表3 RSD的内容
Figure PCTCN2020087301-appb-000004
应理解,表3中的每个终端路由选择信息具有不同的优先级。
终端每检测到新的应用,终端按照Rule precedence的顺序评估该应用是否匹配规则中的Traffic descriptor。可以匹配时,终端按照Route Selection Descriptor Precedence的顺序选择该规则中的Route Selection Descriptor。当有符合要求(属性与Route  Selection Descriptor相同)的PDU会话存在时,终端将该应用的数据包路由到该PDU会话上(有多个终端会根据配置等挑选其中一个),若没有符合要求的PDU会话,终端会发起PDU会话的建立,建立一个拥有该属性的会话。
简而言之,如图1所示,终端会先检测有没有符合该应用(也可以称为数据包(packet))要求(数据网络名称(data network name,DNN),切片等)的PDU会话,若有,则将当前应用映射到该PDU会话上。
图1中不同的图案代表不同的切片(单个网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI))。虚线代表未建立的PDU会话(例如,数据包A对应的PDU会话),实线代表已经建立的PDU会话(例如,数据包B对应的PDU会话、数据包C对应的PDU会话。其中,会话和业务连续性(Session and service continuity,SSC)。
如图2a所示,图2a示出了本申请实施例提供的一种通信系统的结构示意图,该通信系统包括:应用功能网元10、与应用功能网元10通信的第一策略控制网元20。其中,应用功能网元10和第一策略控制网元20之间可以直接通信,也可以通过其他设备的转发进行通信,本申请实施例对此不作具体限定。
在第一种示例中,第一策略控制网元20,用于获取终端的终端能力信息,终端能力信息用于指示终端支持在终端的终端路由选择策略中传输背景流量传输信息。第一策略控制网元20根据终端能力信息,确定在终端路由选择策略中传输背景流量传输信息。应用功能网元10,用于确定在PCC规则中传输背景流量传输信息。应用功能网元10还用于向第一策略控制网元20发送第一请求消息,该第一请求消息用于指示第一策略控制网元20在PCC规则中传输背景流量传输信息。其中,上述方案的具体实现将在后续方法实施例中详细阐述,在此不予赘述。
基于第一策略控制网元根据终端能力信息确定终端支持在终端的终端路由选择策略中传输背景流量传输信息。这样可以提高在终端路由选择策略中传输背景流量传输信息的可靠性。避免由于终端不支持在终端的终端路由选择策略中传输背景流量传输信息,而在终端路由选择策略中传输背景流量传输信息导致的终端无法成功获取背景流量传输信息。
在第二种示例中,第一策略控制网元20,用于获取终端的终端能力信息,终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输背景流量传输信息。第一策略控制网元20,还用于根据终端能力信息,确定不在终端路由选择策略中传输背景流量传输信息。该应用功能网元10,用于确定在终端路由选择策略中传输背景流量传输信息。应用功能网元10,还用于向第一策略控制网元发送第一请求消息,第一请求消息用于指示第一策略控制网元20在终端路由选择策略中传输背景流量传输信息。其中,上述方案的具体实现将在后续方法实施例中详细阐述,在此不予赘述。
在一种可选的实现方式中,如图2a所示的通信系统中还可以包括:与应用功能网元10通信的第二策略控制网元。应用功能网元10和第二策略控制网元30之间可以直接通信,也可以通过其他设备的转发进行通信,本申请实施例对此不作具体限定。
在一种可选的实现方式中,如图2a所示的通信系统中还可以包括:终端或者用户数据管理网元。终端通过接入网接入核心网,并可以与核心网中的网元通信。其中, 应用功能网元、第一策略控制网元、用户数据管理网元以及第二策略控制网元属于核心网中的网元。
具体的,第一策略控制网元20与第二策略控制网元、用户数据管理网元以及终端之间的交互可以参考下述实施例中方法部分的描述,此处不再赘述。
如图2b所示,图2b示出了本申请实施例提供的另一种通信系统的结构示意图,该通信系统包括:应用功能网元10、与应用功能网元10通信的第二策略控制网元30。其中,应用功能网元10和第二策略控制网元30之间可以直接通信,也可以通过其他设备的转发进行通信,本申请实施例对此不作具体限定。
在第三种示例中,第二策略控制网元30,用于获取终端的终端能力信息,终端能力信息用于指示终端支持在终端的终端路由选择策略中传输背景流量传输信息。第二策略控制网元30,还用于根据终端能力信息,确定不在策略与计费控制PCC规则中传输背景流量传输信息。应用功能网元10确定在PCC规则中传输背景流量传输信息。应用功能网元10向第二策略控制网元30发送第一请求消息。该第一请求消息用于指示第二策略控制网元在PCC规则中传输背景流量传输信息。其中,上述方案的具体实现将在后续方法实施例中详细阐述,在此不予赘述。
本申请实施例提供一种通信系统,该通信系统通过第二策略控制网元获取终端的终端能力信息,第二策略控制网元根据终端能力信息确定终端支持在终端的终端路由选择策略中传输背景流量传输信息下,可以确定在终端的终端路由选择策略中传输背景流量传输信息,而避免在PCC规则中传输背景流量传输信息。
在第四种示例中,第二策略控制网元30,用于获取终端的终端能力信息,终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输背景流量传输信息。第二策略控制网元30,还用于根据终端能力信息,确定在PCC规则中传输背景流量传输信息。应用功能网元10,用于确定在终端路由选择策略中传输背景流量传输信息。应用功能网元10,用于向第二策略控制网元30发送第一请求消息。该第一请求消息用于指示第二策略控制网元30在终端路由选择策略中传输背景流量传输信息。其中,上述方案的具体实现将在后续方法实施例中详细阐述,在此不予赘述。
在一种可选的实现方式中,如图2b所示的通信系统中还可以包括:与应用功能网元10通信的第一策略控制网元。应用功能网元10和第一策略控制网元之间可以直接通信,也可以通过其他设备的转发进行通信,本申请实施例对此不作具体限定。
在一种可选的实现方式中,如图2b所示的通信系统中还可以包括:终端或者用户数据管理网元。终端通过接入网接入核心网,并可以与核心网中的网元通信。其中,应用功能网元、第二策略控制网元、用户数据管理网元以及第一策略控制网元属于核心网中的网元。
具体的,第二策略控制网元30与第一策略控制网元、用户数据管理网元以及终端之间的交互可以参考下述实施例中方法部分的描述,此处不再赘述。
可选的,图2a或图2b所示的通信系统可以应用于目前的5G网络架构以及未来出现的其它的网络架构,本申请实施例对此不作具体限定。
下述将以如图2a或图2b所示的通信系统适用于5G网络架构为例,5G策略控制架构是5G通信系统架构的一部分,5G通信系统架构请见图3a-图3f,根据5G现有 标准,会话管理网元和移动管理网元可以选择不同的策略控制网元进行策略控制。为了区分方便,本申请实施例中将与移动管理网元相连的策略控制网元称为第一策略控制网元。将与会话管理网元相连的策略控制网元称为第二策略控制网元。即移动管理网元选择的策略控制网元称为第一策略控制网元,会话管理网元选择的策略控制网元称为第二策略控制网元)。
由于5G网络架构进一步包含非漫游场景和漫游场景,下述实施例将分别介绍:
在5G网络架构中,非漫游场景下,该5G网络架构可以适用于图3a的基于接口的架构,也可以适用于如图3b所示基于服务化接口的架构。在漫游场景下,该5G网络架构既用于图3c和图3e所示的基于接口的架构,也可以适用于如图3d和图3f所示的基于服务化接口的架构。
示例性的,以图2a和图2b所示的通信系统应用于目前的非漫游5G网络架构中的基于接口的架构为例,则如图3a所示,上述的会话管理网元可以为该非漫游5G网络架构中的会话管理功能(Session Management Function,SMF)网元。策略控制网元所对应的网元或者实体可以为该非漫游5G网络架构中的策略控制功能(Policy Control Function,PCF)网元。移动管理网元所对应的网元或者实体可以为该非漫游5G网络架构中的接入和移动性管理功能(Access and Mobility Management Function,AMF)网元。应用功能网元所对应的网元或者实体可以为该非漫游5G网络架构中的应用功能(application function,AF)。也即第一策略控制网元可以为第一PCF网元,第二策略控制网元可以为第二PCF网元。
此外,如图3a所示,该非漫游5G网络架构中还可以包括:接入设备(例如,接入网络(access network,AN)或者无线接入网络(radio access network,RAN))、统一数据库(Unified Data Repository,UDR)、统一数据管理(Unified Data Management,UDM)、或绑定支持功能(binding support function,BSF)、用户面功能(user plane function,UPF)网元、数据网络(data network,DN)、鉴权服务器功能(authentication server function,AUSF)网元、网络切片选择功能(Network Slice Selection Function,NSSF)网元。网络能力开放功能(network exposure function,NEF)网元、以及网络仓库贮存功能(network repository function,NRF)网元等,本申请实施例对此不作具体限定。用户数据管理网元可以对应UDR、UDM中的任一个或多个。
其中,终端通过下一代网络(Next generation,N1)接口(简称N1)与AMF网元通信。接入设备通过N2接口(简称N2)与AMF网元通信。接入设备通过N3接口(简称N3)与UPF网元通信。UPF网元通过N6接口(简称N6)与DN通信。UPF网元通过N4接口(简称N4)与SMF网元通信。AMF网元通过N11接口(简称N11)与SMF网元通信。AMF网元通过N8接口(简称N8)与UDM网元通信。SMF网元通过N7接口(简称N7)与PCF网元通信。SMF网元通过N10接口(简称N10)与UDM网元通信。AMF网元通过N12接口(简称N12)与AUSF网元通信。AMF网元通过N22接口(简称N22)与NSSF网元通信。AUSF网元通过N13接口(简称N13)与UDM网元通信。UDM网元与UDR网元通信。PCF网元与UDR网元通信,BSF网元与PCF网元和SMF网元通信。
如图3b示出了非漫游5G网络架构中基于服务化接口的架构,该架构与图3a的 区别在于,在图3b中5GC中的控制面网元也可以采用服务化接口进行交互。例如,AMF网元、AUSF网元、SMF网元、UDM网元、UDR网元、NRF网元、NEF网元、NSSF网元或者PCF网元采用服务化接口进行交互。比如,AMF网元对外提供的服务化接口可以为Namf。SMF网元对外提供的服务化接口可以为Nsmf。UDM网元对外提供的服务化接口可以为Nudm。UDR网元对外提供的服务化接口可以为Nudr。PCF网元对外提供的服务化接口可以为Npcf。BSF网元对外提供的服务化接口可以为Nbsf。NEF网元对外提供的服务化接口可以为Nnef。NRF网元对外提供的服务化接口可以为Nnrf。NSSF网元对外提供的服务化接口可以为Nnssf。应理解,图3b中各种服务化接口的名称的相关描述可以参考23501标准中的5G系统架构(5G system architecture)图,在此不予赘述。
需要说明的是,图3a和图3b仅是示例性的给出一个SMF网元和PCF网元。当然,该非漫游5G网络架构中可能包括多个SMF网元、和PCF网元,如包括SMF网元1和SMF网元2,其中,SMF网元1与PCF网元1通信,SMF网元2与PCF网元2通信,本申请实施例对此不作具体限定。其中,各个网元之间的连接方式可参考图3a或图3b所示的非漫游5G网络架构,在此不再一一赘述。
在图3a或图3b所示的架构中,各个网元均归属于归属公共陆地移动网(home public land mobile network,HPLMN)中。
或者,示例性的,以图2a或图2b所示的通信系统应用于目前的漫游5G网络架构中的归属路由场景为例,则如图3c所示,上述的会话管理网元所对应的网元或者实体可以为该归属路由场景中的归属地SMF(home SMF,H-SMF)网元。第二策略控制网元指与H-SMF网元连接的SM-PCF网元。上述的移动管理网元所对应的网元或者实体可以为该归属路由场景中的AMF网元。第一策略控制网元可以为拜访地AM-PCF网元,和归属地AM-PCF网元。该应用功能网元10所对应的网元或者实体可以为该归属路由场景中的AF网元。
需要说明的是,本申请实施例中对与SMF网元连接的PCF网元的名称以SM-PCF网元,对与AMF网元连接的PCF网元的名称以AM-PCF网元为例,当然还可以将与SMF网元连接的PCF网元命名为其他名称,将与AMF网元连接的PCF网元命名为其他名称,本申请实施例对此不做限定。AM-PCF和SM-PCF可以是同一个。
此外,如图3c所示,该归属路由场景中还可以包括终端、接入设备(例如,AN或者RAN)、AMF网元、拜访地SMF(visited SMF,V-SMF)网元、归属地UPF(home UPF,H-UPF)网元、拜访地UPF(visited UPF,V-UPF)网元、拜访地PCF(visited PCF,V-PCF)网元、拜访地NSSF(visited NSSF,V-NSSF)网元、AUSF网元、DN、AF网元、归属地NSSF(home NSSF,H-NSSF)网元。
其中,终端、接入设备、AMF网元、V-PCF网元、V-SMF网元以及V-UPF网元、V-NSSF网元、V-PCF网元归属于拜访地公共陆地移动网(visited public land mobile network,VPLMN)中。UDM网元、UDR网元、H-PCF网元、H-NSSF网元、AF网元、H-SMF网元、H-UPF网元以及BSF网元归属于HPLMN中。H-PCF网元进行会话管理相关的策略控制。
如图3c所示,终端通过N1与AMF网元通信。接入设备通过N2接口(简称N2) 与AMF网元通信。接入设备通过N3接口(简称N3)与V-UPF网元通信。V-UPF网元通过N9接口(简称N9)与H-UPF网元通信。AMF网元通过N11接口(简称N11)与V-SMF网元通信。AMF网元通过N8接口(简称N8)与UDM网元通信。AMF网元通过N22接口(简称N22)与V-NSSF网元通信。V-NSSF网元通过N31接口(简称N31)与H-NSSF网元通信。AMF网元通过N12接口(简称N12)与AUSF网元通信。AMF网元通过N15接口(简称N15)与V-PCF网元通信。V-PCF网元通过N24接口(简称N24)与H-PCF网元通信。V-SMF网元通过N16接口(简称N16)与H-SMF网元通信。H-SMF网元通过N7接口(简称N7)与H-PCF网元通信。H-SMF网元通过N4接口(简称N4)与H-UPF网元通信。V-SMF网元通过N4接口(简称N4)与V-UPF网元通信。H-SMF网元通过N10接口(简称N10)与UDM网元通信。H-UPF网元通过N6接口(简称N6)与DN通信。H-PCF网元与UDR网元通信,BSF网元与H-PCF网元和H-SMF网元通信。H-PCF网元通过N5接口(简称N5)与AF网元通信。
如图3d示出了漫游5G网络架构中归属路由场景下基于服务化接口的架构,该架构与图3c的区别在于,在图3d中5GC中的控制面网元也可以采用服务化接口进行交互。比如,H-SMF网元对外提供的服务化接口可以为Nsmf。V-SMF网元对外提供的服务化接口可以为Nsmf。UDM网元对外提供的服务化接口可以为Nudm。UDR网元对外提供的服务化接口可以为Nudr。V-PCF网元对外提供的服务化接口可以为Npcf。H-PCF网元对外提供的服务化接口可以为Npcf。BSF网元对外提供的服务化接口可以为Nbsf。其余控制面网元的服务化接口名称可以参考上述图3b处的描述,此处不再赘述。
应理解,在图3d示出了的网络结构中HPLMN中还包括H-安全边缘保护代理(Security Edge Protection Proxy,SEPP),HPLMN中还包括:V-SEPP。其中,H-SEPP和V-SEPP之间通过N32接口(简称N32)通信。
或者,示例性的,以图2a或图2b所示的通信系统应用于目前的漫游5G网络架构中的Local breakout的漫游场景为例,则如图3e所示,上述的移动管理网元所对应的网元或者实体可以为该Local breakout的漫游场景中的AMF网元。上述的会话管理网元所对应的网元或者实体可以为该Local breakout的漫游场景中的V-SMF网元。
此外,如图3e所示的Local breakout的漫游场景中还可以包括:接入设备(例如,AN或者RAN)、AMF网元、SMF网元、UPF网元、DN、H-PCF网元、AUSF网元、AF网元、NSSF网元。
其中,终端、接入设备、AMF网元、V-PCF网元、V-SMF网元、UPF网元、NSSF网元、BSF、UDR网元、DN归属于VPLMN中。AUSF网元、UDM网元、H-PCF网元归属于归属HPLMN中。V-PCF网元进行会话管理相关的策略控制。
图3e中各个网元之间的通信接口名称可以参考图3c中的描述,此处不再赘述。
如图3f示出了漫游5G网络架构的Local breakout的漫游场景中基于服务化接口的架构,该架构与图3e的区别在于,在图3f中5GC中的控制面网元也可以采用服务化接口进行交互。具体的各个网元的服务化接口名称可以参考图3d中的描述,此处不再赘述。
需要说明的是,图3c-图3f仅是示意性的给出一个V-SMF网元、一个H-SMF网元、一个H-UPF网元以及一个V-UPF网元。当然,该归属路由场景或者Local breakout的漫游场景中可能包括多个V-SMF网元、多个H-SMF网元、多个V-UPF网元以及多个H-UPF网元,如包括V-SMF网元1、以及与V-SMF网元1通信的H-SMF网元1,V-SMF网元2、以及与V-SMF网元2通信的H-SMF网元2等。其中,V-SMF网元1与V-UPF网元1通信,V-SMF网元2与V-UPF网元2通信。H-SMF网元1与H-UPF网元1通信,H-SMF网元2与H-UPF网元2通信,本申请实施例对此不作具体限定。
需要说明的是,图3a-图3f中的各个网元或者各个网元之间的接口名字只是一个示例,具体实现中网元名字或者接口名字可能为其他名字,本申请实施例对此不作具体限定。
由于5G网络架构进一步包含非漫游场景和漫游场景,下述实施例将结合架构图如图3g和图3h分别介绍:
示例性的,如图2a或图2b所示的通信系统应用于目前的漫游场景中的本地疏导场景(Local breakout,LBO)的漫游场景为例,在图3g中第一策略控制网元20包括:拜访地第一策略控制网元以及归属地第一策略控制网元。第二策略控制网元30包括:拜访地第二策略控制网元。其中,拜访地第一策略控制网元与归属地第一策略控制网元连接。拜访地第一策略控制网元与移动管理网元连接。拜访地第二策略控制网元与拜访地会话管理网元连接。
示例性的,如图2a或图2b所示的通信系统应用于目前的漫游场景中的归属路由(home routed,HR)漫游场景为例,图3h与图3g的区别在于:在图3h中第二策略控制网元30包括:归属地第二策略控制网元。其中,归属地第二策略控制网元与归属地会话管理网元连接。归属地会话管理网元与拜访地会话管理网元连接。拜访地会话管理网元与移动管理网元连接。
注1:漫游场景的LBO和HR均是指会话管理(Session management,SM)相关的策略控制,与移动性管理(Mobility Management,MM)策略及终端策略无关。
注2:第一策略控制网元和第二策略控制网元可以是同一个策略控制网元。
注3:漫游场景下,如图3g和图3h所示第一策略控制网元包括:拜访地第一策略控制网元和归属地第一策略控制网元。在LBO漫游场景下,拜访地会话管理网元与拜访地第二策略控制网元相连,用于进行SM相关的策略控制。在HR漫游场景下,归属地会话管理网元与归属地第二策略控制网元相连进行SM相关的策略控制。
可选的,本申请实施例中所涉及到的终端(terminal)可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备;还可以包括用户单元(subscriber unit)、蜂窝电话(cellular phone)、智能电话(smart phone)、无线数据卡、个人数字助理(personal digital assistant,PDA)电脑、平板型电脑、无线调制解调器(modem)、手持设备(handheld)、膝上型电脑(laptop computer)、无绳电话(cordless phone)或者无线本地环路(wireless local loop,WLL)台、机器类型通信(machine type communication,MTC)终端、用户设备(user equipment,UE),移动台(mobile station,MS),终端设备(terminal device)或者中继用户设备等。其中,中继用户设备例如可以是5G家庭网关(residential gateway,RG)。为方便 描述,本申请中,上面提到的设备统称为终端。
可选的,本申请实施例中所涉及的接入设备指的是接入核心网的设备,例如可以是基站,宽带网络业务网关(broadband network gateway,BNG),汇聚交换机,非第三代合作伙伴计划(3rd generation partnership project,3GPP)接入设备等。基站可以包括各种形式的基站,例如:宏基站,微基站(也称为小站),中继站,接入点等。
应理解,终端可以通过接入网设备接入图3a-图3f所示的系统时,5G核心网(5Gcore network,5GC)中的网元(例如,NSSF网元)为终端分配一个或多个网络切片。每个网络切片可以包括:UPF网元、SMF网元、NRF网元以及PCF网元中的一个或者多个。
上述图3a-图3f中所涉及到的各个网元的功能如下:
UPF网元,主要功能包含:数据包路由和传输、包检测、业务用量上报、QoS处理、合法监听、上行包检测、下行数据包存储等用户面相关的功能。
AMF网元,主要功能包含:连接管理、移动性管理、注册管理、接入认证和授权、可达性管理、或,安全上下文管理等接入和移动性相关的功能。
SMF网元,主要功能包含:会话管理(如会话建立、修改和释放,包含UPF和AN之间的隧道维护)、UPF网元的选择和控制、业务和会话连续性(Service and Session Continuity,SSC)模式选择、或,漫游等会话相关的功能。
PCF网元,主要功能包含:统一策略制定、策略控制的提供和从UDR中获取策略决策相关的签约信息等策略相关的功能。
NSSF网元,主要功能包含:为终端选择一组网络切片实例、或,确定允许的NSSAI和确定可以服务终端的AMF网元集等。
NRF网元,主要功能包括:服务发现功能,维护可用的网络功能(Network Function,NF)实例的NF文本以及NF实例支持的服务。
AF网元,与3GPP核心网交互提供业务或者服务,包括与NEF交互,或,策略架构交互等。
NEF网元,主要功能包括:安全的开放3GPP网络功能提供的业务和能力,有内部开放,或者开放给第三方等。转化或翻译与AF交互的信息和内部网络功能交互德行信息,如AF服务标识和内部5G核心网信息如DNN,S-NSSAI等;
UDM网元,支持3GPP认证和秘钥协商机制中的认证信任状处理,用户身份处理,接入授权,注册和移动性管理,签约管理,或,短消息管理等。
AUSF网元,与UDM网元交互获取用户信息,并执行认证相关的功能,如生成中间秘钥等。
UDR,用于存储签约数据(Subscribed Data),策略信息(Policy Data),应用数据(Application Data)等。
本申请实施例图3a-图3f中的UDM,PCF网元和NEF可以使用数据存储架构(Data storage architecture),将背景流量传输信息和终端能力信息存储在UDR中。
应理解,本申请实施例中的PCF网元可以通过N3接口分别将背景流量传输信息和终端能力信息存储在UDR中。例如,UDR中可以存储背景流量传输信息和终端能力信息。
可选的,本申请实施例中所涉及到的终端(terminal)可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备;还可以包括用户单元(subscriber unit)、蜂窝电话(cellular phone)、智能电话(smart phone)、无线数据卡、个人数字助理(personal digital assistant,PDA)电脑、平板型电脑、无线调制解调器(modem)、手持设备(handheld)、膝上型电脑(laptop computer)、无绳电话(cordless phone)或者无线本地环路(wireless local loop,WLL)台、机器类型通信(machine type communication,MTC)终端、用户设备(user equipment,UE),移动台(mobile station,MS),终端设备(terminal device)或者中继用户设备等。其中,中继用户设备例如可以是5G家庭网关(residential gateway,RG)。为方便描述,本申请中,上面提到的设备统称为终端。
图4所示为本申请实施例提供的通信设备的硬件结构示意图。本申请实施例中的第一策略控制网元、第二策略控制网元或者应用功能网元的结构可以参考该通信设备400。该通信设备400包括处理器401,以及至少一个通信接口(图4中仅是示例性的以包括通信接口404为例进行说明)。
处理器401可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。
通信接口404,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。
在一种可能的实现中,该通信设备400还可以包括通信线路402和存储器403。
其中,通信线路402可包括一通路,在上述组件之间传送信息。
存储器403可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路402与处理器相连接。存储器也可以和处理器集成在一起。
其中,存储器403用于存储执行本申请方案的计算机执行指令,并由处理器401来控制执行。处理器401用于执行存储器403中存储的计算机执行指令,从而实现本申请下述实施例提供的策略控制方法。
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。
在具体实现中,作为一种实施例,处理器401可以包括一个或多个CPU,例如图4中的CPU0和CPU1。
在具体实现中,作为一种实施例,通信设备400可以包括多个处理器,例如图4 中的处理器401和处理器408。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
在具体实现中,作为一种实施例,通信设备400还可以包括输出设备405和输入设备406。输出设备405和处理器401通信,可以以多种方式来显示信息。例如,输出设备405可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备406和处理器401通信,可以以多种方式接收用户的输入。例如,输入设备406可以是鼠标、键盘、触摸屏设备或传感设备等。
上述的通信设备400可以是一个通用设备或者是一个专用设备。在具体实现中,通信设备400可以是台式机、便携式电脑、网络服务器、掌上电脑(personal digital assistant,PDA)、移动手机、平板电脑、无线终端设备、嵌入式设备或有图4中类似结构的设备。本申请实施例不限定通信设备400的类型。
下面将结合图2a至图3f对本申请实施例提供的传输背景流量传输信息的方法进行具体阐述。
需要说明的是,本申请下述实施例中各个网元之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,本申请实施例对此不作具体限定。
如表4所示,可以在URSP中新引入Route Selection Validation Criteria(路由选择校验条件),UE只有在符合路由选择校验条件时,才会应用该条URSP规则。具体包含时间窗信息和位置条件信息。
表4
Figure PCTCN2020087301-appb-000005
在URSP中携带路由选择校验条件的方式以发送BDT信息的方式可以被称为 xBDT方式。
由于携带路由选择校验条件,因此第一策略控制网元通过URSP向终端下发BDT信息时,终端是否被会成功使用BDT信息,第一策略控制网元并不知晓。此外,网络侧可以通过URSP向终端下发BDT信息,也可以在会话进行中通过PCC规则向终端下发BDT信息,这两种方式只要其中之一就可以了。同时进行只会造成控制的混乱或信令的冗余。基于此,本申请实施例提供一种基于终端能力信息确定终端支持在URSP中发送BDT信息时,则确定在URSP中发送BDT信息。或者基于终端能力信息确定终端不支持在URSP中发送BDT信息时,则确定不在URSP中发送BDT信息。这样可以提高BDT信息传输的可靠性,以及降低信令的冗余。
应理解,本申请实施例中,对于一种传输背景流量传输信息的方法中由第一策略控制网元执行的步骤,也可以由第一策略控制网元中的芯片执行、由第二策略控制网元执行的步骤,也可以由第二策略控制网元中的芯片执行、由应用功能网元执行的步骤,也可以由应用功能网元中的芯片执行。下述实施例中将以第一策略控制网元、第二策略控制网元,以及应用功能网元作为执行主体为例。
以本申请实施例提供的传输背景流量传输信息的方法应用于图2a所示的通信系统,第一策略控制网元为AM-PCF网元,第二策略控制网元为SM-PCF网元,应用功能网元为AF网元,用户数据管理网元为UDR为例,如图5所示,本申请实施例提供的一种传输背景流量传输信息的方法包括如下步骤:
步骤501、AM-PCF网元获取终端的终端能力信息。其中,终端能力信息用于指示终端支持在终端的终端路由选择策略中传输背景流量传输信息。
应理解,本申请实施例中终端支持在终端路由选择策略中传输背景流量传输信息,也可以描述为:终端支持采用xBDT方式传输背景流量传输信息。
步骤502、AM-PCF网元根据终端能力信息,确定在终端路由选择策略中传输背景流量传输信息。
其中,AM-PCF网元确定终端支持在终端的终端路由选择策略中传输背景流量传输信息之后,一方面,AM-PCF网元可以在终端路由选择策略中向终端传输背景流量传输信息。另一方面,AM-PCF网元可以对部分背景流量传输信息在终端路由选择策略中传输,对于另外部分背景流量传输信息在PCC规则中传输。
本申请实施例提供一种传输BDT信息的方法,该方法通过第一策略控制网元获取终端的终端能力信息,并根据终端能力信息确定终端支持在终端的终端路由选择策略中传输BDT信息的情况下,可以确定在终端路由选择策略中传输BDT信息。这样可以提高在终端路由选择策略中传输背景流量传输信息的可靠性。避免由于终端不支持在终端路由选择策略中传输BDT信息,而依然在终端路由选择策略中传输BDT信息导致的终端无法成功获取BDT信息。
在第一种可能的实施例中,继续结合图5,本申请实施例提供的方法还包括:
步骤503、AF网元确定需要在策略与计费控制(policy and charging control,PCC)规则中传输BDT信息。
本申请实施例中在PCC规则中传输BDT信息也可以描述为:采用BDT方式传输BDT信息。
一种示例,AF网元可以根据预配置模式确定采用BDT方式还是采用xBDT方式传输BDT信息。也即如果预配置模式为BDT方式,则AF网元确定采用BDT方式传输BDT信息。如果预配置模式为xBDT方式,则AF网元确定采用xBDT方式传输BDT信息。
另一种示例,AF网元可以和核心网提前协商采用xBDT方式或采用BDT方式传输BDT信息。
例如,一方面,AF网元可以主动向核心网请求传输BDT信息的方式。基于AF网元的请求,核心网可以指示AF网元采用BDT方式。或者,核心网可以指示AF网元采用xBDT方式。
另一方面,AF网元可以将自己选择的传输BDT信息的方式通知核心网,在得到核心网的授权后,便可以确定采用自己选择的传输BDT信息的方式传输BDT信息。
再一方面,即使未接收到AF网元的请求,核心网也可以主动指示AF网元采用BDT方式。或者核心网指示AF网元采用xBDT方式,本申请实施例对此不做限定。
示例性的,在核心网确定终端不支持采用xBDT方式传输BDT信息的情况下,核心网可以指示AF网元采用BDT方式。在核心网不确定终端是否支持采用xBDT方式的情况下,核心网可以指示AF网元采用BDT方式,或者指示AF网元采用xBDT方式传输背景流量传输信息。
示例性的,在核心网确定终端支持采用xBDT方式的情况下,核心网可以指示AF网元采用xBDT方式。或者核心网可以指示AF网元采用xBDT方式。或者核心网可以指示AF网元对该终端既可以采用BDT方式,又可以采用xBDT方式,但是保证该xBDT方式和BDT方式不冲突。
步骤504、AF网元向AM-PCF网元发送第一请求消息,以使得AM-PCF网元接收来自AF网元的第一请求消息。该第一请求消息用于指示AM-PCF网元在PCC规则中传输BDT信息。
示例性的,AF网元可以通过NEF网元向AM-PCF网元发送第一请求消息。例如,第一请求消息可以为AF网元向NEF网元发送的BDT信息命令建立请求(Nnef_BDTPNegotiation_Create request)服务操作。NEF网元向AM-PCF网元发送BDT信息策略控制建立请求(Npcf_BDTPolicyControl_Create request)服务操作。
可选的,该第一请求消息中还可以携带第四指示。该第四指示用于AM-PCF网元确定需要传输的BDT信息。例如,该第四指示可以为BDT信息本身。当然,该第四指示也可以为用于确定BDT信息的指示信息。
应理解,AM-PCF网元可以根据用于确定BDT信息的指示信息从UDR处获取AF网元指示的BDT信息。
例如,用于确定BDT信息的指示信息可以为BDT信息的标识。
例如,用于确定BDT信息的指示信息可以为AF网元的标识信息、终端数量(Number of UEs)、外部组标识(External Group Identifier)、每个终端的流量(Volume per UE)、需要的时间窗(Desired time window)、网络位置信息(Network Area Information)。
应理解,AF网元向NEF网元发送的是外部组标识,NEF网元可以将外部组标识 处理为内部组标识后向AM-PCF网元发送。
作为第一种可能的实现方式,该第一请求消息可以显式指示在PCC规则中传输BDT信息。或者该第一请求消息可以显式指示在PCC规则中传输第四指示确定的BDT信息。
示例性的,该第一请求消息中携带第一字段,该第一字段用于指示AM-PCF网元在PCC规则中传输BDT信息。
作为第二种可能的实现方式,该第一请求消息可以隐式指示在PCC规则中传输BDT信息。
示例性的,该第一请求消息本身可用于指示AM-PCF网元在PCC规则中传输BDT信息。或者,第一请求消息本身可用于指示AM-PCF网元对第四指示确定的BDT信息在PCC规则中传输。
无论AF网元隐式指示还是显式指示在PCC规则中传输BDT信息,该AF网元还可以请求在第一时间窗之前在终端路由选择策略中传输BDT信息,请求在第一时间窗内在PCC规则中传输BDT信息。
作为一种可能的实现方式,AF网元可以确定即将达到传输BDT信息的时间时,向AM-PCF网元发送第一请求消息。作为另一种可能的实现方式,AF网元可以在其他网元的请求下,确定向AM-PCF网元发送第一请求消息。
需要说明的是,如果第一请求消息中携带第四指示,则第一请求消息具体用于请求AM-PCF网元确定需要对第四指示确定的BDT信息在PCC规则中传输。如果第一请求消息中未携带第四指示,则第一请求消息具体用于请求向该终端传输的BDT信息均在PCC规则中传输。
步骤505、AM-PCF网元向AF网元发送第一响应消息,以使得AM-PCF网元接收来自AF网元的第一响应消息。第一响应消息用于指示拒绝在PCC规则中传输背景流量传输信息。向AF网元发送第一响应消息可以使得AF网元及时感知核心网(例如,SM-PCF网元或PCF网元)未在PCC规则中传输背景流量传输信息。
示例性的,该第一响应消息中可以携带第二字段,该第二字段用于指示拒绝在PCC规则中传输BDT信息。或者该第一响应消息本身具有拒绝在PCC规则中传输BDT信息的含义。
需要说明的是,一方面,如果AM-PCF网元确定只采用xBDT方式传输BDT信息,则AM-PCF网元向AF网元发送第一响应消息,此时第一响应消息可以用于表示对该终端的BDT信息均不在PCC规则中传输。另一方面,如果AM-PCF网元确定只对AF网元指示的BDT信息不采用xBDT方式传输,则第一响应消息用于指示拒绝在PCC规则中传输AF网元指示的BDT信息。
在第二种可能的实施例中,请继续结合图5,本申请实施例提供的方法还包括:
步骤506、AM-PCF网元向AF网元发送第一通知消息,以使得AF网元接收来自AM-PCF网元的第一通知消息。该第一通知消息用于指示在终端路由选择策略中传输BDT信息。
通过步骤506,这样便于AF网元根据第一通知消息确定AM-PCF网元可以在终端路由选择策略中传输BDT信息。进而使得AF网元触发AM-PCF网元在终端路由选 择策略中传输BDT信息。
需要说明的是,本申请实施例中的步骤505和步骤506可以并行执行,也即步骤505和步骤506执行并无先后顺序。当然,第一通知消息和第一响应消息还可以携带在同一个消息中的信息元,步骤505和步骤506以携带在不同消息中为例。
在第三种可能的实施例中,请继续结合图5,本申请实施例提供的方法还包括:
步骤507、AM-PCF网元通过AMF网元向终端发送终端路由选择策略,以使得终端接收来自AM-PCF网元的终端路由选择策略。其中,终端路由选择策略中包括BDT信息。由于终端支持在终端路由选择策略中传输BDT信息,这样终端在接收到终端路由选择策略后,便可以从终端路由选择策略中得到BDT信息。
示例性的,AM-PCF网元向AMF网元发送终端路由选择策略,以由AMF网元向终端发送终端路由选择策略。
需要说明的是,步骤507中终端路由选择策略中携带的BDT信息包括一个或多个BDT信息。该一个或多个BDT信息可以由AF网元向AM-PCF网元指示。或者一旦AM-PCF网元确定终端支持在终端路由选择策略中传输BDT信息,则只要AF网元触发AM-PCF网元发送BDT信息,则AM-PCF网元便可以需要传输至该终端的BDT信息均可以携带在终端路由选择策略中。
步骤508、AM-PCF网元接收第一指示。该第一指示用于指示终端成功通过终端路由选择策略接收BDT信息。
应理解,终端如果成功通过终端路由选择策略接收BDT信息,便可以通过AMF网元或SMF网元向AM-PCF网元发送第一指示。应理解,SMF网元接收到来自终端的第一指示之后,可以将该第一指示转发至AMF网元,以由AMF网元将第一指示向AM-PCF网元发送。
示例性的,终端向AMF网元发送终端策略交互结果(Result of the delivery of UE policies),其中,Result of the delivery of UE policies中携带第一指示。然后AMF网元向AM-PCF网元发送N1消息通知(Namf_N1MessageNotify)服务操作。该Namf_N1MessageNotify服务操作中携带第一指示。
可选的,该第一指示还用于指示终端成功通过终端路由选择策略接收到的BDT信息。
示例性的,AM-PCF网元通过终端路由选择策略向终端发送BDT信息1和BDT信息2,如果终端成功选择BDT信息2,则第一指示还可以用于指示BDT信息2的标识。
步骤509、AM-PCF网元向AF网元发送确认信息,以使得AF网元接收来自AM-PCF网元的确认信息。该确认信息用于AF网元确定终端成功接收到的BDT信息。
这样便于AF网元根据确认信息确定终端成功接收到的是哪个BDT信息。
例如,AM-PCF网元可能基于AF网元的指示确定了BDT信息1和BDT信息2,但是AM-PCF网元经过策略决策选择在URSP中向终端发送BDT信息2。因此,如果终端成功通过URSP接收到BDT信息2,则AM-PCF网元可以通过确认信息向AF网元指示BDT信息2。
示例性的,本申请实施例中在步骤509之前还可以包括:AM-PCF网元确定AF 网元。示例性的,AM-PCF网元可以根据AF网元的标识(例如,ASP ID)确定AF网元。
本申请实施例中AM-PCF网元或者SM-PCF网元可以直接向AF网元发送信息,也可以通过其他网元(例如,NEF网元)向AF网元发送信息。本申请实施例中但凡涉及到AM-PCF网元或者SM-PCF网元与AF网元之间通信,均可以参考此处的描述,后续不再赘述。
应理解,在AM-PCF网元确定终端成功通过终端路由选择策略接收BDT信息的情况下,AM-PCF网元可以执行步骤509。
由于AF网元可以通过第四指示向AM-PCF网元指示一个或多个BDT信息。当AF网元向AM-PCF网元指示多个BDT信息时,AM-PCF网元可以根据策略决策从多个BDT信息中选择至少一个BDT信息。AM-PCF网元可以在终端路由选择策略中向终端发送至少一个BDT信息。因此,示例性的,确认信息可以为终端成功接收到的BDT信息。或者示例性的,确认信息可以为终端成功接收到的BDT信息的标识。或者示例性的,确认信息可以为终端成功接收到的BDT信息的标识和AM-PCF网元为该终端选择的至少一个BDT信息。该终端成功接收到的BDT信息属于至少一个BDT信息。
当AF网元向AM-PCF网元指示一个BDT信息时,则AM-PCF网元可以向AF网元发送第二指示即可。
在第四种可能的实施例中,继续结合图5,本申请实施例提供的方法还可以包括:
步骤510、AM-PCF网元向AF网元发送终端的标识信息和第二指示,以使得AF网元接收到终端的标识信息和第二指示。第二指示用于指示终端成功通过终端路由选择策略接收BDT信息。
示例性的,本申请实施例中的终端的标识信息可以为以下一个或者多个:网际协议地址(internet protocol,IP)、签约永久标识(subscription permanent identifier,SUPI)、永久设备标识(permanent equipment identifier,PEI)、通用公共签约标识(generic public subscription identifier,GPSI)、国际移动用户标识符(international mobile subscriber identifier,IMSI)、国际移动设备标识(international mobile equipment identity,IMEI)、IP地址和移动台国际综合业务数字网络号码(mobile station international integrated service digital network number,MSISDN)。下述实施例中但凡涉及到终端的标识信息均可以参考此处的描述,后续不再赘述。
经过步骤510,AF网元便可以根据第二指示确定终端成功通过终端路由选择策略接收BDT信息。此外,AF网元可以通过终端的标识信息,确定成功接收到的BDT信息和终端之间的对应关系。
在一种可选的实施例中,继续结合图5,本申请实施例提供的方法还可以包括:
步骤511、AM-PCF网元向UDR或SM-PCF网元发送第三指示,以使得UDR或SM-PCF网元接收来自AM-PCF网元的第三指示。第三指示用于确定终端成功接收到的BDT信息。
示例性的,第三指示可以为终端成功接收到的BDT信息。或者示例性的,第三指示可以为终端成功接收到的BDT信息的标识。或者示例性的,第三指示可以为终端成 功接收到的BDT信息的标识和AM-PCF网元为该终端选择的至少一个BDT信息。
由于终端在移动过程中可能会更换AM-PCF网元,因此,向UDR发送第三指示,这样便于终端移动中新选择的AM-PCF网元可以从UDR处确定终端成功接收到的BDT信息。由于AM-PCF网元的选择位于SM-PCF网元之前,且AM-PCF网元和SM-PCF网元可以共用同一个UDR,因此,SM-PCF也可以从UDR处确定终端成功接收到的BDT信息。
需要说明的是,本申请实施例中如果AM-PCF网元确定终端支持在URSP中传输BDT信息,则AM-PCF网元还可以通知SM-PCF网元不在PCC规则中传输BDT信息。或者AM-PCF网元还可以通知SM-PCF网元对于哪些BDT信息可以不在PCC规则中传输。
作为一种可能的实现方式,本申请实施例中的步骤501具体可以通过以下方式1-方式3中的任一个实现:
方式1、AM-PCF网元从SM-PCF网元处获取终端能力信息。
示例性的,PDU会话建立流程中,终端向SMF网元上报终端能力信息。然后SMF网元在建立SM策略关联时,SMF网元向SM-PCF网元上报终端能力信息,以便SM-PCF网元处具有终端能力信息。这样AM-PCF网元便可以向SM-PCF网元发送能力信息获取请求,以从SM-PCF网元处获取终端能力信息。
如图6所示,图6示出了PDU会话建立流程中,终端上报终端能力信息的具体过程:
步骤601、终端向AMF网元发送PDU会话建立请求(Session Establishment Request)。其中,PDU会话建立请求中包含终端能力信息。示例性的,PDU会话建立请求中可以携带N1 SM Container。该N1 SM Container中携带终端能力信息,AMF将N1 SM Container转发给SMF网元,而不处理N1 SM Container。
步骤602、AMF网元选择SMF网元。
步骤603、AMF网元向SMF网元发送PDU会话建立会话管理上下文请求(Nsmf_PDU Session_CreateSM Context Request)。AMF网元将从终端收到的终端能力信息发送给SMF网元。
步骤604、SMF网元在UDM网元中进行注册,并从UDM网元中获取终端的签约信息。
步骤605、SMF网元向AMF网元发送PDU会话建立请求应答(Nsmf_PDU Session_CreateSM Context Response)。SMF网元可能会在这一步拒绝PDU会话的建立,并携带原因值。
步骤606、PDU会话的鉴权/授权。
即UE和DN之间完成PDU会话的鉴权/授权。
步骤607、SMF网元选择SM-PCF网元,并向SM-PCF网元请求策略规则。其中可以携带终端能力信息。
步骤607之后涉及到的相关PDU会话建立过程可以参考现有技术中的描述,此处不再赘述。
方式2、AM-PCF网元从UDR中获取终端能力信息。
其中,UDR处具有终端能力信息。这样AM-PCF网元便可以向UDR发送能力信息获取请求,以从UDR处获取终端能力信息。
示例性的,UDR处具有的终端能力信息可以通过以下方式获取:SM-PCF网元在得到终端能力信息之后可以将终端能力信息存储在UDR中,以便UDR中具有终端能力信息。终端向UDR发送终端能力信息,以使得UDR处具有终端能力信息。或者,AM-PCF网元1将获取到的终端能力信息存储至UDR中。AM-PCF网元1为终端更换前的AM-PCF网元。
方式3、AM-PCF网元从终端处获取终端能力信息。
具体的,初始注册时终端向AM-PCF网元上报终端能力信息,以使得AM-PCF网元从终端处获取终端能力信息。
示例性的,方式3的具体实现:终端向RAN发送注册请求(Registration Request)。该Registration Request中携带终端能力信息。示例性的,Registration Request中携带终端策略容器(UE Policy Container)。其中,UE Policy Container中携带终端能力信息。这样RAN和AMF网元不处理UE Policy Container,而是将其转发给AM-PCF网元。RAN向选择的AMF网元发送Registration Request。AMF网元向AM-PCF网元发送Npcf_AMPolicyControl_Get。其中,Npcf_AMPolicyControl_Get中携带终端能力信息。
应理解,在AMF网元向AM-PCF网元之前还包括其他过程,具体可以参考现有技术中的描述,此处不再赘述。
如图7所示,图7示出了本申请实施例提供的另一种传输BDT信息的方法,包括如下步骤:
步骤701、SM-PCF网元获取终端的终端能力信息。终端能力信息用于指示终端支持在终端的终端路由选择策略中传输BDT信息。
作为一种可能的实现方式,本申请实施例中的步骤701具体可以通过以下方式实现:SM-PCF网元从终端处获取终端能力信息。
其中,SM-PCF网元从终端处获取终端能力信息的具体实现可以参考上述方式1处的描述,此处不再赘述。
步骤702、SM-PCF网元根据终端能力信息,确定不在PCC规则中传输BDT信息。
需要说明的是,在终端支持在终端的终端路由选择策略中传输BDT信息的情况下,SM-PCF网元也可以确定在PCC规则中传输BDT信息。但是为了避免在PCC规则中和在终端路由选择策略中传输的BDT信息重复,则SM-PCF网元在不同会话的PCC规则中传输的BDT信息,需要和在终端路由选择策略中传输的BDT信息不同。在相同会话的PCC规则中传输的BDT信息,需要和在终端路由选择策略中传输的BDT信息相同。
本申请实施例提供一种传输背景流量传输信息的方法,该方法通过SM-PCF网元获取终端的终端能力信息。然后SM-PCF网元根据终端能力信息确定终端支持在终端的终端路由选择策略中传输背景流量传输信息下,后续便可以知晓核心网(例如,AM-PCF网元)在终端的终端路由选择策略中传输背景流量传输信息,而避免在PCC规则中传输BDT信息。这是由于如果不确定终端是否支持在终端的终端路由选择策略 中传输背景流量传输信息,而盲目在PCC中传输背景流量传输信息,导致的对于同一个背景流量传输信息既由AM-PCF网元在终端路由选择策略中传输,又由第二策略控制网元在PCC规则中传输引起的冲突。
在第一种可能的实施例中,继续结合图7,本申请实施例提供的方法还包括:
步骤703、SM-PCF网元向AM-PCF网元或UDR发送终端能力信息,以使得AM-PCF网元或UDR接收来自SM-PCF网元的终端能力信息。
AM-PCF网元或UDR获取到终端能力信息的作用可以参考上述方式1或方式2中的描述,此处不再赘述。
在第二种可能的实施例中,继续结合图7,本申请实施例提供方法还包括:情况1、情况2或情况3中的任一个。
其中,情况1包括:步骤704-步骤707。情况2包括:步骤708-步骤710。情况3包括:步骤711-步骤713。
在第三种可能的实施例中,继续结合图7,本申请实施例提供的方法还包括:
步骤704、AF网元确定在PCC规则中传输背景流量传输信息。
其中,步骤704的具体实现可以参考步骤503处的描述,此处不再赘述。
步骤705、AF网元向SM-PCF网元发送第一请求消息,以使得SM-PCF网元接收来自AF网元的第一请求消息用于指示SM-PCF网元在PCC规则中传输BDT信息。
示例性的,第一请求消息的具体内容可以参考步骤504处的描述,此处不再赘述。
步骤706、SM-PCF网元向AF网元发送第一响应消息,以使得AF网元接收来自SM-PCF网元的第一响应消息。该第一响应消息用于指示拒绝在PCC规则中传输BDT信息。
示例性的,第一响应消息的内容可以具体参考步骤505处的描述,此处不再赘述。
通过步骤706可以使得AF网元及时感知SM-PCF网元未在PCC规则中传输背景流量传输信息,以便AF网元触发SM-PCF网元在终端路由选择策略中传输BDT信息。
需要说明的是,在终端支持在URSP中传输BDT信息的情况下,一方面,SM-PCF网元可以拒绝对该终端的任何BDT信息均不在PCC规则中传输。另一方面,SM-PCF网元可以拒绝对该终端的某些BDT信息或者该AF网元请求的BDT信息不在PCC规则中传输。如果SM-PCF网元拒绝对该终端的某些BDT信息或者该AF网元请求的BDT信息不在PCC规则中传输,则第一响应消息中可以携带被拒绝在PCC规则中传输的BDT信息的标识,或者被拒绝的BDT信息。
在第四种可能的实施例中,继续结合图7,本申请实施例提供的方法还包括:
步骤707和步骤708、同步骤704和步骤705,此处不再赘述。
步骤709、SM-PCF网元确定不向SMF网元发送第一PCC规则,第一PCC规则与终端成功接收到的背景流量传输信息对应。也即如果SM-PCF网元确定BDT信息A已在URSP中传输,则可以不再触发携带BDT信息A的第一PCC规则。
本申请实施例中情况1与情况2为并列方案,情况1与情况2的区别在于:情况1中SM-PCF网元拒绝在PCC规则中传输BDT信息。而在情况2中对于终端成功接收到的BDT信息,SM-PCF网元不触发PCC规则,也即对于终端未成功接收到的背景流量传输信息,或者未在URSP中传输的BDT信息,SM-PCF网元依然可以在PCC 规则中传输。
在第五种可能的实施例中,继续结合图7,本申请实施例提供的方法还包括:
步骤710和步骤711,同步骤704和步骤705,此处不再赘述。
步骤712、SM-PCF网元向SMF网元发送第二PCC规则。以使得SMF网元接收到来自SM-PCF网元的第二PCC规则。其中,第二PCC规则与未在终端路由选择策略中传输的BDT信息对应。
由于SM-PCF网元确定终端支持采用xBDT方式传输BDT信息,在SM-PCF网元确定到采用xBDT方式传输的BDT信息后,为了避免采用xBDT方式传输BDT信息和采用BDT方式传输BDT信息冲突,需要保证在第二PCC规则中传输的BDT信息未在终端路由选择策略中传输。也即需要保证在第二PCC规则中传输的BDT信息与在终端路由选择策略中传输的BDT信息不同。
示例性的,SM-PCF网元可以从AM-PCF网元或者UDR处确定已在终端路由选择策略中传输的BDT信息。
应理解,如果请求在PCC规则中传输BDT信息时,则SM-PCF网元可以将未在终端路由选择策略中传输的BDT信息采用BDT方式传输至终端。
例如,如果BDT信息1在终端路由选择策略中传输,则SM-PCF网元可以向SMF网元发送第二PCC规则,其中,第二PCC规则中包括BDT信息2。
本申请实施例中步骤710-步骤712与步骤704-步骤706为并列方案,步骤704-步骤706与步骤710-步骤712的区别在于:步骤704-步骤706中SM-PCF网元拒绝在PCC规则中传输背景流量传输信息。而在步骤710-步骤712中对于未在终端路由选择策略中传输的BDT信息,SM-PCF网元触发第二PCC规则。该第二PCC规则中包括未在终端路由选择策略中传输的BDT信息。也即情况1表明SM-PCF网元对于该终端的任何BDT信息均不在PCC规则中传输,而情况3表明SM-PCF网元不在PCC规则中传输已在终端路由选择策略中传输的BDT信息。
在一种可能的实施例中,本申请实施例提供的方法还包括:SM-PCF网元确定终端成功接收到的背景流量传输信息。
具体的,如图7所示,SM-PCF网元确定终端成功接收到的背景流量传输信息具体可以通过步骤713实现:
步骤713、SM-PCF网元从UDR中获取第三指示。该第三指示用于确定终端成功接收到的背景流量传输信息。
其中,第三指示的具体内容可以参考上述描述,此处不再赘述。
在一种可能的实施例中,如图7所示,本申请实施例提供的方法还包括:
步骤714,同步骤506。具体的,可以将步骤506中的AM-PCF网元替换为SM-PCF网元。
在一种可能的实施例中,本申请实施例提供的方法还包括:SM-PCF网元通知AM-PCF网元采用终端路由选择策略向终端传输BDT信息。
应理解,对于在PCC规则中传输的BDT信息,SM-PCF网元可以基于AF网元的第四指示确定向终端传输的BDT信息。
需要说明的是,如果AM-PCF网元和SM-PCF网元为同一个PCF网元A时,该 PCF网元A既可以在PCC规则中传输BDT信息,也可以在URSP中传输BDT信息。
如图8所示,图8示出了本申请实施例提供的一种传输背景流量传输信息的方法,包括:
步骤801、AM-PCF网元获取终端的终端能力信息,终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输BDT信息。
步骤801的具体实现方式可以参考上述步骤501中的描述,此处不再赘述,区别在于,步骤801中获取到的终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输BDT信息。终端不支持在终端的终端路由选择策略中传输BDT信息也可以描述为:终端不支持采用xBDT方式传输BDT信息。
步骤802、AM-PCF网元根据终端能力信息,确定不在终端路由选择策略中传输BDT信息。
本申请实施例提供一种传输背景流量传输信息的方法,该方法通过AM-PCF网元获取终端的终端能力信息。然后AM-PCF网元根据终端能力信息确定终端不支持在终端路由选择策略中传输BDT信息的情况下,可以确定不在终端的终端路由选择策略中传输BDT信息,避免盲目采用终端路由选择策略传输BDT信息导致终端无法从终端路由选择策略中成功获取BDT信息,提高了传输BDT信息的可靠性。
作为一种可能的实施例,如果AM-PCF网元确定终端不支持在终端的终端路由选择策略中传输BDT信息,AM-PCF网元还可以通知SM-PCF网元在PCC规则中传输该终端的BDT信息。
在一种可能的实施例中,如图8所示,本申请实施例提供的方法还可以包括:
步骤803、AF网元确定需要在终端路由选择策略中传输BDT信息。
步骤803的具体实现可以参考步骤503处的描述,与步骤503的区别在于:AF网元根据预配置模式或与核心网协商,目的在于确定需要在终端路由选择策略中传输BDT信息。
步骤804、AF网元向AM-PCF网元发送第一请求消息,该第一请求消息用于指示AM-PCF网元在终端路由选择策略中传输BDT信息。
具体的,第一请求消息的内容可以参考上述步骤504处的描述,与步骤504的区别在于:第一请求消息用于指示AM-PCF网元在终端路由选择策略中传输BDT信息,也即在通过步骤804实现时,将上述步骤504的具体实现方式中涉及到的在PCC规则中传输BDT信息替换为:在终端路由选择策略中传输BDT信息。
步骤805、AM-PCF网元向AF网元发送第一响应消息,该第一响应消息用于指示拒绝在终端路由选择策略中传输BDT信息。
示例性的,该第一响应消息中可以携带第三字段,该第三字段用于指示拒绝在终端路由选择策略中传输背景流量传输信息。或者该第一响应消息本身具有指示拒绝在终端路由选择策略中传输背景流量传输信息的含义。
需要说明的是,如果AM-PCF网元确定终端不支持采用BDT方式传输BDT信息,则AM-PCF网元向AF网元发送第一响应消息。
在一种可能的实现方式中,AM-PCF网元还可以向AF网元发送第一原因值,该第一原因值用于使得AF网元确定拒绝在终端路由选择策略中传输BDT信息的原因。 例如,该第一原因值可以为终端不支持在终端路由选择策略中传输BDT信息。
通过步骤805这样AF网元便可以及时确定AM-PCF网元拒绝在终端路由选择策略中传输BDT信息。进而AF网元可以触发SM-PCF网元在PCC规则中传输BDT信息。
在一种可能的实施例中,如图8所示,本申请实施例提供的方法还可以包括:
步骤806、AM-PCF网元向AF网元发送第一通知消息,以使得AF网元接收来自AM-PCF网元的第一通知消息。该第一通知消息用于指示在PCC规则中传输BDT信息。在得到第一通知消息之后,AF网元便可以确定可以触发SM-PCF网元在PCC规则中传输BDT信息。应理解,PCC规则中携带BDT信息即为根据BDT信息生成PCC规则。
在一种可能的实施例中,如图8所示,本申请实施例提供的方法还可以包括:
步骤807-步骤808,同步骤803-步骤804,此处不再赘述。
步骤809、AM-PCF网元向终端发送终端路由选择策略,终端路由选择策略不包括BDT信息。
应理解,由于终端不支持采用xBDT方式传输,因此AM-PCF网元向终端发送的终端路由选择策略中不包括BDT信息。
应理解,在图8所示的实施例中AM-PCF网元还可以将终端能力信息存储在UDR中,或者向SM-PCF网元发送终端能力信息。
应理解,本申请实施例中步骤807-步骤809与步骤803-步骤805为并列方案。
如图9所示,图9示出了本申请实施例提供的一种传输背景流量传输信息的方法,包括:
步骤901、SM-PCF网元获取终端的终端能力信息,终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输BDT信息。
具体的,步骤901可以通过以下方式实现:SM-PCF网元从终端处获取终端能力信息。
其中,步骤901的具体实现可以参考步骤701处的描述,区别在于:SM-PCF网元获取到的终端能力信息用于指示终端不支持在终端的终端路由选择策略中传输BDT信息。
步骤902、SM-PCF网元根据终端能力信息,确定在PCC规则中传输BDT信息。
作为一种可能的实施例,在SM-PCF网元确定终端不支持在终端的终端路由选择策略中传输BDT信息的情况下,SM-PCF网元还可以通知AM-PCF网元无需在终端路由选择策略中传输BDT信息。
该方法通过SM-PCF网元根据终端能力信息确定终端不支持在终端的终端路由选择策略中传输BDT信息,这样便可以确定后续需要在PCC规则中传输BDT信息,以使得终端从PCC规则中获取BDT信息。
在一种可能的实施例中,继续结合图9所示,本申请实施例提供的方法还包括:
步骤903-步骤906,同步骤803-步骤806,区别在于:在由步骤903-步骤906实现时,将步骤803-步骤806中的AM-PCF网元替换为:SM-PCF网元。
在一种可能的实施例中,继续结合图9所示,本申请实施例提供的方法还包括:
步骤907-步骤908,同步骤803-步骤804,区别在于:在由步骤907-步骤908实现时,将步骤803-步骤804中的AM-PCF网元替换为:SM-PCF网元。
步骤909、SM-PCF网元向SMF网元发送PCC规则,PCC规则包括BDT信息。
应理解,在图9所示的实施例中SM-PCF网元还可以将终端能力信息存储在UDR中,或者向AM-PCF网元发送终端能力信息。
需要说明的是,在图9所示的实施例中SM-PCF网元可以基于AF网元的请求确定在PCC规则中传输的BDT信息。
需要指出的是,本申请各实施例之间可以相互借鉴或参考,例如,相同或相似的步骤,方法实施例和装置实施例之间,均可以相互参考,不予限制。
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,上述第一策略控制网元、应用功能网元、第二策略控制网元为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对第一策略控制网元、应用功能网元、第二策略控制网元进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
比如,以采用集成的方式划分各个功能模块的情况下,图10示出了一种传输背景流量传输信息的装置的结构示意图。该传输背景流量传输信息的装置,包括:处理模块1001和通信模块1002。
可选的,传输背景流量传输信息的装置,还可以包括:存储模块1003,用于存储终端能力信息。
一种示例,该传输背景流量传输信息的装置可以为:第一策略控制网元,也可以为应用于第一策略控制网元中的芯片。其中,处理模块1001,用于支持第一策略控制网元执行上述实施例中的步骤502。通信模块1002,用于支持第一策略控制网元执行上述实施例中的步骤501。
一种可能的实现方式中,该通信模块1002,还用于支持第一策略控制网元执行上述实施例中的步骤505、步骤506、步骤507、步骤508、步骤509、步骤510、步骤511。
另一种示例,该传输背景流量传输信息的装置可以为:应用功能网元,也可以为应用于应用功能网元中的芯片。其中,处理模块1001,用于支持应用功能网元执行上述实施例中的步骤503。通信模块1002,用于支持应用功能网元执行上述实施例中的步骤504。
一种可能的实现方式中,该通信模块1002,还用于支持应用功能网元,执行上述实施例中从第一策略控制网元处获取确认信息、第一响应消息、终端的标识信息和第二指示以及第一通知消息的步骤。
再一种示例,该传输背景流量传输信息的装置可以为:第二策略控制网元,也可以为应用于第二策略控制网元中的芯片。其中,处理模块1001,用于支持第二策略控制网元执行上述实施例中的步骤702。通信模块1002,用于支持第二策略控制网元执行上述实施例中的步骤701。
一种可能的实现方式中,该通信模块1002,还用于支持第二策略控制网元执行上述实施例中的步骤703、步骤706、步骤712、步骤713、步骤714。处理模块1001,还用于支持第二策略控制网元执行上述实施例中的步骤709。
又一种示例,该传输背景流量传输信息的装置可以为:应用功能网元,也可以为应用于应用功能网元中的芯片。其中,处理模块1001,用于支持应用功能网元执行上述实施例中的步骤704。通信模块1002,用于支持应用功能网元执行上述实施例中的步骤705。或者处理模块1001,用于支持应用功能网元执行上述实施例中的步骤707。通信模块1002,用于支持应用功能网元执行上述实施例中的步骤708。或者,处理模块1001,用于支持应用功能网元执行上述实施例中的步骤710。通信模块1002,用于支持应用功能网元执行上述实施例中的步骤711。
又一种示例,该传输背景流量传输信息的装置可以为:第一策略功能网元,也可以为应用于第一策略功能网元中的芯片。其中,处理模块1001,用于支持第一策略功能网元执行上述实施例中的步骤802。通信模块1002,用于支持第一策略功能网元,执行上述实施例中的步骤801。
一种可能的实现方式中,该通信模块1002,还用于支持第一策略控制网元执行上述实施例中的步骤805、步骤806、步骤809。
再一种示例,该传输背景流量传输信息的装置可以为:应用功能网元,也可以为应用于应用功能网元中的芯片。其中,处理模块1001,用于支持应用功能网元执行上述实施例中的步骤803。通信模块1002,用于支持应用功能网元执行上述实施例中的步骤804。或者,处理模块1001,用于支持应用功能网元执行上述实施例中的步骤807。通信模块1002,用于支持应用功能网元执行上述实施例中的步骤808。
再一种示例,该传输背景流量传输信息的装置可以为:第二策略控制网元,也可以为应用于第二策略控制网元中的芯片。其中,处理模块1001,用于支持第二策略控制网元执行上述实施例中的步骤902。通信模块1002,用于支持第二策略控制网元执行上述实施例中的步骤901。
一种可能的实现方式中,该通信模块1002,还用于支持第二策略控制网元执行上述实施例中的步骤905、步骤906、步骤909。
再一种示例,该传输背景流量传输信息的装置可以为:应用功能网元,也可以为应用于应用功能网元中的芯片。其中,处理模块1001,用于支持应用功能网元执行上述实施例中的步骤903。通信模块1002,用于支持应用功能网元执行上述实施例中的步骤904。或者,处理模块1001,用于支持应用功能网元执行上述实施例中的步骤907。通信模块1002,用于支持应用功能网元执行上述实施例中的步骤908。
在本实施例中,对传输背景流量传输信息的装置以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定ASIC,电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该传输背景流量传输信息的装置可以采用图4所示的形式。也即处理模块1001采用硬件实现时可以为处理器401。通信模块1002采用硬件实现时可以为通信接口404。
比如,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得第一策略控制网元执行上述方法实施例中的步骤501、步骤502、步骤505、步骤506、步骤507、步骤508、步骤509、步骤510、步骤511。
由于本实施例提供的第一策略控制网元可执行上述对应的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
比如,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得应用功能网元执行上述方法实施例中的步骤503、步骤504。
由于本实施例提供的应用功能网元可执行上述对应的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
比如,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得第二策略控制网元执行上述方法实施例中的步骤701、步骤702、步骤703、步骤706、步骤709、步骤712、步骤713、步骤714。
由于本实施例提供的第二策略控制网元可执行上述对应的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
比如,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得应用功能网元执行上述方法实施例中的步骤704和步骤705。
或图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得应用功能网元执行上述方法实施例中的步骤707、步骤708。或图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得应用功能网元执行上述方法实施例中的步骤710、和步骤711。
由于本实施例提供的应用功能网元可执行上述对应的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
比如,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得第一策略控制网元执行上述方法实施例中的步骤801、步骤802、步骤805、步骤806、步骤809。
由于本实施例提供的第一策略控制网元可执行上述对应的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
比如,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得应用功能网元执行上述方法实施例中的步骤803和步骤804。或者,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得应用功能网元执行上述方法实施例中的步骤807和步骤808。
由于本实施例提供的应用功能网元可执行上述对应的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
比如,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得第二策略控制网元执行上述方法实施例中的步骤901、步骤902、步骤905、步骤906、步骤909。
由于本实施例提供的第二策略控制网元可执行上述对应的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
比如,图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得应用功能网元执行上述方法实施例中的步骤903、步骤904。或者图4中的处理器401可以通过调用存储器403中存储的计算机执行指令,使得应用功能网元执行上述方法实施例中的步骤907和步骤908。
由于本实施例提供的应用功能网元可执行上述对应的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
具体的,图10中的通信模块1002和处理模块1001的功能/实现过程可以通过图4中的处理器401调用存储器403中存储的计算机执行指令来实现。或者,图10中的处理模块1001的功能/实现过程可以通过图4中的处理器401调用存储器403中存储的计算机执行指令来实现,图10中的通信模块1002的功能/实现过程可以通过图4中的通信接口404来实现。
应理解以上第一策略控制网元、第二策略控制网元、应用功能网元中模块的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且第一策略控制网元、或第二策略控制网元、或应用功能网元中的模块可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分模块以软件通过处理元件调用的形式实现,部分模块以硬件的形式实现。例如,各个模块可以为单独设立的处理元件,也可以集成在装置的某一个芯片中实现,此外,也可以以程序的形式存储于存储器中,由第一策略控制网元、或第二策略控制网元、或应用功能网元的某一个处理元件调用并执行该单元的功能。此外这些模块全部或部分可以集成在一起,也可以独立实现。这里所述的处理元件可以是一种集成电路,具有信号的处理能力。在实现过程中,上述方法的各步骤或以上各个模块可以通过处理器元件中的硬件的集成逻辑电路实现或者以软件通过处理元件调用的形式实现。
在一个例子中,以上任一装置中的模块或单元可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(Application Specific Integrated Circuit,ASIC),或,一个或多个微处理器(digital singnal processor,DSP),或,一个或者多个现场可编程门阵列(Field Programmable Gate Array,FPGA)等。再如,当第一网元或第二网元或接入设备或会话管理网元中的模块可以通过处理元件调度程序的形式实现时,该处理元件可以是通用处理器,例如中央处理器(Central Processing Unit,CPU)或其它可以调用程序的处理器。再如,这些单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。
以上通信模块是一种该装置的接口电路或通信接口,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该通信模块是该芯片用于从其它芯片或装置接收信号或发送信号的接口电路或通信接口。
当以上模块或单元以硬件实现的时候,该硬件可以是CPU、微处理器、数字信号 处理(digital signal processing,DSP)芯片、微控制单元(microcontroller unit,MCU)、人工智能处理器、ASIC、SoC、FPGA、PLD、专用数字电路、硬件加速器或非集成的分立器件中的任一个或任一组合,其可以运行必要的软件或不依赖于软件以执行以上方法流程。
可选的,本申请实施例还提供了一种通信装置(例如,该通信装置可以是芯片或芯片系统),该通信装置包括处理器,用于实现上述任一方法实施例中的方法。在一种可能的设计中,该通信装置还包括存储器。该存储器,用于保存必要的程序指令和数据,处理器可以调用存储器中存储的程序代码以指令该通信装置执行上述任一方法实施例中的方法。当然,存储器也可以不在该通信装置中。该通信装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件,本申请实施例对此不作具体限定。该通信装置的结构可以参考图4所示,此处不再赘述。
在上述实施例中,存储器存储的供处理器执行的指令可以以计算机程序产品的形式实现。计算机程序产品可以是事先写入在存储器中,也可以是以软件形式下载并安装在存储器中。
计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘solid state disk,SSD)等。
一方面,提供一种计算机存储介质,计算机可读存储介质中存储有指令,当指令被运行时,使得第一策略控制网元或者应用于第一策略控制网元中的芯片执行实施例中的步骤501、步骤502、步骤505、步骤506、步骤507、步骤508、步骤509、步骤510、步骤511。
又一方面,提供一种计算机存储介质,计算机可读存储介质中存储有指令,当指令被运行时,使得应用功能网元或应用于应用功能网元中的芯片执行上述方法实施例中的步骤503、步骤504。
再一方面,提供一种计算机存储介质,计算机可读存储介质中存储有指令,当指令被运行时,使得第二策略控制网元或应用于第二策略控制网元中的芯片执行上述方法实施例中的步骤701、步骤702、步骤703、步骤706、步骤709、步骤712、步骤713、步骤714。
再一方面,提供一种计算机存储介质,计算机可读存储介质中存储有指令,当指令被运行时,使得应用功能网元或应用于应用功能网元中的芯片执行上述方法实施例中的步骤704、步骤705。
再一方面,提供一种计算机存储介质,计算机可读存储介质中存储有指令,当指令被运行时,使得第一策略控制网元或应用于第一策略控制网元中的芯片执行上述方法实施例中的步骤801、步骤802、步骤805、步骤806、步骤809。
再一方面,提供一种计算机存储介质,计算机可读存储介质中存储有指令,当指令被运行时,使得应用功能网元或应用于应用功能网元中的芯片执行上述方法实施例中的步骤803、步骤804。
再一方面,提供一种计算机存储介质,计算机可读存储介质中存储有指令,当指令被运行时,使得第二策略控制网元或应用于第二策略控制网元中的芯片执行上述方法实施例中的步骤901、步骤902、步骤905、步骤906、步骤909。
再一方面,提供一种计算机存储介质,计算机可读存储介质中存储有指令,当指令被运行时,使得应用功能网元或应用于应用功能网元中的芯片执行上述方法实施例中的步骤903、步骤904。
前述的可读存储介质可以包括:U盘、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。
一方面,提供一种包含指令的计算机程序产品,计算机程序产品中存储有指令,当指令被运行时,使得第一策略控制网元或者应用于第一策略控制网元中的芯片执行实施例中的步骤501、步骤502、步骤505、步骤506、步骤507、步骤508、步骤509、步骤510、步骤511。
又一方面,提供一种包含指令的计算机程序产品,计算机程序产品中存储有指令,当指令被运行时,使得应用功能网元或应用于应用功能网元中的芯片执行上述方法实施例中的步骤503、步骤504。
再一方面,提供一种包含指令的计算机程序产品,计算机程序产品中存储有指令,当指令被运行时,使得第二策略控制网元或应用于第二策略控制网元中的芯片执行上述方法实施例中的步骤701、步骤702、步骤703、步骤706、步骤709、步骤712、步骤713、步骤714。
再一方面,提供一种包含指令的计算机程序产品,计算机程序产品中存储有指令,当指令被运行时,使得应用功能网元或应用于应用功能网元中的芯片执行上述方法实施例中的步骤704和步骤705。
再一方面,提供一种包含指令的计算机程序产品,计算机程序产品中存储有指令,当指令被运行时,使得第一策略控制网元或应用于第一策略控制网元中的芯片执行上述方法实施例中的步骤801、步骤802、步骤805、步骤806、步骤809。
再一方面,提供一种包含指令的计算机程序产品,计算机程序产品中存储有指令,当指令被运行时,使得应用功能网元或应用于应用功能网元中的芯片执行上述方法实施例中的步骤803、步骤804。
再一方面,提供一种包含指令的计算机程序产品,计算机程序产品中存储有指令,当指令被运行时,使得第二策略控制网元或应用于第二策略控制网元中的芯片执行上述方法实施例中的步骤901、步骤902、步骤905、步骤906、步骤909。
再一方面,提供一种包含指令的计算机程序产品,计算机程序产品中存储有指令,当指令被运行时,使得应用功能网元或应用于应用功能网元中的芯片执行上述方法实 施例中的步骤903、步骤904。
一方面,提供一种芯片,该芯片应用于第一策略控制网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以执行实施例中的步骤501、步骤502、步骤505、步骤506、步骤507、步骤508、步骤509、步骤510、步骤511。
又一方面,提供一种芯片,该芯片应用于应用功能网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以执行实施例中的步骤503、步骤504。
再一方面,提供一种芯片,该芯片应用于第二策略控制网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以执行实施例中的步骤701、步骤702、步骤703、步骤706、步骤709、步骤712、步骤713、步骤714。
再一方面,提供一种芯片,该芯片应用于应用功能网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以执行实施例中的步骤704、步骤705。
再一方面,提供一种芯片,该芯片应用于第一策略控制网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以执行实施例中的步骤801、步骤802、步骤805、步骤806、步骤809。
再一方面,提供一种芯片,该芯片应用于应用功能网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以执行实施例中的步骤803、步骤804。
再一方面,提供一种芯片,该芯片应用于第二策略控制网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以执行实施例中的步骤901、步骤902、步骤905、步骤906、步骤909。
再一方面,提供一种芯片,该芯片应用于应用功能网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以执行实施例中的步骤903、步骤904。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (34)

  1. 一种传输背景流量传输信息的方法,其特征在于,包括:
    第一策略控制网元获取终端的终端能力信息,所述终端能力信息用于指示所述终端支持在所述终端的终端路由选择策略中传输背景流量传输信息;
    所述第一策略控制网元根据所述终端能力信息,确定在所述终端路由选择策略中传输背景流量传输信息。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元接收来自应用功能网元的第一请求消息,所述第一请求消息用于指示所述第一策略控制网元在策略与计费控制PCC规则中传输所述背景流量传输信息;
    所述第一策略控制网元向所述应用功能网元发送第一响应消息,所述第一响应消息用于指示拒绝在PCC规则中传输所述背景流量传输信息。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元向应用功能网元发送第一通知消息,所述第一通知消息用于指示在所述终端路由选择策略中传输背景流量传输信息。
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元接收第一指示,所述第一指示用于指示所述终端成功通过所述终端路由选择策略接收所述背景流量传输信息;
    所述第一策略控制网元向应用功能网元发送确认信息,所述确认信息用于所述应用功能网元确定所述终端成功接收到的背景流量传输信息。
  5. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元向应用功能网元发送所述终端的标识信息和第二指示,所述第二指示用于指示所述终端成功通过所述终端路由选择策略接收所述背景流量传输信息。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元接收第一指示,所述第一指示用于指示所述终端成功通过所述终端路由选择策略接收所述背景流量传输信息;
    所述第一策略控制网元向用户数据管理网元或第二策略控制网元发送第三指示,所述第三指示用于确定所述终端成功接收到的背景流量传输信息。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,所述第一策略控制网元获取终端的终端能力信息,包括:
    所述第一策略控制网元从第二策略控制网元处获取所述终端能力信息;或者,
    所述第一策略控制网元从用户数据管理网元中获取所述终端能力信息;或者,
    所述第一策略控制网元从所述终端处获取所述终端能力信息。
  8. 一种传输背景流量传输信息的方法,其特征在于,包括:
    第一策略控制网元获取终端的终端能力信息,所述终端能力信息用于指示所述终端不支持在所述终端的终端路由选择策略中传输背景流量传输信息;
    所述第一策略控制网元根据所述终端能力信息,确定不在所述终端路由选择策略中传输背景流量传输信息。
  9. 根据权利要求8所述的方法,其特征在于,所述第一策略控制网元获取终端的终端能力信息,包括:
    所述第一策略控制网元从第二策略控制网元处获取所述终端能力信息;或者,
    所述第一策略控制网元从用户数据管理网元中获取所述终端能力信息;或者,
    所述第一策略控制网元从所述终端处获取所述终端能力信息。
  10. 根据权利要求8或9所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元接收来自应用功能网元的第一请求消息,所述第一请求消息用于指示所述第一策略控制网元在终端路由选择策略中传输所述背景流量传输信息;
    所述第一策略控制网元向所述应用功能网元发送第一响应消息,所述第一响应消息用于指示拒绝在所述终端路由选择策略中传输所述背景流量传输信息。
  11. 根据权利要求8或9任一项所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元向应用功能网元发送第一通知消息,所述第一通知消息用于指示在PCC规则中传输背景流量传输信息。
  12. 根据权利要求8-10任一项所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元向所述终端发送所述终端路由选择策略,所述终端路由选择策略不包括所述背景流量传输信息。
  13. 一种传输背景流量传输信息的装置,其特征在于,包括:通信模块和处理模块;
    其中,所述通信模块,用于获取终端的终端能力信息,所述终端能力信息用于指示所述终端支持在所述终端的终端路由选择策略中传输背景流量传输信息;
    所述处理模块,用于根据所述终端能力信息,确定在所述终端路由选择策略中传输背景流量传输信息。
  14. 根据权利要求13所述的装置,其特征在于,所述通信模块,还用于接收来自应用功能网元的第一请求消息,所述第一请求消息用于指示所述装置在策略与计费控制PCC规则中传输所述背景流量传输信息;
    所述通信模块,还用于向所述应用功能网元发送第一响应消息,所述第一响应消息用于指示拒绝在PCC规则中传输所述背景流量传输信息。
  15. 根据权利要求13或14所述的装置,其特征在于,所述通信模块,还用于向应用功能网元发送第一通知消息,所述第一通知消息用于指示在所述终端路由选择策略中传输背景流量传输信息。
  16. 根据权利要求13-15任一项所述的装置,其特征在于,所述通信模块,还用于接收第一指示,所述第一指示用于指示所述终端成功通过所述终端路由选择策略接收所述背景流量传输信息;
    所述通信模块,还用于向应用功能网元发送确认信息,所述确认信息用于所述应用功能网元确定所述终端成功接收到的背景流量传输信息。
  17. 根据权利要求16所述的装置,其特征在于,所述通信模块,还用于向应用功能网元发送所述终端的标识信息和第二指示,所述第二指示用于指示所述终端成功通过所述终端路由选择策略接收所述背景流量传输信息。
  18. 根据权利要求13-17任一项所述的装置,其特征在于,所述通信模块,还用 于接收第一指示,所述第一指示用于指示所述终端成功通过所述终端路由选择策略接收所述背景流量传输信息;
    所述通信模块,还用于向用户数据管理网元或第二策略控制网元发送第三指示,所述第三指示用于确定所述终端成功接收到的背景流量传输信息。
  19. 根据权利要求13-18任一项所述的装置,其特征在于,所述通信模块,具体用于从第二策略控制网元处获取所述终端能力信息;或者,
    所述通信模块,具体用于从用户数据管理网元中获取所述终端能力信息;或者,
    所述通信模块,具体用于从所述终端处获取所述终端能力信息。
  20. 一种传输背景流量传输信息的装置,其特征在于,包括:通信模块和处理模块;
    其中,所述通信模块,用于获取终端的终端能力信息,所述终端能力信息用于指示所述终端不支持在所述终端的终端路由选择策略中传输背景流量传输信息;
    所述处理模块,用于根据所述终端能力信息,确定不在所述终端路由选择策略中传输背景流量传输信息。
  21. 根据权利要求20所述的装置,其特征在于,所述通信模块,具体用于从第二策略控制网元处获取所述终端能力信息;或者,
    所述通信模块,具体用于从用户数据管理网元中获取所述终端能力信息;或者,
    所述通信模块,具体用于从所述终端处获取所述终端能力信息。
  22. 根据权利要求20或21所述的装置,其特征在于,所述通信模块,还用于接收来自应用功能网元的第一请求消息,所述第一请求消息用于指示所述装置在终端路由选择策略中传输所述背景流量传输信息;
    所述通信模块,还用于向所述应用功能网元发送第一响应消息,所述第一响应消息用于指示拒绝在所述终端路由选择策略中传输所述背景流量传输信息。
  23. 根据权利要求20或21任一项所述的装置,其特征在于,所述通信模块,还用于向应用功能网元发送第一通知消息,所述第一通知消息用于指示在PCC规则中传输背景流量传输信息。
  24. 根据权利要求20-23任一项所述的装置,其特征在于,所述通信模块,还用于向所述终端发送所述终端路由选择策略,所述终端路由选择策略不包括所述背景流量传输信息。
  25. 一种通信系统,其特征在于,所述通信系统包括:第一策略控制网元和应用功能网元;
    其中,所述第一策略控制网元,用于获取终端的终端能力信息,所述终端能力信息用于指示所述终端支持在所述终端的终端路由选择策略中传输背景流量传输信息;所述第一策略控制网元,还用于根据所述终端能力信息,确定在所述终端路由选择策略中传输背景流量传输信息;
    所述应用功能网元,用于向所述第一策略控制网元发送第一请求消息,该第一请求消息用于指示第一策略控制网元在PCC规则中传输背景流量传输信息;
    所述第一策略控制网元,还用于向所述应用功能网元发送第一响应消息,所述第一响应消息用于指示拒绝在PCC规则中传输所述背景流量传输信息。
  26. 一种通信系统,其特征在于,所述通信系统包括:第一策略控制网元和应用功能网元;
    其中,所述第一策略控制网元,用于获取终端的终端能力信息,所述终端能力信息用于指示所述终端不支持在所述终端的终端路由选择策略中传输背景流量传输信息;
    所述第一策略控制网元,还用于根据所述终端能力信息,确定不在所述终端路由选择策略中传输背景流量传输信息;
    所述应用功能网元,用于向所述第一策略控制网元发送第一请求消息,所述第一请求消息用于指示所述第一策略控制网元在终端路由选择策略中传输所述背景流量传输信息;
    所述第一策略控制网元,还用于向所述应用功能网元发送第一响应消息,所述第一响应消息用于指示拒绝在所述终端路由选择策略中传输所述背景流量传输信息。
  27. 一种通信装置,其特征在于,包括:处理器和存储器;所述存储器用于存储计算机执行指令,当所述通信装置运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述通信装置执行如权利要求1-7任一项所述的传输背景流量传输信息的方法。
  28. 一种通信装置,其特征在于,包括:处理器和存储器;所述存储器用于存储计算机执行指令,当所述通信装置运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述通信装置执行如权利要求8~12任一项所述的传输背景流量传输信息的方法。
  29. 一种处理器,其特征在于,用于执行如权利要求1-7任一项,或权利要求8-12任一项所述的传输背景流量传输信息的方法。
  30. 一种芯片系统,其特征在于,包括:存储器,用于存储计算机程序;
    处理器,用于从所述存储器调用并运行所述计算机程序,使得安装有所述芯片系统的设备执行如权利要求1-7任一项,或权利要求8-12任一项所述的传输背景流量传输信息的方法。
  31. 一种计算机可读存储介质,包括计算机程序,当其在计算机上运行时,使得所述计算机执行如权利要求1-7任一项,或权利要求8-12任一项所述的传输背景流量传输信息的方法。
  32. 一种计算机程序产品,所述计算机程序产品包括计算机程序,当所述计算机程序在计算机上运行时,使得计算机执行如权利要求1-7任一项,或权利要求8-12任一项所述的传输背景流量传输信息的方法。
  33. 一种用来执行权利要求1-7任一项所述的传输背景流量传输信息的方法的装置。
  34. 一种用来执行权利要求8-12任一项所述的传输背景流量传输信息的方法的装置。
PCT/CN2020/087301 2019-06-17 2020-04-27 一种传输背景流量传输信息的方法、装置及系统 WO2020253385A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910523242.1 2019-06-17
CN201910523242.1A CN112104464B (zh) 2019-06-17 2019-06-17 一种传输背景流量传输信息的方法、装置及系统

Publications (1)

Publication Number Publication Date
WO2020253385A1 true WO2020253385A1 (zh) 2020-12-24

Family

ID=73748609

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/087301 WO2020253385A1 (zh) 2019-06-17 2020-04-27 一种传输背景流量传输信息的方法、装置及系统

Country Status (2)

Country Link
CN (1) CN112104464B (zh)
WO (1) WO2020253385A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745717A (zh) * 2020-12-23 2022-07-12 中国移动通信有限公司研究院 一种校验方法、装置、通信设备和计算机存储介质
CN116743789A (zh) * 2022-03-03 2023-09-12 腾讯科技(深圳)有限公司 感知数据上报方法、装置及信息生成方法、装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106982125A (zh) * 2016-01-18 2017-07-25 中兴通讯股份有限公司 策略计费控制方法、协议转换器、策略计费规则设备、系统
CN108111964A (zh) * 2016-11-25 2018-06-01 中兴通讯股份有限公司 一种执行传输策略的方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6904110B2 (en) * 1997-07-31 2005-06-07 Francois Trans Channel equalization system and method
CN107343294B (zh) * 2016-04-29 2022-08-02 中兴通讯股份有限公司 背景数据传输策略配置方法及装置
JP7396645B2 (ja) * 2017-03-17 2023-12-12 日本電気株式会社 バックグランドデータ転送のための方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106982125A (zh) * 2016-01-18 2017-07-25 中兴通讯股份有限公司 策略计费控制方法、协议转换器、策略计费规则设备、系统
CN108111964A (zh) * 2016-11-25 2018-06-01 中兴通讯股份有限公司 一种执行传输策略的方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CONVIDA WIRELESS LLC ET AL.: "Adding Support for Delivering Background Data Transfer Polices to the UE", 3GPP TSG-SA WG2 MEETING #133, S2-1905893, 17 May 2019 (2019-05-17), XP051736043, DOI: 20200710093615A *

Also Published As

Publication number Publication date
CN112104464A (zh) 2020-12-18
CN112104464B (zh) 2021-09-07

Similar Documents

Publication Publication Date Title
CN111200845B (zh) 一种资源信息发送方法、装置及系统
US11818608B2 (en) Third party charging in a wireless network
US11690005B2 (en) Network slice for visited network
US20230093339A1 (en) Session Management Method, Apparatus, and System
US12088501B2 (en) Systems and methods for supporting traffic steering through a service function chain
US11863983B2 (en) Provisioning of VLAN IDs in 5G systems
US20210368341A1 (en) Secure access for 5g iot devices and services
US20200413241A1 (en) Method for terminal setting update in wireless communication system and apparatus therefor
US20200196130A1 (en) Ue configuration and update with network slice selection policy
CN117221239A (zh) 用于反射服务质量的分组过滤器的灵活范围
WO2021197185A1 (zh) 一种通信方法和通信装置
EP3833150A1 (en) User plane security policy implementation method, apparatus, and system
WO2020147756A1 (zh) 一种会话管理方法及装置
US20220346052A1 (en) Support of network slicing for sms
WO2021070086A1 (en) Ue controlled pdu sessions on a network slice
US20240073772A1 (en) User equipment (ue) policy enhancment for ue route selection policy (ursp) in evolved packet system (eps)
KR20200134293A (ko) 통신 방법 및 장치
US20230388909A1 (en) Ensuring network control of simultaneous access to network slices with application awareness
WO2020253385A1 (zh) 一种传输背景流量传输信息的方法、装置及系统
WO2022171086A1 (zh) 支持信息获得的方法、装置、设备及可读存储介质
EP3972142A1 (en) Policy control function fallback
WO2023147051A1 (en) Personal internet-of-things networks
WO2020011173A1 (zh) 搬迁管理方法及装置
CN115866673A (zh) Ue驱动的分组流描述管理

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20825894

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20825894

Country of ref document: EP

Kind code of ref document: A1