WO2021081711A1 - Procédé, appareil et dispositif de communication - Google Patents

Procédé, appareil et dispositif de communication Download PDF

Info

Publication number
WO2021081711A1
WO2021081711A1 PCT/CN2019/113737 CN2019113737W WO2021081711A1 WO 2021081711 A1 WO2021081711 A1 WO 2021081711A1 CN 2019113737 W CN2019113737 W CN 2019113737W WO 2021081711 A1 WO2021081711 A1 WO 2021081711A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user identity
user
network device
identity
Prior art date
Application number
PCT/CN2019/113737
Other languages
English (en)
Chinese (zh)
Inventor
于海凤
李秉肇
陈磊
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201980101651.0A priority Critical patent/CN114600552A/zh
Priority to PCT/CN2019/113737 priority patent/WO2021081711A1/fr
Publication of WO2021081711A1 publication Critical patent/WO2021081711A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Definitions

  • This application relates to the field of mobile communication technology, and in particular to a communication method, device and equipment.
  • Dual card dual standby means that two subscriber identification module (SIM) cards/universal integrated circuit card (UICC) cards can be inserted into the mobile phone, and the two cards can be on standby at the same time.
  • SIM subscriber identification module
  • UICC universal integrated circuit card
  • Another concept is dual card dual standby dual pass, or dual card dual standby single pass.
  • the so-called “single pass” or “dual pass” refers to whether two cards in a mobile phone can conduct business at the same time (for example, two cards can make calls at the same time). If two cards in a mobile phone can conduct business at the same time, Then the mobile phone is dual-SIM/dual-standby dual-pass, and if the two cards in a mobile phone cannot perform business at the same time, then the mobile phone is dual-sim dual-standby single-pass.
  • the SIM1 card when the SIM1 card is in a radio resource control (radio resource control, RRC) connection state, the SIM2 card in it will be in an RRC idle state or an RRC inactive state. If the SIM2 card has data that needs to be sent or received, the RRC connection of the SIM1 card needs to be cut off, and the RRC connection between the SIM2 card and the network needs to be established or restored. However, this process takes a long time, leading to a long service delay.
  • RRC radio resource control
  • the embodiments of the present application provide a communication method, device, and equipment to reduce service delay.
  • a first communication method is provided, which is applicable to a terminal device that supports a first user identity and a second user identity, and the method includes: sending the first user identity to the first network device as the first user.
  • Information the first information includes second information and third information
  • the terminal device is in an RRC connected state in the network where the first user identity is located, and is in an RRC idle state in the network where the second user identity is located State or RRC inactive state, wherein the second information is used to request the establishment of an RRC connection with the identity of the second user, and the third information is used to indicate that the establishment of the RRC connection with the identity of the second user is complete, or
  • the second information is used to request the re-establishment of the RRC connection as the second user
  • the third information is used to indicate that the re-establishment of the RRC connection as the second user is completed, or the second information is used to request the Recovering the RRC connection as the second user, the third information is used to indicate that the recovery of the RRC
  • the method may be executed by a first communication device, and the first communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the first communication device is a terminal device, or a chip set in the terminal device for realizing the function of the terminal device, or other component used for realizing the function of the terminal device.
  • the first communication device is a terminal device.
  • the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user. If it is necessary to establish a connection with the network as the second user identity, the first information corresponding to the second user identity can be sent to the first network device through the first user identity, so as to establish the second user through the RRC connection of the first user identity
  • the RRC connection between the identity and the network can not only meet the requirement of establishing an RRC connection between the identity of the second user and the network, but also reduce the time required to establish the RRC connection, thereby reducing service delay and improving user experience.
  • the second information is information included in a third message in the random access process corresponding to the second user identity
  • the third message is an RRC establishment request message and an RRC reconstruction Request message or RRC recovery request message.
  • the second information may be information included in different messages, and these messages include but are not limited to an RRC establishment request message, an RRC reconstruction request message, or an RRC recovery request message.
  • the information included in the third message in the random access process corresponding to the second user identity can be sent to the network through the first user identity, and when the first user identity has not disconnected from the first network device, The random access process of the second user identity can be performed, thereby speeding up the process of establishing the RRC connection with the second user identity and reducing the time delay.
  • the third information is information included in a fifth message in the random access process corresponding to the second user identity
  • the fifth message is an RRC establishment complete message, RRC reestablishment Complete message or RRC recovery complete message.
  • the third information may be information included in different messages, and these messages include, but are not limited to, an RRC establishment complete message, an RRC reconstruction complete message, or an RRC recovery complete message.
  • the third information is an RRC establishment complete message; or if the second information is an RRC reestablishment request message, the third information is an RRC reestablishment complete message; or, if the second information It is an RRC recovery request message, and the third information is an RRC recovery complete message.
  • the information included in the third message and the information included in the fifth message in the random access process corresponding to the second user identity can be sent to the network through the first user identity, and the first user identity is not disconnected from the first network.
  • the random access process of the second user identity can be performed, and the information included in the third message and the information included in the fifth message can be sent together, thereby further speeding up the process of establishing an RRC connection with the second user identity , Reduce the time delay.
  • receiving the fourth information from the first network device as the first user includes:
  • the fourth information is transmitted through an RRC reconfiguration message.
  • the fourth information includes response information of the second information and response information of the third information.
  • the second network device may add the fourth information to a message, for example, the message is called the second merged message, which is equivalent to that the second merged message includes the fourth information.
  • the message can also have other names, and the name of the message does not constitute a restriction on the message itself.
  • the second merged message may reuse existing messages, or may also be a newly added message in the embodiment of the present application.
  • an implementation manner of the second merge message is that the second merge message is specifically an RRC reconfiguration message.
  • the implementation of the second merge message is not limited to this.
  • the second network device may send the second merge message to the first network device, and the first network device receives the second merge message and also receives the fourth information.
  • the response information of the second information may include all or part of the information of the fourth message in the random access process corresponding to the second user identity, and the response information of the third information may include all or part of the information of the RRC reconfiguration message. Then, the information included in the fourth message and the information included in the RRC reconfiguration message should be added to one message. If there is a duplicate part in the information included in the fourth message and the information included in the RRC reconfiguration message, the Only need to include one copy in the second merged message. In this way, the redundant information in the second combined message can be reduced, the overhead of the second combined message can be reduced, and the success rate of effective information transmission can also be improved.
  • the second network device may also put the response information of the second information and the response information of the third information into different messages, and send the response information of the second information and the response information of the third information to the first network device. It is also equivalent to that the second network device sends the fourth information to the first network device.
  • the method before sending the first information to the first network device as the first user, the method further includes:
  • the terminal device Before sending the first information to the first network device as the first user, the terminal device can first determine whether it can send the first information to the first network device as the first user, so as to minimize the probability of sending errors.
  • determining to send the first information to the first network device as the first user includes:
  • the difference between the first timing advance and the second timing advance being less than or equal to the first threshold, it is determined that the first information is sent to the first network device as the first user, wherein the The first timing advance is the timing advance corresponding to the terminal device communicating in the first network device as the first user, and the second timing advance is the terminal device using the second The time advance corresponding to the communication of the user identity in the second network device, where the second network device is the network device where the terminal device resides as the second user; or,
  • the first instruction information from the second network device it is determined to initiate the random access process corresponding to the first user identity to the first network device as the first user identity.
  • the difference between the first timing advance and the second timing advance is less than or equal to the first threshold. It can be understood that the first timing advance is equal to or close to the second timing advance (if the first threshold is 0, the first timing advance The advance is equal to the second time advance).
  • the first threshold may be configured by the first network device, or configured by the second network device, or determined by the terminal device itself, or specified by agreement. If the first timing advance and the second timing advance are equal or similar, it can basically be guaranteed that the terminal device can correctly receive the information related to the second user's identity as the first user. To make the first timing advance and the second timing advance equal or similar, for example, one way is that the first network device and the second network device are co-located.
  • first timing advance and the second timing advance may be neither equal nor close.
  • the difference between the first timing advance and the second timing advance may also be greater than the first threshold, as long as the first network device and the The second network device knows the first timing advance and the second timing advance.
  • the first timing advance and the second timing advance are taken into account, so that the terminal device can correctly receive the second user as the first user. Identity-related information is sufficient.
  • the terminal device may determine to initiate a random access process corresponding to the second user identity to the first network device as the first user identity according to the first indication information from the second network device, without obtaining the corresponding timing advance, and the method is more simple.
  • the method before sending the first information to the first network device as the first user, the method further includes:
  • the terminal device may also send fifth information as the first user identity to the first network device, and the fifth information may include random information corresponding to the second user identity. Random access preamble during the access process.
  • the terminal device can send the first message in the random access process corresponding to the second user identity to the first network device as the first user identity, and the first message can be regarded as the random access preamble.
  • the first network device may forward the fifth information to the second network device where the second user identity resides, and the second network device receives the fifth information from the first network device.
  • the second network device may generate sixth information according to the fifth information, and send the sixth information to the first network device, and the first network device receives the sixth information from the second network device.
  • the sixth information is used to respond to the fifth information.
  • the sixth information may include all or part of the information included in the second message in the random access process corresponding to the second user identity.
  • the second timing advance can be included in the sixth information.
  • the second network device may send the second message in the random access process corresponding to the second user identity to the first network device.
  • the second message includes the sixth information, and the first network device may receive the message from the second network device.
  • the terminal device can obtain the second timing advance through the normal interaction process with the first network device, without additional information to obtain the second timing advance, which helps to save signaling overhead.
  • sending fifth information to the first network device as the first user includes one or more of the following:
  • the fifth information includes the identity of the second user.
  • the fifth information is sent to the first network device as the first user, the fifth information is transmitted through a fourth physical resource, and the fourth physical resource is different from the third physical resource.
  • the third physical resource is used to send the random access preamble corresponding to the first user identity to the first network device as the first user identity; or,
  • the fifth information includes the identity of the second user.
  • the terminal device wants to send fifth information to the first network device as the first user, the fifth information corresponds to the second user identity, and the terminal device will also send the first user to the first network device as the first user.
  • Identity-related information for example, when the terminal device performs random access with the identity of the first user, it will also use the identity of the first user to send the first message corresponding to the identity of the first user to the first network device.
  • the information corresponding to the identity of the first user and the information corresponding to the identity of the second user can both be sent as the identity of the first user. If they are not distinguished, it may cause the first network device to respond incorrectly.
  • the terminal device can distinguish the fifth information from the random access preamble corresponding to the first user identity through physical resources; or, the fifth information can be distinguished from the random access preamble corresponding to the first user identity through the user identity.
  • Access preamble alternatively, the fifth information can be distinguished from the random access preamble corresponding to the first user identity by physical resources, or the random access preamble corresponding to the first user identity can be distinguished from the fifth information by the user identity.
  • the first network device can determine which user identity the received information actually corresponds to, so that it can perform correct processing.
  • sending the first information to the first network device as the first user includes one or more of the following:
  • the first information is sent to the first network device in the identity of the first user and in the second SRB, where the second SRB is different from the first SRB, and the first SRB is used to
  • the user identity sends the information corresponding to the first user identity to the first network device; or,
  • the first information is sent to the first network device using the identity of the first user and the second logical channel corresponding to the first SRB.
  • the second logical channel is different from the first logical channel, and the first logical channel is different from the first logical channel.
  • the logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the first user identity sends the information corresponding to the first user identity to the first network device.
  • this implementation manner is described as sending the first information to the first network device as the first user, including one or more of the following:
  • the first information is sent to the first network device as the first user, the first information is transmitted through a second SRB, and the second SRB is different from the first SRB, and the first SRB Used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the first information is sent to the first network device as the first user.
  • the first information is transmitted through a second logical channel corresponding to the first SRB, and the second logical channel is different from the first logical channel.
  • Logical channel the first logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the first information is sent to the first network device as the first user, the first information is transmitted through a second physical resource, and the second physical resource is different from the first physical resource.
  • the first physical resource is used to send the information corresponding to the first user identity to the first network device as the first user identity.
  • the terminal device wants to send the first information to the first network device as the first user, the first information corresponds to the second user identity, and the terminal device will also send the first user to the first network device as the first user.
  • the information corresponding to the identity for example, when the terminal device performs random access with the identity of the first user, it will also use the identity of the first user to send a third message or a fifth message corresponding to the identity of the first user to the first network device.
  • the information corresponding to the identity of the first user and the information corresponding to the identity of the second user can both be sent as the identity of the first user. If they are not distinguished, it may cause the first network device to respond incorrectly. Therefore, in the embodiment of the present application, the terminal device can also distinguish the first information and the information corresponding to the first user identity.
  • the terminal device distinguishing method may include one or more of the following: distinguish the first information and the information corresponding to the first user identity through the SRB, and distinguish the first information and the information corresponding to the first user identity through the logical channel.
  • the first information is distinguished from the information corresponding to the first user's identity by the identifier of the user's identity, or the first information is distinguished from the information corresponding to the first user's identity by the physical resource.
  • the terminal device can distinguish the first information from the information corresponding to the first user identity through SRB; or the terminal device can distinguish the first information from the information corresponding to the first user identity through the logical channel and the user identity; or, the terminal device
  • the first information can be distinguished from the information corresponding to the first user identity by the identification of SRB, logical channel, and user identity; or the terminal device can distinguish the first information from the first user by the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • the first network device can determine which user identity the received information actually corresponds to, so that it can perform correct processing.
  • receiving the fourth information from the first network device as the first user includes one or more of the following:
  • the fourth information from the first network device is received with the identity of the first user and with a fourth SRB, where the fourth SRB is different from the third SRB, and the third SRB is used to A user identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth information from the first network device is received in the identity of the first user and in the fourth logical channel corresponding to the third SRB.
  • the fourth logical channel is different from the third logical channel, and the fourth logical channel is different from the third logical channel.
  • the three logical channels are used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information from the first network device is received with the identity of the first user and with a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used for Receiving the information corresponding to the first user identity from the first network device as the first user identity.
  • the implementation manner is described as receiving the fourth information from the first network device as the first user, including one or more of the following:
  • the fourth information is transmitted through a fourth SRB, the fourth SRB is different from the third SRB, and the third The SRB is configured to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information is transmitted through a fourth logical channel corresponding to the third SRB, and the fourth logical channel is different from the fourth logical channel
  • the third logical channel is used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information is transmitted through a second physical resource, and the second physical resource is different from the first physical resource, so The first physical resource is used to receive the information corresponding to the first user identity from the first network device as the first user identity.
  • the terminal device wants to receive the fourth information from the first network device as the first user, the fourth information corresponds to the second user identity, and the terminal device will also receive the second information from the first network device as the first user.
  • Information corresponding to a user identity for example, when the terminal device performs random access as the first user identity, it will also receive the third message or the fifth message corresponding to the first user identity from the first network device as the first user identity.
  • the information corresponding to the first user identity and the information corresponding to the second user identity can both be received as the first user. If they are not distinguished, the terminal device may respond incorrectly. Therefore, in the embodiment of the present application, the terminal device can also distinguish the fourth information from the information corresponding to the first user identity.
  • the method for distinguishing terminal devices may include one or more of the following: distinguish the fourth information and the information corresponding to the first user identity through SRB, and distinguish the fourth information and the information corresponding to the first user identity through the logical channel.
  • the fourth information is distinguished from the information corresponding to the first user identity through the identification of the user identity, or the fourth information is distinguished from the information corresponding to the first user identity through the physical resource.
  • the terminal device can distinguish the fourth information from the information corresponding to the first user identity through SRB; or the terminal device can distinguish the fourth information from the information corresponding to the first user identity through the logical channel and the user identity; or, the terminal device
  • the fourth information can be distinguished from the information corresponding to the first user identity by the identification of SRB, logical channel, and user identity; or the terminal device can distinguish the fourth information from the first user by the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • the first network device can determine which user identity the received information actually corresponds to, so that it can perform correct processing.
  • the fourth information includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • the second indication information indicates that the terminal device communicates in the second network as the second user, then subsequently, if the terminal device wants to send the information related to the second user's identity to the network, it can send it to the second network device as the second user. . If the second indication information indicates that the terminal device communicates in the first network with the identity of the second user, then if the terminal device wants to send the information related to the second user identity to the network, it can continue to forward the information through the identity of the first user. . For example, if the amount of information corresponding to the second user identity of the terminal device is small, the second indication information may indicate that the terminal device communicates with the second user identity in the first network, which neither affects the communication of the first user identity, but also causes the second user identity to communicate.
  • the information corresponding to the user identity is transmitted; or, if the amount of information corresponding to the second user identity of the terminal device is relatively large, the second indication information may indicate that the terminal device communicates with the second user identity in the second network, so as to ensure the second user identity.
  • the communication of the user identity proceeds normally.
  • the subsequent communication mode of the second user identity can be indicated, so that the communication mode of the network device and the terminal device for the second user identity is consistent.
  • a second communication method includes: receiving first information from a terminal device with a first user identity, where the first information includes second information and third information, and the terminal device supports the first The user identity and the second user identity, the terminal device is in the RRC connected state in the network where the first user identity is located, and is in the RRC idle state or the RRC inactive state in the network where the second user identity is located, where The second information is used to request the establishment of an RRC connection as the second user, and the third information is used to indicate that the establishment of the RRC connection as the second user is complete, or the second information is used to request The RRC connection is re-established as the second user, the third information is used to indicate that the RRC connection re-establishment is completed as the second user, or the second information is used to request the RRC to be restored as the second user Connection, the third information is used to indicate the completion of the restoration of the RRC connection as the second user; the fourth information is determined according to the first information, and the fourth information
  • the method may be executed by a second communication device, and the second communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the second communication device is a network device, or a chip set in the network device for realizing the function of the network device, or other component used for realizing the function of the network device.
  • the second communication device is the first network device.
  • the second information is information included in a third message in the random access process corresponding to the second user identity
  • the third message is an RRC establishment request message and an RRC reconstruction Request message or RRC recovery request message.
  • the third information is information included in a fifth message in the random access process corresponding to the second user identity
  • the fifth message is an RRC establishment complete message, RRC reestablishment Complete message or RRC recovery complete message.
  • sending the fourth information to the terminal device of the first user identity includes:
  • the fourth information is transmitted through an RRC reconfiguration message.
  • the method before receiving the first information from the terminal device of the first user identity, the method further includes:
  • receiving the fifth information of the terminal device from the first user identity includes one or more of the following:
  • the terminal device sends the random access preamble corresponding to the first user identity to the first network device as the first user identity; or,
  • the fifth information includes the identity of the second user.
  • receiving the first information from the terminal device of the first user identity includes one or more of the following:
  • the first user identity sends the information corresponding to the first user identity to the first network device;
  • the device Receiving the first information transmitted through a second physical resource from a terminal device of the first user identity, where the second physical resource is different from the first physical resource, and the first physical resource is used for the terminal
  • the device sends the information corresponding to the first user identity to the first network device as the first user identity.
  • sending the fourth information to the terminal device of the first user identity includes one or more of the following:
  • the fourth information is sent to the terminal device of the first user identity through a fourth SRB.
  • the fourth SRB is different from the third SRB, and the third SRB is used by the terminal device to communicate with the first user.
  • the identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth information is sent to the first user identity through the fourth logical channel corresponding to the third SRB, the fourth logical channel is different from the third logical channel, and the third logical channel is used for the terminal device Receiving the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information is sent to the terminal device of the first user identity through a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used by the terminal device to communicate with each other.
  • the first user identity receives information corresponding to the first user identity from the first network device.
  • the fourth information includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • a third communication method is provided, which is applicable to a terminal device that supports a first user identity and a second user identity, and the method includes: sending a third message to the first network device as the first user identity
  • the third message is a third message in a random access process corresponding to the second user identity, and the third message is used to request the establishment, re-establishment, or restoration of an RRC connection with the second user identity, where:
  • the terminal device is in the RRC connected state in the network where the first user identity is located, and is in the RRC idle state or the RRC inactive state in the network where the second user identity is located;
  • the fourth message of the first network device where the fourth message is a fourth message in a random access process corresponding to the second user identity, and the fourth message is used to respond to the third message.
  • the method may be executed by a third communication device, and the third communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the third communication device is a terminal device, or a chip set in the terminal device for realizing the function of the terminal device, or other component used for realizing the function of the terminal device.
  • the third communication device is a terminal device.
  • the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user. If you need to establish a connection with the network as a second user, you can send a third message corresponding to the second user's identity to the first network device through the first user's identity, so as to assist the second user through the RRC connection of the first user's identity
  • the RRC connection between the identity establishment and the network can not only meet the requirement of establishing an RRC connection between the identity of the second user and the network, but also reduce the time required to establish the RRC connection process, and speed up the establishment of the RRC connection between the identity of the second user and the network. , Which reduces the time delay of the business and helps to improve the user experience.
  • the method further includes:
  • the fifth message in the random access process corresponding to the second user identity is sent to the first network device as the second user identity, where the fifth message is used to instruct to establish, as the second user identity, The reestablishment or restoration of the RRC connection is complete.
  • the terminal device After receiving the fourth message in the random access process corresponding to the second user identity from the first network device through the first user identity, it can be considered that the terminal device is in the RRC connection state as the second user identity, and the terminal device can be in the second user identity.
  • the user identity sends a fifth message to the second network device, and the terminal device can continue to execute the subsequent communication process as the second user identity.
  • the method before sending the third message to the first network device as the first user, the method further includes:
  • the terminal device Before sending the first information to the first network device as the first user, the terminal device can first determine whether it can send the first information to the first network device as the first user, so as to minimize the probability of sending errors.
  • determining to send the third message to the first network device as the first user includes:
  • the third message is sent to the first network device as the first user, wherein the The first timing advance is the timing advance corresponding to the terminal device communicating in the first network device as the first user, and the second timing advance is the terminal device using the second The time advance corresponding to the communication of the user identity in the second network device, where the second network device is the network device where the terminal device resides as the second user; or,
  • the first instruction information from the second network device it is determined to initiate the random access process of the second user identity to the first network device as the first user identity.
  • the difference between the first timing advance and the second timing advance is less than or equal to the first threshold. It can be understood that the first timing advance is equal to or close to the second timing advance (if the first threshold is 0, the first timing advance The advance is equal to the second time advance).
  • the first threshold may be configured by the first network device, or configured by the second network device, or determined by the terminal device itself, or specified by agreement. If the first timing advance and the second timing advance are equal or similar, it can basically be ensured that the terminal device can correctly receive the information related to the second user's identity as the first user. To make the first timing advance and the second timing advance equal or similar, for example, one way is that the first network device and the second network device are co-located.
  • first timing advance and the second timing advance may be neither equal nor close.
  • the difference between the first timing advance and the second timing advance may also be greater than the first threshold, as long as the first network device and the The second network device knows the first timing advance and the second timing advance.
  • the first timing advance and the second timing advance are considered, so that the terminal device can correctly receive the second user as the first user. Identity-related information is fine.
  • the terminal device may determine to initiate a random access process corresponding to the second user identity to the first network device as the first user identity according to the first indication information from the second network device, without obtaining the corresponding timing advance, and the method is more simple.
  • the method before sending the third message to the first network device as the first user, the method further includes:
  • Receive second information from the first network device as the first user the second information is used to respond to the first information, and the second information includes the second timing advance, where: The second timing advance is not equal to the first timing advance, and the second network device is a network device where the terminal device resides as the second user.
  • the terminal device may also send the first information as the first user identity to the first network device, and the first information may include a random message corresponding to the second user identity. Random access preamble during the access process.
  • the terminal device may send the first message in the random access process corresponding to the second user identity to the first network device as the first user identity, and the first message may be regarded as the random access preamble.
  • the first network device may forward the first information to the second network device where the second user identity resides, and the second network device receives the first information from the first network device.
  • the second network device may generate second information according to the first information, and send the second information to the first network device, and the first network device receives the second information from the second network device.
  • the second information is used to respond to the first information.
  • the second information may include all or part of the information included in the second message in the random access process corresponding to the second user identity.
  • the second time advance can be included in the second information.
  • the second network device may send the second message in the random access process corresponding to the second user identity to the first network device.
  • the second message includes the second information, and the first network device may receive the message from the second network device.
  • the second message The terminal device can obtain the second timing advance through the normal interaction process with the first network device, without additional information to obtain the second timing advance, which helps to save signaling overhead.
  • sending the first information to the first network device as the first user includes one or more of the following:
  • the first information includes the identity of the second user.
  • the implementation manner is described as sending first information to the first network device as the first user, including one or more of the following:
  • the first information is sent to the first network device as the first user, the first information is transmitted through a fourth physical resource, and the fourth physical resource is different from the third physical resource.
  • the third physical resource is used to send the random access preamble corresponding to the first user identity to the first network device as the first user identity; or,
  • the first information includes the identity of the second user.
  • the terminal device wants to send the first information to the first network device as the first user, the first information corresponds to the second user identity, and the terminal device will also send the first user to the first network device as the first user.
  • Identity-related information for example, when the terminal device performs random access with the identity of the first user, it will also use the identity of the first user to send the first message corresponding to the identity of the first user to the first network device.
  • the information corresponding to the identity of the first user and the information corresponding to the identity of the second user can both be sent as the identity of the first user. If they are not distinguished, it may cause the first network device to respond incorrectly.
  • the terminal device can distinguish the first information and the random access preamble corresponding to the first user identity through physical resources; or, can distinguish the first information and the random access preamble corresponding to the first user identity through the user identity identifier.
  • the first network device can determine which user identity the received information actually corresponds to, so that it can perform correct processing.
  • sending the third message to the first network device as the first user includes one or more of the following:
  • the third message is sent to the first network device in the identity of the first user and in the second SRB.
  • the second SRB is different from the first SRB, and the first SRB is used to
  • the user identity sends the information corresponding to the first user identity to the first network device; or,
  • the third message is sent to the first network device using the identity of the first user and the second logical channel corresponding to the first SRB.
  • the second logical channel is different from the first logical channel, and the first logical channel is different from the first logical channel.
  • the logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the third message is sent to the first network device using the first user identity and using a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used to
  • the first user identity sends the information corresponding to the first user identity to the first network device.
  • this implementation manner is described as sending a third message to the first network device as the first user, including one or more of the following:
  • the third message is sent to the first network device as the first user, the third message is transmitted through a second SRB, and the second SRB is different from the first SRB, and the first SRB Used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the third message is sent to the first network device as the first user, and the third message is transmitted through a second logical channel corresponding to the first SRB, and the second logical channel is different from the first logical channel.
  • Logical channel the first logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the third message is sent to the first network device as the first user, the third message is transmitted through a second physical resource, and the second physical resource is different from the first physical resource.
  • the first physical resource is used to send the information corresponding to the first user identity to the first network device as the first user identity.
  • the terminal device wants to send a third message to the first network device as the first user, the third message corresponds to the second user identity, and the terminal device will also send the first user to the first network device as the first user
  • the information corresponding to the identity for example, when the terminal device performs random access with the identity of the first user, it will also use the identity of the first user to send a third message corresponding to the identity of the first user to the first network device.
  • the information corresponding to the identity of the first user and the information corresponding to the identity of the second user can both be sent as the identity of the first user. If they are not distinguished, it may cause the first network device to respond incorrectly. Therefore, in the embodiment of the present application, the terminal device can also distinguish the three messages and the information corresponding to the first user identity.
  • the terminal device distinguishing method may include one or more of the following: distinguish the first information and the information corresponding to the first user identity through the SRB, and distinguish the third message and the information corresponding to the first user identity through the logical channel Information, the third message is distinguished from the information corresponding to the first user identity by the user identity, or the third message is distinguished from the information corresponding to the first user identity by the physical resource.
  • the terminal device can distinguish the third message from the information corresponding to the first user identity through SRB; or, the terminal device can distinguish the third message from the information corresponding to the first user identity through the logical channel and the user identity; or, the terminal device The third message can be distinguished from the information corresponding to the first user identity through the identification of SRB, logical channel, and user identity; or the terminal device can distinguish the third message from the first user through the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • the first network device can determine which user identity the received information actually corresponds to, so that it can perform correct processing.
  • receiving the fourth message from the first network device as the first user includes one or more of the following:
  • the fourth message from the first network device is received in the identity of the first user and in the fourth SRB, where the fourth SRB is different from the third SRB, and the third SRB is used to A user identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth message from the first network device is received in the identity of the first user and in the fourth logical channel corresponding to the third SRB.
  • the fourth logical channel is different from the third logical channel, and the fourth logical channel is different from the third logical channel.
  • the three logical channels are used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message from the first network device is received with the identity of the first user and with a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used for Receiving the information corresponding to the first user identity from the first network device as the first user identity.
  • the fourth message is transmitted through a fourth SRB, the fourth SRB is different from the third SRB, and the third The SRB is configured to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message is transmitted through a fourth logical channel corresponding to the third SRB, and the fourth logical channel is different from the fourth logical channel
  • the third logical channel is used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message is transmitted through a second physical resource, and the second physical resource is different from the first physical resource, so The first physical resource is used to receive the information corresponding to the first user identity from the first network device as the first user identity.
  • the terminal device wants to receive the fourth message from the first network device as the first user, the fourth message corresponds to the second user identity, and the terminal device will also receive the second message from the first network device as the first user.
  • Information corresponding to a user identity for example, when the terminal device performs random access as the first user identity, it will also receive the fourth message corresponding to the first user identity from the first network device as the first user identity.
  • the information corresponding to the first user identity and the information corresponding to the second user identity can both be received as the first user. If they are not distinguished, the terminal device may respond incorrectly. Therefore, in this embodiment of the present application, the terminal device can also distinguish the fourth message from the information corresponding to the first user identity.
  • the terminal device distinguishing method may include one or more of the following: distinguish the fourth message and the information corresponding to the first user identity through the SRB, and distinguish the fourth message and the information corresponding to the first user identity through the logical channel Information, distinguishing the fourth message and the information corresponding to the first user identity by the user identity, or distinguishing the fourth message and the information corresponding to the first user identity by the physical resource.
  • the terminal device can distinguish the fourth message from the information corresponding to the first user identity through SRB; or the terminal device can distinguish the fourth message from the information corresponding to the first user identity through the logical channel and the user identity; or, the terminal device
  • the fourth message can be distinguished from the information corresponding to the first user identity by the identification of SRB, logical channel, and user identity; or the terminal device can distinguish the fourth message from the first user by the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • the first network device can determine which user identity the received information actually corresponds to, so that it can perform correct processing.
  • the fourth message includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • the second indication information indicates that the terminal device communicates in the second network as the second user, then subsequently, if the terminal device wants to send the information related to the second user's identity to the network, it can send it to the second network device as the second user. . If the second indication information indicates that the terminal device communicates in the first network with the identity of the second user, then if the terminal device wants to send the information related to the second user identity to the network, it can continue to forward the information through the identity of the first user. . For example, if the amount of information corresponding to the second user identity of the terminal device is small, the second indication information may indicate that the terminal device communicates with the second user identity in the first network, which neither affects the communication of the first user identity, but also causes the second user identity to communicate.
  • the information corresponding to the user identity is transmitted; or, if the amount of information corresponding to the second user identity of the terminal device is relatively large, the second indication information may indicate that the terminal device communicates with the second user identity in the second network, so as to ensure the second user identity.
  • the communication of the user identity proceeds normally.
  • the subsequent communication mode of the second user identity can be indicated, so that the communication mode of the network device and the terminal device for the second user identity is consistent.
  • a fourth communication method includes: receiving a third message from a terminal device with a first user identity, where the third message is the first message in a random access process corresponding to the second user identity. Three messages, the third message is used to request the establishment, re-establishment or restoration of the RRC connection as the second user identity, wherein the terminal device supports the first user identity and the second user identity, and the terminal device is in the The network where the first user identity is located is in the RRC connected state, and the network where the second user identity is located is in the RRC idle state or the RRC inactive state; a fourth message is determined according to the third message, the fourth message Is the fourth message in the random access process corresponding to the second user identity, the fourth message is used to respond to the third message; the fourth message is sent to the first user identity Terminal Equipment.
  • the method may be executed by a fourth communication device, and the fourth communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the fourth communication device is a network device, or a chip set in the network device for realizing the function of the network device, or other component used for realizing the function of the network device.
  • the fourth communication device is the first network device.
  • the method further includes:
  • the method before receiving the first information from the terminal device of the first user identity, the method further includes:
  • receiving the first information of the terminal device from the first user identity includes one or more of the following:
  • the terminal device receives the first information transmitted through a fourth physical resource from the terminal device of the first user identity, where the fourth physical resource is different from the third physical resource, and the third physical resource is used for all
  • the terminal device sends the random access preamble corresponding to the first user identity to the first network device as the first user identity; or,
  • the fifth information includes the identity of the second user.
  • receiving the third message from the terminal device of the first user identity includes one or more of the following:
  • the first user identity sends the information corresponding to the first user identity to the first network device;
  • the device Receiving the third message transmitted through a second physical resource from a terminal device of the first user identity, where the second physical resource is different from the first physical resource, and the first physical resource is used for the terminal
  • the device sends the information corresponding to the first user identity to the first network device as the first user identity.
  • sending the fourth message to the terminal device of the first user identity includes one or more of the following:
  • the fourth message is sent to the terminal device of the first user identity through a fourth SRB.
  • the fourth SRB is different from the third SRB, and the third SRB is used by the terminal device to communicate with the first user.
  • the identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth message is sent to the first user identity through the fourth logical channel corresponding to the third SRB, the fourth logical channel is different from the third logical channel, and the third logical channel is used for the terminal device Receiving the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message is sent to the terminal device of the first user identity through a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used by the terminal device to communicate with each other.
  • the first user identity receives information corresponding to the first user identity from the first network device.
  • the fourth message includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • a communication device is provided, for example, the communication device is the first communication device as described above.
  • the first communication device is used to execute the method in the foregoing first aspect or any possible implementation manner.
  • the first communication device may include a module for executing the method in the first aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the first communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the first communication device is a terminal device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver (or transmitter and receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the first communication device is a terminal device, and the processing module, the sending module, and the receiving module are used as examples for the introduction. among them,
  • the sending module is configured to send first information to a first network device as a first user.
  • the first information includes second information and third information.
  • the terminal device supports the first user identity and the second network device.
  • User identity the terminal device is in the RRC connected state in the network where the first user identity is located, and is in the RRC idle state or RRC inactive state in the network where the second user identity is located, wherein the second user identity is in an RRC idle state or an RRC inactive state.
  • the information is used to request to establish an RRC connection with the identity of the second user
  • the third information is used to indicate that the establishment of the RRC connection with the identity of the second user is complete, or the second information is used to request the establishment of an RRC connection with the second user.
  • the RRC connection is re-established as the user, and the third information is used to indicate that the RRC connection re-establishment as the second user is completed, or the second information is used to request that the RRC connection be restored as the second user, and the first The third information is used to indicate the completion of the restoration of the RRC connection as the second user;
  • the receiving module is configured to receive fourth information from the first network device as the first user, and the fourth information is used to respond to the first information.
  • the second information is information included in a third message in the random access process corresponding to the second user identity
  • the third message is an RRC establishment request message and an RRC reconstruction Request message or RRC recovery request message.
  • the third information is information included in a fifth message in the random access process corresponding to the second user identity
  • the fifth message is an RRC establishment complete message, RRC reestablishment Complete message or RRC recovery complete message.
  • the receiver is configured to receive the fourth information from the first network device as the first user in the following manner:
  • the fourth information is transmitted through an RRC reconfiguration message.
  • the processing module is configured to determine to send the first information to the first network device as the first user before the sending module sends the first information to the first network device as the first user.
  • the processing module is configured to determine to send the first information to the first network device as the first user in the following manner:
  • the difference between the first timing advance and the second timing advance being less than or equal to the first threshold, it is determined that the first information is sent to the first network device as the first user, wherein the The first timing advance is the timing advance corresponding to the terminal device communicating in the first network device as the first user, and the second timing advance is the terminal device using the second The time advance corresponding to the communication of the user identity in the second network device, where the second network device is the network device where the terminal device resides as the second user; or,
  • the first instruction information from the second network device it is determined to initiate the random access process of the second user identity to the first network device as the first user identity.
  • the sending module is further configured to send fifth information as the first user to the first network device before sending the first information as the first user to the first network device, where the fifth information includes The random access preamble in the random access process corresponding to the second user identity;
  • the receiving module is further configured to receive sixth information from the first network device as the first user, where the sixth information is used to respond to the fifth information, and the sixth information includes the A second timing advance, wherein the second timing advance is not equal to the first timing advance, and the second network device is a network device where the terminal device resides as the second user.
  • the sending module is configured to send fifth information to the first network device as the first user in one or more of the following ways:
  • the fifth information includes the identity of the second user.
  • the sending module is configured to send fifth information to the first network device as the first user in one or more of the following ways:
  • the fifth information is sent to the first network device as the first user, the fifth information is transmitted through a fourth physical resource, and the fourth physical resource is different from the third physical resource.
  • the third physical resource is used to send the random access preamble corresponding to the first user identity to the first network device as the first user identity; or,
  • the fifth information includes the identity of the second user.
  • the sending module is configured to send the first information to the first network device as the first user in one or more of the following ways:
  • the first information is sent to the first network device in the identity of the first user and in the second SRB, where the second SRB is different from the first SRB, and the first SRB is used to
  • the user identity sends the information corresponding to the first user identity to the first network device; or,
  • the first information is sent to the first network device using the identity of the first user and the second logical channel corresponding to the first SRB.
  • the second logical channel is different from the first logical channel, and the first logical channel is different from the first logical channel.
  • the logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the first user identity sends the information corresponding to the first user identity to the first network device.
  • the sending module is configured to send the first information to the first network device as the first user in one or more of the following ways:
  • the first information is sent to the first network device as the first user, the first information is transmitted through a second SRB, and the second SRB is different from the first SRB, and the first SRB Used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the first information is sent to the first network device as the first user.
  • the first information is transmitted through a second logical channel corresponding to the first SRB, and the second logical channel is different from the first logical channel.
  • Logical channel the first logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the first information is sent to the first network device as the first user, the first information is transmitted through a second physical resource, and the second physical resource is different from the first physical resource.
  • the first physical resource is used to send the information corresponding to the first user identity to the first network device as the first user identity.
  • the receiving module is configured to receive the fourth information from the first network device as the first user in one or more of the following ways:
  • the fourth information from the first network device is received with the identity of the first user and with a fourth SRB, where the fourth SRB is different from the third SRB, and the third SRB is used to A user identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth information from the first network device is received in the identity of the first user and in the fourth logical channel corresponding to the third SRB.
  • the fourth logical channel is different from the third logical channel, and the fourth logical channel is different from the third logical channel.
  • the three logical channels are used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information from the first network device is received with the identity of the first user and with a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used for Receiving the information corresponding to the first user identity from the first network device as the first user identity.
  • the receiving module is configured to receive the fourth information from the first network device as the first user in one or more of the following ways:
  • the fourth information is transmitted through a fourth SRB, the fourth SRB is different from the third SRB, and the third The SRB is configured to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information is transmitted through a fourth logical channel corresponding to the third SRB, and the fourth logical channel is different from the fourth logical channel
  • the third logical channel is used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information is transmitted through a second physical resource, and the second physical resource is different from the first physical resource, so The first physical resource is used to receive the information corresponding to the first user identity from the first network device as the first user identity.
  • the fourth information includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • a communication device is provided, for example, the communication device is the second communication device as described above.
  • the second communication device is used to execute the method in the foregoing second aspect or any possible implementation manner.
  • the second communication device may include a module for executing the method in the second aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the second communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a first network device.
  • the second communication device is the first network device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter, and the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver (or, transmitter and receiver) is, for example, a communication interface in the chip, and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the second communication device is the first network device, and the processing module, the sending module, and the receiving module are used as examples for the introduction. among them,
  • the receiving module is configured to receive first information from a terminal device with a first user identity, the first information includes second information and third information, and the terminal device supports the first user identity and the second user identity,
  • the terminal device is in the RRC connected state in the network where the first user identity is located, and is in the RRC idle state or the RRC inactive state in the network where the second user identity is located, wherein the second information is used for Request to establish an RRC connection with the identity of the second user, the third information is used to indicate that the establishment of the RRC connection with the identity of the second user is complete, or the second information is used to request the establishment of the RRC connection with the identity of the second user RRC connection, the third information is used to indicate that the reestablishment of the RRC connection as the second user is complete, or the second information is used to request the resumption of the RRC connection as the second user, and the third information is used Instructing to complete the restoration of the RRC connection as the second user;
  • the processing module is configured to determine fourth information according to the first information, and the fourth information is used to respond to the first information;
  • the sending module is configured to send the fourth information to the terminal device of the first user identity.
  • the second information is information included in a third message in the random access process corresponding to the second user identity
  • the third message is an RRC establishment request message and an RRC reconstruction Request message or RRC recovery request message.
  • the third information is information included in a fifth message in the random access process corresponding to the second user identity
  • the fifth message is an RRC establishment complete message, RRC reestablishment Complete message or RRC recovery complete message.
  • the sending module is configured to send the fourth information to the terminal device of the first user identity in the following manner:
  • the fourth information is transmitted through an RRC reconfiguration message.
  • the receiving module is further configured to receive fifth information from the terminal device of the first user identity before receiving the first information from the terminal device of the first user identity, where the fifth information includes the The random access preamble in the random access process corresponding to the second user identity;
  • the sending module is further configured to send sixth information to the terminal device of the first user identity, where the sixth information is used to respond to the fifth information, and the sixth information includes the second time Advance amount, wherein the second timing advance amount is not equal to the first timing advance amount, and the second network device is a network device where the terminal device resides as the second user.
  • the receiving module is configured to receive the fifth information from the terminal device of the first user identity through one or more of the following methods:
  • the terminal device sends the random access preamble corresponding to the first user identity to the first network device as the first user identity; or,
  • the fifth information includes the identity of the second user.
  • the receiving module is configured to receive the first information from the terminal device of the first user identity through one or more of the following methods:
  • the first user identity sends the information corresponding to the first user identity to the first network device;
  • the device Receiving the first information transmitted through a second physical resource from a terminal device of the first user identity, where the second physical resource is different from the first physical resource, and the first physical resource is used for the terminal
  • the device sends the information corresponding to the first user identity to the first network device as the first user identity.
  • the sending module is configured to send the fourth information to the terminal device of the first user identity through one or more of the following methods:
  • the fourth information is sent to the terminal device of the first user identity through a fourth SRB.
  • the fourth SRB is different from the third SRB, and the third SRB is used by the terminal device to communicate with the first user.
  • the identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth information is sent to the first user identity through the fourth logical channel corresponding to the third SRB, the fourth logical channel is different from the third logical channel, and the third logical channel is used for the terminal device Receiving the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information is sent to the terminal device of the first user identity through a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used by the terminal device to communicate with each other.
  • the first user identity receives information corresponding to the first user identity from the first network device.
  • the fourth information includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • a communication device is provided, for example, the communication device is the aforementioned third communication device.
  • the third communication device is used to execute the method in the foregoing third aspect or any possible implementation manner.
  • the third communication device may include a module for executing the method in the third aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the third communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the third communication device is a terminal device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the third communication device is a chip set in the communication device
  • the transceiver (or, the transmitter and the receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the third communication device is continued to be a terminal device, and the processing module, the sending module, and the receiving module are used as examples for the introduction. among them,
  • the sending module is configured to send a third message to the first network device with the identity of the first user, and the third message is the third message in the random access process corresponding to the identity of the second user.
  • the message is used to request to establish, reestablish, or restore an RRC connection as the second user identity, wherein the terminal device supports the first user identity and the second user identity, and the terminal device is in the first user
  • the network where the identity is located is in an RRC connected state
  • the network where the second user identity is located is in an RRC idle state or an RRC inactive state;
  • the receiving module is configured to receive a fourth message from the first network device as the first user identity, where the fourth message is a fourth message in a random access process corresponding to the second user identity , The fourth message is used to respond to the third message.
  • the sending module is further configured to send a fifth message in the random access process corresponding to the second user identity to the first network device as the second user identity,
  • the fifth message is used to indicate that the establishment, re-establishment or restoration of the RRC connection with the identity of the second user is completed.
  • the processing module is further configured to determine to send the third message to the first network device as the first user before the sending module sends the third message to the first network device as the first user The third message.
  • the processing module is configured to determine that the third message is sent to the first network device as the first user in the following manner:
  • the third message is sent to the first network device as the first user, wherein the The first timing advance is the timing advance corresponding to the terminal device communicating in the first network device as the first user, and the second timing advance is the terminal device using the second The time advance corresponding to the communication of the user identity in the second network device, where the second network device is the network device where the terminal device resides as the second user; or,
  • the first instruction information from the second network device it is determined to initiate the random access process of the second user identity to the first network device as the first user identity.
  • the sending module is further configured to send first information to the first network device as the first user before sending the third message to the first network device as the first user, where the first information includes The random access preamble in the random access process corresponding to the second user identity;
  • the receiving module is further configured to receive second information from the first network device as the first user, the second information is used to respond to the first information, and the second information includes the A second timing advance, wherein the second timing advance is not equal to the first timing advance, and the second network device is a network device where the terminal device resides as the second user.
  • the sending module is configured to send the first information to the first network device as the first user in one or more of the following ways:
  • the first information includes the identity of the second user.
  • the sending module is configured to send the first information to the first network device as the first user in one or more of the following ways:
  • the first information is sent to the first network device as the first user, the first information is transmitted through a fourth physical resource, and the fourth physical resource is different from the third physical resource.
  • the third physical resource is used to send the random access preamble corresponding to the first user identity to the first network device as the first user identity; or,
  • the first information includes the identity of the second user.
  • the sending module is configured to send a third message to the first network device as the first user in one or more of the following ways:
  • the third message is sent to the first network device in the identity of the first user and in the second SRB.
  • the second SRB is different from the first SRB, and the first SRB is used to
  • the user identity sends the information corresponding to the first user identity to the first network device; or,
  • the third message is sent to the first network device using the identity of the first user and the second logical channel corresponding to the first SRB.
  • the second logical channel is different from the first logical channel, and the first logical channel is different from the first logical channel.
  • the logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the third message is sent to the first network device using the first user identity and using a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used to
  • the first user identity sends the information corresponding to the first user identity to the first network device.
  • the sending module is configured to send a third message to the first network device as the first user in one or more of the following ways:
  • the third message is sent to the first network device as the first user, the third message is transmitted through a second SRB, and the second SRB is different from the first SRB, and the first SRB Used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the third message is sent to the first network device as the first user, and the third message is transmitted through a second logical channel corresponding to the first SRB, and the second logical channel is different from the first logical channel.
  • Logical channel the first logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the third message is sent to the first network device as the first user, the third message is transmitted through a second physical resource, and the second physical resource is different from the first physical resource.
  • the first physical resource is used to send the information corresponding to the first user identity to the first network device as the first user identity.
  • the receiving module is configured to receive the fourth message from the first network device as the first user in one or more of the following ways:
  • the fourth message from the first network device is received in the identity of the first user and in the fourth SRB, where the fourth SRB is different from the third SRB, and the third SRB is used to A user identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth message from the first network device is received in the identity of the first user and in the fourth logical channel corresponding to the third SRB.
  • the fourth logical channel is different from the third logical channel, and the fourth logical channel is different from the third logical channel.
  • the three logical channels are used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message from the first network device is received with the identity of the first user and with a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used for Receiving the information corresponding to the first user identity from the first network device as the first user identity.
  • the receiving module is configured to receive the fourth message from the first network device as the first user in one or more of the following ways:
  • the fourth message is transmitted through a fourth SRB, the fourth SRB is different from the third SRB, and the third The SRB is configured to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message is transmitted through a fourth logical channel corresponding to the third SRB, and the fourth logical channel is different from the fourth logical channel
  • the third logical channel is used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message is transmitted through a second physical resource, and the second physical resource is different from the first physical resource, so The first physical resource is used to receive the information corresponding to the first user identity from the first network device as the first user identity.
  • the fourth message includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • a communication device is provided, for example, the communication device is the fourth communication device as described above.
  • the fourth communication device is configured to execute the method in the foregoing fourth aspect or any possible implementation manner.
  • the fourth communication device may include a module for executing the method in the fourth aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or the same functional module, but can implement different functions.
  • the fourth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the fourth communication device is a terminal device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the fourth communication device is a chip set in the communication device
  • the transceiver (or, the transmitter and the receiver) is, for example, a communication interface in the chip, and the communication interface is connected with the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the fourth communication device is continued to be a terminal device, and the processing module, the sending module, and the receiving module are used as examples for the introduction. among them,
  • the receiving module is configured to receive a third message from the terminal device of the first user identity, the third message being a third message in a random access process corresponding to the second user identity, the third message Used to request to establish, re-establish or restore an RRC connection as the second user identity, wherein the terminal device supports a first user identity and a second user identity, and the terminal device is in the network where the first user identity is located In an RRC connected state, and in an RRC idle state or an RRC inactive state in the network where the second user identity is located;
  • the processing module is configured to determine a fourth message according to the third message, where the fourth message is a fourth message in a random access process corresponding to the second user identity, and the fourth message is used to respond The third message;
  • the sending module is configured to send the fourth message to the terminal device of the first user identity.
  • the receiving module is further configured to receive a fifth message in the random access process corresponding to the second user identity from the second user identity, and the fifth message is used It indicates that the establishment, re-establishment, or restoration of the RRC connection as the second user is complete.
  • the receiving module is further configured to receive first information from the terminal device of the first user identity before receiving the first information from the terminal device of the first user identity, where the first information includes the The random access preamble in the random access process corresponding to the second user identity;
  • the sending module is further configured to send second information to the terminal device of the first user identity, the second information is used to respond to the first information, and the second information includes the second time Advance amount, wherein the second timing advance amount is not equal to the first timing advance amount, and the second network device is a network device where the terminal device resides as the second user.
  • the receiving module is configured to receive the first information from the terminal device of the first user identity through one or more of the following methods:
  • the terminal device receives the first information transmitted through a fourth physical resource from the terminal device of the first user identity, where the fourth physical resource is different from the third physical resource, and the third physical resource is used for all
  • the terminal device sends the random access preamble corresponding to the first user identity to the first network device as the first user identity; or,
  • the fifth information includes the identity of the second user.
  • the receiving module is configured to receive the third message from the terminal device of the first user identity through one or more of the following methods:
  • the first user identity sends the information corresponding to the first user identity to the first network device;
  • the device Receiving the third message transmitted through a second physical resource from a terminal device of the first user identity, where the second physical resource is different from the first physical resource, and the first physical resource is used for the terminal
  • the device sends the information corresponding to the first user identity to the first network device as the first user identity.
  • the sending module is configured to send the fourth message to the terminal device of the first user identity through one or more of the following methods:
  • the fourth message is sent to the terminal device of the first user identity through a fourth SRB.
  • the fourth SRB is different from the third SRB, and the third SRB is used by the terminal device to communicate with the first user.
  • the identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth message is sent to the first user identity through the fourth logical channel corresponding to the third SRB, the fourth logical channel is different from the third logical channel, and the third logical channel is used for the terminal device Receiving the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message is sent to the terminal device of the first user identity through a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used by the terminal device to communicate with each other.
  • the first user identity receives information corresponding to the first user identity from the first network device.
  • the fourth message includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • a communication device is provided.
  • the communication device is, for example, the first communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the first aspect or various possible implementation manners.
  • the first communication device may not include a memory, and the memory may be located outside the first communication device.
  • the first communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the first aspect or various possible implementation manners.
  • the first communication device when the processor executes the computer instructions stored in the memory, the first communication device is caused to execute the method in the foregoing first aspect or any one of the possible implementation manners.
  • the first communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the communication interface is realized by a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as input/output pins, etc., and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the second communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the second aspect or various possible implementation manners.
  • the second communication device may not include a memory, and the memory may be located outside the second communication device.
  • the second communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the second aspect or various possible implementation manners.
  • the second communication device when the processor executes the computer instructions stored in the memory, the second communication device is caused to execute the method in the second aspect or any one of the possible implementation manners.
  • the second communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a first network device.
  • the communication interface is realized by, for example, a transceiver (or transmitter and receiver) in the communication device.
  • the transceiver is realized by an antenna, a feeder, and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the third communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the third aspect or various possible implementation manners.
  • the third communication device may not include a memory, and the memory may be located outside the third communication device.
  • the third communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the third aspect or various possible implementation manners.
  • the third communication device when the processor executes the computer instructions stored in the memory, the third communication device is caused to execute the method in the third aspect or any one of the possible implementation manners.
  • the third communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the communication interface is realized by a transceiver (or a transmitter and a receiver) in the communication device, for example, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the fourth communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the fourth aspect or various possible implementation manners.
  • the fourth communication device may not include a memory, and the memory may be located outside the fourth communication device.
  • the fourth communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the fourth aspect or various possible implementation manners.
  • the second communication device is caused to execute the method in the fourth aspect or any one of the possible implementation manners.
  • the fourth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a first network device.
  • the communication interface is realized by, for example, a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the fourth communication device is a chip set in a communication device, the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication system which includes the communication device described in the fifth aspect or the communication device described in the ninth aspect, and the communication device described in the sixth aspect or the communication device described in the tenth aspect ⁇ Communication device.
  • a communication system which includes the communication device described in the seventh aspect or the communication device described in the eleventh aspect, and the communication device described in the eighth aspect or the twelfth aspect The communication device.
  • the communication system described in the thirteenth aspect and the communication system described in the fourteenth aspect may be the same communication system or may be different communication systems.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the first aspect or any one of the above. The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the second aspect or any one of the above. The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the third aspect or any one of the foregoing The methods described in the possible implementations.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the fourth aspect or any one of the foregoing. The method described in one possible implementation.
  • a computer program product containing instructions is provided.
  • the computer program product is used to store computer instructions.
  • the computer instructions run on a computer, the computer executes the first aspect or any one of the above. The method described in one possible implementation.
  • a computer program product containing instructions is provided.
  • the computer program product is used to store computer instructions.
  • the computer instructions When the computer instructions are run on a computer, the computer executes the second aspect or any one of the foregoing. The method described in one possible implementation.
  • a computer program product containing instructions is provided, the computer program product is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the third aspect or any of the above The method described in one possible implementation.
  • a computer program product containing instructions is provided, the computer program product is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the fourth aspect or any of the above The method described in one possible implementation.
  • the terminal device if it needs to establish a connection with the network as the second user identity, it can establish the RRC connection between the second user identity and the network through the RRC connection of the first user identity, which can satisfy the second user
  • the need to establish an RRC connection between the identity and the network can also reduce the time required to establish an RRC connection, thereby reducing service delay and improving user experience.
  • Figure 1A is a schematic diagram of a dual-card dual-standby dual-pass mode of a mobile phone
  • Figure 1B is a schematic diagram of a dual-card dual-standby single-pass mode of a mobile phone
  • Fig. 2A is a schematic diagram of switching between two SIM cards in a mobile phone according to TDM mode
  • Figure 2B is a schematic diagram showing that only one SIM card in the mobile phone maintains an RRC connection with the network at a time;
  • 3A to 3D are schematic diagrams of several application scenarios of the embodiments of this application.
  • Figure 4 is a flowchart of establishing an RRC connection between a terminal device and a base station
  • FIG. 5 is a flowchart of the first communication method provided by an embodiment of this application.
  • FIG. 6 is a flowchart of a second communication method provided by an embodiment of this application.
  • FIG. 7 is a flowchart of a third communication method provided by an embodiment of this application.
  • FIG. 8 is a flowchart of a fourth communication method provided by an embodiment of this application.
  • FIG. 9 is a schematic block diagram of a first terminal device provided by an embodiment of this application.
  • FIG. 10 is a schematic block diagram of a first type of first network device according to an embodiment of this application.
  • FIG. 11 is a schematic block diagram of a second type of terminal device provided by an embodiment of this application.
  • FIG. 12 is a schematic block diagram of a second type of first network device according to an embodiment of this application.
  • FIG. 13 is a schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 14 is another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 15 is still another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 16 is another schematic block diagram of a communication device provided by an embodiment of this application.
  • Terminal devices including devices that provide users with voice and/or data connectivity, specifically, include devices that provide users with voice, or include devices that provide users with data connectivity, or include devices that provide users with voice and data connectivity Sexual equipment.
  • it may include a handheld device with a wireless connection function, or a processing device connected to a wireless modem.
  • the terminal device can communicate with the core network via a radio access network (RAN), exchange voice or data with the RAN, or exchange voice and data with the RAN.
  • RAN radio access network
  • the terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, vehicle to everything (V2X) terminal equipment , Machine-to-machine/machine-type communications (M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscriber unit, subscriber station (subscriber) station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc.
  • UE user equipment
  • M2M/MTC Machine-to-machine/machine-type communications
  • IoT Internet of things
  • subscriber unit subscriber station (subscriber) station)
  • mobile station mobile station
  • remote station remote station
  • access point access point
  • AP remote terminal
  • remote terminal remote terminal
  • access terminal access terminal
  • user terminal user terminal
  • user Agent
  • it may include mobile phones (or “cellular” phones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, mobile devices with built-in computers, and so on.
  • PCS personal communication service
  • PCS cordless phones
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistants
  • restricted devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities. Examples include barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), laser scanners and other information sensing equipment.
  • RFID radio frequency identification
  • GPS global positioning system
  • laser scanners and other information sensing equipment.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes Wait.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
  • Use such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
  • the various terminal devices described above if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be regarded as vehicle-mounted terminal equipment, for example, the vehicle-mounted terminal equipment is also called on-board unit (OBU). ).
  • OBU on-board unit
  • the terminal device may also include a relay. Or it can be understood that everything that can communicate with the base station can be regarded as a terminal device.
  • the device for realizing the function of the terminal device may be a terminal device, or a device capable of supporting the terminal device to realize the function, such as a chip system, and the device may be installed in the terminal device.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the device for implementing the functions of the terminal is a terminal device as an example to describe the technical solutions provided by the embodiments of the present application.
  • Network equipment including, for example, access network (AN) equipment, such as a base station (e.g., access point), which may refer to equipment that communicates with wireless terminal equipment through one or more cells on the air interface in the access network
  • AN access network
  • a base station e.g., access point
  • V2X vehicle-to-everything
  • the base station can be used to convert the received air frame and IP packet to each other, as a router between the terminal device and the rest of the access network, where the rest of the access network can include the IP network.
  • the RSU can be a fixed infrastructure entity that supports V2X applications, and can exchange messages with other entities that support V2X applications.
  • the network equipment can also coordinate the attribute management of the air interface.
  • the network equipment may include a long term evolution (LTE) system or an evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in a long term evolution-advanced (LTE-A) system, Or it can also include the next generation node B (gNB) in the new radio (NR) system (also referred to as the NR system) in the 5th generation (5G) mobile communication technology (the 5th generation, 5G), or it can also Including a centralized unit (CU) and a distributed unit (DU) in a cloud radio access network (cloud radio access network, Cloud RAN) system, which is not limited in the embodiment of the present application.
  • LTE long term evolution
  • NodeB or eNB or e-NodeB, evolutional Node B evolution-advanced
  • LTE-A long term evolution-advanced
  • gNB next generation node B
  • NR new radio
  • 5G 5th generation
  • 5G 5th generation
  • CU
  • the network equipment may also include core network equipment.
  • the core network equipment includes, for example, access and mobility management functions (AMF). Since the embodiments of this application do not involve the core network, unless otherwise specified in the following text, the network devices mentioned all refer to the access network devices.
  • AMF access and mobility management functions
  • the device used to implement the function of the network device may be a network device, or a device capable of supporting the network device to implement the function, such as a chip system, and the device may be installed in the network device.
  • the device used to implement the functions of the network equipment is a network device as an example to describe the technical solutions provided in the embodiments of the present application.
  • "user identity” (for example, the first user identity or the second user identity, etc.) is a logical concept.
  • “user identity” can correspond to SIM card, subscriber information, virtual SIM card, user identity (such as international mobile subscriber identity (IMSI), or temporary mobile subscriber identity (TMSI)), etc. ).
  • IMSI international mobile subscriber identity
  • TMSI temporary mobile subscriber identity
  • different "user identities” logically correspond to different communication entities served by the network side, such as UEs in 4G and 5G systems, such as a terminal device that supports two user identities. In other words, it can be regarded as two communicating entities.
  • the network side will recognize two terminal devices that support different SIM cards or different subscriber information as two different communication entities, and will also support multiple different communication entities.
  • the same terminal device with SIM card or multiple subscriber information is identified as multiple different communication entities, even in reality, the terminal device supporting multiple different SIM cards or multiple subscriber information is just one physical entity.
  • description will be made mainly by taking the "user identity" corresponding to the SIM card as an example.
  • the SIM card can be understood as the key for the terminal device to access the mobile network.
  • the SIM card and its evolution are collectively referred to as the SIM card in the embodiments of the present application.
  • the SIM card can be an identification card for a user of a global system for mobile communications (GSM) digital mobile phone, which is used to store the user's identification code and key, and supports the authentication of the user by the GSM system; and
  • the SIM card may also be a universal subscriber identity module (USIM), which may also be referred to as an upgraded SIM card.
  • GSM global system for mobile communications
  • USB universal subscriber identity module
  • Radio resource control (RRC) state terminal equipment has three RRC states: RRC connected state (connected state), RRC idle state (idle state) and inactive state (inactive state).
  • RRC connected state connected state
  • RRC idle state idle state
  • inactive state inactive state
  • RRC connected state (or, can also be referred to as connected state for short.
  • connected state and “RRC connected state” are the same concept, and the two terms can be interchanged): the terminal device establishes an RRC connection with the network, and it can Perform data transfer.
  • RRC idle state (or, can also be referred to as idle state for short.
  • idle state and “RRC idle state” are the same concept, and the two terms can be interchanged): the terminal device does not establish an RRC connection with the network, and the base station The context of the terminal device is not stored. If the terminal device needs to enter the RRC connected state from the RRC idle state, it needs to initiate the RRC connection establishment process.
  • RRC inactive state (or, can also be referred to as inactive state for short.
  • inactive state “inactive state”, “deactivated state”, “inactive state”, “RRC inactive state” and “RRC deactivated state” , Is the same concept, these terms can be interchanged): the terminal device entered the RRC connection state before, and then the base station released the RRC connection, but the base station saved the context of the terminal device. If the terminal device needs to enter the RRC connected state again from the RRC inactive state, it needs to initiate the RRC connection recovery process (or called the RRC connection reestablishment process). Compared with the RRC establishment process, the RRC recovery process has shorter time delay and lower signaling overhead. However, the base station needs to save the context of the terminal device, which will occupy the storage overhead of the base station.
  • At least one means one or more, and “plurality” means two or more.
  • “And/or” describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
  • "The following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • at least one item (a) of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • first and second are used to distinguish multiple objects, and are not used to limit the size, content, order, and timing of multiple objects. , Priority or importance, etc.
  • first information and the second information are only for distinguishing different information, but do not indicate the difference in content, sending order, priority, or importance of the two information.
  • the embodiments of the present application can be applied to various communication systems, such as: an LTE system, an LTE-A system, an NR system, or a possible future communication system, and there is no specific limitation.
  • SIM subscriber identification module
  • one SIM card is used for private business and the other SIM card is used for work; or, one SIM The card is used for data services, and the other SIM card is used for voice services.
  • the two SIM cards in a mobile phone may belong to the same mobile operator or different mobile operators; the two SIM cards may belong to the same standard or different standards.
  • Standards include NR, LTE, wideband code division multiple access (WCDMA), time division multiple access (TDMA) 2000, or global system for mobile communications (GSM), etc.
  • a mobile phone that supports inserting two SIM cards also supports dual-card dual-standby mode.
  • Mobile phones with dual-SIM dual-standby mode can generally be set to the following situations: ⁇ 1>, only SIM1 card is turned on; ⁇ 2>, only SIM2 card is turned on; ⁇ 3>, dual-card is turned on.
  • different cards supporting dual-card dual-standby of different standards are also called dual-network dual-standby or dual-mode dual-standby.
  • Another concept is dual card dual standby dual pass, or dual card dual standby single pass.
  • the so-called “single pass” or “dual pass” refers to whether two cards in a mobile phone can conduct business at the same time (for example, two cards can make calls at the same time). If two cards in a mobile phone can conduct business at the same time, Then the mobile phone is dual-SIM, dual-standby, and dual-pass, and if two cards in a mobile phone cannot perform business at the same time, then the mobile phone is dual-sim, dual-standby, and single-pass.
  • the easiest way to identify single-pass and dual-pass is to use the SIM1 card of a mobile phone to dial the number of the SIM2 card of the mobile phone. If it can be connected, the mobile phone is dual-card dual-standby dual-pass, and if it cannot be connected, the mobile phone is dual-pass. Card dual standby single pass.
  • FIG. 1A is a schematic diagram of a dual-card dual-standby dual-pass mode of a mobile phone.
  • two SIM cards use a set of transceivers respectively.
  • T in FIG. 1A represents the transmitting interface of the transceiver
  • R represents the receiving interface of the transceiver.
  • FIG. 1B is a schematic diagram of the dual-card dual-standby single-pass mode of the mobile phone.
  • two SIM cards share a set of transceivers.
  • T in FIG. 1B represents the transmitting interface of the transceiver, and R represents the receiving interface of the transceiver.
  • base station 1 indicates the base station corresponding to the SIM1 card
  • base station 2 indicates the base station corresponding to the SIM2 card.
  • two sets of chipsets can be used to realize dual-card dual-pass dual-standby. That is, two sets of baseband chips, two sets of radio frequency chips, and two sets of memories are installed in the mobile phone, which is equivalent to combining two complete mobile phone motherboards together in the same mobile phone shell.
  • Such an implementation manner can support two SIM cards to work at the same time, realize a dual-card dual-standby dual-pass mode, and there is no need to switch the device again when switching between SIM cards.
  • the problem with this implementation is that its cost is almost twice that of a normal mobile phone, and its power consumption is often twice that of a normal mobile phone.
  • TDM time division multiplexing
  • the working time of the mobile phone on the SIM1 card of the mobile phone is 4 minutes, and the working time on the SIM2 card of the mobile phone is 6 minutes. If the mobile phone is working on the SIM1 card, then when the 4 minutes arrive, The phone will automatically switch to the SIM2 card. Since the time required for switching is very short, the user cannot feel that the network has been switched, which is equivalent to realizing the simultaneous standby of two cards. If a SIM card is connected to another SIM card, you can send a short message to inform you of missed calls. From the user's point of view, no calls will be missed, which is no different from "dual standby" .
  • the TDM pattern is that the working time of the mobile phone on the SIM1 card is 4 minutes, and the working time on the SIM2 card is 6 minutes.
  • the SIM2 card has burst services arriving at this time, and the wireless/radio frequency module needs to be used. Since the use time of the SIM1 card is not yet reached at this time, according to the TDM method, the SIM2 card cannot be used.
  • Another implementation scheme of dual-card dual-standby single-pass is that at a time, only one SIM card maintains an RRC connection with the network, and the other SIM card does not maintain an RRC connection with the network device. That is to say, when the SIM1 card of the mobile phone is in the RRC connected state, the SIM2 card will be in the RRC idle state or the RRC inactive state. Refer to Figure 2B. If the SIM2 card needs to send or receive data, it is necessary to cut off the RRC connection of the SIM1 card, and establish or restore the RRC connection between the SIM2 card and the network. However, this process takes a long time, leading to a long service delay.
  • the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user.
  • the first information corresponding to the second user identity can be sent to the first network device through the first user identity, so as to assist the second user through the RRC connection of the first user identity
  • the RRC connection between the identity establishment and the network can not only meet the requirement of establishing an RRC connection between the identity of the second user and the network, but also reduce the time required to establish the RRC connection process, and speed up the establishment of the RRC connection between the identity of the second user and the network. , Which reduces the time delay of the business and helps to improve the user experience.
  • FIG. 3A is the first application scenario of the embodiment of this application.
  • Figure 3A includes a network device and a terminal device.
  • the terminal device may support two or more SIM cards.
  • FIG. 3A takes the terminal device supporting two SIM cards as an example, that is, the terminal device supports the first user identity and the second user identity as an example.
  • the network equipment for example, works in the evolved UMTS terrestrial radio access (E-UTRA) system, or works in the NR system, or works in the next-generation communication system or other communication systems. in.
  • E-UTRA evolved UMTS terrestrial radio access
  • FIG. 3B is the second application scenario of the embodiment of the present application.
  • Figure 3B includes network device 1, network device 2, and a terminal device.
  • FIG. 3B takes the terminal device supporting two SIM cards as an example, that is, the terminal device supporting the first user identity and the second user identity as an example.
  • the terminal device can communicate with the network device 1 as the first user, and the terminal device can communicate with the network device 2 as the second user.
  • the network device 1 works, for example, in an evolved UMTS terrestrial radio access (E-UTRA) system, or in an NR system, or in a next-generation communication system or other communication systems.
  • E-UTRA evolved UMTS terrestrial radio access
  • the network device 2 works, for example, in the E-UTRA system, or in the NR system, or in the next-generation communication system or other communication systems.
  • Network device 1 and network device 2 can work in the same communication system, for example, both work in the E-UTRA system, or network device 1 and network device 2 can also work in different communication systems, for example, network device 1 works In the E-UTRA system, the network device 2 works in the NR system.
  • one network device can serve multiple terminal devices, and FIG. 3A and FIG. 3B only take one terminal device as an example.
  • the terminal device may support two or more SIM cards.
  • Figures 3A and 3B take the terminal device supporting two SIM cards, the SIM1 card and the SIM2 card, as an example.
  • the SIM1 card is connected to the network device 1
  • the SIM2 card is connected to the network device 2.
  • the first user identity and the second user identity are user identities supported by the same terminal device.
  • the embodiment of the present application also supports a scenario in which the first user identity and the second user identity are user identities supported by different terminal devices.
  • FIG. 3C is the third application scenario of the embodiment of this application.
  • a network device and two terminal devices are included, and the two terminal devices are terminal device 1 and terminal device 2, respectively.
  • Each of the two terminal devices can support one or more SIM cards.
  • Figure 3C takes the terminal device 1 and the terminal device 2 as an example that supports one SIM card.
  • the terminal device 1 supports the first user identity
  • the terminal device 2 Support the second user identity.
  • the network device works in the E-UTRA system, or in the NR system, or in the next-generation communication system or other communication systems, for example.
  • FIG. 3D is the fourth application scenario of the embodiment of this application.
  • network device 1, network device 2, terminal device 1, and terminal device 2 are included.
  • Each of the two terminal devices can support one or more SIM cards.
  • Figure 3D takes the terminal device 1 and the terminal device 2 as an example that supports one SIM card.
  • the terminal device 1 supports the first user identity
  • the terminal device 2 Support the second user identity.
  • the terminal device 1 can communicate with the network device 1 as the first user
  • the terminal device 2 can communicate with the network device 2 as the second user.
  • Network device 1 and network device 2 can work in the same communication system, for example, both work in the E-UTRA system, or network device 1 and network device 2 can also work in different communication systems, for example, network device 1 works In the E-UTRA system, the network device 2 works in the NR system.
  • the network device shown in any one of the drawings in FIGS. 3A to 3D is, for example, a base station.
  • network devices correspond to different devices in different systems.
  • they can correspond to an eNB
  • 5G system they correspond to an access network device in 5G, such as gNB.
  • the technical solutions provided by the embodiments of this application can also be applied to future mobile communication systems.
  • the network equipment shown in any one of the drawings in FIGS. 3A to 3B can also correspond to the network equipment in the future mobile communication system.
  • the network device is a base station as an example.
  • the network device may also be a device such as an RSU.
  • RRC setup request The UE sends an RRC setup request (RRC setup request) message to the base station, and the base station receives the RRC setup request message from the UE.
  • the RRC establishment request message may be the third message (Msg3) in the random access process.
  • the RRC establishment request message may carry information such as international mobile subscriber identity (IMSI) or S-temporary mobile subscriber identity (S-TMSI), and the reason for establishing the RRC connection.
  • IMSI international mobile subscriber identity
  • S-TMSI S-temporary mobile subscriber identity
  • the UE When the UE is in the RRC idle state or the RRC inactive state, it can send an RRC establishment request message to the base station to request the establishment of an RRC connection.
  • the RRC establishment request can only carry the truncated 40-bit S-TMSI.
  • the RRC establishment request can carry a complete 48-bit S-TMSI.
  • the base station sends an RRC setup (RRC setup) message to the UE, and the UE receives the RRC setup message from the base station.
  • RRC setup RRC setup
  • the RRC establishment message may be the fourth message (Msg4) in the random access process.
  • system information block system information block
  • SIB system information block
  • the initial (initial) bandwidth part bandwidth part
  • MIB master information block
  • the physical downlink control channel physical downlink control channel (PDCCH) bandwidth. If the bandwidth of the initial BWP configured by SIB1 is different from the bandwidth of the PDCCH configured by MIB, the UE will switch to the BWP indicated by SIB1 after receiving the RRC setup message.
  • RRC setup complete RRC setup complete
  • the UE sends an RRC setup complete (RRC setup complete) message to the base station, and the base station receives the RRC setup complete message from the UE.
  • the RRC establishment complete message may be the fifth message (Msg5) in the random access process.
  • the RRC establishment message in S402 may carry a signaling radio bearer (signal radio bearer, SRB) 1 establishment configuration.
  • the UE may establish SRB1 after receiving it, and the RRC connection establishment completion message in S403 may be sent through SRB1.
  • the RRC connection establishment complete message can carry the remaining 8-bit S-TMSI.
  • the RRC establishment complete message can also carry the selected public land mobile network (PLMN) information, the registered access and mobility management function (AMF) information, And non-access stratum (NAS) protocol data unit (protocol data unit, PDU) information, etc.
  • PLMN public land mobile network
  • AMF registered access and mobility management function
  • NAS non-access stratum
  • the base station sends an initial UE information (initial UE message) message to the AMF, and the AMF receives the initial UE information message from the base station.
  • the base station strips the NAS information carried in msg5, and sends the NAS information to the AMF through the initial UE message.
  • the AMF sends a downlink NAS transport message to the base station, and the base station receives the downlink NAS transport message from the AMF.
  • the base station sends a downlink information transfer (DL information transfer) message to the UE, and the UE receives the downlink information transfer message from the base station.
  • DL information transfer downlink information transfer
  • the UE sends an uplink information transfer (UL information transfer) message to the base station, and the base station receives the uplink information transfer message from the UE.
  • UL information transfer uplink information transfer
  • the base station sends an uplink NAS transport message to the AMF, and the AMF receives the uplink NAS transport message from the base station.
  • S404-S408 are some NAS information interaction processes.
  • the AMF sends an initial context setup request (initial context setup request) message to the base station, and the base station receives the initial context setup request message from the AMF.
  • the initial context establishment request message may carry PDU session context information, security key, (security key), UE radio capability (radio capability) information, and UE security capability (security capabilities) information, etc.
  • the base station sends a security mode command (security mode command) message to the UE, and the UE receives the security mode command message from the base station.
  • security mode command security mode command
  • S411 The UE sends a security mode complete (security mode complete) message to the base station, and the base station receives the security mode complete message from the UE.
  • security mode complete security mode complete
  • the base station sends an RRC configuration (RRC configuration) message to the UE, and the UE receives the RRC configuration message from the base station.
  • RRC configuration RRC configuration
  • the UE sends an RRC configuration complete (RRC configuration complete) message to the base station, and the base station receives the RRC configuration complete message from the UE.
  • RRC configuration complete RRC configuration complete
  • S414 The base station sends an initial context setup response (initial context setup response) message to the AMF, and the AMF receives the initial context setup response message from the base station.
  • initial context setup response initial context setup response
  • Figure 4 illustrates the process of establishing an RRC connection between the UE and the network in the NR system.
  • the technical solutions provided by the embodiments of the present application are described below in conjunction with the drawings.
  • the terminal device that can install one SIM card is considered to be that the terminal device supports one user identity.
  • a terminal device that can install two SIM cards can support two users.
  • the identity can be understood as a one-to-one correspondence between the SIM card and the user identity.
  • This article mainly takes the terminal device supporting two user identities as an example, and the two user identities are called the first user identity and the second user identity respectively.
  • the first user identity can be understood as the user identity that the terminal device has after the SIM1 card is installed
  • the second user identity can be understood as the user identity that the terminal device has after the SIM2 card is installed.
  • the terminal device can also support more than two user identities.
  • the terminal device can support three user identities and four user identities. Or more user identities, and can be registered in more than two networks, and each user identity can be registered in one network.
  • the embodiments of this application will mainly be described based on the terminal device supporting two user identities.
  • the specific implementation can refer to the related description of the terminal device supporting two user identities, and some simple things may be required. However, it is also within the protection scope of the embodiments of this application.
  • the terminal device when the user identity of the terminal device is the first user identity, from the perspective of the network side, the terminal device can be understood as a user (from the perspective of the protocol, it is a terminal device, for example, called the first user );
  • the terminal device when the user identity of the terminal device is the second user identity, from the perspective of the network side, the terminal device can be understood as another user (for example, referred to as the second user).
  • the terminal device can be registered in the first network as the first user and registered in the second network as the second user.
  • the terminal device supports one user identity, which can also be described as the terminal device having one user identity.
  • the terminal device supports two user identities, which can also be described as the terminal device having two user identities.
  • the terminal device with the first user identity can be understood as “the first user identity of the terminal device", as indicated by these two descriptions.
  • the content is the same, and the two descriptions can be interchanged.
  • the terminal device of the second user identity can be understood as “the second user identity of the terminal device”.
  • the content indicated by the two description methods is the same, and the two description methods can be interchanged.
  • the embodiment of the present application provides a first communication method. Please refer to FIG. 5, which is a flowchart of this method.
  • FIG. 5 is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 3B is taken as an example. It should be noted that this method can also be applied to the network architecture shown in FIG. 3D.
  • the terminal device supporting the first user identity will be replaced with the first terminal device, and the terminal device supporting the second user identity will be replaced by the first terminal device. Replace the device with the second terminal device, that's it.
  • the first terminal device is, for example, the terminal device 1 in FIG. 3D
  • the second terminal device is, for example, the terminal device 2 in FIG. 3D.
  • the method executed by the network device and the terminal device is taken as an example.
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the second network device may be the network device 2 in the network architecture shown in FIG. 3B
  • the terminal device described below may be the terminal device in the network architecture shown in FIG. 3B.
  • the terminal device sends first information to the first network device as the first user identity, and the first network device receives the first information from the terminal device with the first user identity.
  • the terminal device supports a first user identity and a second user identity
  • the first network device is a network device accessed by the terminal device as the first user identity
  • the terminal device resides in the second network device as the second user identity.
  • the first user identity and the second user identity may belong to the same mobile operator or belong to different mobile operators.
  • the first user identity and the second user identity can belong to the same standard. For example, if the first user identity and the second user identity belong to the LTE standard, both the first network device and the second network device can be eNBs; or, the first user identity
  • the second user identity and the second user identity can also belong to different standards.
  • the first user identity belongs to the LTE standard and the second user identity belongs to the NR standard.
  • the first network device can be an eNB
  • the second network device can be a gNB.
  • the terminal device When performing S501, the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user. If the terminal device needs to enter the RRC connection state as the second user, for example, the terminal device needs to send uplink data as the second user, or the terminal device receives a paging message as the second user, etc., if the terminal device is the second user If the user identity is in the RRC idle state, the terminal device needs to establish an RRC connection with the second network device as the second user identity, or if the terminal device is in the RRC inactive state as the second user identity, the terminal device needs to act as the second user identity The RRC connection with the second network device is restored.
  • the terminal device needs to perform random access to the second network device as the second user identity.
  • the terminal device can assist the second user identity to perform random access with the second network device as the first user identity, thereby reducing the need for the terminal device to establish an RRC connection with the second network device as the second user identity. time.
  • the terminal device generates the first information, but the terminal device sends the first information to the first network device as the first user, which is equivalent to sending the first information as the first user in the RRC connected state.
  • the terminal device may generate the first information as the second user identity, or the terminal device may also determine the first information corresponding to the second user identity through the first user identity, and generate the first information as the first user identity. For example, if the first terminal device supports the first user identity and the second terminal device supports the second user identity, then if the first terminal device is to generate the first information, the second terminal device may correspond to the second user identity. The corresponding information is sent to the first terminal device, so that the first terminal device can generate the first information.
  • the terminal device may generate the first information, which is not limited here.
  • the first information is information corresponding to the identity of the second user.
  • the first information may include second information and third information.
  • the second information may request to establish, reestablish or restore the RRC connection as the second user.
  • the second information is used to request the establishment of an RRC connection as the second user, and the third information is used to indicate that the establishment of the RRC connection as the second user is completed; or the second information is used to request that the RRC connection be established as the second user.
  • the third information is used to indicate the completion of the RRC connection reestablishment as the second user; or, the second information is used to request the restoration of the RRC connection as the second user, and the third information is used to indicate the completion of the RRC connection restoration as the second user.
  • the second information may be all or part of the information included in the Msg3 in the random access process corresponding to the second user identity.
  • Msg3 is an RRC setup request (RRC setup request) message, or an RRC reestablishment request (RRC reestablishment request) message, or an RRC resume request (RRC resume request) message, etc.
  • RRC setup request is the expression in the 4G system. If in the 5G system, Msg3 can be expressed as the RRC connection setup request (RRC connection setup request); RRC reestablishment request is the expression in the 4G system.
  • Msg3 can be expressed as an RRC connection reestablishment request (RRC connection reestablishment request);
  • RRC resume request is an expression in a 4G system, and if in a 5G system, Msg3 can be expressed as an RRC connection resume request (RRC connection resume request).
  • RRC connection resume request Msg3 can be expressed as an RRC connection resume request (RRC connection resume request).
  • RRC establishment request message, the RRC reestablishment request message, and the RRC recovery request message are mainly used as examples.
  • Msg3 may be in the common control channel (common control channel).
  • channel, CCCH common control channel
  • RRC establishment request message transmitted on Msg3 can carry NAS UE identification information.
  • Msg3 may be an RRC reestablishment request message transmitted on the CCCH.
  • Msg3 may be the RRC recovery request message transmitted on the CCCH or the RRC recovery request 1 message transmitted on the CCCH1.
  • Msg3 may include the identification of the terminal device, which may be used for conflict resolution of Msg4. For example, for Msg3 in the random access process corresponding to the second user identity, the identity of the second user identity may be included.
  • the identity of the second user identity can be a cell radio network temprory identifier (C-RNTI); if the terminal device is in the RRC idle state as the second user identity If the terminal device is in the RRC inactive state as the second user identity, the identity of the second user identity can be the inactive radio network temporary identity (inactive radio network temprory). identifier, I-RNTI), or it can be a truncated I-RNTI.
  • C-RNTI cell radio network temprory identifier
  • I-RNTI inactive radio network temporary identity
  • the third information may be all or part of the information included in the Msg5 in the random access process corresponding to the second user identity.
  • Msg5 is an RRC setup complete (RRC setup complete) message, or an RRC reestablishment complete (RRC reestablishment complete) message, or an RRC resume complete (RRC resume complete) message, etc.
  • RRC setup complete is the expression in the 4G system. If in the 5G system, Msg5 can be expressed as the RRC connection completion request (RRC connection setup complete); RRC reestablishment complete is the expression in the 4G system.
  • Msg5 can be expressed as RRC connection reestablishment complete (RRC connection reestablishment complete); RRC resume complete is an expression in 4G system, if in 5G system, Msg5 can be expressed as RRC connection resume complete (RRC connection resume complete).
  • RRC connection resume complete RRC connection resume complete
  • the RRC establishment complete message, the RRC reestablishment complete message, and the RRC recovery complete message are mainly used as examples.
  • Msg3 and the realization form of Msg5 should be corresponding.
  • Msg3 is an RRC establishment request message
  • Msg5 is an RRC establishment complete message
  • Msg5 is an RRC reestablishment complete message
  • Msg5 is an RRC restoration complete message
  • the first information may include all or part of the information included in the Msg3 corresponding to the second user identity, and all or part of the information included in the Msg5 corresponding to the second user identity, which is equivalent to combining the information included in Msg3 and Msg5.
  • the included information is sent to the network equipment together, reducing the interaction process between the terminal equipment and the network equipment.
  • the first information includes some configuration parameters of the second user identity of the terminal device.
  • the terminal device sends the first information to the network device at once, so that the network device can configure the second user identity in advance, which is helpful for the terminal.
  • the device realizes communication as the second user as soon as possible, which further reduces the communication delay.
  • Msg3 When Msg3 is implemented by different messages, it can also include some different information, and the corresponding Msg5 will be different accordingly. The following is introduced.
  • Msg3 is an RRC establishment request message.
  • the RRC establishment request message is used to request the establishment of an RRC connection.
  • the signaling bearer of the RRC establishment request message is signaling radio bearer (SRB) 0, and the corresponding radio link control (radio link control, RLC) mode is transparent mode (transparent mode, TM), the corresponding logical channel is CCCH.
  • the RRC establishment request message may include the identification of the terminal device and the establishment reason value.
  • the identifier of the terminal device is, for example, S-TMSI or a random number.
  • the RRC establishment request message is used to establish the RRC connection with the second user identity, and the identity of the terminal device may be the identity of the second user identity.
  • the establishment reason value may indicate the reason for establishing the RRC connection.
  • the reasons for establishing an RRC connection can include emergency calls (emergency), called response paging (mt-Access), calling signaling (mo-signalling), calling data service (mo-Data), calling voice service ( mo-voicecall), calling audio service (mo-videocall), calling video service, calling short message service (mo-short message service), calling multimedia priority services-priorityaccess, calling key tasks Business (mission critical services-priorityaccess).
  • mo-signalling may correspond to timing advance (TA) update + non-access stratum (non-access stratum, NAS) process attach (attach) and detach (detach).
  • the second information may include all or part of the information included in Msg3.
  • Msg3 includes the identification of the second user identity of the terminal device and the establishment reason value
  • the second information may include the identification of the second user identity or the establishment reason value.
  • Msg3 is an RRC setup request message
  • the fourth message (Msg4) in the corresponding random access process is an RRC setup (RRC setup) message.
  • RRC setup is the expression in the 4G system.
  • Msg4 can be expressed as the RRC connection setup (RRC connection setup) message.
  • the RRC setup message is used to establish SRB1, the signaling bearer of the RRC setup message is SRB0, the corresponding RLC mode is TM, and the corresponding logical channel is CCCH.
  • the content included in the RRC setup message is the configuration of the radio bearer, that is, it includes the configuration of SRB1.
  • the configuration of SRB1 includes the identification of the SRB and/or the packet data convergence protocol (PDCP) layer configuration.
  • the identification of the SRB is, for example, the ID of the SRB.
  • Msg3 is an RRC establishment request message
  • Msg5 in the corresponding random access process is an RRC establishment complete message.
  • the RRC establishment complete message can be used to confirm the successful completion of the RRC connection establishment.
  • the signaling bearer corresponding to the RRC establishment completion message is SRB1
  • the corresponding RLC mode is acknowledged mode (acknowledged mode, AM)
  • the corresponding logical channel is dedicated control channel (DCCH).
  • the RRC establishment complete message may include the following information:
  • Selected PLMN-Identity public land mobile network, PLMN: the PLMN identity selected by the terminal device, where PLMN is used to distinguish different mobile communication operators in a country or region;
  • Registered AMF information of the AMF registered by the terminal device
  • Globally unique AMF ID type used to indicate whether the globally unique AMF ID (globally unique AMF identifier, GUAMI) is local or mapped. If it is local, it means that GUAMI can pass the 5G-globally unique temporary identifier ( 5G globally unique temporary identity, 5G GUTI); if it is mapped, it means that GUAMI is mapped from the evolved packet system (EPS) GUTI, where EPS GUTI is an identifier used in the 4G system;
  • EPS evolved packet system
  • Single network slice selection support information list (single network slice selection assistance information, s-NSSAI-list);
  • NAS refers to the transmission of data between terminal equipment and core network equipment, and the access network equipment transparently transmits NAS messages, that is, NAS messages are not processed;
  • Next generation (ng)-5G-S-TMSI-value used to indicate information related to the identification of the terminal device, which can be the completed S-TMSI value, or when the RRC setup message carries
  • the value of part of the S-TMSI is taken (for example, the value of the first part (part1) of the S-TMSI is carried)
  • the value of the remaining S-TMSI can be carried in the RRC establishment complete message (for example, the value of the S-TMSI is carried The second part (the value of part2)).
  • the third information may include all or part of the information included in Msg5.
  • the third information may include selected PLMN-Identity; or, the third information may include registered AMF and guami-type; or, the third information may include registered AMF, s-NSSAI-list and ng-5G-S-TMSI-value
  • the third information may include selected PLMN-Identity, registered AMF, guami-type, s-NSSAI-list, dedicated NAS-message, and ng-5G-S-TMSI-value, etc.
  • Msg3 is an RRC recovery request message.
  • Msg3 is an RRC resume request message or RRC resume request message 1
  • Msg3 is used to resume a suspended RRC connection, or to perform RAN-based notification area (RAN) update based on the radio access network.
  • RAN RAN-based notification area
  • the signaling bearer corresponding to the RRC recovery request message is SRB0, the corresponding logical channel is CCCH, and the corresponding RLC mode is TM.
  • the signaling bearer corresponding to the RRC recovery request message 1 is SRB0, the corresponding logical channel is CCCH1, and the corresponding RLC mode is TM.
  • the RRC recovery request message and the RRC recovery request message 1 both carry the identification of the terminal device, such as the ID of the terminal device, but the length of the ID of the terminal device carried in the RRC recovery request message and the RRC recovery request message 1 is different.
  • the ID of the terminal device carried in the RRC recovery request message 1 is generally 40 bits, and the ID of the terminal device carried in the RRC recovery request message is generally 24 bits.
  • the RRC recovery request message or RRC recovery request message 1 may include the following information:
  • Resume ID can be the identification of the terminal device, used to obtain the context of the terminal device stored at the network device, the identification of the terminal device can be the identification used by the terminal device in the RRC inactive state, such as I- RNTI;
  • Resume cause value (resumeCause): used to indicate the reason for the RRC connection recovery.
  • the recovery reason value used to indicate the recovery of the RRC connection is the same as the establishment reason value of the RRC connection establishment carried in the RRC establishment request, and will not be repeated here.
  • the second information may include all or part of the information included in Msg3.
  • Msg3 includes resumeIdentity, resumeMAC-I, and resumeCause
  • the second information may include resumeIdentity, or include resumeMAC-I and resumeCause, or include resumeIdentity, resumeMAC-I, and resumeCause, etc.
  • Msg3 is an RRC resume request message
  • Msg4 in the corresponding random access process is an RRC resume (RRC resume) message.
  • RRC resume is an expression in a 4G system
  • Msg4 can be expressed as an RRC connection resume (RRC connection resume) message.
  • the RRC resume message is used to resume the suspended RRC connection, the corresponding signaling bearer is SRB1, the corresponding RLC mode is AM, and the corresponding logical channel is DCCH.
  • the RRC recovery message may include radio bearer configuration, measurement-related configuration, and security key-related configuration.
  • Msg3 is an RRC recovery request message
  • Msg5 in the corresponding random access process is an RRC recovery complete message.
  • the RRC recovery complete message can be used to confirm the successful completion of the RRC connection recovery.
  • the signaling bearer corresponding to the RRC recovery complete message is SRB1
  • the corresponding RLC mode is AM
  • the corresponding logical channel is DCCH.
  • the RRC recovery complete message may include the following information:
  • dedicatedNAS-Message dedicated NAS message, used to send some NAS data
  • selectedPLMN-Identity The selected PLMN identity, which can be the same as the selectedPLMN-Identity carried in the RRC establishment complete message;
  • Uplink sending direct current list (uplinkTxDirectCurrentList): used to indicate the current serving cell (cell), and include related carrier bandwidth indications, etc.
  • the third information may include all or part of the information included in Msg5.
  • Msg5 includes dedicatedNAS-Message, selectedPLMN-Identity, and uplinkTxDirectCurrentList
  • the third information may include selectedPLMN-Identity; or, the third information includes dedicatedNAS-Message and uplinkTxDirectCurrentList; or, the third information includes dedicatedNAS-Message, selectedPLMN-Identity, and uplinkTxDirectCurrentList ,and many more.
  • Msg3 is an RRC re-establishment request message.
  • the signaling bearer corresponding to the RRC reconstruction request message is SRB0, the corresponding RLC mode is TM, and the corresponding logical channel is CCCH.
  • the RRC reconstruction request message may include the following information:
  • ue-Identity The identity of the terminal device that reestablishes the RRC connection.
  • the identity of the terminal device that reestablishes the RRC connection can include three parts: C-RNTI, physical cell identity (physCellId), and short (short) used to identify the identity of the terminal device. )MAC-I;
  • ReestablishmentCause indicates the reason value for RRC reestablishment.
  • the reestablishment cause value may be reconfiguration failure, handover failure, or other failure reasons.
  • the second information may include all or part of the information included in Msg3. For example, if Msg3 includes ue-Identity and reconstruction reason value, the second information may include ue-Identity, or reconstruction reason value, or ue-Identity and reconstruction reason. value.
  • Msg3 is an RRC reestablishment request message
  • Msg4 in the corresponding random access process is an RRC reestablishment (RRC reestablishment) message.
  • RRC reestablishment is an expression in the 4G system.
  • Msg4 can be expressed as an RRC connection reestablishment (RRC connection reestablishment) message.
  • the RRC rebuild message is used to rebuild SRB1, the signaling bearer used to transmit the RRC rebuild message is SRB1, the corresponding RLC mode is AM, and the corresponding logical channel is DCCH.
  • the RRC reconstruction message may include parameters related to the update of the security key.
  • Msg3 is an RRC re-establishment request message
  • Msg5 in the corresponding random access process is an RRC re-establishment complete message.
  • the RRC re-establishment complete message is used to confirm the successful completion of the RRC connection re-establishment.
  • the signaling bearer corresponding to the RRC reconstruction complete message is SRB1
  • the corresponding RLC is AM
  • the corresponding logical channel is DCCH.
  • the third information may include all or part of the information included in the RRC reconstruction complete message.
  • the terminal device may add the first information to a message, for example, the message is called the first merged message, which is equivalent to that the first merged message includes the first information.
  • the message can also have other names, and the name of the message does not constitute a restriction on the message itself.
  • the terminal device may send the first merge message to the first network device as the first user, and the first network device receives the first merge message and also receives the first information.
  • the first information includes the second information and the third information. If the second information includes all or part of the information of Msg3, and the third information includes all or part of the information of Msg5, then the information included in Msg3 and the information included in Msg5 should be included.
  • the Msg3 corresponding to the second user identity includes the identity of the second user identity
  • the Msg5 corresponding to the second user identity also includes the identity of the second user identity
  • the third information includes part of the information of Msg5, or if the identity of the second user identity is included in the third information, then The third information includes partial information of Msg3.
  • the terminal device can also put the second information and the third information into different messages, and send the second information and the third information to the first network device as the first user.
  • the identity sends the first information to the first network device.
  • the terminal device may send to the first network device Msg3 corresponding to the second user identity and Msg5 corresponding to the second user identity.
  • the Msg3 corresponding to the second user identity includes the second information, which corresponds to the second user identity.
  • the Msg5 includes the third message.
  • the first network device receives Msg3 corresponding to the second user identity and Msg5 corresponding to the second user identity, and thus obtains the first information.
  • the terminal device may simultaneously send the Msg3 corresponding to the second user identity and the Msg5 corresponding to the second user identity to the first network device as the first user identity; or, the terminal device may also first send the Msg3 corresponding to the second user identity to the first network device as the first user identity. Send the Msg3 corresponding to the second user identity, and then send the Msg5 corresponding to the second user identity to the first network device; or the terminal device may first send the Msg5 corresponding to the second user identity to the first network device as the first user identity, Then send the Msg3 corresponding to the second user identity to the first network device.
  • the second information and the third information may play different roles. Put the second information and the third information in two messages to send, so that the first network device or the subsequent second network device can more easily distinguish the second information. Information and third information.
  • the terminal device may first determine that it may send the first information to the first network device as the first user. That is, it is determined that the information related to the identity of the second user can be sent to the network as the identity of the first user.
  • the terminal equipment There are many ways to determine the terminal equipment, which are described below with examples.
  • the terminal device may determine that the first information can be sent to the first network device as the first user based on the difference between the first timing advance (TA) and the second TA being less than or equal to the first threshold.
  • the first TA is the TA corresponding to the terminal device communicating in the first network as the first user
  • the second TA is the TA corresponding to the terminal device communicating in the second network as the second user.
  • the first network is the network where the first network device is located
  • the second network is the network where the second network device is located.
  • the second TA may be configured by the second network device for the second user identity.
  • the difference between the first TA and the second TA is less than or equal to the first threshold, and it can be understood that the first TA and the second TA are equal or close (if the first threshold is 0, the first TA and the second TA are equal).
  • the first threshold may be configured by the first network device, or configured by the second network device, or determined by the terminal device itself, or specified by agreement. If the first TA and the second TA are equal or similar, it can basically be guaranteed that the terminal device can correctly receive the information related to the second user's identity as the first user.
  • To make the first TA and the second TA equal or similar for example, one way is that the first network device and the second network device share the same site. Of course, there can be other ways to make the first TA and the second TA equal or similar.
  • the first TA and the second TA may be neither equal nor close.
  • the difference between the first TA and the second TA may also be greater than the first threshold, as long as the first network device and the second network device both know the first For the TA and the second TA, the first TA and the second TA are taken into consideration when sending information, so that the terminal device can correctly receive the information related to the second user's identity as the first user.
  • the terminal device can obtain the first TA and the second TA. For example, if the first TA and the second TA are equal, the terminal device may know in advance that the first TA and the second TA are equal. For the first TA, since the terminal device is in the RRC connection state as the first user, it can be considered as the terminal device Has won the first TA. If the terminal device also knows that the first TA and the second TA are equal, the terminal device may not need to obtain the second TA. Or, even if the first TA and the second TA are equal, because the terminal device does not know that the first TA and the second TA are equal, the terminal device can also obtain the second TA first. If the first TA and the second TA are not equal (for example, the first TA and the second TA are close, or the first TA and the second TA are not close), the terminal device may obtain the second TA first.
  • the terminal device may obtain the second TA first.
  • one way of obtaining the terminal device is to obtain it through the second network device.
  • the release message may carry the second TA. Then the terminal device can obtain the second TA when the second user identity is released.
  • the terminal device may also obtain the second TA through other information from the second network device. For example, before sending the first information as the first user identity to the first network device, the terminal device may also send fifth information as the first user identity to the first network device, and the fifth information may include random information corresponding to the second user identity. Random access preamble during the access process. For example, the terminal device can send the first message (Msg1) in the random access process corresponding to the second user identity to the first network device as the first user identity, and Msg1 can be regarded as a preamble.
  • Msg1 can be regarded as a preamble.
  • the first network device may forward the fifth information to the second network device where the second user identity resides, and the second network device receives the fifth information from the first network device.
  • the second network device may generate sixth information according to the fifth information, and send the sixth information to the first network device, and the first network device receives the sixth information from the second network device.
  • the sixth information is used to respond to the fifth information.
  • the sixth information may include all or part of the information included in the second message (Msg2) in the random access process corresponding to the second user identity.
  • the second TA can be included in the sixth information.
  • the second network device may send the Msg2 in the random access process corresponding to the second user identity to the first network device.
  • the Msg2 includes the sixth information, and the first network device may receive the Msg2 from the second network device.
  • the terminal device wants to send fifth information to the first network device as the first user, the fifth information corresponds to the second user identity, and the terminal device will also send the first user to the first network device as the first user.
  • Identity-related information for example, when the terminal device performs random access as the first user identity, it will also send the Msg1 corresponding to the first user identity to the first network device as the first user identity.
  • the information corresponding to the identity of the first user and the information corresponding to the identity of the second user can both be sent as the identity of the first user. If they are not distinguished, it may cause the first network device to respond incorrectly.
  • the terminal device can distinguish the fifth information from the preamble corresponding to the first user identity through physical resources; alternatively, it can distinguish between the fifth information and the preamble corresponding to the first user identity through the user identity; or, The preamble corresponding to the fifth information and the first user identity can also be distinguished by physical resources, and the preamble corresponding to the fifth information and the first user identity can also be distinguished by the identifier of the user identity.
  • an implementation manner is that the terminal device uses the first user identity and the fourth physical resource to send the fifth information to the first network device.
  • the fourth physical resource is different from the third physical resource, and the third physical resource is used to send the preamble corresponding to the first user identity to the first network device as the first user.
  • the physical resource includes, for example, a channel that carries information, or a coding method that includes information, or a channel that carries information and a coding method of information.
  • physical resources may also include other resources.
  • the physical resource includes a channel that carries information, then the terminal device can use the first user identity and the fourth channel to send the fifth information to the first network device, and the terminal device is sending the first user identity to the first network device.
  • the preamble uses the third channel, which is different from the fourth channel. In this way, the first network device can clarify the correspondence between the received information and the user identity.
  • the terminal device distinguishes the fifth information from the preamble corresponding to the first user identity through the identifier of the user identity
  • the fifth information may include the identifier of the second user identity, for example, the ID of the second user identity.
  • the terminal device sends the preamble corresponding to the first user identity to the first network device as the first user identity, it may also include the identity of the first user identity.
  • the terminal device receives the sixth information from the first network device and the first user as the first user.
  • the identity corresponding to Msg2 can also be distinguished. Or, even if the terminal device does not distinguish between sending the fifth information as the first user identity and sending the preamble corresponding to the first user identity, the terminal device receives the sixth information from the first network device and receives the first user identity as the first user.
  • the Msg2 corresponding to the user identity can also be distinguished.
  • the terminal device makes a distinction between sending the fifth information as the first user identity and sending the preamble corresponding to the first user identity, and the terminal device receives the sixth information from the first network device and receives the first user identity as the first user.
  • the identity corresponds to Msg2.
  • the terminal device does not distinguish between sending the fifth information as the first user identity and sending the preamble corresponding to the first user identity, and the terminal device receives the sixth information from the first network device and receives the first user identity as the first user.
  • the identity corresponds to Msg2.
  • the terminal device can distinguish the sixth information from the Msg2 corresponding to the first user identity through physical resources; or, the sixth information can be distinguished from the Msg2 corresponding to the first user identity through the user identity.
  • the sixth information can include the first user identity. 2.
  • the identification of the user identity such as the ID of the second user identity; alternatively, the sixth information can be distinguished from the Msg2 corresponding to the first user identity by physical resources, or the sixth information can be distinguished from the first user by the user identity identity
  • the identity corresponds to Msg2.
  • an implementation manner is that the terminal device uses the first user identity and the fourth physical resource to receive the sixth information from the first network device.
  • the fourth physical resource is different from the third physical resource, and the third physical resource is used to receive the Msg2 corresponding to the first user identity from the first network device as the first user identity.
  • the terminal device distinguishes the sixth information from the Msg2 corresponding to the first user identity through the identifier of the user identity
  • an implementation manner is that the sixth information may include the identifier of the second user identity.
  • the Msg2 corresponding to the first user identity from the first network device received by the terminal device as the first user identity may also include the identity of the first user identity.
  • the distinguishing method used by the terminal device to distinguish between the fifth information and the preamble corresponding to the first user identity may be the same as the distinguishing method used by the terminal device to distinguish the sixth information from the Msg2 corresponding to the first user identity. It can also be different. For example, if the terminal device distinguishes the fifth information from the preamble corresponding to the first user identity by physical resources, the terminal device can continue to distinguish the sixth information from the Msg2 corresponding to the first user identity by physical resources, or the terminal device can also use the user identity The identifier distinguishes the sixth information from the Msg2 corresponding to the first user identity.
  • the terminal device may determine to initiate a random access process of the second user identity to the first network device as the first user identity according to the first indication information from the second network device.
  • the second network device Before S501, the second network device will release the terminal device of the second user identity. For example, the second network device sends an RRC release message to the terminal device of the second user identity, where the RRC release message is used to release the terminal device of the second user identity. After receiving the RRC release message as the second user, the terminal device can enter the RRC inactive state or the RRC idle state.
  • the embodiment of the present application takes the RRC inactive state as an example.
  • the release message may further include first indication information, and the first indication information may indicate that the second user identity may perform random access through the channel corresponding to the first user identity, or in other words, the first The indication information may indicate that the random access process of the second user identity can be initiated to the first network device as the first user identity.
  • the terminal device can determine that it can send the first information corresponding to the second user identity to the first network device as the first user identity, or in other words, can determine that it can initiate the second user identity to the first network device as the first user identity.
  • the random access process can be used to determine that it can send the first information corresponding to the second user identity to the first network device as the first user identity, or in other words, can determine that it can initiate the second user identity to the first network device as the first user identity.
  • the terminal device wants to send the fifth information to the first network device as the first user identity, the terminal device can distinguish the fifth information from the preamble corresponding to the first user identity.
  • the terminal device wants to send the first information to the first network device as the first user, the first information corresponds to the second user's identity, and the terminal device will also send the first information to the first network device as the first user.
  • Sending the information corresponding to the first user identity for example, when the terminal device performs random access as the first user identity, it will also send the Msg3 or Msg5 corresponding to the first user identity to the first network device as the first user identity.
  • the information corresponding to the identity of the first user and the information corresponding to the identity of the second user can both be sent as the identity of the first user. If they are not distinguished, it may cause the first network device to respond incorrectly. Therefore, in the embodiment of the present application, the terminal device can also distinguish the first information and the information corresponding to the first user identity.
  • the terminal device distinguishing method may include one or more of the following: distinguish the first information and the information corresponding to the first user identity through the SRB, and distinguish the first information and the information corresponding to the first user identity through the logical channel.
  • the first information is distinguished from the information corresponding to the first user's identity by the identifier of the user's identity, or the first information is distinguished from the information corresponding to the first user's identity by the physical resource.
  • the terminal device can distinguish the first information from the information corresponding to the first user identity through SRB; or the terminal device can distinguish the first information from the information corresponding to the first user identity through the logical channel and the user identity; or, the terminal device
  • the first information can be distinguished from the information corresponding to the first user identity by the identification of SRB, logical channel, and user identity; or the terminal device can distinguish the first information from the first user by the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • an implementation manner is that the terminal device uses the first user identity and the second SRB to send the first information to the first network device.
  • the second SRB is different from the first SRB, and the first SRB is used to send the information corresponding to the first user identity to the first network device as the first user.
  • the terminal device distinguishes the first information from the information corresponding to the first user identity through a logical channel
  • the terminal device uses the first user identity and the second logical channel corresponding to the first SRB to send to the first network device First information.
  • the second logical channel is different from the first logical channel corresponding to the first SRB, and the first logical channel is used to send the information corresponding to the first user identity to the first network device as the first user.
  • the terminal device distinguishes the first information from the information corresponding to the first user identity through the identifier of the user identity
  • the first information may include the identifier of the second user identity.
  • the terminal device sends the information corresponding to the first user identity to the first network device as the first user identity, it may also include the identity of the first user identity.
  • an implementation manner is that the terminal device uses the first user identity and the second physical resource to send the first information to the first network device.
  • the second physical resource is different from the first physical resource, and the first physical resource is used to send the information corresponding to the first user identity to the first network device as the first user identity.
  • S502 The first network device forwards the first information to the second network device, and the second network device receives the first information from the first network device.
  • the terminal device sends the first merge message to the first network device as the first user, then in S502, the first network device may forward the first merge message to the second network device, and the second network device can forward the first merge message to the second network device in S502.
  • the device can also receive the first merge message from the first network device.
  • the terminal device sends two messages to the first network device as the first user, and the two messages carry second information and third information, then in S502, the first network device may The two messages are forwarded to the second network device, and the second network device can receive the two messages from the first network device.
  • the terminal device sends Msg3 and Msg5 corresponding to the second user identity to the first network device as the first user identity, then in S502, the first network device may forward Msg3 and Msg5 corresponding to the second user identity For the second network device, the second network device can receive Msg3 and Msg5 corresponding to the second user identity from the first network device.
  • the second network device sends fourth information to the first network device, and the first network device receives the fourth information from the second network device.
  • the fourth information is used to respond to the first information. Therefore, the fourth information is information corresponding to the second user identity of the terminal device.
  • the second network device may generate response information for the first information, that is, generate fourth information. Since the second network device is the first information received from the first network device, the second network device can still send the fourth information to the first network device.
  • the first information includes the second information and the third information
  • the fourth information generated by the second network device may include the response information of the second information or the response information of the third information.
  • the response information of the second information for example, includes all or part of the information included in the Msg4 corresponding to the second user identity
  • the response information of the third information for example, includes the RRC reconfiguration (RRC reconfiguration) message corresponding to the second user identity. All or part of the information.
  • the second network device may add the fourth information to a message, for example, the message is called the second merged message, which is equivalent to that the second merged message includes the fourth information.
  • the message can also have other names, and the name of the message does not constitute a restriction on the message itself.
  • an implementation manner of the second merge message is that the second merge message is specifically an RRC reconfiguration message.
  • the implementation of the second merge message is not limited to this.
  • the second network device may send the second merge message to the first network device, and the first network device receives the second merge message and also receives the fourth information.
  • the fourth information includes the response information of the second information and the response information of the third information.
  • the response information of the second information includes all or part of the information of Msg4
  • the response information of the third information includes all or part of the RRC reconfiguration message.
  • the information included in Msg4 and the information included in the RRC reconfiguration message should be added to a message. If there is a repetitive part in the information included in Msg4 and the information included in the RRC reconfiguration message, for the repetitive part, in Only one copy needs to be included in the second merged message. In this way, the redundant information in the second combined message can be reduced, the overhead of the second combined message can be reduced, and the success rate of effective information transmission can also be improved.
  • the Msg4 corresponding to the second user identity includes the identity of the second user identity
  • the RRC reconfiguration message corresponding to the second user identity also includes the identity of the second user identity
  • the identity of the identity and only need to include a copy of the identity of the second user.
  • the third information includes part of the information of the RRC reconfiguration message, or if the identity of the second user identity is the third If the response information of the message includes, then the third message includes part of the information of Msg4.
  • the second network device may also put the response information of the second information and the response information of the third information into different messages, and send the response information of the second information and the response information of the third information to the first network device. It is also equivalent to that the second network device sends the fourth information to the first network device.
  • the second network device may send the Msg4 corresponding to the second user identity and the RRC reconfiguration message corresponding to the second user identity to the first network device, the Msg4 corresponding to the second user identity includes the response information of the second information, and the second user The RRC reconfiguration message corresponding to the identity includes the response information of the third information.
  • the first network device receives the Msg4 corresponding to the second user identity and the RRC reconfiguration message corresponding to the second user identity, and thus obtains the fourth information.
  • the second network device may simultaneously send the Msg4 corresponding to the second user identity and the RRC reconfiguration message corresponding to the second user identity to the first network device; or, the second network device may also first send the second network device to the first network device.
  • the Msg3 corresponding to the user identity then sends the RRC reconfiguration message corresponding to the second user identity to the first network device; or, the second network device may also first send the RRC reconfiguration message corresponding to the second user identity to the first network device, Then send the Msg3 corresponding to the second user identity to the first network device.
  • the response information of the second information and the response information of the third information may play different roles.
  • the response information of the second information and the response information of the third information are sent in two messages, so that the first network device Or the subsequent terminal device can more easily distinguish the response information of the second information and the response information of the third information.
  • the first network device sends the fourth information to the terminal device of the first user identity, and the terminal device receives the fourth information from the first network device as the first user identity.
  • the first network device may send the second merge message to the first user identity
  • the terminal device can receive the second merge message from the first network device as the first user.
  • the first network device may send the two messages to the terminal device, and the terminal device receives the two messages from the first network device as the first user, and thus obtains the fourth information.
  • the first network device receives the Msg4 and RRC reconfiguration messages corresponding to the second user identity from the second network device.
  • the first network device may combine the Msg4 and RRC reconfiguration messages corresponding to the second user identity.
  • the RRC reconfiguration message is sent to the terminal device of the first user identity, and the terminal device can receive the Msg4 and the RRC reconfiguration message corresponding to the second user identity from the first network device as the first user identity.
  • the terminal device is the fourth information received with the identity of the first user, but the fourth information corresponds to the identity of the second user. Therefore, the terminal device can use the fourth information for the identity of the second user, which is equivalent to the terminal device acting as the second user. The identity obtained the fourth information.
  • the terminal device receives the second merge message from the first network device as the first user identity, then the terminal device can use the second merge message for the second user identity.
  • the terminal device may receive the Msg4 and RRC reconfiguration messages corresponding to the second user identity from the first network device as the first user identity, then the terminal device can transfer the Msg4 and RRC reconfiguration messages corresponding to the second user identity Used for the second user identity.
  • the terminal device receives the fourth information from the first network device and the first user as the first user.
  • the information corresponding to the identity can also be distinguished.
  • the terminal device receives the fourth information from the first network device and receives the first information as the first user.
  • the information corresponding to the user identity can also be distinguished.
  • the terminal device makes a distinction between sending the first information as the first user and sending the information corresponding to the first user's identity, and the terminal device receives the fourth information from the first network device and the first user as the first user.
  • the terminal device does not distinguish between sending the first information as the first user identity and the information corresponding to the first user identity, and the terminal device receives the fourth information from the first network device and the first user as the first user.
  • the information corresponding to the identity There is no distinction between the information corresponding to the identity.
  • the following describes how the terminal device distinguishes between receiving the fourth information from the first network device as the first user and the information corresponding to the first user's identity.
  • the following describes how the terminal device distinguishes between receiving the fourth information from the first network device as the first user and the information corresponding to the first user's identity.
  • the terminal device distinguishing method may include one or more of the following: distinguish the four information and the information corresponding to the first user identity through SRB, and distinguish the fourth information and the information corresponding to the first user identity through the logical channel , Distinguish the fourth information from the information corresponding to the first user identity through the user identity, or distinguish the fourth information from the information corresponding to the first user identity through the physical resource.
  • the terminal device can distinguish the fourth information from the information corresponding to the first user identity through SRB; or the terminal device can distinguish the fourth information from the information corresponding to the first user identity through the logical channel and the user identity; or, the terminal device
  • the fourth information can be distinguished from the information corresponding to the first user identity by the identification of SRB, logical channel, and user identity; or the terminal device can distinguish the fourth information from the first user by the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • an implementation manner is that the terminal device uses the first user identity and the fourth SRB to receive the fourth information from the first network device.
  • the fourth SRB is different from the third SRB, and the third SRB is used to receive the information corresponding to the first user identity from the first network device as the first user.
  • the terminal device distinguishes the fourth information from the information corresponding to the first user identity through the logical channel
  • the terminal device uses the first user identity and uses the fourth logical channel corresponding to the third SRB to receive the information from the first network device.
  • the fourth logical channel is different from the third logical channel, and the third logical channel is used to receive information corresponding to the first user identity from the first network device as the first user.
  • the fourth information may include the identifier of the second user identity.
  • the terminal device receives the information corresponding to the first user identity from the first network device as the first user identity, the information may also include the identity of the first user identity.
  • an implementation manner is that the terminal device uses the first user identity and the second physical resource to receive the fourth information from the first network device.
  • the second physical resource is different from the first physical resource, and the first physical resource is used to receive the information corresponding to the first user identity from the first network device as the first user identity.
  • the distinguishing method used by the terminal device when distinguishing the first information and the information corresponding to the first user identity may be the same as the distinguishing method used by the terminal device when distinguishing the fourth information and the information corresponding to the first user identity. It can also be different. For example, if the terminal device distinguishes the first information from the information corresponding to the first user identity by physical resources, the terminal device can continue to distinguish the fourth information from the information corresponding to the first user identity by physical resources, or the terminal device can also distinguish by SRB.
  • the fourth information is information corresponding to the identity of the first user.
  • the terminal device sends an RRC reconfiguration complete (RRC reconfiguration complete) message corresponding to the second user identity to the second network device as the second user identity, and the second network device receives the RRC reconfiguration from the terminal device with the second user identity. Complete the message.
  • RRC reconfiguration complete RRC reconfiguration complete
  • the terminal device can send the RRC reconfiguration complete message to the second network device as the second user, and the terminal device can continue to perform subsequent operations as the second user.
  • the terminal device may use the identity of the second user to perform data transmission according to the information in the RRC reconfiguration message included in the second information.
  • the fourth information may further include second indication information.
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to instruct the terminal device to communicate with the second network.
  • the user identity communicates in the first network
  • the second network is the network corresponding to the second user identity
  • the first network is the network corresponding to the first user identity. It can be understood that the first network is the network where the first network device is located, and the second network is the network where the second network device is located.
  • the second indication information indicates that the terminal device communicates in the second network as the second user, then subsequently, if the terminal device wants to send the information related to the second user's identity to the network, it can send it to the second network device as the second user. . If the second indication information indicates that the terminal device communicates in the first network with the identity of the second user, then if the terminal device wants to send the information related to the second user identity to the network, it can continue to forward the information through the identity of the first user. . For example, if the amount of information corresponding to the second user identity of the terminal device is small, the second indication information may indicate that the terminal device communicates with the second user identity in the first network, which neither affects the communication of the first user identity, but also causes the second user identity to communicate.
  • the information corresponding to the user identity is transmitted; or, if the amount of information corresponding to the second user identity of the terminal device is relatively large, the second indication information may indicate that the terminal device communicates with the second user identity in the second network, so as to ensure the second user identity.
  • the communication of the user identity proceeds normally.
  • the fourth information includes the second indication information, and the second indication information indicates that the terminal device communicates in the second network as the second user
  • S505 can be executed; or, if the fourth information includes the second indication information, and the second indication information
  • the instruction information indicates that the terminal device communicates in the first network as the second user identity, so it is not necessary to perform S505, but to execute: the terminal device sends the RRC reconfiguration complete message corresponding to the second user identity to the first network device as the first user identity , The first network device receives the RRC reconfiguration complete message from the terminal device of the first user identity, the first network device sends the RRC reconfiguration complete message to the second network device, and the second network device receives the RRC reconfiguration complete message from the first network device The RRC reconfiguration complete message.
  • the terminal device When the terminal device is in the RRC connected state as the second user identity, the terminal device may be in the RRC idle state or the RRC inactive state as the first user identity, or may also be in the RRC connected state as the first user identity. If the terminal device is in the RRC connected state as the second user, the terminal device needs to be in the RRC idle state or the RRC inactive state as the first user. For example, the terminal device can receive data from the first network as the first user. In the fourth information of the device, it enters the RRC idle state or the RRC inactive state as the first user, or the terminal device can also enter the RRC idle state or the RRC inactive state as the first user at other times. This embodiment of the application There is no restriction on this.
  • the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user. If it is necessary to establish a connection with the network as the second user identity, the first information corresponding to the second user identity can be sent to the first network device through the first user identity, so as to assist the second user through the RRC connection of the first user identity
  • the RRC connection between the identity establishment and the network can not only meet the requirement of establishing an RRC connection between the identity of the second user and the network, but also reduce the time required to establish the RRC connection process, and speed up the establishment of the RRC connection between the identity of the second user and the network. , Which reduces the time delay of the business and helps to improve the user experience.
  • the first information may include all or part of the information included in the Msg3 corresponding to the second user identity, and all or part of the information included in the Msg5 corresponding to the second user identity, which is equivalent to combining the information included in Msg3 with
  • the information included in Msg5 is sent to the network equipment together, reducing the interaction process between the terminal equipment and the network equipment.
  • the first information includes some configuration parameters of the second user identity of the terminal device. The terminal device sends the first information to the network device at once, so that the network device can configure the second user identity in advance, which is helpful for the terminal device. Realize communication as the second user as soon as possible, further reducing the communication delay.
  • an embodiment of the present application provides a second communication method.
  • FIG. 6, is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 3B is taken as an example.
  • the method provided by the embodiment shown in FIG. 6 can further reduce the service delay.
  • this method can also be applied to the network architecture shown in FIG. 3D.
  • the terminal device supporting the first user identity will be replaced with the first terminal device, and the terminal device supporting the second user identity will be replaced by the first terminal device. Replace the device with the second terminal device, that's it.
  • the first terminal device is, for example, the terminal device 1 in FIG. 3D
  • the second terminal device is, for example, the terminal device 2 in FIG. 3D.
  • the method executed by the network device and the terminal device is taken as an example.
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the second network device may be the network device 2 in the network architecture shown in FIG. 3B
  • the terminal device described below may be the terminal device in the network architecture shown in FIG. 3B.
  • the terminal device sends a third message to the first network device with the identity of the first user, and the first network device receives the third message from the terminal device with the identity of the first user.
  • the terminal device supports a first user identity and a second user identity
  • the first network device is a network device accessed by the terminal device as the first user identity
  • the terminal device resides in the second network device as the second user identity.
  • the first user identity and the second user identity may belong to the same mobile operator or belong to different mobile operators.
  • the first user identity and the second user identity can belong to the same standard. For example, if the first user identity and the second user identity belong to the LTE standard, both the first network device and the second network device can be eNBs; or, the first user identity
  • the second user identity and the second user identity can also belong to different standards.
  • the first user identity belongs to the LTE standard and the second user identity belongs to the NR standard.
  • the first network device can be an eNB
  • the second network device can be a gNB.
  • the terminal device When performing S601, the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user. If the terminal device needs to enter the RRC connection state as the second user, for example, the terminal device needs to send uplink data as the second user, or the terminal device receives a paging message as the second user, etc., if the terminal device is the second user If the user identity is in the RRC idle state, the terminal device needs to establish an RRC connection with the second network device as the second user identity, or if the terminal device is in the RRC inactive state as the second user identity, the terminal device needs to act as the second user identity The RRC connection with the second network device is restored.
  • the terminal device needs to perform random access to the second network device as the second user identity.
  • the terminal device can assist the second user identity to perform random access with the second network device as the first user identity, thereby reducing the need for the terminal device to establish an RRC connection with the second network device as the second user identity. time.
  • the terminal device generates the third message as the second user, but the terminal device sends the third message to the first network device as the first user, which is equivalent to the identity of the first user in the RRC connection state. Send the third message to the network.
  • the third message may be the third message (Msg3) in the random access process corresponding to the second user identity, and the third message is used to request the establishment, re-establishment or restoration of the RRC connection with the second user identity.
  • Msg3 the third message
  • the terminal device before the terminal device sends the third message to the first network device as the first user, it may also determine that the third message is sent to the first network device as the first user.
  • the determination method of the terminal device refer to the introduction in S501 in the embodiment shown in FIG. 5 for the terminal device determining the content of sending the first information to the first network device as the first user.
  • the terminal device needs to obtain the second TA, for example, it can be obtained through the second network device.
  • the release message may carry the second TA. Then the terminal device can obtain the second TA when the second user identity is released.
  • the terminal device may also obtain the second TA through other information from the second network device.
  • the terminal device may also send the first information as the first user identity to the first network device, and the first information may include a random message corresponding to the second user identity.
  • the terminal device can send the Msg1 in the random access process corresponding to the second user identity to the first network device as the first user identity, and the Msg1 can be regarded as a preamble.
  • the first network device may forward the first information to the second network device where the second user identity resides, and the second network device receives the first information from the first network device.
  • the second network device may generate second information according to the first information, and send the second information to the first network device, and the first network device receives the second information from the second network device.
  • the second information is used to respond to the fifth information.
  • the second information may include all or part of the information included in the Msg2 in the random access process corresponding to the second user identity.
  • the second TA may be included in the second information.
  • the second network device may send the Msg2 in the random access process corresponding to the second user identity to the first network device.
  • the Msg2 includes the second information, and the first network device may receive the Msg2 from the second network device.
  • the terminal device can distinguish the first information and the preamble corresponding to the first user identity through physical resources; or, the first information and the preamble corresponding to the first user identity can be distinguished through the user identity; or, The first information and the preamble corresponding to the first user identity can also be distinguished by physical resources, and the first information and the preamble corresponding to the first user identity can also be distinguished by the user identity.
  • the terminal device can distinguish between the second information and the Msg2 corresponding to the first user identity through physical resources; alternatively, the second information can be distinguished from the Msg2 corresponding to the first user identity through the identification of the user identity.
  • the second information can include the first user identity. 2.
  • the identification of the user identity such as the ID of the second user identity; alternatively, the second information can be distinguished from the Msg2 corresponding to the first user identity by physical resources, or the sixth information can be distinguished from the first user by the user identity identity
  • the identity corresponds to Msg2.
  • the terminal device can also distinguish the third message from the information corresponding to the first user identity (for example, Msg3 corresponding to the first user identity).
  • the method of distinguishing the terminal device may include one or more of the following: distinguish the third message and the information corresponding to the first user identity through the SRB, and distinguish the third message and the information corresponding to the first user identity through the logical channel For information, the third message is distinguished from the information corresponding to the first user identity by the user identity, or the third message is distinguished from the information corresponding to the first user identity by physical resources.
  • the terminal device can distinguish the third message from the information corresponding to the first user identity through SRB; or, the terminal device can distinguish the third message from the information corresponding to the first user identity through the logical channel and the user identity; or, the terminal device The third message can be distinguished from the information corresponding to the first user identity through the identification of SRB, logical channel, and user identity; or the terminal device can distinguish the third message from the first user through the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • S501 the terminal device can distinguish the third message from the information corresponding to the first user identity through SRB
  • the terminal device can distinguish the third message from the information corresponding to the first user identity through the logical channel and the user identity
  • the terminal device can distinguish the third message from the first user through the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • the first network device forwards the third message to the second network device, and the second network device receives the third message from the first network device.
  • the second network device sends a fourth message to the first network device, and the first network device receives the fourth message from the second network device.
  • the fourth message is used to respond to the third message.
  • the fourth message may be Msg4 in the random access process corresponding to the second user identity.
  • the second network device may generate response information for the third message, that is, generate the fourth message. Since the second network device is the third message received from the first network device, the second network device can still send the fourth message to the first network device.
  • the first network device sends the fourth message to the terminal device with the first user identity, and the terminal device receives the fourth message from the first network device with the first user identity.
  • the terminal device is the fourth message received with the identity of the first user, but the fourth message corresponds to the identity of the second user. Therefore, the terminal device can use the fourth message for the identity of the second user, which is equivalent to that the terminal device acts as the second user.
  • the identity received the fourth message.
  • the terminal device can also distinguish the fourth message from the information corresponding to the first user identity (for example, Msg4 corresponding to the first user identity).
  • the terminal device distinguishing method may include one or more of the following: distinguish the fourth message and the information corresponding to the first user identity through the SRB, and distinguish the fourth message and the information corresponding to the first user identity through the logical channel Information, distinguishing the fourth message and the information corresponding to the first user identity by the user identity, or distinguishing the fourth message and the information corresponding to the first user identity by the physical resource.
  • the terminal device can distinguish the fourth message from the information corresponding to the first user identity through SRB; or the terminal device can distinguish the fourth message from the information corresponding to the first user identity through the logical channel and the user identity; or, the terminal device
  • the fourth message can be distinguished from the information corresponding to the first user identity by the identification of SRB, logical channel, and user identity; or the terminal device can distinguish the fourth message from the first user by the identification of SRB, logical channel, physical resource, and user identity Information corresponding to the identity, etc.
  • S504 for this part of the content, please refer to the related introduction of S504 in the embodiment shown in FIG. 5.
  • the terminal device sends the Msg5 in the random access process corresponding to the second user identity to the second network device as the second user identity, and the second network device receives the Msg5 from the terminal device of the second user identity.
  • the terminal device can send the Msg5 to the second network device as the second user identity, and the terminal device can continue to execute the subsequent process as the second user identity.
  • the fourth message may further include second indication information.
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to instruct the terminal device to communicate with the second network.
  • the user identity communicates in the first network
  • the second network is the network corresponding to the second user identity
  • the first network is the network corresponding to the first user identity. It can be understood that the first network is the network where the first network device is located, and the second network is the network where the second network device is located.
  • the terminal device sends the Msg5 corresponding to the second user identity to the first network device as the first user identity.
  • a network device receives the Msg5 from the terminal device of the first user identity, the first network device sends the Msg5 to the second network device, and the second network device receives the Msg5 from the first network device.
  • the terminal device When the terminal device is in the RRC connected state as the second user identity, the terminal device may be in the RRC idle state or the RRC inactive state as the first user identity, or may also be in the RRC connected state as the first user identity. If the terminal device is in the RRC connected state as the second user, the terminal device needs to be in the RRC idle state or the RRC inactive state as the first user. For example, the terminal device can receive data from the first network as the first user. In the fourth information of the device, it enters the RRC idle state or the RRC inactive state as the first user, or the terminal device can also enter the RRC idle state or the RRC inactive state as the first user at other times. This embodiment of the application There is no restriction on this.
  • the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user. If it is necessary to establish a connection with the network as the second user identity, the first information corresponding to the second user identity can be sent to the first network device through the first user identity, so as to assist the second user through the RRC connection of the first user identity
  • the RRC connection between the identity establishment and the network can not only meet the requirement of establishing an RRC connection between the identity of the second user and the network, but also reduce the time required to establish the RRC connection process, and speed up the establishment of the RRC connection between the identity of the second user and the network. , Which reduces the time delay of the business and helps to improve the user experience.
  • the two user identities of the terminal device correspond to different network devices, and information needs to be forwarded between the two network devices.
  • the two user identities of the terminal device correspond to the same network device, that is, the scenario shown in FIG. 3A.
  • the terminal device supports the first user identity and the second user identity, and the terminal device accesses the network device as the first user identity, and the terminal device also resides on the network device as the second user identity. If this is the case, you can continue to apply the solution provided in the embodiment of this application.
  • the first network device and the second network device are the same network device.
  • the two user identities correspond to the same network device, which reduces the forwarding steps between network devices and is more conducive to reducing time delay. Or, there may also be a situation.
  • there are two terminal devices supporting the first user identity and the second user identity respectively and these two terminal devices correspond to the same network device, that is, as shown in FIG. 3C. Scenes.
  • the first terminal device supports the first user identity
  • the second terminal device supports the second user identity
  • the second terminal device also resides as the second user identity In that network device. If this is the case, you can continue to apply the solution provided in the embodiment of this application.
  • the first network device and the second network device are the same network device.
  • the terminal device that supports the first user identity is the first terminal device
  • the terminal device that supports the second user identity is the second terminal device, that is, the forwarding step between the two network devices does not need to be performed.
  • the two user identities correspond to the same network device, which reduces the forwarding steps between network devices and is more conducive to reducing time delay.
  • FIG. 7 is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 3B is taken as an example. It should be noted that this method can also be applied to the network architecture shown in FIG. 3D.
  • the terminal device supporting the first user identity will be replaced with the first terminal device, and the terminal device supporting the second user identity will be replaced by the first terminal device. Replace the device with the second terminal device, that's it.
  • the first terminal device is, for example, the terminal device 1 in FIG. 3D
  • the second terminal device is, for example, the terminal device 2 in FIG. 3D.
  • the method executed by the network device and the terminal device is taken as an example.
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the second network device may be the network device 2 in the network architecture shown in FIG. 3B
  • the terminal device described below may be the terminal device in the network architecture shown in FIG. 3B.
  • the terminal device sends the Msg1 in the random access process corresponding to the second user identity to the first network device as the first user identity, and the first network device receives the Msg1 from the terminal device of the first user identity.
  • the terminal device supports a first user identity and a second user identity.
  • the first network device is a network device accessed by the terminal device as the first user identity, and the terminal device resides in the second network device as the second user identity.
  • the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user.
  • the terminal device needs to perform random access to the second network device as the second user identity. For example, the terminal device triggers the random access process with the identity of the second user.
  • the terminal device can assist the second user identity to perform random access with the second network device with the identity of the first user, thereby reducing terminal device use The time required for the second user identity to establish an RRC connection with the second network device.
  • the terminal device can distinguish the Msg1 corresponding to the second user identity from the Msg1 corresponding to the first user identity through physical resources; alternatively, the Msg1 corresponding to the second user identity can be distinguished from the first user through the user identity identifier. Msg1 corresponding to the identity; alternatively, the Msg1 corresponding to the second user identity can be distinguished from the Msg1 corresponding to the second user identity through physical resources, or the Msg1 corresponding to the second user identity can be distinguished from the first user identity through the user identity.
  • the corresponding Msg1. please refer to the related introduction of S501 in the embodiment shown in FIG. 5.
  • the second network device Before S701, the second network device will release the connection with the terminal device of the second user identity. For example, referring to S702, the second network device sends a release message to the terminal device of the second user identity, where the release message is used to release the connection with the terminal device of the second user identity. After receiving the release message as the second user, the terminal device can enter the RRC inactive state or the RRC idle state. The embodiment of the present application takes the RRC inactive state as an example. As an optional manner, the release message may also indicate that the second user identity can perform random access through a channel corresponding to the first user identity. Thus, the terminal device can determine that it can send the Msg1 corresponding to the second user identity to the first network device as the first user identity.
  • the first network device forwards the Msg1 corresponding to the second user identity to the second network device, and the second network device receives the Msg1 corresponding to the second user identity from the first network device.
  • the second network device sends the Msg2 in the random access process corresponding to the second user identity to the first network device, and the first network device receives the Msg2 from the second network device.
  • the second network device may generate a response message of the Msg1, that is, Msg2 corresponding to the second user identity. After generating the Msg2, the second network device may send the Msg2 to the first network device.
  • the terminal device can distinguish Msg2 corresponding to the second user identity from Msg2 corresponding to the first user identity through physical resources; or, can distinguish Msg2 corresponding to the second user identity and Msg2 corresponding to the first user identity through the user identity; Alternatively, Msg2 corresponding to the second user identity and Msg2 corresponding to the second user identity can also be distinguished by physical resources, and Msg2 corresponding to the second user identity and Msg2 corresponding to the first user identity can also be distinguished by the identification of the user identity.
  • Msg2 corresponding to the second user identity from Msg2 corresponding to the first user identity through physical resources
  • Msg2 corresponding to the second user identity and Msg2 corresponding to the first user identity can also be distinguished by the identification of the user identity.
  • the Msg2 corresponding to the second user identity may include a second TA, and the second TA is the TA corresponding to the terminal device communicating in the second network with the second user identity.
  • the first TA which is the TA corresponding to the terminal device communicating in the first network as the first user.
  • the first network device sends the Msg2 corresponding to the second user identity to the terminal device of the first user identity, and the terminal device receives the Msg2 from the first network device as the first user identity.
  • the terminal device is Msg2 corresponding to the second user identity received as the first user, but Msg2 corresponds to the second user identity, so the terminal device can use the Msg2 corresponding to the second user identity for the second user identity, which is equivalent to The terminal device obtains the Msg2 corresponding to the second user identity as the second user identity.
  • the terminal device sends the Msg3 in the random access process corresponding to the second user identity to the first network device as the first user identity, and the first network device receives the Msg3 from the terminal device of the first user identity.
  • the Msg3 may include the identifier of the second user identity, for example, the ID of the second user identity.
  • the first network device forwards the Msg3 corresponding to the second user identity to the second network device, and the second network device receives the Msg3 from the first network device.
  • the second network device sends the Msg4 in the random access process corresponding to the second user identity to the first network device, and the first network device receives the Msg4 from the second network device.
  • the second network device may generate a response message of the Msg3, that is, Msg4 corresponding to the second user identity. After generating the Msg4, the second network device can send the Msg4 to the first network device.
  • the Msg4 may include the identifier of the second user identity, for example, the ID of the second user identity.
  • the first network device forwards the Msg4 corresponding to the second user identity to the second network device, and the second network device receives the Msg4 from the first network device.
  • the terminal device sends the Msg5 in the random access process corresponding to the second user identity to the first network device as the second user identity, and the first network device receives the Msg5 from the terminal device of the second user identity.
  • the terminal device may disconnect the RRC connection with the first network device as the first user, and establish the RRC connection with the second network device as the second user.
  • the terminal device After the terminal device sends the Msg5 in the random access process corresponding to the second user identity to the first network device as the second user identity, the terminal device can continue to execute the subsequent process as the second user identity, for example, it can communicate with the second network device For data transmission, etc.
  • the subsequent process please refer to the introduction of the process shown in FIG. 4, which will not be repeated here.
  • the Msg4 corresponding to the second user identity may further include second indication information, and the second indication information is used to instruct the terminal device to communicate in the second network with the second user identity, or to The terminal device is instructed to communicate in the first network as the second user identity, the second network is the network corresponding to the second user identity, and the first network is the network corresponding to the first user identity. It can be understood that the first network is the network where the first network device is located, and the second network is the network where the second network device is located.
  • the terminal device sends the first network device to the first network device as the first user.
  • the first network device receives the Msg5 from the terminal device of the first user identity, the first network device sends the Msg5 to the second network device, and the second network device receives the Msg5 from the first network device Msg5.
  • the first network device receives the Msg5 from the terminal device of the first user identity, the first network device sends the Msg5 to the second network device, and the second network device receives the Msg5 from the first network device Msg5.
  • the terminal device may not need to learn the second TA.
  • the terminal device needs to obtain the second TA before the data transmission corresponding to the second user identity. Therefore, in the embodiment of the present application, a method for obtaining the second TA is provided so as to be used for subsequent data transmission between the second user identity and the second network device.
  • an embodiment of the present application provides a fourth communication method.
  • FIG. 8 is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 3B is taken as an example.
  • the embodiment shown in FIG. 8 helps to further reduce the time delay.
  • this method can also be applied to the network architecture shown in FIG. 3D.
  • the terminal device supporting the first user identity will be replaced with the first terminal device, and the terminal device supporting the second user identity will be replaced by the first terminal device. Replace the device with the second terminal device, that's it.
  • the first terminal device is, for example, the terminal device 1 in FIG. 3D
  • the second terminal device is, for example, the terminal device 2 in FIG. 3D.
  • the method executed by the network device and the terminal device is taken as an example.
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the first network device described in the following may be the network device 1 in the network architecture shown in FIG. 3B
  • the second network device may be the network device 2 in the network architecture shown in FIG. 3B
  • the terminal device described below may be the terminal device in the network architecture shown in FIG. 3B.
  • the terminal device sends the first information in the random access process corresponding to the second user identity to the first network device as the first user identity, and the first network device receives the first information from the terminal device of the first user identity.
  • the terminal device supports a first user identity and a second user identity.
  • the first network device is a network device accessed by the terminal device as the first user identity, and the terminal device resides in the second network device as the second user identity.
  • the terminal device is in the RRC connected state as the first user, and is in the RRC idle state or the RRC inactive state as the second user.
  • the terminal device needs to perform random access to the second network device as the second user identity. For example, the terminal device triggers the random access process with the identity of the second user.
  • the terminal device can assist the second user identity to perform random access with the second network device with the identity of the first user, thereby reducing terminal device use The time required for the second user identity to establish an RRC connection with the second network device.
  • the first information is information corresponding to the identity of the second user.
  • the first information may include second information and third information.
  • the second information may include all or part of the information included in the Msg1 in the random access process corresponding to the second user identity.
  • the third information may include all or part of the information included in the Msg3 in the random access process corresponding to the second user identity.
  • content such as the implementation of Msg3, reference may be made to the related introduction of S501 in the embodiment shown in FIG. 5.
  • the first information may include all or part of the information included in Msg1 corresponding to the second user identity, and all or part of the information included in Msg3 corresponding to the second user identity, which is equivalent to combining the information included in Msg1 and Msg3.
  • the included information is sent to the network equipment together, reducing the interaction process between the terminal equipment and the network equipment.
  • the first information may include the identity of the second user identity, so that the first network device can determine that the first information corresponds to the second user identity.
  • the terminal device may add the first information to a message, for example, the message is called the first merged message, which is equivalent to that the first merged message includes the first information.
  • the message can also have other names, and the name of the message does not constitute a restriction on the message itself.
  • the terminal device may send the first merge message to the first network device as the first user, and the first network device receives the first merge message and also receives the first information.
  • the first information includes the second information and the third information. If the second information includes all or part of the information of Msg1, and the third information includes all or part of the information of Msg3, then the information included in Msg1 and the information included in Msg3 should be included.
  • the terminal device can also put the second information and the third information into different messages, and send the second information and the third information to the first network device as the first user.
  • the identity sends the first information to the first network device.
  • the terminal device may send to the first network device Msg1 corresponding to the second user identity and Msg3 corresponding to the second user identity.
  • the Msg1 corresponding to the second user identity includes the second information
  • the second user identity corresponds to
  • the Msg3 includes the third message.
  • the first network device receives Msg1 corresponding to the second user identity and Msg3 corresponding to the second user identity, and thus obtains the first information.
  • the terminal device Before sending the first information to the first network device as the first user, the terminal device may first determine to send the first information to the first network device as the first user.
  • the determination method of the terminal device and the content of the TA reference may be made to the related introduction of S501 in the embodiment shown in FIG. 5.
  • the terminal device can distinguish the first information corresponding to the second user identity from the information corresponding to the first user identity through physical resources; alternatively, the first information corresponding to the second user identity can be distinguished from the user identity.
  • the first information and the information corresponding to the identity of the first user please refer to the related introduction of S501 in the embodiment shown in FIG. 5.
  • the second network device Before S801, the second network device will release the terminal device of the second user identity. For example, referring to S802, the second network device sends a release message to the terminal device of the second user identity, where the release message is used to release the terminal device of the second user identity. After receiving the release message as the second user, the terminal device can enter the RRC inactive state or the RRC idle state. The embodiment of the present application takes the RRC inactive state as an example. As an optional manner, the release message may also indicate that the second user identity can perform random access through a channel corresponding to the first user identity. Thus, the terminal device can determine that it can send the first information corresponding to the second user identity to the first network device as the first user identity.
  • the first network device forwards the first information to the second network device, and the second network device receives the first information from the first network device.
  • the terminal device sends the first merge message to the first network device as the first user, then in S803, the first network device may forward the first merge message to the second network device, and the second network device may forward the first merge message to the second network device in S803.
  • the device can also receive the first merge message from the first network device.
  • the terminal device sends two messages to the first network device as the first user, and the two messages carry second information and third information, then in S803, the first network device may The two messages are forwarded to the second network device, and the second network device can receive the two messages from the first network device.
  • the terminal device sends Msg1 and Msg3 corresponding to the second user identity to the first network device as the first user identity, then in S803, the first network device may forward Msg1 and Msg3 corresponding to the second user identity For the second network device, the second network device can receive Msg1 and Msg3 corresponding to the second user identity from the first network device.
  • the second network device sends fourth information to the first network device, and the first network device receives the fourth information from the second network device.
  • the fourth information is used to respond to the first information. Therefore, the fourth information is information corresponding to the second user identity of the terminal device.
  • the second network device may generate response information for the first information, that is, generate fourth information. Since the second network device is the first information received from the first network device, the second network device can still send the fourth information to the first network device.
  • the fourth information may include the identity of the second user.
  • the first information includes the second information and the third information
  • the fourth information generated by the second network device may include the response information of the second information or the response information of the third information.
  • the response information of the second information includes, for example, all or part of the information included in the Msg2 corresponding to the second user identity
  • the response information of the third information includes, for example, all or part of the information included in the Msg4 corresponding to the second user identity.
  • the response information of the second information may include the second TA.
  • the second TA is the TA corresponding to the terminal device communicating in the second network as the second user.
  • there is a first TA which is the TA corresponding to the terminal device communicating in the first network as the first user.
  • the second network device may add the fourth information to a message, for example, the message is called the second merged message, which is equivalent to that the second merged message includes the fourth information.
  • the message can also have other names, and the name of the message does not constitute a restriction on the message itself.
  • an implementation manner of the second merge message is that the second merge message is specifically an RRC reconfiguration message.
  • the implementation of the second merge message is not limited to this.
  • the second network device may send the second merge message to the first network device, and the first network device receives the second merge message, which also receives the fourth information.
  • the fourth information includes the response information of the second information and the response information of the third information.
  • the response information of the second information includes all or part of the information of Msg4
  • the response information of the third information includes all or part of the RRC reconfiguration message.
  • the information included in Msg4 and the information included in the RRC reconfiguration message should be added to a message. If there is a repetitive part in the information included in Msg4 and the information included in the RRC reconfiguration message, for the repetitive part, in Only one copy needs to be included in the second merged message. In this way, the redundant information in the second combined message can be reduced, the overhead of the second combined message can be reduced, and the success rate of effective information transmission can also be improved.
  • the second network device may also put the response information of the second information and the response information of the third information into different messages, and send the response information of the second information and the response information of the third information to the first network device. It is also equivalent to that the second network device sends the fourth information to the first network device.
  • the second network device may send Msg2 and Msg4 corresponding to the second user identity to the first network device, the Msg2 corresponding to the second user identity includes the response information of the second information, and the Msg4 corresponding to the second user identity includes the information of the third information.
  • Response information The first network device receives Msg2 corresponding to the second user identity and Msg4 corresponding to the second user identity, and thus obtains the fourth information.
  • the first network device sends the fourth information to the terminal device of the first user identity, and the terminal device receives the fourth information from the first network device as the first user identity.
  • the first network device may send the second merge message to the first user identity
  • the terminal device can receive the second merge message from the first network device as the first user.
  • the first network device receives two messages corresponding to the second user identity from the second network device, and the two messages carry the response information of the second information and the response information of the third information, respectively, Then in S804, the first network device may send the two messages to the terminal device, and the terminal device receives the two messages from the first network device as the first user, and thus obtains the fourth information.
  • the first network device receives Msg2 and Msg4 corresponding to the second user identity from the second network device, then in S805, the first network device may send Msg2 and Msg4 corresponding to the second user identity to The terminal device of the first user identity, the terminal device can receive the Msg2 and Msg4 corresponding to the second user identity from the first network device as the first user identity.
  • the terminal device is the fourth information received with the identity of the first user, but the fourth information corresponds to the identity of the second user. Therefore, the terminal device can use the fourth information for the identity of the second user, which is equivalent to the terminal device acting as the second user. The identity obtained the fourth information.
  • the terminal device sends the Msg5 in the random access process corresponding to the second user identity to the first network device as the second user identity, and the first network device receives the Msg5 from the terminal device of the second user identity.
  • the terminal device may disconnect the RRC connection with the first network device as the first user, and establish the RRC connection with the second network device as the second user.
  • the terminal device After the terminal device sends the Msg5 in the random access process corresponding to the second user identity to the first network device as the second user identity, the terminal device can continue to execute the subsequent process as the second user identity, for example, it can communicate with the second network device For data transmission, etc.
  • the subsequent process please refer to the introduction of the process shown in FIG. 4, which will not be repeated here.
  • the response information of the third information may further include second indication information, and the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to indicate
  • the terminal device communicates in the first network as a second user identity, the second network is a network corresponding to the second user identity, and the first network is a network corresponding to the first user identity. It can be understood that the first network is the network where the first network device is located, and the second network is the network where the second network device is located.
  • the response information of the third information includes the second indication information, and the second indication information indicates that the terminal device communicates in the second network as the second user
  • S806 may be performed; or, if the response information of the third information includes If the second instruction information indicates that the terminal device communicates in the first network as the second user, it is not necessary to perform S806, but to execute: the terminal device sends the second user to the first network device as the first user
  • the first network device receives the Msg5 from the terminal device of the first user identity
  • the first network device sends the Msg5 to the second network device
  • the second network device receives the Msg5 from the first network device.
  • the terminal device may not need to learn the second TA.
  • the terminal device needs to obtain the second TA before the data transmission corresponding to the second user identity. Therefore, in the embodiment of the present application, a method for obtaining the second TA is provided so as to be used for subsequent data transmission between the second user identity and the second network device.
  • the Msg1 and Msg3 corresponding to the second user identity can be sent together, which further accelerates the establishment of the RRC connection between the second user identity and the network, reduces the service delay, and helps improve users.
  • the use of experience can be performed using the Msg1 and Msg3 corresponding to the second user identity.
  • the two user identities of the terminal device correspond to different network devices, and information needs to be forwarded between the two network devices.
  • the two user identities of the terminal device correspond to the same network device, that is, the scenario shown in FIG. 3A.
  • the terminal device supports the first user identity and the second user identity, and the terminal device accesses the network device as the first user identity, and the terminal device also resides on the network device as the second user identity. If this is the case, you can continue to apply the solution provided in the embodiment of this application.
  • the first network device and the second network device are the same network device.
  • the two user identities correspond to the same network device, which reduces the forwarding steps between network devices and is more conducive to reducing time delay. Or, there may also be a situation.
  • there are two terminal devices supporting the first user identity and the second user identity respectively and these two terminal devices correspond to the same network device, that is, as shown in FIG. 3C. Scenes.
  • the first terminal device supports the first user identity
  • the second terminal device supports the second user identity
  • the second terminal device also resides as the second user identity In that network device. If this is the case, you can continue to apply the solution provided in the embodiment of this application.
  • the first network device and the second network device are the same network device.
  • the terminal device that supports the first user identity is the first terminal device
  • the terminal device that supports the second user identity is the second terminal device, that is, the forwarding step between the two network devices does not need to be performed.
  • the two user identities correspond to the same network device, which reduces the forwarding steps between network devices and is more conducive to reducing time delay.
  • FIG. 9 is a schematic block diagram of a communication device 900 according to an embodiment of the application.
  • the communication device 900 is a terminal device 900, for example.
  • the terminal device 900 includes a processing module 910.
  • a sending module 920 and a receiving module 930 may also be included.
  • the terminal device 900 may be a terminal device, or may be a chip applied to the terminal device or other combination devices, components, etc. having the above-mentioned terminal device functions.
  • the transmitting module 920 may be a transmitter
  • the receiving module 930 may be a receiver.
  • the transmitter or receiver may include an antenna and a radio frequency circuit, etc.
  • the processing module 910 may be a processor, such as a baseband processor.
  • the baseband processor may include one or more central processing units (central processing units, CPUs).
  • the sending module 920 and the receiving module 930 may be radio frequency units, and the processing module 910 may be a processor, such as a baseband processor.
  • the sending module 920 and the receiving module 930 may be input and output interfaces of a chip (such as a baseband chip), and the processing module may be a processor of the chip system, and may include one or more central processing units.
  • the processing module 910 may be used to perform all operations performed by the terminal device in the embodiment shown in FIG. 5 except for receiving and sending operations, such as operations such as generating first information, and/or to support the operations described herein. Other processes of technology.
  • the sending module 920 may be used to perform all the sending operations performed by the terminal device in the embodiment shown in FIG. 5, such as S501, and/or other processes used to support the technology described herein.
  • the receiving module 930 may be used to perform all receiving operations performed by the terminal device in the embodiment shown in FIG. 5, such as S504, and/or other processes used to support the technology described herein.
  • the sending module 920 and the receiving module 930 may be a functional module, which can complete both the sending operation and the receiving operation.
  • the functional module may be called a transceiver module.
  • the transceiver module may be used to perform the function shown in FIG. All the sending and receiving operations performed by the terminal device in the embodiment.
  • the transceiver module when performing a sending operation, can be considered as a sending module, and when performing a receiving operation, the transceiver module can be considered as a receiving module; or
  • the module 920 and the receiving module 930 can also be two functional modules.
  • the transceiver module can be regarded as a collective term for these two functional modules.
  • the two functional modules are the sending module 920 and the receiving module 930 respectively.
  • the sending module 920 is used to complete the sending operation.
  • the sending module 920 may be used to perform all the sending operations performed by the terminal device in the embodiment shown in FIG. 5, and the receiving module 930 may be used to complete receiving operations.
  • the receiving module 930 may be used to perform the implementation shown in FIG. In the example, all the receiving operations performed by the terminal device.
  • the sending module 920 is configured to send first information to the first network device as the first user.
  • the first information includes second information and third information.
  • the terminal device 900 supports the first user identity and the second network device. User identity, the terminal device 900 is in the RRC connected state in the network where the first user identity is located, and is in the RRC idle state or RRC inactive state in the network where the second user identity is located, wherein the second information Used to request to establish an RRC connection as the second user, the third information is used to indicate that the establishment of the RRC connection as the second user is complete, or the second information is used to request to establish an RRC connection as the second user.
  • the identity reestablishes the RRC connection, the third information is used to indicate that the reestablishment of the RRC connection as the second user is complete, or the second information is used to request the resumption of the RRC connection as the second user, and the third The information is used to indicate the completion of the restoration of the RRC connection as the second user;
  • the receiving module 930 is configured to receive fourth information from the first network device as the first user, and the fourth information is used to respond to the first information.
  • the second information is information included in a third message in the random access process corresponding to the second user identity
  • the third message is an RRC establishment request message and an RRC reconstruction Request message or RRC recovery request message.
  • the third information is information included in a fifth message in the random access process corresponding to the second user identity
  • the fifth message is an RRC establishment complete message and RRC reestablishment. Complete message or RRC recovery complete message.
  • the receiving module 930 is configured to receive the fourth information from the first network device as the first user in the following manner:
  • the fourth information is transmitted through an RRC reconfiguration message.
  • the processing module 910 is configured to determine to send the first information to the first network device as the first user before the sending module 920 sends the first information to the first network device as the first user .
  • the processing module 910 is configured to determine to send the first information to the first network device as the first user in the following manner:
  • the difference between the first timing advance and the second timing advance being less than or equal to the first threshold, it is determined that the first information is sent to the first network device as the first user, wherein the The first timing advance is the timing advance corresponding to the terminal device 900 communicating in the first network device in the identity of the first user, and the second timing advance is the timing advance of the terminal device 900 in the identity of the second user.
  • the first instruction information from the second network device it is determined to initiate the random access process of the second user identity to the first network device as the first user identity.
  • the sending module 920 is further configured to send fifth information as the first user to the first network device before sending the first information as the first user to the first network device, where the fifth information includes all The random access preamble in the random access process corresponding to the second user identity;
  • the receiving module 930 is further configured to receive sixth information from the first network device as the first user, where the sixth information is used to respond to the fifth information, and the sixth information includes the first Two timing advances, where the second timing advances are not equal to the first timing advances, and the second network device is a network device where the terminal device 900 resides as the second user.
  • the sending module 920 is configured to send fifth information to the first network device as the first user in one or more of the following ways:
  • the fifth information includes the identity of the second user.
  • the sending module 920 is configured to send the first information as the first user to the first network device in one or more of the following ways:
  • the first information is sent to the first network device in the identity of the first user and in the second SRB, where the second SRB is different from the first SRB, and the first SRB is used to
  • the user identity sends the information corresponding to the first user identity to the first network device; or,
  • the first information is sent to the first network device using the identity of the first user and the second logical channel corresponding to the first SRB.
  • the second logical channel is different from the first logical channel, and the first logical channel is different from the first logical channel.
  • the logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the first user identity sends the information corresponding to the first user identity to the first network device.
  • the receiving module 930 is configured to receive the fourth information from the first network device as the first user in one or more of the following manners:
  • the fourth information from the first network device is received with the identity of the first user and with a fourth SRB, where the fourth SRB is different from the third SRB, and the third SRB is used to A user identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth information from the first network device is received in the identity of the first user and in the fourth logical channel corresponding to the third SRB.
  • the fourth logical channel is different from the third logical channel, and the fourth logical channel is different from the third logical channel.
  • the three logical channels are used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth information from the first network device is received with the identity of the first user and with a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used for Receiving the information corresponding to the first user identity from the first network device as the first user identity.
  • the fourth information includes second indication information
  • the second indication information is used to instruct the terminal device 900 to communicate in the second network as the second user, or to indicate
  • the terminal device 900 uses the second user identity to communicate in a first network
  • the second network is a network corresponding to the second user identity
  • the first network is a network corresponding to the first user identity.
  • processing module 910 in the embodiments of the present application may be implemented by a processor or processor-related circuit components
  • the sending module 920 may be implemented by a transmitter or a transmitter-related circuit component
  • the receiving module 930 may be implemented by a receiver or a receiver-related circuit component. Circuit component realization.
  • FIG. 10 is a schematic block diagram of a communication device 1000 according to an embodiment of the application.
  • the communication apparatus 1000 is, for example, the first network device 1000.
  • the first network device 1000 includes a processing module 1010.
  • a sending module 1020 and a receiving module 1030 may also be included.
  • the first network device 1000 may be a terminal device, or may be a chip applied in the first network device or other combination devices, components, etc. having the function of the first network device described above.
  • the transmitting module 1020 may be a transmitter
  • the receiving module 1030 may be a receiver
  • the transmitter or receiver may include an antenna and a radio frequency circuit, etc.
  • the processing module 1010 may be a processor
  • the device can include one or more CPUs.
  • the sending module 1020 and the receiving module 1030 may be radio frequency units, and the processing module 1010 may be a processor, such as a baseband processor.
  • the sending module 1020 and the receiving module 1030 may be input and output interfaces of a chip (such as a baseband chip), and the processing module may be a processor of the chip system, and may include one or more central processing units. .
  • the processing module 1010 may be used to perform all operations performed by the first network device in the embodiment shown in FIG. 5 except for receiving and sending operations, for example, operations such as determining that the first information corresponds to the second network device, and/ Or other processes used to support the technology described in this article.
  • the sending module 1020 may be used to perform all the sending operations performed by the first network device in the embodiment shown in FIG. 5, such as S502 and S504, and/or other processes used to support the technology described herein.
  • the receiving module 1030 may be used to perform all receiving operations performed by the first network device in the embodiment shown in FIG. 5, such as S501 and S503, and/or other processes used to support the technology described herein.
  • the sending module 1020 and the receiving module 1030 can be a functional module, which can complete both sending and receiving operations.
  • the functional module can be called a transceiver module.
  • the transceiver module can be used to perform the All the sending operations and receiving operations performed by the first network device in the embodiment, for example, when performing the sending operation, the transceiver module can be considered as the sending module, and when performing the receiving operation, the transceiver module can be considered as the receiving module; or ,
  • the sending module 1020 and the receiving module 1030 can also be two functional modules.
  • the transceiver module can be regarded as a collective term for these two functional modules.
  • the two functional modules are the sending module 1020 and the receiving module 1030 respectively.
  • the sending module 1020 is used to complete Sending operations.
  • the sending module 1020 can be used to perform all the sending operations performed by the first network device in the embodiment shown in FIG. 5, and the receiving module 1030 is used to complete the receiving operation.
  • the receiving module 1030 can be used to perform the All receiving operations performed by the first network device in the illustrated embodiment.
  • the receiving module 1030 is configured to receive first information from a terminal device of a first user identity, the first information includes second information and third information, and the terminal device supports the first user identity and the second user identity
  • the terminal device is in the RRC connected state in the network where the first user identity is located, and is in the RRC idle state or the RRC inactive state in the network where the second user identity is located, wherein the second information is used
  • the third information is used to indicate that the establishment of an RRC connection with the identity of the second user is complete, or the second information is used to request to establish an RRC connection with the identity of the second user
  • the RRC connection is reestablished, and the third information is used to indicate that the reestablishment of the RRC connection as the second user is completed, or the second information is used to request that the RRC connection be restored as the second user, the third information It is used to indicate the completion of restoring the RRC connection as the second user;
  • the processing module 1010 is configured to determine fourth information according to the first information, and the fourth information is used to respond to the first information;
  • the sending module 1020 is configured to send the fourth information to the terminal device of the first user identity.
  • the second information is information included in a third message in the random access process corresponding to the second user identity
  • the third message is an RRC establishment request message and an RRC reconstruction Request message or RRC recovery request message.
  • the third information is information included in a fifth message in the random access process corresponding to the second user identity
  • the fifth message is an RRC establishment complete message and RRC reestablishment. Complete message or RRC recovery complete message.
  • the sending module 1020 is configured to send the fourth information to the terminal device of the first user identity in the following manner:
  • the fourth information is transmitted through an RRC reconfiguration message.
  • the receiving module 1030 is further configured to receive fifth information from the terminal device of the first user identity before receiving the first information from the terminal device of the first user identity, where the fifth information includes the first user identity. 2.
  • the random access preamble in the random access process corresponding to the user identity;
  • the sending module 1020 is further configured to send sixth information to the terminal device of the first user identity, where the sixth information is used to respond to the fifth information, and the sixth information includes the second time advance Wherein, the second timing advance is not equal to the first timing advance, and the second network device is a network device where the terminal device resides as the second user.
  • the receiving module 1030 is configured to receive the fifth information from the terminal device of the first user identity through one or more of the following methods:
  • the terminal device sends the random access preamble corresponding to the first user identity to the first network device 1000 as the first user identity; or,
  • the fifth information includes the identity of the second user.
  • the receiving module 1030 is configured to receive the first information from the terminal device of the first user identity through one or more of the following methods:
  • the first user identity sends the information corresponding to the first user identity to the first network device 1000; or,
  • the device receives the first information transmitted through a second physical resource from a terminal device of the first user identity, where the second physical resource is different from the first physical resource, and the first physical resource is used for the terminal
  • the device sends the information corresponding to the first user identity to the first network device 1000 as the first user identity.
  • the sending module 1020 is configured to send the fourth information to the terminal device of the first user identity through one or more of the following methods:
  • the fourth information is sent to the terminal device of the first user identity through a fourth SRB.
  • the fourth SRB is different from the third SRB, and the third SRB is used by the terminal device to communicate with the first user.
  • the identity receives the information corresponding to the first user identity from the first network device 1000; or,
  • the fourth information is sent to the first user identity through the fourth logical channel corresponding to the third SRB, the fourth logical channel is different from the third logical channel, and the third logical channel is used for the terminal device Receiving the information corresponding to the first user identity from the first network device 1000 as the first user identity; or,
  • the fourth information is sent to the terminal device of the first user identity through a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used by the terminal device to communicate with each other.
  • the first user identity receives the information corresponding to the first user identity from the first network device 1000.
  • the fourth information includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in a second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • processing module 1010 in the embodiment of the present application may be implemented by a processor or processor-related circuit components
  • the sending module 1020 may be implemented by a transmitter or a transmitter-related circuit component
  • the receiving module 1030 may be implemented by a receiver or a receiver-related circuit component. Circuit component realization.
  • FIG. 11 is a schematic block diagram of a communication device 1100 according to an embodiment of the application.
  • the communication apparatus 1100 is, for example, a terminal device 1100.
  • the terminal device 1100 includes a processing module 1110.
  • a sending module 1120 and a receiving module 1130 may also be included.
  • the terminal device 1100 may be a terminal device, or may be a chip applied in the terminal device or other combination devices, components, etc. having the above-mentioned terminal device functions.
  • the transmitting module 1120 may be a transmitter
  • the receiving module 1030 may be a receiver
  • the transmitter or receiver may include an antenna and a radio frequency circuit
  • the processing module 1110 may be a processor
  • the processor may include One or more CPUs.
  • the sending module 1120 and the receiving module 1130 may be radio frequency units, and the processing module 1110 may be a processor, such as a baseband processor.
  • the sending module 1120 and the receiving module 1130 may be input and output interfaces of a chip (such as a baseband chip), and the processing module may be a processor of the chip system, and may include one or more central processing units.
  • the processing module 1110 can be used to perform all operations performed by the terminal device in the embodiment shown in FIG. 6 except for receiving and sending operations, such as generating a third message in the random access process corresponding to the second user identity, etc. Operations, and/or other processes used to support the techniques described herein.
  • the sending module 1120 may be used to perform all the sending operations performed by the terminal device in the embodiment shown in FIG. 6, such as S601, and/or other processes used to support the technology described herein.
  • the receiving module 1130 may be used to perform all receiving operations performed by the terminal device in the embodiment shown in FIG. 6, such as S604, and/or other processes used to support the technology described herein.
  • the sending module 1120 and the receiving module 1130 may be a functional module, which can complete both the sending operation and the receiving operation.
  • the functional module may be called a transceiver module.
  • the transceiver module can be used to perform the All the sending and receiving operations performed by the terminal device in the embodiment.
  • the transceiver module can be considered as a sending module, and when performing a receiving operation, the transceiver module can be considered as a receiving module; or
  • the module 1120 and the receiving module 1130 can also be two functional modules.
  • the transceiver module can be regarded as a collective term for these two functional modules.
  • the two functional modules are the sending module 1120 and the receiving module 1130 respectively.
  • the sending module 1120 is used to complete the sending operation.
  • the sending module 1120 may be used to perform all the sending operations performed by the terminal device in the embodiment shown in FIG. 6, and the receiving module 1130 may be used to complete the receiving operation.
  • the receiving module 1130 may be used to perform the implementation shown in FIG. In the example, all the receiving operations performed by the terminal device.
  • the sending module 1120 is configured to send a third message to the first network device with the identity of the first user, the third message being the third message in the random access process corresponding to the identity of the second user, and the first The three messages are used to request to establish, re-establish, or restore the RRC connection as the second user identity.
  • the terminal device 1100 supports the first user identity and the second user identity, and the terminal device 1100 is located where the first user identity is located.
  • the network is in the RRC connected state, and in the RRC idle state or the RRC inactive state in the network where the second user identity is located;
  • the receiving module 1130 is configured to receive a fourth message from the first network device as the first user identity, where the fourth message is a fourth message in a random access process corresponding to the second user identity, The fourth message is used to respond to the third message.
  • the sending module 1120 is further configured to send the fifth message in the random access process corresponding to the second user identity to the first network device as the second user identity, so The fifth message is used to indicate the completion of establishing, reestablishing or restoring the RRC connection as the second user.
  • the processing module 1110 is configured to, before the sending module 1120 sends the third message to the first network device as the first user, determine to send the second message to the first network device as the first user. Three news.
  • the processing module 1110 is configured to determine to send the third message to the first network device as the first user in the following manner:
  • the third message is sent to the first network device as the first user, wherein the The first timing advance is the timing advance corresponding to the terminal device 1100 communicating in the first network device as the first user, and the second timing advance is the terminal device 1100 acting as the second user.
  • the first instruction information from the second network device it is determined to initiate the random access process of the second user identity to the first network device as the first user identity.
  • the sending module 1120 is further configured to send first information as the first user to the first network device before sending the third message as the first user to the first network device, where the first information includes all The random access preamble in the random access process corresponding to the second user identity;
  • the receiving module 1130 is further configured to receive second information from the first network device as the first user, the second information is used to respond to the first information, and the second information includes the first information. Two timing advances, where the second timing advances are not equal to the first timing advances, and the second network device is a network device where the terminal device 1100 resides as the second user.
  • the sending module 1120 is configured to send first information to the first network device as the first user in one or more of the following ways:
  • the first information includes the identity of the second user.
  • the sending module 1120 is configured to send a third message to the first network device as the first user in one or more of the following ways:
  • the third message is sent to the first network device in the identity of the first user and in the second SRB.
  • the second SRB is different from the first SRB, and the first SRB is used to
  • the user identity sends the information corresponding to the first user identity to the first network device; or,
  • the third message is sent to the first network device using the identity of the first user and the second logical channel corresponding to the first SRB.
  • the second logical channel is different from the first logical channel, and the first logical channel is different from the first logical channel.
  • the logical channel is used to send the information corresponding to the first user identity to the first network device as the first user identity; or,
  • the third message is sent to the first network device using the first user identity and using a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used to
  • the first user identity sends the information corresponding to the first user identity to the first network device.
  • the receiving module 1130 is configured to receive the fourth message from the first network device as the first user in one or more of the following manners:
  • the fourth message from the first network device is received in the identity of the first user and in the fourth SRB, where the fourth SRB is different from the third SRB, and the third SRB is used to A user identity receives the information corresponding to the first user identity from the first network device; or,
  • the fourth message from the first network device is received in the identity of the first user and in the fourth logical channel corresponding to the third SRB.
  • the fourth logical channel is different from the third logical channel, and the fourth logical channel is different from the third logical channel.
  • the three logical channels are used to receive the information corresponding to the first user identity from the first network device as the first user identity; or,
  • the fourth message from the first network device is received with the identity of the first user and with a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used for Receiving the information corresponding to the first user identity from the first network device as the first user identity.
  • the fourth message includes second indication information
  • the second indication information is used to instruct the terminal device 1100 to communicate in the second network as the second user, or to indicate
  • the terminal device 1100 uses the second user identity to communicate in a first network
  • the second network is a network corresponding to the second user identity
  • the first network is a network corresponding to the first user identity.
  • processing module 1110 in the embodiment of the present application may be implemented by a processor or processor-related circuit components
  • the sending module 1120 may be implemented by a transmitter or a transmitter-related circuit component
  • the receiving module 1130 may be implemented by a receiver or a receiver-related circuit component. Circuit component realization.
  • FIG. 12 is a schematic block diagram of a communication device 1200 according to an embodiment of the application.
  • the communication apparatus 1200 is, for example, the first network device 1200.
  • the first network device 1200 includes a processing module 1210.
  • a sending module 1220 and a receiving module 1230 may also be included.
  • the first network device 1200 may be a terminal device, or may be a chip applied in the first network device or other combination devices, components, etc. having the function of the first network device described above.
  • the transmitting module 1220 may be a transmitter
  • the receiving module 1230 may be a receiver
  • the transmitter or receiver may include an antenna and a radio frequency circuit, etc.
  • the processing module 1210 may be a processor
  • the device can include one or more CPUs.
  • the sending module 1220 and the receiving module 1230 may be radio frequency units, and the processing module 1210 may be a processor, such as a baseband processor.
  • the sending module 1220 and the receiving module 1230 may be input and output interfaces of a chip (such as a baseband chip), and the processing module may be a processor of the chip system, and may include one or more central processing units. .
  • the processing module 1210 can be used to perform all operations performed by the first network device in the embodiment shown in FIG. 6 except for receiving and sending operations, for example, operations such as determining that the third message corresponds to the second network device, and/ Or other processes used to support the technology described in this article.
  • the sending module 1220 may be used to perform all the sending operations performed by the first network device in the embodiment shown in FIG. 6, such as S602 and S604, and/or other processes used to support the technology described herein.
  • the receiving module 1230 may be used to perform all receiving operations performed by the first network device in the embodiment shown in FIG. 6, such as S601 and S603, and/or other processes used to support the technology described herein.
  • the sending module 1220 and the receiving module 1230 can be a functional module, which can complete both the sending operation and the receiving operation.
  • the functional module can be called a transceiver module.
  • the transceiver module can be used to perform the All the sending operations and receiving operations performed by the first network device in the embodiment, for example, when performing the sending operation, the transceiver module can be considered as the sending module, and when performing the receiving operation, the transceiver module can be considered as the receiving module; or ,
  • the sending module 1220 and the receiving module 1230 can also be two functional modules.
  • the transceiver module can be regarded as a collective term for these two functional modules.
  • the two functional modules are the sending module 1220 and the receiving module 1230 respectively.
  • the sending module 1220 is used to complete Sending operations.
  • the sending module 1220 can be used to perform all the sending operations performed by the first network device in the embodiment shown in FIG. 6, and the receiving module 1230 is used to complete the receiving operation.
  • the receiving module 1230 can be used to perform the All receiving operations performed by the first network device in the illustrated embodiment.
  • the receiving module 1230 is configured to receive a third message from the terminal device of the first user identity, and the third message is the third message in the random access process corresponding to the second user identity.
  • the message is used to request to establish, re-establish or restore the RRC connection as the second user identity, wherein the terminal device supports the first user identity and the second user identity, and the terminal device is in the network where the first user identity is located. Is in an RRC connected state, and is in an RRC idle state or an RRC inactive state in the network where the second user identity is located;
  • the processing module 1210 is configured to determine a fourth message according to the third message, where the fourth message is a fourth message in the random access process corresponding to the second user identity, and the fourth message is used to respond to the Said the third message;
  • the sending module 1220 is configured to send the fourth message to the terminal device of the first user identity.
  • the receiving module 1230 is further configured to receive a fifth message in the random access process corresponding to the second user identity from the second user identity, where the fifth message is used for Indicate that the establishment, re-establishment or restoration of the RRC connection with the identity of the second user is complete.
  • the receiving module 1230 is further configured to receive first information from the terminal device of the first user identity before receiving the first information from the terminal device of the first user identity, where the first information includes the first information 2.
  • the random access preamble in the random access process corresponding to the user identity;
  • the sending module 1220 is further configured to send second information to the terminal device of the first user identity, the second information is used to respond to the first information, and the second information includes the second time advance Wherein, the second timing advance is not equal to the first timing advance, and the second network device is a network device where the terminal device resides as the second user.
  • the receiving module 1230 is configured to receive the first information from the terminal device of the first user identity through one or more of the following methods:
  • the terminal device receives the first information transmitted through a fourth physical resource from the terminal device of the first user identity, where the fourth physical resource is different from the third physical resource, and the third physical resource is used for all
  • the terminal device sends the random access preamble corresponding to the first user identity to the first network device 1200 as the first user identity; or,
  • the fifth information includes the identity of the second user.
  • the receiving module 1230 is configured to receive the third message from the terminal device of the first user identity through one or more of the following methods:
  • the first user identity sends the information corresponding to the first user identity to the first network device 1200; or,
  • the device receives the third message transmitted through a second physical resource from a terminal device of the first user identity, where the second physical resource is different from the first physical resource, and the first physical resource is used for the terminal
  • the device sends the information corresponding to the first user identity to the first network device 1200 as the first user identity.
  • the sending module 1220 is configured to send the fourth message to the terminal device of the first user identity through one or more of the following methods:
  • the fourth message is sent to the terminal device of the first user identity through a fourth SRB.
  • the fourth SRB is different from the third SRB, and the third SRB is used by the terminal device to communicate with the first user.
  • the identity receives the information corresponding to the first user identity from the first network device 1200; or,
  • the fourth message is sent to the first user identity through the fourth logical channel corresponding to the third SRB, the fourth logical channel is different from the third logical channel, and the third logical channel is used for the terminal device Receiving the information corresponding to the first user identity from the first network device 1200 as the first user identity; or,
  • the fourth message is sent to the terminal device of the first user identity through a second physical resource, where the second physical resource is different from the first physical resource, and the first physical resource is used by the terminal device to communicate with each other.
  • the first user identity receives the information corresponding to the first user identity from the first network device 1200.
  • the fourth message includes second indication information
  • the second indication information is used to instruct the terminal device to communicate in the second network as the second user, or to Instruct the terminal device to communicate with the second user identity in a first network
  • the second network is the network corresponding to the second user identity
  • the first network is the first user identity The internet.
  • processing module 1210 in the embodiment of the present application may be implemented by a processor or processor-related circuit components
  • the sending module 1220 may be implemented by a transmitter or a transmitter-related circuit component
  • the receiving module 1230 may be implemented by a receiver or a receiver-related circuit component. Circuit component realization.
  • the embodiment of the present application also provides a communication device, and the communication device may be a terminal device or a circuit.
  • the communication device may be used to perform the actions performed by the terminal device in the foregoing method embodiments.
  • FIG. 13 shows a simplified schematic diagram of the structure of the terminal device. It is easy to understand and easy to illustrate.
  • the terminal device uses a mobile phone as an example.
  • the terminal equipment includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, and to control the terminal device, execute the software program, and process the data of the software program.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of baseband signal and radio frequency signal and the processing of radio frequency signal.
  • the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal devices may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 13 only one memory and processor are shown in FIG. 13. In an actual terminal device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the antenna and radio frequency circuit with transceiving functions can be regarded as the transceiving unit of the terminal device (the transceiving unit can be a functional unit that can realize the sending and receiving functions; or the transceiving unit can also be It includes two functional units, namely a receiving unit capable of realizing the receiving function and a transmitting unit capable of realizing the transmitting function), and the processor with the processing function is regarded as the processing unit of the terminal device.
  • the terminal device includes a transceiver unit 1310 and a processing unit 1320.
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
  • the processing unit may also be called a processor, a processing board, a processing module, a processing device, and so on.
  • the device for implementing the receiving function in the transceiver unit 1310 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 1310 as the sending unit, that is, the transceiver unit 1310 includes a receiving unit and a sending unit.
  • the transceiver unit may sometimes be called a transceiver, a transceiver, or a transceiver circuit.
  • the receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit.
  • the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
  • transceiving unit 1310 is configured to perform sending and receiving operations on the terminal device side in the foregoing method embodiment
  • processing unit 1320 is configured to perform other operations on the terminal device in the foregoing method embodiment except for the transceiving operation.
  • the transceiver unit 1310 is used to perform all the sending operations and receiving operations of the terminal device in the embodiment shown in FIG. 5, such as S501 and S504, and/or the transceiver unit 1310 is also used to perform support for this text.
  • the processing unit 1320 is configured to perform all operations performed by the terminal device in the embodiment shown in FIG. 5 except for receiving and sending operations, such as operations such as generating first information, and/or the processing unit 1320 is also configured to perform support for this text Other processes of the described technique.
  • the transceiver unit 1310 is used to perform all the sending operations and receiving operations of the terminal device in the embodiment shown in FIG. 6, such as S601 and S604, and/or the transceiver unit 1310 is also used to perform support Other processes of the technique described in this article.
  • the processing unit 1320 is configured to perform all operations performed by the terminal device in the embodiment shown in FIG. 6 except for the receiving and sending operations, for example, operations such as generating the third message in the random access process corresponding to the second user identity, etc., And/or the processing unit 1320 is also used to perform other processes that support the technology described herein.
  • the device may include a transceiver unit and a processing unit.
  • the transceiving unit may be an input/output circuit and/or a communication interface;
  • the processing unit is an integrated processor or a microprocessor or an integrated circuit.
  • the device shown in FIG. 14 can be referred to.
  • the device can perform functions similar to the processing module 910 in FIG. 9.
  • the device can perform functions similar to the processing module 1110 in FIG. 11.
  • the device includes a processor 1410, a data sending processor 1420, and a data receiving processor 1430.
  • the processing module 910 in the foregoing embodiment may be the processor 1410 in FIG. 14 and complete the corresponding function;
  • the sending module 920 in the foregoing embodiment may be the sending data processor 1420 in FIG. 14 and complete the corresponding function
  • the receiving module 930 in the above-mentioned embodiment may be the receiving data processor 1430 in FIG. 14 and completes the corresponding functions.
  • the channel encoder and the channel decoder are shown in FIG. 14, it can be understood that these modules do not constitute a restrictive description of this embodiment, and are only illustrative.
  • the processing device 1500 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem.
  • the communication device in this embodiment can be used as the modulation subsystem therein.
  • the modulation subsystem may include a processor 1503 and an interface 1504.
  • the processor 1503 completes the function of the aforementioned processing module 910
  • the interface 1504 completes the function of the aforementioned transceiver module 920.
  • the processor 1503 completes the function of the aforementioned processing module 1110
  • the interface 1504 completes the function of the aforementioned transceiver module 1120.
  • the modulation subsystem includes a memory 1506, a processor 1503, and a program stored in the memory 1506 and running on the processor.
  • the processor 1503 executes the program, the terminal device side in the above method embodiment is implemented.
  • Methods It should be noted that the memory 1506 can be non-volatile or volatile, and its location can be located inside the modulation subsystem or in the processing device 1500, as long as the memory 1506 can be connected to the The processor 1503 is fine.
  • the device 1600 includes one or more radio frequency units, such as a remote radio unit (RRU) 1610 and one or more baseband units (BBU) (also referred to as digital units, digital units, DU) 1620 .
  • the RRU 1610 may be called a transceiver module, and the transceiver module may include a sending module and a receiving module.
  • the sending module corresponds to the sending module 1020 in FIG. 10, and the receiving module corresponds to the receiving module 1030 in FIG. 10; or the sending module corresponds to the sending module 1220 in FIG. 12, and the receiving module corresponds to the receiving module 1230 in FIG. 12.
  • the transceiver module may also be called a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 1611 and a radio frequency unit 1612.
  • the RRU 1610 part is mainly used for receiving and sending of radio frequency signals and conversion of radio frequency signals and baseband signals, for example, for sending instruction information to terminal equipment.
  • the BBU1610 part is mainly used to perform baseband processing, control the base station, and so on.
  • the RRU 1610 and the BBU 1620 may be physically set together, or may be physically separated, that is, a distributed base station.
  • the BBU 1620 is the control center of the base station, and may also be called a processing module. It may correspond to the processing module 1010 in FIG. 10, or may correspond to the processing module 1210 in FIG. 12, and is mainly used to complete baseband processing functions, such as channel Encoding, multiplexing, modulation, spread spectrum, etc.
  • the BBU processing module
  • the BBU may be used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment, for example, to generate the foregoing indication information.
  • the BBU 1620 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network with a single access standard (such as an LTE network), or support different access standards. Wireless access network (such as LTE network, 5G network or other networks).
  • the BBU 1620 also includes a memory 1621 and a processor 1622.
  • the memory 1621 is used to store necessary instructions and data.
  • the processor 1622 is used to control the base station to perform necessary actions, for example, used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the memory 1621 and the processor 1622 may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • the embodiment of the present application provides a first communication system.
  • the first communication system may include at least one terminal device involved in the embodiment shown in FIG. 5 and the first network device involved in the embodiment shown in FIG. 5 mentioned above.
  • the terminal device is, for example, the terminal device 900 in FIG. 9.
  • the first network device is, for example, the first network device 1000 in FIG. 10.
  • the embodiment of the present application provides a second communication system.
  • the second communication system may include at least one terminal device involved in the embodiment shown in FIG. 5 and the first network device involved in the embodiment shown in FIG. 5 mentioned above.
  • the terminal device is, for example, the terminal device 1100 in FIG. 11.
  • the first network device is, for example, the first network device 1200 in FIG. 12.
  • the first communication system and the second communication system may be the same communication system or different communication systems.
  • the embodiments of the present application also provide a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 5 provided by the foregoing method embodiment.
  • the process related to the terminal device in the embodiment is not limited to a computer-readable storage medium.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 5 provided by the foregoing method embodiment.
  • the process related to the first network device in the embodiment is not limited to a computer-readable storage medium.
  • the embodiments of the present application also provide a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 6 provided by the foregoing method embodiment.
  • the process related to the terminal device in the embodiment is not limited to a computer-readable storage medium.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 6 provided by the foregoing method embodiment.
  • the process related to the first network device in the embodiment is not limited to a computer-readable storage medium.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 5 provided by the above method embodiment Processes related to terminal equipment.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 5 provided by the above method embodiment The process related to the first network device.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 6 provided by the above method embodiment Processes related to terminal equipment.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 6 provided by the above method embodiment The process related to the first network device.
  • processors mentioned in the embodiments of this application may be a CPU, or other general-purpose processors, digital signal processors (digital signal processors, DSP), application specific integrated circuits (ASICs), ready-made Field programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component
  • the memory storage module
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention se rapporte à un procédé, à un appareil et à un dispositif. La présente invention peut s'appliquer à un dispositif terminal. Le dispositif terminal envoie des premières informations à un premier dispositif réseau en utilisant une première identité d'utilisateur. Des deuxièmes informations comprises dans les premières informations demandent à établir, rétablir, ou restaurer une connexion RRC à l'aide d'une seconde identité d'utilisateur, et des troisièmes informations comprises dans les premières informations indiquent que l'établissement, le rétablissement ou la restauration de la connexion RRC à l'aide de la seconde identité d'utilisateur est achevé. Le dispositif terminal reçoit des quatrièmes informations provenant du premier dispositif de réseau en utilisant la première identité d'utilisateur, les quatrièmes informations étant utilisées pour répondre aux premières informations. Si une connexion doit être établie avec un réseau en utilisant la seconde identité d'utilisateur, le dispositif terminal peut établir une connexion RRC entre la seconde identité d'utilisateur et le réseau en utilisant une connexion RRC de la première identité d'utilisateur, qui répond à une exigence d'établissement d'une connexion RRC avec le réseau en utilisant la seconde identité d'utilisateur, et réduit également le temps requis dans le processus d'établissement d'une connexion RRC, ce qui permet de réduire le retard de service et d'améliorer l'expérience de l'utilisateur.
PCT/CN2019/113737 2019-10-28 2019-10-28 Procédé, appareil et dispositif de communication WO2021081711A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201980101651.0A CN114600552A (zh) 2019-10-28 2019-10-28 一种通信方法、装置及设备
PCT/CN2019/113737 WO2021081711A1 (fr) 2019-10-28 2019-10-28 Procédé, appareil et dispositif de communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/113737 WO2021081711A1 (fr) 2019-10-28 2019-10-28 Procédé, appareil et dispositif de communication

Publications (1)

Publication Number Publication Date
WO2021081711A1 true WO2021081711A1 (fr) 2021-05-06

Family

ID=75715655

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/113737 WO2021081711A1 (fr) 2019-10-28 2019-10-28 Procédé, appareil et dispositif de communication

Country Status (2)

Country Link
CN (1) CN114600552A (fr)
WO (1) WO2021081711A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105792333A (zh) * 2014-12-25 2016-07-20 中国移动通信集团公司 多模双待终端的通信方法及装置
US20170150545A1 (en) * 2015-11-25 2017-05-25 Samsung Electronics Co., Ltd. Optimization of power consumption in dual sim mobiles in connected mode in a wireless network
CN106922004A (zh) * 2015-12-28 2017-07-04 宇龙计算机通信科技(深圳)有限公司 一种多sim卡终端呼叫控制方法及装置
CN110351704A (zh) * 2019-05-29 2019-10-18 努比亚技术有限公司 一种寻呼控制方法、双卡双待终端及计算机可读存储介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107889182B (zh) * 2016-09-29 2022-08-12 英特尔公司 使用通信业务的通信设备和方法
US10568073B2 (en) * 2016-12-07 2020-02-18 Samsung Electronics Co., Ltd. Methods and dual SIM dual standby (DSDS) devices for managing data communication
CN109314736B (zh) * 2017-03-24 2020-10-23 华为技术有限公司 一种实现双卡双待双通的通信方法及终端
CN109429304B (zh) * 2017-08-31 2023-02-21 北京三星通信技术研究有限公司 网络连接方法、装置及用户终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105792333A (zh) * 2014-12-25 2016-07-20 中国移动通信集团公司 多模双待终端的通信方法及装置
US20170150545A1 (en) * 2015-11-25 2017-05-25 Samsung Electronics Co., Ltd. Optimization of power consumption in dual sim mobiles in connected mode in a wireless network
CN106922004A (zh) * 2015-12-28 2017-07-04 宇龙计算机通信科技(深圳)有限公司 一种多sim卡终端呼叫控制方法及装置
CN110351704A (zh) * 2019-05-29 2019-10-18 努比亚技术有限公司 一种寻呼控制方法、双卡双待终端及计算机可读存储介质

Also Published As

Publication number Publication date
CN114600552A (zh) 2022-06-07

Similar Documents

Publication Publication Date Title
CN114900547B (zh) 一种通信方法及装置
CN111373783A (zh) 一种信息传输方法及装置、通信设备
US20220124859A1 (en) Data transmission method and apparatus, and communication device
CN113286331B (zh) 重建立的方法和通信装置
EP3474601A1 (fr) Dispositif et procédé de gestion d'une session d'unité de données de protocole et d'une tranche de réseau
CN114342435B (zh) 无线通信方法和装置
WO2018068216A1 (fr) Procédé de gestion de session et élément de réseau
WO2021000688A1 (fr) Procédé et appareil d'émission et de réception d'informations de capacité
US20220264392A1 (en) Rrc connection resume method and device
WO2021258766A1 (fr) Procédé et dispositif permettant de configurer un dispositif terminal
US20230209503A1 (en) Communication method and apparatus, terminal device and network device
WO2022206362A1 (fr) Procédé et appareil de communication
WO2021213014A1 (fr) Procédé et appareil de communication
WO2021134763A1 (fr) Procédé, appareil et dispositif de récupération de transmission
WO2021081711A1 (fr) Procédé, appareil et dispositif de communication
WO2021042387A1 (fr) Procédé, dispositif et appareil de communication
US20210360727A1 (en) User Equipment Context Transfer Over Radio Access Network Paging
US20230199712A1 (en) Wireless communication method and terminal
US20230328825A1 (en) Configuration reset method and apparatus, and terminal device
WO2021088638A1 (fr) Procédé et appareil de communication, et dispositif
US20240137833A1 (en) Wireless communication method, first terminal, and communication device
US20230209502A1 (en) Paging method, device, and storage medium
WO2022141298A1 (fr) Procédé et appareil de communication
WO2023050181A1 (fr) Procédé de communication sans fil et appareil de communication sans fil
US20230189257A1 (en) Data transmission method and terminal device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19951040

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19951040

Country of ref document: EP

Kind code of ref document: A1