WO2021087801A1 - 一种通信方法,通信装置及通信系统 - Google Patents

一种通信方法,通信装置及通信系统 Download PDF

Info

Publication number
WO2021087801A1
WO2021087801A1 PCT/CN2019/115943 CN2019115943W WO2021087801A1 WO 2021087801 A1 WO2021087801 A1 WO 2021087801A1 CN 2019115943 W CN2019115943 W CN 2019115943W WO 2021087801 A1 WO2021087801 A1 WO 2021087801A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
indication information
private
access
private network
Prior art date
Application number
PCT/CN2019/115943
Other languages
English (en)
French (fr)
Inventor
吴烨丹
耿婷婷
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to JP2022525911A priority Critical patent/JP2023500134A/ja
Priority to PCT/CN2019/115943 priority patent/WO2021087801A1/zh
Priority to CN201980101502.4A priority patent/CN114631398B/zh
Priority to BR112022008614A priority patent/BR112022008614A2/pt
Priority to EP19951788.9A priority patent/EP4044642A4/en
Publication of WO2021087801A1 publication Critical patent/WO2021087801A1/zh
Priority to US17/662,120 priority patent/US20220279432A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • This application relates to the field of communication technology, and in particular to a communication method, communication device and communication system.
  • PLMN Public land mobile network
  • SNPN independent private network
  • CAG non-independent private network
  • an idle terminal device accesses the CAG network under the cell, it needs to report the CAG network identity to the base station through a radio resource control (RRC) establishment completion message.
  • RRC radio resource control
  • the base station can determine whether to allow a new terminal equipment to access the CAG network according to the connection status, and can be based on the connection status as The terminal equipment in the CAG network allocates resources reasonably.
  • the RRC establishment complete message is not encrypted, which causes the CAG network identity reported by the terminal device to be easily intercepted, which poses a security risk.
  • the present application provides a communication method, a communication device and a communication system, which can safely and reliably indicate to the base station the private network accessed by the terminal device.
  • a communication method is provided, which may be executed by a terminal device, or may also be executed by a chip or circuit configured in the terminal device, which is not limited in this application.
  • the method includes: the terminal device generates first indication information, the first indication information is used to indicate multiple private networks, the multiple private networks include a first private network, and the first private network is a network that the terminal device requests to access; The terminal device sends the first indication information to the access network device.
  • the first indication information is used to indicate multiple private networks including the first private network. It is impossible to determine which of the multiple private networks is the first private network only by the content of the first indication information. In this way, Even if the first indication information is intercepted by criminals, it is impossible to determine which specific network the terminal device requests to access, so that the identity of the user will not be exposed, and the safe use of the network is improved.
  • the multiple private networks may all be non-independent private networks.
  • the multiple private networks may all be independent private networks.
  • the multiple private networks may include non-independent private networks and independent private networks at the same time.
  • the multiple private networks may depend on the same public network.
  • the multiple private networks may depend on different public networks.
  • the first indication information is carried in an RRC establishment complete message.
  • the first indication information may also be carried in other signaling or sent separately, which is not limited in this application.
  • the first indication information includes indication information of each private network in the plurality of private networks.
  • the terminal device may first determine the multiple private networks, and generate the first indication information according to the multiple private networks.
  • the multiple private networks also include at least one other private network. Therefore, the terminal device can first determine other private networks among the multiple private networks. The terminal device can arbitrarily determine the other private network, which is not limited in this application.
  • a private network other than the first private network in the cell may be determined as the other private network.
  • a private network of the same type as the first private network may be determined as the other private network.
  • a private network that relies on the same public network as the first private network may be determined as the other private network.
  • a private network of the same type as the first private network and dependent on the same public network may be determined as the other private network.
  • the terminal device may receive the broadcast message of the cell, and determine according to the system message block in the broadcast message (for example, system information block 1 (SIB1)) in the multiple private networks other than the first private network Other private networks.
  • SIB1 system information block 1
  • the indication information of each private network includes the identifier of the private network or the index value of the private network.
  • the form of mixed reporting may also be adopted, that is, some private networks of multiple private networks are indicated by the private network identifier, and the remaining private networks are indicated by the private network index value, which is not limited in this application.
  • the first indication information specifically includes private network access indication information and indication information of the first network, and the private network access indication information is used to indicate all The network to which the terminal device requests access is a private network, the first network is a network on which the first private network depends, and the plurality of private networks are private networks that depend on the first network.
  • the access network device After receiving the first indication information, the access network device can determine the type of the private network according to the private network access indication information, and determine the first network according to the indication information of the first network, and the access network device can set the first network
  • the corresponding types of private networks are determined as the multiple private networks.
  • the first indication information can indirectly indicate the multiple private networks.
  • the type of the first private network is a non-independent private network
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is a non-independent private network.
  • the multiple private networks are all non-independent private networks that depend on the first network. After the access network device receives the first indication information, it determines all non-independent private networks in the cell that depend on the first network as the multiple private networks.
  • the type of the first private network is an independent private network
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is an independent private network.
  • the multiple private networks are all independent private networks dependent on the first network. After the access network device receives the first indication information, it determines all independent private networks in the cell that depend on the first network as the multiple private networks.
  • the type of the first private network is a non-independent private network or an independent private network
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is a private network (that is, it is only indicated as a private network, and not specific Indicate whether it is a non-independent private network or an independent private network)
  • the multiple private networks are all private networks (including independent private networks and non-independent private networks) that depend on the first network.
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is a private network (that is, it only indicates that it is a private network, and does not specifically indicate whether it is a non-independent private network or an independent private network).
  • the indication information is used to determine the first network that the terminal device requests to access and the private network type under the first network.
  • the access network device receives the first indication information and the indication information of the first network, and determines the corresponding private networks in the cell that depend on the first network as the multiple private networks.
  • the private network access indication information may be a series of specific codes, or a 1-bit "0" or "1".
  • a bit of "1" can be used to indicate that the network that the terminal device requests to access is a non-independent private network
  • a bit of "0" can be used to indicate that the network that the terminal device requests to access is an independent private network.
  • the access network device After receiving the private network access indication information, the access network device determines whether the network that the terminal device requests to access (that is, the first private network) is a non-independent private network or an independent private network according to the value of the corresponding bit.
  • the private network access indication information may also be an implicit indication, which is not limited in this application.
  • the first network is a network on which the first private network depends.
  • the first network may be a public network.
  • the indication information of the first network may include an identifier or an index value of the first network.
  • the indication information of the first network may include the identifier of any private network under the first network in the cell except the first private network.
  • the access network device determines the first network according to the PLMN ID in the private network identification, and automatically ignores the following CAG ID or NID.
  • a communication method is provided, which can be executed by an access network device, or can also be executed by a chip or circuit configured in the access network device, which is not limited in this application.
  • the method includes: the access network device receives first indication information sent by the terminal device, the first indication information is used to indicate multiple private networks, the multiple private networks include a first private network, and the first private network is the The network to which the terminal device requests access; the access network device determines second indication information according to the first indication information, the second indication information indicates multiple private networks; the access network device sends the second indication information to the core network device; The network access device receives the third indication information sent by the core network device, where the third indication information indicates the first private network.
  • the first indication information includes indication information of each private network in the plurality of private networks.
  • the indication information of each private network includes the identifier of the private network or the index value of the private network.
  • the first indication information specifically includes private network access indication information and indication information of the first network, and the private network access indication information is used to instruct the terminal device to request access
  • the network of is a private network
  • the first network is a network on which the first private network depends
  • multiple private networks are private networks that depend on the first network
  • the access network device determines the second indication information according to the first indication information, including: The access network device determines multiple private networks according to the private network access indication information and the first network indication information.
  • the second indication information includes indication information of each private network in the plurality of private networks.
  • the indication information of each private network includes an identifier or an index value of the private network.
  • the content of the second indication information may be the same as the content of the first indication information.
  • the access network device may play a "forwarding" role.
  • the content of the second indication information may also be different from the first indication information.
  • the first indication information includes the index values of multiple private networks
  • the second indication information may include the identities of the multiple private networks, which is not limited in this application.
  • the second indication information may be carried in the initial terminal device message.
  • the second indication information may also be carried in other RRC signaling or sent separately, which is not limited in this application.
  • a communication method is provided.
  • the method may be executed by a core network device, or may also be executed by a chip or circuit configured in the core network device, which is not limited in this application.
  • the method includes:
  • the core network device receives the second indication information sent by the access network device, the second indication information indicates multiple private networks, the multiple private networks include the first private network, and the first private network is the network that the terminal device requests to access; the core network The device determines the first private network according to the subscription information of multiple private networks and terminal devices; the core network device sends third instruction information to the access network device, and the third instruction information indicates the first private network.
  • the core network device can obtain the contract information of the terminal device. Based on the contract information, the core network device can determine which networks of the cell the terminal device has been authenticated, or in other words, determine which networks of the cell the terminal device can access .
  • the networks here include public networks, non-independent private networks, independent private networks, and so on.
  • the terminal device is usually only authenticated in one of the private networks, or in other words, the terminal device is usually only able to access one private network of the cell.
  • the core network device obtains the contract information of the terminal device, it determines according to the contract information which private network terminal device of the multiple private networks indicated by the second indication information has been authenticated. Furthermore, the authenticated private network is determined as the first private network, and an instruction is given to the access network device.
  • the third indication information is carried in the initial context establishment request message.
  • the third indication information may be carried in other RRC signaling or sent separately, which is not limited in this application.
  • the third indication information includes the identifier or index value of the first private network.
  • the second indication information includes indication information of each private network in the plurality of private networks.
  • a communication device in a fourth aspect, includes a generating unit configured to generate first indication information, where the first indication information is used to indicate multiple private networks, and the multiple private networks include a first private network.
  • the private network is the network that the communication device requests to access; the sending unit is configured to send the first indication information to the access network device.
  • the first indication information includes indication information of each private network in the plurality of private networks.
  • the indication information of each private network includes the identifier of the private network or the index value of the private network.
  • the first indication information specifically includes private network access indication information and indication information of the first network, and the private network access indication information is used to instruct the communication device to request access
  • the network of is a private network
  • the first network is a network that the first private network depends on
  • multiple private networks are private networks that depend on the first network.
  • a communication device in a fifth aspect, includes a receiving unit configured to receive first indication information sent by a terminal device, where the first indication information is used to indicate multiple private networks, and the multiple private networks include the first private network.
  • the first private network is the network that the terminal device requests to access;
  • the determining unit is configured to determine the second indication information according to the first indication information, and the second indication information indicates the multiple private networks;
  • the sending unit is configured to Sending second indication information to the core network device;
  • the receiving unit is further configured to receive third indication information sent by the core network device, where the third indication information indicates the first private network.
  • the first indication information includes indication information of each private network in the plurality of private networks.
  • the indication information of each private network includes the identifier of the private network or the index value of the private network.
  • the first indication information specifically includes private network access indication information and indication information of the first network, and the private network access indication information is used to instruct the terminal device to request access
  • the network of is a private network
  • the first network is a network on which the first private network depends
  • multiple private networks are private networks that depend on the first network
  • the determining unit is also used for the private network access instruction information and the first network’s
  • the instructions identify multiple private networks.
  • the second indication information includes indication information of each private network in the plurality of private networks.
  • a communication device in a sixth aspect, includes a receiving unit configured to receive second indication information sent by an access network device, where the second indication information indicates multiple private networks, and the multiple private networks include the first private network.
  • the first private network is the network that the terminal device requests to access; the determining unit is used to determine the first private network according to the subscription information of multiple private networks and the terminal device; the sending unit is used to send the first private network to the access network device Three indication information, the third indication information indicates the first private network.
  • the second indication information includes indication information of each private network in the plurality of private networks.
  • a communication device may be a terminal device or a chip in the terminal device.
  • the device may include a processing unit and a transceiving unit.
  • the processing unit may be a processor, and the transceiving unit may be a transceiver;
  • the terminal device may also include a storage unit, and the storage unit may be a memory;
  • the processing unit executes the instructions stored by the storage unit, so that the terminal device executes the method in the first aspect.
  • the processing unit may be a processor, and the transceiving unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit to make
  • the terminal device executes the method in the first aspect
  • the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit in the terminal device located outside the chip (for example, Read only memory, random access memory, etc.).
  • a communication device may be an access network device or a chip in the access network device.
  • the device may include a processing unit and a transceiving unit.
  • the processing unit may be a processor, and the transceiving unit may be a transceiver;
  • the access network device may also include a storage unit, and the storage unit may be a memory;
  • the storage unit is used for storing instructions, and the processing unit executes the instructions stored by the storage unit, so that the network device executes the method in the second aspect.
  • the processing unit may be a processor, the transceiving unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit,
  • the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or may be a storage unit located in the access network device.
  • a storage unit outside the chip for example, read-only memory, random access memory, etc.).
  • a communication device may be a core network device or a chip in the core network device.
  • the device may include a processing unit and a transceiving unit.
  • the processing unit may be a processor, and the transceiving unit may be a transceiver;
  • the core network device may also include a storage unit, and the storage unit may be a memory; the storage The unit is used for storing instructions, and the processing unit executes the instructions stored by the storage unit, so that the network device executes the method in the third aspect.
  • the processing unit may be a processor, the transceiving unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit , So that the network device executes the method in the third aspect, the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or a storage unit located in the access network device. The storage unit outside the chip (for example, read-only memory, random access memory, etc.).
  • a communication device including at least one processor configured to couple with a memory, read and execute instructions in the memory, so as to implement any method in the first aspect.
  • the communication device further includes the memory.
  • a communication device including at least one processor configured to couple with a memory, read and execute instructions in the memory, so as to implement any method in the second aspect.
  • the communication device further includes the memory.
  • a communication device including at least one processor configured to couple with a memory, read and execute instructions in the memory, so as to implement any method in the third aspect.
  • the communication device further includes the memory.
  • a computer program product includes: computer program code, which when the computer program code runs on a computer, causes the computer to execute the first aspect, the second aspect, or the third aspect. The method in the aspect.
  • the above-mentioned computer program code may be stored in whole or in part on the first storage medium, where the first storage medium may be packaged with the processor or separately packaged with the processor, which is not specifically limited in this application. .
  • a computer-readable medium stores program code, and when the computer program code runs on a computer, the computer executes the first aspect, the second aspect, or the first aspect.
  • the method in three aspects.
  • a chip system including a processor, configured to call and run a computer program from a memory, so that a communication device installed with the chip system executes the first aspect, the second aspect, or the third aspect. In the method.
  • a communication system which includes at least one of the communication device provided in the fourth aspect, the communication device provided in the fifth aspect, and the communication device provided in the sixth aspect.
  • Fig. 1 is a schematic diagram of a communication system provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of the transition relationship between three RRC states provided by an embodiment of the present application.
  • Fig. 3 is a flow chart of four-step contention-based random access provided by an embodiment of the present application.
  • Fig. 4 is a flowchart of an RRC connection establishment process provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of an example of a communication method provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another example of a communication method provided by an embodiment of the present application.
  • Fig. 7 is a schematic block diagram of an example of a communication device provided by an embodiment of the present application.
  • Fig. 8 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 9 is a schematic block diagram of another example of a communication device provided by an embodiment of the present application.
  • Fig. 10 is a schematic structural diagram of an access network device provided by an embodiment of the present application.
  • FIG. 11 is a schematic block diagram of another example of a communication device provided by an embodiment of the present application.
  • Fig. 12 is a schematic structural diagram of a core network device provided by an embodiment of the present application.
  • GSM global system for mobile communications
  • CDMA code division multiple access
  • WCDMA broadband code division multiple access
  • GPRS general packet radio service
  • LTE long term evolution
  • LTE frequency division duplex FDD
  • TDD LTE Time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX worldwide interoperability for microwave access
  • FIG. 1 is a schematic diagram of a communication system 100 applicable to the communication method of an embodiment of the present application.
  • the communication system 100 may include at least one access network device (for example, the access network device 101 shown in FIG. 1) and at least one terminal device (for example, the terminal device 102 shown in FIG. 1). ), the access network device 101 can communicate with the terminal device 102 wirelessly.
  • the communication system 100 may also include more access network devices and/or more terminal devices, which is not limited in this application.
  • the communication system 100 provided by the present application further includes at least one core network device (for example, the core network device 103 shown in FIG. 1), and the core network device 103 can communicate with the access network device 101 Connect (for example, connect by wire).
  • the communication system 100 may also include more core network equipment, which is not limited in this application.
  • the access network equipment may include equipment that communicates with the wireless terminal through one or more sectors on the air interface in the access network.
  • the access network system can be used to convert the received air frames and Internet Protocol (IP) packets to each other, as a router between the wireless terminal and the rest of the access network, where the rest of the access network can include IP network.
  • IP Internet Protocol
  • the radio access network system can also coordinate the attribute management of the air interface.
  • the access network equipment includes but is not limited to: evolved Node B (evolved Node B, eNB), radio network controller (Radio Network Controller, RNC), Node B (Node B, NB), base station controller (Base Station Controller, BSC), Base Transceiver Station (BTS), home base station (for example, Home evolved NodeB, or Home Node B, HNB), baseband unit (BaseBand Unit, BBU), wireless fidelity (Wireless Fidelity, WIFI)
  • the access point (AP), wireless relay node, wireless backhaul node, transmission point (transmission and reception point, TRP or transmission point, TP) in the system, etc. can also be 5G, such as NR ,
  • BBU baseband unit
  • the gNB may include a centralized unit (CU) and a DU.
  • the gNB may also include a radio unit (RU).
  • CU implements some functions of gNB
  • DU implements some functions of gNB.
  • CU implements radio resource control (RRC), packet data convergence protocol (PDCP) layer functions
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • DU implements wireless link.
  • RLC radio link control
  • media access control media access control
  • MAC physical (physical, PHY) layer functions.
  • the access network device may be a CU node, or a DU node, or a device including a CU node and a DU node.
  • a CU can be divided into an access network device in an access network (radio access network, RAN), or a CU can be divided into an access network device in a core network (core network, CN), which is not limited here.
  • Terminal equipment can also be called user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile equipment, user terminal, terminal, wireless communication equipment, user Agent or user device.
  • the terminal device in the embodiment of the present application may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (VR) terminal device, and an augmented reality (AR) terminal Equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, transportation safety ( The wireless terminal in transportation safety, the wireless terminal in the smart city, the wireless terminal in the smart home, and so on.
  • the embodiments of this application do not limit the application scenarios.
  • Core network equipment refers to equipment in a core network (core network, CN) that provides service support for terminal equipment.
  • the core network equipment in the embodiments of the present application can be used to implement functions such as call connection, billing, mobility management, and supplementary services.
  • the core network equipment may include, for example, access and mobility management function (AMF) entities, session management function (SMF) entities, and user plane functions (UPF). Entities, etc.
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane functions
  • the embodiments of the present application mainly relate to communication with an AMF entity. Therefore, here is a brief description of the AMF entity.
  • the AMF entity may also be abbreviated as AMF, which is mainly used for mobility management and access management, etc., and can be used to implement other functions in the mobility management entity (mobility management entity, MME) function except for session management. For example, legal interception, access authorization (or authentication) and other functions.
  • AMF in 5G is taken as an example of a network element used for mobility and access management, which should not constitute any limitation to this application. This application does not exclude the possibility of replacing AMF with other network elements to achieve the same or similar functions.
  • the entity in the embodiment of the present application may also be referred to as a network element or a functional entity.
  • an AMF entity may also be referred to as an AMF network element or an AMF functional entity.
  • the public network is generally used to provide network services for terminal devices.
  • the public network that is, the public land mobile network (PLMN)
  • PLMN public land mobile network
  • PSTN public switched telephone network
  • the PLMN identity consists of a mobile country code (mobile contrast code, MCC) and a mobile network number (mobile net code, MNC).
  • MCC mobile country code
  • MNC mobile network number
  • the MCC uniquely identifies the country where the mobile user belongs. For example, the MCC in China is 460.
  • the MNC uniquely identifies a network in the country. For example, the MNC of China Mobile is 00 and the MNC of China Unicom is 01.
  • NPN non-public networks
  • a private network can also be called a non-public network, which refers to a network open to specific users, such as an internal network built by a company, school, or factory. Terminal devices that are not contracted with the private network are not allowed to access the private network.
  • Private networks are divided into non-independent private networks and independent private networks.
  • Non-stand-alone non-public network non-stand-alone non-public network, NSA-NPN, or public network integrated non-public network, PNI-NPN used network resources (such as access network equipment, core network equipment, spectrum resources) Etc.) is part of the public network. It can also be considered that the non-independent private network relies on the public network, or the non-independent private network is based on the public network. Non-independent private networks are also called closed access groups (CG).
  • the identification of the non-independent private network includes two parts, namely the PLMN ID and the CAG ID. Among them, the PLMN ID of the non-independent private network is consistent with the public network on which it depends. For multiple dependent private networks that depend on the same public network, the CAG ID of each dependent private network is unique. That is to say, for multiple dependent private networks that depend on the same public network, you can It is distinguished only by CAG ID.
  • the identifier of the non-independent private network #1 can be expressed as: PLMN#1 CAG#1;
  • the identifier of the non-independent private network #2 can be expressed as: PLMN#1 CAG#2.
  • both the non-independent private network #1 and the non-independent private network #2 are private networks that rely on the public network identified as PLMN#1.
  • the above two private networks can be distinguished only by CAG#1 and CAG#2.
  • terminal equipment can switch between the CAG network and the public network and reselect cells.
  • Handover means that the connected terminal device disconnects from the current serving cell and connects to the target cell under the control of the base station.
  • Cell reselection refers to when a terminal device in an idle/deactivated state resides in a cell, as the terminal device moves, the terminal device may need to be changed to another cell with a higher priority or better signal to camp on. This is the cell reselection process.
  • Stand-alone non-public Network refers to a private network that does not rely on the network functions of the public network.
  • identity of an independent private network is also divided into two parts, namely PLMN ID and NID.
  • PLMN ID is the same as the dependent public network.
  • MCC of its PLMN ID is 999.
  • NID of each non-independent private network is unique, that is to say, for multiple independent private networks that depend on the same public network, you can only pass the NID Make a distinction.
  • independent private network #1 can be expressed as: PLMN#1 NID#1;
  • independent private network #2 can be expressed as: PLMN#1 NID#2;
  • independent private network #1 and independent private network #2 are both private networks that rely on the public network identified as PLMN #1.
  • the above two private networks can be distinguished only by NID#1 and NID#2.
  • the MCC of the PLMN ID of the independent private network #3 is 999, indicating that the independent private network #3 is an independent private network deployed by enterprises and others without the help of operators.
  • the independent private network does not support the handover and cell reselection of terminal equipment between independent private networks and public networks, non-independent private networks and other independent private networks, that is, connected terminal equipment cannot be separated from independent private networks.
  • the private network cell is switched to the public network cell, the non-independent private network cell and other independent private network cells, and vice versa; the terminal equipment in the idle state/deactivated state cannot be reselected from the independent private network cell to the public network cell, and vice versa .
  • the independent private network can support the handover and cell reselection of the terminal device between the independent private network and the public network, the non-independent private network, and other independent private networks.
  • the RRC state of the terminal device includes the RRC connected state (RRC_CONNECTED), the RRC deactivated state or the RRC third state (RRC_INACTIVE), and the RRC idle state (RRC_IDLE).
  • Figure 2 shows a schematic diagram of the transition relationship between the three RRC states.
  • the terminal device when the terminal device is in the RRC connection state, the terminal device has established a link with the base station and the core network, and when data arrives at the network, it can be directly transmitted to the terminal device; when the terminal device is in the RRC third state (or RRC deactivated state) ) Means that the terminal equipment has previously established links with the base station and the core network, but the link from the terminal equipment to the base station is released. Although the link is released, the base station will store the context of the terminal device. When there is data to be transmitted, the base station can quickly restore this link; when the terminal device is in the RRC idle state, there is no link between the terminal device and the base station and the core network. When there is data to be transmitted, the terminal device needs to be established The link to the base station and the core network.
  • the random access process is usually required in the following situations: the initial access of the terminal device, the transition from the idle state/deactivated state to the connected state; the RRC connection is re-established after the wireless connection is interrupted; the terminal device needs to and The target cell establishes uplink synchronization; when the terminal device is in the connected state but the terminal device is not in the uplink synchronization state, when uplink or downlink data arrives, the uplink synchronization needs to be established through random access; when using the uplink measurement-based user positioning; in the physical When no dedicated scheduling request resource is allocated on the physical uplink control channel (PUCCH), the uplink resource is applied for through random access.
  • PUCCH physical uplink control channel
  • the types of random access include contention-based random access, non-competition random access, four-step random access, two-step random access, etc.
  • Figure 3 is a flow chart of four-step contention-based random access.
  • Random access is initialized.
  • the terminal device sends a random access preamble to the base station.
  • the random access preamble is carried in the first message (Msg1).
  • the main function of the random access preamble is to inform the base station that there is a random access request, and enable the base station to estimate the transmission delay between it and the terminal equipment, so that The base station can calibrate the uplink timing and notify the terminal equipment of the calibration information through the timing advance command.
  • the terminal device receives a random access response (RAR) sent by the base station.
  • RAR random access response
  • the RAR is carried in the second message (Msg2).
  • the terminal device After the terminal device sends the preamble, it will monitor the corresponding physical downlink control channel (physical downlink control channel) according to the random access radio network temporary identifier (RA-RNTI) corresponding to the preamble in the RAR response window , PDCCH). If the preamble carried in the response received by the terminal device is consistent with the preamble sent by Msg1, it stops monitoring the RAR.
  • RA-RNTI random access radio network temporary identifier
  • the RAR includes the uplink timing advance, the uplink grant (UL grant) allocated for the third message (Msg3), and the temporary cell radio network temporary identifier (temporary C-RNTI) allocated by the network side.
  • the terminal device sends a scheduled transmission-based message (that is, Msg3) to the network device.
  • a scheduled transmission-based message that is, Msg3
  • the terminal device sends Msg3 to the base station according to the uplink authorization and uplink timing advance information in Msg2.
  • the content of Msg3 may also be different depending on the state of the terminal device and the different application scenarios.
  • Msg3 can be divided into the following types: RRC connection request, tracking area data update, resource scheduling request, etc.
  • the terminal device receives the competition resolution sent by the network device, that is, the fourth message Msg4.
  • contention occurs. At most, only one terminal device among the terminal devices competing for the same resource can successfully access.
  • the base station sends a contention resolution message to the terminal device through a physical downlink shared channel (PDSCH). If the terminal device receives the contention resolution message sent to itself from the base station, it is considered that the random access process is successful.
  • PDSCH physical downlink shared channel
  • FIG. 4 is a flowchart of the RRC connection establishment process. As shown in Figure 4, the RRC connection establishment process is divided into the following three steps:
  • Step 210 The terminal device sends an RRC Setup Request (RRCSetupRequest) message to the base station to request to establish an RRC connection with the base station.
  • RRCSetupRequest RRC Setup Request
  • the RRC establishment request message carries information such as the identification of the terminal device and the reason for establishing the connection.
  • the RRC establishment request message may be the aforementioned third message (Msg3).
  • Step 220 The base station sends an RRC Setup (RRCSetup) message to the terminal device.
  • the base station determines that it agrees to establish an RRC connection with the terminal device according to the reason for the RRC connection establishment and the system resource status, and then sends the RRC setup message to the terminal device.
  • the setup message carries a series of configuration information.
  • the RRC setup message may be the aforementioned fourth message (Msg4).
  • Step 230 The terminal device sends an RRC Setup Complete (RRCSetupComplete) message to the base station.
  • the terminal device performs configuration according to the series of configuration information, and after determining that the RRC connection is successfully established, sends an RRC establishment complete message to the base station. In this way, the RRC connection establishment process ends, and the terminal device starts to send an attach message.
  • step 220 if the base station determines that this RRC connection request cannot be established (such as insufficient resources), the base station can send an RRC reject (RRCReject) message to the terminal device, in which the reason for the RRC connection rejection can be specified .
  • RRC reject RRCReject
  • the base station broadcasts the master information block (MIB) to all terminal devices in the cell,
  • the terminal device can determine which time-frequency resources to search for system information block 1 (SIB1) according to the MIB (specifically, according to the scheduling information of the SIB). If the terminal device searches for SIB1, it can determine the current cell's PLMN ID, tracking area code (tracking area code, TAC) and other information. Optionally, the terminal device can also determine the non-independent private network identification, independent private network identification and other information of the cell.
  • SIB1 system information block 1
  • the network device here refers to the access network device, that is, the base station (for example, gNB).
  • the base station for example, gNB.
  • Different network operators have different PLMN IDs.
  • the networks built by these operators may be PLMN (public network), CAG (non-independent private network), and SNPN (independent private network).
  • SNPN can also be deployed by enterprises, etc.
  • the MCC of SNPN's PLMN ID is equal to 999.
  • a certain cell of a base station may belong to different operators, that is, to provide services for users of different operators.
  • a cell can be shared by the above three network types, that is, there can be multiple networks of different types in the same cell.
  • a cell can have the following 7 networks:
  • Network #1 PLMN#1;
  • Network #2 PLMN#1 CAG#1;
  • Network #3 PLMN#1 CAG#2;
  • Network #4 PLMN#2 CAG#1;
  • Network #5 PLMN#1 NID#1;
  • Network #6 PLMN#2 NID#1;
  • network #1 is a public network
  • network #2, network #3, and network #4 are non-independent private networks
  • network #5, network #6, and network #7 are independent private networks.
  • network #2, network #3, and network #5 are private networks that are deployed (or built) on the public network identified as PLMN#1, in other words, are private networks that depend on the public network PLMN#1, or Say, network #2, network #3, and network #5 use the network resources of the public network PLMN#1.
  • Network #4 and Network #6 are private networks that are deployed with the identification of PLMN#2. It can also be said that they are private networks that depend on the public network PLMN#2. In other words, network #4 and network #6 use the public network PLMN#2 Network resources.
  • the MCC of network #7 is equal to 999, which means that the network resources of the public network are not used, or not dependent on the public network.
  • network #7 can be a private network deployed by an enterprise or the like.
  • the terminal device can learn the network sharing status of the cell by reading the system broadcast of the cell.
  • the terminal equipment in the cell can read SIB1, which includes the identity of the public network and the identity of the private network in the cell.
  • SIB1 includes the identity of the public network and the identity of the private network in the cell.
  • it may also include information such as the index value of the public network in the cell and the index value of the private network.
  • the terminal device can also determine the index values of the public network and the private network according to the order of the public network identification and the private network identification in the network identification list.
  • Table 1 shows that the terminal device determines the network list of the cell according to the network identification list of SIB1 broadcast by the cell, and the network list includes the aforementioned 7 networks.
  • an idle terminal device accesses the CAG network (for example, network #2) under the cell, it needs to report the CAG network identity to the base station through the RRC establishment complete message, so that the base station can Knowing the connection between the CAG network and terminal equipment (for example, the number of connected terminal equipment), the base station can determine whether to allow new terminal equipment to access the CAG network according to the connection status, and can determine whether to allow the new terminal equipment to access the CAG network according to the connection status.
  • the terminal equipment allocates resources reasonably.
  • the RRC establishment completion message is not encrypted, which makes the CAG network identity reported by the terminal device easy to be intercepted by criminals.
  • criminals can determine the identity of the user based on the intercepted CAG network identity (for example, as an employee of a company).
  • illegal activities such as monitoring and tracking can be performed more purposefully, which has great security risks, and at the same time it does not meet the privacy requirements of private networks.
  • the present application provides a communication method and communication device, which can safely and reliably indicate to the base station the private network accessed by the terminal device.
  • terminal devices and/or network devices can perform some or all of the steps in the embodiments of this application, and these steps or operations are only examples.
  • the embodiments of the present application may also perform other operations or variations of various operations.
  • each step may be performed in a different order presented in the embodiment of the present application, and it may not be necessary to perform all the operations in the embodiment of the present application.
  • the access network device in the embodiment may be the access network device 101 in FIG. 1, and the terminal device in the embodiment may be the terminal device 102 in FIG. 1.
  • the core network device in the embodiment may be the core network device 103 in FIG. 1.
  • FIG. 5 is a schematic flowchart of a communication method 300 provided in this application.
  • a communication method 300 provided by an embodiment of the present application is described with reference to FIG. 5, and the method 300 includes:
  • Step 310 The terminal device generates first indication information, where the first indication information is used to indicate multiple private networks, the multiple private networks include a first private network, and the first private network is a network that the terminal device requests to access.
  • Step 320 The terminal device sends the first indication information to the access network device.
  • the access network device receives the first indication information sent by the terminal device.
  • Step 330 The access network device determines second indication information according to the first indication information, where the second indication information indicates the multiple private networks.
  • the access network device can have multiple private networks in a cell (denoted as cell #A) at the same time, and the types of the multiple private networks can be Including at least one of independent private networks and non-independent private networks.
  • the cell #A may also include at least one public network.
  • the cell #A may include 9 types of networks as listed in Table 2.
  • Table 2 is a list of networks included in the cell #A in a network sharing scenario.
  • cell #A is shared by 9 networks, including two public networks, 4 non-independent private networks, and 3 independent private networks.
  • the terminal device can determine the corresponding index value according to the order of the network identification of each network in the network identification list.
  • the non-independent private network #1, #2, and #3 all depend on the network PLMN#1
  • the non-independent private network #4 depends on the network PLMN#2
  • the independent private network #1 It depends on the network PLMN#1
  • the independent private networks #2 and #3 depend on the network PLMN#2.
  • the terminal equipment resides in the cell #A and is a user in the cell #A.
  • the terminal device requests to access a private network (for example, the first private network), it needs to indicate to the access network device.
  • a private network for example, the first private network
  • the first private network is one of multiple private networks deployed by the access network device under cell #A.
  • the first private network can be any one of the seven private networks in Table 2.
  • the terminal device requests to access the first private network, the first indication information may be generated and an instruction is given to the access network device.
  • requesting to access the first private network can be understood as requesting to establish an RRC connection with the first private network.
  • the first indication information is used to indicate multiple private networks including the first private network, and it is impossible to determine which of the multiple private networks is the first private network only by the content of the first indication information. In this way, even if the first indication information is intercepted by criminals, it is impossible to determine which specific network the terminal device requests to access, so that the identity of the user will not be exposed, and the safe use of the network is improved.
  • the first private network may be dependent private network #1 in Table 2, and the first indication information may be used to indicate dependent private networks #1, #2, #3 in Table 2, so that even if the first indication The information is intercepted by criminals, and it is impossible to determine which of the non-independent private networks #1, #2, and #3 the network that the terminal device requests to access is specific, thereby protecting user privacy and improving security.
  • the multiple private networks also include at least one other private network. This application does not limit the type, number, etc., of the multiple private networks.
  • the multiple private networks may all be non-independent private networks.
  • the multiple private networks may all be independent private networks.
  • the multiple private networks may include non-independent private networks and independent private networks at the same time.
  • the multiple private networks may depend on the same public network.
  • the multiple private networks may depend on different public networks.
  • step 310 the terminal device generates first indication information.
  • the terminal device may generate the first indication information in at least one of the following ways.
  • Manner 1 The terminal device generates first indication information according to the multiple private networks.
  • the terminal device may first determine the multiple private networks, and generate the first indication information according to the multiple private networks.
  • the multiple private networks also include at least one other private network. Therefore, the terminal device can first determine other private networks among the multiple private networks. The terminal device can arbitrarily determine the other private network, which is not limited in this application.
  • a private network other than the first private network in cell #A may be determined as the other private network.
  • the terminal device can set one or more of the non-independent private networks #2, #3, #4, and independent private networks #1, #2, #3 Determined to be this other private network.
  • a private network of the same type as the first private network may be determined as the other private network.
  • the terminal device may determine one or more of the non-independent private networks #2, #3, and #4 as the other private network.
  • a private network that depends on the same network as the first private network may be determined as the other private network.
  • the terminal device can use the non-independent private network #2, #3, and independent private network #1 that rely on PLMN#1.
  • One or more are identified as the other private network.
  • a private network that is of the same type as the first private network and depends on the same network may be determined as the other private network.
  • the terminal device can determine one or more of the non-independent private networks #2 and #3 that rely on PLMN#1 as the Other private networks.
  • the terminal device may receive the broadcast message of cell #A, and determine other private networks other than the first private network among the plurality of private networks according to the system message block (for example, SIB1) in the broadcast message.
  • SIB1 system message block
  • the system message block in the broadcast message contains information about each network contained in cell #A (for example, the information in Table 2), and the terminal device can obtain related information about other private networks in cell #A according to the system message block. , And then determine the other private network.
  • the terminal device first determines the multiple private networks, and then determines the first indication information according to the multiple private networks. On this basis, the terminal device can directly instruct the multiple private networks.
  • the first indication information may include indication information of each private network in the plurality of private networks.
  • the indication information of each private network includes an identifier of the private network.
  • the first private network may be non-independent private network #1, and the other private networks are non-independent private networks #2, #3, and the first indication information may include the identities of the above three private networks, namely: PLMN#1 CAG#1, PLMN#1 CAG#2, PLMN#1 CAG#3.
  • the access network device can determine that the three private networks indicated by the first indication information are non-independent private networks #1, #2, #3 according to the identities of the above three private networks.
  • the indication information of each private network may include the index value of the private network.
  • the access network device After receiving the first indication information, the access network device can determine the multiple private networks according to the index value therein.
  • the first private network may be non-independent private network #1, and the other private networks are non-independent private networks #2, #3, and the first indication information may include the index values of the above three private networks, namely: 3. 4, 5.
  • the access network device may determine the three private networks indicated by the first indication information as non-independent private networks #1, #2, #3 in the corresponding network list according to the index value.
  • the form of mixed reporting may also be adopted, that is, some private networks of multiple private networks are indicated by the private network identifier, and the remaining private networks are indicated by the private network index value, which is not limited in this application.
  • step 320 the terminal device sends the first indication information to the access network device.
  • the first indication information is carried in an RRC establishment complete message.
  • the first indication information may also be carried in other signaling or sent separately, which is not limited in this application.
  • the access network device determines the second instruction information according to the first instruction information. After the access network device receives the first instruction information, it reads the content therein and determines the plurality of instructions. Which private networks are the private networks, and then generate the second indication information.
  • the second indication information includes indication information of each private network in the plurality of private networks.
  • the second indication information may include indication information of each private network in a plurality of private networks.
  • the indication information of each private network includes an identifier or an index value of the private network.
  • the content of the second indication information may be the same as the content of the first indication information, and in this case, the access network device may play a "forwarding" role.
  • the content of the second indication information may also be different from the first indication information.
  • the first indication information and the second indication information may be transmitted through a non-access stratum (NAS), that is, the terminal equipment transparently transmits the indication information of the multiple private networks to the access network equipment. Core network equipment. At this time, the access network equipment does not perceive the content of the indication information.
  • NAS non-access stratum
  • the first indication information includes the index values of multiple private networks
  • the second indication information may include the identities of the multiple private networks, which is not limited in this application.
  • Manner 2 The terminal device generates the first indication information according to the first private network.
  • the terminal device determines the type of the first private network, and determines the private network access indication information according to the type of the first private network.
  • the private network access indication information is used to indicate the network that the terminal device requests to access (that is, the first private network).
  • Network is a private network.
  • the private network access network indication information may be used to indicate the private network type that the terminal device requests to access.
  • the terminal device determines that the network on which the first private network depends is the first network, and determines the indication information of the first network according to the first network.
  • the indication information of the first network is used to determine the first network, or determine the first network and the private network type under the first network.
  • the first indication information includes the private network access indication information and the first network indication information.
  • the multiple private networks are private networks dependent on the first network.
  • the access network device After receiving the first indication information, the access network device can determine, according to the private network access indication information, that the network that the terminal device requests to access is a private network, and according to the indication information of the first network, determine the first network that the private network depends on . Further, the access network device may determine a private network under the first network or a private network of the same type under the first network as the multiple private networks. In other words, the first indication information can indirectly indicate the multiple private networks.
  • the type of the first private network is a non-independent private network
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is a non-independent private network.
  • the access network device After receiving the first indication information, the access network device determines all non-independent private networks that depend on the first network in cell #A as the multiple private networks.
  • the type of the first private network is an independent private network
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is an independent private network.
  • the access network device After receiving the first indication information, the access network device determines all independent private networks that depend on the first network in cell #A as the multiple private networks.
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is a private network (that is, it only indicates that it is a private network, and does not specifically indicate whether it is a non-independent private network or an independent private network).
  • the instruction information is used to determine the first network. .
  • the access network device After receiving the first indication information, the access network device determines all the private networks in the cell #A that depend on the first network as the multiple private networks.
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is a private network (that is, it only indicates that it is a private network, and does not specifically indicate whether it is a non-independent private network or an independent private network).
  • the indication information is used to determine the first network that the terminal device requests to access and the private network type under the first network.
  • the access network device receives the first indication information and the indication information of the first network, and determines the corresponding private networks that depend on the first network in the cell #A as the multiple private networks.
  • the private network access indication information may be a series of specific codes, or a 1-bit "0" or "1".
  • a 1-bit "1" can be used to indicate that the network that the terminal device requests to access is a non-independent private network; optionally, a 1-bit "0" can be used to indicate the network that the terminal device requests to access. It is an independent private network.
  • the access network device After receiving the private network access indication information, the access network device determines whether the network that the terminal device requests to access (that is, the first private network) is a non-independent private network or an independent private network according to the value of the corresponding bit.
  • the private network access indication information may also be an implicit indication, which is not limited in this application.
  • whether the network that the terminal device requests to access (that is, the first private network) is a private network can also be indicated by whether the private network access indication information is included in the first indication information.
  • the first network is the network on which the first private network depends.
  • the first network may be a public network.
  • the indication information of the first network may include an identifier or an index value of the first network.
  • the indication information of the first network may include an identifier of the first network and any private network identifier under the first network identifier, or a corresponding index value.
  • the indication information of the first network may include an identifier of the first network and a private network identifier of the same type as the first private network, or a corresponding index value.
  • the indication information of the first network may include the identifier of any private network under the first network in the cell #A except the first private network.
  • the access network device determines the first network according to the PLMN ID of the instruction information of the first network, and automatically ignores the following CAG ID or NID.
  • the first private network may be a non-independent private network #1, the identification of the first network on which it depends is PLMN#1, and the indication information of the first network may include the private network identification of the non-independent private network #2 PLMN#1 CAG#2 or the corresponding index value 4, after receiving the indication information of the first network, the access network device determines that the first network is the network identified as PLMN#1, and automatically ignores the following CAG#2 .
  • the access network device may also determine that the private network type is CAG.
  • protocol in the embodiments of the present application may refer to a standard protocol in the communication field, for example, may include the LTE protocol, the NR protocol, and related protocols applied to future communication systems, which are not limited in this application.
  • the access network device determines the second instruction information according to the first instruction information. After the access network device receives the first instruction information, it reads the content therein and determines the plurality of instructions. Which private networks are the private networks, and then generate the second indication information.
  • the second indication information includes indication information of each private network in the plurality of private networks.
  • the second indication information may include indication information of each private network in a plurality of private networks.
  • the indication information of each private network includes an identifier or an index value of the private network.
  • the terminal device determines that the private network access indication information is used to indicate that the network that the terminal device requests to access is a non-independent private network.
  • the terminal device may also determine that the indication information of the first network may include the identification PLMN#1 of the first network or include at least one of indexes 3, 4, and 5.
  • the access network device determines second indication information.
  • the second indication information may include the identities of all non-independent private networks under the network of PLMN#1, that is, the second indication information may Keep PLMN#1, and non-independent private networks #1, #2, #3.
  • the first private network may be a non-independent private network #4, and its identifier is: PLMN#2 CAG#1.
  • the terminal device learns that there is only one non-independent private network under the network identified as PLMN#2 by reading the network list of cell #A, and there are also two independent private networks. Therefore, according to the first private network, the terminal device can determine that the private network access indication information is used to indicate that the network the terminal device requests to access is a private network (that is, it only indicates a private network, and does not specifically indicate whether it is a non-independent private network or a private network.
  • Independent private network the indication information of the first network may include the identification of independent private network #2: PLMN#2
  • the multiple private networks are all private networks that depend on the network identified as PLMN#2, that is, non-independent private networks #4, and independent private networks #2, #3.
  • the access network device determines that the multiple private networks are all private networks under the network identified as PLMN#2, that is, non-independent private networks #4, and independent private networks #2, #3 .
  • step 340 the access network device sends second indication information to the core network device
  • the core network device receives the second indication information sent by the access network device.
  • the core network device determines the first private network according to the subscription information of the multiple private networks and the terminal device.
  • the core network device sends third indication information to the access network device, where the third indication information indicates the first private network
  • the access network device receives the third indication information sent by the core network device.
  • the access network device can determine the multiple private networks according to the first indication information, but the access network device cannot determine which of the multiple private networks is the first private network, that is, it cannot Determine which network the terminal device requests to access.
  • the terminal device may send second indication information to the core network device.
  • the second indication information indicates the multiple private networks.
  • the multiple private networks may be determined by the core network device. Which of the private networks is the first private network?
  • the second indication information may be carried in an initial terminal equipment message (initial UE message).
  • the second indication information may also be carried in other RRC signaling or sent separately, which is not limited in this application.
  • the core network device determines the first private network according to the subscription information of the multiple private networks and the terminal device indicated by the second indication information.
  • the core network device can obtain the contract information of the terminal device, and according to the contract information, the core network device can determine which networks in the cell #A the terminal device has authenticated, or in other words, determine that the terminal device can access the cell #A In which networks.
  • the networks here include public networks, non-independent private networks, independent private networks, and so on.
  • the terminal device is usually only authenticated in one of the private networks, or in other words, the terminal device is usually only able to access one private network of the cell #A.
  • step 350 after the core network device obtains the contract information of the terminal device, it determines according to the contract information which private network terminal device of the multiple private networks indicated by the second indication information has been authenticated.
  • the core network device may confirm the authenticated private network as the first private network, and give an instruction to the access network device.
  • the following describes the foregoing determination process of the first private network based on specific examples.
  • the first private network may be non-independent private network #1
  • the multiple private networks may be non-independent private networks #1, #2, #3.
  • the core network equipment can determine the non-independent private network #1 as the first private network, and Give instructions to the access network equipment.
  • the following is an example of how the core network device obtains the contract information of the terminal device.
  • the core network device receives the second indication information sent by the access network device, and the second indication information includes the identification of the terminal device.
  • the identification may be a 5G temporary mobile subscriber identity (5G s-temporary mobile subscriber identity, 5G- S-TMSI)
  • the terminal device confirms the identity of the terminal device according to the identifier, and recognizes the international mobile subscriber identity (ISMI) of the terminal device, and the core network device can use the ISMI from the home subscriber server (home subscriber server, HSS) Obtain the contract information of the terminal device.
  • 5G s-temporary mobile subscriber identity 5G- S-TMSI
  • ISMI international mobile subscriber identity
  • the core network device may be an access and mobility management function AMF entity.
  • the core network device may also be any other entity or network element capable of implementing corresponding functions or functions, which is not limited in this application.
  • step 360 the core network device sends third indication information to the access network device, where the third indication information indicates the first private network.
  • the access network device After receiving the third indication information, the access network device confirms the private network indicated by the third indication information as the private network that the terminal device requests to access. That is, the access network device determines that the network that the terminal device requests to access is the first private network, and the access network device can further determine the connection between the first private network and the terminal device (for example, the number of connected terminal devices). The access network device can determine whether to allow a new terminal device to the first private network according to the connection situation, and can reasonably allocate resources for the terminal device in the first private network according to the connection situation.
  • the core network device sends third indication information to the access network device.
  • the third indication information indicates the first private network. Since the data transmission between the core network device and the access network device is more secure and reliable (for example, through Wired transmission), which prevents criminals from knowing which network the terminal device really wants to access, thereby protecting the privacy of users and improving the safe use of the network.
  • the third indication information is carried in an initial context setup request (initial context setup request) message.
  • the third indication information may be carried in other RRC signaling or sent separately, which is not limited in this application.
  • the third indication information includes the identifier or index value of the first private network.
  • the terminal device may have been authenticated in two or more private networks, and the core network device may be a private network other than the first private network (remember As the second private network), it is incorrectly identified as the network that the terminal device requests to access, and the access network device is instructed. At this time, the access network device will also incorrectly determine the second private network as the terminal device requesting access. Private network.
  • the terminal device can communicate with the access network device through messages such as terminal device configuration, and the terminal device can notify the first private network of the instruction information For the access network equipment and the core network equipment, or the terminal equipment can also leave the first private network and establish a connection with the second private network instead.
  • FIG. 6 is a schematic flowchart of the communication method 400 of the present application, and the embodiment shown in FIG. 6 can be regarded as a modification of the embodiment shown in FIG. 5.
  • a communication method 400 provided by an embodiment of the present application will be described with reference to FIG. 6.
  • the method 400 includes:
  • Step 410 The terminal device generates first indication information, where the first indication information is used to indicate multiple private networks, the multiple private networks include a first private network, and the first private network is a network that the terminal device requests to access.
  • Step 420 The terminal device sends the first indication information to the access network device.
  • the access network device receives the first indication information sent by the terminal device.
  • Step 430 The access network device determines multiple private networks according to the first indication information.
  • Step 440 The access network device sends the subscription information request information of the terminal device to the core network device;
  • the core network device receives the subscription information request information sent by the access network device.
  • Step 450 The core network device sends the subscription information response information of the terminal device to the access network device;
  • the access network device receives the subscription information response information of the terminal device sent by the core network device.
  • the access network device determines that the first private network is the network that the terminal device requests to access according to the subscription information of the multiple private networks and the terminal device.
  • the core network device determines the first private network and then sends it to the access network device.
  • the access network device determines the first private network.
  • the core network device can perceive the first private network, but the core network device of this embodiment cannot perceive the first private network.
  • the access network device in the embodiment of the present application sends the subscription information request information of the terminal device to the core network device to request the subscription information of the terminal device. After receiving the request information, the core network device sends the subscription information to the access device.
  • Network equipment, the access network equipment determines the first private network by itself.
  • the subscription information request information of the terminal device may be carried in the initial terminal device message.
  • the subscription information response information of the terminal device may be carried in the initial context establishment request message.
  • step 430 since there is no logical sequence between step 430, step 440, and step 450, the embodiment of the present application does not limit the sequence between step 430, step 440, and step 450.
  • step 430 may be performed before step 440.
  • step 430 may be performed between step 440 and step 450.
  • step 430 may be performed after step 450.
  • step 430 can also be executed simultaneously with step 440 or step 450.
  • step 460 the access network device determines that the first private network is the private network that the terminal device requests to access according to the subscription information of the multiple private networks and the terminal device.
  • Step 460 can be understood with reference to step 350 and step 360 in the aforementioned method 300, and will not be repeated here.
  • FIG. 7 is a schematic block diagram of a communication device 500 provided by an embodiment of the present application. As shown in FIG. 7, the device 500 includes: a generating unit 510 and a sending unit 520.
  • the generating unit 510 is configured to generate first indication information, where the first indication information is used to indicate multiple private networks, the multiple private networks include a first private network, and the first private network is a network that the communication device requests to access;
  • the sending unit 520 is configured to send the first indication information to the access network device.
  • the first indication information includes indication information of each private network in the plurality of private networks.
  • the indication information of each private network includes the identifier of the private network or the index value of the private network.
  • the first indication information specifically includes private network access indication information and indication information of the first network.
  • the private network access indication information is used to indicate that the network that the communication device requests to access is a private network, and the first network is the first network.
  • the private network depends on the network, and the multiple private networks are private networks that depend on the first network.
  • the communication device 500 may correspond to the terminal device in the communication methods 300 and 400 according to the embodiments of the present application, or a chip configured in the terminal device.
  • the communication apparatus 500 may include a unit for executing the method executed by the terminal device of the communication method 300 in FIG. 5 or the communication method 400 in FIG. 6.
  • each unit in the communication device 500 and the above-mentioned other operations and/or functions are to implement the corresponding process of the communication method 300 in FIG. 5 or the communication method 400 in FIG. , 400 has been described in detail, for the sake of brevity, I will not repeat it here.
  • the communication device 500 may be a smart terminal or a wearable device, etc.
  • the sending unit 520 may be a transceiver or a transceiver circuit.
  • the transceiver may also be an input/output circuit or interface.
  • the communication device 500 may also be a chip.
  • the sending unit 520 may be an input/output circuit or interface of a chip.
  • the aforementioned communication device 500 may be a terminal device 50, wherein the function of the generating unit 510 may be implemented by the processor 502 in the terminal device 50, and the function of the sending unit 520 may be implemented by the transceiver 501 of the terminal device. (That is, the control circuit is implemented together with the antenna)
  • the control circuit is implemented together with the antenna
  • FIG. 8 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • the terminal device can be applied to the system shown in FIG. 1 to perform the functions of the terminal device in the foregoing method embodiment.
  • FIG. 8 only shows the main components of the terminal device.
  • the terminal equipment 50 includes a processor, a memory, a control circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, and to control the entire terminal device, execute the software program, and process the data of the software program, for example, to support the terminal device to perform the actions described in the above method embodiment.
  • the memory is mainly used to store software programs and data.
  • the control circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals.
  • the control circuit and the antenna together can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users.
  • the processor can read the software program in the memory, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 8 only shows one memory and one processor. In an actual terminal device, there may be multiple processors and multiple memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be a storage element on the same chip as the processor, that is, an on-chip storage element, or an independent storage element, which is not limited in the embodiment of the present application.
  • the terminal device may include a baseband processor and a central processing unit.
  • the baseband processor is mainly used to process communication protocols and communication data
  • the central processing unit is mainly used to control the entire terminal device. , Execute the software program, and process the data of the software program.
  • the processor in FIG. 8 can integrate the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit can also be independent processors and are interconnected by technologies such as a bus.
  • the terminal device may include multiple baseband processors to adapt to different network standards, the terminal device may include multiple central processors to enhance its processing capabilities, and the various components of the terminal device may be connected through various buses.
  • the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the function of processing the communication protocol and the communication data can be built in the processor, or can be stored in the memory in the form of a software program, and the processor executes the software program to realize the baseband processing function.
  • the antenna and the control circuit with the transceiving function can be regarded as the transceiving unit 501 of the terminal device 50, for example, for supporting the terminal device to perform the receiving function and the transmitting function.
  • the processor 502 with processing functions is regarded as the processing unit 502 of the terminal device 50.
  • the terminal device 50 includes a transceiver unit 501 and a processing unit 502.
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
  • the device for implementing the receiving function in the transceiver unit 501 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 501 can be regarded as the sending unit, that is, the transceiver unit 501 includes a receiving unit and a sending unit.
  • the receiving unit may also be called a receiver, an input port, a receiving circuit, etc.
  • the sending unit may be called a transmitter, a transmitter, or a transmitting circuit, etc.
  • the processor 502 may be used to execute instructions stored in the memory to control the transceiver unit 501 to receive signals and/or send signals, so as to complete the functions of the terminal device in the foregoing method embodiment.
  • the processor 502 also includes an interface for realizing signal input/output functions.
  • the function of the transceiving unit 501 may be implemented by a transceiving circuit or a dedicated chip for transceiving.
  • FIG. 9 is a schematic block diagram of a communication device 600 according to an embodiment of the present application. As shown in FIG. 9, the device 600 includes: a receiving unit 610, a determining unit 620, and a sending unit 630.
  • the receiving unit 610 is configured to receive first indication information sent by a terminal device, where the first indication information is used to indicate multiple private networks, the multiple private networks include a first private network, and the first private network requests access for the terminal device network of;
  • the determining unit 620 is configured to determine second indication information according to the first indication information, where the second indication information indicates the multiple private networks;
  • the sending unit 630 is configured to send second indication information to the core network device
  • the receiving unit 610 is further configured to receive third indication information sent by the core network device, where the third indication information indicates the first private network.
  • the first indication information includes indication information of each private network in the plurality of private networks.
  • the indication information of each private network includes the identifier of the private network or the index value of the private network.
  • the first indication information specifically includes private network access indication information and indication information of the first network.
  • the private network access indication information is used to indicate that the network that the terminal device requests to access is a private network, and the first network is the first network.
  • the network on which the private network depends, the multiple private networks are private networks that depend on the first network; the determining unit 620 is further configured to determine the multiple private networks according to the private network access indication information and the indication information of the first network.
  • the second indication information includes indication information of each private network in the plurality of private networks.
  • the communication device 600 may correspond to the access network device in the communication methods 300 and 400 according to the embodiments of the present application, or a chip configured in the access network device.
  • the communication apparatus 600 may include a unit for executing the method executed by the access network device of the communication method 300 in FIG. 5 or the communication method 400 in FIG. 6.
  • each unit in the communication device 600 and the above-mentioned other operations and/or functions are to implement the corresponding process of the communication method 300 in FIG. 5 or the communication method 400 in FIG. 6, respectively.
  • the specific process of each unit performing the above-mentioned corresponding steps is described in method 300. , 400 has been described in detail, for the sake of brevity, I will not repeat it here.
  • the aforementioned communication device 600 may be a base station, gNB or TRP, DU, CU, CU-CP (control plane) or CU-UP (user plane), etc.
  • the receiving unit 610 and the sending unit 630 can be a transceiver, or a transceiver circuit.
  • the transceiver may also be an input/output circuit or interface.
  • the communication device 600 may also be a chip.
  • the receiving unit 610 and the sending unit 630 may be input/output circuits or interfaces of the chip.
  • the above-mentioned communication apparatus 600 may be an access network device, such as the base station 60 below, where the function of the determining unit 620 may be implemented by the processor 6022 in the base station, the receiving unit 610 and the sending unit 630 The function of can be implemented by the RRU 601 of the base station 60.
  • FIG. 10 is a schematic structural diagram of an access network device according to an embodiment of the present application, for example, it may be a schematic structural diagram of a base station.
  • the base station 60 can be applied to the system shown in FIG. 1 to perform the functions of the access network device in the foregoing method embodiment.
  • the base station 60 may include one or more radio frequency units, such as a remote radio unit (RRU) 601 and one or more baseband units (BBU) (also referred to as digital units, digital units, DU) 602.
  • RRU 601 may be called a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 6011 and a radio frequency unit 6012.
  • the RRU 601 part is mainly used for the transmission and reception of radio frequency signals and the conversion between radio frequency signals and baseband signals, for example, for sending the signaling messages described in the foregoing embodiments to terminal equipment.
  • the BBU 602 part is mainly used to perform baseband processing, control the base station, and so on.
  • the RRU 601 and the BBU 602 may be physically set together, or may be physically separated, that is, a distributed base station.
  • the BBU 602 is the control center of the base station, and may also be called a processing unit, which is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, and spreading.
  • the BBU (processing unit) 602 may be used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the BBU 602 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network (such as an LTE network) with a single access indication, or may respectively support different access standards. Wireless access network (such as LTE network, 5G network or other networks).
  • the BBU 602 further includes a memory 6021 and a processor 6022, and the memory 6021 is used to store necessary instructions and data.
  • the memory 6021 stores the corresponding relationship between the codebook index and the precoding matrix in the foregoing embodiment.
  • the processor 6022 is configured to control the base station to perform necessary actions, for example, to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the memory 6021 and the processor 6022 may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • FIG. 11 is a schematic block diagram of a communication device 700 provided by an embodiment of the present application. As shown in FIG. 11, the device 700 includes: a receiving unit 710, a determining unit 720, and a sending unit 730.
  • the receiving unit 710 is configured to receive second indication information sent by an access network device, where the second indication information indicates multiple private networks, the multiple private networks include a first private network, and the first private network is the network that the terminal device requests to access ;
  • the determining unit 720 is configured to determine the first private network according to the subscription information of multiple private networks and terminal devices;
  • the sending unit 730 is configured to send third indication information to the access network device, where the third indication information indicates the first private network.
  • the second indication information includes indication information of each private network in the plurality of private networks.
  • the third indication information includes the identifier or index value of the first private network.
  • the communication device 700 may correspond to the core network device in the communication methods 300 and 400 according to the embodiments of the present application, or a chip configured in the core network device.
  • the communication apparatus 700 may include a unit for executing the method executed by the core network device of the communication method 300 in FIG. 5 or the communication method 400 in FIG. 6.
  • each unit in the communication device 700 and the above-mentioned other operations and/or functions are to implement the corresponding process of the communication method 300 in FIG. 5 or the communication method 400 in FIG. , 400 has been described in detail, for the sake of brevity, I will not repeat it here.
  • the foregoing communication apparatus 700 may be a core network device, such as an AMF entity, and the receiving unit 710 and the sending unit 730 may be transceivers or transceiver circuits.
  • the transceiver may also be an input/output circuit or interface.
  • the communication device 700 may also be a chip.
  • the receiving unit 710 and the sending unit 730 may be input/output circuits or interfaces of a chip.
  • the aforementioned communication apparatus 700 may be a core network device, such as the core network device 80 below, where the function of the determining unit 820 may be implemented by the processor 801 in the core network device 80, and the receiving unit 710 The function of the sending unit 730 can be implemented by the transceiver 802 of the core network device 80.
  • the following describes the structure of the core network device of the embodiment of the present application in conjunction with FIG. 12.
  • Fig. 12 is a schematic structural diagram of a core network device provided by an embodiment of the present application.
  • the core network device 80 includes a processor 801 and a transceiver 802.
  • the core network device 80 further includes a memory 803.
  • the processor 801, the transceiver 802 and the memory 803 communicate with each other through internal connection paths to transfer control and/or data signals.
  • the memory 803 is used to store computer programs, and the processor 801 is used to call from the memory 803. And run the computer program to control the transceiver 802 to send and receive signals.
  • the above-mentioned processor 801 and the memory 803 may be combined into one processing device, and the processor 801 is configured to execute the program code stored in the memory 803 to realize the above-mentioned functions.
  • the memory 803 may also be integrated in the processor 801 or independent of the processor 801.
  • the processor in the embodiments of the present application may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), and dedicated integration Circuit (application specific integrated circuit, ASIC), ready-made programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • Access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory Take memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus RAM, DR RAM).
  • the present application also provides a computer program product, the computer program product includes: computer program code, when the computer program code runs on a computer, the computer executes the steps shown in FIG. 5 or FIG. 6 The method of any one of the embodiments is shown.
  • the present application also provides a computer-readable medium that stores program code, and when the program code runs on a computer, the computer executes the steps shown in FIG. 5 or FIG. 6 The method of any one of the embodiments is shown.
  • the present application also provides a system, which includes the aforementioned one or more terminal devices, one or more access network devices, and one or more core network devices.
  • the foregoing embodiments may be implemented in whole or in part by software, hardware, firmware or any other combination.
  • the above-mentioned embodiments may be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions or computer programs.
  • the computer instructions or computer programs are loaded or executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center that includes one or more sets of available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium.
  • the semiconductor medium may be a solid state drive.
  • "indication” may include direct indication and indirect indication, and may also include explicit indication and implicit indication.
  • the information indicated by a certain information (such as the "instruction information" in the preceding text) is called information to be indicated.
  • information to be indicated In the specific implementation process, there are many ways to indicate the information to be indicated. For example, but not limited to, you can directly indicate Instruction information, such as the information to be instructed itself or the index of the information to be instructed, etc.
  • the information to be indicated can also be indicated indirectly by indicating other information, where there is an association relationship between the other information and the information to be indicated. It is also possible to indicate only a part of the information to be indicated, while other parts of the information to be indicated are known or agreed in advance. For example, it is also possible to realize the indication of specific information by means of the arrangement order of various information agreed in advance (for example, as stipulated in the agreement), thereby reducing the indication overhead to a certain extent.
  • the "communication protocol” involved in the embodiments of the present application may refer to a standard protocol in the communication field, for example, may include the LTE protocol, the NR protocol, and related protocols applied to future communication systems, which are not limited in this application.
  • At least one refers to one or more, and “multiple” refers to two or more.
  • the following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • at least one item (a) of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • the size of the sequence number of the above-mentioned processes does not imply the order of execution.
  • the execution order of each process should be determined by its function and internal logic, and should not correspond to the implementation process of the embodiments of this application. Constitute any limitation.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请提供了一种通信方法,通信装置及通信系统,该方法包括:终端设备生成第一指示信息,第一指示信息用于指示多个私网,多个私网包括第一私网,第一私网为终端设备请求接入的网络;终端设备向接入网设备发送所述第一指示信息。在本申请中,第一指示信息用于指示包括第一私网在内的多个私网,仅仅通过第一指示信息的内容无法确定该多个私网中哪个为第一私网,这样,即使第一指示信息被截获,也无法确定终端设备请求接入的网络为具体的哪一个,使得用户的身份不会被暴露,提高了网络的安全使用性能。

Description

一种通信方法,通信装置及通信系统 技术领域
本申请涉及通信技术领域,尤其涉及一种通信方法,通信装置及通信系统。
背景技术
为了提高通信效率以及节约通信成本,近年来提出了网络共享的概念,即不同的网络运营商可以共享同一个基站,并且不同的网络运营商可以在同一个基站的同一个小区下搭建公网(public land mobile network,PLMN)、独立私网(stand-alone non-public network,SNPN)、非独立私网(closed access group,CAG)等多个不同类型的网络。
针对存在网络共享的小区,空闲态的终端设备在接入到该小区下的CAG网络的过程中,需要通过无线资源控制(radio resource control,RRC)建立完成消息向基站上报该CAG网络的标识,以使得基站能够获知该CAG网络与终端设备的连接情况(例如接入的终端设备数量),基站可以根据该连接情况确定是否允许新的终端设备接入该CAG网络,并且可以根据该连接情况为该CAG网络内的终端设备合理分配资源。
然而,RRC建立完成消息没有经过加密处理,造成终端设备上报的CAG网络的标识容易被截获,存在安全隐患。
发明内容
本申请提供一种通信方法,通信装置及通信系统,能够安全可靠的向基站指示终端设备所接入的私网。
第一方面,提供了一种通信方法,该方法可以由终端设备执行,或者,也可以由配置于终端设备中的芯片或电路执行,本申请对此不作限定。
具体地,该方法包括:终端设备生成第一指示信息,第一指示信息用于指示多个私网,多个私网包括第一私网,第一私网为终端设备请求接入的网络;终端设备向接入网设备发送所述第一指示信息。
在本申请中,第一指示信息用于指示包括第一私网在内的多个私网,仅仅通过第一指示信息的内容无法确定该多个私网中哪个为第一私网,这样,即使第一指示信息被不法分子截获,也无法确定终端设备请求接入的网络为具体的哪一个,使得用户的身份不会被暴露,提高了网络的安全使用性能。
可选地,该多个私网可以全部为非独立私网。
可选地,该多个私网可以全部为独立私网。
可选地,该多个私网可以同时包括非独立私网和独立私网。
可选地,该多个私网可以依赖于同一个公网。
可选地,该多个私网可以依赖于不同的公网。
可选地,该第一指示信息携带于RRC建立完成消息中。
可选地,该第一指示信息也可以携带于其他信令中,或者单独进行发送,本申请对此不做限定。
结合第一方面,在第一方面的某些实现方式中,第一指示信息包括多个私网中每个私网的指示信息。
可选地,在终端设备生成第一指示信息之前,终端设备可以首先确定该多个私网,并且根据该多个私网生成第一指示信息。该多个私网中除了包括第一私网以外,还包括至少一个其他私网。因此终端设备可以首先确定该多个私网中的其他私网。终端设备可以任意确定该其他私网,本申请对此不做限定。
例如,可以将小区内除第一私网以外的私网确定为该其他私网。
再例如,可以将小区内除第一私网以外的私网中,与第一私网类型相同的私网确定为该其他私网。
再例如,可以将小区内除第一私网以外的私网中,与第一私网依赖于同一个公网的私网确定为该其他私网。
再例如,可以将小区内除第一私网以外的私网中,与第一私网类型相同并且依赖于同一个公网的的私网确定为该其他私网。
可选地,终端设备可以接收小区的广播消息,并且根据广播消息中的系统消息块(例如系统信息块1(system information block 1,SIB1))确定该多个私网中第一私网以外的其他私网。
结合第一方面,在第一方面的某些实现方式中,每个私网的指示信息包括私网的标识或者私网的索引值。
此外,也可以采用混合上报的形式,即多个私网中部分私网通过私网标识进行指示,剩余的私网通过私网索引值进行指示,本申请对此不做限定。
结合第一方面,在第一方面的某些实现方式中,所述第一指示信息具体包括私网接入指示信息和第一网络的指示信息,所述私网接入指示信息用于指示所述终端设备请求接入的网络为私网,所述第一网络为所述第一私网所依赖的网络,所述多个私网为依赖于所述第一网络的私网。
接入网设备在收到该第一指示信息之后,能够根据私网接入指示信息确定私网的类型,并且根据第一网络的指示信息确定第一网络,接入网设备可以将第一网络下相应类型的私网确定为该多个私网。也就是说,该第一指示信息可以间接对该多个私网进行指示。
可选地,第一私网的类型为非独立私网,私网接入指示信息用于指示终端设备请求接入的网络为非独立私网。该多个私网为依赖于第一网络的全部的非独立私网。在接入网设备接收到第一指示信息之后,将小区内依赖于第一网络的全部的非独立私网确定为该多个私网。
可选地,第一私网的类型为独立私网,私网接入指示信息用于指示终端设备请求接入的网络为独立私网。该多个私网为依赖于第一网络的全部的独立私网。在接入网设备接收到第一指示信息之后,将小区内依赖于第一网络的全部的独立私网确定为该多个私网。
可选地,第一私网的类型为非独立私网或者独立私网,私网接入指示信息用于指示终端设备请求接入的网络为私网(即仅指示为私网,而不具体指示究竟是非独立私网还是独立私网),该多个私网为依赖于第一网络的全部的私网(包括独立私网和非独立私网)。 在接入网设备接收到第一指示信息之后,将小区内依赖于第一网络的全部的私网确定为该多个私网。
可选地,私网接入指示信息用于指示终端设备请求接入的网络为私网(即仅指示为私网,而不具体指示究竟是非独立私网还是独立私网),第一网络的指示信息用于确定终端设备请求接入的第一网络和第一网络下的私网类型。接入网设备接收到第一指示信息和第一网络的指示信息,将小区内依赖于第一网络的对应的私网确定为该多个私网。
可选地,按照协议或者系统的规定,该私网接入指示信息可以为一串特定的代码,或者为1个比特位的“0”或者“1”。
例如,可以用1个比特位的“1”来指示终端设备请求接入的网络为非独立私网,可以用1个比特位的“0”来指示终端设备请求接入的网络为独立私网。接入网设备在接收到该私网接入指示信息以后,根据相应的比特位的数值确定终端设备请求接入的网络(即第一私网)为非独立私网还是独立私网。
此外,该私网接入指示信息还可以是隐性指示,本申请对此并不限定。
第一网络为第一私网所依赖的网络,例如,该第一网络可以是公网。
可选地,第一网络的指示信息可以包括第一网络的标识或者索引值。
可选地,第一网络的指示信息可以包括小区内第一网络下除了第一私网以外的任意一个私网的标识。按照系统或者协议的规定,接入网设备在收到该私网的标识以后,根据该私网标识中的PLMN ID确定第一网络,而自动忽略后面的CAG ID或者NID。以上设置的一个好处是可以迷惑不法分子,将错误的私网标识显现给不法分子,以假乱真。
第二方面,提供了一种通信方法,该方法可以由接入网设备执行,或者,也可以由配置于接入网设备中的芯片或电路执行,本申请对此不作限定。
具体地,该方法包括:接入网设备接收终端设备发送的第一指示信息,第一指示信息用于指示多个私网,多个私网包括第一私网,第一私网为所述终端设备请求接入的网络;接入网设备根据第一指示信息确定第二指示信息,第二指示信息指示多个私网;接入网设备向核心网设备发送所述第二指示信息;接入网设备接收核心网设备发送的第三指示信息,第三指示信息指示该第一私网。
结合第二方面,在第二方面的某些实现方式中,第一指示信息包括多个私网中每个私网的指示信息。
结合第二方面,在第二方面的某些实现方式中,每个私网的指示信息包括私网的标识或者私网的索引值。
结合第二方面,在第二方面的某些实现方式中,第一指示信息具体包括私网接入指示信息和第一网络的指示信息,私网接入指示信息用于指示终端设备请求接入的网络为私网,第一网络为第一私网所依赖的网络,多个私网为依赖于第一网络的私网;接入网设备根据第一指示信息确定第二指示信息,包括:接入网设备根据私网接入指示信息和第一网络的指示信息确定多个私网。
结合第二方面,在第二方面的某些实现方式中,第二指示信息包括多个私网中每个私网的指示信息。
可选地,该每个私网的指示信息包括私网的标识或者索引值。
可选地,该第二指示信息的内容可以和第一指示信息的内容相同,此时接入网设备可 以起到“转发”的作用。
可选地,该第二指示信息的内容也可以和第一指示信息不同。
例如,在第一指示信息中包括的是多个私网的索引值,而在第二指示信息中可以包括该多个私网的标识,本申请对此不做限定。
可选地,第二指示信息可以携带于初始终端设备消息中。
可选地,第二指示信息也可以携带于其他RRC信令中,或者单独进行发送,本申请对此不做限定。
第三方面,提供了一种通信方法,该方法可以由核心网设备执行,或者,也可以由配置于核心网设备中的芯片或电路执行,本申请对此不作限定。该方法包括:
核心网设备接收接入网设备发送的第二指示信息,第二指示信息指示多个私网,多个私网包括第一私网,第一私网为终端设备请求接入的网络;核心网设备根据多个私网和终端设备的签约信息确定该第一私网;核心网设备向接入网设备发送第三指示信息,第三指示信息指示该第一私网。
具体地,核心网设备可以获取终端设备的签约信息,根据该签约信息,核心网设备能够确定终端设备在小区的哪些网络中进行认证过,或者说,确定终端设备能够接入小区的哪些网络中。这里的网络包括公网、非独立私网、独立私网等。
通常情况下,对于具备多个私网的小区,终端设备通常只在其中的一个私网中认证过,或者说,终端设备通常仅能够接入小区的一个私网中。
因此,核心网设备获取到终端设备的签约信息后,根据该签约信息确定第二指示信息所指示的多个私网中哪一个私网终端设备曾经认证过。进而将该认证过的私网确定为第一私网,并且向接入网设备进行指示。
可选地,该第三指示信息携带于初始上下文建立请求消息中。
可选地,该第三指示信息可以携带于其他RRC信令中,或者单独进行发送,本申请对此不做限定。
可选地,该第三指示信息包括第一私网的标识或者索引值。
结合第三方面,在第三方面的某些实现方式中,第二指示信息包括多个私网中每个私网的指示信息。
第四方面,提供了一种通信装置,该装置包括:生成单元,用于生成第一指示信息,第一指示信息用于指示多个私网,多个私网包括第一私网,第一私网为该通信装置请求接入的网络;发送单元,用于向接入网设备发送第一指示信息。
结合第四方面,在第四方面的某些实现方式中,第一指示信息包括多个私网中每个私网的指示信息。
结合第四方面,在第四方面的某些实现方式中,每个私网的指示信息包括私网的标识或者私网的索引值。
结合第四方面,在第四方面的某些实现方式中,第一指示信息具体包括私网接入指示信息和第一网络的指示信息,私网接入指示信息用于指示通信装置请求接入的网络为私网,第一网络为第一私网所依赖的网络,多个私网为依赖于第一网络的私网。
第五方面,提供了一种通信装置,该装置包括:接收单元,用于接收终端设备发送的第一指示信息,第一指示信息用于指示多个私网,多个私网包括第一私网,第一私网为所 述终端设备请求接入的网络;确定单元,用于根据第一指示信息确定第二指示信息,第二指示信息指示所述多个私网;发送单元,用于向核心网设备发送第二指示信息;接收单元还用于接收核心网设备发送的第三指示信息,第三指示信息指示该第一私网。
结合第五方面,在第五方面的某些实现方式中,第一指示信息包括多个私网中每个私网的指示信息。
结合第五方面,在第五方面的某些实现方式中,每个私网的指示信息包括私网的标识或者私网的索引值。
结合第五方面,在第五方面的某些实现方式中,第一指示信息具体包括私网接入指示信息和第一网络的指示信息,私网接入指示信息用于指示终端设备请求接入的网络为私网,第一网络为第一私网所依赖的网络,多个私网为依赖于第一网络的私网;确定单元还用于根据私网接入指示信息和第一网络的指示信息确定多个私网。
结合第五方面,在第五方面的某些实现方式中,第二指示信息包括多个私网中每个私网的指示信息。
第六方面,提供了一种通信装置,该装置包括:接收单元,用于接收接入网设备发送的第二指示信息,第二指示信息指示多个私网,多个私网包括第一私网,第一私网为终端设备请求接入的网络;确定单元,用于根据多个私网和终端设备的签约信息确定该第一私网;发送单元,用于向接入网设备发送第三指示信息,第三指示信息指示该第一私网。
结合第六方面,在第六方面的某些实现方式中,第二指示信息包括多个私网中每个私网的指示信息。
第七方面,提供一种通信装置,该装置可以是终端设备,也可以是终端设备内的芯片。该装置可以包括处理单元和收发单元。当所述装置是终端设备时,所述处理单元可以是处理器,所述收发单元可以是收发器;所述终端设备还可以包括存储单元,所述存储单元可以是存储器;所述存储单元用于存储指令,所述处理单元执行所述存储单元所存储的指令,以使所述终端设备执行第一方面中的方法。当所述装置是终端设备内的芯片时,所述处理单元可以是处理器,所述收发单元可以是输入/输出接口、管脚或电路等;处理单元执行存储单元所存储的指令,以使终端设备执行第一方面中的方法,存储单元可以是所述芯片内的存储单元(例如,寄存器、缓存等),也可以是所述终端设备内的位于所述芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第八方面,提供一种通信装置,该装置可以是接入网设备,也可以是接入网设备内的芯片。该装置可以包括处理单元和收发单元。当所述装置是接入网设备时,所述处理单元可以是处理器,所述收发单元可以是收发器;所述接入网设备还可以包括存储单元,所述存储单元可以是存储器;所述存储单元用于存储指令,所述处理单元执行所述存储单元所存储的指令,以使所述网络设备执行第二方面中的方法。当所述装置是网络设备内的芯片时,所述处理单元可以是处理器,所述收发单元可以是输入/输出接口、管脚或电路等;所述处理单元执行存储单元所存储的指令,以使所述网络设备执行第二方面中的方法,所述存储单元可以是所述芯片内的存储单元(例如,寄存器、缓存等),也可以是所述接入网设备内的位于所述芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第九方面,提供一种通信装置,该装置可以是核心网设备,也可以是核心网设备内的芯片。该装置可以包括处理单元和收发单元。当所述装置是核心网设备时,所述处理单元 可以是处理器,所述收发单元可以是收发器;所述核心网设备还可以包括存储单元,所述存储单元可以是存储器;所述存储单元用于存储指令,所述处理单元执行所述存储单元所存储的指令,以使所述网络设备执行第三方面中的方法。当所述装置是核心网设备内的芯片时,所述处理单元可以是处理器,所述收发单元可以是输入/输出接口、管脚或电路等;所述处理单元执行存储单元所存储的指令,以使所述网络设备执行第三方面中的方法,所述存储单元可以是所述芯片内的存储单元(例如,寄存器、缓存等),也可以是所述接入网设备内的位于所述芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十方面,提供一种通信装置,包括至少一个处理器,该至少一个处理器用于与存储器耦合,读取并执行所述存储器中的指令,以实现第一方面中的任一种方法。
可选地,该通信装置还包括该存储器。
第十一方面,提供一种通信装置,包括至少一个处理器,该至少一个处理器用于与存储器耦合,读取并执行所述存储器中的指令,以实现第二方面中的任一种方法。
可选地,该通信装置还包括该存储器。
第十二方面,提供一种通信装置,包括至少一个处理器,该至少一个处理器用于与存储器耦合,读取并执行所述存储器中的指令,以实现第三方面中的任一种方法。
可选地,该通信装置还包括该存储器。
第十三方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述第一方面、第二方面或者第三方面中的方法。
需要说明的是,上述计算机程序代码可以全部或者部分存储在第一存储介质上,其中第一存储介质可以与处理器封装在一起的,也可以与处理器单独封装,本申请对此不作具体限定。
第十四方面,提供了一种计算机可读介质,所述计算机可读介质存储有程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述第一方面、第二方面或者第三方面中的方法。
第十五方面,提供了一种芯片系统,包括处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片系统的通信设备执行上述第一方面、第二方面或者第三方面中的方法。
第十六方面,提供了一种通信系统,该通信系统包括上述第四方面提供的通信装置、第五方面提供的通信装置、第六方面提供的通信装置中的至少一种。
附图说明
图1是本申请实施例提供的一种通信系统的示意图。
图2是本申请实施例提供的RRC三种状态的转换关系示意图。
图3是本申请实施例提供的四步基于竞争的随机接入的流程图。
图4是本申请实施例提供的RRC连接建立流程的流程图。
图5是本申请实施例提供的通信方法的一例的示意性流程图。
图6是本申请实施例提供的通信方法的另一例的示意性流程图。
图7是本申请实施例提供的通信装置的一例的示意性框图。
图8是本申请实施例提供的终端设备的结构示意图。
图9是本申请实施例提供的通信装置的另一例示意性框图。
图10是本申请实施例提供的接入网设备的结构示意图。
图11是本申请实施例提供的通信装置的再一例示意性框图。
图12是本申请实施例提供的核心网设备的结构示意图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(global system for mobile communications,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、第五代(5th generation,5G)通信系统或未来的新无线接入技术(new radio access technology,NR)等。
为便于理解本申请实施例,首先以图1中示出的通信系统为例详细说明适用于本申请实施例的通信系统。图1是适用于本申请实施例的通信方法的通信系统100的示意图。如图1所示,该通信系统100可包括至少一个接入网设备(例如,图1中示出的接入网设备101)和至少一个终端设备(例如,图1中示出的终端设备102),接入网设备101可与终端设备102无线通信。可选地,该通信系统100还可包括更多的接入网设备和/或更多的终端设备,本申请对此不做限定。
进一步地,如图1所示,本申请提供的通信系统100还包括至少一个核心网设备(例如,图1中示出的核心网设备103),核心网设备103可以与接入网设备101通信连接(例如通过有线的方式进行连接)。可选地,该通信系统100还可包括更多的核心网设备,本申请对此不做限定。
其中,接入网设备可以包括接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备。接入网系统可用于将收到的空中帧与网际协议(Internet Protocol,IP)分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中接入网的其余部分可包括IP网络。无线接入网系统还可协调对空中接口的属性管理。应理解,接入网设备包括但不限于:演进型节点B(evolved Node B,eNB)、无线网络控制器(Radio Network Controller,RNC)、节点B(Node B,NB)、基站控制器(Base Station Controller,BSC)、基站收发台(Base Transceiver Station,BTS)、家庭基站(例如,Home evolved NodeB,或Home Node B,HNB)、基带单元(BaseBand Unit,BBU),无线保真(Wireless Fidelity,WIFI)系统中的接入点(Access Point,AP)、无线中继节点、无线回传节点、传输点(transmission and reception point,TRP或者transmission point,TP)等,还可以为5G,如,NR,系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,如基带单 元(BBU),或,分布式单元(distributed unit,DU)等。
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和DU。gNB还可以包括射频单元(radio unit,RU)。CU实现gNB的部分功能,DU实现gNB的部分功能,比如,CU实现无线资源控制(radio resource control,RRC),分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能,DU实现无线链路控制(radio link control,RLC)、媒体接入控制(media access control,MAC)和物理(physical,PHY)层的功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU+CU发送的。可以理解的是,接入网设备可以为CU节点、或DU节点、或包括CU节点和DU节点的设备。此外,CU可以划分为接入网(radio access network,RAN)中的接入网设备,也可以将CU划分为核心网(core network,CN)中的接入网设备,在此不做限制。
终端设备也可以称为用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。本申请的实施例中的终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等。本申请的实施例对应用场景不做限定。
核心网设备是指为终端设备提供业务支持的核心网(core network,CN)中的设备。本申请实施例中的核心网设备可以用于实现呼叫的接续、计费、移动性管理以及补充业务等功能。在5G系统中,核心网设备例如可以包括接入和移动管理功能(access and mobility management function,AMF)实体、会话管理功能(session management function,SMF)实体以及用户平面功能(user plane function,UPF)实体等。本申请实施例主要涉及与AMF实体通信。因此,这里对AMF实体做简单说明。AMF实体也可以简称AMF,主要用于移动性管理和接入管理等,可用于实现移动性管理实体(mobility management entity,MME)功能中除会话管理之外的其他功能。例如,合法监听、接入授权(或鉴权)等功能。下文中将5G中的AMF作为用于移动性和接入管理的网元的一例,不应对本申请构成任何限定。本申请并不排除用其他网元替代AMF实现相同或相似功能的可能。需要说明的是,本申请实施例中实体也可以称为网元或功能实体,例如,AMF实体也可以称为AMF网元或AMF功能实体。
为便于理解本申请实施例,首先对本申请可能涉及到的部分技术概念和通信流程进行举例说明。
一、公网
通常情况下,为终端设备提供网络服务的一般是公网。公网,即公共陆地移动网络(public land mobile network,PLMN),由政府或它所批准的经营者,为公众提供陆地移动通信业务目的而建立和经营的网络。该网络通常与公众交换电话网络(public switched  telephone network,PSTN)互连,形成整个地区或国家规模的通信网。
可以用不同的PLMN标识(identification,ID)来区分不同的PLMN网络。PLMN标识由移动国家号码(mobile contrary code,MCC)和移动网号(mobile net code,MNC)组成。其中,MCC唯一标识移动用户的所属国家,例如中国的MCC为460。MNC唯一标识该国家中的一个网络,例如中国移动的MNC为00,中国联通的MNC为01。
二、私网
除了公网,运营商或者私人也会搭建一些私网(non-public networks,NPN)来满足用户的需求。私网也可以被称作非公网络,是指对特定用户开放的网络,例如公司、学校或者工厂搭建的内部网络。未与私网签约的终端设备不允许接入私网。私网又分为非独立私网和独立私网。
(1)非独立私网
非独立私网(non-stand-alone non-public network,NSA-NPN,或者public network integrated non-public network,PNI-NPN)用到的网络资源(例如接入网设备,核心网设备,频谱资源等)是公网的一部分。也可以认为非独立私网依赖于(rely on)公网,或者非独立私网基于公网。非独立私网也被称为封闭接入组(closed access group,CAG)。非独立私网的标识包括两部分,分别是PLMN ID和CAG ID,其中,非独立私网的PLMN ID和所依赖的公网一致。而对于依赖于同一个公网下的多个非独立私网,每个非独立私网的CAG ID是唯一的,也就是说,对于依赖于同一个公网的多个非独立私网,可以仅通过CAG ID进行区分。
例如,非独立私网#1的标识可以表示为:PLMN#1 CAG#1;
非独立私网#2的标识可以表示为:PLMN#1 CAG#2。
也就是说,非独立私网#1和非独立私网#2均是依赖于标识为PLMN#1的公网所搭建的私网。在一些场合下,可以仅通过CAG#1和CAG#2对上述两个私网进行区分。
根据当前的通信协议,因为CAG网络使用公网资源,所以终端设备可以在CAG网络和公网之间切换和小区重选。切换是指连接态的终端设备在基站的控制下,从当前服务小区断开连接,与目标小区进行连接。小区重选是指当空闲态/去激活态的终端设备驻留在一个小区后,随着终端设备的移动,终端设备可能需要更换到另一个更高优先级或更好信号的小区驻留,这就是小区重选过程。
(2)独立私网
独立私网(stand-alone non-public Network,SNPN)指的是可以不依赖公网的网络功能的私网。类似地,独立私网的标识也分两部分,分别是PLMN ID和NID。对于依赖于公网的独立私网,其PLMN ID和所依赖的公网一致,对于不依赖于公网(例如可以是企业自己部署)的独立私网,其PLMN ID的MCC是999。而对于依赖于同一个公网下的多个独立私网,每个非独立私网的NID是唯一的,也就是说,对于依赖于同一个公网的多个独立私网,可以仅通过NID进行区分。
例如,独立私网#1的标识可以表示为:PLMN#1 NID#1;
独立私网#2的标识可以表示为:PLMN#1 NID#2;
独立私网#3的标识可以表示为:PLMN#3(MCC=999)NID#1。
也就是说,独立私网#1和独立私网#2均是依赖于标识为PLMN#1的公网所搭建的私 网。在一些场合下,可以仅通过NID#1和NID#2对上述两个私网进行区分。
此外,独立私网#3的PLMN ID的MCC为999,说明独立私网#3是不借助于运营商由企业等自己部署的独立私网。
作为一种可能的方式,独立私网不支持终端设备在独立私网和公网、非独立私网以及其他的独立私网之间的切换和小区重选,即连接态的终端设备无法从独立私网小区切换到公网小区、非独立私网小区以及其他独立私网小区,反之亦然;空闲态/去激活态的终端设备无法从独立私网小区重选到公网小区,反之亦然。可以理解的,作为另一种可能的实现方式,独立私网可以支持终端设备在独立私网和公网、非独立私网以及其他的独立私网之间的切换和小区重选。
三、RRC状态
在5G系统中,终端设备的RRC状态包括RRC连接态(RRC_CONNECTED),RRC去激活态或者RRC第三态(RRC_INACTIVE),RRC空闲态(RRC_IDLE)。图2示出了RRC三种状态的转换关系示意图。
其中,终端设备处于RRC连接态时,终端设备与基站以及核心网都已建立链路,当有数据到达网络时可以直接传送到终端设备;当终端设备处于RRC第三态(或者RRC去激活态)时,表示终端设备之前和基站以及核心网建立过链路,但是终端设备到基站这一段链路被释放了。虽然链路被释放了,但是基站会存储终端设备的上下文。当有数据需要传输时,基站可以快速恢复这段链路;当终端设备处于RRC空闲态时,终端设备与基站以及核心网之间都没有链路,当有数据需要传输时,需要建立终端设备到基站以及核心网的链路。
四、随机接入
5G系统中,以下几种情况通常需要进行随机接入过程:终端设备初始接入,由空闲态/去激活态转换到连接态;在无线连接中断后重新建立RRC连接;切换时终端设备需要和目标小区建立上行同步;在终端设备处于连接态但终端设备上行不同步时,此时有上行或者下行数据到达,需通过随机接入建立上行同步;在使用基于上行测量进行用户定位时;在物理上行控制信道(physical uplink control channel,PUCCH)上没有分配专门的调度请求资源时,通过随机接入申请上行资源。
随机接入的类型包括基于竞争的随机接入、非竞争的随机接入、四步随机接入、两步随机接入等,图3是四步基于竞争的随机接入的流程图。
110,随机接入初始化。
120,终端设备向基站发送随机接入前导码(preamble)。
随机接入前导码承载于第一消息(Msg1)中,随机接入前导码的主要作用是告诉基站有一个随机接入请求,并使得基站能估计其与终端设备之间的传输时延,以便基站可以校准上行的提前量(uplink timing)并将校准信息通过定时提前命令(timing advance command)告知终端设备。
130,终端设备接收基站发送的随机接入响应(random access response,RAR)。
RAR承载于第二消息(Msg2)中。在终端设备发送了preamble后,会在RAR响应窗口内根据preamble对应的随机接入无线网络临时标识(random access radio network temporary identifier,RA-RNTI)来监听对应的物理下行控制信道(physical downlink control  channel,PDCCH)。如果终端设备接收的响应中携带的preamble与Msg1发送的preamble一致,则停止监听RAR。
RAR中包含上行定时提前量、为第三消息(Msg3)分配的上行授权(UL grant)、网络侧分配的临时小区无线网络临时标识(cell radio network temporary identifier,temporary C-RNTI)等。
140,终端设备向网络设备发送基于调度传输(scheduled transmission)的消息(即Msg3)。
终端设备根据Msg2中的上行授权和上行定时提前量信息,向基站发送Msg3。这里,根据终端设备状态的不同和应用场景的不同,Msg3的内容也可能不同。
Msg3可以分为以下几种:RRC连接请求、追踪区域数据更新、资源调度请求等。
150,终端设备接收网络设备发送的竞争决议,即第四消息Msg4。
当多个终端设备使用相同的前导码发起随机接入时,就会发生竞争。竞争相同资源的终端设备中最多只有一个终端设备能够接入成功。此时基站通过物理下行共享信道(physical downlink shared channel,PDSCH)向终端设备发送竞争解决消息。若终端设备接收到来自基站发给自己的竞争解决消息,则认为随机接入过程成功。
五、RRC连接建立流程
空闲态的终端设备为了进入连接态,需要发起RRC连接建立流程。图4是RRC连接建立流程的流程图。如图4所示,RRC连接建立流程分为以下三个步骤:
步骤210,终端设备向基站发送RRC建立请求(RRCSetupRequest)消息,以请求和基站之间建立一个RRC连接。RRC建立请求消息携带有终端设备的标识、以及连接建立原因等信息。
可选地,该RRC建立请求消息可以是前述的第三消息(Msg3)。
步骤220,基站向终端设备发送RRC建立(RRCSetup)消息,基站根据RRC连接建立的原因以及系统资源状态等,确定同意与终端设备之间建立RRC连接,则向终端设备发送RRC建立消息,该RRC建立消息携带有一系列配置信息。
可选地,该RRC建立消息可以是前述的第四消息(Msg4)。
步骤230,终端设备向基站发送RRC建立完成(RRCSetupComplete)消息。终端设备根据该一些列配置信息进行配置,在确定RRC连接建立成功后,向基站发送RRC建立完成消息。如此RRC连接建立过程结束,终端设备开始发送附着消息。
此外,在步骤220中,如果基站判定本次RRC连接请求不能建立(比如资源不足),则基站可以给终端设备发送RRC拒绝(RRCReject)消息,在该RRC拒绝消息中可以指明RRC连接拒绝的原因。
六、系统消息读取
基站向小区内的所有终端设备广播主信息块(master information block,MIB),
终端设备可以根据该MIB(具体地,可以根据SIB的调度信息)确定去哪些时频资源上搜索系统消息块1(system information block 1,SIB1),终端设备搜索到SIB1,就能够确定当前小区的PLMN ID、跟踪区代码(tracking area code,TAC)等信息。可选的,终端设备还能够确定该小区的非独立私网标识、独立私网标识等信息。
七、网络共享
不同的网络运营商可以共享同一个网络设备。根据现有的协议,网络设备在这里指的是接入网设备,即基站(例如gNB)。不同的网络运营商拥有不同的PLMN ID,这些运营商搭建的网络可能是PLMN(公网),CAG(非独立私网),SNPN(独立私网)。其中SNPN也可以由企业等自己来部署,这种情况下,SNPN的PLMN ID的MCC等于999。
在网络共享的情况下,一个基站的某个小区可以从属于不同的运营商,即可以为不同运营商的用户提供服务。根据现有的协议,一个小区可以被上述三种网络类型共享,也就是说,在同一个小区下,可以存在多个不同类型的网络。举例说明,一个小区可以存在以下7个网络:
网络#1:PLMN#1;
网络#2:PLMN#1 CAG#1;
网络#3:PLMN#1 CAG#2;
网络#4:PLMN#2 CAG#1;
网络#5:PLMN#1 NID#1;
网络#6:PLMN#2 NID#1;
网络#7:PLMN#3(MCC=999)NID#1。
对于以上7个不同的网络,网络#1为公网,网络#2、网络#3、网络#4为非独立私网,网络#5、网络#6、网络#7为独立私网。
进一步地,网络#2、网络#3、网络#5是标识为PLMN#1的公网部署(或者说搭建)的私网,也可以说,是依赖于公网PLMN#1的私网,或者说,网络#2、网络#3、网络#5使用公网PLMN#1的网络资源。
网络#4、网络#6是标识为PLMN#2部署的私网,也可以说,是依赖于公网PLMN#2的私网,或者说,网络#4、网络#6使用公网PLMN#2的网络资源。
网络#7的MCC等于999,说明不使用公网的网络资源,或者说不依赖于公网,例如网络#7可以是企业等自己部署的私网。
表1:
Figure PCTCN2019115943-appb-000001
在网络共享场景下,终端设备可以通过读取小区的系统广播来来获知该小区的网络共享情况。例如,该小区内的终端设备可以读取SIB1,该SIB1内包括小区内的公网的标识以及私网的标识。可选的,还可以包括小区内的公网的索引值和私网的索引值等信息。可以理解的,终端设备也可以根据公网的标识以及私网的标识在网络标识列表中的顺序确定 公网以及私网的索引值。作为一个示例,表1为终端设备根据该小区广播的SIB1的网络标识列表确定本小区的网络列表,该网络列表包括前述的7个网络。
针对存在网络共享的小区,空闲态的终端设备在接入到该小区下的CAG网络(例如,网络#2)后,需要通过RRC建立完成消息向基站上报该CAG网络的标识,以使得基站能够获知该CAG网络与终端设备的连接情况(例如接入的终端设备数量),基站可以根据该连接情况确定是否允许新的终端设备接入该CAG网络,并且可以根据该连接情况为该CAG网络内的终端设备合理分配资源。
然而,RRC建立完成消息没有经过加密处理,造成终端设备上报的CAG网络的标识容易被不法分子截获,不法分子可以根据截获的CAG网络的标识确定用户的身份(例如确定为某公司的员工),进而可以更有目的性的执行监听、追踪等不法活动,具有很大的安全隐患,同时也与私网的私密性要求不相符。
基于上述问题,本申请提供一种通信的方法及通信装置,能够安全可靠的向基站指示终端设备所接入的私网。
可以理解的,本申请实施例中,终端设备和/或网络设备(比如接入网设备和/或核心网设备)可以执行本申请实施例中的部分或全部步骤,这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或者各种操作的变形。此外,各个步骤可以按照本申请实施例呈现的不同的顺序来执行,并且有可能并非要执行本申请实施例中的全部操作。
下面结合附图介绍本申请实施例提供的通信方法,实施例中的接入网设备可以是图1中的接入网设备101,实施例中的终端设备可以是图1中的终端设备102,实施例中的核心网设备可以是图1中的核心网设备103。
图5是本申请提供的通信方法300的示意性流程图。以下,结合图5阐述本申请实施例提供的通信方法300,该方法300包括:
步骤310,终端设备生成第一指示信息,第一指示信息用于指示多个私网,该多个私网包括第一私网,第一私网为终端设备请求接入的网络。
步骤320,终端设备向接入网设备发送第一指示信息。
相应地,在步骤320中,接入网设备接收终端设备发送的第一指示信息。
步骤330,接入网设备根据第一指示信息确定第二指示信息,第二指示信息指示该多个私网。
具体而言,本申请实施例提供的方法300可以应用于网络共享场景,接入网设备在一个小区(记作小区#A)下可以同时存在多个私网,该多个私网的类型可以包括独立私网、非独立私网中的至少一种。可选地,在小区#A下,还可以包括至少一个公网。
为了更加方便高效的阐述本申请技术方案,作为示例而非限定,小区#A可以包括如表2中所列举的9种网络,表2为网络共享场景下小区#A所包括的网络列表。
通过表2可知,小区#A被9个网络所共享,包括两个公网、4个非独立私网、3个独立私网。终端设备根据各个网络的网络标识在网络标识列表中的顺序可以确定其所对应的索引值。
根据表2中各个私网的网络标识可知,非独立私网#1、#2、#3均依赖于网络PLMN#1,非独立私网#4依赖于网络PLMN#2,独立私网#1依赖于网络PLMN#1,独立私网#2、#3依赖于网络PLMN#2。
表2:
Figure PCTCN2019115943-appb-000002
终端设备驻留于小区#A下,为小区#A下的用户。当终端设备请求接入一个私网(例如第一私网)时,需要向接入网设备进行指示。
第一私网为接入网设备在小区#A下部署的多个私网中的一个。例如,该第一私网可以是表2中7个私网中的任意一个。当终端设备请求接入第一私网时,可以生成第一指示信息并且向接入网设备进行指示。在这里,请求接入第一私网可以理解成请求与第一私网建立RRC连接。
在本申请实施例中,第一指示信息用于指示包括第一私网在内的多个私网,仅仅通过第一指示信息的内容无法确定该多个私网中哪个为第一私网,这样,即使第一指示信息被不法分子截获,也无法确定终端设备请求接入的网络为具体的哪一个,使得用户的身份不会被暴露,提高了网络的安全使用性能。
例如,该第一私网可以是表2中的非独立私网#1,第一指示信息可以用于指示表2中的非独立私网#1、#2、#3,这样即使第一指示信息被不法分子截获,也无法确定终端设备请求接入的网络为非独立私网#1、#2、#3中具体的哪一个,从而保护了用户的隐私,提高了安全性。
该多个私网除了第一私网以外,还包括至少一个其他私网,本申请对该多个私网的类型、数量等并不限定。
可选地,该多个私网可以全部为非独立私网。
可选地,该多个私网可以全部为独立私网。
可选地,该多个私网可以同时包括非独立私网和独立私网。
可选地,该多个私网可以依赖于同一个公网。
可选地,该多个私网可以依赖于不同的公网。
在步骤310中,终端设备生成第一指示信息。
本申请对终端设备如何生成第一指示信息并不限定,作为示例,终端设备可以通过以下方式中的至少一种生成第一指示信息。
方式一:终端设备根据该多个私网生成第一指示信息。
在终端设备生成第一指示信息之前,终端设备可以首先确定该多个私网,并且根据该多个私网生成第一指示信息。
具体地,该多个私网中除了包括第一私网以外,还包括至少一个其他私网。因此终端设备可以首先确定该多个私网中的其他私网。终端设备可以任意确定该其他私网,本申请对此不做限定。
可选地,可以将小区#A内除第一私网以外的私网确定为该其他私网。例如,第一私网是非独立私网#1时,则终端设备可以将非独立私网#2、#3、#4,以及独立私网#1、#2、#3中的一个或者多个确定为该其他私网。
可选地,可以将小区#A内除第一私网以外的私网中,与第一私网类型相同的私网确定为该其他私网。例如,第一私网是非独立私网#1时,则终端设备可以将非独立私网#2、#3、#4中的一个或者多个确定为该其他私网。
可选地,可以将小区#A内除第一私网以外的私网中,与第一私网依赖于同一个网络的私网确定为该其他私网。例如,第一私网是非独立私网#1时,其依赖PLMN#1的网络,则终端设备可以将依赖PLMN#1的非独立私网#2、#3,以及独立私网#1中的一个或者多个确定为该其他私网。
可选地,可以将小区#A内除第一私网以外的私网中,与第一私网类型相同并且依赖于同一个网络的的私网确定为该其他私网。例如,第一私网是非独立私网#1时,其依赖PLMN#1的网络,则终端设备可以将依赖PLMN#1的非独立私网#2、#3中的一个或者多个确定为该其他私网。
作为示例而非限定,终端设备可以接收小区#A的广播消息,并且根据广播消息中的系统消息块(例如SIB1)确定该多个私网中第一私网以外的其他私网。
具体地,广播消息中的系统消息块包含小区#A所包含的各个网络的相关信息(例如表2中的信息),终端设备可以根据该系统消息块获取小区#A内其他私网的相关信息,进而确定出该其他私网。
在方式一中,终端设备首先确定该多个私网,进而根据该多个私网确定第一指示信息,在该基础上,终端设备可以直接对该多个私网进行指示。
可选地,第一指示信息可以包括该多个私网中每个私网的指示信息。
可选地,该每个私网的指示信息包括私网的标识。
例如,第一私网可以是非独立私网#1,该其他私网为非独立私网#2、#3,则第一指示信息的可以包括上述三个私网的标识,即:PLMN#1 CAG#1,PLMN#1 CAG#2,PLMN#1 CAG#3。接入网设备能够根据上述三个私网的标识确定第一指示信息所指示的三个私网为非独立私网#1、#2、#3。
此外,在该多个私网依赖于同一个网络的前提下(即私网标识的PLMN ID相同),则可以仅上报一个网络的标识,这样有利于减少需要传输的数据量,进而有利于节约信令开销。
可选地,该每个私网的指示信息可以包括私网的索引值。接入网设备在收到该第一指示信息以后,能够根据其中的索引值确定该多个私网。
例如,第一私网可以是非独立私网#1,该其他私网为非独立私网#2、#3,则第一指示信息的可以包括上述三个私网的索引值,即:3,4,5。接入网设备可以根据该索引值在相应的网络列表中确定被第一指示信息所指示的三个私网为非独立私网#1、#2、#3。
此外,也可以采用混合上报的形式,即多个私网中部分私网通过私网标识进行指示, 剩余的私网通过私网索引值进行指示,本申请对此不做限定。
在步骤320中,终端设备向接入网设备发送该第一指示信息。
可选地,该第一指示信息携带于RRC建立完成消息中。
可选地,该第一指示信息也可以携带于其他信令中,或者单独进行发送,本申请对此不做限定。
针对方式一,在步骤330中,接入网设备根据第一指示信息确定第二指示信息,可以是接入网设备接收到第一指示信息之后,读取其中的内容,并且确定出该多个私网具体是哪些私网,之后生成第二指示信息。该第二指示信息包括多个私网中每个私网的指示信息。
可选地,该第二指示信息可以包括多个私网中每个私网的指示信息。
可选地,该每个私网的指示信息包括私网的标识或者索引值。
可选地,该第二指示信息的内容可以和第一指示信息的内容相同,此时接入网设备可以起到“转发”的作用。
可选地,该第二指示信息的内容也可以和第一指示信息不同。
可选地,第一指示信息和第二指示信息可以通过非接入层(non-access stratum,NAS)进行传递,即终端设备通过接入网设备将该多个私网的指示信息透传给核心网设备,此时接入网设备不感知该指示信息的内容。
例如,在第一指示信息中包括的是多个私网的索引值,而在第二指示信息中可以包括该多个私网的标识,本申请对此不做限定。
方式二:终端设备根据第一私网生成第一指示信息。
具体地,终端设备确定第一私网的类型,根据第一私网的类型确定私网接入指示信息,该私网接入指示信息用于指示终端设备请求接入的网络(即第一私网)为私网。可选的,该私网接入网指示信息又可以用于指示终端设备请求接入的私网类型。进一步的,终端设备确定第一私网所依赖的网络为第一网络,并且根据该第一网络确定第一网络的指示信息。第一网络的指示信息用于确定第一网络,或者确定第一网络和第一网络下的私网类型。
第一指示信息包括该私网接入指示信息和第一网络的指示信息。可选的,该多个私网为依赖于第一网络的私网。
接入网设备在收到该第一指示信息之后,能够根据私网接入指示信息确定终端设备请求接入的网络为私网,并且根据第一网络的指示信息确定私网依赖的第一网络。进一步的,接入网设备可以将第一网络下的私网或第一网络下相同类型的私网确定为该多个私网。也就是说,该第一指示信息可以间接对该多个私网进行指示。
可选地,第一私网的类型为非独立私网,私网接入指示信息用于指示终端设备请求接入的网络为非独立私网。接入网设备接收到第一指示信息之后,将小区#A内依赖于第一网络的全部的非独立私网确定为该多个私网。
可选地,第一私网的类型为独立私网,私网接入指示信息用于指示终端设备请求接入的网络为独立私网。接入网设备接收到第一指示信息之后,将小区#A内依赖于第一网络的全部的独立私网确定为该多个私网。
可选地,私网接入指示信息用于指示终端设备请求接入的网络为私网(即仅指示为私网,而不具体指示究竟是非独立私网还是独立私网),第一网络的指示信息用于确定第一网络。。接入网设备接收到第一指示信息之后,将小区#A内依赖于第一网络的全部的私 网确定为该多个私网。
可选地,私网接入指示信息用于指示终端设备请求接入的网络为私网(即仅指示为私网,而不具体指示究竟是非独立私网还是独立私网),第一网络的指示信息用于确定终端设备请求接入的第一网络和第一网络下的私网类型。接入网设备接收到第一指示信息和第一网络的指示信息,将小区#A内依赖于第一网络的对应的私网确定为该多个私网。
可选地,按照协议或者系统的规定,该私网接入指示信息可以为一串特定的代码,或者为1个比特位的“0”或者“1”。
例如,可以用1个比特位的“1”来指示终端设备请求接入的网络为非独立私网;可选的,可以用1个比特位的“0”来指示终端设备请求接入的网络为独立私网。接入网设备在接收到该私网接入指示信息以后,根据相应的比特位的数值确定终端设备请求接入的网络(即第一私网)为非独立私网还是独立私网。
此外,该私网接入指示信息还可以是隐性指示,本申请对此并不限定。
可选地,还可以通过第一指示信息内是否包括该私网接入指示信息来指示终端设备请求接入的网络(即第一私网)是否为私网。
第一网络为第一私网所依赖的网络。例如,该第一网络可以是公网。
可选地,第一网络的指示信息可以包括第一网络的标识或者索引值。或者,第一网络的指示信息可以包括第一网络的标识以及该第一网络标识下的任一私网标识,或者对应的索引值。或者,第一网络的指示信息可以包括第一网络的标识以及和第一私网类型相同的私网标识,或者对应的索引值。
可选地,第一网络的指示信息可以包括小区#A内第一网络下除了第一私网以外的任意一个私网的标识。按照系统或者协议的规定,接入网设备在收到第一网络的指示信息以后,根据该第一网络的指示信息的PLMN ID确定第一网络,而自动忽略后面的CAG ID或者NID。以上设置的一个好处是可以迷惑不法分子,将错误的私网标识显现给不法分子,以假乱真。
作为具体示例,第一私网可以为非独立私网#1,其所依赖的第一网络的标识为PLMN#1,该第一网络的指示信息可以包括非独立私网#2的私网标识PLMN#1 CAG#2或者对应的索引值4,接入网设备在接收到该第一网络的指示信息以后,确定第一网络是标识为PLMN#1的网络,而自动忽略后面的CAG#2。可选的,接入网设备还可以确定私网类型为CAG。
应理解,本申请实施例中的“协议”可以是指通信领域的标准协议,例如可以包括LTE协议、NR协议以及应用于未来的通信系统中的相关协议,本申请对此不做限定。
针对方式二,在步骤330中,接入网设备根据第一指示信息确定第二指示信息,可以是接入网设备接收到第一指示信息之后,读取其中的内容,并且确定出该多个私网具体是哪些私网,之后生成第二指示信息。该第二指示信息包括多个私网中每个私网的指示信息。
接入网设备根据第一指示信息确定该多个私网的相关过程可以参见前文的描述,在此不再赘述。
可选地,该第二指示信息可以包括多个私网中每个私网的指示信息。
可选地,该每个私网的指示信息包括私网的标识或者索引值。
下面根据具体示例来阐述前述的方式二。
作为一例,第一私网为非独立私网#1时,非独立私网#1的标识为:PLMN#1 CAG#1。终端设备根据该第一私网,确定私网接入指示信息用于指示终端设备请求接入的网络为非独立私网。终端设备还可以确定第一网络的指示信息可以包括第一网络的标识PLMN#1或者包括索引3,4,5的至少一个。接入网设备在接收到第一指示信息之后,确定第二指示信息,该第二指示信息可以包括该为PLMN#1的网络下全部的非独立私网的标识,即该第二指示信息可以保留PLMN#1,和非独立私网#1、#2、#3。
作为另一例,第一私网可以为非独立私网#4,其标识为:PLMN#2 CAG#1。此时终端设备通过读取小区#A的网络列表获知在该标识为PLMN#2的网络下只存在一个非独立私网,此外还存在两个独立私网。因此,终端设备根据该第一私网,可以确定私网接入指示信息用于指示终端设备请求接入的网络为私网(即仅指示为私网,而不具体指示究竟是非独立私网还是独立私网),并且第一网络的指示信息可以包括独立私网#2的标识:PLMN#2
NID#1。该多个私网为依赖于标识为PLMN#2的网络下的全部私网,即非独立私网#4,以及独立私网#2、#3。接入网设备在接收到第一指示信息之后,确定该多个私网为标识为PLMN#2的网络下全部的私网,即非独立私网#4,以及独立私网#2、#3。
在步骤340中,接入网设备向核心网设备发送第二指示信息;
相应地,在步骤340中,核心网设备接收接入网设备发送的第二指示信息。
在步骤350中,核心网设备根据该多个私网和终端设备的签约(subscription)信息确定第一私网。
可选的,在步骤360中,核心网设备向接入网设备发送第三指示信息,第三指示信息指示该第一私网;
相应地,在步骤360中,接入网设备接收核心网设备发送的第三指示信息。
具体地,参见前文的描述可知,接入网设备可以根据第一指示信息确定该多个私网,但是接入网设备无法确定该多个私网中究竟哪一个为第一私网,即无法确定终端设备请求接入的网络为哪一个,此时,终端设备可以将第二指示信息发送给核心网设备,该第二指示信息指示该多个私网,可以借助核心网设备确定该多个私网中哪一个为第一私网。
可选地,第二指示信息可以携带于初始终端设备消息(initial UE message)中。
可选地,第二指示信息也可以携带于其他RRC信令中,或者单独进行发送,本申请对此不做限定。
在步骤350中,核心网设备根据第二指示信息所指示的多个私网和终端设备的签约信息确定第一私网。
具体地,核心网设备可以获取终端设备的签约信息,根据该签约信息,核心网设备能够确定终端设备在小区#A的哪些网络中进行认证过,或者说,确定终端设备能够接入小区#A的哪些网络中。这里的网络包括公网、非独立私网、独立私网等。
通常情况下,对于具备多个私网的小区#A,终端设备通常只在其中的一个私网中认证过,或者说,终端设备通常仅能够接入小区#A的一个私网中。
因此,在步骤350中,核心网设备获取到终端设备的签约信息后,根据该签约信息确定第二指示信息所指示的多个私网中哪一个私网终端设备曾经认证过。核心网设备可以将该认证过的私网确认为第一私网,并且向接入网设备进行指示。下面根据具体示例来阐述前述的第一私网的确定过程。
作为一例,第一私网可以为非独立私网#1,该多个私网可以为非独立私网#1、#2、#3。根据终端设备的签约信息能够确定,该三个私网中终端设备仅在非独立私网#1中认证过,此时核心网设备可以将非独立私网#1确定为第一私网,并且向接入网设备进行指示。
下面对核心网设备如何获取终端设备的签约信息进行举例说明。
核心网设备接收接入网设备发送的第二指示信息,该第二指示信息中包含终端设备的标识,例如,该标识可以是5G临时移动用户识别码(5G s-temporary mobile subscriber identity,5G-S-TMSI),终端设备根据该标识确认终端设备的身份,并且识别出终端设备的国际移动用户标识号(international mobile subscriber identity,ISMI),核心网设备可以根据ISMI从归属服务器(home subscriber server,HSS)获取终端设备的签约信息。
可选地,该核心网设备可以为接入和移动管理功能AMF实体,此外,该核心网设备也可以为任何其他能够实现相应功能或作用的实体或网元,本申请对此不做限定。
在步骤360中,核心网设备向接入网设备发送第三指示信息,该第三指示信息指示第一私网。
接入网设备在接收到该第三指示信息之后,将第三指示信息所指示的私网确认为终端设备请求接入的私网。即接入网设备确定终端设备请求接入的网络为第一私网,接入网设备可以进一步确定第一私网与终端设备的连接情况(例如接入的终端设备数量)。接入网设备可以根据该连接情况确定是否允许新的终端设备第一私网,并且可以根据该连接情况为第一私网内的终端设备合理分配资源。
在步骤360中,核心网设备向接入网设备发送第三指示信息,该第三指示信息指示第一私网,由于核心网设备和接入网设备之间数据传输更加安全可靠(例如可以通过有线的方式进行传输),由此使得不法分子无法获知终端设备真正要接入的是哪个网络,由此保护了用户的隐私,提高了网络的安全使用性能。
可选地,该第三指示信息携带于初始上下文建立请求(initial context setup request)消息中。
可选地,该第三指示信息可以携带于其他RRC信令中,或者单独进行发送,本申请对此不做限定。
可选地,该第三指示信息包括第一私网的标识或者索引值。
在极少数情况下,对于具备多个私网的小区#A,终端设备可能在其中的两个或者更多个私网中认证过,核心网设备可能将第一私网以外的私网(记作第二私网)错误认定为是终端设备请求接入的网络,并且向接入网设备进行指示,这时接入网设备也会错误的将第二私网确定为终端设备请求接入的私网。针对该种情况,,可以在终端设备进入连接态,进行加密的数据传输后,终端设备可以通过终端设备配置等消息与接入网设备进行沟通,终端设备可以将第一私网的指示信息通知给接入网设备和核心网设备,或者,终端设备也可以离开第一私网,转而与第二私网建立连接。
图6是本申请的通信方法400的示意性流程图,图6所示实施例可以看作是图5所示实施例的一种变形方式。以下,结合图6说明本申请实施例提供的通信方法400,方法400包括:
步骤410,终端设备生成第一指示信息,第一指示信息用于指示多个私网,该多个私网包括第一私网,第一私网为终端设备请求接入的网络。
步骤420,终端设备向接入网设备发送第一指示信息。
相应地,在步骤420中,接入网设备接收终端设备发送的第一指示信息。
步骤430,接入网设备根据第一指示信息确定多个私网。
步骤440,接入网设备向核心网设备发送终端设备的签约信息请求信息;
相应地,在步骤440中,核心网设备接收接入网设备发送的签约信息请求信息。
步骤450,核心网设备向接入网设备发送终端设备的签约信息应答信息;
相应地,在步骤450中,接入网设备接收核心网设备发送的终端设备的签约信息应答信息。
步骤460中,接入网设备根据多个私网和终端设备的签约信息确定该第一私网是终端设备请求接入的网络。
上述步骤410、420、430可以参照方法300中的步骤310、320、330进行理解,在此阐述不同之处。
在本申请实施例中,和前述图5所示实施例不同的地方主要在于,前述实施例是由核心网设备确定第一私网,之后发送给接入网设备。而本实施例是由接入网设备确定第一私网。前述实施例中核心网设备能感知该第一私网,而本实施例的核心网设备无法感知该第一私网。
具体地,本申请实施例接入网设备向核心网设备发送终端设备的签约信息请求信息,以请求终端设备的签约信息,核心网设备在收到该请求信息后,将签约信息发送给接入网设备,接入网设备自行确定该第一私网。
可选地,终端设备的签约信息请求信息可以携带于初始终端设备消息中。
可选地,终端设备的签约信息应答信息可以携带于初始上下文建立请求消息中。
可选地,由于步骤430和步骤440、步骤450之间并无逻辑上的先后顺序,因此,本申请实施例并不对步骤430和步骤440、步骤450之间的先后顺序进行限定。
例如,步骤430可以在步骤440之前执行。
再例如,步骤430可以在步骤440和步骤450之间执行。
再例如,步骤430可以在步骤450之后执行。
再例如,步骤430也可以和步骤440或者步骤450同时执行。
在步骤460中,接入网设备根据多个私网和终端设备的签约信息确定第一私网为终端设备请求接入的私网。步骤460可以参照前述方法300中的步骤350、步骤360进行理解,在此不再赘述。
上文结合图1至图6详细描述了本申请实施例的通信方法,下面结合图7至图12,详细描述本申请实施例的装置。应理解,图7至图12所示的装置能够实现图5或6所示的方法流程中的一个或者多个的步骤。为避免重复,在此不再详细赘述。
图7是本申请实施例提供的通信装置500的示意性框图。如图7所示,该装置500包括:生成单元510和发送单元520。
生成单元510,用于生成第一指示信息,第一指示信息用于指示多个私网,多个私网包括第一私网,第一私网为该通信装置请求接入的网络;
发送单元520,用于向接入网设备发送第一指示信息。
可选地,第一指示信息包括多个私网中每个私网的指示信息。
可选地,每个私网的指示信息包括私网的标识或者私网的索引值。
可选地,第一指示信息具体包括私网接入指示信息和第一网络的指示信息,私网接入指示信息用于指示通信装置请求接入的网络为私网,第一网络为第一私网所依赖的网络,多个私网为依赖于第一网络的私网。
具体地,该通信装置500可对应于根据本申请实施例的通信方法300、400中的终端设备,或配置于该终端设备中的芯片。该通信装置500可以包括用于执行图5中通信方法300或者图6中通信方法400的终端设备执行的方法的单元。并且,该通信装置500中的各单元和上述其他操作和/或功能分别为了实现图5中通信方法300或者图6中通信方法400的相应流程,各单元执行上述相应步骤的具体过程在方法300、400中已经详细说明,为了简洁,在此不再赘述。
所述通信装置500可以为智能终端或可穿戴设备等,所述发送单元520可以是收发器,或收发电路。可选的,所述收发器也可以为输入/输出电路或者接口。
所述通信装置500还可以为芯片。所述发送单元520可以为芯片的输入/输出电路或者接口。
在一种可能的实现方式中,上述通信装置500可以为终端设备50,其中生成单元510的功能可以由终端设备中50的处理器502实现,发送单元520的功能可以通过终端设备的收发器501(即控制电路与天线一起)实现。下文结合图8介绍本申请实施例的终端设备的结构。
图8是本申请实施例提供的一种终端设备的结构示意图。该终端设备可适用于图1所示出的系统中,执行上述方法实施例中终端设备的功能。为了便于说明,图8仅示出了终端设备的主要部件。如图8所示,终端设备50包括处理器、存储器、控制电路、天线以及输入输出装置。处理器主要用于对通信协议以及通信数据进行处理,以及对整个终端设备进行控制,执行软件程序,处理软件程序的数据,例如用于支持终端设备执行上述方法实施例中所描述的动作。存储器主要用于存储软件程序和数据。控制电路主要用于基带信号与射频信号的转换以及对射频信号的处理。控制电路和天线一起也可以叫做收发器,主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。
当终端设备开机后,处理器可以读取存储器的软件程序,解释并执行软件程序的指令,处理软件程序的数据。当需要通过无线发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。
本领域技术人员可以理解,为了便于说明,图8仅示出了一个存储器和一个处理器。在实际的终端设备中,可以存在多个处理器和多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以为与处理器处于同一芯片上的存储元件,即片内存储元件,或者为独立的存储元件,本申请实施例对此不做限定。
作为一种可选的实现方式,所述终端设备可以包括基带处理器和中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个终端设备进 行控制,执行软件程序,处理软件程序的数据。图8中的处理器可以集成基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。本领域技术人员可以理解,终端设备可以包括多个基带处理器以适应不同的网络制式,终端设备可以包括多个中央处理器以增强其处理能力,终端设备的各个部件可以通过各种总线连接。所述基带处理器也可以表述为基带处理电路或者基带处理芯片。所述中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储器中,由处理器执行软件程序以实现基带处理功能。
在本申请实施例中,可以将具有收发功能的天线和控制电路视为终端设备50的收发单元501,例如,用于支持终端设备执行接收功能和发送功能。将具有处理功能的处理器502视为终端设备50的处理单元502。如图8所示,终端设备50包括收发单元501和处理单元502。收发单元也可以称为收发器、收发机、收发装置等。可选的,可以将收发单元501中用于实现接收功能的器件视为接收单元,将收发单元501中用于实现发送功能的器件视为发送单元,即收发单元501包括接收单元和发送单元,接收单元也可以称为接收机、输入口、接收电路等,发送单元可以称为发射机、发射器或者发射电路等。
处理器502可用于执行该存储器存储的指令,以控制收发单元501接收信号和/或发送信号,完成上述方法实施例中终端设备的功能。所述处理器502还包括接口,用以实现信号的输入/输出功能。作为一种实现方式,收发单元501的功能可以考虑通过收发电路或者收发的专用芯片实现。
图9是本申请实施例提供的通信装置600的示意性框图。如图9所示,该装置600包括:接收单元610、确定单元620和发送单元630。
接收单元610,用于接收终端设备发送的第一指示信息,第一指示信息用于指示多个私网,多个私网包括第一私网,第一私网为所述终端设备请求接入的网络;
确定单元620,用于根据第一指示信息确定第二指示信息,第二指示信息指示所述多个私网;
发送单元630,用于向核心网设备发送第二指示信息;
接收单元610还用于接收核心网设备发送的第三指示信息,第三指示信息指示该第一私网。
可选地,第一指示信息包括多个私网中每个私网的指示信息。
可选地,每个私网的指示信息包括私网的标识或者私网的索引值。
可选地,第一指示信息具体包括私网接入指示信息和第一网络的指示信息,私网接入指示信息用于指示终端设备请求接入的网络为私网,第一网络为第一私网所依赖的网络,多个私网为依赖于第一网络的私网;确定单元620还用于根据私网接入指示信息和第一网络的指示信息确定多个私网。
可选地,第二指示信息包括多个私网中每个私网的指示信息。
具体地,该通信装置600可对应于根据本申请实施例的通信方法300、400中的接入网设备,或配置于该接入网设备中的芯片。该通信装置600可以包括用于执行图5中通信方法300或者图6中通信方法400的接入网设备执行的方法的单元。并且,该通信装置600中的各单元和上述其他操作和/或功能分别为了实现图5中通信方法300或者图6中通 信方法400的相应流程,各单元执行上述相应步骤的具体过程在方法300、400中已经详细说明,为了简洁,在此不再赘述。
在一种可能的实现方式中,上述通信装置600可以为基站,gNB或TRP,DU,CU,CU-CP(control plane)或CU-UP(user plane)等,所述接收单元610和发送单元630可以是收发器,或收发电路。可选的,所述收发器也可以为输入/输出电路或者接口。
所述通信装置600还可以为芯片。接收单元610和发送单元630可以为芯片的输入/输出电路或者接口。
在一种可能的实现方式中,上述通信装置600可以为接入网设备,例如下文中的基站60,其中确定单元620的功能可以由基站中的处理器6022实现,接收单元610和发送单元630的功能可以通过基站60的RRU 601实现。下文结合图10介绍本申请实施例的网络设备的结构。
图10是本申请实施例的一种接入网设备的结构示意图,如可以为基站的结构示意图。如图10所示,该基站可应用于如图1所示的系统中,执行上述方法实施例中接入网设备的功能。基站60可包括一个或多个射频单元,如远端射频单元(remote radio unit,RRU)601和一个或多个基带单元(baseband unit,BBU)(也可称为数字单元,digital unit,DU)602。所述RRU 601可以称为收发单元、收发机、收发电路、或者收发器等等,其可以包括至少一个天线6011和射频单元6012。所述RRU 601部分主要用于射频信号的收发以及射频信号与基带信号的转换,例如用于向终端设备发送上述实施例中所述的信令消息。所述BBU 602部分主要用于进行基带处理,对基站进行控制等。所述RRU 601与BBU 602可以是物理上设置在一起,也可以物理上分离设置的,即分布式基站。
所述BBU 602为基站的控制中心,也可以称为处理单元,主要用于完成基带处理功能,如信道编码,复用,调制,扩频等等。例如所述BBU(处理单元)602可以用于控制基站执行上述方法实施例中关于网络设备的操作流程。
在一个实例中,所述BBU 602可以由一个或多个单板构成,多个单板可以共同支持单一接入指示的无线接入网(如LTE网),也可以分别支持不同接入制式的无线接入网(如LTE网,5G网或其他网)。所述BBU 602还包括存储器6021和处理器6022,所述存储器6021用于存储必要的指令和数据。例如存储器6021存储上述实施例中的码本索引与预编码矩阵的对应关系。所述处理器6022用于控制基站进行必要的动作,例如用于控制基站执行上述方法实施例中关于网络设备的操作流程。所述存储器6021和处理器6022可以服务于一个或多个单板。也就是说,可以每个单板上单独设置存储器和处理器。也可以是多个单板共用相同的存储器和处理器。此外每个单板上还可以设置有必要的电路。
图11是本申请实施例提供的通信装置700的示意性框图。如图11所示,该装置700包括:接收单元710、确定单元720和发送单元730。
接收单元710,用于接收接入网设备发送的第二指示信息,第二指示信息指示多个私网,多个私网包括第一私网,第一私网为终端设备请求接入的网络;
确定单元720,用于根据多个私网和终端设备的签约信息确定该第一私网;
发送单元730,用于向接入网设备发送第三指示信息,第三指示信息指示该第一私网。
可选地,第二指示信息包括多个私网中每个私网的指示信息。
可选地,该第三指示信息包括该第一私网的标识或者索引值。
具体地,该通信装置700可对应于根据本申请实施例的通信方法300、400中的核心网设备,或配置于该核心网设备中的芯片。该通信装置700可以包括用于执行图5中通信方法300或者图6中通信方法400的核心网设备执行的方法的单元。并且,该通信装置700中的各单元和上述其他操作和/或功能分别为了实现图5中通信方法300或者图6中通信方法400的相应流程,各单元执行上述相应步骤的具体过程在方法300、400中已经详细说明,为了简洁,在此不再赘述。
在一种可能的实现方式中,上述通信装置700可以为核心网设备,例如AMF实体,所述接收单元710和发送单元730可以是收发器,或收发电路。可选的,所述收发器也可以为输入/输出电路或者接口。
所述通信装置700还可以为芯片。所述接收单元710和发送单元730可以为芯片的输入/输出电路或者接口。
在一种可能的实现方式中,上述通信装置700可以为核心网设备,例如下文中的核心网设备80,其中确定单元820的功能可以由核心网设备80中的处理器801实现,接收单元710和发送单元730的功能可以通过核心网设备80的收发器802实现。下文结合图12介绍本申请实施例的核心网设备的结构。
图12是本申请实施例提供的核心网设备的结构示意图。如图12所示,该核心网设备80包括包括处理器801和收发器802。可选地,该核心网设备80还包括存储器803。其中,处理器801、收发器802和存储器803之间通过内部连接通路互相通信,传递控制和/或数据信号,该存储器803用于存储计算机程序,该处理器801用于从该存储器803中调用并运行该计算机程序,以控制该收发器802收发信号。
上述处理器801和存储器803可以合成一个处理装置,处理器801用于执行存储器803中存储的程序代码来实现上述功能。具体实现时,该存储器803也可以集成在处理器801中,或者独立于处理器801。
应理解,在本申请实施例中的处理器可以是中央处理单元(Central Processing Unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的随机存取存储器(random access memory,RAM)可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存 储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行图5或图6所示实施例中任意一个实施例的方法。
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行图5或图6所示实施例中任意一个实施例的方法。
根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的一个或多个终端设备、一个或多个接入网设备、一个或者多个核心网设备。
上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令或计算机程序。在计算机上加载或执行所述计算机指令或计算机程序时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质。半导体介质可以是固态硬盘。
为了便于理解,下文中对本申请介绍方案的过程中涉及的名词进行说明。
在本申请实施例中,“指示”可以包括直接指示和间接指示,也可以包括显式指示和隐式指示。将某一信息(如前文中的“指示信息”)所指示的信息称为待指示信息,则具体实现过程中,对待指示信息进行指示的方式有很多种,例如但不限于,可以直接指示待指示信息,如待指示信息本身或者该待指示信息的索引等。也可以通过指示其他信息来间接指示待指示信息,其中该其他信息与待指示信息之间存在关联关系。还可以仅仅指示待指示信息的一部分,而待指示信息的其他部分则是已知的或者提前约定的。例如,还可以借助预先约定(例如协议规定)的各个信息的排列顺序来实现对特定信息的指示,从而在一定程度上降低指示开销。
在本申请实施例中,各术语及英文缩略语,公网(PLMN)、非独立私网(CAG)、独立私网(SNPN)、无线资源控制(RRC)、系统消息块(SIB)等,均为方便描述而给出的示例性举例,不应对本申请构成任何限定。本申请并不排除在已有或未来的协议中定义其它能够实现相同或相似功能的术语的可能。
在本申请实施例中,“第一”、“第二”、“第三”以及各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围。例如,区分不同的指示信息信息等。
本申请实施例中涉及的“通信协议”可以是指通信领域的标准协议,例如可以包括LTE协议、NR协议以及应用于未来的通信系统中的相关协议,本申请对此不做限定。
本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (25)

  1. 一种通信方法,其特征在于,包括:
    终端设备生成第一指示信息,所述第一指示信息用于指示多个私网,所述多个私网包括第一私网,所述第一私网为所述终端设备请求接入的网络;
    所述终端设备向接入网设备发送所述第一指示信息。
  2. 根据权利要求1所述的方法,其特征在于,所述第一指示信息包括所述多个私网中每个私网的指示信息。
  3. 根据权利要求2所述的方法,其特征在于,所述每个私网的指示信息包括私网的标识或者私网的索引值。
  4. 根据权利要求1所述的方法,其特征在于,所述第一指示信息具体包括私网接入指示信息和第一网络的指示信息,所述私网接入指示信息用于指示所述终端设备请求接入的网络为私网,所述第一网络为所述第一私网所依赖的网络,所述多个私网为依赖于所述第一网络的私网。
  5. 一种通信方法,其特征在于,包括:
    接入网设备接收终端设备发送的第一指示信息,所述第一指示信息用于指示多个私网,所述多个私网包括第一私网,所述第一私网为所述终端设备请求接入的网络;
    所述接入网设备根据所述第一指示信息确定第二指示信息,所述第二指示信息指示所述多个私网;
    所述接入网设备向核心网设备发送所述第二指示信息;
    所述接入网设备接收所述核心网设备发送的第三指示信息,所述第三指示信息指示所述第一私网。
  6. 根据权利要求5所述的方法,其特征在于,所述第一指示信息包括所述多个私网中每个私网的指示信息。
  7. 根据权利要求6所述的方法,其特征在于,所述每个私网的指示信息包括私网的标识或者私网的索引值。
  8. 根据权利要求5所述的方法,其特征在于,所述第一指示信息具体包括私网接入指示信息和第一网络的指示信息,所述私网接入指示信息用于指示所述终端设备请求接入的网络为私网,所述第一网络为所述第一私网所依赖的网络,所述多个私网为依赖于所述第一网络的私网;
    所述接入网设备根据所述第一指示信息确定第二指示信息,包括:
    所述接入网设备根据所述私网接入指示信息和所述第一网络的指示信息确定所述多个私网。
  9. 根据权利要求5-8中任一项所述的方法,其特征在于,所述第二指示信息包括所述多个私网中每个私网的指示信息。
  10. 一种通信的方法,其特征在于,包括:
    核心网设备接收接入网设备发送的第二指示信息,所述第二指示信息指示多个私网,所述多个私网包括第一私网,所述第一私网为终端设备请求接入的网络;
    所述核心网设备根据所述多个私网和所述终端设备的签约信息确定所述第一私网;
    所述核心网设备向所述接入网设备发送第三指示信息,所述第三指示信息指示所述第一私网。
  11. 根据权利要求10所述的方法,其特征在于,所述第二指示信息包括所述多个私网中每个私网的指示信息。
  12. 一种通信装置,其特征在于,包括:
    生成单元,用于生成第一指示信息,所述第一指示信息用于指示多个私网,所述多个私网包括第一私网,所述第一私网为所述通信装置请求接入的网络;
    发送单元,用于向接入网设备发送所述第一指示信息。
  13. 根据权利要求12所述的装置,其特征在于,所述第一指示信息包括所述多个私网中每个私网的指示信息。
  14. 根据权利要求13所述的装置,其特征在于,所述每个私网的指示信息包括私网的标识或者私网的索引值。
  15. 根据权利要求12所述的装置,其特征在于,所述第一指示信息具体包括私网接入指示信息和第一网络的指示信息,所述私网接入指示信息用于指示所述通信装置请求接入的网络为私网,所述第一网络为所述第一私网所依赖的网络,所述多个私网为依赖于所述第一网络的私网。
  16. 一种通信装置,其特征在于,包括:
    接收单元,用于接收终端设备发送的第一指示信息,所述第一指示信息用于指示多个私网,所述多个私网包括第一私网,所述第一私网为所述终端设备请求接入的网络;
    确定单元,用于根据所述第一指示信息确定第二指示信息,所述第二指示信息指示所述多个私网;
    发送单元,用于向核心网设备发送所述第二指示信息;
    所述接收单元还用于接收所述核心网设备发送的第三指示信息,所述第三指示信息指示所述第一私网。
  17. 根据权利要求16所述的装置,其特征在于,所述第一指示信息包括所述多个私网中每个私网的指示信息。
  18. 根据权利要求17所述的装置,其特征在于,所述每个私网的指示信息包括私网的标识或者私网的索引值。
  19. 根据权利要求16所述的装置,其特征在于,所述第一指示信息具体包括私网接入指示信息和第一网络的指示信息,所述私网接入指示信息用于指示所述终端设备请求接入的网络为私网,所述第一网络为所述第一私网所依赖的网络,所述多个私网为依赖于所述第一网络的私网;
    所述确定单元还用于根据所述私网接入指示信息和所述第一网络的指示信息确定所述多个私网。
  20. 根据权利要求16-19中任一项所述的装置,其特征在于,所述第二指示信息包括所述多个私网中每个私网的指示信息。
  21. 一种通信的装置,其特征在于,包括:
    接收单元,用于接收接入网设备发送的第二指示信息,所述第二指示信息指示多个私 网,所述多个私网包括第一私网,所述第一私网为终端设备请求接入的网络;
    确定单元,用于根据所述多个私网和所述终端设备的签约信息确定所述第一私网;
    发送单元,用于向所述接入网设备发送第三指示信息,所述第三指示信息指示所述第一私网。
  22. 根据权利要求21所述的装置,其特征在于,所述第二指示信息包括所述多个私网中每个私网的指示信息。
  23. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至11中任意一项所述的方法。
  24. 一种芯片系统,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片系统的通信设备执行如权利要求1至11中任意一项所述的方法。
  25. 一种通信装置,其特征在于,包括至少一个处理器,所述至少一个处理器用于与存储器耦合,读取并执行所述存储器中的指令,以实现如权利要求1至11中任一项所述的方法。
PCT/CN2019/115943 2019-11-06 2019-11-06 一种通信方法,通信装置及通信系统 WO2021087801A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
JP2022525911A JP2023500134A (ja) 2019-11-06 2019-11-06 通信方法、通信装置、および通信システム
PCT/CN2019/115943 WO2021087801A1 (zh) 2019-11-06 2019-11-06 一种通信方法,通信装置及通信系统
CN201980101502.4A CN114631398B (zh) 2019-11-06 2019-11-06 一种通信方法,通信装置及通信系统
BR112022008614A BR112022008614A2 (pt) 2019-11-06 2019-11-06 Método de comunicação, aparelho de comunicações e sistema de comunicações
EP19951788.9A EP4044642A4 (en) 2019-11-06 2019-11-06 COMMUNICATION METHOD, COMMUNICATION DEVICE AND COMMUNICATION SYSTEM
US17/662,120 US20220279432A1 (en) 2019-11-06 2022-05-05 Communication Method, Communications Apparatus, and Communications System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/115943 WO2021087801A1 (zh) 2019-11-06 2019-11-06 一种通信方法,通信装置及通信系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/662,120 Continuation US20220279432A1 (en) 2019-11-06 2022-05-05 Communication Method, Communications Apparatus, and Communications System

Publications (1)

Publication Number Publication Date
WO2021087801A1 true WO2021087801A1 (zh) 2021-05-14

Family

ID=75849405

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/115943 WO2021087801A1 (zh) 2019-11-06 2019-11-06 一种通信方法,通信装置及通信系统

Country Status (6)

Country Link
US (1) US20220279432A1 (zh)
EP (1) EP4044642A4 (zh)
JP (1) JP2023500134A (zh)
CN (1) CN114631398B (zh)
BR (1) BR112022008614A2 (zh)
WO (1) WO2021087801A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023066392A1 (zh) * 2021-10-22 2023-04-27 大唐移动通信设备有限公司 非公共网络处理方法、装置、设备及存储介质

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015148959A1 (en) * 2014-03-28 2015-10-01 Qualcomm Incorporated Provisioning credentials in wireless communications

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8601569B2 (en) * 2010-04-09 2013-12-03 International Business Machines Corporation Secure access to a private network through a public wireless network
CN115484659B (zh) * 2019-05-06 2024-03-22 腾讯科技(深圳)有限公司 网络接入控制方法、装置、计算机可读介质及电子设备

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015148959A1 (en) * 2014-03-28 2015-10-01 Qualcomm Incorporated Provisioning credentials in wireless communications

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ERICSSON QUALCOMM INCORPORATED: "Support of CAG ID privacy", 3GPP DRAFT; S2-1910443_WAS09371_23501-CAG-ID-PRIVACY, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Split, Croatia; 20191014 - 20191018, 17 October 2019 (2019-10-17), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051797137 *
ERICSSON QUALCOMM INCORPORATED: "Support of CAG ID privacy", 3GPP DRAFT; S2-1910444_WAS09372_23502-CAG-ID-PRIVACY, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Split, Croatia; 20191014 - 20191018, 17 October 2019 (2019-10-17), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051797138 *
QUALCOMM INCORPORATED: "Support of CAG ID privacy", 3GPP DRAFT; S2-1909079_23502_REMOVE_CAGID_FROM_RRC_V2, vol. SA WG2, 4 October 2019 (2019-10-04), Split, Croatia, pages 1 - 29, XP051801289 *
See also references of EP4044642A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023066392A1 (zh) * 2021-10-22 2023-04-27 大唐移动通信设备有限公司 非公共网络处理方法、装置、设备及存储介质

Also Published As

Publication number Publication date
US20220279432A1 (en) 2022-09-01
BR112022008614A2 (pt) 2022-08-09
EP4044642A1 (en) 2022-08-17
EP4044642A4 (en) 2022-10-19
CN114631398A (zh) 2022-06-14
JP2023500134A (ja) 2023-01-04
CN114631398B (zh) 2024-08-23

Similar Documents

Publication Publication Date Title
US10034324B2 (en) Optimization of power consumption in dual SIM mobiles in connected mode in a wireless network
US10701618B2 (en) System and method for access barring
EP3493601B1 (en) Selecting a network slice
US10674346B2 (en) Connectivity to a core network via an access network
US9578663B2 (en) Method and apparatus for setting up link at high-speed in wireless communication system
US20160007213A1 (en) Data transmission methods, devices and system
KR20180014941A (ko) 차세대 이동통신 시스템에서 네트워크 소모 전력을 효과적으로 절감시키는 방법 및 장치
US20220014901A1 (en) Method and apparatus for identifying user equipment capability in sidelink transmission
US20220053452A1 (en) Communication method, communications apparatus, and communications system
EP3386244B1 (en) Terminal device, network device, method for selecting cell, and wireless communication system
EP2712262A1 (en) Network joining method and apparatus thereof for relay node
US20220141664A1 (en) Data transmission method and apparatus in network slice architecture
WO2015108462A1 (en) Methods and nodes for information transfer in wlan
US20220303937A1 (en) Communication method, communication apparatus, and communication system
EP3687223B1 (en) Terminal device, access network device, air interface configuration method, and wireless communications system
WO2021148053A1 (zh) 一种信息传输方法、装置及相关设备
US20220312286A1 (en) Synchronization for Low-Layer based Mobility Management
US20220279432A1 (en) Communication Method, Communications Apparatus, and Communications System
WO2023016160A1 (zh) 一种会话建立方法和相关装置
WO2020147049A1 (zh) 处理上行覆盖弱化的方法及装置、终端、网络设备
WO2021047479A1 (zh) 一种通信方法及装置
WO2021035499A1 (zh) 通信方法、设备和通信系统
WO2023092448A1 (en) 5g new radio mobility enhancements
WO2022237898A1 (zh) 用于在线签约的方法、通信装置、介质及芯片
WO2023216075A1 (en) Cellular device radio network temporary identity protection

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19951788

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022525911

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2019951788

Country of ref document: EP

Effective date: 20220509

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112022008614

Country of ref document: BR

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 112022008614

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20220504