WO2021136211A1 - Method and device for determining authorization result - Google Patents

Method and device for determining authorization result Download PDF

Info

Publication number
WO2021136211A1
WO2021136211A1 PCT/CN2020/140406 CN2020140406W WO2021136211A1 WO 2021136211 A1 WO2021136211 A1 WO 2021136211A1 CN 2020140406 W CN2020140406 W CN 2020140406W WO 2021136211 A1 WO2021136211 A1 WO 2021136211A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
terminal device
network device
access
access network
Prior art date
Application number
PCT/CN2020/140406
Other languages
French (fr)
Chinese (zh)
Inventor
张博
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021136211A1 publication Critical patent/WO2021136211A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Definitions

  • This application relates to the field of communication technology, and in particular to a method and device for determining an authorization result.
  • the Internet of Everything technology includes not only narrowband internet of things, NB-LOT) technology and enhanced machine type communication (eMTC) technology, It may also include IoT, end-to-end (device to device, D2D) technology, and so on.
  • IoT or end-to-end technology can also be referred to as proximity-based services (Proximity-based services, ProSe).
  • ProSe proximity-based services
  • a terminal device can communicate with the network through another terminal device.
  • one terminal device can access the operator's network through another terminal device to perform registration procedures, data transmission and other services.
  • the other terminal device may also be referred to as a relay terminal device.
  • the embodiments of the present application provide a method and device for determining an authorization result, which can effectively determine the relay service of a relay terminal device and prevent the terminal device from accessing the network through an unauthorized relay terminal device.
  • an embodiment of the present application provides a method for determining an authorization result, and the method includes:
  • the access network device receives a first message sent by a second terminal device, where the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes the second terminal device.
  • Identification information of the terminal device the access network device determines the authorization result of the second terminal device according to the identification information of the second terminal device; the access network device sends a second message to the first core network device, The second message includes the authorization result of the second terminal device; the access network device receives a response message of the second message sent by the first core network device.
  • the authorization result of the second terminal device may be the result of the second terminal device being authorized to perform the relay service.
  • the RAN determines that UE2 is authorized to perform the relay service, and then sends a second message including the authorization result of UE2 to AMF1, so that the AMF1 can be based on the UE2's authorization result.
  • the authorization result allows UE1 to access the network through UE2.
  • Implementing the embodiments of this application can enable AMF1 to obtain the authorization result of UE2, thereby safely and effectively allowing UE1 to access the network through UE2.
  • the access network device stores the authorization result of the second terminal device.
  • the method before the access network device determines the authorization result of the second terminal device according to the identification information of the second terminal device, the method further includes: The second core network device sends a third message, the third message includes the identification information of the second terminal device, and the third message is used to request the authorization result of the second terminal device; the access network The device receives a response message of a third message sent by the second core network device, where the response message of the third message includes the authorization result of whether the second terminal device is authorized to perform the relay service; the access network device Save the authorization result of the second terminal device.
  • the identification information of the second terminal device includes a relay identification of the second terminal device.
  • the method further includes: the access network device sends a response message of the first message to the second terminal device, and the response message of the first message is used to indicate the first message A terminal device is allowed to access the network through the second terminal device.
  • the response message of the first message includes the authorization result of the second terminal device.
  • an embodiment of the present application provides a method for determining an authorization result, and the method includes:
  • the first core network device receives a second message sent by the access network device, where the second message includes the authorization result of the second terminal device; the first core network device determines the The second terminal device is authorized to perform a relay service; the first core network device sends a response message of the second message to the access network device.
  • the method before the first core network device receives the second message sent by the access network device, the method further includes: the access network device receives the first message sent by the second terminal device. A message; wherein, the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes the identification information of the second terminal device; the access The network device determines that the second terminal device is authorized to perform the relay service, and sends the second message to the first core network device.
  • the method further includes: the access network device sends the second core network device to the second core network device.
  • the third message includes the identification information of the second terminal device, and the third message is used to request the authorization result of the second terminal device;
  • the second core network device receives the access The third message sent by the network device, and sending a response message of the third message to the access network device;
  • the determining by the access network device that the second terminal device is authorized to perform the relay service includes: the access network device determines that the second terminal device is authorized to perform the relay according to the response message of the third message business.
  • the method further includes: the access network device sends a response message of the first message to the second terminal device, and the response message of the first message is used to indicate the first message A terminal device is allowed to access the network through the second terminal device.
  • beneficial effects of the second aspect can be referred to the beneficial effects of the first aspect, which will not be repeated here.
  • embodiments of the present application provide a communication device, which may be a network device, a device in a network device, or a device that can be used in conjunction with a network device.
  • the communication device may also be a chip system.
  • the communication device can execute the methods described in the first aspect and various possible implementation manners of the first aspect.
  • the communication device may execute the methods described in the second aspect and various possible implementation manners of the second aspect.
  • the function of the communication device can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • the unit can be software and/or hardware.
  • the network device may be an access network device.
  • the network device may be the first core network device.
  • the network device may be a second core network device.
  • an embodiment of the present application provides a communication system, the communication system includes: a first core network device, configured to receive a second message sent by an access network device, the second message including the authorization of the second terminal device Result; the first core network device is also used to determine that the second terminal device is authorized to perform relay services according to the authorization result of the second terminal device; the first core network device is also used to The access network device sends a response message to the second message.
  • the system further includes: an access network device, configured to receive a first message sent by the second terminal device; wherein, the first message is used to instruct the first terminal The device requests to access the network through the second terminal device, and the first message includes the identification information of the second terminal device; the access network device is also used to determine that the second terminal device is authorized to perform relay Service, sending the second message to the first core network device.
  • an access network device configured to receive a first message sent by the second terminal device; wherein, the first message is used to instruct the first terminal The device requests to access the network through the second terminal device, and the first message includes the identification information of the second terminal device; the access network device is also used to determine that the second terminal device is authorized to perform relay Service, sending the second message to the first core network device.
  • the access network device is further configured to send a third message to the second core network device, where the third message includes the identification information of the second terminal device, and The third message is used to request the authorization result of the second terminal device;
  • the system further includes: a second core network device, configured to receive the third message sent by the access network device, and send a response message of the third message to the access network device;
  • the network access device is specifically configured to determine, according to the response message of the third message, that the second terminal device is authorized to perform the relay service.
  • the access network device is further configured to send a response message of a first message to the first terminal device, and the response message of the first message is used to instruct the first terminal The device allows access to the network through the second terminal device.
  • an embodiment of the present application provides a communication device, the communication device includes a processor, and when the processor invokes a computer program in a memory, as in the first aspect and various possible implementation manners of the first aspect The method described is executed.
  • the processor invokes the computer program in the memory
  • the methods described in the second aspect and various possible implementation manners of the second aspect are executed.
  • the processor calls the computer program, the method described in any one of the first core network device, the second core network device, and the access network device is executed.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a processor and a memory.
  • the memory is used to store computer-executable instructions; the processor is used to execute the computer-executable instructions to enable the
  • the communication device executes the methods described in the first aspect and various possible implementation manners of the first aspect.
  • the processor invokes the computer to execute instructions
  • the methods described in the second aspect and various possible implementation manners of the second aspect are executed.
  • the processor invokes the computer to execute instructions
  • the method described in any one of the first core network device, the second core network device, and the access network device is executed.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a processor, a memory, and a transceiver.
  • the transceiver is used to receive signals or send signals; and the memory is used to store program codes;
  • the processor is configured to call the program code to execute the method described in the first aspect.
  • the processor calls the program code
  • the methods described in the second aspect and various possible implementation manners of the second aspect are executed.
  • the processor calls the program code
  • the method described in any one of the first core network device, the second core network device, and the access network device is executed.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a processor and an interface circuit.
  • the interface circuit is configured to receive code instructions and transmit them to the processor; the processor runs the The code instructions execute the methods described in the first aspect and various possible implementations of the first aspect.
  • the processor runs the code instructions to execute the methods described in the second aspect and various possible implementation manners of the second aspect. For example, the method described in any one of the first core network device, the second core network device, and the access network device is executed.
  • an embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium is used to store instructions, and when the instructions are executed, the first aspect and the various possibilities of the first aspect Implementation The method described is implemented.
  • the methods described in the second aspect and various possible implementation manners of the second aspect are implemented.
  • the method described in any one of the first core network device, the second core network device, and the access network device is implemented.
  • embodiments of the present application provide a computer program product including instructions, which when executed, enable the methods described in the first aspect and various possible implementations of the first aspect to be implemented.
  • the methods described in the second aspect and various possible implementation manners of the second aspect are implemented.
  • the method described in any one of the first core network device, the second core network device, and the access network device is implemented.
  • an embodiment of the present application provides a computer program for executing the first aspect and various possible implementation manners of the first aspect.
  • an embodiment of the present application provides a computer program for executing the second aspect and various possible implementation manners of the second aspect.
  • the computer program is used to execute the method described in any one of the first core network device, the second core network device, and the access network device.
  • FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a method for determining an authorization result provided by an embodiment of the present application
  • FIG. 4 is a schematic flowchart of a method for determining an authorization result provided by an embodiment of the present application
  • FIG. 5 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a method for determining an authorization result provided by an embodiment of the present application.
  • At least one (item) refers to one or more
  • multiple refers to two or more than two
  • at least two (item) refers to two or three and three
  • “and/or” is used to describe the association relationship of associated objects, which means that there can be three kinds of relationships.
  • a and/or B can mean: there is only A, only B, and both A and B. In this case, A and B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an "or” relationship.
  • the following at least one item (a) or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • At least one of a, b, or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c" ", where a, b, and c can be single or multiple.
  • the method for determining the authorization result provided in this application can be applied to various communication systems, such as the Internet of Things (IoT) system, the narrowband Internet of Things (NB-IoT) system, and the long-term evolution ( Long term evolution, LTE) system, it can also be the fifth generation (5th-generation, 5G) communication system, it can also be a hybrid architecture of LTE and 5G, it can also be a 5G new radio (NR) system, and future communications New communication systems, etc. appearing in development.
  • IoT Internet of Things
  • NB-IoT narrowband Internet of Things
  • LTE long-term evolution
  • 5G fifth generation
  • 5G 5G new radio
  • NR 5G new radio
  • FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • the various parts involved in FIG. 1 are as follows:
  • the terminal device 110 is also referred to as user equipment (UE), terminal, and so on.
  • a terminal device is a device with a wireless transceiver function. It can be connected to one or more core networks (core networks) via the (radio) access network ((radio) access network, (R) AN) 120 access network equipment, CN) to communicate. It can be deployed on land, including indoor or outdoor, handheld, wearable, or vehicle-mounted; it can also be deployed on the water, such as on a ship, and it can also be deployed in the air, such as on an airplane, balloon, or satellite.
  • core networks core networks
  • R radio access network
  • CN access network equipment
  • Terminal devices can be mobile phones, tablets, computers with wireless transceiver functions, virtual reality (VR) terminal devices, augmented reality (AR) terminal devices, industrial control (industrial control) Wireless terminals in ), wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, and wireless terminals in transportation safety , Wireless terminals in smart cities, wireless terminals in smart homes, etc.
  • VR virtual reality
  • AR augmented reality
  • industrial control industrial control
  • Wireless terminals in wireless terminals in self-driving
  • wireless terminals in remote medical wireless terminals in smart grid
  • wireless terminals in transportation safety Wireless terminals in smart cities, wireless terminals in smart homes, etc.
  • the terminal equipment includes a remote terminal equipment (remote UE) and a relay terminal equipment (relay UE).
  • a relay UE can be understood as a UE that can directly access the network (or a base station); or, a relay UE can be understood as a UE that can be covered by a signal; or, a relay UE can be understood as a UE in the coverage area of the base station.
  • a relay UE can be understood as a UE with a relay function, where the relay function refers to a UE without signal coverage, and can access the operator's network through a relay UE with signal coverage.
  • the remote UE can be understood as a UE that cannot be covered by the signal. In other words, the remote UE needs to rely on a relay UE to be able to access the network.
  • the network architecture includes UE1, UE2, and UE3, and the UE1, UE2, and UE3 belong to the same ProSe group.
  • UE1 and UE2 can be understood as remote UEs
  • UE3 can be understood as relay UEs.
  • the remote UE can access the operator's network through a relay UE, perform a registration process, or establish a protocol data unit (protocol data unit, PDU) session, send user data, and so on.
  • the relay UE can establish a communication connection with the remote UE to provide services for the remote UE to access the network.
  • the remote UE can use Internet services, use the call function, and so on through the relay UE.
  • the remote UE and the relay UE may communicate through proximity-based services (Proximity-based services, ProSe).
  • ProSe proximity-based services
  • the short-distance-based service may include a device-to-device (D2D) service or a vehicle-to-everything (V2X) service and so on.
  • D2D device-to-device
  • V2X vehicle-to-everything
  • the relay UE may also be referred to as a UE-to-network relay.
  • (Radio) access network ((radio) access network, (R) AN) 120 used to provide network access functions for authorized terminal equipment in a specific area, and can use different quality transmissions according to the level of terminal equipment, business needs, etc. tunnel.
  • (R)AN can manage wireless resources, provide access services for terminal devices, and then complete the forwarding of control information and/or data information between the terminal device and the core network (CN).
  • the access network device in the embodiment of the present application is a device that provides a wireless communication function for terminal devices, and may also be referred to as a network device.
  • the access network equipment may include: next generation node base station (gNB) in 5G system, evolved node B (evolved node B, eNB) in long term evolution (LTE), wireless Network controller (radio network controller, RNC), node B (node B, NB), base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved nodeB) , Or home node B (HNB), base band unit (BBU), transmission point (transmitting and receiving point, TRP) (or called transmission receiving point), transmission point (TP), small base station equipment (pico), mobile switching center, or network equipment in the future network.
  • gNB next generation node base station
  • eNB evolved node B
  • LTE long term evolution
  • RNC wireless Network controller
  • node B node B
  • BSC base station controller
  • the user plane function (UPF) network function 130 is used for packet routing and forwarding, quality of service (QoS) processing of user plane data, and so on.
  • QoS quality of service
  • the data network (DN) network function 140 is used to provide a data transmission network.
  • Access and mobility management function (AMF) network function 150 can be used to implement mobility management entity (mobility management entity, MME) functions except session management Other functions, such as lawful interception and access authorization/authentication functions.
  • MME mobility management entity
  • the AMF network function is hereinafter referred to as AMF.
  • the AMF network function includes a remote AMF and a relay AMF.
  • the remote AMF is: an AMF used to provide services for a remote UE;
  • the relay AMF is: a relay AMF is used to provide services for a relay UE AMF.
  • the session management function (SMF) 160 is mainly used for session management, terminal device Internet protocol (IP) address allocation and management, selection of manageable user plane functions, policy control and charging function interfaces End point and downlink data notification, etc.
  • IP Internet protocol
  • the policy control network function 170 such as a policy control function (PCF) is a unified policy framework used to guide network behavior, and provides policy rule information for control plane functions (such as AMF, SMF network functions, etc.).
  • PCF policy control function
  • the authentication server function (authentication server function, AUSF) 180 is used for authentication services, generating keys to implement two-way authentication for terminal devices, and supporting a unified authentication framework.
  • the unified data management (UDM) network function 190 can be used to process terminal device identification, access authentication, registration, and mobility management. It can be understood that the UDM network function is hereinafter referred to as UDM for short.
  • the application function (AF) 1100 is used for data routing affected by applications, access to network opening functions, and interaction with the policy framework for policy control.
  • the network slice selection function can be used to determine network slice instances, select AMF network functions, and so on.
  • Network storage network functions such as including network repository function (NRF) can be used to maintain real-time information of all network functions and services in the network.
  • NRF network repository function
  • the network architecture shown in FIG. 1 may also include a ProSe function, and the ProSe function may be used to perform the management and control of the ProSe service, and so on.
  • the mobility management network function in the embodiment of the present application may be the AMF network function 150 shown in FIG. 1, or may be other network functions having the aforementioned AMF network function 150 in the future communication system.
  • the mobility management network function in this application may also be a mobility management entity (MME) in long term evolution (LTE), etc.
  • MME mobility management entity
  • the AMF network function 150 is referred to as AMF for short, and the terminal device 110 is referred to as UE. That is, the AMF described later in the embodiments of this application can be replaced with mobility management network functions or core network equipment, and the UE can be either Replace with terminal equipment.
  • the network architecture shown in Figure 1 (such as the 5G network architecture) adopts a service-based architecture.
  • the traditional network element functions (or network functions) are split into several self-contained, self-contained, network functions based on network function virtualization (NFV) technology.
  • NFV network function virtualization
  • Self-management and reusable network function service modules can realize customized network function reconstruction through flexible definition of service module collections, and form business processes through a unified service call interface externally.
  • the schematic diagram of the network architecture shown in FIG. 1 can be understood as a schematic diagram of a service-based 5G network architecture in a non-roaming scenario. For roaming scenarios, the embodiments of this application are also applicable.
  • the aforementioned network function or function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
  • the remote terminal device is UE1
  • the relay terminal device is UE2
  • the AMF that provides services for the remote terminal device is AMF1, which provides services for the relay terminal device.
  • the AMF is AMF2
  • the access network equipment is RAN.
  • FIG. 3 is a schematic flowchart of a method for determining an authorization result provided by an embodiment of the present application. This method can be applied to the network architecture shown in FIG. 1 and/or FIG. 2. As shown in Figure 3, the method includes:
  • the RAN receives a first message sent by UE2, where the first message is used to instruct UE1 to request access to the network through UE2, and the first message includes identification information of UE2.
  • the identification information of UE2 is included in the first message, so that after receiving the first message, the RAN knows that UE1 requests to access the network through UE2.
  • the identification information of UE2 may include an identifier (identifier, ID) of UE2.
  • the ID of the UE2 may include the permanent identity of UE2, such as the international mobile subscriber identity (IMSI), the subscription permanent identifier (SUPI), the subscriber encapsulated identifier (SUCI) or general public subscription. Any one or more of ID (generic public subscription identifier, GPSI).
  • ID of the UE2 may include the temporary identity of the UE2, such as a globally unique temporary UE identity (GUTI).
  • GUI globally unique temporary UE identity
  • the ID of the UE2 may also include the relay ID of the UE2; the relay ID of the UE2 may be the UE identification of the relay service, or the relay ID of the UE2 may be the UE identification of the ProSe service.
  • the identification information of UE2 may include any one or more of IMSI, SUPI, SUCI, GPSI, or relay ID of UE2. It can be understood that, in order to distinguish the permanent identity, temporary identity, and relay identity of UE2, the identification information of UE2 in the following description is UE2's ID and/or UE2's relay ID.
  • the first message may also include the identification information of UE1.
  • the identification information of the UE1 may include the ID of the UE1, and the ID of the UE1 may include the permanent identification of the UE1, such as any one or more of the IMSI, SUPI, and SUCI of the UE1.
  • the ID of the UE1 may include the temporary identification of the UE1, such as the GUTI of the UE1.
  • the ID of the UE1 may also include the remote ID of the UE1.
  • the RAN can know which UE (such as UE1) needs to access the network through UE2.
  • the identification information of UE1 may include IMSI, SUPI, SUCI, GPSI, etc.
  • the identification information of UE1 in the following description is the ID of UE1 and/or the remote ID of UE1.
  • the remote ID of UE1 and the relay ID of UE2 can be configured by the short-distance service function. That is, the identification information related to the service can be configured by the short-distance service function.
  • the specific format of the identification information related to the service is not limited in the embodiment of the present application.
  • the first message may be a message sent by UE1 to the RAN through UE2; or, the first message may be a message sent by UE2 to the RAN.
  • the first message is a message sent by UE2 to the RAN, which can be understood as: UE1 sends a fourth message to UE2; then, after UE2 receives the fourth message, it parses the fourth message and generates the first message.
  • one processing method of parsing is to encapsulate the fourth message in the first message, so that the UE2 sends the first message to the RAN.
  • the identification information of UE2 may be carried in the fourth message itself, or may be encapsulated in the first message together with the fourth message after UE2 receives the fourth message.
  • the identification information of UE1 may be carried in the fourth message itself.
  • the method shown in FIG. 3 will be described by taking the first message as an example that the UE2 sends to the RAN.
  • step 302 the method shown in FIG. 3 further includes:
  • UE1 sends a fourth message to UE2, where the fourth message is used to request access to the network, and the fourth message includes identification information of UE1; correspondingly, UE2 receives the fourth message.
  • UE2 when UE2 receives the fourth message, it can encapsulate the identification information of UE1 in the first message, so as to send the first message to the RAN.
  • the fourth message when the UE2 receives the fourth message, the fourth message may be encapsulated in the first message, so as to send the first message to the RAN.
  • the fourth message may also include a non-access stratum (NAS) request.
  • the NAS request may include a registration access request and so on.
  • UE2 may encapsulate the NAS request in the first message, or encapsulate the fourth message in the first message, so as to send the first message to the RAN.
  • the NAS request may also be a normal uplink NAS message.
  • the fourth message includes the NAS request and the identification information of UE1, and UE2 receives the fourth message, and may encapsulate the NAS request and the identification information of UE1 in the first message.
  • the first message is sent to the RAN.
  • the first message may also include first indication information (indicator), and the first indication information is used to indicate that the data contained in the first message is for the remote UE of the relay. Data; or, the first indication information is used to indicate that the first message includes information in the fourth message from UE1.
  • the first indication information may be included in the NAS request, or the first indication information may be information encapsulated in the first message together with the fourth message when the UE2 receives the fourth message.
  • the method shown in FIG. 3 further includes: AMF1 checks UE1 to determine the authorization result of UE1.
  • the authorization result of the UE1 includes the result of whether the UE1 is applicable to the ProSe service, and/or the result of whether the UE1 is authorized to perform the remote UE service.
  • the method for the AMF1 to verify the UE can perform the verification according to the subscription information of the UE1.
  • the AMF1 obtains the subscription information of the UE1, this embodiment of the application does not limit it.
  • the subscription information may be acquired by AMF1 from UDM, or the subscription information may also be acquired by AMF1 from the short-distance service function.
  • the AMF1 may also obtain second indication information from the UDM or the short-distance service function, and the second indication information is used to indicate the authorization result of the UE1.
  • the RAN determines the authorization result of the UE2 according to the identification information of the UE2; and sends a second message to the AMF1; the second message includes the authorization result of the UE2.
  • AMF1 receives the second message.
  • the authorization result of the UE2 may include the result of whether the UE2 is applicable to the ProSe service, and/or the result of whether the UE2 is authorized to perform the relay service.
  • the authorization result of UE2 may include the result that UE2 is authorized to perform the relay service.
  • the authorization result of the UE2 may include the application of the ProSe service to the UE2 and the result of the UE2 being authorized to perform the relay service.
  • the authorization result of the UE2 may include the result that the UE2 applies the ProSe service and the UE2 is not authorized to perform the relay service.
  • the UE2 being authorized to perform the relay service can also be understood as: the UE2 can be authorized to perform the relay function; alternatively, the UE2 can be the relay node of the remote UE. And the UE2 is authorized to perform the relay service, which may also indicate that the UE2 applies the ProSe service.
  • the RAN may determine whether the UE2 is authorized to perform the relay service according to stored information, and the stored information includes the identification information of the UE2 and the authorization result of the UE2.
  • the authorization result of the UE2 may be sent by AMF2 to the RAN voluntarily, so that the RAN saves it.
  • the authorization result of the UE2 may also be stored by the RAN by requesting the AMF2 to send the authorization result by the RAN.
  • the RAN may also request the authorization result from AMF2 after receiving the second message.
  • the details can be as follows:
  • the RAN sends a third message to AMF2, the third message includes the identification information of UE2, and the third message is used to request the authorization result of UE2.
  • the AMF2 receives the third message.
  • the AMF2 sends a response message of the third message to the RAN.
  • the RAN receives the response message of the third message sent by the AMF2.
  • the embodiment of the present application does not limit how the RAN determines AMF2.
  • the temporary identity of UE2 includes the address of AMF2, or the RAN can determine AMF2 according to the network information in the identity information of UE2.
  • the AMF2 after the AMF2 receives the third message for requesting the authorization result of the UE2, it can send the authorization result of the UE2 to the RAN.
  • the response message of the third message may include the authorization result of the UE2.
  • the response message of the third message may also include the identification information of UE2.
  • Step 3031) and step 3032) may be the third message sent by the RAN to the AMF2 to determine the authorization result of the UE2 after the RAN receives the first message of the UE2.
  • the response message of the third message may also include rejection information, and the rejection information may be used to indicate that UE1 is denied access to the network through UE2.
  • the response message of the third message may also include a rejection type, and the rejection type is used to indicate that the UE2 is not authorized to perform a relay function. Further, in the case that the RAN determines that the UE2 is not authorized to perform the relay service according to the identification information of the UE2, the RAN may discard the first message.
  • the method shown in step 3031) and step 3032) may also be a third message sent by the RAN to the AMF2 in order to determine the authorization result of the UE2 before receiving the first message.
  • the RAN can save the authorization result of UE2 after receiving the authorization result of UE2. Therefore, after receiving the first message, the authorization result of the UE2 can be sent to the AMF1.
  • the third message can be a message from UE2; alternatively, it can be a message sent by UE2 to the RAN, and then sent to the AMF2 through the RAN; or, it can also be sent by UE1 to UE2, and then UE2 through RAN Message sent to this AMF2. It can be understood that by including the identification information of the UE2, the AMF2 can clearly know the UE (such as UE2) requesting authorization of the relay service.
  • the third message may be understood as: the third message is used to request authorization for the relay service of UE2.
  • the third message can be applied to the following scenario: UE1 notifies UE2 to request access to the network, and UE2 requests AMF2 to authorize its own relay service.
  • the method shown in the embodiment of the present application may further include: 3033) the AMF2 verifies the UE2 to determine the authorization result of the UE2.
  • the AMF2 may determine the authorization result of the UE2 according to the subscription information of the UE2. For example, the AMF2 may obtain the subscription information of the UE2 from UDM, or the AMF2 may also obtain the subscription information of the UE2 from the ProSe function. Alternatively, the AMF2 sends a message for requesting the authorization result of UE2 to the proximity service function; after receiving the message, the proximity service function stores UE2 subscription information in UDM or unified data repository (UDR), etc. The entity requests subscription information.
  • the contract information can be issued by the operator's network and stored in the UDM or short-distance service function.
  • the AMF2 may also obtain third indication information from the UDM or the short-distance service function, and the third indication information is used to indicate the authorization result of the UE2. That is, the third indication information may be used to indicate whether the UE2 is authorized to perform the ProSe service and/or whether it is authorized to perform the relay function of the ProSe service.
  • AMF1 sends a response message of the second message to the RAN.
  • the RAN receives the response message of the second message sent by the AMF1.
  • the second message may include the authorization result of UE2, and may also include part or all of the information in the first message.
  • the second message may also include part or all of the information in the fourth message.
  • UE2 after UE2 receives the fourth message, it can encapsulate the fourth message in the first message; thereby sending the first message to the RAN, the RAN receives the first message, and encapsulates the first message in the second message ; Then send the second message to AMF1.
  • UE2 receives the fourth message, and encapsulates the non-access stratum request in the fourth message in the first message, thereby sending the first message to the RAN.
  • the RAN receives the first message, and encapsulates the identification information of the UE2 in the first message in the first message, thereby sending the second message to AMF1. It can be understood that the embodiment of the present application does not limit the manner in which the message is generated. For another example, if the RAN receives a first message, and the first message includes the first indication information, the RAN may encapsulate the first indication information in a second message, so as to send the second message to AMF1. By including the first indication information in the second message, the AMF1 can receive the first indication information and verify the relay service of the UE2.
  • the response message of the second message includes a non-access stratum (NAS) message sent to UE1.
  • the NAS message may be used to respond to the NAS request included in the fourth message.
  • the NAS message may also have integrity protection, that is, it can be a NAS message after NAS activation, or a NAS security mode instruction message, and so on. By performing integrity protection on the NAS, other attackers can be prevented from modifying the content in the response message of the second message.
  • the response message of the second message may be used to indicate that AMF1 has processed the NAS request sent by UE1 to UE2.
  • the response message of the second message includes a NAS message
  • it may also indicate that AMF1 has processed the NAS request sent by UE1, which indicates that AMF1 authorizes UE1 to access the network through UE2.
  • AMF1 informs UE1 that the UE2 it accesses is authorized to use the ProSe service and/or relay function by sending a NAS message carrying the authorization result of UE2 to UE1.
  • the response message of the second message may also include the authorization result of UE1.
  • AMF1 after AMF1 receives the second message, it can also verify the relay service of UE2. If the check is passed, AMF1 sends a response message of the second message to the RAN. The response message of the second message is used to indicate that UE1 is allowed to access the network through UE2. If the check fails, AMF2 may discard the second message; or, the response message of the second message may be used to indicate that UE1 is denied access to the network.
  • the method for the AMF1 to verify the relay service of the UE2 such as: the AMF1 judges whether the identification information of the UE2 included in the message for requesting access to the network is consistent with the identification information of the UE2 included in the second message ; If they are consistent; AMF1 can determine that UE1 can access the network through UE2; if they are not consistent, AMF1 can determine that the relay UE requested by UE1 and the relay UE authorized by the RAN are not the same UE, then the AMF1 can discard the second news.
  • the response message of the second message may include rejection information or rejection reason, and so on.
  • the RAN sends a response message of the first message to UE2, where the response message of the first message is used to indicate that UE1 is allowed to access the network through UE2.
  • the UE2 receives the response message of the first message.
  • the response message of the first message may include the authorization result of UE1. If UE1 is not authorized to perform remote UE functions and/or short-distance communication service functions, UE2 can reject UE1's access, disconnect the connection or send a rejection message to UE1.
  • the rejection message may also include a rejection identifier, which is used to indicate that the UE1 is not authorized to perform the function of the remote UE and/or the short-distance communication service function.
  • the response message of the first message may be the response message of the second message of AMF1 forwarded by the RAN.
  • the response message of the first message may also include the authorization result of UE2.
  • the response message of the first message may include part or all of the information in the response message of the second message, part or all of the information in the second message, part or all of the information in the first message, and part of the fourth message. Or any one or more of all the information.
  • the response message of the first message refer to the description of the response message of the fourth message or the second message for analogy, which will not be repeated here.
  • the method shown in FIG. 3 may further include:
  • UE2 sends a response message of the fourth message to UE1.
  • the UE1 receives the response message of the fourth message.
  • the response message of the fourth message may include the authorization result of UE2, part or all of the information in the response message of the first message, part or all of the information in the response message of the second message, and part of the second message. Or any one or more of all the information, part or all of the information in the first message, and part or all of the information in the fourth message.
  • the response message of the fourth message refer to the description of the response message of the second message for analogy, which will not be repeated here.
  • the response message of the fourth message may include a non-access stratum (NAS) message sent by AMF1 to UE1, and the NAS message includes information indicating whether UE2 is authorized to perform the relay function. Through the indication information, the UE1 can determine whether the accessing UE2 is authorized.
  • NAS non-access stratum
  • step 303 can be replaced with:
  • the RAN sends a fifth message to AMF2, the fifth message is used to request the authorization result of UE2, and the fifth message includes the address of AMF1 and identification information of UE2.
  • the AMF2 receives the fifth message.
  • AMF2 sends a response message of the fifth message to AMF1, and the response message of the fifth message includes the authorization result of UE2 and the identification information of UE2.
  • AMF1 receives the response message of the fifth message.
  • the AMF2 can determine the authorization result of the UE2 according to the identification information of the UE2.
  • the address of AMF1 included in the fifth message can be used to instruct AMF2 to send the authorization result of UE2 to AMF1.
  • the RAN can determine the address of AMF2 according to the identification information of UE2, and determine the address of AMF1 according to the identification information of UE1. Therefore, by sending the address of AMF1 to AMF2, AMF2 can directly send the authorization result of UE2 to AMF1. It is understandable that AMF2 may directly send a response message of the fifth message to AMF1, and may also send a response message of the fifth message to AMF1 through other network elements.
  • the RAN determines that UE2 is authorized to perform the relay service, and then sends a second message including the authorization result of UE2 to AMF1, so that the AMF1 can be based on the UE2's authorization result.
  • the authorization result allows UE1 to access the network through UE2.
  • Implementing the embodiments of this application can enable AMF1 to obtain the authorization result of UE2, thereby allowing UE1 to access the network through UE2 in time.
  • FIG. 4 is a schematic diagram of a scenario of a method for determining an authorization result provided by an embodiment of the present application. As shown in Figure 4, the method includes:
  • UE2 accesses AMF2 through RAN, completes the network registration process, and accesses the operator network.
  • UE1 accesses AMF1 through RAN, completes the network registration process, and accesses the operator network.
  • the UE2 determines whether the UE2 applies the ProSe service through the AMF2 or the ProSe function. And the UE1 determines whether the UE1 is applicable to the ProSe service through the AMF1 or the ProSe function.
  • AMF2 may obtain UE2's subscription information from UDM, and determine whether the UE2 can use the ProSe service according to the UE2's subscription information, and/or determine whether the UE2 can perform the relay service.
  • AMF2 may obtain UE2's subscription information and so on from the short-distance service function.
  • the above step 403 may also be implemented when the UE2 accesses the AMF2 and performs the registration procedure.
  • AMF2 can obtain the subscription information of UE2 from the UDM or short-range service function according to the request of UE2 to determine whether the UE2 can be authorized to perform the ProSe service, or to determine whether the UE2 is authorized to perform the service Following the business. Then obtain the authorization result of the UE2.
  • the AMF2 can also save the authorization result of the UE2, such as saving the UE2 ID and the authorization result of the UE2, or save the relay ID of the UE2 and the authorization result of the UE2.
  • the AMF1 may also obtain the subscription information of the UE1 from the UDM or the short-distance service function according to the registration request of the UE1. Therefore, the AMF1 determines whether the UE1 can use the ProSe service, and/or determines whether the UE1 can perform the service of the remote UE, and then obtains the authorization result of the UE1. And the AMF1 can also save the authorization result of the UE1, such as saving the UE1 ID and the authorization result of the UE1, or saving the remote ID of the UE1 and the authorization result of the UE1.
  • UE1 executes the discovery process.
  • UE1 performs the discovery process, which can be understood as: UE1 discovers that it can access the network through UE2. Alternatively, it can also be understood as: UE1 finds that the distance to UE2 is closer than the distance to the base station. For example, UE1 may determine that UE2 is a relay UE by receiving a broadcast message of UE2.
  • UE1 sends an indirect communication request to UE2, where the indirect communication request includes UE1 ID and/or remote ID.
  • the UE2 receives the indirect communication request.
  • the UE2 sends a relay service request (relay UE service request) to the AMF2 through the RAN.
  • the relay service request includes the UE2 ID and/or the UE2 relay ID.
  • AMF2 receives the relay service request.
  • the relay service request may also include the ID of UE1 and/or the remote ID of UE1.
  • relay service request in step 406 can be understood as the third message in step 3031) shown in FIG. 3.
  • AMF2 checks UE2 to determine the authorization result of UE2.
  • the AMF2 can verify whether the UE2 is authorized to perform the relay function; or, the AMF2 can also verify whether the UE2 is authorized to perform the relay service function of the remote UE through the relay UE.
  • AMF2 may determine the authorization result of UE2 according to locally stored information.
  • the AMF2 may obtain the authorization result of the UE2 from the UDM or the short-distance service function.
  • AMF2 sends an NG interface application protocol (NG application protocol, NGAP) message to the RAN, where the NGAP message includes proximity authorization indication (ProSe authorized) information.
  • NGAP NG interface application protocol
  • the RAN receives the NGAP message and saves the short-range authorization instruction.
  • the short-range authorization indication information is used to indicate that the UE2 non-access communication request is authorized.
  • the NGAP message may also include authorization success indication information, which is used to indicate that the UE2 is authorized to perform the relay function; or used to indicate that the remote UE is authorized to perform the relay service through the relay UE.
  • the NGAP message may also include UE2's ID and/or UE2's relay ID.
  • the NGAP message may also include the ID of UE1 and/or the remote ID of UE1.
  • the RAN may also store the UE2 ID and/or the relay ID of UE2, as well as the UE1 ID and/or the remote ID of UE1.
  • NGAP message in step 408 can be understood as a response message to the third message shown in FIG. 3.
  • the RAN sends a radio resource control (radio resource control, RRC) message to UE2.
  • RRC radio resource control
  • the RRC message includes short-range authorization indication information.
  • the UE2 receives the RRC message.
  • UE2 sends a response message to UE1.
  • response message is used to indicate that UE2 is allowed to use the indirect communication service.
  • the above steps 405-410 can be understood as the following scenario: if the UE1 informs the UE2 to request access to the network, the UE2 requests the AMF2 to authorize its own relay service.
  • the method shown in FIG. 4 may not include steps 406-409 and may not be done.
  • the UE2 may also send the identification information of the UE1 to the AMF1 through the RAN.
  • the AMF1 can determine whether the UE1 is authorized to use the short-range communication service and/or the remote service (that is, the function of the remote UE) according to the identification information of the UE1.
  • the authorization result of UE1 is sent to UE2. If the verification is successful, UE2 continues to perform; otherwise, UE2 interrupts the process or sends a rejection message to UE1.
  • the rejection message may also include a rejection indication, indicating that the UE1 is not authorized to use the near field communication service and/or the function of the remote UE.
  • UE1 sends a remote UE non-access request (remote UE NAS request) to UE2, where the remote UE non-access request includes UE1 ID and/or UE1's remote ID.
  • UE2 receives the remote UE non-access request.
  • the remote UE non-access request may also include UE2's ID and/or UE2's relay ID.
  • the UE2 ID and/or the relay ID of UE2 may be obtained by UE1 in step 404; or may be obtained in step 410, and so on.
  • the UE2 can also check whether it is in the same PLMN service network as the UE1; if it is not in the same PLMN service network, the process is interrupted or a rejection message is sent to UE1.
  • the rejection message may also include a rejection indication, indicating that UE1 and UE2 belong to different PLMN service networks.
  • the verification method here can be determined by the service network identifier carried in the identifier of UE1 or the service network identifier separately sent by UE1 to UE2 to compare whether it is the same as the service network accessed by UE2.
  • the remote UE non-access request can be understood as the fourth message in step 301 shown in FIG. 3.
  • UE2 sends an uplink RRC message to the RAN, where the uplink RRC message includes a non-access request.
  • the RAN receives the uplink RRC message.
  • uplink RRC message can be understood as the first message in step 301 shown in FIG. 3.
  • the RAN determines that UE2 is authorized to perform the relay service.
  • the method for the RAN to determine that the UE2 is authorized to perform the relay service can be determined according to the authorization result and the identification information saved by the RAN in step 408, for example.
  • the RAN sends an NGAP message to AMF1, where the NGAP message includes the authorization result of UE2 and the ID of UE2; or, the NGAP message includes the authorization result of UE2 and the relay ID of UE2.
  • the NGAP message also includes a non-access request.
  • the NGAP message can be understood as the second message in step 303 shown in FIG. 3.
  • AMF1 determines that UE2 is authorized to perform the relay service. For a specific authorization verification method, refer to the embodiment in FIG. 3.
  • AMF1 determines whether the UE2 ID in the NGAP message sent by the RAN is consistent with the UE2 ID in the remote UE non-access request sent by UE1; if they are the same, it is determined that the authorization of UE2 is successful; if they are inconsistent, UE1 is denied access Network request.
  • the AMF1 may also discard the NGAP message and so on.
  • AMF1 sends a downlink NAS message to UE1 through RAN and UE2, where the downlink NAS message is used to instruct UE1 to access the network through UE2 or to authorize UE2 to perform a relay service.
  • the downlink NAS message can be understood as a response message to the second message in step 304 shown in FIG. 3.
  • the downlink NAS message may be understood as the response message of the first message in step 305 shown in FIG. 3; or the response message of the fourth message in step 306.
  • the downlink NAS message also includes the UE2 ID and/or relay ID.
  • the UE1 determines the authorization to access the network according to the downlink NAS message.
  • the UE1 may also determine whether the relay ID of the UE2 in the downlink NAS message is consistent with the ID of the relay UE discovered in the discovery process. If they are consistent, it is determined to access the network; if they are inconsistent, the UE1 The process of accessing the network can also be interrupted; or another relay UE can be reselected to access the network.
  • the transfer of the authorization information of the UE2 is completed by the base station, which avoids the transfer of authorization parameters between AMFs and reduces the impact between AMFs.
  • steps 413-415 above can also be replaced with:
  • the RAN forwards the uplink RRC message sent by UE2 to AMF1.
  • the AMF1 receives the uplink RRC message.
  • AMF1 sends a request message to AMF2, and the request message is used to request the authorization result of UE2.
  • the AMF2 receives the request message.
  • the request message carries UE2 ID and/or relay ID.
  • the AMF1 may determine the address of the AMF2 according to the UE2 ID and/or the relay ID of the UE2 included in the uplink RRC message.
  • the AMF2 can determine whether the UE2 is authorized to perform the relay service according to the UE2 ID and/or the relay ID of the UE2. In the case that the AMF2 determines that the UE2 is authorized to perform the relay service, the AMF2 performs step 425).
  • AMF2 sends a response message of the request message to AMF1.
  • the AMF1 receives the response message of the request message.
  • the AMF1 determines that the UE2 is authorized to perform the relay service according to the response message of the request message.
  • steps 413-415 above can also be replaced with:
  • the RAN forwards the uplink RRC message sent by UE2 to AMF1.
  • the AMF1 receives the uplink RRC message.
  • AMF1 sends a request message to UDM or the short-distance service function, and the request message is used to request the authorization result of UE2.
  • the UDM or short-distance service function receives the request message.
  • the request message carries UE2 ID and/or relay ID.
  • the UDM or short-distance service function sends a response message of the request message to AMF1.
  • the AMF1 receives the response message of the request message.
  • the AMF1 determines that the UE2 is authorized to perform the relay service according to the response message of the request message.
  • the data transfer is completed through the interface between AMFs, which avoids the transfer of authorization parameters and the like through the base station.
  • the method shown in the embodiment of this application uses AMF2 as an example to verify whether UE2 is authorized to perform relay services or short-distance service functions; or AMF1 as an example to verify whether UE1 is authorized to perform remote services or short-distance services service function.
  • the above method may also be executed by SMF.
  • SMF1 Take SMF1 as an example to describe: Here, UE1 accesses SMF1 through UE2, RAN and AMF1. At this time, SMF1 checks whether UE2 can use the relay function. The specific method is as follows: AMF1 sends the authorization result of UE2 to SMF1; or, SMF1 is determined according to the identification information of UE2 (the specific confirmation method is the same as that determined by AMF2 according to the identification information of UE2); or SMF1 requests AMF2 and obtains it from AMF2. If SMF1 successfully verifies UE2, it sends a verification success indication to AMF1, and then AMF1 continues to execute other processes without restriction.
  • AMF1 sends the authorization result of UE2 to SMF1; or, SMF1 is determined according to the identification information of UE2 (the specific confirmation method is the same as that determined by AMF2 according to the identification information of UE2); or SMF1 requests AMF2 and obtains it from AMF2. If SMF1 successfully verifies UE2,
  • the embodiment of the present application also includes the following possibility. If the AMF1 successfully verifies the UE2, it may not send the UE2 authorization verification success indication to the RAN, or the UE2, or the UE1. AMF1 can normally perform UE1's business processes, such as UE1 registration, session establishment, and so on. The business process is not interrupted, which means that the authorization verification of UE2 is successful.
  • the embodiment of the present application also includes the following possibility. If the RAN verifies UE2 successfully, the UE2 authorization verification success indication may not be sent to UE2 or UE1.
  • the RAN can normally perform UE1's service procedures, such as UE1 registration, session establishment, and so on.
  • the business process is not interrupted, which means that the authorization verification of UE2 is successful.
  • FIG. 5 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the wireless communication device can be used to execute the method for determining the authorization result provided in this application. As shown in Figure 5,
  • the transceiver unit 501 is configured to receive a first message sent by a second terminal device, where the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes the second terminal device ’S identification information;
  • the processing unit 502 is configured to determine the authorization result of the second terminal device according to the identification information of the second terminal device;
  • the transceiver unit 501 is further configured to send a second message to the first core network device, the second message including the authorization result of the second terminal device; and also to receive a second message sent by the first core network device Response message.
  • the access network device stores the authorization result of the second terminal device.
  • the transceiver unit 501 is further configured to send a third message to the second core network device, the third message includes the identification information of the second terminal device, and the third message is used to request The authorization result of the second terminal device;
  • the transceiver unit 501 is further configured to receive a response message of the third message sent by the second core network device;
  • the processing unit 502 is also used to save the authorization result of the second terminal device.
  • the identification information of the second terminal device includes the relay identification of the second terminal device.
  • the transceiving unit 501 is further configured to send a response message of the first message to the second terminal device, and the response message of the first message is used to indicate that the first terminal device is allowed to pass through the second terminal device.
  • the terminal equipment is connected to the network.
  • the response message of the first message includes the authorization result of the second terminal device.
  • the processing unit 502 may be implemented by one or more processors, and the transceiver unit 501 may be implemented by a transceiver.
  • the processing unit 502 can be implemented by one or more processing circuits, and the transceiver unit 501 can be implemented by an interface circuit (or an input/output interface, a communication interface, an interface, etc.).
  • FIG. 6 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • the communication system can be used to implement the methods shown in FIG. 3 and FIG. 4.
  • the communication system includes:
  • the first core network device 601 is configured to receive a second message sent by the access network device, where the second message includes the authorization result of the second terminal device;
  • the first core network device 601 is further configured to determine that the second terminal device is authorized to perform the relay service according to the authorization result of the second terminal device;
  • the first core network device 601 is further configured to send a response message of the second message to the access network device.
  • system further includes:
  • the access network device 602 is configured to receive a first message sent by the second terminal device; where the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes Identification information of the second terminal device;
  • the access network device 602 is also used to determine that the second terminal device is authorized to perform a relay service, and send the second message to the first core network device.
  • the access network device 602 is further configured to send a third message to the second core network device, the third message includes the identification information of the second terminal device, and the third message is used To request the authorization result of the second terminal device;
  • the second core network device 603 is configured to receive the third message sent by the access network device, and send a response message of the third message to the access network device;
  • the access network device 602 is specifically configured to determine, according to the response message of the third message, that the second terminal device is authorized to perform the relay service.
  • the access network device 602 is also used to send a response message of the first message to the second terminal device, and the response message of the first message is used to instruct the first terminal device to allow passage through The second terminal device accesses the network.
  • the foregoing first core network device may include a processing unit and a transceiving unit, and the transceiving unit may be used to perform a method related to transceiving signals.
  • the transceiver unit may be used to receive a second message sent by an access network device, and send a response message of the second message to the access network device.
  • the processing unit may be configured to determine that the second terminal device is authorized to perform the relay service according to the authorization result of the second terminal device.
  • the processing unit is also used to verify the ProSe service of the first terminal device and so on.
  • the foregoing second core network device may include a processing unit and a transceiving unit.
  • the transceiver unit may be used to receive the third message sent by the access network device.
  • the transceiver unit is also configured to send a response message of the third message to the access network device.
  • the processing unit may be used to verify the terminal device and determine the authorization result of the second terminal device.
  • FIG. 7 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the communication device may be used as an access network device. In another embodiment, the communication device may be used as the first core network device. In another embodiment, the communication device can be used as a second core network device.
  • the specific implementation of the communication device can refer to the methods shown in FIG. 3 and FIG. 4.
  • the device 70 includes at least one processor 720 for implementing the implementation of this application.
  • the processing unit of the first core network device or the second core network device (not shown in the drawings) is implemented by a processor, and the transceiver unit is implemented by a transceiver, as shown in FIG. 7, the apparatus 70 includes at least one processing unit.
  • the device 720 is configured to implement the function of the first core network device or the second core network device in the method provided in the embodiment of the present application.
  • the device 70 may also include a transceiver 710.
  • the transceiver can be used to communicate with other devices through the transmission medium.
  • the processor 720 uses the transceiver 710 to send and receive data (such as sending and receiving messages, etc.), and is used to implement the method described in the foregoing method embodiment.
  • the device 70 may further include at least one memory 730 for storing program instructions and/or data.
  • the memory 730 and the processor 720 are coupled.
  • the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, and may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • the processor 720 may operate in cooperation with the memory 730.
  • the processor 720 may execute program instructions stored in the memory 730.
  • connection medium between the above-mentioned transceiver 710, the processor 720, and the memory 730 is not limited in the embodiment of the present application.
  • the memory 730, the processor 720, and the transceiver 710 are connected by a bus 740 in FIG. 7, and the bus is represented by a thick line in FIG. 7.
  • the connection mode between other components is only for schematic illustration. , Is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 7, but it does not mean that there is only one bus or one type of bus.
  • the processor may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which may implement or Perform the methods, steps, and logic block diagrams disclosed in the embodiments of the present application.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly embodied as execution and completion by a hardware processor, or execution and completion by a combination of hardware and software modules in the processor.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM
  • the present application also provides a computer program product, the computer program product includes: computer program code, when the computer program code runs on a computer, the computer executes FIG. 3 and/or FIG. 4 shows the method in the embodiment.
  • the present application also provides a computer-readable medium that stores program code, and when the program code runs on a computer, the computer executes FIG. 3 and/or FIG. 4 shows the method in the embodiment.
  • the present application also provides a computer program that can be used to execute the method in the embodiment shown in FIG. 3 and/or FIG. 4.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc, SSD)) etc.
  • component used in this specification are used to denote computer-related entities, hardware, firmware, a combination of hardware and software, software, or software in execution.
  • the component may be, but is not limited to, a process, a processor, an object, an executable file, an execution thread, a program, and/or a computer running on a processor.
  • the application running on the computing device and the computing device can be components.
  • One or more components may reside in processes and/or threads of execution, and components may be located on one computer and/or distributed between two or more computers.
  • these components can be executed from various computer readable media having various data structures stored thereon.
  • the component can be based on, for example, a signal having one or more data packets (e.g. data from two components interacting with another component in a local system, a distributed system, and/or a network, such as the Internet that interacts with other systems through a signal) Communicate through local and/or remote processes.
  • a signal having one or more data packets (e.g. data from two components interacting with another component in a local system, a distributed system, and/or a network, such as the Internet that interacts with other systems through a signal) Communicate through local and/or remote processes.
  • this application also includes methods for authorizing UE1 to allow access to certain slices and/or sessions through relay UE2 .
  • FIG. 8 is a schematic diagram of a scenario of another authorization result determination method provided by this application. As shown in Figure 8, the method includes:
  • UE2 accesses AMF2 through RAN, completes the network registration process, and accesses the operator's network.
  • AMF2 stores UE2's subscription information. This subscription information is received from UDM when AMF2 sends a subscription data acquisition request to UDM during UE2 registration.
  • the UE2 subscription information includes the slice information that the UE2 is allowed to access; or the UE2 subscription information includes the slice information for which the UE2 is allowed to provide the service of the relay function.
  • the slice information here can be a slice identifier, or network slice selection assistance information (NSSAI), or single network slice selection assistance information (S-NSSAI), S-NSSAI, etc. Information or identification of the slice.
  • NSSAI network slice selection assistance information
  • S-NSSAI single network slice selection assistance information
  • Mode 1 is that UE2 broadcasts information.
  • UE1 uses the broadcast information of UE2 to determine to use the relay service provided by UE2, and then access UE2.
  • Mode 2 is that UE1 sends broadcast information to broadcast that it wants to use the relay service, and UE2 determines that it can provide the relay service for UE1, and then responds to UE1's broadcast information.
  • the method shown in FIG. 8 may further include step 801 and step 802.
  • UE2 serves as a relay to send broadcast information, where the broadcast information includes slice information 2 or the code of slice information 2.
  • Slice information 2 is used to indicate which slices UE2 can provide relay services for as a relay.
  • the coding of slice information 2 can also be broadcast here; but the receiver UE1 can determine the corresponding slice information 2 according to the coding of slice information 2.
  • the slice information 2 or the code of slice information 2 may also be carried in the relay service code of the broadcast message for transmission.
  • UE1 receives the broadcast information sent by UE2, and determines that it wants to access slice information 2 or the slice service corresponding to the code of slice information 2 through UE2, then UE1 sends SUCI1 and slice information 1 to UE2, where slice information 1 is UE1 hopes to pass.
  • the slice information corresponding to the accessed slice service can be sent to UE2 through a PC5 communication request.
  • the UE1 may determine the slice information 2 according to the encoding of the slice information 2.
  • the UE1 may preset a list of slice information 2 corresponding to the encoding of the slice information 2, or during the registration process, receive this list from the UDM through the AMF network element, and then determine the slice information 2.
  • the slice corresponding to the slice information 2 or the encoding of the slice information 2 may be the same as the slice corresponding to the slice information 1, or include the slice corresponding to the slice information 1.
  • slice information 2 includes 5 S-NSSAIs
  • slice information 1 is 1 of the above 5 S-NSSAIs.
  • step 801 is optional.
  • UE1 sends PC5 communication request information, which includes slice information 1 and SUCI1.
  • slice information 1 is slice information corresponding to the slice service that UE1 wants to access through the relay.
  • the UE2 determines that it can provide the relay service for the slice information 1 for the UE1, and then continues.
  • Optionally send a response that can provide a relay service to UE1.
  • UE2 sends a relay service request to AMF2, which includes SUCI1 and slice information 1, where SUCI1 and slice information 1 are information corresponding to remote UE1.
  • UE2 determines whether to provide a relay service for the slice corresponding to slice information 1.
  • UE2 may save the slice information configured to UE2 by the network to allow UE2 to provide relay services. According to the saved slice information, UE2 can determine whether to provide a relay service for slice information 1 sent by UE1. If the service can be provided, continue execution; otherwise, send a rejection message to UE1.
  • UE2 also sends a relay indication 1 to tell AMF2 that this service request is a relay service request.
  • the foregoing relay service request is a special request message type that can be used to instruct UE2 to perform a message sent by the relay function.
  • SUCI1 and slice information 1 can be placed in a special container and sent to AMF2.
  • This container is used to indicate that it is the container sent by the UE2 performing the relay function, which includes the SUCI1 and slice information 1 of the remote UE1.
  • AMF2 can be the AMF2 that saves UE2's subscription information in step 800; or a new AMF, but can request the AMF2 that saves UE2's subscription information, and obtain UE2's subscription information.
  • AMF2 is used here.
  • the AMF2 determines according to the relay indication 1 that the message 803 is a message sent by the UE2 performing the relay function; then the following verification in step 804 is triggered.
  • step 804 can also be replaced with: AMF2 determines according to the message type of the relay service request that it is a message sent by UE2 performing the relay function; then the following verification is triggered.
  • step 804 can also be replaced with: AMF2 determines according to a special container that it is the container sent by UE2 performing the relay function; then the following verification is triggered.
  • AMF2 determines whether UE2 can provide a relay service for slice information 1 according to UE2's subscription information. Specifically, AMF2 determines whether slice information 1 is one of the slice information that UE2 is allowed to access in the subscription information of UE2; and/or one of slice information that allows UE2 to serve as a relay function in the UE2 subscription information. If the slice information 1 meets the above-mentioned first checksum/or the second check, AMF2 continues to execute; otherwise, AMF2 sends a rejection message to UE2.
  • the optional rejection message carries a rejection indication, which is used to indicate that UE2 is not allowed to provide a relay service for slice information 1.
  • UE2 After UE2 receives the rejection message sent by AMF2, it sends a PC5 communication rejection message to UE1, rejecting UE1 to use the relay function of UE2.
  • the optional rejection message carries a rejection indication, which is used to indicate that UE2 cannot provide a relay service for slice information 1.
  • AMF2 continues to execute. AMF sends an authentication request to AUSF, which includes SUCI1.
  • AUSF obtains the authentication vector of SUCI1 corresponding to UE1 and SUPI1 (ie, SUPI of UE1) from UDM, which is the identifier of UE1 corresponding to SUPI1 after SUPI1 is decrypted by SUCI1.
  • AUSF and UE1 perform authentication through UE2, RAN and AMF2.
  • AUSF After the authentication is successful, AUSF sends an authentication response to AMF2, which carries SUPI1.
  • the authentication methods shown in steps 805-807 provided in the embodiments of the present application are not limited.
  • the authentication method may be executed according to the current 5G authentication process. Or, it can be implemented in accordance with relevant standards or agreements.
  • AMF2 sends a subscription data acquisition request, which carries SUPI1.
  • SUPI2 can also be carried.
  • SUPI2 may be the permanent identifier of UE2 saved by AMF2 in step 800.
  • AMF2 can also send slice information 1.
  • AMF2 may also send a relay service indication 2 indicating that this is a request for subscription information corresponding to the remote UE1, that is, the subscription information corresponding to SUPI1; or indicating that this is a request for performing authorization determination of the remote UE1, such as slice information 1. Whether it is authorized or not.
  • UDM determines UE1 subscription information according to SUPI1, and sends UE1 subscription information to AMF2 through a subscription data acquisition response message.
  • the UE1 subscription information includes at least one of the slice information that UE1 is allowed to access, the slice information that UE1 is allowed to access as a remote UE, whether it is allowed to use remote UE services, and whether the slice information to which it belongs needs to perform slice authentication.
  • the UDM receives the relay service indication 2 and SUPI2, and determines according to the relay service indication 2 that this is a request for subscription information corresponding to the remote UE1, that is, the subscription information corresponding to SUPI1; or indicates that this is to perform the authorization of the remote UE1 Determine the request, and then determine whether the UE corresponding to SUPI2 (such as UE2) is allowed to perform the relay function. This can be determined based on the contract information corresponding to SUPI2. If the relay function is allowed, the subscription information of UE1 is determined according to SUPI1.
  • the UDM receives the relay service indication 2 and determines that this is the subscription information corresponding to the remote UE1 requested by the AMF2, that is, the subscription information corresponding to the SUPI1; then the UE1 subscription information is determined.
  • the UDM receives the relay service indication 2 and determines that this is the authorization determination request of the remote UE1, such as the authorization determination of the slice information 1.
  • the UE1 subscription information is first determined according to SUPI1, and then the UDM determines whether the slice information 1 is UE1 One of the slice information that the UE1 is allowed to access in the subscription information; determine whether the slice information 1 is one of the slice information that the UE accesses as a remote UE; or determine whether the UE1 is allowed to use the remote UE service. If at least one of the above judgments is passed, an indication that the authorization judgment is successful is sent to AMF2, and AMF executes step 811. Otherwise, UDM sends an indication of authorization failure to AMF2.
  • AMF2 can send a rejection message to UE2.
  • the optional rejection message carries a rejection indication, which is used to indicate that the UE1 is not allowed to access the slice service corresponding to the slice information 1, or the remote UE serves.
  • UE2 After UE2 receives the rejection message sent by AMF2, it sends a PC5 communication rejection message to UE1, rejecting UE1 to use the relay function of UE2.
  • the rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1.
  • UDM optionally does not need to send UE1 subscription information to AMF2.
  • the method shown in FIG. 8 may further include step 810 and subsequent steps shown below.
  • AMF2 determines whether slice information 1 is one of the slice information that UE1 is allowed to access in the UE subscription information.
  • the AMF2 may also determine whether the slice information 1 is one of the slice information that the remote end allows the UE to access as UE1;
  • AMF2 determines whether UE1 is allowed to use remote UE services
  • AMF2 After the above AMF2 verification is passed, if all three conditions in the above 810 are passed (if all are yes), and if any one or two conditions in the above 810 are passed, AMF2 continues to execute . Otherwise, AMF2 sends a rejection message to UE2.
  • the optional rejection message carries a rejection indication, which is used to indicate that the UE1 is not allowed to access the slice service corresponding to the slice information 1, or the remote UE serves.
  • UE2 After UE2 receives the rejection message sent by AMF2, it sends a PC5 communication rejection message to UE1, rejecting UE1 to use the relay function of UE2.
  • the rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1.
  • the AMF2 determines whether the service corresponding to the slice information 1 needs to perform slice authentication according to the subscription information of the UE1. If slice authentication needs to be performed, a slice authentication process is triggered, and slice authentication between UE1 and AMF2, network slice specific authentication and authorization (NSSAAF) and AAA is completed. If AMF2 determines that the slice authentication is successful, it continues; otherwise, AMF2 sends a rejection message to UE2.
  • the optional rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1, or the remote UE serves. After UE2 receives the rejection message sent by AMF2, it sends a PC5 communication rejection message to UE1, rejecting UE1 to use the relay function of UE2.
  • the rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1.
  • the action of AMF2 to verify UE2 can also be executed in this step.
  • the embodiment of the present application does not limit the sequence of step 804 and step 810.
  • AMF2 sends an authorization result to UE2.
  • the authorization result includes whether UE1 is allowed to access the slice service corresponding to slice information 1 through UE2; or whether UE1 is allowed to use the slice corresponding to slice information 1.
  • the above authorization result may not be sent. If AMF2 does not send a rejection message to UE2, it can also mean that the authorization verification of AMF2 has passed.
  • the authorization result indicates that UE1 is authorized to access the slice service corresponding to slice information 1 through UE2, or is authorized to use the slice service corresponding to slice information 1, continue execution. Otherwise, send a rejection message to UE1.
  • the optional rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1.
  • UE2 sends a PC5 communication response message to UE1. If UE1 does not receive the PC5 communication rejection message, it means that the slice information 1 of UE1 has passed the verification.
  • the above-mentioned slice information 2 may also be data network name (data network name, DNN) information.
  • DNN information is used to indicate the information of the DNN network that UE1 wants to access through UE2.
  • the authorization check of whether the UE1 is allowed to access the DNN through the relay UE2 is similar to the check of the slice information described above, and will not be repeated.
  • the communication device provided in the embodiment of the present application may also be used to execute the method shown in FIG. 8, which will not be described in detail here.

Abstract

Disclosed are a method and device for determining an authorization result, comprising: an access network device receives a first message transmitted by a second terminal device, the first message being used for instructing a first terminal device to request access to a network via the second terminal device, and the first message comprising identification information of the second terminal device; the access network device determines an authorization result of the second terminal device on the basis of the identification information of the second terminal device; the access network device transmits a second message to a core network device, the second message comprising an authorization result of the second terminal device; and the access network device receives a response message transmitted by the first core network device for the second message. The implementation of the present application effectively determines a relay service of a relay terminal device, thus preventing a terminal device from accessing a network via an unauthorized relay terminal device.

Description

授权结果的确定方法及装置Method and device for determining authorization result
本申请要求于2019年12月31日提交中国专利局、申请号为201911425151.0、申请名称为“授权结果的确定方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on December 31, 2019, the application number is 201911425151.0, and the application name is "Method and Apparatus for Determining Authorization Results", the entire content of which is incorporated into this application by reference .
技术领域Technical field
本申请涉及通信技术领域,尤其涉及一种授权结果的确定方法及装置。This application relates to the field of communication technology, and in particular to a method and device for determining an authorization result.
背景技术Background technique
随着通信技术的演进,万物互联也在不断加速,万物互联的技术不仅包括窄带物联网(narrow band internet of things,NB-LOT)技术和增强机器类通信(enhanced machine type communication,eMTC)技术,还可包括物联物、端到端(device to device,D2D)技术等等。With the evolution of communication technology, the Internet of Everything is also accelerating. The Internet of Everything technology includes not only narrowband internet of things, NB-LOT) technology and enhanced machine type communication (eMTC) technology, It may also include IoT, end-to-end (device to device, D2D) technology, and so on.
一般的,物联物或端到端的技术,也可以称为基于近距离的业务(proximity-based services,ProSe)。基于该ProSe一个终端设备可以通过另一个终端设备与网络进行通信。例如,一个终端设备通过另一个终端设备,可以接入到运营商网络中,从而执行注册流程、发送数据等业务。其中,该另一个终端设备也可以称为中继终端设备。Generally, IoT or end-to-end technology can also be referred to as proximity-based services (Proximity-based services, ProSe). Based on the ProSe, a terminal device can communicate with the network through another terminal device. For example, one terminal device can access the operator's network through another terminal device to perform registration procedures, data transmission and other services. Wherein, the other terminal device may also be referred to as a relay terminal device.
由此,在终端设备通过中继终端设备访问网络的过程中,如何确定中继终端设备的中继业务是需要解决的问题。Therefore, in the process of terminal equipment accessing the network through the relay terminal equipment, how to determine the relay service of the relay terminal equipment is a problem that needs to be solved.
发明内容Summary of the invention
本申请实施例提供一种授权结果的确定方法和装置,可有效的确定中继终端设备的中继业务,避免终端设备通过未被授权的中继终端设备访问网络。The embodiments of the present application provide a method and device for determining an authorization result, which can effectively determine the relay service of a relay terminal device and prevent the terminal device from accessing the network through an unauthorized relay terminal device.
第一方面,本申请实施例提供一种授权结果的确定方法,所述方法包括:In the first aspect, an embodiment of the present application provides a method for determining an authorization result, and the method includes:
接入网设备接收第二终端设备发送的第一消息,所述第一消息用于指示第一终端设备请求通过所述第二终端设备接入网络,且所述第一消息包括所述第二终端设备的标识信息;所述接入网设备根据所述第二终端设备的标识信息确定所述第二终端设备的授权结果;所述接入网设备向第一核心网设备发送第二消息,所述第二消息包括所述第二终端设备的授权结果;所述接入网设备接收所述第一核心网设备发送的所述第二消息的响应消息。The access network device receives a first message sent by a second terminal device, where the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes the second terminal device. Identification information of the terminal device; the access network device determines the authorization result of the second terminal device according to the identification information of the second terminal device; the access network device sends a second message to the first core network device, The second message includes the authorization result of the second terminal device; the access network device receives a response message of the second message sent by the first core network device.
本申请实施例中,该第二终端设备的授权结果可以该第二终端设备被授权执行中继业务的结果。In the embodiment of the present application, the authorization result of the second terminal device may be the result of the second terminal device being authorized to perform the relay service.
本申请实施例中,UE1请求通过UE2接入网络时,RAN确定该UE2被授权执行中继业务,然后向AMF1发送包括UE2的授权结果的第二消息,从而可使得该AMF1能够根据该UE2的授权结果允许UE1通过UE2接入网络。实施本申请实施例,可使得AMF1能够获得UE2的授权结果,从而安全有效地允许UE1通过UE2接入网络。In the embodiment of this application, when UE1 requests to access the network through UE2, the RAN determines that UE2 is authorized to perform the relay service, and then sends a second message including the authorization result of UE2 to AMF1, so that the AMF1 can be based on the UE2's authorization result. The authorization result allows UE1 to access the network through UE2. Implementing the embodiments of this application can enable AMF1 to obtain the authorization result of UE2, thereby safely and effectively allowing UE1 to access the network through UE2.
在一种可能的实现方式中,所述接入网设备保存有所述第二终端设备的授权结果。In a possible implementation manner, the access network device stores the authorization result of the second terminal device.
在一种可能的实现方式中,所述接入网设备根据所述第二终端设备的标识信息确定所 述第二终端设备的授权结果之前,所述方法还包括:所述接入网设备向第二核心网设备发送第三消息,所述第三消息包括所述第二终端设备的标识信息,且所述第三消息用于请求所述第二终端设备的授权结果;所述接入网设备接收所述第二核心网设备发送的第三消息的响应消息,所述第三消息的响应消息包括所述第二终端设备是否被授权执行中继业务的授权结果;所述接入网设备保存所述第二终端设备的授权结果。In a possible implementation manner, before the access network device determines the authorization result of the second terminal device according to the identification information of the second terminal device, the method further includes: The second core network device sends a third message, the third message includes the identification information of the second terminal device, and the third message is used to request the authorization result of the second terminal device; the access network The device receives a response message of a third message sent by the second core network device, where the response message of the third message includes the authorization result of whether the second terminal device is authorized to perform the relay service; the access network device Save the authorization result of the second terminal device.
在一种可能的实现方式中,所述第二终端设备的标识信息包括所述第二终端设备的中继标识。In a possible implementation manner, the identification information of the second terminal device includes a relay identification of the second terminal device.
在一种可能的实现方式中,所述方法还包括:所述接入网设备向所述第二终端设备发送第一消息的响应消息,所述第一消息的响应消息用于指示所述第一终端设备允许通过所述第二终端设备接入网络。In a possible implementation manner, the method further includes: the access network device sends a response message of the first message to the second terminal device, and the response message of the first message is used to indicate the first message A terminal device is allowed to access the network through the second terminal device.
在一种可能的实现方式中,所述第一消息的响应消息包括所述第二终端设备的授权结果。In a possible implementation manner, the response message of the first message includes the authorization result of the second terminal device.
第二方面,本申请实施例提供一种授权结果的确定方法,所述方法包括:In a second aspect, an embodiment of the present application provides a method for determining an authorization result, and the method includes:
第一核心网设备接收接入网设备发送的第二消息,所述第二消息包括第二终端设备的授权结果;所述第一核心网设备根据所述第二终端设备的授权结果确定所述第二终端设备被授权执行中继业务;所述第一核心网设备向所述接入网设备发送所述第二消息的响应消息。The first core network device receives a second message sent by the access network device, where the second message includes the authorization result of the second terminal device; the first core network device determines the The second terminal device is authorized to perform a relay service; the first core network device sends a response message of the second message to the access network device.
在一种可能的实现方式中,所述第一核心网设备接收接入网设备发送的第二消息之前,所述方法还包括:所述接入网设备接收所述第二终端设备发送的第一消息;其中,所述第一消息用于指示所述第一终端设备请求通过所述第二终端设备接入网络,且所述第一消息包括第二终端设备的标识信息;所述接入网设备确定所述第二终端设备被授权执行中继业务,向所述第一核心网设备发送所述第二消息。In a possible implementation manner, before the first core network device receives the second message sent by the access network device, the method further includes: the access network device receives the first message sent by the second terminal device. A message; wherein, the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes the identification information of the second terminal device; the access The network device determines that the second terminal device is authorized to perform the relay service, and sends the second message to the first core network device.
在一种可能的实现方式中,所述接入网设备确定所述第二终端设备被授权执行中继业务之前,所述方法还包括:所述接入网设备向第二核心网设备发送第三消息,所述第三消息包括所述第二终端设备的标识信息,且所述第三消息用于请求所述第二终端设备的授权结果;所述第二核心网设备接收所述接入网设备发送的所述第三消息,并向所述接入网设备发送所述第三消息的响应消息;In a possible implementation manner, before the access network device determines that the second terminal device is authorized to perform the relay service, the method further includes: the access network device sends the second core network device to the second core network device. Three messages, the third message includes the identification information of the second terminal device, and the third message is used to request the authorization result of the second terminal device; the second core network device receives the access The third message sent by the network device, and sending a response message of the third message to the access network device;
所述接入网设备确定所述第二终端设备被授权执行中继业务,包括:所述接入网设备根据所述第三消息的响应消息,确定所述第二终端设备被授权执行中继业务。The determining by the access network device that the second terminal device is authorized to perform the relay service includes: the access network device determines that the second terminal device is authorized to perform the relay according to the response message of the third message business.
在一种可能的实现方式中,所述方法还包括:所述接入网设备向所述第二终端设备发送第一消息的响应消息,所述第一消息的响应消息用于指示所述第一终端设备允许通过所述第二终端设备接入网络。In a possible implementation manner, the method further includes: the access network device sends a response message of the first message to the second terminal device, and the response message of the first message is used to indicate the first message A terminal device is allowed to access the network through the second terminal device.
第二方面的有益效果可参见第一方面的有益效果,在此不赘述。The beneficial effects of the second aspect can be referred to the beneficial effects of the first aspect, which will not be repeated here.
第三方面,本申请实施例提供一种通信装置,该通信装置可以是网络设备,也可以是网络设备中的装置,或者是能够和网络设备匹配使用的装置。其中,该通信装置还可以为芯片系统。该通信装置可执行第一方面及第一方面的各种可能的实现方式所述的方法。或者,该通信装置可执行第二方面及第二方面的各种可能的实现方式所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一 个或多个与上述功能相对应的单元。该单元可以是软件和/或硬件。In a third aspect, embodiments of the present application provide a communication device, which may be a network device, a device in a network device, or a device that can be used in conjunction with a network device. Wherein, the communication device may also be a chip system. The communication device can execute the methods described in the first aspect and various possible implementation manners of the first aspect. Alternatively, the communication device may execute the methods described in the second aspect and various possible implementation manners of the second aspect. The function of the communication device can be realized by hardware, or by hardware executing corresponding software. The hardware or software includes one or more units corresponding to the above-mentioned functions. The unit can be software and/or hardware.
可选的,该网络设备可以为接入网设备。或者,该网络设备可以为第一核心网设备。或者,该网络设备可以为第二核心网设备。Optionally, the network device may be an access network device. Alternatively, the network device may be the first core network device. Or, the network device may be a second core network device.
第四方面,本申请实施例提供一种通信系统,该通信系统包括:第一核心网设备,用于接收接入网设备发送的第二消息,所述第二消息包括第二终端设备的授权结果;所述第一核心网设备,还用于根据所述第二终端设备的授权结果确定所述第二终端设备被授权执行中继业务;所述第一核心网设备,还用于向所述接入网设备发送所述第二消息的响应消息。In a fourth aspect, an embodiment of the present application provides a communication system, the communication system includes: a first core network device, configured to receive a second message sent by an access network device, the second message including the authorization of the second terminal device Result; the first core network device is also used to determine that the second terminal device is authorized to perform relay services according to the authorization result of the second terminal device; the first core network device is also used to The access network device sends a response message to the second message.
在一种可能的实现方式中,所述系统还包括:接入网设备,用于接收所述第二终端设备发送的第一消息;其中,所述第一消息用于指示所述第一终端设备请求通过所述第二终端设备接入网络,且所述第一消息包括第二终端设备的标识信息;所述接入网设备,还用于确定所述第二终端设备被授权执行中继业务,向所述第一核心网设备发送所述第二消息。In a possible implementation manner, the system further includes: an access network device, configured to receive a first message sent by the second terminal device; wherein, the first message is used to instruct the first terminal The device requests to access the network through the second terminal device, and the first message includes the identification information of the second terminal device; the access network device is also used to determine that the second terminal device is authorized to perform relay Service, sending the second message to the first core network device.
在一种可能的实现方式中,所述接入网设备,还用于向所述第二核心网设备发送第三消息,所述第三消息包括所述第二终端设备的标识信息,且所述第三消息用于请求所述第二终端设备的授权结果;In a possible implementation manner, the access network device is further configured to send a third message to the second core network device, where the third message includes the identification information of the second terminal device, and The third message is used to request the authorization result of the second terminal device;
所述系统还包括:第二核心网设备,用于接收所述接入网设备发送的所述第三消息,并向所述接入网设备发送所述第三消息的响应消息;所述接入网设备,具体用于根据所述第三消息的响应消息,确定所述第二终端设备被授权执行中继业务。The system further includes: a second core network device, configured to receive the third message sent by the access network device, and send a response message of the third message to the access network device; The network access device is specifically configured to determine, according to the response message of the third message, that the second terminal device is authorized to perform the relay service.
在一种可能的实现方式中,所述接入网设备,还用于向所述第一终端设备发送第一消息的响应消息,所述第一消息的响应消息用于指示所述第一终端设备允许通过所述第二终端设备接入网络。In a possible implementation manner, the access network device is further configured to send a response message of a first message to the first terminal device, and the response message of the first message is used to instruct the first terminal The device allows access to the network through the second terminal device.
第五方面,本申请实施例提供一种通信装置,所述通信装置包括处理器,当所述处理器调用存储器中的计算机程序时,如第一方面及第一方面的各种可能的实现方式所述的方法被执行。In a fifth aspect, an embodiment of the present application provides a communication device, the communication device includes a processor, and when the processor invokes a computer program in a memory, as in the first aspect and various possible implementation manners of the first aspect The method described is executed.
在一种可能的实现方式中,当所述处理器调用存储器中的计算机程序时,如第二方面及第二方面的各种可能的实现方式所述的方法被执行。例如,所述处理器调用所述计算机程序时,如第一核心网设备、第二核心网设备和接入网设备中的任一设备所述的方法被执行。In a possible implementation manner, when the processor invokes the computer program in the memory, the methods described in the second aspect and various possible implementation manners of the second aspect are executed. For example, when the processor calls the computer program, the method described in any one of the first core network device, the second core network device, and the access network device is executed.
第六方面,本申请实施例提供一种通信装置,所述通信装置包括处理器和存储器,所述存储器用于存储计算机执行指令;所述处理器用于执行所述计算机执行指令,以使所述通信装置执行如第一方面及第一方面的各种可能的实现方式所述的方法。In a sixth aspect, an embodiment of the present application provides a communication device. The communication device includes a processor and a memory. The memory is used to store computer-executable instructions; the processor is used to execute the computer-executable instructions to enable the The communication device executes the methods described in the first aspect and various possible implementation manners of the first aspect.
在一种可能的实现方式中,当所述处理器调用所述计算机执行指令时,如第二方面及第二方面的各种可能的实现方式所述的方法被执行。例如,所述处理器调用所述计算机执行指令时,如第一核心网设备、第二核心网设备和接入网设备中的任一设备所述的方法被执行。In a possible implementation manner, when the processor invokes the computer to execute instructions, the methods described in the second aspect and various possible implementation manners of the second aspect are executed. For example, when the processor invokes the computer to execute instructions, the method described in any one of the first core network device, the second core network device, and the access network device is executed.
第七方面,本申请实施例提供一种通信装置,所述通信装置包括处理器、存储器和收发器,所述收发器,用于接收信号或者发送信号;所述存储器,用于存储程序代码;所述处理器,用于调用所述程序代码执行如第一方面所述的方法。In a seventh aspect, an embodiment of the present application provides a communication device. The communication device includes a processor, a memory, and a transceiver. The transceiver is used to receive signals or send signals; and the memory is used to store program codes; The processor is configured to call the program code to execute the method described in the first aspect.
在一种可能的实现方式中,当所述处理器调用所述程序代码时,如第二方面及第二方面的各种可能的实现方式所述的方法被执行。例如,所述处理器调用所述程序代码时,如第一核心网设备、第二核心网设备和接入网设备中的任一设备所述的方法被执行。In a possible implementation manner, when the processor calls the program code, the methods described in the second aspect and various possible implementation manners of the second aspect are executed. For example, when the processor calls the program code, the method described in any one of the first core network device, the second core network device, and the access network device is executed.
第八方面,本申请实施例提供一种通信装置,所述通信装置包括处理器和接口电路,所述接口电路,用于接收代码指令并传输至所述处理器;所述处理器运行所述代码指令以执行如第一方面及第一方面的各种可能的实现方式所述的方法。In an eighth aspect, an embodiment of the present application provides a communication device. The communication device includes a processor and an interface circuit. The interface circuit is configured to receive code instructions and transmit them to the processor; the processor runs the The code instructions execute the methods described in the first aspect and various possible implementations of the first aspect.
在一种可能的实现方式中,所述处理器运行所述代码指令以执行如第二方面及第二方面的各种可能的实现方式所述的方法。例如,所述执行如第一核心网设备、第二核心网设备和接入网设备中的任一设备所述的方法。In a possible implementation manner, the processor runs the code instructions to execute the methods described in the second aspect and various possible implementation manners of the second aspect. For example, the method described in any one of the first core network device, the second core network device, and the access network device is executed.
第九方面,本申请实施例提供一种计算机可读存储介质,所述计算机可读存储介质用于存储指令,当所述指令被执行时,使得第一方面及第一方面的各种可能的实现方式所述的方法被实现。In a ninth aspect, an embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium is used to store instructions, and when the instructions are executed, the first aspect and the various possibilities of the first aspect Implementation The method described is implemented.
在一种可能的实现方式中,当所述指令被执行时,使得第二方面及第二方面的各种可能的实现方式所述的方法被实现。例如,使得第一核心网设备、第二核心网设备和接入网设备中的任一设备所述的方法被实现。In a possible implementation manner, when the instruction is executed, the methods described in the second aspect and various possible implementation manners of the second aspect are implemented. For example, the method described in any one of the first core network device, the second core network device, and the access network device is implemented.
第十方面,本申请实施例提供一种包括指令的计算机程序产品,当所述指令被执行时,使得第一方面及第一方面的各种可能的实现方式所述的方法被实现。In a tenth aspect, embodiments of the present application provide a computer program product including instructions, which when executed, enable the methods described in the first aspect and various possible implementations of the first aspect to be implemented.
在一种可能的实现方式中,当所述指令被执行时,使得第二方面及第二方面的各种可能的实现方式所述的方法被实现。例如,使得第一核心网设备、第二核心网设备和接入网设备中的任一设备所述的方法被实现。In a possible implementation manner, when the instruction is executed, the methods described in the second aspect and various possible implementation manners of the second aspect are implemented. For example, the method described in any one of the first core network device, the second core network device, and the access network device is implemented.
第十一方面,本申请实施例提供一种计算机程序,所述计算机程序用于执行第一方面及第一方面的各种可能的实现方式。In an eleventh aspect, an embodiment of the present application provides a computer program for executing the first aspect and various possible implementation manners of the first aspect.
第十二方面,本申请实施例提供一种计算机程序,所述计算机程序用于执行第二方面及第二方面的各种可能的实现方式。In a twelfth aspect, an embodiment of the present application provides a computer program for executing the second aspect and various possible implementation manners of the second aspect.
可选的,所述计算机程序用于执行第一核心网设备、第二核心网设备和接入网设备中的任一设备所述的方法。Optionally, the computer program is used to execute the method described in any one of the first core network device, the second core network device, and the access network device.
附图说明Description of the drawings
图1是本申请实施例提供的一种网络架构示意图;FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application;
图2是本申请实施例提供的一种网络架构示意图;FIG. 2 is a schematic diagram of a network architecture provided by an embodiment of the present application;
图3是本申请实施例提供的一种授权结果的确定方法的流程示意图;FIG. 3 is a schematic flowchart of a method for determining an authorization result provided by an embodiment of the present application;
图4是本申请实施例提供的一种授权结果的确定方法的流程示意图;FIG. 4 is a schematic flowchart of a method for determining an authorization result provided by an embodiment of the present application;
图5是本申请实施例提供的一种通信装置的结构示意图;FIG. 5 is a schematic structural diagram of a communication device provided by an embodiment of the present application;
图6是本申请实施例提供的一种通信系统的结构示意图;FIG. 6 is a schematic structural diagram of a communication system provided by an embodiment of the present application;
图7是本申请实施例提供的一种通信装置的结构示意图;FIG. 7 is a schematic structural diagram of a communication device provided by an embodiment of the present application;
图8是本申请实施例提供的一种授权结果的确定方法的流程示意图。FIG. 8 is a schematic flowchart of a method for determining an authorization result provided by an embodiment of the present application.
具体实施方式Detailed ways
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述。In order to make the purpose, technical solutions, and advantages of the present application clearer, the present application will be further described in detail below with reference to the accompanying drawings.
本申请的说明书、权利要求书及附图中的术语“第一”和“第二”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first" and "second" in the specification, claims, and drawings of this application are used to distinguish different objects, rather than to describe a specific sequence. In addition, the terms "including" and "having" and any variations of them are intended to cover non-exclusive inclusions. For example, a process, method, system, product, or device that includes a series of steps or units is not limited to the listed steps or units, but optionally includes unlisted steps or units, or optionally also includes Other steps or units inherent to these processes, methods, products or equipment.
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。The reference to "embodiments" herein means that a specific feature, structure, or characteristic described in conjunction with the embodiments may be included in at least one embodiment of the present application. The appearance of the phrase in various places in the specification does not necessarily refer to the same embodiment, nor is it an independent or alternative embodiment mutually exclusive with other embodiments. Those skilled in the art clearly and implicitly understand that the embodiments described herein can be combined with other embodiments.
在本申请中,“至少一个(项)”是指一个或者多个,“多个”是指两个或两个以上,“至少两个(项)”是指两个或三个及三个以上,“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系,例如,“A和/或B”可以表示:只存在A,只存在B以及同时存在A和B三种情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,“a和b”,“a和c”,“b和c”,或“a和b和c”,其中a,b,c可以是单个,也可以是多个。In this application, "at least one (item)" refers to one or more, "multiple" refers to two or more than two, and "at least two (item)" refers to two or three and three Above, "and/or" is used to describe the association relationship of associated objects, which means that there can be three kinds of relationships. For example, "A and/or B" can mean: there is only A, only B, and both A and B. In this case, A and B can be singular or plural. The character "/" generally indicates that the associated objects before and after are in an "or" relationship. "The following at least one item (a)" or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a). For example, at least one of a, b, or c can mean: a, b, c, "a and b", "a and c", "b and c", or "a and b and c" ", where a, b, and c can be single or multiple.
下面结合附图对本申请的实施例进行描述。The embodiments of the present application will be described below in conjunction with the drawings.
首先,介绍本申请实施例所涉及的网络架构。First, the network architecture involved in the embodiments of the present application is introduced.
本申请提供的授权结果的确定方法可应用于各类通信系统中,例如,物联网(internet of things,IoT)系统、窄带物联网(narrow band internet of things,NB-IoT)系统、长期演进(long term evolution,LTE)系统,也可以是第五代(5th-generation,5G)通信系统,还可以是LTE与5G混合架构、也可以是5G新无线(new radio,NR)系统,以及未来通信发展中出现的新的通信系统等。The method for determining the authorization result provided in this application can be applied to various communication systems, such as the Internet of Things (IoT) system, the narrowband Internet of Things (NB-IoT) system, and the long-term evolution ( Long term evolution, LTE) system, it can also be the fifth generation (5th-generation, 5G) communication system, it can also be a hybrid architecture of LTE and 5G, it can also be a 5G new radio (NR) system, and future communications New communication systems, etc. appearing in development.
参见图1,图1是本申请实施例提供的一种网络架构示意图,图1中所涉及的各个部分如下所示:Referring to FIG. 1, FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application. The various parts involved in FIG. 1 are as follows:
终端设备110,也称为用户设备(user equipment,UE)、终端等。终端设备是一种具有无线收发功能的设备,可以经(无线)接入网络((radio)access network,(R)AN)120中的接入网设备与一个或多个核心网(core network,CN)进行通信。可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上,如轮船上等;还可以部署在空中,例如部署在飞机、气球或卫星上等。终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线 终端、智慧家庭(smart home)中的无线终端等等。The terminal device 110 is also referred to as user equipment (UE), terminal, and so on. A terminal device is a device with a wireless transceiver function. It can be connected to one or more core networks (core networks) via the (radio) access network ((radio) access network, (R) AN) 120 access network equipment, CN) to communicate. It can be deployed on land, including indoor or outdoor, handheld, wearable, or vehicle-mounted; it can also be deployed on the water, such as on a ship, and it can also be deployed in the air, such as on an airplane, balloon, or satellite. Terminal devices can be mobile phones, tablets, computers with wireless transceiver functions, virtual reality (VR) terminal devices, augmented reality (AR) terminal devices, industrial control (industrial control) Wireless terminals in ), wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, and wireless terminals in transportation safety , Wireless terminals in smart cities, wireless terminals in smart homes, etc.
本申请实施例中,终端设备包括远端终端设备(remote UE)和中继终端设备(relay UE)。例如,中继UE可以理解为能够直接接入到网络(或基站)的UE;或者,中继UE可以理解为信号能够覆盖到的UE;或者,中继UE可以理解为基站覆盖区域内的UE;或者,中继UE可以理解为具有中继功能的UE,这里中继功能指没有信号覆盖的UE,可以通过有信号覆盖的中继UE接入到运营商的网络。远端UE可以理解为信号覆盖不到的UE。也就是说,该远端UE需要借助中继UE才能够接入网络。In the embodiment of the present application, the terminal equipment includes a remote terminal equipment (remote UE) and a relay terminal equipment (relay UE). For example, a relay UE can be understood as a UE that can directly access the network (or a base station); or, a relay UE can be understood as a UE that can be covered by a signal; or, a relay UE can be understood as a UE in the coverage area of the base station. Or, a relay UE can be understood as a UE with a relay function, where the relay function refers to a UE without signal coverage, and can access the operator's network through a relay UE with signal coverage. The remote UE can be understood as a UE that cannot be covered by the signal. In other words, the remote UE needs to rely on a relay UE to be able to access the network.
参见图2,图2是本申请实施例提供的一种网络架构示意图。如图2所示,该网络架构包括UE1、UE2和UE3,该UE1、UE2和UE3属于同一个近距离组(ProSe group)。进一步的,UE1和UE2可以理解为远端UE,UE3可以理解为中继UE。远端UE可以通过中继UE接入到运营商网络中,执行注册流程、或协议数据单元(protocol data unit,PDU)会话建立、发送用户数据等等。该中继UE可与远端UE建立通信连接,为该远端UE接入网络提供服务。例如,远端UE通过中继UE可使用互联网业务,使用通话功能等等。可选的,远端UE与中继UE之间可以通过基于近距离的业务(proximity-based services,ProSe)进行通信。该基于近距离的业务可以包括设备到设备(device to device,D2D)业务或车与任何事物通信(vehicle-to-everything,V2X)业务等等。可理解,中继UE还可以称为UE-to-network relay。Refer to FIG. 2, which is a schematic diagram of a network architecture provided by an embodiment of the present application. As shown in FIG. 2, the network architecture includes UE1, UE2, and UE3, and the UE1, UE2, and UE3 belong to the same ProSe group. Further, UE1 and UE2 can be understood as remote UEs, and UE3 can be understood as relay UEs. The remote UE can access the operator's network through a relay UE, perform a registration process, or establish a protocol data unit (protocol data unit, PDU) session, send user data, and so on. The relay UE can establish a communication connection with the remote UE to provide services for the remote UE to access the network. For example, the remote UE can use Internet services, use the call function, and so on through the relay UE. Optionally, the remote UE and the relay UE may communicate through proximity-based services (Proximity-based services, ProSe). The short-distance-based service may include a device-to-device (D2D) service or a vehicle-to-everything (V2X) service and so on. It can be understood that the relay UE may also be referred to as a UE-to-network relay.
(无线)接入网络((radio)access network,(R)AN)120,用于为特定区域的授权终端设备提供入网功能,并能够根据终端设备的级别,业务的需求等使用不同质量的传输隧道。如(R)AN可管理无线资源,为终端设备提供接入服务,进而完成控制信息和/或数据信息在终端设备和核心网(core network,CN)之间的转发。(Radio) access network ((radio) access network, (R) AN) 120, used to provide network access functions for authorized terminal equipment in a specific area, and can use different quality transmissions according to the level of terminal equipment, business needs, etc. tunnel. For example, (R)AN can manage wireless resources, provide access services for terminal devices, and then complete the forwarding of control information and/or data information between the terminal device and the core network (CN).
本申请实施例中的接入网设备是一种为终端设备提供无线通信功能的设备,也可称为网络设备。如该接入网设备可以包括:5G系统中的下一代基站节点(next generation node basestation,gNB)、长期演进(long term evolution,LTE)中的演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(base band unit,BBU)、传输点(transmitting and receiving point,TRP)(或称为传输接收点)、发射点(transmitting point,TP)、小基站设备(pico)、移动交换中心,或者未来网络中的网络设备等。可理解,本申请实施例对接入网设备的具体类型不作限定。在不同无线接入技术的系统中,具备接入网设备功能的设备的名称可能会有所不同。The access network device in the embodiment of the present application is a device that provides a wireless communication function for terminal devices, and may also be referred to as a network device. For example, the access network equipment may include: next generation node base station (gNB) in 5G system, evolved node B (evolved node B, eNB) in long term evolution (LTE), wireless Network controller (radio network controller, RNC), node B (node B, NB), base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved nodeB) , Or home node B (HNB), base band unit (BBU), transmission point (transmitting and receiving point, TRP) (or called transmission receiving point), transmission point (TP), small base station equipment (pico), mobile switching center, or network equipment in the future network. It can be understood that the embodiment of the present application does not limit the specific type of the access network device. In systems with different wireless access technologies, the names of devices with access network device functions may be different.
用户面功能(user plane function,UPF)网络功能130,用于分组路由和转发以及用户面数据的服务质量(quality of service,QoS)处理等。The user plane function (UPF) network function 130 is used for packet routing and forwarding, quality of service (QoS) processing of user plane data, and so on.
数据网络(data network,DN)网络功能140,用于提供传输数据的网络。The data network (DN) network function 140 is used to provide a data transmission network.
接入管理功能(access and mobility management function,AMF)网络功能150,主要用于移动性管理和接入管理等,可以用于实现移动性管理实体(mobility management entity,MME)功能中除会话管理之外的其它功能,例如,合法监听以及接入授权/鉴权等功能。可理解,以下简称AMF网络功能为AMF。本申请实施例中,AMF网络功能包括为远端AMF 和中继AMF,该远端AMF为:用于为远端UE提供服务的AMF;该中继AMF为:用于为中继UE提供服务的AMF。Access and mobility management function (AMF) network function 150, mainly used for mobility management and access management, etc., can be used to implement mobility management entity (mobility management entity, MME) functions except session management Other functions, such as lawful interception and access authorization/authentication functions. It can be understood that the AMF network function is hereinafter referred to as AMF. In the embodiment of the present application, the AMF network function includes a remote AMF and a relay AMF. The remote AMF is: an AMF used to provide services for a remote UE; the relay AMF is: a relay AMF is used to provide services for a relay UE AMF.
会话管理功能(session management function,SMF)160,主要用于会话管理、终端设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理用户平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。The session management function (SMF) 160 is mainly used for session management, terminal device Internet protocol (IP) address allocation and management, selection of manageable user plane functions, policy control and charging function interfaces End point and downlink data notification, etc.
策略控制网络功能170,如策略控制功能(policy control function,PCF),用于指导网络行为的统一策略框架,为控制面功能(例如AMF,SMF网络功能等)提供策略规则信息等。The policy control network function 170, such as a policy control function (PCF), is a unified policy framework used to guide network behavior, and provides policy rule information for control plane functions (such as AMF, SMF network functions, etc.).
认证服务器功能(authentication server function,AUSF)180,用于鉴权服务、产生密钥实现对终端设备的双向鉴权,支持统一的鉴权框架。The authentication server function (authentication server function, AUSF) 180 is used for authentication services, generating keys to implement two-way authentication for terminal devices, and supporting a unified authentication framework.
统一数据管理(unified data management,UDM)网络功能190,可用于处理终端设备标识,接入鉴权,注册以及移动性管理等。可理解,以下简称UDM网络功能为UDM。The unified data management (UDM) network function 190 can be used to process terminal device identification, access authentication, registration, and mobility management. It can be understood that the UDM network function is hereinafter referred to as UDM for short.
应用功能(application function,AF)1100,用于进行应用影响的数据路由,接入网络开放功能,与策略框架交互进行策略控制等。The application function (AF) 1100 is used for data routing affected by applications, access to network opening functions, and interaction with the policy framework for policy control.
网络切片选择功能(network slice selection function,NSSF),可用于确定网络切片实例,选择AMF网络功能等等。The network slice selection function (NSSF) can be used to determine network slice instances, select AMF network functions, and so on.
网络存储网络功能,如包括网络注册功能(network repository function,NRF),可用于维护网络中所有网络功能服务的实时信息。Network storage network functions, such as including network repository function (NRF), can be used to maintain real-time information of all network functions and services in the network.
可理解,图1所示的网络架构还可以包括近距离服务功能(ProSe function),该近距离服务功能可以用于执行ProSe业务的管理和控制等等。It can be understood that the network architecture shown in FIG. 1 may also include a ProSe function, and the ProSe function may be used to perform the management and control of the ProSe service, and so on.
本申请实施例中的移动性管理网络功能可以是图1所示的AMF网络功能150,也可以是未来通信系统中的具有上述AMF网络功能150的其他网络功能。或者,本申请中的移动性管理网络功能还可以是长期演进(long term evolution,LTE)中的移动性管理实体(mobility management entity,MME)等。The mobility management network function in the embodiment of the present application may be the AMF network function 150 shown in FIG. 1, or may be other network functions having the aforementioned AMF network function 150 in the future communication system. Alternatively, the mobility management network function in this application may also be a mobility management entity (MME) in long term evolution (LTE), etc.
为方便说明,将AMF网络功能150简称为AMF,将终端设备110称为UE,即本申请实施例中后文所描述的AMF均可替换为移动性管理网络功能或核心网设备,UE均可替换为终端设备。For the convenience of description, the AMF network function 150 is referred to as AMF for short, and the terminal device 110 is referred to as UE. That is, the AMF described later in the embodiments of this application can be replaced with mobility management network functions or core network equipment, and the UE can be either Replace with terminal equipment.
图1中示出的网络架构(例如5G网络架构)采用基于服务的架构,传统网元功能(或网络功能)基于网络功能虚拟化(network function virtualization,NFV)技术拆分成若干个自包含、自管理、可重用的网络功能服务模块,通过灵活定义服务模块集合,可以实现定制化的网络功能重构,对外通过统一的服务调用接口组成业务流程。图1中示出的网络架构示意图可以理解为一种非漫游场景下基于服务的5G网络架构示意图。对于漫游场景,本申请实施例同样适用。The network architecture shown in Figure 1 (such as the 5G network architecture) adopts a service-based architecture. The traditional network element functions (or network functions) are split into several self-contained, self-contained, network functions based on network function virtualization (NFV) technology. Self-management and reusable network function service modules can realize customized network function reconstruction through flexible definition of service module collections, and form business processes through a unified service call interface externally. The schematic diagram of the network architecture shown in FIG. 1 can be understood as a schematic diagram of a service-based 5G network architecture in a non-roaming scenario. For roaming scenarios, the embodiments of this application are also applicable.
可理解,以上说介绍的术语在不同的领域或不同的标准中,可能有不同的名称,因此不应将以上所示的名称理解为对本申请实施例的限定。上述网络功能或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。It is understandable that the terms introduced above may have different names in different fields or different standards. Therefore, the names shown above should not be construed as limiting the embodiments of the present application. The aforementioned network function or function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
以下将详细介绍本申请实施例提供的授权结果的确定方法。可理解,为便于描述,以下所示的各个方法中,远端终端设备为UE1,中继终端设备为UE2,为该远端终端设备提供服务的AMF为AMF1,为该中继终端设备提供服务的AMF为AMF2,以及接入网设备为RAN。The method for determining the authorization result provided by the embodiment of the application will be described in detail below. It can be understood that, for ease of description, in the various methods shown below, the remote terminal device is UE1, the relay terminal device is UE2, and the AMF that provides services for the remote terminal device is AMF1, which provides services for the relay terminal device. The AMF is AMF2, and the access network equipment is RAN.
参见图3,图3是本申请实施例提供的一种授权结果的确定方法的流程示意图。该方法可以应用于图1和/或图2所示的网络架构。如图3所示,该方法包括:Referring to FIG. 3, FIG. 3 is a schematic flowchart of a method for determining an authorization result provided by an embodiment of the present application. This method can be applied to the network architecture shown in FIG. 1 and/or FIG. 2. As shown in Figure 3, the method includes:
302、RAN接收UE2发送的第一消息,该第一消息用于指示UE1请求通过该UE2接入网络,且该第一消息包括该UE2的标识信息。302. The RAN receives a first message sent by UE2, where the first message is used to instruct UE1 to request access to the network through UE2, and the first message includes identification information of UE2.
本申请实施例中,第一消息中通过包括UE2的标识信息,可使得RAN接收到该第一消息后,得知UE1请求通过该UE2接入网络。可选的,该UE2的标识信息可以包括UE2的标识(identifier,ID)。该UE2的ID可以包括UE2的永久标识如国际移动用户识别码(international mobile subscriber identity,IMSI)、用户永久标识(subscription permanent identifier,SUPI)、用户封装标识(Subscription Concealed Identifier,SUCI)或者一般公共签约ID(generic public subscription identifier,GPSI)中的任一项或多项。或者,该UE2的ID可以包括该UE2的临时标识如全球唯一临时标识(globally unique temporary UE identity,GUTI)。或者,该UE2的ID还可以包括该UE2的中继ID;该UE2的中继ID可以为中继业务的UE标识,或者,该UE2的中继ID可以为ProSe业务的UE标识。例如,UE2的标识信息可以包括UE2的IMSI、SUPI、SUCI、GPSI或中继ID中的任一项或多项。可理解,为区分UE2的永久标识、临时标识与中继标识,以下描述中UE2的标识信息为UE2 ID和/或UE2的中继ID。In the embodiment of the present application, the identification information of UE2 is included in the first message, so that after receiving the first message, the RAN knows that UE1 requests to access the network through UE2. Optionally, the identification information of UE2 may include an identifier (identifier, ID) of UE2. The ID of the UE2 may include the permanent identity of UE2, such as the international mobile subscriber identity (IMSI), the subscription permanent identifier (SUPI), the subscriber encapsulated identifier (SUCI) or general public subscription. Any one or more of ID (generic public subscription identifier, GPSI). Alternatively, the ID of the UE2 may include the temporary identity of the UE2, such as a globally unique temporary UE identity (GUTI). Alternatively, the ID of the UE2 may also include the relay ID of the UE2; the relay ID of the UE2 may be the UE identification of the relay service, or the relay ID of the UE2 may be the UE identification of the ProSe service. For example, the identification information of UE2 may include any one or more of IMSI, SUPI, SUCI, GPSI, or relay ID of UE2. It can be understood that, in order to distinguish the permanent identity, temporary identity, and relay identity of UE2, the identification information of UE2 in the following description is UE2's ID and/or UE2's relay ID.
在一种可能的实现方式中,该第一消息中还可以包括UE1的标识信息。该UE1的标识信息可以包括UE1的ID,该UE1的ID可以包括UE1的永久标识如UE1的IMSI、SUPI和SUCI中的任一项或多项。或者,该UE1的ID可以包括UE1的临时标识如UE1的GUTI。或者,该UE1的ID还可以包括UE1的远端ID。通过包括UE1的ID,可使得RAN得知是哪个UE(如UE1)需要通过UE2接入网络。例如,UE1的标识信息可以包括UE1的IMSI、SUPI、SUCI、GPSI等,或中继ID中的任一项或多项。可理解,为区分UE1的永久标识、临时标识与中继标识,以下描述中UE1的标识信息为UE1 ID和/或UE1的远端ID。In a possible implementation manner, the first message may also include the identification information of UE1. The identification information of the UE1 may include the ID of the UE1, and the ID of the UE1 may include the permanent identification of the UE1, such as any one or more of the IMSI, SUPI, and SUCI of the UE1. Alternatively, the ID of the UE1 may include the temporary identification of the UE1, such as the GUTI of the UE1. Alternatively, the ID of the UE1 may also include the remote ID of the UE1. By including the ID of UE1, the RAN can know which UE (such as UE1) needs to access the network through UE2. For example, the identification information of UE1 may include IMSI, SUPI, SUCI, GPSI, etc. of UE1, or any one or more of the relay IDs. It can be understood that, in order to distinguish the permanent identity, temporary identity and relay identity of UE1, the identification information of UE1 in the following description is the ID of UE1 and/or the remote ID of UE1.
可理解,UE1的远端ID和UE2的中继ID可以由近距离服务功能配置。即与业务相关的标识信息可以由该近距离服务功能配置。对于该与业务相关的标识信息的具体格式,本申请实施例不作限定。It can be understood that the remote ID of UE1 and the relay ID of UE2 can be configured by the short-distance service function. That is, the identification information related to the service can be configured by the short-distance service function. The specific format of the identification information related to the service is not limited in the embodiment of the present application.
可理解,该第一消息可以是UE1通过UE2发送给RAN的消息;或者,该第一消息可以是UE2发送给RAN的消息。其中,该第一消息是UE2发送给RAN的消息,可以理解为:UE1向UE2发送第四消息;然后UE2接收到该第四消息之后,对该第四消息进行解析,以及生成第一消息。例如,解析的一种处理方式为,将该第四消息封装在第一消息中,从而该UE2将该第一消息发送给RAN。可选的,UE2的标识信息可以为该第四消息本身携带的,也可以为UE2接收到该第四消息之后,与该第四消息一起封装在第一消息中的。可选的,UE1的标识信息可以为该第四消息本身携带的。以下以该第一消息是UE2发送给RAN的消息为例,说明图3所示的方法。It is understandable that the first message may be a message sent by UE1 to the RAN through UE2; or, the first message may be a message sent by UE2 to the RAN. Wherein, the first message is a message sent by UE2 to the RAN, which can be understood as: UE1 sends a fourth message to UE2; then, after UE2 receives the fourth message, it parses the fourth message and generates the first message. For example, one processing method of parsing is to encapsulate the fourth message in the first message, so that the UE2 sends the first message to the RAN. Optionally, the identification information of UE2 may be carried in the fourth message itself, or may be encapsulated in the first message together with the fourth message after UE2 receives the fourth message. Optionally, the identification information of UE1 may be carried in the fourth message itself. Hereinafter, the method shown in FIG. 3 will be described by taking the first message as an example that the UE2 sends to the RAN.
在一种可能的实现方式中,步骤302之前,图3所示的方法还包括:In a possible implementation manner, before step 302, the method shown in FIG. 3 further includes:
301、UE1向UE2发送第四消息,该第四消息用于请求接入网络,且该第四消息包括UE1的标识信息;相应的,该UE2接收该第四消息。301. UE1 sends a fourth message to UE2, where the fourth message is used to request access to the network, and the fourth message includes identification information of UE1; correspondingly, UE2 receives the fourth message.
该情况下,UE2接收到该第四消息时,可将UE1的标识信息封装于第一消息中,从而向RAN发送该第一消息。或者,UE2接收到第四消息时,可将该第四消息封装于第一消息中,从而向RAN发送该第一消息。In this case, when UE2 receives the fourth message, it can encapsulate the identification information of UE1 in the first message, so as to send the first message to the RAN. Alternatively, when the UE2 receives the fourth message, the fourth message may be encapsulated in the first message, so as to send the first message to the RAN.
可理解,该第四消息还可以包括非接入层(non-access stratum,NAS)请求,例如该NAS请求可包括注册接入请求等等。该情况下,UE2可将该NAS请求封装于第一消息中,或者,将第四消息封装于第一消息中,从而向RAN发送该第一消息。该NAS请求也可以是普通上行NAS消息。为进一步说明第四消息的生成方式,作为示例,第四消息中包括NAS请求和UE1的标识信息,则UE2接收该第四消息,可以将NAS请求和UE1的标识信息封装于第一消息中,从而向RAN发送该第一消息。It is understandable that the fourth message may also include a non-access stratum (NAS) request. For example, the NAS request may include a registration access request and so on. In this case, UE2 may encapsulate the NAS request in the first message, or encapsulate the fourth message in the first message, so as to send the first message to the RAN. The NAS request may also be a normal uplink NAS message. To further illustrate the method of generating the fourth message, as an example, the fourth message includes the NAS request and the identification information of UE1, and UE2 receives the fourth message, and may encapsulate the NAS request and the identification information of UE1 in the first message. Thus, the first message is sent to the RAN.
可选的,在包括步骤302情况下,该第一消息中还可以包括第一指示信息(indicator),该第一指示信息用于指示第一消息中包含的数据是中继的远端UE的数据;或者,该第一指示信息用于指示该第一消息中包括来自UE1的第四消息中的信息。可选的,该第一指示信息可包含于NAS请求中,或者,该第一指示信息可为UE2接收到第四消息时,与该第四消息一起封装于第一消息中的信息。Optionally, if step 302 is included, the first message may also include first indication information (indicator), and the first indication information is used to indicate that the data contained in the first message is for the remote UE of the relay. Data; or, the first indication information is used to indicate that the first message includes information in the fourth message from UE1. Optionally, the first indication information may be included in the NAS request, or the first indication information may be information encapsulated in the first message together with the fourth message when the UE2 receives the fourth message.
可选的,UE1向UE2发送第四消息之前,图3所示的方法还包括:AMF1对UE1进行校验,确定该UE1的授权结果。该UE1的授权结果包括UE1是否适用ProSe业务的结果,和/或,该UE1是否被授权执行远端UE业务的结果。Optionally, before UE1 sends the fourth message to UE2, the method shown in FIG. 3 further includes: AMF1 checks UE1 to determine the authorization result of UE1. The authorization result of the UE1 includes the result of whether the UE1 is applicable to the ProSe service, and/or the result of whether the UE1 is authorized to perform the remote UE service.
其中,该AMF1对UE1进行校验的方法,如该AMF1可以根据该UE1的签约信息进行校验。至于该AMF1如何得到该UE1的签约信息,本申请实施例不作限定。例如,该签约信息可以是AMF1从UDM中获取的,或者,该签约信息也可以是AMF1从近距离服务功能中获取的。又例如,该AMF1还可以从UDM或近距离服务功能中获取第二指示信息,该第二指示信息用于指示UE1的授权结果。Wherein, the method for the AMF1 to verify the UE1, for example, the AMF1 can perform the verification according to the subscription information of the UE1. As for how the AMF1 obtains the subscription information of the UE1, this embodiment of the application does not limit it. For example, the subscription information may be acquired by AMF1 from UDM, or the subscription information may also be acquired by AMF1 from the short-distance service function. For another example, the AMF1 may also obtain second indication information from the UDM or the short-distance service function, and the second indication information is used to indicate the authorization result of the UE1.
303、RAN根据UE2的标识信息确定该UE2的授权结果;并向AMF1发送第二消息;该第二消息包括该UE2的授权结果。相应的,AMF1接收该第二消息。303. The RAN determines the authorization result of the UE2 according to the identification information of the UE2; and sends a second message to the AMF1; the second message includes the authorization result of the UE2. Correspondingly, AMF1 receives the second message.
本申请实施例中,该UE2的授权结果可包括UE2是否适用ProSe业务的结果,和/或,UE2是否被授权执行中继业务的结果。例如,该UE2的授权结果可包括UE2被授权执行中继业务的结果。又例如,该UE2的授权结果可包括该UE2适用ProSe业务,以及该UE2被授权执行中继业务的结果。又例如,该UE2的授权结果可包括UE2适用ProSe业务,以及该UE2不被授权执行中继业务的结果。该UE2被授权执行中继业务也可以理解为:该UE2可以被授权执行中继功能;或者,该UE2可以作为远端UE的中继节点。且该UE2被授权执行中继业务,也可以表示该UE2适用ProSe业务。In the embodiment of the present application, the authorization result of the UE2 may include the result of whether the UE2 is applicable to the ProSe service, and/or the result of whether the UE2 is authorized to perform the relay service. For example, the authorization result of UE2 may include the result that UE2 is authorized to perform the relay service. For another example, the authorization result of the UE2 may include the application of the ProSe service to the UE2 and the result of the UE2 being authorized to perform the relay service. For another example, the authorization result of the UE2 may include the result that the UE2 applies the ProSe service and the UE2 is not authorized to perform the relay service. The UE2 being authorized to perform the relay service can also be understood as: the UE2 can be authorized to perform the relay function; alternatively, the UE2 can be the relay node of the remote UE. And the UE2 is authorized to perform the relay service, which may also indicate that the UE2 applies the ProSe service.
可选的,RAN可以根据保存的信息来确定该UE2是否被授权执行中继业务,该保存的信息包括UE2的标识信息和UE2的授权结果。该UE2的授权结果可以是AMF2主动发送给该RAN,从而由RAN保存的。或者,该UE2的授权结果还可以是RAN请求AMF2发送该授权结果,从而由RAN保存的。可选的,RAN还可以在接收到第二消息之后,向AMF2 请求该授权结果。对于以上所示的RAN确定UE2是否被授权执行中继业务的方法,具体可如下所示:Optionally, the RAN may determine whether the UE2 is authorized to perform the relay service according to stored information, and the stored information includes the identification information of the UE2 and the authorization result of the UE2. The authorization result of the UE2 may be sent by AMF2 to the RAN voluntarily, so that the RAN saves it. Alternatively, the authorization result of the UE2 may also be stored by the RAN by requesting the AMF2 to send the authorization result by the RAN. Optionally, the RAN may also request the authorization result from AMF2 after receiving the second message. For the above-mentioned method for the RAN to determine whether UE2 is authorized to perform the relay service, the details can be as follows:
3031)RAN向AMF2发送第三消息,该第三消息包括UE2的标识信息,且该第三消息用于请求该UE2的授权结果。相应的,该AMF2接收该第三消息。3031) The RAN sends a third message to AMF2, the third message includes the identification information of UE2, and the third message is used to request the authorization result of UE2. Correspondingly, the AMF2 receives the third message.
3032)该AMF2向该RAN发送第三消息的响应消息。相应的,该RAN接收该AMF2发送的第三消息的响应消息。3032) The AMF2 sends a response message of the third message to the RAN. Correspondingly, the RAN receives the response message of the third message sent by the AMF2.
可理解,本申请实施例对于RAN如何确定AMF2不作限定。例如,UE2的临时标识中包括AMF2的地址,或者RAN可以根据UE2的标识信息中的网络信息确定AMF2等。It can be understood that the embodiment of the present application does not limit how the RAN determines AMF2. For example, the temporary identity of UE2 includes the address of AMF2, or the RAN can determine AMF2 according to the network information in the identity information of UE2.
本申请实施例中,该AMF2接收到用于请求UE2的授权结果的第三消息之后,便可向RAN发送该UE2的授权结果。可选的,该第三消息的响应消息中可以包括该UE2的授权结果。可选的,该第三消息的响应消息中还可以包括UE2的标识信息。对于以上所示的步骤3031)和步骤3032)可以适用于以下场景。In the embodiment of the present application, after the AMF2 receives the third message for requesting the authorization result of the UE2, it can send the authorization result of the UE2 to the RAN. Optionally, the response message of the third message may include the authorization result of the UE2. Optionally, the response message of the third message may also include the identification information of UE2. The steps 3031) and 3032) shown above can be applied to the following scenarios.
场景一、scene one,
步骤3031)和步骤3032)可以是在RAN接收到UE2的第一消息之后,该RAN为确定该UE2的授权结果,向AMF2发送的第三消息。Step 3031) and step 3032) may be the third message sent by the RAN to the AMF2 to determine the authorization result of the UE2 after the RAN receives the first message of the UE2.
可选的,该第三消息的响应消息中还可以包括拒绝信息,该拒绝信息可用于指示拒绝UE1通过UE2接入网络。可选的,该第三消息的响应消息中还可以包括拒绝类型,该拒绝类型用于指示UE2未被授权执行中继功能等。进一步的,在该RAN根据UE2的标识信息确定该UE2不被授权执行中继业务的情况下,该RAN可以丢弃该第一消息。Optionally, the response message of the third message may also include rejection information, and the rejection information may be used to indicate that UE1 is denied access to the network through UE2. Optionally, the response message of the third message may also include a rejection type, and the rejection type is used to indicate that the UE2 is not authorized to perform a relay function. Further, in the case that the RAN determines that the UE2 is not authorized to perform the relay service according to the identification information of the UE2, the RAN may discard the first message.
场景二、Scene two,
该步骤3031)和步骤3032)所示的方法还可以是在接收第一消息之前,该RAN为确定该UE2的授权结果,向AMF2发送的第三消息。The method shown in step 3031) and step 3032) may also be a third message sent by the RAN to the AMF2 in order to determine the authorization result of the UE2 before receiving the first message.
该情况下,RAN接收到UE2的授权结果,就可以保存该UE2的授权结果。从而在接收到第一消息之后,便可将该UE2的授权结果发送给AMF1。对于场景二,该第三消息可以是来自UE2的消息;或者,也可以是UE2发送给RAN,然后通过该RAN发送给该AMF2的消息;或者,还可以是UE1发送给UE2,然后UE2通过RAN发送给该AMF2的消息。可理解,通过包括该UE2的标识信息,可使得该AMF2明确得知请求授权中继业务的UE(如UE2)。具体的,该第三消息可理解为:该第三消息用于请求对UE2的中继业务进行授权。例如,该第三消息可应用于以下场景:UE1通知UE2请求接入网络,该UE2请求AMF2对自己的中继业务进行授权。In this case, the RAN can save the authorization result of UE2 after receiving the authorization result of UE2. Therefore, after receiving the first message, the authorization result of the UE2 can be sent to the AMF1. For scenario 2, the third message can be a message from UE2; alternatively, it can be a message sent by UE2 to the RAN, and then sent to the AMF2 through the RAN; or, it can also be sent by UE1 to UE2, and then UE2 through RAN Message sent to this AMF2. It can be understood that by including the identification information of the UE2, the AMF2 can clearly know the UE (such as UE2) requesting authorization of the relay service. Specifically, the third message may be understood as: the third message is used to request authorization for the relay service of UE2. For example, the third message can be applied to the following scenario: UE1 notifies UE2 to request access to the network, and UE2 requests AMF2 to authorize its own relay service.
对于场景二,步骤3031)之后,以及步骤3032)之前,本申请实施例所示的方法还可以包括:3033)AMF2对该UE2进行校验,确定该UE2的授权结果。For scenario 2, after step 3031) and before step 3032), the method shown in the embodiment of the present application may further include: 3033) the AMF2 verifies the UE2 to determine the authorization result of the UE2.
具体的,该AMF2可以根据UE2的签约信息来确定该UE2的授权结果。例如,该AMF2可以从UDM中获取该UE2的签约信息,或者,该AMF2还可以从近距离服务功能(ProSe function)中获取该UE2的签约信息。或者,该AMF2向近距离服务功能发送用于请求获取UE2的授权结果的消息;该近距离服务功能接收到该消息后,向UDM或者统一数据存储(unified data repository,UDR)等存储UE2签约信息的实体请求签约信息。可选的,该签约信息可以由运营商网络下发,保存于UDM或近距离服务功能中。可选的,该AMF2 还可以从UDM或近距离服务功能中获取第三指示信息,该第三指示信息用于指示UE2的授权结果。即该第三指示信息可以用于指示UE2是否被授权执行近距离服务(ProSe service)和/或是否被授权执行近距离服务的中继功能。Specifically, the AMF2 may determine the authorization result of the UE2 according to the subscription information of the UE2. For example, the AMF2 may obtain the subscription information of the UE2 from UDM, or the AMF2 may also obtain the subscription information of the UE2 from the ProSe function. Alternatively, the AMF2 sends a message for requesting the authorization result of UE2 to the proximity service function; after receiving the message, the proximity service function stores UE2 subscription information in UDM or unified data repository (UDR), etc. The entity requests subscription information. Optionally, the contract information can be issued by the operator's network and stored in the UDM or short-distance service function. Optionally, the AMF2 may also obtain third indication information from the UDM or the short-distance service function, and the third indication information is used to indicate the authorization result of the UE2. That is, the third indication information may be used to indicate whether the UE2 is authorized to perform the ProSe service and/or whether it is authorized to perform the relay function of the ProSe service.
304、AMF1向该RAN发送第二消息的响应消息。相应的,该RAN接收该AMF1发送的该第二消息的响应消息。304. AMF1 sends a response message of the second message to the RAN. Correspondingly, the RAN receives the response message of the second message sent by the AMF1.
可选的,第二消息中可以包括UE2的授权结果,还可以包括第一消息中的部分或全部信息。或者,该第二消息中除了包括UE2的授权结果、第一消息中的部分或全部信息,还可以包括第四消息中的部分或全部信息。例如,UE2接收到第四消息后,可以将第四消息封装于第一消息中;从而向RAN发送该第一消息,该RAN接收该第一消息,将该第一消息封装于第二消息中;进而向AMF1发送该第二消息。又例如,UE2接收第四消息,将第四消息中的非接入层请求封装于第一消息中,从而向RAN发送该第一消息。又例如,RAN接收第一消息,将第一消息中的UE2的标识信息封装于第一消息中,从而向AMF1发送第二消息。可理解,本申请实施例对于消息的生成方式不作限定。又例如,RAN接收到第一消息,该第一消息中包括第一指示信息,则该RAN可以将该第一指示信息封装于第二消息中,从而向AMF1发送该第二消息。该第二消息中通过包括第一指示信息,可使得该AMF1接收到该第一指示信息,对UE2的中继业务进行校验。Optionally, the second message may include the authorization result of UE2, and may also include part or all of the information in the first message. Alternatively, in addition to the authorization result of UE2 and part or all of the information in the first message, the second message may also include part or all of the information in the fourth message. For example, after UE2 receives the fourth message, it can encapsulate the fourth message in the first message; thereby sending the first message to the RAN, the RAN receives the first message, and encapsulates the first message in the second message ; Then send the second message to AMF1. For another example, UE2 receives the fourth message, and encapsulates the non-access stratum request in the fourth message in the first message, thereby sending the first message to the RAN. For another example, the RAN receives the first message, and encapsulates the identification information of the UE2 in the first message in the first message, thereby sending the second message to AMF1. It can be understood that the embodiment of the present application does not limit the manner in which the message is generated. For another example, if the RAN receives a first message, and the first message includes the first indication information, the RAN may encapsulate the first indication information in a second message, so as to send the second message to AMF1. By including the first indication information in the second message, the AMF1 can receive the first indication information and verify the relay service of the UE2.
可选的,该第二消息的响应消息包括发送给UE1的非接入层(non-access stratum,NAS)消息。该NAS消息可以用于响应上述第四消息中所包括的NAS请求。具体的,该NAS消息还可以具有完整性保护,即可以为NAS激活后的NAS消息,或者NAS安全模式指令消息等等。通过对该NAS进行完整性保护,可避免其他攻击者修改该第二消息的响应消息中的内容。该情况下,该第二消息的响应消息可以用于指示AMF1已处理UE1发送给UE2的NAS请求。可理解,在该第二消息的响应消息中包括NAS消息的情况下,还可以表示AMF1已处理UE1发出的NAS请求,表示AMF1授权UE1通过UE2接入网络。可选的,AMF1通过发送携带UE2授权结果的NAS消息给UE1,通知UE1其所接入的UE2被授权使用ProSe业务和/或中继功能。Optionally, the response message of the second message includes a non-access stratum (NAS) message sent to UE1. The NAS message may be used to respond to the NAS request included in the fourth message. Specifically, the NAS message may also have integrity protection, that is, it can be a NAS message after NAS activation, or a NAS security mode instruction message, and so on. By performing integrity protection on the NAS, other attackers can be prevented from modifying the content in the response message of the second message. In this case, the response message of the second message may be used to indicate that AMF1 has processed the NAS request sent by UE1 to UE2. It can be understood that, in the case that the response message of the second message includes a NAS message, it may also indicate that AMF1 has processed the NAS request sent by UE1, which indicates that AMF1 authorizes UE1 to access the network through UE2. Optionally, AMF1 informs UE1 that the UE2 it accesses is authorized to use the ProSe service and/or relay function by sending a NAS message carrying the authorization result of UE2 to UE1.
可选的,该第二消息的响应消息还可以包括UE1的授权结果。Optionally, the response message of the second message may also include the authorization result of UE1.
在一种可能的实现方式中,AMF1接收到第二消息之后,还可以对UE2的中继业务进行校验。若校验通过,则AMF1向RAN发送第二消息的响应消息,该第二消息的响应消息用于指示允许UE1通过UE2接入网络。若校验不通过,则AMF2可以丢弃第二消息;或者,该第二消息的响应消息可以用于指示拒绝UE1接入网络。其中,该AMF1对UE2的中继业务进行校验的方法,如:该AMF1判断上述用于请求接入网络的消息中包括的UE2的标识信息是否与第二消息中包括的UE2的标识信息一致;若一致;则AMF1可判断UE1可以通过UE2接入网络;如果不一致,则AMF1可判断UE1请求的中继UE与RAN确定授权的中继UE不是同一个UE,则该AMF1可丢弃该第二消息。或者,该第二消息的响应消息中可包括拒绝信息或拒绝原因等等。In a possible implementation manner, after AMF1 receives the second message, it can also verify the relay service of UE2. If the check is passed, AMF1 sends a response message of the second message to the RAN. The response message of the second message is used to indicate that UE1 is allowed to access the network through UE2. If the check fails, AMF2 may discard the second message; or, the response message of the second message may be used to indicate that UE1 is denied access to the network. Wherein, the method for the AMF1 to verify the relay service of the UE2, such as: the AMF1 judges whether the identification information of the UE2 included in the message for requesting access to the network is consistent with the identification information of the UE2 included in the second message ; If they are consistent; AMF1 can determine that UE1 can access the network through UE2; if they are not consistent, AMF1 can determine that the relay UE requested by UE1 and the relay UE authorized by the RAN are not the same UE, then the AMF1 can discard the second news. Alternatively, the response message of the second message may include rejection information or rejection reason, and so on.
305、该RAN向UE2发送第一消息的响应消息,该第一消息的响应消息用于指示UE1允许通过UE2接入网络。相应的,该UE2接收该第一消息的响应消息。305. The RAN sends a response message of the first message to UE2, where the response message of the first message is used to indicate that UE1 is allowed to access the network through UE2. Correspondingly, the UE2 receives the response message of the first message.
可选的,该第一消息的响应消息可包括UE1的授权结果。若UE1未被授权执行远端 UE的功能和/或近距离通信业务功能,则UE2可以拒绝UE1的接入,并断开连接或者发送拒绝消息给UE1。该拒绝消息还可以包括拒绝标识,该拒绝标识用于指示UE1未被授权执行远端UE的功能和/或近距离通信业务功能。Optionally, the response message of the first message may include the authorization result of UE1. If UE1 is not authorized to perform remote UE functions and/or short-distance communication service functions, UE2 can reject UE1's access, disconnect the connection or send a rejection message to UE1. The rejection message may also include a rejection identifier, which is used to indicate that the UE1 is not authorized to perform the function of the remote UE and/or the short-distance communication service function.
可选的,该第一消息的响应消息可为RAN转发的AMF1的第二消息的响应消息。可选的,该第一消息的响应消息还可以包括UE2的授权结果。或者,该第一消息的响应消息可以包括第二消息的响应消息中的部分或全部信息、第二消息中的部分或全部信息、第一消息中的部分或全部信息和第四消息中的部分或全部信息中的任一项或多项。对于第一消息的响应消息可类比参考第四消息或第二消息的响应消息的描述,这里不再一一赘述。Optionally, the response message of the first message may be the response message of the second message of AMF1 forwarded by the RAN. Optionally, the response message of the first message may also include the authorization result of UE2. Alternatively, the response message of the first message may include part or all of the information in the response message of the second message, part or all of the information in the second message, part or all of the information in the first message, and part of the fourth message. Or any one or more of all the information. For the response message of the first message, refer to the description of the response message of the fourth message or the second message for analogy, which will not be repeated here.
在一种可能的实现方式中,图3所示的方法还可以包括:In a possible implementation manner, the method shown in FIG. 3 may further include:
306、UE2向UE1发送第四消息的响应消息。相应的,该UE1接收该第四消息的响应消息。306. UE2 sends a response message of the fourth message to UE1. Correspondingly, the UE1 receives the response message of the fourth message.
可选的,该第四消息的响应消息可以包括UE2的授权结果、第一消息的响应消息中的部分或全部信息、第二消息的响应消息中的部分或全部信息、第二消息中的部分或全部信息、第一消息中的部分或全部信息和第四消息中的部分或全部信息中的任一项或多项。对于第四消息的响应消息可类比参考第二消息的响应消息的描述,这里不再一一赘述。例如,该第四消息的响应消息中可以包括AMF1发送给UE1的非接入层(non-access stratum,NAS)消息,该NAS消息中包括UE2是否被授权执行中继功能的指示信息。通过该指示信息,可使得UE1确定接入的UE2是否被授权。Optionally, the response message of the fourth message may include the authorization result of UE2, part or all of the information in the response message of the first message, part or all of the information in the response message of the second message, and part of the second message. Or any one or more of all the information, part or all of the information in the first message, and part or all of the information in the fourth message. For the response message of the fourth message, refer to the description of the response message of the second message for analogy, which will not be repeated here. For example, the response message of the fourth message may include a non-access stratum (NAS) message sent by AMF1 to UE1, and the NAS message includes information indicating whether UE2 is authorized to perform the relay function. Through the indication information, the UE1 can determine whether the accessing UE2 is authorized.
在一种可能的实现方式中,上述步骤303可以替换为:In a possible implementation manner, the above step 303 can be replaced with:
313)RAN向AMF2发送第五消息,该第五消息用于请求UE2的授权结果,且该第五消息包括AMF1的地址和UE2的标识信息。相应的,该AMF2接收该第五消息。313) The RAN sends a fifth message to AMF2, the fifth message is used to request the authorization result of UE2, and the fifth message includes the address of AMF1 and identification information of UE2. Correspondingly, the AMF2 receives the fifth message.
以及该AMF2向AMF1发送第五消息的响应消息,该第五消息的响应消息包括UE2的授权结果和UE2的标识信息。相应的,AMF1接收该第五消息的响应消息。And the AMF2 sends a response message of the fifth message to AMF1, and the response message of the fifth message includes the authorization result of UE2 and the identification information of UE2. Correspondingly, AMF1 receives the response message of the fifth message.
本申请实施例中,该AMF2可以根据UE2的标识信息确定UE2的授权结果。对于该AMF2如何确定UE2的授权结果,可参考前述描述,这里不作详述。其中,该第五消息中包括的AMF1的地址可用于指示AMF2将UE2的授权结果发送给该AMF1。该RAN可以根据UE2的标识信息确定AMF2的地址,以及根据UE1的标识信息确定AMF1的地址。从而通过将AMF1的地址发送给AMF2,可使得AMF2能够直接将UE2的授权结果发送给AMF1。可理解,AMF2可以是直接向AMF1发送第五消息的响应消息,还可以通过其他网元向AMF1发送该第五消息的响应消息。In the embodiment of the present application, the AMF2 can determine the authorization result of the UE2 according to the identification information of the UE2. For how the AMF2 determines the authorization result of the UE2, please refer to the foregoing description, which will not be described in detail here. The address of AMF1 included in the fifth message can be used to instruct AMF2 to send the authorization result of UE2 to AMF1. The RAN can determine the address of AMF2 according to the identification information of UE2, and determine the address of AMF1 according to the identification information of UE1. Therefore, by sending the address of AMF1 to AMF2, AMF2 can directly send the authorization result of UE2 to AMF1. It is understandable that AMF2 may directly send a response message of the fifth message to AMF1, and may also send a response message of the fifth message to AMF1 through other network elements.
本申请实施例中,UE1请求通过UE2接入网络时,RAN确定该UE2被授权执行中继业务,然后向AMF1发送包括UE2的授权结果的第二消息,从而可使得该AMF1能够根据该UE2的授权结果允许UE1通过UE2接入网络。实施本申请实施例,可使得AMF1能够获得UE2的授权结果,从而及时允许UE1通过UE2接入网络。In the embodiment of this application, when UE1 requests to access the network through UE2, the RAN determines that UE2 is authorized to perform the relay service, and then sends a second message including the authorization result of UE2 to AMF1, so that the AMF1 can be based on the UE2's authorization result. The authorization result allows UE1 to access the network through UE2. Implementing the embodiments of this application can enable AMF1 to obtain the authorization result of UE2, thereby allowing UE1 to access the network through UE2 in time.
为更详细的理解本申请实施例所提供的授权结果的确定方法。参见图4,图4是本申请实施例提供的一种授权结果的确定方法的场景示意图。如图4所示,该方法包括:For a more detailed understanding of the method for determining the authorization result provided in the embodiment of the present application. Referring to FIG. 4, FIG. 4 is a schematic diagram of a scenario of a method for determining an authorization result provided by an embodiment of the present application. As shown in Figure 4, the method includes:
401、UE2通过RAN接入AMF2,完成网络的注册流程,接入到运营商网络。401. UE2 accesses AMF2 through RAN, completes the network registration process, and accesses the operator network.
402、UE1通过RAN接入AMF1,完成网络的注册流程,接入到运营商网络。402. UE1 accesses AMF1 through RAN, completes the network registration process, and accesses the operator network.
403、UE2通过AMF2或近距离服务功能(ProSe function)确定该UE2是否适用ProSe业务。以及UE1通过AMF1或近距离服务功能(ProSe function)确定该UE1是否适用ProSe业务。403. The UE2 determines whether the UE2 applies the ProSe service through the AMF2 or the ProSe function. And the UE1 determines whether the UE1 is applicable to the ProSe service through the AMF1 or the ProSe function.
具体的,AMF2可以从UDM中获取UE2的签约信息,根据该UE2的签约信息确定该UE2是否能够使用ProSe业务,和/或,确定该UE2是否能够执行中继业务。或者,AMF2可以从近距离服务功能获取UE2的签约信息等等。可选的,上述步骤403还可以在UE2接入AMF2,执行注册流程时实现。例如,在注册流程中,AMF2可以根据UE2的请求,从UDM或近距离服务功能中获取UE2的签约信息,从而确定该UE2是否可以被授权执行ProSe业务,或者,确定该UE2是否被授权执行中继业务。进而获得该UE2的授权结果。以及该AMF2还可以保存该UE2的授权结果,如保存UE2 ID和UE2的授权结果,或者保存UE2的中继ID和UE2的授权结果。Specifically, AMF2 may obtain UE2's subscription information from UDM, and determine whether the UE2 can use the ProSe service according to the UE2's subscription information, and/or determine whether the UE2 can perform the relay service. Alternatively, AMF2 may obtain UE2's subscription information and so on from the short-distance service function. Optionally, the above step 403 may also be implemented when the UE2 accesses the AMF2 and performs the registration procedure. For example, in the registration process, AMF2 can obtain the subscription information of UE2 from the UDM or short-range service function according to the request of UE2 to determine whether the UE2 can be authorized to perform the ProSe service, or to determine whether the UE2 is authorized to perform the service Following the business. Then obtain the authorization result of the UE2. And the AMF2 can also save the authorization result of the UE2, such as saving the UE2 ID and the authorization result of the UE2, or save the relay ID of the UE2 and the authorization result of the UE2.
可选的,在UE1接入AMF1,执行注册流程的过程中,该AMF1也可以根据UE1的注册请求,从UDM或近距离服务功能中获取UE1的签约信息。从而该AMF1确定该UE1是否能够使用ProSe业务,和/或,确定该UE1是否能够执行远端UE的业务,进而获得该UE1的授权结果。以及该AMF1还可以保存该UE1的授权结果,如保存UE1 ID和UE1的授权结果,或者保存UE1的远端ID和UE1的授权结果。Optionally, when the UE1 accesses the AMF1 and performs the registration process, the AMF1 may also obtain the subscription information of the UE1 from the UDM or the short-distance service function according to the registration request of the UE1. Therefore, the AMF1 determines whether the UE1 can use the ProSe service, and/or determines whether the UE1 can perform the service of the remote UE, and then obtains the authorization result of the UE1. And the AMF1 can also save the authorization result of the UE1, such as saving the UE1 ID and the authorization result of the UE1, or saving the remote ID of the UE1 and the authorization result of the UE1.
404、UE1执行发现流程。404. UE1 executes the discovery process.
其中,UE1执行发现流程,可以理解为:UE1发现可以通过UE2接入网络。或者,也可以理解为:UE1发现相对于与基站的距离来说,与UE2的距离更近。例如,UE1可以通过接收UE2的广播消息,从而确定该UE2是中继UE。Among them, UE1 performs the discovery process, which can be understood as: UE1 discovers that it can access the network through UE2. Alternatively, it can also be understood as: UE1 finds that the distance to UE2 is closer than the distance to the base station. For example, UE1 may determine that UE2 is a relay UE by receiving a broadcast message of UE2.
405、UE1向UE2发送非直接通信请求,该非直接通信请求包括UE1 ID和/或远端ID。相应的,该UE2接收该非直接通信请求。405. UE1 sends an indirect communication request to UE2, where the indirect communication request includes UE1 ID and/or remote ID. Correspondingly, the UE2 receives the indirect communication request.
406、UE2通过RAN向AMF2发送中继服务请求(relay UE service request),该中继服务请求包括UE2 ID和/或UE2的中继ID。相应的,AMF2接收该中继服务请求。406. The UE2 sends a relay service request (relay UE service request) to the AMF2 through the RAN. The relay service request includes the UE2 ID and/or the UE2 relay ID. Correspondingly, AMF2 receives the relay service request.
可选的,该中继服务请求中还可以包括UE1 ID和/或UE1的远端ID。Optionally, the relay service request may also include the ID of UE1 and/or the remote ID of UE1.
可理解,步骤406中继服务请求可以理解为图3所示的步骤3031)中的第三消息。It can be understood that the relay service request in step 406 can be understood as the third message in step 3031) shown in FIG. 3.
407、AMF2对UE2进行校验,确定UE2的授权结果。407. AMF2 checks UE2 to determine the authorization result of UE2.
该AMF2可以对UE2是否被授权执行中继功能进行校验;或者,该AMF2还可以对UE2是否被授权远端UE通过该中继UE执行中继业务的功能进行校验。可选的,如果AMF2在上述步骤403已对UE2进行校验,则该步骤407中,AMF2可以根据本地保存的信息确定UE2的授权结果。可选的,如果未执行上述步骤403,则AMF2可以从UDM或近距离服务功能获取该UE2的授权结果。The AMF2 can verify whether the UE2 is authorized to perform the relay function; or, the AMF2 can also verify whether the UE2 is authorized to perform the relay service function of the remote UE through the relay UE. Optionally, if AMF2 has verified UE2 in step 403, then in step 407, AMF2 may determine the authorization result of UE2 according to locally stored information. Optionally, if the above step 403 is not performed, the AMF2 may obtain the authorization result of the UE2 from the UDM or the short-distance service function.
408、AMF2向RAN发送NG接口应用协议(NG application protocol,NGAP)消息,该NGAP消息包括近距离授权指示(ProSe authorized)信息。该RAN接收该NGAP消息,并保存该近距离授权指示。408. AMF2 sends an NG interface application protocol (NG application protocol, NGAP) message to the RAN, where the NGAP message includes proximity authorization indication (ProSe authorized) information. The RAN receives the NGAP message and saves the short-range authorization instruction.
其中,近距离授权指示信息用于指示UE2非接入通信请求被授权。可选的,该NGAP消息还可以包括授权成功指示信息,该授权成功指示信息用于指示UE2被授权执行中继功 能;或者用于指示授权远端UE通过中继UE执行中继业务。可选的,该NGAP消息还可以包括UE2 ID和/或UE2的中继ID。可选的,该NGAP消息还可以包括UE1 ID和/或UE1的远端ID。可选的,RAN除了保存UE2的授权结果,还可以保存该UE2 ID和/或UE2的中继ID,以及UE1 ID和/或UE1的远端ID。Among them, the short-range authorization indication information is used to indicate that the UE2 non-access communication request is authorized. Optionally, the NGAP message may also include authorization success indication information, which is used to indicate that the UE2 is authorized to perform the relay function; or used to indicate that the remote UE is authorized to perform the relay service through the relay UE. Optionally, the NGAP message may also include UE2's ID and/or UE2's relay ID. Optionally, the NGAP message may also include the ID of UE1 and/or the remote ID of UE1. Optionally, in addition to storing the authorization result of UE2, the RAN may also store the UE2 ID and/or the relay ID of UE2, as well as the UE1 ID and/or the remote ID of UE1.
可理解,步骤408中的NGAP消息可以理解为图3所示的第三消息的响应消息。It can be understood that the NGAP message in step 408 can be understood as a response message to the third message shown in FIG. 3.
409、RAN向UE2发送无线资源控制(radio resource control,RRC)消息。409. The RAN sends a radio resource control (radio resource control, RRC) message to UE2.
可选的,该RRC消息包括近距离授权指示信息。相应的,该UE2接收该RRC消息。Optionally, the RRC message includes short-range authorization indication information. Correspondingly, the UE2 receives the RRC message.
410、UE2向UE1发送响应消息。410. UE2 sends a response message to UE1.
可以理解该响应消息用于指示UE2被允许使用非直接通信业务。It can be understood that the response message is used to indicate that UE2 is allowed to use the indirect communication service.
上述步骤405-410可理解为以下场景:如UE1通知UE2请求接入网络,该UE2请求AMF2对自己的中继业务进行授权。The above steps 405-410 can be understood as the following scenario: if the UE1 informs the UE2 to request access to the network, the UE2 requests the AMF2 to authorize its own relay service.
可以理解,如果UE2已经被授权执行relay的业务,那么图4所示的方法可以不包括406-409的步骤可以不做。It can be understood that if UE2 has been authorized to perform relay services, the method shown in FIG. 4 may not include steps 406-409 and may not be done.
可选的,在UE2接收到UE1发送的非直接通信请求时,该UE2还可以通过RAN向AMF1发送该UE1的标识信息。从而可使得该AMF1根据UE1的标识信息确定UE1是否被授权使用近距离通信业务和/或远端业务(即远端UE的功能)。AMF1校验通过之后,向UE2发送UE1的授权结果。如果校验成功,则UE2继续执行;否则UE2则中断流程,或者发送拒绝消息至UE1。所述拒绝消息还可以包括拒绝指示,指示UE1未被授权使用近距离通信业务和/或远端UE的功能。Optionally, when the UE2 receives the indirect communication request sent by the UE1, the UE2 may also send the identification information of the UE1 to the AMF1 through the RAN. Thus, the AMF1 can determine whether the UE1 is authorized to use the short-range communication service and/or the remote service (that is, the function of the remote UE) according to the identification information of the UE1. After the AMF1 verification is passed, the authorization result of UE1 is sent to UE2. If the verification is successful, UE2 continues to perform; otherwise, UE2 interrupts the process or sends a rejection message to UE1. The rejection message may also include a rejection indication, indicating that the UE1 is not authorized to use the near field communication service and/or the function of the remote UE.
411、UE1向UE2发送远端UE非接入请求(remote UE NAS request),该远端UE非接入请求包括UE1 ID和/或UE1的远端ID。相应的,UE2接收该远端UE非接入请求。411. UE1 sends a remote UE non-access request (remote UE NAS request) to UE2, where the remote UE non-access request includes UE1 ID and/or UE1's remote ID. Correspondingly, UE2 receives the remote UE non-access request.
可选的,该远端UE非接入请求还可以包括UE2 ID和/或UE2的中继ID。该UE2 ID和/或UE2的中继ID,可以为UE1在步骤404中获取的;或者也可以是在步骤410中获取的等等。Optionally, the remote UE non-access request may also include UE2's ID and/or UE2's relay ID. The UE2 ID and/or the relay ID of UE2 may be obtained by UE1 in step 404; or may be obtained in step 410, and so on.
可选的,该UE2还可以校验与UE1是否在同一个PLMN的服务网络;若不在同一个PLMN的服务网络,则中断流程,或者发送拒绝消息至UE1。所述拒绝消息还可以包括拒绝指示,指示UE1与UE2所属不同的PLMN服务网络。这里的校验方式可以为通过UE1的标识中携带的服务网络标识来确定或者UE1单独发送给UE2的服务网络标识,对比其与UE2所接入的服务网络是否相同。Optionally, the UE2 can also check whether it is in the same PLMN service network as the UE1; if it is not in the same PLMN service network, the process is interrupted or a rejection message is sent to UE1. The rejection message may also include a rejection indication, indicating that UE1 and UE2 belong to different PLMN service networks. The verification method here can be determined by the service network identifier carried in the identifier of UE1 or the service network identifier separately sent by UE1 to UE2 to compare whether it is the same as the service network accessed by UE2.
可理解,该远端UE非接入请求可以理解为图3所示的步骤301中的第四消息。It can be understood that the remote UE non-access request can be understood as the fourth message in step 301 shown in FIG. 3.
412、UE2向RAN发送上行RRC消息,该上行RRC消息包括非接入请求。相应的,该RAN接收该上行RRC消息。412. UE2 sends an uplink RRC message to the RAN, where the uplink RRC message includes a non-access request. Correspondingly, the RAN receives the uplink RRC message.
可理解,该上行RRC消息可以理解为图3所示的步骤301中的第一消息。It can be understood that the uplink RRC message can be understood as the first message in step 301 shown in FIG. 3.
413、RAN确定UE2被授权执行中继业务。413. The RAN determines that UE2 is authorized to perform the relay service.
本申请实施例中,RAN确定UE2被授权执行中继业务的方法如可以根据步骤408中该RAN保存的授权结果以及标识信息来确定。In the embodiment of the present application, the method for the RAN to determine that the UE2 is authorized to perform the relay service can be determined according to the authorization result and the identification information saved by the RAN in step 408, for example.
414、RAN向AMF1发送NGAP消息,该NGAP消息包括UE2的授权结果和UE2 ID;或者,该NGAP消息包括UE2的授权结果和UE2的中继ID。414. The RAN sends an NGAP message to AMF1, where the NGAP message includes the authorization result of UE2 and the ID of UE2; or, the NGAP message includes the authorization result of UE2 and the relay ID of UE2.
可选的,该NGAP消息还包括非接入请求。Optionally, the NGAP message also includes a non-access request.
可理解,该NGAP消息可以理解为图3所示的步骤303中的第二消息。It can be understood that the NGAP message can be understood as the second message in step 303 shown in FIG. 3.
415、AMF1确定UE2被授权执行中继业务。具体授权校验方式可以参见图3实施例。415. AMF1 determines that UE2 is authorized to perform the relay service. For a specific authorization verification method, refer to the embodiment in FIG. 3.
可选的,AMF1确定RAN发送的NGAP消息中的UE2 ID是否与UE1发送的远端UE非接入请求中的UE2 ID一致;若一致,则确定UE2授权成功;若不一致,则拒绝UE1接入网络的请求。或者,该AMF1还可以丢弃该NGAP消息等等。Optionally, AMF1 determines whether the UE2 ID in the NGAP message sent by the RAN is consistent with the UE2 ID in the remote UE non-access request sent by UE1; if they are the same, it is determined that the authorization of UE2 is successful; if they are inconsistent, UE1 is denied access Network request. Alternatively, the AMF1 may also discard the NGAP message and so on.
416、AMF1通过RAN,以及UE2向UE1发送下行NAS消息,该下行NAS消息用于指示授权UE1通过UE2接入网络或者授权UE2执行中继业务。416. AMF1 sends a downlink NAS message to UE1 through RAN and UE2, where the downlink NAS message is used to instruct UE1 to access the network through UE2 or to authorize UE2 to perform a relay service.
可理解,该下行NAS消息可以理解为图3所示的步骤304中的第二消息的响应消息。或者,该下行NAS消息可以理解为图3所示的步骤305中的第一消息的响应消息;或者步骤306中的第四消息的响应消息。It can be understood that the downlink NAS message can be understood as a response message to the second message in step 304 shown in FIG. 3. Or, the downlink NAS message may be understood as the response message of the first message in step 305 shown in FIG. 3; or the response message of the fourth message in step 306.
该下行NAS消息中,还包括UE2 ID和/或中继ID。The downlink NAS message also includes the UE2 ID and/or relay ID.
417、UE1根据下行NAS消息确定授权接入网络。417. The UE1 determines the authorization to access the network according to the downlink NAS message.
可选的,该UE1还可以确定该下行NAS消息中的UE2的中继ID与发现流程中所发现的中继UE的ID是否一致,若一致,则确定接入网络;若不一致,则该UE1还可以中断接入网络流程;或者重新选择其他中继UE来接入网络。Optionally, the UE1 may also determine whether the relay ID of the UE2 in the downlink NAS message is consistent with the ID of the relay UE discovered in the discovery process. If they are consistent, it is determined to access the network; if they are inconsistent, the UE1 The process of accessing the network can also be interrupted; or another relay UE can be reselected to access the network.
本申请实施例中,通过基站完成UE2的授权信息的中转,避免了AMF之间授权参数的传递,减少了AMF之间的影响。In the embodiment of the present application, the transfer of the authorization information of the UE2 is completed by the base station, which avoids the transfer of authorization parameters between AMFs and reduces the impact between AMFs.
在一种可能的实现方式中,上述步骤413-415所示的方法还可以替换为:In a possible implementation manner, the methods shown in steps 413-415 above can also be replaced with:
423)RAN向AMF1转发UE2发送的上行RRC消息。相应的,该AMF1接收该上行RRC消息。423) The RAN forwards the uplink RRC message sent by UE2 to AMF1. Correspondingly, the AMF1 receives the uplink RRC message.
424)AMF1向AMF2发送请求消息,该请求消息用于请求UE2的授权结果。相应的,该AMF2接收该请求消息。该请求消息携带UE2 ID和/或中继ID。424) AMF1 sends a request message to AMF2, and the request message is used to request the authorization result of UE2. Correspondingly, the AMF2 receives the request message. The request message carries UE2 ID and/or relay ID.
该AMF1可以根据上行RRC消息中包括的UE2 ID和/或UE2的中继ID,确定该AMF2的地址。该AMF2可以根据该UE2 ID和/或UE2的中继ID确定该UE2是否被授权执行中继业务。在该AMF2确定该UE2被授权执行中继业务的情况下,该AMF2执行步骤425)。The AMF1 may determine the address of the AMF2 according to the UE2 ID and/or the relay ID of the UE2 included in the uplink RRC message. The AMF2 can determine whether the UE2 is authorized to perform the relay service according to the UE2 ID and/or the relay ID of the UE2. In the case that the AMF2 determines that the UE2 is authorized to perform the relay service, the AMF2 performs step 425).
425)AMF2向AMF1发送请求消息的响应消息。相应的,该AMF1接收该请求消息的响应消息。以及该AMF1根据该请求消息的响应消息确定该UE2被授权执行中继业务。425) AMF2 sends a response message of the request message to AMF1. Correspondingly, the AMF1 receives the response message of the request message. And the AMF1 determines that the UE2 is authorized to perform the relay service according to the response message of the request message.
在一种可能的实现方式中,上述步骤413-415所示的方法还可以替换为:In a possible implementation manner, the methods shown in steps 413-415 above can also be replaced with:
433)RAN向AMF1转发UE2发送的上行RRC消息。相应的,该AMF1接收该上行RRC消息。433) The RAN forwards the uplink RRC message sent by UE2 to AMF1. Correspondingly, the AMF1 receives the uplink RRC message.
434)AMF1向UDM或近距离服务功能发送请求消息,该请求消息用于请求UE2的授权结果。相应的,该UDM或近距离服务功能接收该请求消息。该请求消息携带UE2 ID和/或中继ID。434) AMF1 sends a request message to UDM or the short-distance service function, and the request message is used to request the authorization result of UE2. Correspondingly, the UDM or short-distance service function receives the request message. The request message carries UE2 ID and/or relay ID.
435)UDM或近距离服务功能向AMF1发送请求消息的响应消息。相应的,该AMF1接收该请求消息的响应消息。以及该AMF1根据该请求消息的响应消息确定该UE2被授权执行中继业务。435) The UDM or short-distance service function sends a response message of the request message to AMF1. Correspondingly, the AMF1 receives the response message of the request message. And the AMF1 determines that the UE2 is authorized to perform the relay service according to the response message of the request message.
本申请实施例中,通过AMF之间的接口完成数据的传递,避免了通过基站传递授权参 数等。In the embodiment of the present application, the data transfer is completed through the interface between AMFs, which avoids the transfer of authorization parameters and the like through the base station.
本申请实施例所示的方法,是以AMF2为例来校验UE2是否被授权执行中继业务或近距离服务功能;或者是以AMF1为例校验UE1是否被授权执行远端业务或近距离服务功能。在一些实施例中,也可以由SMF执行上述方法。The method shown in the embodiment of this application uses AMF2 as an example to verify whether UE2 is authorized to perform relay services or short-distance service functions; or AMF1 as an example to verify whether UE1 is authorized to perform remote services or short-distance services service function. In some embodiments, the above method may also be executed by SMF.
以SMF1为例进行描述:这里UE1通过UE2,RAN和AMF1访问SMF1。此时SMF1校验UE2是否能够使用中继功能。具体的方式如:AMF1将UE2的授权结果发送给SMF1;或者,SMF1根据UE2的标识信息确定(具体确认方式跟AMF2根据UE2的标识信息确定相同);或者SMF1请求AMF2,从AMF2处得到。如果SMF1校验UE2成功之后,发送校验成功指示给AMF1,之后AMF1再继续执行其他流程,不做限制。Take SMF1 as an example to describe: Here, UE1 accesses SMF1 through UE2, RAN and AMF1. At this time, SMF1 checks whether UE2 can use the relay function. The specific method is as follows: AMF1 sends the authorization result of UE2 to SMF1; or, SMF1 is determined according to the identification information of UE2 (the specific confirmation method is the same as that determined by AMF2 according to the identification information of UE2); or SMF1 requests AMF2 and obtains it from AMF2. If SMF1 successfully verifies UE2, it sends a verification success indication to AMF1, and then AMF1 continues to execute other processes without restriction.
本申请实施例还包括以下可能性,如果AMF1校验UE2成功,也可以不发送UE2授权校验成功指示给RAN,或者UE2,或者UE1。AMF1可以正常的执行UE1的业务流程,例如UE1注册,会话建立等。业务流程没有中断,意味着UE2的授权校验是成功的。The embodiment of the present application also includes the following possibility. If the AMF1 successfully verifies the UE2, it may not send the UE2 authorization verification success indication to the RAN, or the UE2, or the UE1. AMF1 can normally perform UE1's business processes, such as UE1 registration, session establishment, and so on. The business process is not interrupted, which means that the authorization verification of UE2 is successful.
本申请实施例还包括以下可能性,如果RAN校验UE2成功,也可以不发送UE2授权校验成功指示给UE2,或者UE1。RAN可以正常的执行UE1的业务流程,例如UE1注册,会话建立等。业务流程没有中断,意味着UE2的授权校验是成功的。The embodiment of the present application also includes the following possibility. If the RAN verifies UE2 successfully, the UE2 authorization verification success indication may not be sent to UE2 or UE1. The RAN can normally perform UE1's service procedures, such as UE1 registration, session establishment, and so on. The business process is not interrupted, which means that the authorization verification of UE2 is successful.
以上详细介绍了本申请实施例提供的方法,以下将详细介绍本申请实施例提供的装置。The method provided in the embodiment of the present application is described in detail above, and the device provided in the embodiment of the present application will be described in detail below.
参见图5,图5是本申请实施例提供的一种通信装置的结构示意图。该无线通信装置可用于执行本申请所提供的授权结果的确定方法。如图5所示,Referring to FIG. 5, FIG. 5 is a schematic structural diagram of a communication device provided by an embodiment of the present application. The wireless communication device can be used to execute the method for determining the authorization result provided in this application. As shown in Figure 5,
收发单元501,用于接收第二终端设备发送的第一消息,该第一消息用于指示第一终端设备请求通过该第二终端设备接入网络,且该第一消息包括该第二终端设备的标识信息;The transceiver unit 501 is configured to receive a first message sent by a second terminal device, where the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes the second terminal device ’S identification information;
处理单元502,用于根据该第二终端设备的标识信息确定该第二终端设备的授权结果;The processing unit 502 is configured to determine the authorization result of the second terminal device according to the identification information of the second terminal device;
该收发单元501,还用于向第一核心网设备发送第二消息,该第二消息包括该第二终端设备的授权结果;以及还用于接收该第一核心网设备发送的第二消息的响应消息。The transceiver unit 501 is further configured to send a second message to the first core network device, the second message including the authorization result of the second terminal device; and also to receive a second message sent by the first core network device Response message.
在一种可能的实现方式中,该接入网设备保存有该第二终端设备的授权结果。In a possible implementation manner, the access network device stores the authorization result of the second terminal device.
在一种可能的实现方式中,该收发单元501,还用于向第二核心网设备发送第三消息,该第三消息包括该第二终端设备的标识信息,且该第三消息用于请求该第二终端设备的授权结果;In a possible implementation manner, the transceiver unit 501 is further configured to send a third message to the second core network device, the third message includes the identification information of the second terminal device, and the third message is used to request The authorization result of the second terminal device;
该收发单元501,还用于接收该第二核心网设备发送的第三消息的响应消息;The transceiver unit 501 is further configured to receive a response message of the third message sent by the second core network device;
该处理单元502,还用于保存该第二终端设备的授权结果。The processing unit 502 is also used to save the authorization result of the second terminal device.
在一种可能的实现方式中,该第二终端设备的标识信息包括该第二终端设备的中继标识。In a possible implementation manner, the identification information of the second terminal device includes the relay identification of the second terminal device.
在一种可能的实现方式中,该收发单元501,还用于向该第二终端设备发送第一消息的响应消息,该第一消息的响应消息用于指示该第一终端设备允许通过该第二终端设备接入网络。In a possible implementation manner, the transceiving unit 501 is further configured to send a response message of the first message to the second terminal device, and the response message of the first message is used to indicate that the first terminal device is allowed to pass through the second terminal device. 2. The terminal equipment is connected to the network.
在一种可能的实现方式中,该第一消息的响应消息包括该第二终端设备的授权结果。In a possible implementation manner, the response message of the first message includes the authorization result of the second terminal device.
在一种可能的实现方式中,处理单元502可以用一个或多个处理器实现,收发单元501可以用收发器实现。在一种可能的实现方式中,处理单元502可以用一个或多个处理电路 实现,收发单元501可以用接口电路(或输入输出接口、通信接口、接口等)实现。In a possible implementation manner, the processing unit 502 may be implemented by one or more processors, and the transceiver unit 501 may be implemented by a transceiver. In a possible implementation manner, the processing unit 502 can be implemented by one or more processing circuits, and the transceiver unit 501 can be implemented by an interface circuit (or an input/output interface, a communication interface, an interface, etc.).
可理解,对于图5所示的通信装置的具体实现方式可参考图3和图4所示的接入网设备如RAN所执行的步骤,这里不作详述。It can be understood that, for the specific implementation of the communication device shown in FIG. 5, reference may be made to the steps performed by the access network device such as the RAN shown in FIG. 3 and FIG. 4, which are not described in detail here.
参见图6,图6是本申请实施例提供的一种通信系统的结构示意图。该通信系统可用于执行图3和图4所示的方法。如图6所示,该通信系统包括:Refer to FIG. 6, which is a schematic structural diagram of a communication system provided by an embodiment of the present application. The communication system can be used to implement the methods shown in FIG. 3 and FIG. 4. As shown in Figure 6, the communication system includes:
第一核心网设备601,用于接收接入网设备发送的第二消息,该第二消息包括第二终端设备的授权结果;The first core network device 601 is configured to receive a second message sent by the access network device, where the second message includes the authorization result of the second terminal device;
该第一核心网设备601,还用于根据该第二终端设备的授权结果确定该第二终端设备被授权执行中继业务;The first core network device 601 is further configured to determine that the second terminal device is authorized to perform the relay service according to the authorization result of the second terminal device;
该第一核心网设备601,还用于向该接入网设备发送该第二消息的响应消息。The first core network device 601 is further configured to send a response message of the second message to the access network device.
在一种可能的实现方式中,该系统还包括:In a possible implementation manner, the system further includes:
接入网设备602,用于接收该第二终端设备发送的第一消息;其中,该第一消息用于指示第一终端设备请求通过该第二终端设备接入网络,且该第一消息包括第二终端设备的标识信息;The access network device 602 is configured to receive a first message sent by the second terminal device; where the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes Identification information of the second terminal device;
该接入网设备602,还用于确定该第二终端设备被授权执行中继业务,向该第一核心网设备发送该第二消息。The access network device 602 is also used to determine that the second terminal device is authorized to perform a relay service, and send the second message to the first core network device.
在一种可能的实现方式中,该接入网设备602,还用于向第二核心网设备发送第三消息,该第三消息包括该第二终端设备的标识信息,且该第三消息用于请求该第二终端设备的授权结果;In a possible implementation manner, the access network device 602 is further configured to send a third message to the second core network device, the third message includes the identification information of the second terminal device, and the third message is used To request the authorization result of the second terminal device;
第二核心网设备603,用于接收该接入网设备发送的该第三消息,并向该接入网设备发送该第三消息的响应消息;The second core network device 603 is configured to receive the third message sent by the access network device, and send a response message of the third message to the access network device;
该接入网设备602,具体用于根据该第三消息的响应消息,确定该第二终端设备被授权执行中继业务。The access network device 602 is specifically configured to determine, according to the response message of the third message, that the second terminal device is authorized to perform the relay service.
在一种可能的实现方式中,该接入网设备602,还用于向该第二终端设备发送第一消息的响应消息,该第一消息的响应消息用于指示该第一终端设备允许通过该第二终端设备接入网络。In a possible implementation manner, the access network device 602 is also used to send a response message of the first message to the second terminal device, and the response message of the first message is used to instruct the first terminal device to allow passage through The second terminal device accesses the network.
作为示例,上述第一核心网设备可以包括处理单元和收发单元,该收发单元可用于执行与收发信号相关的方法。例如,收发单元可用于接收接入网设备发送的第二消息,以及向该接入网设备发送该第二消息的响应消息。例如,处理单元,可用于根据第二终端设备的授权结果确定该第二终端设备被授权执行中继业务。又例如,处理单元,还用于对第一终端设备的ProSe业务进行校验等等。As an example, the foregoing first core network device may include a processing unit and a transceiving unit, and the transceiving unit may be used to perform a method related to transceiving signals. For example, the transceiver unit may be used to receive a second message sent by an access network device, and send a response message of the second message to the access network device. For example, the processing unit may be configured to determine that the second terminal device is authorized to perform the relay service according to the authorization result of the second terminal device. For another example, the processing unit is also used to verify the ProSe service of the first terminal device and so on.
作为示例,上述第二核心网设备可以包括处理单元和收发单元。例如,收发单元,可用于接收接入网设备发送的第三消息。又例如,该收发单元,还用于向接入网设备发送第三消息的响应消息。例如,处理单元,可用于对终端设备进行校验,确定该第二终端设备的授权结果。As an example, the foregoing second core network device may include a processing unit and a transceiving unit. For example, the transceiver unit may be used to receive the third message sent by the access network device. For another example, the transceiver unit is also configured to send a response message of the third message to the access network device. For example, the processing unit may be used to verify the terminal device and determine the authorization result of the second terminal device.
可理解,对于图6所示的通信系统中各个设备的具体实现方式可参考图3和图4所示的方法,这里不作详述。It can be understood that, for the specific implementation of each device in the communication system shown in FIG. 6, reference may be made to the methods shown in FIG. 3 and FIG. 4, which are not described in detail here.
参见图7,图7是本申请实施例提供的一种通信装置的结构示意图。Refer to FIG. 7, which is a schematic structural diagram of a communication device provided by an embodiment of the present application.
在一个实施例中,该通信装置可以作为接入网设备使用。在另一个实施例中,该通信装置可以作为第一核心网设备使用。在另一个实施例中,该通信装置可以作为第二核心网设备使用。对于以上各个实施例,该通信装置的具体实现方式可参考图3和图4所示的方法。In an embodiment, the communication device may be used as an access network device. In another embodiment, the communication device may be used as the first core network device. In another embodiment, the communication device can be used as a second core network device. For each of the above embodiments, the specific implementation of the communication device can refer to the methods shown in FIG. 3 and FIG. 4.
作为示例,当图5所示装置中的处理单元502用处理器实现,收发单元501用收发器实现时,如图7所示,该装置70包括至少一个处理器720,用于实现本申请实施例提供的方法中接入网设备的功能。或者,当第一核心网设备或第二核心网设备的处理单元(附图未示出)用处理器实现,收发单元用收发器实现时,如图7所示,该装置70包括至少一个处理器720,用于实现本申请实施例提供的方法中第一核心网设备或第二核心网设备的功能。As an example, when the processing unit 502 in the device shown in FIG. 5 is implemented by a processor, and the transceiver unit 501 is implemented by a transceiver, as shown in FIG. 7, the device 70 includes at least one processor 720 for implementing the implementation of this application. The function of the access network equipment in the method provided in the example. Or, when the processing unit of the first core network device or the second core network device (not shown in the drawings) is implemented by a processor, and the transceiver unit is implemented by a transceiver, as shown in FIG. 7, the apparatus 70 includes at least one processing unit. The device 720 is configured to implement the function of the first core network device or the second core network device in the method provided in the embodiment of the present application.
以及装置70还可以包括收发器710。收发器可用于通过传输介质和其它装置进行通信。处理器720利用收发器710收发数据(如收发消息等等),并用于实现上述方法实施例所述的方法。And the device 70 may also include a transceiver 710. The transceiver can be used to communicate with other devices through the transmission medium. The processor 720 uses the transceiver 710 to send and receive data (such as sending and receiving messages, etc.), and is used to implement the method described in the foregoing method embodiment.
可选的,装置70还可以包括至少一个存储器730,用于存储程序指令和/或数据。存储器730和处理器720耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器720可能和存储器730协同操作。处理器720可能执行存储器730中存储的程序指令。Optionally, the device 70 may further include at least one memory 730 for storing program instructions and/or data. The memory 730 and the processor 720 are coupled. The coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, and may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules. The processor 720 may operate in cooperation with the memory 730. The processor 720 may execute program instructions stored in the memory 730.
本申请实施例中不限定上述收发器710、处理器720以及存储器730之间的具体连接介质。本申请实施例在图7中以存储器730、处理器720以及收发器710之间通过总线740连接,总线在图7中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图7中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The specific connection medium between the above-mentioned transceiver 710, the processor 720, and the memory 730 is not limited in the embodiment of the present application. In the embodiment of the present application, the memory 730, the processor 720, and the transceiver 710 are connected by a bus 740 in FIG. 7, and the bus is represented by a thick line in FIG. 7. The connection mode between other components is only for schematic illustration. , Is not limited. The bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 7, but it does not mean that there is only one bus or one type of bus.
在本申请实施例中,处理器可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。In the embodiments of the present application, the processor may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which may implement or Perform the methods, steps, and logic block diagrams disclosed in the embodiments of the present application. The general-purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in combination with the embodiments of the present application may be directly embodied as execution and completion by a hardware processor, or execution and completion by a combination of hardware and software modules in the processor.
本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括 但不限于这些和任意其它适合类型的存储器。The memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), and synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) ) And direct memory bus random access memory (direct rambus RAM, DR RAM). It should be noted that the memories of the systems and methods described herein are intended to include, but are not limited to, these and any other suitable types of memories.
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行图3和/或图4所示实施例中的方法。According to the method provided in the embodiments of the present application, the present application also provides a computer program product, the computer program product includes: computer program code, when the computer program code runs on a computer, the computer executes FIG. 3 and/or FIG. 4 shows the method in the embodiment.
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行图3和/或图4所示实施例中的方法。According to the method provided in the embodiments of the present application, the present application also provides a computer-readable medium that stores program code, and when the program code runs on a computer, the computer executes FIG. 3 and/or FIG. 4 shows the method in the embodiment.
依据本申请实施例提供的方法,本申请还提供一种计算机程序,该计算机程序可用于执行图3和/或图4所示实施例中的方法。According to the method provided in the embodiment of the present application, the present application also provides a computer program that can be used to execute the method in the embodiment shown in FIG. 3 and/or FIG. 4.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disc,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented by software, it can be implemented in the form of a computer program product in whole or in part. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website, computer, server, or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc, SSD)) etc.
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在两个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进程来通信。The terms "component", "module", "system", etc. used in this specification are used to denote computer-related entities, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, the component may be, but is not limited to, a process, a processor, an object, an executable file, an execution thread, a program, and/or a computer running on a processor. Through the illustration, both the application running on the computing device and the computing device can be components. One or more components may reside in processes and/or threads of execution, and components may be located on one computer and/or distributed between two or more computers. In addition, these components can be executed from various computer readable media having various data structures stored thereon. The component can be based on, for example, a signal having one or more data packets (e.g. data from two components interacting with another component in a local system, a distributed system, and/or a network, such as the Internet that interacts with other systems through a signal) Communicate through local and/or remote processes.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各种说明性逻辑块(illustrative logical block)和步骤(step),能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art may realize that the various illustrative logical blocks and steps described in the embodiments disclosed herein can be implemented by electronic hardware or a combination of computer software and electronic hardware. achieve. Whether these functions are executed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of description, the specific working process of the system, device and unit described above can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟 悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in this application. Should be covered within the scope of protection of this application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.
除了上述授权UE1能否执行远端UE业务,和/或授权UE2能否执行中继UE业务之外,本申请还包括授权UE1是否允许通过中继UE2接入某些切片和/或会话的方法。In addition to the above authorization whether UE1 can perform remote UE services and/or whether UE2 is authorized to perform relay UE services, this application also includes methods for authorizing UE1 to allow access to certain slices and/or sessions through relay UE2 .
为更详细的理解本申请提供的切片等相关授权结果的确定方法,参见图8。图8是本申请提供的另一种授权结果确定方法的场景示意图。如图8所示,该方法包括:For a more detailed understanding of the method for determining related authorization results such as slices provided in this application, refer to FIG. 8. FIG. 8 is a schematic diagram of a scenario of another authorization result determination method provided by this application. As shown in Figure 8, the method includes:
800、UE2通过RAN接入AMF2,完成网络的注册流程,接入到运营商网络。AMF2保存有UE2的订阅信息。此订阅信息为UE2注册过程中,AMF2向UDM发送订阅数据获得请求,并从UDM处接收到的。UE2订阅信息包括允许UE2访问的切片信息;或者UE2订阅信息包括允许UE2为哪些切片信息提供中继功能的服务。这里切片信息可以为切片标识,或者网络切片选择支撑信息(network slice selection assistance information,NSSAI),或者单网络切片选择支撑信息(single network slice selection assistance information,S-NSSAI)S-NSSAI等用来标识切片的信息或者标识。800. UE2 accesses AMF2 through RAN, completes the network registration process, and accesses the operator's network. AMF2 stores UE2's subscription information. This subscription information is received from UDM when AMF2 sends a subscription data acquisition request to UDM during UE2 registration. The UE2 subscription information includes the slice information that the UE2 is allowed to access; or the UE2 subscription information includes the slice information for which the UE2 is allowed to provide the service of the relay function. The slice information here can be a slice identifier, or network slice selection assistance information (NSSAI), or single network slice selection assistance information (S-NSSAI), S-NSSAI, etc. Information or identification of the slice.
注意,这里UE1发现UE2有两种模式。模式1为UE2广播信息,UE1通过UE2的广播信息确定使用UE2提供的中继服务,然后接入UE2。模式2为UE1发送广播信息广播自己希望使用中继服务,UE2确定可以为UE1提供中继服务,则响应UE1的广播信息。Note that here UE1 finds that UE2 has two modes. Mode 1 is that UE2 broadcasts information. UE1 uses the broadcast information of UE2 to determine to use the relay service provided by UE2, and then access UE2. Mode 2 is that UE1 sends broadcast information to broadcast that it wants to use the relay service, and UE2 determines that it can provide the relay service for UE1, and then responds to UE1's broadcast information.
针对模式1的方式,图8所示的方法还可以包括步骤801和步骤802。For the mode of mode 1, the method shown in FIG. 8 may further include step 801 and step 802.
801、UE2作为中继发送广播信息,广播信息包括切片信息2或者切片信息2的编码。切片信息2用来指示UE2作为中继可以为哪些切片提供中继服务。可选的,这里也可以广播切片信息2的编码;但接收者UE1可以根据切片信息2的编码确定对应的切片信息2。这里切片信息2或者切片信息2的编码也可以承载在广播消息的中继服务编码中进行发送。801. UE2 serves as a relay to send broadcast information, where the broadcast information includes slice information 2 or the code of slice information 2. Slice information 2 is used to indicate which slices UE2 can provide relay services for as a relay. Optionally, the coding of slice information 2 can also be broadcast here; but the receiver UE1 can determine the corresponding slice information 2 according to the coding of slice information 2. Here, the slice information 2 or the code of slice information 2 may also be carried in the relay service code of the broadcast message for transmission.
802、UE1接收到UE2发送的广播信息,确定希望通过UE2访问切片信息2或者切片信息2的编码对应的切片服务,则UE1发送SUCI1和切片信息1至UE2,这里切片信息1为UE1希望通过中继访问的切片业务对应的切片信息。可选的,可以通过PC5通信请求发送给UE2。这里UE1可以根据切片信息2的编码确定切片信息2。可选的,UE1可以预置切片信息2的编码对应的切片信息2的列表,或者注册过程中,通过AMF网元从UDM接收到这个列表,进而确定切片信息2。这里切片信息2或者切片信息2的编码对应的切片可以与切片信息1对应的切片相同,或者包括切片信息1对应的切片。例如切片信息2包括5个S-NSSAI,而切片信息1为上述5个S-NSSAI中1个。802. UE1 receives the broadcast information sent by UE2, and determines that it wants to access slice information 2 or the slice service corresponding to the code of slice information 2 through UE2, then UE1 sends SUCI1 and slice information 1 to UE2, where slice information 1 is UE1 hopes to pass. The slice information corresponding to the accessed slice service. Optionally, it can be sent to UE2 through a PC5 communication request. Here, the UE1 may determine the slice information 2 according to the encoding of the slice information 2. Optionally, the UE1 may preset a list of slice information 2 corresponding to the encoding of the slice information 2, or during the registration process, receive this list from the UDM through the AMF network element, and then determine the slice information 2. Here, the slice corresponding to the slice information 2 or the encoding of the slice information 2 may be the same as the slice corresponding to the slice information 1, or include the slice corresponding to the slice information 1. For example, slice information 2 includes 5 S-NSSAIs, and slice information 1 is 1 of the above 5 S-NSSAIs.
针对模式2的方式,图8所示的方法可以包括步骤802。即步骤801可选。UE1发送PC5通信请求信息,其中包括切片信息1和SUCI1。这里切片信息1为UE1希望通过中继访问的切片业务对应的切片信息。UE2确定能够为UE1提供针对切片信息1的中继服务,则继续执行。可选的发送可以提供中继服务的响应给UE1。For the mode of mode 2, the method shown in FIG. 8 may include step 802. That is, step 801 is optional. UE1 sends PC5 communication request information, which includes slice information 1 and SUCI1. Here, slice information 1 is slice information corresponding to the slice service that UE1 wants to access through the relay. The UE2 determines that it can provide the relay service for the slice information 1 for the UE1, and then continues. Optionally send a response that can provide a relay service to UE1.
803、UE2发送中继服务请求至AMF2,其中包括SUCI1和切片信息1,其中SUCI1和切片信息1为远端UE1对应的信息。803. UE2 sends a relay service request to AMF2, which includes SUCI1 and slice information 1, where SUCI1 and slice information 1 are information corresponding to remote UE1.
可选的,UE2确定能否为切片信息1对应的切片提供中继服务。这里UE2可以保存有 网络配置给UE2的允许UE2提供中继服务的切片信息。根据保存的此切片信息,UE2可以确定是否为UE1发送的切片信息1提供中继服务。若能够提供服务,则继续执行;否则发送拒绝消息给UE1。Optionally, UE2 determines whether to provide a relay service for the slice corresponding to slice information 1. Here, UE2 may save the slice information configured to UE2 by the network to allow UE2 to provide relay services. According to the saved slice information, UE2 can determine whether to provide a relay service for slice information 1 sent by UE1. If the service can be provided, continue execution; otherwise, send a rejection message to UE1.
可选的,UE2还发送中继指示1,用来告诉AMF2此服务请求为中继服务请求。Optionally, UE2 also sends a relay indication 1 to tell AMF2 that this service request is a relay service request.
可选的,上述中继服务请求是一种特殊的请求消息类型,可用来指示UE2执行中继功能发送的消息。Optionally, the foregoing relay service request is a special request message type that can be used to instruct UE2 to perform a message sent by the relay function.
可选的,SUCI1和切片信息1可以放在一个特殊的container内,发送给AMF2。这个container用来指示是UE2执行中继功能发送的container,其中包括远端UE1的SUCI1和切片信息1。Optionally, SUCI1 and slice information 1 can be placed in a special container and sent to AMF2. This container is used to indicate that it is the container sent by the UE2 performing the relay function, which includes the SUCI1 and slice information 1 of the remote UE1.
这里AMF2可以为步骤800中,保存UE2订阅信息的AMF2;或者一个新的AMF,但是可以请求保存UE2订阅信息的AMF2,并获得UE2订阅信息。为了描述方便,这里用AMF2描述。Here, AMF2 can be the AMF2 that saves UE2's subscription information in step 800; or a new AMF, but can request the AMF2 that saves UE2's subscription information, and obtain UE2's subscription information. For the convenience of description, AMF2 is used here.
804、可选的,AMF2根据中继指示1确定消息803是UE2执行中继功能发送的消息;则触发步骤804中如下的校验。804. Optionally, the AMF2 determines according to the relay indication 1 that the message 803 is a message sent by the UE2 performing the relay function; then the following verification in step 804 is triggered.
可选的,步骤804还可以替换为:AMF2根据中继服务请求的消息类型确定是UE2执行中继功能发送的消息;则触发下面的校验。Optionally, step 804 can also be replaced with: AMF2 determines according to the message type of the relay service request that it is a message sent by UE2 performing the relay function; then the following verification is triggered.
可选的,步骤804还可以替换为:AMF2根据特殊的container确定是UE2执行中继功能发送的container;则触发下面的校验。Optionally, step 804 can also be replaced with: AMF2 determines according to a special container that it is the container sent by UE2 performing the relay function; then the following verification is triggered.
可选的,AMF2根据UE2订阅信息确定UE2是否能够为切片信息1提供中继服务。具体为,AMF2确定切片信息1是否为UE2的订阅信息中允许UE2访问的切片信息的一个;和/或UE2订阅信息中允许UE2作为中继功能提供服务的切片信息的一个。如果切片信息1符合上述第一个校验和/或第二个校验,则AMF2继续执行;否则AMF2发送拒绝消息至UE2。可选的拒绝消息携带拒绝指示,用来指示UE2不被允许为切片信息1提供中继服务。UE2接收到AMF2发送的拒绝消息后,发送PC5通信拒绝消息至UE1,拒绝UE1使用UE2的中继功能。可选的拒绝消息携带拒绝指示,用来指示UE2不能为切片信息1提供中继服务。Optionally, AMF2 determines whether UE2 can provide a relay service for slice information 1 according to UE2's subscription information. Specifically, AMF2 determines whether slice information 1 is one of the slice information that UE2 is allowed to access in the subscription information of UE2; and/or one of slice information that allows UE2 to serve as a relay function in the UE2 subscription information. If the slice information 1 meets the above-mentioned first checksum/or the second check, AMF2 continues to execute; otherwise, AMF2 sends a rejection message to UE2. The optional rejection message carries a rejection indication, which is used to indicate that UE2 is not allowed to provide a relay service for slice information 1. After UE2 receives the rejection message sent by AMF2, it sends a PC5 communication rejection message to UE1, rejecting UE1 to use the relay function of UE2. The optional rejection message carries a rejection indication, which is used to indicate that UE2 cannot provide a relay service for slice information 1.
如果切片信息1符合第一个校验和/或第二个校验,则AMF2继续执行。AMF发送认证请求至AUSF,其中包括SUCI1。If the slice information 1 matches the first checksum/or the second check, AMF2 continues to execute. AMF sends an authentication request to AUSF, which includes SUCI1.
805、AUSF从UDM获得SUCI1对应UE1的认证向量和SUPI1(即UE1的SUPI),这是SUPI1为SUCI1解密后对应的UE1的标识。805. AUSF obtains the authentication vector of SUCI1 corresponding to UE1 and SUPI1 (ie, SUPI of UE1) from UDM, which is the identifier of UE1 corresponding to SUPI1 after SUPI1 is decrypted by SUCI1.
806、AUSF与UE1通过UE2,RAN和AMF2执行认证。806. AUSF and UE1 perform authentication through UE2, RAN and AMF2.
807、认证成功后,AUSF发送认证响应给AMF2,其中携带SUPI1。807. After the authentication is successful, AUSF sends an authentication response to AMF2, which carries SUPI1.
可理解,对于本申请实施例提供的步骤805-807所示的认证方法不做限定。示例性的,该认证方法可以依据当前5G的认证流程执行。或者,还可以根据相关标准或协议执行等。It can be understood that the authentication methods shown in steps 805-807 provided in the embodiments of the present application are not limited. Exemplarily, the authentication method may be executed according to the current 5G authentication process. Or, it can be implemented in accordance with relevant standards or agreements.
808、AMF2发送签约数据获取请求,其中携带SUPI1。可选的,还可以携带SUPI2。这里SUPI2可以为步骤800中AMF2保存的UE2的永久标识。808. AMF2 sends a subscription data acquisition request, which carries SUPI1. Optionally, SUPI2 can also be carried. Here, SUPI2 may be the permanent identifier of UE2 saved by AMF2 in step 800.
可选的,AMF2还可以发送切片信息1。Optionally, AMF2 can also send slice information 1.
可选的,AMF2还可以发送中继服务指示2,指示这是请求远端UE1对应的订阅信息, 即SUPI1对应的订阅信息;或者指示这是执行远端UE1的授权判定请求,例如切片信息1是否被授权的判定。Optionally, AMF2 may also send a relay service indication 2 indicating that this is a request for subscription information corresponding to the remote UE1, that is, the subscription information corresponding to SUPI1; or indicating that this is a request for performing authorization determination of the remote UE1, such as slice information 1. Whether it is authorized or not.
809、UDM根据SUPI1确定UE1订阅信息,通过订阅数据获取响应消息发送UE1订阅信息给AMF2。其中UE1订阅信息包括允许UE1访问的切片信息,允许UE1作为远端UE访问的切片信息,是否被允许使用远端UE业务,以及所属切片信息是否需要执行切片认证的至少一项。809. UDM determines UE1 subscription information according to SUPI1, and sends UE1 subscription information to AMF2 through a subscription data acquisition response message. The UE1 subscription information includes at least one of the slice information that UE1 is allowed to access, the slice information that UE1 is allowed to access as a remote UE, whether it is allowed to use remote UE services, and whether the slice information to which it belongs needs to perform slice authentication.
可选的,UDM接收到中继服务指示2和SUPI2,根据中继服务指示2确定这是请求远端UE1对应的订阅信息,即SUPI1对应的订阅信息;或者指示这是执行远端UE1的授权判定请求,再确定SUPI2对应UE(如UE2)是否被允许执行中继功能。这里可以根据SUPI2对应的签约信息做判定。若允许执行中继功能,再根据SUPI1确定UE1的订阅信息。Optionally, the UDM receives the relay service indication 2 and SUPI2, and determines according to the relay service indication 2 that this is a request for subscription information corresponding to the remote UE1, that is, the subscription information corresponding to SUPI1; or indicates that this is to perform the authorization of the remote UE1 Determine the request, and then determine whether the UE corresponding to SUPI2 (such as UE2) is allowed to perform the relay function. This can be determined based on the contract information corresponding to SUPI2. If the relay function is allowed, the subscription information of UE1 is determined according to SUPI1.
可选的,UDM接收中继服务指示2,确定这是AMF2请求远端UE1对应的订阅信息,即SUPI1对应的订阅信息;则再确定UE1订阅信息。Optionally, the UDM receives the relay service indication 2 and determines that this is the subscription information corresponding to the remote UE1 requested by the AMF2, that is, the subscription information corresponding to the SUPI1; then the UE1 subscription information is determined.
可选的,UDM接收中继服务指示2,确定这是执行远端UE1的授权判定请求,例如切片信息1的授权判定;则首先根据SUPI1确定UE1订阅信息,然后UDM确定切片信息1是否为UE1订阅信息中允许UE1访问的切片信息的一个;确定切片信息1是否为UE作为远端UE访问的切片信息的一个;或者确定UE1是否被允许使用远端UE业务。若上述至少一个判定都通过,则发送授权判定成功的指示给AMF2,AMF执行步骤811。否则UDM发送授权判定失败的指示给AMF2。此时AMF2可以发送拒绝消息至UE2。可选的拒绝消息携带拒绝指示,用来指示UE1不被允许访问切片信息1对应切片业务,或者远端UE服务。UE2接收到AMF2发送的拒绝消息后,发送PC5通信拒绝消息至UE1,拒绝UE1使用UE2的中继功能。可选的,拒绝消息携带拒绝指示,用来指示UE1不被允许访问切片信息1对应切片业务。此时UDM可选的不用发送UE1订阅信息给AMF2。当上述UDM的校验通过之后,图8所示的方法还可以包括下文所示的步骤810以及之后的步骤等。Optionally, the UDM receives the relay service indication 2 and determines that this is the authorization determination request of the remote UE1, such as the authorization determination of the slice information 1. The UE1 subscription information is first determined according to SUPI1, and then the UDM determines whether the slice information 1 is UE1 One of the slice information that the UE1 is allowed to access in the subscription information; determine whether the slice information 1 is one of the slice information that the UE accesses as a remote UE; or determine whether the UE1 is allowed to use the remote UE service. If at least one of the above judgments is passed, an indication that the authorization judgment is successful is sent to AMF2, and AMF executes step 811. Otherwise, UDM sends an indication of authorization failure to AMF2. At this time, AMF2 can send a rejection message to UE2. The optional rejection message carries a rejection indication, which is used to indicate that the UE1 is not allowed to access the slice service corresponding to the slice information 1, or the remote UE serves. After UE2 receives the rejection message sent by AMF2, it sends a PC5 communication rejection message to UE1, rejecting UE1 to use the relay function of UE2. Optionally, the rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1. At this time, UDM optionally does not need to send UE1 subscription information to AMF2. After the above UDM verification is passed, the method shown in FIG. 8 may further include step 810 and subsequent steps shown below.
810、可选的,AMF2确定切片信息1是否为UE订阅信息中允许UE1访问的切片信息的一个;810. Optionally, AMF2 determines whether slice information 1 is one of the slice information that UE1 is allowed to access in the UE subscription information.
可选的,AMF2还可以确定切片信息1是否为UE1作为远端允许UE访问的切片信息的一个;Optionally, the AMF2 may also determine whether the slice information 1 is one of the slice information that the remote end allows the UE to access as UE1;
可选的,AMF2确定UE1是否被允许使用远端UE业务;Optionally, AMF2 determines whether UE1 is allowed to use remote UE services;
当上述AMF2的校验通过之后,如上述810中的三种情况均通过的情况(如均为是的情况),又如上述810中的任一项或两项情况通过的情况,AMF2继续执行。否则AMF2发送拒绝消息至UE2。可选的拒绝消息携带拒绝指示,用来指示UE1不被允许访问切片信息1对应切片业务,或者远端UE服务。UE2接收到AMF2发送的拒绝消息后,发送PC5通信拒绝消息至UE1,拒绝UE1使用UE2的中继功能。可选的,拒绝消息携带拒绝指示,用来指示UE1不被允许访问切片信息1对应切片业务。After the above AMF2 verification is passed, if all three conditions in the above 810 are passed (if all are yes), and if any one or two conditions in the above 810 are passed, AMF2 continues to execute . Otherwise, AMF2 sends a rejection message to UE2. The optional rejection message carries a rejection indication, which is used to indicate that the UE1 is not allowed to access the slice service corresponding to the slice information 1, or the remote UE serves. After UE2 receives the rejection message sent by AMF2, it sends a PC5 communication rejection message to UE1, rejecting UE1 to use the relay function of UE2. Optionally, the rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1.
可选的,AMF2根据UE1订阅信息确定切片信息1对应业务是否需要执行切片认证。如果需要执行切片认证,则触发切片认证流程,并完成UE1与AMF2,网络切片认证和授权(network slice specific authentication and authorization,NSSAAF)和AAA之间的切片认证。若AMF2确定切片认证成功,则继续执行;否则AMF2发送拒绝消息至UE2。可选的 拒绝消息携带拒绝指示,用来指示UE1不被允许访问切片信息1对应切片业务,或者远端UE服务。UE2接收到AMF2发送的拒绝消息后,发送PC5通信拒绝消息至UE1,拒绝UE1使用UE2的中继功能。可选的,拒绝消息携带拒绝指示,用来指示UE1不被允许访问切片信息1对应切片业务。Optionally, the AMF2 determines whether the service corresponding to the slice information 1 needs to perform slice authentication according to the subscription information of the UE1. If slice authentication needs to be performed, a slice authentication process is triggered, and slice authentication between UE1 and AMF2, network slice specific authentication and authorization (NSSAAF) and AAA is completed. If AMF2 determines that the slice authentication is successful, it continues; otherwise, AMF2 sends a rejection message to UE2. The optional rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1, or the remote UE serves. After UE2 receives the rejection message sent by AMF2, it sends a PC5 communication rejection message to UE1, rejecting UE1 to use the relay function of UE2. Optionally, the rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1.
可选的,804中,AMF2校验UE2的动作,也可以在此步骤执行等,本申请实施例对于步骤804与步骤810的先后顺序,不做限制。Optionally, in 804, the action of AMF2 to verify UE2 can also be executed in this step. The embodiment of the present application does not limit the sequence of step 804 and step 810.
811、AMF2发送授权结果至UE2,授权结果包括是否允许UE1通过UE2访问切片信息1对应的切片业务;或者是否允许UE1使用切片信息1对应的切片。811. AMF2 sends an authorization result to UE2. The authorization result includes whether UE1 is allowed to access the slice service corresponding to slice information 1 through UE2; or whether UE1 is allowed to use the slice corresponding to slice information 1.
可选的,上述授权结果也可以不发送。如果AMF2没有发送拒绝消息UE2,也可以代表AMF2的授权校验都通过了。Optionally, the above authorization result may not be sent. If AMF2 does not send a rejection message to UE2, it can also mean that the authorization verification of AMF2 has passed.
812、若授权结果指示UE1被授权允许通过UE2访问切片信息1对应的切片业务,或者被授权使用切片信息1对应的切片业务,则继续执行。否则,发送拒绝消息至UE1。可选的拒绝消息携带拒绝指示,用来指示UE1不被允许访问切片信息1对应切片业务。812. If the authorization result indicates that UE1 is authorized to access the slice service corresponding to slice information 1 through UE2, or is authorized to use the slice service corresponding to slice information 1, continue execution. Otherwise, send a rejection message to UE1. The optional rejection message carries a rejection indication, which is used to indicate that UE1 is not allowed to access the slice service corresponding to slice information 1.
813、若继续执行,UE2发送PC5通信响应消息至UE1。若UE1未接收到PC5通信拒绝消息,则代表UE1的切片信息1校验通过了。813. If the execution continues, UE2 sends a PC5 communication response message to UE1. If UE1 does not receive the PC5 communication rejection message, it means that the slice information 1 of UE1 has passed the verification.
可选的,上述切片信息2也可以为数据网络名称(data network name,DNN)信息。这里DNN信息用来指示UE1希望通过UE2接入的DNN网络的信息。是否UE1被允许通过中继UE2访问DNN的授权校验与上述切片信息的校验类似,不做赘述。Optionally, the above-mentioned slice information 2 may also be data network name (data network name, DNN) information. Here, the DNN information is used to indicate the information of the DNN network that UE1 wants to access through UE2. The authorization check of whether the UE1 is allowed to access the DNN through the relay UE2 is similar to the check of the slice information described above, and will not be repeated.
可理解,本申请实施例提供的通信装置也可以用于执行图8所示的方法,这里不再详述。It can be understood that the communication device provided in the embodiment of the present application may also be used to execute the method shown in FIG. 8, which will not be described in detail here.

Claims (18)

  1. 一种授权结果的确定方法,其特征在于,所述方法包括:A method for determining authorization results, characterized in that the method includes:
    接入网设备接收第二终端设备发送的第一消息,所述第一消息用于指示第一终端设备请求通过所述第二终端设备接入网络,且所述第一消息包括所述第二终端设备的标识信息;The access network device receives a first message sent by a second terminal device, where the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes the second terminal device. Identification information of the terminal equipment;
    所述接入网设备根据所述第二终端设备的标识信息确定所述第二终端设备的授权结果;Determining, by the access network device, the authorization result of the second terminal device according to the identification information of the second terminal device;
    所述接入网设备向第一核心网设备发送第二消息,所述第二消息包括所述第二终端设备的授权结果;Sending, by the access network device, a second message to the first core network device, where the second message includes the authorization result of the second terminal device;
    所述接入网设备接收所述第一核心网设备发送的所述第二消息的响应消息。The access network device receives a response message of the second message sent by the first core network device.
  2. 根据权利要求1所述的方法,其特征在于,所述接入网设备保存有所述第二终端设备的授权结果。The method according to claim 1, wherein the access network device stores an authorization result of the second terminal device.
  3. 根据权利要求2所述的方法,其特征在于,所述接入网设备根据所述第二终端设备的标识信息确定所述第二终端设备的授权结果之前,所述方法还包括:The method according to claim 2, wherein before the access network device determines the authorization result of the second terminal device according to the identification information of the second terminal device, the method further comprises:
    所述接入网设备向第二核心网设备发送第三消息,所述第三消息包括所述第二终端设备的标识信息,且所述第三消息用于请求所述第二终端设备的授权结果;The access network device sends a third message to the second core network device, the third message includes the identification information of the second terminal device, and the third message is used to request authorization of the second terminal device result;
    所述接入网设备接收所述第二核心网设备发送的第三消息的响应消息,所述第三消息的响应消息包括所述第二终端设备是否被授权执行中继业务的授权结果;Receiving, by the access network device, a response message of a third message sent by the second core network device, where the response message of the third message includes an authorization result of whether the second terminal device is authorized to perform a relay service;
    所述接入网设备保存所述第二终端设备的授权结果。The access network device saves the authorization result of the second terminal device.
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述第二终端设备的标识信息包括所述第二终端设备的中继标识。The method according to any one of claims 1 to 3, wherein the identification information of the second terminal device includes a relay identification of the second terminal device.
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-4, wherein the method further comprises:
    所述接入网设备向所述第二终端设备发送所述第一消息的响应消息,所述第一消息的响应消息包括所述第二终端设备的授权结果,且所述第一消息的响应消息用于指示所述第一终端设备允许通过所述第二终端设备接入网络。The access network device sends a response message of the first message to the second terminal device, the response message of the first message includes the authorization result of the second terminal device, and the response of the first message The message is used to instruct the first terminal device to allow access to the network through the second terminal device.
  6. 一种授权结果的确定方法,其特征在于,所述方法包括:A method for determining authorization results, characterized in that the method includes:
    第一核心网设备接收接入网设备发送的第二消息,所述第二消息包括第二终端设备的授权结果;The first core network device receives a second message sent by the access network device, where the second message includes the authorization result of the second terminal device;
    所述第一核心网设备根据所述第二终端设备的授权结果确定所述第二终端设备被授权执行中继业务;Determining, by the first core network device, that the second terminal device is authorized to perform the relay service according to the authorization result of the second terminal device;
    所述第一核心网设备向所述接入网设备发送所述第二消息的响应消息。The first core network device sends a response message of the second message to the access network device.
  7. 根据权利要求6所述的方法,其特征在于,所述第一核心网设备接收接入网设备发 送的第二消息之前,所述方法还包括:The method according to claim 6, wherein before the first core network device receives the second message sent by the access network device, the method further comprises:
    所述接入网设备接收所述第二终端设备发送的第一消息;其中,所述第一消息用于指示所述第一终端设备请求通过所述第二终端设备接入网络,且所述第一消息包括第二终端设备的标识信息;The access network device receives the first message sent by the second terminal device; wherein, the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the The first message includes identification information of the second terminal device;
    所述接入网设备确定所述第二终端设备被授权执行中继业务,向所述第一核心网设备发送所述第二消息。The access network device determines that the second terminal device is authorized to perform the relay service, and sends the second message to the first core network device.
  8. 根据权利要求7所述的方法,其特征在于,所述接入网设备确定所述第二终端设备被授权执行中继业务之前,所述方法还包括:The method according to claim 7, wherein before the access network device determines that the second terminal device is authorized to perform the relay service, the method further comprises:
    所述接入网设备向第二核心网设备发送第三消息,所述第三消息包括所述第二终端设备的标识信息,且所述第三消息用于请求所述第二终端设备的授权结果;The access network device sends a third message to the second core network device, the third message includes the identification information of the second terminal device, and the third message is used to request authorization of the second terminal device result;
    所述第二核心网设备接收所述接入网设备发送的所述第三消息,并向所述接入网设备发送所述第三消息的响应消息;Receiving, by the second core network device, the third message sent by the access network device, and sending a response message of the third message to the access network device;
    所述接入网设备确定所述第二终端设备被授权执行中继业务,包括:The determining by the access network device that the second terminal device is authorized to perform a relay service includes:
    所述接入网设备根据所述第三消息的响应消息,确定所述第二终端设备被授权执行中继业务。According to the response message of the third message, the access network device determines that the second terminal device is authorized to perform the relay service.
  9. 根据权利要求6-8任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 6-8, wherein the method further comprises:
    所述接入网设备向所述第二终端设备发送所述第一消息的响应消息,所述第一消息的响应消息用于指示所述第一终端设备允许通过所述第二终端设备接入网络。The access network device sends a response message of the first message to the second terminal device, where the response message of the first message is used to instruct the first terminal device to allow access through the second terminal device The internet.
  10. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    收发单元,用于接收第二终端设备发送的第一消息,所述第一消息用于指示第一终端设备请求通过所述第二终端设备接入网络,且所述第一消息包括所述第二终端设备的标识信息;The transceiver unit is configured to receive a first message sent by a second terminal device, where the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and the first message includes the first message 2. Identification information of the terminal equipment;
    处理单元,用于根据所述第二终端设备的标识信息确定所述第二终端设备的授权结果;A processing unit, configured to determine an authorization result of the second terminal device according to the identification information of the second terminal device;
    所述收发单元,还用于向第一核心网设备发送第二消息,所述第二消息包括所述第二终端设备的授权结果;The transceiver unit is further configured to send a second message to the first core network device, where the second message includes the authorization result of the second terminal device;
    所述收发单元,还用于接收所述第一核心网设备发送的所述第二消息的响应消息。The transceiving unit is further configured to receive a response message of the second message sent by the first core network device.
  11. 根据权利要求10所述的装置,其特征在于,所述接入网设备保存有所述第二终端设备的授权结果。The apparatus according to claim 10, wherein the access network device stores an authorization result of the second terminal device.
  12. 根据权利要求11所述的装置,其特征在于,The device according to claim 11, wherein:
    所述收发单元,还用于向第二核心网设备发送第三消息,所述第三消息包括所述第二终端设备的标识信息,且所述第三消息用于请求所述第二终端设备的授权结果;The transceiving unit is further configured to send a third message to the second core network device, the third message includes the identification information of the second terminal device, and the third message is used to request the second terminal device Authorization result;
    所述收发单元,还用于接收所述第二核心网设备发送的第三消息的响应消息,所述第三消息的响应消息包括所述第二终端设备是否被授权执行中继业务的授权结果;The transceiver unit is further configured to receive a response message of a third message sent by the second core network device, where the response message of the third message includes the authorization result of whether the second terminal device is authorized to perform the relay service ;
    所述处理单元,还用于保存所述第二终端设备的授权结果。The processing unit is also used to save the authorization result of the second terminal device.
  13. 根据权利要求10-12任一项所述的装置,其特征在于,所述第二终端设备的标识信息包括所述第二终端设备的中继标识。The apparatus according to any one of claims 10-12, wherein the identification information of the second terminal device includes a relay identification of the second terminal device.
  14. 根据权利要求10-13任一项所述的装置,其特征在于,The device according to any one of claims 10-13, wherein:
    所述收发单元,还用于向所述第二终端设备发送所述第一消息的响应消息,所述第一消息的响应消息包括所述第二终端设备的授权结果,且所述第一消息的响应消息用于指示所述第一终端设备允许通过所述第二终端设备接入网络。The transceiver unit is further configured to send a response message of the first message to the second terminal device, the response message of the first message includes the authorization result of the second terminal device, and the first message The response message of is used to instruct the first terminal device to allow access to the network through the second terminal device.
  15. 一种通信系统,其特征在于,所述系统包括:A communication system, characterized in that the system includes:
    第一核心网设备,用于接收接入网设备发送的第二消息,所述第二消息包括第二终端设备的授权结果;The first core network device is configured to receive a second message sent by the access network device, where the second message includes the authorization result of the second terminal device;
    所述第一核心网设备,还用于根据所述第二终端设备的授权结果确定所述第二终端设备被授权执行中继业务;The first core network device is further configured to determine that the second terminal device is authorized to perform a relay service according to an authorization result of the second terminal device;
    所述第一核心网设备,还用于向所述接入网设备发送所述第二消息的响应消息。The first core network device is further configured to send a response message of the second message to the access network device.
  16. 根据权利要求15所述的系统,其特征在于,所述系统还包括:The system according to claim 15, wherein the system further comprises:
    接入网设备,用于接收所述第二终端设备发送的第一消息;其中,所述第一消息用于指示所述第一终端设备请求通过所述第二终端设备接入网络,且所述第一消息包括第二终端设备的标识信息;The access network device is configured to receive a first message sent by the second terminal device; wherein, the first message is used to instruct the first terminal device to request access to the network through the second terminal device, and The first message includes identification information of the second terminal device;
    所述接入网设备,还用于确定所述第二终端设备被授权执行中继业务,向所述第一核心网设备发送所述第二消息。The access network device is further configured to determine that the second terminal device is authorized to perform a relay service, and send the second message to the first core network device.
  17. 根据权利要求16所述的系统,其特征在于,The system of claim 16, wherein:
    所述接入网设备,还用于向第二核心网设备发送第三消息,所述第三消息包括所述第二终端设备的标识信息,且所述第三消息用于请求所述第二终端设备的授权结果;The access network device is further configured to send a third message to a second core network device, where the third message includes identification information of the second terminal device, and the third message is used to request the second core network device. Authorization result of terminal equipment;
    所述系统还包括:The system also includes:
    第二核心网设备,用于接收所述接入网设备发送的所述第三消息,并向所述接入网设备发送所述第三消息的响应消息;A second core network device, configured to receive the third message sent by the access network device, and send a response message of the third message to the access network device;
    所述接入网设备,具体用于根据所述第三消息的响应消息,确定所述第二终端设备被授权执行中继业务。The access network device is specifically configured to determine that the second terminal device is authorized to perform the relay service according to the response message of the third message.
  18. 根据权利要求15-17任一项所述的系统,其特征在于,The system according to any one of claims 15-17, wherein:
    所述接入网设备,还用于向所述第二终端设备发送所述第一消息的响应消息,所述第一消息的响应消息用于指示所述第一终端设备允许通过所述第二终端设备接入网络。The access network device is further configured to send a response message of the first message to the second terminal device, and the response message of the first message is used to instruct the first terminal device to allow the second terminal device to pass through the second terminal device. The terminal device is connected to the network.
PCT/CN2020/140406 2019-12-31 2020-12-28 Method and device for determining authorization result WO2021136211A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911425151.0 2019-12-31
CN201911425151.0A CN113132334B (en) 2019-12-31 2019-12-31 Authorization result determination method and device

Publications (1)

Publication Number Publication Date
WO2021136211A1 true WO2021136211A1 (en) 2021-07-08

Family

ID=76686492

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/140406 WO2021136211A1 (en) 2019-12-31 2020-12-28 Method and device for determining authorization result

Country Status (2)

Country Link
CN (1) CN113132334B (en)
WO (1) WO2021136211A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114339753A (en) * 2021-12-31 2022-04-12 中国电信股份有限公司 Communication data processing method, system, electronic device and readable storage medium
WO2023142569A1 (en) * 2022-01-30 2023-08-03 华为技术有限公司 Communication method and apparatus, and readable storage medium and chip system

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115996437A (en) * 2021-10-20 2023-04-21 华为技术有限公司 Method and device for relaying communication
CN116471640A (en) * 2022-01-11 2023-07-21 华为技术有限公司 Communication method, device and system
CN116489625A (en) * 2022-01-14 2023-07-25 华为技术有限公司 Communication method and device
WO2024065334A1 (en) * 2022-09-28 2024-04-04 北京小米移动软件有限公司 Method, apparatus and device for generating authorization token of user equipment (ue), and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015005900A1 (en) * 2013-07-08 2015-01-15 Nokia Siemens Networks Oy Establishment of packet data network connection via relay user equipment
CN106470382A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 Authority checking method, configuration information method of reseptance, device, base station and terminal
WO2018126452A1 (en) * 2017-01-06 2018-07-12 华为技术有限公司 Authorization verification method and device
WO2018145084A1 (en) * 2017-02-06 2018-08-09 Intel IP Corporation User equipment (ue), evolved node-b (enb) and methods to indicate parameters for a relay arrangement

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108174380A (en) * 2016-12-08 2018-06-15 华为技术有限公司 The method and its terminal device of access network device, the network equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015005900A1 (en) * 2013-07-08 2015-01-15 Nokia Siemens Networks Oy Establishment of packet data network connection via relay user equipment
CN106470382A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 Authority checking method, configuration information method of reseptance, device, base station and terminal
WO2018126452A1 (en) * 2017-01-06 2018-07-12 华为技术有限公司 Authorization verification method and device
WO2018145084A1 (en) * 2017-02-06 2018-08-09 Intel IP Corporation User equipment (ue), evolved node-b (enb) and methods to indicate parameters for a relay arrangement

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Architecture Enhancements to ProSe UE-to-Network Relay (Release 15)", 3GPP STANDARD ; TECHNICAL REPORT ; 3GPP TR 23.733, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. V2.0.0, 7 September 2017 (2017-09-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 82, XP051336883 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114339753A (en) * 2021-12-31 2022-04-12 中国电信股份有限公司 Communication data processing method, system, electronic device and readable storage medium
WO2023142569A1 (en) * 2022-01-30 2023-08-03 华为技术有限公司 Communication method and apparatus, and readable storage medium and chip system

Also Published As

Publication number Publication date
CN113132334B (en) 2022-12-27
CN113132334A (en) 2021-07-16

Similar Documents

Publication Publication Date Title
US20230016378A1 (en) Pdu session management
WO2021136211A1 (en) Method and device for determining authorization result
US20200296142A1 (en) User Group Establishment Method and Apparatus
US11470674B2 (en) Communication method and communications apparatus
US20230029714A1 (en) Authorization method, policy control function device, and access and mobility management function device
US11729599B2 (en) Communication system
US20230156833A1 (en) Packet Forwarding Method, Apparatus, and System
WO2021197175A1 (en) Method for discovering application server and related device
US20230087407A1 (en) Authentication and authorization method and apparatus
US20220272577A1 (en) Communication method and communication apparatus
WO2022199451A1 (en) Session switching method and apparatus
CN116723507B (en) Terminal security method and device for edge network
CN113727342B (en) Network registration method and device
WO2023016160A1 (en) Session establishment method and related apparatus
WO2023087965A1 (en) Communication method and apparatus
WO2023011630A1 (en) Authorization verification method and apparatus
US20220264435A1 (en) Access control method and communications apparatus
WO2022148469A1 (en) Security protection method, apparatus and system
US20220225463A1 (en) Communications method, apparatus, and system
WO2021073382A1 (en) Registration method and apparatus
WO2022170798A1 (en) Strategy determining method and communication apparatus
WO2023072271A1 (en) Method and apparatus for managing security context
WO2022188156A1 (en) Communication method and communication apparatus
US20220272533A1 (en) Identity authentication method and communications apparatus
WO2022160183A1 (en) Method and apparatus for accessing network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20911240

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20911240

Country of ref document: EP

Kind code of ref document: A1