WO2021196241A1 - 通信控制方法、装置、设备及存储介质 - Google Patents

通信控制方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2021196241A1
WO2021196241A1 PCT/CN2020/083379 CN2020083379W WO2021196241A1 WO 2021196241 A1 WO2021196241 A1 WO 2021196241A1 CN 2020083379 W CN2020083379 W CN 2020083379W WO 2021196241 A1 WO2021196241 A1 WO 2021196241A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
area
session
allowed
needs
Prior art date
Application number
PCT/CN2020/083379
Other languages
English (en)
French (fr)
Inventor
许阳
陈振豪
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202080095376.9A priority Critical patent/CN115039390B/zh
Priority to PCT/CN2020/083379 priority patent/WO2021196241A1/zh
Publication of WO2021196241A1 publication Critical patent/WO2021196241A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D1/00Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
    • G05D1/02Control of position or course in two dimensions

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a communication control method, device, device, and storage medium.
  • terminal devices can access the mobile communication network.
  • terminal equipment such as drones, self-driving cars, etc.
  • certain areas may need to be restricted from entering, and the prohibited areas can be called restricted areas.
  • the restricted area can be set through the geofence.
  • the drone needs to know the scope of the restricted area to avoid flying in the restricted area. Once the drone flies into the restricted area, you need to control the drone to fly out of the restricted area, or notify an authoritative third party entity (Third Party Authorized Entity, TPAE), such as the drone controller belonging to the public security system to take over Machine control or monitoring.
  • TPAE hird Party Authorized Entity
  • the embodiments of the present application provide a communication control method, device, equipment, and storage medium, which are used to solve the current technical solution.
  • a terminal device moves to a restricted area, all session connections will be disconnected, making it difficult to control the restricted area.
  • an embodiment of the present application provides a communication control method, which is applied to an electronic device, and the method includes:
  • the restricted data communication including allowing the electronic device to use part of the established session for data transmission in the first area; and/or allowing the electronic device to transmit data in the first area
  • the electronic device establishes a specific session for data transmission.
  • an embodiment of the present application provides a communication control method, which is applied to a network device, and the method includes:
  • Perform restricted data communication in the first area where the restricted data communication includes allowing terminal devices in the first area to use part of an established session for data transmission; and/or allowing the terminal device to establish a specific session for data transmission transmission.
  • an embodiment of the present application provides a communication control device, which is applied to an electronic device, and the device includes:
  • the restricted communication module is configured to perform restricted data communication in the first area, where the restricted data communication includes allowing the electronic device to use part of the established session for data transmission in the first area; and/or in the first area;
  • the first area allows the electronic device to establish a specific session for data transmission.
  • an embodiment of the present application provides a communication control device, which is applied to a network device, and the device includes:
  • the restricted communication module is configured to perform restricted data communication in the first area, where the restricted data communication includes allowing terminal devices in the first area to use part of an established session for data transmission; and/or allowing the The terminal device establishes a specific session for data transmission.
  • an electronic device including:
  • Processor memory, receiver, and interface for communication with network equipment or terminal equipment;
  • the memory stores computer execution instructions
  • the processor executes the computer-executable instructions stored in the memory, so that the processor executes the communication control method provided in any one of the first aspect.
  • an embodiment of the present application provides a network device, including:
  • Processor memory, transmitter and interface for communication with terminal equipment
  • the memory stores computer execution instructions
  • the processor executes the computer-executable instructions stored in the memory, so that the processor executes the communication control method provided in any item of the second aspect.
  • the foregoing processor may be a chip.
  • an embodiment of the present application provides a computer-readable storage medium having computer-executable instructions stored in the computer-readable storage medium, and when the computer-executable instructions are executed by a processor, they are used to implement any of the aspects of the first aspect.
  • a method of communication control provided.
  • an embodiment of the present application may provide a computer-readable storage medium having a computer-executable instruction stored in the computer-readable storage medium, and when the computer-executable instruction is executed by a processor, it is used to implement any aspect of the second aspect.
  • a method of communication control provided.
  • an embodiment of the present application provides a program, when the program is executed by a processor, it is used to execute the communication control method provided in any one of the first aspect.
  • an embodiment of the present application provides a program, when the program is executed by a processor, it is used to execute the communication control method provided in any one of the second aspects.
  • an embodiment of the present application provides a computer program product, including program instructions, which are used to implement the communication control method provided in any one of the first aspects.
  • an embodiment of the present application provides a computer program product, including program instructions, and the program instructions are used to implement the communication control method provided in any one of the second aspects.
  • an embodiment of the present application provides a chip, including a processing module and a communication interface, and the processing module can execute the communication control method provided in any one of the first aspect.
  • the chip also includes a storage module (such as a memory), the storage module is used to store instructions, the processing module is used to execute the instructions stored in the storage module, and the execution of the instructions stored in the storage module causes the processing module to perform the first aspect. Any communication control method provided.
  • a storage module such as a memory
  • the storage module is used to store instructions
  • the processing module is used to execute the instructions stored in the storage module
  • the execution of the instructions stored in the storage module causes the processing module to perform the first aspect. Any communication control method provided.
  • an embodiment of the present application provides a chip, including a processing module and a communication interface, and the processing module can execute the communication control method provided in any one of the second aspect.
  • the chip also includes a storage module (such as a memory), the storage module is used to store instructions, the processing module is used to execute the instructions stored in the storage module, and the execution of the instructions stored in the storage module causes the processing module to execute the second aspect Any communication control method provided.
  • a storage module such as a memory
  • the storage module is used to store instructions
  • the processing module is used to execute the instructions stored in the storage module
  • the execution of the instructions stored in the storage module causes the processing module to execute the second aspect Any communication control method provided.
  • the communication control method, device, equipment, and storage medium provided by the embodiments of this application introduce restricted data communication in the first area, that is, only allow electronic devices to use part of the established sessions for data transmission in the first area, or allow The electronic device establishes a specific session for data transmission, which enables the electronic device to maintain or establish a specific communication connection in the first area for data communication, so that the electronic device in the first area can be conveniently controlled to prevent the electronic device from losing in the first area control.
  • Fig. 1 is a schematic diagram of an application scenario of a communication control method in a technical solution.
  • Fig. 2 is a schematic diagram of a communication system applied in an embodiment of this application.
  • FIG. 3 is a schematic diagram of a communication system architecture applied in an embodiment of this application.
  • FIG. 4 is a schematic flowchart of Embodiment 1 of a communication control method provided by an embodiment of this application.
  • FIG. 5 is a schematic flowchart of Embodiment 2 of a communication control method provided by an embodiment of this application.
  • FIG. 6 is a schematic flowchart of Embodiment 3 of a communication control method provided by an embodiment of this application.
  • FIG. 7 is a schematic flowchart of Embodiment 4 of a communication control method provided by an embodiment of this application.
  • FIG. 8 is a schematic flowchart of Embodiment 5 of a communication control method according to an embodiment of this application.
  • FIG. 9 is a schematic block diagram of Embodiment 1 of a communication control apparatus according to an embodiment of the application.
  • FIG. 10 is a schematic block diagram of Embodiment 2 of a communication control apparatus according to an embodiment of the application.
  • FIG. 11 is a schematic block diagram of Embodiment 3 of a communication control apparatus according to an embodiment of the application.
  • FIG. 12 is a schematic structural diagram of Embodiment 1 of an electronic device provided by an embodiment of this application.
  • FIG. 13 is a schematic structural diagram of Embodiment 1 of a network device provided by an embodiment of this application.
  • Authorized area In some scenarios, the movement of the terminal device needs to be limited to a certain range. This limited range can be called an authorized area, and the area outside the authorized area can be called an unauthorized area or a restricted area.
  • UE user equipment (user equipment, UE), also referred to as terminal equipment or terminal in the embodiments of the present application, which may include various handheld devices with wireless communication functions, vehicle-mounted equipment, drones, wearable devices, Computing devices or other processing devices connected to wireless modems, such as smart phones, IoT chips, smart driving vehicles, etc.
  • UE user equipment
  • terminal equipment or terminal in the embodiments of the present application, which may include various handheld devices with wireless communication functions, vehicle-mounted equipment, drones, wearable devices, Computing devices or other processing devices connected to wireless modems, such as smart phones, IoT chips, smart driving vehicles, etc.
  • (R)AN The main function of the (radio)access network ((radio)access network, (R)AN) is to control the UE to access the mobile communication network through wireless.
  • the (R)AN node may be a base station.
  • UPF The main functions of the user plane function (UPF) include data packet routing and transmission, packet inspection, service usage reporting, quality of service (QoS) processing, lawful monitoring, upstream packet inspection, and downstream data packets Storage and other user-related functions.
  • QoS quality of service
  • DN data network
  • AMF The main functions of access and mobility management function (AMF) include connection management, mobility management, registration management, access authentication and authorization, reachability management, security context management, etc. Mobility-related functions.
  • SMF The main functions of the session management function (session management function, SMF) include session management (such as session establishment, modification, and release, including tunnel maintenance between UPF network elements and AN), selection and control of UPF network elements, and business and Session continuity (service and session continuity, SSC) mode selection, roaming and other session-related functions.
  • session management such as session establishment, modification, and release, including tunnel maintenance between UPF network elements and AN
  • selection and control of UPF network elements selection and control of UPF network elements
  • business and Session continuity service and session continuity, SSC) mode selection, roaming and other session-related functions.
  • PCF policy control function
  • the main functions of the policy control function (PCF) include unified policy formulation, policy control provision, and policy-related functions such as obtaining contract information related to policy decisions from a unified data repository (UDR).
  • UDR unified data repository
  • AF Application Function Network Element
  • NSSF Network slice selection function.
  • the main functions of the network element include selecting a set of network slice instances for the UE, determining the allowed network slice selection service information (Network Slice Selection Assistance Information, NSSAI), and determining available services UE’s AMF set, etc.
  • NSSAI Network Slice Selection Assistance Information
  • UDM Unified data management network element (UDM), supports 3GPP authentication and key negotiation mechanism for authentication credential processing, user identity processing, access authorization, registration and mobility management, contract management, short message management Wait.
  • AUSF Authentication server function (authentication server function, AUSF), interacts with UDM to obtain user information, and performs authentication-related functions, such as generating intermediate keys.
  • NEF The main functions of the network exposure function (NEF) include: safe and open services and capabilities provided by the 3GPP network function, which are internally open or open to third parties.
  • Translate or translate the information interacted with AF and internal network function interaction information such as AF service identification and internal 5G core network information such as Data Network Name (DNN), single-network slice selection service information (Single-Network Slice Selection) Assistance Information, S-NSSAI) etc.;
  • DNN Data Network Name
  • S-NSSAI Single-network Slice Selection Assistance Information
  • Fig. 1 is a schematic diagram of an application scenario of a communication control method in a technical solution.
  • the movement of terminal equipment 110 such as drones or autonomous vehicles may need to be limited to a certain range.
  • This limited range can be called an authorized area, and the area outside the authorized area can be called a non-authorized area.
  • Authorized area or restricted area As shown in FIG. 1, a PDU session-1 is established between the terminal device 110 and the management and control server 120.
  • the management and control server 120 may be a remote server of a private organization, and the terminal device 110 is controlled by the management and control server 120. When the terminal device 110 moves to an unauthorized area, it still needs to maintain data transmission with the control server 120.
  • the control server 120 can continue to control the flight or driving of the terminal device 110; on the other hand, the terminal device 110 can be The control right of the terminal device 110 is transferred to a node under the jurisdiction of an unauthorized area.
  • the management and control server 120 can continue to control the flight or driving of the terminal device 110, or the control right can be moved to the jurisdiction of the unauthorized area For example, on the management server 130.
  • the terminal device 110 it is necessary for the terminal device 110 to maintain a specific communication connection (such as PDU session-1) in an unauthorized area, or to establish a specific communication connection in an unauthorized area to communicate with the management and control server 130 in the unauthorized area, for example, to establish a connection with the control server 130 in the unauthorized area.
  • a specific communication connection such as PDU session-1
  • PDU session-1 can be released (but not immediately after the terminal device 110 moves to an unauthorized area), for example, a PDU session is established between the terminal device 110 and the management server 130
  • the PDU session -1 is released.
  • an embodiment of the present application provides a communication control method to perform restricted data communication in the first area, and the restricted data communication includes allowing a terminal device to use part of an established session for data transmission; and/or allowing the terminal The device establishes a specific session for data transmission.
  • the terminal device by introducing restricted data communication in the first area, that is, in the first area, the terminal device is allowed to use part of the established session for data transmission, or the terminal device is allowed to establish a specific session for data transmission, The terminal device can maintain or establish a specific communication connection in the first area for data communication, so that the terminal device in the first area can be conveniently controlled, and the terminal device can be prevented from losing control in the first area.
  • GSM Global System of Mobile Communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GSM Global System of Mobile Communication
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • LTE-A Advanced long term evolution
  • NR New Radio
  • NR NR system evolution system
  • LTE on unlicensed frequency bands LTE-based access to unlicensed spectrum, LTE-U
  • NR NR-based access to unlicensed spectrum, NR-U
  • UMTS Universal Mobile Telecommunication System
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • WiMAX Wireless Local Area Networks
  • WLAN Wireless Fidelity
  • NTN next-generation communication systems or other communication systems, etc.
  • D2D Device to Device
  • M2M Machine to Machine
  • MTC machine type communication
  • V2V vehicle to vehicle
  • FIG. 2 is a schematic diagram of a communication system applied in an embodiment of this application.
  • the communication system 200 may include a terminal device 210 and a network device 220.
  • the terminal device 210 includes but is not limited to devices that communicate via wired lines, such as devices that communicate via public switched telephone networks (PSTN), digital subscriber lines (Digital Subscriber Line, DSL), digital cables, and direct cable connections; And/or via wireless interfaces, such as devices for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM-FM broadcast transmitters; and/or
  • Another terminal device is a device configured to receive/send communication signals; and/or an Internet of Things (IoT) device.
  • IoT Internet of Things
  • a terminal device set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal” or a “mobile terminal”.
  • mobile terminals include, but are not limited to, satellite or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet Internet access, Web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver for personal digital processing (Personal Digital Assistant, PDA); and conventional laptop and/or palmtop receivers Device or other electronic device including a radio telephone transceiver.
  • PCS Personal Communications System
  • GPS Global Positioning System
  • PDA Personal Digital Assistant
  • Terminal equipment can refer to access terminals, user equipment (UE), user units, user stations, mobile stations, mobile stations, remote stations, remote terminals, mobile equipment, user terminals, terminals, wireless communication equipment, user agents, or User device.
  • the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a PDA, a handheld device with wireless communication function, a computing device or a connection
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • the network device 220 may provide communication coverage for a specific geographic area, and may communicate with the terminal device 210 located in the coverage area.
  • the network device 220 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the wireless controller in the Cloud Radio Access Network (CRAN), or the satellite in the Non-Terrestrial Network (NTN), or the
  • the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, a wearable device, a hub, a switch, a bridge, a router, a network device in a 5G network, or a public land mobile network that will evolve in the future (Public Land Mobile Network). , PLMN) in the network equipment and so on.
  • BTS Base Transceiver Station
  • direct terminal connection (Device to Device, D2D) communication may be performed between the terminal devices 210, that is, the technical solution provided in this application may also be applied to the communication between two terminal devices.
  • the 5G system or 5G network may also be referred to as a New Radio (NR) system or NR network.
  • NR New Radio
  • Figure 2 exemplarily shows one network device and two terminal devices.
  • the communication system 200 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
  • the communication system 200 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • FIG. 3 is a schematic diagram of a communication system architecture applied in an embodiment of this application.
  • the UE that is, the terminal device, is connected to the AN through the access layer through the Uu port, the UE and the AN exchange access layer messages and perform wireless data transmission, and the AN performs data transmission with the AMF through the N2 interface.
  • the UE establishes a non-access stratum (None Access Stratum, NAS) connection with the AMF through the N1 port, and exchanges NAS messages between the UE and the AMF.
  • AMF communicates with UDM through the N8 interface.
  • UDM is the subscription database in the core network, which stores the user's subscription data in the 5G network.
  • AMF is the mobility management function in the core network.
  • AMF communicates with SMF through the N11 interface.
  • SMF is the session management function in the core network.
  • the AMF is also responsible for sending session management related messages to the UE. Forward with SMF.
  • the AMF also communicates with AUSF and NSSF through the N12 interface and the N22 interface, respectively.
  • SMF communicates with PCF through the N7 interface.
  • PCF is a policy management function in the core network and is responsible for formulating policies related to UE mobility management, session management, and billing.
  • PCF communicates with AF through the N5 interface.
  • UPF is the user plane function in the core network. It transmits data with the external data network DN through the N6 interface, transmits data with the AN through the N3 interface, and transmits data with the SFM through the N4 interface.
  • the UE After the UE accesses the 5G network through the Uu port, it establishes a PDU session data connection from the UE to the UPF under the control of the SMF to perform data transmission.
  • the NEF function is also present in the system, which is used to interface with third-party application servers to transfer information between core network nodes and third-party applications.
  • FIG. 4 is a schematic flowchart of Embodiment 1 of a communication control method provided by an embodiment of this application.
  • the communication control method can be applied to an electronic device, and the communication control method includes step S410.
  • step S410 the electronic device performs restricted data communication in the first area.
  • the restricted data communication includes allowing the electronic device to use part of the established session for data transmission; and/or allowing the electronic device to establish a specific session for data transmission.
  • the first area is a restricted area
  • the electronic device performs restricted data communication in the first area.
  • the restricted data communication means restricting the data communication of the electronic device in the first area, for example, only allowing the electronic device to use Part of the established sessions, such as session-1, performs data transmission with server 1; and/or only allows the electronic device to establish a specific session with server 2, such as session 2 for data transmission.
  • the restricted area After the drones fly into the first area, the restricted area, only the drones are allowed to use the established sessions with the UTM (Unmanned Aerial System Traffic Management), and/ Or only allow the electronic device to establish a session with the authoritative third-party entity TPAE for data transmission.
  • UTM Unmanned Aerial System Traffic Management
  • “specific” may mean that it is determined according to the type of electronic device.
  • the specific session may be a session determined for the type of electronic device in the first area, for example, for The communication session between the drone and the drone control server of the public security system is used for the communication session between the autonomous driving vehicle and the vehicle control server of the traffic management system.
  • the specific session can also be another appropriate form of session. This application There is no special restriction on this.
  • the electronic device can determine the specific session according to the specific session-related information or local configuration sent by the network device side. For example, the network device side may set different specific sessions for different electronic device types in the first area, and send information related to the specific session to the electronic device according to the type of the electronic device. The electronic device may also configure a specific session corresponding to the type of the electronic device locally, and determine the specific session that needs to be established according to the local configuration after moving to the first area.
  • the electronic device normally performs data communication in the second area, and the second area is another area outside the restricted area.
  • Normally performing data communication may be to perform the establishment of a PDU session according to a process specified by 3GPP, Modify and transmit user plane data.
  • the above-mentioned partially established sessions are sessions established in the second area.
  • the electronic device may be a terminal device such as a mobile phone, a drone or an autonomous vehicle, or other appropriate electronic device such as a base station, which is also within the protection scope of this application.
  • the second area is an authorized area
  • the first area is an unauthorized area.
  • Electronic equipment in the authorized area can normally establish and use multiple user-plane connections (such as multiple PDU sessions) for data communication.
  • the establishment and use of the connection can be the same as the existing 3GPP mechanism; the electronic equipment in the non-authorized area can only Part of the established PDU session is allowed to be used.
  • Part of the established PDU session can be used for communication with a specific server; and/or when the electronic device moves to an unauthorized area, a specific PDU session is allowed to be established.
  • a specific PDU session can be used for communication with a specific server.
  • the specific server may be a server determined according to the type of electronic device.
  • the specific server may be a UTM server; for autonomous vehicles, the specific server may be traffic.
  • the vehicle control server of the management system may be a server determined according to the type of electronic device.
  • the maintained communication connection such as session-1 can be released later, for example, after the session-2 is established between the electronic device and the server 2, or the server 2 After taking over the control electronic device, release the maintained communication connection, namely Session-1.
  • the electronic device may also be a base station, and the terminal device may access the new base station through handover, or the terminal device may access the new base station through cell reselection, cell selection, or redirection.
  • the new base station can obtain the second information and/or the fourth information from the electronic device; or the new base station can obtain the second information and/or the first information from the terminal device.
  • the second information includes at least one of the following information: whether to enable restricted data communication for the electronic device; and information about an authorized area and/or an unauthorized area. It should be noted that in the exemplary embodiment of the present application, the content form of the second information is not limited, but the second information may indicate at least one of the foregoing information.
  • the fourth information includes at least one of the following information: the session is allowed or needs to be released or deactivated in the unauthorized area; which QoS data flow in the session is allowed or needs to be released or deactivated in the unauthorized area; the session is in an unauthorized area
  • the area allows or needs to be reserved; which QoS data flow or flows in the session are allowed or need to be reserved in the unauthorized area.
  • "Reserved” may mean that the session or at least one QoS data stream in the session is allowed or needs not to be released or activated in an unauthorized area, and data communication can also be performed normally as in an authorized area.
  • the content form of the fourth information is not limited, but the fourth information may indicate at least one of the foregoing information, and the fourth information may further carry specific session identification information and/or Identification information of the QoS data flow.
  • FIG. 5 is a schematic flowchart of Embodiment 2 of a communication control method provided by an embodiment of this application.
  • step S510 the terminal device normally performs data communication in the authorized area.
  • the normal data communication may be to perform the establishment and modification of the PDU session according to the procedures specified by the 3GPP, and to transmit user plane data, for example, to normally establish, activate or maintain multiple session connections.
  • a PDU session is normally established between the terminal device and the management and control server 1 and multiple other servers, for example, a PDU session-1 is normally established between the terminal device and the management and control server 1.
  • step S520 the terminal device maintains some of the established connections in the unauthorized area, and/or establishes a specific connection.
  • the terminal device moves from an authorized area to an unlicensed area, and maintains a part of the established session connection in the unlicensed area, for example, maintains the session connection with the management and control server 1, namely PDU session-1, and releases the connection with others. Session connection between servers.
  • maintaining this part of the established session connection can avoid the out-of-control situation caused by the sudden disconnection of the communication connection when the terminal device enters an unauthorized area.
  • the terminal device can also establish a specific connection, for example, establish a session connection with the management and control server 2 that is PDU session 2.
  • a specific connection is a connection for more reasonable control of terminal equipment in an unauthorized area.
  • a specific connection can be a connection for communication between the drone and the drone control server of the public security system, or for autonomous vehicles Communication connection with the vehicle control server of the traffic management system.
  • the maintained communication connection such as PDU session-1
  • PDU session-1 can be released later, for example, after the PDU session-2 is established between the terminal device and the management server 2. Or the management and control server 2 releases the maintained communication connection after taking over and controlling the terminal device.
  • the terminal device may send the first information to the network device through a NAS message (for example, a registration request), and the first information may be used to indicate at least one of the following information:
  • the information of the authorized area and/or the non-authorized area can be described by Global Positioning System (GPS) information, cell identification information, tracking area identity (TAI) information, etc.
  • GPS Global Positioning System
  • TAI tracking area identity
  • the core network element may interact with UDM and/or PCF, and the interaction information may include the first information.
  • the core network element determines the second information based on the NAS message and/or the interaction message, and sends the second information to the terminal and/or the access network, such as the base station, where the second information includes at least one of the following information:
  • the information of the authorized area and/or the unauthorized area can be described by GPS coordinates, cell identification, TAI table, etc.).
  • FIG. 6 is a schematic flowchart of Embodiment 3 of a communication control method provided by an embodiment of this application.
  • step S610 the terminal device sends a registration request to the core network during the registration process, and the registration request may include the first information.
  • the first information may be used to indicate at least one of the following information: information requesting to open restricted data communication; authorized area and/or non-authorized area information.
  • the terminal device may send the registration request to the core network by adding the first information to the registration request, such as a NAS message.
  • the information of the authorized area and/or the unauthorized area can be described by GPS coordinates, cell identification information, tracking area identity (TAI) information, and so on.
  • the content form of the first information is not limited, but the first information may indicate at least one of the foregoing information.
  • restricted data communication means restricting the data communication of the terminal device in an unauthorized area, for example, allowing the terminal device to use part of the established sessions to transmit data with the network device; and/or allowing the terminal device to communicate with the network device Establish a specific session for data transmission.
  • UDM Unmanned Aerial System Traffic Management
  • step S620 the core network interacts with UDM and/or PCF, and the interaction information may include the first information.
  • a core network element such as AMF interacts with UDM and/or PCF, and the interactive message includes first information.
  • the interactive message includes subscription information and/or policy information, and the subscription information and/or policy information includes First information.
  • the first information may be added in only one step in step S610 and step S620, for example, only the first information may be added in the registration request in step S610, or only the subscription information and/or in step S620 may be added.
  • the first information is added to the policy information, or the first information can be added in both steps. Adding the first information includes providing some or all of the parameters of the first information, and the content of the first information in the two steps conflicts.
  • the core network such as AMF, decides which step of the first information content to use.
  • step S630 the core network sends the second information to the access network, and the second information may be determined based on the interaction information in step S620 and/or the registration request in step S610.
  • the second information includes at least one of the following information: whether to enable restricted data communication for the terminal device; and information about an authorized area and/or an unauthorized area.
  • the core network element AMF requests to send the second information to the access network RAN through the N2 interface, and the N2 interface request includes the second information.
  • the content form of the second information is not limited, but the second information may indicate at least one of the foregoing information.
  • step S640 the core network sends a registration reply to the terminal device, and the registration reply may include the second information.
  • the core network element such as the AMF, sends a registration reply to the terminal device through the N1 interface, and the registration reply includes the second information.
  • step 630 and step 640 can be combined into one step, that is, the message sent to the access network RAN with the N2 interface in step 630 also carries the registration reply sent to the terminal device, that is, the NAS message.
  • the RAN transparently transmits the registration reply, that is, the NAS message to the terminal device.
  • the terminal device or UDM/PCF can also provide the core network with an indication of "not restricting the authorized area or unlicensed area for the terminal device, that is, the effective area of the user plane data connection is not limited.
  • the second information can be sent to the base station and/or the terminal.
  • Information, or the core network such as AMF only receives the first information from the terminal and/or UDM/PCF, and does not need to send the second information to the base station and/or terminal.
  • the terminal device may add third information to the NAS message (such as session establishment/modification request), and/or the core network element (such as SMF) passes UDM or PCF
  • the third information is obtained from the interactive information of, and the third information includes at least one of the following information:
  • Reserved may mean that the session or at least one QoS data stream in the session is allowed or needs not to be released or activated in an unauthorized area, and data communication can also be performed normally as in an authorized area.
  • only one of the interactive information between the NAS message and the UDM/PCF may include the third information, that is, the NAS message includes the third information, or the interactive information of the UDM/PCF includes the third information.
  • the core network element may add fourth information to the "session establishment request" message sent to the base station and/or the NAS reply message (such as session establishment reply) sent to the terminal device, and the fourth information is used to indicate the third information Whether the requested behavior is approved (corresponding to the four requested information in the third information above).
  • FIG. 7 is a schematic flowchart of Embodiment 4 of a communication control method provided by an embodiment of this application.
  • step S710 the terminal device sends third information to the core network during the session establishment or modification process.
  • third information may be added to the NAS message of the session establishment/modification request, and the third information includes at least one of the following information:
  • the content form of the third information is not limited, but the third information may indicate at least one of the foregoing information, and the third information may further carry specific session identification information and/or Identification information of the QoS data flow.
  • step S720 the core network interacts with UDM and/or PCF, and the interaction message may include a third message.
  • the core network element (such as SMF) interacts with UDM and/or PCF to obtain a third message from the interactive message.
  • the interactive message contains subscription information and/or policy information, subscription information and/or policy
  • the information contains the third information.
  • the NAS message in step S710 and the interactive information in step S720 may include the third information, that is, the NAS message includes the third information, or the UDM/PCF interactive information includes the third information. It is also possible to add the first information in both steps, including providing some or all of the parameters of the first information. In the case that the parameter content of the first information in the two steps conflicts, the core network such as SMF decides which step to use The first information content.
  • the core network may add fourth information to the "session request" message sent to the access network.
  • the fourth information is used to indicate at least one of the following information:
  • the fourth information may be derived based on the third information, or may be generated by the core network element itself, which is not specifically limited in this application.
  • the content form of the fourth information is not limited, but the fourth information may indicate at least one of the foregoing information, and the fourth information may further carry specific session identification information and/or Identification information of the QoS data flow.
  • the core network element may determine the content of the fourth information according to the Single-Network Slice Selection Assistance Information (S-NSSAI) and/or DNN corresponding to the PDU session.
  • S-NSSAI Single-Network Slice Selection Assistance Information
  • the determined fourth information is added to the session establishment request sent to the access network RAN.
  • the core network may add fourth information to the session reply message sent by the terminal device.
  • the core network element such as SMF adds a fourth message to the NAS message of the session establishment reply message sent to the terminal device.
  • step S730 and step S740 can be combined into one step, that is, step S730 carries the session establishment request sent to the RAN and also carries the session establishment reply sent to the terminal device (such as session acceptance or rejection), and the RAN receives the step After the message in S730, the session establishment reply, that is, the NAS reply message, is transparently transmitted to the terminal device.
  • step S730 carries the session establishment request sent to the RAN and also carries the session establishment reply sent to the terminal device (such as session acceptance or rejection), and the RAN receives the step After the message in S730, the session establishment reply, that is, the NAS reply message, is transparently transmitted to the terminal device.
  • the fourth information can be sent to the base station and/or the terminal.
  • Information, or the core network such as SMF only receives the third information from the terminal and/or UDM/PCF, and does not need to send the fourth information to the base station and/or terminal.
  • the terminal device is outside the "authorized area", that is, in the unlicensed area, only specific PDU sessions are allowed to be reserved, and specific PDU sessions may also be allowed to be established.
  • a specific PDU session can be a session determined for the type of terminal device in an unauthorized area, for example, a session between a drone and a drone control server of a public security system, and a vehicle control of an autonomous vehicle and a traffic management system Sessions between servers.
  • the fifth information is introduced during the session establishment and/or modification process.
  • the fifth information may be added to the NAS message (such as a session establishment/modification request)
  • the core network element for example, SMF
  • the content form of the fifth information is not limited, but the fifth information may indicate at least one of the foregoing information, and the fourth information may further carry specific session identification information and/or Identification information of the QoS data flow.
  • the fifth information may include: requesting that the session be established, modified or activated when the terminal device moves from an authorized area to an unlicensed area;
  • the device is established, modified or activated when it moves from an authorized area to an unauthorised area;
  • the fifth information is used to indicate that the session is established, modified or activated in an unauthorized area.
  • the fifth information may include the NAS message (PDU session establishment/modification request) sent by the terminal device, or the core network element may obtain it from the interaction information of UDM or PCF. This step is similar to step S710 and step S720, and will not be repeated here. Go into details.
  • the core network element may determine whether to allow the establishment, modification or activation of the corresponding PDU session according to the fifth information. For example, the core network element may determine to establish, modify or activate the corresponding session in the unauthorized area according to the fifth information.
  • the terminal device may carry the foregoing third information or fifth information in the session establishment/modification request message. Further, the terminal device may obtain the sixth information from the network device side, and the sixth information includes At least one of the following information:
  • the content form of the sixth information is not limited, but the sixth information may indicate at least one of the foregoing information, and the sixth information may further carry specific session identification information and/or Identification information of the QoS data flow.
  • the sixth information may include: which PDU sessions or QoS data flows must be established, modified or activated when moving from the "authorized area” to the "unauthorized area”; and/or, which PDU sessions or QoS data flows must be established, modified or activated from the "authorized area” "Authorized area” is allowed to be created, modified or activated when it is moved to "non-authorized area”;
  • the terminal device when the terminal device is in the "authorized area", it can determine whether it is necessary to add "third information" or "fifth information" to the NAS message sent to the network device according to the content of the above-mentioned "sixth information". information".
  • the NAS message may be a registration request message or a session establishment request message.
  • the terminal when the terminal is in the "unauthorized area", it can determine whether to establish, modify, or activate the corresponding PDU session according to the content of the above-mentioned "sixth information" article (3) and article (4).
  • PDU session can be described by PDU session attribute parameters such as S-NSSAI, DNN, PDU session type, SSC-Mode, etc., as shown in Table 2 of the following path selection descriptor (Route Selection Descriptor).
  • the sixth information may be sent to the terminal device through a NAS message
  • the NAS message may be a message such as a "registration reply", a "terminal configuration update request (UE Configuration Update Request)" and the like.
  • the sixth information can be implemented by extending the UE Route Selection Policy (URSP) rule of the terminal device, that is, adding "sixth information" to the URSP policy rule, as shown in the following table 1 shows:
  • URSP UE Route Selection Policy
  • Non-IP descriptor Describe the characteristics of non-IP packets DNN DNN is provided by the application layer Connectivity Request to run the data on a connection that supports the described capability Path selection descriptor Path selection descriptor list, see Table 2 for specific content
  • Path selection parameters describe Routing descriptor priority Decide the order in which path selection descriptors are used
  • Path selection parameters Define path selection parameters
  • Business and continuity model selection Contains a value Network slice selection Contains one or more values
  • DNN selection Contains one or more DNNs
  • PDU session type selection Contains a type value
  • Non-seamless diversion indication Indicate whether specific traffic needs to be offloaded to non-3GPP access
  • FIG. 8 is a schematic flowchart of Embodiment 5 of a communication control method according to an embodiment of this application.
  • a communication control method is provided, which is applied to a network device, and the method includes:
  • Step S810 Perform restricted data communication in the first area, where the restricted data communication includes allowing terminal devices in the first area to use part of the established sessions for data transmission; and/or allowing the terminal devices to establish specific The session performs data transmission.
  • the method further includes: normal data communication in the second area.
  • the second area is an authorized area
  • the first area is an unauthorized area
  • the part of the established session is used for communication with a specific server, and the specific session is used for communication with the specific server.
  • the method further includes: receiving first information sent by the terminal device or another network device, where the first information includes at least one of the following information: request to activate the Restricted data communication; information about the authorized area and/or the non-authorized area.
  • the method further includes: sending second information to the terminal device, where the second information includes at least one of the following information: whether to enable the restriction for the terminal device sexual data communication; information about the authorized area and/or the non-authorized area.
  • the method further includes: during the session establishment and/or modification process, receiving third information sent by the terminal device or another network device, where the third information includes At least one of the following information: request that the session is allowed or needs to be released or deactivated in the unauthorized area; request at least one QoS data flow in the session to be allowed or needs to be released or deactivated in the unauthorized area Activate; request the session to be allowed or need to be reserved in the unauthorized area; request at least one QoS data stream in the session to be allowed or need to be reserved in the unauthorized area.
  • the method further includes: sending fourth information to the terminal device, where the fourth information includes at least one of the following information: the session is allowed in the unauthorized area Or need to be released or deactivated; at least one QoS data flow in the session is allowed or needs to be released or deactivated in the unauthorized area; the session is allowed or needs to be reserved in the unauthorized area; the session At least one of the QoS data flows in is allowed or needs to be reserved in the unauthorized area.
  • the fourth information is determined according to the single-network slice selection service information S-NSSAI and/or the data network name DNN corresponding to the session.
  • the method further includes: during the session establishment and/or modification process, receiving fifth information sent by the terminal device or another network device, where the fifth information includes At least one of the following information: request the session to be established, modified or activated in the unauthorized area; request at least one QoS data stream in the session to be established, modified or activated in the unauthorized area.
  • the method further includes: sending sixth information to the terminal device, where the sixth information includes at least one of the following information: allowing or requiring reservation in the unauthorized area Information about the session or QoS data flow; information about the session or QoS data flow that is allowed or needs to be released or deactivated in the unauthorized area; is allowed or needs to be established, modified or activated in the case of the unauthorized area Information about the session or QoS data flow.
  • the method further includes: in the authorized area, determining whether the third information or the fifth information needs to be sent to the network device according to the content of the sixth information.
  • the sixth information includes information about a session or QoS data flow that is established, modified, or activated when the terminal device is in the unlicensed area, and the method further It includes: determining whether to establish, modify or activate a corresponding session according to the content of the sixth information when in the unauthorized area.
  • the sixth information is information added to the policy rule of the terminal path selection policy URSP.
  • the session is a protocol data unit PDU session
  • the PDU session is represented by an attribute parameter of the PDU session.
  • the sending the second information to the terminal device includes: sending the second information to a radio access network RAN, and transparently transmitting the second information via the RAN To the terminal device; or, the sending the fourth information to the terminal device includes: sending the fourth information to the RAN, and transparently transmitting the fourth information to the terminal via the RAN equipment.
  • the network device is a core network network element.
  • the core network element is an access and mobility management function AMF or a session management function SMF.
  • the network device is a base station, and the method further includes: receiving second information sent by a core network, where the second information includes at least one of the following information:
  • the terminal device opens the restricted data communication; the information of the authorized area and/or the non-authorized area.
  • the network device is a base station, and the method further includes: receiving fourth information sent by a core network, where the fourth information includes at least one of the following information:
  • the unlicensed area is allowed or needs to be released or deactivated; at least one QoS data flow in the session is allowed or needs to be released or deactivated in the unlicensed area; the session is allowed or needs to be released or deactivated in the unlicensed area. Need to be reserved; at least one QoS data flow in the session is allowed or needs to be reserved in the unauthorized area.
  • FIG. 9 is a schematic block diagram of Embodiment 1 of a communication control apparatus according to an embodiment of the application.
  • the communication control device is applied to electronic equipment.
  • the communication control device 900 may include:
  • the restricted communication module 910 is configured to perform restricted data communication in a first area, where the restricted data communication includes allowing the electronic device to use part of an established session for data transmission in the first area; and/or The first area allows the electronic device to establish a specific session for data transmission.
  • FIG. 10 is a schematic block diagram of Embodiment 2 of a communication control apparatus according to an embodiment of the application.
  • the device 900 further includes: a normal communication module 1010, which is configured to perform data communication normally in the second area.
  • the second area is an authorized area
  • the first area is an unauthorized area
  • the part of the established session is used for communication with a specific server, and the specific session is used for communication with the specific server.
  • the apparatus further includes: a first sending module, configured to send first information to a network device, wherein the first information includes at least one of the following information: request to enable the restriction Sexual data communication; information about the authorized area and/or the non-authorized area.
  • a first sending module configured to send first information to a network device, wherein the first information includes at least one of the following information: request to enable the restriction Sexual data communication; information about the authorized area and/or the non-authorized area.
  • the apparatus further includes: a first receiving module, configured to receive second information sent by the network device, where the second information includes at least one of the following information:
  • the electronic device enables the restricted data communication; the information of the authorized area and/or the non-authorized area.
  • the apparatus further includes: a second sending module, configured to send third information to the network device during the session establishment and/or modification process, where the third information includes the following At least one type of information: request that the session is allowed or needs to be released or deactivated in the unlicensed area; request at least one quality of service QoS data flow in the session to be allowed or needs to be released in the unlicensed area or Deactivate; request that the session be allowed or need to be reserved in the unauthorized area; request at least one QoS data flow in the session to be allowed or need to be reserved in the unauthorized area.
  • a second sending module configured to send third information to the network device during the session establishment and/or modification process, where the third information includes the following At least one type of information: request that the session is allowed or needs to be released or deactivated in the unlicensed area; request at least one quality of service QoS data flow in the session to be allowed or needs to be released in the unlicensed area or Deactivate; request that the session be allowed or need to be reserved in the unauthorized
  • the apparatus further includes: a second receiving module, configured to receive fourth information sent by the network device, where the fourth information includes at least one of the following information:
  • the session is allowed or needs to be released or deactivated in the unlicensed area; at least one QoS data flow in the session is allowed or needs to be released or deactivated in the unlicensed area; the session is in the unlicensed area Allow or need to be reserved; at least one QoS data stream in the session is allowed or needs to be reserved in the unauthorized area.
  • the fourth information is determined according to the single-network slice selection service information S-NSSAI and/or the data network name DNN corresponding to the session.
  • the apparatus further includes: a third sending module, configured to send fifth information to the network device during the session establishment and/or modification process, where the fifth information includes the following At least one type of information: request the session to be established, modified or activated in the unauthorized area; request at least one QoS data stream in the session to be established, modified or activated in the unauthorized area.
  • a third sending module configured to send fifth information to the network device during the session establishment and/or modification process, where the fifth information includes the following At least one type of information: request the session to be established, modified or activated in the unauthorized area; request at least one QoS data stream in the session to be established, modified or activated in the unauthorized area.
  • the apparatus further includes: a third receiving module configured to receive sixth information sent by the network device, where the sixth information includes at least one of the following information: Information about the sessions or QoS data streams that are allowed or need to be reserved in the unauthorized area; information about the sessions or QoS data streams that are allowed or need to be released or deactivated in the unauthorized area; Information about sessions or QoS data flows that are established, modified, or activated.
  • a third receiving module configured to receive sixth information sent by the network device, where the sixth information includes at least one of the following information: Information about the sessions or QoS data streams that are allowed or need to be reserved in the unauthorized area; information about the sessions or QoS data streams that are allowed or need to be released or deactivated in the unauthorized area; Information about sessions or QoS data flows that are established, modified, or activated.
  • the apparatus further includes: a sending determination module, configured to determine whether the third information needs to be sent to the network device according to the content of the sixth information in the authorized area. Information or fifth information.
  • the sixth information includes information about sessions or QoS data streams that are allowed or need to be established, modified, or activated in the unauthorized area
  • the apparatus further includes: a session determination module, It is used to determine whether to establish, modify or activate a corresponding session according to the content of the sixth information when in the unauthorized area.
  • the sixth information is information added to the policy rule of the terminal path selection policy URSP.
  • the session is a protocol data unit PDU session
  • the PDU session is represented by an attribute parameter of the PDU session.
  • the first receiving module is specifically further configured to: receive the first receiving module sent by the network device to the radio access network RAN, and transparently transmit it to the electronic device via the RAN.
  • Second information or, the second receiving module is specifically further configured to: receive the fourth information sent by the network device to the RAN and transparently transmitted to the electronic device via the RAN.
  • the electronic device is a terminal device.
  • the electronic device is a base station.
  • the electronic device is a first base station
  • the apparatus further includes: a handover control module, configured to: when the terminal device accesses the second base station, the second base station The first base station obtains second information and/or fourth information; or, the second base station obtains the second information and/or fourth information from the terminal device, where the second information includes the following At least one piece of information: whether the restricted data communication is opened for the terminal device; the information of the authorized area and/or the non-authorized area, and the fourth information includes at least one of the following information: the session is in The unlicensed area is allowed or needs to be released or deactivated; at least one QoS data flow in the session is allowed or needs to be released or deactivated in the unlicensed area; the session is allowed or needs to be released or deactivated in the unlicensed area. Need to be reserved; at least one QoS data flow in the session is allowed or needs to be reserved in the unauthorized area.
  • the communication control device provided in this embodiment is used to implement the technical solution on the electronic device side in any of the foregoing method embodiments, and its implementation principles and technical effects are similar, and will not be repeated here.
  • FIG. 11 is a schematic block diagram of Embodiment 3 of a communication control apparatus according to an embodiment of the application.
  • the communication control apparatus is applied to network equipment.
  • the communication control apparatus 1100 may include:
  • the restricted communication module 1110 is configured to perform restricted data communication in the first area, where the restricted data communication includes allowing terminal devices in the first area to use part of an established session for data transmission; and/or allowing all The terminal device establishes a specific session for data transmission.
  • the device further includes:
  • the normal communication module is used for normal data communication in the second area.
  • the second area is an authorized area
  • the first area is an unauthorized area
  • the part of the established session is used for communication with a specific server, and the specific session is used for communication with the specific server.
  • the device further includes:
  • the first receiving module is configured to receive first information sent by the terminal device or another network device, where the first information includes at least one of the following information:
  • the device further includes:
  • the first sending module is configured to send second information to the terminal device, where the second information includes at least one of the following information:
  • the device further includes:
  • the second receiving module is configured to receive third information sent by the terminal device or another network device during the session establishment and/or modification process, where the third information includes at least one of the following information:
  • At least one QoS data flow in the session is allowed or needs to be reserved in the unauthorized area.
  • the device further includes:
  • the second sending module is configured to send fourth information to the terminal device, where the fourth information includes at least one of the following information:
  • the session is allowed or needs to be released or deactivated in the unauthorized area;
  • At least one QoS data flow in the session is allowed or needs to be released or deactivated in the unauthorized area;
  • the session is allowed or needs to be reserved in the unauthorized area
  • At least one QoS data flow in the session is allowed or needs to be reserved in the unauthorized area.
  • the fourth information is determined according to the single-network slice selection service information S-NSSAI and/or the data network name DNN corresponding to the session.
  • the device further includes:
  • the third receiving module is configured to receive fifth information sent by the terminal device or another network device during the session establishment and/or modification process, where the fifth information includes at least one of the following information:
  • At least one QoS data flow in the session is requested to be established, modified or activated in the unauthorized area.
  • the device further includes:
  • the third sending module is configured to send sixth information to the terminal device, where the sixth information includes at least one of the following information:
  • the device further includes:
  • the sending determination module is configured to determine whether the third information or the fifth information needs to be sent to the network device according to the content of the sixth information when in the authorized area.
  • the sixth information includes information about a session or QoS data flow that is established, modified, or activated when the terminal device is in the unlicensed area, and the apparatus further include:
  • the session determining module is configured to determine whether to establish, modify or activate a corresponding session according to the content of the sixth information when in the unauthorized area.
  • the sixth information is information added to the policy rule of the terminal path selection policy URSP.
  • the session is a protocol data unit PDU session
  • the PDU session is represented by an attribute parameter of the PDU session.
  • the first sending module is specifically further configured to:
  • the second sending module is specifically further used for:
  • the network device is a core network network element.
  • the core network element is AMF or SMF.
  • the network device is a base station
  • the apparatus further includes:
  • the fourth receiving module is configured to receive second information sent by the core network, where the second information includes at least one of the following information:
  • the network device is a base station
  • the apparatus further includes:
  • the fifth receiving module is configured to receive fourth information sent by the core network, where the fourth information includes at least one of the following information:
  • the session is allowed or needs to be released or deactivated in the unauthorized area;
  • At least one QoS data flow in the session is allowed or needs to be released or deactivated in the unauthorized area;
  • the session is allowed or needs to be reserved in the unauthorized area
  • At least one QoS data flow in the session is allowed or needs to be reserved in the unauthorized area.
  • the communication control device provided in this embodiment is used to implement the technical solution on the network device side in any of the foregoing method embodiments, and its implementation principles and technical effects are similar, and will not be repeated here.
  • FIG. 12 is a schematic structural diagram of Embodiment 1 of a terminal device according to an embodiment of this application. As shown in FIG. 12, the terminal device 1200 includes:
  • the memory 1230 stores computer execution instructions
  • the processor 1220 executes the computer-executable instructions stored in the memory, so that the processor 1220 executes the technical solution on the terminal device side in any of the foregoing method embodiments.
  • FIG. 13 is a schematic structural diagram of Embodiment 1 of a network device according to an embodiment of this application. As shown in FIG. 13, the network device 1300 includes:
  • the network device 1300 further includes a transmitter 1340;
  • the memory 1320 stores computer execution instructions
  • the processor 1310 executes the computer-executable instructions stored in the memory, so that the processor 1310 executes the technical solution on the network device side as in any of the foregoing method embodiments.
  • the present application also provides a computer-readable storage medium in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, they are used to implement the technology on the network device side in any of the foregoing method embodiments. plan.
  • the present application also provides a computer-readable storage medium in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, they are used to implement the technical solutions on the terminal device side in any of the foregoing method embodiments.
  • the embodiment of the present application also provides a program, which is used to execute the technical solution on the network device side in the foregoing method embodiment when the program is executed by the processor.
  • the embodiment of the present application also provides a program, when the program is executed by the processor, it is used to execute the technical solution on the terminal device side in the foregoing method embodiment.
  • the embodiments of the present application also provide a computer program product, including program instructions, which are used to implement the technical solutions on the network device side in the foregoing method embodiments.
  • the embodiments of the present application also provide a computer program product, including program instructions, and the program instructions are used to implement the technical solutions on the terminal device side in the foregoing method embodiments.
  • An embodiment of the present application also provides a chip, which includes a processing module and a communication interface, and the processing module can execute the technical solution on the network device side in the foregoing method embodiment.
  • the chip also includes a storage module (such as a memory), the storage module is used to store instructions, the processing module is used to execute the instructions stored in the storage module, and the execution of the instructions stored in the storage module causes the processing module to execute the network device side Technical solutions.
  • a storage module such as a memory
  • the storage module is used to store instructions
  • the processing module is used to execute the instructions stored in the storage module
  • the execution of the instructions stored in the storage module causes the processing module to execute the network device side Technical solutions.
  • the embodiment of the present application also provides a chip, which includes a processing module and a communication interface, and the processing module can execute the technical solution of the terminal device in the foregoing method embodiment.
  • the chip also includes a storage module (such as a memory), the storage module is used to store instructions, the processing module is used to execute the instructions stored in the storage module, and the execution of the instructions stored in the storage module causes the processing module to execute the terminal device side Technical solutions.
  • a storage module such as a memory
  • the storage module is used to store instructions
  • the processing module is used to execute the instructions stored in the storage module
  • the execution of the instructions stored in the storage module causes the processing module to execute the terminal device side Technical solutions.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or integrated. To another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the processor may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (Digital Signal Processors, DSPs), Application Specific Integrated Circuit (ASIC), etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps in the method disclosed in this application can be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • All or part of the steps in the foregoing method embodiments may be implemented by a program instructing relevant hardware.
  • the aforementioned program can be stored in a readable memory.
  • the program executes the steps that include the foregoing method embodiments; and the foregoing memory (storage medium) includes: Read-Only Memory (ROM), Random Access Memory (RAM), Flash memory, hard disk, solid state hard disk, magnetic tape, floppy disk, optical disk and any combination thereof.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • Flash memory hard disk, solid state hard disk, magnetic tape, floppy disk, optical disk and any combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种通信控制方法、装置、设备及存储介质,该方法包括:在第一区域进行限制性数据通信,该限制性数据通信包括在第一区域允许终端设备使用部分已建立的会话进行数据传输;和/或在第一区域允许终端设备建立特定会话进行数据传输。根据本申请实施例的技术方案,能够方便地控制第一区域内的终端设备,避免终端设备在第一区域失去控制。

Description

通信控制方法、装置、设备及存储介质 技术领域
本申请实施例涉及通信技术领域,尤其涉及一种通信控制方法、装置、设备及存储介质。
背景技术
随着移动通信技术的发展,各种各样的终端设备都可以接入移动通信网络。对于一些类型的终端设备,例如无人机、自动驾驶汽车等,可能需要限定某些区域禁止进入,禁止进入的区域可以称之为限制区域。
以无人机为例,在无人机的飞行过程中,可以通过地理围栏设置限制区域,无人机需要知道限制区域的范围,从而避免在限制区域飞行。一旦无人机飞入限制区域,需要控制无人机飞离该限制区域,或者通知权威第三方实体(Third Party Authorized Entity,TPAE),例如归属于公安系统的无人机控制器接管对无人机的操控或者监控。
然而,在目前的技术方案中,在终端设备例如无人机移动到限制区域时,会断掉全部的会话连接,导致难以控制限制区域内的终端设备。
发明内容
本申请实施例提供一种通信控制方法、装置、设备及存储介质,用于解决目前的技术方案中,在终端设备移动到限制区域时,由于会断掉全部的会话连接,导致难以控制限制区域内的终端设备的问题。
第一方面,本申请实施例提供了一种通信控制方法,应用于电子设备,所述方法包括:
在第一区域进行限制性数据通信,所述限制性数据通信包括在所述第一区域允许所述电子设备使用部分已建立的会话进行数据传输;和/或在所述第一区域允许所述电子设备建立特定会话进行数据传输。
第二方面,本申请实施例提供了一种通信控制方法,应用于网络设备,所述方法包括:
在第一区域进行限制性数据通信,所述限制性数据通信包括允许所述第一区域内的终端设备使用部分已建立的会话进行数据传输;和/或允许所述终端设备建立特定会话进行数据传输。
第三方面,本申请实施例提供了一种通信控制装置,应用于电子设备,所述装置包括:
限制性通信模块,用于在第一区域进行限制性数据通信,所述限制性数据通信包括在所述第一区域允许所述电子设备使用部分已建立的会话进行数据传输;和/或在所述第一区域允许所述电子设备建立特定会话进行数据传输。
第四方面,本申请实施例提供了一种通信控制装置,应用于网络设备,所述装置包括:
限制性通信模块,用于在第一区域进行限制性数据通信,所述限制性数据通信包括允许所述第一区域内的终端设备使用部分已建立的会话进行数据传输;和/或允许所述终端设备建立特定会话进行数据传输。
第五方面,本申请实施例提供了一种电子设备,包括:
处理器、存储器、接收器以及与网络设备或终端设备进行通信的接口;
所述存储器存储计算机执行指令;
所述处理器执行所述存储器存储的计算机执行指令,使得所述处理器执行第一方面任一项提供的通信控制方法。
第六方面,本申请实施例提供了一种网络设备,包括:
处理器、存储器、发送器以及与终端设备进行通信的接口;
所述存储器存储计算机执行指令;
所述处理器执行所述存储器存储的计算机执行指令,使得所述处理器执行第二面任一项提供的通信控制方法。
可选地,上述处理器可以为芯片。
第七方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计 算机执行指令,当所述计算机执行指令被处理器执行时用于实现第一方面任一项提供的通信控制方法。
第八方面,本申请实施例可提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机执行指令,当所述计算机执行指令被处理器执行时用于实现第二方面任一项提供的通信控制方法。
第九方面,本申请实施例提供一种程序,当该程序被处理器执行时,用于执行如第一方面任一项提供的通信控制方法。
第十方面,本申请实施例提供一种程序,当该程序被处理器执行时,用于执行如第二方面任一项提供的通信控制方法。
第十一方面,本申请实施例提供一种计算机程序产品,包括程序指令,程序指令用于实现如第一方面任一项提供的通信控制方法。
第十二方面,本申请实施例提供一种计算机程序产品,包括程序指令,程序指令用于实现如第二方面任一项提供的通信控制方法。
第十三方面,本申请实施例提供了一种芯片,包括:处理模块与通信接口,该处理模块能执行第一方面任一项提供的通信控制方法。
进一步地,该芯片还包括存储模块(如,存储器),存储模块用于存储指令,处理模块用于执行存储模块存储的指令,并且对存储模块中存储的指令的执行使得处理模块执行第一方面任一项提供的通信控制方法。
第十四方面,本申请实施例提供了一种芯片,包括:处理模块与通信接口,该处理模块能执行第二方面任一项提供的通信控制方法。
进一步地,该芯片还包括存储模块(如,存储器),存储模块用于存储指令,处理模块用于执行存储模块存储的指令,并且对存储模块中存储的指令的执行使得处理模块执行第二方面任一项提供的通信控制方法。
本申请实施例提供的通信控制方法、装置、设备及存储介质,通过在第一区域上引入限制性数据通信,即在第一区域仅允许电子设备使用部分已建立的会话进行数据传输,或者允许电子设备建立特定会话进行数据传输,能够使电子设备在第一区域上保持或新建特定的通信连接进行数据通信,从而能够方便地控制第一区域内的电子设备,避免电子设备在第一区域失去控制。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图做一简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为一种技术方案中的通信控制方法的应用场景的示意图。
图2为本申请实施例应用的一种通信系统的示意图。
图3为本申请实施例应用的一种通信系统架构的示意图。
图4为本申请实施例提供的通信控制方法实施例一的流程示意图。
图5为本申请实施例提供的通信控制方法实施例二的流程示意图。
图6为本申请实施例提供的通信控制方法实施例三的流程示意图。
图7为本申请实施例提供的通信控制方法实施例四的流程示意图。
图8为本申请实施例提供的通信控制方法实施例五的流程示意图。
图9为本申请实施例提供的通信控制装置实施例一的示意框图。
图10为本申请实施例提供的通信控制装置实施例二的示意框图。
图11为本申请实施例提供的通信控制装置实施例三的示意框图。
图12为本申请实施例提供的电子设备实施例一的结构示意图。
图13为本申请实施例提供的网络设备实施例一的结构示意图。
具体实施方式
本申请实施例的说明书、权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例例如能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅 是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
首先,对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解:
授权区域:在一些场景下,终端设备的移动需要限定在一定范围内,这个限定的范围可以称为授权区域,授权区域之外的区域可以称为非授权区域或者限制区域。
UE:用户设备(user equipment,UE),在本申请的实施例中也称为终端设备或终端,其可以包括各种具有无线通信功能的手持设备、车载设备、无人机、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备,比如智能手机,物联网芯片,智能驾驶车辆等。
(R)AN:(无线)接入网((radio)access network,(R)AN)主要功能是控制UE通过无线接入到移动通信网络中。以手机上网为例,(R)AN节点可以是基站。
UPF:用户面功能(user plane function,UPF)的主要功能包含数据包路由和传输、包检测、业务用量上报、服务质量(quality of service,QoS)处理、合法监听、上行包检测、下行数据包存储等用户面相关的功能。
DN:数据网络(data network)。
AMF:接入和移动性管理功能(access and mobility management function,AMF)的主要功能包含连接管理、移动性管理、注册管理、接入认证和授权、可达性管理、安全上下文管理等接入和移动性相关的功能。
SMF:会话管理功能(session management function,SMF)的主要功能包含会话管理(如会话建立、修改和释放,包含UPF网元和AN之间的隧道维护)、UPF网元的选择和控制、业务和会话连续性(service and session continuity,SSC)模式选择、漫游等会话相关的功能。
PCF:策略控制功能(policy control function,PCF)的主要功能包含统一策略制定、策略控制的提供和从统一数据库(unified data repository,UDR)中获取策略决策相关的签约信息等策略相关的功能。
AF:应用功能网元(Application Function,AF)与3GPP核心网交互提供业务或者服务。
NSSF:网络切片选择功能网元(network slice selection function,NSSF)的主要功能包含为UE选择一组网络切片实例、确定允许的网络切片选择服务信息(Network Slice Selection Assistance Information,NSSAI)和确定可以服务UE的AMF集等。
UDM:统一数据管理网元(unified data management,UDM),支持3GPP认证和秘钥协商机制中的认证信任状处理,用户身份处理,接入授权,注册和移动性管理,签约管理,短消息管理等。
AUSF:认证服务器功能网元(authentication server function,AUSF),与UDM交互获取用户信息,并执行认证相关的功能,如生成中间秘钥等。
NEF:网络开放功能网元(network exposure function,NEF)的主要功能包括:安全的开放3GPP网络功能提供的业务和能力,有内部开放,或者开放给第三方等。转化或翻译与AF交互的信息和内部网络功能交互信息,如AF服务标识和内部5G核心网信息如数据网络名称(Data Network Name,DNN),单-网络切片选择服务信息(Single-Network Slice Selection Assistance Information,S-NSSAI)等;
下面,将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
图1为一种技术方案中的通信控制方法的应用场景的示意图。
参照图1所示,终端设备110如无人机或自动驾驶汽车的移动可能需要限定在一定的范围中,这个限定的范围可以称之为授权区域,授权区域之外的区域可以称之为非授权区域或者限制区域。如图1所示,终端设备110与管控服务器120之间建立有PDU会话-1,管控服务器120可以为民营机构的远程服务器,终端设备110受到管控服务器120的控制。终端设备110移动到非授权区域时,仍然需要保持与管控服务器120之间的数据传输,一方面,使得管控服务器120能够继续控制终端设备110飞行或驾驶;另一方面,使得能够将终端设备110的控制权转移到非授权区域管辖的节点上,例如,终端设备110移动到非授权区域时,需要管控服务器120可以继续控制终端设备110飞行或驾驶,或者可以将控制权移到非授权区域管辖的节点例如管控服务器130上。
因此,需要终端设备110在非授权区域时仍保持特定的通信连接(例如PDU会话-1),或者在非授权区域建立特定的通信连接来与非授权区域的管控服务器130进行通信,例如建立与管控服务器130之间的PDU会话-2。在管控服务器130完全接管该终端设备110后,可以释放PDU会话-1(但不是在终端设备110移动到非授权区域后立刻释放),例如,在终端设备110与管控服务器130之间建立PDU会话-2成功之后,在释放PDU会话-1。
在目前的技术方案中,在终端设备110例如无人机移动到非授权区域时,会断掉全部的会话连接,导致难以控制非授权区域内的终端设备。
基于上述内容,本申请实施例提供了一种通信控制方法,在第一区域进行限制性数据通信,该限制性数据通信包括允许终端设备使用部分已建立的会话进行数据传输;和/或允许终端设备建立特定会话进行数据传输。根据本申请实施例的技术方案,通过在第一区域上引入限制性数据通信,即在第一区域允许终端设备使用部分已建立的会话进行数据传输,或者允许终端设备建立特定会话进行数据传输,能够使终端设备在第一区域上保持或新建特定的通信连接进行数据通信,从而能够方便地控制第一区域内的终端设备,避免终端设备在第一区域失去控制。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、非授权频段上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频段上的NR(NR-based access to unlicensed spectrum,NR-U)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、NTN通信系统、下一代通信系统或其他通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),以及车辆间(Vehicle to Vehicle,V2V)通信、设备与卫星的通信等,本申请实施例的技术方案也可以应用于这些通信系统。
图2为本申请实施例应用的一种通信系统示意图,如图2所示,该通信系统200可以包括终端设备210以及网络设备220。终端设备210包括但不限于经由有线线路通信的设备,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接通信的设备;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器通信的设备;和/或另一终端设备的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端设备可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的个人数字处理(Personal Digital Assistant,PDA);以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端设备可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、PDA、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端设备或者未来演进的PLMN中的终端设备等。
网络设备220可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备210进行通信。可选地,该网络设备220可以是GSM系统或CDMA系统中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者为非地面通信网络(Non Terrestrial Network,NTN)中的卫星,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络设备设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。
可选地,终端设备210之间可以进行终端直连(Device to Device,D2D)通信,即本申请提供的技术方案也可以应用在两个终端设备之间的通信中。
可选地,5G系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。
图2示例性地示出了一个网络设备和两个终端设备,可选地,该通信系统200可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。
可选地,该通信系统200还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
图3为本申请实施例应用的一种通信系统架构的示意图。
参照图3所示,UE即终端设备通过Uu口与AN进行接入层连接,UE与AN之间交互接入层消息以及进行无线数据传输,AN通过N2接口与AMF进行数据传输。UE通过N1口与AMF进行非接入层(None Access Stratum,NAS)连接,UE与AMF之间交互NAS消息。AMF通过N8接口与UDM通信连接,UDM是核心网中的签约数据库,存储用户在5G网络中的签约数据。AMF是核心网中的移动性管理功能,AMF通过N11接口与SMF通信连接,SMF是核心网中的会话管理功能,AMF在对UE进行移动性管理之外,还负责将会话管理相关消息在UE与SMF之间进行转发。此外,AMF还分别通过N12接口和N22接口与AUSF和NSSF通信连接。SMF通过N7接口与PCF通信连接,PCF是核心网中的策略管理功能,负责制定对UE的移动性管理、会话管理、计费等相关的策略,PCF通过N5接口与AF通信连接。UPF是核心网中的用户面功能,通过N6接口与外部数据网络DN进行数据传输,通过N3接口与AN进行数据传输,通过N4接口与SFM进行数据传输。UE通过Uu口接入5G网络后,在SMF的控制下建立UE到UPF的PDU会话数据连接,从而进行数据传输。系统中还存在NEF功能,用于与第三方应用服务器接口,在核心网节点与第三方应用之间进行信息传递。
下面通过几个具体实施例对本申请提供的通信控制方法进行详细的说明。
图4为本申请实施例提供的通信控制方法实施例一的流程示意图。该通信控制方法可以应用于电子设备,该通信控制方法包括步骤S410。
在步骤S410中,电子设备在第一区域进行限制性数据通信,该限制性数据通信包括允许电子设备使用部分已建立的会话进行数据传输;和/或允许电子设备建立特定会话进行数据传输。
在示例实施例中,第一区域为限制区域,电子设备在第一区域进行限制性数据通信,限制性数据通信表示对电子设备在第一区域的数据通信进行限制,例如,仅允许电子设备使用部分已建立的会话例如会话-1与服务器1进行数据传输;和/或仅允许电子设备与服务器2建立特定会话例如会话2进行数据传输。以无人机为例,无人机飞入第一区域即限制区域之后,仅允许无人机使用与无人机管理中心(Unmanned Aerial System Traffic Management,UTM)之间的已建立会话,和/或仅允许电子设备与权威第三方实体TPAE建立会话进行数据传输。
需要说明的是,在示例实施例中,“特定”可以表示根据电子设备的类型确定,举例而言,特定会话可以为在第一区域针对该电子设备的类型而确定的会话,例如,用于无人机与公安系统的无人机控制服务器之间通信的会话,用于自动驾驶车辆与交通管理系统的车辆控制服务器之间通信的会话,特定会话也可以为其他适当形式的会话,本申请对此不进行特殊限定。
电子设备可以根据网络设备侧发送的特定会话相关信息或本地配置来判断特定会话。例如,网络设备侧可以在第一区域针对不同的电子设备类型设定不同的特定会话,根据电子设备的类型向电子设备发送特定会话相关的信息。电子设备也可以在本地配置与电子设备的类型对应的特定会话,在移动到第一区域后根据本地配置来确定需要建立的特定会话。
进一步地,在示例实施例中,电子设备在第二区域正常进行数据通信,第二区域为限制区域之外的另一区域,正常进行数据通信可以是按照3GPP规定的流程执行PDU会话的建立、修改,并传输用户面数据。上述部分已建立的会话为在第二区域建立的会话。
需要说明的是,电子设备可以为终端设备例如手机、无人机或自动驾驶车辆,也可以为其他适当的电子设备例如基站,这同样在本申请的保护范围内。
根据图4的示例实施例中的技术方案,通过在第一区域上引入限制性数据通信,即在第一区域仅允许电子设备使用部分已建立的会话进行数据传输,或者允许电子设备建立特定会话进行数据传输,能够使电子设备在第一区域上保持或新建特定的通信连接进行数据通信,从而能够方便地控制第一区域内的电子设备,避免电子设备在第一区域失去控制。
在示例实施例中,第二区域为授权区域,第一区域为非授权区域。电子设备在授权区域,可以正常的建立和使用用户面的多个连接(例如多个PDU会话)进行数据通信,连接的建立和使用与现有的3GPP机制可以相同;电子设备在非授权区域仅允许使用部分已建立的PDU会话。部分已建立的PDU会话可以用于特定服务器的通信;和/或电子设备移动到非授权区域时,允许特定的PDU会话建立。特定PDU会话可以用于特定服务器的通信。
需要说明的是,在示例实施例中,特定服务器可以为根据电子设备的类型而确定的服务器,例如,针对无人机,特定服务器可以为UTM的服务器;针对自动驾驶车辆,特定服务器可以为交通管理系统 的车辆控制服务器。
进一步地,电子设备从第二区域移动到第一区域之后,保持的通信连接例如会话-1可以稍后释放,例如,在电子设备与服务器2之间建立了会话-2之后再释放,或者服务器2接管控制电子设备之后再释放保持的通信连接即会话-1。
此外,在一些实施例中,电子设备还可以为基站,终端设备可以通过切换的方式接入新基站,或终端设备可以通过小区重选、小区选择、或重定向的方式接入到新基站。在终端设备从原基站即电子设备接入到新基站的情况下,新基站可以从电子设备获取第二信息和/或第四信息;或者新基站可以从终端设备获得第二信息和/或第四信息。
其中,第二信息包括以下至少一种信息:是否为电子设备开通限制性数据通信;授权区域和/或非授权区域的信息。需要说明的是,在本申请示例实施例中,对第二信息的内容形式不作限定,但是第二信息可以指示上述至少一种信息。
第四信息包括以下至少一种信息:会话在非授权区域允许或需要被释放或去激活;会话中的哪个或哪些QoS数据流在非授权区域允许或需要被释放或去激活;会话在非授权区域允许或需要保留;会话中的哪个或哪些QoS数据流在非授权区域允许或需要保留。“保留”可以表示该会话或该会话中的至少一个QoS数据流在非授权区域允许或需要不被释放或激活,还可以像在授权区域一样正常进行数据通信。
需要说明的是,在本申请示例实施例中,对第四信息的内容形式不作限定,但是第四信息可以指示上述至少一种信息,第四信息还可以进一步携带具体的会话标识信息和/或QoS数据流的标识信息。
图5为本申请实施例提供的通信控制方法实施例二的流程示意图。
参照图5所示,在步骤S510中,终端设备在授权区域正常进行数据通信。
在示例实施例中,正常进行数据通信可以是按照3GPP规定的流程执行PDU会话的建立、修改,并传输用户面数据,例如,正常建立、激活或维持多个会话连接。参照图5所示,终端设备与管控服务器1和多个其他服务器之间正常建立PDU会话,例如终端设备与管控服务器1之间正常建立PDU会话-1。
在步骤S520中,终端设备在非授权区域维持部分已建立的连接,和/或建立特定连接。
在示例实施例中,终端设备从授权区域移动到非授权区域,在非授权区域维持部分已建立的会话连接,例如,维持与管控服务器1之间的会话连接即PDU会话-1,释放与其他服务器之间的会话连接。
根据图5的示例实施例中的技术方案,维持该部分已建立的会话连接,能够避免终端设备在进入非授权区域时由于通信连接突然断掉而导致的失控情况。
进一步地,终端设备还可以建立特定连接,例如建立与管控服务器2之间的会话连接即PDU会话2。特定连接是为了在非授权区域对终端设备进行更合理的控制的连接,例如特定连接可以是用于无人机与公安系统的无人机控制服务器之间通信的连接,或者用于自动驾驶车辆与交通管理系统的车辆控制服务器之间通信的连接。
需要说明的是,终端设备在移动到非授权区域之后,保持的通信连接例如PDU会话-1可以稍后释放,例如,在终端设备与管控服务器2之间建立了PDU会话-2之后再释放,或者管控服务器2接管控制终端设备之后再释放保持的通信连接。
在上述实施例的基础上,下面结合附图,通过几个具体实施例,对该通信控制方法具体应用过程中的实现方案进行详细说明。
实施例三
在该实施例中,终端设备在注册过程中,可以通过NAS消息(例如注册请求)向网络设备发送第一信息,第一信息可以用于指示以下至少一种信息:
-请求开通限制性数据通信;
-授权区域和/或非授权区域信息。其中,授权区域和/或非授权区域的信息可以通过全球定位系统(Global Positioning System,GPS)信息、小区标识信息、跟踪区域标识(Tracking Area Identity,TAI)信息等进行描述。
核心网网元(例如如AMF)可以与UDM和/或PCF进行交互,交互信息中可以包含该第一信息。
进一步地,核心网网元基于NAS消息和/或交互消息确定第二信息,将第二信息发送给终端和/或接入网例如基站,第二信息包括以下至少一种信息:
-是否为终端设备开通限制性数据通信;
-授权区域和/或非授权区域的信息。其中,授权区域和/或非授权区域的信息可以通过GPS坐标、小区标识、TAI表等进行描述)。
图6为本申请实施例提供的通信控制方法实施例三的流程示意图。
参照图6所示,在步骤S610中,终端设备在注册过程中,向核心网发送注册请求,该注册请求中可以包含第一信息。
在示例实施例中,第一信息可以用于指示以下至少一种信息:请求开通限制性数据通信的信息;授权区域和/或非授权区域信息。终端设备可以通过在注册请求例如NAS消息中添加第一信息,向核心网发送该注册请求。授权区域和/或非授权区域的信息可以通过GPS坐标、小区标识信息、跟踪区域标识(Tracking Area Identity,TAI)信息等进行描述。
需要说明的是,在本申请示例实施例中,对第一信息的内容形式不作限定,但是第一信息可以指示上述至少一种信息。
需要说明的是,限制性数据通信表示对终端设备在非授权区域的数据通信进行限制,例如,允许终端设备使用部分已建立的会话与网络设备进行数据传输;和/或允许终端设备与网络设备建立特定会话进行数据传输。以无人机为例,无人机飞入非授权区域之后,仅允许无人机使用与无人机管理中心(Unmanned Aerial System Traffic Management,UTM)之间的已建立会话,和/或仅允许终端设备与TPAE建立会话进行数据传输。
在步骤S620中,核心网与UDM和/或PCF进行交互,交互信息中可以包含第一信息。
在示例实施例中,核心网网元例如AMF与UDM和/或PCF进行交互,交互消息中包含第一信息,例如交互消息包含签约信息和/或策略信息,签约信息和/或策略信息中包含第一信息。
需要说明的是,步骤S610和步骤S620中可以只在一个步骤中添加第一信息,例如,仅在步骤S610中的注册请求中添加第一信息,或者仅在步骤S620中的签约信息和/或策略信息中添加第一信息,也可以两个步骤中都添加第一信息,添加第一信息包括提供部分或全部第一信息的参数,在两个步骤中的第一信息的参数内容冲突的情况下,由核心网网络例如AMF决定使用哪个步骤的第一信息内容。
在步骤S630中,核心网将第二信息发送给接入网,第二信息可以基于步骤S620中的交互信息和/或步骤S610中的注册请求来确定。
在示例实施例中,第二信息包括以下至少一种信息:是否为终端设备开通限制性数据通信;授权区域和/或非授权区域的信息。核心网网元AMF通过N2接口请求向接入网RAN发送第二信息,该N2接口请求中包含第二信息。
需要说明的是,在本申请示例实施例中,对第二信息的内容形式不作限定,但是第二信息可以指示上述至少一种信息。
在步骤S640中,核心网向终端设备发送注册回复,该注册回复中可以包括第二信息。
在示例实施例中,核心网网元例如AMF通过N1接口向终端设备发送注册回复,该注册回复中包括第二信息。
需要说明的是,在一些示例实施例中,步骤630和步骤640可以合并为一个步骤,即步骤630中携带N2接口发给接入网RAN的消息也携带发给终端设备的注册回复即NAS消息,RAN接收到步骤630的消息后,将注册回复即NAS消息透传给终端设备。
此外,在示例实施例中,终端设备或UDM/PCF还可以向核心网提供“不为该终端设备限定授权区域或非授权区域的指示,即不限定用户面数据连接的有效区域。
需要说明的是,第一信息和第二信息之间没有必然的因果关系,即即便核心网例如AMF没有接收到终端或UDM/PCF的第一信息,也可以向基站和/或终端发送第二信息,或者核心网例如AMF仅接收来自终端和/或UDM/PCF的第一信息,不需要将第二信息发送给基站和/或终端。
实施例四
在该实施例中,终端设备在会话建立/修改过程中,可以在NAS消息(如会话建立/修改请求)中添加第三信息,和/或,核心网网元(例如SMF)通过UDM或PCF的交互信息中得到第三信息,第三信息包含以下至少一种信息:
-请求该会话在“非授权区域”允许或需要被释放或去激活;
-请求该会话在“非授权区域”允许或需要保留;
-请求该会话中的哪个或哪些QoS数据流在“非授权区域”允许或需要被释放或去激活;
-请求该会话中的哪个或哪些QoS数据流在“非授权区域”允许或需要保留。
“保留”可以表示该会话或该会话中的至少一个QoS数据流在非授权区域允许或需要不被释放或激活,还可以像在授权区域一样正常进行数据通信。
需要说明的是,NAS消息和UDM/PCF的交互信息中可以只有一个包含第三信息,即NAS消息包含第三信息,或UDM/PCF的交互信息中包含第三信息。
核心网网元可以在发送给基站的“会话建立请求”消息和/或发送给终端设备的NAS回复消息(如会话建立回复)中,添加第四信息,第四信息用于指示第三信息中请求的行为是否被批准(对应上面第三信息中的四条请求信息)。
图7为本申请实施例提供的通信控制方法实施例四的流程示意图。
参照图7所示,在步骤S710中,终端设备在会话建立或修改过程中,向核心网发送第三信息。
在示例实施例中,可以在会话建立/修改请求的NAS消息中添加第三信息,第三信息包含以下至少一种信息:
-请求该会话在“非授权区域”允许或需要被释放或去激活;
-请求该会话在“非授权区域”允许或需要保留;
-请求该会话中的哪个或哪些QoS数据流在“非授权区域”允许或需要被释放或去激活;
-请求该会话中的哪个或哪些QoS数据流在“非授权区域”允许或需要保留。
需要说明的是,在本申请示例实施例中,对第三信息的内容形式不作限定,但是第三信息可以指示上述至少一种信息,第三信息还可以进一步携带具体的会话标识信息和/或QoS数据流的标识信息。
在步骤S720中,核心网与UDM和/或PCF进行交互,交互消息中可以包含第三消息。
在示例实施例中,核心网网元(例如SMF)与UDM和/或PCF进行交互,从交互消息中得到第三消息,例如交互消息包含签约信息和/或策略信息,签约信息和/或策略信息中包含第三信息。
需要说明的是,步骤S710的NAS消息和步骤S720中的交互信息中可以只有一个包含第三信息,即NAS消息包含第三信息,或UDM/PCF的交互信息中包含第三信息。也可以两个步骤中都添加第一信息,包括提供部分或全部第一信息的参数,在两个步骤中的第一信息的参数内容冲突的情况下,由核心网网络例如SMF决定使用哪个步骤的第一信息内容。
在步骤S730中,核心网可以在发送给接入网的“会话请求”消息添加第四信息。第四信息用于指示以下至少一种信息:
-该会话在“非授权区域”允许或需要被释放或去激活;
-该会话在“非授权区域”允许或需要保留;
-该会话中的哪个或哪些QoS数据流在“非授权区域”允许或需要被释放或去激活;
-该会话中的哪个或哪些QoS数据流在“非授权区域”允许或需要保留。
需要说明的是,第四信息可以是基于第三信息得出的,也可以是核心网网元自己产生,本申请对此不作特殊限定。
需要说明的是,在本申请示例实施例中,对第四信息的内容形式不作限定,但是第四信息可以指示上述至少一种信息,第四信息还可以进一步携带具体的会话标识信息和/或QoS数据流的标识信息。
在示例实施例中,核心网网元可以根据该PDU会话对应的单-网络切片选择服务信息(Single-Network Slice Selection Assistance Information,S-NSSAI)和/或DNN来确定第四信息的内容。将所确定的第四信息添加到发给接入网RAN的会话建立请求中。
在步骤S740中,核心网可以在发送终端设备的会话回复消息中,添加第四信息。
在示例实施例中,核心网网元例如SMF在发送给终端设备的会话建立回复消息的NAS消息中,添加第四消息。
需要说明的是,步骤S730和步骤S740可以合并为一个步骤,即步骤S730中携带发给RAN的会话建立请求也携带发给终端设备的会话建立回复(如会话接受或拒绝),RAN接收到步骤S730的消息后,将会话建立回复即NAS回复消息透传给终端设备。
需要说明的是,第三信息和第四信息之间没有必然的因果关系,即即便核心网例如SMF没有接收到终端或UDM/PCF的第三信息,也可以向基站和/或终端发送第四信息,或者核心网例如SMF仅接收来自终端和/或UDM/PCF的第三信息,不需要将第四信息发送给基站和/或终端。
实施例五
在该示例实施例中,终端设备在“授权区域”外即非授权区域,仅允许保留特定的PDU会话,并且还可以允许特定的PDU会话进行建立。特定的PDU会话可以为在非授权区域针对该终端设备的类型而确定的会话,例如,无人机与公安系统的无人机控制服务器之间的会话,自动驾驶车辆与交通管理系统的车辆控制服务器之间的会话。
为了建立特定的PDU会话,在该示例实施例中,在会话建立和/或修改的过程中,引入了第五信息,例如,可以在NAS消息(如会话建立/修改请求)中添加第五信息,和/或,核心网网元(例如SMF)通过UDM或PCF的交互信息中得到第五信息,该第五信息可以包含以下至少一种信息:
-请求该会话在非授权区域被建立、修改或激活;
-请求该会话中的哪个或哪些QoS数据流,在非授权区域被建立、修改或激活。
需要说明的是,在本申请示例实施例中,对第五信息的内容形式不作限定,但是第五信息可以指示上述至少一种信息,第四信息还可以进一步携带具体的会话标识信息和/或QoS数据流的标识信息。
例如,第五信息可以包括:请求该会话在终端设备从授权区域移动到非授权区域的情况下被建立、修改或激活;和/或,请求该会话中的哪个或哪些QoS数据流,在终端设备从授权区域移动到非授权区域的情况下被建立、修改或激活;
第五信息用于指示该会话在非授权区域建立、修改或激活。第五信息可以包含终端设备发送的NAS消息(PDU会话建立/修改请求)中,或者核心网网元从UDM或PCF的交互信息中得到,该步骤与步骤S710和步骤S720类似,在此不再赘述。
进一步地,核心网网元(如SMF)可以根据第五信息确定是否允许对应的PDU会话建立、修改或激活。例如,核心网网元可以根据第五信息确定在非授权区域建立、修改或激活对应的会话。
此外,在一些示例实施例中,终端设备可以在会话建立/修改请求消息中携带上述第三信息或第五信息,进一步地,终端设备可以从网络设备侧获得第六信息,该第六信息包含以下至少一种信息:
(1)哪些(种)PDU会话或QoS数据流在“非授权区域”允许或需要仍然保持;
(2)哪些PDU会话或QoS数据流在“非授权区域”允许或需要被释放或去激活;
(3)哪些PDU会话或QoS数据流在“非授权区域”需要被建立、修改或激活;
(4)哪些PDU会话或QoS数据流在“非授权区域”允许被建立、修改或激活。
需要说明的是,在本申请示例实施例中,对第六信息的内容形式不作限定,但是第六信息可以指示上述至少一种信息,第六信息还可以进一步携带具体的会话标识信息和/或QoS数据流的标识信息。
例如,第六信息可以包括:哪些PDU会话或QoS数据流从“授权区域”移动到“非授权区域”情况下必须被建立、修改或激活;和/或,哪些PDU会话或QoS数据流从“授权区域”移动到“非授权区域”情况下允许被建立、修改或激活;
进一步地,在示例实施例中,终端设备在“授权区域”时,可以根据上述“第六信息”的内容确定是否需要在发送给网络设备的NAS消息中添加“第三信息”或“第五信息”。该NAS消息可以为注册请求消息或会话建立请求消息。
此外,终端在“非授权区域”时,可以根据上述“第六信息”的第(3)条和第(4)条内容确定是否建立、修改、或激活对应的PDU会话。
需要说明的是,PDU会话可以通过PDU会话属性参数例如S-NSSAI、DNN、PDU会话类型、SSC-Mode等)描述,如下面的路径选择描述符(Route Selection Descriptor)表2所示。
在一些示例实施例中,第六信息可以通过NAS消息发送给终端设备,该NAS消息可以是“注册回复”、“终端配置更新请求(UE Configuration Update Request)”等消息。
在另一些实施例中,第六信息可以通过扩展终端设备的终端路径选择策略(UE Route Selection Policy,URSP)规则来实现,即在URSP的策略规则中添加“第六信息”来实现,如下表1所示:
表1 UE路径选择策略规则
参数名称 描述
规则优先级 决定URSP规则的查看顺序
数据流描述符 描述数据流的特征
应用描述符 包括终端操作系统可识别的应用标识,唯一指代某个应用
IP描述符 IP三元组或IPv6前缀、端口号、协议标识等
非IP描述符 描述非IP数据包的特征
DNN DNN由应用层提供
连接能力 请求将数据跑在支持所述能力的连接上
路径选择描述符 路径选择描述符列表,具体内容见表2
表2 路径选择描述符
参数名称 描述
路径选择描述符优先级 决定使用路径选择描述符的顺序
路径选择参数 定义路径选择参数
业务和连续性模式选择 包含一个值
网络切片选择 包含一个或多个值
DNN选择 包含一个或多个DNN
PDU会话类型选择 包含一个类型值
非无缝分流指示 指示是否需要将特定的流量分流至非3GPP接入
接入类型选择 只是对数据流量跑在3GPP或非3GPP接入对应的PDU会话上
第六信息  
图8为本申请实施例提供的通信控制方法实施例五的流程示意图。
在本申请的一些示例实施例中,提供了一种通信控制方法,应用于网络设备,所述方法包括:
步骤S810,在第一区域进行限制性数据通信,所述限制性数据通信包括允许所述第一区域内的终端设备使用部分已建立的会话进行数据传输;和/或允许所述终端设备建立特定会话进行数据传输。
根据图8的示例实施例中的技术方案,通过在第一区域上引入限制性数据通信,即在第一区域仅允许终端设备使用部分已建立的会话进行数据传输,或者允许终端设备建立特定会话进行数据传输,能够使终端设备在第一区域上保持或新建特定的通信连接进行数据通信,从而能够方便地控制第一区域内的终端设备,避免终端设备在第一区域失去控制。
在本申请的一些示例实施例中,所述方法还包括:在第二区域正常进行数据通信。
在本申请的一些示例实施例中,所述第二区域为授权区域,所述第一区域为非授权区域。
在本申请的一些示例实施例中,所述部分已建立的会话用于与特定服务器的通信,所述特定会话用于与所述特定服务器的通信。
在本申请的一些示例实施例中,所述方法还包括:接收所述终端设备或另一网络设备发送的第一信息,其中,所述第一信息包括以下至少一种信息:请求开通所述限制性数据通信;所述授权区域和/或所述非授权区域的信息。
在本申请的一些示例实施例中,所述方法还包括:向所述终端设备发送第二信息,其中,所述第二信息包括以下至少一种信息:是否为所述终端设备开通所述限制性数据通信;所述授权区域和/或所述非授权区域的信息。
在本申请的一些示例实施例中,所述方法还包括:在会话建立和/或修改过程中,接收所述终端设备或另一网络设备发送的第三信息,其中,所述第三信息包括以下至少一种信息:请求所述会话在所述非授权区域允许或需要被释放或去激活;请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要被释放或去激活;请求所述会话在所述非授权区域允许或需要保留;请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要保留。
在本申请的一些示例实施例中,所述方法还包括:向所述终端设备发送第四信息,其中,所述第四信息包括以下至少一种信息:所述会话在所述非授权区域允许或需要被释放或去激活;所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;所述会话在所述非授权区域允许或需要保留;所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
在本申请的一些示例实施例中,所述第四信息是根据所述会话对应的单-网络切片选择服务信息S-NSSAI和/或数据网络名称DNN确定的。
在本申请的一些示例实施例中,所述方法还包括:在会话建立和/或修改过程中,接收所述终端设备或另一网络设备发送的第五信息,其中,所述第五信息包括以下至少一种信息:请求所述会话在所述非授权区域被建立、修改或激活;请求所述会话中的至少一个QoS数据流,在所述非授权区域被建立、修改或激活。
在本申请的一些示例实施例中,所述方法还包括:向所述终端设备发送第六信息,其中,所述第六信息包括以下至少一种信息:在所述非授权区域允许或需要保留的会话或QoS数据流的信息;在所述非授权区域允许或需要被释放或去激活的会话或QoS数据流的信息;在所述非授权区域的情况下允许或需要被建立、修改或激活的会话或QoS数据流的信息。
在本申请的一些示例实施例中,所述方法还包括:在所述授权区域时,根据所述第六信息的内容确定是否需要向所述网络设备发送所述第三信息或第五信息。
在本申请的一些示例实施例中,所述第六信息包括在所述终端设备在所述非授权区域的情况下,被建立、修改或激活的会话或QoS数据流的信息,所述方法还包括:在所述非授权区域时,根据所述第六信息的内容确定是否建立、修改或激活对应的会话。
在本申请的一些示例实施例中,所述第六信息为在终端路径选择策略URSP的策略规则中添加的信息。
在本申请的一些示例实施例中,所述会话为协议数据单元PDU会话,所述PDU会话由PDU会话的属性参数表示。
在本申请的一些示例实施例中,所述向所述终端设备发送第二信息,包括:向无线接入网络RAN发送所述第二信息,并经所述RAN将所述第二信息透传至所述终端设备;或者,所述向所述终端设备发送第四信息,包括:向所述RAN发送所述第四信息,并经所述RAN将所述第四信息透传至所述终端设备。
在本申请的一些示例实施例中,所述网络设备为核心网网元。
在本申请的一些示例实施例中,所述核心网网元为接入和移动性管理功能AMF或会话管理功能SMF。
在本申请的一些示例实施例中,所述网络设备为基站,所述方法还包括:接收核心网发送的第二信息,其中,所述第二信息包括以下至少一种信息:是否为所述终端设备开通所述限制性数据通信;所述授权区域和/或所述非授权区域的信息。
在本申请的一些示例实施例中,所述网络设备为基站,所述方法还包括:接收核心网发送的第四信息,其中,所述第四信息包括以下至少一种信息:所述会话在所述非授权区域允许或需要被释放或去激活;所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;所述会话在所述非授权区域允许或需要保留;所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
由于网络设备端的通信控制方法与上述终端设备端的通信控制方法的实现原理以及技术效果类似,在此不再赘述。
图9为本申请实施例提供的通信控制装置实施例一的示意框图。该通信控制装置应用于电子设备,参照图9所示,该通信控制装置900可以包括:
限制性通信模块910,用于在第一区域进行限制性数据通信,所述限制性数据通信包括在所述第一区域允许所述电子设备使用部分已建立的会话进行数据传输;和/或在所述第一区域允许所述电子设备建立特定会话进行数据传输。
根据图9的示例实施例中的技术方案,通过在第一区域上引入限制性数据通信,即在第一区域仅允许电子设备使用部分已建立的会话进行数据传输,或者允许电子设备建立特定会话进行数据传输,能够使电子设备在第一区域上保持或新建特定的通信连接进行数据通信,从而能够方便地控制第一区域内的电子设备,避免电子设备在第一区域失去控制。
图10为本申请实施例提供的通信控制装置实施例二的示意框图。参照图10所示,在本申请的一些示例实施例中,所述装置900还包括:正常通信模块1010,用于在第二区域正常进行数据通信。
在本申请的一些示例实施例中,所述第二区域为授权区域,所述第一区域为非授权区域。
在本申请的一些示例实施例中,所述部分已建立的会话用于与特定服务器的通信,所述特定会话用于与所述特定服务器的通信。
在本申请的一些示例实施例中,所述装置还包括:第一发送模块,用于向网络设备发送第一信息,其中,所述第一信息包括以下至少一种信息:请求开通所述限制性数据通信;所述授权区域和/或所述非授权区域的信息。
在本申请的一些示例实施例中,所述装置还包括:第一接收模块,用于接收所述网络设备发送的第二信息,其中,所述第二信息包括以下至少一种信息:是否为所述电子设备开通所述限制性数据通信;所述授权区域和/或所述非授权区域的信息。
在本申请的一些示例实施例中,所述装置还包括:第二发送模块,用于在会话建立和/或修改过程中,向网络设备发送第三信息,其中,所述第三信息包括以下至少一种信息:请求所述会话在所述非授权区域允许或需要被释放或去激活;请求所述会话中的至少一个服务质量QoS数据流,在所述非授权区域允许或需要被释放或去激活;请求所述会话在所述非授权区域允许或需要保留;请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要保留。
在本申请的一些示例实施例中,所述装置还包括:第二接收模块,用于接收所述网络设备发送的第四信息,其中,所述第四信息包括以下至少一种信息:所述会话在所述非授权区域允许或需要被释放或去激活;所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;所述会话在所述非授权区域允许或需要保留;所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
在本申请的一些示例实施例中,所述第四信息是根据所述会话对应的单-网络切片选择服务信息S-NSSAI和/或数据网络名称DNN确定的。
在本申请的一些示例实施例中,所述装置还包括:第三发送模块,用于在会话建立和/或修改过程中,向网络设备发送第五信息,其中,所述第五信息包括以下至少一种信息:请求所述会话在所述非授权区域被建立、修改或激活;请求所述会话中的至少一个QoS数据流,在所述非授权区域被建立、修改或激活。
在本申请的一些示例实施例中,所述装置还包括:第三接收模块,用于接收所述网络设备发送的第六信息,其中,所述第六信息包括以下至少一种信息:在所述非授权区域允许或需要保留的会话或QoS数据流的信息;在所述非授权区域允许或需要被释放或去激活的会话或QoS数据流的信息;在所 述非授权区域允许或需要被建立、修改或激活的会话或QoS数据流的信息。
在本申请的一些示例实施例中,所述装置还包括:发送确定模块,用于在所述授权区域时,根据所述第六信息的内容确定是否需要向所述网络设备发送所述第三信息或第五信息。
在本申请的一些示例实施例中,所述第六信息包括在所述非授权区域允许或需要被建立、修改或激活的会话或QoS数据流的信息,所述装置还包括:会话确定模块,用于在所述非授权区域时,根据所述第六信息的内容确定是否建立、修改或激活对应的会话。
在本申请的一些示例实施例中,所述第六信息为在终端路径选择策略URSP的策略规则中添加的信息。
在本申请的一些示例实施例中,所述会话为协议数据单元PDU会话,所述PDU会话由PDU会话的属性参数表示。
在本申请的一些示例实施例中,所述第一接收模块具体还用于:接收所述网络设备向无线接入网络RAN发送,并经所述RAN透传至所述电子设备的所述第二信息;或者,所述第二接收模块具体还用于:接收所述网络设备向所述RAN发送,并经所述RAN透传至所述电子设备的所述第四信息。
在本申请的一些示例实施例中,所述电子设备是终端设备。
在本申请的一些示例实施例中,所述电子设备是基站。
在本申请的一些示例实施例中,所述电子设备是第一基站,所述装置还包括:切换控制模块,用于在终端设备接入到第二基站的情况下,所述第二基站从所述第一基站获得第二信息和/或第四信息;或者,所述第二基站从所述终端设备获得所述第二信息和/或第四信息,其中,所述第二信息包括以下至少一种信息:是否为所述终端设备开通所述限制性数据通信;所述授权区域和/或所述非授权区域的信息,所述第四信息包括以下至少一种信息:所述会话在所述非授权区域允许或需要被释放或去激活;所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;所述会话在所述非授权区域允许或需要保留;所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
本实施例提供的通信控制装置,用于执行前述任一方法实施例中电子设备侧的技术方案,其实现原理和技术效果类似,在此不再赘述。
图11为本申请实施例提供的通信控制装置实施例三的示意框图。该通信控制装置应用于网络设备,参照图11所示,该通信控制装置1100可以包括:
限制性通信模块1110,用于在第一区域进行限制性数据通信,所述限制性数据通信包括允许所述第一区域内的终端设备使用部分已建立的会话进行数据传输;和/或允许所述终端设备建立特定会话进行数据传输。
在本申请的一些示例实施例中,所述装置还包括:
正常通信模块,用于在第二区域正常进行数据通信。
在本申请的一些示例实施例中,所述第二区域为授权区域,所述第一区域为非授权区域。
在本申请的一些示例实施例中,所述部分已建立的会话用于与特定服务器的通信,所述特定会话用于与所述特定服务器的通信。
在本申请的一些示例实施例中,所述装置还包括:
第一接收模块,用于接收所述终端设备或另一网络设备发送的第一信息,其中,所述第一信息包括以下至少一种信息:
请求开通所述限制性数据通信;
所述授权区域和/或所述非授权区域的信息。
在本申请的一些示例实施例中,所述装置还包括:
第一发送模块,用于向所述终端设备发送第二信息,其中,所述第二信息包括以下至少一种信息:
是否为所述终端设备开通所述限制性数据通信;
所述授权区域和/或所述非授权区域的信息。
在本申请的一些示例实施例中,所述装置还包括:
第二接收模块,用于在会话建立和/或修改过程中,接收所述终端设备或另一网络设备发送的第三信息,其中,所述第三信息包括以下至少一种信息:
请求所述会话在所述非授权区域允许或需要被释放或去激活;
请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要被释放或去激活;
请求所述会话在所述非授权区域允许或需要保留;
请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要保留。
在本申请的一些示例实施例中,所述装置还包括:
第二发送模块,用于向所述终端设备发送第四信息,其中,所述第四信息包括以下至少一种信息:
所述会话在所述非授权区域允许或需要被释放或去激活;
所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
所述会话在所述非授权区域允许或需要保留;
所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
在本申请的一些示例实施例中,所述第四信息是根据所述会话对应的单-网络切片选择服务信息S-NSSAI和/或数据网络名称DNN确定的。
在本申请的一些示例实施例中,所述装置还包括:
第三接收模块,用于在会话建立和/或修改过程中,接收所述终端设备或另一网络设备发送的第五信息,其中,所述第五信息包括以下至少一种信息:
请求所述会话在所述非授权区域被建立、修改或激活;
请求所述会话中的至少一个QoS数据流,在所述非授权区域被建立、修改或激活。
在本申请的一些示例实施例中,所述装置还包括:
第三发送模块,用于向所述终端设备发送第六信息,其中,所述第六信息包括以下至少一种信息:
在所述非授权区域允许或需要保留的会话或QoS数据流的信息;
在所述非授权区域允许或需要被释放或去激活的会话或QoS数据流的信息;
在所述非授权区域的情况下允许或需要被建立、修改或激活的会话或QoS数据流的信息。
在本申请的一些示例实施例中,所述装置还包括:
发送确定模块,用于在所述授权区域时,根据所述第六信息的内容确定是否需要向所述网络设备发送所述第三信息或第五信息。
在本申请的一些示例实施例中,所述第六信息包括在所述终端设备在所述非授权区域的情况下,被建立、修改或激活的会话或QoS数据流的信息,所述装置还包括:
会话确定模块,用于在所述非授权区域时,根据所述第六信息的内容确定是否建立、修改或激活对应的会话。
在本申请的一些示例实施例中,所述第六信息为在终端路径选择策略URSP的策略规则中添加的信息。
在本申请的一些示例实施例中,所述会话为协议数据单元PDU会话,所述PDU会话由PDU会话的属性参数表示。
在本申请的一些示例实施例中,所述第一发送模块具体还用于:
向无线接入网络RAN发送所述第二信息,并经所述RAN将所述第二信息透传至所述终端设备;或者,
所述第二发送模块具体还用于:
向所述RAN发送所述第四信息,并经所述RAN将所述第四信息透传至所述终端设备。
在本申请的一些示例实施例中,所述网络设备为核心网网元。
在本申请的一些示例实施例中,所述核心网网元为AMF或SMF。
在本申请的一些示例实施例中,所述网络设备为基站,所述装置还包括:
第四接收模块,用于接收核心网发送的第二信息,其中,所述第二信息包括以下至少一种信息:
是否为所述终端设备开通所述限制性数据通信;
所述授权区域和/或所述非授权区域的信息。
在本申请的一些示例实施例中,所述网络设备为基站,所述装置还包括:
第五接收模块,用于接收核心网发送的第四信息,其中,所述第四信息包括以下至少一种信息:
所述会话在所述非授权区域允许或需要被释放或去激活;
所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
所述会话在所述非授权区域允许或需要保留;
所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
本实施例提供的通信控制装置,用于执行前述任一方法实施例中网络设备侧的技术方案,其实现原理和技术效果类似,在此不再赘述。
图12为本申请实施例提供的终端设备实施例一的结构示意图。如图12所示,该终端设备1200,包括:
处理器1220、存储器1230、发送器1240与网络设备进行通信的接口1250;可选的,该终端设备1200还包括接收器1210。
存储器1230存储计算机执行指令;
处理器1220执行存储器存储的计算机执行指令,使得处理器1220执行如前述任一方法实施例中的终端设备侧的技术方案。
图13为本申请实施例提供的网络设备实施例一的结构示意图,如图13所示,该网络设备1300,包括:
处理器1310、存储器1320、接收器1330、与终端设备进行通信的接口1350,可选的,该网络设备1300还包括发送器1340;
存储器1320存储计算机执行指令;
处理器1310执行存储器存储的计算机执行指令,使得处理器1310执行如前述任一方法实施例中的网络设备侧的技术方案。
本申请还提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机执行指令,当计算机执行指令被处理器执行时用于实现第一前述任一方法实施例中网络设备侧的技术方案。
本申请还提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机执行指令,当计算机执行指令被处理器执行时用于实现前述任一方法实施例中终端设备侧的技术方案。
本申请实施例还提供一种程序,当该程序被处理器执行时,用于执行前述方法实施例中网络设备侧的技术方案。
本申请实施例还提供一种程序,当该程序被处理器执行时,用于执行前述方法实施例中终端设备侧的技术方案。
本申请实施例还提供一种计算机程序产品,包括程序指令,程序指令用于实现前述方法实施例中网络设备侧的技术方案。
本申请实施例还提供一种计算机程序产品,包括程序指令,程序指令用于实现前述方法实施例中终端设备侧的技术方案。
本申请实施例还提供了一种芯片,包括:处理模块与通信接口,该处理模块能执行前述方法实施例中网络设备侧的技术方案。
进一步地,该芯片还包括存储模块(如,存储器),存储模块用于存储指令,处理模块用于执行存储模块存储的指令,并且对存储模块中存储的指令的执行使得处理模块执行网络设备侧的技术方案。
本申请实施例还提供了一种芯片,包括:处理模块与通信接口,该处理模块能执行前述方法实施例中终端设备的技术方案。
进一步地,该芯片还包括存储模块(如,存储器),存储模块用于存储指令,处理模块用于执行存储模块存储的指令,并且对存储模块中存储的指令的执行使得处理模块执行终端设备侧的技术方案。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
在上述网络设备以及终端设备的具体实现中,应理解,处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。
实现上述各方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成。前述的程序可以存储于一可读取存储器中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储器(存储介质)包括:只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、快闪存储器、硬盘、固态硬盘、磁带、软盘、光盘及其任意组合。

Claims (81)

  1. 一种通信控制方法,其特征在于,应用于电子设备,所述方法包括:
    在第一区域进行限制性数据通信,所述限制性数据通信包括在所述第一区域允许所述电子设备使用部分已在第二区域建立的会话进行数据传输;和/或在所述第一区域允许所述电子设备建立特定会话进行数据传输。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在所述第二区域正常进行数据通信。
  3. 根据权利要求2所述的方法,其特征在于,所述第二区域为授权区域,所述第一区域为非授权区域。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述部分已在所述第二区域建立的会话用于与特定服务器的通信,所述特定会话用于与所述特定服务器的通信。
  5. 根据权利要求3或4所述的方法,其特征在于,所述方法还包括:
    向网络设备发送第一信息,其中,所述第一信息包括以下至少一种信息:
    请求开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  6. 根据权利要求3至5中任一项所述的方法,其特征在于,所述方法还包括:
    接收所述网络设备发送的第二信息,其中,所述第二信息包括以下至少一种信息:
    是否为所述电子设备开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  7. 根据权利要求3或4所述的方法,其特征在于,所述方法还包括:
    在会话建立和/或修改过程中,向网络设备发送第三信息,其中,所述第三信息包括以下至少一种信息:
    请求所述会话在所述非授权区域允许或需要被释放或去激活;
    请求所述会话中的至少一个服务质量QoS数据流,在所述非授权区域允许或需要被释放或去激活;
    请求所述会话在所述非授权区域允许或需要保留;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要保留。
  8. 根据权利要求3、4或7中任一项所述的方法,其特征在于,所述方法还包括:
    接收所述网络设备发送的第四信息,其中,所述第四信息包括以下至少一种信息:
    所述会话在所述非授权区域允许或需要被释放或去激活;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
    所述会话在所述非授权区域允许或需要保留;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
  9. 根据权利要求8所述的方法,其特征在于,所述第四信息是根据所述会话对应的单-网络切片选择服务信息S-NSSAI和/或数据网络名称DNN确定的。
  10. 根据权利要求3或4所述的方法,其特征在于,所述方法还包括:
    在会话建立和/或修改过程中,向网络设备发送第五信息,其中,所述第五信息包括以下至少一种信息:
    请求所述会话在所述非授权区域被建立、修改或激活;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域被建立、修改或激活。
  11. 根据权利要求3、4、7或10中任一项所述的方法,其特征在于,所述方法还包括:
    接收所述网络设备发送的第六信息,其中,所述第六信息包括以下至少一种信息:
    在所述非授权区域允许或需要保留的会话或QoS数据流的信息;
    在所述非授权区域允许或需要被释放或去激活的会话或QoS数据流的信息;
    在所述非授权区域允许或需要被建立、修改或激活的会话或QoS数据流的信息。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    在所述授权区域时,根据所述第六信息的内容确定是否需要向所述网络设备发送所述第三信息或第五信息。
  13. 根据权利要求11所述的方法,其特征在于,所述第六信息包括在所述非授权区域允许或需要被建立、修改或激活的会话或QoS数据流的信息,所述方法还包括:
    在所述非授权区域时,根据所述第六信息的内容确定是否建立、修改或激活对应的会话。
  14. 根据权利要求11所述的方法,其特征在于,所述第六信息为在终端路径选择策略URSP的策略规则中添加的信息。
  15. 根据权利要求1至14中任一项所述的方法,其特征在于,所述会话为协议数据单元PDU会话,所述PDU会话由PDU会话的属性参数表示。
  16. 根据权利要求6或8所述的方法,其特征在于,所述接收所述网络设备发送的第二信息,包括:
    接收所述网络设备向无线接入网络RAN发送,并经所述RAN透传至所述电子设备的所述第二信息;
    或者,
    所述接收所述网络设备发送的第四信息,包括:
    接收所述网络设备向所述RAN发送,并经所述RAN透传至所述电子设备的所述第四信息。
  17. 根据权利要求1至16中任一项所述的方法,其特征在于,所述电子设备是终端设备。
  18. 根据权利要求1至13中任一项所述的方法,其特征在于,所述电子设备是基站。
  19. 根据权利要求3至5、7、10至14中任一项所述的方法,其特征在于,所述电子设备是第一基站,所述方法还包括:
    在终端设备接入到第二基站的情况下,所述第二基站从所述第一基站获得第二信息和/或第四信息;或者,所述第二基站从所述终端设备获得所述第二信息和/或第四信息,
    其中,所述第二信息包括以下至少一种信息:
    是否为所述终端设备开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息,
    所述第四信息包括以下至少一种信息:
    所述会话在所述非授权区域允许或需要被释放或去激活;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
    所述会话在所述非授权区域允许或需要保留;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
  20. 一种通信控制方法,其特征在于,应用于网络设备,所述方法包括:
    在第一区域进行限制性数据通信,所述限制性数据通信包括允许所述第一区域内的终端设备使用部分已在第二区域建立的会话进行数据传输;和/或允许所述终端设备建立特定会话进行数据传输。
  21. 根据权利要求20所述的方法,其特征在于,所述方法还包括:
    在所述第二区域正常进行数据通信。
  22. 根据权利要求21所述的方法,其特征在于,所述第二区域为授权区域,所述第一区域为非授权区域。
  23. 根据权利要求20至22中任一项所述的方法,其特征在于,所述部分已在所述第二区域建立的会话用于与特定服务器的通信,所述特定会话用于与所述特定服务器的通信。
  24. 根据权利要求22或23所述的方法,其特征在于,所述方法还包括:
    接收所述终端设备或另一网络设备发送的第一信息,其中,所述第一信息包括以下至少一种信息:
    请求开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  25. 根据权利要求22至24中任一项所述的方法,其特征在于,所述方法还包括:
    向所述终端设备发送第二信息,其中,所述第二信息包括以下至少一种信息:
    是否为所述终端设备开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  26. 根据权利要求22或23所述的方法,其特征在于,所述方法还包括:
    在会话建立和/或修改过程中,接收所述终端设备或另一网络设备发送的第三信息,其中,所述第三信息包括以下至少一种信息:
    请求所述会话在所述非授权区域允许或需要被释放或去激活;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要被释放或去激活;
    请求所述会话在所述非授权区域允许或需要保留;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要保留。
  27. 根据权利要求22、23或26中任一项所述的方法,其特征在于,所述方法还包括:
    向所述终端设备发送第四信息,其中,所述第四信息包括以下至少一种信息:
    所述会话在所述非授权区域允许或需要被释放或去激活;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
    所述会话在所述非授权区域允许或需要保留;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
  28. 根据权利要求27所述的方法,其特征在于,所述第四信息是根据所述会话对应的单-网络切片选择服务信息S-NSSAI和/或数据网络名称DNN确定的。
  29. 根据权利要求22或23所述的方法,其特征在于,所述方法还包括:
    在会话建立和/或修改过程中,接收所述终端设备或另一网络设备发送的第五信息,其中,所述第五信息包括以下至少一种信息:
    请求所述会话在所述非授权区域允许或需要被建立、修改或激活;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要被建立、修改或激活。
  30. 根据权利要求22、23、26或29中任一项所述的方法,其特征在于,所述方法还包括:
    向所述终端设备发送第六信息,其中,所述第六信息包括以下至少一种信息:
    在所述非授权区域允许或需要保留的会话或QoS数据流的信息;
    在所述非授权区域允许或需要被释放或去激活的会话或QoS数据流的信息;
    在所述非授权区域的情况下允许或需要被建立、修改或激活的会话或QoS数据流的信息。
  31. 根据权利要求30所述的方法,其特征在于,所述方法还包括:
    在所述授权区域时,根据所述第六信息的内容确定是否需要向所述网络设备发送所述第三信息或第五信息。
  32. 根据权利要求30所述的方法,其特征在于,所述第六信息包括在所述终端设备在所述非授权区域的情况下,被建立、修改或激活的会话或QoS数据流的信息,所述方法还包括:
    在所述非授权区域时,根据所述第六信息的内容确定是否建立、修改或激活对应的会话。
  33. 根据权利要求30所述的方法,其特征在于,所述第六信息为在终端路径选择策略URSP的策略规则中添加的信息。
  34. 根据权利要求20至33中任一项所述的方法,其特征在于,所述会话为协议数据单元PDU会话,所述PDU会话由PDU会话的属性参数表示。
  35. 根据权利要求25或27所述的方法,其特征在于,所述向所述终端设备发送第二信息,包括:
    向无线接入网络RAN发送所述第二信息,并经所述RAN将所述第二信息透传至所述终端设备;或者,
    所述向所述终端设备发送第四信息,包括:
    向所述RAN发送所述第四信息,并经所述RAN将所述第四信息透传至所述终端设备。
  36. 根据权利要求20至35中任一项所述的方法,其特征在于,所述网络设备为核心网网元。
  37. 根据权利要求36所述的方法,其特征在于,所述核心网网元为接入和移动性管理功能AMF或会话管理功能SMF。
  38. 根据权利要求22或23所述的方法,其特征在于,所述网络设备为基站,所述方法还包括:
    接收核心网发送的第二信息,其中,所述第二信息包括以下至少一种信息:
    是否为所述终端设备开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  39. 根据权利要求22或23所述的方法,其特征在于,所述网络设备为基站,所述方法还包括:
    接收核心网发送的第四信息,其中,所述第四信息包括以下至少一种信息:
    所述会话在所述非授权区域允许或需要被释放或去激活;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
    所述会话在所述非授权区域允许或需要保留;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
  40. 一种通信控制装置,其特征在于,应用于电子设备,所述装置包括:
    限制性通信模块,用于在第一区域进行限制性数据通信,所述限制性数据通信包括在所述第一区域允许所述电子设备使用部分已在第二区域建立的会话进行数据传输;和/或在所述第一区域允许所述 电子设备建立特定会话进行数据传输。
  41. 根据权利要求40所述的装置,其特征在于,所述装置还包括:
    正常通信模块,用于在所述第二区域正常进行数据通信。
  42. 根据权利要求41所述的装置,其特征在于,所述第二区域为授权区域,所述第一区域为非授权区域。
  43. 根据权利要求40至42中任一项所述的装置,其特征在于,所述部分已在所述第二区域建立的会话用于与特定服务器的通信,所述特定会话用于与所述特定服务器的通信。
  44. 根据权利要求42或43所述的装置,其特征在于,所述装置还包括:
    第一发送模块,用于向网络设备发送第一信息,其中,所述第一信息包括以下至少一种信息:
    请求开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  45. 根据权利要求42至44中任一项所述的装置,其特征在于,所述装置还包括:
    第一接收模块,用于接收所述网络设备发送的第二信息,其中,所述第二信息包括以下至少一种信息:
    是否为所述电子设备开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  46. 根据权利要求42或43所述的装置,其特征在于,所述装置还包括:
    第二发送模块,用于在会话建立和/或修改过程中,向网络设备发送第三信息,其中,所述第三信息包括以下至少一种信息:
    请求所述会话在所述非授权区域允许或需要被释放或去激活;
    请求所述会话中的至少一个服务质量QoS数据流,在所述非授权区域允许或需要被释放或去激活;
    请求所述会话在所述非授权区域允许或需要保留;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要保留。
  47. 根据权利要求42、43或46中任一项所述的装置,其特征在于,所述装置还包括:
    第二接收模块,用于接收所述网络设备发送的第四信息,其中,所述第四信息包括以下至少一种信息:
    所述会话在所述非授权区域允许或需要被释放或去激活;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
    所述会话在所述非授权区域允许或需要保留;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
  48. 根据权利要求47所述的装置,其特征在于,所述第四信息是根据所述会话对应的单-网络切片选择服务信息S-NSSAI和/或数据网络名称DNN确定的。
  49. 根据权利要求42或43所述的装置,其特征在于,所述装置还包括:
    第三发送模块,用于在会话建立和/或修改过程中,向网络设备发送第五信息,其中,所述第五信息包括以下至少一种信息:
    请求所述会话在所述非授权区域被建立、修改或激活;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域被建立、修改或激活。
  50. 根据权利要求42、43、46或49中任一项所述的装置,其特征在于,所述装置还包括:
    第三接收模块,用于接收所述网络设备发送的第六信息,其中,所述第六信息包括以下至少一种信息:
    在所述非授权区域允许或需要保留的会话或QoS数据流的信息;
    在所述非授权区域允许或需要被释放或去激活的会话或QoS数据流的信息;
    在所述非授权区域允许或需要被建立、修改或激活的会话或QoS数据流的信息。
  51. 根据权利要求50所述的装置,其特征在于,所述装置还包括:
    发送确定模块,用于在所述授权区域时,根据所述第六信息的内容确定是否需要向所述网络设备发送所述第三信息或第五信息。
  52. 根据权利要求50所述的装置,其特征在于,所述第六信息包括在所述非授权区域允许或需要被建立、修改或激活的会话或QoS数据流的信息,所述装置还包括:
    会话确定模块,用于在所述非授权区域时,根据所述第六信息的内容确定是否建立、修改或激活对应的会话。
  53. 根据权利要求50所述的装置,其特征在于,所述第六信息为在终端路径选择策略URSP的策 略规则中添加的信息。
  54. 根据权利要求40至53中任一项所述的装置,其特征在于,所述会话为协议数据单元PDU会话,所述PDU会话由PDU会话的属性参数表示。
  55. 根据权利要求45或47所述的装置,其特征在于,所述第一接收模块具体还用于:
    接收所述网络设备向无线接入网络RAN发送,并经所述RAN透传至所述电子设备的所述第二信息;
    或者,
    所述第二接收模块具体还用于:
    接收所述网络设备向所述RAN发送,并经所述RAN透传至所述电子设备的所述第四信息。
  56. 根据权利要求40至55中任一项所述的装置,其特征在于,所述电子设备是终端设备。
  57. 根据权利要求40至52中任一项所述的装置,其特征在于,所述电子设备是基站。
  58. 根据权利要求42至44、46、49至53中任一项所述的装置,其特征在于,所述电子设备是第一基站,所述装置还包括:
    切换控制模块,用于在终端设备接入到第二基站的情况下,所述第二基站从所述第一基站获得第二信息和/或第四信息;或者,所述第二基站从所述终端设备获得所述第二信息和/或第四信息,
    其中,所述第二信息包括以下至少一种信息:
    是否为所述终端设备开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息,
    所述第四信息包括以下至少一种信息:
    所述会话在所述非授权区域允许或需要被释放或去激活;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
    所述会话在所述非授权区域允许或需要保留;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
  59. 一种通信控制装置,其特征在于,应用于网络设备,所述装置包括:
    限制性通信模块,用于在第一区域进行限制性数据通信,所述限制性数据通信包括允许所述第一区域内的终端设备使用部分已在第二区域建立的会话进行数据传输;和/或允许所述终端设备建立特定会话进行数据传输。
  60. 根据权利要求59所述的装置,其特征在于,所述装置还包括:
    正常通信模块,用于在所述第二区域正常进行数据通信。
  61. 根据权利要求60所述的装置,其特征在于,所述第二区域为授权区域,所述第一区域为非授权区域。
  62. 根据权利要求59至61中任一项所述的装置,其特征在于,所述部分已在所述第二区域建立的会话用于与特定服务器的通信,所述特定会话用于与所述特定服务器的通信。
  63. 根据权利要求61或62所述的装置,其特征在于,所述装置还包括:
    第一接收模块,用于接收所述终端设备或另一网络设备发送的第一信息,其中,所述第一信息包括以下至少一种信息:
    请求开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  64. 根据权利要求61至63中任一项所述的装置,其特征在于,所述装置还包括:
    第一发送模块,用于向所述终端设备发送第二信息,其中,所述第二信息包括以下至少一种信息:
    是否为所述终端设备开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  65. 根据权利要求61或62所述的装置,其特征在于,所述装置还包括:
    第二接收模块,用于在会话建立和/或修改过程中,接收所述终端设备或另一网络设备发送的第三信息,其中,所述第三信息包括以下至少一种信息:
    请求所述会话在所述非授权区域允许或需要被释放或去激活;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要被释放或去激活;
    请求所述会话在所述非授权区域允许或需要保留;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要保留。
  66. 根据权利要求61、62或65中任一项所述的装置,其特征在于,所述装置还包括:
    第二发送模块,用于向所述终端设备发送第四信息,其中,所述第四信息包括以下至少一种信息:
    所述会话在所述非授权区域允许或需要被释放或去激活;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
    所述会话在所述非授权区域允许或需要保留;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留。
  67. 根据权利要求66所述的装置,其特征在于,所述第四信息是根据所述会话对应的单-网络切片选择服务信息S-NSSAI和/或数据网络名称DNN确定的。
  68. 根据权利要求61或62所述的装置,其特征在于,所述装置还包括:
    第三接收模块,用于在会话建立和/或修改过程中,接收所述终端设备或另一网络设备发送的第五信息,其中,所述第五信息包括以下至少一种信息:
    请求所述会话在所述非授权区域允许或需要被建立、修改或激活;
    请求所述会话中的至少一个QoS数据流,在所述非授权区域允许或需要被建立、修改或激活。
  69. 根据权利要求61、62、65或67中任一项所述的装置,其特征在于,所述装置还包括:
    第三发送模块,用于向所述终端设备发送第六信息,其中,所述第六信息包括以下至少一种信息:
    在所述非授权区域允许或需要保留的会话或QoS数据流的信息;
    在所述非授权区域允许或需要被释放或去激活的会话或QoS数据流的信息;
    在所述非授权区域的情况下允许或需要被建立、修改或激活的会话或QoS数据流的信息。
  70. 根据权利要求69所述的装置,其特征在于,所述装置还包括:
    发送确定模块,用于在所述授权区域时,根据所述第六信息的内容确定是否需要向所述网络设备发送所述第三信息或第五信息。
  71. 根据权利要求69所述的装置,其特征在于,所述第六信息包括在所述终端设备在所述非授权区域的情况下,被建立、修改或激活的会话或QoS数据流的信息,所述装置还包括:
    会话确定模块,用于在所述非授权区域时,根据所述第六信息的内容确定是否建立、修改或激活对应的会话。
  72. 根据权利要求69所述的装置,其特征在于,所述第六信息为在终端路径选择策略URSP的策略规则中添加的信息。
  73. 根据权利要求59至72中任一项所述的装置,其特征在于,所述会话为协议数据单元PDU会话,所述PDU会话由PDU会话的属性参数表示。
  74. 根据权利要求64或66所述的装置,其特征在于,所述第一发送模块具体还用于:
    向无线接入网络RAN发送所述第二信息,并经所述RAN将所述第二信息透传至所述终端设备;或者,
    所述第二发送模块具体还用于:
    向所述RAN发送所述第四信息,并经所述RAN将所述第四信息透传至所述终端设备。
  75. 根据权利要求59至74中任一项所述的装置,其特征在于,所述网络设备为核心网网元。
  76. 根据权利要求75所述的装置,其特征在于,所述核心网网元为AMF或SMF。
  77. 根据权利要求61或62所述的装置,其特征在于,所述网络设备为基站,所述装置还包括:
    第四接收模块,用于接收核心网发送的第二信息,其中,所述第二信息包括以下至少一种信息:
    是否为所述终端设备开通所述限制性数据通信;
    所述授权区域和/或所述非授权区域的信息。
  78. 根据权利要求61或62所述的装置,其特征在于,所述网络设备为基站,所述装置还包括:
    第五接收模块,用于接收核心网发送的第四信息,其中,所述第四信息包括以下至少一种信息:
    所述会话在所述非授权区域允许或需要被释放或去激活;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要被释放或去激活;
    所述会话在所述非授权区域允许或需要保留;
    所述会话中的至少一个QoS数据流在所述非授权区域允许或需要保留的信息。
  79. 一种电子设备,其特征在于,包括:
    处理器、存储器、发送器以及与网络设备或终端设备进行通信的接口;
    所述存储器存储计算机执行指令;
    所述处理器执行所述存储器存储的计算机执行指令,使得所述处理器执行如权利要求1至19中任一项所述的通信控制方法。
  80. 一种网络设备,其特征在于,包括:
    处理器、存储器、接收器以及与终端设备进行通信的接口;
    所述存储器存储计算机执行指令;
    所述处理器执行所述存储器存储的计算机执行指令,使得所述处理器执行如权利要求20至39中任一项所述的通信控制方法。
  81. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机执行指令,当所述计算机执行指令被处理器执行时用于实现如权利要求1至19或20至39中任一项所述的通信控制方法。
PCT/CN2020/083379 2020-04-03 2020-04-03 通信控制方法、装置、设备及存储介质 WO2021196241A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080095376.9A CN115039390B (zh) 2020-04-03 2020-04-03 通信控制方法、装置、设备及存储介质
PCT/CN2020/083379 WO2021196241A1 (zh) 2020-04-03 2020-04-03 通信控制方法、装置、设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/083379 WO2021196241A1 (zh) 2020-04-03 2020-04-03 通信控制方法、装置、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2021196241A1 true WO2021196241A1 (zh) 2021-10-07

Family

ID=77928912

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/083379 WO2021196241A1 (zh) 2020-04-03 2020-04-03 通信控制方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN115039390B (zh)
WO (1) WO2021196241A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023142759A1 (zh) * 2022-01-29 2023-08-03 华为技术有限公司 一种授权方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205751276U (zh) * 2016-05-16 2016-11-30 北华大学 一种移动式无人机飞行区域限制系统
US20170148328A1 (en) * 2015-11-25 2017-05-25 International Business Machines Corporation Dynamic geo-fence for drone
CN107210000A (zh) * 2015-01-29 2017-09-26 高通股份有限公司 用于限制无人机空域访问的系统和方法
CN108351645A (zh) * 2015-11-17 2018-07-31 深圳市大疆创新科技有限公司 用于管理飞行限制区域的系统和方法
WO2019027732A1 (en) * 2017-08-02 2019-02-07 X Development Llc SYSTEMS AND METHODS FOR NAVIGATION TRACK DETERMINATION FOR VEHICLES WITHOUT PILOT

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109983792A (zh) * 2017-02-06 2019-07-05 华为技术有限公司 一种数据处理方法、装置及系统
WO2018161796A1 (zh) * 2017-03-08 2018-09-13 华为技术有限公司 多接入场景中的连接处理方法和装置
CN110366216B (zh) * 2018-04-10 2021-07-20 华为技术有限公司 通信的方法和通信装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107210000A (zh) * 2015-01-29 2017-09-26 高通股份有限公司 用于限制无人机空域访问的系统和方法
CN108351645A (zh) * 2015-11-17 2018-07-31 深圳市大疆创新科技有限公司 用于管理飞行限制区域的系统和方法
US20170148328A1 (en) * 2015-11-25 2017-05-25 International Business Machines Corporation Dynamic geo-fence for drone
CN205751276U (zh) * 2016-05-16 2016-11-30 北华大学 一种移动式无人机飞行区域限制系统
WO2019027732A1 (en) * 2017-08-02 2019-02-07 X Development Llc SYSTEMS AND METHODS FOR NAVIGATION TRACK DETERMINATION FOR VEHICLES WITHOUT PILOT

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023142759A1 (zh) * 2022-01-29 2023-08-03 华为技术有限公司 一种授权方法及装置

Also Published As

Publication number Publication date
CN115039390B (zh) 2023-09-12
CN115039390A (zh) 2022-09-09

Similar Documents

Publication Publication Date Title
JP7041212B2 (ja) 仮想化されたモバイルコアネットワークへの接続
US11419046B2 (en) Methods and systems for performing multi-domain network slice selection and approval
US20210385625A1 (en) Wireless device location determination
US11659481B2 (en) Methods and systems for UE to request appropriate NSSAI in 5G
WO2019192417A1 (zh) 指示业务分流的方法和装置
US20210400489A1 (en) 3gpp private lans
US11653178B2 (en) Positioning service level
WO2020224622A1 (zh) 一种信息配置方法及装置
US20210258842A1 (en) METHODS AND SYSTEMS FOR ONLINE SERVICES APPS, BROWSERS, OR EXTERNAL DEVICES TO REQUEST UE HANDOVER VIA MODEM APIs
WO2021087910A1 (zh) 用于连接网络的方法和设备
WO2021047454A1 (zh) 位置信息获取、位置服务配置方法和通信设备
WO2021063164A1 (zh) 通信方法、通信装置及存储介质
JP2023545686A (ja) 航空システムのセッション管理
WO2023030369A1 (zh) 通信感知业务中选择网元的方法、通信装置和通信系统
US20240073848A1 (en) Network Slice in a Wireless Network
WO2020217224A1 (en) Amf and scp behavior in delegated discovery of pcf
WO2021022460A1 (zh) 一种会话验证方法、电子设备及存储介质
CN116390203A (zh) 选择网络的方法和装置
WO2021196241A1 (zh) 通信控制方法、装置、设备及存储介质
JP2021529485A (ja) 接続モードのユーザ機器のアクセス制御
US20230074413A1 (en) Communication related to network slice
JP7501962B2 (ja) サイドリンクリソース制御のための方法および装置
WO2023160394A1 (zh) 通信的方法和装置
WO2023151420A1 (zh) 通信方法和通信装置
WO2023179397A1 (zh) 一种授权方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20928786

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20928786

Country of ref document: EP

Kind code of ref document: A1