WO2021232919A1 - 一种网络的接入方法、装置及系统 - Google Patents

一种网络的接入方法、装置及系统 Download PDF

Info

Publication number
WO2021232919A1
WO2021232919A1 PCT/CN2021/081549 CN2021081549W WO2021232919A1 WO 2021232919 A1 WO2021232919 A1 WO 2021232919A1 CN 2021081549 W CN2021081549 W CN 2021081549W WO 2021232919 A1 WO2021232919 A1 WO 2021232919A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
public network
network
message
access
Prior art date
Application number
PCT/CN2021/081549
Other languages
English (en)
French (fr)
Inventor
朱强华
朱奋勤
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to KR1020227044296A priority Critical patent/KR20230012590A/ko
Priority to EP21808276.6A priority patent/EP4149166A4/en
Priority to JP2022571140A priority patent/JP2023525925A/ja
Publication of WO2021232919A1 publication Critical patent/WO2021232919A1/zh
Priority to US17/992,494 priority patent/US20230080067A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/186Processing of subscriber group data

Definitions

  • This application relates to the field of communication technology, and in particular to a network access method, device and system.
  • a terminal with the ability or authority to access a non-public network can use the non-public network to access the public network for data transmission.
  • private network terminals access non-public networks in different ways.
  • the private network terminal can use the contract information between the private network terminal and the non-public network to request registration in the non-public network, and the private network terminal can use the contract between the private network terminal and the public network.
  • the information request is registered in the public network.
  • the private network terminal can use the contract information between the private network terminal and the public network to request registration in the non-public network.
  • non-private network terminal attempts to access the non-public network defined in the R16 phase of 3GPP or the R17 phase of 3GPP. solution.
  • the embodiments of the present application provide a network access method, device, and system to solve the problem that the first terminal attempts to access a non-public network.
  • an embodiment of the present application provides a network access method, including: a first terminal sends to an access management network element in a first non-public network for requesting to register the first network element in the first non-public network.
  • the first message of the terminal receives a second message from the access management network element that is used to indicate that the first terminal is denied registration on the first non-public network.
  • the second message includes first indication information, and the first indication information indicates that the first terminal is prohibited from accessing in the first non-public network.
  • the first terminal updates the network ban list of the first terminal according to the first indication information. Wherein, the updated network banned list includes the information of the first non-public network.
  • the first terminal updates the network ban list of the first terminal to obtain the updated network ban list.
  • the embodiment of the present application provides a network access method.
  • the first terminal sends a first message to the access management network element in the first non-public network to request to register the second network in the first non-public network.
  • One terminal receives a second message from the access management network element.
  • the second message indicates that the first terminal is refused to register in the first non-public network, and the first indication information indicates that the first terminal is prohibited from being registered in the first non-public network.
  • Access in the network This is so that the first terminal updates the network ban list of the first terminal according to the first instruction information, so that the updated network ban list includes the information of the first non-public network, which can be avoided when the first terminal selects the network to register later. Select the first non-public network that is forbidden to access.
  • This solution can solve the problem that the first terminal that does not have the right to access the non-public network tries to access the first non-public network.
  • the first non-public network in the embodiment of the present application supports intercommunication with the first public network.
  • the first non-public network and the first public network in the embodiment of the present application communicate with each other through a roaming architecture.
  • the method provided in the embodiment of the present application further includes: the first terminal selects a network other than the first non-public network for registration according to the updated network ban list.
  • the first terminal that does not have the right to access the non-public network is prevented from accessing the first non-public network, and the first terminal is prevented from automatically/manually selecting the first non-public network that is forbidden to access.
  • the method provided in the embodiment of the present application further includes: the first terminal starts a timer according to the first indication information, and when the timer expires, the first terminal selects from the updated network ban list Delete the information of the first non-public network. So that the first terminal will continue to try to access the first non-public network.
  • the method provided in the embodiment of the present application further includes: the second message includes a timer time value, and the first terminal sets the timer according to the timer time value. So that the first terminal obtains the timer time value from the first non-public network.
  • the first terminal is a terminal that does not have the ability or authority to access a non-public network.
  • an embodiment of the present application provides a network access method, including: an access management network element in a first non-public network receives a request from a first terminal to register a first terminal in the first non-public network. The first message of the terminal. The access management network element obtains the third message from the unified data management network element in the first public network. The access management network element sends to the first terminal a second message indicating that the first terminal is denied registration on the first non-public network according to the third message. The second message includes indicating that the first terminal is prohibited from being on the first non-public network. The first indication information accessed in.
  • the access management network element in the first non-public network receives a first message from the first terminal for requesting to register the first terminal in the first non-public network, and then the access management network element according to the third The message sends to the first terminal a second message indicating that the first terminal is rejected to register on the first non-public network, which can prevent the first terminal that does not have the right to access the non-public network from accessing the first non-public network.
  • the third message includes the subscription data of the first terminal, and the subscription data includes the second indication information.
  • the second indication information is used to indicate that the first terminal can only pass through the public network. Access, or, on the other hand, the second indication information is used to indicate that the first terminal cannot access through a non-public network.
  • the second indication information includes a network list supported by the first terminal, where the network list does not include information about the first non-public network. Or, the list of networks supported by the first terminal does not include any non-public network information.
  • the third message includes third indication information, and the third indication information is used to indicate that the subscription data of the first terminal is not successfully obtained.
  • the third message also includes a reason value for unsuccessfully acquiring the subscription data of the first terminal, and the reason value indicates that the first terminal is not allowed to access in the first non-public network.
  • the third message does not include the subscription data of the first terminal.
  • the method provided in the embodiment of the present application further includes: the access management network element determines, according to the third message, to reject the registration of the first terminal in the first non-public network.
  • the access management network element determines to reject the registration of the first terminal in the first non-public network according to the third message, including: the access management network element determines to reject the first terminal according to the second indication information. Registration of the terminal in the first non-public network.
  • the access management network element determines to reject the registration of the first terminal in the first non-public network according to the third message, including: the access management network element determines to reject the first terminal according to the third indication information Registration of a terminal in the first non-public network.
  • the access management network element determines to reject the registration of the first terminal in the first non-public network according to the third message, including: the access management network element determines that the third message does not include the first terminal Is determined to reject the registration of the first terminal in the first non-public network.
  • an embodiment of the present application provides a network access method, including: a unified data management network element in a first public network receives information from an access management network element in a first non-public network for querying the first A query message for the terminal's subscription data.
  • the unified data management network element sends a third message to the access management network element.
  • the third message includes one or more of the following: the subscription data of the first terminal and the cause value.
  • the subscription data includes the second indication information.
  • the second indication information is used to indicate that the first terminal can only access through the public network, or the second indication information is used to indicate that the first terminal cannot access through the first non-public network, and the reason value indicates that the first terminal is not allowed to access Access in the first non-public network.
  • the second indication information includes a list of networks supported by the first terminal, where the network list does not include information about the first non-public network.
  • the third message includes third indication information, and the third indication information is used to indicate that the subscription data of the first terminal is not successfully obtained.
  • the third message also includes a reason value for unsuccessfully acquiring the subscription data of the first terminal, and the reason value indicates that the first terminal is not allowed to access in the first non-public network.
  • the third message does not include the subscription data of the first terminal.
  • an embodiment of the present application provides a network access method, including: a second terminal receives broadcast information from an access network device in a first non-public network, and the broadcast information includes information for indicating the first non-public network.
  • the first indication information that the network communicates with the public network.
  • the second terminal determines to use the first subscription information to access the first non-public network.
  • the first contract information is the contract information of the second terminal on the first public network.
  • the first identifier of the second terminal carried in the first subscription information is related to the first public network.
  • the first identification of the second terminal carries the information of the first public network.
  • the information of the first public network may be the first PLMNID.
  • the embodiment of the present application provides a network access method, in which the second terminal receives broadcast information from the access network device in the first non-public network, so that the second terminal can determine the first non-public network Intercommunication with public networks. So that the terminal with the ability or authority to access the non-public network can subsequently use the subscription information with the public network to access the first non-public network. In addition, because the terminal that does not have the ability or authority to access the non-public network cannot receive the By broadcasting information, it is possible to prevent a terminal that does not have the ability or authority to access a non-public network from attempting to access the first non-public network from wasting network resources.
  • the method provided in the embodiment of the present application may further include: the second terminal uses the first subscription information to access the first non-public network.
  • the second terminal using the first subscription information to access the first non-public network includes: the second terminal sends a registration request message to an access management network element in the first non-public network, and The registration request message carries the first identifier of the second terminal.
  • the second terminal is a terminal that has the ability or authority to access a non-public network.
  • the broadcast information is also used to indicate that the first non-public network and the public network adopt a roaming architecture to communicate with each other.
  • the broadcast information is sent for terminals that have the ability or authority to access non-public networks.
  • the broadcast information further includes information about one or more public networks that communicate with the first non-public network, and the information about the public network may be an identifier of the public network.
  • the identification of the public network may be the PLMN ID, and the first public network belongs to one or more public networks. This is so that the second terminal can determine one or more public networks that communicate with the first non-public network.
  • the network selection priority of the first public network is the highest among the network selection priorities of one or more public networks.
  • an embodiment of the present application provides a network access method, including: an access network device in a first non-public network sends broadcast information, the broadcast information includes first indication information, and the first indication information is used for Instruct the first non-public network to communicate with the public network.
  • the broadcast information further includes information about one or more public networks that communicate with the first non-public network.
  • an embodiment of the present application provides a network access method, including: a second terminal uses first subscription information to send a first message to an access management network element in a first non-public network, and the first message is used Yu represents a request to register the second terminal in the first non-public network, where the first subscription information is the subscription information of the second terminal in the first non-public network, or the first subscription information is the second terminal’s subscription information in the first non-public network. Contract information in the public network.
  • the second terminal receives a second message from the access management network element that is used to indicate that the second terminal is denied registration in the first non-public network.
  • the second message includes fourth indication information, and the fourth indication information is used to indicate a reason for rejecting registration of the second terminal in the first non-public network.
  • the first subscription information is the subscription information of the second terminal in the first non-public network.
  • the second identity of the second terminal carried in the first subscription information is related to the first non-public network.
  • the second identity of the second terminal includes the identity of the first non-public network.
  • the identity of the first non-public network is determined by the identity of the target public network and a network identifier (NID).
  • the value of the target public network may be a reserved value provided by a third-party operator for the target public network.
  • the first subscription information is the subscription information of the second terminal in the first public network.
  • the third identity of the second terminal carried in the first subscription information is related to the first public network.
  • the third identity of the second terminal includes information of the first public network.
  • the information of the first non-public network is the identification of the first non-public network, for example, the identification of the first non-public network is the first PLMN ID.
  • the first subscription information is the subscription information of the second terminal in the first non-public network.
  • the method provided in this embodiment of the application further includes: the second terminal uses the second terminal according to the fourth instruction information.
  • the second contract information of the terminal is registered in the first non-public network, and the second contract information is the contract information of the second terminal in the first public network.
  • the method provided in the embodiment of the present application further includes: the second terminal receives a fourth message from the access management network element, the fourth message includes a network candidate list of the second terminal, and the network candidate The list includes the information of the first non-public network. So that the second terminal can determine that the second terminal can register in the first non-public network.
  • the method provided in the embodiment of the present application further includes: the second terminal receives a fifth message from the access management network element, where the fifth message is used to indicate that the second terminal is accepted to be on the first non-public network. Register in.
  • the second terminal adds the information of the first non-public network to the network candidate list of the second terminal. So that the second terminal determines that the second terminal can register in the first non-public network, and then selects the second subscription information of the second terminal to register in the first non-public network.
  • the fourth indication information is used to indicate that the second terminal is an illegal terminal.
  • the first subscription information is the subscription information of the second terminal in the first public network
  • the second terminal also has the third subscription information of the second terminal in the first non-public network.
  • the method provided in the embodiment of the present application further includes: the second terminal uses the third subscription information to request registration in the first non-public network.
  • the fourth identifier includes information about the first non-public network. For example, taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification and NID of the target public network.
  • the second terminal uses the third subscription information to request registration in the first non-public network, including: the second terminal sends a registration request message to the access management network element in the first non-public network ,
  • the registration request message includes the fourth identifier of the second terminal.
  • an embodiment of the present application provides a network access method, including: an access management network element in a first non-public network receives a second terminal from a second terminal that indicates that the second terminal requests to use the first subscription information in The first message registered in the first non-public network, where the first subscription information is the subscription information of the second terminal in the first non-public network, or the first subscription information is the subscription information of the second terminal in the first public network Signing information.
  • the access management network element sends a second message to the second terminal, the second message is used to refuse the second terminal to register in the first non-public network, and the second message includes fourth indication information, which is used to indicate The reason for rejecting the second terminal from registering in the first non-public network.
  • the method provided in the embodiment of the present application further includes: the access management network element sends a fourth message to the second terminal, where the fourth message includes a network candidate list of the second terminal.
  • the network candidate list includes the information of the first non-public network. Taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification and NID of the target public network.
  • the method provided in the embodiment of the present application further includes: the access management network element sends a fifth message to the second terminal, and the fifth message is used to indicate that the second terminal is accepted in the first non-public network. Register in. This is so that the second terminal determines according to the fifth message that the second terminal can be registered in the first non-public network.
  • the fourth indication information is used to indicate that the second terminal is an illegal terminal.
  • the method provided in the embodiment of the present application further includes: the access management network element determines to reject the second terminal from registering in the first non-public network.
  • the access management network element determining to reject the second terminal from registering in the first non-public network includes: the access management network element determines whether the second terminal is in the first non-public network according to configuration information or The subscription information determines that the second terminal is rejected to register in the first non-public network.
  • an embodiment of the present application provides a communication device that can implement the first aspect or any possible implementation method of the first aspect, and therefore can also implement any possible implementation of the first aspect or the first aspect.
  • the beneficial effect in the realization method may be a first terminal, or a device that supports the first terminal to implement the first aspect or any possible implementation of the first aspect, for example, a chip applied to the first terminal.
  • the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a communication unit and a processing unit.
  • the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
  • the communication unit is configured to send a first message for requesting registration of the first terminal in the first non-public network to an access management network element in the first non-public network.
  • the communication unit is further configured to receive a second message from the access management network element that is used to indicate that the first terminal is denied registration on the first non-public network.
  • the second message includes first indication information, and the first indication information indicates that the first terminal is prohibited from accessing in the first non-public network.
  • the processing unit is configured to update the network ban list of the first terminal according to the first instruction information, wherein the updated network ban list includes the information of the first non-public network.
  • the first non-public network in the embodiment of the present application supports intercommunication with the first public network.
  • the first non-public network and the first public network in the embodiment of the present application communicate with each other through a roaming architecture.
  • the processing unit is further configured to select a network other than the first non-public network for registration according to the updated network ban list.
  • the processing unit is further configured to start a timer according to the first indication information, and when the timer expires, delete the information of the first non-public network from the updated network ban list.
  • the second message includes a timer time value
  • the first terminal sets the timer according to the timer time value.
  • the first terminal is a terminal that does not have the ability or authority to access a non-public network.
  • the processing unit may be a processor, and the communication unit may be a communication interface.
  • the communication interface can be an input/output interface, a pin, or a circuit.
  • the processing unit executes the instructions stored in the storage unit, so that the first terminal implements the network access method described in the first aspect or any one of the possible implementation manners of the first aspect.
  • the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit in the first terminal located outside the chip (for example, a read-only memory, a random access memory, etc.).
  • an embodiment of the present application provides a communication device that can implement the second aspect or any possible implementation method of the second aspect, and therefore can also implement any possible implementation of the second aspect or the second aspect.
  • the beneficial effect in the realization method may be an access management network element, or a device that supports the access management network element to implement the method in the second aspect or any possible implementation manner of the second aspect, for example, a device used in the access management network element chip.
  • the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
  • an embodiment of the present application provides a communication device.
  • the communication device is an access management network element in a first non-public network, or is a chip applied to an access management network element, and the device includes: a communication unit And a processing unit, where the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
  • the communication unit is configured to receive a first message from the first terminal for requesting registration of the first terminal in the first non-public network.
  • the communication unit is used to obtain the third message from the unified data management network element in the public network.
  • the communication unit is configured to send to the first terminal a second message indicating that the first terminal is denied registration on the first non-public network according to the third message, the second message includes first indication information, and the first indication information indicates prohibition The first terminal accesses in the first non-public network.
  • the third message includes the subscription data of the first terminal, and the subscription data includes the second indication information.
  • the second indication information is used to indicate that the first terminal can only pass through the public network. Access, or, on the other hand, the second indication information is used to indicate that the first terminal cannot access through a non-public network.
  • the second indication information includes a network list supported by the first terminal, where the network list does not include information about the first non-public network.
  • the third message includes third indication information, and the third indication information is used to indicate that the subscription data of the first terminal is not successfully obtained.
  • the third message does not include the subscription data of the first terminal.
  • the third message also includes a reason value for unsuccessfully acquiring the subscription data of the first terminal, and the reason value indicates that the first terminal is not allowed to access in the first non-public network.
  • the processing unit is configured to determine, according to the third message, to reject the registration of the first terminal in the first non-public network.
  • the processing unit is configured to determine to reject the registration of the first terminal in the first non-public network according to the third message, and includes: a processing unit, configured to determine to reject the first terminal according to the second indication information Registration of the terminal in the first non-public network.
  • the processing unit is configured to determine to reject the registration of the first terminal in the first non-public network according to the third message, and includes: a processing unit, configured to determine to reject the first terminal according to the third instruction information The registration of a terminal in the first non-public network.
  • the processing unit may be a processor, and the communication unit may be a communication interface.
  • the communication interface can be an input/output interface, a pin, or a circuit.
  • the processing unit executes the instructions stored in the storage unit, so that the access management network element implements the network access method described in the second aspect or any one of the possible implementation manners of the second aspect.
  • the storage unit may be a storage unit (for example, register, cache, etc.) in the chip, or a storage unit (for example, read-only memory, random access memory, etc.) located outside the chip in the access management network element. ).
  • an embodiment of the present application provides a communication device that can implement the third aspect or any possible implementation method of the third aspect, and therefore can also implement any possible implementation of the third aspect or the third aspect.
  • the beneficial effect in the realization method may be a unified data management network element, or a device that supports the unified data management network element to implement the method in the third aspect or any possible implementation manner of the third aspect, for example, the device used in the unified data management network element chip.
  • the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a communication unit and a processing unit.
  • the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
  • the communication unit is configured to receive a query message for querying subscription data of the first terminal from an access management network element in the first non-public network.
  • the communication unit is further configured to send a third message to the access management network element, where the third message includes one or more of the following: the subscription data of the first terminal, the reason value, the subscription data includes the second indication information, and the second
  • the indication information is used to indicate that the first terminal can only access through the public network, or the second indication information is used to indicate that the first terminal cannot access through the non-public network, and the reason value indicates that the first terminal is not allowed to be on the first non-public network Medium access.
  • the second indication information includes a list of networks supported by the first terminal, where the network list does not include information about the first non-public network.
  • the third message includes third indication information, and the third indication information is used to indicate that the subscription data of the first terminal is not successfully obtained.
  • the third message also includes a reason value for unsuccessfully acquiring the subscription data of the first terminal, and the reason value indicates that the first terminal is not allowed to access in the first non-public network.
  • the third message does not include the subscription data of the first terminal.
  • the communication device is a unified data management network element applied in a public network, or a chip in a unified data management network element applied in a public network.
  • the processing unit may be a processor, and the communication unit may be a communication interface.
  • the communication interface can be an input/output interface, a pin, or a circuit.
  • the processing unit executes the instructions stored in the storage unit, so that the unified data management network element implements the network access method described in the third aspect or any one of the possible implementation manners of the third aspect.
  • the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit located outside the chip in the unified data management network element (for example, a read-only memory, a random access memory, etc.) ).
  • an embodiment of the present application provides a communication device that can implement the fourth aspect or any possible implementation method of the fourth aspect, and therefore can also implement any possible implementation of the fourth aspect or the fourth aspect.
  • the beneficial effects in the realization of the method may be a second terminal, or a device that supports the second terminal to implement the fourth aspect or the method in any possible implementation manner of the fourth aspect, for example, a chip applied to the second terminal.
  • the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a communication unit and a processing unit.
  • the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
  • the communication unit is configured to receive broadcast information from an access network device in the first non-public network, where the broadcast information includes first indication information for indicating that the first non-public network communicates with the public network.
  • the processing unit is configured to determine to use the first subscription information to access the first non-public network according to the broadcast information.
  • the first contract information is the contract information of the second terminal on the first public network.
  • the second terminal is a terminal that has the ability or authority to access a non-public network.
  • the broadcast information is also used to indicate that the first non-public network and the public network adopt a roaming architecture to communicate with each other.
  • the broadcast information further includes information about one or more public networks that communicate with the first non-public network, and the first public network belongs to one or more public networks. This is so that the second terminal can determine one or more public networks that communicate with the first non-public network.
  • the network selection priority of the first public network is the highest among the network selection priorities of one or more public networks.
  • the first identifier of the second terminal carried in the first subscription information is related to the first public network.
  • the first identifier of the second terminal carries information of the first public network.
  • the identification of the first public network may be the first PLMN ID.
  • the processing unit is further configured to use the first subscription information to access the first non-public network.
  • the processing unit is further configured to use the first subscription information to access the first non-public network, including: a processing unit, further configured to access the first non-public network through the communication unit
  • the management network element sends a registration request message, and the registration request message carries the first identifier of the second terminal.
  • the processing unit may be a processor, and the communication unit may be a communication interface.
  • the communication interface can be an input/output interface, a pin, or a circuit.
  • the processing unit executes the instructions stored in the storage unit, so that the second terminal implements the network access method described in the fourth aspect or any one of the possible implementation manners of the fourth aspect.
  • the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit in the second terminal located outside the chip (for example, a read-only memory, a random access memory, etc.).
  • an embodiment of the present application provides a communication device that can implement the fifth aspect or any possible implementation method of the fifth aspect, and therefore can also implement any possible implementation of the fifth aspect or the fifth aspect.
  • the beneficial effects in the realization of the method may be an access network device, or a device that supports the access network device to implement the fifth aspect or the method in any possible implementation manner of the fifth aspect, for example, a chip applied to the access network device.
  • the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a communication unit and a processing unit.
  • the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
  • the communication unit is configured to send broadcast information, the broadcast information includes first indication information, and the first indication information is used to indicate that the first non-public network communicates with the public network.
  • the broadcast information further includes information about one or more public networks that communicate with the first non-public network.
  • the communication device is suitable for use in non-public networks.
  • the processing unit may be a processor, and the communication unit may be a communication interface.
  • the communication interface can be an input/output interface, a pin, or a circuit.
  • the processing unit executes the instructions stored in the storage unit, so that the access network device implements a network access method described in the fifth aspect or any one of the possible implementation manners of the fifth aspect.
  • the storage unit can be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit (for example, a read-only memory, a random access memory, etc.) located outside the chip in the access network device .
  • an embodiment of the present application provides a communication device, which can implement the sixth aspect or any possible implementation method of the sixth aspect, and therefore can also implement any possible implementation of the sixth aspect or the sixth aspect.
  • the beneficial effects in the realization of the method may be a second terminal, or a device that supports the second terminal to implement the sixth aspect or the method in any possible implementation manner of the sixth aspect, for example, a chip applied to the second terminal.
  • the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
  • an embodiment of the present application provides a communication device that is a second terminal or a chip applied to the second terminal.
  • the communication device includes a communication unit and a processing unit.
  • the processing unit is configured to To process information, the communication unit is used to receive or send information.
  • the communication unit is configured to use the first subscription information to send a first message to the access management network element in the first non-public network, where the first message is used to indicate a request to register the second terminal in the first non-public network,
  • the first contract information is the contract information of the second terminal in the first non-public network, or the first contract information is the contract information of the second terminal in the first public network.
  • the communication unit is configured to receive a second message from the access management network element, which is used to indicate that the second terminal is denied registration in the first non-public network.
  • the second message includes fourth indication information, and the fourth indication information is used to indicate a reason for rejecting registration of the second terminal in the first non-public network.
  • the first subscription information is the subscription information of the second terminal in the first non-public network.
  • the second identification of the second terminal carried in the first subscription information is related to the first non-public network.
  • the second identification of the second terminal includes information of the first non-public network. Taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification of the target public network and the NID.
  • the first subscription information is the subscription information of the second terminal in the first public network.
  • the third identity of the second terminal carried in the first subscription information is related to the first public network.
  • the third identity of the second terminal includes information of the first public network.
  • the information of the first public network may be the identification of the first public network.
  • the first subscription information is the subscription information of the second terminal in the first non-public network
  • the processing unit is further configured to use the second subscription information of the second terminal in accordance with the fourth instruction information.
  • Register in the first non-public network, and the second contract information is the contract information of the second terminal in the first public network.
  • the communication unit is further configured to receive a fourth message from the access management network element, where the fourth message includes a network candidate list of the second terminal, and the network candidate list includes the first non-public Network information. So that the second terminal can determine that the second terminal can register in the first non-public network.
  • the communication unit is further configured to receive a fifth message from the access management network element, where the fifth message is used to indicate that the second terminal is accepted to register in the first non-public network.
  • the second terminal adds the information of the first non-public network to the network candidate list of the second terminal. So that the second terminal determines that the second terminal can register in the first non-public network, and then selects the second subscription information of the second terminal to register in the first non-public network.
  • the fourth indication information is used to indicate that the second terminal is an illegal terminal.
  • the first subscription information is subscription information of the second terminal in the first public network
  • the second terminal also has third subscription information of the second terminal in the first non-public network
  • the processing unit is further configured to use the third contract information to request registration in the first non-public network.
  • the fourth identifier of the second terminal included in the third subscription information is related to the first non-public network.
  • the fourth identifier includes information of the first non-public network. Taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification of the target public network and the NID.
  • the first subscription information is the subscription information of the second terminal in the first public network
  • the second terminal also has the third subscription information of the second terminal in the first non-public network
  • the processing unit is further configured to use the third contract information for the second terminal to request registration in the first non-public network.
  • the processing unit is configured to send a registration request message to the access management network element in the first non-public network through the communication unit, where the registration request message includes the fourth identifier of the second terminal.
  • the processing unit may be a processor, and the communication unit may be a communication interface.
  • the communication interface can be an input/output interface, a pin, or a circuit.
  • the processing unit executes the instructions stored in the storage unit, so that the second terminal implements the network access method described in the sixth aspect or any one of the possible implementation manners of the sixth aspect.
  • the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit in the second terminal located outside the chip (for example, a read-only memory, a random access memory, etc.).
  • an embodiment of the present application provides a communication device, which can implement the seventh aspect or any possible implementation method of the seventh aspect, and therefore can also implement any possible seventh aspect or the seventh aspect.
  • the beneficial effects in the realization of the method may be an access management network element, or a device that supports the access management network element to implement the method in the seventh aspect or any possible implementation manner of the seventh aspect, for example, the device used in the access management network element chip.
  • the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
  • an embodiment of the present application provides a communication device.
  • the communication device is an access management network element or a chip applied to an access management network element.
  • the communication device includes a communication unit and a processing unit.
  • the unit is used to process information, and the communication unit is used to receive or send information.
  • the communication unit is configured to receive a first message from the second terminal indicating that the second terminal requests to use the first subscription information to register in the first non-public network, where the first subscription information indicates that the second terminal is in the first non-public network.
  • a contract information in a non-public network, or, the first contract information is the contract information of the second terminal in the first public network.
  • the communication unit is configured to send a second message to the second terminal, the second message is used to refuse the second terminal to register in the first non-public network, the second message includes fourth indication information, the fourth indication information is used to indicate The reason for rejecting the second terminal from registering in the first non-public network.
  • the communication unit is further configured to send a fourth message to the second terminal, where the fourth message includes a network candidate list of the second terminal, and the network candidate list includes information about the first non-public network.
  • the communication unit is further configured to send a fifth message to the second terminal, where the fifth message is used to indicate that the second terminal is accepted to register in the first non-public network. This is so that the second terminal determines that it can register in the first non-public network according to the fifth message.
  • the fourth indication information is used to indicate that the second terminal is an illegal terminal.
  • the processing unit is configured to determine to reject the second terminal from registering in the first non-public network.
  • the processing unit is configured to determine to reject the second terminal from registering in the first non-public network, and includes: a processing unit, configured to determine whether the second terminal is in the first non-public network according to the configuration information The subscription information determines that the second terminal is rejected to register in the first non-public network.
  • the communication device is an access management network element applied to the first non-public network, or a chip applied to the access management network element of the first non-public network.
  • the processing unit may be a processor, and the communication unit may be a communication interface.
  • the communication interface can be an input/output interface, a pin, or a circuit.
  • the processing unit executes the instructions stored in the storage unit, so that the access management network element implements the network access method described in the seventh aspect or any one of the possible implementation manners of the seventh aspect.
  • the storage unit may be a storage unit (for example, register, cache, etc.) in the chip, or a storage unit (for example, read-only memory, random access memory, etc.) located outside the chip in the access management network element. ).
  • the embodiments of the present application provide a computer-readable storage medium, and the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction runs on the computer, the computer can execute the operations as described in the first aspect to A network access method described in any one of the possible implementations of the first aspect.
  • the embodiments of the present application provide a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction runs on the computer, the computer executes the operations as described in the second aspect to A network access method described in any possible implementation of the second aspect.
  • the embodiments of the present application provide a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction runs on the computer, the computer executes the operations as described in the third aspect to A network access method described in any one of the possible implementations of the third aspect.
  • the embodiments of the present application provide a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction runs on the computer, the computer executes the operations as in the fourth aspect to A network access method described in any one of the possible implementations of the fourth aspect.
  • the embodiments of the present application provide a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction runs on the computer, the computer can execute the operations as described in the fifth aspect to A network access method described in any possible implementation manner of the fifth aspect.
  • the embodiments of the present application provide a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction When the computer program or instruction is run on the computer, the computer can execute the operations as described in the sixth aspect to A network access method described in any one of the possible implementations of the sixth aspect.
  • an embodiment of the present application provides a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction runs on a computer, the computer can execute the seventh aspect.
  • the embodiments of the present application provide a computer program product including instructions.
  • the instructions run on a computer, the computer executes the first aspect or one of the various possible implementations of the first aspect.
  • the access method of the network is not limited to, but not limited to, but not limited to, but not limited to, but not limited to,
  • embodiments of the present application provide a computer program product including instructions.
  • the instructions run on a computer, the computer executes the second aspect or one of the various possible implementations of the second aspect.
  • the access method of the network is not limited to, but not limited to, but not limited to, but not limited to, but not limited to,
  • the embodiments of the present application provide a computer program product including instructions.
  • the instructions When the instructions are run on a computer, the computer executes the third aspect or various possible implementations of the third aspect.
  • the embodiments of the present application provide a computer program product including instructions.
  • the instructions When the instructions are run on a computer, the computer executes the fourth aspect or one of the various possible implementations of the fourth aspect.
  • the access method of the network When the instructions are run on a computer, the computer executes the fourth aspect or one of the various possible implementations of the fourth aspect.
  • the access method of the network When the instructions are run on a computer, the computer executes the fourth aspect or one of the various possible implementations of the fourth aspect.
  • the access method of the network The access method of the network.
  • the embodiments of the present application provide a computer program product including instructions.
  • the instructions When the instructions are run on a computer, the computer executes one of the fifth aspect or various possible implementation manners of the fifth aspect.
  • the access method of the network When the instructions are run on a computer, the computer executes one of the fifth aspect or various possible implementation manners of the fifth aspect.
  • the access method of the network When the instructions are run on a computer, the computer executes one of the fifth aspect or various possible implementation manners of the fifth aspect.
  • the access method of the network The access method of the network.
  • the embodiments of the present application provide a computer program product including instructions.
  • the instructions When the instructions are executed on a computer, the computer executes the sixth aspect or various possible implementations of the sixth aspect.
  • the embodiments of the present application provide a computer program product including instructions.
  • the instructions When the instructions are run on a computer, the computer executes the seventh aspect or various possible implementations of the seventh aspect.
  • an embodiment of the present application provides a communication device for implementing various possible designs in any of the foregoing first to seventh aspects.
  • the communication device may be the aforementioned first terminal, or a device including the aforementioned first terminal, or a component (for example, a chip) applied to the first terminal.
  • the communication device may be the above-mentioned access management network element, or a device including the above-mentioned access management network element, or the communication device may be a component (for example, a chip) applied to the access management network element.
  • the communication device may be the above-mentioned unified data management network element, or a device including the above-mentioned unified data management network element, or a component (for example, a chip) applied to the unified data management network element.
  • the communication device may be the above-mentioned access network equipment, or a device including the above-mentioned access network equipment, or a component (for example, a chip) applied to the access network equipment.
  • the communication device may be the above-mentioned second terminal, or a device including the above-mentioned second terminal, or a component (for example, a chip) applied to the second terminal.
  • the communication device includes modules and units corresponding to the foregoing methods.
  • the modules and units can be implemented by hardware, software, or hardware execution of corresponding software.
  • the hardware or software includes one or more modules or units corresponding to the above-mentioned functions.
  • an embodiment of the present application provides a communication device, the communication device including: at least one processor and a communication interface.
  • the processor executes a computer-executable instruction or program stored in the communication device, so that the communication device executes the aforementioned first aspect, second aspect, third aspect, fourth aspect, or fourth aspect
  • the communication device may be the first terminal or a component applied to the first terminal.
  • the communication device may be an access management network element, or a component applied to an access management network element.
  • the communication device is a second terminal, or a component applied to the second terminal.
  • the communication device may be a unified data management network element, or a component applied to a unified data management network element.
  • the communication device is an access network device or a component applied to the access network device.
  • the communication device described in the thirtieth aspect may further include a bus and a memory, and the memory is used to store code and data.
  • the memory is used to store code and data.
  • at least one processor communication interface and the memory are coupled to each other.
  • an embodiment of the present application provides a communication device, the communication device including: at least one processor.
  • at least one processor is coupled to the memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the first aspect or the first aspect described above.
  • the communication device may be the first terminal or a chip applied in the first terminal.
  • an embodiment of the present application provides a communication device, the communication device including: at least one processor.
  • at least one processor is coupled with the memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the second aspect or the second aspect described above.
  • the communication device may be an access management network element, or a chip applied to an access management network element.
  • an embodiment of the present application provides a communication device, the communication device including: at least one processor.
  • at least one processor is coupled with the memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the above-mentioned third aspect or the third aspect.
  • the communication device may be a unified data management network element, or a chip used in a unified data management network element.
  • an embodiment of the present application provides a communication device, the communication device including: at least one processor.
  • at least one processor is coupled with a memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the fourth aspect or the fourth aspect.
  • the communication device may be a second terminal or a chip applied in the second terminal.
  • an embodiment of the present application provides a communication device, the communication device including: at least one processor.
  • at least one processor is coupled with a memory, and when the communication device is running, the processor executes a computer-executable instruction or program stored in the memory, so that the communication device executes any one of the fifth aspect or the fifth aspect described above.
  • the communication device may be an access network device or a chip applied to the access network device.
  • an embodiment of the present application provides a communication device, the communication device including: at least one processor.
  • at least one processor is coupled with the memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the sixth aspect or the sixth aspect described above.
  • the communication device may be a second terminal or a chip applied in the second terminal.
  • an embodiment of the present application provides a communication device, the communication device including: at least one processor.
  • at least one processor is coupled with a memory, and when the communication device is running, the processor executes a computer-executable instruction or program stored in the memory, so that the communication device executes any one of the seventh aspect or the seventh aspect described above.
  • the communication device may be an access management network element, or a chip applied to an access management network element.
  • the memory described in any one of the thirty-first aspect to the thirty-seventh aspect may also be replaced with a storage medium, which is not limited in the embodiment of the present application.
  • the memory described in any one of the 31st to the 37th aspects may be a memory inside the communication device.
  • the memory may also be located outside the communication device, but at least one The processor can still execute the computer-executable instructions or programs stored in the memory.
  • an embodiment of the present application provides a communication device that includes one or more modules for implementing the first aspect, the second aspect, the third aspect, the fourth aspect, and the fifth aspect.
  • the method of any one of the sixth aspect or the seventh aspect, the one or more modules can be combined with the above-mentioned first aspect, second aspect, third aspect, fourth aspect, fifth aspect, sixth aspect or seventh aspect.
  • the steps in the method of any one of the aspects correspond to each other.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the first aspect or the first aspect.
  • the communication interface is used to communicate with other modules outside the chip.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the second aspect or each of the second aspect.
  • the communication interface is used to communicate with other modules outside the chip.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the third aspect or the third aspect.
  • the communication interface is used to communicate with other modules outside the chip.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, and the communication interface is coupled to the processor.
  • the processor is used to run a computer program or instruction to implement the fourth aspect or the fourth aspect.
  • the communication interface is used to communicate with other modules outside the chip.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, and the communication interface is coupled to the processor.
  • the processor is used to run a computer program or instruction to implement the fifth aspect or the fifth aspect.
  • the communication interface is used to communicate with other modules outside the chip.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the sixth aspect or the sixth aspect A network access method described in various possible implementations.
  • the communication interface is used to communicate with other modules outside the chip.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the seventh aspect or the seventh aspect.
  • the communication interface is used to communicate with other modules outside the chip.
  • the chip provided in the embodiment of the present application further includes a memory for storing computer programs or instructions.
  • an embodiment of the present application provides a communication system, which includes: the communication device described in the ninth aspect or any one of the possible implementation manners of the ninth aspect, and any one of the tenth aspect or the tenth aspect Possible implementations are described in the communication device.
  • the communication system may further include: the communication device described in the eighth aspect or any one of the eighth aspect.
  • an embodiment of the present application provides a communication system, which includes: the communication device described in any possible implementation manner of the eleventh aspect or the eleventh aspect, the twelfth aspect or the twelfth aspect The communication device described in any one of the possible implementations of the aspect.
  • an embodiment of the present application provides a communication system, which includes: the communication device described in the thirteenth aspect or any one of the possible implementation manners of the thirteenth aspect, the fourteenth aspect or the fourteenth aspect The communication device described in any one of the possible implementations of the aspect.
  • any device or computer storage medium or computer program product or chip or communication system provided above is used to execute the corresponding method provided above. Therefore, the beneficial effects that can be achieved can refer to the corresponding method provided above The beneficial effects of the corresponding solutions in the method will not be repeated here.
  • FIG. 1 is a schematic diagram of a public network integrated NPN and independent deployment of NPN architecture provided by an embodiment of the application;
  • FIG. 2 is a schematic diagram of the structure of a public network or a non-public network provided by an embodiment of the application;
  • FIG. 3 is an architecture diagram of a communication system to which a network access method provided by an embodiment of the application is applicable;
  • FIG. 4 is an architecture diagram of a 5G network provided by an embodiment of this application.
  • FIG. 5a is a schematic diagram of a non-public network and a public network based on the N3IWF interworking architecture provided by an embodiment of the application;
  • FIG. 5b is a schematic diagram of a non-public network and a public network interworking based on a roaming architecture provided by an embodiment of the application;
  • FIG. 6 is a first schematic flowchart of a network access method provided by an embodiment of this application.
  • FIG. 7 is a second schematic flowchart of a network access method provided by an embodiment of this application.
  • FIG. 8 is a third schematic flowchart of a network access method provided by an embodiment of this application.
  • FIG. 9 is a fourth schematic flowchart of a network access method provided by an embodiment of this application.
  • FIG. 10 is a tenth schematic flowchart of a network access method provided by an embodiment of this application.
  • FIG. 11 is a schematic flowchart 1 of a specific embodiment of a network access method provided by an embodiment of this application.
  • FIG. 12 is a second schematic flowchart of a specific embodiment of a network access method provided by an embodiment of this application.
  • FIG. 13 is a third schematic flowchart of a specific embodiment of a network access method provided by an embodiment of this application.
  • FIG. 14 is a fourth schematic flowchart of a specific embodiment of a network access method provided by an embodiment of this application.
  • 15 is a schematic flowchart 5 of a specific embodiment of a network access method provided by an embodiment of this application.
  • FIG. 16 is a sixth schematic flowchart of a specific embodiment of a network access method provided by an embodiment of this application.
  • FIG. 17 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 18 is a schematic structural diagram of another communication device provided by an embodiment of this application.
  • FIG. 19 is a schematic structural diagram of a chip provided by an embodiment of the application.
  • words such as “first” and “second” are used to distinguish the same items or similar items that have substantially the same function and effect.
  • the first terminal and the second terminal are only used to distinguish different terminals, and the sequence of the terminals is not limited.
  • words such as “first” and “second” do not limit the quantity and order of execution, and words such as “first” and “second” do not limit the difference.
  • At least one refers to one or more, and “multiple” refers to two or more.
  • “And/or” describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
  • the following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • at least one of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • the steps involved in the network access method provided in the embodiments of this application are only examples, not all steps are mandatory steps, or not all information or content in the message is mandatory. During use, it can be increased or decreased as needed.
  • Public network refers to a network established and operated for the purpose of providing land mobile communication services to the public, that is, a traditional operator network, including but not limited to mobile phone communication.
  • the public network may be a public land mobile network (PLMN).
  • PLMN public land mobile network
  • Non-public network is a non-public 5G network, which refers to a communication network that can be used by some private users.
  • non-public networks may include industrial communication networks, enterprise private networks, etc.
  • a typical industrial communication network service scope is usually one or more industrial parks, and a corporate private network service scope usually covers all users within an enterprise.
  • non-public networks only serve devices managed or owned by a certain industrial communication network or enterprise private network, and provide network communication services such as data connections for these devices.
  • the non-public network may provide communication services for terminals located in the industrial park and having the ability and authority to access the non-public network.
  • the non-public network in the embodiment of the present application may also be referred to as: a private network or a private network, which will be described in a unified manner here, and will not be repeated in the following.
  • Non-public networks may include: public network integrated NPN (PNI-NPN) and standalone NPN (standalone NPN, SNPN).
  • PNI-NPN public network integrated NPN
  • SNPN standalone NPN
  • the public network integration NPN can rely on the support of PLMN to achieve, SNPN does not rely on the realization of the network function of the PLMN.
  • Public network integration NPN can be implemented using network slicing in PLMN.
  • a closed access group (CAG) function is additionally used.
  • CAG is used to identify a group of terminals. A group of terminals that can be recognized by CAG are allowed to access the cell associated with the CAG (CAG cell).
  • the CAG cell broadcasts one or more CAG identifiers, and the available CAG list (list) and instructions are configured on the terminal (this instruction is used to indicate whether the terminal only allows Access to the 5G system (5G System, 5GS) through the CAG cell.
  • the unified data management network element has the subscription data of the terminal, and the subscription data of the terminal includes the CAG list and instructions available for the terminal.
  • the diagram (a) in Figure 1 takes the public network integrated NPN as an example.
  • PLMN ID on terminal 3 A, then terminal 1 can access both base station 1 and base station 2, and although terminal 2 can access base station 1, but cannot access base station 2.
  • Terminal 3 can access base station 2, but terminal 3 cannot access base station 1.
  • Figure 1 (b) takes independent deployment of NPN as an example.
  • SNPN (5G network) is deployed independently and does not rely on PLMN.
  • SNPN is identified by PLMN ID+NID, where PLMN The ID can be an inherent value reserved by a third-party operator, or it can be a specific value of the PLMN operator deploying this SNPN.
  • the base station 3 in the SNPN sends the SIB3, and the SIB3 includes the identification N of the SNPN (for example, PLMN ID+NID1).
  • the terminal 4 selects the NPN network to access according to the broadcast information and the configured network selection information.
  • the terminal 4 finds that the configured network selection information (PLMN ID+NID2) is different from the PLMN ID or PLMN ID+NID1 broadcast by the base station 3, the terminal 4 will not choose to access the SNPN. If the terminal 4 finds that the configured network selection information (PLMN ID+NID1) is the same as the PLMN ID or PLMN ID+NID1 broadcast by the base station 3, the terminal 4 chooses to access the SNPN.
  • the configured network selection information PLMN ID+NID2
  • Base station 1, base station 2, and base station 3 may be base stations in a 5G network.
  • base station 1, base station 2, and base station 3 may be next Generation Node B (gNB).
  • the diagram (a) in Figure 1 takes the base station 1 and the base station 2 accessing the same 5G core network (5G Core, 5GC) as an example.
  • the base station 2 accesses the 5GC corresponding to the non-public network.
  • Figure 2 shows the composition of a public network or a non-public network.
  • Both the public network and the non-public network include a terminal, an access network (AN), a core network (core), and a data network ( data network, DN), where the terminal, AN, and Core are the main components of the architecture.
  • the terminal, AN, and Core can be divided into two parts: the user plane and the control plane.
  • the control plane is responsible for the management of the mobile network
  • the user plane is responsible for the business. Transmission of data.
  • the NG2 reference point is located between the control plane of the AN and the core
  • the NG3 reference point is located between the user plane of the AN and the user plane of the Core
  • the NG6 reference point is located between the user plane of the Core and the data network.
  • Terminal It is the portal for mobile users to interact with the network. It can provide basic computing and storage capabilities, display business windows to users, and accept user input.
  • the terminal in the 5G network can use the new air interface technology to establish a signal connection and data connection with the AN, thereby transmitting control signals and service data to the mobile network.
  • AN Similar to the base station in the traditional network, it is deployed close to the terminal to provide the network access function for authorized terminals in a specific area. AN can determine transmission tunnels of different qualities to transmit terminal data according to the level of the terminal and service requirements. AN can manage its own resources, make reasonable use of it, provide access services for terminals on demand, and be responsible for forwarding control signals and terminal data between the terminal and the core network.
  • the Core responsible for maintaining the contract data of the mobile network, managing the network elements of the mobile network, and providing the terminal with functions such as session management, mobility management, policy management, and security authentication.
  • the Core provides network access authentication for the terminal.
  • the Core allocates network resources for the terminal; when the terminal moves, the Core updates the network resources for the terminal.
  • the Core When the terminal is idle, the Core provides a fast recovery mechanism for the terminal; when the terminal is detached, the Core releases network resources for the terminal; when the terminal has business data, the Core provides data routing functions for the terminal, such as forwarding uplink data to the data network .
  • the Core receives downlink data for the terminal from the Data Network.
  • the Core sends the received downlink data for the terminal to the AN, so that the AN sends the downlink data for the terminal to the terminal.
  • the data network It is a data network that provides business services to users.
  • the client is located at the terminal and the server is located at the data network.
  • the data network can be a private network, such as a local area network, or an external network that is not under the control of operators, such as the Internet, or a private network jointly deployed by operators, such as the provision of IP multimedia network subsystems (IP multimedia).
  • IP multimedia IP multimedia
  • IMS core network subsystem
  • Fig. 2 describes the main components of the non-public network and the public network, as shown in Fig. 3, and Fig. 3 shows a communication system to which a network access method of the present application is applicable.
  • the communication system includes: a terminal 10. And access management network element 20.
  • the access management network element 20 belongs to a network element in the non-public network 100.
  • the terminal 10 can access the non-public network 100 through the access network device 30 and the access management network element 20 in the non-public network 100.
  • the terminals 10 may be distributed in a wireless network, and each terminal may be static or mobile.
  • the communication system may further include: a unified data management network element 40.
  • the unified data management network element 40 belongs to a network element in the public network 200.
  • the public network 200 and the non-public network 100 communicate with each other. After the terminal 10 successfully accesses the non-public network 100.
  • the terminal 10 can access the public network 200 through the non-public network 100.
  • the communication system shown in FIG. 3 in the embodiment of the present application can be applied to the current 5G network architecture and other network architectures that will appear in the future, which is not limited in the embodiment of the present application.
  • the communication system shown in FIG. 3 is applicable to a 5G network as an example, that is, the non-public network 100 and the public network 200 are both 5G networks as an example.
  • the network element or entity corresponding to the access management network element 20 may be as shown in the figure.
  • access and mobility management function (AMF) network element AMF
  • the network element or entity corresponding to the unified data management network element 40 may be a unified data management (unified data management, UDM) network element.
  • the network element or entity corresponding to the access network device 30 may be a (radio) access network ((R)AN) device.
  • Non-public network 100 or the public network 200 may also include: session management function (SMF) network elements, policy control function (PCF) network elements, Network slice selection function (NSSF) network element, authentication server function (authentication server function, AUSF) network element, network exposure function (NEF) network element, network repository storage function (network repository function) , NRF) network elements, and application function (AF) network elements, etc., which are not specifically limited in the embodiment of the present application.
  • SMF session management function
  • PCF policy control function
  • NSSF Network slice selection function
  • authentication server function authentication server function
  • AUSF authentication server function
  • NEF network exposure function
  • NRF network repository storage function
  • AF application function
  • the non-public network 100 or the public network 200 may also communicate with a data network (data network, DN), and the DN may be managed by an AF network element.
  • DN data network
  • the terminal accesses the network (non-public network or public network) through the (R)AN device, and the terminal communicates with the AMF network element through the N1 interface (abbreviated as N1).
  • the SMF network element communicates with one or more UPF network elements through the N4 interface (N4 for short).
  • the UPF network element communicates with the DN through the N6 interface (N6 for short).
  • the AN equipment communicates with the AMF network element through the N2 interface (abbreviated as N2).
  • (R) AN equipment communicates with UPF network elements through an N3 interface (N3 for short).
  • the control plane network elements can also interact with service-oriented interfaces.
  • AMF network elements, SMF network elements, UDM network elements, or PCF network elements interact with each other using a service-oriented interface.
  • the service-oriented interface provided by the AMF network element to the outside may be Namf.
  • the service-oriented interface provided by the SMF network element to the outside may be Nsmf.
  • the service-oriented interface provided by the UDM network element to the outside may be Nudm.
  • the service-oriented interface provided by the PCF network element to the outside may be Npcf.
  • the service-oriented interface provided by the NSSF network element to the outside may be Nnssf.
  • the service-oriented interface provided by the NEF network element to the outside may be Nnef.
  • the service-oriented interface provided by the AF network element to the outside may be Naf. It should be understood that related descriptions of the names of various service-oriented interfaces can refer to the 5G system architecture (5G system architecture) diagram in the prior art, which will not be repeated here.
  • the control plane network elements can also communicate in the following manner: AMF entities communicate with SMF network elements through the N11 interface (N11 for short) Communication. Any two UPF network elements among one or more UPF network elements communicate through an N9 interface (abbreviated as N9).
  • the SMF network element communicates with the PCF network element through the N7 interface (N7 for short), and the PCF network element communicates with the AF network element through the N5 interface.
  • Any two AMF network elements communicate through the N14 interface (N14 for short).
  • the SMF network element communicates with the UDM through the N10 interface (N10 for short).
  • the AMF network element communicates with AUSF through the N12 interface (N12 for short).
  • the AUSF network element communicates with the UDM network element through the N13 interface (N13 for short).
  • the AMF network element communicates with the UDM network element through the N8 interface (N8 for short).
  • FIG. 4 is only an example of a UPF network element and an SMF network element.
  • multiple UPF network elements and SMF network elements may be included, such as SMF network element 1 and SMF network element 2, which are not specifically limited in the embodiment of the present application.
  • the (R) AN device, AMF network element, SMF network element, UDM network element, UPF network element, and PCF network element in FIG. 4 are only a name, and the name does not constitute a limitation on the device itself.
  • the network elements or entities corresponding to (R)AN equipment, AMF network elements, SMF network elements, UDM network elements, UPF network elements, and PCF network elements can also have other names.
  • the application embodiment does not specifically limit this.
  • the UDM network element may also be replaced with a user home server (home subscriber server, HSS) or user subscription database (user subscription database, USD) or a database entity, etc., which will be uniformly explained here and will not be repeated in the following .
  • the non-public network 100 and the public network 200 use a non-3GPP interworking function (Non-3GPP interworking function, N3IWF)-based architecture for intercommunication.
  • the terminal 10 has dual subscription information. That is, the terminal 10 not only has the private network contract information with the non-public network 100, but also has the first public network contract information with the public network 200. Among them, the private network subscription information is used for the terminal 10 to access the non-public network 100.
  • the first public network subscription information is used to specify 10 to access the public network 200.
  • the private network subscription information between the terminal 10 and the non-public network 100 includes the identity 1 of the terminal 10, and the identity 1 of the terminal 10 includes the identity of the non-public network 100.
  • the first public network subscription information between the terminal 10 and the public network 200 includes the identity 2 of the terminal 10, and the identity 2 of the terminal 10 includes the identity of the public network 200.
  • the first version may be version (Release, R)16.
  • the terminal 10 uses the private network contract information with the non-public network 100 to determine the identity of the non-public network 100. Then the terminal 10 accesses the access network equipment deployed in the non-public network 100, and the terminal 10 performs 3GPP registration in the non-public network 100 through the access network equipment.
  • the terminal 10 uses the first public network contract information with the public network 200 to determine the identity of the public network 200. After that, the terminal 10 selects the N3IWF in the public network 200, the terminal 10 establishes a PDU session in the non-public network 100 to access the N3IWF in the public network 200, and performs N3GPP registration on the public network 200.
  • the non-public network 100 includes AMF network element 1, SMF network element 1, and UPF network element 1
  • public network 200 includes AMF network element 2, SMF network element 2, and UPF network element 2.
  • N3IWF is used to realize the intercommunication between the non-public network 100 and the public network 200.
  • the terminal 10 accesses the non-public network 100 through the 3GPP access technology of NPN, and then a PDU session is established between the terminal 10 and the UPF network element 1 in the non-public network 100 network. Later, when the terminal 10 needs to perform non-3GPP (non3GPP, N3GPP) registration on the public network 200 through the non-public network 100 network, the terminal 10 can use the PDU session established with the UPF network element 1 to send the public information to the UPF network element 1.
  • the registration request message of the public network is used to request the registration of the terminal 10 in the public network 200.
  • UPF network element 1 uses DN1 as shown in FIG. 5a to send a public network registration request message to N3IWF.
  • the N3IWF After the N3IWF receives the public network registration request message, it can forward the public network registration request message to the AMF network element 2 in the public network 200, so that the AMF network element 2 can determine whether the terminal is allowed according to the public network registration request message. 10 Register in the public network 200. If the AMF network element 2 allows the terminal 10 to register in the public network 200, it sends a registration acceptance message to the N3IWF, so that the N3IWF sends the registration acceptance message to the UPF network element 1 in the non-public network 100 via DN1. After the UPF network element 1 receives the registration acceptance message, it can use the PDU session with the terminal 10 to send the registration acceptance message to the terminal 10.
  • the DN1 is used to provide services for the non-public network 100
  • the DN2 is used to provide services for the public network 200. That is, the terminal 10 can access the service deployed on DN1 through the non-public network 100. That is, the terminal 10 can access the service deployed on DN2 through the public network 200.
  • the N3IWF communicates with the DN through the N6 interface.
  • the N3IWF communicates with the AMF network element 2 through the N2 interface of the public network.
  • the non-public network 100 and the public network 200 use a roaming architecture to communicate, and the terminal 10 has a connection with the public network 200.
  • the second public network contract information As shown in FIG. 5b, the terminal 10 uses the second public network contract information with the public network 200 to determine the identity of the non-public network 100. After the terminal 10 determines the identity of the non-public network 100, the terminal 10 can choose to use the (R)AN device deployed in the non-public network to implement registration in the non-public network 100.
  • the terminal 10 may establish a session (for example, a PDU session) in the non-public network 100, and the non-public network 100 determines, according to the second public network subscription information, that the mode of the session is the home routed (HR) mode or the local grooming ( local breakout) mode.
  • the second version can be R17.
  • the second public network subscription information includes information about one or more non-public networks that the terminal 10 is allowed to access.
  • the terminal 10 can receive the broadcast information of the non-public network a (including the identification of the non-public network a). If the identity of the non-public network a included in the broadcast information is the same as the identity of a certain non-public network among the identities of one or more non-public networks, the terminal 10 can determine that the non-public network a can be selected for access.
  • Fig. 5b takes the roaming architecture supporting intercommunication between the non-public network 100 and the public network 200 as the home routing mode as an example.
  • the non-public network 100 of the terminal 10 also referred to as the visited network of the terminal
  • AMF network element 1 visited SMF (visited SMF, V-SMF) network element, visited PCF (V-PCF) network element, (R)AN equipment, visited UPF (visited UPF, V-UPF) ) Network elements and visited NSSF (visited NSSF, V-NSSF) network elements.
  • the public network 200 (also referred to as the home network of the terminal) of the terminal 10 includes: home SMF (home SMF, H-SMF) network elements, and home PCF (home PCF, H-PCF) Network elements, home UPF (home UPF, H-UPF) network elements, UDM network elements, AUSF network elements, and home NSSF (home NSSF, H-NSSF) network elements.
  • the H-SMF network element communicates with the V-SMF network element through the N16 interface
  • the AUSF network element communicates with the AMF network element 1 through the N12 interface
  • the H-PCF network element and the V-PCF network element communicate through the N24 interface.
  • the AMF network element 1 communicates with the V-NSSF network element through the N22 interface.
  • the V-NSSF network element communicates with the H-NSSF network element through the N31 interface.
  • the H-UPF network element and the V-UPF network element communicate through the N9 interface.
  • the public network 200 may also include: home security edge protection proxy (H-SEPP).
  • the non-public network 100 may also include: a visited security edge protection proxy (V-SEPP).
  • the public network 200 and the non-public network 100 communicate through the SEPP of the visited place and the SEPP of the home place. There is an N32 interface between the SEPP of the home place and the SEPP of the visited place.
  • the public network involved in the embodiments of the present application may be PLMN, and the non-public network may be SNPN, which will be described in a unified manner here, and will not be repeated in the following.
  • the UPF network element is used to perform user data packet forwarding according to the routing rules of the SMF network element, for example, uplink data is sent to DN or other UPF; downlink data is forwarded to other UPF or RAN.
  • AUSF network element used to perform terminal security authentication.
  • AMF Used to implement terminal access management and mobility management. Responsible for terminal status maintenance, terminal reachability management, non-mobility management (mobility management, MM), non-access stratum (Non-access stratum, NAS) message forwarding, session management (Session Management, SM) N2 message Forward.
  • SMF network element responsible for terminal session management, allocating resources for terminal sessions, and releasing resources; the resources include session quality of service (QoS), session paths, forwarding rules, etc.
  • QoS session quality of service
  • NSSF Used to select network slices for the terminal.
  • NEF Open network functions to third parties in the form of northbound application programming interface (API).
  • API application programming interface
  • NRF Provide storage function and selection function of network function entity information for other network elements.
  • UDM network element used to store the contract information of the terminal or manage the context of the terminal.
  • PCF network element user policy management.
  • AF network element used for management applications.
  • Terminals can include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to wireless modems; they can also include subscriber units, cellular phones, etc. ), smart phone (smart phone), wireless data card, personal digital assistant (personal digital assistant, PDA) computer, tablet computer, wireless modem (modem), handheld device (handheld), laptop computer (laptop computer), Cordless phone or wireless local loop (WLL) station, machine type communication (MTC) terminal, user equipment (UE), mobile station (mobile station, MS), Terminal device (terminal device) or relay user equipment, etc.
  • the relay user equipment may be, for example, a 5G residential gateway (RG).
  • RG 5G residential gateway
  • the terminals in the embodiments of the present application may be terminals in various vertical industry application fields such as Internet of Things terminal equipment, ports, smart factories, railway transportation, logistics, drones, and unmanned vehicles.
  • Mobile Robot Mobile Robot
  • AGV Automated Guided Vehicle
  • driverless cars control equipment and sensors on trains
  • control equipment and sensors Sensors deployed in factories, etc.
  • the terminal may also be a wearable device.
  • Wearable devices can also be called wearable smart devices. It is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
  • the terminal can also be a sensor device used in a factory.
  • the access network equipment is used to provide network access functions for authorized terminals in a specific area, and can use transmission tunnels of different quality according to the level of the terminal and service requirements.
  • the access network equipment can manage wireless resources, provide access services for the terminal, and then complete the forwarding of control signals and terminal data between the terminal and the core network.
  • the access network equipment can also be understood as a base station in a traditional network. For example, it can be responsible for functions such as radio resource management, quality of service (QoS) management, data compression and encryption on the air interface side.
  • QoS quality of service
  • the specific structure of the executive body of a network access method is not particularly limited in the embodiment of this application, as long as the code of a network access method of the embodiment of this application can be recorded by running
  • the procedure for communicating can be carried out by using a network access method according to an embodiment of the present application.
  • the execution subject of the network access method provided by the embodiment of the present application may be a functional module in the first terminal that can call and execute the program, or a communication device, such as a chip, applied to the first terminal.
  • the execution subject of the network access method provided by the embodiment of the present application may be a functional module in the access management network element that can call and execute the program, or a communication device applied to the access management network element, for example, chip.
  • the execution subject of the network access method provided by the embodiment of the present application may be a functional module in the unified data management network element that can call and execute the program, or a communication device applied to the unified data management network element, for example, chip. This application does not limit this.
  • the following embodiments are described with an example in which the execution subject of a network access method is the first terminal, the access management network element, and the unified data management network element.
  • FIG. 6 shows an interactive embodiment of a network access method provided by an embodiment of the present application, and the method includes:
  • Step 601 The first terminal sends a first message to the access management network element in the first non-public network, and correspondingly, the access management network element in the first non-public network receives the first message from the first terminal.
  • the first message is used to request to register the first terminal in the first non-public network.
  • the first terminal is located within the coverage area of the first non-public network. It should be understood that the first terminal may detect one or more candidate non-public networks, and the first non-public network may be any one of the one or more candidate non-public networks. Of course, the first non-public network may be a candidate non-public network with the strongest signal quality among one or more candidate non-public networks.
  • the access management network element may be the access management network element 20 shown in FIG. 2.
  • the first non-public network may be the non-public network 100 in FIG. 2.
  • the first terminal in the embodiment of the present application does not have the authority or ability to access a non-public network.
  • the first terminal may have the authority or ability to access the public network, which is not limited in the embodiment of the present application.
  • the “non-public network” in which the first terminal does not have the right to access a non-public network can be a general term, that is, the first terminal does not have the right to access any non-public network.
  • the “non-public network” in which the first terminal does not have the right to access the non-public network can be specified, that is, the first terminal just cannot access a specific non-public network (for example, a specific non-public network).
  • the network is the first non-public network), but the first terminal can access non-public networks other than the first non-public network. For example, taking the first non-public network as the non-public network 1 as an example, although the first terminal does not have the function of accessing the non-public network 1, the first terminal has the function of accessing the non-public network 2.
  • the first terminal is exclusively used to access the non-public network 2 serving the factory 1.
  • the first terminal does not have access to the Permission of non-public network 1.
  • the first message may also carry the identity of the first terminal.
  • the identifier of the first terminal is used to identify the first terminal.
  • the identifier of the first terminal may be one or more of the following: subscription permanent identifier (SUPI), subscriber concealed identifier (SUCI).
  • SUPI subscription permanent identifier
  • SUCI subscriber concealed identifier
  • step 601 in the embodiment of the present application can be implemented in the following manner: the first terminal sends the first terminal to the access management network element in the first non-public network through the access network device in the first non-public network. A message.
  • the access management network element in the first non-public network receives the first message from the first terminal through the access network device in the first non-public network.
  • the access management network element may also obtain the information of the first non-public network from the access network device in the first non-public network.
  • the information of the first non-public network is used to identify the non-public network.
  • the information of the first non-public network may be an identification of the first non-public network. Taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification of the target public network and the NID.
  • the target public network in the embodiment of the present application is a public network corresponding to the first non-public network.
  • the target public network is the public network of operator A
  • the identifier of the target public network assigned by operator A for the target public network is "00000" and the NID is "0001”
  • the identifier of the first non-public network includes " 000000001”.
  • the identifier of the target public network is a specific value assigned to the target public network by the operator deploying the first non-public network.
  • the identifier of the target public network is an inherent value reserved for the target public network by a third-party operator, which is not limited in the embodiment of the present application.
  • the first message may be a registration request message.
  • Step 602 The access management network element sends a query message to the unified data management network element in the first public network, and correspondingly, the unified data management network element in the first public network receives the access management network element from the non-public network Query message.
  • the query message is used to query the subscription data of the first terminal.
  • the first public network communicates with the first non-public network.
  • the first non-public network described in step 601 to step 605 is a non-public network that communicates with the first public network.
  • the query message may carry the identification of the first terminal and the information of the first non-public network.
  • the first public network may be the public network 200 shown in FIG. 2.
  • the unified data management network element may be the unified data management network element 40 in FIG. 2.
  • Step 603 The unified data management network element sends a third message to the access management network element, and correspondingly, the access management network element obtains the third message from the unified data management network element in the first public network.
  • the third message includes one or more of the following: subscription data and cause value of the first terminal.
  • the contract data includes the second indication information.
  • the second indication information is used to indicate that the first terminal can only access through the public network.
  • the second indication information is used to indicate that the first terminal cannot access through a non-public network.
  • the reason value indicates that the first terminal is not allowed to access in the first non-public network.
  • step 602 can be omitted.
  • the “public network” in the above-mentioned first terminal can only be accessed through a public network is a general term, that is, the first terminal is used to access through any public network other than the public network, and is not limited to only through The first public network access.
  • the “non-public network” in the foregoing that the first terminal cannot access through a non-public network may be a general term, that is, the first terminal cannot be accessed through any non-public network.
  • the "non-public network” in the foregoing first terminal cannot access through the non-public network specifically refers to that the first terminal cannot access through the first non-public network. The embodiment of the application does not limit this.
  • Step 604 The access management network element sends a second message to the first terminal according to the third message, and correspondingly, the first terminal receives the second message from the access management network element.
  • the second message is used to indicate that the first terminal is refused to register on the first non-public network.
  • the second message includes first indication information, and the first indication information indicates that the first terminal is prohibited from accessing in the first non-public network.
  • Step 605 The first terminal updates the network ban list of the first terminal according to the first indication information.
  • the updated network banned list includes the information of the first non-public network.
  • the updated network banned list can be regarded as the first network banned list.
  • step 605 in the embodiment of the present application may be implemented in the following manner: the first terminal adds the information of the first non-public network to the network ban list of the first terminal according to the first indication information.
  • the network ban list of the first terminal may itself have information about one or more networks, and the one or more networks include the first non-public network, in other words, the network of the first terminal
  • the prohibition list may include the first non-public network.
  • Each of the one or more networks has a record item, and the record item is used to indicate whether access to the network is prohibited or allowed.
  • including the information of the first non-public network in the updated network banning list can be understood as: the first terminal sets the record item corresponding to the first non-public network to a state of being prohibited from accessing.
  • the so-called update by the first terminal of the network ban list of the first terminal may refer to: the first terminal updates the record item corresponding to the first non-public network in the network ban list.
  • the record item of the first non-public network is indicator a, which indicates that access to the first non-public network is prohibited.
  • the record item of the first non-public network is indicator b, which indicates that the first non-public network is allowed to access.
  • the network ban list includes the record item corresponding to the first non-public network as indicator b, and then the first terminal executes the above steps 601 to 603 to request access to the first non-public network.
  • the first terminal receives the second message in the process of requesting access to the first non-public network.
  • the second terminal determines that it is denied access to the first non-public network according to the second message.
  • the first terminal may set the record item corresponding to the first non-public network as the indicator a.
  • the indicator a can also be represented by a deactivated state, and the indicator b can also be represented by an activated state, which is not limited in the embodiment of the present application.
  • the network ban list of the first terminal may itself have information about one or more networks, and the one or more networks do not include the first non-public network, then the updated network ban Including the information of the first non-public network in the list can be understood as: the first terminal adds the information of the first non-public network to the network ban list, and sets the record item corresponding to the first non-public network as indicator a.
  • the first terminal can use The access network device in the non-public network 1 sends a first message to the access management network element in the non-public network 1 to request to register in the non-public network 1, and then if the first terminal receives a message from the access management network element If the second message indicates that the first terminal is refused to register in the non-public network 1, the first terminal may determine that the non-public network 1 is a non-public network that the first terminal is prohibited from accessing.
  • the information of the first non-public network in the embodiment of the present application is used to identify the first non-public network.
  • the information of the first non-public network may be an identification of the first non-public network.
  • the information of the first non-public network may also be other parameters that can identify the first non-public network, which is not limited in the embodiment of the present application.
  • the embodiment of the present application provides a network access method.
  • the first terminal sends a first message to the access management network element in the first non-public network to request to register the second network in the first non-public network.
  • One terminal receives a second message from the access management network element.
  • the second message indicates that the first terminal is refused to register in the first non-public network, and the first indication information indicates that the first terminal is prohibited from being registered in the first non-public network.
  • Access in the network This is so that the first terminal updates the network ban list of the first terminal according to the first instruction information, so that the updated network ban list includes the information of the first non-public network, which can be avoided when the first terminal selects the network to register later. Select the first non-public network that is forbidden to access.
  • This solution can solve the problem that the first terminal that does not have the right to access the non-public network tries to access the first non-public network.
  • the method provided in the embodiment of the present application may further include after step 605: the first terminal selects a network other than the first non-public network for registration according to the updated network ban list.
  • the first terminal selects a network other than the first non-public network for registration according to the updated network ban list, which can be implemented in the following manner: the first terminal selects the network except the updated network ban list Register on the network listed in the network ban list.
  • the first terminal can select non-public network 2 other than non-public network 1. Sign up. If the updated network banned list includes the information of non-public network 1 and the information of non-public network 2, the first terminal can choose to register unless non-public network 3 other than public network 1 and non-public network 2 is registered. The following network banned list does not include the information of non-public network 3.
  • the method provided in the embodiment of the present application may further include: the first terminal starts a timer according to the first indication information, and when the timer expires, the first terminal starts from the updated Delete the information of the first non-public network from the network ban list. In this way, when the timer expires, the first non-public network can still be used as the non-public network that the first terminal can choose to access.
  • timer expiration may refer to reaching the timer time value corresponding to the timer.
  • the above-mentioned first terminal deletes the information of the first non-public network from the updated network ban list and can also be replaced by the following method: the first terminal updates the first network ban list to obtain The second network banned list.
  • the second network ban list does not include the information of the first non-public network, or the record item corresponding to the first public network included in the second network ban list indicates that the first non-public network is an accessible network
  • the embodiments of this application do not limit this.
  • the first terminal updates the record item corresponding to the first non-public network from indicator a to indicator b.
  • the first terminal when the first terminal deletes the information of the first non-public network from the updated network ban list, the first terminal can continue to request registration in the first non-public network. For example, for a first terminal that does not have the right to access a non-public network, if the first terminal is configured to have the right to access a non-public network, when the timer time value corresponding to the timer is reached, the When a terminal deletes the information of the first non-public network from the network ban list, the first terminal can subsequently register in the first non-public network.
  • deleting information about a certain non-public network from a certain network ban list can also be expressed as: the second terminal sets the record item corresponding to the non-public network as indicator a.
  • the timer time value corresponding to the timer may be predefined by the protocol, or the timer time value corresponding to the timer may be configured by the first terminal itself, or the timer time value corresponding to the timer may be determined by The access management network element is configured for the first terminal.
  • the second message includes the timer time value, and correspondingly, the first terminal sets the timer according to the timer time value.
  • the access management network element may also send the timer time value corresponding to the timer to the first terminal through other messages except the second message, which is not limited in this embodiment of the application.
  • the embodiment described in FIG. 6 may be applicable to the following scenarios:
  • the first non-public network and the first public network are both networks defined in the first version.
  • the first non-public network is an R16 non-public network
  • the first public network is an R16 public network.
  • the first non-public network and the first public network are both networks defined in the second version.
  • the first non-public network is an R17 non-public network
  • the first public network is an R17 public network.
  • the access management network element may be the AMF network element 1 as shown in FIG. 5b.
  • step 605 can be omitted.
  • the first indication information in the second message can be replaced by indication information x, where the indication information x is used to indicate that the reason why the first terminal is prohibited from accessing the first non-public network is: the first terminal is Illegal terminal.
  • the fact that the first terminal is an illegal terminal means that the first non-public network cannot identify the identity of the first terminal.
  • step 605 is a mandatory step.
  • the first non-public network is an R17 non-public network
  • the first public network is an R17 public network
  • the first non-public network and the first public network adopt a roaming architecture to communicate with each other.
  • FIG. 7 shows an interactive embodiment of a network access method provided by an embodiment of the present application, and the method includes:
  • Step 701 The access network device in the first non-public network sends broadcast information, and correspondingly, the second terminal receives the broadcast information from the access network device in the first non-public network.
  • the broadcast information includes first indication information, and the first indication information is used to indicate that the first non-public network communicates with the public network.
  • the second terminal in the embodiment of the present application has the authority to access the non-public network function.
  • the second terminal may have the authority to access the public network, or the second terminal may not have the authority to access the public network, which is not limited in the embodiment of the present application.
  • the “non-public network” in the second terminal having the right to access a non-public network may be a general term, that is, the second terminal has the right to access any non-public network.
  • the “non-public network” of the second terminal having the right to access the non-public network may be specified, that is, the second terminal can only access a specific non-public network (for example, a specific non-public network). Is the first non-public network).
  • the “public network” in the intercommunication between the first non-public network and the public network can be any public network in general.
  • the second terminal is located within the coverage area of the first non-public network, and the second terminal can receive broadcast information sent from an access network device in the first non-public network.
  • the first indication information may be a first indicator, and the first indicator is used to indicate that the first non-public network communicates with the public network.
  • the first indication information may be "1".
  • the first indication information is used to instruct the first non-public network to communicate with the public network using a roaming architecture. So that the second terminal uses the roaming architecture to access the first non-public network.
  • the so-called second terminal using the roaming architecture to access the first non-public network may refer to: the second terminal uses the subscription information of the second terminal in the public network (for example, the following first subscription information) to access the first non-public network The internet.
  • the method in the embodiment of the present application may further include: the access network device in the first non-public network determines that the first non-public network is interoperable with the public network.
  • the access network device in the first non-public network can determine that the first non-public network communicates with the public network in the following manner: the access network device determines the non-public network to communicate with the public network according to the operator configuration information.
  • Step 702 The second terminal determines to use the first subscription information to access the first non-public network according to the broadcast information.
  • the first contract information is the contract information of the second terminal in the first public network.
  • the first identifier of the second terminal carried in the first subscription information is related to the first public network.
  • the first identification of the second terminal carries information of the first public network, such as the network identification PLMN ID.
  • the first public network is one of one or more public networks that communicate with the first non-public network.
  • the first public network may be the public network 200 as shown in FIG. 5b.
  • the first non-public network may be the non-public network 100 as shown in FIG. 5b.
  • the access management network element may be the AMF network element 1 as shown in Fig. 5b.
  • the embodiment of the present application provides a network access method.
  • the second terminal receives the broadcast information broadcasted by the access network device, so that it is convenient for the second terminal to determine the first non-information according to the first indication information carried in the broadcast information.
  • the public network supports intercommunication with the public network.
  • the second terminal may determine to use the first subscription information to access the first non-public network.
  • the second terminal needs to access the first non-public network later, it can use the first subscription information to request registration in the first non-public network, which prevents the second terminal from not knowing the public network and the first non-public network.
  • a registration request is blindly initiated to the first non-public network, resulting in registration failure.
  • the method provided in the embodiment of the present application may further include after step 702: the second terminal uses the first subscription information to access the first non-public network.
  • the second terminal using the first subscription information to access the first non-public network can be implemented in the following manner: the second terminal uses the first subscription information to manage access to the first non-public network
  • the network element sends a first message, where the first message is used to indicate that the second terminal is registered in the first non-public network.
  • the first message carries the first identifier of the second terminal.
  • the first message may carry a registration indication, and the registration indication is used to indicate that the second terminal is registered in the first non-public network.
  • the broadcast information further includes information about one or more public networks that communicate with the first non-public network, and the first public network belongs to the one or more public networks.
  • the access network device broadcasts information about one or more public networks, so that the second terminal can determine one or more public networks that the second terminal can access.
  • the broadcast information may also include a manual selection access instruction
  • the second terminal prompts the user to use the manual selection method to access the first non-public network according to the manual selection access instruction to prevent the second terminal from automatically selecting To the first non-public network.
  • the one or more public networks also belong to country A.
  • the first public network may be any one of the one or more public networks. That is, the second terminal can choose one of the one or more public networks as the first public network.
  • the network selection priority of the first public network is the highest among the network selection priorities of one or more public networks.
  • the first public network is a public network supported by the second terminal.
  • the second terminal has a network selection priority for each of the one or more public networks.
  • the second terminal has contract information with the public network.
  • the first non-public network involved in the embodiment described in FIG. 7 may be an R17 non-public network.
  • the public network can be an R17 public network.
  • the first non-public network and the public network in the embodiment described in FIG. 7 adopt a roaming architecture for intercommunication.
  • FIG. 8 shows an interactive embodiment of a network access method provided by an embodiment of the present application, and the method includes:
  • Step 801 The second terminal uses the first subscription information to send a first message to the access management network element in the first non-public network.
  • the access management network element in the first non-public network receives the information from the second terminal.
  • the first message is used to indicate that the second terminal requests to use the first subscription information to register in the first non-public network.
  • the second terminal in the embodiment of the present application is a second terminal that supports the first version of the network.
  • the so-called second terminal that supports the first version of the network refers to: the second terminal has the same version as the first version of the second terminal.
  • the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network.
  • the "first non-public network" in the first message refers to the second version of the first non-public network.
  • the access management network element in the first non-public network may be the access management network element in the first non-public network of the second version.
  • the first subscription information is the subscription information of the second terminal in the first non-public network.
  • the first subscription information is the non-public network subscription information of the second terminal in the first version of the first non-public network.
  • the second terminal in the embodiment of the present application is a second terminal that supports the second version of the network.
  • the so-called second terminal that supports the second version of the network refers to: the second terminal has the same version as the second terminal.
  • the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network.
  • the "first non-public network" in the first message refers to the first version of the first non-public network. .
  • the access management network element in the first non-public network may be the access management network element in the first non-public network of the first version.
  • the first contract information is the contract information of the second terminal in the first public network.
  • the first subscription information is public network subscription information between the second terminal and the second version of the first public network.
  • the above-mentioned first version may be an R16 version, and the second version may be an R17 version.
  • the first subscription information is the first subscription information of the second terminal in the first version.
  • the second identity of the second terminal carried in the first subscription information is related to the first non-public network.
  • the second identity of the second terminal includes the identity of the first non-public network.
  • the first subscription information is the first subscription information of the second terminal in the second version. Contract information in the public network.
  • the third identifier of the second terminal carried in the first subscription information is related to the first public network.
  • the third identifier of the second terminal includes the information of the first public network.
  • the information of the first public network is used to identify the first public network.
  • the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network, which can be understood as: the access of the second terminal to the first non-public network
  • the management network element sends a first message, and the identifier of the second terminal included in the first message may be obtained from the first subscription information.
  • the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network to carry the second The second identifier of the terminal.
  • the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network to carry the second The third identifier of the terminal.
  • Step 802 The access management network element sends a second message to the second terminal, and correspondingly, the second terminal receives the second message from the access management network element.
  • the second message is used to refuse registration of the second terminal in the non-public network
  • the second message includes fourth indication information
  • the fourth indication information is used to indicate the reason for the rejection of the second terminal to register in the non-public network.
  • the embodiment described in FIG. 8 can be applied to: the non-public network to which the second terminal subscribes or the public network is different from the non-public network to which the second terminal registers. That is, case 1.
  • the second terminal uses the private network subscription information of the second terminal in the first non-public network of the first version to request registration in the first non-public network of the second version, the first non-public network of the second version
  • the access management network element in the network refuses the second terminal to register in the second version of the first non-public network.
  • Case 2
  • the second terminal uses the public network subscription information of the second terminal in the second version of the first public network to request registration in the first version of the first non-public network, the first version of the first non-public network
  • the access management network element of denies the second terminal to register in the first non-public network of the first version.
  • the first subscription information can be the subscription information of the second terminal in the first non-public network, or the subscription information of the second terminal in the first public network, but under different circumstances, the second terminal receives the second message There are differences in the subsequent processing actions, which will be introduced separately as follows:
  • the first subscription information is the subscription information of the second terminal in the first non-public network, which means that the first subscription information is the subscription information of the second terminal in the first version of the first non-public network.
  • the first non-public network to be registered by the second terminal is the first non-public network of the second version
  • the first public network is the first public network of the second version.
  • the embodiment of the present application provides a network access method, in which a second terminal uses first subscription information to send a first message to an access management network element in a first non-public network, where the first subscription information is the second The contract information of the terminal in the first non-public network or the first contract information is the contract information of the second terminal in the first public network.
  • the second terminal receives the second message from the access management network element, so that the subsequent second terminal can determine according to the second message that the access network management network element in the first non-public network refuses the second terminal to register in the non-public network , And determine the reason why the access management network element refuses the second terminal to register in the non-public network according to the fourth indication information.
  • This solution can solve the problem that the second terminal uses the subscription information of the second terminal in the first non-public network to register in the first non-public network, or solves the problem that the second terminal uses the subscription information of the second terminal in the first public network The problem of registering in the first non-public network.
  • FIG. 9 shows another network access method according to an embodiment of the present application, and the method includes:
  • Step 901 is the same as step 801, and will not be repeated here.
  • Step 902 The access management network element determines to reject the second terminal from registering in the first non-public network.
  • step 902 may be implemented in the following manner: the access management network element determines to reject the second terminal from registering in the first non-public network according to the configuration information or the subscription information of the second terminal in the first non-public network.
  • the access management network element determines to reject the second terminal from registering in the first non-public network.
  • the access management network element determines to reject the second terminal in the first non-public network. Register in the network.
  • Step 903 is the same as step 802, and will not be repeated here.
  • the method provided in the embodiment of the present application may further include step 904 after step 903, or the method provided in the embodiment of the present application may further include step 905 and step 904 after step 904.
  • 906 :
  • Step 904 The access management network element sends a fourth message to the second terminal.
  • the second terminal receives a fourth message from the access management network element, where the fourth message includes the network candidate list of the second terminal.
  • the network candidate list includes information of the first non-public network.
  • the network candidate list in the embodiment of the present application includes the information of the first non-public network, it means that the second terminal can register in the first public network.
  • the network candidate list including the information of the first non-public network can also be replaced with: the record item corresponding to the first public network included in the network candidate list is in an active state.
  • the network candidate list of the second terminal includes one or more candidate non-public networks that the second terminal can choose to access.
  • the first non-public network belongs to the one or more candidate non-public networks.
  • the second terminal can determine that although the second terminal uses the subscription information of the second terminal in the first version of the first non-public network to register in the first non-public network and is rejected, the second terminal is rejected The terminal can register in the first non-public network.
  • Step 905 The access management network element sends a fifth message to the second terminal.
  • the second terminal receives the fifth message from the access management network element. Register in the network.
  • the fifth message includes an acceptance instruction, and the acceptance instruction is used to indicate that the second terminal is accepted to register in the first non-public network.
  • Step 906 The second terminal adds the information of the first non-public network to the network candidate list of the second terminal according to the fifth message.
  • step 906 in the embodiment of the present application can also be described as: the second terminal updates the network ban list of the second terminal according to the fifth message.
  • the updated network banned list includes the information of the first non-public network.
  • the second terminal can determine that although the second terminal uses the subscription information of the second terminal in the first version of the first non-public network to register in the first non-public network, the registration in the first non-public network is rejected, But the second terminal can register in the first non-public network.
  • the method provided in the embodiment of the present application may further include:
  • Step 907 The second terminal uses the second contract information of the second terminal to register in the first non-public network according to the fourth instruction information, and the second contract information is the contract information of the second terminal in the first public network.
  • the second subscription information includes an identifier of the first public network, and the second subscription information includes a fifth identifier of the second terminal, and the fifth identifier is related to the identifier of the first public network.
  • the fourth indication information may also be used to instruct the second terminal to use the roaming architecture to register in the first non-public network.
  • the fourth indication information may also be used to instruct the second terminal to use the second subscription information of the second terminal to register in the first non-public network, which is not limited in this embodiment of the application.
  • the embodiment of the present application provides a network access method, in which a second terminal uses first subscription information to send a first message to an access management network element in a first non-public network, where the first subscription information is the second The contract information of the terminal in the first non-public network. After that, the second terminal receives the second message from the access management network element, so that the subsequent second terminal can determine according to the second message that the access network management network element in the first non-public network refuses the second terminal to register in the non-public network , And determine the reason why the access management network element refuses the second terminal to register in the non-public network according to the fourth indication information.
  • the second terminal may use the second contract information of the second terminal to register in the first non-public network according to the reason.
  • This solution can realize that the second terminal uses the second terminal's subscription information in the first non-public network to register in the first non-public network after the registration in the first non-public network is rejected, and then uses the second contract information to register in the first non-public network.
  • the first subscription information is the subscription information of the second terminal in the first public network, which means that the first subscription information is the subscription information of the second terminal in the second version of the first public network.
  • the first non-public network to be registered by the second terminal is the first non-public network of the first version.
  • the first public network that communicates with the first non-public network of the first version is the first public network of the first version.
  • the fourth indication information is used to indicate that the second terminal is an illegal terminal.
  • the fourth indication information is used to indicate that the non-public network cannot identify the identity of the second terminal.
  • FIG. 10 shows another network access method according to an embodiment of the present application, and the method includes:
  • Step 1001 is the same as step 801, and will not be repeated here.
  • Step 1002 The access management network element determines to reject the second terminal from registering in the first non-public network.
  • step 1002 can be implemented in the following manner: the access management network element cannot obtain the subscription information of the second terminal or cannot identify the identity of the second terminal, that is, the authentication of the second terminal fails. Register in the first non-public network.
  • Step 1003 is the same as step 802, and will not be repeated here.
  • the second message is also used to instruct the second terminal to use the third subscription information to request registration in the first non-public network.
  • the method provided in this embodiment of the present application is After 1003, it can also include:
  • Step 1004 The second terminal uses the third subscription information to request registration in the first non-public network.
  • the third subscription information is the subscription information between the second terminal and the first non-public network of the first version.
  • the third subscription information includes a fourth identifier of the second terminal, and the fourth identifier is related to the first non-public network.
  • the fourth identifier includes information about the first non-public network.
  • the identification of the first non-public network for the content of the identification of the first non-public network, reference may be made to the descriptions elsewhere in the embodiment of the present application, which will not be repeated here.
  • step 1004 in the embodiment of the present application can be implemented in the following manner: the second terminal sends a registration request message to the access management network element in the first version of the non-public network, and the registration request message is used To request to register the second terminal in the first version of the non-public network.
  • the registration request message includes the fourth identifier of the second terminal.
  • the fourth identifier of the second terminal is determined by the third subscription information. In other words, the fourth identifier of the second terminal includes information about the first non-public network.
  • the method provided in this embodiment of the present application may further include: the second terminal uses the second terminal in the first The subscription information in the public network requests registration in the first public network of the first version.
  • the second message in step 1003 in Example 2 may also include instruction information for instructing the second terminal to use the third subscription information to request registration in the first non-public network.
  • the embodiment of the present application provides a network access method, in which a second terminal uses first subscription information to send a first message to an access management network element in a first non-public network, where the first subscription information is the second The contract information of the terminal in the first public network.
  • the second terminal receives the second message from the access management network element, so that the subsequent second terminal can determine according to the second message that the access network management network element in the first non-public network refuses the second terminal to register in the non-public network , And determining, according to the fourth indication information, that the reason why the access management network element refuses the second terminal to register in the non-public network is that the second terminal is an illegal terminal.
  • the second terminal may use the third subscription information of the second terminal to register in the first non-public network according to the reason.
  • This solution can realize that the second terminal uses the subscription information of the second terminal in the first public network to register in the first non-public network after being rejected, and then uses the third contract information to register in the first non-public network.
  • Figure 11 uses the first terminal as a non-SNPN device, and the first non-public network is the R17 version of SNPN (hereinafter referred to as R17 SNPN, which corresponds to the non-public network in Figure 5b).
  • Network 100 the access management network element is the SNPN AMF network element in R17 SNPN (corresponding to the AMF network element 1 in Figure 5b), the access network equipment is SNPN RAN, and the public network is the R17 version of the PLMN (hereinafter referred to as: R17 PLMN, corresponding to the public network 200 in Figure 5b), the unified data management network element is the UDM network element in Figure 5b as an example, the method includes:
  • Step 1101 the non-SNPN device sends a registration request message to the SNPN AMF network element, and correspondingly, the SNPN AMF network element receives the registration request message from the non-SNPN device.
  • the registration request message is used to request registration of non-SNPN devices in R17 SNPN.
  • the registration request message carries the identification of the non-SNPN device.
  • the identification of a non-SNPN device can be SUPI or SUCI.
  • Step 1101 can be implemented in the following manner: the non-SNPN device sends a registration request message to the SNPN AMF network element through the SNPN RAN in the R17 SNPN.
  • the SNPN AMF network element may also receive the R17 SNPN identifier from the SNPN RAN, and the R17 SNPN identifier is used to identify the R17 SNPN.
  • the SUPI or SUCI of the non-SNPN device contains the HPLMN ID of the non-SNPN device. The HPLMN ID is used to determine the home public network corresponding to the non-SNPN device.
  • Step 1102 If the R17 SNPN and R17 PLMN do not support roaming intercommunication, the SNPN AMF network element sends a registration rejection message 1 to the non-SNPN device, and accordingly, the non-SNPN device receives the registration rejection message 1 from the SNPN AMF network element.
  • the registration rejection message 1 is used to indicate that the non-SNPN device is rejected to register in R17 SNPN, and the registration rejection message 1 can also carry the reason that the non-SNPN device is rejected to register in R17 SNPN: the non-SNPN device is an illegal terminal ( Illegal UE).
  • Step 1103. If the R17 SNPN and R17 PLMN support roaming intercommunication, the SNPN AMF network element sends a contract acquisition request message to the UDM network element in the R17 PLMN, and the UDM network element receives the contract acquisition request from the SNPN AMF network element accordingly. information. Among them, the subscription acquisition request message is used to request subscription data of non-SNPN devices.
  • the subscription acquisition request message carries the R17 SNPN identifier and the identifier of the non-SNPN device.
  • the R17 SNPN identifier By carrying the R17 SNPN identifier in the contract acquisition request message, it is convenient for the UDM network element to determine the non-public network that the non-SNPN device should access.
  • step 1103 can be implemented in the following manner: the SNPN AMF network element sends a subscription acquisition request message to the V-SEPP in the R17 SNPN. After that, the V-SEPP sends the acquired subscription acquisition request message to the H-SEPP in the R17 PLMN, so that the H-SEPP forwards the subscription acquisition request message to the UDM network element.
  • Step 1104 The UDM network element sends a contract acquisition response message to the SNPN AMF network element.
  • the SNPN AMF network element receives the contract acquisition response message from the UDM network element.
  • the contract acquisition response message is used for the SNPN AMF network element to determine to reject the non-SNPN
  • the device is registered in R17 SNPN.
  • step 1104 can be implemented in the following manner: the UDM network element sends a subscription acquisition response message to the H-SEPP in the R17 PLMN. After that, the H-SEPP sends the acquired subscription acquisition response message to the V-SEPP in R17 SNPN, so that the V-SEPP sends the subscription acquisition response message to the SNPN AMF network element in R17 SNPN.
  • the subscription acquisition response message carries subscription data of the non-SNPN device, and the subscription data includes second indication information.
  • the second indication information is used to indicate that the non-SNPN device can only access through the public network.
  • the second indication information is used to indicate that the non-SNPN device cannot access through the non-public network.
  • the second indication information includes a list of networks supported by the non-SNPN device. Among them, the list of networks supported by the non-SNPN device does not include the R17 SNPN information. Or the record item corresponding to the R17 SNPN in the network list supported by the non-SNPN device is used to indicate that the R17 SNPN is forbidden to access.
  • the subscription acquisition response message includes third indication information, which is used to indicate that the subscription data of the non-SNPN device has not been successfully acquired.
  • the subscription acquisition response message includes a reason value, and the reason value is used to indicate that the non-SNPN device is not allowed to access in the R17SNPN.
  • the subscription acquisition response message does not include the subscription data of the non-SNPN device.
  • Step 1105 The SNPN AMF network element determines to reject the registration of the non-SNPN device in the R17 SNPN according to the contract acquisition response message.
  • Step 1106 The SNPN AMF network element sends a registration rejection message 2 to the non-SNPN device, and correspondingly, the non-SNPN device receives a registration rejection message 2 from the SNPN AMF network element.
  • the registration rejection message 2 is used to indicate that non-SNPN devices are rejected to register in R17 SNPN.
  • the registration rejection message 2 may also carry the reason for rejecting the registration of the non-SNPN device in R17 SNPN. For example, the reason for rejecting the registration of a non-SNPN device in the R17 SNPN is that the non-SNPN device is not allowed to access the R17 SNPN.
  • Step 1107 The non-SNPN device adds the R17 SNPN information to the network ban list of the non-SNPN device.
  • step 1107 can also be implemented in the following manner: the non-SNPN device updates the network ban list of the non-SNPN device.
  • the updated network ban list of non-SNPN devices includes R17 SNPN information.
  • the information of R17 SNPN is used to identify R17 SNPN.
  • the information of R17 SNPN may be the identification of R17 SNPN.
  • the network ban list includes one or more networks that the non-SNPN device is prohibited from accessing, and the one or more networks include the aforementioned R17 SNPN.
  • the method provided in the embodiment of the present application may further include after step 1107:
  • Step 1108 The non-SNPN device performs network selection according to the network ban list to select a network except the network ban list for registration.
  • step 1101 and step 1102 can form a separate embodiment to solve the problem of non-SNPN interoperability when roaming architecture intercommunication is not supported between R17 SNPN and R17 PLMN.
  • Steps 1101, steps 1103 to 1108 can form a separate embodiment to solve the problem of non-SNPN devices accessing R17 SNPN in the case of supporting roaming architecture intercommunication between R17 SNPN and R17 PLMN.
  • the registration request message in the embodiment shown in FIG. 11 may correspond to the first message in the embodiment shown in FIG. 6.
  • the subscription acquisition response message may correspond to the third message in the embodiment shown in FIG. 6 above.
  • the registration rejection message 2 may correspond to the second message in the embodiment shown in FIG. 6 above.
  • the subscription acquisition request message may correspond to the query message in the embodiment shown in FIG. 6 above.
  • the reason for rejecting the registration of the non-SNPN device in R17 SNPN may correspond to the first indication information in the embodiment shown in FIG. 6.
  • Figure 12 shows a specific embodiment of another network access method of the present application.
  • the first non-public network is R17 SNPN
  • the access network device is SNPN RAN
  • the second terminal is an SNPN device as an example
  • the method includes:
  • Step 1201 R17 SNPN RAN in the SNPN sends broadcast information, and correspondingly, the SNPN device receives the broadcast information from the SNPN RAN.
  • the broadcast information includes an interworking indication, which is used to indicate that R17 SNPN and R17 PLMN support interworking.
  • the SNPN device is located within the coverage of R17 SNPN, and the SNPN device can receive broadcast information from the SNPN RAN.
  • Step 1202 the SNPN device determines to use the contract information between the SNPN device and the R17 PLMN to access the R17 SNPN and R17 PLMN according to the interworking instruction in the broadcast information.
  • step 1202 can be implemented in the following manner: the SNPN device according to the interoperability instruction in the broadcast information, Determine to use the target contract information between the SNPN device and the target R17 PLMN to access the R17 SNPN and R17 PLMN.
  • the target R17 PLMN belongs to the one or more R17 PLMNs.
  • the embodiment shown in FIG. 12 may further include after step 1202: the SNPN device sends a registration request message to the SNPN AMF network element in the R17 SNPN through the SNPN RAN in the R17 SNPN , So please register in this R17 SNPN.
  • the registration request message carries the identification of the SNPN device described in the target subscription information, and the identification of the SNPN device described in the target subscription information includes the R17 PLMN identification.
  • the SNPN AMF network element allows the SNPN device to register in R17 SNPN
  • the SNPN AMF network element sends a registration acceptance message to the SNPN device.
  • Figure 13 uses the second terminal as the SNPN device, the first non-public network is the R17 version of SNPN (hereinafter referred to as R17 SNPN), and the access management network element is the SNPN in R17 SNPN
  • the AMF network element, the access network equipment is SNPN RAN, the first public network is the R17 version of the PLMN (hereinafter referred to as R17 PLMN), and the unified data management network element is the UDM network element.
  • Step 1301. The SNPN device uses the subscription information 1 to send a registration request message to the SNPN AMF network element, and correspondingly, the SNPN AMF network element receives the registration request message from the SNPN device.
  • the registration request message includes the identification 1 of the SNPN device.
  • the SNPN device shown in Figure 13 and Figure 14 may be an R16 SNPN device.
  • the so-called R16 SNPN device refers to the SNPN device that has private network subscription information with the R16 version of SNPN, and also has the same PLMN version with the R16 version.
  • the aforementioned subscription information 1 may be private network subscription information between the SNPN device and the R16 version of the SNPN.
  • the private network subscription information between the SNPN device and the R16 version of SNPN includes the identification 1 of the SNPN device.
  • the identification 1 of the SNPN device includes the identification of the R16 version SNPN.
  • Step 1302 the SNPN AMF network element determines that the SNPN device cannot pass the security authentication.
  • the SNPN AMF network element determines that the SNPN device cannot pass the safety certification.
  • Step 1303 The SNPN AMF network element sends a registration rejection message 11 to the SNPN device, and correspondingly, the SNPN device receives a registration rejection message 11 from the SNPN AMF network element.
  • the registration rejection message 11 is used to indicate that the SNPN device is rejected to register in R17 SNPN.
  • the registration rejection message 11 may also carry the reason indicating that the SNPN device is rejected to register in R17 SNPN: the SNPN device is an illegal terminal, that is, the SNPN cannot recognize the identity of the SNPN device.
  • SNPN AMF network elements are obtained through the AMF network element upgrade in R16 SNPN, and the operator policy does not support N3IWF mode, that is, R17 SNPN and R17 PLMN do not support interworking in N3IWF mode, while R17 SNPN and R17 PLMN support roaming mode Intercommunication.
  • Step 1304 The SNPN AMF network element determines that the SNPN device uses the roaming mode to register in the R17 SNPN according to the contract information 1 of the SNPN device and the operator policy.
  • Step 1305 The SNPN AMF network element sends a registration rejection message 12 to the SNPN device.
  • the SNPN device receives a registration rejection message 12 from the SNPN AMF network element.
  • the registration rejection message 12 is used to indicate that the SNPN device is rejected to register in R17 SNPN.
  • the registration rejection message 12 may also carry the reason for rejecting the registration of the SNPN device in the R17 SNPN: the private network subscription information between the SNPN device and the R16 version of the SNPN is unavailable.
  • the registration rejection message 12 may also carry indication information y for instructing the SNPN device to use the roaming architecture to register in R17 SNPN.
  • the indication information y is used to facilitate the SNPN device to determine to use the public network.
  • the signing information is registered in R17 SNPN.
  • Step 1306 The SNPN device uses the public network subscription information to register in R17 SNPN according to the reason for rejecting the SNPN device to register in R17 SNPN.
  • step 1306 it may also include: the SNPN AMF network element sends a network candidate list to the SNPN device, and the network candidate list includes R17 SNPN information.
  • the SNPN AMF network element sends a fourth message to the SNPN device, the fourth message is used to instruct the SNPN device to add R17 SNPN to the network candidate list.
  • the SNPN device adds the R17 SNPN information to the network candidate list according to the fourth message.
  • Step 1307 The SNPN AMF network element determines that the SNPN device can use the N3IWF mode to register in the R17 SNPN according to the contract information 1 of the SNPN device and the operator policy.
  • Step 1308 The SNPN AMF network element sends a registration acceptance message to the SNPN device, and correspondingly, the SNPN device receives the registration acceptance message from the SNPN AMF network element.
  • the registration acceptance message indicates that the SNPN device is allowed to register in R17 SNPN.
  • Figure 14 uses the second terminal as the SNPN device, the first non-public network is the R17 version of SNPN (hereinafter referred to as R17 SNPN), and the access management network element is the SNPN in R17 SNPN
  • the AMF network element, the access network equipment is SNPN RAN, the first public network is the R17 version of the PLMN (hereinafter referred to as R17 PLMN), and the unified data management network element is the UDM network element.
  • a specific embodiment of a network access method the method includes:
  • Step 1401 The SNPN device uses the contract information 2 to send a registration request message to the SNPN AMF network element, and correspondingly, the SNPN AMF network element receives the registration request message from the SNPN device.
  • the registration request message includes the identification 2 of the SNPN device.
  • the SNPN AMF network element can also obtain the R17 SNPN identifier from the SNPN RAN.
  • the identity 2 of the SNPN device includes the identity of the HPLMN corresponding to the SNPN device.
  • the subscription information 2 is the public network subscription information between the SNPN device and the R16 version of the PLMN.
  • Step 1402. If the R17 SNPN does not support the HPLMN intercommunication corresponding to the SNPN device, the SNPN AMF network element determines that the SNPN device cannot pass the security authentication.
  • Step 1403 The SNPN AMF network element sends a registration rejection message 21 to the SNPN device.
  • the SNPN device receives a registration rejection message 21 from the SNPN AMF network element.
  • the registration rejection message 21 is used to indicate that the SNPN device is rejected to register in R17 SNPN.
  • the registration rejection message 21 may also carry the reason indicating that the SNPN device is rejected to register in R17 SNPN: the SNPN device is an illegal terminal.
  • Step 1404 If the R17 SNPN supports the HPLMN intercommunication corresponding to the SNPN device, the SNPN AMF network element sends a registration acceptance message to the SNPN device, and correspondingly, the SNPN device receives the registration acceptance message from the SNPN AMF network element.
  • the registration acceptance message indicates that the SNPN device is allowed to register in R17 SNPN.
  • the SNPN AMF network element may also send configuration information to the SNPN device, and the configuration information is used by the SNPN device to determine the Network candidate list of SNPN equipment.
  • the network candidate list includes the R17 SNPN information.
  • the contract information 2 in the embodiment described in FIG. 14 corresponds to the first contract information in the foregoing embodiment as the contract information of the second terminal in the first non-public network.
  • the registration request message corresponds to the above-mentioned first message.
  • the registration rejection message 21 corresponds to the second message in the embodiment described in FIG. 9 above.
  • Figure 15 takes the first terminal as a non-SNPN device, and the first non-public network is an R16 version of SNPN (hereinafter referred to as R16SNPN, corresponding to the non-public network 100 in Figure 5a).
  • the incoming management network element is the SNPN AMF network element in R16 SNPN (corresponding to AMF network element 1 in Figure 5a)
  • the access network equipment is SNPN RAN
  • the first public network is the R16 version of PLMN (hereinafter referred to as R16 PLMN,
  • the unified data management network element is a UDM network element, and the method includes:
  • Step 1501 The non-SNPN device sends a registration request message to the SNPN AMF network element.
  • the SNPN AMF network element receives the registration request message from the non-SNPN device.
  • the registration request message is used to request registration of non-SNPN devices in R16 SNPN.
  • the registration request message carries the identification of the non-SNPN device.
  • the identification of a non-SNPN device can be SUPI or SUCI.
  • step 1501 can be implemented in the following manner: the non-SNPN device sends a registration request message to the SNPN AMF network element through the SNPN RAN in the R16 SNPN.
  • the SNPN AMF network element can also receive the R16 SNPN identifier from the SNPN RAN, and the R16 SNPN identifier is used to identify the R16 SNPN.
  • the SUPI or SUCI of the non-SNPN device contains the HPLMN ID of the non-SNPN device. The HPLMN ID is used to determine the home public network corresponding to the non-SNPN device.
  • Step 1502 if the R16 SNPN and the R16 PLMN do not support roaming intercommunication, the SNPN AMF network element determines that the non-SNPN device cannot pass the security authentication.
  • Step 1503 The SNPN AMF network element sends a registration rejection message 1 to the non-SNPN device, and correspondingly, the non-SNPN device receives the registration rejection message 1 from the SNPN AMF network element.
  • the registration rejection message 1 indicates that the non-SNPN device is rejected to register in R16 SNPN.
  • the registration rejection message 1 may also carry the reason for rejecting the registration of the non-SNPN device in R16 SNPN: the non-SNPN device is an illegal terminal.
  • Figure 16 uses the second terminal as the SNPN device, the non-public network of the SNPN device is the R16 version of SNPN (hereinafter referred to as R16SNPN), and the access management network element is the SNPN AMF in R16 SNPN
  • the network element, the access network equipment is SNPN RAN, the public network of SNPN equipment is the R16 version of PLMN (hereinafter referred to as R16 PLMN), and the unified data management network element is the UDM network element as an example.
  • the method includes:
  • the SNPN device uses the contract information 3 to send a registration request message to the SNPN AMF network element, and correspondingly, the SNPN AMF network element receives the registration request message from the SNPN device.
  • the registration request message includes the identification 3 of the SNPN device.
  • the SNPN device shown in FIG. 16 and FIG. 17 may be an R17 SNPN device.
  • the so-called R17 SNPN device refers to the contract information between the SNPN device and the R17 version of the PLMN, that is, the aforementioned contract information 3.
  • the identification 3 of the SNPN device in step 1601 includes the HPLMN ID corresponding to the SNPN device.
  • Step 1602 if the R16 SNPN and the R16 PLMN do not support roaming and intercommunication, the SNPN AMF network element cannot resolve the SNPN device identity 3, and it is determined that the SNPN device cannot pass the security authentication.
  • Step 1603 The SNPN AMF network element sends a registration rejection message 11 to the SNPN device, and correspondingly, the SNPN device receives a registration rejection message 11 from the SNPN AMF network element.
  • the registration rejection message 11 is used to indicate that the SNPN device is rejected to register in R17 SNPN.
  • the registration rejection message 11 may also carry the reason indicating that the SNPN device is rejected to register in R17 SNPN: the SNPN device is an illegal terminal.
  • Step 1604 If the SNPN device still has subscription information 4, when an available SNPN is detected, the SNPN device can also use the subscription information 4 to initiate a registration request message to the SNPN AMF network element.
  • the subscription information 4 is the subscription information between the SNPN device and the R16 SNPN. In another example, the subscription information 4 is the subscription information between the SNPN device and the R17 SNPN.
  • the subscription information 4 includes the identity 4 of the SNPN device, and the identity 4 of the SNPN device is related to the identity of the SNPN.
  • the identification 4 of the SNPN device includes the identification of the SNPN.
  • the registration request message in step 1604 carries the identification 4 of the SNPN device.
  • Step 1605 The SNPN device uses the N3IWF mode to access the R16 SNPN and R16 PLMN.
  • step 1605 For the specific implementation of step 1605, reference may be made to the description in the prior art, which will not be repeated here.
  • the SNPN device can use N3IWF mode to access R16 SNPN and R16 PLMN.
  • the so-called SNPN device can use the N3IWF mode to access R16 SNPN and R16 PLMN means that the SNPN device can use private network subscription information to request registration in the R16 SNPN. After the SNPN device is successfully registered in the R16 SNPN, the SNPN device can use the public network contract information between the SNPN device and the R16 PLMN to request registration in the R16 PLMN.
  • the subscription information 4 in the embodiment described in FIG. 16 may be the third subscription information of the above-mentioned second terminal in the first non-public network.
  • the subscription information 3 may be that the first subscription information in the foregoing embodiment is the subscription information of the second terminal in the first public network.
  • the registration request message may be the above-mentioned first message.
  • the registration rejection message 11 corresponds to the second message in the embodiment described in FIG. 10 above.
  • each network element such as the first terminal, the second terminal, the access management network element, the unified data management network element, the access network equipment, etc., in order to achieve the above functions, includes the corresponding structure and structure for performing each function. / Or software module.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
  • the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network device can be divided into functional units according to the above-mentioned method examples.
  • each functional unit can be divided corresponding to each function. It is also possible to integrate two or more functions into one processing unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit. It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • the method of the embodiment of the present application is described above in conjunction with FIG. 6 to FIG. 16, and the communication device provided in the embodiment of the present application for performing the foregoing method is described below. Those skilled in the art can understand that the methods and devices can be combined and quoted with each other.
  • the communication device provided in the embodiments of the present application can perform the analysis methods described above by the first terminal, the second terminal, the access management network element, and the unified data management network element. , Steps performed by the access network equipment.
  • FIG. 17 shows the communication device involved in the foregoing embodiment, and the communication device may include: a communication module 113 and a processing module 112.
  • the communication device may further include a storage module 111 for storing program codes and data of the communication device.
  • the communication device is the first terminal or a chip applied in the first terminal.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
  • the communication module 113 is configured to perform the signal transceiving operation of the first terminal in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the first terminal in the foregoing method embodiment.
  • the communication module 113 is configured to execute the sending action performed by the first terminal in step 601 of FIG. 6 in the foregoing embodiment.
  • the communication module 113 is configured to execute the receiving action performed by the first terminal in step 604 of FIG. 6 in the foregoing embodiment.
  • the processing module 112 is configured to support the communication device to perform the action performed by the first terminal in step 605 in FIG. 6.
  • the communication device is an access management network element, or a chip applied to an access management network element.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, the first terminal or the unified data management network element).
  • the communication module 113 is configured to perform the signal transceiving operation of the access management network element in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the access management network element in the foregoing method embodiment.
  • the communication module 113 is configured to execute the receiving actions performed by the access management network element in step 601 and step 603 of FIG. 6 in the foregoing embodiment.
  • the communication module 113 is configured to execute the sending actions performed by the access management network element in step 602 and step 604 of FIG. 6 in the foregoing embodiment.
  • the communication device is a unified data management network element, or a chip applied to a unified data management network element.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
  • the communication module 113 is configured to perform the signal transceiving operation of the unified data management network element in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the unified data management network element in the foregoing method embodiment.
  • the communication module 113 is configured to perform the receiving action performed by the unified data management network element in step 602 of FIG. 6 in the foregoing embodiment.
  • the communication module 113 is configured to execute the sending action performed by the unified data management network element in step 603 of FIG. 6 in the foregoing embodiment.
  • the communication device is a second terminal or a chip applied to the second terminal.
  • the communication module 113 is used to support the communication device to communicate with external network elements (for example, access network equipment).
  • the communication module 113 is configured to perform the signal transceiving operation of the second terminal in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the second terminal in the foregoing method embodiment.
  • the communication module 113 is configured to execute the receiving action performed by the second terminal in step 701 of FIG. 7 in the foregoing embodiment.
  • the processing module 112 is configured to support the communication device to perform the action performed by the second terminal in step 702 in FIG. 7.
  • the communication device is a second terminal or a chip applied to the second terminal.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
  • the communication module 113 is configured to perform the signal transceiving operation of the second terminal in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the second terminal in the foregoing method embodiment.
  • the communication module 113 is configured to execute the sending action performed by the second terminal in step 801 of FIG. 8 in the foregoing embodiment.
  • the communication module 113 is configured to execute the receiving action performed by the second terminal in step 802 of FIG. 8 in the foregoing embodiment.
  • the communication module 113 is configured to perform the receiving action performed by the second terminal in step 904 and step 905 in FIG. 9 of the foregoing embodiment.
  • the processing module 112 is configured to support the communication device to execute the actions performed by the second terminal in step 906 and step 907 in FIG. 9.
  • the processing module 112 is configured to support the communication device to perform the action performed by the second terminal in step 1004 in FIG. 10.
  • the communication device is an access management network element, or a chip applied to an access management network element.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, a second terminal).
  • the communication module 113 is configured to perform the signal transceiving operation of the access management network element in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the access management network element in the foregoing method embodiment.
  • the communication module 113 is configured to execute the receiving action performed by the access management network element in step 801 of FIG. 8 in the foregoing embodiment.
  • the communication module 113 is configured to execute the sending action performed by the access management network element in step 802 of FIG. 8 in the foregoing embodiment.
  • the processing module 112 is configured to support the communication device to perform the action performed by the access management network element in step 902 in FIG. 9.
  • the communication module 113 is configured to execute the sending action performed by the access management network element in step 904 or step 905 in FIG. 9 of the foregoing embodiment.
  • processing module 112 is configured to support the communication device to perform the action performed by the access management network element in step 1002 in FIG. 10.
  • the communication module 113 shown in FIG. 17 can also be replaced by a communication unit, and the processing module 112 can also be replaced with reference to the processing unit.
  • the storage module 111 can also be replaced by a storage unit.
  • the processing unit is used to control and manage the actions of the communication device. For example, the processing unit is used to perform information/data processing steps on the communication device.
  • the communication unit is used to support the communication device to send or receive information/data.
  • the communication unit may include a receiving unit and a sending unit, the receiving unit is used for receiving signals, and the sending unit is used for sending signals.
  • the processing module 112 may be a processor or a controller, for example, a central processing unit, a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic devices, transistor logic devices, Hardware components or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of this application.
  • the processor may also be a combination of computing functions, for example, a combination of one or more microprocessors, a combination of a digital signal processor and a microprocessor, and so on.
  • the communication module can be a transceiver, a transceiver circuit, or a communication interface.
  • the storage module may be a memory.
  • the processing module 112 is the processor 1801 or the processor 1805
  • the communication module 113 is the communication interface 1803
  • the storage module 111 is the memory 1802
  • the communication device involved in this application may be the communication device shown in FIG. 18.
  • FIG. 18 is a schematic diagram of the hardware structure of a communication device provided by an embodiment of the application.
  • the communication device includes a processor 1801, a communication line 1804, and at least one communication interface (in FIG. 18, the communication interface 1803 is taken as an example for illustration).
  • the processor 1801 can be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of this application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the communication line 1804 may include a path to transmit information between the above-mentioned components.
  • the communication interface 1803 is used to exchange information with other devices.
  • any device such as a transceiver is used to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), and wireless Local area network (wireless local area networks, WLAN), etc.
  • RAN radio access network
  • WLAN wireless Local area network
  • the communication device may further include a memory 1802.
  • the memory 1802 can be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory can exist independently and is connected to the processor through a communication line 1804. The memory can also be integrated with the processor.
  • the memory 1802 is used to store computer-executable instructions for executing the solution of the present application, and the processor 1801 controls the execution.
  • the processor 1801 is configured to execute computer-executable instructions stored in the memory 1802, so as to implement a network access method provided in the following embodiments of the present application.
  • the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
  • the processor 1801 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 18.
  • the communication device may include multiple processors, such as the processor 1801 and the processor 1805 in FIG. 18.
  • processors can be a single-CPU (single-CPU) processor or a multi-core (multi-CPU) processor.
  • the processor here may refer to one or more devices, circuits, and/or processing cores for processing data (for example, computer program instructions).
  • the communication device is a first terminal or a chip applied in the first terminal.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
  • the communication module 113 is configured to perform the signal transceiving operation of the first terminal in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the first terminal in the foregoing method embodiment.
  • the communication module 113 is configured to execute the sending action performed by the first terminal in step 601 of FIG. 6 in the foregoing embodiment.
  • the communication module 113 is configured to execute the receiving action performed by the first terminal in step 604 of FIG. 6 in the foregoing embodiment.
  • the processing module 112 is configured to support the communication device to perform the action performed by the first terminal in step 605 in FIG. 6.
  • the communication device is an access management network element, or a chip applied to an access management network element.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, the first terminal or the unified data management network element).
  • the communication module 113 is configured to perform the signal transceiving operation of the access management network element in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the access management network element in the foregoing method embodiment.
  • the communication module 113 is configured to execute the receiving actions performed by the access management network element in step 601 and step 603 of FIG. 6 in the foregoing embodiment.
  • the communication module 113 is configured to execute the sending actions performed by the access management network element in step 602 and step 604 of FIG. 6 in the foregoing embodiment.
  • the communication device is a unified data management network element, or a chip applied to a unified data management network element.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
  • the communication module 113 is configured to perform the signal transceiving operation of the unified data management network element in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the unified data management network element in the foregoing method embodiment.
  • the communication module 113 is configured to perform the receiving action performed by the unified data management network element in step 602 of FIG. 6 in the foregoing embodiment.
  • the communication module 113 is configured to execute the sending action performed by the unified data management network element in step 603 of FIG. 6 in the foregoing embodiment.
  • the communication device is a second terminal or a chip applied to the second terminal.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access network device).
  • the communication module 113 is configured to perform the signal transceiving operation of the second terminal in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the second terminal in the foregoing method embodiment.
  • the communication module 113 is configured to execute the receiving action performed by the second terminal in step 701 of FIG. 7 in the foregoing embodiment.
  • the processing module 112 is configured to support the communication device to perform the action performed by the second terminal in step 702 in FIG. 7.
  • the communication device is a second terminal or a chip applied to the second terminal.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
  • the communication module 113 is configured to perform the signal transceiving operation of the second terminal in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the second terminal in the foregoing method embodiment.
  • the communication module 113 is configured to execute the sending action performed by the second terminal in step 801 of FIG. 8 in the foregoing embodiment.
  • the communication module 113 is configured to execute the receiving action performed by the second terminal in step 802 of FIG. 8 in the foregoing embodiment.
  • the communication module 113 is configured to perform the receiving action performed by the second terminal in step 904 and step 905 in FIG. 9 of the foregoing embodiment.
  • the processing module 112 is configured to support the communication device to perform step 906 and the actions performed by the second terminal in step 907 in FIG. 9.
  • the processing module 112 is configured to support the communication device to perform the action performed by the second terminal in step 1004 in FIG. 10.
  • the communication device is an access management network element, or a chip applied to the access management network element.
  • the communication module 113 is used to support the communication device to communicate with an external network element (for example, the second terminal).
  • the communication module 113 is configured to perform the signal transceiving operation of the access management network element in the foregoing method embodiment.
  • the processing module 112 is configured to perform the signal processing operation of the access management network element in the foregoing method embodiment.
  • the communication module 113 is configured to execute the receiving action performed by the access management network element in step 801 of FIG. 8 in the foregoing embodiment.
  • the communication module 113 is configured to execute the sending action performed by the access management network element in step 802 of FIG. 8 in the foregoing embodiment.
  • the processing module 112 is configured to support the communication device to perform the action performed by the access management network element in step 902 in FIG. 9.
  • the communication module 113 is configured to execute the sending action performed by the access management network element in step 904 or step 905 in FIG. 9 of the foregoing embodiment.
  • processing module 112 is configured to support the communication device to perform the action performed by the access management network element in step 1002 in FIG. 10.
  • FIG. 19 is a schematic structural diagram of a chip 190 provided by an embodiment of the present application.
  • the chip 190 includes one or more (including two) processors 1910 and a communication interface 1930.
  • the chip 190 further includes a memory 1940.
  • the memory 1940 may include a read-only memory and a random access memory, and provides operation instructions and data to the processor 1910.
  • a part of the memory 1940 may also include a non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the memory 1940 stores the following elements, execution modules or data structures, or their subsets, or their extended sets.
  • the corresponding operation is executed by calling the operation instruction stored in the memory 1940 (the operation instruction may be stored in the operating system).
  • One possible implementation is that the chips used in the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network equipment are similar in structure, and different devices can use different chips to achieve The respective functions.
  • the processor 1910 controls the processing operations of any one of the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network device.
  • the processor 1910 may also be referred to as a central processing unit (central processing unit, CPU).
  • the memory 1940 may include a read-only memory and a random access memory, and provides instructions and data to the processor 1910. A part of the memory 1940 may also include NVRAM.
  • the memory 1940, the communication interface 1930, and the memory 1940 are coupled together through a bus system 1920, where the bus system 1920 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
  • bus system 1920 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
  • various buses are marked as the bus system 1920 in FIG. 19.
  • the method disclosed in the foregoing embodiments of the present application may be applied to the processor 1910 or implemented by the processor 1910.
  • the processor 1910 may be an integrated circuit chip with signal processing capabilities. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 1910 or instructions in the form of software.
  • the aforementioned processor 1910 may be a general-purpose processor, a digital signal processing (digital signal processing, DSP), an ASIC, an off-the-shelf programmable gate array (field-programmable gate array, FPGA) or other programmable logic devices, discrete gates, or transistors. Logic devices, discrete hardware components.
  • DSP digital signal processing
  • ASIC application-the-shelf programmable gate array
  • FPGA field-programmable gate array
  • Logic devices discrete hardware components.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 1940, and the processor 1910 reads the information in the memory 1940, and completes the steps of the foregoing method in combination with its hardware.
  • the communication interface 1930 is used to execute the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network device in the embodiment shown in FIG. 6 to FIG.
  • the processor 1910 is configured to execute the processing steps of the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network device in the embodiments shown in FIGS. 6-16.
  • the above communication module may be a communication interface of the device, which is used to receive signals from other devices.
  • the communication module is a communication interface for the chip to receive signals or send signals from other chips or devices.
  • a computer-readable storage medium stores instructions. When the instructions are executed, the functions executed by the first terminal as shown in FIG. 6 are realized.
  • a computer-readable storage medium stores instructions. When the instructions are executed, the functions performed by the access management network element as shown in FIG. 6 are realized.
  • a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium.
  • the instructions are executed, the functions performed by the unified data management network element as shown in FIG. 6 are realized.
  • a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium. When the instructions are executed, the functions performed by the second terminal as shown in FIG. 7 are realized.
  • a computer-readable storage medium stores instructions. When the instructions are executed, the functions performed by the access network device as shown in FIG. 7 are realized.
  • a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium.
  • the computer-readable storage medium can realize the functions of the second terminal as shown in FIGS. 8-10.
  • a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium.
  • the computer-readable storage medium can realize the functions of accessing management network elements as shown in Figs. 8-10. .
  • a computer program product including instructions is provided.
  • the computer program product includes instructions. When the instructions are executed, the functions executed by the first terminal as shown in FIG. 6 are realized.
  • a computer program product including instructions.
  • the computer program product includes instructions. When the instructions are executed, the functions performed by the access management network element as shown in FIG. 6 are realized.
  • a computer program product including instructions.
  • the computer program product includes instructions. When the instructions are executed, the functions performed by the unified data management network element as shown in FIG. 6 are realized.
  • the computer program product includes instructions. When the instructions are executed, the functions performed by the second terminal as shown in FIG. 7 are realized.
  • the computer program product includes instructions. When the instructions are executed, the functions performed by the access network device as shown in FIG. 7 are realized.
  • the computer program product includes instructions. When the instructions are executed, the functions of the second terminal as shown in Figs. 8-10 are realized.
  • the computer program product includes instructions.
  • the instructions When the instructions are executed, the functions of accessing management network elements as shown in Figs. 8-10 are realized.
  • a chip is provided.
  • the chip is applied to a first terminal.
  • the chip includes at least one processor and a communication interface.
  • the communication interface is coupled to the at least one processor. A function performed by a terminal.
  • an embodiment of the present application provides a chip, which is applied to an access management network element, the chip includes at least one processor and a communication interface, the communication interface is coupled with at least one processor, and the processor is used to run instructions, In order to realize the functions performed by the access management network element as shown in FIG. 6.
  • an embodiment of the present application provides a chip that is applied to a unified data management network element.
  • the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to Realize the functions of unified data management network elements as in 6.
  • an embodiment of the present application provides a chip that is used in a second terminal.
  • the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to implement such as The function of the second terminal in 7.
  • an embodiment of the present application provides a chip that is applied to an access network device.
  • the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to implement The function of the access network equipment as shown in Figure 7.
  • an embodiment of the present application provides a chip that is used in a second terminal.
  • the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to implement such as The functions of the second terminal in Figures 8-10.
  • an embodiment of the present application provides a chip that is applied to an access management network element.
  • the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to Realize the functions of accessing management network elements as shown in Figure 8-10.
  • An embodiment of the present application provides a communication system, which includes: an access management network element and a unified data management network element.
  • the access management network element is used to perform the functions performed by the access management network element in FIG. 6, and the unified data management network element is used to perform the functions performed by the unified data management network element in FIG. 6.
  • the communication system may further include a terminal, and the terminal is configured to perform the function performed by the first terminal in FIG. 6.
  • An embodiment of the present application provides a communication system.
  • the communication system includes: an access network device and a terminal.
  • the terminal is used to perform the function performed by the second terminal in FIG. 7, and the access network device is used to perform the function performed by the access network device in FIG. 7.
  • An embodiment of the present application provides a communication system, which includes: an access management network element and a terminal.
  • the access management network element is used to perform any function performed by the access management network element in FIGS. 8-10
  • the terminal is used to perform any function performed by the second terminal in any one of FIGS. 8-10.
  • the computer program product includes one or more computer programs or instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
  • the computer program or instruction may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer program or instruction may be downloaded from a website, computer, The server or data center transmits to another website site, computer, server or data center through wired or wireless means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center that integrates one or more available media.
  • the usable medium may be a magnetic medium, such as a floppy disk, a hard disk, and a magnetic tape; it may also be an optical medium, such as a digital video disc (digital video disc, DVD); and it may also be a semiconductor medium, such as a solid state drive (solid state drive). , SSD).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种网络的接入方法、装置及系统,涉及通信技术领域,用以解决第一终端尝试接入非公共网络的问题。该方法包括:第一终端向第一非公共网络中的接入管理网元发送第一消息,该第一消息用于请求在第一非公共网络中注册该第一终端。第一终端接收来自接入管理网元的第二消息,该第二消息用于表示拒绝该第一终端在第一非公共网络进行注册,该第二消息包括第一指示信息,第一指示信息表示禁止所述第一终端在第一非公共网络中接入。第一终端根据所述第一指示信息将第一非公共网络的信息加入第一终端的网络禁选列表中。

Description

一种网络的接入方法、装置及系统
本申请要求于2020年05月22日提交国家知识产权局、申请号为202010446009.0、申请名称为“一种网络的接入方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种网络的接入方法、装置及系统。
背景技术
具有接入非公共网络能力或权限的终端(以下简称为私网终端)可以利用非公共网络接入公共网络以进行数据传输。但是在3GPP演进的不同阶段,私网终端接入非公共网络的方式不同。例如,在3GPP的R16阶段,私网终端可以利用该私网终端与非公共网络之间的签约信息请求注册在非公共网络中,私网终端可以利用该私网终端与公共网络之间的签约信息请求注册在公共网络中。而在3GPP的R17阶段,私网终端可以利用该私网终端与公共网络之间的签约信息请求注册在非公共网络中。
但是,目前现有技术中并未记载不具有接入非公共网络能力或权限的终端(以下简称非私网终端)尝试接入3GPP的R16阶段或3GPP的R17阶段中定义的非公共网络时的解决方案。
发明内容
本申请实施例提供一种网络的接入方法、装置及系统,用以解决第一终端尝试接入非公共网络的问题。
为了达到上述目的,本申请实施例提供如下技术方案:
第一方面,本申请实施例提供一种网络的接入方法,包括:第一终端向第一非公共网络中的接入管理网元发送用于请求在第一非公共网络中注册该第一终端的第一消息。第一终端接收来自该接入管理网元的用于表示拒绝第一终端在第一非公共网络进行注册的第二消息。该第二消息包括第一指示信息,该第一指示信息表示禁止第一终端在第一非公共网络中接入。第一终端根据第一指示信息更新第一终端的网络禁选列表。其中,更新后的网络禁选列表中包括第一非公共网络的信息。
应理解,第一终端更新第一终端的网络禁选列表可以得到更新后的网络禁选列表。
本申请实施例提供一种网络的接入方法,该方法中第一终端通过向第一非公共网络中的接入管理网元发送第一消息,以请求在第一非公共网络中注册该第一终端。之后,第一终端接收来自接入管理网元的第二消息,该第二消息表示拒绝第一终端在第一非公共网络进行注册,且第一指示信息表示禁止第一终端在第一非公共网络中接入。以便于第一终端根据第一指示信息更新第一终端的网络禁选列表,使得更新后的网络禁选列表中包括第一非公共网络的信息,后续第一终端在选择网络注册时便可以避免选择被禁止接入的第一非公共网络。该方案可以解决不具有接入非公共网络的权限的第一终端尝试接入第一非公共网络的问题。
在一种可能的实现方式中,本申请实施例中的第一非公共网络支持与第一公共网络互通。
在一种可能的实现方式中,本申请实施例中的第一非公共网络与第一公共网络采用漫游架构互通。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一终端根据更新后的网络禁 选列表选择除第一非公共网络以外的网络进行注册。避免不具有接入非公共网络的权限的第一终端接入第一非公共网络,避免第一终端自动/手动选择被禁止接入的该第一非公共网络。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一终端根据第一指示信息启动定时器,在定时器超时的情况下,第一终端从更新后的网络禁选列表中删除第一非公共网络的信息。以便于后续第一终端继续尝试接入该第一非公共网络。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第二消息包括定时器时间值,该第一终端根据定时器时间值设置定时器。以便于第一终端从第一非公共网络处获取定时器时间值。
在一种可能的实现方式中,第一终端为不具有接入非公共网络能力或权限的终端。
第二方面,本申请实施例提供一种网络的接入方法,包括:第一非公共网络中的接入管理网元接收来自第一终端的用于请求在第一非公共网络中注册第一终端的第一消息。接入管理网元从第一公共网络中的统一数据管理网元处获取第三消息。接入管理网元根据第三消息向第一终端发送用于表示拒绝第一终端在第一非公共网络进行注册的第二消息,该第二消息包括表示禁止第一终端在第一非公共网络中接入的第一指示信息。
该方案中第一非公共网络中的接入管理网元通过接收来自第一终端的用于请求在第一非公共网络中注册第一终端的第一消息,之后接入管理网元根据第三消息向第一终端发送用于表示拒绝第一终端在第一非公共网络进行注册的第二消息,能够避免不具有接入非公共网络的权限的第一终端接入第一非公共网络。
在一种可能的实现方式中,第三消息中包括第一终端的签约数据,该签约数据中包括第二指示信息,一方面,该第二指示信息用于指示第一终端只能通过公共网络接入,或者,另一方面,该第二指示信息用于指示第一终端不能通过非公共网络接入。
在一种可能的实现方式中,第二指示信息包括第一终端支持的网络列表,其中,该网络列表中不包括第一非公共网络的信息。或者该第一终端支持的网络列表中不包括任何非公共网络的信息。
在一种可能的实现方式中,第三消息中包括第三指示信息,该第三指示信息用于指示未成功获取第一终端的签约数据。
在一种可能的实现方式中,第三消息中还包括未成功获取第一终端的签约数据的原因值,该原因值表示不允许第一终端在第一非公共网络中接入。
在一种可能的实现方式中,第三消息未包括第一终端的签约数据。
在一种可能的实现方式中,本申请实施例提供的方法还包括:接入管理网元根据第三消息,确定拒绝第一终端在第一非公共网络中的注册。
在一种可能的实现方式中,接入管理网元根据第三消息,确定拒绝第一终端在第一非公共网络中的注册,包括:接入管理网元根据第二指示信息确定拒绝第一终端在第一非公共网络中的注册。
在一种可能的实现方式中,接入管理网元根据第三消息,确定拒绝第一终端在第一非公共网络中的注册,包括:接入管理网元根据第三指示信息,确定拒绝第一终端在所述第一非公共网络中的注册。
在一种可能的实现方式中,接入管理网元根据第三消息,确定拒绝第一终端在第一非公共网络中的注册,包括:接入管理网元确定第三消息未包括第一终端的签约数据,则确定拒绝第一终 端在第一非公共网络中的注册。
第三方面,本申请实施例提供一种网络的接入方法,包括:第一公共网络中的统一数据管理网元接收来自第一非公共网络中的接入管理网元的用于查询第一终端的签约数据的查询消息。统一数据管理网元向接入管理网元发送第三消息,该第三消息包括以下一项或多项:第一终端的签约数据、原因值,该签约数据中包括第二指示信息,该第二指示信息用于指示第一终端只能通过公共网络接入,或者,第二指示信息用于指示第一终端不能通过所述第一非公共网络接入,原因值表示不允许第一终端在第一非公共网络中接入。
在一种可能的实现方式中,第二指示信息包括第一终端支持的网络列表,其中,网络列表中不包括第一非公共网络的信息。
在一种可能的实现方式中,第三消息中包括第三指示信息,该第三指示信息用于指示未成功获取第一终端的签约数据。
在一种可能的实现方式中,第三消息中还包括未成功获取第一终端的签约数据的原因值,该原因值表示不允许第一终端在第一非公共网络中接入。
在一种可能的实现方式中,第三消息中不包括第一终端的签约数据。
第四方面,本申请实施例提供一种网络的接入方法,包括:第二终端接收来自第一非公共网络中的接入网设备的广播信息,该广播信息包括用于指示第一非公共网络与公共网络互通的第一指示信息。第二终端根据广播信息,确定使用第一签约信息接入该第一非公共网络。其中,第一签约信息为第二终端在第一公共网络的签约信息。
在一种可能的实现方式中,第一签约信息中携带的该第二终端的第一标识与第一公共网络相关。例如,该第二终端的第一标识中携带第一公共网络的信息,以第一公共网络为第一PLMN为例,例如,第一公共网络的信息可以为第一PLMNID。
本申请实施例提供一种网络的接入方法,该方法中第二终端通过接收来自第一非公共网络中的接入网设备的广播信息,这样第二终端便可以确定该第一非公共网络与公共网络互通。以便于具有接入非公共网络能力或权限的终端后续使用与公共网络之间的签约信息接入该第一非公共网络,此外由于不具有接入非公共网络能力或权限的终端无法接收到该广播信息,从而可以防止不具有接入非公共网络能力或权限的终端尝试接入该第一非公共网络造成的网络资源浪费。
在一种可能的实现方式中,本申请实施例提供的方法还可以包括:第二终端使用第一签约信息接入该第一非公共网络。
在一种可能的实现方式中,第二终端使用第一签约信息接入该第一非公共网络,包括:第二终端向第一非公共网络中的接入管理网元发送注册请求消息,该注册请求消息中携带该第二终端的第一标识。
在一种可能的实现方式中,第二终端为具有接入非公共网络能力或权限的终端。
在一种可能的实现方式中,该广播信息还用于指示该第一非公共网络与公共网络采用漫游架构互通。
在一种可能的实现方式中,该广播信息针对具有接入非公共网络能力或权限的终端发送。
在一种可能的实现方式中,广播信息还包括与第一非公共网络互通的一个或多个公共网络的信息,公共网络的信息可以为公共网络的标识。以公共网络为PLMN为例,公共网络的标识可以为PLMN ID,第一公共网络属于一个或多个公共网络。以便于第二终端确定与该第一非公共网络互通的一个或多个公共网络。
在一种可能的实现方式中,第一公共网络的网络选择优先级在一个或多个公共网络的网络选择优先级中为最高的。
第五方面,本申请实施例提供一种网络的接入方法,包括:第一非公共网络中的接入网设备发送广播信息,该广播信息包括第一指示信息,该第一指示信息用于指示第一非公共网络与公共网络互通。
在一种可能的实现方式中,广播信息还包括与所述第一非公共网络互通的一个或多个公共网络的信息。
第六方面,本申请实施例提供一种网络的接入方法,包括:第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息,该第一消息用于表示请求在第一非公共网络中注册第二终端,其中,该第一签约信息为第二终端在第一非公共网络中的签约信息,或者,第一签约信息为第二终端在第一公共网络中的签约信息。第二终端接收来自接入管理网元的用于表示拒绝第二终端在第一非公共网络中注册的第二消息。该第二消息中包括第四指示信息,该第四指示信息用于指示拒绝第二终端在第一非公共网络中进行注册的原因。
在一种可能的实现方式中,第一公共网络与第一非公共网络采用漫游架构互通的情况下,该第一签约信息为第二终端在第一非公共网络中的签约信息。此时,第一签约信息中携带的第二终端的第二标识与第一非公共网络相关,例如,第二终端的第二标识中包括第一非公共网络的标识。该第一非公共网络的标识由目标公共网络的标识和网络标识(Network identifier,NID)确定。该目标公共网络的可以为第三方运营商为该目标公共网络提供的预留的值。
在一种可能的实现方式中,第一公共网络与第一非公共网络采用N3IWF互通的情况下,该第一签约信息为第二终端在第一公共网络中的签约信息。此时,第一签约信息中携带的第二终端的第三标识与第一公共网络相关,例如,第二终端的第三标识中包括第一公共网络的信息。例如,第一非公共网络的信息为第一非公共网络的标识,例如,第一非公共网络的标识为第一PLMN ID。
在一种可能的实现方式中,第一签约信息为第二终端在第一非公共网络中的签约信息,本申请实施例提供的方法还包括:第二终端根据第四指示信息,使用第二终端的第二签约信息在第一非公共网络中进行注册,该第二签约信息为第二终端在第一公共网络中的签约信息。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第二终端接收来自接入管理网元的第四消息,该第四消息包括第二终端的网络候选列表,该网络候选列表包括该第一非公共网络的信息。以便于第二终端确定该第二终端能够在该第一非公共网络中注册。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第二终端接收来自接入管理网元的第五消息,第五消息用于表示接受第二终端在第一非公共网络中注册。第二终端将第一非公共网络的信息添加到第二终端的网络候选列表中。以便于第二终端确定该第二终端能够在该第一非公共网络中注册,之后选择第二终端的第二签约信息在第一非公共网络中进行注册。
在一种可能的实现方式中,第四指示信息用于指示第二终端为非法终端。
在一种可能的实现方式中,第一签约信息为第二终端在第一公共网络中的签约信息,该第二终端中还具有第二终端在第一非公共网络中的第三签约信息的情况下,本申请实施例提供的方法还包括:第二终端使用第三签约信息请求在第一非公共网络中进行注册。第三签约信息中包括的第二终端的第四标识,该第四标识与第一非公共网络相关。例如,该第四标识中包括第一非公共网络的信息。例如,以第一非公共网络的信息为第一非公共网络的标识为例,则第一非公共网络的标识由目标公共网络的标识和NID确定。
在一种可能的实现方式中,第二终端使用第三签约信息请求在第一非公共网络中进行注册,包括:第二终端向第一非公共网络中的接入管理网元发送注册请求消息,该注册请求消息中包括第二终端的第四标识。
第七方面,本申请实施例提供一种网络的接入方法,包括:第一非公共网络中的接入管理网元接收来自第二终端的用于表示第二终端请求使用第一签约信息在第一非公共网络中注册的第一消息,其中,第一签约信息为第二终端在第一非公共网络中的签约信息,或者,第一签约信息为第二终端在第一公共网络中的签约信息。接入管理网元向第二终端发送第二消息,第二消息用于拒绝第二终端在第一非公共网络中注册,第二消息中包括第四指示信息,该第四指示信息用于指示拒绝第二终端在第一非公共网络中进行注册的原因。
在一种可能的实现方式中,本申请实施例提供的方法还包括:接入管理网元向第二终端发送第四消息,该第四消息包括该第二终端的网络候选列表。其中,该网络候选列表包括第一非公共网络的信息。以第一非公共网络的信息为第一非公共网络的标识为例,则该第一非公共网络的标识为由目标公共网络的标识和NID确定。
在一种可能的实现方式中,本申请实施例提供的方法还包括:接入管理网元向第二终端发送第五消息,该第五消息用于表示接受第二终端在第一非公共网络中注册。以便于第二终端根据第五消息确定该第二终端能够在第一非公共网络中注册。
在一种可能的实现方式中,第四指示信息用于指示第二终端为非法终端。
在一种可能的实现方式中,本申请实施例提供的方法还包括:接入管理网元确定拒绝第二终端在第一非公共网络中注册。
在一种可能的实现方式中,接入管理网元确定拒绝第二终端在第一非公共网络中注册,包括:接入管理网元根据配置信息或者第二终端在第一非公共网络中的签约信息确定拒绝第二终端在第一非公共网络中注册。
第八方面,本申请实施例提供一种通信装置,该通信装置可以实现第一方面或第一方面的任意可能的实现方式中的方法,因此也能实现第一方面或第一方面任意可能的实现方式中的有益效果。该通信装置可以为第一终端,也可以为支持第一终端实现第一方面或第一方面的任意可能的实现方式中的方法的装置,例如应用于第一终端中的芯片。该通信装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种通信装置,该通信装置包括:通信单元以及处理单元,其中,处理单元,用于处理信息,该通信单元用于接收或者发送信息。例如,通信单元,用于向第一非公共网络中的接入管理网元发送用于请求在第一非公共网络中注册该第一终端的第一消息。通信单元,还用于接收来自该接入管理网元的用于表示拒绝第一终端在第一非公共网络进行注册的第二消息。该第二消息包括第一指示信息,该第一指示信息表示禁止第一终端在第一非公共网络中接入。处理单元,用于根据第一指示信息更新所述第一终端的网络禁选列表,其中,更新后的网络禁选列表中包括所述第一非公共网络的信息。
在一种可能的实现方式中,本申请实施例中的第一非公共网络支持与第一公共网络互通。
在一种可能的实现方式中,本申请实施例中的第一非公共网络与第一公共网络采用漫游架构互通。
在一种可能的实现方式中,处理单元,还用于根据更新后的网络禁选列表选择除第一非公共网络以外的网络进行注册。
在一种可能的实现方式中,处理单元,还用于根据第一指示信息启动定时器,在定时器超时的情况下,从更新后的网络禁选列表中删除第一非公共网络的信息。
在一种可能的实现方式中,第二消息包括定时器时间值,该第一终端根据定时器时间值设置定时器。
在一种可能的实现方式中,第一终端为不具有接入非公共网络能力或权限的终端。
示例性的,当该通信装置是第一终端内的芯片或者芯片系统时,该处理单元可以是处理器,该通信单元可以是通信接口。例如通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的指令,以使该第一终端实现第一方面或第一方面的任意一种可能的实现方式中描述的一种网络的接入方法。该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该第一终端内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第九方面,本申请实施例提供一种通信装置,该通信装置可以实现第二方面或第二方面的任意可能的实现方式中的方法,因此也能实现第二方面或第二方面任意可能的实现方式中的有益效果。该通信装置可以为接入管理网元,也可以为支持接入管理网元实现第二方面或第二方面的任意可能的实现方式中的方法的装置,例如应用于接入管理网元中的芯片。该通信装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种通信装置,该通信装置为第一非公共网络中的接入管理网元,或者为应用于接入管理网元中的芯片,该装置包括:通信单元以及处理单元,其中,处理单元,用于处理信息,该通信单元用于接收或者发送信息。例如,通信单元,用于接收来自第一终端的用于请求在第一非公共网络中注册第一终端的第一消息。通信单元,用于从公共网络中的统一数据管理网元处获取第三消息。通信单元,用于根据第三消息向第一终端发送用于表示拒绝第一终端在第一非公共网络进行注册的第二消息,该第二消息包括第一指示信息,第一指示信息表示禁止第一终端在第一非公共网络中接入。
在一种可能的实现方式中,第三消息中包括第一终端的签约数据,该签约数据中包括第二指示信息,一方面,该第二指示信息用于指示第一终端只能通过公共网络接入,或者,另一方面,该第二指示信息用于指示第一终端不能通过非公共网络接入。
在一种可能的实现方式中,第二指示信息包括第一终端支持的网络列表,其中,该网络列表中不包括第一非公共网络的信息。
在一种可能的实现方式中,第三消息中包括第三指示信息,该第三指示信息用于指示未成功获取第一终端的签约数据。
在一种可能的实现方式中,第三消息中不包括第一终端的签约数据。
在一种可能的实现方式中,第三消息中还包括未成功获取第一终端的签约数据的原因值,该原因值表示不允许第一终端在第一非公共网络中接入。
在一种可能的实现方式中,处理单元,用于根据第三消息,确定拒绝第一终端在第一非公共网络中的注册。
在一种可能的实现方式中,处理单元,用于根据第三消息,确定拒绝第一终端在第一非公共网络中的注册,包括:处理单元,用于根据第二指示信息确定拒绝第一终端在第一非公共网络中的注册。
在一种可能的实现方式中,处理单元,用于根据第三消息,确定拒绝第一终端在第一非公共网络中的注册,包括:处理单元,用于根据第三指示信息,确定拒绝第一终端在第一非公共网络 中的注册。
示例性的,当该通信装置是接入管理网元内的芯片或者芯片系统时,该处理单元可以是处理器,该通信单元可以是通信接口。例如通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的指令,以使该接入管理网元实现第二方面或第二方面的任意一种可能的实现方式中描述的一种网络的接入方法。该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该接入管理网元内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十方面,本申请实施例提供一种通信装置,该通信装置可以实现第三方面或第三方面的任意可能的实现方式中的方法,因此也能实现第三方面或第三方面任意可能的实现方式中的有益效果。该通信装置可以为统一数据管理网元,也可以为支持统一数据管理网元实现第三方面或第三方面的任意可能的实现方式中的方法的装置,例如应用于统一数据管理网元中的芯片。该通信装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种通信装置,该通信装置包括:通信单元以及处理单元,其中,处理单元,用于处理信息,该通信单元用于接收或者发送信息。例如,通信单元,用于接收来自第一非公共网络中的接入管理网元的用于查询第一终端的签约数据的查询消息。通信单元,还用于向接入管理网元发送第三消息,该第三消息包括以下一项或多项:第一终端的签约数据、原因值,签约数据中包括第二指示信息,第二指示信息用于指示第一终端只能通过公共网络接入,或者,第二指示信息用于指示第一终端不能通过非公共网络接入,原因值表示不允许第一终端在第一非公共网络中接入。
在一种可能的实现方式中,第二指示信息包括第一终端支持的网络列表,其中,网络列表中不包括第一非公共网络的信息。
在一种可能的实现方式中,第三消息中包括第三指示信息,该第三指示信息用于指示未成功获取第一终端的签约数据。
在一种可能的实现方式中,第三消息中还包括未成功获取第一终端的签约数据的原因值,该原因值表示不允许第一终端在第一非公共网络中接入。
在一种可能的实现方式中,第三消息中不包括第一终端的签约数据。
在一种可能的实现方式中,该通信装置为应用于公共网络中的统一数据管理网元,或者为应用于公共网络中的统一数据管理网元中的芯片。
示例性的,当该通信装置是统一数据管理网元内的芯片或者芯片系统时,该处理单元可以是处理器,该通信单元可以是通信接口。例如通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的指令,以使该统一数据管理网元实现第三方面或第三方面的任意一种可能的实现方式中描述的一种网络的接入方法。该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该统一数据管理网元内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十一方面,本申请实施例提供一种通信装置,该通信装置可以实现第四方面或第四方面的任意可能的实现方式中的方法,因此也能实现第四方面或第四方面任意可能的实现方式中的有益效果。该通信装置可以为第二终端,也可以为支持第二终端实现第四方面或第四方面的任意可能的实现方式中的方法的装置,例如应用于第二终端中的芯片。该通信装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种通信装置,该通信装置包括:通信单元以及处理单元,其中,处理单元,用于处理信息,该通信单元用于接收或者发送信息。例如,通信单元,用于接收来自第一非公共网络中的接入网设备的广播信息,该广播信息包括用于指示第一非公共网络与公共网络互通的第一指示信息。处理单元,用于根据广播信息,确定使用第一签约信息接入该第一非公共网络。其中,第一签约信息为第二终端在第一公共网络的签约信息。
在一种可能的实现方式中,第二终端为具有接入非公共网络能力或权限的终端。
在一种可能的实现方式中,该广播信息还用于指示该第一非公共网络与公共网络采用漫游架构互通。
在一种可能的实现方式中,广播信息还包括与第一非公共网络互通的一个或多个公共网络的信息,第一公共网络属于一个或多个公共网络。以便于第二终端确定与该第一非公共网络互通的一个或多个公共网络。
在一种可能的实现方式中,第一公共网络的网络选择优先级在一个或多个公共网络的网络选择优先级中为最高的。
在一种可能的实现方式中,第一签约信息中携带的该第二终端的第一标识与第一公共网络相关。例如,该第二终端的第一标识中携带第一公共网络的信息。以第一公共网络为第一PLMN,第一公共网络的信息为第一公共网络的标识为例,则第一公共网络的标识可以为第一PLMN ID。
在一种可能的实现方式中,处理单元,还用于使用第一签约信息接入该第一非公共网络。
在一种可能的实现方式中,处理单元,还用于使用第一签约信息接入该第一非公共网络,包括:处理单元,还用于通过通信单元向第一非公共网络中的接入管理网元发送注册请求消息,该注册请求消息中携带该第二终端的第一标识。
示例性的,当该通信装置是第二终端内的芯片或者芯片系统时,该处理单元可以是处理器,该通信单元可以是通信接口。例如通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的指令,以使该第二终端实现第四方面或第四方面的任意一种可能的实现方式中描述的一种网络的接入方法。该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该第二终端内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十二方面,本申请实施例提供一种通信装置,该通信装置可以实现第五方面或第五方面的任意可能的实现方式中的方法,因此也能实现第五方面或第五方面任意可能的实现方式中的有益效果。该通信装置可以为接入网设备,也可以为支持接入网设备实现第五方面或第五方面的任意可能的实现方式中的方法的装置,例如应用于接入网设备中的芯片。该通信装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种通信装置,该通信装置包括:通信单元以及处理单元,其中,处理单元,用于处理信息,该通信单元用于接收或者发送信息。例如,通信单元,用于发送广播信息,该广播信息包括第一指示信息,该第一指示信息用于指示第一非公共网络与公共网络互通。
在一种可能的实现方式中,广播信息还包括与第一非公共网络互通的一个或多个公共网络的信息。
在一种可能的实现方式中,该通信装置适用于非公共网络中。
示例性的,当该通信装置是接入网设备内的芯片或者芯片系统时,该处理单元可以是处理器,该通信单元可以是通信接口。例如通信接口可以为输入/输出接口、管脚或电路等。该处理单元执 行存储单元所存储的指令,以使该接入网设备实现第五方面或第五方面的任意一种可能的实现方式中描述的一种网络的接入方法。该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该接入网设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十三方面,本申请实施例提供一种通信装置,该通信装置可以实现第六方面或第六方面的任意可能的实现方式中的方法,因此也能实现第六方面或第六方面任意可能的实现方式中的有益效果。该通信装置可以为第二终端,也可以为支持第二终端实现第六方面或第六方面的任意可能的实现方式中的方法的装置,例如应用于第二终端中的芯片。该通信装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种通信装置,该通信装置为第二终端或者为应用于第二终端中的芯片,该通信装置包括:通信单元以及处理单元,其中,处理单元,用于处理信息,该通信单元用于接收或者发送信息。例如,通信单元,用于使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息,该第一消息用于表示请求在第一非公共网络中注册第二终端,其中,该第一签约信息为第二终端在第一非公共网络中的签约信息,或者,第一签约信息为第二终端在第一公共网络中的签约信息。通信单元,用于接收来自接入管理网元的用于表示拒绝第二终端在第一非公共网络中注册的第二消息。该第二消息中包括第四指示信息,该第四指示信息用于指示拒绝第二终端在第一非公共网络中进行注册的原因。
在一种可能的实现方式中,第一公共网络与第一非公共网络采用漫游架构互通的情况下,该第一签约信息为第二终端在第一非公共网络中的签约信息。此时,第一签约信息中携带的第二终端的第二标识与第一非公共网络相关,例如,第二终端的第二标识中包括第一非公共网络的信息。以第一非公共网络的信息为第一非公共网络的标识为例,则第一非公共网络的标识由目标公共网络的标识和NID确定。
在一种可能的实现方式中,第一公共网络与第一非公共网络采用N3IWF互通的情况下,该第一签约信息为第二终端在第一公共网络中的签约信息。此时,第一签约信息中携带的第二终端的第三标识与第一公共网络相关,例如,第二终端的第三标识中包括第一公共网络的信息。例如,第一公共网络的信息可以为第一公共网络的标识。
在一种可能的实现方式中,第一签约信息为第二终端在第一非公共网络中的签约信息,处理单元,还用于根据第四指示信息,使用第二终端的第二签约信息在第一非公共网络中进行注册,该第二签约信息为第二终端在第一公共网络中的签约信息。
在一种可能的实现方式中,通信单元,还用于接收来自接入管理网元的第四消息,该第四消息包括第二终端的网络候选列表,该网络候选列表包括该第一非公共网络的信息。以便于第二终端确定该第二终端能够在该第一非公共网络中注册。
在一种可能的实现方式中,通信单元,还用于接收来自接入管理网元的第五消息,第五消息用于表示接受第二终端在第一非公共网络中注册。第二终端将第一非公共网络的信息添加到第二终端的网络候选列表中。以便于第二终端确定该第二终端能够在该第一非公共网络中注册,之后选择第二终端的第二签约信息在第一非公共网络中进行注册。
在一种可能的实现方式中,第四指示信息用于指示第二终端为非法终端。
在一种可能的实现方式中,第一签约信息为第二终端在第一公共网络中的签约信息,该第二终端中还具有该第二终端在第一非公共网络中的第三签约信息的情况下,处理单元,还用于使用 第三签约信息请求在第一非公共网络中进行注册。其中,第三签约信息中包括的第二终端的第四标识,该第四标识与第一非公共网络相关,例如,该第四标识中包括第一非公共网络的信息。以第一非公共网络的信息为第一非公共网络的标识为例,则第一非公共网络的标识由目标公共网络的标识和NID确定。
在一种可能的实现方式中,第一签约信息为第二终端在第一公共网络中的签约信息,该第二终端中还具有第二终端在第一非公共网络中的第三签约信息的情况下,处理单元,还用于第二终端使用第三签约信息请求在第一非公共网络中进行注册。第三签约信息中包括的第二终端的第四标识,该第四标识与第一非公共网络相关,例如,该第四标识中包括第一非公共网络的信息。以第一非公共网络的信息为第一非公共网络的标识为例,则第一非公共网络的标识由目标公共网络的标识和NID确定。
在一种可能的实现方式中,处理单元,用于通过通信单元向第一非公共网络中的接入管理网元发送注册请求消息,该注册请求消息中包括第二终端的第四标识。
示例性的,当该通信装置是第二终端内的芯片或者芯片系统时,该处理单元可以是处理器,该通信单元可以是通信接口。例如通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的指令,以使该第二终端实现第六方面或第六方面的任意一种可能的实现方式中描述的一种网络的接入方法。该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该第二终端内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十四方面,本申请实施例提供一种通信装置,该通信装置可以实现第七方面或第七方面的任意可能的实现方式中的方法,因此也能实现第七方面或第七方面任意可能的实现方式中的有益效果。该通信装置可以为接入管理网元,也可以为支持接入管理网元实现第七方面或第七方面的任意可能的实现方式中的方法的装置,例如应用于接入管理网元中的芯片。该通信装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种通信装置,该通信装置为接入管理网元或者为应用于接入管理网元中的芯片,该通信装置包括:通信单元以及处理单元,其中,处理单元,用于处理信息,该通信单元用于接收或者发送信息。例如,通信单元,用于接收来自第二终端的用于表示第二终端请求使用第一签约信息在第一非公共网络中注册的第一消息,其中,第一签约信息为第二终端在第一非公共网络中的签约信息,或者,第一签约信息为第二终端在第一公共网络中的签约信息。通信单元,用于向第二终端发送第二消息,第二消息用于拒绝第二终端在第一非公共网络中注册,第二消息中包括第四指示信息,该第四指示信息用于指示拒绝第二终端在第一非公共网络中进行注册的原因。
在一种可能的实现方式中,通信单元,还用于向第二终端发送第四消息,该第四消息包括第二终端的网络候选列表,网络候选列表包括第一非公共网络的信息。
在一种可能的实现方式中,通信单元,还用于向第二终端发送第五消息,第五消息用于表示接受第二终端在第一非公共网络中注册。以便于第二终端根据第五消息确定能够在第一非公共网络中注册。
在一种可能的实现方式中,第四指示信息用于指示第二终端为非法终端。
在一种可能的实现方式中,处理单元,用于确定拒绝第二终端在第一非公共网络中注册。
在一种可能的实现方式中,处理单元,用于确定拒绝第二终端在第一非公共网络中注册,包括:处理单元,用于根据配置信息或者第二终端在第一非公共网络中的签约信息确定拒绝第二终 端在第一非公共网络中注册。
在一种可能的实现方式中,该通信装置为应用于第一非公共网络中的接入管理网元,或者为应用于第一非公共网络中的接入管理网元中的芯片。
示例性的,当该通信装置是接入管理网元内的芯片或者芯片系统时,该处理单元可以是处理器,该通信单元可以是通信接口。例如通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的指令,以使该接入管理网元实现第七方面或第七方面的任意一种可能的实现方式中描述的一种网络的接入方法。该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该接入管理网元内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十五方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第一方面至第一方面的任意一种可能的实现方式中描述的一种网络的接入方法。
第十六方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第二方面至第二方面的任意一种可能的实现方式中描述的一种网络的接入方法。
第十七方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第三方面至第三方面的任意一种可能的实现方式中描述的一种网络的接入方法。
第十八方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第四方面至第四方面的任意一种可能的实现方式中描述的一种网络的接入方法。
第十九方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第五方面至第五方面的任意一种可能的实现方式中描述的一种网络的接入方法。
第二十方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第六方面至第六方面的任意一种可能的实现方式中描述的一种网络的接入方法。
第二十一方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第七方面至第七方面的任意一种可能的实现方式中描述的一种网络的接入方法。
第二十二方面,本申请实施例提供一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第一方面或第一方面的各种可能的实现方式中描述的一种网络的接入方法。
第二十三方面,本申请实施例提供一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第二方面或第二方面的各种可能的实现方式中描述的一种网络的接入方法。
第二十四方面,本申请实施例提供了一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第三方面或第三方面的各种可能的实现方式中描述的一种网络的接入方法。
第二十五方面,本申请实施例提供一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第四方面或第四方面的各种可能的实现方式中描述的一种网络的接入方法。
第二十六方面,本申请实施例提供一种包括指令的计算机程序产品,当指令在计算机上运行 时,使得计算机执行第五方面或第五方面的各种可能的实现方式中描述的一种网络的接入方法。
第二十七方面,本申请实施例提供了一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第六方面或第六方面的各种可能的实现方式中描述的一种网络的接入方法。
第二十八方面,本申请实施例提供了一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第七方面或第七方面的各种可能的实现方式中描述的一种网络的接入方法。
第二十九方面,本申请实施例提供一种通信装置用于实现上述第一方面至第七方面中任一方面的各种可能的设计中的各种方法。该通信装置可以为上述第一终端,或者包含上述第一终端的装置,或者应用于第一终端中的部件(例如,芯片)。或者,该通信装置可以为上述接入管理网元,或者包含上述接入管理网元的装置,或者通信装置可以为应用于接入管理网元中的部件(例如,芯片)。该通信装置可以为上述统一数据管理网元,或者包含上述统一数据管理网元的装置,或者应用于统一数据管理网元中的部件(例如,芯片)。或者该通信装置可以为上述接入网设备,或者包含上述接入网设备的装置,或者应用于接入网设备中的部件(例如,芯片)。或者该通信装置可以为上述第二终端,或者包含上述第二终端的装置,或者应用于第二终端中的部件(例如,芯片)。该通信装置包括实现上述方法相应的模块、单元、该模块、单元可以通过硬件实现,软件实现,或者通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。
第三十方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器和通信接口。其中,当该通信装置运行时,该处理器执行该通信装置中存储的计算机执行指令或程序,以使该通信装置执行如上述第一方面或第二方面或第三方面或第四方面或第五方面或第六方面或第七方面中任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为第一终端,或者为应用于第一终端中的部件。例如,该通信装置可以为接入管理网元,或者为应用于接入管理网元中的部件。例如,该通信装置为第二终端,或者为应用于第二终端中的部件。例如,该通信装置可以为统一数据管理网元,或者为应用于统一数据管理网元中的部件。例如,该通信装置为接入网设备,或者为应用于接入网设备中的部件。
应理解,上述第三十方面中描述的通信装置中还可以包括:总线和存储器,存储器用于存储代码和数据。可选的,至少一个处理器通信接口和存储器相互耦合。
第三十一方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器。其中,至少一个处理器和存储器耦合,当该通信装置运行时,该处理器执行该存储器中存储的计算机执行指令或程序,以使该通信装置执行如上述第一方面或第一方面的任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为第一终端,或者为应用于第一终端中的芯片。
第三十二方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器。其中,至少一个处理器和存储器耦合,当该通信装置运行时,该处理器执行该存储器中存储的计算机执行指令或程序,以使该通信装置执行如上述第二方面或第二方面的任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为接入管理网元,或者为应用于接入管理网元中的芯片。
第三十三方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器。其中,至少一个处理器和存储器耦合,当该通信装置运行时,该处理器执行该存储器中存储的计算机执行指令或程序,以使该通信装置执行如上述第三方面或第三方面的任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为统一数据管理网元,或者为应用于统一数据管理 网元中的芯片。
第三十四方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器。其中,至少一个处理器和存储器耦合,当该通信装置运行时,该处理器执行该存储器中存储的计算机执行指令或程序,以使该通信装置执行如上述第四方面或第四方面的任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为第二终端,或者为应用于第二终端中的芯片。
第三十五方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器。其中,至少一个处理器和存储器耦合,当该通信装置运行时,该处理器执行该存储器中存储的计算机执行指令或程序,以使该通信装置执行如上述第五方面或第五方面的任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为接入网设备,或者为应用于接入网设备中的芯片。
第三十六方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器。其中,至少一个处理器和存储器耦合,当该通信装置运行时,该处理器执行该存储器中存储的计算机执行指令或程序,以使该通信装置执行如上述第六方面或第六方面的任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为第二终端,或者为应用于第二终端中的芯片。
第三十七方面,本申请实施例提供了一种通信装置,该通信装置包括:至少一个处理器。其中,至少一个处理器和存储器耦合,当该通信装置运行时,该处理器执行该存储器中存储的计算机执行指令或程序,以使该通信装置执行如上述第七方面或第七方面的任一方面的各种可能的设计中的任一项的方法。例如,该通信装置可以为接入管理网元,或者为应用于接入管理网元中的芯片。
应理解,第三十一方面至第三十七方面任一方面描述的存储器还可以使用存储介质替换,本申请实施例对此不作限定。在一种可能的实现方式中,第三十一方面至第三十七方面任一方面描述的存储器可以为该通信装置内部的存储器,当然,该存储器也可以位于该通信装置外部,但是至少一个处理器仍然可以执行该存储器中存储的计算机执行指令或程序。
第三十八方面,本申请实施例提供了一种通信装置,该通信装置包括一个或者多个模块,用于实现上述第一方面、第二方面、第三方面、第四方面、第五方面、第六方面或者第七方面中任一个方面的方法,该一个或者多个模块可以与上述第一方面、第二方面、第三方面、第四方面、第五方面、第六方面或者第七方面中任一个方面的方法中的各个步骤相对应。
第三十九方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第一方面或第一方面的各种可能的实现方式中所描述的一种网络的接入方法。通信接口用于与芯片之外的其它模块进行通信。
第四十方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第二方面或第二方面的各种可能的实现方式中所描述的一种网络的接入方法。通信接口用于与芯片之外的其它模块进行通信。
第四十一方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第三方面或第三方面的各种可能的实现方式中所描述的一种网络的接入方法。通信接口用于与芯片之外的其它模块进行通信。
第四十二方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第四方面或第四方面的各种可能的实现方式中所描述的一种网络的接入方法。通信接口用于与芯片之外的其它模块进行通信。
第四十三方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处 理器耦合,处理器用于运行计算机程序或指令,以实现第五方面或第五方面的各种可能的实现方式中所描述的一种网络的接入方法。通信接口用于与芯片之外的其它模块进行通信。
第四十四方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第六方面或第六方面的各种可能的实现方式中所描述的一种网络的接入方法。通信接口用于与芯片之外的其它模块进行通信。
第四十五方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第七方面或第七方面的各种可能的实现方式中所描述的一种网络的接入方法。通信接口用于与芯片之外的其它模块进行通信。
具体的,本申请实施例中提供的芯片还包括存储器,用于存储计算机程序或指令。
第四十六方面,本申请实施例提供一种通信系统,该通信系统包括:第九方面或第九方面的任一个可能的实现方式描述的通信装置,第十方面或第十方面的任一个可能的实现方式描述的通信装置。
在一种可能的实现方式中,该通信系统还可以包括:第八方面或第八方面的任一个可能的实现方式描述的通信装置。
第四十七方面,本申请实施例提供一种通信系统,该通信系统包括:第十一方面或第十一方面的任一个可能的实现方式描述的通信装置,第十二方面或第十二方面的任一个可能的实现方式描述的通信装置。
第四十八方面,本申请实施例提供一种通信系统,该通信系统包括:第十三方面或第十三方面的任一个可能的实现方式描述的通信装置,第十四方面或第十四方面的任一个可能的实现方式描述的通信装置。
上述提供的任一种装置或计算机存储介质或计算机程序产品或芯片或通信系统均用于执行上文所提供的对应的方法,因此,其所能达到的有益效果可参考上文提供的对应的方法中对应方案的有益效果,此处不再赘述。
附图说明
图1为本申请实施例提供的一种公网集成NPN和独立部署NPN的架构示意图;
图2为本申请实施例提供的一种公共网络或者非公共网络的构成架构示意图;
图3为本申请实施例提供的一种网络的接入方法适用的通信系统架构图;
图4为本申请实施例提供的一种5G网络的架构图;
图5a为本申请实施例提供的一种非公共网络和公共网络基于N3IWF互通的架构示意图;
图5b为本申请实施例提供的一种非公共网络和公共网络基于漫游架构互通的架构示意图;
图6为本申请实施例提供的一种网络的接入方法的流程示意图一;
图7为本申请实施例提供的一种网络的接入方法的流程示意图二;
图8为本申请实施例提供的一种网络的接入方法的流程示意图三;
图9为本申请实施例提供的一种网络的接入方法的流程示意图四;
图10为本申请实施例提供的一种网络的接入方法的流程示意图十;
图11为本申请实施例提供的一种网络的接入方法的具体实施例的流程示意图一;
图12为本申请实施例提供的一种网络的接入方法的具体实施例的流程示意图二;
图13为本申请实施例提供的一种网络的接入方法的具体实施例的流程示意图三;
图14为本申请实施例提供的一种网络的接入方法的具体实施例的流程示意图四;
图15为本申请实施例提供的一种网络的接入方法的具体实施例的流程示意图五;
图16为本申请实施例提供的一种网络的接入方法的具体实施例的流程示意图六;
图17为本申请实施例提供的一种通信装置的结构示意图;
图18为本申请实施例提供的另一种通信装置的结构示意图;
图19为本申请实施例提供的一种芯片的结构示意图。
具体实施方式
为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。例如,第一终端和第二终端仅仅是为了区分不同的终端,并不对其先后顺序进行限定。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
需要说明的是,本申请中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其他实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
本申请实施例中提供的一种网络的接入方法中所涉及到的步骤仅仅作为示例,并非所有的步骤均是必须执行的步骤,或者并非各个信息或消息中的内容均是必选的,在使用过程中可以根据需要酌情增加或减少。
本申请实施例中同一个步骤或者具有相同功能的步骤或者消息在不同实施例之间可以互相参考借鉴。
本申请实施例描述的系统架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。本申请实施例中以提供的方法应用于NR系统或第五代移动通信技术(5th generation mobile networks或5th generation wireless systems、5th-Generation,5G)网络中为例进行说明。
在介绍本申请实施例之前首先对本申请实施例涉及到的相关名词作如下释义:
1)、公共网络,指为公众提供陆地移动通信业务目的而建立和经营的网络,即传统的运营商网络,包括但不限于手机通信。例如,公共网络可以为公共陆地移动网络(public land mobile network,PLMN)。
2)、非公共网络(Non-public network,NPN),是一种非公用的5G网络,指可以供部分私 有用户使用的通信网络。例如,非公共网络可以包括工业通信网络、企业私有网络等,其中典型的工业通信网络服务范围通常为一个或者多个工业园区,企业私有网络服务范围通常为一个企业内部的所有用户。换言之,非公共网络只服务于某工业通信网络、企业私有网络所管理或拥有的设备,为这些设备提供数据连接等网络通信服务。
举例说明,非公共网络为某个工业园区提供通信服务,则该非公共网络可以为位于该工业园区,且为具有接入该非公共网络的能力和权限的终端提供通信服务。
本申请实施例中的非公共网络也可以称为:私网或者专用网络,此处统一说明,后续不再赘述。
非公共网络可以包括:公网集成NPN(public network integrated NPN,PNI-NPN)以及独立部署NPN(standalone NPN,SNPN)。其中,公网集成NPN可以依赖PLMN的支持实现,SNPN不依赖与PLMN的网络功能实现。
公网集成NPN可以使用PLMN中的网络切片实现,为了阻止非授权终端尝试接入和选择PNI-NPN,额外使用封闭访问组(closed access group,CAG)功能。CAG用于识别一组终端。能够被CAG识别的一组终端允许接入与CAG关联的小区(CAG小区)。为了防止不允许接入CAG小区的终端自动选择和接入CAG小区,CAG小区广播一个或者多个CAG标识,终端上配置可用的CAG列表(list)和指示(该指示用于指示终端是否只允许通过CAG小区接入5G系统(5G System,5GS))。统一数据管理网元中具有该终端的签约数据,该终端的签约数据中包括该终端可用的CAG list和指示。
如图1中的(a)图所示:图1中的(a)图以公网集成NPN为例,其中,基站1发送系统信息块(system information block,SIB)1,该SIB1中包括:PLMN ID=A,CAG标识=X。基站2发送SIB2,该SIB2包括:PLMN ID=A。终端1上具有的PLMN ID=A,CAG标识=X;终端2上具有的PLMN ID=A,CAG标识=X,以及只能通过CAG小区接入5G系统的指示;终端3上具有的PLMN ID=A,则终端1既可以接入基站1也可以接入基站2,而终端2虽然能接入基站1,但不能接入基站2。终端3可以接入基站2,但是终端3不能接入基站1。
如图1中的(b)图所示:图1中的(b)图以独立部署NPN为例,SNPN(5G网络)独立部署,不依赖PLMN,SNPN使用PLMN ID+NID来标识,其中PLMN ID可以为第三方运营商预留的固有值,也可以是部署此SNPN的PLMN运营商的特定值。在SNPN中,SNPN中的基站3发送SIB3,该SIB3包括该SNPN的标识N(例如,PLMN ID+NID1)。终端4根据广播信息和配置的选网信息选择接入的NPN网络。如果终端4发现配置的选网信息(PLMN ID+NID2)与基站3广播的PLMN ID或者PLMN ID+NID1不相同,终端4不会选择接入该SNPN。如果终端4发现配置的选网信息(PLMN ID+NID1)与基站3广播的PLMN ID或者PLMN ID+NID1相同,终端4选择接入该SNPN。
图1中的(a)图描述的架构和图1中的(b)图描述的架构不支持切换。基站1、基站2以及基站3可以为5G网络中的基站。例如,基站1、基站2以及基站3可以为下一代节点B(next Generation Node B,gNB)。图1中的(a)图以基站1和基站2接入相同的5G核心网(5G Core,5GC)为例。基站2接入非公共网络对应的5GC。
如图2所示,图2示出了公共网络或者非公共网络的构成,无论公共网络或者非公共网络均包括终端、接入网(acess network,AN)、核心网(core)和数据网络(data network,DN),其中,终端,AN,Core是构成架构的主要成分,逻辑上终端,AN,Core可以分为用户面和控制面 两部分,控制面负责移动网络的管理,用户面负责业务数据的传输。图2中,NG2参考点位于AN的控制面和Core的控制面之间,NG3参考点位于AN的用户面和Core的用户面之间,NG6参考点位于Core的用户面和数据网络之间。
终端:是移动用户与网络交互的入口,能够提供基本的计算能力,存储能力,向用户显示业务窗口,接受用户操作输入。5G网络中的终端可以采用新空口技术,与AN建立信号连接,数据连接,从而传输控制信号和业务数据到移动网络。
AN:类似于传统网络里面的基站,部署在靠近终端的位置,为特定区域的授权终端提供入网功能。AN能够根据终端的级别,业务的需求等确定不同质量的传输隧道来传输终端的数据。AN能够管理自身的资源,合理利用,按需为终端提供接入服务,以及负责在终端和核心网之间转发控制信号和终端数据。
Core:负责维护移动网络的签约数据,管理移动网络的网元,为终端提供会话管理,移动性管理,策略管理,安全认证等功能。在终端附着的时候,该Core为终端提供入网认证。在终端有业务请求时,该Core为终端分配网络资源;在终端移动的时候,Core为终端更新网络资源。在终端空闲的时候,Core为终端提供快恢复机制;在终端去附着的时候,Core为终端释放网络资源;在终端有业务数据时,Core为终端提供数据路由功能,如转发上行数据到data network。或者Core从Data Network接收针对终端的下行数据。Core向AN发送接收到的针对终端的下行数据,以由AN向终端发送针对该终端的下行数据。
data network:是为用户提供业务服务的数据网络,一般客户端位于终端,服务端位于数据网络。数据网络可以是私有网络,如局域网,也可以是不受运营商管控的外部网络,如因特网(internet),还可以是运营商共同部署的专有网络,如提供IP多媒体网络子系统(IP multimedia core network subsystem,IMS)服务的网络。
综上,图2描述了非公共网络和公共网络的主要构成部分,如图3所示,图3示出了本申请的一种网络的接入方法适用的通信系统,该通信系统包括:终端10、以及接入管理网元20。该接入管理网元20属于非公共网络100中的网元。
其中,终端10可以通过非公共网络100中的接入网设备30以及接入管理网元20接入非公共网络100。
在本申请实施例中,终端10可以分布于无线网络中,每个终端可以是静态的或移动的。
在一种可能的实现方式中,该通信系统还可以包括:统一数据管理网元40。该统一数据管理网元40属于公共网络200中的网元。该公共网络200与非公共网络100之间互通。待终端10成功接入非公共网络100后。终端10可以通过非公共网络100接入该公共网络200。
本申请实施例中如图3所示的通信系统可以应用于目前的5G网络架构以及未来出现的其他网络架构,本申请实施例对此不做限定。
下述以图3所示的通信系统适用于5G网络为例,即非公共网络100和公共网络200均为5G网络为例,该接入管理网元20对应的网元或者实体可以为如图3所示的:接入与移动管理功能(access and mobility management function,AMF)网元。统一数据管理网元40对应的网元或者实体可以为统一数据管理(unified data management,UDM)网元。接入网设备30对应的网元或者实体可以为(无线)接入网((radio)access network,(R)AN)设备。
如图4所示,图4示出了非公共网络100或公共网络200中还可以包括:会话管理功能(session management function,SMF)网元、策略控制功能(policy control function,PCF)网元、网络切 片选择功能(network slice selection function,NSSF)网元、认证服务器功能(authentication server function,AUSF)网元、网络能力开放功能(network exposure function,NEF)网元、网络仓库贮存功能(network repository function,NRF)网元、以及应用功能(application function,AF)网元等,本申请实施例对此不作具体限定。
如图5a所示,该非公共网络100或公共网络200还可以与数据网络(data network,DN)通信,该DN可以由AF网元管理。
其中,终端通过(R)AN设备接入网络(非公共网络或者公共网络),终端通过N1接口(简称N1)与AMF网元通信。SMF网元通过N4接口(简称N4)与一个或者多个UPF网元通信。UPF网元通过N6接口(简称N6)与DN通信。(R)AN设备与AMF网元之间通过N2接口(简称N2)通信。(R)AN设备通过N3接口(简称N3)与UPF网元通信。其中,控制面网元也可以采用服务化接口进行交互。例如,如图4所示,AMF网元、SMF网元、UDM网元、或者PCF网元采用服务化接口进行交互。比如,AMF网元对外提供的服务化接口可以为Namf。SMF网元对外提供的服务化接口可以为Nsmf。UDM网元对外提供的服务化接口可以为Nudm。PCF网元对外提供的服务化接口可以为Npcf。NSSF网元对外提供的服务化接口可以为Nnssf。NEF网元对外提供的服务化接口可以为Nnef。AF网元对外提供的服务化接口可以为Naf。应理解,各种服务化接口的名称的相关描述可以参考现有技术中的5G系统架构(5G system architecture)图,在此不予赘述。
如图4所示的网络架构中,以控制面网元采用服务化接口进行交互为例,当然控制面网元也可以采用如下方式进行通信:AMF实体通过N11接口(简称N11)与SMF网元通信。一个或多个UPF网元中任意两个UPF网元通过N9接口(简称N9)通信。SMF网元通过N7接口(简称N7)与PCF网元通信,PCF网元通过N5接口与AF网元通信。任意两个AMF网元之间通过N14接口(简称N14)通信。SMF网元通过N10接口(简称N10)与UDM通信。AMF网元通过N12接口(简称N12)与AUSF通信。AUSF网元通过N13接口(简称N13)与UDM网元通信。AMF网元通过N8接口(简称N8)与UDM网元通信。
需要说明的是,图4仅是示例性的给出一个UPF网元、SMF网元。当然,该中可能包括多个UPF网元、SMF网元,如包括SMF网元1和SMF网元2,本申请实施例对此不作具体限定。
需要说明的是,图4的(R)AN设备、AMF网元、SMF网元、UDM网元、UPF网元和PCF网元等仅是一个名字,名字对设备本身不构成限定。在5G网络以及未来其它的网络中,(R)AN设备、AMF网元、SMF网元、UDM网元、UPF网元和PCF网元所对应的网元或实体也可以是其他的名字,本申请实施例对此不作具体限定。例如,该UDM网元还有可能被替换为用户归属服务器(home subscriber server,HSS)或者用户签约数据库(user subscription database,USD)或者数据库实体,等等,在此进行统一说明,后续不再赘述。
由于在第三代合作伙伴计划(3rd generation partnership project,3GPP)的不同版本中,非公共网络与公共网络互通的方式存在差异,因此下述将结合图5a和图5b分别介绍:
在3GPP的第一版本中,如图5a所示,非公共网络100与公共网络200采用基于非3GPP互通功能(Non-3GPP interworking function,N3IWF)的架构进行互通,这时终端10具有双签约信息,即终端10不仅具有与非公共网络100之间的私网签约信息还具有与公共网络200之间的第一公网签约信息。其中,私网签约信息用于终端10接入非公共网络100。第一公网签约信息用于指定10接入公共网络200。应理解,终端10与非公共网络100之间的私网签约信息中包括该终端 10的标识1,该终端10的标识1中包括非公共网络100的标识。终端10与公共网络200之间的第一公网签约信息中包括该终端10的标识2,该终端10的标识2中包括公共网络200的标识。
例如,第一版本可以为版本(Release,R)16。
如图5a所示:终端10使用与非公共网络100之间的私网签约信息确定非公共网络100的标识。然后终端10接入非公共网络100中部署的接入网设备,终端10通过接入网设备在非公共网络100中进行3GPP注册。终端10使用与公共网络200之间的第一公网签约信息确定公共网络200的标识。之后,终端10选择公共网络200中的N3IWF,终端10在非公共网络100建立PDU会话接入公共网络200中的N3IWF,在公共网络200网络进行N3GPP注册。
具体的,如图5a所示,非公共网络100中包括AMF网元1、SMF网元1、以及UPF网元1,公共网络200中包括AMF网元2、SMF网元2、UPF网元2以及N3IWF。其中,N3IWF用于实现非公共网络100与公共网络200之间的互通。
终端10通过NPN的3GPP接入技术(access technology)接入非公共网络100,之后终端10与非公共网络100网络中的UPF网元1之间建立PDU会话。后续待终端10需要通过非公共网络100网络在公共网络200网络进行非3GPP(non 3GPP,N3GPP)注册时,终端10可以利用与UPF网元1之间建立的PDU会话向UPF网元1发送公网的注册请求消息,该公网的注册请求消息用于请求在公共网络200中注册该终端10。之后,UPF网元1利用如图5a所示的DN1向N3IWF发送公网的注册请求消息。在N3IWF接收到公网的注册请求消息之后,可以将公网的注册请求消息转发给公共网络200中的AMF网元2,以由AMF网元2根据公网的注册请求消息判断是否允许该终端10在公共网络200中注册。如果AMF网元2允许该终端10在公共网络200中注册,则向N3IWF发送注册接受消息,以由N3IWF将该注册接受消息通过DN1发送给非公共网络100中的UPF网元1。UPF网元1接收到该注册接受消息之后可以利用与该终端10之间的PDU会话向该终端10发送该注册接受消息。可以理解的是,该DN1用于为非公共网络100提供服务,而DN2用于为公共网络200提供服务。即终端10可以通过非公共网络100访问DN1上部署的业务。即终端10可以通过公共网络200访问DN2上部署的业务。
需要说明的是,图5a所示的非公共网络100以及公共网络200中涉及到的各个网元之间的通信接口可以参考图4处的描述,此处不再赘述。如图5a所示,N3IWF与DN之间通过N6接口通信。N3IWF与AMF网元2之间通过公共网络的N2接口通信。
在3GPP的第二版本(第二版本为第一版本的升级版本)中,如图5所示,非公共网络100与公共网络200采用漫游架构互通,这时终端10具有与公共网络200之间的第二公网签约信息。如图5b所示:终端10使用与公共网络200之间的第二公网签约信息确定非公共网络100的标识。待终端10确定非公共网络100的标识之后,终端10可以选择利用该非公共网络中部署的(R)AN设备实现在非公共网络100中的注册。随后,终端10可以在非公共网络100中建立会话(例如,PDU会话),非公共网络100根据第二公网签约信息确定会话的模式为归属路由(home routed,HR)模式或者为本地疏导(local breakout)模式。例如,第二版本可以为R17。
应理解,第二公网签约信息中包括允许该终端10接入的一个或多个非公共网络的信息。当该终端10位于某个非公共网络a的覆盖范围时,终端10可以接收到该非公共网络a的广播信息(包括该非公共网络a的标识)。如果广播信息中包括的非公共网络a的标识与一个或多个非公共网络的标识中的某个非公共网络的标识相同,则该终端10便可以确定能够选择该非公共网络a接入。
图5b以非公共网络100与公共网络200支持互通的漫游架构为归属路由模式为例,图5b中 该终端10的非公共网络100(又可以称为该终端的拜访地网络(visited network))包括:AMF网元1、拜访地SMF(visited SMF,V-SMF)网元、拜访地(visited PCF,V-PCF)网元、(R)AN设备、拜访地UPF(visited UPF,V-UPF)网元以及拜访地NSSF(visited NSSF,V-NSSF)网元。该终端10的公共网络200(又可以称为该终端的归属地网络(home network))包括:归属地SMF(home SMF,H-SMF)网元、归属地PCF(home PCF,H-PCF)网元、归属地UPF(home UPF,H-UPF)网元、UDM网元、AUSF网元以及归属地NSSF(home NSSF,H-NSSF)网元。
其中,H-SMF网元与V-SMF网元通过N16接口通信,AUSF网元与AMF网元1通过N12接口通信。H-PCF网元与V-PCF网元通过N24接口通信。AMF网元1与V-NSSF网元通过N22接口通信。V-NSSF网元与H-NSSF网元通过N31接口通信。H-UPF网元与V-UPF网元通过N9接口通信。
其中,公共网络200中还可以包括:归属地-安全边缘保护代理(home Security edge protection proxy,H-SEPP)。非公共网络100中还可以包括:拜访地-安全边缘保护代理(visited Security edge protection proxy,V-SEPP)。公共网络200和非公共网络100之间通过拜访地的SEPP和归属地的SEPP通信。归属地的SEPP和拜访地的SEPP之间具有N32接口。
本申请实施例中涉及到的公共网络可以为PLMN,非公共网络可以为SNPN,此处统一说明,后续不再赘述。
核心网中的功能实体的功能如下:
UPF网元,用于根据SMF网元的路由规则执行用户数据包转发,如上行数据发送到DN或其他UPF;下行数据转发到其他UPF或者RAN。
AUSF网元:用于执行终端的安全认证。
AMF:用于实现终端接入管理和移动性管理。负责终端的状态维护,终端的可达性管理,非移动管理(mobility management,MM),非接入层(Non-access stratum,NAS)消息的转发,会话管理(Session Management,SM)N2消息的转发。
SMF网元:负责终端的会话管理,为终端的会话分配资源,释放资源;其中资源包括会话服务质量参数(quality of service,QoS),会话路径,转发规则等。
NSSF:用于为终端选择网络切片。
NEF:以北向应用编程接口(application programming interface,API)的方式向第三方开放网络功能。
NRF:为其他网元提供网络功能实体信息的存储功能和选择功能。
UDM网元:用于存储终端的签约信息或者管理终端的上下文。
PCF网元:用户策略管理。
AF网元:用于管理应用。
终端(terminal)可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备;还可以包括用户单元(subscriber unit)、蜂窝电话(cellular phone)、智能电话(smart phone)、无线数据卡、个人数字助理(personal digital assistant,PDA)电脑、平板型电脑、无线调制解调器(modem)、手持设备(handheld)、膝上型电脑(laptop computer)、无绳电话(cordless phone)或者无线本地环路(wireless local loop,WLL)台、机器类型通信(machine type communication,MTC)终端、用户设备(user equipment,UE),移动台(mobile station,MS),终端设备(terminal device)或者中继用户设备等。其中,中继用户设备 例如可以是5G家庭网关(residential gateway,RG)。为方便描述,本申请中,上面提到的设备统称为终端。
应理解,本申请实施例中的终端可以为物联网终端设备、港口、智能工厂、铁路交通、物流、无人机、无人驾驶汽车等多种垂直行业应用领域中的终端。例如:移动机器人(Mobile Robot)、自动导引车(Automated Guided Vehicle,AGV),无人驾驶汽车,列车上的控制设备和传感器、工厂中部署的控制设备和传感器(Sensor)等。
作为示例,在本申请实施例中,该终端还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。该终端还可以为应用于工厂的传感器设备。
接入网设备用于为特定区域的授权终端提供入网功能,并能够根据终端的级别,业务的需求等使用不同质量的传输隧道。接入网设备能够管理无线资源,为终端提供接入服务,进而完成控制信号和终端数据在终端和核心网之间的转发,接入网设备也可以理解为传统网络中的基站。例如,可以负责空口侧的无线资源管理、服务质量(quality of service,QoS)管理、数据压缩和加密等功能。
在本申请实施例中,一种网络的接入方法的执行主体的具体结构,本申请实施例并未特别限定,只要可以通过运行记录有本申请实施例的一种网络的接入方法的代码的程序,以根据本申请实施例的一种网络的接入方法进行通信即可。例如,本申请实施例提供的一种网络的接入方法的执行主体可以是第一终端中能够调用程序并执行程序的功能模块,或者为应用于第一终端中的通信装置,例如,芯片。本申请实施例提供的一种网络的接入方法的执行主体可以是接入管理网元中能够调用程序并执行程序的功能模块,或者为应用于接入管理网元中的通信装置,例如,芯片。本申请对此不进行限定。本申请实施例提供的一种网络的接入方法的执行主体可以是统一数据管理网元中能够调用程序并执行程序的功能模块,或者为应用于统一数据管理网元中的通信装置,例如,芯片。本申请对此不进行限定。下述实施例以一种网络的接入方法的执行主体为第一终端、接入管理网元、统一数据管理网元为例进行描述。
如图6所示,图6示出了本申请实施例提供的一种网络的接入方法的交互实施例,该方法包括:
步骤601、第一终端向第一非公共网络中的接入管理网元发送第一消息,相应的,第一非公共网络中的接入管理网元接收来自第一终端的第一消息。该第一消息用于请求在第一非公共网络中注册第一终端。
应理解,该第一终端位于该第一非公共网络的覆盖范围内。应理解,第一终端可以检测到一个或多个候选非公共网络,该第一非公共网络可以为一个或多个候选非公共网络中的任一个非公共网络。当然第一非公共网络可以为一个或多个候选非公共网络中的信号质量最强的候选非公共网络。
例如,接入管理网元可以为图2所示的接入管理网元20。第一非公共网络可以为图2中的非 公共网络100。
本申请实施例中的第一终端不具有接入非公共网络的权限或能力。当然该第一终端可以具有接入公共网络的权限或能力,本申请实施例对此不作限定。
需要说明的是,一方面,第一终端为不具有接入非公共网络的权限中的“非公共网络”可以为泛指,即该第一终端不具有接入任何非公共网络的权限。例如,无论非公共网络是非公共网络1还是非公共网络2,第一终端均不能接入。另一方面,第一终端为不具有接入非公共网络的权限中的“非公共网络”可以为特指,即该第一终端只是不能接入特定的非公共网络(例如,特定的非公共网络为第一非公共网络),但是该第一终端可以接入除第一非公共网络以外的非公共网络。例如,以第一非公共网络为非公共网络1为例,第一终端虽然不具有接入非公共网络1的功能,但是第一终端具有接入非公共网络2的功能。
举例说明,第一终端专门用于接入为工厂1服务的非公共网络2,当第一终端位于为工厂2服务的非公共网络1的覆盖范围内时,该第一终端不具有接入该非公共网络1的权限。
作为一种可能的实现方式,该第一消息中还可以携带该第一终端的标识。该第一终端的标识用于识别该第一终端。例如,第一终端的标识可以为以下一个或者多个:签约永久标识(subscription permanent identifier,SUPI)、用户隐藏标识符(subscriber concealed identifier,SUCI)。下述实施例中但凡涉及到终端的标识均可以参考此处的描述,后续不再赘述。
作为一种具体实现,本申请实施例中的步骤601可以通过以下方式实现:第一终端通过第一非公共网络中的接入网设备向第一非公共网络中的接入管理网元发送第一消息。相应的,第一非公共网络中的接入管理网元通过第一非公共网络中的接入网设备接收来自第一终端的第一消息。可以理解的是,接入管理网元还可以从第一非公共网络中的接入网设备处获取该第一非公共网络的信息。例如,该第一非公共网络的信息用于识别该非公共网络。例如,该第一非公共网络的信息可以为该第一非公共网络的标识。以第一非公共网络的信息为第一非公共网络的标识为例,则第一非公共网络的标识由目标公共网络的标识和NID确定。
本申请实施例中的目标公共网络为与该第一非公共网络对应的公共网络。例如,以目标公共网络为A运营商的公共网络,如果A运营商为目标公共网络分配的目标公共网络的标识为“00000”,NID为“0001”,则第一非公共网络的标识包括“000000001”。换言之,目标公共网络的标识为部署第一非公共网络的运营商为该目标公共网络分配的特定值。或者,该目标公共网络的标识为第三方运营商为该目标公共网络预留的固有值,本申请实施例对此不做限定。
例如,第一消息可以为注册请求消息。
步骤602、接入管理网元向第一公共网络中的统一数据管理网元发送查询消息,相应的,第一公共网络中的统一数据管理网元接收来自非公共网络中的接入管理网元的查询消息。该查询消息用于查询第一终端的签约数据。
其中,第一公共网络与第一非公共网络互通,换言之,步骤601~步骤605中描述的第一非公共网络为与第一公共网络互通的非公共网络。
例如,查询消息中可以携带第一终端的标识以及该第一非公共网络的信息。
例如,第一公共网络可以为图2所示的公共网络200。统一数据管理网元可以为图2中的统一数据管理网元40。
步骤603、统一数据管理网元向接入管理网元发送第三消息,相应的,接入管理网元从第一公共网络中的统一数据管理网元处获取第三消息。该第三消息包括以下一项或多项:第一终端的 签约数据、原因值。
其中,签约数据中包括第二指示信息。一方面,该第二指示信息用于指示第一终端只能通过公共网络接入。或者,另一方面,第二指示信息用于指示第一终端不能通过非公共网络接入。该原因值表示不允许第一终端在第一非公共网络中接入。
需要说明的是,如果统一数据管理网元可以主动向接入管理网元发送第三消息,则步骤602可以省略。
应理解,上述第一终端只能通过公共网络接入中的“公共网络”为泛指,即该第一终端用于通过除非公共网络外的任何公共网络接入,并不局限于只能通过第一公共网络接入。上述第一终端不能通过非公共网络接入中的“非公共网络”可以为泛指,即该第一终端不能够通过任何非公共网络接入。上述第一终端不能通过非公共网络接入中的“非公共网络”为特指,即该第一终端不能够通过该第一非公共网络接入。本申请实施例对此不做限定。
步骤604、接入管理网元根据第三消息向第一终端发送第二消息,相应的,第一终端接收来自接入管理网元的第二消息。该第二消息用于表示拒绝第一终端在第一非公共网络进行注册。其中,第二消息包括第一指示信息,该第一指示信息表示禁止第一终端在第一非公共网络中接入。
步骤605、第一终端根据第一指示信息更新第一终端的网络禁选列表。其中,该更新后的网络禁选列表中包括第一非公共网络的信息。
当然该更新后的网络禁选列表可以看作为第一网络禁选列表。
作为一种可替代的方式,本申请实施例中的步骤605可以通过以下方式实现:第一终端根据第一指示信息将第一非公共网络的信息加入第一终端的网络禁选列表中。
可以理解的是,一方面,该第一终端的网络禁选列表中可能本身具有一个或多个网络的信息,该一个或多个网络中包括第一非公共网络,换言之,第一终端的网络禁止列表中可能包括该第一非公共网络。该一个或多个网络中每个网络具有一个记录项,该记录项用于表示该网络是被禁止接入的还是允许接入的。在这种情况下,该更新后的网络禁选列表中包括第一非公共网络的信息可以理解为:第一终端将第一非公共网络对应的记录项设置为被禁止接入状态。
所谓的第一终端更新第一终端的网络禁选列表可以指:第一终端更新网络禁选列表中第一非公共网络对应的记录项。
举例说明,第一非公共网络的记录项为指示符a,表示该第一非公共网络是被禁止接入的。第一非公共网络的记录项为指示符b,表示该第一非公共网络是被允许接入的。该网络禁选列表中包括第一非公共网络对应的记录项为指示符b,然后第一终端执行上述步骤601~步骤603以请求接入该第一非公共网络。但是第一终端在请求接入第一非公共网络的过程中接收到第二消息。第二终端根据第二消息确定被拒绝接入该第一非公共网络。之后第一终端可以将第一非公共网络对应的记录项设置为指示符a。
当然指示符a也可以使用去激活状态表示,指示符b也可以使用激活状态表示,本申请实施例对此不做限定。
当然,另一方面,该第一终端的网络禁选列表中可能本身具有一个或多个网络的信息,该一个或多个网络中不包括第一非公共网络,则该更新后的网络禁选列表中包括第一非公共网络的信息可以理解为:第一终端将第一非公共网络的信息加入该网络禁选列表,且设置该第一非公共网络对应的记录项为指示符a。
举例说明,以第一非公共网络为非公共网络1,第一终端不具有接入非公共网络1的权限为 例,当第一终端位于非公共网络1的覆盖范围时,第一终端可以利用非公共网络1中的接入网设备向非公共网络1中的接入管理网元发送第一消息,以请求在非公共网络1中注册,之后如果第一终端接收到来自接入管理网元的第二消息,如果第二消息表示拒绝该第一终端在非公共网络1中进行注册,则第一终端可以确定非公共网络1为第一终端禁止接入的非公共网络。
本申请实施例中第一非公共网络的信息用于识别第一非公共网络。例如,该第一非公共网络的信息可以为第一非公共网络的标识。当然,该第一非公共网络的信息还可以是其他可以标识该第一非公共网络的参数,本申请实施例对此不做限定。
本申请实施例提供一种网络的接入方法,该方法中第一终端通过向第一非公共网络中的接入管理网元发送第一消息,以请求在第一非公共网络中注册该第一终端。之后,第一终端接收来自接入管理网元的第二消息,该第二消息表示拒绝第一终端在第一非公共网络进行注册,且第一指示信息表示禁止第一终端在第一非公共网络中接入。以便于第一终端根据第一指示信息更新第一终端的网络禁选列表,使得更新后的网络禁选列表中包括第一非公共网络的信息,后续第一终端在选择网络注册时便可以避免选择被禁止接入的第一非公共网络。该方案可以解决不具有接入非公共网络的权限的第一终端尝试接入第一非公共网络的问题。
在一种可能的实施例中,本申请实施例提供的方法在步骤605之后还可以包括:第一终端根据更新后的网络禁选列表选择除第一非公共网络以外的网络进行注册。
作为一种具体实现,第一终端根据更新后的网络禁选列表选择除第一非公共网络以外的网络进行注册可以通过以下方式实现:第一终端根据更新后的网络禁选列表选择除更新后的网络禁选列表记载的网络进行注册。
举例说明,以第一非公共网络为非公共网络1为例,如果更新后的网络禁选列表中包括非公共网络1的信息,则第一终端可以选择非公共网络1以外的非公共网络2进行注册。如果更新后的网络禁选列表中包括非公共网络1的信息以及非公共网络2的信息,则第一终端可以选择除非公共网络1和非公共网络2以外的非公共网络3进行注册,该更新后的网络禁选列表中未包括非公共网络3的信息。
在一种可能的实施例中,本申请实施例提供的方法在步骤605之后还可以包括:第一终端根据第一指示信息启动定时器,在定时器超时的情况下,第一终端从更新后的网络禁选列表中删除第一非公共网络的信息。这样可以使得在定时器超时的情况下,第一非公共网络依然可以作为该第一终端能够选择接入的非公共网络。
应理解,定时器超时可以指达到该定时器对应的定时器时间值。
在一种可替代的实现方式中,上述第一终端从更新后的网络禁选列表中删除第一非公共网络的信息还可以通过以下方式替换:第一终端更新第一网络禁选列表,得到第二网络禁选列表。该第二网络禁选列表中不包括第一非公共网络的信息,或者该第二网络禁选列表中包括的第一公共网络对应的记录项表示该第一非公共网络为可接入的网络,本申请实施例对此不做限定。
结合上例,在定时器超时的情况下,第一终端将第一非公共网络对应的记录项从指示符a更新为指示符b。
可以理解的是,当第一终端从更新后的网络禁选列表中删除第一非公共网络的信息,则后续第一终端便可以继续请求在该第一非公共网络中注册。举例说明,针对不具有接入非公共网络的权限的第一终端,若该第一终端经过配置后具有接入非公共网络的权限,则在达到定时器对应的定时器时间值时,由于第一终端从网络禁选列表中删除第一非公共网络的信息,则后续第一终端 便可以在该第一非公共网络中注册。
需要说明的是,本申请实施例中从某个网络禁选列表中删除某个非公共网络的信息也可以表达为:第二终端将该非公共网络对应的记录项设置为指示符a。
本申请实施例中上述定时器对应的定时器时间值可以由协议预定义,或者该定时器对应的定时器时间值可以由第一终端自己配置,或者该定时器对应的定时器时间值可以由接入管理网元为该第一终端配置。
在由接入管理网元为该第一终端配置定时器对应的定时器时间值的情况下,第二消息包括定时器时间值,相应的,第一终端根据定时器时间值设置定时器。当然,该接入管理网元还可以通过除第二消息以外的其他消息向第一终端发送定时器对应的定时器时间值,本申请实施例对此不做限定。
如图6所描述的实施例可以适用于如下场景:
场景1、第一非公共网络和第一公共网络均为第一版本中定义的网络,例如,第一非公共网络为R16非公共网络,第一公共网络为R16公共网络。
场景2、第一非公共网络和第一公共网络均为第二版本中定义的网络,例如,第一非公共网络为R17非公共网络,第一公共网络为R17公共网络。此时,接入管理网元可以为如图5b中的AMF网元1。
在场景1和场景2中当第一非公共网络和第一公共网络之间不支持互通的情况下,步骤605可以省略。此时,第二消息中的第一指示信息可以由指示信息x替换,其中,指示信息x用于指示禁止该第一终端在第一非公共网络中接入的原因为:该第一终端为非法终端。第一终端为非法终端表示该第一非公共网络无法识别该第一终端的身份。
在场景2中当第一非公共网络和第一公共网络之间支持互通的情况下,步骤605为必选步骤。
需要说明的是,如果第一非公共网络为R17非公共网络,第一公共网络为R17公共网络,则第一非公共网络与第一公共网络采用漫游架构互通。
如图7所示,图7示出了本申请实施例提供的一种网络的接入方法的交互实施例,该方法包括:
步骤701、第一非公共网络中的接入网设备发送广播信息,相应的,第二终端接收来自第一非公共网络中的接入网设备的广播信息。该广播信息包括第一指示信息,该第一指示信息用于指示第一非公共网络与公共网络互通。
本申请实施例中的第二终端为具有接入非公共网络功能的权限。当然该第二终端可以具有接入公共网络的权限,或者该第二终端也可以不具有接入公共网络的权限,本申请实施例对此不作限定。
需要说明的是,一方面,第二终端为具有接入非公共网络的权限中的“非公共网络”可以为泛指,即该第二终端具有接入任何非公共网络的权限。例如,无论非公共网络是非公共网络1还是非公共网络2,第二终端均能够接入。另一方面,第二终端为具有接入非公共网络的权限中的“非公共网络”可以为特指,即该第二终端只能够接入特定的非公共网络(例如,特定的非公共网络为第一非公共网络)。
可以理解的是,第一非公共网络与公共网络互通中的“公共网络”可以为泛指的任何公共网络。
应理解,该第二终端位于第一非公共网络的覆盖范围内,且该第二终端能够接收到来自第一 非公共网络中的接入网设备发送的广播信息。
示例性的,第一指示信息可以为第一指示符,该第一指示符用于表示第一非公共网络与公共网络互通。例如,第一指示信息可以为“1”。
作为一种具体实现,该第一指示信息用于指示第一非公共网络与公共网络使用漫游架构互通。以便于第二终端使用漫游架构接入该第一非公共网络。所谓第二终端使用漫游架构接入该第一非公共网络可以指:第二终端使用该第二终端在公共网络中的签约信息(例如,下述第一签约信息)接入该第一非公共网络。
在一种可能的实现方式中,本申请实施例中的方法在步骤701之前还可以包括:第一非公共网络中的接入网设备确定第一非公共网络与公共网络互通。例如,第一非公共网络中的接入网设备确定第一非公共网络与公共网络互通可以通过以下方式实现:接入网设备根据运营商配置信息确定非公共网络与公共网络互通。
步骤702、第二终端根据广播信息,确定使用第一签约信息接入该第一非公共网络。其中,第一签约信息为第二终端在第一公共网络中的签约信息。
在一种可能的实现方式中,第一签约信息中携带的该第二终端的第一标识与第一公共网络相关。例如,该第二终端的第一标识中携带第一公共网络的信息,如网络标识PLMN ID。
可以理解的是,第一公共网络为与该第一非公共网络互通的一个或多个公共网络中的一个。
举例说明,第一公共网络可以为如图5b中的公共网络200。第一非公共网络可以为如图5b中的非公共网络100。接入管理网元可以为如图5b中的AMF网元1。
本申请实施例提供一种网络的接入方法,该方法中第二终端通过接收来自接入网设备广播的广播信息,这样便于第二终端根据广播信息中携带的第一指示信息确定第一非公共网络支持与公共网络之间的互通。然后第二终端可以确定使用第一签约信息接入该第一非公共网络。待后续第二终端需要接入该第一非公共网络时,便可以使用该第一签约信息请求在该第一非公共网络中注册,避免了第二终端在不知道公共网络和第一非公共网络之间互通的情况下,盲目向第一非公共网络发起注册请求,而导致的注册失败。
在一种可能的实施例中,本申请实施例提供的方法在步骤702之后还可以包括:第二终端使用第一签约信息接入该第一非公共网络。
在一种可能的实现方式中,第二终端使用第一签约信息接入该第一非公共网络可以通过以下方式实现:第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息,该第一消息用于表示在第一非公共网络中注册该第二终端。该第一消息中携带该第二终端的第一标识。
作为一种示例,该第一消息中可以携带注册指示,该注册指示用于表示在第一非公共网络中注册该第二终端。
在一种可能的实施例中,广播信息还包括与第一非公共网络互通的一个或多个公共网络的信息,第一公共网络属于该一个或多个公共网络。接入网设备通过广播一个或多个公共网络的信息,以便于第二终端确定该第二终端可以接入的一个或多个公共网络。
在一种可能的实现方式中,广播信息还可以包括手选接入指示,第二终端根据手选接入指示提示用户使用手动选择方式接入该第一非公共网络,防止第二终端自动选择到该第一非公共网络。
举例说明,如果该第一非公共网络属于A国家,则该一个或多个公共网络也属于A国家。
在一种可能的实现方式中,第一公共网络可以为该一个或多个公共网络中的任一个。即第二终端可以在一个或多个公共网络中任选一个公共网络作为第一公共网络。在另一种可能的实现方 式中,第一公共网络的网络选择优先级在一个或多个公共网络的网络选择优先级中为最高的。或者第一公共网络为该第二终端支持的公共网络。
应理解,第二终端中具有一个或多个公共网络中每个公共网络的网络选择优先级。
在一种可能的实现方式中,第二终端中具有与公共网络之间的签约信息。
图7所描述的实施例中涉及到的第一非公共网络可以为R17非公共网络。公共网络可以为R17公共网络。换言之,图7所描述的实施例中的第一非公共网络和公共网络之间采用漫游架构互通。
如图8所示,图8示出了本申请实施例提供的一种网络的接入方法的交互实施例,该方法包括:
步骤801、第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息,相应的,第一非公共网络中的接入管理网元接收来自第二终端的第一消息,该第一消息用于表示第二终端请求使用第一签约信息在第一非公共网络中注册。
作为一种示例,本申请实施例中的第二终端为支持第一版本网络的第二终端,所谓支持第一版本网络的第二终端是指:该第二终端中具有与第一版本的第一非公共网络之间的非公网签约信息,以及具有与第一版本的第一公共网络之间的公网签约信息。此时,步骤801中第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息中的“第一非公共网络”指第二版本的第一非公共网络。
当第二终端为支持第一版本网络的第二终端时,第一非公共网络中的接入管理网元可以为第二版本的第一非公共网络中的接入管理网元。此时,第一签约信息为第二终端在第一非公共网络中的签约信息,换言之,第一签约信息为第二终端在第一版本的第一非公共网络中的非公网签约信息。
作为另一种示例,本申请实施例中的第二终端为支持第二版本网络的第二终端,所谓支持第二版本网络的第二终端是指:该第二终端中具有与第二版本的第一公共网络之间的公网签约信息。此时,步骤801中第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息中的“第一非公共网络”指第一版本的第一非公共网络。
当第二终端为支持第二版本网络的第二终端时,第一非公共网络中的接入管理网元可以为第一版本的第一非公共网络中的接入管理网元。此时,第一签约信息为第二终端在第一公共网络中的签约信息。换言之,第一签约信息为第二终端与第二版本的第一公共网络之间的公网签约信息。
上述第一版本可以为R16版本,第二版本可以为R17版本。
在一种可能的实现方式中,第二版本的第一公共网络与第二版本的第一非公共网络采用漫游架构互通的情况下,该第一签约信息为第二终端在第一版本的第一非公共网络中的签约信息。此时,第一签约信息中携带的第二终端的第二标识与第一非公共网络相关,例如,第二终端的第二标识中包括第一非公共网络的标识。
在一种可能的实现方式中,第一版本的第一公共网络与第一版本的第一非公共网络采用N3IWF互通的情况下,该第一签约信息为第二终端在第二版本的第一公共网络中的签约信息。此时,第一签约信息中携带的第二终端的第三标识与第一公共网络相关。例如,第二终端的第三标识中包括第一公共网络的信息。例如,第一公共网络的信息用于识别第一公共网络。
应理解,本申请实施例中第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息可以理解为:第二终端向第一非公共网络中的接入管理网元发送第一消息,该第一消息中包括的第二终端的标识可以从第一签约信息中得到。
例如,如果第一非公共网络为第二版本的第一非公共网络,则第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送的第一消息中携带第二终端的第二标识。例如,如果第一非公共网络为第一版本的第一非公共网络,则第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送的第一消息中携带第二终端的第三标识。
步骤802、接入管理网元向第二终端发送第二消息,相应的,该第二终端接收来自接入管理网元的第二消息。
其中,第二消息用于拒绝第二终端在非公共网络中注册,该第二消息中包括第四指示信息,第四指示信息用于指示拒绝第二终端在非公共网络中进行注册的原因。
综上描述,图8所描述的实施例可以适用于:第二终端所签约的非公共网络或公共网络与第二终端进行注册的非公共网络的版本不同。即情况1、第二终端使用第二终端在第一版本的第一非公共网络中的私网签约信息请求在第二版本的第一非公共网络中注册时,第二版本的第一非公共网络中的接入管理网元拒绝该第二终端在第二版本的第一非公共网络中注册。情况2、第二终端使用第二终端在第二版本的第一公共网络中的公网签约信息请求在第一版本的第一非公共网络中注册时,第一版本的第一非公共网络中的接入管理网元拒绝该第二终端在第一版本的第一非公共网络中注册。
由于第一签约信息可以为第二终端在第一非公共网络中的签约信息,也可以为第二终端在第一公共网络中的签约信息,但是不同情况下,第二终端接收到第二消息之后的处理动作存在差异,下述将分别介绍:
示例1,第一签约信息为第二终端在第一非公共网络中的签约信息,是指第一签约信息为第二终端在第一版本的第一非公共网络中的签约信息。但是第二终端要注册的第一非公共网络为第二版本的第一非公共网络,第一公共网络为第二版本的第一公共网络。
本申请实施例提供一种网络的接入方法,该方法中第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息,该第一签约信息为第二终端在第一非公共网络中的签约信息或者该第一签约信息为第二终端在第一公共网络中的签约信息。之后第二终端接收来自接入管理网元的第二消息,这样便于后续第二终端根据第二消息确定第一非公共网络中的接入网管理网元拒绝第二终端在非公共网络中注册,以及根据第四指示信息确定接入管理网元拒绝第二终端在非公共网络中进行注册的原因。该方案可以解决第二终端使用第二终端在第一非公共网络中的签约信息在第一非公共网络中注册的问题,或者解决第二终端使用第二终端在第一公共网络中的签约信息在第一非公共网络中注册的问题。
如图9所示,图9示出了本申请实施例的另一种网络的接入方法,该方法包括:
步骤901、同步骤801,此处不再赘述。
步骤902、接入管理网元确定拒绝第二终端在该第一非公共网络中注册。
具体的,步骤902可以通过以下方式实现:接入管理网元根据配置信息或者第二终端在第一非公共网络中的签约信息确定拒绝第二终端在第一非公共网络中注册。
例如,配置信息指示该第一非公共网络不支持采用N3IWF模式与第一公共网络之间的互通,则接入管理网元确定拒绝第二终端在第一非公共网络中注册。
例如,第二终端在第一非公共网络中的签约信息指示第二终端不能再使用此签约信息接入该第一非公共网络,则接入管理网元确定拒绝第二终端在第一非公共网络中注册。
步骤903、同步骤802,此处不再赘述。
在一种可能的实施例中,如图9所示本申请实施例提供的方法在步骤903之后还可以包括步骤904,或者本申请实施例提供的方法在步骤904之后还可以包括步骤905和步骤906:
步骤904、接入管理网元向第二终端发送第四消息,相应的,第二终端接收来自接入管理网元的第四消息,该第四消息包括第二终端的网络候选列表。网络候选列表包括第一非公共网络的信息。
本申请实施例中网络候选列表包括第一非公共网络的信息时,表示第二终端可以在该第一公共网络中进行注册。该网络候选列表包括第一非公共网络的信息也可以替换为:网络候选列表中包括的第一公共网络对应的记录项处于激活状态。
应理解,第二终端的网络候选列表中包括第二终端可选择接入的一个或多个候选非公共网络。该第一非公共网络属于该一个或多个候选非公共网络。
可以理解的是,通过执行步骤904第二终端能够确定虽然第二终端使用第二终端在第一版本的第一非公共网络中的签约信息在第一非公共网络中注册被拒绝,但是第二终端能够在该第一非公共网络中注册。
步骤905、接入管理网元向第二终端发送第五消息,相应的,第二终端接收来自接入管理网元的第五消息,第五消息用于表示接受第二终端在第一非公共网络中注册。
例如,第五消息中包括接受指示,该接受指示用于表示接受第二终端在第一非公共网络中注册。
步骤906、第二终端根据第五消息,将第一非公共网络的信息添加到第二终端的网络候选列表中。
作为一种可替代的实现方式,本申请实施例中的步骤906也可以描述为:第二终端根据第五消息更新第二终端的网络禁选列表。其中,该更新后的网络禁选列表中包括第一非公共网络的信息。
关于第二终端更新第二终端的网络禁选列表的方式可以具体参考上述第一终端更新第一终端的网络禁止列表的过程,此处不再赘述。
可以理解的是,通过执行步骤905和步骤906第二终端能够确定虽然第二终端使用第二终端在第一版本的第一非公共网络中的签约信息在第一非公共网络中注册被拒绝,但是第二终端能够在第一非公共网络中注册。
在一种可能的实施例中,如图9所示本申请实施例提供的方法在第二终端确定可以在第一非公共网络中注册的情况下,还可以包括:
步骤907、第二终端根据第四指示信息,使用第二终端的第二签约信息在第一非公共网络中进行注册,第二签约信息为第二终端在第一公共网络中的签约信息。
该第二签约信息中包括第一公共网络的标识,该第二签约信息中包括第二终端的第五标识,该第五标识与第一公共网络的标识相关。
可以理解的是,当第一签约信息为第二终端在第一非公共网络中的签约信息时,第四指示信息还可以用于指示第二终端采用漫游架构在第一非公共网络中进行注册,换言之,第四指示信息还可以用于指示第二终端使用第二终端的第二签约信息在第一非公共网络中进行注册,本申请实施例对此不做限定。
本申请实施例提供一种网络的接入方法,该方法中第二终端使用第一签约信息向第一非公共网络中的接入管理网元发送第一消息,该第一签约信息为第二终端在第一非公共网络中的签约信 息。之后第二终端接收来自接入管理网元的第二消息,这样便于后续第二终端根据第二消息确定第一非公共网络中的接入网管理网元拒绝第二终端在非公共网络中注册,以及根据第四指示信息确定接入管理网元拒绝第二终端在非公共网络中进行注册的原因。后续如果该第二终端要继续在第一非公共网络注册,则第二终端可以根据该原因采用第二终端的第二签约信息在第一非公共网络中进行注册。该方案可以实现第二终端使用第二终端在第一非公共网络中的签约信息在第一非公共网络中注册被拒绝之后,使用第二签约信息在第一非公共网络中进行注册。
示例2,第一签约信息为第二终端在第一公共网络中的签约信息,是指第一签约信息为第二终端在第二版本的第一公共网络中的签约信息。但是第二终端将要注册的第一非公共网络为第一版本的第一非公共网络。与该第一版本的第一非公共网络互通的第一公共网络为第一版本的第一公共网络。
在这种情况下,第四指示信息用于指示第二终端为非法终端,换言之第四指示信息用于指示非公共网络不能识别该第二终端的身份。
如图10所示,图10示出了本申请实施例的另一种网络的接入方法,该方法包括:
步骤1001、同步骤801,此处不再赘述。
步骤1002、接入管理网元确定拒绝第二终端在该第一非公共网络中注册。
具体的,步骤1002可以通过以下方式实现:接入管理网元获取不到该第二终端的签约信息或者不能识别该第二终端的身份,即第二终端认证失败,则确定拒绝第二终端在第一非公共网络中注册。
步骤1003、同步骤802,此处不再赘述。
应理解,第二消息还用于指示该第二终端使用第三签约信息请求在第一非公共网络中进行注册。
在一种可能的实施例中,第二终端中还具有该第二终端在第一非公共网络中的第三签约信息的情况下,如图10所示,本申请实施例提供的方法在步骤1003之后还可以包括:
步骤1004、第二终端使用第三签约信息请求在第一非公共网络中进行注册。
应理解,该第三签约信息为第二终端与第一版本的第一非公共网络之间的签约信息。第三签约信息中包括第二终端的第四标识,该第四标识与第一非公共网络相关。例如,该第四标识中包括第一非公共网络的信息。如第一非公共网络的标识,关于第一非公共网络的标识的内容可以参考本申请实施例其他地方的描述,此处不再赘述。
作为一种可能的实现方式,本申请实施例中的步骤1004可以通过以下方式实现:第二终端向第一版本的非公共网络中的接入管理网元发送注册请求消息,该注册请求消息用于请求在该第一版本的非公共网络中注册该第二终端。该注册请求消息中包括该第二终端的第四标识。该第二终端的第四标识由第三签约信息确定,换言之,该第二终端的第四标识中包括第一非公共网络的信息。
作为一种可能的实现方式,当第二终端成功在该第一版本的第一非公共网络中注册之后,本申请实施例提供的方法还可以包括:第二终端使用该第二终端在第一公共网络中的签约信息请求在第一版本的第一公共网络中进行注册。
可以理解的是,在示例2中步骤1003中的第二消息中还可以包括用于指示第二终端使用第三签约信息请求在第一非公共网络中进行注册的指示信息。
本申请实施例提供一种网络的接入方法,该方法中第二终端使用第一签约信息向第一非公共 网络中的接入管理网元发送第一消息,该第一签约信息为第二终端在第一公共网络中的签约信息。之后第二终端接收来自接入管理网元的第二消息,这样便于后续第二终端根据第二消息确定第一非公共网络中的接入网管理网元拒绝第二终端在非公共网络中注册,以及根据第四指示信息确定接入管理网元拒绝第二终端在非公共网络中进行注册的原因为第二终端为非法终端。后续如果该第二终端要继续在第一非公共网络注册,则第二终端可以根据该原因采用第二终端的第三签约信息在第一非公共网络中进行注册。该方案可以实现第二终端使用第二终端在第一公共网络中的签约信息在第一非公共网络中注册被拒绝之后,使用第三签约信息在第一非公共网络中进行注册。
结合图5b所示的架构,如图11所示,图11以第一终端为非SNPN设备,第一非公共网络为R17版本的SNPN(下述简称:R17 SNPN,对应图5b中的非公共网络100),接入管理网元为R17 SNPN中的SNPN AMF网元(对应图5b中的AMF网元1),接入网设备为SNPN RAN,公共网络为R17版本的PLMN(下述简称:R17 PLMN,对应图5b中的公共网络200),统一数据管理网元为图5b中的UDM网元为例,该方法包括:
步骤1101、非SNPN设备向SNPN AMF网元发送注册请求消息,相应的,SNPN AMF网元接收来自非SNPN设备的注册请求消息。该注册请求消息用于请求在R17 SNPN中注册非SNPN设备。
例如,注册请求消息中携带非SNPN设备的标识。例如,非SNPN设备的标识可以为SUPI或SUCI。
作为一种具体实现:步骤1101可以通过以下方式实现:非SNPN设备通过R17 SNPN中的SNPN RAN向SNPN AMF网元发送注册请求消息。此外,SNPN AMF网元还可以从SNPN RAN处接收R17 SNPN的标识,该R17 SNPN的标识用于识别R17 SNPN。其中,非SNPN设备的SUPI或SUCI中包含非SNPN设备的HPLMN ID。该HPLMN ID用于确定该非SNPN设备对应的归属地公共网络。
步骤1102、如果R17 SNPN与R17 PLMN之间不支持漫游互通,则SNPN AMF网元向非SNPN设备发送注册拒绝消息1,相应的,非SNPN设备接收来自SNPN AMF网元的注册拒绝消息1。
其中,注册拒绝消息1用于表示拒绝非SNPN设备在R17 SNPN中注册,该注册拒绝消息1中还可以携带表示拒绝非SNPN设备在R17 SNPN中注册的原因为:该非SNPN设备为非法终端(Illegal UE)。
步骤1103、如果R17 SNPN与R17 PLMN之间支持漫游互通,则SNPN AMF网元向R17 PLMN中的UDM网元发送签约获取请求消息,相应的,UDM网元接收来自SNPN AMF网元的签约获取请求消息。其中,签约获取请求消息用于请求非SNPN设备的签约数据。
例如,签约获取请求消息中携带R17 SNPN的标识以及非SNPN设备的标识。通过在签约获取请求消息中携带R17 SNPN的标识便于UDM网元确定该非SNPN设备要接入的非公共网络。
如图11所示,步骤1103可以通过以下方式实现:SNPN AMF网元向R17 SNPN中的V-SEPP发送签约获取请求消息。之后V-SEPP向R17 PLMN中的H-SEPP发送获取到的签约获取请求消息,以由H-SEPP向UDM网元转发该签约获取请求消息。
步骤1104、UDM网元向SNPN AMF网元发送签约获取响应消息,相应的,SNPN AMF网元接收来自UDM网元的签约获取响应消息,该签约获取响应消息用于SNPN AMF网元确定拒绝非SNPN设备在R17 SNPN中注册。
如图11所示,步骤1104可以通过以下方式实现:UDM网元向R17 PLMN中的H-SEPP发送 签约获取响应消息。之后H-SEPP向R17 SNPN中的V-SEPP发送获取到的签约获取响应消息,以由V-SEPP向R17 SNPN中的SNPN AMF网元发送该签约获取响应消息。
例如,一方面,签约获取响应消息中携带非SNPN设备的签约数据,该签约数据中包括第二指示信息,该第二指示信息用于指示非SNPN设备只能通过公共网络接入。或者,第二指示信息用于指示非SNPN设备不能通过非公共网络接入。例如,第二指示信息包括该非SNPN设备支持的网络列表。其中,该非SNPN设备支持的网络列表中不包括该R17 SNPN的信息。或者该非SNPN设备支持的网络列表中该R17 SNPN对应的记录项用于表示该R17 SNPN是被禁止接入的。
另一方面,签约获取响应消息中包括第三指示信息,该第三指示信息用于指示未成功获取该非SNPN设备的签约数据。
再一方面,签约获取响应消息中包括原因值,原因值用于表示不允许该非SNPN设备在R17SNPN中接入。
又一方面,签约获取响应消息中未包括非SNPN设备的签约数据。
步骤1105、SNPN AMF网元根据签约获取响应消息确定拒绝非SNPN设备在R17 SNPN中注册。
步骤1106、SNPN AMF网元向非SNPN设备发送注册拒绝消息2,相应的,非SNPN设备接收来自SNPN AMF网元的注册拒绝消息2。该注册拒绝消息2用于表示拒绝非SNPN设备在R17 SNPN中注册。该注册拒绝消息2中还可以携带拒绝非SNPN设备在R17 SNPN中注册的原因。例如,拒绝非SNPN设备在R17 SNPN中注册的原因为不允许该非SNPN设备接入该R17 SNPN。
步骤1107、非SNPN设备将R17 SNPN的信息加入该非SNPN设备的网络禁选列表。
应理解,步骤1107还可以通过以下方式实现:非SNPN设备更新该非SNPN设备的网络禁选列表。其中,更新后的非SNPN设备的网络禁选列表中包括R17 SNPN的信息。R17 SNPN的信息用于识别R17 SNPN。例如,R17 SNPN的信息可以为R17 SNPN的标识。
应理解,网络禁选列表中包括该非SNPN设备禁止接入的一个或多个网络,该一个或多个网络包括上述R17 SNPN。
在一种可能的实施例中,本申请实施例提供的方法在步骤1107之后还可以包括:
步骤1108、非SNPN设备根据网络禁选列表执行网络选择,以选择除该网络禁选列表中的网络进行注册。
需要说明的是,在图11所示的实施例中,步骤1101和步骤1102可以形成一个单独的实施例,用以解决在R17 SNPN与R17 PLMN之间不支持漫游架构互通的情况下,非SNPN设备接入R17 SNPN的问题。步骤1101、步骤1103~步骤1108可以形成一个单独的实施例,用以解决在R17 SNPN与R17 PLMN之间支持漫游架构互通的情况下,非SNPN设备接入R17 SNPN的问题。
需要说明的是,在图11所示的实施例中的注册请求消息可以对应上述图6所示的实施例中的第一消息。签约获取响应消息可以对应上述图6所示的实施例中的第三消息。注册拒绝消息2可以对应上述图6所示的实施例中的第二消息。签约获取请求消息可以对应上述图6所示的实施例中的查询消息。拒绝非SNPN设备在R17 SNPN中注册的原因可以对应上述图6所示的实施例中的第一指示信息。
结合图5b,如图12所示,图12示出了本申请的另一种网络的接入方法的具体实施例,该实施例以第一非公共网络为R17 SNPN,接入网设备为SNPN RAN,第二终端为SNPN设备为例,该方法包括:
步骤1201、R17 SNPN中的SNPN RAN发送广播信息,相应的,SNPN设备接收到来自SNPN RAN的广播信息。该广播信息中包括互通指示,该互通指示用于表示R17 SNPN与R17 PLMN之间支持互通。
可以理解的是,该SNPN设备位于R17 SNPN的覆盖范围内,且该SNPN设备能够接收到来自SNPN RAN的广播信息。
步骤1202、该SNPN设备根据广播信息中的互通指示,确定使用该SNPN设备与R17 PLMN之间的签约信息接入该R17 SNPN与R17 PLMN。
在一种可能的实现方式中,如果该广播信息中还包括与R17 SNPN互通的一个或多个R17 PLMN的标识,则步骤1202可以通过以下方式实现:该SNPN设备根据广播信息中的互通指示,确定使用该SNPN设备与目标R17 PLMN之间的目标签约信息接入该R17 SNPN与R17 PLMN。其中,目标R17 PLMN属于该一个或多个R17 PLMN。
在一种可能的实现方式中,如图12所示的实施例在步骤1202之后还可以包括:该SNPN设备通过该R17 SNPN中的SNPN RAN向该R17 SNPN中的SNPN AMF网元发送注册请求消息,以请在该R17 SNPN中进行注册。该注册请求消息中携带目标签约信息中描述的该SNPN设备的标识,目标签约信息中描述的该SNPN设备的标识中包括R17 PLMN的标识。在该SNPN AMF网元允许该SNPN设备在R17 SNPN中注册的情况下,该SNPN AMF网元向该SNPN设备发送注册接受消息。
结合图5b,如图13所示,图13以第二终端为SNPN设备,第一非公共网络为R17版本的SNPN(下述简称:R17 SNPN),接入管理网元为R17 SNPN中的SNPN AMF网元,接入网设备为SNPN RAN,第一公共网络为R17版本的PLMN(下述简称:R17 PLMN),统一数据管理网元为UDM网元为例,描述了本申请实施例提供的一种网络的接入方法的具体实施例,该方法包括:
步骤1301、SNPN设备使用签约信息1向SNPN AMF网元发送注册请求消息,相应的,SNPN AMF网元接收来自SNPN设备的注册请求消息。该注册请求消息中包括该SNPN设备的标识1。
应理解,图13和图14所示的SNPN设备可以为R16 SNPN设备,所谓R16 SNPN设备是指该SNPN设备中具有与R16版本的SNPN之间的私网签约信息,也具有与R16版本的PLMN之间的公网签约信息。上述签约信息1可以为该SNPN设备中具有的与R16版本的SNPN之间的私网签约信息。SNPN设备与R16版本的SNPN之间的私网签约信息中包括SNPN设备的标识1。该SNPN设备的标识1中包括R16版本SNPN的标识。
由于SNPN AMF网元通过R16版本的SNPN中的AMF网元升级得到,与SNPN AMF网元直接部署的情况下,该SNPN AMF网元拒绝该SNPN设备在R17 SNPN中注册的原因不同,下述将分情况1~情况3说明:
情况1、SNPN AMF网元是直接部署的。
步骤1302、SNPN AMF网元确定该SNPN设备无法通过安全认证。
具体的,如果该SNPN AMF网元是在R17 SNPN中直接部署的,而非通过R16 SNPN中的AMF网元升级得到,则该SNPN AMF网元无法解析该SNPN设备的标识1,因此,SNPN AMF网元确定该SNPN设备无法通过安全认证。
步骤1303、SNPN AMF网元向该SNPN设备发送注册拒绝消息11,相应的,该SNPN设备接收来自SNPN AMF网元的注册拒绝消息11。该注册拒绝消息11用于表示拒绝该SNPN设备在 R17 SNPN中注册。其中,该注册拒绝消息11中还可以携带指示拒绝该SNPN设备在R17 SNPN中注册的原因为:该SNPN设备为非法终端,即SNPN无法识别该SNPN设备的身份。
情况2、SNPN AMF网元通过R16 SNPN中的AMF网元升级得到,且运营商策略不支持N3IWF模式,即R17 SNPN与R17 PLMN不支持采用N3IWF模式互通,而R17 SNPN与R17 PLMN支持采用漫游模式互通。
步骤1304、SNPN AMF网元根据该SNPN设备的签约信息1以及运营商策略,确定该SNPN设备使用漫游模式在R17 SNPN中注册。
步骤1305、SNPN AMF网元向该SNPN设备发送注册拒绝消息12,相应的,该SNPN设备接收来自SNPN AMF网元的注册拒绝消息12。该注册拒绝消息12用于表示拒绝该SNPN设备在R17 SNPN中注册。其中,该注册拒绝消息12中还可以携带拒绝该SNPN设备在R17 SNPN中注册的原因为:SNPN设备与R16版本的SNPN之间的私网签约信息不可用。
在一种可能的实现方式中,该注册拒绝消息12中还可以携带用于指示该SNPN设备使用漫游架构在R17 SNPN中注册的指示信息y,通过该指示信息y便于该SNPN设备确定使用公网签约信息在R17 SNPN中注册。
步骤1306、SNPN设备根据拒绝该SNPN设备在R17 SNPN中注册的原因使用公网签约信息在R17 SNPN中注册。
可以理解的是,在步骤1306之后还可以包括:SNPN AMF网元向该SNPN设备发送网络候选列表,该网络候选列表中包括R17 SNPN的信息。或者,在步骤1306之后还可以包括:SNPN AMF网元向该SNPN设备发送第四消息,该第四消息用于指示该SNPN设备将R17 SNPN加入该网络候选列表中。该SNPN设备根据第四消息将R17 SNPN的信息加入该网络候选列表中。
情况3、SNPN AMF网元通过R16 SNPN中的AMF网元升级得到,且运营商策略仍然支持N3IWF模式,即R17 SNPN与R17 PLMN支持采用N3IWF模式互通。
步骤1307、SNPN AMF网元根据该SNPN设备的签约信息1以及运营商策略,确定该SNPN设备能够使用N3IWF模式在R17 SNPN中注册。
步骤1308、SNPN AMF网元向该SNPN设备发送注册接受消息,相应的,该SNPN设备接收来自该SNPN AMF网元的注册接受消息。注册接受消息表示允许该SNPN设备在R17 SNPN中注册。
结合图5b,如图14所示,图14以第二终端为SNPN设备,第一非公共网络为R17版本的SNPN(下述简称:R17 SNPN),接入管理网元为R17 SNPN中的SNPN AMF网元,接入网设备为SNPN RAN,第一公共网络为R17版本的PLMN(下述简称:R17 PLMN),统一数据管理网元为UDM网元为例,描述了本申请实施例提供的一种网络的接入方法的具体实施例,该方法包括:
步骤1401、SNPN设备使用签约信息2向SNPN AMF网元发送注册请求消息,相应的,SNPN AMF网元接收来自SNPN设备的注册请求消息。该注册请求消息中包括该SNPN设备的标识2。
此外,SNPN AMF网元还可以从SNPN RAN处获取R17 SNPN的标识。其中,SNPN设备的标识2中包括该SNPN设备对应的HPLMN的标识。
签约信息2为该SNPN设备与R16版本的PLMN之间的公网签约信息。
步骤1402、如果R17 SNPN不支持与该SNPN设备对应的HPLMN互通,则SNPN AMF网元确定该SNPN设备无法通过安全认证。
步骤1403、SNPN AMF网元向该SNPN设备发送注册拒绝消息21,相应的,该SNPN设备接收来自SNPN AMF网元的注册拒绝消息21。该注册拒绝消息21用于表示拒绝该SNPN设备在R17 SNPN中注册。其中,该注册拒绝消息21中还可以携带指示拒绝该SNPN设备在R17 SNPN中注册的原因为:该SNPN设备为非法终端。
步骤1404、如果R17 SNPN支持与该SNPN设备对应的HPLMN互通,则SNPN AMF网元向该SNPN设备发送注册接受消息,相应的,该SNPN设备接收来自该SNPN AMF网元的注册接受消息。注册接受消息表示允许该SNPN设备在R17 SNPN中注册。
在一种可能的实现方式中,在R17 SNPN支持与该SNPN设备对应的HPLMN互通的情况下,该SNPN AMF网元还可以向该SNPN设备发送配置信息,该配置信息用于该SNPN设备确定该SNPN设备的网络候选列表。该网络候选列表中包括该R17 SNPN的信息。
图14所描述的实施例中的签约信息2对应上述实施例中的第一签约信息为第二终端在第一非公共网络中的签约信息。注册请求消息对应上述第一消息。注册拒绝消息21对应上述图9描述的实施例中的第二消息。
结合图5a,如图15所示,图15以第一终端为非SNPN设备,第一非公共网络为R16版本的SNPN(下述简称:R16SNPN,对应图5a中的非公共网络100),接入管理网元为R16 SNPN中的SNPN AMF网元(对应图5a中的AMF网元1),接入网设备为SNPN RAN,第一公共网络为R16版本的PLMN(下述简称:R16 PLMN,对应图5a中的公共网络200),统一数据管理网元为UDM网元为例,该方法包括:
步骤1501、非SNPN设备向SNPN AMF网元发送注册请求消息,相应的,SNPN AMF网元接收来自非SNPN设备的注册请求消息。该注册请求消息用于请求在R16 SNPN中注册非SNPN设备。
例如,注册请求消息中携带非SNPN设备的标识。例如,非SNPN设备的标识可以为SUPI或SUCI。
作为一种具体实现,步骤1501可以通过以下方式实现:非SNPN设备通过R16 SNPN中的SNPN RAN向SNPN AMF网元发送注册请求消息。此外,SNPN AMF网元还可以从SNPN RAN处接收R16 SNPN的标识,该R16 SNPN的标识用于识别R16 SNPN。其中,非SNPN设备的SUPI或SUCI中包含非SNPN设备的HPLMN ID。该HPLMN ID用于确定该非SNPN设备对应的归属地公共网络。
步骤1502、如果R16 SNPN与R16 PLMN之间不支持漫游互通,则SNPN AMF网元确定该非SNPN设备不能通过安全认证。
步骤1503、SNPN AMF网元向非SNPN设备发送注册拒绝消息1,相应的,非SNPN设备接收来自SNPN AMF网元的注册拒绝消息1。该注册拒绝消息1表示拒绝该非SNPN设备在R16 SNPN中注册。
其中,注册拒绝消息1中还可以携带拒绝该非SNPN设备在R16 SNPN中注册的原因为:该非SNPN设备为非法终端。
结合图5a,如图16所示,图16以第二终端为SNPN设备,SNPN设备非公共网络为R16版本的SNPN(下述简称:R16SNPN),接入管理网元为R16 SNPN中的SNPN AMF网元,接入网设备为SNPN RAN,SNPN设备公共网络为R16版本的PLMN(下述简称:R16 PLMN),统一数据管理网元为UDM网元为例,该方法包括:
步骤1601、SNPN设备使用签约信息3向SNPN AMF网元发送注册请求消息,相应的,SNPN AMF网元接收来自SNPN设备的注册请求消息。该注册请求消息中包括该SNPN设备的标识3。
应理解,图16和图17所示的SNPN设备可以为R17 SNPN设备,所谓R17 SNPN设备是指该SNPN设备中具有与R17版本的PLMN之间的签约信息,即上述签约信息3。
步骤1601中的该SNPN设备的标识3包括该SNPN设备对应的HPLMN ID。
步骤1602、如果R16 SNPN与R16 PLMN之间不支持漫游互通,则SNPN AMF网元解析不出SNPN设备的标识3,认定该SNPN设备无法通过安全认证。
步骤1603、SNPN AMF网元向该SNPN设备发送注册拒绝消息11,相应的,该SNPN设备接收来自SNPN AMF网元的注册拒绝消息11。该注册拒绝消息11用于表示拒绝该SNPN设备在R17 SNPN中注册。其中,该注册拒绝消息11中还可以携带指示拒绝该SNPN设备在R17 SNPN中注册的原因为:该SNPN设备为非法终端。
步骤1604、如果该SNPN设备中还具有签约信息4,则在检测到可用SNPN时,该SNPN设备还可以使用签约信息4向该SNPN AMF网元发起注册请求消息。
在一种示例中该签约信息4为该SNPN设备与R16 SNPN之间的签约信息。另一种示例,该签约信息4为该SNPN设备与R17 SNPN之间的签约信息。
该签约信息4中包括该SNPN设备的标识4,该SNPN设备的标识4与该SNPN的标识相关。例如,该SNPN设备的标识4中包括该SNPN的标识。具体的,步骤1604中的注册请求消息中携带该SNPN设备的标识4。
步骤1605、该SNPN设备使用N3IWF模式接入R16 SNPN与R16 PLMN。
关于步骤1605的具体实现可以参考现有技术中的描述,此处不再赘述。
本申请实施例中如果该SNPN设备中不仅具有与R16 SNPN之间的私网签约信息,还具有与R16 PLMN之间的公网签约信息,则该SNPN设备可以使用N3IWF模式接入R16 SNPN与R16 PLMN。
所谓的SNPN设备可以使用N3IWF模式接入R16 SNPN与R16 PLMN指:该SNPN设备可以使用私网签约信息请求在该R16 SNPN中注册。待该SNPN设备在R16 SNPN中注册成功的情况下,该SNPN设备可以使用该SNPN设备与R16 PLMN之间的公网签约信息请求在该R16 PLMN中注册。
例如,图16所描述的实施例中的签约信息4可以为上述第二终端在第一非公共网络中的第三签约信息。签约信息3可以为上述实施例中的第一签约信息为第二终端在第一公共网络中的签约信息。注册请求消息可以为上述第一消息。注册拒绝消息11对应上述图10描述的实施例中的第二消息。
上述主要从各个网元之间交互的角度对本申请实施例的方案进行了介绍。可以理解的是,各个网元,例如第一终端、第二终端、接入管理网元、统一数据管理网元、接入网设备等为了实现上述功能,其包括了执行各个功能相应的结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例第一终端、第二终端、接入管理网元、统一数据管理网 元、接入网设备进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
上面结合图6至图16,对本申请实施例的方法进行了说明,下面对本申请实施例提供的执行上述方法的通信装置进行描述。本领域技术人员可以理解,方法和装置可以相互结合和引用,本申请实施例提供的通信装置可以执行上述分析方法中由第一终端、第二终端、接入管理网元、统一数据管理网元、接入网设备执行的步骤。
在采用集成单元的情况下,图17示出了上述实施例中所涉及的通信装置,该通信装置可以包括:通信模块113和处理模块112。
在一种可选的实现方式中,该通信装置还可以包括存储模块111,用于存储通信装置的程序代码和数据。
一种示例,该通信装置为第一终端,或者为应用于第一终端中的芯片。在这种情况下,通信模块113用于支持该通信装置与外部网元(例如,接入管理网元)通信。例如,通信模块113用于执行上述方法实施例中第一终端的信号收发操作。处理模块112用于执行上述方法实施例中第一终端的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图6的步骤601中由第一终端执行的发送动作。通信模块113用于执行上述实施例的图6的步骤604中由第一终端执行的接收动作。处理模块112,用于支持该通信装置执行图6的步骤605中由第一终端执行的动作。
另一种示例,该通信装置为接入管理网元,或者为应用于接入管理网元中的芯片。在这种情况下,通信模块113用于支持该通信装置与外部网元(例如,第一终端或统一数据管理网元)通信。例如,通信模块113用于执行上述方法实施例中接入管理网元的信号收发操作。处理模块112用于执行上述方法实施例中接入管理网元的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图6的步骤601以及步骤603中由接入管理网元执行的接收动作。通信模块113用于执行上述实施例的图6的步骤602以及步骤604中由接入管理网元执行的发送动作。
再一种示例,该通信装置为统一数据管理网元,或者为应用于统一数据管理网元中的芯片。在这种情况下,通信模块113用于支持该通信装置与外部网元(例如,接入管理网元)通信。例如,通信模块113用于执行上述方法实施例中统一数据管理网元的信号收发操作。处理模块112用于执行上述方法实施例中统一数据管理网元的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图6的步骤602中由统一数据管理网元执行的接收动作。通信模块113用于执行上述实施例的图6的步骤603中由统一数据管理网元执行的发送动作。
一种示例,该通信装置为第二终端,或者为应用于第二终端中的芯片。在这种情况下,通信模块113用于支持该通信装置与外部网元(例如,接入网设备)通信。例如,通信模块113用于执行上述方法实施例中第二终端的信号收发操作。处理模块112用于执行上述方法实施例中第二终端的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图7的步骤701中由第二终端执行的接收动作。处理模块112,用于支持该通信装置执行图7的步骤702中由第二终端执行的动作。
一种示例,该通信装置为第二终端,或者为应用于第二终端中的芯片。在这种情况下,通信模块113用于支持该通信装置与外部网元(例如,接入管理网元)通信。例如,通信模块113用于执行上述方法实施例中第二终端的信号收发操作。处理模块112用于执行上述方法实施例中第二终端的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图8的步骤801中由第二终端执行的发送动作。通信模块113用于执行上述实施例的图8的步骤802中由第二终端执行的接收动作。
在一种可能的实施例中,该通信模块113用于执行上述实施例的图9的步骤904、步骤905中由第二终端执行的接收动作。处理模块112,用于支持该通信装置执行图9的步骤906以及步骤907中由第二终端执行的动作。
在另一种可能的实施例中,处理模块112,用于支持该通信装置执行图10的步骤1004中由第二终端执行的动作。
一种示例,该通信装置为接入管理网元,或者为应用于接入管理网元中的芯片。在这种情况下,通信模块113用于支持该通信装置与外部网元(例如,第二终端)通信。例如,通信模块113用于执行上述方法实施例中接入管理网元的信号收发操作。处理模块112用于执行上述方法实施例中接入管理网元的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图8的步骤801中由接入管理网元执行的接收动作。通信模块113用于执行上述实施例的图8的步骤802中由接入管理网元执行的发送动作。
在一种可能的实施例中,该处理模块112,用于支持该通信装置执行图9的步骤902中由接入管理网元执行的动作。通信模块113用于执行上述实施例的图9的步骤904或者步骤905中由接入管理网元执行的发送动作。
在另一种可能的实施例中,处理模块112,用于支持该通信装置执行图10的步骤1002中由接入管理网元执行的动作。
需要说明的是,图17所示的通信模块113还可以采用通信单元替换,处理模块112还可以参考处理单元替换。存储模块111还可以采用存储单元替换。处理单元用于对通信装置的动作进行控制管理,例如,处理单元用于执行在通信装置进行信息/数据处理的步骤。通信单元用于支持通信装置进行信息/数据发送或者接收的步骤。
在一种可能的实现方式中,通信单元可以包括接收单元和发送单元,接收单元用于接收信号,发送单元用于发送信号。
其中,处理模块112可以是处理器或控制器,例如可以是中央处理器单元,通用处理器,数字信号处理器,专用集成电路,现场可编程门阵列或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,数字信号处理器和微处理器的组合等等。通信模块可以是收发器、收发电路或通信接口等。存储模块可以是存储器。
当处理模块112为处理器1801或处理器1805,通信模块113为通信接口1803时,存储模块111为存储器1802时,本申请所涉及的通信装置可以为图18所示的通信设备。
图18所示为本申请实施例提供的通信设备的硬件结构示意图。本申请实施例中的第一终端、第二终端、接入管理网元、统一数据管理网元、接入网设备的结构均可以参考如图18所示的通信设备的结构示意图。该通信设备包括处理器1801,通信线路1804以及至少一个通信接口(图18 中示例性的以通信接口1803为例进行说明)。
处理器1801可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。
通信线路1804可包括一通路,在上述组件之间传送信息。
通信接口1803,用于与其他装置进行信息交互,例如使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。
可选的,该通信设备还可以包括存储器1802。
存储器1802可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路1804与处理器相连接。存储器也可以和处理器集成在一起。
其中,存储器1802用于存储执行本申请方案的计算机执行指令,并由处理器1801来控制执行。处理器1801用于执行存储器1802中存储的计算机执行指令,从而实现本申请下述实施例提供的一种网络的接入方法。
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。
在具体实现中,作为一种实施例,处理器1801可以包括一个或多个CPU,例如图18中的CPU0和CPU1。
在具体实现中,作为一种实施例,通信设备可以包括多个处理器,例如图18中的处理器1801和处理器1805。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
一种示例,该通信设备为第一终端,或者为应用于第一终端中的芯片。在这种情况下,通信模块113用于支持该通信设备与外部网元(例如,接入管理网元)通信。例如,通信模块113用于执行上述方法实施例中第一终端的信号收发操作。处理模块112用于执行上述方法实施例中第一终端的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图6的步骤601中由第一终端执行的发送动作。通信模块113用于执行上述实施例的图6的步骤604中由第一终端执行的接收动作。处理模块112,用于支持该通信设备执行图6的步骤605中由第一终端执行的动作。
另一种示例,该通信设备为接入管理网元,或者为应用于接入管理网元中的芯片。在这种情况下,通信模块113用于支持该通信设备与外部网元(例如,第一终端或统一数据管理网元)通信。例如,通信模块113用于执行上述方法实施例中接入管理网元的信号收发操作。处理模块112用于执行上述方法实施例中接入管理网元的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图6的步骤601以及步骤603中由接入管理网元执行的接收动作。通信模块113用于执行上述实施例的图6的步骤602以及步骤604中由接入管理网元执行的发送动作。
再一种示例,该通信设备为统一数据管理网元,或者为应用于统一数据管理网元中的芯片。在这种情况下,通信模块113用于支持该通信设备与外部网元(例如,接入管理网元)通信。例如,通信模块113用于执行上述方法实施例中统一数据管理网元的信号收发操作。处理模块112用于执行上述方法实施例中统一数据管理网元的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图6的步骤602中由统一数据管理网元执行的接收动作。通信模块113用于执行上述实施例的图6的步骤603中由统一数据管理网元执行的发送动作。
一种示例,该通信设备为第二终端,或者为应用于第二终端中的芯片。在这种情况下,通信模块113用于支持该通信设备与外部网元(例如,接入网设备)通信。例如,通信模块113用于执行上述方法实施例中第二终端的信号收发操作。处理模块112用于执行上述方法实施例中第二终端的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图7的步骤701中由第二终端执行的接收动作。处理模块112,用于支持该通信设备执行图7的步骤702中由第二终端执行的动作。
一种示例,该通信设备为第二终端,或者为应用于第二终端中的芯片。在这种情况下,通信模块113用于支持该通信设备与外部网元(例如,接入管理网元)通信。例如,通信模块113用于执行上述方法实施例中第二终端的信号收发操作。处理模块112用于执行上述方法实施例中第二终端的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图8的步骤801中由第二终端执行的发送动作。通信模块113用于执行上述实施例的图8的步骤802中由第二终端执行的接收动作。
在一种可能的实施例中,该通信模块113用于执行上述实施例的图9的步骤904、步骤905中由第二终端执行的接收动作。处理模块112,用于支持该通信设备执行图9的步骤906以及步骤907中由第二终端执行的动作。
在另一种可能的实施例中,处理模块112,用于支持该通信设备执行图10的步骤1004中由第二终端执行的动作。
一种示例,该通信设备为接入管理网元,或者为应用于接入管理网元中的芯片。在这种情况下,通信模块113用于支持该通信设备与外部网元(例如,第二终端)通信。例如,通信模块113用于执行上述方法实施例中接入管理网元的信号收发操作。处理模块112用于执行上述方法实施例中接入管理网元的信号处理操作。
举例说明,通信模块113用于执行上述实施例的图8的步骤801中由接入管理网元执行的接收动作。通信模块113用于执行上述实施例的图8的步骤802中由接入管理网元执行的发送动作。
在一种可能的实施例中,该处理模块112,用于支持该通信设备执行图9的步骤902中由接入管理网元执行的动作。通信模块113用于执行上述实施例的图9的步骤904或者步骤905中由接入管理网元执行的发送动作。
在另一种可能的实施例中,处理模块112,用于支持该通信设备执行图10的步骤1002中由接入管理网元执行的动作。
图19是本申请实施例提供的芯片190的结构示意图。芯片190包括一个或两个以上(包括两 个)处理器1910和通信接口1930。
可选的,该芯片190还包括存储器1940,存储器1940可以包括只读存储器和随机存取存储器,并向处理器1910提供操作指令和数据。存储器1940的一部分还可以包括非易失性随机存取存储器(non-volatile random access memory,NVRAM)。
在一些实施方式中,存储器1940存储了如下的元素,执行模块或者数据结构,或者他们的子集,或者他们的扩展集。
在本申请实施例中,通过调用存储器1940存储的操作指令(该操作指令可存储在操作系统中),执行相应的操作。
一种可能的实现方式中为:第一终端、第二终端、接入管理网元、统一数据管理网元、接入网设备所用的芯片的结构类似,不同的装置可以使用不同的芯片以实现各自的功能。
处理器1910控制第一终端、第二终端、接入管理网元、统一数据管理网元、接入网设备中任一个的处理操作,处理器1910还可以称为中央处理单元(central processing unit,CPU)。
存储器1940可以包括只读存储器和随机存取存储器,并向处理器1910提供指令和数据。存储器1940的一部分还可以包括NVRAM。例如应用中存储器1940、通信接口1930以及存储器1940通过总线系统1920耦合在一起,其中总线系统1920除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图19中将各种总线都标为总线系统1920。
上述本申请实施例揭示的方法可以应用于处理器1910中,或者由处理器1910实现。处理器1910可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器1910中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器1910可以是通用处理器、数字信号处理器(digital signal processing,DSP)、ASIC、现成可编程门阵列(field-programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器1940,处理器1910读取存储器1940中的信息,结合其硬件完成上述方法的步骤。
一种可能的实现方式中,通信接口1930用于执行图6-图16所示的实施例中的第一终端、第二终端、接入管理网元、统一数据管理网元、接入网设备的接收和发送的步骤。处理器1910用于执行图6-图16所示的实施例中的第一终端、第二终端、接入管理网元、统一数据管理网元、接入网设备的处理的步骤。
以上通信模块可以是该装置的一种通信接口,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该通信模块是该芯片用于从其它芯片或装置接收信号或发送信号的通信接口。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,实现如图6中由第一终端执行的功能。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,实现如图6中由接入管理网元执行的功能。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,实现如图6中由统一数据管理网元执行的功能。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,实现如图7中由第二终端执行的功能。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,实现如图7中由接入网设备执行的功能。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,该计算机可读存储介质可以实现如图8~图10中第二终端的功能。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,该计算机可读存储介质可以实现如图8~图10中接入管理网元的功能。
一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图6中由第一终端执行的功能。
又一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图6中由接入管理网元执行的功能。
一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图6中由统一数据管理网元执行的功能。
另一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图7中由第二终端执行的功能。
另一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图7中由接入网设备执行的功能。
另一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图8~图10中第二终端的功能。
另一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图8~图10中接入管理网元的功能。
一方面,提供一种芯片,该芯片应用于第一终端中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以实现如图6中由第一终端执行的功能。
又一方面,本申请实施例提供一种芯片,该芯片应用于接入管理网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,该处理器用于运行指令,以实现如图6中由接入管理网元执行的功能。
一方面,本申请实施例提供一种芯片,该芯片应用于统一数据管理网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,该处理器用于运行指令,以实现如6中统一数据管理网元的功能。
一方面,本申请实施例提供一种芯片,该芯片应用于第二终端中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,该处理器用于运行指令,以实现如7中第二终端的功能。
一方面,本申请实施例提供一种芯片,该芯片应用于接入网设备中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,该处理器用于运行指令,以实现如图7中接入网设备的功能。
一方面,本申请实施例提供一种芯片,该芯片应用于第二终端中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,该处理器用于运行指令,以实现如图8~图10中第二终端的功能。
一方面,本申请实施例提供一种芯片,该芯片应用于接入管理网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,该处理器用于运行指令,以实现如图8~图10中接入管理网元的功能。
本申请实施例提供一种通信系统,该通信系统包括:接入管理网元和统一数据管理网元。其中,接入管理网元用于执行如图6中由接入管理网元执行的功能,统一数据管理网元用于执行图6中由统一数据管理网元执行的功能。
在一种可能的实施例中,该通信系统还可以包括:终端,该终端用于执行图6中由第一终端执行的功能。
本申请实施例提供一种通信系统,该通信系统包括:接入网设备和终端。其中,终端用于执行如图7中由第二终端执行的功能,接入网设备用于执行图7中由接入网设备执行的功能。
本申请实施例提供一种通信系统,该通信系统包括:接入管理网元和终端。其中,接入管理网元用于执行如图8~图10中任一个由接入管理网元执行的功能,终端用于执行如图8~图10中任一个由第二终端执行的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备或者其它可编程装置。所述计算机程序或指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序或指令可以从一个网站站点、计算机、服务器或数据中心通过有线或无线方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,例如,软盘、硬盘、磁带;也可以是光介质,例如,数字视频光盘(digital video disc,DVD);还可以是半导体介质,例如,固态硬盘(solid state drive,SSD)。
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看附图、公开内容、以及所附权利要求书,可理解并实现公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包括这些改动和变型在内。

Claims (33)

  1. 一种网络的接入方法,其特征在于,包括:
    第一终端向第一非公共网络中的接入管理网元发送第一消息,所述第一消息用于请求在所述第一非公共网络中注册所述第一终端;
    所述第一终端接收来自所述接入管理网元的第二消息,所述第二消息用于表示拒绝所述第一终端在所述第一非公共网络进行注册,所述第二消息包括第一指示信息,所述第一指示信息表示禁止所述第一终端在所述第一非公共网络中接入;
    所述第一终端根据所述第一指示信息更新所述第一终端的网络禁选列表,其中,更新后的网络禁选列表中包括所述第一非公共网络的信息。
  2. 根据权利要求1所述的方法,其特征在于,所述第一非公共网络支持与第一公共网络互通。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述第一终端根据所述更新后的网络禁选列表选择除所述第一非公共网络以外的网络进行注册。
  4. 根据权利要求1~3任一项所述的方法,其特征在于,所述方法还包括:
    所述第一终端根据第一指示信息启动定时器,在所述定时器超时的情况下,所述第一终端从所述更新后的网络禁选列表中删除所述第一非公共网络的信息。
  5. 根据权利要求1~4任一项所述的方法,其特征在于,所述方法还包括:
    所述第二消息包括定时器时间值,所述第一终端根据所述定时器时间值设置定时器。
  6. 一种网络的接入方法,其特征在于,包括:
    第一非公共网络中的接入管理网元接收来自第一终端的第一消息,所述第一消息用于请求在所述第一非公共网络中注册所述第一终端;
    所述接入管理网元从第一公共网络中的统一数据管理网元处获取第三消息;
    所述接入管理网元根据所述第三消息向所述第一终端发送第二消息,所述第二消息用于表示拒绝所述第一终端在所述第一非公共网络进行注册,所述第二消息包括第一指示信息,所述第一指示信息表示禁止所述第一终端在所述第一非公共网络中接入。
  7. 根据权利要求6所述的方法,其特征在于,所述第三消息中包括所述第一终端的签约数据,所述签约数据中包括第二指示信息,所述第二指示信息用于指示所述第一终端只能通过公共网络接入,或者,所述第二指示信息用于指示所述第一终端不能通过非公共网络接入。
  8. 根据权利要求7所述的方法,其特征在于,所述第二指示信息包括所述第一终端支持的网络列表,其中,所述网络列表中不包括所述第一非公共网络的信息。
  9. 根据权利要求6所述的方法,其特征在于,所述第三消息中包括第三指示信息,所述第三指示信息用于指示未成功获取所述第一终端的签约数据。
  10. 根据权利要求9所述的方法,其特征在于,所述第三消息中还包括未成功获取所述第一终端的签约数据的原因值,所述原因值表示不允许所述第一终端在所述第一非公共网络中接入。
  11. 根据权利要求6~10任一项所述的方法,其特征在于,所述方法还包括:
    所述接入管理网元根据所述第三消息,确定拒绝所述第一终端在所述第一非公共网络中的注册。
  12. 一种网络的接入方法,其特征在于,包括:
    第一公共网络中的统一数据管理网元接收来自第一非公共网络中的接入管理网元的查询消息, 所述查询消息用于查询第一终端的签约数据;
    所述统一数据管理网元向所述接入管理网元发送第三消息,所述第三消息包括以下一项或多项:所述第一终端的签约数据、原因值,所述签约数据中包括第二指示信息,所述第二指示信息用于指示所述第一终端只能通过公共网络接入,或者,所述第二指示信息用于指示所述第一终端不能通过非公共网络接入,所述原因值表示不允许所述第一终端在所述第一非公共网络中接入。
  13. 根据权利要求12所述的方法,其特征在于,所述第二指示信息包括所述第一终端支持的网络列表,其中,所述网络列表中不包括所述第一非公共网络的信息。
  14. 根据权利要求12所述的方法,其特征在于,所述第三消息中包括第三指示信息,所述第三指示信息用于指示未成功获取所述第一终端的签约数据。
  15. 一种通信装置,其特征在于,所述通信装置为第一终端,或者为应用于所述第一终端中的芯片,所述装置包括:
    通信单元,用于向第一非公共网络中的接入管理网元发送第一消息,所述第一消息用于请求在所述第一非公共网络中注册所述第一终端;
    所述通信单元,还用于接收来自所述接入管理网元的第二消息,所述第二消息用于表示拒绝所述第一终端在所述第一非公共网络进行注册,所述第二消息包括第一指示信息,所述第一指示信息表示禁止所述第一终端在所述第一非公共网络中接入;
    处理单元,用于根据所述第一指示信息更新所述第一终端的网络禁选列表,其中,更新后的网络禁选列表中包括所述第一非公共网络的信息。
  16. 根据权利要求15所述的装置,其特征在于,所述第一非公共网络支持与第一公共网络互通。
  17. 根据权利要求15或16所述的装置,其特征在于,所述处理单元,还用于根据所述更新后的网络禁选列表选择除所述第一非公共网络以外的网络进行注册。
  18. 根据权利要求15~17任一项所述的装置,其特征在于,所述处理单元,还用于根据第一指示信息启动定时器,在所述定时器超时的情况下,从所述更新后的网络禁选列表中删除所述第一非公共网络的信息。
  19. 根据权利要求15~18任一项所述的装置,其特征在于,所述第二消息包括定时器时间值,所述处理单元,还用于根据所述定时器时间值设置定时器。
  20. 一种通信装置,其特征在于,所述通信装置为接入管理网元,或者所述通信装置为应用于所述接入管理网元中的芯片,所述装置包括:
    通信单元,用于接收来自第一终端的第一消息,所述第一消息用于请求在所述第一非公共网络中注册所述第一终端;
    所述通信单元,还用于从第一公共网络中的统一数据管理网元处获取第三消息;
    所述通信单元,还用于根据所述第三消息向所述第一终端发送第二消息,所述第二消息用于表示拒绝所述第一终端在所述第一非公共网络进行注册,所述第二消息包括第一指示信息,所述第一指示信息表示禁止所述第一终端在所述第一非公共网络中接入。
  21. 根据权利要求20所述的装置,其特征在于,所述第三消息中包括所述第一终端的签约数据,所述签约数据中包括第二指示信息,所述第二指示信息用于指示所述第一终端只能通过公共网络接入,或者,所述第二指示信息用于指示所述第一终端不能通过所述第一非公共网络接入。
  22. 根据权利要求21所述的装置,其特征在于,所述第二指示信息包括所述第一终端支持的 网络列表,其中,所述网络列表中不包括所述第一非公共网络的信息。
  23. 根据权利要求20所述的装置,其特征在于,所述第三消息中包括第三指示信息,所述第三指示信息用于指示未成功获取所述第一终端的签约数据。
  24. 根据权利要求23所述的装置,其特征在于,所述第三消息中还包括未成功获取所述第一终端的签约数据的原因值,所述原因值表示不允许所述第一终端在所述第一非公共网络中接入。
  25. 根据权利要求20~24任一项所述的装置,其特征在于,所述装置还包括:处理单元,用于根据所述第三消息,确定拒绝所述第一终端在所述第一非公共网络中的注册。
  26. 一种通信装置,其特征在于,所述通信装置为统一数据管理网元,或者,所述通信装置为应用于所述统一数据管理网元中的芯片,所述通信装置包括:
    通信单元,用于接收来自第一非公共网络中的接入管理网元的查询消息,所述查询消息用于查询第一终端的签约数据;
    所述通信单元,还用于向所述接入管理网元发送第三消息,所述第三消息包括以下一项或多项:所述第一终端的签约数据、原因值,所述签约数据中包括第二指示信息,所述第二指示信息用于指示所述第一终端只能通过公共网络接入,或者,所述第二指示信息用于指示所述第一终端不能通过非公共网络接入,所述原因值表示不允许所述第一终端在所述第一非公共网络中接入。
  27. 根据权利要求26所述的装置,其特征在于,所述第二指示信息包括所述第一终端支持的网络列表,其中,所述网络列表中不包括所述第一非公共网络的信息。
  28. 根据权利要求26或27所述的装置,其特征在于,所述第三消息中包括第三指示信息,所述第三指示信息用于指示未成功获取所述第一终端的签约数据。
  29. 一种通信系统,其特征在于,所述系统包括:第一非公共网络中的接入管理网元以及第一公共网络中的统一数据管理网元;
    其中,所述接入管理网元,用于执行如权利要求6~11中任一项所述的方法;
    所述统一数据管理网元,用于执行权利要求12~14中任一项所述的方法。
  30. 根据权利要求29所述的系统,其特征在于,所述系统还包括:第一终端,所述第一终端用于执行权利要求1~5任一项所述的方法。
  31. 一种计算机可读存储介质,其特征在于,所述可读存储介质中存储有指令,当所述指令被执行时,实现如权利要求1~5任一项所述的方法,或以实现如权利要求6~11中任一项所述的方法,或以实现如权利要求12~14中任一项所述的方法。
  32. 一种芯片,其特征在于,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行计算机程序或指令,以实现如权利要求1~5任一项所述的方法,或以实现如权利要求6~11中任一项所述的方法,或以实现如权利要求12~14中任一项所述的方法,所述通信接口用于与所述芯片之外的其它模块进行通信。
  33. 一种通信装置,其特征在于,包括:至少一个处理器,所述至少一个处理器与存储器耦合,所述至少一个处理器用于运行存储器中存储的指令以执行如权利要求1~5任一项所述的方法,或如权利要求6~11中任一项所述的方法,或如权利要求12~14中任一项所述的方法。
PCT/CN2021/081549 2020-05-22 2021-03-18 一种网络的接入方法、装置及系统 WO2021232919A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
KR1020227044296A KR20230012590A (ko) 2020-05-22 2021-03-18 네트워크 액세스 방법, 장치, 및 시스템
EP21808276.6A EP4149166A4 (en) 2020-05-22 2021-03-18 METHOD, APPARATUS AND SYSTEM FOR ACCESSING A NETWORK
JP2022571140A JP2023525925A (ja) 2020-05-22 2021-03-18 ネットワークアクセス方法、装置、およびシステム
US17/992,494 US20230080067A1 (en) 2020-05-22 2022-11-22 Network Access Method, Apparatus, and System

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010446009.0 2020-05-22
CN202010446009.0A CN113766500A (zh) 2020-05-22 2020-05-22 一种网络的接入方法、装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/992,494 Continuation US20230080067A1 (en) 2020-05-22 2022-11-22 Network Access Method, Apparatus, and System

Publications (1)

Publication Number Publication Date
WO2021232919A1 true WO2021232919A1 (zh) 2021-11-25

Family

ID=78709152

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/081549 WO2021232919A1 (zh) 2020-05-22 2021-03-18 一种网络的接入方法、装置及系统

Country Status (6)

Country Link
US (1) US20230080067A1 (zh)
EP (1) EP4149166A4 (zh)
JP (1) JP2023525925A (zh)
KR (1) KR20230012590A (zh)
CN (1) CN113766500A (zh)
WO (1) WO2021232919A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114339837A (zh) * 2021-12-31 2022-04-12 中国联合网络通信集团有限公司 专网接入控制方法、装置、电子设备及存储介质

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220360985A1 (en) * 2021-05-07 2022-11-10 Mediatek Inc. Ue rejection handling when onboarding a network based on default ue credentials
US11979937B2 (en) * 2021-09-20 2024-05-07 Nokia Technologies Oy Method, apparatus and computer program
CN116456353A (zh) * 2022-01-06 2023-07-18 维沃移动通信有限公司 托管网络接入处理方法、装置、终端及网络侧设备
CN116801351A (zh) * 2022-03-17 2023-09-22 华为技术有限公司 一种接入控制方法及装置
CN116806046A (zh) * 2022-03-18 2023-09-26 华为技术有限公司 一种通信方法及装置
CN118612712A (zh) * 2023-03-06 2024-09-06 华为技术有限公司 通信方法及通信装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1671240A (zh) * 2004-03-19 2005-09-21 华为技术有限公司 一种实现移动网络接入限制的方法
CN101646248A (zh) * 2008-08-07 2010-02-10 华为技术有限公司 封闭用户组信息处理方法、接入控制方法及系统和设备
CN101860534A (zh) * 2010-05-20 2010-10-13 北京星网锐捷网络技术有限公司 网络切换方法、系统及接入设备、认证服务器
CN101932048A (zh) * 2009-06-26 2010-12-29 联芯科技有限公司 多模终端模式间小区重选的方法和装置
CN102271382A (zh) * 2010-06-07 2011-12-07 电信科学技术研究院 一种mtc设备的接入控制方法和设备
CN103166939A (zh) * 2011-12-19 2013-06-19 上海市闸北区信息化服务中心 一种虚拟专用网络结构及其认证授权方法
KR20140146819A (ko) * 2013-06-18 2014-12-29 엘지전자 주식회사 무선 통신 시스템에서 다중 무선 접속을 수행하는 장치 및 방법

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019221563A1 (ko) * 2018-05-18 2019-11-21 삼성전자 주식회사 사업자의 제한적인 서비스에 대한 망접속 제어 방법 및 장치
KR20200019067A (ko) * 2018-08-13 2020-02-21 삼성전자주식회사 단말이 사설 셀룰러 네트워크를 발견하고 선택하기 위한 방법 및 장치
KR102528728B1 (ko) * 2018-08-13 2023-05-08 삼성전자주식회사 무선 통신 시스템에서 네트워크에 등록하기 위한 장치 및 방법
CN110971641B (zh) * 2018-09-30 2022-04-19 维沃移动通信有限公司 一种网络服务控制方法及通信设备
CN111182543B (zh) * 2018-11-12 2021-10-19 华为技术有限公司 切换网络的方法和装置
CN115484659B (zh) * 2019-05-06 2024-03-22 腾讯科技(深圳)有限公司 网络接入控制方法、装置、计算机可读介质及电子设备
JP7380005B2 (ja) * 2019-09-26 2023-11-15 日本電気株式会社 無線端末、コアネットワークノード、及びこれらの方法
CN113630843B (zh) * 2020-05-09 2023-04-18 华为技术有限公司 一种通信方法和通信装置

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1671240A (zh) * 2004-03-19 2005-09-21 华为技术有限公司 一种实现移动网络接入限制的方法
CN101646248A (zh) * 2008-08-07 2010-02-10 华为技术有限公司 封闭用户组信息处理方法、接入控制方法及系统和设备
CN101932048A (zh) * 2009-06-26 2010-12-29 联芯科技有限公司 多模终端模式间小区重选的方法和装置
CN101860534A (zh) * 2010-05-20 2010-10-13 北京星网锐捷网络技术有限公司 网络切换方法、系统及接入设备、认证服务器
CN102271382A (zh) * 2010-06-07 2011-12-07 电信科学技术研究院 一种mtc设备的接入控制方法和设备
CN103166939A (zh) * 2011-12-19 2013-06-19 上海市闸北区信息化服务中心 一种虚拟专用网络结构及其认证授权方法
KR20140146819A (ko) * 2013-06-18 2014-12-29 엘지전자 주식회사 무선 통신 시스템에서 다중 무선 접속을 수행하는 장치 및 방법

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114339837A (zh) * 2021-12-31 2022-04-12 中国联合网络通信集团有限公司 专网接入控制方法、装置、电子设备及存储介质
CN114339837B (zh) * 2021-12-31 2023-12-22 中国联合网络通信集团有限公司 专网接入控制方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
EP4149166A4 (en) 2023-10-11
KR20230012590A (ko) 2023-01-26
CN113766500A (zh) 2021-12-07
EP4149166A1 (en) 2023-03-15
US20230080067A1 (en) 2023-03-16
JP2023525925A (ja) 2023-06-19

Similar Documents

Publication Publication Date Title
WO2021232919A1 (zh) 一种网络的接入方法、装置及系统
KR102452427B1 (ko) Plmn 내의 사설 슬라이스들에 대한 액세스 제어용 시스템들, 방법들, 및 디바이스들
US11963133B2 (en) Core paging handling
CN112584486A (zh) 一种通信方法及装置
US20240284377A1 (en) Method of user equipment (ue), user equipment (ue), method of communication apparatus and communication apparatus
CN111328019B (zh) 识别终端的方法、装置
CN115314973A (zh) 一种无线通信方法及通信装置
WO2021134175A1 (zh) 一种漫游的方法、装置及系统
US20240323828A1 (en) Method of af apparatus, method of nef apparatus, method of udm apparatus, method of amf apparatus, method of ue, method of pcf apparatus, method of ran node, af apparatus, nef apparatus, udm apparatus, amf apparatus, ue, pcf apparatus and ran node
KR20220152950A (ko) 네트워크 슬라이스 승인 제어(nsac) 발견 및 로밍 향상들
WO2024024704A1 (en) Method of user equipment (ue), method of communication apparatus, method of radio access network (ran) node, ue, communication apparatus and radio access network (ran) node
WO2024024696A1 (en) Method of user equipment (ue), method of communication apparatus, ue and communication apparatus
US12101712B2 (en) Network access management
WO2024070837A1 (en) Method of user equipment (ue), method of communication apparatus, ue and communication apparatus
WO2024070935A1 (en) Method of first communication apparatus and first communication apparatus
EP4436254A1 (en) Network access method and communication apparatus
WO2023238806A1 (en) Method of first communication apparatus, method of communication apparatus, first communication apparatus and communication apparatus
WO2024026020A1 (en) Multicast broadcast service control
JP2024538747A (ja) Ueの方法、地理的に選択されたamf装置の方法、ue、及び地理的に選択されたamf装置
WO2023215351A1 (en) Enabling localized services in hosting network
WO2024166061A1 (en) Access function (af) providing user equipment (ue) route selection policy (ursp) rules for roamers
CN118678436A (zh) 一种注册终端设备的方法及装置
KR20230130700A (ko) 정보 처리 방법, 장치, 통신기기 및 판독가능 저장매체
CN116981019A (zh) 处理用户设备的服务请求的方法
CN116567587A (zh) 通信方法及通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21808276

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022571140

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 202237068960

Country of ref document: IN

ENP Entry into the national phase

Ref document number: 20227044296

Country of ref document: KR

Kind code of ref document: A

Ref document number: 2021808276

Country of ref document: EP

Effective date: 20221206

NENP Non-entry into the national phase

Ref country code: DE