WO2021232919A1 - 一种网络的接入方法、装置及系统 - Google Patents
一种网络的接入方法、装置及系统 Download PDFInfo
- Publication number
- WO2021232919A1 WO2021232919A1 PCT/CN2021/081549 CN2021081549W WO2021232919A1 WO 2021232919 A1 WO2021232919 A1 WO 2021232919A1 CN 2021081549 W CN2021081549 W CN 2021081549W WO 2021232919 A1 WO2021232919 A1 WO 2021232919A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- public network
- network
- message
- access
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 224
- 238000004891 communication Methods 0.000 claims abstract description 382
- 238000007726 management method Methods 0.000 claims description 234
- 238000012545 processing Methods 0.000 claims description 115
- 238000013523 data management Methods 0.000 claims description 77
- 238000004590 computer program Methods 0.000 claims description 52
- 230000006870 function Effects 0.000 description 73
- 230000009471 action Effects 0.000 description 40
- 238000010586 diagram Methods 0.000 description 17
- 238000013461 design Methods 0.000 description 13
- 230000004044 response Effects 0.000 description 12
- 230000009286 beneficial effect Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 101000601047 Homo sapiens Nidogen-1 Proteins 0.000 description 4
- 101000684181 Homo sapiens Selenoprotein P Proteins 0.000 description 4
- 102100037369 Nidogen-1 Human genes 0.000 description 4
- 102100023843 Selenoprotein P Human genes 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 229940119265 sepp Drugs 0.000 description 4
- 230000003993 interaction Effects 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 101150039363 SIB2 gene Proteins 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 101000601048 Homo sapiens Nidogen-2 Proteins 0.000 description 1
- 102100037371 Nidogen-2 Human genes 0.000 description 1
- 101150119040 Nsmf gene Proteins 0.000 description 1
- 101150096310 SIB1 gene Proteins 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000003370 grooming effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000010187 selection method Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/186—Processing of subscriber group data
Definitions
- This application relates to the field of communication technology, and in particular to a network access method, device and system.
- a terminal with the ability or authority to access a non-public network can use the non-public network to access the public network for data transmission.
- private network terminals access non-public networks in different ways.
- the private network terminal can use the contract information between the private network terminal and the non-public network to request registration in the non-public network, and the private network terminal can use the contract between the private network terminal and the public network.
- the information request is registered in the public network.
- the private network terminal can use the contract information between the private network terminal and the public network to request registration in the non-public network.
- non-private network terminal attempts to access the non-public network defined in the R16 phase of 3GPP or the R17 phase of 3GPP. solution.
- the embodiments of the present application provide a network access method, device, and system to solve the problem that the first terminal attempts to access a non-public network.
- an embodiment of the present application provides a network access method, including: a first terminal sends to an access management network element in a first non-public network for requesting to register the first network element in the first non-public network.
- the first message of the terminal receives a second message from the access management network element that is used to indicate that the first terminal is denied registration on the first non-public network.
- the second message includes first indication information, and the first indication information indicates that the first terminal is prohibited from accessing in the first non-public network.
- the first terminal updates the network ban list of the first terminal according to the first indication information. Wherein, the updated network banned list includes the information of the first non-public network.
- the first terminal updates the network ban list of the first terminal to obtain the updated network ban list.
- the embodiment of the present application provides a network access method.
- the first terminal sends a first message to the access management network element in the first non-public network to request to register the second network in the first non-public network.
- One terminal receives a second message from the access management network element.
- the second message indicates that the first terminal is refused to register in the first non-public network, and the first indication information indicates that the first terminal is prohibited from being registered in the first non-public network.
- Access in the network This is so that the first terminal updates the network ban list of the first terminal according to the first instruction information, so that the updated network ban list includes the information of the first non-public network, which can be avoided when the first terminal selects the network to register later. Select the first non-public network that is forbidden to access.
- This solution can solve the problem that the first terminal that does not have the right to access the non-public network tries to access the first non-public network.
- the first non-public network in the embodiment of the present application supports intercommunication with the first public network.
- the first non-public network and the first public network in the embodiment of the present application communicate with each other through a roaming architecture.
- the method provided in the embodiment of the present application further includes: the first terminal selects a network other than the first non-public network for registration according to the updated network ban list.
- the first terminal that does not have the right to access the non-public network is prevented from accessing the first non-public network, and the first terminal is prevented from automatically/manually selecting the first non-public network that is forbidden to access.
- the method provided in the embodiment of the present application further includes: the first terminal starts a timer according to the first indication information, and when the timer expires, the first terminal selects from the updated network ban list Delete the information of the first non-public network. So that the first terminal will continue to try to access the first non-public network.
- the method provided in the embodiment of the present application further includes: the second message includes a timer time value, and the first terminal sets the timer according to the timer time value. So that the first terminal obtains the timer time value from the first non-public network.
- the first terminal is a terminal that does not have the ability or authority to access a non-public network.
- an embodiment of the present application provides a network access method, including: an access management network element in a first non-public network receives a request from a first terminal to register a first terminal in the first non-public network. The first message of the terminal. The access management network element obtains the third message from the unified data management network element in the first public network. The access management network element sends to the first terminal a second message indicating that the first terminal is denied registration on the first non-public network according to the third message. The second message includes indicating that the first terminal is prohibited from being on the first non-public network. The first indication information accessed in.
- the access management network element in the first non-public network receives a first message from the first terminal for requesting to register the first terminal in the first non-public network, and then the access management network element according to the third The message sends to the first terminal a second message indicating that the first terminal is rejected to register on the first non-public network, which can prevent the first terminal that does not have the right to access the non-public network from accessing the first non-public network.
- the third message includes the subscription data of the first terminal, and the subscription data includes the second indication information.
- the second indication information is used to indicate that the first terminal can only pass through the public network. Access, or, on the other hand, the second indication information is used to indicate that the first terminal cannot access through a non-public network.
- the second indication information includes a network list supported by the first terminal, where the network list does not include information about the first non-public network. Or, the list of networks supported by the first terminal does not include any non-public network information.
- the third message includes third indication information, and the third indication information is used to indicate that the subscription data of the first terminal is not successfully obtained.
- the third message also includes a reason value for unsuccessfully acquiring the subscription data of the first terminal, and the reason value indicates that the first terminal is not allowed to access in the first non-public network.
- the third message does not include the subscription data of the first terminal.
- the method provided in the embodiment of the present application further includes: the access management network element determines, according to the third message, to reject the registration of the first terminal in the first non-public network.
- the access management network element determines to reject the registration of the first terminal in the first non-public network according to the third message, including: the access management network element determines to reject the first terminal according to the second indication information. Registration of the terminal in the first non-public network.
- the access management network element determines to reject the registration of the first terminal in the first non-public network according to the third message, including: the access management network element determines to reject the first terminal according to the third indication information Registration of a terminal in the first non-public network.
- the access management network element determines to reject the registration of the first terminal in the first non-public network according to the third message, including: the access management network element determines that the third message does not include the first terminal Is determined to reject the registration of the first terminal in the first non-public network.
- an embodiment of the present application provides a network access method, including: a unified data management network element in a first public network receives information from an access management network element in a first non-public network for querying the first A query message for the terminal's subscription data.
- the unified data management network element sends a third message to the access management network element.
- the third message includes one or more of the following: the subscription data of the first terminal and the cause value.
- the subscription data includes the second indication information.
- the second indication information is used to indicate that the first terminal can only access through the public network, or the second indication information is used to indicate that the first terminal cannot access through the first non-public network, and the reason value indicates that the first terminal is not allowed to access Access in the first non-public network.
- the second indication information includes a list of networks supported by the first terminal, where the network list does not include information about the first non-public network.
- the third message includes third indication information, and the third indication information is used to indicate that the subscription data of the first terminal is not successfully obtained.
- the third message also includes a reason value for unsuccessfully acquiring the subscription data of the first terminal, and the reason value indicates that the first terminal is not allowed to access in the first non-public network.
- the third message does not include the subscription data of the first terminal.
- an embodiment of the present application provides a network access method, including: a second terminal receives broadcast information from an access network device in a first non-public network, and the broadcast information includes information for indicating the first non-public network.
- the first indication information that the network communicates with the public network.
- the second terminal determines to use the first subscription information to access the first non-public network.
- the first contract information is the contract information of the second terminal on the first public network.
- the first identifier of the second terminal carried in the first subscription information is related to the first public network.
- the first identification of the second terminal carries the information of the first public network.
- the information of the first public network may be the first PLMNID.
- the embodiment of the present application provides a network access method, in which the second terminal receives broadcast information from the access network device in the first non-public network, so that the second terminal can determine the first non-public network Intercommunication with public networks. So that the terminal with the ability or authority to access the non-public network can subsequently use the subscription information with the public network to access the first non-public network. In addition, because the terminal that does not have the ability or authority to access the non-public network cannot receive the By broadcasting information, it is possible to prevent a terminal that does not have the ability or authority to access a non-public network from attempting to access the first non-public network from wasting network resources.
- the method provided in the embodiment of the present application may further include: the second terminal uses the first subscription information to access the first non-public network.
- the second terminal using the first subscription information to access the first non-public network includes: the second terminal sends a registration request message to an access management network element in the first non-public network, and The registration request message carries the first identifier of the second terminal.
- the second terminal is a terminal that has the ability or authority to access a non-public network.
- the broadcast information is also used to indicate that the first non-public network and the public network adopt a roaming architecture to communicate with each other.
- the broadcast information is sent for terminals that have the ability or authority to access non-public networks.
- the broadcast information further includes information about one or more public networks that communicate with the first non-public network, and the information about the public network may be an identifier of the public network.
- the identification of the public network may be the PLMN ID, and the first public network belongs to one or more public networks. This is so that the second terminal can determine one or more public networks that communicate with the first non-public network.
- the network selection priority of the first public network is the highest among the network selection priorities of one or more public networks.
- an embodiment of the present application provides a network access method, including: an access network device in a first non-public network sends broadcast information, the broadcast information includes first indication information, and the first indication information is used for Instruct the first non-public network to communicate with the public network.
- the broadcast information further includes information about one or more public networks that communicate with the first non-public network.
- an embodiment of the present application provides a network access method, including: a second terminal uses first subscription information to send a first message to an access management network element in a first non-public network, and the first message is used Yu represents a request to register the second terminal in the first non-public network, where the first subscription information is the subscription information of the second terminal in the first non-public network, or the first subscription information is the second terminal’s subscription information in the first non-public network. Contract information in the public network.
- the second terminal receives a second message from the access management network element that is used to indicate that the second terminal is denied registration in the first non-public network.
- the second message includes fourth indication information, and the fourth indication information is used to indicate a reason for rejecting registration of the second terminal in the first non-public network.
- the first subscription information is the subscription information of the second terminal in the first non-public network.
- the second identity of the second terminal carried in the first subscription information is related to the first non-public network.
- the second identity of the second terminal includes the identity of the first non-public network.
- the identity of the first non-public network is determined by the identity of the target public network and a network identifier (NID).
- the value of the target public network may be a reserved value provided by a third-party operator for the target public network.
- the first subscription information is the subscription information of the second terminal in the first public network.
- the third identity of the second terminal carried in the first subscription information is related to the first public network.
- the third identity of the second terminal includes information of the first public network.
- the information of the first non-public network is the identification of the first non-public network, for example, the identification of the first non-public network is the first PLMN ID.
- the first subscription information is the subscription information of the second terminal in the first non-public network.
- the method provided in this embodiment of the application further includes: the second terminal uses the second terminal according to the fourth instruction information.
- the second contract information of the terminal is registered in the first non-public network, and the second contract information is the contract information of the second terminal in the first public network.
- the method provided in the embodiment of the present application further includes: the second terminal receives a fourth message from the access management network element, the fourth message includes a network candidate list of the second terminal, and the network candidate The list includes the information of the first non-public network. So that the second terminal can determine that the second terminal can register in the first non-public network.
- the method provided in the embodiment of the present application further includes: the second terminal receives a fifth message from the access management network element, where the fifth message is used to indicate that the second terminal is accepted to be on the first non-public network. Register in.
- the second terminal adds the information of the first non-public network to the network candidate list of the second terminal. So that the second terminal determines that the second terminal can register in the first non-public network, and then selects the second subscription information of the second terminal to register in the first non-public network.
- the fourth indication information is used to indicate that the second terminal is an illegal terminal.
- the first subscription information is the subscription information of the second terminal in the first public network
- the second terminal also has the third subscription information of the second terminal in the first non-public network.
- the method provided in the embodiment of the present application further includes: the second terminal uses the third subscription information to request registration in the first non-public network.
- the fourth identifier includes information about the first non-public network. For example, taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification and NID of the target public network.
- the second terminal uses the third subscription information to request registration in the first non-public network, including: the second terminal sends a registration request message to the access management network element in the first non-public network ,
- the registration request message includes the fourth identifier of the second terminal.
- an embodiment of the present application provides a network access method, including: an access management network element in a first non-public network receives a second terminal from a second terminal that indicates that the second terminal requests to use the first subscription information in The first message registered in the first non-public network, where the first subscription information is the subscription information of the second terminal in the first non-public network, or the first subscription information is the subscription information of the second terminal in the first public network Signing information.
- the access management network element sends a second message to the second terminal, the second message is used to refuse the second terminal to register in the first non-public network, and the second message includes fourth indication information, which is used to indicate The reason for rejecting the second terminal from registering in the first non-public network.
- the method provided in the embodiment of the present application further includes: the access management network element sends a fourth message to the second terminal, where the fourth message includes a network candidate list of the second terminal.
- the network candidate list includes the information of the first non-public network. Taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification and NID of the target public network.
- the method provided in the embodiment of the present application further includes: the access management network element sends a fifth message to the second terminal, and the fifth message is used to indicate that the second terminal is accepted in the first non-public network. Register in. This is so that the second terminal determines according to the fifth message that the second terminal can be registered in the first non-public network.
- the fourth indication information is used to indicate that the second terminal is an illegal terminal.
- the method provided in the embodiment of the present application further includes: the access management network element determines to reject the second terminal from registering in the first non-public network.
- the access management network element determining to reject the second terminal from registering in the first non-public network includes: the access management network element determines whether the second terminal is in the first non-public network according to configuration information or The subscription information determines that the second terminal is rejected to register in the first non-public network.
- an embodiment of the present application provides a communication device that can implement the first aspect or any possible implementation method of the first aspect, and therefore can also implement any possible implementation of the first aspect or the first aspect.
- the beneficial effect in the realization method may be a first terminal, or a device that supports the first terminal to implement the first aspect or any possible implementation of the first aspect, for example, a chip applied to the first terminal.
- the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
- an embodiment of the present application provides a communication device.
- the communication device includes a communication unit and a processing unit.
- the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
- the communication unit is configured to send a first message for requesting registration of the first terminal in the first non-public network to an access management network element in the first non-public network.
- the communication unit is further configured to receive a second message from the access management network element that is used to indicate that the first terminal is denied registration on the first non-public network.
- the second message includes first indication information, and the first indication information indicates that the first terminal is prohibited from accessing in the first non-public network.
- the processing unit is configured to update the network ban list of the first terminal according to the first instruction information, wherein the updated network ban list includes the information of the first non-public network.
- the first non-public network in the embodiment of the present application supports intercommunication with the first public network.
- the first non-public network and the first public network in the embodiment of the present application communicate with each other through a roaming architecture.
- the processing unit is further configured to select a network other than the first non-public network for registration according to the updated network ban list.
- the processing unit is further configured to start a timer according to the first indication information, and when the timer expires, delete the information of the first non-public network from the updated network ban list.
- the second message includes a timer time value
- the first terminal sets the timer according to the timer time value.
- the first terminal is a terminal that does not have the ability or authority to access a non-public network.
- the processing unit may be a processor, and the communication unit may be a communication interface.
- the communication interface can be an input/output interface, a pin, or a circuit.
- the processing unit executes the instructions stored in the storage unit, so that the first terminal implements the network access method described in the first aspect or any one of the possible implementation manners of the first aspect.
- the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit in the first terminal located outside the chip (for example, a read-only memory, a random access memory, etc.).
- an embodiment of the present application provides a communication device that can implement the second aspect or any possible implementation method of the second aspect, and therefore can also implement any possible implementation of the second aspect or the second aspect.
- the beneficial effect in the realization method may be an access management network element, or a device that supports the access management network element to implement the method in the second aspect or any possible implementation manner of the second aspect, for example, a device used in the access management network element chip.
- the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
- an embodiment of the present application provides a communication device.
- the communication device is an access management network element in a first non-public network, or is a chip applied to an access management network element, and the device includes: a communication unit And a processing unit, where the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
- the communication unit is configured to receive a first message from the first terminal for requesting registration of the first terminal in the first non-public network.
- the communication unit is used to obtain the third message from the unified data management network element in the public network.
- the communication unit is configured to send to the first terminal a second message indicating that the first terminal is denied registration on the first non-public network according to the third message, the second message includes first indication information, and the first indication information indicates prohibition The first terminal accesses in the first non-public network.
- the third message includes the subscription data of the first terminal, and the subscription data includes the second indication information.
- the second indication information is used to indicate that the first terminal can only pass through the public network. Access, or, on the other hand, the second indication information is used to indicate that the first terminal cannot access through a non-public network.
- the second indication information includes a network list supported by the first terminal, where the network list does not include information about the first non-public network.
- the third message includes third indication information, and the third indication information is used to indicate that the subscription data of the first terminal is not successfully obtained.
- the third message does not include the subscription data of the first terminal.
- the third message also includes a reason value for unsuccessfully acquiring the subscription data of the first terminal, and the reason value indicates that the first terminal is not allowed to access in the first non-public network.
- the processing unit is configured to determine, according to the third message, to reject the registration of the first terminal in the first non-public network.
- the processing unit is configured to determine to reject the registration of the first terminal in the first non-public network according to the third message, and includes: a processing unit, configured to determine to reject the first terminal according to the second indication information Registration of the terminal in the first non-public network.
- the processing unit is configured to determine to reject the registration of the first terminal in the first non-public network according to the third message, and includes: a processing unit, configured to determine to reject the first terminal according to the third instruction information The registration of a terminal in the first non-public network.
- the processing unit may be a processor, and the communication unit may be a communication interface.
- the communication interface can be an input/output interface, a pin, or a circuit.
- the processing unit executes the instructions stored in the storage unit, so that the access management network element implements the network access method described in the second aspect or any one of the possible implementation manners of the second aspect.
- the storage unit may be a storage unit (for example, register, cache, etc.) in the chip, or a storage unit (for example, read-only memory, random access memory, etc.) located outside the chip in the access management network element. ).
- an embodiment of the present application provides a communication device that can implement the third aspect or any possible implementation method of the third aspect, and therefore can also implement any possible implementation of the third aspect or the third aspect.
- the beneficial effect in the realization method may be a unified data management network element, or a device that supports the unified data management network element to implement the method in the third aspect or any possible implementation manner of the third aspect, for example, the device used in the unified data management network element chip.
- the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
- an embodiment of the present application provides a communication device.
- the communication device includes a communication unit and a processing unit.
- the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
- the communication unit is configured to receive a query message for querying subscription data of the first terminal from an access management network element in the first non-public network.
- the communication unit is further configured to send a third message to the access management network element, where the third message includes one or more of the following: the subscription data of the first terminal, the reason value, the subscription data includes the second indication information, and the second
- the indication information is used to indicate that the first terminal can only access through the public network, or the second indication information is used to indicate that the first terminal cannot access through the non-public network, and the reason value indicates that the first terminal is not allowed to be on the first non-public network Medium access.
- the second indication information includes a list of networks supported by the first terminal, where the network list does not include information about the first non-public network.
- the third message includes third indication information, and the third indication information is used to indicate that the subscription data of the first terminal is not successfully obtained.
- the third message also includes a reason value for unsuccessfully acquiring the subscription data of the first terminal, and the reason value indicates that the first terminal is not allowed to access in the first non-public network.
- the third message does not include the subscription data of the first terminal.
- the communication device is a unified data management network element applied in a public network, or a chip in a unified data management network element applied in a public network.
- the processing unit may be a processor, and the communication unit may be a communication interface.
- the communication interface can be an input/output interface, a pin, or a circuit.
- the processing unit executes the instructions stored in the storage unit, so that the unified data management network element implements the network access method described in the third aspect or any one of the possible implementation manners of the third aspect.
- the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit located outside the chip in the unified data management network element (for example, a read-only memory, a random access memory, etc.) ).
- an embodiment of the present application provides a communication device that can implement the fourth aspect or any possible implementation method of the fourth aspect, and therefore can also implement any possible implementation of the fourth aspect or the fourth aspect.
- the beneficial effects in the realization of the method may be a second terminal, or a device that supports the second terminal to implement the fourth aspect or the method in any possible implementation manner of the fourth aspect, for example, a chip applied to the second terminal.
- the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
- an embodiment of the present application provides a communication device.
- the communication device includes a communication unit and a processing unit.
- the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
- the communication unit is configured to receive broadcast information from an access network device in the first non-public network, where the broadcast information includes first indication information for indicating that the first non-public network communicates with the public network.
- the processing unit is configured to determine to use the first subscription information to access the first non-public network according to the broadcast information.
- the first contract information is the contract information of the second terminal on the first public network.
- the second terminal is a terminal that has the ability or authority to access a non-public network.
- the broadcast information is also used to indicate that the first non-public network and the public network adopt a roaming architecture to communicate with each other.
- the broadcast information further includes information about one or more public networks that communicate with the first non-public network, and the first public network belongs to one or more public networks. This is so that the second terminal can determine one or more public networks that communicate with the first non-public network.
- the network selection priority of the first public network is the highest among the network selection priorities of one or more public networks.
- the first identifier of the second terminal carried in the first subscription information is related to the first public network.
- the first identifier of the second terminal carries information of the first public network.
- the identification of the first public network may be the first PLMN ID.
- the processing unit is further configured to use the first subscription information to access the first non-public network.
- the processing unit is further configured to use the first subscription information to access the first non-public network, including: a processing unit, further configured to access the first non-public network through the communication unit
- the management network element sends a registration request message, and the registration request message carries the first identifier of the second terminal.
- the processing unit may be a processor, and the communication unit may be a communication interface.
- the communication interface can be an input/output interface, a pin, or a circuit.
- the processing unit executes the instructions stored in the storage unit, so that the second terminal implements the network access method described in the fourth aspect or any one of the possible implementation manners of the fourth aspect.
- the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit in the second terminal located outside the chip (for example, a read-only memory, a random access memory, etc.).
- an embodiment of the present application provides a communication device that can implement the fifth aspect or any possible implementation method of the fifth aspect, and therefore can also implement any possible implementation of the fifth aspect or the fifth aspect.
- the beneficial effects in the realization of the method may be an access network device, or a device that supports the access network device to implement the fifth aspect or the method in any possible implementation manner of the fifth aspect, for example, a chip applied to the access network device.
- the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
- an embodiment of the present application provides a communication device.
- the communication device includes a communication unit and a processing unit.
- the processing unit is used for processing information, and the communication unit is used for receiving or sending information.
- the communication unit is configured to send broadcast information, the broadcast information includes first indication information, and the first indication information is used to indicate that the first non-public network communicates with the public network.
- the broadcast information further includes information about one or more public networks that communicate with the first non-public network.
- the communication device is suitable for use in non-public networks.
- the processing unit may be a processor, and the communication unit may be a communication interface.
- the communication interface can be an input/output interface, a pin, or a circuit.
- the processing unit executes the instructions stored in the storage unit, so that the access network device implements a network access method described in the fifth aspect or any one of the possible implementation manners of the fifth aspect.
- the storage unit can be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit (for example, a read-only memory, a random access memory, etc.) located outside the chip in the access network device .
- an embodiment of the present application provides a communication device, which can implement the sixth aspect or any possible implementation method of the sixth aspect, and therefore can also implement any possible implementation of the sixth aspect or the sixth aspect.
- the beneficial effects in the realization of the method may be a second terminal, or a device that supports the second terminal to implement the sixth aspect or the method in any possible implementation manner of the sixth aspect, for example, a chip applied to the second terminal.
- the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
- an embodiment of the present application provides a communication device that is a second terminal or a chip applied to the second terminal.
- the communication device includes a communication unit and a processing unit.
- the processing unit is configured to To process information, the communication unit is used to receive or send information.
- the communication unit is configured to use the first subscription information to send a first message to the access management network element in the first non-public network, where the first message is used to indicate a request to register the second terminal in the first non-public network,
- the first contract information is the contract information of the second terminal in the first non-public network, or the first contract information is the contract information of the second terminal in the first public network.
- the communication unit is configured to receive a second message from the access management network element, which is used to indicate that the second terminal is denied registration in the first non-public network.
- the second message includes fourth indication information, and the fourth indication information is used to indicate a reason for rejecting registration of the second terminal in the first non-public network.
- the first subscription information is the subscription information of the second terminal in the first non-public network.
- the second identification of the second terminal carried in the first subscription information is related to the first non-public network.
- the second identification of the second terminal includes information of the first non-public network. Taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification of the target public network and the NID.
- the first subscription information is the subscription information of the second terminal in the first public network.
- the third identity of the second terminal carried in the first subscription information is related to the first public network.
- the third identity of the second terminal includes information of the first public network.
- the information of the first public network may be the identification of the first public network.
- the first subscription information is the subscription information of the second terminal in the first non-public network
- the processing unit is further configured to use the second subscription information of the second terminal in accordance with the fourth instruction information.
- Register in the first non-public network, and the second contract information is the contract information of the second terminal in the first public network.
- the communication unit is further configured to receive a fourth message from the access management network element, where the fourth message includes a network candidate list of the second terminal, and the network candidate list includes the first non-public Network information. So that the second terminal can determine that the second terminal can register in the first non-public network.
- the communication unit is further configured to receive a fifth message from the access management network element, where the fifth message is used to indicate that the second terminal is accepted to register in the first non-public network.
- the second terminal adds the information of the first non-public network to the network candidate list of the second terminal. So that the second terminal determines that the second terminal can register in the first non-public network, and then selects the second subscription information of the second terminal to register in the first non-public network.
- the fourth indication information is used to indicate that the second terminal is an illegal terminal.
- the first subscription information is subscription information of the second terminal in the first public network
- the second terminal also has third subscription information of the second terminal in the first non-public network
- the processing unit is further configured to use the third contract information to request registration in the first non-public network.
- the fourth identifier of the second terminal included in the third subscription information is related to the first non-public network.
- the fourth identifier includes information of the first non-public network. Taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification of the target public network and the NID.
- the first subscription information is the subscription information of the second terminal in the first public network
- the second terminal also has the third subscription information of the second terminal in the first non-public network
- the processing unit is further configured to use the third contract information for the second terminal to request registration in the first non-public network.
- the processing unit is configured to send a registration request message to the access management network element in the first non-public network through the communication unit, where the registration request message includes the fourth identifier of the second terminal.
- the processing unit may be a processor, and the communication unit may be a communication interface.
- the communication interface can be an input/output interface, a pin, or a circuit.
- the processing unit executes the instructions stored in the storage unit, so that the second terminal implements the network access method described in the sixth aspect or any one of the possible implementation manners of the sixth aspect.
- the storage unit may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit in the second terminal located outside the chip (for example, a read-only memory, a random access memory, etc.).
- an embodiment of the present application provides a communication device, which can implement the seventh aspect or any possible implementation method of the seventh aspect, and therefore can also implement any possible seventh aspect or the seventh aspect.
- the beneficial effects in the realization of the method may be an access management network element, or a device that supports the access management network element to implement the method in the seventh aspect or any possible implementation manner of the seventh aspect, for example, the device used in the access management network element chip.
- the communication device can implement the above method by software, hardware, or by hardware executing corresponding software.
- an embodiment of the present application provides a communication device.
- the communication device is an access management network element or a chip applied to an access management network element.
- the communication device includes a communication unit and a processing unit.
- the unit is used to process information, and the communication unit is used to receive or send information.
- the communication unit is configured to receive a first message from the second terminal indicating that the second terminal requests to use the first subscription information to register in the first non-public network, where the first subscription information indicates that the second terminal is in the first non-public network.
- a contract information in a non-public network, or, the first contract information is the contract information of the second terminal in the first public network.
- the communication unit is configured to send a second message to the second terminal, the second message is used to refuse the second terminal to register in the first non-public network, the second message includes fourth indication information, the fourth indication information is used to indicate The reason for rejecting the second terminal from registering in the first non-public network.
- the communication unit is further configured to send a fourth message to the second terminal, where the fourth message includes a network candidate list of the second terminal, and the network candidate list includes information about the first non-public network.
- the communication unit is further configured to send a fifth message to the second terminal, where the fifth message is used to indicate that the second terminal is accepted to register in the first non-public network. This is so that the second terminal determines that it can register in the first non-public network according to the fifth message.
- the fourth indication information is used to indicate that the second terminal is an illegal terminal.
- the processing unit is configured to determine to reject the second terminal from registering in the first non-public network.
- the processing unit is configured to determine to reject the second terminal from registering in the first non-public network, and includes: a processing unit, configured to determine whether the second terminal is in the first non-public network according to the configuration information The subscription information determines that the second terminal is rejected to register in the first non-public network.
- the communication device is an access management network element applied to the first non-public network, or a chip applied to the access management network element of the first non-public network.
- the processing unit may be a processor, and the communication unit may be a communication interface.
- the communication interface can be an input/output interface, a pin, or a circuit.
- the processing unit executes the instructions stored in the storage unit, so that the access management network element implements the network access method described in the seventh aspect or any one of the possible implementation manners of the seventh aspect.
- the storage unit may be a storage unit (for example, register, cache, etc.) in the chip, or a storage unit (for example, read-only memory, random access memory, etc.) located outside the chip in the access management network element. ).
- the embodiments of the present application provide a computer-readable storage medium, and the computer-readable storage medium stores a computer program or instruction.
- the computer program or instruction runs on the computer, the computer can execute the operations as described in the first aspect to A network access method described in any one of the possible implementations of the first aspect.
- the embodiments of the present application provide a computer-readable storage medium.
- the computer-readable storage medium stores a computer program or instruction.
- the computer program or instruction runs on the computer, the computer executes the operations as described in the second aspect to A network access method described in any possible implementation of the second aspect.
- the embodiments of the present application provide a computer-readable storage medium.
- the computer-readable storage medium stores a computer program or instruction.
- the computer program or instruction runs on the computer, the computer executes the operations as described in the third aspect to A network access method described in any one of the possible implementations of the third aspect.
- the embodiments of the present application provide a computer-readable storage medium.
- the computer-readable storage medium stores a computer program or instruction.
- the computer program or instruction runs on the computer, the computer executes the operations as in the fourth aspect to A network access method described in any one of the possible implementations of the fourth aspect.
- the embodiments of the present application provide a computer-readable storage medium.
- the computer-readable storage medium stores a computer program or instruction.
- the computer program or instruction runs on the computer, the computer can execute the operations as described in the fifth aspect to A network access method described in any possible implementation manner of the fifth aspect.
- the embodiments of the present application provide a computer-readable storage medium.
- the computer-readable storage medium stores a computer program or instruction.
- the computer program or instruction When the computer program or instruction is run on the computer, the computer can execute the operations as described in the sixth aspect to A network access method described in any one of the possible implementations of the sixth aspect.
- an embodiment of the present application provides a computer-readable storage medium.
- the computer-readable storage medium stores a computer program or instruction.
- the computer program or instruction runs on a computer, the computer can execute the seventh aspect.
- the embodiments of the present application provide a computer program product including instructions.
- the instructions run on a computer, the computer executes the first aspect or one of the various possible implementations of the first aspect.
- the access method of the network is not limited to, but not limited to, but not limited to, but not limited to, but not limited to,
- embodiments of the present application provide a computer program product including instructions.
- the instructions run on a computer, the computer executes the second aspect or one of the various possible implementations of the second aspect.
- the access method of the network is not limited to, but not limited to, but not limited to, but not limited to, but not limited to,
- the embodiments of the present application provide a computer program product including instructions.
- the instructions When the instructions are run on a computer, the computer executes the third aspect or various possible implementations of the third aspect.
- the embodiments of the present application provide a computer program product including instructions.
- the instructions When the instructions are run on a computer, the computer executes the fourth aspect or one of the various possible implementations of the fourth aspect.
- the access method of the network When the instructions are run on a computer, the computer executes the fourth aspect or one of the various possible implementations of the fourth aspect.
- the access method of the network When the instructions are run on a computer, the computer executes the fourth aspect or one of the various possible implementations of the fourth aspect.
- the access method of the network The access method of the network.
- the embodiments of the present application provide a computer program product including instructions.
- the instructions When the instructions are run on a computer, the computer executes one of the fifth aspect or various possible implementation manners of the fifth aspect.
- the access method of the network When the instructions are run on a computer, the computer executes one of the fifth aspect or various possible implementation manners of the fifth aspect.
- the access method of the network When the instructions are run on a computer, the computer executes one of the fifth aspect or various possible implementation manners of the fifth aspect.
- the access method of the network The access method of the network.
- the embodiments of the present application provide a computer program product including instructions.
- the instructions When the instructions are executed on a computer, the computer executes the sixth aspect or various possible implementations of the sixth aspect.
- the embodiments of the present application provide a computer program product including instructions.
- the instructions When the instructions are run on a computer, the computer executes the seventh aspect or various possible implementations of the seventh aspect.
- an embodiment of the present application provides a communication device for implementing various possible designs in any of the foregoing first to seventh aspects.
- the communication device may be the aforementioned first terminal, or a device including the aforementioned first terminal, or a component (for example, a chip) applied to the first terminal.
- the communication device may be the above-mentioned access management network element, or a device including the above-mentioned access management network element, or the communication device may be a component (for example, a chip) applied to the access management network element.
- the communication device may be the above-mentioned unified data management network element, or a device including the above-mentioned unified data management network element, or a component (for example, a chip) applied to the unified data management network element.
- the communication device may be the above-mentioned access network equipment, or a device including the above-mentioned access network equipment, or a component (for example, a chip) applied to the access network equipment.
- the communication device may be the above-mentioned second terminal, or a device including the above-mentioned second terminal, or a component (for example, a chip) applied to the second terminal.
- the communication device includes modules and units corresponding to the foregoing methods.
- the modules and units can be implemented by hardware, software, or hardware execution of corresponding software.
- the hardware or software includes one or more modules or units corresponding to the above-mentioned functions.
- an embodiment of the present application provides a communication device, the communication device including: at least one processor and a communication interface.
- the processor executes a computer-executable instruction or program stored in the communication device, so that the communication device executes the aforementioned first aspect, second aspect, third aspect, fourth aspect, or fourth aspect
- the communication device may be the first terminal or a component applied to the first terminal.
- the communication device may be an access management network element, or a component applied to an access management network element.
- the communication device is a second terminal, or a component applied to the second terminal.
- the communication device may be a unified data management network element, or a component applied to a unified data management network element.
- the communication device is an access network device or a component applied to the access network device.
- the communication device described in the thirtieth aspect may further include a bus and a memory, and the memory is used to store code and data.
- the memory is used to store code and data.
- at least one processor communication interface and the memory are coupled to each other.
- an embodiment of the present application provides a communication device, the communication device including: at least one processor.
- at least one processor is coupled to the memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the first aspect or the first aspect described above.
- the communication device may be the first terminal or a chip applied in the first terminal.
- an embodiment of the present application provides a communication device, the communication device including: at least one processor.
- at least one processor is coupled with the memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the second aspect or the second aspect described above.
- the communication device may be an access management network element, or a chip applied to an access management network element.
- an embodiment of the present application provides a communication device, the communication device including: at least one processor.
- at least one processor is coupled with the memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the above-mentioned third aspect or the third aspect.
- the communication device may be a unified data management network element, or a chip used in a unified data management network element.
- an embodiment of the present application provides a communication device, the communication device including: at least one processor.
- at least one processor is coupled with a memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the fourth aspect or the fourth aspect.
- the communication device may be a second terminal or a chip applied in the second terminal.
- an embodiment of the present application provides a communication device, the communication device including: at least one processor.
- at least one processor is coupled with a memory, and when the communication device is running, the processor executes a computer-executable instruction or program stored in the memory, so that the communication device executes any one of the fifth aspect or the fifth aspect described above.
- the communication device may be an access network device or a chip applied to the access network device.
- an embodiment of the present application provides a communication device, the communication device including: at least one processor.
- at least one processor is coupled with the memory, and when the communication device is running, the processor executes the computer-executable instructions or programs stored in the memory, so that the communication device executes any one of the sixth aspect or the sixth aspect described above.
- the communication device may be a second terminal or a chip applied in the second terminal.
- an embodiment of the present application provides a communication device, the communication device including: at least one processor.
- at least one processor is coupled with a memory, and when the communication device is running, the processor executes a computer-executable instruction or program stored in the memory, so that the communication device executes any one of the seventh aspect or the seventh aspect described above.
- the communication device may be an access management network element, or a chip applied to an access management network element.
- the memory described in any one of the thirty-first aspect to the thirty-seventh aspect may also be replaced with a storage medium, which is not limited in the embodiment of the present application.
- the memory described in any one of the 31st to the 37th aspects may be a memory inside the communication device.
- the memory may also be located outside the communication device, but at least one The processor can still execute the computer-executable instructions or programs stored in the memory.
- an embodiment of the present application provides a communication device that includes one or more modules for implementing the first aspect, the second aspect, the third aspect, the fourth aspect, and the fifth aspect.
- the method of any one of the sixth aspect or the seventh aspect, the one or more modules can be combined with the above-mentioned first aspect, second aspect, third aspect, fourth aspect, fifth aspect, sixth aspect or seventh aspect.
- the steps in the method of any one of the aspects correspond to each other.
- an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the first aspect or the first aspect.
- the communication interface is used to communicate with other modules outside the chip.
- an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the second aspect or each of the second aspect.
- the communication interface is used to communicate with other modules outside the chip.
- an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the third aspect or the third aspect.
- the communication interface is used to communicate with other modules outside the chip.
- an embodiment of the present application provides a chip that includes a processor and a communication interface, and the communication interface is coupled to the processor.
- the processor is used to run a computer program or instruction to implement the fourth aspect or the fourth aspect.
- the communication interface is used to communicate with other modules outside the chip.
- an embodiment of the present application provides a chip that includes a processor and a communication interface, and the communication interface is coupled to the processor.
- the processor is used to run a computer program or instruction to implement the fifth aspect or the fifth aspect.
- the communication interface is used to communicate with other modules outside the chip.
- an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the sixth aspect or the sixth aspect A network access method described in various possible implementations.
- the communication interface is used to communicate with other modules outside the chip.
- an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the seventh aspect or the seventh aspect.
- the communication interface is used to communicate with other modules outside the chip.
- the chip provided in the embodiment of the present application further includes a memory for storing computer programs or instructions.
- an embodiment of the present application provides a communication system, which includes: the communication device described in the ninth aspect or any one of the possible implementation manners of the ninth aspect, and any one of the tenth aspect or the tenth aspect Possible implementations are described in the communication device.
- the communication system may further include: the communication device described in the eighth aspect or any one of the eighth aspect.
- an embodiment of the present application provides a communication system, which includes: the communication device described in any possible implementation manner of the eleventh aspect or the eleventh aspect, the twelfth aspect or the twelfth aspect The communication device described in any one of the possible implementations of the aspect.
- an embodiment of the present application provides a communication system, which includes: the communication device described in the thirteenth aspect or any one of the possible implementation manners of the thirteenth aspect, the fourteenth aspect or the fourteenth aspect The communication device described in any one of the possible implementations of the aspect.
- any device or computer storage medium or computer program product or chip or communication system provided above is used to execute the corresponding method provided above. Therefore, the beneficial effects that can be achieved can refer to the corresponding method provided above The beneficial effects of the corresponding solutions in the method will not be repeated here.
- FIG. 1 is a schematic diagram of a public network integrated NPN and independent deployment of NPN architecture provided by an embodiment of the application;
- FIG. 2 is a schematic diagram of the structure of a public network or a non-public network provided by an embodiment of the application;
- FIG. 3 is an architecture diagram of a communication system to which a network access method provided by an embodiment of the application is applicable;
- FIG. 4 is an architecture diagram of a 5G network provided by an embodiment of this application.
- FIG. 5a is a schematic diagram of a non-public network and a public network based on the N3IWF interworking architecture provided by an embodiment of the application;
- FIG. 5b is a schematic diagram of a non-public network and a public network interworking based on a roaming architecture provided by an embodiment of the application;
- FIG. 6 is a first schematic flowchart of a network access method provided by an embodiment of this application.
- FIG. 7 is a second schematic flowchart of a network access method provided by an embodiment of this application.
- FIG. 8 is a third schematic flowchart of a network access method provided by an embodiment of this application.
- FIG. 9 is a fourth schematic flowchart of a network access method provided by an embodiment of this application.
- FIG. 10 is a tenth schematic flowchart of a network access method provided by an embodiment of this application.
- FIG. 11 is a schematic flowchart 1 of a specific embodiment of a network access method provided by an embodiment of this application.
- FIG. 12 is a second schematic flowchart of a specific embodiment of a network access method provided by an embodiment of this application.
- FIG. 13 is a third schematic flowchart of a specific embodiment of a network access method provided by an embodiment of this application.
- FIG. 14 is a fourth schematic flowchart of a specific embodiment of a network access method provided by an embodiment of this application.
- 15 is a schematic flowchart 5 of a specific embodiment of a network access method provided by an embodiment of this application.
- FIG. 16 is a sixth schematic flowchart of a specific embodiment of a network access method provided by an embodiment of this application.
- FIG. 17 is a schematic structural diagram of a communication device provided by an embodiment of this application.
- FIG. 18 is a schematic structural diagram of another communication device provided by an embodiment of this application.
- FIG. 19 is a schematic structural diagram of a chip provided by an embodiment of the application.
- words such as “first” and “second” are used to distinguish the same items or similar items that have substantially the same function and effect.
- the first terminal and the second terminal are only used to distinguish different terminals, and the sequence of the terminals is not limited.
- words such as “first” and “second” do not limit the quantity and order of execution, and words such as “first” and “second” do not limit the difference.
- At least one refers to one or more, and “multiple” refers to two or more.
- “And/or” describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
- the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
- the following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
- at least one of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
- the steps involved in the network access method provided in the embodiments of this application are only examples, not all steps are mandatory steps, or not all information or content in the message is mandatory. During use, it can be increased or decreased as needed.
- Public network refers to a network established and operated for the purpose of providing land mobile communication services to the public, that is, a traditional operator network, including but not limited to mobile phone communication.
- the public network may be a public land mobile network (PLMN).
- PLMN public land mobile network
- Non-public network is a non-public 5G network, which refers to a communication network that can be used by some private users.
- non-public networks may include industrial communication networks, enterprise private networks, etc.
- a typical industrial communication network service scope is usually one or more industrial parks, and a corporate private network service scope usually covers all users within an enterprise.
- non-public networks only serve devices managed or owned by a certain industrial communication network or enterprise private network, and provide network communication services such as data connections for these devices.
- the non-public network may provide communication services for terminals located in the industrial park and having the ability and authority to access the non-public network.
- the non-public network in the embodiment of the present application may also be referred to as: a private network or a private network, which will be described in a unified manner here, and will not be repeated in the following.
- Non-public networks may include: public network integrated NPN (PNI-NPN) and standalone NPN (standalone NPN, SNPN).
- PNI-NPN public network integrated NPN
- SNPN standalone NPN
- the public network integration NPN can rely on the support of PLMN to achieve, SNPN does not rely on the realization of the network function of the PLMN.
- Public network integration NPN can be implemented using network slicing in PLMN.
- a closed access group (CAG) function is additionally used.
- CAG is used to identify a group of terminals. A group of terminals that can be recognized by CAG are allowed to access the cell associated with the CAG (CAG cell).
- the CAG cell broadcasts one or more CAG identifiers, and the available CAG list (list) and instructions are configured on the terminal (this instruction is used to indicate whether the terminal only allows Access to the 5G system (5G System, 5GS) through the CAG cell.
- the unified data management network element has the subscription data of the terminal, and the subscription data of the terminal includes the CAG list and instructions available for the terminal.
- the diagram (a) in Figure 1 takes the public network integrated NPN as an example.
- PLMN ID on terminal 3 A, then terminal 1 can access both base station 1 and base station 2, and although terminal 2 can access base station 1, but cannot access base station 2.
- Terminal 3 can access base station 2, but terminal 3 cannot access base station 1.
- Figure 1 (b) takes independent deployment of NPN as an example.
- SNPN (5G network) is deployed independently and does not rely on PLMN.
- SNPN is identified by PLMN ID+NID, where PLMN The ID can be an inherent value reserved by a third-party operator, or it can be a specific value of the PLMN operator deploying this SNPN.
- the base station 3 in the SNPN sends the SIB3, and the SIB3 includes the identification N of the SNPN (for example, PLMN ID+NID1).
- the terminal 4 selects the NPN network to access according to the broadcast information and the configured network selection information.
- the terminal 4 finds that the configured network selection information (PLMN ID+NID2) is different from the PLMN ID or PLMN ID+NID1 broadcast by the base station 3, the terminal 4 will not choose to access the SNPN. If the terminal 4 finds that the configured network selection information (PLMN ID+NID1) is the same as the PLMN ID or PLMN ID+NID1 broadcast by the base station 3, the terminal 4 chooses to access the SNPN.
- the configured network selection information PLMN ID+NID2
- Base station 1, base station 2, and base station 3 may be base stations in a 5G network.
- base station 1, base station 2, and base station 3 may be next Generation Node B (gNB).
- the diagram (a) in Figure 1 takes the base station 1 and the base station 2 accessing the same 5G core network (5G Core, 5GC) as an example.
- the base station 2 accesses the 5GC corresponding to the non-public network.
- Figure 2 shows the composition of a public network or a non-public network.
- Both the public network and the non-public network include a terminal, an access network (AN), a core network (core), and a data network ( data network, DN), where the terminal, AN, and Core are the main components of the architecture.
- the terminal, AN, and Core can be divided into two parts: the user plane and the control plane.
- the control plane is responsible for the management of the mobile network
- the user plane is responsible for the business. Transmission of data.
- the NG2 reference point is located between the control plane of the AN and the core
- the NG3 reference point is located between the user plane of the AN and the user plane of the Core
- the NG6 reference point is located between the user plane of the Core and the data network.
- Terminal It is the portal for mobile users to interact with the network. It can provide basic computing and storage capabilities, display business windows to users, and accept user input.
- the terminal in the 5G network can use the new air interface technology to establish a signal connection and data connection with the AN, thereby transmitting control signals and service data to the mobile network.
- AN Similar to the base station in the traditional network, it is deployed close to the terminal to provide the network access function for authorized terminals in a specific area. AN can determine transmission tunnels of different qualities to transmit terminal data according to the level of the terminal and service requirements. AN can manage its own resources, make reasonable use of it, provide access services for terminals on demand, and be responsible for forwarding control signals and terminal data between the terminal and the core network.
- the Core responsible for maintaining the contract data of the mobile network, managing the network elements of the mobile network, and providing the terminal with functions such as session management, mobility management, policy management, and security authentication.
- the Core provides network access authentication for the terminal.
- the Core allocates network resources for the terminal; when the terminal moves, the Core updates the network resources for the terminal.
- the Core When the terminal is idle, the Core provides a fast recovery mechanism for the terminal; when the terminal is detached, the Core releases network resources for the terminal; when the terminal has business data, the Core provides data routing functions for the terminal, such as forwarding uplink data to the data network .
- the Core receives downlink data for the terminal from the Data Network.
- the Core sends the received downlink data for the terminal to the AN, so that the AN sends the downlink data for the terminal to the terminal.
- the data network It is a data network that provides business services to users.
- the client is located at the terminal and the server is located at the data network.
- the data network can be a private network, such as a local area network, or an external network that is not under the control of operators, such as the Internet, or a private network jointly deployed by operators, such as the provision of IP multimedia network subsystems (IP multimedia).
- IP multimedia IP multimedia
- IMS core network subsystem
- Fig. 2 describes the main components of the non-public network and the public network, as shown in Fig. 3, and Fig. 3 shows a communication system to which a network access method of the present application is applicable.
- the communication system includes: a terminal 10. And access management network element 20.
- the access management network element 20 belongs to a network element in the non-public network 100.
- the terminal 10 can access the non-public network 100 through the access network device 30 and the access management network element 20 in the non-public network 100.
- the terminals 10 may be distributed in a wireless network, and each terminal may be static or mobile.
- the communication system may further include: a unified data management network element 40.
- the unified data management network element 40 belongs to a network element in the public network 200.
- the public network 200 and the non-public network 100 communicate with each other. After the terminal 10 successfully accesses the non-public network 100.
- the terminal 10 can access the public network 200 through the non-public network 100.
- the communication system shown in FIG. 3 in the embodiment of the present application can be applied to the current 5G network architecture and other network architectures that will appear in the future, which is not limited in the embodiment of the present application.
- the communication system shown in FIG. 3 is applicable to a 5G network as an example, that is, the non-public network 100 and the public network 200 are both 5G networks as an example.
- the network element or entity corresponding to the access management network element 20 may be as shown in the figure.
- access and mobility management function (AMF) network element AMF
- the network element or entity corresponding to the unified data management network element 40 may be a unified data management (unified data management, UDM) network element.
- the network element or entity corresponding to the access network device 30 may be a (radio) access network ((R)AN) device.
- Non-public network 100 or the public network 200 may also include: session management function (SMF) network elements, policy control function (PCF) network elements, Network slice selection function (NSSF) network element, authentication server function (authentication server function, AUSF) network element, network exposure function (NEF) network element, network repository storage function (network repository function) , NRF) network elements, and application function (AF) network elements, etc., which are not specifically limited in the embodiment of the present application.
- SMF session management function
- PCF policy control function
- NSSF Network slice selection function
- authentication server function authentication server function
- AUSF authentication server function
- NEF network exposure function
- NRF network repository storage function
- AF application function
- the non-public network 100 or the public network 200 may also communicate with a data network (data network, DN), and the DN may be managed by an AF network element.
- DN data network
- the terminal accesses the network (non-public network or public network) through the (R)AN device, and the terminal communicates with the AMF network element through the N1 interface (abbreviated as N1).
- the SMF network element communicates with one or more UPF network elements through the N4 interface (N4 for short).
- the UPF network element communicates with the DN through the N6 interface (N6 for short).
- the AN equipment communicates with the AMF network element through the N2 interface (abbreviated as N2).
- (R) AN equipment communicates with UPF network elements through an N3 interface (N3 for short).
- the control plane network elements can also interact with service-oriented interfaces.
- AMF network elements, SMF network elements, UDM network elements, or PCF network elements interact with each other using a service-oriented interface.
- the service-oriented interface provided by the AMF network element to the outside may be Namf.
- the service-oriented interface provided by the SMF network element to the outside may be Nsmf.
- the service-oriented interface provided by the UDM network element to the outside may be Nudm.
- the service-oriented interface provided by the PCF network element to the outside may be Npcf.
- the service-oriented interface provided by the NSSF network element to the outside may be Nnssf.
- the service-oriented interface provided by the NEF network element to the outside may be Nnef.
- the service-oriented interface provided by the AF network element to the outside may be Naf. It should be understood that related descriptions of the names of various service-oriented interfaces can refer to the 5G system architecture (5G system architecture) diagram in the prior art, which will not be repeated here.
- the control plane network elements can also communicate in the following manner: AMF entities communicate with SMF network elements through the N11 interface (N11 for short) Communication. Any two UPF network elements among one or more UPF network elements communicate through an N9 interface (abbreviated as N9).
- the SMF network element communicates with the PCF network element through the N7 interface (N7 for short), and the PCF network element communicates with the AF network element through the N5 interface.
- Any two AMF network elements communicate through the N14 interface (N14 for short).
- the SMF network element communicates with the UDM through the N10 interface (N10 for short).
- the AMF network element communicates with AUSF through the N12 interface (N12 for short).
- the AUSF network element communicates with the UDM network element through the N13 interface (N13 for short).
- the AMF network element communicates with the UDM network element through the N8 interface (N8 for short).
- FIG. 4 is only an example of a UPF network element and an SMF network element.
- multiple UPF network elements and SMF network elements may be included, such as SMF network element 1 and SMF network element 2, which are not specifically limited in the embodiment of the present application.
- the (R) AN device, AMF network element, SMF network element, UDM network element, UPF network element, and PCF network element in FIG. 4 are only a name, and the name does not constitute a limitation on the device itself.
- the network elements or entities corresponding to (R)AN equipment, AMF network elements, SMF network elements, UDM network elements, UPF network elements, and PCF network elements can also have other names.
- the application embodiment does not specifically limit this.
- the UDM network element may also be replaced with a user home server (home subscriber server, HSS) or user subscription database (user subscription database, USD) or a database entity, etc., which will be uniformly explained here and will not be repeated in the following .
- the non-public network 100 and the public network 200 use a non-3GPP interworking function (Non-3GPP interworking function, N3IWF)-based architecture for intercommunication.
- the terminal 10 has dual subscription information. That is, the terminal 10 not only has the private network contract information with the non-public network 100, but also has the first public network contract information with the public network 200. Among them, the private network subscription information is used for the terminal 10 to access the non-public network 100.
- the first public network subscription information is used to specify 10 to access the public network 200.
- the private network subscription information between the terminal 10 and the non-public network 100 includes the identity 1 of the terminal 10, and the identity 1 of the terminal 10 includes the identity of the non-public network 100.
- the first public network subscription information between the terminal 10 and the public network 200 includes the identity 2 of the terminal 10, and the identity 2 of the terminal 10 includes the identity of the public network 200.
- the first version may be version (Release, R)16.
- the terminal 10 uses the private network contract information with the non-public network 100 to determine the identity of the non-public network 100. Then the terminal 10 accesses the access network equipment deployed in the non-public network 100, and the terminal 10 performs 3GPP registration in the non-public network 100 through the access network equipment.
- the terminal 10 uses the first public network contract information with the public network 200 to determine the identity of the public network 200. After that, the terminal 10 selects the N3IWF in the public network 200, the terminal 10 establishes a PDU session in the non-public network 100 to access the N3IWF in the public network 200, and performs N3GPP registration on the public network 200.
- the non-public network 100 includes AMF network element 1, SMF network element 1, and UPF network element 1
- public network 200 includes AMF network element 2, SMF network element 2, and UPF network element 2.
- N3IWF is used to realize the intercommunication between the non-public network 100 and the public network 200.
- the terminal 10 accesses the non-public network 100 through the 3GPP access technology of NPN, and then a PDU session is established between the terminal 10 and the UPF network element 1 in the non-public network 100 network. Later, when the terminal 10 needs to perform non-3GPP (non3GPP, N3GPP) registration on the public network 200 through the non-public network 100 network, the terminal 10 can use the PDU session established with the UPF network element 1 to send the public information to the UPF network element 1.
- the registration request message of the public network is used to request the registration of the terminal 10 in the public network 200.
- UPF network element 1 uses DN1 as shown in FIG. 5a to send a public network registration request message to N3IWF.
- the N3IWF After the N3IWF receives the public network registration request message, it can forward the public network registration request message to the AMF network element 2 in the public network 200, so that the AMF network element 2 can determine whether the terminal is allowed according to the public network registration request message. 10 Register in the public network 200. If the AMF network element 2 allows the terminal 10 to register in the public network 200, it sends a registration acceptance message to the N3IWF, so that the N3IWF sends the registration acceptance message to the UPF network element 1 in the non-public network 100 via DN1. After the UPF network element 1 receives the registration acceptance message, it can use the PDU session with the terminal 10 to send the registration acceptance message to the terminal 10.
- the DN1 is used to provide services for the non-public network 100
- the DN2 is used to provide services for the public network 200. That is, the terminal 10 can access the service deployed on DN1 through the non-public network 100. That is, the terminal 10 can access the service deployed on DN2 through the public network 200.
- the N3IWF communicates with the DN through the N6 interface.
- the N3IWF communicates with the AMF network element 2 through the N2 interface of the public network.
- the non-public network 100 and the public network 200 use a roaming architecture to communicate, and the terminal 10 has a connection with the public network 200.
- the second public network contract information As shown in FIG. 5b, the terminal 10 uses the second public network contract information with the public network 200 to determine the identity of the non-public network 100. After the terminal 10 determines the identity of the non-public network 100, the terminal 10 can choose to use the (R)AN device deployed in the non-public network to implement registration in the non-public network 100.
- the terminal 10 may establish a session (for example, a PDU session) in the non-public network 100, and the non-public network 100 determines, according to the second public network subscription information, that the mode of the session is the home routed (HR) mode or the local grooming ( local breakout) mode.
- the second version can be R17.
- the second public network subscription information includes information about one or more non-public networks that the terminal 10 is allowed to access.
- the terminal 10 can receive the broadcast information of the non-public network a (including the identification of the non-public network a). If the identity of the non-public network a included in the broadcast information is the same as the identity of a certain non-public network among the identities of one or more non-public networks, the terminal 10 can determine that the non-public network a can be selected for access.
- Fig. 5b takes the roaming architecture supporting intercommunication between the non-public network 100 and the public network 200 as the home routing mode as an example.
- the non-public network 100 of the terminal 10 also referred to as the visited network of the terminal
- AMF network element 1 visited SMF (visited SMF, V-SMF) network element, visited PCF (V-PCF) network element, (R)AN equipment, visited UPF (visited UPF, V-UPF) ) Network elements and visited NSSF (visited NSSF, V-NSSF) network elements.
- the public network 200 (also referred to as the home network of the terminal) of the terminal 10 includes: home SMF (home SMF, H-SMF) network elements, and home PCF (home PCF, H-PCF) Network elements, home UPF (home UPF, H-UPF) network elements, UDM network elements, AUSF network elements, and home NSSF (home NSSF, H-NSSF) network elements.
- the H-SMF network element communicates with the V-SMF network element through the N16 interface
- the AUSF network element communicates with the AMF network element 1 through the N12 interface
- the H-PCF network element and the V-PCF network element communicate through the N24 interface.
- the AMF network element 1 communicates with the V-NSSF network element through the N22 interface.
- the V-NSSF network element communicates with the H-NSSF network element through the N31 interface.
- the H-UPF network element and the V-UPF network element communicate through the N9 interface.
- the public network 200 may also include: home security edge protection proxy (H-SEPP).
- the non-public network 100 may also include: a visited security edge protection proxy (V-SEPP).
- the public network 200 and the non-public network 100 communicate through the SEPP of the visited place and the SEPP of the home place. There is an N32 interface between the SEPP of the home place and the SEPP of the visited place.
- the public network involved in the embodiments of the present application may be PLMN, and the non-public network may be SNPN, which will be described in a unified manner here, and will not be repeated in the following.
- the UPF network element is used to perform user data packet forwarding according to the routing rules of the SMF network element, for example, uplink data is sent to DN or other UPF; downlink data is forwarded to other UPF or RAN.
- AUSF network element used to perform terminal security authentication.
- AMF Used to implement terminal access management and mobility management. Responsible for terminal status maintenance, terminal reachability management, non-mobility management (mobility management, MM), non-access stratum (Non-access stratum, NAS) message forwarding, session management (Session Management, SM) N2 message Forward.
- SMF network element responsible for terminal session management, allocating resources for terminal sessions, and releasing resources; the resources include session quality of service (QoS), session paths, forwarding rules, etc.
- QoS session quality of service
- NSSF Used to select network slices for the terminal.
- NEF Open network functions to third parties in the form of northbound application programming interface (API).
- API application programming interface
- NRF Provide storage function and selection function of network function entity information for other network elements.
- UDM network element used to store the contract information of the terminal or manage the context of the terminal.
- PCF network element user policy management.
- AF network element used for management applications.
- Terminals can include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to wireless modems; they can also include subscriber units, cellular phones, etc. ), smart phone (smart phone), wireless data card, personal digital assistant (personal digital assistant, PDA) computer, tablet computer, wireless modem (modem), handheld device (handheld), laptop computer (laptop computer), Cordless phone or wireless local loop (WLL) station, machine type communication (MTC) terminal, user equipment (UE), mobile station (mobile station, MS), Terminal device (terminal device) or relay user equipment, etc.
- the relay user equipment may be, for example, a 5G residential gateway (RG).
- RG 5G residential gateway
- the terminals in the embodiments of the present application may be terminals in various vertical industry application fields such as Internet of Things terminal equipment, ports, smart factories, railway transportation, logistics, drones, and unmanned vehicles.
- Mobile Robot Mobile Robot
- AGV Automated Guided Vehicle
- driverless cars control equipment and sensors on trains
- control equipment and sensors Sensors deployed in factories, etc.
- the terminal may also be a wearable device.
- Wearable devices can also be called wearable smart devices. It is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes.
- a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
- wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
- the terminal can also be a sensor device used in a factory.
- the access network equipment is used to provide network access functions for authorized terminals in a specific area, and can use transmission tunnels of different quality according to the level of the terminal and service requirements.
- the access network equipment can manage wireless resources, provide access services for the terminal, and then complete the forwarding of control signals and terminal data between the terminal and the core network.
- the access network equipment can also be understood as a base station in a traditional network. For example, it can be responsible for functions such as radio resource management, quality of service (QoS) management, data compression and encryption on the air interface side.
- QoS quality of service
- the specific structure of the executive body of a network access method is not particularly limited in the embodiment of this application, as long as the code of a network access method of the embodiment of this application can be recorded by running
- the procedure for communicating can be carried out by using a network access method according to an embodiment of the present application.
- the execution subject of the network access method provided by the embodiment of the present application may be a functional module in the first terminal that can call and execute the program, or a communication device, such as a chip, applied to the first terminal.
- the execution subject of the network access method provided by the embodiment of the present application may be a functional module in the access management network element that can call and execute the program, or a communication device applied to the access management network element, for example, chip.
- the execution subject of the network access method provided by the embodiment of the present application may be a functional module in the unified data management network element that can call and execute the program, or a communication device applied to the unified data management network element, for example, chip. This application does not limit this.
- the following embodiments are described with an example in which the execution subject of a network access method is the first terminal, the access management network element, and the unified data management network element.
- FIG. 6 shows an interactive embodiment of a network access method provided by an embodiment of the present application, and the method includes:
- Step 601 The first terminal sends a first message to the access management network element in the first non-public network, and correspondingly, the access management network element in the first non-public network receives the first message from the first terminal.
- the first message is used to request to register the first terminal in the first non-public network.
- the first terminal is located within the coverage area of the first non-public network. It should be understood that the first terminal may detect one or more candidate non-public networks, and the first non-public network may be any one of the one or more candidate non-public networks. Of course, the first non-public network may be a candidate non-public network with the strongest signal quality among one or more candidate non-public networks.
- the access management network element may be the access management network element 20 shown in FIG. 2.
- the first non-public network may be the non-public network 100 in FIG. 2.
- the first terminal in the embodiment of the present application does not have the authority or ability to access a non-public network.
- the first terminal may have the authority or ability to access the public network, which is not limited in the embodiment of the present application.
- the “non-public network” in which the first terminal does not have the right to access a non-public network can be a general term, that is, the first terminal does not have the right to access any non-public network.
- the “non-public network” in which the first terminal does not have the right to access the non-public network can be specified, that is, the first terminal just cannot access a specific non-public network (for example, a specific non-public network).
- the network is the first non-public network), but the first terminal can access non-public networks other than the first non-public network. For example, taking the first non-public network as the non-public network 1 as an example, although the first terminal does not have the function of accessing the non-public network 1, the first terminal has the function of accessing the non-public network 2.
- the first terminal is exclusively used to access the non-public network 2 serving the factory 1.
- the first terminal does not have access to the Permission of non-public network 1.
- the first message may also carry the identity of the first terminal.
- the identifier of the first terminal is used to identify the first terminal.
- the identifier of the first terminal may be one or more of the following: subscription permanent identifier (SUPI), subscriber concealed identifier (SUCI).
- SUPI subscription permanent identifier
- SUCI subscriber concealed identifier
- step 601 in the embodiment of the present application can be implemented in the following manner: the first terminal sends the first terminal to the access management network element in the first non-public network through the access network device in the first non-public network. A message.
- the access management network element in the first non-public network receives the first message from the first terminal through the access network device in the first non-public network.
- the access management network element may also obtain the information of the first non-public network from the access network device in the first non-public network.
- the information of the first non-public network is used to identify the non-public network.
- the information of the first non-public network may be an identification of the first non-public network. Taking the information of the first non-public network as the identification of the first non-public network as an example, the identification of the first non-public network is determined by the identification of the target public network and the NID.
- the target public network in the embodiment of the present application is a public network corresponding to the first non-public network.
- the target public network is the public network of operator A
- the identifier of the target public network assigned by operator A for the target public network is "00000" and the NID is "0001”
- the identifier of the first non-public network includes " 000000001”.
- the identifier of the target public network is a specific value assigned to the target public network by the operator deploying the first non-public network.
- the identifier of the target public network is an inherent value reserved for the target public network by a third-party operator, which is not limited in the embodiment of the present application.
- the first message may be a registration request message.
- Step 602 The access management network element sends a query message to the unified data management network element in the first public network, and correspondingly, the unified data management network element in the first public network receives the access management network element from the non-public network Query message.
- the query message is used to query the subscription data of the first terminal.
- the first public network communicates with the first non-public network.
- the first non-public network described in step 601 to step 605 is a non-public network that communicates with the first public network.
- the query message may carry the identification of the first terminal and the information of the first non-public network.
- the first public network may be the public network 200 shown in FIG. 2.
- the unified data management network element may be the unified data management network element 40 in FIG. 2.
- Step 603 The unified data management network element sends a third message to the access management network element, and correspondingly, the access management network element obtains the third message from the unified data management network element in the first public network.
- the third message includes one or more of the following: subscription data and cause value of the first terminal.
- the contract data includes the second indication information.
- the second indication information is used to indicate that the first terminal can only access through the public network.
- the second indication information is used to indicate that the first terminal cannot access through a non-public network.
- the reason value indicates that the first terminal is not allowed to access in the first non-public network.
- step 602 can be omitted.
- the “public network” in the above-mentioned first terminal can only be accessed through a public network is a general term, that is, the first terminal is used to access through any public network other than the public network, and is not limited to only through The first public network access.
- the “non-public network” in the foregoing that the first terminal cannot access through a non-public network may be a general term, that is, the first terminal cannot be accessed through any non-public network.
- the "non-public network” in the foregoing first terminal cannot access through the non-public network specifically refers to that the first terminal cannot access through the first non-public network. The embodiment of the application does not limit this.
- Step 604 The access management network element sends a second message to the first terminal according to the third message, and correspondingly, the first terminal receives the second message from the access management network element.
- the second message is used to indicate that the first terminal is refused to register on the first non-public network.
- the second message includes first indication information, and the first indication information indicates that the first terminal is prohibited from accessing in the first non-public network.
- Step 605 The first terminal updates the network ban list of the first terminal according to the first indication information.
- the updated network banned list includes the information of the first non-public network.
- the updated network banned list can be regarded as the first network banned list.
- step 605 in the embodiment of the present application may be implemented in the following manner: the first terminal adds the information of the first non-public network to the network ban list of the first terminal according to the first indication information.
- the network ban list of the first terminal may itself have information about one or more networks, and the one or more networks include the first non-public network, in other words, the network of the first terminal
- the prohibition list may include the first non-public network.
- Each of the one or more networks has a record item, and the record item is used to indicate whether access to the network is prohibited or allowed.
- including the information of the first non-public network in the updated network banning list can be understood as: the first terminal sets the record item corresponding to the first non-public network to a state of being prohibited from accessing.
- the so-called update by the first terminal of the network ban list of the first terminal may refer to: the first terminal updates the record item corresponding to the first non-public network in the network ban list.
- the record item of the first non-public network is indicator a, which indicates that access to the first non-public network is prohibited.
- the record item of the first non-public network is indicator b, which indicates that the first non-public network is allowed to access.
- the network ban list includes the record item corresponding to the first non-public network as indicator b, and then the first terminal executes the above steps 601 to 603 to request access to the first non-public network.
- the first terminal receives the second message in the process of requesting access to the first non-public network.
- the second terminal determines that it is denied access to the first non-public network according to the second message.
- the first terminal may set the record item corresponding to the first non-public network as the indicator a.
- the indicator a can also be represented by a deactivated state, and the indicator b can also be represented by an activated state, which is not limited in the embodiment of the present application.
- the network ban list of the first terminal may itself have information about one or more networks, and the one or more networks do not include the first non-public network, then the updated network ban Including the information of the first non-public network in the list can be understood as: the first terminal adds the information of the first non-public network to the network ban list, and sets the record item corresponding to the first non-public network as indicator a.
- the first terminal can use The access network device in the non-public network 1 sends a first message to the access management network element in the non-public network 1 to request to register in the non-public network 1, and then if the first terminal receives a message from the access management network element If the second message indicates that the first terminal is refused to register in the non-public network 1, the first terminal may determine that the non-public network 1 is a non-public network that the first terminal is prohibited from accessing.
- the information of the first non-public network in the embodiment of the present application is used to identify the first non-public network.
- the information of the first non-public network may be an identification of the first non-public network.
- the information of the first non-public network may also be other parameters that can identify the first non-public network, which is not limited in the embodiment of the present application.
- the embodiment of the present application provides a network access method.
- the first terminal sends a first message to the access management network element in the first non-public network to request to register the second network in the first non-public network.
- One terminal receives a second message from the access management network element.
- the second message indicates that the first terminal is refused to register in the first non-public network, and the first indication information indicates that the first terminal is prohibited from being registered in the first non-public network.
- Access in the network This is so that the first terminal updates the network ban list of the first terminal according to the first instruction information, so that the updated network ban list includes the information of the first non-public network, which can be avoided when the first terminal selects the network to register later. Select the first non-public network that is forbidden to access.
- This solution can solve the problem that the first terminal that does not have the right to access the non-public network tries to access the first non-public network.
- the method provided in the embodiment of the present application may further include after step 605: the first terminal selects a network other than the first non-public network for registration according to the updated network ban list.
- the first terminal selects a network other than the first non-public network for registration according to the updated network ban list, which can be implemented in the following manner: the first terminal selects the network except the updated network ban list Register on the network listed in the network ban list.
- the first terminal can select non-public network 2 other than non-public network 1. Sign up. If the updated network banned list includes the information of non-public network 1 and the information of non-public network 2, the first terminal can choose to register unless non-public network 3 other than public network 1 and non-public network 2 is registered. The following network banned list does not include the information of non-public network 3.
- the method provided in the embodiment of the present application may further include: the first terminal starts a timer according to the first indication information, and when the timer expires, the first terminal starts from the updated Delete the information of the first non-public network from the network ban list. In this way, when the timer expires, the first non-public network can still be used as the non-public network that the first terminal can choose to access.
- timer expiration may refer to reaching the timer time value corresponding to the timer.
- the above-mentioned first terminal deletes the information of the first non-public network from the updated network ban list and can also be replaced by the following method: the first terminal updates the first network ban list to obtain The second network banned list.
- the second network ban list does not include the information of the first non-public network, or the record item corresponding to the first public network included in the second network ban list indicates that the first non-public network is an accessible network
- the embodiments of this application do not limit this.
- the first terminal updates the record item corresponding to the first non-public network from indicator a to indicator b.
- the first terminal when the first terminal deletes the information of the first non-public network from the updated network ban list, the first terminal can continue to request registration in the first non-public network. For example, for a first terminal that does not have the right to access a non-public network, if the first terminal is configured to have the right to access a non-public network, when the timer time value corresponding to the timer is reached, the When a terminal deletes the information of the first non-public network from the network ban list, the first terminal can subsequently register in the first non-public network.
- deleting information about a certain non-public network from a certain network ban list can also be expressed as: the second terminal sets the record item corresponding to the non-public network as indicator a.
- the timer time value corresponding to the timer may be predefined by the protocol, or the timer time value corresponding to the timer may be configured by the first terminal itself, or the timer time value corresponding to the timer may be determined by The access management network element is configured for the first terminal.
- the second message includes the timer time value, and correspondingly, the first terminal sets the timer according to the timer time value.
- the access management network element may also send the timer time value corresponding to the timer to the first terminal through other messages except the second message, which is not limited in this embodiment of the application.
- the embodiment described in FIG. 6 may be applicable to the following scenarios:
- the first non-public network and the first public network are both networks defined in the first version.
- the first non-public network is an R16 non-public network
- the first public network is an R16 public network.
- the first non-public network and the first public network are both networks defined in the second version.
- the first non-public network is an R17 non-public network
- the first public network is an R17 public network.
- the access management network element may be the AMF network element 1 as shown in FIG. 5b.
- step 605 can be omitted.
- the first indication information in the second message can be replaced by indication information x, where the indication information x is used to indicate that the reason why the first terminal is prohibited from accessing the first non-public network is: the first terminal is Illegal terminal.
- the fact that the first terminal is an illegal terminal means that the first non-public network cannot identify the identity of the first terminal.
- step 605 is a mandatory step.
- the first non-public network is an R17 non-public network
- the first public network is an R17 public network
- the first non-public network and the first public network adopt a roaming architecture to communicate with each other.
- FIG. 7 shows an interactive embodiment of a network access method provided by an embodiment of the present application, and the method includes:
- Step 701 The access network device in the first non-public network sends broadcast information, and correspondingly, the second terminal receives the broadcast information from the access network device in the first non-public network.
- the broadcast information includes first indication information, and the first indication information is used to indicate that the first non-public network communicates with the public network.
- the second terminal in the embodiment of the present application has the authority to access the non-public network function.
- the second terminal may have the authority to access the public network, or the second terminal may not have the authority to access the public network, which is not limited in the embodiment of the present application.
- the “non-public network” in the second terminal having the right to access a non-public network may be a general term, that is, the second terminal has the right to access any non-public network.
- the “non-public network” of the second terminal having the right to access the non-public network may be specified, that is, the second terminal can only access a specific non-public network (for example, a specific non-public network). Is the first non-public network).
- the “public network” in the intercommunication between the first non-public network and the public network can be any public network in general.
- the second terminal is located within the coverage area of the first non-public network, and the second terminal can receive broadcast information sent from an access network device in the first non-public network.
- the first indication information may be a first indicator, and the first indicator is used to indicate that the first non-public network communicates with the public network.
- the first indication information may be "1".
- the first indication information is used to instruct the first non-public network to communicate with the public network using a roaming architecture. So that the second terminal uses the roaming architecture to access the first non-public network.
- the so-called second terminal using the roaming architecture to access the first non-public network may refer to: the second terminal uses the subscription information of the second terminal in the public network (for example, the following first subscription information) to access the first non-public network The internet.
- the method in the embodiment of the present application may further include: the access network device in the first non-public network determines that the first non-public network is interoperable with the public network.
- the access network device in the first non-public network can determine that the first non-public network communicates with the public network in the following manner: the access network device determines the non-public network to communicate with the public network according to the operator configuration information.
- Step 702 The second terminal determines to use the first subscription information to access the first non-public network according to the broadcast information.
- the first contract information is the contract information of the second terminal in the first public network.
- the first identifier of the second terminal carried in the first subscription information is related to the first public network.
- the first identification of the second terminal carries information of the first public network, such as the network identification PLMN ID.
- the first public network is one of one or more public networks that communicate with the first non-public network.
- the first public network may be the public network 200 as shown in FIG. 5b.
- the first non-public network may be the non-public network 100 as shown in FIG. 5b.
- the access management network element may be the AMF network element 1 as shown in Fig. 5b.
- the embodiment of the present application provides a network access method.
- the second terminal receives the broadcast information broadcasted by the access network device, so that it is convenient for the second terminal to determine the first non-information according to the first indication information carried in the broadcast information.
- the public network supports intercommunication with the public network.
- the second terminal may determine to use the first subscription information to access the first non-public network.
- the second terminal needs to access the first non-public network later, it can use the first subscription information to request registration in the first non-public network, which prevents the second terminal from not knowing the public network and the first non-public network.
- a registration request is blindly initiated to the first non-public network, resulting in registration failure.
- the method provided in the embodiment of the present application may further include after step 702: the second terminal uses the first subscription information to access the first non-public network.
- the second terminal using the first subscription information to access the first non-public network can be implemented in the following manner: the second terminal uses the first subscription information to manage access to the first non-public network
- the network element sends a first message, where the first message is used to indicate that the second terminal is registered in the first non-public network.
- the first message carries the first identifier of the second terminal.
- the first message may carry a registration indication, and the registration indication is used to indicate that the second terminal is registered in the first non-public network.
- the broadcast information further includes information about one or more public networks that communicate with the first non-public network, and the first public network belongs to the one or more public networks.
- the access network device broadcasts information about one or more public networks, so that the second terminal can determine one or more public networks that the second terminal can access.
- the broadcast information may also include a manual selection access instruction
- the second terminal prompts the user to use the manual selection method to access the first non-public network according to the manual selection access instruction to prevent the second terminal from automatically selecting To the first non-public network.
- the one or more public networks also belong to country A.
- the first public network may be any one of the one or more public networks. That is, the second terminal can choose one of the one or more public networks as the first public network.
- the network selection priority of the first public network is the highest among the network selection priorities of one or more public networks.
- the first public network is a public network supported by the second terminal.
- the second terminal has a network selection priority for each of the one or more public networks.
- the second terminal has contract information with the public network.
- the first non-public network involved in the embodiment described in FIG. 7 may be an R17 non-public network.
- the public network can be an R17 public network.
- the first non-public network and the public network in the embodiment described in FIG. 7 adopt a roaming architecture for intercommunication.
- FIG. 8 shows an interactive embodiment of a network access method provided by an embodiment of the present application, and the method includes:
- Step 801 The second terminal uses the first subscription information to send a first message to the access management network element in the first non-public network.
- the access management network element in the first non-public network receives the information from the second terminal.
- the first message is used to indicate that the second terminal requests to use the first subscription information to register in the first non-public network.
- the second terminal in the embodiment of the present application is a second terminal that supports the first version of the network.
- the so-called second terminal that supports the first version of the network refers to: the second terminal has the same version as the first version of the second terminal.
- the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network.
- the "first non-public network" in the first message refers to the second version of the first non-public network.
- the access management network element in the first non-public network may be the access management network element in the first non-public network of the second version.
- the first subscription information is the subscription information of the second terminal in the first non-public network.
- the first subscription information is the non-public network subscription information of the second terminal in the first version of the first non-public network.
- the second terminal in the embodiment of the present application is a second terminal that supports the second version of the network.
- the so-called second terminal that supports the second version of the network refers to: the second terminal has the same version as the second terminal.
- the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network.
- the "first non-public network" in the first message refers to the first version of the first non-public network. .
- the access management network element in the first non-public network may be the access management network element in the first non-public network of the first version.
- the first contract information is the contract information of the second terminal in the first public network.
- the first subscription information is public network subscription information between the second terminal and the second version of the first public network.
- the above-mentioned first version may be an R16 version, and the second version may be an R17 version.
- the first subscription information is the first subscription information of the second terminal in the first version.
- the second identity of the second terminal carried in the first subscription information is related to the first non-public network.
- the second identity of the second terminal includes the identity of the first non-public network.
- the first subscription information is the first subscription information of the second terminal in the second version. Contract information in the public network.
- the third identifier of the second terminal carried in the first subscription information is related to the first public network.
- the third identifier of the second terminal includes the information of the first public network.
- the information of the first public network is used to identify the first public network.
- the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network, which can be understood as: the access of the second terminal to the first non-public network
- the management network element sends a first message, and the identifier of the second terminal included in the first message may be obtained from the first subscription information.
- the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network to carry the second The second identifier of the terminal.
- the second terminal uses the first subscription information to send the first message to the access management network element in the first non-public network to carry the second The third identifier of the terminal.
- Step 802 The access management network element sends a second message to the second terminal, and correspondingly, the second terminal receives the second message from the access management network element.
- the second message is used to refuse registration of the second terminal in the non-public network
- the second message includes fourth indication information
- the fourth indication information is used to indicate the reason for the rejection of the second terminal to register in the non-public network.
- the embodiment described in FIG. 8 can be applied to: the non-public network to which the second terminal subscribes or the public network is different from the non-public network to which the second terminal registers. That is, case 1.
- the second terminal uses the private network subscription information of the second terminal in the first non-public network of the first version to request registration in the first non-public network of the second version, the first non-public network of the second version
- the access management network element in the network refuses the second terminal to register in the second version of the first non-public network.
- Case 2
- the second terminal uses the public network subscription information of the second terminal in the second version of the first public network to request registration in the first version of the first non-public network, the first version of the first non-public network
- the access management network element of denies the second terminal to register in the first non-public network of the first version.
- the first subscription information can be the subscription information of the second terminal in the first non-public network, or the subscription information of the second terminal in the first public network, but under different circumstances, the second terminal receives the second message There are differences in the subsequent processing actions, which will be introduced separately as follows:
- the first subscription information is the subscription information of the second terminal in the first non-public network, which means that the first subscription information is the subscription information of the second terminal in the first version of the first non-public network.
- the first non-public network to be registered by the second terminal is the first non-public network of the second version
- the first public network is the first public network of the second version.
- the embodiment of the present application provides a network access method, in which a second terminal uses first subscription information to send a first message to an access management network element in a first non-public network, where the first subscription information is the second The contract information of the terminal in the first non-public network or the first contract information is the contract information of the second terminal in the first public network.
- the second terminal receives the second message from the access management network element, so that the subsequent second terminal can determine according to the second message that the access network management network element in the first non-public network refuses the second terminal to register in the non-public network , And determine the reason why the access management network element refuses the second terminal to register in the non-public network according to the fourth indication information.
- This solution can solve the problem that the second terminal uses the subscription information of the second terminal in the first non-public network to register in the first non-public network, or solves the problem that the second terminal uses the subscription information of the second terminal in the first public network The problem of registering in the first non-public network.
- FIG. 9 shows another network access method according to an embodiment of the present application, and the method includes:
- Step 901 is the same as step 801, and will not be repeated here.
- Step 902 The access management network element determines to reject the second terminal from registering in the first non-public network.
- step 902 may be implemented in the following manner: the access management network element determines to reject the second terminal from registering in the first non-public network according to the configuration information or the subscription information of the second terminal in the first non-public network.
- the access management network element determines to reject the second terminal from registering in the first non-public network.
- the access management network element determines to reject the second terminal in the first non-public network. Register in the network.
- Step 903 is the same as step 802, and will not be repeated here.
- the method provided in the embodiment of the present application may further include step 904 after step 903, or the method provided in the embodiment of the present application may further include step 905 and step 904 after step 904.
- 906 :
- Step 904 The access management network element sends a fourth message to the second terminal.
- the second terminal receives a fourth message from the access management network element, where the fourth message includes the network candidate list of the second terminal.
- the network candidate list includes information of the first non-public network.
- the network candidate list in the embodiment of the present application includes the information of the first non-public network, it means that the second terminal can register in the first public network.
- the network candidate list including the information of the first non-public network can also be replaced with: the record item corresponding to the first public network included in the network candidate list is in an active state.
- the network candidate list of the second terminal includes one or more candidate non-public networks that the second terminal can choose to access.
- the first non-public network belongs to the one or more candidate non-public networks.
- the second terminal can determine that although the second terminal uses the subscription information of the second terminal in the first version of the first non-public network to register in the first non-public network and is rejected, the second terminal is rejected The terminal can register in the first non-public network.
- Step 905 The access management network element sends a fifth message to the second terminal.
- the second terminal receives the fifth message from the access management network element. Register in the network.
- the fifth message includes an acceptance instruction, and the acceptance instruction is used to indicate that the second terminal is accepted to register in the first non-public network.
- Step 906 The second terminal adds the information of the first non-public network to the network candidate list of the second terminal according to the fifth message.
- step 906 in the embodiment of the present application can also be described as: the second terminal updates the network ban list of the second terminal according to the fifth message.
- the updated network banned list includes the information of the first non-public network.
- the second terminal can determine that although the second terminal uses the subscription information of the second terminal in the first version of the first non-public network to register in the first non-public network, the registration in the first non-public network is rejected, But the second terminal can register in the first non-public network.
- the method provided in the embodiment of the present application may further include:
- Step 907 The second terminal uses the second contract information of the second terminal to register in the first non-public network according to the fourth instruction information, and the second contract information is the contract information of the second terminal in the first public network.
- the second subscription information includes an identifier of the first public network, and the second subscription information includes a fifth identifier of the second terminal, and the fifth identifier is related to the identifier of the first public network.
- the fourth indication information may also be used to instruct the second terminal to use the roaming architecture to register in the first non-public network.
- the fourth indication information may also be used to instruct the second terminal to use the second subscription information of the second terminal to register in the first non-public network, which is not limited in this embodiment of the application.
- the embodiment of the present application provides a network access method, in which a second terminal uses first subscription information to send a first message to an access management network element in a first non-public network, where the first subscription information is the second The contract information of the terminal in the first non-public network. After that, the second terminal receives the second message from the access management network element, so that the subsequent second terminal can determine according to the second message that the access network management network element in the first non-public network refuses the second terminal to register in the non-public network , And determine the reason why the access management network element refuses the second terminal to register in the non-public network according to the fourth indication information.
- the second terminal may use the second contract information of the second terminal to register in the first non-public network according to the reason.
- This solution can realize that the second terminal uses the second terminal's subscription information in the first non-public network to register in the first non-public network after the registration in the first non-public network is rejected, and then uses the second contract information to register in the first non-public network.
- the first subscription information is the subscription information of the second terminal in the first public network, which means that the first subscription information is the subscription information of the second terminal in the second version of the first public network.
- the first non-public network to be registered by the second terminal is the first non-public network of the first version.
- the first public network that communicates with the first non-public network of the first version is the first public network of the first version.
- the fourth indication information is used to indicate that the second terminal is an illegal terminal.
- the fourth indication information is used to indicate that the non-public network cannot identify the identity of the second terminal.
- FIG. 10 shows another network access method according to an embodiment of the present application, and the method includes:
- Step 1001 is the same as step 801, and will not be repeated here.
- Step 1002 The access management network element determines to reject the second terminal from registering in the first non-public network.
- step 1002 can be implemented in the following manner: the access management network element cannot obtain the subscription information of the second terminal or cannot identify the identity of the second terminal, that is, the authentication of the second terminal fails. Register in the first non-public network.
- Step 1003 is the same as step 802, and will not be repeated here.
- the second message is also used to instruct the second terminal to use the third subscription information to request registration in the first non-public network.
- the method provided in this embodiment of the present application is After 1003, it can also include:
- Step 1004 The second terminal uses the third subscription information to request registration in the first non-public network.
- the third subscription information is the subscription information between the second terminal and the first non-public network of the first version.
- the third subscription information includes a fourth identifier of the second terminal, and the fourth identifier is related to the first non-public network.
- the fourth identifier includes information about the first non-public network.
- the identification of the first non-public network for the content of the identification of the first non-public network, reference may be made to the descriptions elsewhere in the embodiment of the present application, which will not be repeated here.
- step 1004 in the embodiment of the present application can be implemented in the following manner: the second terminal sends a registration request message to the access management network element in the first version of the non-public network, and the registration request message is used To request to register the second terminal in the first version of the non-public network.
- the registration request message includes the fourth identifier of the second terminal.
- the fourth identifier of the second terminal is determined by the third subscription information. In other words, the fourth identifier of the second terminal includes information about the first non-public network.
- the method provided in this embodiment of the present application may further include: the second terminal uses the second terminal in the first The subscription information in the public network requests registration in the first public network of the first version.
- the second message in step 1003 in Example 2 may also include instruction information for instructing the second terminal to use the third subscription information to request registration in the first non-public network.
- the embodiment of the present application provides a network access method, in which a second terminal uses first subscription information to send a first message to an access management network element in a first non-public network, where the first subscription information is the second The contract information of the terminal in the first public network.
- the second terminal receives the second message from the access management network element, so that the subsequent second terminal can determine according to the second message that the access network management network element in the first non-public network refuses the second terminal to register in the non-public network , And determining, according to the fourth indication information, that the reason why the access management network element refuses the second terminal to register in the non-public network is that the second terminal is an illegal terminal.
- the second terminal may use the third subscription information of the second terminal to register in the first non-public network according to the reason.
- This solution can realize that the second terminal uses the subscription information of the second terminal in the first public network to register in the first non-public network after being rejected, and then uses the third contract information to register in the first non-public network.
- Figure 11 uses the first terminal as a non-SNPN device, and the first non-public network is the R17 version of SNPN (hereinafter referred to as R17 SNPN, which corresponds to the non-public network in Figure 5b).
- Network 100 the access management network element is the SNPN AMF network element in R17 SNPN (corresponding to the AMF network element 1 in Figure 5b), the access network equipment is SNPN RAN, and the public network is the R17 version of the PLMN (hereinafter referred to as: R17 PLMN, corresponding to the public network 200 in Figure 5b), the unified data management network element is the UDM network element in Figure 5b as an example, the method includes:
- Step 1101 the non-SNPN device sends a registration request message to the SNPN AMF network element, and correspondingly, the SNPN AMF network element receives the registration request message from the non-SNPN device.
- the registration request message is used to request registration of non-SNPN devices in R17 SNPN.
- the registration request message carries the identification of the non-SNPN device.
- the identification of a non-SNPN device can be SUPI or SUCI.
- Step 1101 can be implemented in the following manner: the non-SNPN device sends a registration request message to the SNPN AMF network element through the SNPN RAN in the R17 SNPN.
- the SNPN AMF network element may also receive the R17 SNPN identifier from the SNPN RAN, and the R17 SNPN identifier is used to identify the R17 SNPN.
- the SUPI or SUCI of the non-SNPN device contains the HPLMN ID of the non-SNPN device. The HPLMN ID is used to determine the home public network corresponding to the non-SNPN device.
- Step 1102 If the R17 SNPN and R17 PLMN do not support roaming intercommunication, the SNPN AMF network element sends a registration rejection message 1 to the non-SNPN device, and accordingly, the non-SNPN device receives the registration rejection message 1 from the SNPN AMF network element.
- the registration rejection message 1 is used to indicate that the non-SNPN device is rejected to register in R17 SNPN, and the registration rejection message 1 can also carry the reason that the non-SNPN device is rejected to register in R17 SNPN: the non-SNPN device is an illegal terminal ( Illegal UE).
- Step 1103. If the R17 SNPN and R17 PLMN support roaming intercommunication, the SNPN AMF network element sends a contract acquisition request message to the UDM network element in the R17 PLMN, and the UDM network element receives the contract acquisition request from the SNPN AMF network element accordingly. information. Among them, the subscription acquisition request message is used to request subscription data of non-SNPN devices.
- the subscription acquisition request message carries the R17 SNPN identifier and the identifier of the non-SNPN device.
- the R17 SNPN identifier By carrying the R17 SNPN identifier in the contract acquisition request message, it is convenient for the UDM network element to determine the non-public network that the non-SNPN device should access.
- step 1103 can be implemented in the following manner: the SNPN AMF network element sends a subscription acquisition request message to the V-SEPP in the R17 SNPN. After that, the V-SEPP sends the acquired subscription acquisition request message to the H-SEPP in the R17 PLMN, so that the H-SEPP forwards the subscription acquisition request message to the UDM network element.
- Step 1104 The UDM network element sends a contract acquisition response message to the SNPN AMF network element.
- the SNPN AMF network element receives the contract acquisition response message from the UDM network element.
- the contract acquisition response message is used for the SNPN AMF network element to determine to reject the non-SNPN
- the device is registered in R17 SNPN.
- step 1104 can be implemented in the following manner: the UDM network element sends a subscription acquisition response message to the H-SEPP in the R17 PLMN. After that, the H-SEPP sends the acquired subscription acquisition response message to the V-SEPP in R17 SNPN, so that the V-SEPP sends the subscription acquisition response message to the SNPN AMF network element in R17 SNPN.
- the subscription acquisition response message carries subscription data of the non-SNPN device, and the subscription data includes second indication information.
- the second indication information is used to indicate that the non-SNPN device can only access through the public network.
- the second indication information is used to indicate that the non-SNPN device cannot access through the non-public network.
- the second indication information includes a list of networks supported by the non-SNPN device. Among them, the list of networks supported by the non-SNPN device does not include the R17 SNPN information. Or the record item corresponding to the R17 SNPN in the network list supported by the non-SNPN device is used to indicate that the R17 SNPN is forbidden to access.
- the subscription acquisition response message includes third indication information, which is used to indicate that the subscription data of the non-SNPN device has not been successfully acquired.
- the subscription acquisition response message includes a reason value, and the reason value is used to indicate that the non-SNPN device is not allowed to access in the R17SNPN.
- the subscription acquisition response message does not include the subscription data of the non-SNPN device.
- Step 1105 The SNPN AMF network element determines to reject the registration of the non-SNPN device in the R17 SNPN according to the contract acquisition response message.
- Step 1106 The SNPN AMF network element sends a registration rejection message 2 to the non-SNPN device, and correspondingly, the non-SNPN device receives a registration rejection message 2 from the SNPN AMF network element.
- the registration rejection message 2 is used to indicate that non-SNPN devices are rejected to register in R17 SNPN.
- the registration rejection message 2 may also carry the reason for rejecting the registration of the non-SNPN device in R17 SNPN. For example, the reason for rejecting the registration of a non-SNPN device in the R17 SNPN is that the non-SNPN device is not allowed to access the R17 SNPN.
- Step 1107 The non-SNPN device adds the R17 SNPN information to the network ban list of the non-SNPN device.
- step 1107 can also be implemented in the following manner: the non-SNPN device updates the network ban list of the non-SNPN device.
- the updated network ban list of non-SNPN devices includes R17 SNPN information.
- the information of R17 SNPN is used to identify R17 SNPN.
- the information of R17 SNPN may be the identification of R17 SNPN.
- the network ban list includes one or more networks that the non-SNPN device is prohibited from accessing, and the one or more networks include the aforementioned R17 SNPN.
- the method provided in the embodiment of the present application may further include after step 1107:
- Step 1108 The non-SNPN device performs network selection according to the network ban list to select a network except the network ban list for registration.
- step 1101 and step 1102 can form a separate embodiment to solve the problem of non-SNPN interoperability when roaming architecture intercommunication is not supported between R17 SNPN and R17 PLMN.
- Steps 1101, steps 1103 to 1108 can form a separate embodiment to solve the problem of non-SNPN devices accessing R17 SNPN in the case of supporting roaming architecture intercommunication between R17 SNPN and R17 PLMN.
- the registration request message in the embodiment shown in FIG. 11 may correspond to the first message in the embodiment shown in FIG. 6.
- the subscription acquisition response message may correspond to the third message in the embodiment shown in FIG. 6 above.
- the registration rejection message 2 may correspond to the second message in the embodiment shown in FIG. 6 above.
- the subscription acquisition request message may correspond to the query message in the embodiment shown in FIG. 6 above.
- the reason for rejecting the registration of the non-SNPN device in R17 SNPN may correspond to the first indication information in the embodiment shown in FIG. 6.
- Figure 12 shows a specific embodiment of another network access method of the present application.
- the first non-public network is R17 SNPN
- the access network device is SNPN RAN
- the second terminal is an SNPN device as an example
- the method includes:
- Step 1201 R17 SNPN RAN in the SNPN sends broadcast information, and correspondingly, the SNPN device receives the broadcast information from the SNPN RAN.
- the broadcast information includes an interworking indication, which is used to indicate that R17 SNPN and R17 PLMN support interworking.
- the SNPN device is located within the coverage of R17 SNPN, and the SNPN device can receive broadcast information from the SNPN RAN.
- Step 1202 the SNPN device determines to use the contract information between the SNPN device and the R17 PLMN to access the R17 SNPN and R17 PLMN according to the interworking instruction in the broadcast information.
- step 1202 can be implemented in the following manner: the SNPN device according to the interoperability instruction in the broadcast information, Determine to use the target contract information between the SNPN device and the target R17 PLMN to access the R17 SNPN and R17 PLMN.
- the target R17 PLMN belongs to the one or more R17 PLMNs.
- the embodiment shown in FIG. 12 may further include after step 1202: the SNPN device sends a registration request message to the SNPN AMF network element in the R17 SNPN through the SNPN RAN in the R17 SNPN , So please register in this R17 SNPN.
- the registration request message carries the identification of the SNPN device described in the target subscription information, and the identification of the SNPN device described in the target subscription information includes the R17 PLMN identification.
- the SNPN AMF network element allows the SNPN device to register in R17 SNPN
- the SNPN AMF network element sends a registration acceptance message to the SNPN device.
- Figure 13 uses the second terminal as the SNPN device, the first non-public network is the R17 version of SNPN (hereinafter referred to as R17 SNPN), and the access management network element is the SNPN in R17 SNPN
- the AMF network element, the access network equipment is SNPN RAN, the first public network is the R17 version of the PLMN (hereinafter referred to as R17 PLMN), and the unified data management network element is the UDM network element.
- Step 1301. The SNPN device uses the subscription information 1 to send a registration request message to the SNPN AMF network element, and correspondingly, the SNPN AMF network element receives the registration request message from the SNPN device.
- the registration request message includes the identification 1 of the SNPN device.
- the SNPN device shown in Figure 13 and Figure 14 may be an R16 SNPN device.
- the so-called R16 SNPN device refers to the SNPN device that has private network subscription information with the R16 version of SNPN, and also has the same PLMN version with the R16 version.
- the aforementioned subscription information 1 may be private network subscription information between the SNPN device and the R16 version of the SNPN.
- the private network subscription information between the SNPN device and the R16 version of SNPN includes the identification 1 of the SNPN device.
- the identification 1 of the SNPN device includes the identification of the R16 version SNPN.
- Step 1302 the SNPN AMF network element determines that the SNPN device cannot pass the security authentication.
- the SNPN AMF network element determines that the SNPN device cannot pass the safety certification.
- Step 1303 The SNPN AMF network element sends a registration rejection message 11 to the SNPN device, and correspondingly, the SNPN device receives a registration rejection message 11 from the SNPN AMF network element.
- the registration rejection message 11 is used to indicate that the SNPN device is rejected to register in R17 SNPN.
- the registration rejection message 11 may also carry the reason indicating that the SNPN device is rejected to register in R17 SNPN: the SNPN device is an illegal terminal, that is, the SNPN cannot recognize the identity of the SNPN device.
- SNPN AMF network elements are obtained through the AMF network element upgrade in R16 SNPN, and the operator policy does not support N3IWF mode, that is, R17 SNPN and R17 PLMN do not support interworking in N3IWF mode, while R17 SNPN and R17 PLMN support roaming mode Intercommunication.
- Step 1304 The SNPN AMF network element determines that the SNPN device uses the roaming mode to register in the R17 SNPN according to the contract information 1 of the SNPN device and the operator policy.
- Step 1305 The SNPN AMF network element sends a registration rejection message 12 to the SNPN device.
- the SNPN device receives a registration rejection message 12 from the SNPN AMF network element.
- the registration rejection message 12 is used to indicate that the SNPN device is rejected to register in R17 SNPN.
- the registration rejection message 12 may also carry the reason for rejecting the registration of the SNPN device in the R17 SNPN: the private network subscription information between the SNPN device and the R16 version of the SNPN is unavailable.
- the registration rejection message 12 may also carry indication information y for instructing the SNPN device to use the roaming architecture to register in R17 SNPN.
- the indication information y is used to facilitate the SNPN device to determine to use the public network.
- the signing information is registered in R17 SNPN.
- Step 1306 The SNPN device uses the public network subscription information to register in R17 SNPN according to the reason for rejecting the SNPN device to register in R17 SNPN.
- step 1306 it may also include: the SNPN AMF network element sends a network candidate list to the SNPN device, and the network candidate list includes R17 SNPN information.
- the SNPN AMF network element sends a fourth message to the SNPN device, the fourth message is used to instruct the SNPN device to add R17 SNPN to the network candidate list.
- the SNPN device adds the R17 SNPN information to the network candidate list according to the fourth message.
- Step 1307 The SNPN AMF network element determines that the SNPN device can use the N3IWF mode to register in the R17 SNPN according to the contract information 1 of the SNPN device and the operator policy.
- Step 1308 The SNPN AMF network element sends a registration acceptance message to the SNPN device, and correspondingly, the SNPN device receives the registration acceptance message from the SNPN AMF network element.
- the registration acceptance message indicates that the SNPN device is allowed to register in R17 SNPN.
- Figure 14 uses the second terminal as the SNPN device, the first non-public network is the R17 version of SNPN (hereinafter referred to as R17 SNPN), and the access management network element is the SNPN in R17 SNPN
- the AMF network element, the access network equipment is SNPN RAN, the first public network is the R17 version of the PLMN (hereinafter referred to as R17 PLMN), and the unified data management network element is the UDM network element.
- a specific embodiment of a network access method the method includes:
- Step 1401 The SNPN device uses the contract information 2 to send a registration request message to the SNPN AMF network element, and correspondingly, the SNPN AMF network element receives the registration request message from the SNPN device.
- the registration request message includes the identification 2 of the SNPN device.
- the SNPN AMF network element can also obtain the R17 SNPN identifier from the SNPN RAN.
- the identity 2 of the SNPN device includes the identity of the HPLMN corresponding to the SNPN device.
- the subscription information 2 is the public network subscription information between the SNPN device and the R16 version of the PLMN.
- Step 1402. If the R17 SNPN does not support the HPLMN intercommunication corresponding to the SNPN device, the SNPN AMF network element determines that the SNPN device cannot pass the security authentication.
- Step 1403 The SNPN AMF network element sends a registration rejection message 21 to the SNPN device.
- the SNPN device receives a registration rejection message 21 from the SNPN AMF network element.
- the registration rejection message 21 is used to indicate that the SNPN device is rejected to register in R17 SNPN.
- the registration rejection message 21 may also carry the reason indicating that the SNPN device is rejected to register in R17 SNPN: the SNPN device is an illegal terminal.
- Step 1404 If the R17 SNPN supports the HPLMN intercommunication corresponding to the SNPN device, the SNPN AMF network element sends a registration acceptance message to the SNPN device, and correspondingly, the SNPN device receives the registration acceptance message from the SNPN AMF network element.
- the registration acceptance message indicates that the SNPN device is allowed to register in R17 SNPN.
- the SNPN AMF network element may also send configuration information to the SNPN device, and the configuration information is used by the SNPN device to determine the Network candidate list of SNPN equipment.
- the network candidate list includes the R17 SNPN information.
- the contract information 2 in the embodiment described in FIG. 14 corresponds to the first contract information in the foregoing embodiment as the contract information of the second terminal in the first non-public network.
- the registration request message corresponds to the above-mentioned first message.
- the registration rejection message 21 corresponds to the second message in the embodiment described in FIG. 9 above.
- Figure 15 takes the first terminal as a non-SNPN device, and the first non-public network is an R16 version of SNPN (hereinafter referred to as R16SNPN, corresponding to the non-public network 100 in Figure 5a).
- the incoming management network element is the SNPN AMF network element in R16 SNPN (corresponding to AMF network element 1 in Figure 5a)
- the access network equipment is SNPN RAN
- the first public network is the R16 version of PLMN (hereinafter referred to as R16 PLMN,
- the unified data management network element is a UDM network element, and the method includes:
- Step 1501 The non-SNPN device sends a registration request message to the SNPN AMF network element.
- the SNPN AMF network element receives the registration request message from the non-SNPN device.
- the registration request message is used to request registration of non-SNPN devices in R16 SNPN.
- the registration request message carries the identification of the non-SNPN device.
- the identification of a non-SNPN device can be SUPI or SUCI.
- step 1501 can be implemented in the following manner: the non-SNPN device sends a registration request message to the SNPN AMF network element through the SNPN RAN in the R16 SNPN.
- the SNPN AMF network element can also receive the R16 SNPN identifier from the SNPN RAN, and the R16 SNPN identifier is used to identify the R16 SNPN.
- the SUPI or SUCI of the non-SNPN device contains the HPLMN ID of the non-SNPN device. The HPLMN ID is used to determine the home public network corresponding to the non-SNPN device.
- Step 1502 if the R16 SNPN and the R16 PLMN do not support roaming intercommunication, the SNPN AMF network element determines that the non-SNPN device cannot pass the security authentication.
- Step 1503 The SNPN AMF network element sends a registration rejection message 1 to the non-SNPN device, and correspondingly, the non-SNPN device receives the registration rejection message 1 from the SNPN AMF network element.
- the registration rejection message 1 indicates that the non-SNPN device is rejected to register in R16 SNPN.
- the registration rejection message 1 may also carry the reason for rejecting the registration of the non-SNPN device in R16 SNPN: the non-SNPN device is an illegal terminal.
- Figure 16 uses the second terminal as the SNPN device, the non-public network of the SNPN device is the R16 version of SNPN (hereinafter referred to as R16SNPN), and the access management network element is the SNPN AMF in R16 SNPN
- the network element, the access network equipment is SNPN RAN, the public network of SNPN equipment is the R16 version of PLMN (hereinafter referred to as R16 PLMN), and the unified data management network element is the UDM network element as an example.
- the method includes:
- the SNPN device uses the contract information 3 to send a registration request message to the SNPN AMF network element, and correspondingly, the SNPN AMF network element receives the registration request message from the SNPN device.
- the registration request message includes the identification 3 of the SNPN device.
- the SNPN device shown in FIG. 16 and FIG. 17 may be an R17 SNPN device.
- the so-called R17 SNPN device refers to the contract information between the SNPN device and the R17 version of the PLMN, that is, the aforementioned contract information 3.
- the identification 3 of the SNPN device in step 1601 includes the HPLMN ID corresponding to the SNPN device.
- Step 1602 if the R16 SNPN and the R16 PLMN do not support roaming and intercommunication, the SNPN AMF network element cannot resolve the SNPN device identity 3, and it is determined that the SNPN device cannot pass the security authentication.
- Step 1603 The SNPN AMF network element sends a registration rejection message 11 to the SNPN device, and correspondingly, the SNPN device receives a registration rejection message 11 from the SNPN AMF network element.
- the registration rejection message 11 is used to indicate that the SNPN device is rejected to register in R17 SNPN.
- the registration rejection message 11 may also carry the reason indicating that the SNPN device is rejected to register in R17 SNPN: the SNPN device is an illegal terminal.
- Step 1604 If the SNPN device still has subscription information 4, when an available SNPN is detected, the SNPN device can also use the subscription information 4 to initiate a registration request message to the SNPN AMF network element.
- the subscription information 4 is the subscription information between the SNPN device and the R16 SNPN. In another example, the subscription information 4 is the subscription information between the SNPN device and the R17 SNPN.
- the subscription information 4 includes the identity 4 of the SNPN device, and the identity 4 of the SNPN device is related to the identity of the SNPN.
- the identification 4 of the SNPN device includes the identification of the SNPN.
- the registration request message in step 1604 carries the identification 4 of the SNPN device.
- Step 1605 The SNPN device uses the N3IWF mode to access the R16 SNPN and R16 PLMN.
- step 1605 For the specific implementation of step 1605, reference may be made to the description in the prior art, which will not be repeated here.
- the SNPN device can use N3IWF mode to access R16 SNPN and R16 PLMN.
- the so-called SNPN device can use the N3IWF mode to access R16 SNPN and R16 PLMN means that the SNPN device can use private network subscription information to request registration in the R16 SNPN. After the SNPN device is successfully registered in the R16 SNPN, the SNPN device can use the public network contract information between the SNPN device and the R16 PLMN to request registration in the R16 PLMN.
- the subscription information 4 in the embodiment described in FIG. 16 may be the third subscription information of the above-mentioned second terminal in the first non-public network.
- the subscription information 3 may be that the first subscription information in the foregoing embodiment is the subscription information of the second terminal in the first public network.
- the registration request message may be the above-mentioned first message.
- the registration rejection message 11 corresponds to the second message in the embodiment described in FIG. 10 above.
- each network element such as the first terminal, the second terminal, the access management network element, the unified data management network element, the access network equipment, etc., in order to achieve the above functions, includes the corresponding structure and structure for performing each function. / Or software module.
- the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
- the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network device can be divided into functional units according to the above-mentioned method examples.
- each functional unit can be divided corresponding to each function. It is also possible to integrate two or more functions into one processing unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit. It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
- the method of the embodiment of the present application is described above in conjunction with FIG. 6 to FIG. 16, and the communication device provided in the embodiment of the present application for performing the foregoing method is described below. Those skilled in the art can understand that the methods and devices can be combined and quoted with each other.
- the communication device provided in the embodiments of the present application can perform the analysis methods described above by the first terminal, the second terminal, the access management network element, and the unified data management network element. , Steps performed by the access network equipment.
- FIG. 17 shows the communication device involved in the foregoing embodiment, and the communication device may include: a communication module 113 and a processing module 112.
- the communication device may further include a storage module 111 for storing program codes and data of the communication device.
- the communication device is the first terminal or a chip applied in the first terminal.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
- the communication module 113 is configured to perform the signal transceiving operation of the first terminal in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the first terminal in the foregoing method embodiment.
- the communication module 113 is configured to execute the sending action performed by the first terminal in step 601 of FIG. 6 in the foregoing embodiment.
- the communication module 113 is configured to execute the receiving action performed by the first terminal in step 604 of FIG. 6 in the foregoing embodiment.
- the processing module 112 is configured to support the communication device to perform the action performed by the first terminal in step 605 in FIG. 6.
- the communication device is an access management network element, or a chip applied to an access management network element.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, the first terminal or the unified data management network element).
- the communication module 113 is configured to perform the signal transceiving operation of the access management network element in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the access management network element in the foregoing method embodiment.
- the communication module 113 is configured to execute the receiving actions performed by the access management network element in step 601 and step 603 of FIG. 6 in the foregoing embodiment.
- the communication module 113 is configured to execute the sending actions performed by the access management network element in step 602 and step 604 of FIG. 6 in the foregoing embodiment.
- the communication device is a unified data management network element, or a chip applied to a unified data management network element.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
- the communication module 113 is configured to perform the signal transceiving operation of the unified data management network element in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the unified data management network element in the foregoing method embodiment.
- the communication module 113 is configured to perform the receiving action performed by the unified data management network element in step 602 of FIG. 6 in the foregoing embodiment.
- the communication module 113 is configured to execute the sending action performed by the unified data management network element in step 603 of FIG. 6 in the foregoing embodiment.
- the communication device is a second terminal or a chip applied to the second terminal.
- the communication module 113 is used to support the communication device to communicate with external network elements (for example, access network equipment).
- the communication module 113 is configured to perform the signal transceiving operation of the second terminal in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the second terminal in the foregoing method embodiment.
- the communication module 113 is configured to execute the receiving action performed by the second terminal in step 701 of FIG. 7 in the foregoing embodiment.
- the processing module 112 is configured to support the communication device to perform the action performed by the second terminal in step 702 in FIG. 7.
- the communication device is a second terminal or a chip applied to the second terminal.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
- the communication module 113 is configured to perform the signal transceiving operation of the second terminal in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the second terminal in the foregoing method embodiment.
- the communication module 113 is configured to execute the sending action performed by the second terminal in step 801 of FIG. 8 in the foregoing embodiment.
- the communication module 113 is configured to execute the receiving action performed by the second terminal in step 802 of FIG. 8 in the foregoing embodiment.
- the communication module 113 is configured to perform the receiving action performed by the second terminal in step 904 and step 905 in FIG. 9 of the foregoing embodiment.
- the processing module 112 is configured to support the communication device to execute the actions performed by the second terminal in step 906 and step 907 in FIG. 9.
- the processing module 112 is configured to support the communication device to perform the action performed by the second terminal in step 1004 in FIG. 10.
- the communication device is an access management network element, or a chip applied to an access management network element.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, a second terminal).
- the communication module 113 is configured to perform the signal transceiving operation of the access management network element in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the access management network element in the foregoing method embodiment.
- the communication module 113 is configured to execute the receiving action performed by the access management network element in step 801 of FIG. 8 in the foregoing embodiment.
- the communication module 113 is configured to execute the sending action performed by the access management network element in step 802 of FIG. 8 in the foregoing embodiment.
- the processing module 112 is configured to support the communication device to perform the action performed by the access management network element in step 902 in FIG. 9.
- the communication module 113 is configured to execute the sending action performed by the access management network element in step 904 or step 905 in FIG. 9 of the foregoing embodiment.
- processing module 112 is configured to support the communication device to perform the action performed by the access management network element in step 1002 in FIG. 10.
- the communication module 113 shown in FIG. 17 can also be replaced by a communication unit, and the processing module 112 can also be replaced with reference to the processing unit.
- the storage module 111 can also be replaced by a storage unit.
- the processing unit is used to control and manage the actions of the communication device. For example, the processing unit is used to perform information/data processing steps on the communication device.
- the communication unit is used to support the communication device to send or receive information/data.
- the communication unit may include a receiving unit and a sending unit, the receiving unit is used for receiving signals, and the sending unit is used for sending signals.
- the processing module 112 may be a processor or a controller, for example, a central processing unit, a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic devices, transistor logic devices, Hardware components or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of this application.
- the processor may also be a combination of computing functions, for example, a combination of one or more microprocessors, a combination of a digital signal processor and a microprocessor, and so on.
- the communication module can be a transceiver, a transceiver circuit, or a communication interface.
- the storage module may be a memory.
- the processing module 112 is the processor 1801 or the processor 1805
- the communication module 113 is the communication interface 1803
- the storage module 111 is the memory 1802
- the communication device involved in this application may be the communication device shown in FIG. 18.
- FIG. 18 is a schematic diagram of the hardware structure of a communication device provided by an embodiment of the application.
- the communication device includes a processor 1801, a communication line 1804, and at least one communication interface (in FIG. 18, the communication interface 1803 is taken as an example for illustration).
- the processor 1801 can be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of this application. integrated circuit.
- CPU central processing unit
- ASIC application-specific integrated circuit
- the communication line 1804 may include a path to transmit information between the above-mentioned components.
- the communication interface 1803 is used to exchange information with other devices.
- any device such as a transceiver is used to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), and wireless Local area network (wireless local area networks, WLAN), etc.
- RAN radio access network
- WLAN wireless Local area network
- the communication device may further include a memory 1802.
- the memory 1802 can be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
- the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
- the memory can exist independently and is connected to the processor through a communication line 1804. The memory can also be integrated with the processor.
- the memory 1802 is used to store computer-executable instructions for executing the solution of the present application, and the processor 1801 controls the execution.
- the processor 1801 is configured to execute computer-executable instructions stored in the memory 1802, so as to implement a network access method provided in the following embodiments of the present application.
- the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
- the processor 1801 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 18.
- the communication device may include multiple processors, such as the processor 1801 and the processor 1805 in FIG. 18.
- processors can be a single-CPU (single-CPU) processor or a multi-core (multi-CPU) processor.
- the processor here may refer to one or more devices, circuits, and/or processing cores for processing data (for example, computer program instructions).
- the communication device is a first terminal or a chip applied in the first terminal.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
- the communication module 113 is configured to perform the signal transceiving operation of the first terminal in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the first terminal in the foregoing method embodiment.
- the communication module 113 is configured to execute the sending action performed by the first terminal in step 601 of FIG. 6 in the foregoing embodiment.
- the communication module 113 is configured to execute the receiving action performed by the first terminal in step 604 of FIG. 6 in the foregoing embodiment.
- the processing module 112 is configured to support the communication device to perform the action performed by the first terminal in step 605 in FIG. 6.
- the communication device is an access management network element, or a chip applied to an access management network element.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, the first terminal or the unified data management network element).
- the communication module 113 is configured to perform the signal transceiving operation of the access management network element in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the access management network element in the foregoing method embodiment.
- the communication module 113 is configured to execute the receiving actions performed by the access management network element in step 601 and step 603 of FIG. 6 in the foregoing embodiment.
- the communication module 113 is configured to execute the sending actions performed by the access management network element in step 602 and step 604 of FIG. 6 in the foregoing embodiment.
- the communication device is a unified data management network element, or a chip applied to a unified data management network element.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
- the communication module 113 is configured to perform the signal transceiving operation of the unified data management network element in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the unified data management network element in the foregoing method embodiment.
- the communication module 113 is configured to perform the receiving action performed by the unified data management network element in step 602 of FIG. 6 in the foregoing embodiment.
- the communication module 113 is configured to execute the sending action performed by the unified data management network element in step 603 of FIG. 6 in the foregoing embodiment.
- the communication device is a second terminal or a chip applied to the second terminal.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access network device).
- the communication module 113 is configured to perform the signal transceiving operation of the second terminal in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the second terminal in the foregoing method embodiment.
- the communication module 113 is configured to execute the receiving action performed by the second terminal in step 701 of FIG. 7 in the foregoing embodiment.
- the processing module 112 is configured to support the communication device to perform the action performed by the second terminal in step 702 in FIG. 7.
- the communication device is a second terminal or a chip applied to the second terminal.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, an access management network element).
- the communication module 113 is configured to perform the signal transceiving operation of the second terminal in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the second terminal in the foregoing method embodiment.
- the communication module 113 is configured to execute the sending action performed by the second terminal in step 801 of FIG. 8 in the foregoing embodiment.
- the communication module 113 is configured to execute the receiving action performed by the second terminal in step 802 of FIG. 8 in the foregoing embodiment.
- the communication module 113 is configured to perform the receiving action performed by the second terminal in step 904 and step 905 in FIG. 9 of the foregoing embodiment.
- the processing module 112 is configured to support the communication device to perform step 906 and the actions performed by the second terminal in step 907 in FIG. 9.
- the processing module 112 is configured to support the communication device to perform the action performed by the second terminal in step 1004 in FIG. 10.
- the communication device is an access management network element, or a chip applied to the access management network element.
- the communication module 113 is used to support the communication device to communicate with an external network element (for example, the second terminal).
- the communication module 113 is configured to perform the signal transceiving operation of the access management network element in the foregoing method embodiment.
- the processing module 112 is configured to perform the signal processing operation of the access management network element in the foregoing method embodiment.
- the communication module 113 is configured to execute the receiving action performed by the access management network element in step 801 of FIG. 8 in the foregoing embodiment.
- the communication module 113 is configured to execute the sending action performed by the access management network element in step 802 of FIG. 8 in the foregoing embodiment.
- the processing module 112 is configured to support the communication device to perform the action performed by the access management network element in step 902 in FIG. 9.
- the communication module 113 is configured to execute the sending action performed by the access management network element in step 904 or step 905 in FIG. 9 of the foregoing embodiment.
- processing module 112 is configured to support the communication device to perform the action performed by the access management network element in step 1002 in FIG. 10.
- FIG. 19 is a schematic structural diagram of a chip 190 provided by an embodiment of the present application.
- the chip 190 includes one or more (including two) processors 1910 and a communication interface 1930.
- the chip 190 further includes a memory 1940.
- the memory 1940 may include a read-only memory and a random access memory, and provides operation instructions and data to the processor 1910.
- a part of the memory 1940 may also include a non-volatile random access memory (NVRAM).
- NVRAM non-volatile random access memory
- the memory 1940 stores the following elements, execution modules or data structures, or their subsets, or their extended sets.
- the corresponding operation is executed by calling the operation instruction stored in the memory 1940 (the operation instruction may be stored in the operating system).
- One possible implementation is that the chips used in the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network equipment are similar in structure, and different devices can use different chips to achieve The respective functions.
- the processor 1910 controls the processing operations of any one of the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network device.
- the processor 1910 may also be referred to as a central processing unit (central processing unit, CPU).
- the memory 1940 may include a read-only memory and a random access memory, and provides instructions and data to the processor 1910. A part of the memory 1940 may also include NVRAM.
- the memory 1940, the communication interface 1930, and the memory 1940 are coupled together through a bus system 1920, where the bus system 1920 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
- bus system 1920 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
- various buses are marked as the bus system 1920 in FIG. 19.
- the method disclosed in the foregoing embodiments of the present application may be applied to the processor 1910 or implemented by the processor 1910.
- the processor 1910 may be an integrated circuit chip with signal processing capabilities. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 1910 or instructions in the form of software.
- the aforementioned processor 1910 may be a general-purpose processor, a digital signal processing (digital signal processing, DSP), an ASIC, an off-the-shelf programmable gate array (field-programmable gate array, FPGA) or other programmable logic devices, discrete gates, or transistors. Logic devices, discrete hardware components.
- DSP digital signal processing
- ASIC application-the-shelf programmable gate array
- FPGA field-programmable gate array
- Logic devices discrete hardware components.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory 1940, and the processor 1910 reads the information in the memory 1940, and completes the steps of the foregoing method in combination with its hardware.
- the communication interface 1930 is used to execute the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network device in the embodiment shown in FIG. 6 to FIG.
- the processor 1910 is configured to execute the processing steps of the first terminal, the second terminal, the access management network element, the unified data management network element, and the access network device in the embodiments shown in FIGS. 6-16.
- the above communication module may be a communication interface of the device, which is used to receive signals from other devices.
- the communication module is a communication interface for the chip to receive signals or send signals from other chips or devices.
- a computer-readable storage medium stores instructions. When the instructions are executed, the functions executed by the first terminal as shown in FIG. 6 are realized.
- a computer-readable storage medium stores instructions. When the instructions are executed, the functions performed by the access management network element as shown in FIG. 6 are realized.
- a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium.
- the instructions are executed, the functions performed by the unified data management network element as shown in FIG. 6 are realized.
- a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium. When the instructions are executed, the functions performed by the second terminal as shown in FIG. 7 are realized.
- a computer-readable storage medium stores instructions. When the instructions are executed, the functions performed by the access network device as shown in FIG. 7 are realized.
- a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium.
- the computer-readable storage medium can realize the functions of the second terminal as shown in FIGS. 8-10.
- a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium.
- the computer-readable storage medium can realize the functions of accessing management network elements as shown in Figs. 8-10. .
- a computer program product including instructions is provided.
- the computer program product includes instructions. When the instructions are executed, the functions executed by the first terminal as shown in FIG. 6 are realized.
- a computer program product including instructions.
- the computer program product includes instructions. When the instructions are executed, the functions performed by the access management network element as shown in FIG. 6 are realized.
- a computer program product including instructions.
- the computer program product includes instructions. When the instructions are executed, the functions performed by the unified data management network element as shown in FIG. 6 are realized.
- the computer program product includes instructions. When the instructions are executed, the functions performed by the second terminal as shown in FIG. 7 are realized.
- the computer program product includes instructions. When the instructions are executed, the functions performed by the access network device as shown in FIG. 7 are realized.
- the computer program product includes instructions. When the instructions are executed, the functions of the second terminal as shown in Figs. 8-10 are realized.
- the computer program product includes instructions.
- the instructions When the instructions are executed, the functions of accessing management network elements as shown in Figs. 8-10 are realized.
- a chip is provided.
- the chip is applied to a first terminal.
- the chip includes at least one processor and a communication interface.
- the communication interface is coupled to the at least one processor. A function performed by a terminal.
- an embodiment of the present application provides a chip, which is applied to an access management network element, the chip includes at least one processor and a communication interface, the communication interface is coupled with at least one processor, and the processor is used to run instructions, In order to realize the functions performed by the access management network element as shown in FIG. 6.
- an embodiment of the present application provides a chip that is applied to a unified data management network element.
- the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to Realize the functions of unified data management network elements as in 6.
- an embodiment of the present application provides a chip that is used in a second terminal.
- the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to implement such as The function of the second terminal in 7.
- an embodiment of the present application provides a chip that is applied to an access network device.
- the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to implement The function of the access network equipment as shown in Figure 7.
- an embodiment of the present application provides a chip that is used in a second terminal.
- the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to implement such as The functions of the second terminal in Figures 8-10.
- an embodiment of the present application provides a chip that is applied to an access management network element.
- the chip includes at least one processor and a communication interface, the communication interface is coupled to at least one processor, and the processor is used to run instructions to Realize the functions of accessing management network elements as shown in Figure 8-10.
- An embodiment of the present application provides a communication system, which includes: an access management network element and a unified data management network element.
- the access management network element is used to perform the functions performed by the access management network element in FIG. 6, and the unified data management network element is used to perform the functions performed by the unified data management network element in FIG. 6.
- the communication system may further include a terminal, and the terminal is configured to perform the function performed by the first terminal in FIG. 6.
- An embodiment of the present application provides a communication system.
- the communication system includes: an access network device and a terminal.
- the terminal is used to perform the function performed by the second terminal in FIG. 7, and the access network device is used to perform the function performed by the access network device in FIG. 7.
- An embodiment of the present application provides a communication system, which includes: an access management network element and a terminal.
- the access management network element is used to perform any function performed by the access management network element in FIGS. 8-10
- the terminal is used to perform any function performed by the second terminal in any one of FIGS. 8-10.
- the computer program product includes one or more computer programs or instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
- the computer program or instruction may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer program or instruction may be downloaded from a website, computer, The server or data center transmits to another website site, computer, server or data center through wired or wireless means.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center that integrates one or more available media.
- the usable medium may be a magnetic medium, such as a floppy disk, a hard disk, and a magnetic tape; it may also be an optical medium, such as a digital video disc (digital video disc, DVD); and it may also be a semiconductor medium, such as a solid state drive (solid state drive). , SSD).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (33)
- 一种网络的接入方法,其特征在于,包括:第一终端向第一非公共网络中的接入管理网元发送第一消息,所述第一消息用于请求在所述第一非公共网络中注册所述第一终端;所述第一终端接收来自所述接入管理网元的第二消息,所述第二消息用于表示拒绝所述第一终端在所述第一非公共网络进行注册,所述第二消息包括第一指示信息,所述第一指示信息表示禁止所述第一终端在所述第一非公共网络中接入;所述第一终端根据所述第一指示信息更新所述第一终端的网络禁选列表,其中,更新后的网络禁选列表中包括所述第一非公共网络的信息。
- 根据权利要求1所述的方法,其特征在于,所述第一非公共网络支持与第一公共网络互通。
- 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:所述第一终端根据所述更新后的网络禁选列表选择除所述第一非公共网络以外的网络进行注册。
- 根据权利要求1~3任一项所述的方法,其特征在于,所述方法还包括:所述第一终端根据第一指示信息启动定时器,在所述定时器超时的情况下,所述第一终端从所述更新后的网络禁选列表中删除所述第一非公共网络的信息。
- 根据权利要求1~4任一项所述的方法,其特征在于,所述方法还包括:所述第二消息包括定时器时间值,所述第一终端根据所述定时器时间值设置定时器。
- 一种网络的接入方法,其特征在于,包括:第一非公共网络中的接入管理网元接收来自第一终端的第一消息,所述第一消息用于请求在所述第一非公共网络中注册所述第一终端;所述接入管理网元从第一公共网络中的统一数据管理网元处获取第三消息;所述接入管理网元根据所述第三消息向所述第一终端发送第二消息,所述第二消息用于表示拒绝所述第一终端在所述第一非公共网络进行注册,所述第二消息包括第一指示信息,所述第一指示信息表示禁止所述第一终端在所述第一非公共网络中接入。
- 根据权利要求6所述的方法,其特征在于,所述第三消息中包括所述第一终端的签约数据,所述签约数据中包括第二指示信息,所述第二指示信息用于指示所述第一终端只能通过公共网络接入,或者,所述第二指示信息用于指示所述第一终端不能通过非公共网络接入。
- 根据权利要求7所述的方法,其特征在于,所述第二指示信息包括所述第一终端支持的网络列表,其中,所述网络列表中不包括所述第一非公共网络的信息。
- 根据权利要求6所述的方法,其特征在于,所述第三消息中包括第三指示信息,所述第三指示信息用于指示未成功获取所述第一终端的签约数据。
- 根据权利要求9所述的方法,其特征在于,所述第三消息中还包括未成功获取所述第一终端的签约数据的原因值,所述原因值表示不允许所述第一终端在所述第一非公共网络中接入。
- 根据权利要求6~10任一项所述的方法,其特征在于,所述方法还包括:所述接入管理网元根据所述第三消息,确定拒绝所述第一终端在所述第一非公共网络中的注册。
- 一种网络的接入方法,其特征在于,包括:第一公共网络中的统一数据管理网元接收来自第一非公共网络中的接入管理网元的查询消息, 所述查询消息用于查询第一终端的签约数据;所述统一数据管理网元向所述接入管理网元发送第三消息,所述第三消息包括以下一项或多项:所述第一终端的签约数据、原因值,所述签约数据中包括第二指示信息,所述第二指示信息用于指示所述第一终端只能通过公共网络接入,或者,所述第二指示信息用于指示所述第一终端不能通过非公共网络接入,所述原因值表示不允许所述第一终端在所述第一非公共网络中接入。
- 根据权利要求12所述的方法,其特征在于,所述第二指示信息包括所述第一终端支持的网络列表,其中,所述网络列表中不包括所述第一非公共网络的信息。
- 根据权利要求12所述的方法,其特征在于,所述第三消息中包括第三指示信息,所述第三指示信息用于指示未成功获取所述第一终端的签约数据。
- 一种通信装置,其特征在于,所述通信装置为第一终端,或者为应用于所述第一终端中的芯片,所述装置包括:通信单元,用于向第一非公共网络中的接入管理网元发送第一消息,所述第一消息用于请求在所述第一非公共网络中注册所述第一终端;所述通信单元,还用于接收来自所述接入管理网元的第二消息,所述第二消息用于表示拒绝所述第一终端在所述第一非公共网络进行注册,所述第二消息包括第一指示信息,所述第一指示信息表示禁止所述第一终端在所述第一非公共网络中接入;处理单元,用于根据所述第一指示信息更新所述第一终端的网络禁选列表,其中,更新后的网络禁选列表中包括所述第一非公共网络的信息。
- 根据权利要求15所述的装置,其特征在于,所述第一非公共网络支持与第一公共网络互通。
- 根据权利要求15或16所述的装置,其特征在于,所述处理单元,还用于根据所述更新后的网络禁选列表选择除所述第一非公共网络以外的网络进行注册。
- 根据权利要求15~17任一项所述的装置,其特征在于,所述处理单元,还用于根据第一指示信息启动定时器,在所述定时器超时的情况下,从所述更新后的网络禁选列表中删除所述第一非公共网络的信息。
- 根据权利要求15~18任一项所述的装置,其特征在于,所述第二消息包括定时器时间值,所述处理单元,还用于根据所述定时器时间值设置定时器。
- 一种通信装置,其特征在于,所述通信装置为接入管理网元,或者所述通信装置为应用于所述接入管理网元中的芯片,所述装置包括:通信单元,用于接收来自第一终端的第一消息,所述第一消息用于请求在所述第一非公共网络中注册所述第一终端;所述通信单元,还用于从第一公共网络中的统一数据管理网元处获取第三消息;所述通信单元,还用于根据所述第三消息向所述第一终端发送第二消息,所述第二消息用于表示拒绝所述第一终端在所述第一非公共网络进行注册,所述第二消息包括第一指示信息,所述第一指示信息表示禁止所述第一终端在所述第一非公共网络中接入。
- 根据权利要求20所述的装置,其特征在于,所述第三消息中包括所述第一终端的签约数据,所述签约数据中包括第二指示信息,所述第二指示信息用于指示所述第一终端只能通过公共网络接入,或者,所述第二指示信息用于指示所述第一终端不能通过所述第一非公共网络接入。
- 根据权利要求21所述的装置,其特征在于,所述第二指示信息包括所述第一终端支持的 网络列表,其中,所述网络列表中不包括所述第一非公共网络的信息。
- 根据权利要求20所述的装置,其特征在于,所述第三消息中包括第三指示信息,所述第三指示信息用于指示未成功获取所述第一终端的签约数据。
- 根据权利要求23所述的装置,其特征在于,所述第三消息中还包括未成功获取所述第一终端的签约数据的原因值,所述原因值表示不允许所述第一终端在所述第一非公共网络中接入。
- 根据权利要求20~24任一项所述的装置,其特征在于,所述装置还包括:处理单元,用于根据所述第三消息,确定拒绝所述第一终端在所述第一非公共网络中的注册。
- 一种通信装置,其特征在于,所述通信装置为统一数据管理网元,或者,所述通信装置为应用于所述统一数据管理网元中的芯片,所述通信装置包括:通信单元,用于接收来自第一非公共网络中的接入管理网元的查询消息,所述查询消息用于查询第一终端的签约数据;所述通信单元,还用于向所述接入管理网元发送第三消息,所述第三消息包括以下一项或多项:所述第一终端的签约数据、原因值,所述签约数据中包括第二指示信息,所述第二指示信息用于指示所述第一终端只能通过公共网络接入,或者,所述第二指示信息用于指示所述第一终端不能通过非公共网络接入,所述原因值表示不允许所述第一终端在所述第一非公共网络中接入。
- 根据权利要求26所述的装置,其特征在于,所述第二指示信息包括所述第一终端支持的网络列表,其中,所述网络列表中不包括所述第一非公共网络的信息。
- 根据权利要求26或27所述的装置,其特征在于,所述第三消息中包括第三指示信息,所述第三指示信息用于指示未成功获取所述第一终端的签约数据。
- 一种通信系统,其特征在于,所述系统包括:第一非公共网络中的接入管理网元以及第一公共网络中的统一数据管理网元;其中,所述接入管理网元,用于执行如权利要求6~11中任一项所述的方法;所述统一数据管理网元,用于执行权利要求12~14中任一项所述的方法。
- 根据权利要求29所述的系统,其特征在于,所述系统还包括:第一终端,所述第一终端用于执行权利要求1~5任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,所述可读存储介质中存储有指令,当所述指令被执行时,实现如权利要求1~5任一项所述的方法,或以实现如权利要求6~11中任一项所述的方法,或以实现如权利要求12~14中任一项所述的方法。
- 一种芯片,其特征在于,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行计算机程序或指令,以实现如权利要求1~5任一项所述的方法,或以实现如权利要求6~11中任一项所述的方法,或以实现如权利要求12~14中任一项所述的方法,所述通信接口用于与所述芯片之外的其它模块进行通信。
- 一种通信装置,其特征在于,包括:至少一个处理器,所述至少一个处理器与存储器耦合,所述至少一个处理器用于运行存储器中存储的指令以执行如权利要求1~5任一项所述的方法,或如权利要求6~11中任一项所述的方法,或如权利要求12~14中任一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020227044296A KR20230012590A (ko) | 2020-05-22 | 2021-03-18 | 네트워크 액세스 방법, 장치, 및 시스템 |
EP21808276.6A EP4149166A4 (en) | 2020-05-22 | 2021-03-18 | METHOD, APPARATUS AND SYSTEM FOR ACCESSING A NETWORK |
JP2022571140A JP2023525925A (ja) | 2020-05-22 | 2021-03-18 | ネットワークアクセス方法、装置、およびシステム |
US17/992,494 US20230080067A1 (en) | 2020-05-22 | 2022-11-22 | Network Access Method, Apparatus, and System |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010446009.0 | 2020-05-22 | ||
CN202010446009.0A CN113766500A (zh) | 2020-05-22 | 2020-05-22 | 一种网络的接入方法、装置及系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/992,494 Continuation US20230080067A1 (en) | 2020-05-22 | 2022-11-22 | Network Access Method, Apparatus, and System |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021232919A1 true WO2021232919A1 (zh) | 2021-11-25 |
Family
ID=78709152
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/081549 WO2021232919A1 (zh) | 2020-05-22 | 2021-03-18 | 一种网络的接入方法、装置及系统 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20230080067A1 (zh) |
EP (1) | EP4149166A4 (zh) |
JP (1) | JP2023525925A (zh) |
KR (1) | KR20230012590A (zh) |
CN (1) | CN113766500A (zh) |
WO (1) | WO2021232919A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114339837A (zh) * | 2021-12-31 | 2022-04-12 | 中国联合网络通信集团有限公司 | 专网接入控制方法、装置、电子设备及存储介质 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220360985A1 (en) * | 2021-05-07 | 2022-11-10 | Mediatek Inc. | Ue rejection handling when onboarding a network based on default ue credentials |
US11979937B2 (en) * | 2021-09-20 | 2024-05-07 | Nokia Technologies Oy | Method, apparatus and computer program |
CN116456353A (zh) * | 2022-01-06 | 2023-07-18 | 维沃移动通信有限公司 | 托管网络接入处理方法、装置、终端及网络侧设备 |
CN116801351A (zh) * | 2022-03-17 | 2023-09-22 | 华为技术有限公司 | 一种接入控制方法及装置 |
CN116806046A (zh) * | 2022-03-18 | 2023-09-26 | 华为技术有限公司 | 一种通信方法及装置 |
CN118612712A (zh) * | 2023-03-06 | 2024-09-06 | 华为技术有限公司 | 通信方法及通信装置 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1671240A (zh) * | 2004-03-19 | 2005-09-21 | 华为技术有限公司 | 一种实现移动网络接入限制的方法 |
CN101646248A (zh) * | 2008-08-07 | 2010-02-10 | 华为技术有限公司 | 封闭用户组信息处理方法、接入控制方法及系统和设备 |
CN101860534A (zh) * | 2010-05-20 | 2010-10-13 | 北京星网锐捷网络技术有限公司 | 网络切换方法、系统及接入设备、认证服务器 |
CN101932048A (zh) * | 2009-06-26 | 2010-12-29 | 联芯科技有限公司 | 多模终端模式间小区重选的方法和装置 |
CN102271382A (zh) * | 2010-06-07 | 2011-12-07 | 电信科学技术研究院 | 一种mtc设备的接入控制方法和设备 |
CN103166939A (zh) * | 2011-12-19 | 2013-06-19 | 上海市闸北区信息化服务中心 | 一种虚拟专用网络结构及其认证授权方法 |
KR20140146819A (ko) * | 2013-06-18 | 2014-12-29 | 엘지전자 주식회사 | 무선 통신 시스템에서 다중 무선 접속을 수행하는 장치 및 방법 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019221563A1 (ko) * | 2018-05-18 | 2019-11-21 | 삼성전자 주식회사 | 사업자의 제한적인 서비스에 대한 망접속 제어 방법 및 장치 |
KR20200019067A (ko) * | 2018-08-13 | 2020-02-21 | 삼성전자주식회사 | 단말이 사설 셀룰러 네트워크를 발견하고 선택하기 위한 방법 및 장치 |
KR102528728B1 (ko) * | 2018-08-13 | 2023-05-08 | 삼성전자주식회사 | 무선 통신 시스템에서 네트워크에 등록하기 위한 장치 및 방법 |
CN110971641B (zh) * | 2018-09-30 | 2022-04-19 | 维沃移动通信有限公司 | 一种网络服务控制方法及通信设备 |
CN111182543B (zh) * | 2018-11-12 | 2021-10-19 | 华为技术有限公司 | 切换网络的方法和装置 |
CN115484659B (zh) * | 2019-05-06 | 2024-03-22 | 腾讯科技(深圳)有限公司 | 网络接入控制方法、装置、计算机可读介质及电子设备 |
JP7380005B2 (ja) * | 2019-09-26 | 2023-11-15 | 日本電気株式会社 | 無線端末、コアネットワークノード、及びこれらの方法 |
CN113630843B (zh) * | 2020-05-09 | 2023-04-18 | 华为技术有限公司 | 一种通信方法和通信装置 |
-
2020
- 2020-05-22 CN CN202010446009.0A patent/CN113766500A/zh active Pending
-
2021
- 2021-03-18 JP JP2022571140A patent/JP2023525925A/ja active Pending
- 2021-03-18 KR KR1020227044296A patent/KR20230012590A/ko unknown
- 2021-03-18 WO PCT/CN2021/081549 patent/WO2021232919A1/zh active Application Filing
- 2021-03-18 EP EP21808276.6A patent/EP4149166A4/en active Pending
-
2022
- 2022-11-22 US US17/992,494 patent/US20230080067A1/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1671240A (zh) * | 2004-03-19 | 2005-09-21 | 华为技术有限公司 | 一种实现移动网络接入限制的方法 |
CN101646248A (zh) * | 2008-08-07 | 2010-02-10 | 华为技术有限公司 | 封闭用户组信息处理方法、接入控制方法及系统和设备 |
CN101932048A (zh) * | 2009-06-26 | 2010-12-29 | 联芯科技有限公司 | 多模终端模式间小区重选的方法和装置 |
CN101860534A (zh) * | 2010-05-20 | 2010-10-13 | 北京星网锐捷网络技术有限公司 | 网络切换方法、系统及接入设备、认证服务器 |
CN102271382A (zh) * | 2010-06-07 | 2011-12-07 | 电信科学技术研究院 | 一种mtc设备的接入控制方法和设备 |
CN103166939A (zh) * | 2011-12-19 | 2013-06-19 | 上海市闸北区信息化服务中心 | 一种虚拟专用网络结构及其认证授权方法 |
KR20140146819A (ko) * | 2013-06-18 | 2014-12-29 | 엘지전자 주식회사 | 무선 통신 시스템에서 다중 무선 접속을 수행하는 장치 및 방법 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114339837A (zh) * | 2021-12-31 | 2022-04-12 | 中国联合网络通信集团有限公司 | 专网接入控制方法、装置、电子设备及存储介质 |
CN114339837B (zh) * | 2021-12-31 | 2023-12-22 | 中国联合网络通信集团有限公司 | 专网接入控制方法、装置、电子设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
EP4149166A4 (en) | 2023-10-11 |
KR20230012590A (ko) | 2023-01-26 |
CN113766500A (zh) | 2021-12-07 |
EP4149166A1 (en) | 2023-03-15 |
US20230080067A1 (en) | 2023-03-16 |
JP2023525925A (ja) | 2023-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021232919A1 (zh) | 一种网络的接入方法、装置及系统 | |
KR102452427B1 (ko) | Plmn 내의 사설 슬라이스들에 대한 액세스 제어용 시스템들, 방법들, 및 디바이스들 | |
US11963133B2 (en) | Core paging handling | |
CN112584486A (zh) | 一种通信方法及装置 | |
US20240284377A1 (en) | Method of user equipment (ue), user equipment (ue), method of communication apparatus and communication apparatus | |
CN111328019B (zh) | 识别终端的方法、装置 | |
CN115314973A (zh) | 一种无线通信方法及通信装置 | |
WO2021134175A1 (zh) | 一种漫游的方法、装置及系统 | |
US20240323828A1 (en) | Method of af apparatus, method of nef apparatus, method of udm apparatus, method of amf apparatus, method of ue, method of pcf apparatus, method of ran node, af apparatus, nef apparatus, udm apparatus, amf apparatus, ue, pcf apparatus and ran node | |
KR20220152950A (ko) | 네트워크 슬라이스 승인 제어(nsac) 발견 및 로밍 향상들 | |
WO2024024704A1 (en) | Method of user equipment (ue), method of communication apparatus, method of radio access network (ran) node, ue, communication apparatus and radio access network (ran) node | |
WO2024024696A1 (en) | Method of user equipment (ue), method of communication apparatus, ue and communication apparatus | |
US12101712B2 (en) | Network access management | |
WO2024070837A1 (en) | Method of user equipment (ue), method of communication apparatus, ue and communication apparatus | |
WO2024070935A1 (en) | Method of first communication apparatus and first communication apparatus | |
EP4436254A1 (en) | Network access method and communication apparatus | |
WO2023238806A1 (en) | Method of first communication apparatus, method of communication apparatus, first communication apparatus and communication apparatus | |
WO2024026020A1 (en) | Multicast broadcast service control | |
JP2024538747A (ja) | Ueの方法、地理的に選択されたamf装置の方法、ue、及び地理的に選択されたamf装置 | |
WO2023215351A1 (en) | Enabling localized services in hosting network | |
WO2024166061A1 (en) | Access function (af) providing user equipment (ue) route selection policy (ursp) rules for roamers | |
CN118678436A (zh) | 一种注册终端设备的方法及装置 | |
KR20230130700A (ko) | 정보 처리 방법, 장치, 통신기기 및 판독가능 저장매체 | |
CN116981019A (zh) | 处理用户设备的服务请求的方法 | |
CN116567587A (zh) | 通信方法及通信装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21808276 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022571140 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202237068960 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 20227044296 Country of ref document: KR Kind code of ref document: A Ref document number: 2021808276 Country of ref document: EP Effective date: 20221206 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |