WO2022006828A1 - Procédé et dispositif de communication sans fil - Google Patents

Procédé et dispositif de communication sans fil Download PDF

Info

Publication number
WO2022006828A1
WO2022006828A1 PCT/CN2020/101166 CN2020101166W WO2022006828A1 WO 2022006828 A1 WO2022006828 A1 WO 2022006828A1 CN 2020101166 W CN2020101166 W CN 2020101166W WO 2022006828 A1 WO2022006828 A1 WO 2022006828A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
uac
access
terminal device
target
Prior art date
Application number
PCT/CN2020/101166
Other languages
English (en)
Chinese (zh)
Inventor
付喆
卢前溪
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2020/101166 priority Critical patent/WO2022006828A1/fr
Priority to CN202080100404.1A priority patent/CN115486130A/zh
Publication of WO2022006828A1 publication Critical patent/WO2022006828A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • the embodiments of the present application relate to the field of communication, and more particularly, to wireless communication methods and devices.
  • AMF Access Management Function
  • the main purpose of unified access control is to control network overload or make special restrictions on network applications.
  • Access control is divided into cell-level access control and UE-level access control.
  • the access stratum (Access Stratrum, AS) of the terminal device obtains UAC information according to the access identifier and the access category provided by the non-access stratum (Non-Access Stratrum, NAS) or AS, and then executes the execution based on the UAC information.
  • the access control process of the access network slice is used to define different services on each access category or a network slice selection policy (Network Slice Selection Policy, NSSP) adopted by the user.
  • Network Slice Selection Policy Network Slice Selection Policy
  • different network slices may correspond to one NSSP, and the access control requirements of different network slices may also be different. Therefore, the UAC information determined based on the access identifier cannot meet the access control requirements of the network slice, and accordingly, the accuracy of the access control of the network slice is too low.
  • a wireless communication method and device which can improve the accuracy of access control of network slices.
  • a wireless communication method including:
  • the terminal device obtains the target unified access control UAC information corresponding to the target network slice;
  • the terminal device determines UAC information for the terminal device and/or determines whether to access the network based on the target UAC information.
  • a wireless communication method including:
  • the network device sends target unified access control UAC information corresponding to the target network slice to the terminal device, where the target UAC information is used by the terminal device to determine UAC information for the terminal device and/or determine whether to access the network.
  • a terminal device for executing the method in the above-mentioned first aspect or each implementation manner thereof.
  • the terminal device includes a functional module for executing the method in the first aspect or each implementation manner thereof.
  • a network device for executing the method in the second aspect or each of its implementations.
  • the network device includes a functional module for executing the method in the second aspect or each implementation manner thereof.
  • a terminal device including a processor and a memory.
  • the memory is used for storing a computer program
  • the processor is used for calling and running the computer program stored in the memory, so as to execute the method in the above-mentioned first aspect or each implementation manner thereof.
  • a network device including a processor and a memory.
  • the memory is used for storing a computer program
  • the processor is used for calling and running the computer program stored in the memory, so as to execute the method in the above-mentioned second aspect or each implementation manner thereof.
  • a chip for implementing any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
  • the chip includes: a processor for calling and running a computer program from a memory, so that a device installed with the chip executes any one of the above-mentioned first to second aspects or each of its implementations method in .
  • a computer-readable storage medium for storing a computer program, and the computer program causes a computer to execute the method in any one of the above-mentioned first aspect to the second aspect or each implementation manner thereof.
  • a computer program product comprising computer program instructions, the computer program instructions causing a computer to execute the method in any one of the above-mentioned first to second aspects or the implementations thereof.
  • a computer program which, when run on a computer, causes the computer to perform the method in any one of the above-mentioned first to second aspects or the respective implementations thereof.
  • FIG. 1 and FIG. 2 are examples of the system framework provided by the embodiments of the present application.
  • FIG. 3 is a schematic flowchart of a wireless communication method provided by an embodiment of the present application.
  • FIG. 4 is another schematic flowchart of a wireless communication method provided by an embodiment of the present application.
  • FIG. 5 is a schematic block diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of a network device provided by an embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a chip provided by an embodiment of the present application.
  • FIG. 1 is a schematic block diagram of a wireless communication system architecture 100 provided in accordance with the present application.
  • the system architecture 100 includes a terminal device 110 , an access network device 120 , a core network device 130 and a data network (DN) 160 .
  • the core network device 130 includes a management device 140 and a gateway device 150 .
  • the terminal device 110 may be configured to connect to the access network device 120 deployed by the operator through a wireless air interface, and then connect to the data network 160 through the core network device 130 .
  • the terminal device 110 may also be referred to as user equipment (user equipment, UE).
  • the terminal device 110 includes, but is not limited to, a mobile phone, a computer, and can also be a cellular phone, a cordless phone, a session initiation protocol (session initiation protocol, SIP) phone, a smart phone, a wireless local loop (WLL) ) station, personal digital assistant (PDA), computer, laptop computer, handheld communication device, handheld computing device, satellite wireless device, wireless modem card, television set top box (STB), user Premises equipment (customer premise equipment, CPE) and/or other equipment used to communicate over the wireless system.
  • a mobile phone a computer
  • PDA personal digital assistant
  • STB television set top box
  • CPE user Premises equipment
  • the access network device 120 may also be referred to as an access network (access network, AN)/radio access network (radio access network, RAN) device.
  • the access network device 120 is mainly used to implement functions such as wireless physical layer functions, resource scheduling and wireless resource management, wireless access control, and mobility management.
  • the access network device 120 may also be referred to as a 5G-AN/5G-RAN node.
  • the access network device 120 includes but is not limited to: an access point (access point, AP), a next-generation base station (NR NodeB, gNB), a central unit (central unit, CU) and Distributed unit (DU) separate form gNB, transmission receive point (TRP), transmission point (TP) or some other access node.
  • access point access point
  • gNB next-generation base station
  • CU central unit
  • DU Distributed unit
  • the core network device 130 is mainly used to implement functions such as call connection, charging, mobility management, and implementation of supplementary services.
  • the core network device 130 may include a management device 140 and a gateway device 150 .
  • the access network device 120 can communicate with the management device 140 and the gateway device 150 respectively, and the gateway device 150 can communicate with the data network 160 .
  • the management device 140 is mainly used for device registration, security authentication, mobility management and location management of the terminal device, and the gateway device 150 is mainly used to establish a channel with the terminal device, and forward the communication between the terminal device and the external data network on the channel. data pack.
  • the data network 160 may correspond to a variety of different service domains, such as IP multimedia subsystem (IMS), Internet, Internet protocol television (internet protocol). television, IPTV), other operator business domains, etc., are mainly used to provide a variety of data business services for terminal equipment.
  • IMS IP multimedia subsystem
  • Internet Internet protocol television
  • IPTV Internet protocol television
  • other operator business domains etc.
  • the data network 160 may include network devices such as servers (including servers providing multicast services), routers, and gateways.
  • servers including servers providing multicast services
  • routers including servers providing multicast services
  • gateways such as gateways.
  • FIG. 1 is only an exemplary architecture diagram, and should not be construed as a limitation on itself.
  • the network architecture 100 may further include other functional units or functional entities.
  • FIG. 2 is an example of the system architecture shown in FIG. 1 .
  • the management device 140 may include a management device access & mobility function (AMF), a session management function (SMF), and a policy control function (PCF) ) and other functional units.
  • the gateway device 150 may include functional units such as a user plane function (UPF), and these functional units may work independently, or may be combined together to implement certain control functions.
  • AMF management device access & mobility function
  • SMF session management function
  • PCF policy control function
  • the gateway device 150 may include functional units such as a user plane function (UPF), and these functional units may work independently, or may be combined together to implement certain control functions.
  • UPF user plane function
  • AMF, SMF and PCF can be combined as a management device to complete access control and mobility management functions such as access authentication, security encryption, and location registration of terminal devices, as well as the establishment and release of user plane transmission paths. Session management functions such as changes and changes, as well as the function of analyzing some slice-related data (such as congestion) and terminal device-related data.
  • UPF mainly performs functions such as routing and forwarding of user plane data. For example, it is responsible for data packet filtering, data transmission/forwarding, rate control, and generation of billing information for terminal devices.
  • the terminal device 110 can establish a control plane signaling connection with the AMF through the NG interface 1 (NG1, N1); the access network device 120 can establish a control plane signaling connection with the AMF through the NG interface 2 (NG2, N2) connection; the access network device 120 can establish a user plane data connection with the UPF through the NG interface 3 (NG3, N3); the UPF can establish a control plane signaling connection with the SMF through the NG interface 4 (NG4, N4); the UPF can pass the NG interface 6 (NG6, N6) Exchange user plane data with the data network.
  • NG1, N1 the access network device 120
  • the access network device 120 can establish a control plane signaling connection with the AMF through the NG interface 2 (NG2, N2) connection
  • the access network device 120 can establish a user plane data connection with the UPF through the NG interface 3 (NG3, N3)
  • the UPF can establish a control plane signaling connection with the SMF through the NG interface 4 (NG4, N4)
  • the UPF can pass the NG
  • FIG. 2 is only an example of the present application, and should not be construed as a limitation on the present application.
  • the terminal device 110 can establish an air interface connection with the access network device 120 through the NR interface for transmitting user plane data and control plane signaling; the AMF can establish control plane signaling with the SMF through the NG interface 11 (NG11, N11). The SMF can establish a control plane signaling connection with the PCF through the NG interface 7 (NG7, N7).
  • the AMF can establish control plane signaling with the SMF through the NG interface 11 (NG11, N11).
  • the SMF can establish a control plane signaling connection with the PCF through the NG interface 7 (NG7, N7).
  • the network architecture 100 in the embodiment of the present application may support a PDU connection service
  • the PDU connection service refers to a service of exchanging PDU data packets between the UE and the DN.
  • a service of exchanging PDU data packets between the terminal device 110 and the data network 160 For example, a service of exchanging PDU data packets between the terminal device 110 and the data network 160.
  • the terminal device realizes the PDU session connection by initiating the establishment of the PDU session. After a single PDU session is established, a data transmission channel between the terminal device 110 and the data network 160 is established.
  • the PDU session refers to the process of communication between the terminal device 110 and the data network 160 .
  • the terminal device 110 may establish multiple PDU session connections, and the SMF corresponding to each PDU session may be different or the same.
  • terminal devices 110 may be connected to the same data network through different UPFs.
  • a PDU session can have multiple N6 interfaces at the same time.
  • the UPF connecting each N6 interface is called a PDU Session Anchor, and each PDU Session Anchor provides a different path to the same data network.
  • the terminal device 110 may establish multiple PDU sessions, each of which may include multiple data radio bearers (DRBs) on the RAN side.
  • DRBs data radio bearers
  • the PDU data packet may include at least one of the following information: a number, an International Mobile Subscriber Identity (IMSI), an International Mobile Equipment Identity (International Mobile Equipment) Identity, MEI), PDU session identifier (ID), session type (IPv4, IPv6, IPv4v6 and Ethernet frame), uplink and downlink rate, charging ID, roaming status information, IP information of terminal equipment, policy control function equipment (Policy Control function, PCF) information, quality of service (Quality of service, QoS) information, tunnel information, destination address, session management function (Session Management Function, SMF) identification, slice information (if supported), default data radio bearer (Data Radio) Bearer, DRB) information, data network name, access management function (Access Management Function, AMF) information, user location information, session management information, UPF ID, online charging identification, offline charging identification and other related information.
  • IMSI International Mobile Subscriber Identity
  • MEI International Mobile Equipment Identity
  • IPv4, IPv6, IPv4v6 and Ethernet frame IPv4, IP
  • a user plane connection between the terminal device 110 and the data network 160 may be established through network slicing.
  • the access network device 120 selects an AMF capable of supporting the required network slice
  • one or more PDU sessions connected to the data network 160 may be established through the network slice.
  • different network slices have different single network slice selection assistance information (Single Network Slice Selection Assistance Information, S-NSSAI).
  • S-NSSAI Single Network Slice Selection Assistance Information
  • Each PDU session can have multiple quality of service flows (Quality of Service flow, QoS Flow), thus, it can be subordinate to different network slices and different transmission performance requirements (such as reliability, transmission delay, transmission rate, etc. ) data communication is carried by different protocol data unit (Protocol Data Unit, PDU) sessions (sessions).
  • PDU Protocol Data Unit
  • the network can carry Enhanced Mobile Broadband (eMBB) and Ultra-Reliable and Low Latency Communication (URLLC) services on different PDU sessions respectively.
  • eMBB Enhanced Mobile Broadband
  • URLLC Ultra-Reliable and Low Latency Communication
  • the Non-Access Stratum (NAS) service data flow (SDF) template (template) of the core network device 130 classifies and maps different data packets from the application layer to different Different QoS Flows in the PDU session, and make it sent to the access network device 120 in different PDU sessions.
  • the access network device 120 maps the QoS Flow to different data radio bearers (Data Radio Bearer, DRB) according to the identification (ID) information of the QoS Flow and sends it to the UE through the air interface.
  • DRB data radio bearers
  • ID identification
  • FIG. 3 shows a schematic flowchart of a wireless communication method 200 according to an embodiment of the present application, and the method 200 may be executed by a terminal device.
  • the terminal device shown in FIG. 3 may be the terminal device shown in FIG. 1 .
  • the method 200 includes some or all of the following contents:
  • the terminal device acquires target unified access control (Unified Access Control, UAC) information corresponding to the target network slice.
  • UAC Unified Access Control
  • the terminal device determines UAC information for the terminal device and/or determines whether to access the network based on the target UAC information.
  • the terminal device determines that it needs to access the network, it first obtains the target UAC information corresponding to the target slice, then determines the UAC information of the terminal device based on the target UAC information, and finally determines the UAC information of the terminal device based on the UAC information of the terminal device. Access the network. For example, the terminal device may access the target network slice based on the target UAC information. For another example, when the terminal device determines that it needs to access the network, it first obtains target UAC information corresponding to the target slice, and then determines whether the terminal device can access the network based on the target UAC information. For example, the terminal device may determine whether to access the target network slice based on the target UAC information.
  • the UAC information for the terminal device can be determined based on the UAC information corresponding to the network slice, and/or whether the terminal device accesses the network or the target network slice can be controlled.
  • UAC information can be used, avoiding the problem that the UAC information determined based on the access identifier cannot meet the access control requirements of network slices, and correspondingly, it can improve network slices. accuracy of access control.
  • the UAC information may also be corresponding to the granularity of the network slice group.
  • the terminal device may determine the UAC information of the terminal device and/or whether to access the network based on the target UAC information.
  • the S210 may include:
  • the terminal device acquires at least one UAC information corresponding to at least one network slice, where the at least one network slice corresponds to at least one of the same access category, the same access identifier, and the same access level, and the at least one network slice corresponds to at least one of the same access class, the same access identifier, and the same access class
  • a network slice includes the target network slice.
  • the at least one network slice is associated with the at least one UAC information, so that after the terminal device determines the network slice that needs to be registered (that is, the target network slice), it can be based on the at least one network slice
  • the correspondence between the slice and the at least one UAC information, and the target UAC information corresponding to the target network slice is determined in the at least one UAC information.
  • the at least one network slice can be structured to correspond to at least one of the same access class, the same access identity, and the same access class, the access class, the access identity, or the access class.
  • the corresponding UAC information is converted into the UAC information corresponding to the network slice, which is equivalent to refining the granularity of the UAC information. Accordingly, the accuracy of the access control of the network slice can be improved.
  • the terminal device may also acquire at least one UAC information corresponding to at least one network slice group, the at least one network slice group.
  • the slice group corresponds to at least one of the same access category, the same access identifier, and the same access level, and the at least one network slice includes the target network slice group.
  • the target UAC information may also include UAC information of the target network slice and/or an absolute value used for determining whether to access the target network.
  • the UAC information of the target network slice and/or whether to access the target network may be determined only by the target UAC information corresponding to the target network slice in the at least one network slice.
  • the following describes the access category, the access identifier, and the access level.
  • the access category may be determined based on a triggering event of an access attempt. For example, the following describes the correspondence between the access attempt and the access category with reference to Table 1.
  • the access category can be determined by the triggering event of the access attempt and the conditions related to the terminal device. For example, if the triggering event of the access attempt is a Mobile Originate (MO) signal generated by paging, it may be determined that the access class of the terminal device is access class 0.
  • MO Mobile Originate
  • the access class (Access Class, AC) may be used to associate with an access class or an access identity.
  • each user may be randomly assigned an AC within (0..9), and the one AC within (0..9) may be stored in the SIM card.
  • some special users may have one or more ACs located in (11..15), and the one or more ACs located in (11..15) may be stored in the SIM card.
  • the one or more ACs located in (11..15) may have a higher priority.
  • the specific value of the AC may be different from the priority of the AC.
  • the AC numerical order may not be used to represent the priority order of the ACs.
  • Access levels 0 to 9 can be assigned to ordinary users; access level 11 can be assigned to PLMN management, etc.; access level 12 can be assigned to security sector applications; access level 13 can be assigned to public utilities; 14 may be assigned to emergency services; access class 15 may be assigned to PLMN staff.
  • the access identifier may be used to define different services on each access category or a network slice selection policy (Network Slice Selection Policy, NSSP) adopted by the user.
  • NSSP Network Slice Selection Policy
  • the access identifier may be determined based on the access level or service type configured for the UE. For example, the relationship between the access identifier and the access UE configuration is described below with reference to Table 2.
  • the access identifier of the terminal device may be access identifier 0.
  • the access identifier of the terminal device may be access identifier 1.
  • the access identifier of the terminal device may be the access identifier 11 .
  • the S220 may include:
  • the terminal device determines UAC information for the terminal device and/or determines whether to access the network based on the target UAC information and the first UAC information, where the first UAC information is the same access type, all The UAC information corresponding to the same access identifier or the same access class.
  • the terminal device may adjust the first UAC information based on the target UAC information to acquire UAC information for the terminal device.
  • the function of the first UAC information in this embodiment of the present application is to control network overload or to impose special restrictions on network applications, and the target UAC information is used to adjust the first UAC information.
  • This application does not limit the specific content of the first UAC information.
  • the first UAC information may be used for access control, and optionally, the access control may include cell-level access control and user equipment (User Equipment, UE)-level access control.
  • the first UAC information may be cell-level access control information or UE-level control information.
  • the first UAC information may be used for cell-level access control.
  • the first UAC information may include at least one of the following information:
  • Cellbarred Information indicating whether the cell is barred
  • cellReservedForOperatorUse information indicating whether the cell is reserved for operational use
  • cellReservedForOtherUse information indicating whether the cell is reserved for other purposes
  • Information indicating whether Information to allow intraFreqRese information indicating whether Information to allow intraFreqRese.
  • the information used to indicate whether the cell is barred may indicate that the cell is barred (barred), or may indicate that the cell is not barred (not barred); optionally, the information may be carried in the master-information block (Master-information block). Information Block, MIB); optionally, the information may be for all PLMNs, that is, valid or valid for all PLMNs; for example, if the information indicates that the cell is prohibited, then for all terminal equipment, access is prohibited Network Slicing.
  • the information used to indicate whether the cell is reserved for operational purposes may be indicated as reserved (Reserved), or may be indicated as not reserved (not Reserved); optionally, the information may be carried in the system information block 1 (System Information Block 1, SIB1); Optionally, if the information is indicated as reserved, it will have the effect of prohibiting access to some terminal equipment; Interrupting the device has the effect of prohibiting access.
  • SIB1 System Information Block 1, SIB1
  • SIB1 System Information Block 1
  • the information used to indicate whether intraFreqRese is allowed can be indicated as allowed (allowed) or indicated as not allowed (not allowed); optionally, the information can be carried in the main-information block (Master Information Block, MIB); optional, if the current cell is a barred cell, it is allowed to reselect to the same-frequency neighbor cell; The restriction is canceled later; optionally, the certain period of time may be 300s.
  • MIB Master Information Block
  • the first UAC information may be used for UE-level access control.
  • the access control at the UE level may be based on trigger factors, that is, each access attempt is classified into a specified access class, and then the access control is performed based on the access class. Equivalently, probabilistic access can be performed according to trigger factors, which can not only solve all use cases and scenarios, but also reduce the complexity of protocol writing.
  • the UE-level access control can be used for terminal devices in any state. In other words, the methods in the embodiments of the present application can be applied to terminal devices in any state. For example, it can be applied to a terminal device in an idle state (RRC_IDLE state), an inactive state (RRC_INACTIVE state), or a connected state (RRC_CONNECTED state).
  • the idle state, the inactive state, and the connected state will be described below.
  • Idle state mobility is based on UE-based cell selection and reselection, paging is initiated by CN, and paging area is configured by CN; in addition, there is no UE AS context on the access network device side, that is, there is no RRC connection.
  • RRC connection that is, the UE AS context exists between the access network device side and the UE.
  • the access network device knows the location of the UE at a specific cell level. Mobility is the mobility controlled by the access network equipment. Unicast data can be transmitted between the UE and the access network equipment.
  • Deactivated state mobility is UE-based cell selection and reselection, there is a connection between CN-NR, UE AS context exists on an access network device, paging is triggered by RAN, and RAN-based paging area is set by RAN Management, the access network device side knows the location of the UE is based on the paging area level of the RAN.
  • the target UAC information includes adjustment values and/or adjustment factors for at least some parameters in the first UAC information.
  • the parameters of the first UAC information type are described below.
  • the first UAC information may also be referred to as barring information setting (UAC-BarringInfoSet).
  • each access category may be associated with one UAC barring information setting (ie, the first UAC information).
  • access classes may include 64.
  • access category 0 may not be configured or associated with UAC barring information settings. It is also possible to configure or associate a UAC barring information setting per PLMN. If the UAC barring information setting is not associated with each PLMN information, the same UAC barring information setting may be used for all PLMNs.
  • the terminal device may be triggered to execute the UAC process through the NAS layer, or the terminal device may be triggered to execute the UAC process through the AS.
  • AS-triggered access may include paging-triggered access and RAN-based Notification Area update (RAN-based Notification Area update, RNAU)-triggered access.
  • RAN-based Notification Area update RAN-based Notification Area update
  • its access class is 0, that is, the terminal device may not perform access control, in other words, the terminal device may directly initiate the process of accessing the network.
  • the access type is 8, that is, the terminal device needs to perform access control.
  • the AS layer obtains the prohibition information setting (ie, the first UAC information) according to the access identifier and the access class provided by the NAS layer or the access class generated by the AS, and then executes the access control process.
  • the priority of setting the cause value and the access type may be sorted in the following order: paging-triggered access, NAS-triggered event, and RNAU-triggered access.
  • the barring information setting may include a UAC barring threshold (uac-BarringFactor), a UAC barring timing (uac-BarringTime), and a UAC barring access identifier (uac-BarringForAccessIdentities).
  • a UAC barring threshold (uac-BarringFactor)
  • a UAC barring timing (uac-BarringTime)
  • a UAC barring access identifier uac-BarringForAccessIdentities
  • T390 may be a timer for access control, or may be a timer started for each access type.
  • the access control timer may be specified and maintained at the AS layer.
  • the AS notifies the NAS layer, which is also based on the access type to notify the access prohibition release.
  • the UE may start the UAC procedure after obtaining the valid configuration UAC configuration parameter (SIB1) from the target cell.
  • the terminal device can convert the UAC information corresponding to the access category to the UAC information corresponding to the network slice based on the target UAC information corresponding to the target network slice, so as to improve the access control of the network slice accuracy.
  • the target UAC information includes the same adjustment value and/or adjustment factor corresponding to all parameters in the first UAC information, and/or the target UAC information includes the first UAC Adjustment value and/or adjustment factor corresponding to at least one parameter in the information.
  • the target UAC information may include an adjustment value and/or an adjustment factor corresponding to each parameter in the first UAC information.
  • the first UAC information includes a barring factor and/or an access control timing.
  • the barring threshold may be the aforementioned uac-BarringFactor.
  • the access control timing may be the aforementioned uac-BarringTime or the access control time.
  • the target UAC information may include an adjustment value and/or an adjustment factor for the barring threshold, and/or an adjustment value and/or an adjustment factor for the access control timing.
  • access category K corresponds to network slice 1 and network slice 2.
  • the UAC information corresponding to the access category K includes the prohibition threshold value of A and the access control timing of B.
  • the adjustment factor of A in the UAC information of the access category K is 0.5
  • the adjustment factor of B in the UAC information of the access category K is 0.3.
  • the target network slice is network slice 1
  • the terminal device selects network slice 1
  • the UAC information corresponding to the target network slice ie, network slice 1
  • the UAC information for the terminal device is A*0.5 and B*0.3.
  • the terminal device can determine whether it can access the network based on A*0.5 and B*0.3.
  • the adjustment value of A in the UAC information of the access type K is C
  • the adjustment value of B in the UAC information of the access type K is D.
  • the target network slice is network slice 1
  • the terminal device selects network slice 1
  • the UAC information corresponding to the target network slice (ie, network slice 1) is C and D.
  • the UAC information for the terminal device is A+C and B+C. In other words, the terminal device can determine whether it can access the network based on A+C and B+C.
  • the adjustment factor of all parameters in the UAC information of access category K is 0.5.
  • the adjustment factor of all the information in the UAC information of access category K is 0.3. If the target network slice is network slice 1, that is, the terminal device selects network slice 1, the UAC information corresponding to the target network slice (ie, network slice 1) is 0.5. Based on this, the UAC information for the terminal device is A*0.5 and B*0.5. In other words, the terminal device can determine whether it can access the network based on A*0.5 and B*0.5. If the target network slice is network slice 2, that is, the terminal device selects network slice 2, the UAC information corresponding to the target network slice (ie, network slice 2) is 0.3. Based on this, the UAC information for the terminal device is A*0.3 and B*0.3. In other words, the terminal device can determine whether it can access the network based on A*0.3 and B*0.3.
  • the target UAC information may also include all parameters in the first UAC information or other adjustment amounts of at least one parameter. This application does not specifically limit this.
  • the at least one UAC information is multiple UAC information, and different UAC information in the multiple UAC information includes partially the same information, and/or different UAC information among the multiple UAC information UAC information is completely different.
  • different UAC information in the plurality of UAC information includes the same barring factor (Barringfactor) and/or access control timing.
  • different UAC information among the plurality of UAC information includes different barring thresholds (Barringfactors) and/or access control timings.
  • one UAC information of the at least one UAC information corresponds to one or more network slices of the at least one network slice.
  • the same access category, the same access identity or the same access class may correspond to one or more UAC information.
  • one UAC information in the at least one UAC information may also correspond to one or more network slice groups in the at least one network slice.
  • the method 200 may further include:
  • the terminal device sends a mapping relationship to the access network device and/or the core network device, where the mapping relationship includes a corresponding relationship between the at least one network slice and at least one of the following:
  • the terminal device receives the mapping relationship sent by the core network device.
  • the terminal device after generating the mapping relationship, the terminal device sends the mapping relationship to the access network device and/or the core network device. For another example, after the core network device generates the mapping relationship, the terminal device receives the mapping relationship sent by the core network device.
  • the embodiment of the present application does not specifically limit the sending time or timing of the mapping relationship.
  • the terminal device may directly send the mapping relationship, or the network may trigger the terminal device to send the mapping relationship.
  • the method 200 may further include:
  • the terminal device determines the target network slice.
  • the target network slice is at least one of a network slice selected by the terminal device, expected, interested, preconfigured, allowed, and a network slice with a priority greater than or equal to a certain threshold.
  • the target network slice is the union or intersection of network slices selected, expected, interested, preconfigured, allowed, and the priority of which is greater than or equal to a certain threshold by the terminal device.
  • the certain threshold may be a statically configured threshold, a dynamically configured threshold, a threshold negotiated between the terminal device and other devices, or a threshold predefined by a protocol.
  • the S210 may include at least one of the following:
  • the terminal device receives broadcast information sent by an access network device, where the broadcast information includes the target UAC information; or
  • the terminal device receives dedicated signaling sent by the access network device, where the dedicated signaling includes the target UAC information; or
  • the terminal device receives pre-configuration information sent by the access network device and/or the core network device, where the pre-configuration information includes the target UAC information; or
  • the terminal device receives a non-access stratum NAS message sent by a core network device, where the NAS message includes the target UAC information.
  • the target UAC information may be information generated by a core network device or an access network device and sent to the terminal device.
  • the target UAC information is information determined by the terminal device.
  • the target UAC information may be information generated by the terminal device.
  • the target UAC information is information determined by the terminal device according to at least one of service characteristics, service requirements and network status.
  • the terminal device determines the target UAC information or the core network device determines the target UAC information, which avoids the access network device from broadcasting the target UAC information, which can not only improve the accuracy of access control, but also avoid the need for SIB signaling/base station Impact.
  • the method 200 may further include:
  • the terminal device receives indication information sent by the access network device, where the indication information is used to indicate whether to use the UAC information corresponding to the network slice; or, the indication information is used to indicate whether to determine whether to use the UAC information corresponding to the network slice.
  • the UAC information of the terminal device or, the indication information is used to indicate whether to access the network based on the UAC information corresponding to the network slice; or the indication information is used to indicate whether to use the access category, access identifier or access level Corresponding UAC information; or, the indication information is used to indicate whether the UAC information for the terminal device is determined based on the UAC information corresponding to the access type, access identifier or access level; or, the indication information is used to indicate Whether to access the network based on the UAC information corresponding to the access type, access identifier or access level.
  • the terminal device may first acquire the indication information, and if the indication information belongs to at least one of the following, acquire the target UAC information :
  • the indication information is used to indicate that the UAC information corresponding to the network slice is used; or the indication information is used to indicate that the UAC information for the terminal device is determined based on the UAC information corresponding to the network slice; or the indication information is used to indicate Access the network based on the UAC information corresponding to the network slice; or, the indication information is used to indicate that the UAC information corresponding to the access type, access identifier or access level is not used; or, the indication information is used to indicate that the access The UAC information corresponding to the access category, access identifier or access level determines the UAC information for the terminal device; or, the indication information is used to indicate that the UAC information not based on the access category, access identifier or access level corresponds to Access the network.
  • FIG. 4 is a schematic flowchart of a wireless communication method 300 provided by an embodiment of the present application.
  • the method 300 may be executed interactively by a terminal device and a network device.
  • the terminal equipment shown in FIG. 4 may be the terminal equipment shown in FIG. 1
  • the network equipment shown in FIG. 4 may be the core network equipment shown in FIG. 1 , or the access equipment shown in FIG. 1 .
  • the core network device may be a device with AMF.
  • the method 200 shown in FIG. 3 describes the wireless communication method according to the embodiment of the present application from the perspective of a terminal device.
  • the method 300 shown in FIG. 4 describes the wireless communication method according to the embodiment of the present application in detail from the perspective of the interaction between the terminal device and the network device.
  • For the steps in the method 300 reference may be made to the corresponding steps in the method 200. For brevity, here Repeated content in the method 200 will not be repeated.
  • the method 300 may include:
  • S320 in the method 300 may refer to S220 in the method 200, and S310 in the method 300 is an implementation manner of S210 in the method 200.
  • S320 No further description will be given, and only the S310 will be described.
  • the network device sends target unified access control UAC information corresponding to the target network slice to the terminal device, where the target UAC information is used by the terminal device to determine UAC information for the terminal device and/or determine whether to access the network.
  • the network device sends at least one UAC information corresponding to at least one network slice to the terminal device, where the at least one network slice corresponds to the same access category, the same access In at least one item, the at least one network slice includes the target network slice.
  • the network device may also send at least one UAC information corresponding to at least one network slice group to the terminal device, where the at least one network slice group corresponds to the same access category, the same access identifier, and the same access at least one of the entry levels, the at least one network slice group includes the target network slice group.
  • the method 300 may further include:
  • the network device sends first UAC information to the terminal device, where the first UAC information is UAC information corresponding to the same access category, the same access identifier, or the same access level.
  • the network device is an access network device, and the access network device may send the first UAC information to the terminal device through a broadcast message.
  • the network device is an access network device; the method 300 may further include:
  • the access network device receives the mapping relationship sent by the terminal device and/or the core network device, where the mapping relationship includes a corresponding relationship between the at least one network slice and at least one of the following:
  • the same access category, the same access identifier, and the same access class are identical to each other.
  • the network device is a core network device; the method 300 may further include:
  • the core network device sends a mapping relationship to the access network device and/or the terminal device, where the mapping relationship includes a corresponding relationship between the at least one network slice and at least one of the following:
  • the core network device receives the mapping relationship sent by the terminal device.
  • the network device is an access network device
  • the S310 may include at least one of the following:
  • the access network device sends broadcast information to the terminal device, where the broadcast information includes the target UAC information; or the access network device sends dedicated signaling to the terminal device, where the dedicated signaling includes all the target UAC information; or the access network device sends pre-configuration information to the terminal device, where the pre-configuration information includes the target UAC information.
  • the network device is a core network device, and the S310 may include at least one of the following:
  • the core network device sends pre-configuration information to the terminal device, where the pre-configuration information includes the target UAC information; or the core network device sends a non-access stratum NAS message to the terminal device, the NAS message Include the target UAC information.
  • the network device is an access network device
  • the method 300 may further include:
  • the access network device sends indication information to the terminal device, where the indication information is used to indicate whether to use the UAC information corresponding to the network slice; or, the indication information is used to indicate whether to determine whether to use the UAC information corresponding to the network slice UAC information of the terminal device; or, the indication information is used to indicate whether to access the network based on the UAC information corresponding to the network slice; or, the indication information is used to indicate whether to use the access type, access identifier or access UAC information corresponding to the level; or, the indication information is used to indicate whether the UAC information for the terminal device is determined based on the UAC information corresponding to the access class, the access identifier or the access level; or, the indication information is used for Indicates whether to access the network based on the UAC information corresponding to the access class, access identifier or access class.
  • FIG. 5 is a schematic block diagram of a terminal device 400 according to an embodiment of the present application.
  • the terminal device 400 may include:
  • a communication unit 410 configured to acquire target unified access control UAC information corresponding to the target network slice;
  • the processing unit 420 is configured to determine UAC information for the terminal device and/or determine whether to access the network based on the target UAC information.
  • the communication unit 410 is specifically configured to:
  • At least one UAC information corresponding to at least one network slice where the at least one network slice corresponds to at least one of the same access category, the same access identifier, and the same access level, and the at least one network slice includes the target network slice.
  • the processing unit 420 is specifically configured to:
  • the terminal device Determine the UAC information for the terminal device and/or determine whether to access the network based on the target UAC information and the first UAC information, where the first UAC information is the same access type, the same access type Access ID or UAC information corresponding to the same access level.
  • the target UAC information includes adjustment values and/or adjustment factors for at least some parameters in the first UAC information.
  • the target UAC information includes the same adjustment value and/or adjustment factor corresponding to all parameters in the first UAC information, and/or the target UAC information includes the first UAC Adjustment value and/or adjustment factor corresponding to at least one parameter in the information.
  • the first UAC information includes a barring threshold and/or an access control timing.
  • the target UAC information includes an adjustment value and/or an adjustment factor for the barring threshold, and/or an adjustment value and/or an adjustment factor for the access control timing.
  • the at least one UAC information is multiple UAC information, and different UAC information in the multiple UAC information includes partially the same information, and/or different UAC information among the multiple UAC information UAC information is completely different.
  • one UAC information of the at least one UAC information corresponds to one or more network slices of the at least one network slice.
  • the communication unit 410 is further configured to:
  • mapping relationship includes a corresponding relationship between the at least one network slice and at least one of the following:
  • mapping relationship sent by the core network device is received.
  • the processing unit 420 is further configured to:
  • the target network slice is determined.
  • the target network slice is at least one of a network slice selected by the terminal device, expected, interested, preconfigured, allowed, and a network slice with a priority greater than or equal to a certain threshold.
  • the communication unit 410 is specifically configured to perform at least one of the following:
  • pre-configuration information sent by an access network device and/or a core network device, where the pre-configuration information includes the target UAC information;
  • a non-access stratum NAS message sent by a core network device is received, where the NAS message includes the target UAC information.
  • the target UAC information is information determined by the terminal device.
  • the target UAC information is information determined by the terminal device according to at least one of service characteristics, service requirements, and network status.
  • the communication unit 410 is further configured to:
  • Receive indication information sent by the access network device where the indication information is used to indicate whether to use the UAC information corresponding to the network slice; UAC information; or, the indication information is used to indicate whether to access the network based on the UAC information corresponding to the network slice; or the indication information is used to indicate whether to use the UAC information corresponding to the access type, access identifier or access level ; Or, the indication information is used to indicate whether the UAC information for the terminal device is determined based on the UAC information corresponding to the access category, the access identifier or the access level; or, the indication information is used to indicate whether the UAC information is based on the access The UAC information corresponding to the category, access identifier or access level accesses the network.
  • the apparatus embodiments and the method embodiments may correspond to each other, and similar descriptions may refer to the method embodiments.
  • the terminal device 400 shown in FIG. 5 may correspond to executing the method 200 or the corresponding subject in the method 300 of the embodiments of the present application, and the aforementioned and other operations and/or functions of each unit in the terminal device 400 are for the purpose of realizing For the sake of brevity, the corresponding processes in each method in FIG. 3 or FIG. 4 will not be repeated here.
  • FIG. 6 is a schematic block diagram of a network device 500 provided by an embodiment of the present application.
  • the network device 500 may be a core network device or an access network device.
  • the network device 500 may include:
  • a communication unit 510 configured to send the target unified access control UAC information corresponding to the target network slice to the terminal device, where the target UAC information is used by the terminal device to determine the UAC information for the terminal device and/or determine whether to access The internet.
  • the communication unit 510 is specifically used for:
  • the At least one network slice includes the target network slice.
  • the communication unit 510 is further configured to:
  • the terminal device Send first UAC information to the terminal device, where the first UAC information is UAC information corresponding to the same access category, the same access identifier, or the same access level.
  • the target UAC information includes adjustment values and/or adjustment factors for at least some parameters in the first UAC information.
  • the target UAC information includes the same adjustment value and/or adjustment factor corresponding to all parameters in the first UAC information, and/or the target UAC information includes the first UAC Adjustment value and/or adjustment factor corresponding to at least one parameter in the information.
  • the first UAC information includes a barring threshold and/or an access control timing.
  • the target UAC information includes an adjustment value and/or an adjustment factor for the barring threshold, and/or an adjustment value and/or an adjustment factor for the access control timing.
  • the at least one UAC information is multiple UAC information, and different UAC information in the multiple UAC information includes partially the same information, and/or different UAC information among the multiple UAC information UAC information is completely different.
  • one UAC information of the at least one UAC information corresponds to one or more network slices of the at least one network slice.
  • the network device is an access network device; the communication unit 510 is further configured to:
  • mapping relationship sent by the terminal device and/or the core network device, where the mapping relationship includes a corresponding relationship between the at least one network slice and at least one of the following:
  • the same access category, the same access identifier, and the same access class are identical to each other.
  • the network device is a core network device; the communication unit 510 is further configured to:
  • mapping relationship includes a corresponding relationship between the at least one network slice and at least one of the following:
  • the mapping relationship sent by the terminal device is received.
  • the network device is an access network device
  • the communication unit 510 is configured to perform at least one of the following:
  • the network device is a core network device
  • the communication unit 510 is configured to perform at least one of the following:
  • the network device is an access network device
  • the communication unit 510 is further configured to:
  • the indication information is used to indicate whether to use the UAC information corresponding to the network slice; or, the indication information is used to indicate whether to determine the UAC for the terminal device based on the UAC information corresponding to the network slice information; or, the indication information is used to indicate whether to access the network based on the UAC information corresponding to the network slice; or, the indication information is used to indicate whether to use the UAC information corresponding to the access type, access identifier or access level; Or, the indication information is used to indicate whether the UAC information for the terminal device is determined based on the UAC information corresponding to the access class, the access identifier or the access class; or the indication information is used to indicate whether the UAC information is based on the access class , UAC information corresponding to the access identifier or the access level to access the network.
  • the apparatus embodiments and the method embodiments may correspond to each other, and similar descriptions may refer to the method embodiments.
  • the network device 500 shown in FIG. 6 may correspond to the corresponding subject in executing the method 300 of the embodiment of the present application, and the aforementioned and other operations and/or functions of the various units in the network device 500 are respectively for the purpose of realizing the method shown in FIG. 4 .
  • the corresponding processes in each of the methods are not repeated here.
  • the steps of the method embodiments in the embodiments of the present application may be completed by hardware integrated logic circuits in the processor and/or instructions in the form of software, and the steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as hardware
  • the execution of the decoding processor is completed, or the execution is completed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in random access memory, flash memory, read-only memory, programmable read-only memory, electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps in the above method embodiments in combination with its hardware.
  • processing unit and the communication unit referred to above may be implemented by a processor and a transceiver, respectively.
  • Fig. 7 is a schematic structural diagram of a communication device 600 according to an embodiment of the present application.
  • the communication device 600 may include a processor 610 .
  • the processor 610 may call and run a computer program from the memory to implement the methods in the embodiments of the present application.
  • the communication device 600 may further include a memory 620 .
  • the memory 620 may be used to store indication information, and may also be used to store codes, instructions, etc. executed by the processor 610 .
  • the processor 610 may call and run a computer program from the memory 620 to implement the methods in the embodiments of the present application.
  • the memory 620 may be a separate device independent of the processor 610 , or may be integrated in the processor 610 .
  • the communication device 600 may further include a transceiver 630 .
  • the processor 610 can control the transceiver 630 to communicate with other devices, and specifically, can send information or data to other devices, or receive information or data sent by other devices.
  • Transceiver 630 may include a transmitter and a receiver.
  • the transceiver 630 may further include antennas, and the number of the antennas may be one or more.
  • each component in the communication device 600 is connected through a bus system, wherein the bus system includes a power bus, a control bus and a status signal bus in addition to a data bus.
  • the communication device 600 may be a terminal device of an embodiment of the present application, and the communication device 600 may implement the corresponding processes implemented by the terminal device in each method of the embodiment of the present application.
  • the communication device 600 may correspond to the terminal device 400 in the embodiment of the present application, and may correspond to the corresponding subject in executing the method 200 or the method 300 according to the embodiment of the present application, which is not repeated here for brevity.
  • the communication device 600 may be the network device of the embodiments of the present application, and the communication device 600 may implement the corresponding processes implemented by the network device in each method of the embodiments of the present application.
  • the communication device 600 in the embodiment of the present application may correspond to the network device 500 in the embodiment of the present application, and may correspond to the corresponding subject in executing the method 300 according to the embodiment of the present application, which is not omitted here for brevity. Repeat.
  • the embodiment of the present application also provides a chip.
  • the chip may be an integrated circuit chip, which has a signal processing capability, and can implement or execute the methods, steps, and logic block diagrams disclosed in the embodiments of the present application.
  • the chip may also be referred to as a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip, or the like.
  • the chip can be applied to various communication devices, so that the communication device installed with the chip can execute the methods, steps and logic block diagrams disclosed in the embodiments of the present application.
  • FIG. 8 is a schematic structural diagram of a chip 700 according to an embodiment of the present application.
  • the chip 700 includes the processor 710 .
  • the processor 710 may call and run a computer program from the memory to implement the methods in the embodiments of the present application.
  • the chip 700 may further include a memory 720 .
  • the processor 710 may call and run a computer program from the memory 720 to implement the methods in the embodiments of the present application.
  • the memory 720 may be used to store instruction information, and may also be used to store codes, instructions and the like executed by the processor 710 .
  • the memory 720 may be a separate device independent of the processor 710 , or may be integrated in the processor 710 .
  • the chip 700 may further include an input interface 730 .
  • the processor 710 may control the input interface 730 to communicate with other devices or chips, and specifically, may acquire information or data sent by other devices or chips.
  • the chip 700 may further include an output interface 740 .
  • the processor 710 can control the output interface 740 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
  • the chip 700 can be applied to the network device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the network device in the various methods of the embodiments of the present application, and can also implement the various methods of the embodiments of the present application.
  • the corresponding process implemented by the terminal device in FIG. 1 is not repeated here.
  • bus system includes a power bus, a control bus and a status signal bus in addition to a data bus.
  • the processors referred to above may include, but are not limited to:
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • the processor may be used to implement or execute the methods, steps, and logical block diagrams disclosed in the embodiments of this application.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in random access memory, flash memory, read-only memory, programmable read-only memory or erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memory mentioned above includes but is not limited to:
  • Non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory may be Random Access Memory (RAM), which acts as an external cache.
  • RAM Random Access Memory
  • RAM Static RAM
  • DRAM Dynamic RAM
  • SDRAM Synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • synchronous link dynamic random access memory SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • Embodiments of the present application also provide a computer-readable storage medium for storing a computer program.
  • the computer-readable storage medium stores one or more programs including instructions that, when executed by a portable electronic device including a plurality of application programs, enable the portable electronic device to perform method 200 or method 300 The method of the illustrated embodiment.
  • the computer-readable storage medium can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application.
  • the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application.
  • the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application. , and are not repeated here for brevity.
  • the embodiments of the present application also provide a computer program product, including a computer program.
  • the computer program product can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the network device in each method of the embodiments of the present application. Repeat.
  • the computer program product can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application, in order to It is concise and will not be repeated here.
  • a computer program is also provided in the embodiments of the present application.
  • the computer program When the computer program is executed by the computer, the computer can execute the method of the embodiment shown in the method 200 or the method 300 .
  • the computer program can be applied to the network device in the embodiments of the present application.
  • the computer program When the computer program is run on the computer, it causes the computer to execute the corresponding processes implemented by the network device in each method of the embodiments of the present application. For the sake of brevity. , and will not be repeated here.
  • an embodiment of the present application further provides a communication system, which may include the above-mentioned terminal equipment and network equipment to form a communication system 100 as shown in FIG. 1 , which is not repeated here for brevity.
  • a communication system which may include the above-mentioned terminal equipment and network equipment to form a communication system 100 as shown in FIG. 1 , which is not repeated here for brevity.
  • system and the like in this document may also be referred to as “network management architecture” or “network system” and the like.
  • a software functional unit If implemented in the form of a software functional unit and sold or used as a stand-alone product, it may be stored in a computer-readable storage medium.
  • the technical solutions of the embodiments of the present application can be embodied in the form of software products in essence, or the parts that make contributions to the prior art or the parts of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the embodiments of the present application.
  • the aforementioned storage medium includes: a U disk, a removable hard disk, a read-only memory, a random access memory, a magnetic disk or an optical disk and other media that can store program codes.
  • division of units, modules or components in the apparatus embodiments described above is only a logical function division, and other division methods may be used in actual implementation.
  • multiple units, modules or components may be combined or integrated.
  • To another system, or some units or modules or components can be ignored, or not implemented.
  • the above-mentioned units/modules/components described as separate/display components may or may not be physically separated, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units/modules/components may be selected according to actual needs to achieve the purpose of the embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un dispositif de communication sans fil. Le procédé comprend les étapes suivantes : un dispositif terminal acquiert des informations de commande d'accès unifié (UAC) cibles correspondant à une tranche de réseau cible ; et d'après les informations UAC cibles, le dispositif terminal détermine des informations UAC pour le dispositif terminal et/ou détermine s'il faut accéder à un réseau. D'après la solution technique, différentes informations UAC peuvent être utilisées pour des exigences de commande d'accès de différentes tranches de réseau, ce qui permet d'éviter le problème selon lequel des informations UAC déterminées d'après un identifiant d'accès ne peuvent pas satisfaire une exigence de commande d'accès d'une tranche de réseau. Par conséquent, la précision de commande d'accès pour la tranche de réseau peut être améliorée.
PCT/CN2020/101166 2020-07-09 2020-07-09 Procédé et dispositif de communication sans fil WO2022006828A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/101166 WO2022006828A1 (fr) 2020-07-09 2020-07-09 Procédé et dispositif de communication sans fil
CN202080100404.1A CN115486130A (zh) 2020-07-09 2020-07-09 无线通信方法和设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/101166 WO2022006828A1 (fr) 2020-07-09 2020-07-09 Procédé et dispositif de communication sans fil

Publications (1)

Publication Number Publication Date
WO2022006828A1 true WO2022006828A1 (fr) 2022-01-13

Family

ID=79553671

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/101166 WO2022006828A1 (fr) 2020-07-09 2020-07-09 Procédé et dispositif de communication sans fil

Country Status (2)

Country Link
CN (1) CN115486130A (fr)
WO (1) WO2022006828A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114786239A (zh) * 2022-04-08 2022-07-22 哲库科技(北京)有限公司 系统信息的调度方法、装置、设备及存储介质
WO2023216904A1 (fr) * 2022-05-09 2023-11-16 中国移动通信有限公司研究院 Procédé et appareil de communication, dispositif associé, et support de stockage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110100481A (zh) * 2018-01-19 2019-08-06 Oppo广东移动通信有限公司 一种接入控制的方法、设备及计算机存储介质
US20200052963A1 (en) * 2018-08-09 2020-02-13 Samsung Electronics Co., Ltd. Method and apparatus for configuring network connection in mobile communication system
CN110870354A (zh) * 2017-06-23 2020-03-06 Lg电子株式会社 用于执行接入禁止检查的方法和设备
CN111201809A (zh) * 2018-09-19 2020-05-26 日本电气株式会社 更新与统一接入控制有关的参数的过程

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110870354A (zh) * 2017-06-23 2020-03-06 Lg电子株式会社 用于执行接入禁止检查的方法和设备
CN110100481A (zh) * 2018-01-19 2019-08-06 Oppo广东移动通信有限公司 一种接入控制的方法、设备及计算机存储介质
US20200052963A1 (en) * 2018-08-09 2020-02-13 Samsung Electronics Co., Ltd. Method and apparatus for configuring network connection in mobile communication system
CN111201809A (zh) * 2018-09-19 2020-05-26 日本电气株式会社 更新与统一接入控制有关的参数的过程

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
OPPO: "Discussion on Access Control for Network Slicing", 3GPP DRAFT; R2-1801792 DISCUSSION ON ACCESS CONTROL FOR NETWORK SLICING, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Athens, Greece; 20180226 - 20180302, 13 February 2018 (2018-02-13), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051398969 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114786239A (zh) * 2022-04-08 2022-07-22 哲库科技(北京)有限公司 系统信息的调度方法、装置、设备及存储介质
WO2023216904A1 (fr) * 2022-05-09 2023-11-16 中国移动通信有限公司研究院 Procédé et appareil de communication, dispositif associé, et support de stockage

Also Published As

Publication number Publication date
CN115486130A (zh) 2022-12-16

Similar Documents

Publication Publication Date Title
TWI817612B (zh) 通信方法和裝置
WO2023280121A1 (fr) Procédé et appareil d'obtention de service de périphérie
WO2020143061A1 (fr) Procédé d'établissement de ressources, et dispositif
CN111225013A (zh) 一种传输策略确定方法、策略控制方法及装置
US11399307B2 (en) Service authorization method, terminal device and network device
US20220124500A1 (en) Communication method, terminal device and network device
WO2020252710A1 (fr) Procédé et dispositif de communication sans fil
WO2022006828A1 (fr) Procédé et dispositif de communication sans fil
US20230388863A1 (en) Communication method and apparatus
US20230422016A1 (en) Network access method and apparatus
WO2023061255A1 (fr) Procédé de communication
TW202015440A (zh) 無線通訊的方法和設備
US20230388756A1 (en) Communication method and apparatus for multicast/broadcast service
WO2021062765A1 (fr) Procédé et dispositif de transmission d'informations
WO2023125201A1 (fr) Procédé et appareil de communication
WO2020164078A1 (fr) Procédé et dispositif de transmission de données
WO2020147001A1 (fr) Procédé et dispositif d'activation de ressources
US20220248319A1 (en) Method for wireless communication and device
WO2023092610A1 (fr) Procédé de communication sans fil, dispositif terminal et dispositif de réseau d'accès
WO2023116240A1 (fr) Procédé et appareil de communication
WO2024012299A1 (fr) Procédé, appareil et système de communication
WO2021203400A1 (fr) Procédé et appareil de configuration d'une politique de transmission, dispositif réseau et dispositif terminal
WO2024094128A1 (fr) Procédé et appareil de communication
WO2022233024A1 (fr) Procédé d'établissement d'une session se service de multidiffusion/diffusion, et système et appareil associés
CN116866981A (zh) 通信方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20944183

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20944183

Country of ref document: EP

Kind code of ref document: A1