WO2022033428A1 - 网络的转移方法、终端及网络侧设备 - Google Patents

网络的转移方法、终端及网络侧设备 Download PDF

Info

Publication number
WO2022033428A1
WO2022033428A1 PCT/CN2021/111505 CN2021111505W WO2022033428A1 WO 2022033428 A1 WO2022033428 A1 WO 2022033428A1 CN 2021111505 W CN2021111505 W CN 2021111505W WO 2022033428 A1 WO2022033428 A1 WO 2022033428A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
terminal
service
sor
network
Prior art date
Application number
PCT/CN2021/111505
Other languages
English (en)
French (fr)
Inventor
韩鲁峰
康艳超
张鹏飞
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to JP2023509448A priority Critical patent/JP2023537739A/ja
Priority to EP21855480.6A priority patent/EP4195774A4/en
Priority to KR1020237008068A priority patent/KR20230049684A/ko
Publication of WO2022033428A1 publication Critical patent/WO2022033428A1/zh
Priority to US18/107,279 priority patent/US20230189202A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/006Locating users or terminals or network equipment for network management purposes, e.g. mobility management with additional information processing, e.g. for direction or speed determination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/38Connection release triggered by timers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/142Reselecting a network or an air interface over the same radio air interface technology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/36Reselection control by user or terminal equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/04Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/06De-registration or detaching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/34Selective release of ongoing connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/50Connection management for emergency connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems

Definitions

  • the present application belongs to the field of communication technologies, and specifically relates to a network transfer method, a terminal, and a network side device.
  • the user equipment User Equipment, UE
  • some continuous unimportant services such as services with lower service priorities
  • the UE will continue to stay on the current network, and the UE will not be able to be implemented as desired by the network.
  • the services are transferred to the target network, resulting in inability to adjust network operations in time and waste of communication resources.
  • the embodiments of the present application provide a network transfer method, a terminal, and a network-side device, which can solve the problem that in the prior art, when the terminal currently has unimportant services, the terminal will continue to reside on the current network and cannot realize network transfer. The problem.
  • a method for transferring a network including: a terminal acquiring a service currently executed by the terminal; and the terminal releasing the current service currently executed by the terminal when there is no target service in the service currently executed by the terminal Executed service; the terminal executes network transfer to the terminal after releasing the service currently executed by the terminal.
  • a network transfer device comprising: an acquisition module for acquiring a service currently executed by a terminal; a release module for releasing a target service when there is no target service currently executed by the terminal The service currently executed by the terminal; the execution module is configured to execute the network transfer to the terminal after releasing the service currently executed by the terminal.
  • a network transfer method including: a network-side device generating first information corresponding to Extended Steering of Roaming (EXT-SOR); the network-side device sending the first information; wherein, the first information indicates that a service with target information is the target service.
  • EXT-SOR Extended Steering of Roaming
  • a network transfer device comprising: a generating module for generating first information corresponding to EXT-SOR; a second sending module for sending the first information to a terminal; wherein, the The first information indicates that the service with target information is the target service.
  • a terminal in a fifth aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, when the program or instruction is executed by the processor.
  • a network side device in a sixth aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, the program or instruction being executed by the The processor implements the steps of the method as described in the third aspect when executed.
  • a readable storage medium is provided, and a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the steps of the method described in the first aspect, or the The steps of the method described in the third aspect.
  • a chip in an eighth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a network-side device program or instruction, and implements the method described in the first aspect. the method described above, or implement the method described in the third aspect.
  • the terminal may release the service currently executed by the terminal when the target service does not exist in the currently executed service, and then transfer the network.
  • the target service is a high-priority service, it may be If there is no high-priority service among the services currently executed by the terminal, release the currently executed service and perform network transfer; in addition, the target service can also be one or more services specified by the terminal, that is, if the service currently executed by the terminal There is no one or more of these specified services in the network, and it is also possible to release the currently executed service and perform network transfer, thereby solving the problem that the terminal will continue to reside in the current The problem that the network cannot realize the transfer of the network.
  • FIG. 1 shows a block diagram of a wireless communication system to which an embodiment of the present application can be applied
  • FIG. 2 is a flowchart 1 of a network transfer method according to an embodiment of the present application.
  • Fig. 3 is the registration flow chart of the information that the network side equipment decides EXT-SOR resides in VPLMN according to the embodiment of the present application;
  • Fig. 4 is the registration flow chart of the information that the network side equipment decides EXT-SOR resides in HPLMN according to the embodiment of the present application;
  • FIG. 5 is a second flowchart of a method for transferring a network according to an embodiment of the present application.
  • FIG. 6 is a flow chart of the information corresponding to the EXT-SOR that needs to be updated by the network side device according to the embodiment of the present application;
  • FIG. 7 is a first structural schematic diagram of a transfer apparatus of a network according to an embodiment of the present application.
  • FIG. 8 is a second structural schematic diagram of a network transfer apparatus according to an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a network side device according to an embodiment of the present application.
  • first, second and the like in the description and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and "first”, “second” distinguishes Usually it is a class, and the number of objects is not limited.
  • the first object may be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the associated objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced LTE-Advanced
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • system and “network” in the embodiments of the present application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies.
  • NR New Radio
  • the following description describes a New Radio (NR) system for example purposes, and NR terminology is used in most of the description below, although these techniques are also applicable to applications other than NR system applications, such as 6th generation ( 6th Generation , 6G) communication system.
  • 6th generation 6th Generation
  • FIG. 1 shows a block diagram of a wireless communication system to which the embodiments of the present application can be applied.
  • the wireless communication system includes a terminal 11 and a network-side device 12 .
  • the terminal 11 may also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital computer Assistant (Personal Digital Assistant, PDA), handheld computer, netbook, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), mobile Internet device (Mobile Internet Device, MID), wearable device (Wearable Device) or vehicle-mounted device (Vehicle User Equipment, VUE), pedestrian terminal (Pedestrian User Equipment, PUE) and other terminal-side devices, wearable devices include: bracelets, headphones, glasses, etc.
  • the network side device 12 may be a base station or a core network, wherein the base station may be referred to as a Node B, an evolved Node B, an access point, a Base Transceiver Station (BTS), a radio base station, a radio transceiver, a basic service Set (Basic Service Set, BSS), Extended Service Set (Extended Service Set, ESS), Node B, Evolved Node B (eNB), Home Node B, Home Evolved Node B, WLAN Access Point, WiFi Node, Send Transmitting Receiving Point (TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms.
  • the base station in the NR system is taken as an example, but the specific type of the base station is not limited.
  • FIG. 2 is a flowchart 1 of the method for transferring a network according to an embodiment of the present application. As shown in Fig. 2, the steps of the method include:
  • Step S202 the terminal obtains the service currently executed by the terminal
  • Step S204 in the case that the target service does not exist in the service currently executed by the terminal, the terminal releases the service currently executed by the terminal;
  • Step S206 the terminal performs network transfer to the terminal after releasing the service currently executed by the terminal.
  • the terminal can release the service currently executed by the terminal under the condition that the target service does not exist in the currently executed service, and then transfer the network. If the target service has a high priority If there is no high-priority service among the services currently executed by the terminal, the currently executed service is released and the network is transferred; in addition, the target service can also be one or more services specified by the terminal, That is, if one or more of the specified services do not exist in the services currently executed by the terminal, the currently executed services can be released and network transfer can be performed, thereby solving the problem that the terminal currently has unimportant services in the prior art. It will continue to reside in the current network and cannot realize the transfer of the network.
  • the target service in the embodiment of the present application is preferably a service with a service priority higher than a preset priority.
  • the manner in which the terminal determines whether there is a target service in the currently executed service may include the following two manners:
  • Mode 1 is determined according to the first information corresponding to the EXT-SOR sent by the network side device, and the specific steps are as follows:
  • Step S11 the terminal receives the first information corresponding to the extended roaming control EXT-SOR sent by the network side device;
  • step S12 the terminal determines whether there is a target service in the currently executed service according to the first information; wherein the first information is used to indicate that the service with the target information is the target service.
  • the terminal autonomously determines whether the target service exists in the currently executed service.
  • the terminal can independently determine whether the target service exists in the currently executed service, or the network side device can independently determine whether the target service exists in the currently executed service.
  • the information sent is determined.
  • the target information in the first information includes at least one of the following: the type of the target service, the name of the target service, the number of the target service, the target single network Slice selection assistance information (Single Network Slice Selection Assistance Information, S-NSSAI), target data network name (Data Network Name, DNN), target 5G Quality of Service Identifier (5G Quality of Service Identifier, 5QI), the request type of the target PDU session , target Internet Protocol (Internet Protocol, IP) address, target packet filter.
  • S-NSSAI Single Network Slice Selection Assistance Information
  • S-NSSAI Single Network Slice Selection Assistance Information
  • target data network name Data Network Name, DNN
  • target 5G Quality of Service Identifier 5G Quality of Service Identifier
  • 5QI 5G Quality of Service Identifier
  • the service on the Protocol Data Unit (PDU) session belonging to the target S-NSSAI belongs to the high-priority service; the service connected to the target data network (DNN/APN) belongs to the high-priority service; belongs to the target 5QI services belong to high-priority services; Request type information of some PDU SESSIONs; PDU SESSION services established using the Request type of the target PDU SESSION belong to high-priority services, such as "initial emergency request", "existing emergency PDU session” ", "MA PDU request”.
  • the IP address of the PDU SESSION target PDU SESSION of certain IP addresses belongs to high-priority services; the services of which address ranges the target communication IP address of the UE belongs to belong to high-priority services; services on PDU SESSION/QOS FLOW including the target Packet filter It is a high-priority business.
  • the terminal receives the first information sent by the network side device through at least one of the following bearers: a transparent transmission container of SOR, a transparent transmission container of EXT-SOR (EXT-SOR transparent container).
  • the transparent transmission container of SOR or the transparent transmission container of EXT-SOR includes at least one of the following: EXT-SOR information 1, EXT-SOR information 2, and EXT-SOR security information.
  • the IE whose IEI is 73 is the transparent transmission container of SOR;
  • the SOR transparent container is a type 6 information element with a minimum length of 20 octets, as shown in Tables 2 and 3, including EXT-SOR information 1 and EXT-SOR information 2:
  • the above-mentioned Table 2 and Table 3 indicate that the SOR (transparent container information element) carries the information related to the protected EXT-SOR.
  • EXT-SOR information 1 and information 2 are part of the newly added information related to EXT-SOR, such as information indicating high-priority services;
  • SOR header-new, SOR-MAC-IAUSF-new, CounterSOR- new is the part that needs to be modified, which needs to be modified to indicate that the SOR transparent container IE contains EXT-SOR information 1 (EXT-SOR related information protected by USIM, etc.) or EXT-SOR information 2 (not protected by USIM, etc.) EXT-SOR related information), and related safety information, as shown in Table 4:
  • the calculation of SOR-MAC-IAUSF-new also corresponds to the content of the SOR transparent container IE. That is, if the SOR transparent container IE carries EXT-SOR, the calculation process of SOR-MAC-IAUSF-new also includes EXT-SOR; if the SOR transparent container IE does not carry EXT-SOR, then the calculation process of SOR-MAC-IAUSF-new The calculation process does not include EXT-SOR;
  • CounterSOR-new also corresponds to the content of SOR transparent container IE. That is, if the SOR transparent container IE carries EXT-SOR, the calculation process of SOR-MAC-IAUSF-new also reflects the existence (or transmission) of EXT-SOR; if the SOR transparent container IE does not carry EXT-SOR, the SOR - The calculation process of MAC-IAUSF-new does not reflect the existence (or transmission) of EXT-SOR.
  • the transparent transmission container of EXT-SOR is also included in IE;
  • the transparent transmission container of EXT-SOR is used for IE carrying EXT-SOR related information, such as carrying EXT-SOR information 1 or 2, and can also carry EXT-SOR security information, such as MAC, counter, etc.
  • EXT-SOR related information such as carrying EXT-SOR information 1 or 2
  • EXT-SOR security information such as MAC, counter, etc.
  • the EXT-SOR header indicates the characteristics of the EXT-SOR, such as: the EXT-SOR information sent by the network to the UE, or the EXT-SOR information sent by the UE to the network; the valid range of the EXT-SOR information, such as whether there is a time limit , whether there are PLMN restrictions, etc.;
  • EXT-SOR-MAC-1 represents the checksum generated after performing the integrity protection algorithm on EXT-SOR information 1 or 2;
  • CounterEXT-SOR represents the count value required to execute the integrity protection algorithm on EXT-SOR information 1 or 2.
  • the method of receiving the first information corresponding to the extended roaming control EXT-SOR sent by the network side device involved in the above-mentioned step S11 may further include:
  • Step S11-1 the terminal sends a notification message to the network side device; wherein, the notification message is used to notify the network side device that the terminal supports the EXT-SOR capability;
  • Step S11-2 the terminal receives the first information corresponding to the EXT-SOR sent by the network side device.
  • a registration request message is used to notify the network-side device that the terminal supports the EXT-SOR capability as an example , which includes:
  • Step S21 the network side device checks whether the registration request message sent by the terminal indicates whether "the UE supports the EXT-SOR capability". If indicated, go to step S23, otherwise go to step 22.
  • Step S22 the network side device determines that the terminal does not support the EXT-SOR function
  • Step S23 the network side device determines that the terminal supports the EXT-SOR function.
  • the VPLMN AMF needs to obtain the UE's EXT-SOR related information from the HPLMN;
  • Step S24 the AMF judges whether it has the latest EXT-SOR related information; if so, execute step S25; if not, execute step S26;
  • Step S25 in some special scenarios, such as initial registration, emergency registration, etc., the Home Public Land Mobile Network (HPLMN) Unified Data Management (UDM) may require access to the mobility management function (Access). and Mobility Management Function, AMF) retrieves EXT-SOR related information from HPLMN UDM. Therefore, the visited (Visited Public Land Mobile Network, VPLMN) AMF judges whether it currently belongs to this scenario, and if it does, step S26 is performed. Otherwise, do not re-fetch.
  • HPLMN Home Public Land Mobile Network
  • UDM Unified Data Management
  • AMF Mobility Management Function
  • Step S26 the VPLMN AMF requests the HPLMN UDM to obtain EXT-SOR related information.
  • the network side device in a specific application scenario, it may also be determined whether the terminal supports the EXT-SOR capability through subscription information, and the specific process is as follows:
  • Step S31 after receiving the registration request message, the VPLMN AMF judges whether the UE supports the EXT-SOR capability according to the subscription information of the UE;
  • step S32 If there is no subscription information of the UE in the VPLMN AMF, first obtain the subscription information of the UE from the HPLLMN UDM; if the UE does not support the EXT-SOR function, stop the EXT-SOR related behavior, otherwise, perform step S32;
  • Step S32 AMF decides how to obtain EXT-SOR related information
  • step S32 is equivalent to the above-mentioned steps S23 to S26.
  • the 5GMM (5G System Mobility Management, 5G System Mobility Management) capability in the notification message is used to indicate to the network side device that the terminal supports the EXT-SOR capability; in specific application scenarios , the 5GMM capability is shown in the IE with an IEI of 10 in Table 7:
  • the purpose of the 5GMM capability information element is to provide the network with information about the UE aspects related to 5GCN or interworking with EPS. Content may affect how the network handles UE operations.
  • the coding of the 5GMM capability information element is shown in Table 8, wherein, the 5GMM capability is a type 4 information element with a minimum length of 3 octets and a maximum length of 15 octets.
  • the EXT-SOR capability (octet 5, bit 5): when it is 0, it means that the EXT-SOR capability is not supported, and when it is 1, it means that the EXT-SOR capability is supported.
  • the notification message in this embodiment of the present application includes at least one of the following: a registration request message, an uplink non-transport layer transmission message, and a protocol data unit session message.
  • the method for determining whether there is a target service in the currently executed service according to the first information involved in step 12 in the above method 1) includes one of the following:
  • the terminal judges, according to the first information, whether there is a target service in the service currently executed by the terminal;
  • the terminal judges whether there is a target service in the currently executed service according to the first information, and/or the subscription information saved by the terminal, and/or the target service agreed between the terminal and the network side device, and/or the target service defined by the terminal .
  • the terminal can only judge whether there is a target service in the currently executed service according to the first information, and can further determine whether there is a target service in combination with other methods, such as the target service agreed between the terminal and the network side device.
  • the method for the terminal to release the service currently executed by the terminal involved in step S204 in the embodiment of the present application may further include:
  • Step S204-11 the terminal immediately releases the service currently executed by the terminal according to the instruction of the first information.
  • Step S204-12 Release the service currently executed by the terminal after a preset time period according to the indication of the first information.
  • step S204-12 may further include: the terminal starts a timer according to the indication of the first information, and releases the service currently executed by the terminal when the timer expires.
  • the terminal can immediately release the service currently executed by the terminal, or can release the service after a period of time determined by a timer.
  • the method steps of the embodiments of the present application may further include:
  • Step S208 before the timer expires, the terminal receives the second information corresponding to the EXT-SOR sent by the network side device, where the second information is the updated information of the first information;
  • Step S210 the terminal stops running the timer and uses the second information to cover the first information, and determines whether there is a target service in the services currently executed by the terminal according to the second information; or, the terminal discards the second information, and when the timer expires Next, the service currently executed by the terminal is released according to the first information.
  • the network side device can continue to send the information corresponding to the EXT-SOR to the terminal. Overwrite the previous information, which is determined by the terminal itself. Because the target service indicated by the information corresponding to the EXT-SOR received later may be different.
  • the method may further include: the terminal according to the subscription information saved by the terminal, and/or the target service agreed between the terminal and the network side device, and /or the target service defined by the terminal independently determines whether the target service exists in the currently executed service.
  • the method for the terminal to release the service currently executed by the terminal may further include: the terminal determines to release the service currently executed by the terminal immediately; or, the terminal determines to release the service currently executed by the terminal after a self-defined preset time period .
  • the manner of releasing the service currently executed by the terminal after the preset time period may further include: the terminal determines to start a timer, and releases the service currently executed by the terminal when the timer expires.
  • the method steps of the embodiments of the present application may further include:
  • Step S212 in the case that the target service exists in the currently executed service, determine whether the service of the target service has ended;
  • Step S214 when the target service service ends, it is determined that the target service does not exist in the currently executed service.
  • the target service exists in the currently executed service, it needs to be determined that the target service does not exist in the currently executed service before the target service is completed. For example, if the target service It is a high-priority service. If there is a high-priority service in the currently executed service, it means that the terminal currently has a relatively important service that needs to be executed, and cannot perform network transfer. It can only wait for the currently executed high-priority service. After the end, it indicates that the more important business service ends, and the currently executed business is not an important business, and the network transfer can be performed.
  • the method steps of the embodiments of the present application may further include:
  • Step S216 the terminal determines whether the visited public land mobile network VPLMN in the network side equipment is changed;
  • the terminal can delete the first information or continue to determine whether there is a target service in the currently executed service according to the first information.
  • the specific method can be determined according to the actual situation.
  • the method in this embodiment of the present application may further include:
  • Step S220 performing security detection on the first information; wherein, the security detection includes integrity detection and/or decryption detection;
  • Step S222 in the case of passing the first information security check, determine whether the VPLMN in the network side device is changed;
  • Step S224 in the case that the VPLMN in the network side device is not changed, send feedback information to the network side device, where the feedback information is used to indicate that the terminal receives the first information.
  • the method of sending feedback information to the network side device involved in step S224 may further include:
  • Step S224-11 adding protection to the feedback information; wherein, the protection includes integrity protection and/or encryption protection;
  • Step S224-12 Send the protected feedback information to the network side device through a registration end message or an uplink non-access stratum transmission message.
  • the terminal it is necessary for the terminal to perform security detection on the received first information, because the first information sent by the network side device may be information with low security, that is, it may be based on security Misuse of lower information for network transfer. Similarly, for the terminal side, the feedback information sent to the network side device also needs to be protected to ensure the security of the feedback information.
  • the key used for the protection is generated in the authentication process between the UE and the network, and can be confirmed in the security process; the protection can use the KDF algorithm, for example, the checksum is generated by the KDF algorithm.
  • the terminal is instructed to receive the first information through SOR header-new or EXT-SOR header-new in the feedback information; wherein, the SOR header-new is as shown in Table 9 shown;
  • the SOR header-new contains information that can indicate that the UE has successfully received the EXT-SOR feedback to the network, as shown in Table 10:
  • EXT-SOR data type when the EXT-SOR data type is 0, it indicates that the EXT-SOR transparent container carries the extended control of roaming information.
  • EXT-SOR data type When the EXT-SOR data type is 1, it indicates that the EXT-SOR transparent container bears the confirmation of the successful reception of the roaming information extension control.
  • SOR-MAC-IUE-new Checksum after integrity protection is performed on SOR header-new information.
  • EXT-SOR header-new is shown in Table 11;
  • the EXT-SOR header-new contains information that can indicate that the UE has successfully received the information corresponding to the EXT-SOR feedback to the network, as shown in Table 12:
  • EXT-SOR data type when the EXT-SOR data type is 0, it indicates that the EXT-SOR transparent container carries the extended control of roaming information.
  • EXT-SOR data type When the EXT-SOR data type is 1, it indicates that the EXT-SOR transparent container bears the confirmation of the successful reception of the roaming information extension control.
  • EXT-SOR-MAC-IUE-new the checksum after integrity protection is performed on the EXT-SOR header-new information
  • EXT-SOR transparent container IEI the cell identification corresponding to the new container EXT-SOR transparent container identification
  • the method steps in the embodiment of the present application may further include:
  • Step S226, the terminal saves the first information in the user service identification module USIM or the mobile equipment ME.
  • the method steps of the embodiments of the present application may further include:
  • Step S228, the terminal exchanges the first information with the user through the AT interface.
  • the way that the terminal exchanges the first information with the user through the AT interface may be:
  • the terminal can exchange EXT-SOR-related information with the USER through the AT interface; that is, the user can query the UE for EXT-SOR-related information through the AT interface; it is also possible to set whether the UE actively reports the EXT-SOR through the AT interface Changes to SOR-related information.
  • the terminal can display the EXT-SOR information received by the UE to the user through the AT interface, and can also display the EXT-SOR information saved in the UE to the user through the AT interface;
  • the UE can actively show it to the user, for example, every time it receives the EXT-SOR related information of the network side device, it can show it to the user, or it can feed back the EXT-SOR related information to the user when the user queries;
  • the EXT-SOR related information may also include information such as the target PLMN to which the network side device wants the UE to be transferred.
  • the steps of the registration process include:
  • Step S301 the UE can check the EXT-SOR capability of the UE, and if it supports the EXT-SOR capability, it will carry an indication in the REG REQ message: the UE supports the EXT-SOR capability; if not, the indication will not be carried;
  • the UE may not check the EXT-SOR capability of the UE, that is, the indication that "UE supports the EXT-SOR capability" is not sent to the network side device in the air interface message, but the network side device is based on the subscription saved by the network side device.
  • the UE and HPLMN UDM need to store the subscription information of the UE and the network side equipment, such as: the EXT-SOR capability of the UE, and/or whether the UE requires in some scenarios such as the registration process
  • the network side device returns EXT-SOR related information;
  • Step S302 the UE sends a registration request message to the network side device
  • Step S303 complete mutual authentication and key negotiation between the network side device and the UE;
  • the network side device After receiving the registration request message from the UE, the network side device triggers the authentication and key negotiation process.
  • the authentication includes the network side equipment's judgment of the legitimacy of the terminal, and the terminal's judgment of the network side equipment's legitimacy; the authentication can be completed by 5G-AKA, or EAP-AKA' algorithm;
  • the network side device and the terminal can negotiate a key KEY1, which will be used in the next EXT-SOR transmission and inspection; the key KEY1 is reserved in HPLMN and UE respectively;
  • the UE or the network side device finds that the reliability of the identity of the other party cannot be confirmed, the subsequent EXT-SOR process is stopped, and the registration process is ended.
  • the UE and the network side device mutually confirm the reliability of each other's identity, negotiate a key, and determine to use the key subsequently, continue to 104;
  • Step S304 the VPLMN AMF judges whether it is necessary to obtain the EXT-SOR related information of the UE from the HPLMN UDM
  • judgment process can also include:
  • VPLMN AMF can assist in judgment according to the operator's configuration
  • Step S305 the VPLMN AMF requests the HPLMN UDM for EXT-SOR related information of the UE, such as subscription information; or, the VPLMN AMF provides the HPLMN UDM with related information, including: UE ID (identity identifier of the terminal), requests EXT-SOR related information The indication of the information, the current location information of the UE, such as geographic location, PLMN ID (identity of the home public land mobile network), TA, CELL, etc.;
  • the EXT-SOR related information of the UE can be requested from the HPLMN UDM using the interface Nudm_SDM_Get;
  • Step S306 HPLMN UDM prepares EXT-SOR related information
  • HPLMN UDM prepares EXT-SOR related information
  • the HPLMN UDM decides to perform the EXT-SOR function on the UE after judgment; the judgment can be based on the subscription information of the UE, or based on the configuration information of the HPLMN, the current load, etc.;
  • the HPLMN UDM can determine whether to provide the UE's EXT-SOR-related information independently, or obtain it through the network-side device function EXT-SOR-AF; the determination can be based on HPLMN's policies, such as whether HPLMN has called EXT -SOR-AF policy; the judgment can also be based on the current configuration, such as whether EXT-SOR-AF is configured on the HPLMN face;
  • step S307 If the HPLMN UDM is obtained through EXT-SOR-AF, then go to step S307; if the HPLMN UDM itself determines the EXT-SOR related information of the UE, go to step S310;
  • the HPLMN UDM decides not to perform the EXT-SOR function on the UE temporarily, for example, if the HPLMN cannot calculate the EXT-SOR-related information by itself temporarily, it cannot obtain the EXT-SOR-related information from the EXT-SOR-AF temporarily. , the UE is notified in a certain way, indicating that the HPLMN does not require the UE to perform the EXT-SOR function.
  • This method may include: 1) information related to EXT-SOR may not be returned to the UE, 2) information indicating "HPLMN does not require UE to perform EXT-SOR function" may be returned; when HPLMN UDM wishes to notify UE to update EXT-SOR after registration SOR-related information can be processed through the EXT-SOR update process.
  • Step S307 HPLMN UDM requests EXT-SOR-related information from EXT-SOR-AF;
  • HPLMN UDM when HPLMN UDM requests EXT-SOR-AF for EXT-SOR-related information, it can provide: UE ID, an indication of requesting EXT-SOR-related information, carrying the current location information of the UE, such as geographic location, VPLMN ID, TA, CELL, etc.;
  • Step S308, EXT-SOR-AF prepares EXT-SOR related information for HPLMN UDM
  • the EXT-SOR-related information prepared by EXT-SOR-AF for HPLMN UDM can be in plain text or a protected data packet 1, and the protected data packet 1 can only be accessed by certain network-side devices. Only trusted components can be parsed, such as USIM, or an encryption and decryption program saved in ME;
  • Step S309 EXT-SOR-AF sends EXT-SOR related information to HPLMN UDM;
  • Step S310 HPLMN UDM decides to protect EXT-SOR related information
  • One purpose of the protection is to avoid tampering by the VPLMN; once the VPLMN is tampered, the UE can identify the tampering when deprotecting.
  • the PLMN where the current UE is located is a VPLMN, or an untrusted network-side device or area;
  • the EXT-SOR-related information can be plaintext EXT-SOR-related information, It can also be protected EXT-SOR related information, such as packet 1;
  • Step S311 HPLMN UDM sends EXT-SOR related information to the functional unit responsible for protecting the data, such as AUSF;
  • Step S312 the authentication server function (Authorization Server Function, AUSF) protects the received EXT-SOR;
  • AUSF Authorization Server Function
  • the protection algorithm will use the key negotiated in step S303;
  • Step S314 the HPLMN UDM sends the protected EXT-SOR related information to the VPLMN AMF;
  • Step S315 the VPLMN AMF forwards the protected EXT-SOR related information to the UE;
  • the VPLMN AMF puts the protected EXT-SOR related information into the registration success message, that is, the REGISTRATION ACCEPT message;
  • Step S316 the UE processes the protected EXT-SOR related information
  • the UE After receiving the REGISSTRATION ACCEPT message, the UE processes the protected EXT-SOR related information;
  • Step S317 the UE feeds back REGISTRATION COMPLETE
  • the UE checks and finds that the VPLMN has not tampered with or discarded the protected EXT-SOR-related information, the UE feeds back the received EXT-SOR-related information to the HPLMN, and the feedback information can be included in the REGISTRATION COMPLETE;
  • VPLMN AMF After VPLMN AMF receives it, if it finds that there is EXT-SOR confirmation information in the REGISTRATION COMPLETE message, it decides to forward the confirmation information to HPLMN UDM;
  • Step S319 VPLMN AMF forwards this confirmation information to HPLMN UDM;
  • Step S320 HPLMN UDM checks the confirmation information of EXT-SOR
  • Step S321 HPLMN UDM forwards this confirmation information to EXT-SOR-AF;
  • the HPLMN UDM forwards the confirmation information to the EXT-SOR-AF;
  • Step S322 the EXT-SOR-AF checks the EXT-SOR confirmation information
  • EXT-SOR-AF can resend EXT-SOR-related information; after reaching the number of retransmissions, it can be considered that the VPLMN is unreliable, and the UE is required to leave the current VPLMN, for example, from the current VPLMN. DE-REGISTRATION registration in VPLMN.
  • the EXT-SOR information determined by the network side device can also reside in the HPLMN.
  • the HPLMN since the HPLMN is credible, when the HPLMN indicates the EXT-SOR related information to the UE,
  • the form of protection can be adopted, that is, the EXT-SOR-related information is acquired in the same manner as when the UE resides in the VPLMN; at this time, the process is the same as the registration process of the CAMP (residence) in the VPLMN. That is, the unprotected form and unprotected form can also be used, which means that the HPLMN UDM sends the EXT-SOR related information to the HPLMN AMF in the form of plaintext.
  • the HPLMN AMF sends it to the UE in the air interface NAS message.
  • the HPLMN AMF will decide whether to perform security protection on the NAS message, such as encryption and integrity protection, according to the existing protocol requirements. As shown in Figure 4, the registration process includes:
  • Step S401 when the UE resides on the HPLMN, it initiates registration to complete authentication and security;
  • Step S402 AMF judges whether to request EXT-SOR related information from UDM
  • steps S403 to S407 are the same as steps S305 to S309;
  • Step S408 the UDM determines that the UE is currently in the HPLMN, and decides not to protect the EXT-SOR related information;
  • Step S409 UDM sends unprotected EXT-SOR related information to HPLMN AMF;
  • Step S410 the HPLMN AMF puts the unprotected EXT-SOR related information into the registration success message and sends it to the UE;
  • the UE judges that it can accept the information related to the unprotected EXT-SOR;
  • EXT-SOR-related information is the same as steps S504 to S512; if it is necessary to feed back the EXT-SOR-related information to HPLMN UDM, the plaintext of the feedback information can be placed in the registration end message and sent to the network.
  • the UE may further include:
  • Step S501 the UE receives the NAS message sent by the network
  • Step S502 the UE checks whether the NAS message contains EXT-SOR-related information; if the UE finds that the network does not provide EXT-SOR-related parameters, it does not perform the EXT-SOR function; at this time, the UE may consider that the network does not want the UE to perform the EXT-SOR function.
  • This function can also be considered as VPLMN; if it contains EXT-SOR related information, go to step S503;
  • Step S503 the UE performs a security check on the information related to the EXT-SOR to determine whether the VPLMN has tampered with the EXT-SOR;
  • step S503-11 If the security check is successful, go to step S503-11; otherwise, go to step S513;
  • Step S503-11 the UE checks whether the PLMN where the UE is currently located is a qualified PLMN.
  • the current PLMN is a qualified PLMN, for example, it is not HPLMM, EHPLMN, User Controlled PLMN Selector with Access Technology, enter S503-13, and check the conditions of the network selection mode;
  • the current PLMN is not a qualified PLMN, for example, HPLMM or EHPLMN or User Controlled PLMN Selector with Access Technology, go to step S503-12;
  • a qualified PLMN for example, HPLMM or EHPLMN or User Controlled PLMN Selector with Access Technology
  • Step S503-12 the UE saves the received EXT-SOR related information
  • the EXT-SOR-related information can continue to be valid, or it can be considered invalid;
  • the EXT-SOR-related information can continue to be valid or deleted;
  • Step S503-13 the UE checks whether the current network selection mode of the UE is an automatic network selection mode, and if it is currently in the automatic network selection mode, then enters step S504; if it is in the manual network selection mode, then save the received EXT-SOR related information, not implemented for the time being;
  • step S503-11 If the UE enters the automatic network selection mode from the manual network selection mode, it needs to enter step S503-11 again;
  • the subsequent behavior 1 of the UE may include:
  • Step S504 the UE checks whether the EXT-SOR needs to be sent to the USIM or a special program for analysis, and if necessary, executes step S505; otherwise, writes the relevant information after deprotection of the EXT-SOR into the ME, and then executes step S506;
  • the UE is in the VPLMN, the UE is in the automatic network selection mode, and the security check of the EXT-SOR is not restricted in order, as long as these conditions are satisfied at the same time.
  • Step S505 a special program such as the USIM parses the EXT-SOR related information, sends the parsed EXT-SOR related information to the UE, and then executes step S506;
  • Step S506 the UE uses this parameter to check whether the UE currently has a service being executed that belongs to high priority; if so, execute step S507, otherwise execute step S507;
  • the UE can also use the standard defined by the UE itself to check whether there is a high-priority service. For example, the UE considers that a certain service being executed is a high-priority service, and the service may not be within the scope of the high-priority service determined by the network. ;
  • the standard defined by the UE itself may be user-defined or predefined by the UE; if it is user-defined, the user can query, set, and modify the EXT-SOR related parameters saved in the UE, Delete operation; the UE can also actively report to the user when this parameter changes; the user's operation on the EXT-SOR related parameters in the UE can be an AT command interface, an API interface, or other message interfaces;
  • Step S507 the UE saves the EXT-SOR related information. If the UE currently has EXT-SOR-related information, it will overwrite the original EXT-SOR-related information; when the UE saves the EXT-SOR-related information, it can save its corresponding current VPLMN information, such as VPLMN ID; Indicates that the EXT-SOR related information was received under the VPLMN;
  • Step S508 the UE can continue to apply the EXT-SOR-related information saved by the UE after the high priority on going service ends, regardless of whether the PLMN where the UE is located has changed;
  • the UE finds that the PLMN is changed during the execution of the high-priority service, it may consider that the information related to the EXT-SOR received under the previous PLMN continues to be valid; it may also be invalid;
  • Step S509 whether the UE currently has an ongoing service that does not belong to a high priority. If yes, go to S510, if no, the UE releases the connection, enters the IDLE state, and executes step S512;
  • Step S510 the UE calculates the time required to stop the current service, and determines the duration of the timer TIMER1; the duration may be set to a default value, or may be determined by the UE according to implementation (based on UE implementation), or may be negotiated with the network, or The network can give indication information in the air interface message, and the UE further determines the duration of the timer TIMER1 according to the indication information; it can also limit a maximum value, and the duration cannot be greater than this maximum value;
  • Step S511 after the timer expires, the UE checks and satisfies all the above conditions, releases the current service, releases the NAS signaling connection, enters the IDLE state, and executes step S512; if not, continues this step.
  • Scenario 1 If there are high-priority services in the services currently executed by the terminal, it is necessary to determine whether the high-priority services have ended. The service of the current terminal is released.
  • Scenario 2 If the current terminal has only low-priority services, after "all the above conditions are met", the services of the current terminal are released.
  • Scenario 3 If the current terminal has only a low-priority service, during the running of the timer in "Meet all the above conditions", the terminal stops the low-priority service, and the service can also be released.
  • Scenario 4 If the current terminal only has low-priority services, and if it enters a non-compliant PLMN while the terminal is performing low-priority services, the terminal stops the timer and accesses step S503.
  • Step S512 the UE selects a network; wherein, the method for selecting a network may be: sorting and selecting a network, or selecting a target network specified by the network;
  • Step S513 if the security detection fails, it is determined that the current VPLMN network has tampered with the EXT-SOR related information, and it can also be determined that the reliability of the current VPLMN is reduced, and the UE sets the current VPLMN network as the lowest priority;
  • the UE can immediately release the connection and search for other networks; if there is no other available network, it will register on the current network;
  • the UE After the UE finds that the VPLMN has tampered with the EXT-SOR related information, it can report the event to the user, or it can not tell the user.
  • FIG. 5 is a flowchart 2 of the network transfer method according to the embodiment of the present application, as shown in FIG. 5 . , the steps of the method include:
  • Step S602 the network side device generates first information corresponding to the EXT-SOR
  • Step S604 the network side device sends first information to the terminal; wherein the first information indicates that the service with the target information is the target service.
  • the target information in this embodiment of the present application may include at least one of the following: the type of the target service, the name of the target service, the number of the target service, the target network slice selection assistance information S-NSSAI, the target data network name DNN , target 5QI, target protocol data unit PDU session request type, target IP address, target packet filter.
  • the method for generating the first information for the network side device involved in step S502 may further include: the home public land mobile network unified data management HPLMN UDM network element in the network side device Generate first information.
  • the network side device involved in step S604 to send the first information to the terminal may further include:
  • Step S604-11 the HPLMN UDM network element in the network side device sends the first information to the AMF network element in the network side device;
  • Step S604-12 the AMF network element in the network side device transparently transmits the first information to the terminal.
  • the AMF network element in the network side device transparently transmits the first information to the terminal through at least one of the following: a transparent transmission container of SOR and a transparent transmission container of EXT-SOR.
  • the transparent transmission container of the EXT-SOR includes at least one of the following: EXT-SOR information 1, EXT-SOR information 2, and EXT-SOR security information.
  • the method further includes: the HPLMN UDM network element in the network side device sends the authentication server in the network side device to the authentication server.
  • the functional AUSF network element performs protection on the first information.
  • the method further includes: the network-side device sends the second information corresponding to the EXT-SOR to the terminal. information.
  • the update process includes:
  • Step S701 the UE completes registration in the VPLMN
  • Step S702 the HPLMN determines that the information related to the EXT-SOR needs to be updated
  • Step S703 HPLMN prepares EXT-SOR related information; if HPLMN UDM obtains through EXT-SOR-AF, then enter step S703;
  • Step S704 HPLMN UDM requests EXT-SOR information from SOR-AF;
  • Step S705 SOR-AF determines EXT-SOR information
  • Step S707 HPLMN UDM protects the EXT-SOR information
  • Step S708 HPLMN UDM sends EXT-SOR information to AUSF;
  • Step S709 the AUSF protects the EXT-SOR information
  • Step S710 the AUSF sends the protected EXT-SOR information to the HPLMN UDM;
  • Step S711 the HPLMN UDM sends the updated EXT-SOR related information after the protection to the VPLMN AMF;
  • Step S712 the VPLMN AMF transparently transmits the received protected updated EXT-SOR related information to the UE through a NAS message.
  • a NAS message For example, through the MM message, through the DL NAS TRANSPORT (downlink non-access stratum transport) message.
  • VPLMN AMF cannot change the EXT-SOR-related information of the protected update;
  • Step S713 after receiving the protected and updated EXT-SOR-related information, the UE first performs a security check on the information, such as an integrity check;
  • Step S714 if it is necessary to feed back to the network the UE successfully received the updated EXT-SOR-related information, the feedback information can be protected, and then sent to the network in an uplink non-access stratum (Non Access Stratum, NAS) message, For example, UL NAS TRANSPORT (upstream non-access stratum transport) message;
  • NAS Non Access Stratum
  • UL NAS TRANSPORT upstream non-access stratum transport
  • Step S717 HPLMN UDM checks the confirmation message
  • steps S715 to S718 in this flow are the same as steps S318 to S321 in FIG. 3 .
  • EXT-SOR related information resides in the HPLMN. That is, when the UE resides and registers in the HPLMN, the HPLMN is credible. At this time, when the HPLMN indicates the EXT-SOR-related information to the UE, it can be protected in the form of protection, that is, it is updated in the same way as when the UE resides in the VPLMN. EXT-SOR related information; at this time, the process is the same as the registration process residing in the VPLMN; the UE can also be notified by transmitting unprotected EXT-SOR related information. After receiving it, the UE saves the information related to the EXT-SOR. This parameter will be used when the UE camps on a qualifying VPLMN.
  • the execution subject may be a network transfer device, or a control module in the network transfer device for executing the network transfer method.
  • the network transfer device provided by the embodiment of the present application is described by taking the network transfer device for performing the network transfer method as an example.
  • FIG. 7 is a schematic structural diagram 1 of a network transfer device according to an embodiment of the present application. As shown in FIG. 7 , the device includes:
  • an acquisition module 72 configured to acquire the service currently executed by the terminal
  • a release module 74 configured to release the service currently executed by the terminal when the target service does not exist in the service currently executed by the terminal;
  • the executing module 76 is configured to execute network transfer to the terminal after releasing the service currently executed by the terminal.
  • the apparatus in this embodiment of the present application may further include:
  • a first receiving module configured to receive the first information corresponding to the extended roaming control EXT-SOR sent by the network side device
  • the first determination module is configured to determine whether there is a target service in the currently executed service according to the first information; wherein the first information is used to indicate that the service with the target information is the target service.
  • the first receiving module may further include: a first sending unit for sending a notification message to the network side device; wherein the notification message is used for notifying the network side device that the terminal supports the EXT-SOR capability; a receiving unit for receiving The first information corresponding to the EXT-SOR sent by the network side device.
  • the notification message includes at least one of the following: a registration request message, an uplink non-transport layer transmission message, and a protocol data unit session message.
  • the first determination module in the embodiment of the present application includes one of the following: a first determination unit, used for determining whether there is a target service in the services currently executed by the terminal according to the first information; information, and/or subscription information saved by the terminal, and/or target service agreed between the terminal and the network side device, and/or target service defined by the terminal to determine whether there is a target service in the currently executed service.
  • the release module 74 in this embodiment of the present application may further include: a first release unit, configured to immediately release the service currently executed by the terminal according to the indication of the first information; The information indicates that the service currently executed by the terminal is released after a preset time period.
  • the second release unit is further configured to start a timer according to the indication of the first information, and release the service currently executed by the terminal when the timer expires.
  • the apparatus in this embodiment of the present application may further include: a second determination module, configured to autonomously determine whether a target service exists in the currently executed service.
  • a second determination module configured to autonomously determine whether a target service exists in the currently executed service.
  • the second determining module is also used for the terminal to independently determine whether there is a currently executed service according to the subscription information saved by the terminal, and/or the target service agreed between the terminal and the network side device, and/or the target service defined by the terminal. target business.
  • the release module in the embodiment of the present application may further include: a third release unit, used for determining to immediately release the service currently executed by the terminal; or, a fourth release unit, used for determining a user-defined preset time period. Afterwards, the service currently executed by the terminal is released.
  • the fourth release unit is further configured to determine to start the timer, and release the service currently executed by the terminal when the timer expires.
  • the apparatus in this embodiment of the present application may further include: a second receiving module, configured to receive second information corresponding to the EXT-SOR sent by the network side device before the timer expires, where the second information is the first information after the information is updated; a first processing module, configured to stop running the timer and use the second information to cover the first information, and determine whether there is a target service in the services currently executed by the terminal according to the second information; or, discard the second information information and release the service currently executed by the terminal according to the first information when the timer expires.
  • a second receiving module configured to receive second information corresponding to the EXT-SOR sent by the network side device before the timer expires, where the second information is the first information after the information is updated
  • a first processing module configured to stop running the timer and use the second information to cover the first information, and determine whether there is a target service in the services currently executed by the terminal according to the second information; or, discard the second information information and release the service currently executed by the terminal according to the
  • the apparatus of this embodiment of the present application may further include: a third determination module, configured to determine whether the target service has ended if the target service exists in the currently executed service; a fourth determination module, configured to When the business service ends, it is determined that the target business does not exist in the currently executed business.
  • the apparatus of this embodiment of the present application may further include: a fifth determination module, configured to determine whether the VPLMN of the visited public land mobile network in the network side device is changed; a second processing module, configured to, when the VPLMN is changed, The first information is deleted or whether there is a target service in the currently executed service is determined according to the first information.
  • a fifth determination module configured to determine whether the VPLMN of the visited public land mobile network in the network side device is changed
  • a second processing module configured to, when the VPLMN is changed, The first information is deleted or whether there is a target service in the currently executed service is determined according to the first information.
  • the apparatus in this embodiment of the present application may further include: a detection module, configured to perform security detection on the first information after receiving the first information sent by the network side device; wherein the security detection includes an integrity check and/or decryption detection; the sixth determination module is used to determine whether the VPLMN in the network side device is changed when the first information security detection is passed; the first sending module is used for the VPLMN in the network side device In the case of modification, feedback information is sent to the network side device, where the feedback information is used to indicate that the terminal receives the first information.
  • a detection module configured to perform security detection on the first information after receiving the first information sent by the network side device
  • the security detection includes an integrity check and/or decryption detection
  • the sixth determination module is used to determine whether the VPLMN in the network side device is changed when the first information security detection is passed
  • the first sending module is used for the VPLMN in the network side device
  • feedback information is sent to the network side device, where the feedback information is used to indicate that the terminal receive
  • the first sending module may further include: an adding protection unit for adding protection to the feedback information; wherein, adding protection includes integrity protection and/or encryption protection; a second sending unit, for adding protection to The feedback information is sent to the network side device through a registration end message or an uplink non-access stratum transmission message.
  • the apparatus in this embodiment of the present application may further include: a saving module, configured to save the first information in the user service identification module USIM or the mobile equipment ME after receiving the first information.
  • a saving module configured to save the first information in the user service identification module USIM or the mobile equipment ME after receiving the first information.
  • the apparatus in this embodiment of the present application may further include: an interaction module, configured to interact with the user the first information through an AT interface.
  • an interaction module configured to interact with the user the first information through an AT interface.
  • the target information in this embodiment of the present application includes at least one of the following: the type of the target service, the name of the target service, the number of the target service, the target S-NSSAI, the target DNN, the target 5QI, and the request type of the target PDU session. , destination IP address, destination packet filter.
  • the first receiving module receives the first information sent by the network side device through at least one of the following bearers: a transparent transmission container of SOR and a transparent transmission container of EXT-SOR.
  • the transparent transmission container of the EXT-SOR includes at least one of the following: EXT-SOR information 1, EXT-SOR information 2, and EXT-SOR security information.
  • the 5GMM capability is used to indicate to the network side device that the terminal supports the EXT-SOR capability.
  • the terminal is instructed to receive the first information through SOR header-new or EXT-SOR header-new in the feedback information.
  • the target service is a service with a service priority higher than a preset priority.
  • FIG. 8 is a schematic structural diagram 2 of the network transfer device according to the embodiment of the present application. , as shown in Figure 8, the device includes:
  • a generating module 82 configured to generate the first information corresponding to the EXT-SOR
  • the second sending module 84 is configured to send first information to the terminal, wherein the first information indicates that the service with target information is the target service.
  • the target information includes at least one of the following:
  • Type of target service name of target service, number of target service, target network slice selection auxiliary information S-NSSAI, target data network name DNN, target 5QI, target protocol data unit PDU session request type, target network interconnection protocol IP Address, destination packet filter.
  • the generating module 82 in this embodiment of the present application may further include: an HPLMN UDM network element, configured to generate the first information.
  • the second sending module 84 in this embodiment of the present application may further include: an HPLMN UDM network element, configured to send the first information to the AMF network element; and the AMF network element, used to transparently transmit the first information to the terminal.
  • an HPLMN UDM network element configured to send the first information to the AMF network element
  • the AMF network element used to transparently transmit the first information to the terminal.
  • the AMF network element transparently transmits the first information to the terminal through at least one of the following: a transparent transmission container of SOR and a transparent transmission container of EXT-SOR.
  • the transparent transmission container of the EXT-SOR includes at least one of the following: EXT-SOR information 1, EXT-SOR information 2, and EXT-SOR security information.
  • the apparatus in this embodiment of the present application may further include: an HPLMN UDM network element, configured to protect the first information to the AUSF network element before the HPLMN UDM network element sends the first information to the AMF network element.
  • an HPLMN UDM network element configured to protect the first information to the AUSF network element before the HPLMN UDM network element sends the first information to the AMF network element.
  • the apparatus in this embodiment of the present application may further include: a second sending module, further configured to send the second information corresponding to the EXT-SOR to the terminal after the network side device sends the first information to the terminal; and/ Or, the third receiving module is configured to receive the protected feedback information sent by the terminal, and perform deprotection on the feedback, wherein the feedback information is used to indicate that the terminal receives the first information.
  • a second sending module further configured to send the second information corresponding to the EXT-SOR to the terminal after the network side device sends the first information to the terminal
  • the third receiving module is configured to receive the protected feedback information sent by the terminal, and perform deprotection on the feedback, wherein the feedback information is used to indicate that the terminal receives the first information.
  • the terminal can release the service currently executed by the terminal when there is no target service in the currently executed service, and then transfer the network.
  • the target service is a high-priority service, it can be a If there is no high-priority service in the currently executed service, the currently executed service is released and the network is transferred; in addition, the target service can also be one or more services specified by the terminal, that is, if the terminal is currently executing the service in the In the absence of one or more of these specified services, it is also possible to release the currently executed services and perform network transfer, thereby solving the problem that the terminal will continue to reside on the current network in the case of the existing unimportant services in the prior art. The problem of not being able to transfer the network.
  • the network transfer device in this embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal.
  • the device may be a mobile terminal or a non-mobile terminal.
  • the mobile terminal may include, but is not limited to, the types of terminals 11 listed above, and the non-mobile terminal may be a server, a network attached storage (NAS), a personal computer (personal computer, PC), a television ( television, TV), teller machine, or self-service machine, etc., which are not specifically limited in the embodiments of the present application.
  • the network transfer device in this embodiment of the present application may be a device with an operating system.
  • the operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
  • the network transfer apparatus provided in this embodiment of the present application can implement each process implemented by the method embodiment in FIG. 2 or FIG. 5 , and achieve the same technical effect. To avoid repetition, details are not described here.
  • an embodiment of the present application further provides a communication device 900, including a processor 901, a memory 902, a program or instruction stored in the memory 902 and executable on the processor 901,
  • a communication device 900 including a processor 901, a memory 902, a program or instruction stored in the memory 902 and executable on the processor 901
  • the communication device 900 is a terminal
  • the program or instruction is executed by the processor 901
  • each process of the foregoing network transfer method embodiment can be implemented, and the same technical effect can be achieved.
  • the communication device 900 is a network side device, when the program or instruction is executed by the processor 901, each process of the foregoing network transfer method embodiment can be achieved, and the same technical effect can be achieved. To avoid repetition, details are not described here.
  • FIG. 10 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
  • the terminal 100 includes but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110 and other components .
  • the terminal 100 may also include a power source (such as a battery) for supplying power to various components, and the power source may be logically connected to the processor 110 through a power management system, so as to manage charging, discharging, and power consumption through the power management system management and other functions.
  • a power source such as a battery
  • the terminal structure shown in FIG. 10 does not constitute a limitation on the terminal, and the terminal may include more or less components than those shown in FIG. 10 , or combine some components, or arrange different components, which will not be repeated here.
  • the input unit 104 may include a graphics processor (Graphics Processing Unit, GPU) 1041 and a microphone 1042. Such as camera) to obtain still pictures or video image data for processing.
  • the display unit 106 may include a display panel 1061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 107 includes a touch panel 1071 and other input devices 1072 .
  • the touch panel 1071 is also called a touch screen.
  • the touch panel 1071 may include two parts, a touch detection device and a touch controller.
  • Other input devices 1072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which are not described herein again.
  • the radio frequency unit 101 receives the downlink data from the network side device, and then processes it to the processor 110; in addition, sends the uplink data to the network side device.
  • the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • Memory 109 may be used to store software programs or instructions as well as various data.
  • the memory 109 may mainly include a storage program or instruction area and a storage data area, wherein the stored program or instruction area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.) and the like.
  • the memory 109 may include a high-speed random access memory, and may also include a non-volatile memory, wherein the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM) , PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • ROM Read-Only Memory
  • PROM programmable read-only memory
  • PROM erasable programmable read-only memory
  • Erasable PROM Erasable PROM
  • EPROM electrically erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory for example at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
  • the processor 110 may include one or more processing units; optionally, the processor 110 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, application programs or instructions, etc., Modem processors mainly deal with wireless communications, such as baseband processors. It can be understood that, the above-mentioned modulation and demodulation processor may not be integrated into the processor 110 .
  • the network device 1100 includes: an antenna 111 , a radio frequency device 112 , and a baseband device 113 .
  • the antenna 111 is connected to the radio frequency device 112 .
  • the radio frequency device 112 receives information through the antenna 111, and sends the received information to the baseband device 113 for processing.
  • the baseband device 113 processes the information to be sent and sends it to the radio frequency device 112
  • the radio frequency device 112 processes the received information and sends it out through the antenna 111 .
  • the above-mentioned frequency band processing apparatus may be located in the baseband apparatus 113 , and the method performed by the network side device in the above embodiments may be implemented in the baseband apparatus 113 .
  • the baseband apparatus 113 includes a processor 114 and a memory 115 .
  • the baseband device 113 may include, for example, at least one baseband board on which multiple chips are arranged, as shown in FIG. 11 , one of the chips is, for example, the processor 114 , which is connected to the memory 115 to call the program in the memory 115 to execute
  • the network devices shown in the above method embodiments operate.
  • the baseband device 113 may further include a network interface 116 for exchanging information with the radio frequency device 112, and the interface is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network-side device in the embodiment of the present invention further includes: instructions or programs stored in the memory 115 and executable on the processor 114, and the processor 114 invokes the instructions or programs in the memory 115 to execute the modules shown in FIG. 8 .
  • Embodiments of the present application further provide a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, each process of the foregoing network transfer method embodiment can be achieved, and can achieve The same technical effect, in order to avoid repetition, will not be repeated here.
  • the processor is the processor in the terminal described in the foregoing embodiment.
  • the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
  • An embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a network-side device program or instruction to realize the above-mentioned network transfer
  • the chip includes a processor and a communication interface
  • the communication interface is coupled to the processor
  • the processor is used to run a network-side device program or instruction to realize the above-mentioned network transfer
  • the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.
  • An embodiment of the present application further provides a program product, where the program product is stored in a non-volatile readable storage medium, and the program product is executed by at least one processor to implement each process of the foregoing network transfer method embodiment, And can achieve the same technical effect, in order to avoid repetition, it is not repeated here.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种网络的转移方法、终端及网络侧设备。其中,该方法包括:终端获取所述终端当前执行的业务;所述终端在所述终端当前执行的业务中不存在目标业务的情况下,释放所述终端当前执行的业务;所述终端在释放所述终端当前执行的业务后,执行对所述终端的网络转移。

Description

网络的转移方法、终端及网络侧设备
相关申请的交叉引用
本申请主张在2020年8月10日在中国提交的中国专利申请号No.202010797349.8的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种网络的转移方法、终端及网络侧设备。
背景技术
现有技术中,若用户设备(User Equipment,UE)当前有一些持续的不重要的业务,例如业务优先级较低的业务,UE会持续驻留在当前的网络,无法实现网络希望的将UE的业务转移到目标网络,导致无法及时调整网络运营和通信资源浪费。
发明内容
本申请实施例提供了一种网络的转移方法、终端及网络侧设备,能够解决现有技术中终端当前存在不重要的业务的情况下,终端会持续驻留在当前的网络无法实现网络的转移的问题。
第一方面,提供了一种网络的转移方法,包括:终端获取所述终端当前执行的业务;所述终端在所述终端当前执行的业务中不存在目标业务的情况下,释放所述终端当前执行的业务;所述终端在释放所述终端当前执行的业务后,执行对所述终端的网络转移。
第二方面,提供了一种网络的转移装置,包括:获取模块,用于获取终端当前执行的业务;释放模块,用于在所述终端当前执行的业务中不存在目标业务的情况下,释放所述终端当前执行的业务;执行模块,用于在释放所述终端当前执行的业务后,执行对所述终端的网络转移。
第三方面,提供了一种网络的转移方法,包括:网络侧设备生成与扩展 的漫游控制(Extended Steering of Roaming,EXT-SOR)对应的第一信息;所述网络侧设备向终端发送所述第一信息;其中,所述第一信息指示具有目标信息的业务为所述目标业务。
第四方面,提供了一种网络的转移装置,包括:生成模块,用于生成与EXT-SOR对应的第一信息;第二发送模块,用于向终端发送所述第一信息;其中,所述第一信息指示具有目标信息的业务为所述目标业务。
第五方面,提供了一种终端,该终端包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第六方面,提供了一种网络侧设备,该网络侧设备包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面所述的方法的步骤。
第七方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤。
第八方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行网络侧设备程序或指令,实现如第一方面所述的方法,或实现如第三方面所述的方法。
在本申请实施例中,终端可以在当前执行的业务中不存在目标业务的情况下,释放终端当前执行的业务,进而进行网络的转移,如果该目标业务是高优先级业务,则可以是在终端当前执行的业务中不存在高优先级业务的情况下,释放当前执行的业务并进行网络转移;此外,该目标业务也可以是终端指定的一个或多个业务,即如果终端当前执行的业务中不存在这些指定的一个或多个业务,也是可以释放当前执行的业务并进行网络转移,从而解决了现有技术中终端当前存在不重要的业务的情况下,终端会持续驻留在当前的网络无法实现网络的转移的问题。
附图说明
图1示出本申请实施例可应用的一种无线通信系统的框图;
图2是本申请实施例的网络的转移方法流程图一;
图3是本申请实施例的网络侧设备决定EXT-SOR的信息驻留在VPLMN的注册流程图;
图4是本申请实施例的网络侧设备决定EXT-SOR的信息驻留在HPLMN的注册流程图;
图5是本申请实施例的网络的转移方法流程图二;
图6是本申请实施例的络侧设备需要更新与EXT-SOR对应的信息流程图;
图7是本申请实施例的网络的转移装置结构示意图一;
图8是本申请实施例的网络的转移装置结构示意图二;
图9是本申请实施例的通信设备的结构示意图;
图10为实现本申请实施例的一种终端的硬件结构示意图;
图11是本申请实施例的网络侧设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、 时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency-Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。然而,以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,尽管这些技术也可应用于NR系统应用以外的应用,如第6代(6 th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11也可以称作终端设备或者用户终端(User Equipment,UE),终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、可穿戴式设备(Wearable Device)或车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)等终端侧设备,可穿戴式设备包括:手环、耳机、眼镜等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以是基站或核心网,其中,基站可被称为节点B、演进节点B、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、B节点、演进型B节点(eNB)、家用B节点、家用演进型B节点、WLAN接入点、WiFi节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例,但是并不限定基站的具体类型。
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的网络的转移方法进行详细地说明。
本申请实施例提供了一种网络的转移方法,图2是本申请实施例的网络 的转移方法流程图一,如图2所示,该方法的步骤包括:
步骤S202,终端获取终端当前执行的业务;
步骤S204,终端在终端当前执行的业务中不存在目标业务的情况下,释放终端当前执行的业务;
步骤S206,终端在释放终端当前执行的业务后,执行对终端的网络转移。
通过本申请实施例中的上述步骤S202至步骤S206,终端可以在当前执行的业务中不存在目标业务的情况下,释放终端当前执行的业务,进而进行网络的转移,如果该目标业务是高优先级业务,则可以是在终端当前执行的业务中不存在高优先级业务的情况下,释放当前执行的业务并进行网络转移;此外,该目标业务也可以是终端指定的一个或多个业务,即如果终端当前执行的业务中不存在这些指定的一个或多个业务,也是可以释放当前执行的业务并进行网络转移,从而解决了现有技术中终端当前存在不重要的业务的情况下,终端会持续驻留在当前的网络无法实现网络的转移的问题。
在本申请实施例的具体应用场景中,本申请实施例中的目标业务优选为业务优先级高于预设优先级的业务。
可选地,在本申请实施例中对于终端确定当前执行的业务中是否存在目标业务的方式,可以包括如下两种方式:
方式1)根据网络侧设备发送的EXT-SOR对应的第一信息来确定,具体步骤如下:
步骤S11,终端接收网络侧设备发送的扩展的漫游控制EXT-SOR对应的第一信息;
步骤S12,终端根据第一信息确定当前执行的业务中是否存在目标业务;其中,第一信息用于指示具有目标信息的业务为目标业务。
方式2)终端自主确定当前执行的业务中是否存在目标业务。
也就是说,在本申请实施例中,对于终端确定当前执行的业务中是否存在目标业务的方式,可以由终端自主确定当前执行的业务中是否存在目标业务的方式,也可以是由网络侧设备所发送的信息来确定。
对于上述方式1),在本申请实施例的可选实施方式中,该第一信息中的目标信息包括以下至少一项:目标业务的类型、目标业务的名称、目标业务 的号码、目标单个网络切片选择辅助信息(Single Network Slice Selection Assistance Information,S-NSSAI)、目标数据网络名称(Data Network Name,DNN)、目标5G服务质量标识(5G Quality of Service Identifier,5QI)、目标PDU会话的请求类型、目标网际互连协议(Internet Protocol,IP)地址、目标分组过滤器。
也就是说,属于目标S-NSSAI的协议数据单元(Protocol Data Unit,PDU)会话上的业务属于高优先级业务;连接到目标数据网络(DNN/APN)的业务属于高优先级业务;属于目标5QI的业务属于高优先级业务;某些PDU SESSION的Request type信息;使用目标PDU SESSION的Request type建立起来的PDU SESSION的业务属于高优先级业务,例如“initial emergency request”,“existing emergency PDU session”,“MA PDU request”。PDU SESSION的IP地址目标某些IP地址的PDU SESSION属于高优先级业务;UE的目标通信IP地址属于哪些地址范围的业务属于高优先级业务;包含目标Packet filter的PDU SESSION/QOS FLOW上的业务属于高优先级业务。
此外,对于上述方式1)需要说明的是,终端接收网络侧设备通过以下至少之一承载发送的第一信息:SOR的透传容器、EXT-SOR的透传容器(EXT-SOR transparent container)。其中,SOR的透传容器或EXT-SOR的透传容器包括以下至少一项:EXT-SOR信息1、EXT-SOR信息2、EXT-SOR的安全信息。
如表1所示,IEI为73的IE为SOR的透传容器;
Figure PCTCN2021111505-appb-000001
Figure PCTCN2021111505-appb-000002
表1
需要说明的是,SOR透明容器是类型6信息元素,最小长度为20个八位位组,如表2和表3所示,其中,包括EXT-SOR的信息1和EXT-SOR的信息2:
Figure PCTCN2021111505-appb-000003
表2
Figure PCTCN2021111505-appb-000004
表3
其中,上述表2和表3指示SOR(transparent container information element)携带经过保护的EXT-SOR相关的信息。其中,EXT-SOR信息1和信息2为新增的承载EXT-SOR相关的信息中的部分信息,如指示高优先级业务的信息;SOR header-new、SOR-MAC-IAUSF-new、CounterSOR-new为需要修改的部分,需要修改为能指示SOR transparent container IE中包含了EXT-SOR信息1(经过USIM等保护的EXT-SOR相关的信息)或EXT-SOR信息2(未经过USIM等保护的EXT-SOR相关的信息),以及相关的安全信息,如表4所示:
Figure PCTCN2021111505-appb-000005
表4
其中,是否携带EXT-SOR信息(octet 4,bit 6):
0表示SOR transparent container不携带EXT-SOR信息;
1表示SOR transparent container携带EXT-SOR信息;
另外,SOR-MAC-IAUSF-new的计算也对应SOR transparent container IE的内容。即SOR transparent container IE中若携带EXT-SOR,则SOR-MAC-IAUSF-new的计算过程也包含了EXT-SOR;SOR transparent container IE若不携带EXT-SOR,则SOR-MAC-IAUSF-new的计算过程就不包含EXT-SOR;
CounterSOR-new也对应SOR transparent container IE的内容。即,SOR transparent container IE中若携带EXT-SOR,则SOR-MAC-IAUSF-new的计算过程也体现了EXT-SOR的存在(或传输);SOR transparent container IE若不携带EXT-SOR,则SOR-MAC-IAUSF-new的计算过程就不体现EXT-SOR的存在(或传输)。
如表5所示,IE中还包括EXT-SOR的透传容器;
Figure PCTCN2021111505-appb-000006
Figure PCTCN2021111505-appb-000007
表5
其中,EXT-SOR的透传容器用于携带EXT-SOR相关的信息的IE,如携带EXT-SOR信息1或2,同时可以携带EXT-SOR的安全信息,如MAC,counter,等。如表6所示:
Figure PCTCN2021111505-appb-000008
表6
其中,EXT-SOR header指示EXT-SOR的特征,如:是网络发给UE的EXT-SOR信息,还是UE发给网络的EXT-SOR信息;EXT-SOR信息的有效范围,如是否有时间限制,是否有PLMN限制,等;
EXT-SOR-MAC-1表示对EXT-SOR信息1或2执行完整性保护算法后生成的校验和;
CounterEXT-SOR表示对EXT-SOR信息1或2执行完整性保护算法所需要的计数值。
在本申请实施例的可选实施方式中,基于上述方式1),上述步骤S11中 涉及到的接收网络侧设备发送的扩展的漫游控制EXT-SOR对应的第一信息的方式,进一步可以包括:
步骤S11-1,终端向网络侧设备发送通知消息;其中,通知消息用于向网络侧设备通知终端支持EXT-SOR能力;
步骤S11-2,终端接收网络侧设备发送的与EXT-SOR对应的第一信息。
对于上述步骤S11-1中涉及到的终端向网络侧设备发送通知消息的方式,对于网络侧设备而言,在具体应用场景中以注册请求消息向网络侧设备通知终端支持EXT-SOR能力为例,其过程包括:
步骤S21,网络侧设备检查终端发来的注册请求消息中是否指示了“UE支持EXT-SOR能力”。若指示了,执行步骤S23,否则执行步骤22.
步骤S22,网络侧设备确定终端不支持EXT-SOR功能;
步骤S23,网络侧设备确定终端支持EXT-SOR功能。VPLMN AMF需要从HPLMN获取该UE的EXT-SOR相关的信息;
步骤S24,AMF判断:自己是否已有最新的EXT-SOR相关的信息;若已有了,执行步骤S25;若没有,执行步骤S26;
步骤S25,有些特殊场景下,如初始注册,紧急注册等,归属公用陆地移动网络(Home Public Land Mobile Network,HPLMN)统一数据管理(Unified Data Management,UDM)可以要求接入移动性管理功能(Access and Mobility Management Function,AMF)从HPLMN UDM那么重新获取EXT-SOR相关的信息。因此,访问(Visited Public Land Mobile Network,VPLMN)AMF判断当前是否属于这种场景,若属于,则执行步骤S26。否则,则不再重新获取。
步骤S26,VPLMN AMF向HPLMN UDM请求获取EXT-SOR相关的信息。
在本申请实施例的另一个可选实施方式中,对于网络侧设备而言,在具体应用场景中还可以是通过签约信息来判断终端是否支持EXT-SOR能力,具体过程如下:
步骤S31,收到注册请求消息后,VPLMN AMF根据该UE的签约信息判断UE是否支持EXT-SOR能力;
若该VPLMN AMF中没有该UE的签约信息,则先从HPLLMN UDM获 取该UE的签约信息;若UE不支持EXT-SOR功能,则停止EXT-SOR相关行为,否则,执行步骤S32;
步骤S32,AMF决定怎样获取EXT-SOR相关的信息;
需要说明的是,步骤S32的具体过程与上述步骤S23到步骤S26相当。
需要说明的是,在通知消息中通过5GMM(5G System Mobility Management,5G系统移动性管理)capability(能力)中用于向所述网络侧设备指示所述终端支持EXT-SOR能力;在具体应用场景中,该5GMM capability如表7中的IEI为10的IE所示:
Figure PCTCN2021111505-appb-000009
Figure PCTCN2021111505-appb-000010
表7
此外,5GMM能力信息元素的目的是向网络提供有关与5GCN有关或与EPS互通的UE方面的信息。内容可能会影响网络处理UE操作的方式。
5GMM能力信息元素的编码如表8所示,其中,5GMM能力是类型4信息元素,其最小长度为3个八位位组,最大长度为15个八位位组。
Figure PCTCN2021111505-appb-000011
表8
其中,EXT-SOR能力(octet 5,bit 5):在为0时表示不支持EXT-SOR能力,在为1时表示支持EXT-SOR能力。
可选地,本申请实施例中的通知消息包括以下至少一项:注册请求消息、上行非传输层传输消息、协议数据单元会话消息。
可选地,在本申请实施例中,对于上述方式1)中步骤12中涉及到的根据第一信息确定当前执行的业务中是否存在目标业务的方式包括以下之一:
(1)终端根据第一信息判断终端当前执行的业务中是否存在目标业务;
(2)终端根据第一信息,和/或终端保存的签约信息,和/或终端与网络侧设备约定的目标业务,和/或终端自定义的目标业务判断当前执行的业务中是否存在目标业务。
也就是说,终端可以只根据第一信息判断当亲执行的业务中是否存在目标业务,可以进一步结合其他方式来确定,如终端与网络侧设备约定的目标业务等。
本申请实施例的可选实施方式中,对于本申请实施例中的步骤S204中涉及到的终端释放终端当前执行的业务的方式,进一步可以包括:
步骤S204-11,终端根据第一信息的指示立刻释放终端当前执行的业务;或,
步骤S204-12,根据第一信息的指示在预设时间段后释放终端当前执行的业务。
其中,对于步骤S204-12进一步可以是包括:终端根据第一信息的指示启动定时器,在定时器超时的情况下释放终端当前执行的业务。
通过上述步骤S204-11和步骤S204-12,终端可以立刻释放终端当前执行的业务也可以通过定时器来确定一段时间后再释放。
在本申请实施例的可选实施方式中,本申请实施例的方法步骤还可以进一步包括:
步骤S208,终端在定时器超时之前,接收网络侧设备发送的与EXT-SOR对应的第二信息,其中,第二信息为第一信息更新后的信息;
步骤S210,终端停止运行定时器并使用第二信息覆盖第一信息,以及根据第二信息确定终端当前执行的业务中是否存在目标业务;或,终端丢弃第 二信息,并在定时器超时的情况下根据第一信息释放终端当前执行的业务。
通过上述步骤S208和步骤S210可知,网络侧设备可以持续向终端发送与EXT-SOR对应的信息,至于终端在接收到多个与EXT-SOR对应的信息后,是否需要用后接收到的信息来覆盖前面的信息,由终端自行确定。因为后接收到的与EXT-SOR对应的信息所指示的目标业务可能不尽相同。
对于上述方式2)中涉及到的终端自主确定当前执行的业务中是否存在目标业务的方式,进一步可以包括:终端根据终端保存的签约信息,和/或终端与网络侧设备约定的目标业务,和/或终端自定义的目标业务自主确定当前执行的业务中是否存在目标业务。
基于上述方式2),对于终端释放终端当前执行的业务的方式,可以进一步包括:终端确定立刻释放终端当前执行的业务;或,终端确定在自定义的预设时间段后释放终端当前执行的业务。
基于上述方式2),在预设时间段后释放终端当前执行的业务的方式进一步可以包括:终端确定启动定时器,并在定时器超时的情况下释放终端当前执行的业务。
在本申请实施例的可选实施方式中,本申请实施例的方法步骤还可以进一步包括:
步骤S212,在当前执行的业务中存在目标业务的情况下,确定目标业务是否服务结束;
步骤S214,在目标业务服务结束的情况下,确定当前执行的业务中不存在目标业务。
通过上述步骤S212和步骤S214可知,如果当前执行的业务中存在目标业务的情况下,则需要在确定目标业务服务结束后,才会确定当前执行的业务中不存在目标业务,例如,如果目标业务为高优先级的业务,则当前执行的业务中存在高优先级的业务的情况下,说明终端当前有较为重要的业务需要执行,不能进行网络的转移,只有等当前执行的高优先级业务服务结束之后,说明较为重要的业务服务结束,当前执行的业务不是重要业务,则可以进行网络转移。
基于上述方式1),本申请实施例的方法步骤还可以包括:
步骤S216,终端确定网络侧设备中的拜访公用陆地移动网VPLMN是否变更;
步骤S218,终端在VPLMN变更的情况下,删除第一信息或根据第一信息确定当前执行的业务中是否存在目标业务。
通过上述步骤S216和步骤S218可知,如果VPLMN变更,终端可以删除第一信息也可以继续根据第一信息确定当前执行的业务中是否存在目标业务,具体采用哪种方式,可以根据实际情况进行确定。
基于上述方式1),在接收网络侧设备发送的第一信息之后,本申请实施例的方法还可以包括:
步骤S220,对第一信息进行安全性检测;其中,安全性检测包括指完整性检查和/或解密检测;
步骤S222,在第一信息安全性检测通过的情况下,确定网络侧设备中的VPLMN是否变更;
步骤S224,在网络侧设备中的VPLMN未变更的情况下,向网络侧设备发送反馈信息,其中,反馈信息用于指示终端接收到第一信息。
其中,对于步骤S224中涉及到的向网络侧设备发送反馈信息的方式进一步可以包括:
步骤S224-11,对反馈信息进行加保护;其中,加保护包括指完整性保护和/或加密保护;
步骤S224-12,将加保护后的反馈信息通过注册结束消息或上行非接入层传输消息发送给网络侧设备。
通过上述步骤S220至步骤S224,对于终端而言需要对接收到的第一信息进行安全性检测,因为网络侧设备发送的第一信息有可能是安全性较低的信息,即有可能根据安全性较低信息进行网络转移的误操作。同样地,对于终端侧而言,也需要将向网络侧设备发送的反馈信息进行加保护,以确保反馈信息的安全性。
需要说明是,该保护所使用的密钥在UE和网络之间的鉴权过程中产生,可以在安全过程中确认;保护可以采用KDF算法,例如通过KDF算法生成校验和。
在本申请实施例的具体应用场景中,在所述反馈信息中通过SOR header-new或EXT-SOR header-new指示所述终端接收到所述第一信息;其中,SOR header-new如表9所示;
Figure PCTCN2021111505-appb-000012
表9
其中,SOR header-new,其中包含能指示UE向网络反馈成功收到了与EXT-SOR对应的信息,如表10所示:
Figure PCTCN2021111505-appb-000013
表10
其中,EXT-SOR data type为0的情况下,指示EXT-SOR透明容器承载漫游信息的扩展控制。EXT-SOR data type为1的情况下,指示EXT-SOR透明容器承载成功接收漫游信息扩展控制的确认。
此外,SOR-MAC-IUE-new:对SOR header-new信息执行完整性保护后的校验和。
其中,EXT-SOR header-new如表11所示;
Figure PCTCN2021111505-appb-000014
表11
其中,EXT-SOR header-new,其中包含能指示UE向网络反馈成功收到了与EXT-SOR对应的信息,如表12所示:
Figure PCTCN2021111505-appb-000015
表12
其中,EXT-SOR data type为0的情况下,指示EXT-SOR透明容器承载漫游信息的扩展控制。EXT-SOR data type为1的情况下,指示EXT-SOR透明容器承载成功接收漫游信息扩展控制的确认。
此外,EXT-SOR-MAC-IUE-new:对EXT-SOR header-new信息执行完整性保护后的校验和;EXT-SOR transparent container IEI:该新容器EXT-SOR transparent container对应的信元识别标识;
在本申请实施例的可选实施方式中,在接收第一信息之后,本申请实施例中的方法步骤还可以包括:
步骤S226,终端保存第一信息到用户业务识别模块USIM或移动设备ME中。
在本申请实施例中的另一个可选实施方式中,本申请实施例的方法步骤还可以包括:
步骤S228,终端通过AT接口与用户交互第一信息。
其中,终端通过AT接口与用户交互第一信息的方式,在具体应用场景中可以是:
(1)终端可以通过AT接口与USER交互EXT-SOR相关的信息;也就是说,用户可以通过AT接口向UE查询EXT-SOR相关的信息;也可以通过AT接口设定UE是否主动上报EXT-SOR相关的信息的变更。
(2)终端可以通过AT接口把UE收到的EXT-SOR的信息向用户展示(show),也可以通过AT接口把UE中保存的EXT-SOR的信息向用户展示;
(3)UE可以主动向用户展示,例如每次收到网络侧设备的EXT-SOR相关的信息时都展示给用户,也可以在用户查询时,向用户反馈EXT-SOR相关的信息;其中,该EXT-SOR相关的信息也可以包含网络侧设备希望UE转移到的目标PLMN等信息。
下面对本申请实施例中整个的注册流程进行举例说明,以网络侧设备决定EXT-SOR的信息驻留在VPLMN的注册流程为例进行说明,如图3所示,该注册流程的步骤包括:
步骤S301,UE可以检查UE的EXT-SOR能力,若支持EXT-SOR能力,则在REG REQ消息中携带指示:UE支持EXT-SOR能力;若不支持,则不携带该指示;
需要说明的是,UE也可以不检查UE的EXT-SOR能力,即“UE支持EXT-SOR能力”的指示不在空口消息中发给网络侧设备,而由网络侧设备根 据网络侧设备保存的签约信息来判断;此时需要UE和HPLMN UDM中保存有该UE和网络侧设备的签约信息,例如:该UE的EXT-SOR能力,和/或该UE在某些场景下如注册过程中是否要求网络侧设备返回EXT-SOR相关的信息;
步骤S302,UE向网络侧设备发送注册请求消息;
步骤S303,网络侧设备与UE之间完成互相鉴权和密钥协商;
网络侧设备收到UE的注册请求消息后,触发鉴权和密钥协商过程。该鉴权包括网络侧设备对终端合法性的判断,和终端对网络侧设备合法性的判断;该鉴权可以用5G-AKA,或EAP-AKA'算法来完成;
在鉴权过程中,网络侧设备和终端可以协商出密钥KEY1,该密钥KEY1在接下来的EXT-SOR传输和检查时将被使用;该密钥KEY1分别保留在HPLMN和UE中;
若鉴权过程中,UE或网络侧设备发现无法确认对方身份的可信性,则停止后续的EXT-SOR过程,结束注册过程。
若鉴权过程中,UE和网络侧设备互相确认了对方身份的可靠性,并且协商出了密钥,并确定后续使用该密钥,则继续104;
步骤S304,VPLMN AMF判断是否需要向HPLMN UDM获取该UE的EXT-SOR相关的信息
此外,判断过程还可以包括:
VPLMN AMF可以根据运营商的配置来协助判断;
若需要向HPLMN UDM获取该UE的EXT-SOR相关的信息,则执行105;
若不需要向HPLMN UDM获取该UE的EXT-SOR相关的信息,则按现有注册过程执行;
步骤S305,VPLMN AMF向HPLMN UDM请求该UE的EXT-SOR相关的信息,如签约信息;或,VPLMN AMF向HPLMN UDM提供相关信息,包括:UE ID(终端的身份标识),请求EXT-SOR相关的信息的指示,UE当前的位置信息,例如地理位置,PLMN ID(归属公用陆地移动网络的标识),TA,CELL等;
可以使用接口Nudm_SDM_Get向HPLMN UDM请求该UE的EXT-SOR 相关的信息;
步骤S306,HPLMN UDM准备EXT-SOR相关的信息;
其中,HPLMN UDM准备EXT-SOR相关的信息;
(1)HPLMN UDM经判断后决定对该UE执行EXT-SOR功能;该判断可以基于该UE的签约信息,也可以基于HPLMN的配置信息,当前负载等;
HPLMN UDM可以判断决定是自己独立提供该UE的EXT-SOR相关的信息,还是通过网络侧设备功能EXT-SOR-AF来获取;其中,该判断可以基于HPLMN的策略等,例如HPLMN是否有调用EXT-SOR-AF的策略(policy);该判断也可以基于当前的配置,例如HPLMN当面有没有配置EXT-SOR-AF;
若HPLMN UDM通过EXT-SOR-AF来获取,则进入步骤S307;若HPLMN UDM自己决定该UE的EXT-SOR相关的信息,则进入步骤S310;
(2)若HPLMN UDM决定暂时不对该UE执行该EXT-SOR功能,例如:若HPLMN暂时自己无法计算出EXT-SOR相关的信息,暂时也无法从EXT-SOR-AF获取EXT-SOR相关的信息,则通过某种方式通知UE,指示HPLMN不要求UE执行EXT-SOR功能。该方式可以包括:1)可以不给UE返回EXT-SOR相关的信息,2)或返回指示“HPLMN不要求UE执行EXT-SOR功能”的信息;当HPLMN UDM在注册后希望通知UE更新EXT-SOR相关的信息时,可以通过EXT-SOR更新过程来处理。
步骤S307,HPLMN UDM向EXT-SOR-AF请求EXT-SOR相关的信息;
其中,HPLMN UDM向EXT-SOR-AF请求EXT-SOR相关的信息时可以提供:UE ID,请求EXT-SOR相关的信息的指示,携带UE当前的位置信息,例如地理位置,VPLMN ID,TA,CELL等;
步骤S308,EXT-SOR-AF为HPLMN UDM准备EXT-SOR相关的信息;
其中,EXT-SOR-AF为HPLMN UDM准备的该EXT-SOR相关的信息可以是明文,也可以是一种经过保护的数据包1,该经过保护的数据包1只有通过某些网络侧设备可以信赖的组件才能解析,例如USIM,或ME中保存的某加解密程序;
步骤S309,EXT-SOR-AF把EXT-SOR相关的信息发给HPLMN UDM;
步骤S310,HPLMN UDM决定对EXT-SOR相关的信息进行保护;
其中,该保护的一个目的是为了避免VPLMN对其进行篡改;一旦VPLMN篡改,UE在进行解保护时能识别出来该篡改。
该决定可以经过判断后做的决定,例如,当前UE所在的PLMN是VPLMN,或者某个不可信的网络侧设备或区域;该EXT-SOR相关的信息可以是明文的EXT-SOR相关的信息,也可以是经过保护的EXT-SOR相关的信息,如数据包1;
步骤S311,HPLMN UDM把EXT-SOR相关的信息发给负责对该数据进行保护的功能单元,例如AUSF;
步骤S312,认证服务器功能(Authorization Server Function,AUSF)对收到的EXT-SOR进行保护;
其中,保护算法将使用步骤S303中协商得到的密钥;
步骤S313,AUSF把保护后的EXT-SOR相关的信息发给HPLMN UDM;
步骤S314,HPLMN UDM把保护后的EXT-SOR相关的信息发给VPLMN AMF;
步骤S315,VPLMN AMF把保护后的EXT-SOR相关的信息转发给UE;
其中,VPLMN AMF把保护后的EXT-SOR相关的信息放进注册成功消息中,即REGISTRATION ACCEPT消息中;
步骤S316,UE对该保护后的EXT-SOR相关的信息进行处理;
其中,UE收到REGISTRATION ACCEPT消息后,对该保护后的EXT-SOR相关的信息进行处理;
步骤S317,UE反馈REGISTRATION COMPLETE;
其中,若UE检查发现VPLMN没有篡改或丢弃保护后的EXT-SOR相关的信息,则UE向HPLMN反馈收到了EXT-SOR相关的信息,该反馈信息可以包含在REGISTRATION COMPLETE中;
步骤S318,VPLMN AMF判断UE发来的消息中是否有该确认收到了EXT-SOR对应的信息;
其中,VPLMN AMF收到后,若发现REGISTRATION COMPLETE消息中有EXT-SOR的确认信息,则决定把该确认信息转发给HPLMN UDM;
步骤S319,VPLMN AMF把该确认信息转发给HPLMN UDM;
步骤S320,HPLMN UDM检查EXT-SOR的确认信息;
步骤S321,HPLMN UDM给EXT-SOR-AF转发此确认信息;
其中,若EXT-SOR-AF要求UE确认收到了EXT-SOR相关的信息,则HPLMN UDM给EXT-SOR-AF转发此确认信息;
步骤S322,EXT-SOR-AF对此EXT-SOR确认信息进行check;
其中,若成功,流程结束;若失败,EXT-SOR-AF可以重新发送EXT-SOR相关的信息;在达到重发次数要求后,可以认为该VPLMN不可靠,要求UE离开当前VPLMN,例如从当前VPLMN中的DE-REGISTRATION注册。
需要说明的是,网络侧设备决定EXT-SOR的信息还可以驻留在HPLMN,当UE在HPLMN驻留时,由于HPLMN是可信的,此时HPLMN给UE指示EXT-SOR相关的信息时,可以采用保护的形式,即与UE驻留在VPLMN时采用相同的方式获取EXT-SOR相关的信息;此时流程同CAMP(驻留)在VPLMN的注册流程。即也可以采用无保护的形式,无保护的形式,指HPLMN UDM采用明文的形式把EXT-SOR相关的信息发给HPLMN AMF。然后HPLMN AMF再在空口NAS消息中发给UE。HPLMN AMF将根据现有协议要求决定是否对该NAS消息进行安全保护,如加密和加完整性保护。如图4所示,其注册流程包括:
步骤S401,UE驻留在HPLMN时,发起注册,完成鉴权和安全;
步骤S402,AMF判断是否向UDM请求EXT-SOR相关的信息;
需要说明的是,步骤S403至S407与步骤S305至步骤S309是相同的;
步骤S408,UDM确定UE当前在HPLMN,决定不对EXT-SOR相关的信息进行保护;
步骤S409,UDM把无保护的EXT-SOR相关的信息发给HPLMN AMF;
步骤S410,HPLMN AMF把无保护的EXT-SOR相关的信息放进注册成功消息中,发给UE;
UE根据自己当前在HPLMN中,判断为:可以接受无保护的EXT-SOR相关的信息;
其中,对EXT-SOR相关的信息的处理同步骤S504~S512;若需要给HPLMN UDM反馈收到了EXT-SOR相关的信息,则可以把该反馈信息的明 文放在注册结束消息中发给网络。
在本申请实施例的具体应用场景中,基于上述步骤S301至步骤S322,对于UE对网络发来的EXT-SOR对应的信息的处理过程,还可以包括:
步骤S501,UE收到网络发来的NAS消息;
步骤S502,UE检查该NAS消息中是否包含EXT-SOR相关的信息;若UE发现网络没有提供EXT-SOR相关的参数,则不执行EXT-SOR功能;此时,UE可以认为网络不希望UE执行此功能,也可以认为VPLMN;若包含了EXT-SOR相关的信息,执行步骤S503;
步骤S503,UE对EXT-SOR相关的信息进行security check,以判断VPLMN是否对该EXT-SOR做了篡改;
若安全检查成功,进入步骤S503-11;否则进入步骤S513;
步骤S503-11,UE检查UE当前所处的PLMN是否符合条件的PLMN。
若当前所处的PLMN是符合条件的PLMN,例如,不是HPLMM,EHPLMN,User Controlled PLMN Selector with Access Technology,进入S503-13,检查选网模式的条件;
若当前所处的PLMN非符合条件的PLMN,例如,是HPLMM或EHPLMN或User Controlled PLMN Selector with Access Technology,进入步骤S503-12;
步骤S503-12,UE保存收到的EXT-SOR相关的信息;
其中,若当前的PLMN发生变更,即从非符合条件的PLMN进入其他的非符合条件的PLMN,EXT-SOR相关的信息可以继续有效,也可以被认为无效;
若当前的PLMN发生变更,即从非符合条件的PLMN进入符合条件的PLMN,EXT-SOR相关的信息可以继续有效,也可以删除;
步骤S503-13,UE检查UE当前的选网模式是否自动选网模式,当前若处于自动选网模式,则进入步骤S504;若处于手动选网模式,则保存收到EXT-SOR相关的信息,暂不执行;
若UE从手动选网模式进入自动选网模式,需要再次进入步骤S503-11;
并可以进一步检查:当前自动选网模式下的VPLMN是否是收到当前保存的EXT-SOR的那个VPLMN;并根据该检查结果进一步决定UE的后续行 为1。该UE的后续行为1可以包括:
1)若当前的VPLMN是接收当前保存的EXT-SOR的那个VPLMN,那么认为当前保存的EXT-SOR继续有效;
2)若当前的VPLMN不再是接收当前保存的EXT-SOR的那个VPLMN,那么认为当前保存的EXT-SOR继续有效;
3)若当前的VPLMN不再是接收当前保存的EXT-SOR的那个VPLMN,那么认为当前保存的EXT-SOR失效;
步骤S504,UE检查该EXT-SOR是否需要发给USIM或某专用程序进行解析,若需要,执行步骤S505;否则,把EXT-SOR解保护后的相关信息写进ME,然后执行步骤S506;
其中,进入S504前的几个条件检查:UE处于VPLMN,UE处于自动选网模式,EXT-SOR的安全检查,顺序不做限制,同时满足这几个条件即可。
步骤S505,USIM等专用程序解析EXT-SOR相关的信息,把解析后的EXT-SOR相关的信息发给UE,然后执行步骤S506;
步骤S506,UE使用该参数检查,UE当前是否有属于high priority的正在执行的业务;若有执行步骤S507,否则执行步骤S507;
其中,UE还可以补充使用UE自己定义的标准来检查是否有高优先级业务,例如UE认为某个正在执行的业务是高优先级业务,该业务可以不在网络认定的高优先级业务的范围内;
该UE自己定义的标准可以是用户自定义的,也可以是UE事先定义的;其中,若是用户自定义的,则用户可以对UE中保存的该EXT-SOR相关参数进行查询,设置,修改,删除操作;UE也可以在此参数发生变更时主动上报给用户;用户对UE中该EXT-SOR相关参数的操作可以时AT命令接口,也可以是API接口,或其他消息接口;
步骤S507,UE保存该EXT-SOR相关的信息。若UE当前已保存有EXT-SOR相关的信息,则覆盖原有EXT-SOR相关的信息;UE保存该EXT-SOR相关的信息时,可以保存其对应的当前的VPLMN的信息,如VPLMN ID;指示该EXT-SOR相关的信息是在该VPLMN下收到的;
步骤S508,UE可以等high priority on going业务结束后,再继续应用UE 保存的EXT-SOR相关的信息,无论UE所处的PLMN是否发生变更;
UE若发现高优先级业务执行过程发生PLMN变更,可以认为在前一个PLMN下收到EXT-SOR相关的信息继续有效;也可以失效;
步骤S509,UE当前是否有不属于高优先级的正在执行的业务。若有,进入S510,若没有,UE释放连接,进入IDLE态,执行步骤S512;
步骤S510,UE计算停止当前业务所需的时间,确定定时器TIMER1的时长;该时长可以设置为缺省值,也可以由UE根据实现决定(based on UE implementation),也可以与网络协商,也可以网络在空口消息中给以指示信息,UE根据该指示信息进一步确定定时器TIMER1的时长;也可以限定一个最大值,时长不能大于这个最大值;
若当前定时器没有正在运行的话,启动定时器TIMER1;
若定时器TIMER运行期间,若发生当前的服务PLMN变更,则可以:认为当前存储的EXT-SOR相关的信息无效;或认为当前存储的EXT-SOR相关的信息仍然有效,然后根据步骤S503-11中的原则进行判断;
步骤S511,该定时器超时后,UE检查并满足上述所有条件后,释放当前业务,并释放NAS信令连接,进入IDLE态,执行步骤S512;若不满足,则继续本步骤。
其中,所述“满足上述所有条件”是指满足:EXT-SOR成功通过了安全检查;当前PLMN为User Controlled PLMN Selector with Access Technology的VPLMN;无高优先级业务;自动选网模式;定时器时长满足了要求;
对于该步骤S511中释放当前业务,包括以下场景:
场景1:如果终端当前执行的业务中存在高优先级业务,需要确定高优先级业务是否服务结束,如优先级业务降级或高优先级业务停止,则可以在“满足上述所有条件”后,对当前终端的业务进行释放。
场景2:如果当前终端只有低优先级业务,则在“满足上述所有条件”后,对当前终端的业务进行释放。
场景3:如果当前终端只有低优先级业务,则在“满足上述所有条件”中的定时器运行期间,终端停止了该低优先级业务,则也可以进行业务的释放。
场景4:如果当前终端只有低优先级业务,如果在终端执行低优先级业务 期间进入不符合PLMN,则终端停止定时器并接入步骤S503。
步骤S512,UE进行选网;其中,选网的方式可以是:排序选网,或选择到网络指定的目标网络;
步骤S513,若安全性检测失败,则确定当前VPLMN网络篡改了EXT-SOR相关的信息,也可以确定当前的VPLMN的可信度降低,UE将当前VPLMN网络设置为最低优先级;
UE可以立刻释放连接,并搜索其他网络;若没有其他可用的网络,再在当前网络上驻留注册;
UE发现VPLMN篡改了EXT-SOR相关的信息后,可用将该事件报告给用户,也可以不告诉用户。
上述图2是终端侧对本申请进行说明的,下述将从网络侧对本申请中的网络的转移方法进行说明,图5是本申请实施例的网络的转移方法流程图二,如图5所示,该方法的步骤包括:
步骤S602,网络侧设备生成与EXT-SOR对应的第一信息;
步骤S604,网络侧设备向终端发送第一信息;其中,第一信息指示具有目标信息的业务为目标业务。
需要说明的是,本申请实施例中的目标信息可以包括以下至少一项:目标业务的类型、目标业务的名称、目标业务的号码、目标网络切片选择辅助信息S-NSSAI、目标数据网络名称DNN、目标5QI、目标协议数据单元PDU会话的请求类型、目标网络互连协议IP地址、目标分组过滤器。
在本申请实施例的可选实施方式中,对于步骤S502中涉及到的网络侧设备生成第一信息的方式进一步可以包括:网络侧设备中的归属地公用陆地移动网络统一数据管理HPLMN UDM网元生成第一信息。
在本申请实施例的可选实施方式中,对于步骤S604中涉及到的网络侧设备向终端发送第一信息进一步可以包括:
步骤S604-11,网络侧设备中的HPLMN UDM网元向网络侧设备中的AMF网元发送第一信息;
步骤S604-12,网络侧设备中的AMF网元向终端透传第一信息。
可选地,网络侧设备中的AMF网元通过以下至少之一向终端透传第一 信息:SOR的透传容器、EXT-SOR的透传容器。其中,EXT-SOR的透传容器包括以下至少一项:EXT-SOR信息1、EXT-SOR信息2、EXT-SOR的安全信息。
可选地,网络侧设备中的HPLMN UDM网元向网络侧设备中的AMF网元发送第一信息之前,方法还包括:网络侧设备中的HPLMN UDM网元向网络侧设备中的鉴权服务器功能AUSF网元对第一信息进行加保护。
在本申请实施例的可选实施方式中,在所述网络侧设备向终端发送所述第一信息之后,所述方法还包括:所述网络侧设备向终端发送与EXT-SOR对应的第二信息。
对于网络侧设备需要更新与EXT-SOR对应的信息的方式,在本申请实施例的具体应用场景中,如图6所示,该更新的过程包括:
步骤S701,UE在VPLMN中完成注册;
步骤S702,HPLMN判断EXT-SOR相关的信息需要更新;
步骤S703,HPLMN准备EXT-SOR相关的信息;若HPLMN UDM通过EXT-SOR-AF来获取,则进入步骤S703;
步骤S704,HPLMN UDM向SOR-AF请求EXT-SOR信息;
步骤S705,SOR-AF决定EXT-SOR信息;
步骤S706,SOR-AF反馈EXT-SOR信息;
步骤S707,HPLMN UDM对EXT-SOR信息进行保护;
步骤S708,HPLMN UDM向AUSF发送EXT-SOR信息;
步骤S709,AUSF对EXT-SOR信息进行保护;
步骤S710,AUSF向HPLMN UDM发送保护后的EXT-SOR信息;
可见,上述步骤S704~S710与图3中的步骤S307~S313是相同的;
步骤S711,HPLMN UDM把保护后的更新的EXT-SOR相关的信息发给VPLMN AMF;
步骤S712,VPLMN AMF把收到的保护后的更新的EXT-SOR相关的信息通过NAS消息透传给UE。例如通过MM消息,通过DL NAS TRANSPORT(下行非接入层传输)消息。VPLMN AMF不能更改该保护后的更新的EXT-SOR相关的信息;
步骤S713,UE收到保护后的更新的EXT-SOR相关的信息后,先对该信息进行安全检查,如完整性检查;
步骤S714,若需要向网络反馈UE成功收到了该更新的EXT-SOR相关的信息,则可以把反馈信息进行保护,然后在上行非接入层(Non Access Stratum,NAS)消息中发给网络,例如UL NAS TRANSPORT(上行非接入层传输)消息;
步骤S715,VPLMN AFM判断是否收到了EXT-SOR信息;
步骤S716,HPLMN AFM向HPLMN UDM反馈确认消息;
步骤S717,HPLMN UDM检查确认消息;
步骤S718,HPLMN UDM向SOR-AF转发确认消息。
需要说明的是,该流程中的S715~S718与图3中的步骤S318~S321是相同的。
此外,还可以是网络决定EXT-SOR相关的信息驻留在HPLMN的更新。即当UE在HPLMN驻留和注册后,HPLMN是可信的,此时HPLMN给UE指示EXT-SOR相关的信息时,可以采用保护的形式,即与UE驻留在VPLMN时采用相同的方式更新EXT-SOR相关的信息;此时流程同驻留在VPLMN的注册流程;也可以通过传输无保护的EXT-SOR相关的信息,通知UE。UE收到后,将EXT-SOR相关的信息保存。该参数将在UE驻留到符合条件的VPLMN时被使用。
需要说明的是,本申请实施例提供的网络的转移方法,执行主体可以为网络的转移装置,或者,该网络的转移装置中的用于执行网络的转移方法的控制模块。本申请实施例中以网络的转移装置执行网络的转移方法为例,说明本申请实施例提供的网络的转移装置。
本申请实施例提供了一种网络的转移装置,图7是本申请实施例的网络的转移装置结构示意图一,如图7所示,该装置包括:
获取模块72,用于获取终端当前执行的业务;
释放模块74,用于在终端当前执行的业务中不存在目标业务的情况下,释放终端当前执行的业务;
执行模块76,用于在释放终端当前执行的业务后,执行对终端的网络转 移。
可选地,本申请实施例的装置还可以包括:
第一接收模块,用于接收网络侧设备发送的扩展的漫游控制EXT-SOR对应的第一信息;
第一确定模块,用于根据第一信息确定当前执行的业务中是否存在目标业务;其中,第一信息用于指示具有目标信息的业务为目标业务。
其中,该第一接收模块还可以包括:第一发送单元,用于向网络侧设备发送通知消息;其中,通知消息用于向网络侧设备通知终端支持EXT-SOR能力;接收单元,用于接收网络侧设备发送的与EXT-SOR对应的第一信息。
可选地,通知消息包括以下至少一项:注册请求消息、上行非传输层传输消息、协议数据单元会话消息。
可选地,本申请实施例中的第一确定模块包括以下之一:第一判断单元,用于第一信息判断终端当前执行的业务中是否存在目标业务;第二判断单元,用于根据第一信息,和/或终端保存的签约信息,和/或终端与网络侧设备约定的目标业务,和/或终端自定义的目标业务判断当前执行的业务中是否存在目标业务。
可选地,本申请实施例中的释放模块74进一步可以包括:第一释放单元,用于根据第一信息的指示立刻释放终端当前执行的业务;或,第二释放单元,用于根据第一信息的指示在预设时间段后释放终端当前执行的业务。
可选地,该第二释放单元,还用于根据第一信息的指示启动定时器,在定时器超时的情况下释放终端当前执行的业务。
可选地,本申请实施例的装置还可以包括:第二确定模块,用于自主确定当前执行的业务中是否存在目标业务。
其中,该第二确定模块,还用于终端根据终端保存的签约信息,和/或终端与网络侧设备约定的目标业务,和/或终端自定义的目标业务自主确定当前执行的业务中是否存在目标业务。
可选地,本申请实施例中的释放模块还可以包括:第三释放单元,用于确定立刻释放终端当前执行的业务;或,第四释放单元,用于确定在自定义的预设时间段后释放终端当前执行的业务。
其中,第四释放单元,还用于确定启动定时器,并在定时器超时的情况下释放终端当前执行的业务。
可选地,本申请实施例的装置还可以包括:第二接收模块,用于在定时器超时之前,接收网络侧设备发送的与EXT-SOR对应的第二信息,其中,第二信息为第一信息更新后的信息;第一处理模块,用于停止运行定时器并使用第二信息覆盖第一信息,以及根据第二信息确定终端当前执行的业务中是否存在目标业务;或,丢弃第二信息并在定时器超时的情况下根据第一信息释放终端当前执行的业务。
可选地,本申请实施例的装置还可以包括:第三确定模块,用于在当前执行的业务中存在目标业务的情况下,确定目标业务是否服务结束;第四确定模块,用于在目标业务服务结束的情况下,确定当前执行的业务中不存在目标业务。
可选地,本申请实施例的装置还可以包括:第五确定模块,用于确定网络侧设备中的拜访公用陆地移动网VPLMN是否变更;第二处理模块,用于在VPLMN变更的情况下,删除第一信息或根据第一信息确定当前执行的业务中是否存在目标业务。
可选地,本申请实施例的装置还可以包括:检测模块,用于在接收网络侧设备发送的第一信息之后,对第一信息进行安全性检测;其中,安全性检测包括指完整性检查和/或解密检测;第六确定模块,用于在第一信息安全性检测通过的情况下,确定网络侧设备中的VPLMN是否变更;第一发送模块,用于在网络侧设备中的VPLMN未变更的情况下,向网络侧设备发送反馈信息,其中,反馈信息用于指示终端接收到第一信息。
其中,该第一发送模块进一步可以包括:加保护单元,用于对反馈信息进行加保护;其中,加保护包括指完整性保护和/或加密保护;第二发送单元,用于将加保护后的反馈信息通过注册结束消息或上行非接入层传输消息发送给网络侧设备。
可选地,本申请实施例的装置还可以包括:保存模块,用于在接收第一信息之后,保存第一信息到用户业务识别模块USIM或移动设备ME中。
可选地,本申请实施例的装置还可以包括:交互模块,用于通过AT接口 与用户交互第一信息。
可选地,本申请实施例中的目标信息包括以下至少一项:目标业务的类型、目标业务的名称、目标业务的号码、目标S-NSSAI、目标DNN、目标5QI、目标PDU会话的请求类型、目标IP地址、目标分组过滤器。
可选地,本申请实施例中第一接收模块接收网络侧设备通过以下至少之一承载发送的第一信息:SOR的透传容器、EXT-SOR的透传容器。
可选地,EXT-SOR的透传容器包括以下至少一项:EXT-SOR信息1、EXT-SOR信息2、EXT-SOR的安全信息。
可选地,在通知消息中通过5GMM capability中用于向网络侧设备指示终端支持EXT-SOR能力。
可选地,在反馈信息中通过SOR header-new或EXT-SOR header-new指示终端接收到第一信息。
可选地,目标业务为业务优先级高于预设优先级的业务。
上述是从终端侧对本申请进行描述,下述将从网络侧对本申请进行说明;本申请实施例还提供了一种网络的转移装置,图8是本申请实施例的网络的转移装置结构示意图二,如图8所示,该装置包括:
生成模块82,用于生成与EXT-SOR对应的第一信息;
第二发送模块84,用于向终端发送第一信息;其中,第一信息指示具有目标信息的业务为目标业务。
可选地,目标信息包括以下至少一项:
目标业务的类型、目标业务的名称、目标业务的号码、目标网络切片选择辅助信息S-NSSAI、目标数据网络名称DNN、目标5QI、目标协议数据单元PDU会话的请求类型、目标网络互连协议IP地址、目标分组过滤器。
可选地,生本申请实施例中的成模块82进一步可以包括:HPLMN UDM网元,用于生成第一信息。
可选地,生本申请实施例中的第二发送模块84进一步可以包括:HPLMN UDM网元,用于向AMF网元发送第一信息;AMF网元,用于向终端透传第一信息。
可选地,AMF网元通过以下至少之一向终端透传第一信息:SOR的透 传容器、EXT-SOR的透传容器。
可选地,EXT-SOR的透传容器包括以下至少一项:EXT-SOR信息1、EXT-SOR信息2、EXT-SOR的安全信息。
可选地,本申请实施例中的装置还可以进一步包括:HPLMN UDM网元,用于在HPLMN UDM网元向AMF网元发送第一信息之前,向AUSF网元对第一信息进行加保护。
可选地,本申请实施例中的装置还可以包括:第二发送模块,还用于在网络侧设备向终端发送第一信息之后,向终端发送与EXT-SOR对应的第二信息;和/或,第三接收模块,用于接收终端发送的加保护后的反馈信息,并对反馈进行进行解保护;其中,反馈信息用于指示终端接收到所述第一信息。
通过本申请实施例,终端可以在当前执行的业务中不存在目标业务的情况下,释放终端当前执行的业务,进而进行网络的转移,如果该目标业务是高优先级业务,则可以是在终端当前执行的业务中不存在高优先级业务的情况下,释放当前执行的业务并进行网络转移;此外,该目标业务也可以是终端指定的一个或多个业务,即如果终端当前执行的业务中不存在这些指定的一个或多个业务,也是可以释放当前执行的业务并进行网络转移,从而解决了现有技术中终端当前存在不重要的业务的情况下,终端会持续驻留在当前的网络无法实现网络的转移的问题。
本申请实施例中的网络的转移装置可以是装置,也可以是终端中的部件、集成电路、或芯片。该装置可以是移动终端,也可以为非移动终端。示例性的,移动终端可以包括但不限于上述所列举的终端11的类型,非移动终端可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例中的网络的转移装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为ios操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。
本申请实施例提供的网络的转移装置能够实现图2或图5的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选的,如图9所示,本申请实施例还提供一种通信设备900,包括处理器901,存储器902,存储在存储器902上并可在所述处理器901上运行的程序或指令,例如,该通信设备900为终端时,该程序或指令被处理器901执行时实现上述网络的转移方法实施例的各个过程,且能达到相同的技术效果。该通信设备900为网络侧设备时,该程序或指令被处理器901执行时实现上述网络的转移方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
图10为实现本申请实施例的一种终端的硬件结构示意图。
该终端100包括但不限于:射频单元101、网络模块102、音频输出单元103、输入单元104、传感器105、显示单元106、用户输入单元107、接口单元108、存储器109、以及处理器110等部件。
本领域技术人员可以理解,终端100还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器110逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图10中示出的终端结构并不构成对终端的限定,终端可以包括比图10示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元104可以包括图形处理器(Graphics Processing Unit,GPU)1041和麦克风1042,图形处理器1041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元106可包括显示面板1061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板1061。用户输入单元107包括触控面板1071以及其他输入设备1072。触控面板1071,也称为触摸屏。触控面板1071可包括触摸检测装置和触摸控制器两个部分。其他输入设备1072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元101将来自网络侧设备的下行数据接收后,给处理器110处理;另外,将上行的数据发送给网络侧设备。通常,射频单元101包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器109可用于存储软件程序或指令以及各种数据。存储器109可主要包括存储程序或指令区和存储数据区,其中,存储程序或指令区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器109可以包括高速随机存取存储器,还可以包括非易失性存储器,其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。
处理器110可包括一个或多个处理单元;可选的,处理器110可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序或指令等,调制解调处理器主要处理无线通信,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器110中。
具体地,本申请实施例还提供了一种网络侧设备。如图11所示,该网络设备1100包括:天线111、射频装置112、基带装置113。天线111与射频装置112连接。在上行方向上,射频装置112通过天线111接收信息,将接收的信息发送给基带装置113进行处理。在下行方向上,基带装置113对要发送的信息进行处理,并发送给射频装置112,射频装置112对收到的信息进行处理后经过天线111发送出去。
上述频带处理装置可以位于基带装置113中,以上实施例中网络侧设备执行的方法可以在基带装置113中实现,该基带装置113包括处理器114和存储器115。
基带装置113例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图11所示,其中一个芯片例如为处理器114,与存储器115连接,以调用存储器115中的程序,执行以上方法实施例中所示的网络设备操作。
该基带装置113还可以包括网络接口116,用于与射频装置112交互信息,该接口例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本发明实施例的网络侧设备还包括:存储在存储器115上并可在处理器114上运行的指令或程序,处理器114调用存储器115中的指令或 程序执行图8所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述网络的转移方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行网络侧设备程序或指令,实现上述网络的转移方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种程序产品,所述程序产品存储在非易失的可读存储介质,所述程序产品被至少一个处理器执行以实现上述网络的转移方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述 实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (57)

  1. 一种网络的转移方法,包括:
    终端获取所述终端当前执行的业务;
    所述终端在所述终端当前执行的业务中不存在目标业务的情况下,释放所述终端当前执行的业务;
    所述终端在释放所述终端当前执行的业务后,执行对所述终端的网络转移。
  2. 根据权利要求1所述的方法,其中,所述终端确定当前执行的业务中是否存在目标业务包括:
    所述终端接收网络侧设备发送的扩展的漫游控制EXT-SOR对应的第一信息;
    所述终端根据所述第一信息确定当前执行的业务中是否存在目标业务;其中,所述第一信息用于指示具有目标信息的业务为所述目标业务。
  3. 根据权利要求2所述的方法,其中,所述接收网络侧设备发送的扩展的漫游控制EXT-SOR对应的第一信息,包括:
    所述终端向所述网络侧设备发送通知消息;其中,所述通知消息用于向所述网络侧设备通知所述终端支持EXT-SOR能力;
    所述终端接收所述网络侧设备发送的与EXT-SOR对应的第一信息。
  4. 根据权利要求3所述的方法,其中,所述通知消息包括以下至少一项:注册请求消息、上行非传输层传输消息、协议数据单元会话消息。
  5. 根据权利要求3所述的方法,其中,据所述第一信息确定当前执行的业务中是否存在目标业务包括以下之一:
    所述终端根据所述第一信息判断所述终端当前执行的业务中是否存在所述目标业务;
    所述终端根据所述第一信息,和/或所述终端保存的签约信息,和/或所述终端与所述网络侧设备约定的目标业务,和/或所述终端自定义的目标业务判断当前执行的业务中是否存在所述目标业务。
  6. 根据权利要求2所述的方法,其中,所述终端释放所述终端当前执行 的业务,包括:
    所述终端根据所述第一信息的指示立刻释放所述终端当前执行的业务;或,
    所述终端根据所述第一信息的指示在预设时间段后释放所述终端当前执行的业务。
  7. 根据权利要求6所述的方法,其中,所述终端根据所述第一信息的指示在预设时间段后释放所述终端当前执行的业务包括:
    所述终端根据所述第一信息的指示启动定时器,在所述定时器超时的情况下释放所述终端当前执行的业务。
  8. 根据权利要求1所述的方法,其中,所述终端确定当前执行的业务中是否存在目标业务包括:
    所述终端自主确定当前执行的业务中是否存在目标业务。
  9. 根据权利要求8所述的方法,其中,所述终端自主确定当前执行的业务中是否存在目标业务包括:
    所述终端根据所述终端保存的签约信息,和/或所述终端与所述网络侧设备约定的目标业务,和/或所述终端自定义的目标业务自主确定当前执行的业务中是否存在目标业务。
  10. 根据权利要求8所述的方法,其中,所述终端释放所述终端当前执行的业务,包括:
    所述终端确定立刻释放所述终端当前执行的业务;或,
    所述终端确定在自定义的预设时间段后释放所述终端当前执行的业务。
  11. 根据权利要求10所述的方法,其中,在预设时间段后释放所述终端当前执行的业务包括:
    所述终端确定启动定时器,并在所述定时器超时的情况下释放所述终端当前执行的业务。
  12. 根据权利要求7所述的方法,还包括:
    所述终端在所述定时器超时之前,接收所述网络侧设备发送的与EXT-SOR对应的第二信息,其中,所述第二信息为所述第一信息更新后的信息;
    所述终端停止运行所述定时器并使用所述第二信息覆盖所述第一信息, 以及根据所述第二信息确定所述终端当前执行的业务中是否存在目标业务;或,所述终端丢弃所述第二信息,并在所述定时器超时的情况下根据所述第一信息释放所述终端当前执行的业务。
  13. 根据权利要求1所述的方法,还包括:
    所述终端在当前执行的业务中存在所述目标业务的情况下,确定所述目标业务是否服务结束;
    所述终端在所述目标业务服务结束的情况下,确定所述当前执行的业务中不存在所述目标业务。
  14. 根据权利要求7所述的方法,还包括:
    所述终端确定所述网络侧设备中的拜访公用陆地移动网VPLMN是否变更;
    所述终端在所述VPLMN变更的情况下,确定所述第一信息无效并停止所述定时器,或根据所述第一信息确定所述当前执行的业务中是否存在所述目标业务。
  15. 根据权利要求2所述的方法,其中,在接收网络侧设备发送的第一信息之后,所述方法还包括:
    所述终端对所述第一信息进行安全性检测;其中,所述安全性检测包括完整性检查和/或解密检测;
    所述终端在所述第一信息安全性检测通过的情况下,确定所述网络侧设备中的VPLMN是否变更;
    所述终端在所述网络侧设备中的VPLMN未变更的情况下,向所述网络侧设备发送反馈信息,其中,所述反馈信息用于指示所述终端接收到所述第一信息。
  16. 根据权利要求15所述的方法,其中,向所述网络侧设备发送反馈信息,包括:
    所述终端对所述反馈信息进行加保护;其中,所述加保护包括完整性保护和/或加密保护;
    所述终端将加保护后的所述反馈信息通过注册结束消息或上行非接入层传输消息发送给所述网络侧设备。
  17. 根据权利要求2所述的方法,其中,在接收所述第一信息之后,所述方法还包括:
    所述终端保存所述第一信息到用户业务识别模块USIM或移动设备ME中。
  18. 根据权利要求17所述的方法,还包括:
    所述终端通过AT接口与用户交互所述第一信息。
  19. 根据权利要求2所述的方法,其中,所述目标信息包括以下至少一项:
    所述目标业务的类型、所述目标业务的名称、所述目标业务的号码、目标单个网络切片选择辅助信息S-NSSAI、目标数据网络名称DNN、目标5G服务质量标识5QI、目标协议数据单元PDU会话的请求类型、目标网络互连协议IP地址、目标分组过滤器。
  20. 根据权利要求2所述的方法,其中,所述终端接收网络侧设备通过以下至少之一承载发送的第一信息:SOR的透传容器、EXT-SOR的透传容器。
  21. 根据权利要求20所述的方法,其中,所述EXT-SOR的透传容器包括以下至少一项:EXT-SOR信息1、EXT-SOR信息2、EXT-SOR的安全信息;所述EXT-SOR的安全信息包括:生成被保护的第一信息所需要的计数器的值,和/或生成被保护的第一信息的校验和,和/或生成被保护的第一信息的加密后的密文信息。
  22. 根据权利要求3所述的方法,其中,在所述通知消息中通过5G系统移动性管理5GMM能力中用于向所述网络侧设备指示所述终端支持EXT-SOR能力。
  23. 根据权利要求15所述的方法,其中,在所述反馈信息中通过SOR header-new或EXT-SOR header-new指示所述终端接收到所述第一信息。
  24. 根据权利要求1所述的方法,其中,所述目标业务为业务优先级高于预设优先级的业务。
  25. 一种网络的转移方法,包括:
    网络侧设备生成与EXT-SOR对应的第一信息;
    所述网络侧设备向终端发送所述第一信息;其中,所述第一信息指示具 有目标信息的业务为所述目标业务。
  26. 根据权利要求25所述的方法,其中,所述目标信息包括以下至少一项:
    所述目标业务的类型、所述目标业务的名称、所述目标业务的号码、目标S-NSSAI、目标DNN、目标5QI、目标PDU会话的请求类型、目标网络互连协议IP地址、目标分组过滤器。
  27. 根据权利要求25所述的方法,其中,网络侧设备生成第一信息包括:
    所述网络侧设备中的归属地公用陆地移动网络统一数据管理HPLMN UDM网元生成所述第一信息。
  28. 根据权利要求27所述的方法,其中,所述网络侧设备向终端发送所述第一信息包括:
    所述网络侧设备中的HPLMN UDM网元向所述网络侧设备中的接入和移动性管理功能AMF网元发送所述第一信息;
    所述网络侧设备中的AMF网元向所述终端透传所述第一信息。
  29. 根据权利要求28所述的方法,其中,所述网络侧设备中的AMF网元通过以下至少之一向所述终端透传所述第一信息:SOR的透传容器、EXT-SOR的透传容器。
  30. 根据权利要求29所述的方法,其中,所述EXT-SOR的透传容器包括以下至少一项:EXT-SOR信息1、EXT-SOR信息2、EXT-SOR的安全信息;所述EXT-SOR的安全信息包括:生成被保护的第一信息所需要的计数器的值,和/或生成被保护的第一信息的校验和,和/或生成被保护的第一信息的加密后的密文信息。
  31. 根据权利要求27所述的方法,其中,所述网络侧设备中的HPLMN UDM网元向所述网络侧设备中的AMF网元发送所述第一信息之前,所述方法还包括:
    所述网络侧设备中的HPLMN UDM网元向所述网络侧设备中的鉴权服务器功能AUSF网元对所述第一信息进行加保护。
  32. 根据权利要求27所述的方法,其中,在所述网络侧设备向终端发送所述第一信息之后,所述方法还包括:
    所述网络侧设备向终端发送与EXT-SOR对应的第二信息;和/或,
    所述网络侧设备接收所述终端发送的加保护后的反馈信息,并对所述反馈进行进行解保护;其中,所述反馈信息用于指示所述终端接收到所述第一信息。
  33. 一种网络的转移装置,包括:
    获取模块,用于获取终端当前执行的业务;
    释放模块,用于在所述终端当前执行的业务中不存在目标业务的情况下,释放所述终端当前执行的业务;
    执行模块,用于在释放所述终端当前执行的业务后,执行对所述终端的网络转移。
  34. 根据权利要求33所述的装置,还包括:
    第一接收模块,用于接收网络侧设备发送的扩展的漫游控制EXT-SOR对应的第一信息;
    第一确定模块,用于根据所述第一信息确定当前执行的业务中是否存在目标业务;其中,所述第一信息用于指示具有目标信息的业务为所述目标业务。
  35. 根据权利要求34所述的装置,其中,所述第一接收模块包括:
    第一发送单元,用于向所述网络侧设备发送通知消息;其中,所述通知消息用于向所述网络侧设备通知所述终端支持EXT-SOR能力;
    接收单元,用于接收所述网络侧设备发送的与EXT-SOR对应的第一信息。
  36. 根据权利要求35所述的装置,其中,所述通知消息包括以下至少一项:注册请求消息、上行非传输层传输消息、协议数据单元会话消息。
  37. 根据权利要求35所述装置法,其中,所述第一确定模块包括以下之一:
    第一判断单元,用于所述第一信息判断所述终端当前执行的业务中是否存在所述目标业务;
    第二判断单元,用于根据所述第一信息,和/或所述终端保存的签约信息,和/或所述终端与所述网络侧设备约定的目标业务,和/或所述终端自定义的目 标业务判断当前执行的业务中是否存在所述目标业务。
  38. 根据权利要求34所述的装置,其中,所述释放模块包括:
    第一释放单元,用于根据所述第一信息的指示立刻释放所述终端当前执行的业务;
    或,
    第二释放单元,用于根据所述第一信息的指示在预设时间段后释放所述终端当前执行的业务。
  39. 根据权利要求38所述的装置,其中,所述第二释放单元,还用于根据所述第一信息的指示启动定时器,在所述定时器超时的情况下释放所述终端当前执行的业务。
  40. 根据权利要求34所述的装置,还包括:
    第五确定模块,用于确定所述网络侧设备中的拜访公用陆地移动网VPLMN是否变更;
    第二处理模块,用于在所述VPLMN变更的情况下,删除所述第一信息或根据所述第一信息确定所述当前执行的业务中是否存在所述目标业务。
  41. 根据权利要求34所述的装置,还包括:
    检测模块,用于在接收网络侧设备发送的第一信息之后,对所述第一信息进行安全性检测;其中,所述安全性检测包括指完整性检查和/或解密检测;
    第六确定模块,用于在所述第一信息安全性检测通过的情况下,确定所述网络侧设备中的VPLMN是否变更;
    第一发送模块,用于在所述网络侧设备中的VPLMN未变更的情况下,向所述网络侧设备发送反馈信息,其中,所述反馈信息用于指示所述终端接收到所述第一信息。
  42. 根据权利要求41所述的装置,其中,所述第一发送模块包括:
    加保护单元,用于对所述反馈信息进行加保护;其中,所述加保护包括指完整性保护和/或加密保护;
    第二发送单元,用于将加保护后的所述反馈信息通过注册结束消息或上行非接入层传输消息发送给所述网络侧设备。
  43. 一种网络的转移装置,包括:
    生成模块,用于生成与EXT-SOR对应的第一信息;
    第二发送模块,用于向终端发送所述第一信息;其中,所述第一信息指示具有目标信息的业务为所述目标业务。
  44. 根据权利要求43所述的装置,其中,所述目标信息包括以下至少一项:
    所述目标业务的类型、所述目标业务的名称、所述目标业务的号码、目标网络切片选择辅助信息S-NSSAI、目标数据网络名称DNN、目标5QI、目标协议数据单元PDU会话的请求类型、目标网络互连协议IP地址、目标分组过滤器。
  45. 根据权利要求43所述的装置,其中,所述生成模块包括:
    HPLMN UDM网元,用于生成所述第一信息。
  46. 根据权利要求45所述的装置,其中,所述第二发送模块包括:
    HPLMN UDM网元,用于向AMF网元发送所述第一信息;
    AMF网元,用于向所述终端透传所述第一信息。
  47. 根据权利要求46所述的装置,其中,所述网络侧设备中的AMF网元通过以下至少之一向所述终端透传所述第一信息:SOR的透传容器、EXT-SOR的透传容器。
  48. 根据权利要求47所述的装置,其中,所述EXT-SOR的透传容器包括以下至少一项:EXT-SOR信息1、EXT-SOR信息2、EXT-SOR的安全信息;所述EXT-SOR的安全信息包括:生成被保护的第一信息所需要的计数器的值,和/或生成被保护的第一信息的校验和,和/或生成被保护的第一信息的加密后的密文信息。
  49. 根据权利要求46所述的装置,还包括:
    HPLMN UDM网元,用于在HPLMN UDM网元向所述AMF网元发送所述第一信息之前,向所述AUSF网元对所述第一信息进行加保护。
  50. 根据权利要求45所述的装置,还包括:
    所述第二发送模块,还用于在所述网络侧设备向终端发送所述第一信息之后,向终端发送与EXT-SOR对应的第二信息;和/或,
    第三接收模块,用于接收所述终端发送的加保护后的反馈信息,并对所 述反馈进行进行解保护;其中,所述反馈信息用于指示所述终端接收到所述第一信息。
  51. 一种终端,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至24任一项所述的网络的转移方法的步骤。
  52. 一种网络侧设备,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求25至32任一项所述的网络的转移方法的步骤。
  53. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至24任一项所述的网络的转移方法,或者实现如权利要求25至32任一项所述的网络的转移方法的步骤。
  54. 一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1至32任一项所述的网络的转移方法的步骤。
  55. 一种程序产品,所述程序产品存储在非易失的可读存储介质,所述程序产品被至少一个处理器执行以实现如权利要求1至32任一项所述的网络的转移方法的步骤。
  56. 一种网络侧设备,被配置成用于执行如权利要求25至32任一项所述的网络的转移方法的步骤。
  57. 一种终端,被配置成用于执行如权利要求1至24任一项所述的网络的转移方法的步骤。
PCT/CN2021/111505 2020-08-10 2021-08-09 网络的转移方法、终端及网络侧设备 WO2022033428A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2023509448A JP2023537739A (ja) 2020-08-10 2021-08-09 ネットワークの移行方法、端末及びネットワーク側機器
EP21855480.6A EP4195774A4 (en) 2020-08-10 2021-08-09 NETWORK TRANSFER METHOD, TERMINAL, AND NETWORK SIDE DEVICE
KR1020237008068A KR20230049684A (ko) 2020-08-10 2021-08-09 네트워크의 전송 방법, 단말 및 네트워크 측 장치
US18/107,279 US20230189202A1 (en) 2020-08-10 2023-02-08 Network transferring method, terminal, and network-side device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010797349.8A CN114079991B (zh) 2020-08-10 2020-08-10 网络的转移方法、终端及网络侧设备
CN202010797349.8 2020-08-10

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/107,279 Continuation US20230189202A1 (en) 2020-08-10 2023-02-08 Network transferring method, terminal, and network-side device

Publications (1)

Publication Number Publication Date
WO2022033428A1 true WO2022033428A1 (zh) 2022-02-17

Family

ID=80246926

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/111505 WO2022033428A1 (zh) 2020-08-10 2021-08-09 网络的转移方法、终端及网络侧设备

Country Status (6)

Country Link
US (1) US20230189202A1 (zh)
EP (1) EP4195774A4 (zh)
JP (1) JP2023537739A (zh)
KR (1) KR20230049684A (zh)
CN (2) CN116347548A (zh)
WO (1) WO2022033428A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150065125A1 (en) * 2013-09-04 2015-03-05 Cellco Partnership D/B/A Verizon Wireless Connection state-based long term evolution steering of roaming
CN109089261A (zh) * 2018-10-18 2018-12-25 Oppo广东移动通信有限公司 无线漫游触发的方法、装置、计算机设备以及存储介质
CN110324840A (zh) * 2018-03-31 2019-10-11 华为技术有限公司 一种更新配置的方法及装置
CN110602744A (zh) * 2019-09-06 2019-12-20 南京大鱼半导体有限公司 物联网拥塞控制的方法、装置、存储介质和电子设备
US20200177333A1 (en) * 2018-11-30 2020-06-04 Nokia Technologies Oy Method and apparatus for enabling concurrent transport via control plane
WO2020145299A1 (ja) * 2019-01-09 2020-07-16 株式会社Nttドコモ ネットワークノード及び通知方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE0302004D0 (sv) * 2003-07-04 2003-07-04 Ericsson Telefon Ab L M Method and arrangement in a telecommunication system
US9031557B2 (en) * 2006-04-21 2015-05-12 Itxc Ip Holdings S.A.R.L. Method and apparatus for steering of roaming
EP2088723A1 (en) * 2008-02-08 2009-08-12 NEC Corporation Method for controlling the steering of the roaming of user equipment in a wireless communication network
US10791508B2 (en) * 2016-11-18 2020-09-29 Lg Electronics Inc. Method for selecting network node in wireless communication system and device therefor
US10952062B2 (en) * 2018-02-26 2021-03-16 Blackberry Limited Steering of roaming in wireless communication networks
CN110650529A (zh) * 2018-06-26 2020-01-03 华为技术有限公司 去注册的方法、设备及系统
EP3681204B1 (en) * 2019-01-09 2024-05-29 NTT DoCoMo, Inc. User equipment, network node, and communication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150065125A1 (en) * 2013-09-04 2015-03-05 Cellco Partnership D/B/A Verizon Wireless Connection state-based long term evolution steering of roaming
CN110324840A (zh) * 2018-03-31 2019-10-11 华为技术有限公司 一种更新配置的方法及装置
CN109089261A (zh) * 2018-10-18 2018-12-25 Oppo广东移动通信有限公司 无线漫游触发的方法、装置、计算机设备以及存储介质
US20200177333A1 (en) * 2018-11-30 2020-06-04 Nokia Technologies Oy Method and apparatus for enabling concurrent transport via control plane
WO2020145299A1 (ja) * 2019-01-09 2020-07-16 株式会社Nttドコモ ネットワークノード及び通知方法
CN110602744A (zh) * 2019-09-06 2019-12-20 南京大鱼半导体有限公司 物联网拥塞控制的方法、装置、存储介质和电子设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4195774A4 *

Also Published As

Publication number Publication date
US20230189202A1 (en) 2023-06-15
EP4195774A1 (en) 2023-06-14
CN114079991A (zh) 2022-02-22
CN116347548A (zh) 2023-06-27
EP4195774A4 (en) 2024-01-17
JP2023537739A (ja) 2023-09-05
CN114079991B (zh) 2023-04-25
KR20230049684A (ko) 2023-04-13

Similar Documents

Publication Publication Date Title
US11611949B2 (en) Keeping the UE awake
US11019566B2 (en) Service capability server / EPC coordination for power savings mode and paging
EP3869766B1 (en) Network connection method, hotspot terminal and management terminal
EP3735029B1 (en) Methods and devices for establishing control plane session
CN109792457B (zh) 存储和检索设备的网络上下文
CN113411798B (zh) 覆盖增强ce功能的实现方法及设备
WO2020151614A1 (zh) 用户面安全保护的方法和装置
WO2018170703A1 (zh) 一种连接建立方法及装置
WO2018188426A1 (zh) 一种消息传输控制方法及装置
WO2022033428A1 (zh) 网络的转移方法、终端及网络侧设备
JP2023040195A (ja) 通信方法、及びユーザ装置
WO2022033458A1 (zh) 网络转移方法、装置和设备
WO2022178727A1 (zh) 寻呼方法、装置及通信设备
WO2022083630A1 (zh) 寻呼方法、装置、终端、网络侧设备及可读存储介质
US20220304098A1 (en) Enhanced namf interface to support radio resource control inactive state
WO2022022712A1 (zh) 信息传输方法、装置、多卡终端及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21855480

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2023509448

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20237008068

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2021855480

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2021855480

Country of ref document: EP

Effective date: 20230310