WO2022155796A1 - 通信方法以及相关装置 - Google Patents

通信方法以及相关装置 Download PDF

Info

Publication number
WO2022155796A1
WO2022155796A1 PCT/CN2021/072769 CN2021072769W WO2022155796A1 WO 2022155796 A1 WO2022155796 A1 WO 2022155796A1 CN 2021072769 W CN2021072769 W CN 2021072769W WO 2022155796 A1 WO2022155796 A1 WO 2022155796A1
Authority
WO
WIPO (PCT)
Prior art keywords
service provider
information
network device
access network
home service
Prior art date
Application number
PCT/CN2021/072769
Other languages
English (en)
French (fr)
Inventor
马川
韩锋
郑黎丽
晋英豪
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2021/072769 priority Critical patent/WO2022155796A1/zh
Publication of WO2022155796A1 publication Critical patent/WO2022155796A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks

Definitions

  • the present application relates to the field of communication, and in particular, to a communication method and related apparatus.
  • Non-public network (NPN) networks and public networks are being discussed in the 3rd generation partnership project (3GPP) fifth generation wireless communication (5th generation, 5G) standard to secure communications.
  • 3GPP 3rd generation partnership project
  • 5th generation, 5G fifth generation wireless communication
  • Embodiments of the present application provide a communication method and a related device, which are used to ensure normal communication.
  • a first aspect of the embodiments of the present application provides a communication method, including:
  • the access network device establishes a radio resource control (RRC) connection with the terminal device; then, the access network device sends an initial UE message to the core network device; the access network device receives an initial context establishment request message from the core network device ;
  • the initial context establishment request message includes at least one of the following: first information, or second information; the first information is used to indicate that the terminal device is restricted to move in cells that support external authentication; the second information includes a home service provider or a home service provider group group information; the access network device sends an initial context response message to the core network device.
  • RRC radio resource control
  • the access network device acquires the first information and/or the second information from the core network device.
  • the first information is used to indicate that the terminal device is restricted to move in cells that support external authentication;
  • the second information includes the information of the home service provider or the home service provider group.
  • the access network device can refer to the information to select a cell supporting external authentication for the terminal device, or select a cell supporting the home service provider or home service provider group for the terminal device. It is avoided that the terminal equipment moves to a cell that does not support external authentication or a cell that does not support a home service provider or a home service provider group and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the access network device can select a cell that supports the home service provider or the home service provider group for the terminal device. To prevent the terminal equipment from moving to a cell that does not support external authentication, the secondary authentication of the terminal equipment cannot be completed.
  • the initial context establishment request message includes a mobility restriction list.
  • the first information and/or the second information are in the mobility restriction list.
  • the mobility restriction list in the initial context establishment request message is used to carry the first information and/or the second information, that is, a specific carrying manner is provided.
  • the mobility restriction list is usually used to indicate some restriction conditions of the network behavior of the terminal device. Therefore, the core network device delivers the first information and/or the second information to the access network device through the mobility restriction list. There is no need to indicate that the first information and the second information are relevant restriction information about external authentication of the terminal device through other indication fields or indication signaling, thereby saving signaling overhead or bit overhead.
  • the access network device may determine the first information and/or the second information according to the mobility restriction list.
  • the access network device may select a cell supporting external authentication for the terminal device according to the first information and/or the second information, or select a cell supporting a home service provider or a home service provider group for the terminal device. It is avoided that the terminal equipment moves to a cell that does not support external authentication and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the home service provider includes: a first home service provider that performs external authentication on the terminal device, and/or a second home service provider associated with the first home service provider;
  • the home service provider group includes: a first home service provider group that performs external authentication on the terminal device, and/or a second home service provider group associated with the first home service provider group.
  • the access network device can determine the first home service provider or the first home service provider group that performs external authentication on the terminal device. . In this way, the access network device can select a cell supporting the first home service provider or the first home service provider group for the terminal device. The terminal equipment is prevented from moving to a cell that does not support the first home service provider or the first home service provider group.
  • the core network device may further provide second home service provider information associated with the first home service provider or information of a second home service provider group associated with the first home service provider group. Then there are multiple home service providers or home service provider groups that can be used to authenticate the terminal device, which can improve the success rate of the terminal device accessing the network through external authentication.
  • the method further includes:
  • the access network device selects a cell that supports external authentication for the terminal device, or selects a cell that supports the home service provider or home service provider group for the terminal device.
  • the cell selected by the access network device for the terminal device is a cell that supports external authentication or supports a home service provider or a home service provider group.
  • This cell can be used for handover or dual connectivity of terminal equipment. This can prevent the terminal equipment from moving to a cell that does not support external authentication or a cell that does not support the home service provider or the home service provider group and failing to complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the method further includes:
  • the access network device sends a handover request message to the target access network device, where the handover request message includes at least one of the following: first information or second information.
  • the terminal device may transmit the first information and/or the second information to the target access network device.
  • the target access network device can combine the first information and/or the second information to restrict the terminal device from moving in a cell supporting external authentication or a cell supporting a home service provider or a home service provider group. It is avoided that the terminal equipment moves to a cell that does not support external authentication or a cell that does not support a home service provider or a home service provider group and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the handover request message includes an identifier of a cell that supports external authentication, or includes an identifier of a cell that supports the home service provider or home service provider group.
  • the access network device switches the terminal device to the target access network device to select an externally authenticated cell or a cell that supports the home service provider or the home service provider group through the above implementation manner. This avoids switching the terminal equipment to a cell that does not support external authentication or a cell that does not support the home service provider or home service provider group. It is avoided that the terminal equipment moves to a cell that does not support external authentication or a cell that does not support a home service provider or a home service provider group and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the method further includes:
  • the access network device sends a handover requirement message to the core network device, where the handover requirement message includes an identifier of a cell that supports external authentication, or an identifier of a cell that supports a home service provider or a home service provider group.
  • the access network device requests the core network device to switch the terminal device to a cell that selects external authentication or a cell that supports a home service provider or a home service provider group through the above implementation manner. This avoids switching the terminal device to a cell that does not support external authentication or a cell that does not support the home service provider or the home service provider group. It is avoided that the terminal equipment moves to a cell that does not support external authentication or a cell that does not support a home service provider or a home service provider group and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the method further includes:
  • the access network device receives the UE context extraction request message from the target access network device, and the target access network device is the access network device that initiates the RRC recovery request from the terminal device;
  • the access network device sends a UE context extraction response message to the target access network device, and the UE context extraction response message includes at least one of the following: first information or second information.
  • the access network device may determine whether to allow the target access network device to extract the context of the terminal device, thereby restricting the terminal device from moving in a cell supporting external authentication. Further, if the access network device allows the target access network device to extract the context of the terminal device, the access network device may transmit the first information and/or the second information to the target access network device. In this way, the target access network device can combine the first information and/or the second information to restrict the terminal device from moving in a cell supporting external authentication or a cell supporting a home service provider or a home service provider group.
  • the terminal equipment moves to a cell that does not support external authentication or a cell that does not support a home service provider or a home service provider group and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the method further includes:
  • the access network device receives the UE context extraction request message from the target access network device, and the target access network device is the access network device that initiates the RRC recovery request from the terminal device;
  • the access network device sends a context extraction failure message to the target access network device, where the context extraction failure message includes a failure reason; the failure reason includes a mismatch of external authentication information.
  • the access network device may determine whether to allow the target access network device to extract the context of the terminal device, thereby restricting the terminal device from moving in a cell supporting external authentication. If the access network device does not allow the target access network device to extract the context of the terminal device, the access network device may send the failure reason to the target access network device. In this way, the target access network device can determine the reason for the failure of RRC recovery of the terminal device.
  • the method further includes:
  • the access network device sends an auxiliary node addition request message to the target access network device, where the auxiliary node addition request message includes at least one of the following: first information or second information.
  • the terminal device may transmit the first information and/or the second information to the target access network device.
  • the target access network device can combine the first information and/or the second information to restrict the terminal device from moving in a cell supporting external authentication or a cell supporting a home service provider or a home service provider group. It is avoided that the terminal equipment moves to a cell that does not support external authentication or a cell that does not support a home service provider or a home service provider group and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • a second aspect of the embodiments of the present application provides a communication method, including:
  • the core network device receives the initial UE message from the access network device; the core network device performs external authentication on the terminal device; the core network device sends an initial context establishment request message to the access network device, and the initial context establishment request message includes at least one of the following: The first information, or the second information; the first information is used to indicate that the terminal equipment is restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group; the core network device receives information from the access network The device's initial context response message.
  • the core network device may send the first information and/or the second information to the access network device.
  • the first information is used to indicate that the terminal device is restricted to move in cells that support external authentication;
  • the second information includes the information of the home service provider or the home service provider group.
  • the access network device obtains the information, it can refer to the information to select a cell supporting external authentication for the terminal device, or select a cell supporting the home service provider or home service provider group for the terminal device. It is avoided that the terminal equipment moves to a cell that does not support external authentication or a cell that does not support a home service provider or a home service provider group and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the access network device can select a cell that supports the home service provider or the home service provider group for the terminal device. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the initial context establishment request message includes a mobility restriction list, and the first information and/or the second information are located in the mobility restriction list.
  • the mobility restriction list in the initial context establishment request message is used to carry the first information and/or the second information, that is, a specific carrying manner is provided.
  • the mobility restriction list is usually used to indicate some restriction conditions of the network behavior of the terminal device. Therefore, the core network device delivers the first information and/or the second information to the access network device through the mobility restriction list. There is no need to indicate that the first information and the second information are relevant restriction information about external authentication of the terminal device through other indication fields or indication signaling, thereby saving signaling overhead or bit overhead.
  • the access network device may determine the first information and/or the second information according to the mobility restriction list.
  • the access network device may select a cell supporting external authentication for the terminal device according to the first information and/or the second information, or select a cell supporting a home service provider or a home service provider group for the terminal device. It is avoided that the terminal equipment moves to a cell that does not support external authentication and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the home service provider includes: a first home service provider that performs external authentication on the terminal device, and/or a second home service provider associated with the first home service provider;
  • the home service provider group includes: a first home service provider group that performs external authentication on the terminal device, and/or a second home service provider group associated with the first home service provider group.
  • the above implementations provide one or more home service providers or groups of home service providers.
  • multiple home service providers or home service provider groups there are multiple home service providers or home service provider groups that can be used to authenticate the terminal device, which can improve the access of the terminal device through external authentication. network success rate.
  • the method further includes:
  • the core network device receives a handover requirement message from the access network device, where the handover requirement message includes an identifier of a cell that supports external authentication, or an identifier of a cell that supports the home service provider or home service provider group.
  • the access network device requests the core network device to switch the terminal device to a cell that selects external authentication or a cell that supports the home service provider or home service provider group through the above implementation manner. This avoids switching the terminal device to a cell that does not support external authentication or a cell that does not support the home service provider or the home service provider group. It is avoided that the terminal equipment moves to a cell that does not support external authentication or a cell that does not support a home service provider or a home service provider group and cannot complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • a third aspect of the embodiments of the present application provides a communication method, including:
  • the source access network device sends a handover request message to the target access network device, where the handover request message is used to request handover of the terminal device to the target cell;
  • the handover request message includes at least one of the following: first information or second information; first The information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group; the first access network device receives a handover request confirmation message from the target access network device.
  • the source access network device sends the first information and/or the second information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to handover to the target cell according to the first information and/or the second information.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or in a cell supporting a home service provider or a home service provider group. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the target access network device can determine that the terminal device is restricted to move in cells that support the home service provider or home service provider group.
  • the implementation enables the target access network device to restrict the terminal device from moving in a cell supporting a home service provider or a home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • a fourth aspect of the embodiments of the present application provides a communication method, including:
  • the source access network device sends a handover request message to the target access network device, where the handover request message is used to request handover of the terminal device to the target cell;
  • the handover request message includes at least one of the following: first information or second information; first The information is used to indicate that the terminal equipment is restricted to move in cells that support external authentication; the second information includes the information of the home service provider or the home service provider group; the source access network device receives the handover preparation failure message from the target access network device; handover The preparation failure message includes the failure reason; the failure reason includes any of the following: the target cell does not support external authentication, the target cell does not support external authentication of the home service provider or home service provider group, or the terminal device is denied use of a certificate owned by an external entity Access the network to which the target cell belongs.
  • the source access network device sends the first information and/or the second information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to handover to the target cell according to the first information and/or the second information. If the target access network device does not allow the terminal device to switch to the target cell, the target access network device sends a handover preparation failure message to the source access network device. And, the handover preparation failure message includes the failure reason. In this way, the source access network device can determine the cause of the handover failure in combination with the failure cause, and re-select a cell for the terminal device to request handover.
  • the source access network device may also update the information about the external authentication of the target cell stored on the source access network device according to the failure reason. It is avoided that the source access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot complete the secondary authentication after switching to the target cell.
  • the handover preparation failure message further includes information that the target cell supports the home service provider or the home service provider group.
  • the source access network device may update or modify the information of the target cell stored on the source access network device according to the information that the target cell supports the home service provider or the home service provider group. It is avoided that the source access network device mistakenly switches the terminal device to the target cell and the terminal device cannot complete the secondary authentication.
  • the information of the home service provider or the home service provider group includes the identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the target access network device can determine that the terminal device is restricted to move in cells that support the home service provider or home service provider group.
  • the implementation enables the target access network device to restrict the terminal device from moving in a cell supporting a home service provider or a home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • a fifth aspect of the embodiments of the present application provides a communication method, including:
  • the target access network device receives a handover request message from the source access network device, and the handover request message is used to request that the terminal device be handed over to the target cell;
  • the handover request message includes at least one of the following: first information or second information; One piece of information is used to instruct the terminal equipment to be restricted to move in cells that support external authentication; the second information includes information about the home service provider or home service provider group; the target access network equipment performs access control to determine whether to allow the terminal equipment to switch to the target cell; the target access network device sends a handover request confirmation message to the source access network device.
  • the target access network device acquires the first information and/or the second information from the source access network device. In this way, the target access network device can determine whether to allow the terminal device to switch to the target cell according to the first information and/or the second information.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or in a cell supporting a home service provider or a home service provider group. It is avoided that the terminal equipment is unable to complete the secondary authentication due to moving to a cell that does not support external authentication, and the terminal equipment cannot perform corresponding services, thereby ensuring normal communication.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the target access network device can determine that the terminal device is restricted to move in a cell that supports the home service provider or the home service provider group. Thereby, enabling the target access network device to restrict the terminal device from moving in the cell supporting the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the target access network device performs access control to determine whether to allow the terminal device to switch to the target cell, including:
  • the target access network device allows the terminal device to be handed over to the target cell
  • the target access network device allows the terminal device to switch to the target cell.
  • This implementation shows a specific process in which the target access network device determines whether to allow the terminal device to handover to the target cell in combination with the first information, the second information and the external authentication support capability of the target cell.
  • the terminal equipment is restricted to move only in cells that support external authentication or cells that support home service providers or home service provider groups. It prevents the terminal equipment from moving to a cell that does not support external authentication and cannot complete the secondary authentication of the terminal equipment, and prevents the terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • a sixth aspect of the embodiments of the present application provides a communication method, including:
  • the target access network device receives a handover request message from the source access network device, and the handover request message is used to request that the terminal device be handed over to the target cell;
  • the handover request message includes at least one of the following: first information or second information; One piece of information is used to instruct the terminal equipment to be restricted to move in cells that support external authentication; the second information includes information about the home service provider or home service provider group; the target access network equipment performs access control to determine whether to allow the terminal equipment to switch to the target Cell; the target access network device sends a handover preparation failure message to the source access network device;
  • the handover preparation failure message includes failure reasons, and the failure reasons include any of the following: the target cell does not support external authentication, the target cell does not support the home service provider or The external authentication of the home service provider group, or the rejection of the terminal equipment to use the certificate owned by the external entity to access the network to which the target cell belongs.
  • the target access network device acquires the first information and/or the second information from the source access network device. In this way, the target access network device can determine whether to allow the terminal device to switch to the target cell according to the first information and/or the second information. If the target access network device does not allow the terminal device to switch to the target cell, the target access network device sends a handover preparation failure message to the source access network device. And, the handover preparation failure message includes the failure reason. In this way, the source access network device can determine the cause of the handover failure in combination with the failure cause, and re-select a cell for the terminal device to request handover.
  • the source access network device may also update the information about the external authentication of the target cell stored on the source access network device according to the failure reason. It is avoided that the source access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot complete the secondary authentication of the terminal device after switching to the target cell.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the target access network device can determine that the terminal device is restricted to move in a cell that supports the home service provider or the home service provider group. Thereby, enabling the target access network device to restrict the terminal device from moving in the cell supporting the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the handover preparation failure message further includes information that the target cell supports the home service provider or the home service provider group.
  • the source access network device can update or modify the information about the external authentication of the target cell stored on the source access network device according to the information that the target cell supports the home service provider or the home service provider group. It is avoided that the source access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot perform secondary authentication.
  • the target access network device performs access control to determine whether to allow the terminal device to switch to the target cell, including:
  • the target access network device does not allow the terminal device to be handed over to the target cell
  • the target access network device does not allow the terminal device to switch to the target cell.
  • This implementation shows a specific process in which the target access network device determines whether to allow the terminal device to handover to the target cell in combination with the first information, the second information and the external authentication support capability of the target cell.
  • the terminal equipment is restricted to move only in cells that support external authentication or cells that support home service providers or home service provider groups. It prevents the terminal equipment from moving to a cell that does not support external authentication and cannot complete the secondary authentication of the terminal equipment, and prevents the terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • a seventh aspect of an embodiment of the present application provides a communication method, including:
  • the source access network device sends a handover request message to the core network device; the source access network device receives the handover preparation failure message from the core network device; the handover preparation failure message includes the failure reason, and the failure reason includes any of the following: the target cell does not support External authentication, the target cell does not support the external authentication of the home service provider or the home service provider group, or the terminal device is refused to use the certificate owned by the external entity to access the network to which the target cell belongs.
  • the core network device sends a handover preparation failure message to the source access network device.
  • the handover preparation failure message includes the failure reason.
  • the source access network device can determine the cause of the handover failure in combination with the failure cause, and re-select a cell for the terminal device to request handover.
  • the source access network device may also update the information about the external authentication of the target cell stored on the source access network device according to the failure reason. It is avoided that the source access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot perform external authentication again. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the handover preparation failure message further includes information of the home service provider or home service provider group supported by the target cell.
  • the source access network device can update or modify the information about the external authentication of the target cell stored on the source access network device according to the information that the target cell supports the home service provider or the home service provider group. It is avoided that the source access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot perform external authentication again.
  • An eighth aspect of the embodiments of the present application provides a communication method, the method comprising:
  • the core network device receives a handover request message sent from the source access network device; the core network device sends a handover request message to the target access network device; the handover request message is used to request the terminal device to be handed over to the target cell; the handover request message includes at least one of the following: Item: first information or second information; the first information is used to indicate that the terminal device is restricted to move in cells that support external authentication; the second information includes the information of the home service provider or the home service provider group; if the target access network device The terminal device is allowed to switch to the target cell, and the core network device receives a handover request confirmation message from the target access network device; the core network device sends a handover command to the source access network device.
  • the core network device sends the first information and/or the second information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to switch to the target cell according to the first information and/or the second information.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or in a cell supporting a home service provider or a home service provider group. It is avoided that the terminal equipment moves to a cell that does not support external authentication and cannot complete the secondary authentication of the terminal equipment. This further prevents terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • the information of the home service provider or the home service provider group includes the identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the target access network device can determine that the terminal device is restricted to move in cells that support the home service provider or home service provider group. Thereby, enabling the target access network device to restrict the terminal device from moving in the cell supporting the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • a ninth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the core network device receives a handover request message sent from the source access network device; the core network device sends a handover request message to the target access network device; the handover request message is used to request the terminal device to be handed over to the target cell; the handover request message includes at least one of the following: Item: first information, or second information; the first information is used to indicate that the terminal equipment is restricted to move in cells that support external authentication; the second information includes the information of the home service provider or the home service provider group; the core network device receives information from the target The handover failure message of the access network device; the handover failure message includes the failure reason, and the failure reason includes any of the following: the target cell does not support external authentication, the target cell does not support the external authentication of the home service provider or home service provider group, or rejects
  • the terminal device uses the certificate owned by the external entity to access the network to which the target cell belongs; the core network device sends a handover preparation failure message to the source access network device, and the handover preparation failure message includes the failure reason.
  • the core network device sends the first information and/or the second information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to handover to the target cell according to the first information and/or the second information. If the target access network device does not allow the terminal device to switch to the target cell, the core network device sends a handover preparation failure message to the source access network device. And, the handover preparation failure message includes the failure reason.
  • the source access network device can determine the cause of the handover failure based on the failure cause, and re-select a cell for the terminal device to request handover. Further, the source access network device may also update the information of the target cell stored on the source access network device according to the failure reason. It is avoided that the source access network device mistakenly switches the terminal device to the target cell and causes the terminal device to perform secondary authentication.
  • the information of the home service provider or the home service provider group includes the identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the target access network device can determine that the terminal device is restricted to move in cells that support the home service provider or home service provider group. Thereby, enabling the target access network device to restrict the terminal device from moving in the cell supporting the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the handover failure message further includes information about the home service provider or home service provider group supported by the target cell; the handover preparation failure message also includes the home service provider or home service provider group supported by the target cell Information.
  • the core network device sends the information of the home service provider or the home service provider group supported by the target cell to the source access network device. Then, the source access network device can update or modify the information of the target cell stored on the source access network device according to the information that the target cell supports the home service provider or the home service provider group. It is avoided that the source access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot perform external authentication again.
  • a tenth aspect of the embodiments of the present application provides a communication method, the method comprising:
  • the target access network device receives a handover request message from the core network device, where the handover request message is used to request handover of the terminal device to the target cell; the handover request message includes at least one of the following: first information or second information; first information It is used to instruct the terminal device to be restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group; the target access network device performs access control to determine whether to allow the terminal device to switch to the target cell; The target access network device sends a handover request confirmation message to the core network device.
  • the target access network device receives the first information and/or the second information from the core network device. In this way, the target access network device can determine whether to allow the terminal device to handover to the target cell according to the first information and/or the second information.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or in a cell supporting a home service provider or a home service provider group. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the target access network device can determine that the terminal device is restricted to move in cells that support the home service provider or home service provider group. Thereby, enabling the target access network device to restrict the terminal device to move only in the cell supporting the home service provider or the home service provider group. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication, thereby ensuring normal communication.
  • the target access network device performs access control to determine whether to allow the terminal device to switch to the target cell, including:
  • the target access network device allows the terminal device to be handed over to the target cell
  • the target access network device allows the terminal device to switch to the target cell.
  • This implementation shows a specific process in which the target access network device determines whether to allow the terminal device to handover to the target cell in combination with the first information, the second information and the external authentication support capability of the target cell.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or in a cell supporting a home service provider or a home service provider group. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • An eleventh aspect of the embodiments of the present application provides a communication method, the method comprising:
  • the target access network device receives a handover request message from the core network device, where the handover request message is used to request handover of the terminal device to the target cell; the handover request message includes at least one of the following: first information or second information; first information It is used to instruct the terminal device to be restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group; the target access network device performs access control to determine whether to allow the terminal device to switch to the target cell;
  • the target access network device sends a handover failure message to the core network device; the handover failure message includes failure reasons, and the failure reasons include any of the following: the target cell does not support external authentication, the target cell does not support the home service provider or home service provider group. Externally authenticate, or deny, the terminal device to use the certificate possessed by the external entity to access the network to which the target cell belongs.
  • the target access network device receives the first information and/or the second information from the core network device. In this way, the target access network device can determine whether to allow the terminal device to handover to the target cell according to the first information and/or the second information. If the target access network device does not allow the terminal device to switch to the target cell, the target access network device sends a handover failure message to the core network device, and the handover failure message includes the failure reason. In this way, the core network device can send the failure reason to the source access network device. In this way, the source access network device can determine the cause of the handover failure in combination with the failure cause, and re-select a cell for the terminal device to request handover. Further, the source access network device may also update the information about the external authentication of the target cell stored on the source access network device according to the failure reason. It is avoided that the source access network device mistakenly switches the terminal device to the target cell and the terminal device cannot complete the secondary authentication.
  • the information of the home service provider or the home service provider group includes the identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the target access network device can determine that the terminal device is restricted to move in cells that support the home service provider or home service provider group. Thereby, enabling the target access network device to restrict the terminal device to move only in the cell supporting the home service provider or the home service provider group. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication, thereby ensuring normal communication.
  • the handover preparation failure message further includes the information of the home service provider or the home service provider group supported by the target cell.
  • the target access network device sends information about the home service provider or home service provider group supported by the target cell to the core network device. Then, the core network device sends the information of the home service provider or home service provider group supported by the target cell to the source access network device. Then, the source access network device can update or modify the information of the target cell stored on the source access network device according to the information that the target cell supports the home service provider or the home service provider group. It is avoided that the source access network device mistakenly switches the terminal device to the target cell and the terminal device cannot complete the secondary authentication.
  • the target access network device performs access control to determine whether to allow the terminal device to switch to the target cell, including:
  • the target access network device does not allow the terminal device to be handed over to the target cell
  • the target access network device does not allow the terminal device to switch to the target cell.
  • This implementation shows a specific process in which the target access network device determines whether to allow the terminal device to handover to the target cell in combination with the first information, the second information and the external authentication support capability of the target cell.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or in a cell supporting a home service provider or a home service provider group. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • a twelfth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the first access network device receives the RRC recovery request message from the terminal device; the first access network device sends a request message for extracting the UE context to the source access network device; the first access network device receives the extraction from the source access network device UE context response message; extracting UE context response message includes at least one of the following: first information or second information; the first information is used to instruct the terminal equipment to be restricted to move in cells that support external authentication; the second information includes the home service provider or Information of the home service provider group; the first access network device sends an RRC recovery message to the terminal device.
  • the first access network device receives the first access network device sent from the source access network device. a message and or a second message. In this way, the first access network device can restrict the terminal device from moving in the cell supporting external authentication according to the first information and/or the second information.
  • the terminal equipment is prevented from being unable to complete the secondary authentication due to moving to a cell that does not support external authentication, so as to prevent the terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the first access network device can determine that the terminal device is restricted to move in cells that support the home service provider or the home service provider group.
  • the terminal equipment cannot complete the secondary authentication, so as to ensure the normal communication.
  • a thirteenth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the first access network device receives the RRC recovery request message from the terminal device; the first access network device sends a request message for extracting the UE context to the source access network device; the first access network device receives the extraction from the source access network device
  • the UE context failure message is extracted, and the UE context failure message includes a failure cause, and the failure cause includes a mismatch of external authentication information; the first access network device sends an RRC establishment message to the terminal device.
  • the first access network device sends the source access network device to the source access network device. Sending failure reason. In this way, the first access network device determines that the RRC recovery request of the terminal device fails.
  • the first access network device may instruct the terminal device to re-establish the RRC connection.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the first access network device can determine that the terminal device is restricted to move in cells that support the home service provider or the home service provider group.
  • a fourteenth aspect of the embodiments of the present application provides a communication method, the method comprising:
  • the source access network device receives an extract UE context request message from the first access network device; the source access network device sends an extract UE context response message to the first access network device; the extract UE context response message includes at least one of the following: The first information or the second information, where the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group.
  • the source access network device determines that the first access network device is allowed to extract the context of the terminal device, the source access network device sends the first information and the first access network device to the first access network device. or secondary information.
  • the first access network device can restrict the terminal device from moving in the cell supporting external authentication according to the first information and/or the second information. The problem that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication is avoided, so as to prevent the terminal device from being unable to perform corresponding services, thereby ensuring normal communication.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group. It is implemented to enable the first access network device to restrict the terminal device to move only in cells that support the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the source access network device determines, according to the context of the terminal device, whether to allow the first access network device to extract the context of the terminal device, including:
  • the source access network device allows the first access network device to extract the context of the terminal device
  • the context of the terminal device includes the second information, or the context of the terminal device includes the first information and the second information, and the identity of the home service provider or the home service provider group whose cell where the terminal device initiates the RRC recovery request supports external authentication includes: If the second information includes an identifier of at least one home service provider or a group of home service providers, the source access network device allows the first access network device to extract the context of the terminal device.
  • a fifteenth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the source access network device receives a request message for extracting the UE context from the first access network device; the source access network device sends a context extraction failure message to the first access network device; the UE context extraction failure message includes the failure reasons, and the failure reasons include External authentication information does not match.
  • the source access network device determines that the first access network device is allowed to extract the context of the terminal device, the source access network device sends the first information and the first access network device to the first access network device. or secondary information. In this way, the first access network device can restrict the terminal device from moving in the cell supporting external authentication according to the first information and/or the second information. If the source access network device determines that the first access network device is not allowed to extract the context of the terminal device, the source access network device sends a failure reason to the first access network device. In this way, the first access network device determines that the RRC recovery request of the terminal device fails. The first access network device may instruct the terminal device to re-establish the RRC connection.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group. It is implemented to enable the first access network device to restrict the terminal device to move only in cells that support the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the source access network device determines, according to the context of the terminal device, whether to allow the first access network device to extract the context of the terminal device, including:
  • the source access network device does not allow the first access network device to extract the context of the terminal device ;
  • the context of the terminal device includes the second information, or the context of the terminal device includes the first information and the second information, and the identity of the home service provider or the home service provider group whose cell where the terminal device initiates the RRC recovery request supports external authentication includes: The identifier of at least one home service provider or home service provider group that is not included in the second information, the source access network device does not allow the first access network device to extract the context of the terminal device.
  • the source access network device determines whether to allow the first access network device to extract the context of the terminal device according to the first information and/or the second information is shown.
  • the implementation enables energy access network equipment to restrict terminal equipment from moving in cells that support external authentication. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services.
  • a sixteenth aspect of the embodiments of the present application provides a communication method, the method comprising:
  • the first access network device sends an auxiliary node addition request message to the second access network device;
  • the auxiliary node addition request message includes the identifier of the target cell for which the terminal device requests dual connectivity;
  • the auxiliary node addition request message includes at least one of the following : first information, or second information; the first information is used to instruct the terminal equipment to be restricted from moving in cells that support external authentication;
  • the second information includes the information of the home service provider or the home service provider group; the first access network device receives A secondary node addition request confirmation message from the second access network device.
  • the first access network device sends the first information and/or the second information to the second access network device.
  • the second access network device can determine whether to allow the terminal device to be dual-connected to the target cell according to the first information and/or the second information, so as to restrict the terminal device from moving in the cell supporting external authentication. It is avoided that the terminal device is dual-connected to a cell that does not support external authentication and the secondary authentication of the terminal device cannot be completed. This further prevents terminal equipment from being unable to perform corresponding services.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group. It is implemented to enable the first access network device to restrict the terminal device to move only in cells that support the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • a seventeenth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the first access network device sends an auxiliary node addition request message to the second access network device;
  • the auxiliary node addition request message includes the identifier of the target cell for which the terminal device requests dual connectivity;
  • the auxiliary node addition request message includes at least one of the following : first information, or second information; the first information is used to instruct the terminal equipment to be restricted from moving in cells that support external authentication;
  • the second information includes the information of the home service provider or the home service provider group;
  • the first access network device receives A secondary node addition request rejection message from the second access network device;
  • the addition request rejection message includes failure reasons, and the failure reasons include any of the following: the target cell does not support external authentication, the target cell does not support one or more home services external authentication of the provider or the home service provider group, or deny the terminal device to use the certificate owned by the external entity to access the network to which the target cell belongs.
  • the first access network device sends the first information and/or the second information to the second access network device.
  • the second access network device can determine whether to allow the terminal device to be dual-connected to the target cell according to the first information and/or the second information. If the second access network device does not allow the terminal device to be dual-connected to the target cell, the first access network device receives a secondary node addition request rejection message from the second access network device. And, the new request rejection message includes the failure reason. In this way, the first access network device can determine that the dual connection request fails. The access network device can reselect a cell for the terminal device and make a dual connection request.
  • the first access network device may also update the external authentication related information of the target cell stored on the first access network device according to the failure cause. It is avoided that the first access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot complete the secondary authentication.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal equipment is restricted to support the cell movement of the home service provider or the home service provider group.
  • the implementation of enabling the second access network device restricts the terminal device to move only in cells that support the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the information of the home service provider or the home service provider group includes the identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the implementation of enabling the second access network device restricts the terminal device to move only in cells that support the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the new request rejection message further includes the information of the home service provider or the home service provider group supported by the target cell.
  • the first access network device updates or modifies the information about the external authentication of the target cell stored on the first access network device according to the information of the home service provider or home service provider group supported by the target cell . It is avoided that the first access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot complete the secondary authentication.
  • An eighteenth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the second access network device receives the secondary node addition request message from the first access network device; the secondary node addition request message includes the identifier of the target cell for which the terminal device requests dual connectivity; the secondary node addition request message includes at least one of the following Item: first information, or second information; the first information is used to indicate that the terminal equipment is restricted to move in cells that support external authentication; the second information includes the information of the home service provider or the home service provider group; the second access network equipment Perform access control to determine whether to allow the terminal device to be dual-connected to the target cell; if the second access network device allows the terminal device to be dual-connected to the target cell, the second access network device sends an auxiliary node new addition to the first access network device Request confirmation message.
  • first information is used to indicate that the terminal equipment is restricted to move in cells that support external authentication
  • the second information includes the information of the home service provider or the home service provider group
  • the second access network equipment Perform access control to determine whether to allow the terminal device to be dual-connected to the target cell; if the second
  • the second access network device receives the first information and/or the second information from the first access network device.
  • the second access network device can determine whether to allow the terminal device to be dual-connected to the target cell according to the first information and/or the second information, so as to restrict the terminal device from moving in the cell supporting external authentication. It is avoided that the terminal device is dual-connected to a cell that does not support external authentication and the secondary authentication of the terminal device cannot be completed. This further prevents terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group.
  • the implementation of enabling the second access network device restricts the terminal device to move only in cells that support the home service provider or the home service provider group. Avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the second access network device performs access control to determine whether to allow the terminal device to be dual-connected to the target cell, including:
  • the second access network device allows the terminal device to be dual-connected to the target cell
  • the second access network device allows the terminal device to be dual-connected to the target cell.
  • the second access network device determines whether to allow the first access network device to extract the context of the terminal device according to the first information and/or the second information is shown.
  • the implementation enables the second access network device to restrict the terminal device from moving in a cell that supports external authentication. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services.
  • a nineteenth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the second access network device receives the secondary node addition request message from the first access network device; the secondary node addition request message includes the identifier of the target cell for which the terminal device requests dual connectivity; the secondary node addition request message includes at least one of the following Item: first information, or second information; the first information is used to indicate that the terminal equipment is restricted to move in cells that support external authentication; the second information includes the information of the home service provider or the home service provider group; the second access network equipment Perform access control to determine whether to allow the terminal device to be dual-connected to the target cell; the second access network device sends a secondary node addition request rejection message to the first access network device; the addition request rejection message includes failure reasons, and the failure reasons include Any of the following: the target cell does not support external authentication, the target cell does not support external authentication of one or more home service providers or home service provider groups, or the terminal device is denied access to the target cell using the certificate owned by the external entity network.
  • the second access network device receives the first information and/or the second information from the first access network device. In this way, the second access network device can determine whether to allow the terminal device to be dual-connected to the target cell according to the first information and/or the second information. If the second access network device does not allow the terminal device to be dual-connected to the target cell, the second access network device sends a secondary node addition request rejection message to the first access network device. And, the new request rejection message includes the failure reason. In this way, the first access network device can determine that the dual connection request fails. The access network device can reselect a cell for the terminal device and make a dual connection request.
  • the first access network device may also update the external authentication related information of the target cell stored on the first access network device according to the failure cause. It is avoided that the first access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot complete the secondary authentication.
  • the new request rejection message further includes information about the home service provider or home service provider group supported by the target cell.
  • the second access network device sends the information of the home service provider or the home service provider group supported by the target cell to the first access network device.
  • the first access network device updates or modifies the external authentication related information of the target cell stored on the first access network device according to the information of the home service provider or home service provider group supported by the target cell. It is avoided that the first access network device mistakenly switches the terminal device to the target cell, so that the terminal device cannot complete the secondary authentication.
  • the second access network device performs access control to determine whether to allow the terminal device to be dual-connected to the target cell, including:
  • the second access network device does not allow the terminal device to be dual-connected to the target cell;
  • the secondary node addition request message includes the second information, or the secondary node addition request message includes the first information and the second information, and the identity of the home service provider or home service provider group that supports external authentication of the target cell does not include the second information If the information includes the identifier of at least one home service provider or home service provider group, the second access network device does not allow the terminal device to be dual-connected to the target cell.
  • the second access network device determines whether to allow the first access network device to extract the context of the terminal device according to the first information and/or the second information is shown.
  • the implementation enables the second access network device to restrict the terminal device from moving in a cell that supports external authentication. It is avoided that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services.
  • a twentieth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the first network element receives a paging message from the second network element, and the paging message includes at least one of the following: first information or second information; the first information is used to instruct the terminal device to be restricted to move in a cell that supports external authentication;
  • the second information includes the information of the home service provider or the home service provider group; the first network element selects the target cell according to the paging message; the first network element pages the terminal equipment in the target cell.
  • the first network element receives the paging message from the second network element.
  • the paging message includes at least one of the following: first information, or second information.
  • the first network element can select the target cell according to the first information and/or the second information.
  • the first network element may page the terminal device in a cell supporting external authentication or a cell supporting the home service provider or home service provider group included in the second information. Avoid paging terminal equipment in cells that do not support external authentication. The number of paging messages sent by the first network element is reduced, and signaling overhead is saved.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group. Then, the first network element can only page the terminal device in a cell that supports external authentication, thereby saving signaling overhead.
  • the first network element is a first access network device
  • the second network element is a second access network device
  • the paging message is an access network paging message
  • the above implementation manner is also applicable to the paging process initiated by the access network.
  • the first access network device only pages the terminal device in a cell that supports external authentication, thereby saving signaling overhead.
  • the first network element is an access network device
  • the second network element is a core network device
  • the above implementation manner is also applicable to the paging process initiated by the core network.
  • Access network equipment only pages terminal equipment in cells that support external authentication, thereby saving signaling overhead.
  • the first network element selects the target cell according to the paging message, including: if the paging message includes the first information and does not include the second information, the first network element selects a cell that supports external authentication as the target cell; if the paging message includes the second information, or the paging message includes the first information and the second information, the first network element selects a cell that supports the home service provider or the home service provider group as the target cell.
  • the first network element can only page the terminal device in the cell that supports external authentication. Avoid paging terminal equipment in cells that do not support external authentication. The number of paging messages sent by the first network element is reduced, and signaling overhead is saved.
  • a twenty-first aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the second network element sends a paging message to the first network element, and the paging message includes at least one of the following: first information or second information; the first information is used to instruct the terminal device to be restricted to move in a cell that supports external authentication; The second information includes the information of the home service provider or the home service provider group.
  • the second network element sends a paging message to the first network element.
  • the paging message includes at least one of the following: first information, or second information.
  • the first network element can select the target cell according to the first information and/or the second information.
  • the first network element may page the terminal device in a cell supporting external authentication or a cell supporting the home service provider or home service provider group included in the second information. It avoids paging terminal equipment in cells that do not support external authentication, reduces the number of paging messages sent by the first network element, and saves signaling overhead.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the home service provider or the home service provider group is represented by the identifier of the home service provider or the home service provider group.
  • the identity of the home service provider or the home service provider group is used to indicate that the terminal device is restricted to support the cell movement of the home service provider or the home service provider group. Then, the first network element can only page the terminal device in a cell that supports external authentication, thereby saving signaling overhead.
  • the first network element is a first access network device
  • the second network element is a second access network device
  • the paging message is an access network paging message
  • the above implementation manner is also applicable to the paging process initiated by the access network.
  • the first access network device only pages the terminal device in a cell that supports external authentication, thereby saving signaling overhead.
  • the first network element is an access network device
  • the second network element is a core network device
  • the above implementation manner is also applicable to the paging process initiated by the core network.
  • Access network equipment only pages terminal equipment in cells that support external authentication, thereby saving signaling overhead.
  • a twenty-second aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the terminal device receives a unified access control (UAC) parameter for external authentication from the access network device; the terminal device determines whether to access the access network device according to the UAC parameter for external authentication.
  • UAC unified access control
  • the access network device broadcasts a set of UAC parameters for external authentication.
  • the terminal device can receive the UAC parameters for external authentication broadcast by the access network device in the cell of the access network device. Then, the terminal device determines whether to access the access network device according to the UAC parameter used for external authentication.
  • the access network device can perform differential control on two access modes related to external authentication (including access to the network through external authentication and access to the network through non-external authentication). For example, when the network wants to preferentially accept terminal devices that access the network through external authentication, the UAC parameters used for external authentication can be adjusted (for example, the prohibition factor is increased, or the prohibition time is decreased), so that an attempt to access the network by external authentication can be performed. The probability of the terminal equipment entering the network being connected to the network is higher.
  • the unified access control UAC parameters used for external authentication include: a set of UAC parameters corresponding to one or more access categories (access categories, ACs).
  • the UAC parameters used for external authentication may include UAC parameters corresponding to one or more ACs.
  • the terminal device can select a corresponding set of UAC parameters for external authentication according to the AC corresponding to the access attempt of the terminal device. Then, the terminal device makes an access attempt according to the UAC parameter.
  • a twenty-third aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the access network device determines the UAC parameters for external authentication; then, the access network device sends the UAC parameters for external authentication to the terminal device.
  • the access network device determines UAC parameters for external authentication; then, the access network device broadcasts a set of UAC parameters for external authentication. In this way, the terminal device determines whether to access the access network device according to the UAC parameter used for external authentication.
  • the access network device can perform differential control on two access modes related to external authentication (including access to the network through external authentication and access to the network through non-external authentication). For example, when the network wants to preferentially accept terminal devices that access the network through external authentication, the UAC parameters used for external authentication can be adjusted (for example, the prohibition factor is increased, or the prohibition time is decreased), so that an attempt to access the network by external authentication can be performed. The probability of the terminal equipment entering the network being connected to the network is higher.
  • the unified access control UAC parameters used for external authentication include: a set of UAC parameters corresponding to one or more access categories (access categories, ACs).
  • the UAC parameters used for external authentication may include UAC parameters corresponding to one or more ACs.
  • the terminal device can select a corresponding set of UAC parameters for external authentication according to the AC corresponding to the access attempt of the terminal device. Then, the terminal device makes an access attempt according to the UAC parameter.
  • a twenty-fourth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the terminal device establishes an RRC connection with the access network device; then, the terminal device receives information from the home service provider or home service provider group of the core network device.
  • the core network device may send the information of the home service provider or the home service provider group to the terminal device.
  • the terminal device may select, according to the information of the home service provider or the home service provider group, to reselect a cell from the cells supporting the home service provider or the home service provider group to camp or move. Avoid the terminal equipment being unable to complete the secondary authentication because the cell where the terminal equipment moves or resides does not support external authentication. Avoid terminal equipment from being unable to perform corresponding services and ensure normal communication.
  • the method further includes: the terminal device selects a cell that supports a home service provider or a home service provider group to camp on.
  • the terminal device may choose to camp on a cell that supports the home service provider or the home service provider group. It is avoided that the terminal equipment cannot perform corresponding services due to camping on the cell that does not support external authentication. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • a twenty-fifth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the core network device receives the initial UE message from the access network device; the core network device performs external authentication on the terminal device; the core network device sends the information of the home service provider or the home service provider group to the terminal device; the core network device sends the access network The device sends an initial context establishment request message.
  • the core network device may send the information of the home service provider or the home service provider group to the terminal device.
  • the terminal device may choose to reselect a cell from the cells supporting the home service provider or home service provider group to camp or move. Avoid the terminal equipment being unable to complete the secondary authentication because the cell where the terminal equipment moves or resides does not support external authentication. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • a twenty-sixth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the access network device establishes an RRC connection with the terminal device; the access network device sends an initial UE message to the core network device; the access network device receives an initial context establishment request message from the core network device, and the initial context establishment request message includes at least one of the following : first information, or second information; the first information is used to indicate that the terminal equipment is restricted to move in a cell that supports online subscription; the second information includes information about the network to be subscribed for the terminal equipment; the access network equipment sends an initial Build up and down response messages.
  • the access network device acquires the first information and/or the second information from the core network device. In this way, the access network device can restrict the terminal device to move only in a cell that supports online subscription according to the first information and/or the second information. It is avoided that the terminal device cannot obtain the certificate of the network to be subscribed for the terminal device because the terminal device moves to a cell that does not support online subscription.
  • the information of the network to be subscribed of the terminal device includes the identifier of the network to be subscribed.
  • the access network device can restrict the terminal device from moving in a cell that supports online subscription of the network to be subscribed according to the identity of the network to be subscribed. It is avoided that the terminal device cannot obtain the certificate of the network to be subscribed for the terminal device because the terminal device moves to a cell that does not support online subscription.
  • a twenty-seventh aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the core network device receives the initial UE message from the access network device; the core network device sends an initial context establishment request message to the access network device, and the initial context establishment request message includes at least one of the following: first information or second information; One piece of information is used to indicate that the terminal equipment is restricted to move in a cell that supports online subscription; the second information includes information about the network to be subscribed to by the terminal equipment; the core network equipment receives an initial context establishment response message from the access network equipment.
  • the core network device sends the first information and/or the second information to the access network device.
  • the access network device can restrict the terminal device to move only in a cell that supports online subscription according to the first information and/or the second information. It is avoided that the terminal device cannot obtain the certificate of the network to be subscribed for the terminal device because the terminal device moves to a cell that does not support online subscription.
  • the information of the network to be subscribed of the terminal device includes the identifier of the network to be subscribed.
  • the core network device sends the identification of the network to be subscribed to the access network device.
  • the access network device can restrict the terminal device from moving in the cell supporting the online subscription of the network to be subscribed according to the identity of the network to be subscribed. It is avoided that the terminal device cannot obtain the certificate of the network to be subscribed for the terminal device because the terminal device moves to a cell that does not support online subscription.
  • a twenty-eighth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the terminal device receives the UAC parameter for online subscription from the access network device; then, the terminal device determines whether to access the access network device according to the UAC parameter for online subscription.
  • the terminal device receives a set of UAC parameters for online subscription broadcast by the access network device. Then, the terminal device determines whether to access the access network device according to the UAC parameter used for online subscription.
  • the access network device may perform differential control on two access modes (including access to the network in an online subscription mode or access to the network in a non-online subscription mode). For example, when the network wants to preferentially accept terminal devices that access the network through online subscription, the UAC parameters for online subscription can be adjusted (for example, the prohibition factor is increased, or the prohibition time is decreased), so as to attempt to receive access through online subscription. The probability of the terminal equipment entering the network being connected to the network is higher.
  • the UAC parameters used for online subscription include: a group of UAC parameters corresponding to the AC, where the AC is the AC corresponding to the online subscription access.
  • the access network device broadcasts a set of UAC parameters of the AC corresponding to the online subscription access.
  • the terminal device determines whether to access the access network device according to the UAC parameter used for online subscription.
  • a twenty-ninth aspect of an embodiment of the present application provides a communication method, the method comprising:
  • the access network device determines the UAC parameters for online subscription; the access network device sends the UAC parameters for online subscription to the terminal device.
  • the access network device determines UAC parameters for online subscription, and broadcasts the UAC parameters for online subscription. In this way, the terminal device can determine whether to access the access network device according to the UAC parameter used for online subscription.
  • the access network device may perform differential control on two access modes (including access to the network in an online subscription mode or access to the network in a non-online subscription mode). For example, when the network wants to preferentially accept terminal devices that access the network through online subscription, the UAC parameters for online subscription can be adjusted (for example, the prohibition factor is increased, or the prohibition time is decreased), so as to attempt to receive access through online subscription. The probability of the terminal equipment entering the network being connected to the network is higher.
  • the UAC parameters used for online subscription include: a group of UAC parameters corresponding to the AC, where the AC is the AC corresponding to the online subscription access.
  • the access network device broadcasts a set of UAC parameters of the AC corresponding to the online subscription access.
  • the terminal device determines whether to access the access network device according to the UAC parameter used for online subscription.
  • a thirtieth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to establish a radio resource control RRC connection with the terminal device
  • a sending unit configured to send an initial UE message to the core network device
  • the receiving unit is further configured to receive an initial context establishment request message from the core network device, where the initial context establishment request message includes at least one of the following: first information or second information;
  • the first information is used to indicate that the terminal device is restricted to move in cells that support external authentication
  • the second information includes the information of the home service provider or the home service provider group
  • the sending unit is further configured to send an initial context response message to the core network device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the initial context establishment request message includes a mobility restriction list, and the first information and/or the second information are located in the mobility restriction list.
  • the home service provider includes: a first home service provider that performs external authentication on the terminal device, and/or a second home service provider associated with the first home service provider;
  • the home service provider group includes: a first home service provider group that performs external authentication on the terminal device, and/or a second home service provider group associated with the first home service provider group.
  • the communication device includes a processing unit
  • the processing unit is used for selecting a cell supporting external authentication for the terminal device, or selecting a cell supporting a home service provider or a home service provider group for the terminal device.
  • the sending unit is also used for:
  • the handover request message includes at least one of the following: first information or second information; or,
  • the handover request message includes the identity of the cell selected for external authentication, or includes the identity of the cell supporting the home service provider or the home service provider group;
  • the handover requirement message includes the identity of the cell that supports external authentication, or includes the identity of the cell that supports the home service provider or home service provider group.
  • the receiving unit is also used for:
  • the target access network device is an access network device that initiates an RRC recovery request for the terminal device
  • the sending unit is further configured to send a UE context extraction response message to the target access network device, where the UE context extraction response message includes at least one of the following: first information or second information.
  • the receiving unit is also used for:
  • the target access network device is an access network device that initiates an RRC recovery request for the terminal device
  • a sending unit configured to send a context extraction failure message to the target access network device, where the context extraction failure message includes a failure reason; the failure reason includes a mismatch of external authentication information.
  • the sending unit is also used for:
  • a secondary node addition request message is sent to the target access network device, where the secondary node addition request message includes at least one of the following: first information or second information.
  • a thirty-first aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive an initial UE message from an access network device
  • the processing unit is used to perform external authentication on the terminal device
  • a sending unit configured to send an initial context establishment request message to the access network device, where the initial context establishment request message includes at least one of the following: first information or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication
  • the second information includes the information of the home service provider or the home service provider group
  • the receiving unit is further configured to receive an initial context response message from the access network device.
  • the information of the home service provider or the home service provider group refers to the identifier of the home service provider or the home service provider group.
  • the initial context establishment request message includes a mobility restriction list, and the first information and/or the second information are located in the mobility restriction list.
  • the home service provider includes: a first home service provider that performs external authentication on the terminal device, and/or a second home service provider associated with the first home service provider;
  • the home service provider group includes: a first home service provider group that performs external authentication on the terminal device, and/or a second home service provider group associated with the first home service provider group.
  • the receiving unit is also used for:
  • a handover requirement message is received from the access network device, where the handover requirement message includes an identifier of a cell that supports external authentication, or an identifier of a cell that supports the home service provider or home service provider group.
  • a thirty-second aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit configured to send a handover request message to the target access network device, where the handover request message is used to request handover of the terminal device to the target cell;
  • the handover request message includes at least one of the following: first information or second information; first The information is used to indicate that the terminal equipment is restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group;
  • the receiving unit is configured to receive a handover request confirmation message from the target access network device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • a thirty-third aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit configured to send a handover request message to the target access network device, where the handover request message is used to request handover of the terminal device to the target cell;
  • the handover request message includes at least one of the following: first information or second information; first The information is used to indicate that the terminal equipment is restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group;
  • a receiving unit configured to receive a handover preparation failure message from the target access network device
  • the handover preparation failure message includes the reason for the failure; the reason for the failure includes any of the following:
  • the target cell does not support external authentication, the target cell does not support external authentication of the home service provider or the home service provider group, or the terminal device is refused to use the certificate owned by the external entity to access the network to which the target cell belongs.
  • the handover preparation failure message further includes information that the target cell supports the home service provider or the home service provider group.
  • a thirty-fourth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a handover request message from the source access network device, where the handover request message is used to request handover of the terminal device to the target cell;
  • the handover request message includes at least one of the following: first information or second information;
  • One piece of information is used to indicate that the terminal equipment is restricted to move in a cell that supports external authentication;
  • the second piece of information includes the information of the home service provider or the home service provider group;
  • a processing unit configured to perform access control and determine whether to allow the terminal device to be handed over to the target cell
  • the sending unit is configured to send a handover request confirmation message to the source access network device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • processing unit is specifically used for:
  • the target cell supports external authentication, allowing the terminal device to handover to the target cell;
  • the terminal device is allowed to switch to the target cell.
  • a thirty-fifth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a handover request message from the source access network device, where the handover request message is used to request handover of the terminal device to the target cell;
  • the handover request message includes at least one of the following: first information or second information;
  • One piece of information is used to indicate that the terminal equipment is restricted to move in a cell that supports external authentication;
  • the second piece of information includes the information of the home service provider or the home service provider group;
  • a processing unit configured to perform access control and determine whether to allow the terminal device to be handed over to the target cell
  • a sending unit configured to send a handover preparation failure message to the source access network device
  • the handover preparation failure message includes the failure reason, and the failure reason includes any of the following: the target cell does not support external authentication, the target cell does not support the external authentication of the home service provider or the home service provider group, or the terminal device is refused to use the external entity.
  • the certificate accesses the network to which the target cell belongs.
  • the handover preparation failure message further includes information that the target cell supports the home service provider or the home service provider group.
  • processing unit is specifically used for:
  • the terminal device is not allowed to handover to the target cell;
  • the terminal device is not allowed to switch to the target cell.
  • a thirty-sixth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit configured to send a handover request message to the core network device
  • a receiving unit configured to receive a handover preparation failure message from the core network device
  • the handover preparation failure message includes the failure reason, and the failure reason includes any of the following: the target cell does not support external authentication, the target cell does not support the external authentication of the home service provider or the home service provider group, or the terminal device is refused to use the external entity.
  • the certificate accesses the network to which the target cell belongs.
  • the handover preparation failure message further includes information of the home service provider or home service provider group supported by the target cell.
  • a thirty-seventh aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a handover request message sent from a source access network device
  • a sending unit configured to send a handover request message to the target access network device
  • the handover request message is used to request the terminal device to be handed over to the target cell; the handover request message includes at least one of the following: first information, or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication
  • the second information includes the information of the home service provider or the home service provider group
  • a receiving unit further configured to receive a handover request confirmation message from the target access network device
  • the sending unit is further configured to send a handover command to the source access network device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the handover failure message further includes information about the home service provider or home service provider group supported by the target cell; the handover preparation failure message also includes the home service provider or home service provider group supported by the target cell Information.
  • a thirty-eighth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a handover request message sent from a source access network device
  • a sending unit configured to send a handover request message to the target access network device
  • the handover request message is used to request the terminal device to be handed over to the target cell; the handover request message includes at least one of the following: first information, or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication
  • the second information includes the information of the home service provider or the home service provider group
  • the receiving unit is further configured to receive a handover failure message from the target access network device if the target access network device does not allow the terminal device to switch to the target cell;
  • the handover failure message includes the failure reason, and the failure reason includes any of the following: the target cell does not support external authentication, the target cell does not support the external authentication of the home service provider or the home service provider group, or the terminal device is refused to use the certificate owned by the external entity Access the network to which the target cell belongs;
  • the sending unit is also used to:
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the handover failure message further includes information about the home service provider or home service provider group supported by the target cell; the handover preparation failure message also includes the home service provider or home service provider group supported by the target cell Information.
  • a thirty-ninth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a handover request message from a core network device; the handover request message is used to request that the terminal device be handed over to a target cell; the handover request message includes at least one of the following: first information, or second information; first information It is used to instruct the terminal equipment to be restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group;
  • a processing unit configured to perform access control and determine whether to allow the terminal device to be handed over to the target cell
  • the sending unit is configured to send a handover request confirmation message to the core network device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the handover preparation failure message further includes information about the home service provider or home service provider group supported by the target cell.
  • processing unit is specifically used for:
  • the target cell supports external authentication, allowing the terminal device to handover to the target cell;
  • the terminal device is allowed to switch to the target cell.
  • a fortieth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a handover request message from a core network device; the handover request message is used to request that the terminal device be handed over to a target cell; the handover request message includes at least one of the following: first information, or second information; first information It is used to instruct the terminal equipment to be restricted to move in a cell that supports external authentication; the second information includes the information of the home service provider or the home service provider group;
  • a processing unit configured to perform access control and determine whether to allow the terminal device to be handed over to the target cell
  • the sending unit is further configured to send a handover failure message to the core network device
  • the handover failure message includes the failure reason, and the failure reason includes any of the following: the target cell does not support external authentication, the target cell does not support the external authentication of the home service provider or the home service provider group, or the terminal device is refused to use the certificate owned by the external entity Access the network to which the target cell belongs.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the handover preparation failure message further includes information about the home service provider or home service provider group supported by the target cell.
  • processing unit is specifically used for:
  • the terminal device is not allowed to switch to the target cell
  • the terminal device is allowed to switch to the target cell.
  • a forty-first aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive an RRC recovery request message from the terminal device
  • a sending unit configured to send a request message for extracting the UE context to the source access network device
  • a receiving unit configured to receive a UE context extraction response message from the source access network device
  • Extracting the UE context response message includes at least one of the following: first information, or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication;
  • the second information includes the information of the home service provider or the home service provider group;
  • the sending unit is further configured to send an RRC recovery message to the terminal device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • a forty-second aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive an RRC recovery request message from the terminal device
  • a sending unit configured to send a request message for extracting the UE context to the source access network device
  • a receiving unit configured to receive a UE context extraction failure message from the source access network device
  • the UE context extraction failure message includes failure reasons, and the failure reasons include external authentication information mismatch;
  • the sending unit is further configured to send an RRC setup message to the terminal device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • a forty-third aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a UE context extraction request message from the first access network device
  • a sending unit configured to send a UE context extraction response message to the first access network device if the communication apparatus allows the first access network device to extract the context of the terminal device;
  • the UE context extraction response message includes at least one of the following: first information or second information, where the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication; the second information includes a home service provider or a home service provider group Information.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • a forty-fourth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a UE context extraction request message from the first access network device
  • a sending unit configured to send a context extraction failure message to the first access network device if the communication device determines that the first access network device is not allowed to extract the context of the terminal device;
  • the UE context extraction failure message includes a failure cause, and the failure cause includes a mismatch of external authentication information.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • a forty-fifth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit configured to send an auxiliary node addition request message to the second access network device;
  • the auxiliary node addition request message includes the identifier of the target cell for which the terminal equipment requests dual connectivity;
  • the auxiliary node addition request message includes at least one of the following: first information, or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication;
  • the second information includes the information of the home service provider or the home service provider group;
  • the receiving unit is configured to receive a secondary node addition request confirmation message from the second access network device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • a forty-sixth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit configured to send an auxiliary node addition request message to the second access network device;
  • the auxiliary node addition request message includes the identifier of the target cell for which the terminal equipment requests dual connectivity;
  • the auxiliary node addition request message includes at least one of the following: first information, or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication;
  • the second information includes the information of the home service provider or the home service provider group;
  • a receiving unit configured to receive a secondary node addition request rejection message from the second access network device
  • the newly added request rejection message includes failure reasons, and the failure reasons include any of the following: the target cell does not support external authentication, the target cell does not support external authentication of one or more home service providers or home service provider groups, or the terminal device is refused to use
  • the certificate owned by the external entity accesses the network to which the target cell belongs.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the new request rejection message further includes the information of the home service provider or the home service provider group supported by the target cell.
  • a forty-seventh aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a secondary node addition request message from the first access network device
  • the secondary node addition request message includes the identifier of the target cell for which the terminal device requests dual connectivity; the secondary node addition request message includes at least one of the following: first information or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication;
  • the second information includes the information of the home service provider or the home service provider group;
  • a processing unit configured to perform access control and determine whether to allow the terminal equipment to be dual-connected to the target cell
  • the sending unit is configured to send a secondary node addition request confirmation message to the first access network device.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • processing unit is specifically used for:
  • the terminal device is allowed to be dual-connected to the target cell;
  • the secondary node addition request message includes the second information, or the secondary node addition request message includes the first information and the second information, and the identifier of the home service provider or home service provider group that supports external authentication of the target cell includes the second information.
  • the included identifier of at least one home service provider or home service provider group allows the terminal device to be dual-connected to the target cell.
  • a forty-eighth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a secondary node addition request message from the first access network device
  • the secondary node addition request message includes the identifier of the target cell for which the terminal device requests dual connectivity; the secondary node addition request message includes at least one of the following: first information or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication;
  • the second information includes the information of the home service provider or the home service provider group;
  • a processing unit configured to perform access control and determine whether to allow the terminal equipment to be dual-connected to the target cell
  • a sending unit configured to send a secondary node addition request rejection message to the first access network device
  • the newly added request rejection message includes failure reasons, and the failure reasons include any of the following: the target cell does not support external authentication, the target cell does not support external authentication of one or more home service providers or home service provider groups, or the terminal device is refused to use
  • the certificate owned by the external entity accesses the network to which the target cell belongs.
  • the new request rejection message further includes information about the home service provider or home service provider group supported by the target cell.
  • processing unit is specifically used for:
  • the terminal device is not allowed to be dual-connected to the target cell;
  • the secondary node addition request message includes the second information, or the secondary node addition request message includes the first information and the second information, and the identity of the home service provider or home service provider group that supports external authentication of the target cell does not include the second information If the information includes the identifier of at least one home service provider or home service provider group, the terminal device is not allowed to be dual-connected to the target cell.
  • a forty-ninth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a paging message from a second network element, where the paging message includes at least one of the following: first information or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication;
  • the second information includes the information of the home service provider or the home service provider group;
  • the processing unit is used for selecting a target cell according to the paging message; and paging the terminal equipment in the target cell.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the communication device is a first access network device
  • the second network element is a second access network device
  • the paging message is an access network paging message.
  • the communication device is an access network device
  • the second network element is a core network device
  • processing unit is specifically used for:
  • the paging message includes the first information and does not include the second information, select a cell that supports external authentication as the target cell;
  • the paging message includes the second information, or the paging message includes the first information and the second information, a cell supporting the home service provider or the home service provider group is selected as the target cell.
  • a fiftieth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit configured to send a paging message to the first network element, where the paging message includes at least one of the following: first information or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication;
  • the second information includes the information of the home service provider or the home service provider group.
  • the information of the home service provider or the home service provider group includes an identifier of the home service provider or the home service provider group.
  • the first network element is a first access network device
  • the communication device is a second access network device
  • the paging message is an access network paging message
  • the first network element is an access network device
  • the communication device is a core network device
  • a fifty-first aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive a unified access control (unified access control, UAC) parameter for external authentication from an access network device;
  • UAC unified access control
  • the processing unit is configured to determine whether to access the access network device according to the UAC parameter used for external authentication.
  • the unified access control UAC parameters used for external authentication include: a set of UAC parameters corresponding to one or more ACs respectively.
  • a fifty-second aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • the sending unit is used for sending UAC parameters for external authentication to the terminal device.
  • the unified access control UAC parameters used for external authentication include: a set of UAC parameters corresponding to one or more access categories (access categories, ACs).
  • a fifty-third aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit used to establish an RRC connection with an access network device
  • the receiving unit is configured to receive information from the home service provider or home service provider group of the core network device.
  • the communication device further includes a processing unit; the processing unit is used for:
  • a fifty-fourth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive an initial UE message from an access network device
  • the processing unit is used to perform external authentication on the terminal device
  • the sending unit is configured to send the information of the home service provider or the home service provider group to the terminal device; and send the initial context establishment request message to the access network device.
  • a fifty-fifth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit used for establishing an RRC connection with the terminal device; sending an initial UE message to the core network device;
  • a receiving unit configured to receive an initial context establishment request message from a core network device, where the initial context establishment request message includes at least one of the following: first information or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports online subscription;
  • the second information includes information of the network to be subscribed to by the terminal device;
  • the sending unit is also used for the core network device to send an initial up-down setup response message.
  • the information of the network to be subscribed of the terminal device includes the identifier of the network to be subscribed.
  • a fifty-sixth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive an initial UE message from an access network device
  • a sending unit configured to send an initial context establishment request message to the access network device, where the initial context establishment request message includes at least one of the following: first information or second information;
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports online subscription;
  • the second information includes information of the network to be subscribed to by the terminal device;
  • the receiving unit is further configured to receive an initial context establishment response message from the access network device.
  • the information of the network to be subscribed of the terminal device includes the identifier of the network to be subscribed.
  • a fifty-seventh aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a receiving unit configured to receive UAC parameters for online subscription from the access network device
  • a processing unit configured to determine whether to access the access network device according to the UAC parameter for online subscription.
  • the UAC parameters used for online subscription include: a group of UAC parameters corresponding to the AC, where the AC is the AC corresponding to the online subscription access.
  • a fifty-eighth aspect of an embodiment of the present application provides a communication device, where the communication device includes:
  • a sending unit configured to send the UAC parameter for online subscription to the terminal device.
  • the UAC parameters used for online subscription include: a group of UAC parameters corresponding to the AC, where the AC is the AC corresponding to the online subscription access.
  • a fifty-ninth aspect of an embodiment of the present application provides a communication device, where the communication device includes: a processor and a memory.
  • a computer program or computer instruction is stored in the memory, and the processor is further configured to invoke and execute the computer program or computer instruction stored in the memory, so that the processor implements any one of the first to twenty-ninth aspects. an implementation.
  • the communication apparatus includes a transceiver; the processor is configured to control the transceiver to perform any one of the implementation manners of any one of the first aspect to the twenty-ninth aspect.
  • a sixtieth aspect of the embodiments of the present application provides a computer program product including computer instructions, characterized in that, when it is run on a computer, the computer is made to perform the implementation of any one of the first to twenty-ninth aspects Way.
  • a sixty-first aspect of an embodiment of the present application provides a computer-readable storage medium, including computer instructions, when the computer instructions are executed on a computer, the computer can execute any one of the first to twenty-ninth aspects. an implementation.
  • a sixty-second aspect of an embodiment of the present application provides a communication apparatus, where the communication apparatus includes entities such as network equipment, terminal equipment, or chips, and the communication apparatus includes a processor for invoking a computer program or computer instruction in a memory, so that the processor Perform any one of the implementations of any one of the above-described first to twenty-ninth aspects.
  • the processor is coupled to the memory through an interface.
  • a sixty-third aspect of an embodiment of the present application provides a communication system, where the communication system includes the communication device of the thirtieth aspect and the communication device of the thirty-first aspect; or the communication system includes the communication device of the thirty-second aspect and the communication device of the thirty-first aspect
  • a sixty-fourth aspect of an embodiment of the present application provides a chip, including a processor, which is connected to a memory and calls a program stored in the memory, so that the processor executes the first to twenty-ninth aspects above. either way of implementation.
  • FIG. 1 is a schematic diagram of a scenario in which a terminal device accesses a network through external authentication according to an embodiment of the present application;
  • FIG. 2 is a schematic diagram of a network architecture according to an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an embodiment of a communication method according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • FIG. 5 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • FIG. 6 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • FIG. 7 is a schematic diagram of another embodiment of a communication method according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • FIG. 9A is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • FIG. 9B is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • FIG. 10A is a schematic diagram of a scenario of online signing in an embodiment of the present application.
  • 10B is a schematic diagram of another scenario of online signing according to the embodiment of the present application.
  • FIG. 11 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 13 is another schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 14 is another schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 15 is another schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 16 is another schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
  • references in this specification to "one embodiment” or “some embodiments” and the like mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
  • appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically emphasized otherwise.
  • the terms “including”, “including”, “having” and their variants mean “including but not limited to” unless specifically emphasized otherwise.
  • At least one means one or more, and “plurality” means two or more.
  • And/or which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • At least one item(s) below or similar expressions thereof refer to any combination of these items, including any combination of single item(s) or plural items(s).
  • At least one item (a) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, and c can be single or multiple .
  • a terminal equipment may also be referred to as a user equipment (user equipment, UE), a mobile station (mobile station, MS), a mobile terminal (mobile terminal), and a client terminal (station, STA) etc.
  • UE user equipment
  • MS mobile station
  • MS mobile terminal
  • client terminal station
  • the terminal device may include a wireless connection-capable handheld device, an in-vehicle device, and the like.
  • Terminal equipment can communicate with one or more core networks via a radio access network (RAN).
  • RAN radio access network
  • terminal equipment can be a mobile phone (or "cellular" phone), a computer with a mobile terminal, a mobile phone (mobile phone), tablet computer, laptop, PDA, mobile internet device (MID), wearable device, virtual reality (VR) device, augmented reality (AR) device, industrial Wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, wireless terminals in smart grid, transportation security wireless terminals in safety), wireless terminals in smart cities, or wireless terminals in smart homes, etc.
  • RAN radio access network
  • the terminal device may also be a portable, pocket-sized, hand-held, computer built-in or vehicle-mounted mobile device, as well as a terminal device in a 5G communication network or a terminal device in a future evolution network, and the like.
  • the end device can also be an industrial IoT device.
  • the terminal device is a park monitoring device in an industrial park.
  • an access network device is a device that provides a wireless communication function for a terminal device, and may also be referred to as an access device, a (R)AN device, or a network device, or the like.
  • Access network equipment includes but is not limited to: next generation node base station (gNB) in 5G communication system, evolved node B (eNB) in LTE system, radio network controller (radio network controller) , RNC), node B (node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS), home base station (home evolved nodeB, or home node B, HNB), Base band unit (BBU), transmitting and receiving point (TRP), transmitting point (TP), small base station equipment (pico), mobile switching center, or network equipment in future networks, etc.
  • This application does not limit the specific types of wireless access network equipment. In systems using different radio access technologies, the names of devices with radio access network device functions may be different.
  • the core network device is responsible for the access control, registration management, service management, mobility management, etc. of the terminal device accessing the network.
  • the core network device may be an access and mobility management function (AMF) in a 5G communication system, or a core network device in a future network, or the like.
  • AMF access and mobility management function
  • This application does not limit the specific types of core network equipment.
  • the names of core network devices may be different.
  • the access network device and the core network device may be dedicated devices in the NPN network. For example, building an NPN network in an industrial park. Access network equipment and core network equipment are only used for campus-wide communications.
  • the NPN network is a network under discussion in the 3rd generation partnership project (3GPP) fifth generation wireless communication (5th generation, 5G) standard, which is different from the traditional cellular network (cellular network), NPN network Allow certain users with specific permissions to access.
  • 3GPP 3rd generation partnership project
  • 5G fifth generation wireless communication
  • the NPN network is divided into two networking modes: independent networking (standalone) and non-standalone networking (non-standalone).
  • independent networking standalone
  • non-standalone networking non-standalone networking
  • the embodiments of this application are applicable to an NPN network in any networking manner, which is not specifically limited in this application.
  • the access network device may be an access network device in an NPN network of independent networking or an access network device in an NPN network of non-independent networking.
  • the core network device may be a core network device in an NPN network of independent networking or a core network device of an NPN network of non-independent networking.
  • FIG. 1 is a schematic diagram of a terminal device accessing a network through external authentication according to an embodiment of the present application.
  • the terminal device accesses the network through external authentication.
  • External authentication includes: the terminal device has the certificate of the external entity, the terminal device accesses the network through the certificate of the external entity (the credential owned by the external entity), and the network authenticates the terminal device on the external entity according to the certificate of the external entity. ).
  • external authentication For the convenience of description, hereinafter referred to as external authentication.
  • the external entity is an entity independent of the network to which the terminal device is accessed. That is, the external entity does not belong to the access network and core network of the network accessed by the terminal device.
  • the external entity can be an entity in another network, or an independent authentication server.
  • the external entity may include one or more entities of another network.
  • the other network is a different network from the network to which the terminal device is connected.
  • the core network of the other network is independent of the core network of the network to which the terminal device accesses. However, there is an interface connection between the core networks of the two networks for information exchange.
  • the external entity or the owner of the external entity may be referred to as a home-service provider (H-SP).
  • H-SP home-service provider
  • Several home service providers can form a home service provider group (H-SP group).
  • the external entity 108 may be an apple server, and the owner of the external entity 108 may be an Apple service provider.
  • the network accessed by the terminal device may be a public land mobile network (PLMN) or an NPN, which is not specifically limited in this application.
  • PLMN public land mobile network
  • NPN Network-to-Network Protocol
  • the PLMN network is a network established and operated by the government or its approved operators for the purpose of providing land mobile communication services to the public, mainly mobile network operators (mobile network operators, MNOs) to provide users with mobile broadband access services. public network.
  • the PLMN described in this application may specifically be a network that meets the requirements of the 3rd generation partnership project (3GPP) standard, which is referred to as a 3GPP network for short.
  • 3GPP 3rd generation partnership project
  • the 3GPP network usually includes but is not limited to the second generation mobile communication (second generation) (referred to as 2G network), the third generation mobile communication (3rd generation) network (referred to as 3G network), the fourth generation mobile communication (4th-generation, 4G) Network (referred to as 4G network), fifth-generation mobile communication (5th-generation, 5G) network (referred to as 5G network), or future sixth-generation mobile communication network (referred to as 6G network) and so on.
  • second generation mobile communication referred to as 2G network
  • 3G network third generation mobile communication (3rd generation) network
  • 4G network fourth generation mobile communication (4th-generation, 4G) Network
  • 5G network fifth-generation mobile communication
  • 6G network future sixth-generation mobile communication network
  • the terminal device accesses the network through the certificate of the external entity owned by the terminal device, and the network authenticates the terminal device on the external entity according to the certificate of the external entity.
  • private information such as user's contract information and authentication information are stored on external entities and will not be acquired by the network, thereby realizing the protection of private information and the neutrality of the network.
  • non-public networks and public networks can have the function of external authentication to improve information security.
  • a non-public network may include an industrial non-public network or a commercial non-public network.
  • the public network may include a networked public network or a mobile public network.
  • each factory has a corresponding authentication server.
  • the campus establishes an NPN network and connects to the authentication servers deployed in each factory.
  • an employee of a factory uses a terminal device to access the NPN network, he/she is authenticated by the authentication server of the factory. After the authentication is successful, the terminal device performs some corresponding business communication and so on.
  • the terminal device is an Apple device, and the terminal device does not have subscription information for connecting to the public network.
  • the terminal device is authenticated on the Apple server by accessing the Unicom public network. After the authentication is passed, the terminal device can use the Unicom public network to communicate.
  • the following describes a network accessed by a terminal device in this embodiment of the present application with reference to FIG. 2 .
  • FIG. 2 is a schematic diagram of a network architecture according to an embodiment of the present application.
  • the network that the terminal device 101 requests to access includes an access network and a core network.
  • the network is connected to external entities 108 .
  • the access network includes access network equipment 102 . It should be noted that only one access network device is shown in FIG. 2 , and in practical applications, the access network of the network may include one or more access network devices.
  • the core network includes an access and mobility management function (AMF) 103, a unified data management (UDM) 104, a policy control function (PCF) 105, and a session management function (session management function).
  • AMF access and mobility management function
  • UDM unified data management
  • PCF policy control function
  • session management function session management function
  • management function, SMF user plane function
  • UPF user plane function
  • the access network device 102 broadcasts the corresponding external authentication indications in the cells of the access network device 102 respectively.
  • the external authentication indication is used to indicate that the corresponding cell of the access network device 102 supports external authentication.
  • the access network device 102 broadcasts the identification of the home service provider or the home service provider group supported by the corresponding cell in the cells of the access network device 102 respectively.
  • the access network device 102 includes cell 1 and cell 2 .
  • the cell 1 supports the authentication of the Apple service provider 1
  • the cell 2 supports the authentication of the volkswagen service provider 1.
  • the access network device 102 broadcasts the identity of the Apple service provider 1 in cell 1, and broadcasts the identity of the public service provider 1 in cell 2.
  • the home service provider or home service provider group supported by each cell in the cells of the access network device 102 may be determined by the service provider or operator according to a corresponding policy.
  • the terminal device 101 receives the external authentication information broadcast by the access network device 102 .
  • the external authentication indications corresponding to the cells of the access network device 102 respectively.
  • the identity of the home service provider or home service provider group supported by the cell of the access network device 102 Then, the terminal device 101 selects a cell from the cells of the access network device 102 according to the certificate of the external entity possessed by the terminal device 101, and requests to access the cell through the certificate of the external entity.
  • AMF103 is responsible for access control, registration management, service management, mobility management, etc. of terminal equipment accessing the network.
  • the AMF 103 may acquire the certificate of the external entity of the terminal device 101 from the access network device 102 .
  • the AMF 103 selects an appropriate network element from the core network, and sends the certificate of the external entity to the network element.
  • the network element authenticates the terminal device 101 on the external entity 108 according to the certificate of the external entity.
  • the UDM 104 is responsible for storing information such as subscriber permanent identifier (SUPI), security context (security context), and subscription data of subscribers in the network.
  • the subscriber of the above-mentioned network can specifically be a user who uses the service provided by the network, such as a user who uses a subscriber identification module of China Telecom (subscriber identification module, SIM card), or a user who uses a SIM card of China Mobile, etc.
  • the SUPI of the subscribed user may be the number of the SIM card or the like.
  • the above-mentioned security context may be data (cookie) or token (token) stored on a local terminal device (for example, a mobile phone).
  • the subscription data of the above-mentioned subscribers may be the supporting services of the SIM card, such as the data package of the SIM card of the mobile phone, and the like.
  • the PCF 105 is used to provide the SMF 106 with a policy for a protocol data unit (PDU) session.
  • the policies may include charging-related policies, QoS-related policies, authorization-related policies, and the like.
  • the SMF 106 is responsible for managing a protocol data unit (protocol data unit, PDU) session of the terminal device 101 .
  • a PDU session is a channel for transmitting PDUs, and terminal devices need to transmit PDUs to and from the data network through the PDU session.
  • PDU sessions can be established, maintained, deleted, etc. by the SMF 106 .
  • SMF 106 is also used for session management (such as session establishment, modification and release, etc.), service and session continuity (service and session continuity, SSC) mode selection, and session-related functions such as roaming.
  • UPF107 is a gateway for network and data network communication.
  • UPF107 includes user plane-related functions such as data packet routing and transmission, packet detection, service usage reporting, quality of service (QoS) processing, legal interception, uplink packet detection, and downlink packet storage.
  • QoS quality of service
  • FIG. 3 is a schematic diagram of an embodiment of a communication method according to an embodiment of the present application.
  • the communication method includes:
  • a terminal device establishes an RRC connection with an access network device.
  • the terminal device sends an RRC setup request (RRC setup request) message to the access network device. Then, the access network device replies an RRC setup (RRC setup) message to the terminal device. The terminal device establishes an RRC connection between the terminal device and the access network device. Then, the terminal device feeds back an RRC setup complete (RRC setup complete) message to the access network device to inform the access network device that the RRC connection establishment is complete.
  • the terminal device accesses the network through external authentication.
  • the external authentication includes: the terminal device has the certificate of the external entity, the terminal device accesses the network through the certificate of the external entity owned by the terminal device, and the network authenticates the terminal device on the external entity according to the certificate of the external entity.
  • the external entity is an entity independent of the network to which the terminal device is accessed. That is, the external entity does not belong to the access network and core network of the network accessed by the terminal device.
  • the external entity can be an entity in another network, or an independent authentication server.
  • the external entity may include one or more entities of another network.
  • the other network is a different network from the network to which the terminal device is connected.
  • the core network of the other network is independent of the core network of the network to which the terminal device accesses. However, there is an interface connection between the core networks of the two networks for information exchange.
  • the external entity or the owner of the external entity may be referred to as the home service provider.
  • Multiple home service providers may form a home service provider group.
  • the external entity 108 is connected to the network accessed by the terminal device 101 , and the external entity 108 is independent of the network accessed by the terminal device 101 .
  • the external entity 108 may be an Apple server, then the owner of the external entity 108 may be an Apple service provider.
  • the Apple service provider may be an Apple service provider in the Apple service provider group.
  • Each Apple server has a corresponding identifier, which may be specifically referred to as an identifier of an Apple service provider or an identifier of an Apple service provider group.
  • the RRC establishment request message includes the first indication information.
  • the first indication information is used to instruct the terminal device to access the network using a certificate of an external entity possessed by the terminal device; or the first indication information is used to instruct the terminal device to access the network by means of external authentication.
  • the terminal device instructs the access network device through the first indication information: the terminal device accesses the network by means of external authentication.
  • the first indication information is used to instruct the terminal device to access the network by means of external authentication.
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication.
  • the access network device sends an initial UE message (initial UE message) to the core network device.
  • the core network device receives the initial UE message from the access network device.
  • the terminal device accesses the network through external authentication.
  • the access network device determines that the terminal device accesses the network by means of external authentication through the first indication information included in the RRC establishment request message in the foregoing step 301 .
  • the access network device sends an initial UE message to the core network device.
  • the initial UE message includes first indication information to instruct the core network device, the terminal device, to access the network through external authentication.
  • the core network device performs external authentication on the terminal device.
  • the core network device receives a certificate from an external entity of the terminal device.
  • the core network device selects the corresponding network element in the network.
  • the network element authenticates the terminal device on the external entity according to the certificate of the external entity possessed by the terminal device. That is, the network element requests the external entity to authenticate the terminal device according to the certificate of the external entity. Then, the external entity authenticates the terminal device according to the certificate, thereby realizing external authentication of the terminal device.
  • the core network device sends an initial context setup request (initial context setup request) message to the access network device.
  • the access network device receives the initial context establishment request message from the core network device.
  • the initial context establishment request message includes at least one of the following: first information, or second information.
  • first information is described below.
  • the first information is used to indicate that the terminal equipment is restricted (restricted) to move in a cell supporting external authentication; or the first information is used to indicate that the terminal equipment only moves in a cell supporting external authentication.
  • the first information indicates that the terminal device can only move in a cell that supports external authentication. Then the access network device can restrict the terminal device to move only in the cell that supports external authentication. Avoid the problem that the terminal device cannot complete the secondary authentication due to the terminal device moving to a cell that does not support external authentication. Secondary authentication means that the terminal device performs external authentication again.
  • the terminal device moves to a cell that does not support external authentication
  • secondary authentication is required when the terminal device initiates a service request. Because the cell to which the terminal device moves does not support external authentication, and the secondary authentication of the terminal device fails, the terminal device cannot perform corresponding services.
  • the initial context establishment request message includes the first information, it means that the terminal device is restricted to move in a cell that supports external authentication. If the initial context establishment request message does not include the first information, it means that the terminal device can move in a cell that does not support external authentication or a cell that does not support external authentication. In this embodiment, the terminal device accesses the network through external authentication. Therefore, in this embodiment, the initial context establishment request message includes the first information.
  • the first information is used to indicate whether or not the terminal equipment is restricted to move in cells that support external authentication, or the first information is used to indicate whether or not the terminal equipment moves only in cells that support external authentication.
  • the first information is the second indication information.
  • the value of the second indication information is “true” (true) or “restricted” (restricted)
  • it indicates that the terminal device can only move in a cell that supports external authentication.
  • the value of the second indication information is "false” or “not-restricted”
  • it indicates that the terminal device can move in a cell that supports external authentication or a cell that does not support external authentication.
  • the terminal device accesses the network by means of external authentication. Therefore, in this embodiment, the first information indicates that the terminal device is restricted to move in a cell that supports external authentication.
  • the above-mentioned first information may be indication information, or may be other forms of information, which are not specifically limited in this application.
  • the second information includes the information of the home service provider or the home service provider group.
  • the second information is used to instruct the terminal equipment to move only in the cells that support the home service provider or the home service provider group; or the second information is used to indicate that the terminal equipment is restricted to move in the cells that support the home service provider or the home service provider group . That is, the terminal device can only move in cells that support the home service provider or home service provider group.
  • the second information includes the identification of one or more Apple service providers.
  • Each of the one or more Apple Service Providers has a corresponding External Entity.
  • the terminal device moves in a cell that supports the one or more Apple service providers.
  • the terminal device accesses the network by means of external authentication.
  • the core network device selects the corresponding network element, and the network element requests the external entity to authenticate the terminal device.
  • the external entity or the owner of the external entity is called the first home service provider.
  • the first home service provider is a home service provider in the first home service provider group.
  • the home service provider of the second information includes: a first home service provider that performs external authentication on the terminal device, and/or a second home service provider associated with the first home service provider.
  • An example of the second home service provider is: a home service provider of the same type as the first home service provider to which the terminal device requests to access the network connection.
  • the first home service provider is Apple Service Provider 1
  • the network that the terminal device requests to access is also connected to Apple Service Provider 2 and Apple Service Provider 3 (it may also be referred to as the network that also connects the external entities of Apple Service Provider 2 and Apple services). external entity of quotient 3).
  • the second home service provider includes Apple Service Provider 2 and Apple Service Provider 3.
  • Another example of the second home service provider is: a home service provider for which a contract exists between the network connection that the terminal device requests to access and the first home service provider.
  • the first home service provider is a public service provider.
  • the network that the terminal device requests to access is also connected to the external entity of the Apple service provider.
  • the second home service provider includes an Apple service provider.
  • the home service provider group included in the second information includes: a first home service provider group, and/or a second home service provider group associated with the first home service provider group.
  • An example of the second home service provider group is: a home service provider group of the same type as the first home service provider included in the first home service provider group in the network that the terminal device requests to access.
  • the first home service provider is Apple service provider 1
  • the first home service provider group includes Apple service provider 1.
  • the network that the terminal device requests to access also connects the external entity of Apple Service Provider 2 and the external entity of Apple Service Provider 3 .
  • Apple Service Provider 2 and Apple Service Provider 3 are included in the second home service provider group.
  • the second home service provider group may be understood as a home service provider group associated with the first home service provider group.
  • Another example of the second home service provider group is: a home service provider that has a contract between the network that the terminal device requests to access and the first home service provider included in the first home service provider group.
  • the first home service provider is an Apple service provider.
  • the first home service provider group includes Apple service providers.
  • the network to which the terminal device requests access is also connected to external entities of the mass service provider.
  • the Apple service provider is included in the second home service provider group.
  • the second home service provider group may be understood as a home service provider group associated with the first home service provider group.
  • the access network device may determine the first home service provider or the first home service provider group that performs external authentication on the terminal device. In this way, the access network device can select a cell supporting the first home service provider or the first home service provider group for the terminal device.
  • the terminal equipment is prevented from moving to a cell that does not support the first home service provider or the first home service provider group.
  • the core network device may further provide second home service provider information associated with the first home service provider or information of a second home service provider group associated with the first home service provider group.
  • second home service provider information associated with the first home service provider or information of a second home service provider group associated with the first home service provider group.
  • the information of the home service provider or the home service provider group includes the identifier of the home service provider or the home service provider group.
  • the second information includes identifiers of one or more home service providers or home service provider groups.
  • the second information may be specifically expressed in the form of a list or in other forms, which is not specifically limited in this application.
  • the second information includes ⁇ identity of home service provider 1, identity of home service provider 2, identity of home service provider 3 ⁇ .
  • the second information includes ⁇ identity of home service provider group 1, identity of home service provider group 2, identity of home service provider group 3 ⁇ .
  • the identifier of the home service provider or the home service provider group may be located in the SNPN ID. That is, some bits in the SNPN ID are valued. Some bits are used to indicate home service provider or home service provider group.
  • the movement of the terminal equipment in a certain cell includes any of the following possible implementation manners: the terminal equipment switches to the cell; or the terminal equipment performs RRC recovery in the cell; or the terminal equipment is dual-connected to this area.
  • the terminal equipment switches to the cell; or the terminal equipment performs RRC recovery in the cell; or the terminal equipment is dual-connected to this area.
  • the initial context establishment request message includes a mobility restriction list (mobility restriction list).
  • the first information and/or the second information are located in the mobility restriction list.
  • the mobility restriction list in the initial context establishment request message is used to carry the first information and/or the second information, that is, a specific carrying manner is provided.
  • the mobility restriction list is usually used to indicate some restriction conditions of the network behavior of the terminal device. Therefore, the core network device delivers the first information and/or the second information to the access network device through the mobility restriction list. There is no need to indicate that the first information and the second information are relevant restriction information about external authentication of the terminal device through other indication fields or indication signaling, thereby saving signaling overhead or bit overhead.
  • the access network device may determine the first information and/or the second information according to the mobility restriction list.
  • the access network device may select a cell supporting external authentication for the terminal device according to the first information and/or the second information, or select a cell supporting a home service provider or a home service provider group for the terminal device. To prevent the terminal equipment from moving to a cell that does not support external authentication and unable to complete the secondary authentication of the terminal equipment. To prevent the terminal equipment from being unable to perform corresponding services, so as to ensure normal communication.
  • the access network device sends an initial context setup response (initial context setup response) message to the core network device.
  • the core network device receives the initial context establishment response message from the access network device.
  • the access network device After the access network device receives the initial context establishment request message of the core network device, the access network device establishes the context of the terminal device.
  • the context of the terminal device includes the first information and/or the second information. Then, the access network device sends an initial context establishment response message to the core network device.
  • the core network device provides the access network device with the mobility restriction list of the terminal device.
  • the mobility restriction list is used to restrict the terminal device from moving in a cell supporting external authentication, or for restricting movement in a cell supporting home service provider or home service provider group.
  • the access network device needs to select a cell that supports external authentication or a cell that supports the home service provider or home service provider group for the terminal device.
  • the access network device selects a cell supporting external authentication or a cell supporting a home service provider or a home service provider group according to the first information and/or the second information.
  • the access network device selects a cell supporting external authentication or a cell supporting a home service provider or a home service provider group for the terminal device according to the first information and/or the second information. It is avoided that the terminal device cannot complete the secondary authentication due to handover or dual connection to a cell that does not support external authentication or a cell that does not support the home service provider or home service provider group. Avoid terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • this embodiment further includes step 306 and step 307 .
  • Steps 306 and 307 are performed after step 305 .
  • the core network device sends the second information to the terminal device.
  • the terminal device receives the second information from the core network device.
  • the terminal device selects to move or camp in a cell that supports the home service provider or the home service provider group included in the second information.
  • the terminal device may choose to move or camp in a cell that supports the home service provider or home service provider group included in the second information Keep. This can prevent the terminal equipment from moving or camping on cells that do not support external authentication.
  • the access network device acquires the first information and/or the second information from the core network device.
  • the first information is used to indicate that the terminal device is restricted to move in cells that support external authentication;
  • the second information includes the information of the home service provider or the home service provider group.
  • the access network device can refer to the information to select a cell supporting external authentication for the terminal device, or select a cell supporting the home service provider or home service provider group for the terminal device.
  • the terminal equipment is prevented from moving to a cell that does not support external authentication and the terminal equipment cannot complete the secondary authentication, so as to prevent the terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • the access network device may select, for the terminal device, a cell that supports external authentication or a home service provider or home service provider group included in the second information for the terminal device according to the first information and/or the second information. the cell, and then initiates a handover request to the network.
  • the access network device may send the first information and/or the second information to the target access network device for further access control of the target access network device.
  • a cell supporting external authentication or a cell supporting a home service provider or a home service provider group is a cell under the target access network device.
  • the target access network device may also transmit the first information and/or the second information to the access network device to which the terminal device moves during the subsequent movement process of the terminal device, so as to limit the cell to which the terminal device moves. Avoid switching the terminal device to a cell that does not support external authentication or a cell that does not support the home service provider or the home service provider group, so that the terminal device cannot complete the secondary authentication. Avoid terminal equipment from being unable to perform corresponding services. This ensures normal communication.
  • the access network device may transmit the first information and/or the second information to the target access network device.
  • the target access network device is the access network device of the cell where the terminal device initiates the RRC recovery request.
  • the target access network device can determine, according to the first information and/or the second information, whether to allow the terminal device to access the cell where the terminal device initiates the RRC recovery request. Avoid switching the terminal equipment to a cell that does not support external authentication or a cell that does not support the home service provider or the home service provider group, so that the terminal equipment cannot complete the secondary authentication, and prevents the terminal equipment from being unable to perform corresponding services. This ensures normal communication.
  • the access network device selects a cell that supports external authentication or a cell that supports the home service provider or home service provider group for the terminal device according to the first information and/or the second information, and sends the information to the terminal device.
  • the network initiates a dual connection request.
  • the access network device may transmit the first information and/or the second information to the target access network device for further access control of the target access network device.
  • a cell supporting external authentication or a cell supporting a home service provider or a home service provider group is a cell under the target access network device.
  • the target access network device may also transmit the first information and/or the second information to the access network device to which the terminal device moves during the subsequent movement process of the terminal device, so as to limit the cell to which the terminal device moves. Avoid switching the terminal device to a cell that does not support external authentication or a cell that does not support the home service provider or the home service provider group, so that the terminal device cannot complete the secondary authentication. Avoid terminal equipment from being unable to perform corresponding services, thereby ensuring normal communication.
  • FIG. 4 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • the communication method includes:
  • the source access network device selects a target cell.
  • the target cell is the cell of the target access network device. That is, the target cell is a cell managed by the target access network device.
  • the source access network device receives signal qualities from multiple cells measured by the terminal device.
  • the source access network device selects the target cell according to the signal quality of the multiple cells. For example, the source access network device selects the cell with the best signal quality as the target cell.
  • Step 401 is an optional step.
  • the source access network device may select the target cell according to the first information and/or the second information.
  • the target cell is a cell that supports external authentication, or the target cell is a cell that supports the home service provider or home service provider group included in the second information.
  • the source access network device may acquire the first information and/or the second information through the initial access process of the terminal device in the embodiment shown in FIG. 3 .
  • the source access network device may also acquire the first information and/or the second information during the handover process of the terminal device, which is not specifically limited in this application. That is to say, before this embodiment, the terminal device is switched to the source access network device, and the source access network device acquires the first information and/or the second information through the switching process of the terminal device.
  • the source access network device sends a handover request (handover request) message to the target access network device.
  • the target access network device receives the handover request message from the source access network device.
  • the handover request message includes the identity of the target cell.
  • the handover request message is used to request handover of the terminal device to the target cell.
  • the handover request message includes at least one of the following: first information, or second information.
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication. If the handover request message includes the first information, it means that the terminal device can only move in a cell that supports external authentication. If the handover request message does not include the first information, it means that the terminal device can move in a cell that does not support external authentication. In this embodiment, the terminal device can access the source access network device through external authentication.
  • the target access network device performs access control to determine whether to allow the terminal device to be handed over to the target cell.
  • the handover request message includes the first information and/or the second information.
  • the target access network device performs access control according to the first information and/or the second information, and determines whether to allow the terminal device to switch to the target cell.
  • the following introduces a possible implementation manner of the target access network device performing access control to determine whether to allow the terminal device to handover to the target cell in combination with the first information and/or the second information.
  • the technical solutions of the present application still apply.
  • the following implementations do not limit the application.
  • the target access network device allows the terminal device to handover to the target cell.
  • the target access network device does not allow the terminal device to handover to the target cell.
  • the target access network device allows the terminal device to switch to the target cell.
  • the target cell supports Apple Service Provider 1 and Apple Service Provider 2
  • the identity of the home service provider supported by the target cell includes the identity of Apple Service Provider 1 and the identity of Apple Service Provider 2.
  • the second information includes the identity of Apple Service Provider 1 and the identity of Apple Service Provider 3 .
  • the target access network device determines that the target cell supports the authentication of Apple Service Provider 1 . Therefore, the target access network equipment allows the terminal equipment to be handed over to the target cell.
  • the terminal device when the terminal device initiates a service request, if the terminal device needs to perform secondary authentication on the network. Then, the terminal device can access the network through the certificate of Apple Service Provider 1. The network authenticates the terminal device through the certificate of the Apple service provider 1 to an external entity of the Apple service provider 1, so as to ensure the success of the secondary guarantee of the terminal device. In this way, the terminal equipment can perform corresponding services.
  • the target access network device does not allow the terminal device to switch to the target cell.
  • the target cell supports Apple Provider 1 and Apple Provider 2.
  • the identity of the home service provider supported by the target cell includes the identity of Apple service provider 1 and the identity of Apple service provider 2 .
  • the second information includes the identity of the Apple service provider 3 and the identity of the public service provider 1 .
  • the target access network device determines that the identifier of the service provider supported by the target cell does not include the identifier of at least one home service provider in the second information. Then, the target access network device does not allow the terminal device to switch to the target cell, so as to prevent the terminal device from moving to the target cell.
  • step 404a if the target access network equipment allows the terminal equipment to be handed over to the target cell, step 404a is performed; if the target access network equipment does not allow the terminal equipment to be handed over to the target cell, step 404b is performed.
  • the target access network device If the target access network device allows the terminal device to switch to the target cell, the target access network device sends a handover request acknowledgement (handover request acknowledge) message to the source access network device. Correspondingly, if the target access network device allows the terminal device to switch to the target cell, the source access network device receives the handover request message from the target access network device.
  • handover request acknowledge handover request acknowledge
  • this embodiment further includes step 404c. Step 404c may be performed after step 404a.
  • the source access network device sends a handover instruction to the terminal device.
  • the terminal device receives the handover instruction from the source access network device.
  • the handover instruction is used to instruct the terminal device to hand over to the target cell.
  • the source access network device sends the first information and/or the second information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to switch to the target cell according to the first information and/or the second information. If the target access network device allows the terminal device to switch to the target cell, the source access network device sends a handover instruction to the terminal device to instruct the terminal device to switch to the target cell.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or in a cell supporting a home service provider or a home service provider group.
  • the target access network device If the target access network device does not allow the terminal device to switch to the target cell, the target access network device sends a handover preparation failure (handover preparation failure) message to the source access network device. Correspondingly, if the target access network device does not allow the terminal device to switch to the target cell, the source access network device receives a handover preparation failure message from the target access network device.
  • a handover preparation failure handover preparation failure
  • the target access network device If the target access network device does not allow the terminal device to switch to the target cell, the target access network device sends a handover preparation failure message to the source access network device. Then the source access network device can re-select another cell for the terminal device, and initiate a handover request to the access network device that manages the cell.
  • the handover preparation failure message includes a failure cause (cause).
  • the failure reasons include any of the following: the target cell does not support external authentication, the target cell does not support external authentication of the home service provider or home service provider group, or the terminal device is refused to use the certificate owned by the external entity to access the network to which the target cell belongs .
  • the handover preparation failure message includes a cause information element, and the reason information element includes the failure reason.
  • the failure reasons may include that the target cell does not support external authentication, or the terminal device is refused to use the certificate owned by the external entity to access the network to which the target cell belongs.
  • the failure cause may include that the target cell does not support home External certification of the service provider or belonging to the service provider group.
  • the handover preparation failure message further includes information of the home service provider or home service provider group supported by the target cell.
  • the information of the home service provider or the home service provider group supported by the target cell includes: the identifier of the home service provider or the home service provider group supported by the target cell.
  • the home service provider supported by the target cell may be one or more home service providers, and the home service provider group supported by the target cell may be one or more home service provider groups.
  • the target cell supports the authentication of Apple Provider 1 and Apple Provider 2. Then, the handover preparation failure message includes the identity of the Apple service provider 1 and the identity of the Apple service provider 2 .
  • the target cell supports the authentication of Apple Provider 1 and Mass Provider 1. Then, the handover preparation failure message includes the identity of the Apple service provider 1 and the identity of the mass service provider 1 .
  • the source access network device sends the first information and/or the second information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to switch to the target cell according to the first information and/or the second information. If the target access network device does not allow the terminal device to switch to the target cell, the target access network device sends a handover preparation failure message to the source access network device. And, the handover preparation failure message includes the failure reason.
  • the source access network device can determine the cause of the handover failure in combination with the failure cause, and re-select a cell for the terminal device to request handover.
  • the terminal equipment is prevented from moving to a cell that does not support external authentication.
  • the source access network device can modify or update the information about the target cell saved on the source access network device to avoid the source access network device from accessing
  • the network equipment mistakenly switches the terminal equipment to the target cell, so that the terminal equipment cannot complete the secondary authentication. Avoid terminal equipment from being unable to perform corresponding services and ensure normal communication.
  • the source access network device updates the identity of the home service provider or home service provider group supported by the target cell.
  • the above-mentioned embodiment shown in FIG. 4 shows a handover process in which the source access network device switches the terminal device to the target access network device through the interface between the source access network device and the target access network device.
  • the source access network device sends the first information and/or the second information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to switch to the target cell according to the first information and/or the second information. Therefore, the terminal device is made to move in a cell supporting external authentication or in a cell supporting the home service provider or home service provider group.
  • the terminal equipment moves to a cell that does not support external authentication and cannot complete the secondary authentication of the terminal equipment. Avoid terminal equipment from being unable to perform corresponding services and ensure normal communication.
  • FIG. 5 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • the communication method includes:
  • the source access network device selects a target cell for the terminal device.
  • Step 501 is similar to step 401 in the foregoing embodiment shown in FIG. 4 .
  • Step 501 is an optional step.
  • the terminal device accesses the source access network device through external authentication.
  • the specific access process please refer to the related introduction of the embodiment shown in FIG. 3 above.
  • the source access network device sends a handover required (handover required) message to the core network device.
  • the core network device receives the handover request message from the source access network device.
  • the handover requirement message includes the identity of the target cell.
  • the handover request message is used to request handover of the terminal device to the target cell.
  • the core network device may be an AMF.
  • the core network device sends a handover request (handover request) message to the target access network device.
  • the target access network device receives the handover request message from the core network device.
  • the handover request message includes the identity of the target cell.
  • the handover request message is used to request handover of the terminal device to the target cell.
  • the target cell is a cell under the target access network device. That is, the target cell is a cell managed by the target access network device.
  • the handover request message includes at least one of the following: first information, or second information.
  • step 304 for the related introduction of the first information and the second information, please refer to the related introduction of step 304 in the above-mentioned embodiment shown in FIG. 3 , and details are not repeated here.
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication. If the handover request message includes the first information, it means that the terminal device can only move in a cell that supports external authentication. If the handover request message does not include the first information, it means that the terminal device can move in a cell that does not support external authentication. In this embodiment, the terminal device accesses the source access network device through external authentication. Therefore, the handover request message includes the first information.
  • the target access network device performs access control to determine whether to allow the terminal device to be handed over to the target cell.
  • Step 504 is similar to step 403 in the foregoing embodiment shown in FIG. 4 .
  • Step 504 please refer to the relevant introduction of step 403 in the foregoing embodiment shown in FIG. 4 , which will not be repeated here.
  • step 504 if the target access network equipment allows the terminal equipment to switch to the target cell, then steps 505a and 506a are performed; if the target access network equipment does not allow the terminal equipment to switch to the target cell, then steps 505b and 506b are performed.
  • the target access network device If the target access network device allows the terminal device to be handed over to the target cell, the target access network device sends a handover request acknowledgement (handover request acknowledge) message to the core network device. Correspondingly, the core network device receives the handover request confirmation message from the target access network device.
  • handover request acknowledge handover request acknowledge
  • the core network device sends a handover command (handover command) to the source access network device.
  • the source access network device receives the handover command from the core network device.
  • the target access network device sends a handover request confirmation message to the core network device to instruct the target access network device to allow the terminal device to switch to the target cell. Then, the core network device initiates a handover command to the source access network device.
  • this embodiment further includes step 506c.
  • Step 506c is performed after step 506a.
  • the source access network device sends a handover instruction to the terminal device.
  • the terminal device receives the handover instruction from the source access network device.
  • the handover instruction is used to instruct the terminal device to hand over to the target cell.
  • the terminal device switches to the target cell.
  • the core network device sends the first information and/or the second information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to switch to the target cell according to the first information and/or the second information. If the target access network device allows the terminal device to switch to the target cell, the source access network device instructs the terminal device to switch to the target cell.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or in a cell supporting a home service provider or a home service provider group. It is avoided that the terminal equipment moves to a cell that does not support external authentication and cannot complete the secondary authentication of the terminal equipment.
  • the target access network device sends a handover failure (handover failure) message to the core network device.
  • the core network device receives the handover failure message from the target access network device.
  • the handover failure message includes a failure cause (cause).
  • the failure reason includes any one of the following: the target cell does not support external authentication, the target cell does not support external authentication of the home service provider or the home service provider group, or the terminal device is refused to use the certificate owned by the external entity to access the target The network to which the cell belongs.
  • the relevant introduction about the failure reason is similar to the failure reason in step 404b in the embodiment shown in FIG. 4 .
  • the relevant introduction in step 404b in the embodiment shown in FIG. 4 please refer to the relevant introduction in step 404b in the embodiment shown in FIG. 4 , which will not be repeated here.
  • the handover failure message further includes information about the home service provider or home service provider group supported by the target cell.
  • the related introduction about the information about the home service provider or home service provider group supported by the target cell is similar to the related introduction of step 404b in the embodiment shown in FIG. 4.
  • step 404b in the embodiment shown in FIG. 4.
  • the related introductions will not be repeated here.
  • the core network device sends a handover preparation failure (handover preparation failure) message to the source access network device.
  • the source access network device receives the handover preparation failure message from the core network device.
  • the handover preparation failure message includes the failure reason.
  • the failure cause is similar to the failure cause in step 404b in the embodiment shown in FIG. 4 .
  • the failure cause is similar to the failure cause in step 404b in the embodiment shown in FIG. 4 .
  • the handover preparation failure message further includes information of the home service provider or home service provider group supported by the target cell.
  • the related introduction about the information about the home service provider or home service provider group supported by the target cell is similar to the related introduction of step 405 in the embodiment shown in FIG. 4. For details, please refer to step 405 in the embodiment shown in FIG. 4. The related introductions will not be repeated here.
  • the target access network device sends a handover failure message to the core network device.
  • the handover failure message is used to indicate that the target access network device does not allow the terminal device to handover to the target cell.
  • the core network device may send a handover preparation failure message to the source access network device to indicate that the target access network device does not allow the terminal device to handover to the target cell. In this way, the source access network device can re-select another cell for the terminal device, and request the network to switch the terminal device to the other cell.
  • the source access network device can modify or update the information about the target cell saved on the source access network device to avoid the source access network
  • the network equipment mistakenly switches the terminal equipment to the target cell, so that the terminal equipment cannot complete the secondary authentication. Avoid terminal equipment from being unable to perform corresponding services and ensure normal communication.
  • the source access network device updates the identity of the home service provider or home service provider group supported by the target cell.
  • the above embodiment shown in FIG. 5 shows a handover process in which the source access network device switches the terminal device to the target access network device based on the NG interface request between the core network device and the target access network device.
  • the core network device sends a handover request message to the target access network device.
  • the handover request message includes the first information and/or the second information.
  • the target access network device may determine whether to allow the terminal device to switch to the target cell according to the first information and/or the second information, so as to restrict the terminal device to only move in a cell that supports external authentication.
  • the problem that the terminal device cannot complete the secondary authentication of the terminal device due to moving to a cell that does not support external authentication is avoided. Avoid terminal equipment from being unable to perform corresponding services and ensure normal communication.
  • FIG. 6 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • the communication method includes:
  • the terminal device sends an RRC resume request (RRC resume request) message to the first access network device.
  • RRC resume request RRC resume request
  • the first access network device receives the RRC recovery request message from the terminal device.
  • the terminal device is in an inactive state.
  • the terminal device selects a cell, and initiates an RRC recovery request to the first access network device in the cell.
  • the cell is a cell under the first access network device, that is, the first access network device is an access network device that manages the cell.
  • the cell is referred to as the cell where the terminal equipment initiates the RRC recovery request.
  • the RRC recovery request message includes the identifier allocated by the source access network device to the terminal device. For example, inactive radio network temporary identifier (I-RNTI).
  • I-RNTI inactive radio network temporary identifier
  • the source access network device is the access network device that recently served the terminal device.
  • the source access network device stores the context of the terminal device.
  • the source access network device may be referred to as the end device's last serving access network device (last serving RAN).
  • the terminal device accesses the source access network device through external authentication.
  • the specific access process please refer to the related introduction of the embodiment shown in FIG. 3 above.
  • the first access network device sends a retrieve UE context request (retrieve UE context request) message to the source access network device.
  • the source access network device receives the UE context extraction request message from the core network device.
  • the extract context request message includes the identity of the cell where the terminal equipment initiates the RRC recovery request.
  • the extract context request message is used to request the context of the terminal device from the source access network device.
  • the first access network device determines the source access network device according to the identifier allocated by the source access network device to the terminal device. Specifically, the identifier allocated by the source access network device to the terminal device is I-RNTI.
  • the I-RNTI includes the identity of the source access network device.
  • the first access network device can identify the identity of the source access network device according to the I-RNTI.
  • the source access network device is the access network device that recently served the terminal device.
  • the source access network device stores the context of the terminal device.
  • the first access network device sends a context extraction request message to the source access network device, so as to request the source access network device for the context of the terminal device.
  • the source access network device determines, according to the first information and/or the second information, whether to allow the first access network device to extract the context of the terminal device.
  • the source access network device is the most recent serving access network device.
  • the source access network device saves the context of the terminal device.
  • the context of the terminal device includes the first information and/or the second information.
  • the source access network device may acquire the first information and/or the second information from the context of the terminal device. Then, the source access network device determines whether to allow the first access network device to extract the context of the terminal device according to the first information and/or the second information.
  • the source access network device may acquire the first information and/or the second information during the initial access process of the terminal device.
  • the source access network device may also acquire the context of the terminal device during the handover process of the terminal device, and the context of the terminal device includes the first information and/or the first 2.
  • Information which is not limited in this application. That is to say, before this embodiment, the terminal device is switched to the source access network device, and the source access network device acquires the first information and/or the second information through the switching process of the terminal device.
  • step 603 and step 403 in the aforementioned embodiment shown in FIG. Please refer to the related introduction of step 403 in the embodiment shown in FIG. 4, which will not be repeated here.
  • step 401 is to acquire the first information and/or the second information from the handover request message.
  • step 604a and step 605a If the source access network device allows the first access network device to extract the context of the terminal device, go to step 604a and step 605a; if the source access network device does not allow the first access network device to extract the context of the terminal device, go to steps 604b and step 605b.
  • the source access network device sends a retrieve UE context response (retrieve UE context response) message to the first access network device.
  • the first access network device receives the extract context response message from the source access network device.
  • the extract UE context response message is used to instruct the source access network device to allow the first access network device to extract the context of the terminal device.
  • the extracting UE context response message includes any one of the following: first information, or second information.
  • the first access network device sends an RRC resume (RRC resume) message to the terminal device.
  • RRC resume RRC resume
  • the source access network device allows the first access network device to extract the context of the terminal device, the source access network device sends an extract UE context response message to the first access network device. Then, the first access network device may send an RRC recovery message to the terminal device to indicate that the terminal device RRC recovery request is successful. Realize that the terminal equipment is restricted from moving in a cell that supports external authentication, so as to avoid the terminal equipment being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication.
  • the extract UE context response message includes the first information and/or the second information.
  • the first access network device can acquire relevant information about the external authentication of the terminal device, so that the first access network device can restrict the cell to which the terminal device moves subsequently. This prevents the terminal equipment from being unable to complete the secondary authentication due to the terminal equipment moving to a cell that does not support external authentication, and preventing the terminal equipment from being unable to perform corresponding services.
  • the source access network device sends a UE context retrieval failure (retrieve UE context failure) message to the first access network device.
  • the first access network device receives the UE context extraction failure message from the source access network device.
  • the UE context extraction failure message includes the failure reason.
  • the failure reasons include: external authentication information does not match.
  • the mismatch of external authentication information includes any of the following situations:
  • the cell where the terminal equipment initiates the RRC recovery request does not support external authentication.
  • the first information indicates that the terminal device only moves in cells that support external authentication.
  • the cell where the terminal equipment initiates the RRC recovery request supports external authentication.
  • the first information indicates that the terminal device only moves in cells that support external authentication.
  • the identity of the home service provider or home service provider group supported by the cell where the terminal device initiates RRC recovery does not include the identity of at least one home service provider or home service provider group included in the second information.
  • the cell where the terminal device initiates the RRC recovery request supports the authentication of Apple Service Provider 1 and Mass Service Provider 1.
  • the second information includes the identity of the Apple service provider 2 and the identity of the public service provider 2 .
  • the source access network device may determine that the external authentication information of the cell where the terminal device initiates the RRC recovery request does not match the second information.
  • the first access network device sends an RRC setup (RRC setup) message to the terminal device.
  • RRC setup RRC setup
  • the source access network device If the source access network device does not allow the first access network device to extract the context of the terminal device, the source access network device sends a UE context extraction failure message to the first access network device. Then the first access network device may send an RRC establishment message to the terminal device to instruct the terminal device to establish an RRC connection. Thus, it is avoided that the terminal equipment moves to a cell that does not support external authentication and cannot complete the secondary authentication of the terminal equipment.
  • the above-mentioned embodiment shown in FIG. 6 shows the RRC recovery process of the terminal device.
  • the source access network device determines whether to allow the first access network device to extract the context of the terminal device according to the first information and/or the second information in the context of the terminal device.
  • the terminal equipment is restricted from moving in a cell supporting external authentication or a cell supporting a home service provider or a home service provider group. It avoids the problem that the terminal device cannot complete the secondary authentication of the terminal device because it moves to a cell that does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services and ensures normal communication.
  • FIG. 7 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • the communication method includes:
  • the first access network device sends a secondary node addition request (s-node addition request) message to the second access network device.
  • the second access network device receives the secondary node addition request message from the first access network device.
  • the secondary node addition request message includes at least one of the following: first information, or second information.
  • step 304 for the related introduction of the first information and the second information, please refer to the related introduction of step 304 in the above-mentioned embodiment shown in FIG. 3 , which will not be repeated here.
  • the terminal device accesses the first access network device through external authentication.
  • the specific access process please refer to the related introduction of the embodiment shown in FIG. 3 above.
  • the first access network device may send a secondary node addition request message to the second access network device.
  • the secondary node addition request message includes the identifier of the target cell for which the terminal device requests dual connectivity.
  • the target cell is a cell under the second access network device. That is, the target cell is a cell managed by the second access network device.
  • the first access network device may be understood as the primary access network device of the terminal device, and the second access network device may be understood as the secondary access network device for which the terminal device requests dual connections.
  • this embodiment further includes step 701a.
  • Step 701a is performed before step 701 .
  • the first access network device selects a target cell.
  • Step 701a is similar to step 401 in the foregoing embodiment shown in FIG. 4 .
  • Step 701a is similar to step 401 in the foregoing embodiment shown in FIG. 4 .
  • the second access network device performs access control to determine whether to allow the terminal device to be dual-connected to the target cell.
  • the secondary node addition request message includes at least any one of the following: first information, or second information.
  • the second access network device determines whether to allow the terminal device to be dual-connected to the target cell according to the first information and/or the second information.
  • the second access network device performs access control according to the first information and/or the second information, and the process of determining whether to allow the terminal device to dual connect to the target cell is similar to step 403 in the aforementioned embodiment shown in FIG. 4 .
  • step 403 in the embodiment shown in the foregoing FIG. 4 will not be repeated here.
  • the second access network device If the second access network device allows the terminal device to be dual-connected to the target cell, the second access network device sends a secondary node addition request acknowledgement (s-node addition request acknowledge) message to the first access network device.
  • the first access network device receives a secondary node addition request confirmation message from the second access network device.
  • the second access network device allows the terminal device to be dual-connected to the target cell, that is, the second access network device allows the second access network device to be added as a secondary access network device of the terminal device
  • the second access network device will send the second access network device to the target cell.
  • the first access network device sends a secondary node addition request confirmation message.
  • the secondary node addition request confirmation message is used to indicate that the terminal equipment is allowed to be dual-connected to the target cell, or used to indicate that the second access network equipment is allowed to be added as a secondary access network equipment of the terminal equipment.
  • the first access network device may initiate a dual connection indication to the terminal device to instruct the terminal device to dual connect to the target cell.
  • the second access network device If the second access network device does not allow the terminal device to be dual-connected to the target cell, the second access network device adds a request rejection (s-node addition request reject) message to the auxiliary node of the first access network device. Correspondingly, if the second access network device does not allow the terminal device to be dual-connected to the target cell, the first access network device receives a secondary node addition request rejection message from the second access network device.
  • a request rejection s-node addition request reject
  • the secondary node addition request rejection message includes the failure reason.
  • the failure reasons include any of the following: the target cell where the terminal device requests dual connectivity does not support external authentication, the target cell does not support the home service provider or the home service provider group, or the terminal device is refused to use the certificate owned by the external entity Access the network.
  • the relevant introduction about the failure reason is similar to the failure reason in step 404b in the embodiment shown in FIG. 4 .
  • the relevant introduction in step 404b in the embodiment shown in FIG. 4 please refer to the relevant introduction in step 404b in the embodiment shown in FIG. 4 , which will not be repeated here.
  • the secondary node addition request rejection message includes information about a home service provider or a home service provider group supported by the target cell for which the terminal device requests dual connectivity.
  • the information about the home service provider or home service provider group supported by the target cell for which the terminal device requests dual connectivity includes: the identifier of the home service provider or home service provider group supported by the target cell for which the terminal device requests dual connectivity.
  • the home service provider supported by the target cell for which the terminal device requests dual connectivity may be one or more home service providers.
  • the target cell support home service provider group may be one or more home service provider groups.
  • the secondary node addition request rejection message includes: the identifiers of one or more home service providers supported by the target cell, or the identifiers of one or more home service provider groups supported by the target cell.
  • the target cell supports the authentication of Apple Provider 1 and Apple Provider 2. Then, the secondary node addition request rejection message includes the identifier of Apple service provider 1 and the identifier of Apple service provider 2 .
  • the target cell supports the authentication of Apple Provider 1 and Mass Provider 1. Then, the secondary node addition request rejection message includes the identity of the Apple service provider 1 and the identity of the public service provider 1 .
  • the second access network device does not allow the terminal device to be dual-connected to the target cell, that is, the second access network device does not allow the second access network device to be added as a secondary access network device of the terminal device, the second access network device The device sends a secondary node addition request rejection message to the first access network device to indicate that the terminal device is not allowed to dual-connect to the target cell.
  • the first access network device modifies or updates the first access network device according to the first information and/or the second information Information about the target cell stored on the network device. It is avoided that the first access network device mistakenly switches the terminal device to the target cell, which causes the terminal device to fail to complete the secondary authentication. Avoid terminal equipment from being unable to perform corresponding services and ensure normal communication. For example, the first access network device updates the home service provider or the identity of the home service provider supported by the target cell stored on the first access network device.
  • the above-mentioned embodiment shown in FIG. 7 shows the process of the terminal device performing dual connection.
  • the first access network device sends the first information and/or the second information to the second access network device.
  • the second access network device can determine whether to allow the terminal device to be dual-connected to the target cell according to the first information and/or the second information, so as to restrict the terminal device to move only in a cell that supports external authentication. It is avoided that the terminal device is dual-connected to a cell that does not support external authentication and the secondary authentication of the terminal device cannot be completed. This further prevents terminal equipment from being unable to perform corresponding services and ensures normal communication.
  • the present application also provides an embodiment, which is applied to an initial access process of a terminal device.
  • the technical solution of this embodiment will be introduced below with reference to FIG. 8 .
  • FIG. 8 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • the communication method includes:
  • a terminal device establishes an RRC connection with an access network device.
  • the access network device sends an initial UE message to the core network device.
  • the core network device receives the initial UE message from the access network device.
  • the core network device performs external authentication on the terminal device.
  • the core network device sends an initial context establishment request message to the access network device.
  • the access network device receives the initial context establishment request message from the core network device.
  • the core network device receives an initial context establishment response message from the access network device.
  • the access network device receives the initial context establishment response message from the core network device.
  • Steps 801 to 805 are similar to steps 301 to 305 in the aforementioned embodiment shown in FIG. 3 .
  • steps 301 to 305 in the aforementioned embodiment shown in FIG. 3 please refer to the related introductions of steps 301 to 305 in the aforementioned embodiment shown in FIG. 3 .
  • the difference is that the initial context establishment request message in the above step 804 does not include the first information and/or the second information.
  • the core network device sends the information of the home service provider or the home service provider group to the terminal device.
  • the terminal device receives information from the home service provider or home service provider group of the core network device.
  • the core network device sends a NAS message to the terminal device, where the NAS message includes the information of the home service provider or the home service provider group.
  • the information of the home service provider or the home service provider group is used to indicate that the terminal device only moves in the cells that support the home service provider or the home service provider group.
  • the information of the home service provider or home service provider group is similar to the information of the home service provider or home service provider group included in the second information. For details, please refer to the relevant introduction of the second information, which will not be repeated here.
  • step 806 the terminal device obtains the information of the home service provider or the home service provider group. In this way, the terminal device only moves in the cell that supports the home service provider or the home service provider group, so as to prevent the terminal device from moving to a cell that does not support external authentication.
  • this embodiment further includes step 807 , and step 807 is performed after step 806 .
  • the terminal selects the cell of the home service provider or the home service provider group to camp on.
  • the terminal device returns to an idle (idle) state or an inactive (inactive) state.
  • the terminal device reselects a cell to camp on from the cells that support the home service provider or home service provider group.
  • the above-mentioned embodiment shown in FIG. 8 may be executed before step 601 in the above-mentioned embodiment shown in FIG. 6 .
  • the terminal device in the above step 601 , the terminal device is in an RRC inactive state, and the terminal device can select a cell supporting the home service provider or home service provider group in step 806 and initiate an RRC recovery request.
  • the core network device may send the information of the home service provider or the home service provider group to the terminal device.
  • the information of the home service provider or the home service provider group is used to indicate that the terminal device only moves in the cells that support the home service provider or the home service provider group.
  • the terminal device can choose to reselect a cell from the cells supporting the home service provider or home service provider group for camping according to the certificate of the external entity possessed by the terminal device and the information of the home service provider or home service provider group. stay or move.
  • the terminal equipment is prevented from camping on or moving to a cell that does not support external authentication. Avoid the terminal equipment being unable to complete the secondary authentication because the cell where the terminal equipment moves or resides does not support external authentication. This further prevents terminal equipment from being unable to perform corresponding services and ensures normal communication.
  • the present application further provides another embodiment, and the technical solution of this embodiment is described below with reference to FIG. 9A .
  • FIG. 9A is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • the communication method includes:
  • the access network device determines UAC parameters used for external authentication.
  • the UAC parameters used for external authentication include a set of UAC parameters corresponding to one or more access categories (access categories, ACs).
  • each group of UAC parameters includes at least one of the following: an access identification barring list (uac-BarringForAccessIdentity), a barring factor (uac-BarringFactor), or a barring time (uac-BarringTime).
  • an access identification barring list (uac-BarringForAccessIdentity)
  • a barring factor (uac-BarringFactor)
  • a barring time (uac-BarringTime).
  • the access network device broadcasts a corresponding external authentication indication in the cell of the access network device, to indicate whether the cell of the access network device supports external authentication.
  • the access network device broadcasts the identity of the home service provider or the home service provider group supported by the corresponding cell in the cell of the access network device respectively.
  • the access network device determines a set of UAC parameters for external authentication.
  • the UAC parameters used for non-external authentication are used for terminal devices that access the network through non-external authentication to access the network.
  • the UAC parameter used for external authentication is used for terminal equipment to access the network through external authentication.
  • UAC parameters for non-external authentication and UAC parameters for external authentication include the same parameter types.
  • both sets of parameters include parameters such as the access ID barring list, barring factor, and barring time.
  • the values of the parameters of the same type in the two sets of parameters are independent of each other. That is to say, the values of parameters of the same type in the two sets of parameters can be the same or different.
  • both the UAC parameter for non-external authentication and the UAC parameter for external authentication include the barring time.
  • the value of the prohibition time included in the UAC parameter for non-external authentication is A
  • the value of the prohibition time included in the UAC parameter for external authentication is B.
  • A, B are greater than 0, A is not equal to B.
  • each access attempt corresponds to one AC.
  • the access network device broadcasts a set of UAC parameters for external authentication for each type of AC. That is, the UAC parameters used for external authentication include a set of UAC parameters corresponding to one or more ACs respectively.
  • the access network device sends the UAC parameter for external authentication to the terminal device.
  • Access network equipment can broadcast a set of UAC parameters for external authentication.
  • the access network device may broadcast a set of UAC parameters for external authentication and a set of UAC parameters for non-external authentication.
  • the terminal device determines whether to access the access network device according to the UAC parameter used for external authentication.
  • the terminal device receives the UAC parameters for external authentication broadcast by the access network device in the cell of the access network device. Then, the terminal device makes an access attempt according to the UAC parameter used for external authentication.
  • step 903 specifically includes steps 9031 to 9038 .
  • Step 9031 The terminal device determines one or more access identities (AI) and the first AC corresponding to the access attempt of the terminal device.
  • AI access identities
  • the terminal device when the terminal device needs to perform a service or transmit data, the terminal device can perform an access attempt.
  • the first AC corresponding to the access attempt of the terminal device may be determined according to the service to be executed or the data to be transmitted of the terminal device.
  • the first AC corresponding to the access attempt of the terminal device is equal to 2.
  • the first AC corresponding to the access attempt of the terminal device is equal to 4.
  • the terminal device has corresponding subscription information.
  • the terminal device determines one or more AIs through subscription information of the terminal device.
  • the subscription information of the terminal device includes the subscription information of the regular service, then it can be known that the one or more AIs include 0.
  • the subscription information of the terminal device includes the subscription information of the regular service and the subscription information of the key service, then it can be known that the one or more AIs include 0 and 2.
  • Step 9032 The terminal device selects the UAC parameter corresponding to the first AC from the UAC parameters used for external authentication.
  • the UAC parameter corresponding to the first AC includes an AI prohibition list, a prohibition factor F, and a prohibition time T1.
  • the AI prohibition list is used to indicate whether one or more AIs in the above step 1 are allowed.
  • Step 9033 The terminal device determines whether at least one of the one or more AIs is allowed according to the AI prohibition list; if so, the terminal device determines that the access attempt of the terminal device is allowed;
  • one or more AIs include 0 and 2, AIs with a value of 0 in the AI forbidden list are allowed, and AIs with a value of 2 are not allowed. Then the terminal device can determine that the current access attempt of the terminal device is allowed.
  • the terminal device executes step 9034.
  • Step 9034 The terminal device generates a first random number m.
  • m is greater than or equal to 0 and less than 1.
  • Step 9035 If the first random number m is less than the prohibition factor F, the terminal device determines that the access attempt of the terminal device is allowed.
  • Step 9036 If the first random number m is greater than or equal to the prohibition factor F, the terminal device generates a second random number n.
  • n is greater than or equal to 0 and less than 1.
  • Step 9037 After the terminal device waits for the first time period, the terminal device generates a third random number p.
  • the first duration is equal to (0.7+0.6*n)*T1, and p is greater than 0 and less than 1.
  • Step 9038 If the third random number p is smaller than the prohibition factor F, the terminal device determines that the access attempt of the terminal device is allowed.
  • the terminal device determines again whether to allow the access attempt according to the execution methods of steps 9034 to 9037. When a certain period of time is reached or the number of executions reaches a preset number of times, the terminal device can use the UAC parameter for non-external authentication to request access to the network.
  • the terminal device determines that the access attempt of the terminal device is allowed (ie, the terminal device determines to access the access network device)
  • the terminal device establishes an RRC connection with the access network device.
  • the access network device sends an initial UE message to the core network device.
  • the core network device performs external authentication on the terminal device, and then sends an initial context request message to the access network device.
  • the access network device sends an initial context establishment response message to the core network device.
  • the access network device originally broadcasts a set of UAC parameters for non-external authentication.
  • the access network device newly broadcasts a set of UAC parameters for external authentication.
  • the terminal device can receive the UAC parameters for external authentication broadcast by the access network device in the cell of the access network device.
  • the terminal device determines whether to access the access network device according to the UAC parameter used for external authentication. If the terminal device determines to access the access network device, the terminal device establishes an RRC connection with the access network device.
  • the access network device can perform differential control on two access modes related to external authentication (including accessing the network through external authentication and accessing the network through non-external authentication).
  • the UAC parameters used for external authentication can be adjusted (for example, the prohibition factor is increased, or the prohibition time is decreased), so that an attempt to access the network by external authentication can be performed.
  • the probability of the terminal equipment entering the network being connected to the network is higher.
  • steps 901 to 903 in the embodiment shown in FIG. 9A may be performed before step 301 in the embodiment shown in FIG. 3 .
  • the terminal device determines to access the access network device in step 903
  • the terminal device executes step 301 in the embodiment shown in FIG. 3 above.
  • steps 901 to 903 in the embodiment shown in FIG. 9A may be performed before step 801 in the embodiment shown in FIG. 8 .
  • the terminal device determines to access the access network device in step 903
  • the terminal device executes step 801 in the embodiment shown in FIG. 8 above.
  • the communication method provided in the present application is also applicable to an onboarding scenario. Two possible online signing scenarios are described below with reference to FIG. 10A and FIG. 10B .
  • the network 2 is the network to be subscribed by the terminal device. There is no certificate for network 2 on the end device. The terminal device obtains the certificate of the network 2 by accessing the network 1.
  • Network 1 and Network 2 are two different networks.
  • the network 1 is the network to be subscribed by the terminal device. There is no certificate for network 1 on the end device. The terminal device obtains the certificate of the network 1 by accessing the network 1 .
  • Embodiment 1 is similar to the embodiment shown in FIG. 3 above. The difference lies in: step 304 and step 306 in the above embodiment shown in FIG. 3 .
  • the above step 304 is replaced with step 304a.
  • the above step 306 is replaced with step 306a.
  • the replaced step 304a is: the core network device sends an initial context establishment request message to the access network device.
  • the initial context establishment request message includes at least one of the following: third information, or fourth information.
  • the third information is used to indicate that the terminal device is restricted to move in a cell that supports online subscription; or, the third information is used to indicate that the terminal device only moves in a cell that supports online subscription.
  • the initial context establishment request message includes the third information, it means that the terminal device is restricted to move in a cell that supports online subscription. If the initial context establishment request message includes the third information, it indicates that the terminal device can move in a cell that supports online subscription or a cell that does not support online subscription. In this embodiment, the terminal device accesses the network by means of online subscription, so the initial context establishment request message includes the third information.
  • the third information is used to indicate whether the terminal device is restricted to move in a cell that supports online subscription; or, the third information is used to indicate whether the terminal device only moves in a cell that supports online subscription.
  • the third information is the third indication information.
  • the value of the third indication information is true (true) or restricted (restricted)
  • it indicates that the terminal device is restricted to move in a cell that supports online subscription.
  • the value of the third indication information is false or not-restricted, it indicates that the terminal device can move in a cell that supports online subscription or a cell that does not support online subscription.
  • the terminal device accesses the network by means of online subscription, so the third information indicates that the terminal device is restricted to move in a cell that supports online subscription.
  • the fourth information includes information of the network to be subscribed to by the terminal device.
  • the fourth information is used to instruct the terminal device to be restricted to move in the cell supporting the network to be subscribed; or, the fourth information is used to instruct the terminal device to only move in the cell supporting the network to be subscribed.
  • the information of the network to be subscribed of the terminal device includes the identifier of the network to be subscribed of the terminal device.
  • the network to be subscribed of the terminal device includes one or more networks to be subscribed. Then the information of the network to be subscribed of the terminal device includes the identifiers of one or more networks to be subscribed.
  • the replaced step 306a is: the core network device sends the fourth information to the terminal device.
  • the fourth information please refer to the aforementioned introduction.
  • the terminal device may select a cell according to the cell information broadcast by the access network device and the network to be subscribed to by the terminal device.
  • the cell supports online subscription of the network to be subscribed. Then, the terminal device performs step 301 again.
  • the terminal device may access the network in a non-external authentication manner. Then, in this case, the present embodiment does not include the above-mentioned step 303 .
  • the terminal device accesses the network 1 , and the access network device and the core network device in the foregoing FIG. 3 belong to the network 1 .
  • the terminal device can obtain the certificate of network 2 by accessing network 1 .
  • the terminal device accesses the network 1 , and the access network device and the core network device in the foregoing FIG. 3 belong to the network 1 .
  • the terminal device can obtain the certificate of the network 1 by accessing the network 1 .
  • the access network device acquires the third information and/or the fourth information from the core network device.
  • the access network device can restrict the terminal device to move only in a cell supporting online subscription or a cell supporting online subscription of the network to be subscribed according to the third information and/or the fourth information. It is avoided that the terminal device cannot obtain the certificate of the network to be subscribed for the terminal device because the terminal device moves to a cell that does not support online subscription.
  • Embodiment 2 which is similar to the embodiment shown in FIG. 4 above. The difference is: step 402 and step 404b. Step 402 is replaced with step 402a. Step 403 is replaced with step 403a. Step 404b is replaced with step 405.
  • Step 402a The source access network device sends a handover request message to the target access network device.
  • the target access network device receives the handover request message from the source access network device.
  • the handover request message includes at least one of the following: third information, or fourth information.
  • third information and the fourth information please refer to the relevant introduction in the foregoing Embodiment 1, which will not be repeated here.
  • Step 403a the target access network device determines whether to allow the terminal device to switch to the target cell according to the third information and/or the fourth information.
  • the handover request message includes the third information and/or the fourth information.
  • the third information and the fourth information please refer to the aforementioned related introduction, which will not be repeated here.
  • a possible implementation manner for the target cell to determine whether to allow the terminal equipment to be handed over to the target cell is described below in combination with the third information and the fourth information.
  • the technical solutions of the present application still apply.
  • the following implementations do not limit the application.
  • the source access network device allows the terminal device to handover to the target cell.
  • the source access network device does not allow the terminal device to handover to the target cell.
  • the source The access network equipment allows the terminal equipment to be handed over to the target cell.
  • the target cell is a cell of network 1 .
  • the networks in which the target cell supports online subscription include network 2 and network 3.
  • the fourth information includes the identification of the network 2 .
  • the source access network device may then allow the terminal device to handover to the target cell. In this way, the terminal device can obtain the certificate of the network 2 through the network accessed by the terminal device.
  • the handover request message includes the fourth information, or the handover request message includes the third information and the fourth information, and the identification of the network supporting the online subscription of the target cell does not include the identification of at least one network to be subscribed in the fourth information, then The source access network equipment does not allow the terminal equipment to be handed over to the target cell.
  • the target cell is a cell of network 1 .
  • the networks in which the target cell supports online subscription include network 2 and network 3.
  • the fourth information includes the identification of the network 4 . Then the source access network device does not allow the terminal device to handover to the target cell. It is avoided that after the terminal device is switched to the target cell, the certificate of the network 4 cannot be obtained.
  • Step 405 The target access network device sends a handover preparation failure message to the source access network device.
  • the Handover Preparation Failed message includes the reason for the failure.
  • the source access network device receives the handover preparation failure message from the target access network device.
  • the failure reason includes any one of the following: the target cell does not support online subscription, the target cell does not support online subscription of the terminal device's network to be subscribed, or the terminal device is refused to obtain the certificate of the to-be-subscribed network through the access network.
  • the target access network device may refuse the terminal device to handover to the target cell. It is avoided that the terminal device cannot obtain the certificate of the network to be subscribed after switching to the target cell.
  • the networks in which the target cell supports online subscription include network 2 and network 3.
  • the to-be-subscribed network of the terminal device includes network 4 .
  • the target access network device can refuse the terminal device to handover to the target cell. It is avoided that the terminal device cannot obtain the certificate of the network to be subscribed after switching to the target cell.
  • the handover preparation failure message further includes information of the network that the target cell supports online subscription.
  • the information of the network that the target cell supports online subscription includes an identifier of the network that the target cell supports online subscription.
  • the networks in which the target cell supports online subscription include network 2 and network 3.
  • the handover preparation failure message includes the identity of network 2 and the identity of network 3.
  • the source access network device may update or modify the information about the target cell, so as to avoid the terminal device being unable to obtain the certificate of the network to be subscribed due to mistakenly switching the terminal device to the target cell.
  • the source access network device updates the network in which the target cell supports online subscription.
  • the source access network device may obtain the third information and/or the fourth information through the initial access process; or, the source access network device may also obtain the third information and/or the fourth information through the handover process of the terminal device. This application is not limited.
  • this embodiment may be executed after the first embodiment.
  • the source access network device may be understood as the access network device of the first embodiment. That is, the terminal device accesses the source access network device through the initial access process, and the source access network device obtains the third information and/or the fourth information during the initial access process of the terminal device.
  • the terminal device was switched from another access network device to the source access network device, and the source access network device obtained the third information and/or the fourth information during the switching process.
  • This embodiment shows a handover process in which the source access network device switches the terminal device to the target access network device through the Xn interface between the source access network device and the target access network device.
  • the source access network device sends the third information and/or the fourth information to the target access network device.
  • the target access network device can determine whether to allow the terminal device to handover to the target cell according to the third information and/or the fourth information. Therefore, the terminal equipment is restricted to move only in the cell supporting online subscription or the cell supporting online subscription of the network to be subscribed. It is avoided that the terminal equipment moves to a cell that is not subscribed online and cannot obtain the certificate of the network to be subscribed.
  • the present application also provides a third embodiment.
  • the third embodiment is similar to the aforementioned embodiment shown in FIG. 5 . The difference is: step 503, step 504, step 505b and step 506b.
  • Step 503 is replaced with step 503a.
  • Step 504 is replaced with step 504a.
  • Step 505b is replaced with step 507 .
  • Step 506b is replaced with step 508.
  • Step 503a The core network device sends a handover request message to the target access network device.
  • the target access network device receives the handover request message from the core network device.
  • the handover request message includes at least one of the following: third information, or fourth information.
  • third information and the fourth information please refer to the foregoing related introduction, and details are not repeated here.
  • Step 504a The target access network device determines whether to allow the terminal device to handover to the target cell according to the third information and/or the fourth information.
  • Step 504a is similar to the foregoing step 403a.
  • Step 504b please refer to the relevant introduction of the foregoing step 403b, which will not be repeated here.
  • Step 507 The target access network device sends a handover failure message to the core network device.
  • the core network device receives the handover failure message from the target access network device.
  • the switchover failure message includes the reason for the failure.
  • the failure reason includes any one of the following: the target cell does not support online subscription, the target cell does not support online subscription of the terminal device's network to be subscribed, or the terminal device is refused to obtain the certificate of the to-be-subscribed network through the access network.
  • the related introduction of the failure reason please refer to the related introduction of step 405 in the second embodiment, which will not be repeated here.
  • the handover failure message further includes information of the network that the target cell supports online subscription.
  • the related introduction of the information of the network supporting the online subscription of the target cell please refer to the related introduction of step 405 in the second embodiment, which is not repeated here.
  • Step 508 The core network device sends a handover preparation failure message to the source access network device.
  • the source access network device receives the handover preparation failure message from the core network device.
  • the Handover Preparation Failed message includes the reason for the failure.
  • the failure reason includes any one of the following: the target cell does not support online subscription, the target cell does not support online subscription of the terminal device's network to be subscribed, or the terminal device is refused to obtain the certificate of the to-be-subscribed network through the access network.
  • the related introduction of the failure reason please refer to the related introduction of step 405 in the second embodiment, which will not be repeated here.
  • the handover preparation failure message further includes information of the network that the target cell supports online subscription.
  • the related introduction of the information of the network supporting the online subscription of the target cell please refer to the related introduction of step 405 in the second embodiment, which is not repeated here.
  • the source access network device may be understood as the access network device of the first embodiment. That is, the terminal device accesses the source access network device through the initial access process. Then, the terminal device performs the handover process through the technical solution of the third embodiment.
  • This embodiment shows a handover process in which the source access network device switches the terminal device to the target access network device based on the NG interface request between the core network device and the target access network device.
  • the core network device sends a handover request message to the target access network device.
  • the handover request message includes third information and/or fourth information.
  • the target access network device may determine whether to allow the terminal device to be handed over to the target cell according to the third information and/or the fourth information. Therefore, the terminal device is restricted to move only in a cell that supports online subscription or a cell that supports online subscription of the network to be subscribed for the terminal device. It is avoided that the terminal equipment moves to a cell that is not subscribed online and cannot obtain the certificate of the network to be subscribed.
  • the present application also provides a fourth embodiment.
  • the fourth embodiment is similar to the foregoing embodiment shown in FIG. 9A , and the difference lies in: the above-mentioned steps 901 to 903 .
  • step 901 may be replaced by step 904
  • step 902 may be replaced by step 905
  • step 903 may be replaced by step 906 .
  • Step 904 The access network device determines UAC parameters for online subscription.
  • the UAC parameters used for online subscription include UAC parameters corresponding to the second AC.
  • the second AC is an AC corresponding to online subscription access.
  • the UAC parameter corresponding to the second AC includes at least one of the following: an access identifier barring list, barring factor, or barring time.
  • the access network device originally broadcasts a set of UAC parameters.
  • the access network device adds a new set of UAC parameters for online subscription to the originally broadcast set of UAC parameters.
  • the UAC parameters used for online subscription are used for terminal equipment accessing the network by means of online subscription to access the network.
  • an entry is added to the type of access attempt: online subscription access.
  • the AC corresponding to online subscription access is 64. Therefore, the access network device adds a set of UAC parameters for online subscription to the set of UAC parameters originally broadcast.
  • Access Class (AC) Type of access attempt 0 Paging-triggered user signaling 1 Latency Tolerant Access 2 emergency access 3 Non-paging-triggered NAS signaling transmission 4 voice 5 video
  • a new item is added to the type of access attempt: online subscription access.
  • the AC corresponding to the online subscription access adopts any one of the reserved AC values.
  • the AC corresponding to the online subscription access adopts 11 among the reserved AC values.
  • Access Class (AC) Type of access attempt 0 Paging-triggered user signaling 1 Latency Tolerant Access 2 emergency access 3 Non-paging-triggered NAS signaling transmission 4 voice 5 video 6 short message 7 User-initiated data transfer 8 Non-paging-triggered user RRC signaling transmission 9 User-initiated IMS registration signaling transmission 10 User-initiated abnormal data transfer 11 Sign up online 12-31 reserved 32-63 Carrier customization
  • Step 905 The terminal device receives the UAC parameters used for online subscription from the access network device.
  • the access network device sends the UAC parameters for online subscription to the terminal device.
  • the access network device originally broadcasts a set of UAC parameters.
  • the access network device adds a new set of UAC parameters for online subscription to the originally broadcast set of UAC parameters.
  • Step 906 The terminal device determines whether to access the access network device according to the UAC parameter used for online subscription.
  • the terminal device receives a set of UAC parameters broadcast by the access network device in the cell of the access network device.
  • the terminal device determines the UAC parameters used for online subscription from a set of UAC parameters broadcast by the access network device. Then, the terminal device makes an access attempt according to the UAC parameters used for online subscription.
  • Step 9061 The terminal device determines one or more AIs.
  • Step 9061 is similar to the process in which the terminal device determines one or more AIs in step 9031 in the embodiment shown in FIG. 9B .
  • the terminal device determines one or more AIs in step 9031 in the embodiment shown in FIG. 9B .
  • Step 9061 is similar to the process in which the terminal device determines one or more AIs in step 9031 in the embodiment shown in FIG. 9B .
  • Step 9062 The terminal device determines whether at least one of the one or more AIs is allowed according to the AI prohibition list in the UAC parameter for online subscription; if so, the terminal device determines that the access attempt of the terminal device is allowed; if not, Then the terminal device executes step 9063.
  • the UAC parameters used for online subscription include a group of UAC parameters corresponding to the second AC.
  • the second AC is an AC corresponding to online subscription access.
  • the set of UAC parameters corresponding to the second AC includes the AI prohibition list, the prohibition factor E, and the prohibition time T2.
  • Step 9063 The terminal device generates a fourth random number x.
  • x is greater than or equal to 0 and less than 1.
  • Step 9064 If the fourth random number x is smaller than the prohibition factor E, the terminal device determines that the access attempt of the terminal device is allowed.
  • Step 9065 If the fourth random number x is greater than or equal to the prohibition factor E, the terminal device generates a fifth random number y.
  • Step 9066 After the terminal device waits for the second time period, the terminal device generates a sixth random number z.
  • the second duration is equal to (0.7+0.6*y)*T2, and z is greater than 0 and less than 1.
  • Step 9067 If the sixth random number z is less than the prohibition factor E, the terminal device determines that the access attempt of the terminal device is allowed.
  • the terminal device judges again whether to allow the access attempt according to the execution methods of steps 9063 to 9067 .
  • the terminal device can exit.
  • the access network device adds a set of UAC parameters for online subscription to a set of UAC parameters originally broadcast.
  • the terminal device can receive a set of UAC parameters for online subscription broadcast by the access network device in the cell of the access network device.
  • the terminal device determines whether to access the access network device according to the UAC parameter for online subscription. If the terminal device determines to access the access network device, the terminal device establishes an RRC connection with the access network device.
  • differentiated control can be performed on two access modes (including access to the network by way of online subscription or access to the network by way of offline subscription).
  • the UAC parameter for online subscription can be adjusted (for example, the prohibition factor is increased, or the prohibition time is decreased), so that the user tries to access the network through online subscription.
  • the probability of the terminal equipment entering the network being connected to the network is higher.
  • the terminal device accesses the network through external authentication.
  • the terminal device can camp on a cell that supports external authentication, but will not camp on a cell that does not support external authentication.
  • the terminal device may determine a cell that supports external authentication through the external authentication indication included in the broadcast information of the existing cell, and camp on the cell.
  • the terminal device may also select a supporting cell and camp on it by the manner of step 807 in the above-mentioned FIG. 8 .
  • the terminal equipment will only camp on cells that support external authentication, and will not camp on cells that do not support external authentication. Thus, when the network pages the terminal device, the network may only page the terminal device in cells that support external authentication. Avoid paging terminal equipment in cells that do not support external authentication to reduce signaling overhead caused by paging terminal equipment. The specific paging process is detailed below with reference to FIG. 11 .
  • FIG. 11 is a schematic diagram of another embodiment of the communication method according to the embodiment of the present application.
  • the communication method includes:
  • the first network element receives a paging message from the second network element.
  • the second network element sends a paging message to the first network element.
  • the paging message includes at least one of the following: first information, or second information.
  • the terminal device accesses the network through external authentication. Then, the terminal device returns to the idle or inactive state. For example, the terminal device may determine a cell that supports external authentication through the external authentication indication included in the broadcast information of the existing cell, and camp on the cell. Alternatively, the terminal device may also select a supporting cell and camp on it by the manner of step 807 in the above-mentioned FIG. 8 .
  • the first network element is an access network device
  • the second network element is a core network device
  • this embodiment can be understood as a paging process (core network paging, CN paging) initiated by the core network.
  • the core network device sends a paging (paging) message to the access network device.
  • the core network device may be an AMF.
  • the first network element is the first access network device
  • the second network element is the source access network device
  • this embodiment can be understood as a paging process (RAN paging) initiated by the access network.
  • the first access network device sends an access network paging (RAN paging) message to the source access network device.
  • RAN paging access network paging
  • the source access network device may be an access network device that has recently served the terminal device.
  • the source access network device stores the context of the terminal device and the NG connection associated with the terminal device between the source access network device and the AMF.
  • the source access network device may be referred to as the end device's last serving access network device (last serving RAN).
  • the first network element selects a target cell according to the paging message.
  • the paging message includes the first information and/or the second information.
  • the first network element selects the target cell according to the first information and/or the second information.
  • the first network element takes a cell managed by the first network element and supporting external authentication as a target cell.
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication.
  • the cells managed by the first network element include cell 1, cell 2, and cell 3. Both cell 1 and cell 2 support external authentication. Cell 3 does not support external authentication. Then, the first network element takes cell 1 and cell 2 as target cells.
  • the first network element manages the home service provider or home service provider group that is managed by the first network element and supports the second information.
  • the cell of the group is used as the target cell.
  • the first information is used to indicate that the terminal device is restricted to move in a cell that supports external authentication.
  • the second information includes the identity of the home service provider 1 and the identity of the home service provider 2 .
  • cells supporting home service provider 1 include cell 1 and cell 2
  • cells supporting home service provider 2 include cell 1 and cell 3. Therefore, the first network element may use cell 1, cell 2 and cell 3 as target cells.
  • the first network element pages the terminal device in the target cell.
  • the first network element may send a paging message to the terminal device in the target cell.
  • this embodiment further includes step 1104 .
  • Step 1104 may be performed after step 1103 .
  • the terminal device sends an RRC establishment request message to the first network element. Then, the first network element replies an RRC setup message to the terminal device. The terminal device establishes an RRC connection with the first network element. Then, the terminal device feeds back an RRC establishment complete message to the first network element. In this way, the establishment of the RRC connection between the terminal device and the first network element is completed.
  • the second network element sends a paging message to the first network element.
  • the paging message includes at least one of the following: first information, or second information.
  • the first network element can select the target cell according to the first information and/or the second information.
  • the first network element may only page the terminal device in a cell that supports external authentication or a cell that supports the home service provider or home service provider group included in the second information. Avoid paging terminal equipment in cells that do not support external authentication. The number of paging messages sent by the first network element is reduced, and signaling overhead is saved.
  • FIG. 12 is a schematic structural diagram of a communication apparatus 1200 according to an embodiment of the present application.
  • the communication device 1200 includes a transmitting unit 1201 and a receiving unit 1202 .
  • the communication apparatus 1200 When the communication apparatus 1200 is an access network device, or a chip in the access network device, the communication apparatus 1200 may be configured to perform all or part of the steps performed by the access network device in the embodiment shown in FIG. All or part of the steps performed by the first access network device in the embodiments shown in FIG. 6 and FIG. 7 . Reference may be made to the relevant descriptions in the method embodiments shown in FIG. 3 , FIG. 6 , and FIG. 7 above.
  • the sending unit 1201 is configured to perform step 302 and step 305 in the above-mentioned embodiment shown in FIG. 3 .
  • the receiving unit 1202 is configured to perform step 301 and step 304 in the above-mentioned embodiment shown in FIG. 3 .
  • the sending unit 1201 is configured to execute step 602, step 605a and step 605b in the embodiment shown in FIG. 6 .
  • the receiving unit 1202 is configured to execute step 601, step 604a and step 604b in the embodiment shown in FIG. 6 .
  • the sending unit 1201 is configured to perform step 701 in the embodiment shown in FIG. 7 .
  • the receiving unit 1202 is configured to perform steps 703a and 703b in the embodiment shown in FIG. 7 .
  • the communication apparatus 1200 When the communication apparatus 1200 is a core network device or a chip in the core network device, the communication apparatus 1200 may be used to execute all or part of the steps performed by the core network device in the embodiment shown in FIG. 5 . Reference may be made to the relevant description of the method embodiment shown in FIG. 5 above.
  • the sending unit 1201 is configured to execute step 503, step 506a and step 506b.
  • the receiving unit 1202 is configured to execute step 502, step 505a and step 505b.
  • FIG. 13 is a schematic structural diagram of a communication apparatus 1300 according to an embodiment of the present application.
  • the communication device 1300 includes a receiving unit 1301, a processing unit 1302 and a sending unit 1303.
  • the communication apparatus 1300 When the communication apparatus 1300 is a core network device or a chip in the core network device, the communication apparatus 1300 may be used to execute all or part of the steps performed by the core network device in the embodiments shown in FIG. 3 and FIG. 8 . Reference may be made to the related descriptions of the method embodiments shown in FIG. 3 and FIG. 8 above.
  • the receiving unit 1301 is configured to perform step 302 and step 305 in the embodiment shown in FIG. 3 .
  • the processing unit 1302 is configured to execute step 303 in the embodiment shown in FIG. 3 .
  • the sending unit 1303 is configured to perform step 304 and step 306 in the embodiment shown in FIG. 3 .
  • the receiving unit 1301 is configured to perform step 802 and step 805 in the embodiment shown in FIG. 8 .
  • the processing unit 1302 is configured to execute step 803 .
  • the sending unit 1303 is configured to perform step 804 and step 806 in the embodiment shown in FIG. 8 .
  • the communication apparatus 1300 When the communication apparatus 1300 is an access network device, or a chip in the access network device, the communication apparatus 1300 may be configured to execute all or part of the execution of the target access network device in the embodiments shown in FIG. 4 and FIG. 5 above.
  • the steps can be used to perform all or part of the steps performed by the source access network device in the embodiment shown in FIG. 4 and FIG. 5 , and can also be used to perform the second access network device in the embodiment shown in FIG. 7 . All or part of the steps performed.
  • the receiving unit 1301 is configured to perform step 402 in the embodiment shown in FIG. 4 .
  • the processing unit 1302 is configured to execute step 403 in the embodiment shown in FIG. 4 .
  • the sending unit 1303 is configured to perform step 404a and step 404b in the embodiment shown in FIG. 4 .
  • the receiving unit 1301 is configured to perform step 503 in the embodiment shown in FIG. 5 .
  • the processing unit 1302 is configured to execute step 504 in the embodiment shown in FIG. 5 .
  • the sending unit 1303 is configured to execute step 505a and step 505b in the embodiment shown in FIG. 5 .
  • the receiving unit 1301 is configured to perform steps 404a and 404b in the embodiment shown in FIG. 4 .
  • the processing unit 1302 is configured to execute step 401 in the embodiment shown in FIG. 4 .
  • the sending unit 1303 is configured to perform step 402 in the embodiment shown in FIG. 4 .
  • the receiving unit 1301 is configured to perform steps 506a and 506b in the embodiment shown in FIG. 5 .
  • the processing unit 1302 is configured to execute step 501 in the embodiment shown in FIG. 5 .
  • the sending unit 1303 is configured to perform step 502 in the embodiment shown in FIG. 5 .
  • the receiving unit 1301 is configured to perform step 701 in the embodiment shown in FIG. 7 .
  • the processing unit 1302 is configured to execute step 702 in the embodiment shown in FIG. 7 .
  • the sending unit 1303 is configured to execute step 703a and step 703b in the embodiment shown in FIG. 7 .
  • the communication apparatus 1300 When the communication apparatus 1300 is a terminal device, or a chip in the terminal device, the communication apparatus 1300 may be used to execute all or part of the steps performed by the terminal device in the embodiment shown in FIG. 8 . Reference may be made to the related description of the method embodiment shown in FIG. 8 above.
  • the receiving unit 1301 is configured to perform step 806 in the embodiment shown in FIG. 8 .
  • the processing unit 1302 is configured to execute step 807 in the above-mentioned embodiment shown in FIG. 8 .
  • the sending unit 1303 is configured to perform step 801 in the above-mentioned embodiment shown in FIG. 8 .
  • FIG. 14 is a schematic structural diagram of a communication apparatus 1400 according to an embodiment of the present application.
  • the communication device 1400 includes a receiving unit 1401 and a processing unit 1402 .
  • the communication device 1400 can be used to perform all or part of the steps performed by the terminal device in the embodiments shown in the above-mentioned FIG. 9A and FIG. 9B , please refer to the above-mentioned FIG. 9A and related descriptions of the method embodiment shown in FIG. 9B .
  • the receiving unit 1401 is configured to perform step 903 in the above-mentioned embodiment shown in FIG. 9A .
  • the processing unit 1402 is configured to execute step 903 in the above-mentioned embodiment shown in FIG. 9A .
  • the processing unit 1402 may specifically execute steps 9031 to 9038 in the above-mentioned embodiment shown in FIG. 9B .
  • the communication apparatus 1400 When the communication apparatus 1400 is the first network element, or a chip in the first network element, the communication apparatus 1400 may be used to perform all or part of the steps performed by the first network element in the above-mentioned embodiment shown in FIG. 11 . Reference may be made to the related description of the method embodiment shown in FIG. 11 above.
  • the receiving unit 1401 is configured to perform step 1101 in the above-mentioned embodiment shown in FIG. 11 .
  • the processing unit 1402 is configured to execute step 1102 and step 1103 in the above-mentioned embodiment shown in FIG. 11 .
  • FIG. 15 is a schematic structural diagram of a communication apparatus 1500 according to an embodiment of the present application.
  • the communication apparatus 1500 includes a processing unit 1501 and a sending unit 1502 .
  • the communication apparatus 1500 When the communication apparatus 1500 is the first network element, or a chip in the first network element, the communication apparatus 1500 may be used to perform all or part of the steps performed by the second network element in the embodiment shown in FIG. 11 . Reference may be made to the foregoing related descriptions of the method embodiment shown in FIG. 11 .
  • the processing unit 1501 is an optional unit.
  • the sending unit 1502 is configured to perform step 1101 in the embodiment shown in FIG. 11 above.
  • the communication apparatus 1500 When the communication apparatus 1500 is an access network device, or a chip in the access network device, the communication apparatus 1500 may be configured to perform all or part of the steps performed by the access network device in the embodiment shown in FIG. 9A . Reference may be made to the foregoing related descriptions of the method embodiment shown in FIG. 9A .
  • the processing unit 1501 is configured to execute step 901 in the above-mentioned embodiment shown in FIG. 9A .
  • the sending unit 1502 is configured to execute step 902 in the above-mentioned embodiment shown in FIG. 9A .
  • the present application also provides a communication apparatus. Please refer to FIG. 16 , which is another schematic structural diagram of a communication apparatus 1600 in an embodiment of the present application.
  • the communication device 1600 includes: a processor 1601 , a memory 1602 and a transceiver 1603 .
  • the processor 1601, the memory 1602 and the transceiver 1603 are respectively connected through a bus, and computer instructions are stored in the memory.
  • the communication apparatus 1600 may be used to perform the steps performed by the access network device in the embodiments shown in FIG. 3 , FIG. 8 and FIG. 9A .
  • the communication apparatus 1600 may be configured to perform the steps performed by the source access network device or the target access network device in the embodiment shown in FIG. 4 and FIG. 5 .
  • the communication apparatus 1600 may be configured to perform the steps performed by the first access network device in the above-mentioned embodiment shown in FIG. 6 .
  • the communication apparatus 1600 may be configured to perform the steps performed by the first access network device or the second access network device in the embodiment shown in FIG. 7 .
  • the communication apparatus 1600 may perform the steps performed by the first network element or the second network element in the above-mentioned embodiment shown in FIG. 11 . Reference may be made to the relevant descriptions in the foregoing method embodiments.
  • the communication apparatus 1600 When the communication apparatus 1600 is a core network device, or a chip in the core network device, the communication apparatus 1600 can be used to perform the steps performed by the core network device in the embodiments shown in FIG. 3 , FIG. 5 , and FIG. 8 , and can also use
  • the steps performed by the second network element in the embodiment shown in the foregoing FIG. 11 reference may be made to the relevant descriptions in the foregoing method embodiments.
  • the sending unit 1201 and the receiving unit 1202 in the foregoing FIG. 12 may specifically be the transceiver 1603 in this embodiment, and thus the specific implementation of the transceiver 1603 will not be described again. or,
  • the receiving unit 1301 and the transmitting unit 1303 in the foregoing FIG. 13 may specifically be the transceiver 1603 in this embodiment, and thus the specific implementation of the transceiver 1603 will not be described again.
  • the processing unit 1302 can be specifically used for the processor 1601 in this embodiment, so the specific implementation of the processor 1601 will not be described again. or,
  • the aforementioned receiving unit 1401 in FIG. 14 may specifically be the transceiver 1603 in this embodiment, and thus the specific implementation of the transceiver 1603 will not be described again.
  • the processing unit 1402 can be specifically used for the processor 1601 in this embodiment, so the specific implementation of the processor 1601 will not be described again. or,
  • the aforementioned sending unit 1502 in FIG. 15 may specifically be the transceiver 1603 in this embodiment, so the specific implementation of the transceiver 1603 will not be described again.
  • the processing unit 1501 can be specifically used for the processor 1601 in this embodiment, so the specific implementation of the processor 1601 will not be described again.
  • FIG. 17 A possible schematic structural diagram of the terminal device is shown below through FIG. 17 .
  • FIG. 17 shows a schematic structural diagram of a simplified terminal device.
  • the terminal device takes a mobile phone as an example.
  • the terminal device includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process communication protocols and communication data, control terminal equipment, execute software programs, and process data of software programs.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of the baseband signal and the radio frequency signal and the processing of the radio frequency signal.
  • Antennas are mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, and keyboards, are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal equipment may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal through the antenna in the form of electromagnetic waves.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data.
  • FIG. 17 For ease of illustration, only one memory and processor are shown in FIG. 17 . In an actual end device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or a storage device or the like.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in this embodiment of the present application.
  • an antenna with a transceiver function and a radio frequency circuit can be regarded as a transceiver unit of the terminal device, and a processor with a processing function can be regarded as a processing unit of the terminal device.
  • the terminal device includes a transceiver unit 1710 and a processing unit 1720 .
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, or the like.
  • the processing unit may also be referred to as a processor, a processing single board, a processing module, a processing device, and the like.
  • the device for implementing the receiving function in the transceiver unit 1710 may be regarded as a receiving unit, and the device for implementing the sending function in the transceiver unit 1710 may be regarded as a transmitting unit, that is, the transceiver unit 1710 includes a receiving unit and a transmitting unit.
  • the transceiver unit may also sometimes be referred to as a transceiver, a transceiver, or a transceiver circuit.
  • the receiving unit may also sometimes be referred to as a receiver, receiver, or receiving circuit, or the like.
  • the transmitting unit may also sometimes be referred to as a transmitter, a transmitter, or a transmitting circuit, or the like.
  • transceiving unit 1710 is configured to perform the sending and receiving operations of the terminal device in the above method embodiments
  • processing unit 1720 is configured to perform other operations on the terminal device in the above method embodiments except the transceiving operations.
  • the transceiver unit 1710 is configured to perform step 301 and step 306 in the above-mentioned embodiment shown in FIG. 3 .
  • the transceiver unit 1710 is configured to perform step 601, step 605a and step 605b in the above-mentioned embodiment shown in FIG. 6 .
  • the transceiver unit 1710 is configured to perform step 801 and step 806 in the above-mentioned embodiment shown in FIG. 8 .
  • the processing unit 1720 is configured to execute step 807 in the above-mentioned embodiment shown in FIG. 8 .
  • the transceiver unit 1710 is configured to perform step 902 in the above-mentioned embodiment shown in FIG. 9A .
  • the processing unit 1720 is configured to execute step 903 in the above-mentioned embodiment shown in FIG. 9A .
  • the processing unit 1720 is configured to perform steps 9031 to 9038 in the above embodiment shown in FIG. 9B .
  • the transceiver unit 1710 is configured to perform step 1103 in the above-mentioned embodiment shown in FIG. 11 .
  • the chip When the terminal device is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input/output circuit or a communication interface;
  • the processing unit may be a processor or a microprocessor or an integrated circuit or a logic circuit integrated on a chip.
  • the sending operation corresponds to the output of the input-output circuit
  • the receiving operation corresponds to the input of the input-output circuit.
  • An embodiment of the present application further provides a communication system, where the communication system includes an access network device and a core network device.
  • the access network device is configured to perform all or part of the steps performed by the access network device in the embodiments shown in FIG. 3 and FIG. 8 .
  • the core network device is configured to perform all or part of the steps performed by the core network device in the embodiments shown in FIG. 3 and FIG. 8 .
  • the embodiment of the present application further provides another communication system, where the communication system includes a source access network device and a target access network device.
  • the source access network device is configured to perform all or part of the steps performed by the source access network device in the embodiments shown in FIG. 4 and FIG. 5 .
  • the target access network device is configured to perform all or part of the steps performed by the target access network device in the embodiments shown in FIG. 4 and FIG. 5 .
  • the communication system further includes core network equipment.
  • the core network device is configured to perform all or part of the steps performed by the core network device in the embodiment shown in FIG. 5 .
  • the embodiment of the present application further provides another communication system, where the communication system includes a first access network device and a source access network device.
  • the first access network device is configured to perform all or part of the steps performed by the first access network device in the embodiment shown in FIG. 6 .
  • the source access network device is configured to perform all or part of the steps performed by the source access network device in the embodiment shown in FIG. 6 .
  • the embodiment of the present application further provides another communication system, where the communication system includes a first access network device and a second access network device.
  • the first access network device is configured to perform all or part of the steps performed by the first access network device in the embodiment shown in FIG. 7 .
  • the second access network device is configured to perform all or part of the steps performed by the source access network device in the embodiment shown in FIG. 7 .
  • the embodiment of the present application further provides another communication system, where the communication system includes a first network element and a second network element.
  • the first network element is configured to perform all or part of the steps performed by the first network element in the embodiment shown in FIG. 11 .
  • the second network element is configured to perform all or part of the steps performed by the second network element in the embodiment shown in FIG. 11 .
  • Embodiments of the present application also provide a computer program product including computer instructions, which, when run on a computer, enables the computer to execute the above-mentioned FIG. 3 , FIG. 4 , FIG. 5 , FIG. 6 , FIG. 7 , FIG. 8 , FIG. 9A , The communication method of the embodiment shown in FIG. 9B and FIG. 11 .
  • Embodiments of the present application also provide a computer-readable storage medium, including computer instructions, when the computer instructions are run on a computer, the computer can execute the above-mentioned FIG. 3 , FIG. 4 , FIG. 5 , FIG. 6 , FIG. 7 , and FIG. 8 . , FIG. 9A , FIG. 9B and the communication method of the embodiment shown in FIG. 11 .
  • An embodiment of the present application further provides a chip device, including a processor for invoking a computer program or computer instruction stored in a memory, so that the processor executes the above-mentioned FIG. 3 , FIG. 4 , FIG. 5 , FIG. 6 , FIG. 7 , and FIG. 8.
  • the processor is coupled to the memory through an interface.
  • the chip device further includes a memory, where computer programs or computer instructions are stored in the memory.
  • the processor mentioned in any of the above can be a general-purpose central processing unit, a microprocessor, an application-specific integrated circuit (ASIC), or one or more of the above-mentioned Fig. 3, Fig. 4 , FIG. 5 , FIG. 6 , FIG. 7 , FIG. 8 , FIG. 9A , FIG. 9B and FIG. 11 .
  • ASIC application-specific integrated circuit
  • the memory mentioned in any one of the above can be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM), and the like.
  • ROM read-only memory
  • RAM random access memory
  • the device embodiments described above are only schematic, wherein the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units , that is, it can be located in one place, or it can be distributed to multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • the connection relationship between the modules indicates that there is a communication connection between them, which may be specifically implemented as one or more communication buses or signal lines.
  • the technical solutions of the present application can be embodied in the form of software products in essence or the parts that make contributions to the prior art, and the computer software products are stored in readable storage media, such as computer floppy disks, U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk, etc., including several instructions to make a computer device execute the methods of various embodiments of the present application.
  • readable storage media such as computer floppy disks, U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk, etc.
  • a computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedures or functions according to the embodiments of the present application are generated in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transferred from a website site, computer, network device, or local computing device,
  • a computing device or data center transmits data to another website site, computer, network device, or local computing device, by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wirelessly (eg, infrared, wireless, microwave, etc.) computing device or data center for transmission.
  • a computer-readable storage medium can be any available medium that a computer can store, or a network device that includes one or more available media integrated, or a data storage device such as a local computing device, a data center, or the like.
  • Useful media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), and the like.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of units is only a logical function division.
  • there may be other division methods for example, multiple units or components may be combined or integrated. to another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • Units described as separate components may or may not be physically separated, and components shown as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented as a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium.
  • the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions.
  • the computer software products are stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods of the various embodiments of the present application.

Abstract

本申请实施例提供一种通信方法以及相关装置,用于保障正常通信进行。通信方法包括:接入网设备与终端设备建立无线资源控制RRC连接。接入网设备向核心网设备发送初始UE消息。接入网设备接收来自核心网设备的初始上下文建立请求消息。初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息。第一信息用于指示终端设备限制于支持外部认证的小区移动;第二信息包括归属服务商或归属服务商群组的信息。归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。接入网设备向核心网设备发送初始上下文响应消息。接入网设备为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。

Description

通信方法以及相关装置 技术领域
本申请涉及通信领域,尤其涉及一种通信方法以及相关装置。
背景技术
第三代移动通信伙伴项目(3rd generation partnership project,3GPP)第五代无线通信(5th generation,5G)标准中正在讨论非公共网络(non-public network,NPN)网络和公共网络,以保障通信。
发明内容
本申请实施例提供了一种通信方法以及相关装置,用于保障通信正常进行。
本申请实施例的第一方面提供一种通信方法,包括:
接入网设备与终端设备建立无线资源控制(radio resource control,RRC)连接;然后,接入网设备向核心网设备发送初始UE消息;接入网设备接收来自核心网设备的初始上下文建立请求消息;初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区移动;第二信息包括归属服务商或归属服务商群组的信息;接入网设备向核心网设备发送初始上下文响应消息。
本实施例中,在终端设备的初始接入过程中,接入网设备从核心网设备获取第一信息和/或第二信息。第一信息用于指示终端设备限制于支持外部认证的小区移动;第二信息包括归属服务商或归属服务商群组的信息。接入网设备获取这些信息后,可以参考这些信息为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。这样接入网设备可以为终端设备选择支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区导致无法完成终端设备的二次认证。
另一种可能的实现方式中,初始上下文建立请求消息包括移动性限制列表。第一信息和/或第二信息位于移动性限制列表中。
在该可能的实现方式中,采用初始上下文建立请求消息中的移动性限制列表携带第一信息和/或第二信息,即提供了一种具体的携带方式。其次,移动性限制列表通常是用来指示终端设备的网络行为的一些限制条件。因此核心网设备通过移动性限制列表向接入网设备下发第一信息和/或第二信息。无需通过其他指示字段或指示信令指示第一信息和第二信息为终端设备的关于外部认证的相关限制信息,节省信令开销或比特开销。
并且,接入网设备可以根据移动性限制列表确定第一信息和/或第二信息。接入网设备可以根据第一信息和/或第二信息为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
另一种可能的实现方式中,归属服务商包括:对终端设备进行外部认证的第一归属服务商,和/或,与第一归属服务商关联的第二归属服务商;
归属服务商群组包括:对终端设备进行外部认证的第一归属服务商群组,和/或,与第一归属服务商群组关联的第二归属服务商群组。
上述实现方式中,接入网设备获取到归属服务商或归属服务商群组的信息之后,接入网设备可以确定对终端设备进行外部认证的第一归属服务商或第一归属服务商群组。这样,接入网设备可以为终端设备选择支持第一归属服务商或第一归属服务商群组的小区。避免终端设备移动至不支持第一归属服务商或第一归属服务商群组的小区。
其次,核心网设备还可以提供与第一归属服务商关联的第二归属服务商信息或与第一归属服务商群组关联的第二归属服务商群组的信息。那么可用于对终端设备进行认证的归属服务商或归属服务商群组有多个,这样能够提高终端设备通过外部认证的方式接入网络的成功率。
另一种可能的实现方式中,该方法还包括:
接入网设备为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。
在该可能的实现方式中,接入网设备为终端设备选择的小区是支持外部认证或支持归属服务商或归属服务商群组的小区。该小区可以用于终端设备的切换或双连接。这样可以避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
另一种可能的实现方式中,该方法还包括:
接入网设备向目标接入网设备发送切换请求消息,切换请求消息包括以下至少一项:第一信息、或第二信息。
在该可能的实现方式中,在终端设备的切换过程中,终端设备可以向目标接入网设备传递第一信息和/或第二信息。这样目标接入网设备可以结合第一信息和/或第二信息限制终端设备在支持外部认证的小区或支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
另一种可能的实现方式中,切换请求消息包括支持外部认证的小区的标识,或包括支持所述归属服务商或归属服务商群组的小区的标识。
接入网设备通过上述实现方式向目标接入网设备将终端设备切换至选择外部认证的小区或支持归属服务商或归属服务商群组的小区。从而避免将终端设备切换至不支持外部认 证的小区或不支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
另一种可能的实现方式中,该方法还包括:
接入网设备向核心网设备发送切换需求消息,切换需求消息包括支持外部认证的小区的标识,或支持归属服务商或归属服务商群组的小区的标识。
接入网设备通过上述实现方式向核心网设备请求将终端设备切换至选择外部认证的小区或支持归属服务商或归属服务商群组的小区。从而避免将终端设备切换至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
另一种可能的实现方式中,该方法还包括:
接入网设备接收来自目标接入网设备的提取UE上下文请求消息,目标接入网设备为终端设备发起RRC恢复请求的接入网设备;
接入网设备向所述目标接入网设备发送提取UE上下文响应消息,提取UE上下文响应消息包括以下至少一项:第一信息、或第二信息。
在该可能的实现方式中,在终端设备的RRC恢复过程中,接入网设备可以确定是否允许目标接入网设备提取终端设备的上下文,从而限制终端设备在支持外部认证的小区移动。进一步的,如果接入网设备允许目标接入网设备提取终端设备的上下文,接入网设备可以向目标接入网设备传递第一信息和/或第二信息。这样目标接入网设备可以结合第一信息和/或第二信息限制终端设备在支持外部认证的小区或支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
另一种可能的实现方式中,该方法还包括:
接入网设备接收来自目标接入网设备的提取UE上下文请求消息,目标接入网设备为终端设备发起RRC恢复请求的接入网设备;
接入网设备向目标接入网设备发送提取上下文失败消息,提取上下文失败消息包括失败原因;失败原因包括外部认证信息不匹配。
在该可能的实现方式中,在终端设备的RRC恢复过程中,接入网设备可以确定是否允许目标接入网设备提取终端设备的上下文,从而限制终端设备在支持外部认证的小区移动。如果接入网设备不允许目标接入网设备提取终端设备的上下文,接入网设备可以向目标接入网设备发送失败原因。这样目标接入网设备可以确定终端设备的RRC恢复失败原因。
另一种可能的实现方式中,该方法还包括:
接入网设备向目标接入网设备发送辅节点新增请求消息,辅节点新增请求消息包括以下至少一项:第一信息、或第二信息。
在该可能的实现方式中,在终端设备的双连接或多连接过程中,终端设备可以向目标 接入网设备传递第一信息和/或第二信息。这样目标接入网设备可以结合第一信息和/或第二信息限制终端设备在支持外部认证的小区或支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
本申请实施例第二方面提供一种通信方法,包括:
核心网设备接收来自接入网设备的初始UE消息;核心网设备对终端设备进行外部认证;核心网设备向接入网设备发送初始上下文建立请求消息,初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;核心网设备接收来自接入网设备的初始上下文响应消息。
本实施例中,在终端设备的初始接入过程中,核心网设备可以向接入网设备发送第一信息和/或第二信息。第一信息用于指示终端设备限制于支持外部认证的小区移动;第二信息包括归属服务商或归属服务商群组的信息。接入网设备获取这些信息后,可以参考这些信息为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。这样接入网设备可以为终端设备选择支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,初始上下文建立请求消息包括移动性限制列表,第一信息和/或第二信息位于移动性限制列表中。
在该可能的实现方式中,采用初始上下文建立请求消息中的移动性限制列表携带第一信息和/或第二信息,即提供了一种具体的携带方式。其次,移动性限制列表通常是用来指示终端设备的网络行为的一些限制条件。因此核心网设备通过移动性限制列表向接入网设备下发第一信息和/或第二信息。无需通过其他指示字段或指示信令指示第一信息和第二信息为终端设备的关于外部认证的相关限制信息,节省信令开销或比特开销。
并且,接入网设备可以根据移动性限制列表确定第一信息和/或第二信息。接入网设备可以根据第一信息和/或第二信息为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
另一种可能的实现方式中,归属服务商包括:对终端设备进行外部认证的第一归属服务商,和/或,与第一归属服务商关联的第二归属服务商;
归属服务商群组包括:对终端设备进行外部认证的第一归属服务商群组,和/或,与第一归属服务商群组关联的第二归属服务商群组。
上述实现方式提供一个或多个归属服务商或归属服务商群组。针对多个归属服务商或多个归属服务商群组的方案,可用于对终端设备进行认证的归属服务商或归属服务商群组有多个,这样能够提高终端设备通过外部认证的方式接入网络的成功率。
另一种可能的实现方式中,方法还包括:
核心网设备接收来自接入网设备的切换需求消息,切换需求消息包括支持外部认证的小区的标识,或包括支持所述归属服务商或归属服务商群组的小区的标识。
在该实现方式中,接入网设备通过上述实现方式向核心网设备请求将终端设备切换至选择外部认证的小区或支持归属服务商或归属服务商群组的小区。从而避免将终端设备切换至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
本申请实施例第三方面提供一种通信方法,包括:
源接入网设备向目标接入网设备发送切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;第一接入网设备接收来自目标接入网设备的切换请求确认消息。
本实施例中,在终端设备的切换过程中,源接入网设备向目标接入网设备发送第一信息和/或第二信息。这样,目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。从而限制终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证。进一步避免终端设备无法进行相应的业务,从而保障通信正常进行。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样目标接入网设备可以确定终端设备限制于在支持归属服务商或归属服务商群组的小区中移动。实现使能目标接入网设备限制终端设备在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
本申请实施例第四方面提供一种通信方法,包括:
源接入网设备向目标接入网设备发送切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;源接入网设备接收来自目标接入网设备的切换准备失败消息;切换准备 失败消息包括失败原因;失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
本实施例中,在终端设备的切换过程中,源接入网设备向目标接入网设备发送第一信息和/或第二信息。这样,目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。如果目标接入网设备不允许终端设备切换至目标小区,目标接入网设备向源接入网设备发送切换准备失败消息。并且,切换准备失败消息包括失败原因。这样源接入网设备可以结合失败原因确定切换失败的原因,并重新为终端设备选择小区请求切换。进一步的,源接入网设备还可以根据失败原因更新源接入网设备上保存的目标小区的关于外部认证的信息。避免源接入网设备误将终端设备切换至目标小区导致终端设备在切换至目标小区后无法完成二次认证。
一种可能的实现方式中,切换准备失败消息还包括目标小区支持归属服务商或归属服务商群组的信息。
在该可能的实现方式中,源接入网设备可以根据目标小区支持归属服务商或归属服务商群组的信息更新或修改源接入网设备上保存的目标小区的信息。避免源接入网设备误将终端设备切换至目标小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样目标接入网设备可以确定终端设备限制于在支持归属服务商或归属服务商群组的小区中移动。实现使能目标接入网设备限制终端设备在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
本申请实施例第五方面提供一种通信方法,包括:
目标接入网设备接收来自源接入网设备的切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区;目标接入网设备向源接入网设备发送切换请求确认消息。
本实施例中,在终端设备的切换过程中,目标接入网设备从源接入网设备获取第一信息和/或第二信息。这样目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。从而限制终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证,避免终端设备无法进行相应的业务,从而保障通信正常进行。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样目标接入网设备可以确定终端设备限制于支持归属服务商或归属服务商群组的小区中移动。从而实现使能目标接入网设备限制终端设备在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区,包括:
若切换请求消息包括第一信息而不包括所述第二信息,且目标小区支持外部认证,目标接入网设备允许终端设备切换至目标小区;
若切换请求消息包括所述第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则目标接入网设备允许终端设备切换至目标小区。
该实现方式示出了目标接入网设备结合第一信息、第二信息和目标小区的外部认证支持能力确定是否允许终端设备切换至目标小区的具体过程。从而限制终端设备只能在支持外部认证的小区或只能在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证,避免终端设备无法进行相应的业务,从而保障通信正常进行。
本申请实施例第六方面提供一种通信方法,包括:
目标接入网设备接收来自源接入网设备的切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区;目标接入网设备向源接入网设备发送切换准备失败消息;切换准备失败消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
本实施例中,在终端设备的切换过程中,目标接入网设备从源接入网设备获取第一信息和/或第二信息。这样目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。如果目标接入网设备不允许终端设备切换至目标小区,目标接入网设备向源接入网设备发送切换准备失败消息。并且,切换准备失败消息包括失败原因。这样,源接入网设备可以结合失败原因确定切换失败的原因,并重新为终端设备选择小区请求切换。进一步的,源接入网设备还可以根据失败原因更新源接入网设备上保存的目标小区的关于外部认证的信息。避免源接入网设备误将终端设备切换至目标小区导致终端设备在切换至目标小区后而无法完成终端设备的二次认证。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样目标接入网设备可以确定终端设备限制于支持归属服务商或归属服务商群组的小区中移动。从而实现使能目标接入网设备限制终端设备在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,切换准备失败消息还包括目标小区支持归属服务商或归属服务商群组的信息。
在该实现方式中,源接入网设备可以根据目标小区支持归属服务商或归属服务商群组的信息更新或修改源接入网设备上保存的目标小区的关于外部认证的信息。避免源接入网设备误将终端设备切换至目标小区导致终端设备无法进行二次认证。
另一种可能的实现方式中,目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区,包括:
若切换请求消息包括第一信息而不包括所述第二信息,且目标小区不支持外部认证,目标接入网设备不允许终端设备切换至目标小区;
若切换请求消息包括第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持的归属服务商或归属服务商群组的标识不包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则目标接入网设备不允许终端设备切换至目标小区。
该实现方式示出了目标接入网设备结合第一信息、第二信息和目标小区的外部认证支持能力确定是否允许终端设备切换至目标小区的具体过程。从而限制终端设备只能在支持外部认证的小区或只能在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证,避免终端设备无法进行相应的业务,从而保障通信正常进行。
本申请实施例第七方面提供一种通信方法,包括:
源接入网设备向核心网设备发送切换需求消息;源接入网设备接收来自核心网设备的切换准备失败消息;切换准备失败消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
本实施例中,在终端设备的切换过程中,如果目标接入网设备不允许终端设备切换至目标小区,核心网设备向源接入网设备发送切换准备失败消息。并且,切换准备失败消息包括失败原因。这样源接入网设备可以结合失败原因确定切换失败的原因,并重新为终端设备选择小区请求切换。进一步的,源接入网设备还可以根据失败原因更新源接入网设备上保存的目标小区的关于外部认证的信息。避免源接入网设备误将终端设备切换至目标小区,导致终端设备无法再次进行外部认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
一种可能的实现方式中,切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
在该实现方式中,源接入网设备可以根据目标小区支持归属服务商或归属服务商群组的信息更新或修改源接入网设备上保存的目标小区的关于外部认证的信息。避免源接入网设备误将终端设备切换至目标小区,导致终端设备无法再次进行外部认证。
本申请实施例第八方面提供一种通信方法,方法包括:
核心网设备接收来自源接入网设备发送切换需求消息;核心网设备向目标接入网设备发送切换请求消息;切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;若目标接入网设备允许终端设备切换至所述目标小区,核心网设备接收来自目标接入网设备的切换请求确认消息;核心网设备向源接入网设备发送切换命令。
本实施例中,在终端设备的切换过程中,核心网设备向目标接入网设备发送第一信息和/或第二信息。这样目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。从而限制终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证。进一步避免终端设备无法进行相应的业务,从而保障通信正常进行。
另一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样目标接入网设备可以确定终端设备限制于在支持归属服务商或归属服务商群组的小区中移动。从而实现使能目标接入网设备限制终端设备在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
本申请实施例第九方面提供一种通信方法,方法包括:
核心网设备接收来自源接入网设备发送切换需求消息;核心网设备向目标接入网设备发送切换请求消息;切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;核心网设备接收来自目标接入网设备的切换失败消息;切换失败消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络;核心网设备向源接入网设备发送切换准备失败消息,切换准备失败消息包括失败原因。
本实施例中,在终端设备的切换过程中,核心网设备向目标接入网设备发送第一信息和/或第二信息。这样,目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。如果目标接入网设备不允许终端设备切换至目标小区,核心网设备向源接入网设备发送切换准备失败消息。并且,切换准备失败消息包括失败原因。这样源接入网设备可以结合失败原因确定切换失败的原因,并重新为终端设备选择小区请 求切换。进一步的,源接入网设备还可以根据失败原因更新源接入网设备上保存的目标小区的信息。避免源接入网设备误将终端设备切换至目标小区导致终端设备进行二次认证。
另一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样目标接入网设备可以确定终端设备限制于在支持归属服务商或归属服务商群组的小区中移动。从而实现使能目标接入网设备限制终端设备在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,切换失败消息包括还包括目标小区支持的归属服务商或归属服务商群组的信息;切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
在该实现方式中,核心网设备将目标小区支持的归属服务商或归属服务商群组的信息发送给源接入网设备。那么源接入网设备可以根据目标小区支持归属服务商或归属服务商群组的信息更新或修改源接入网设备上保存的目标小区的信息。避免源接入网设备误将终端设备切换至目标小区导致终端设备无法再次进行外部认证。
本申请实施例第十方面提供一种通信方法,方法包括:
目标接入网设备接收来自核心网设备的切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区;目标接入网设备向核心网设备发送切换请求确认消息。
本实施例中,在终端设备的切换过程中,目标接入网设备接收来自核心网设备的第一信息和/或第二信息。这样,目标接入网设备可以根据第一信息和/或第二信息确定是否允许终端设备切换至目标小区。从而限制终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证。进一步避免终端设备无法进行相应的业务。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样目标接入网设备可以确定终端设备限制于在支持归属服务商或归属服务商群组的小区中移动。从而实现使能目标接入网设备限制终端设备只在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证,从而保障通信正常进行。
另一种可能的实现方式中,目标接入网设备进行接入控制,确定是否允许终端设备切 换至目标小区,包括:
若切换请求消息包括第一信息而不包括第二信息,且目标小区支持外部认证,目标接入网设备允许所述终端设备切换至所述目标小区;
若切换请求消息包括第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持外部认证的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则目标接入网设备允许终端设备切换至目标小区。
该实现方式示出了目标接入网设备结合第一信息、第二信息和目标小区的外部认证支持能力确定是否允许终端设备切换至目标小区的具体过程。从而限制终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证。进一步避免终端设备无法进行相应的业务,从而保障通信正常进行。
本申请实施例第十一方面提供一种通信方法,方法包括:
目标接入网设备接收来自核心网设备的切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区;目标接入网设备向核心网设备发送切换失败消息;切换失败消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
本实施例中,在终端设备的切换过程中,目标接入网设备接收来自核心网设备的第一信息和/或第二信息。这样,目标接入网设备可以根据第一信息和/或第二信息确定是否允许终端设备切换至目标小区。如果目标接入网设备不允许终端设备切换至目标小区,目标接入网设备向核心网设备发送切换失败消息,且切换失败消息包括失败原因。这样,核心网设备可以向源接入网设备发送失败原因。这样源接入网设备可以结合失败原因确定切换失败的原因,并重新为终端设备选择小区请求切换。进一步的,源接入网设备还可以根据失败原因更新源接入网设备上保存的目标小区的关于外部认证的信息。避免源接入网设备误将终端设备切换至目标小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样目标接入网设备可以确定终端设备限制于在支持归属服务商或归属服务商群组的小区中移动。从而实现使能目标接入网设备限制终端设备只在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证,从而保障通信正常进行。
另一种可能的实现方式中,切换准备失败消息还包括目标小区支持的归属服务商或归 属服务商群组的信息。
在该实现方式中,目标接入网设备向核心网设备发送目标小区支持的归属服务商或归属服务商群组的信息。然后,核心网设备向源接入网设备发送目标小区支持的归属服务商或归属服务商群组的信息。那么源接入网设备可以根据目标小区支持归属服务商或归属服务商群组的信息更新或修改源接入网设备上保存的目标小区的信息。避免源接入网设备误将终端设备切换至目标小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区,包括:
若切换请求消息包括第一信息而不包括第二信息,且目标小区不支持外部认证,目标接入网设备不允许终端设备切换至目标小区;
若切换请求消息包括所述第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持外部认证的归属服务商或归属服务商群组的标识不包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则目标接入网设备不允许终端设备切换至目标小区。
该实现方式示出了目标接入网设备结合第一信息、第二信息和目标小区的外部认证支持能力确定是否允许终端设备切换至目标小区的具体过程。从而限制终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证。进一步避免终端设备无法进行相应的业务,从而保障通信正常进行。
本申请实施例第十二方面提供一种通信方法,方法包括:
第一接入网设备接收来自终端设备的RRC恢复请求消息;第一接入网设备向源接入网设备发送提取UE上下文请求消息;第一接入网设备接收来自源接入网设备的提取UE上下文响应消息;提取UE上下文响应消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;第一接入网设备向终端设备发送RRC恢复消息。
本实施例中,在终端设备的RRC恢复过程中,如果源接入网设备确定允许第一接入网设备提取终端设备的上下文,第一接入网设备接收来自源接入网设备发送的第一信息和或第二信息。这样第一接入网设备可以根据第一信息和/或第二信息限制终端设备在支持外部认证的小区移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证,以避免终端设备无法进行相应的业务,从而保障通信正常进行。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样第一接入网设备可以确定终端设备限制于在支持归属服务商或归属服务商群组的小区中移动。从而实现使能第一接入网设备限制终端设备在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致 终端设备无法完成二次认证,从而保障通信正常进行。
本申请实施例第十三方面提供一种通信方法,方法包括:
第一接入网设备接收来自终端设备的RRC恢复请求消息;第一接入网设备向源接入网设备发送提取UE上下文请求消息;第一接入网设备接收来自源接入网设备的提取UE上下文失败消息,提取UE上下文失败消息包括失败原因,失败原因包括外部认证信息不匹配;第一接入网设备向终端设备发送RRC建立消息。
在该可能的实现方式中,在终端设备的RRC恢复过程中,如果源接入网设备确定不允许第一接入网设备提取终端设备的上下文,第一接入网设备向源接入网设备发送失败原因。这样第一接入网设备确定终端设备的RRC恢复请求失败。第一接入网设备可以指示终端设备重新建立RRC连接。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。这样第一接入网设备可以确定终端设备限制于在支持归属服务商或归属服务商群组的小区中移动。从而实现使能第一接入网设备限制终端设备在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证,从而保障通信正常进行。
本申请实施例第十四方面提供一种通信方法,方法包括:
源接入网设备接收来自第一接入网设备的提取UE上下文请求消息;源接入网设备向第一接入网设备发送提取UE上下文响应消息;提取UE上下文响应消息包括以下至少一项:第一信息、或第二信息,第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息。
本实施例中,在终端设备的RRC恢复过程中,如果源接入网设备确定允许第一接入网设备提取终端设备的上下文,源接入网设备向第一接入网设备第一信息和或第二信息。这样第一接入网设备可以根据第一信息和/或第二信息限制终端设备在支持外部认证的小区移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证的问题,以避免终端设备无法进行相应的业务,从而保障通信正常进行。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。实现使能第一接入网设备限制终端设备只在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,源接入网设备根据终端设备的上下文确定是否允许第一接入网设备提取终端设备的上下文,包括:
若终端设备的上下文包括第一信息而不包括第二信息,且终端设备发起RRC恢复请求所在的小区支持外部认证,则源接入网设备允许第一接入网设备提取终端设备的上下文;
若终端设备的上下文包括第二信息,或终端设备的上下文包括第一信息和第二信息,且终端设备发起RRC恢复请求所在的小区支持外部认证的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则源接入网设备允许第一接入网设备提取终端设备的上下文。
本申请实施例第十五方面提供一种通信方法,方法包括:
源接入网设备接收来自第一接入网设备的提取UE上下文请求消息;源接入网设备向第一接入网设备发送提取上下文失败消息;提取UE上下文失败消息包括失败原因,失败原因包括外部认证信息不匹配。
本实施例中,在终端设备的RRC恢复过程中,如果源接入网设备确定允许第一接入网设备提取终端设备的上下文,源接入网设备向第一接入网设备第一信息和或第二信息。这样第一接入网设备可以根据第一信息和/或第二信息限制终端设备在支持外部认证的小区移动。如果源接入网设备确定不允许第一接入网设备提取终端设备的上下文,源接入网设备向第一接入网设备发送失败原因。这样第一接入网设备确定终端设备的RRC恢复请求失败。第一接入网设备可以指示终端设备重新建立RRC连接。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。实现使能第一接入网设备限制终端设备只在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,源接入网设备根据终端设备的上下文确定是否允许第一接入网设备提取终端设备的上下文,包括:
若终端设备的上下文包括第一信息而不包括第二信息,且终端设备发起RRC恢复请求所在的小区不支持外部认证,则源接入网设备不允许第一接入网设备提取终端设备的上下文;
若终端设备的上下文包括第二信息,或终端设备的上下文包括第一信息和第二信息,且终端设备发起RRC恢复请求所在的小区支持外部认证的归属服务商或归属服务商群组的标识包括第二信息不包括的至少一个归属服务商或归属服务商群组的标识,则源接入网设备不允许第一接入网设备提取终端设备的上下文。
在该可能的实现方式中,示出了源接入网设备根据第一信息和/或第二信息确定是否允许第一接入网设备提取终端设备的上下文的具体过程。实现使能源接入网设备限制终端设备在支持外部认证的小区中移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证。进一步避免终端设备无法进行相应的业务。
本申请实施例第十六方面提供一种通信方法,方法包括:
第一接入网设备向第二接入网设备发送辅节点新增请求消息;辅节点新增请求消息包括终端设备请求双连接的目标小区的标识;辅节点新增请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;第一接入网设备接收来自第二接入网设备的辅节点新增请求确认消息。
本实施例中,在终端设备的双连接过程中,第一接入网设备向第二接入网设备发送第一信息和/或第二信息。这样第二接入网设备可以根据第一信息和/或第二信息确定是否允许终端设备双连接至目标小区,以限制终端设备在支持外部认证的小区移动。避免终端设备双连接至不支持外部认证的小区而无法完成终端设备的二次认证。进一步避免终端设备无法进行相应的业务。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。实现使能第一接入网设备限制终端设备只在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
本申请实施例第十七方面提供一种通信方法,方法包括:
第一接入网设备向第二接入网设备发送辅节点新增请求消息;辅节点新增请求消息包括终端设备请求双连接的目标小区的标识;辅节点新增请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;第一接入网设备接收来自第二接入网设备的辅节点新增请求拒绝消息;新增请求拒绝消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持一个或多个归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
本实施例中,在终端设备的双连接过程中,第一接入网设备向第二接入网设备发送第一信息和/或第二信息。这样第二接入网设备可以根据第一信息和/或第二信息确定是否允许终端设备双连接至目标小区。如果第二接入网设备不允许终端设备双连接至目标小区,第一接入网设备接收来自第二接入网设备的辅节点新增请求拒绝消息。并且,新增请求拒绝消息包括失败原因。这样第一接入网设备可以确定双连接请求失败。接入网设备可以重新为终端设备选择小区并进行双连接请求。其次,第一接入网设备也可以根据失败原因更新第一接入网设备上保存的目标小区的外部认证的相关信息。避免第一接入网设备误将终端设备切换至目标小区导致终端设备无法完成二次认证。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属 服务商群组的小区移动。实现使能第二接入网设备限制终端设备只在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。实现使能第二接入网设备限制终端设备只在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,新增请求拒绝消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
在该可能的实现方式中,第一接入网设备根据目标小区支持的归属服务商或归属服务商群组的信息更新或修改第一接入网设备上保存的目标小区的外部认证的相关信息。避免第一接入网设备误将终端设备切换至目标小区导致终端设备无法完成二次认证。
本申请实施例第十八方面提供一种通信方法,方法包括:
第二接入网设备接收来自第一接入网设备的辅节点新增请求消息;辅节点新增请求消息包括终端设备请求双连接的目标小区的标识;辅节点新增请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;第二接入网设备进行接入控制,确定是否允许终端设备双连接至目标小区;若第二接入网设备允许终端设备双连接至目标小区,第二接入网设备向第一接入网设备发送辅节点新增请求确认消息。
本实施例中,在终端设备的双连接过程中,第二接入网设备接收来自第一接入网设备的第一信息和/或第二信息。这样第二接入网设备可以根据第一信息和/或第二信息确定是否允许终端设备双连接至目标小区,以限制终端设备在支持外部认证的小区移动。避免终端设备双连接至不支持外部认证的小区而无法完成终端设备的二次认证。进一步避免终端设备无法进行相应的业务,从而保障通信正常进行。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。实现使能第二接入网设备限制终端设备只在支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,第二接入网设备进行接入控制,确定是否允许终端设备双连接至目标小区,包括:
若辅节点新增请求消息包括第一信息而不包括第二信息,且目标小区支持外部认证, 则第二接入网设备允许终端设备双连接至目标小区;
若辅节点新增请求消息包括第二信息,或辅节点新增请求消息包括第一信息和第二信息,且目标小区支持外部认证的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则第二接入网设备允许终端设备双连接至目标小区。
在该可能的实现方式中,示出了第二接入网设备根据第一信息和/或第二信息确定是否允许第一接入网设备提取终端设备的上下文的具体过程。实现使能第二接入网设备限制终端设备在支持外部认证的小区中移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证。进一步避免终端设备无法进行相应的业务。
本申请实施例第十九方面提供一种通信方法,方法包括:
第二接入网设备接收来自第一接入网设备的辅节点新增请求消息;辅节点新增请求消息包括终端设备请求双连接的目标小区的标识;辅节点新增请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;第二接入网设备进行接入控制,确定是否允许终端设备双连接至目标小区;第二接入网设备向第一接入网设备发送辅节点新增请求拒绝消息;新增请求拒绝消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持一个或多个归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
本实施例中,在终端设备的双连接过程中,第二接入网设备接收来自第一接入网设备的第一信息和/或第二信息。这样第二接入网设备可以根据第一信息和/或第二信息确定是否允许终端设备双连接至目标小区。如果第二接入网设备不允许终端设备双连接至目标小区,第二接入网设备向第一接入网设备发送辅节点新增请求拒绝消息。并且,新增请求拒绝消息包括失败原因。这样第一接入网设备可以确定双连接请求失败。接入网设备可以重新为终端设备选择小区并进行双连接请求。其次,第一接入网设备也可以根据失败原因更新第一接入网设备上保存的目标小区的外部认证的相关信息。避免第一接入网设备误将终端设备切换至目标小区导致终端设备无法完成二次认证。
一种可能的实现方式中,新增请求拒绝消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
在该可能的实现方式中,第二接入网设备向第一接入网设备发送目标小区支持的归属服务商或归属服务商群组的信息。这样第一接入网设备根据目标小区支持的归属服务商或归属服务商群组的信息更新或修改第一接入网设备上保存的目标小区的外部认证的相关信息。避免第一接入网设备误将终端设备切换至目标小区导致终端设备无法完成二次认证。
另一种可能的实现方式中,第二接入网设备进行接入控制,确定是否允许终端设备双连接至目标小区,包括:
若辅节点新增请求消息包括第一信息而不包括第二信息,且目标小区不支持外部认证,则第二接入网设备不允许终端设备双连接至目标小区;
若辅节点新增请求消息包括第二信息,或辅节点新增请求消息包括第一信息和第二信 息,且目标小区支持外部认证的归属服务商或归属服务商群组的标识不包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则第二接入网设备不允许终端设备双连接至目标小区。
在该可能的实现方式中,示出了第二接入网设备根据第一信息和/或第二信息确定是否允许第一接入网设备提取终端设备的上下文的具体过程。实现使能第二接入网设备限制终端设备在支持外部认证的小区中移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证。进一步避免终端设备无法进行相应的业务。
本申请实施例第二十方面提供一种通信方法,方法包括:
第一网元接收来自第二网元寻呼消息,寻呼消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;第一网元根据寻呼消息选择目标小区;第一网元在目标小区寻呼终端设备。
本实施例中,第一网元接收来自第二网元寻呼消息。寻呼消息包括以下至少一项:第一信息、或第二信息。这样第一网元可以根据第一信息和/或第二信息选择目标小区。对于通过外部认证的方式接入网络的终端设备,第一网元可以在支持外部认证的小区或在支持第二信息包括的归属服务商或归属服务商群组的小区中寻呼终端设备。避免在不支持外部认证的小区中寻呼终端设备。减少第一网元发送的寻呼消息的数量,节省信令开销。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。那么第一网元可以只在支持外部认证的小区寻呼终端设备,从而节省信令开销。
另一种可能的实现方式中,第一网元为第一接入网设备,第二网元为第二接入网设备,寻呼消息为接入网寻呼消息。
上述实现方式同样适用于接入网发起的寻呼过程。第一接入网设备只在支持外部认证的小区寻呼终端设备,从而节省信令开销。
另一种可能的实现方式中,第一网元为接入网设备,第二网元为核心网设备。
上述实现方式同样适用于核心网发起的寻呼过程。接入网设备只在支持外部认证的小区寻呼终端设备,从而节省信令开销。
另一种可能的实现方式中,第一网元根据寻呼消息选择目标小区,包括:若寻呼消息包括第一信息且不包括第二信息,第一网元选择支持外部认证的小区作为目标小区;若寻呼消息包括所述第二信息,或寻呼消息包括第一信息和第二信息,第一网元选择支持归属服务商或归属服务商群组的小区作为目标小区。
在该可能的实现方式中,示出了第一网元根据第一信息和/或第二信息选择目标小区的具体过程。从而实现第一网元只在支持外部认证的小区寻呼终端设备。避免在不支持外部认证的小区中寻呼终端设备。减少第一网元发送的寻呼消息的数量,节省信令开销。
本申请实施例第二十一方面提供一种通信方法,方法包括:
第二网元向第一网元发送寻呼消息,寻呼消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息。
本实施例中,第二网元向第一网元发送寻呼消息。寻呼消息包括以下至少一项:第一信息、或第二信息。这样第一网元可以根据第一信息和/或第二信息选择目标小区。对于通过外部认证的方式接入网络的终端设备,第一网元可以在支持外部认证的小区或在支持第二信息包括的归属服务商或归属服务商群组的小区中寻呼终端设备。避免在不支持外部认证的小区中寻呼终端设备,减少第一网元发送的寻呼消息的数量,节省信令开销。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
该实现方式通过归属服务商或归属服务商群组的标识表示归属服务商或归属服务商群组。归属服务商或归属服务商群组的标识用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。那么第一网元可以只在支持外部认证的小区寻呼终端设备,从而节省信令开销。
另一种可能的实现方式中,第一网元为第一接入网设备,第二网元为第二接入网设备,寻呼消息为接入网寻呼消息。
上述实现方式同样适用于接入网发起的寻呼过程。第一接入网设备只在支持外部认证的小区寻呼终端设备,从而节省信令开销。
另一种可能的实现方式中,第一网元为接入网设备,第二网元为核心网设备。
上述实现方式同样适用于核心网发起的寻呼过程。接入网设备只在支持外部认证的小区寻呼终端设备,从而节省信令开销。
本申请实施例第二十二方面提供一种通信方法,方法包括:
终端设备接收来自接入网设备的用于外部认证的统一接入控制(unified access control,UAC)参数;终端设备根据用于外部认证的UAC参数确定是否接入接入网设备。
本实施例中,接入网设备广播一套用于外部认证的UAC参数。这样终端设备可以在接入网设备的小区接收到接入网设备广播的用于外部认证的UAC参数。然后,终端设备根据用于外部认证的UAC参数确定是否接入接入网设备。接入网设备可以对关于外部认证的两种接入方式(包括通过外部认证的方式接入网络和通过非外部认证的方式接入网络)进行差异化控制。例如,当网络希望优先接纳通过外部认证的方式接入网络的终端设备时,可以调整用于外部认证的UAC参数(例如,提高禁止因子、或降低禁止时间),使得尝试通过外部认证的方式接入网络的终端设备接入网络的概率更大。
一种可能的实现方式中,用于外部认证的统一接入控制UAC参数包括:一个或者多个接入类别(access category,AC)分别对应的一组UAC参数。
在该可能的实现方式中,用于外部认证的UAC参数可以包括一个或多个AC对应的UAC参数。这样终端设备可以根据终端设备的接入尝试对应的AC选择对应的一组用于外部认证的UAC参数。然后,终端设备再根据该UAC参数进行接入尝试。
本申请实施例第二十三方面提供一种通信方法,方法包括:
接入网设备确定用于外部认证的UAC参数;然后,接入网设备向终端设备发送用于外部认证的UAC参数。
本实施例中,接入网设备确定用于外部认证的UAC参数;然后,接入网设备广播一套用于外部认证的UAC参数。这样终端设备根据用于外部认证的UAC参数确定是否接入接入网设备。接入网设备可以对关于外部认证的两种接入方式(包括通过外部认证的方式接入网络和通过非外部认证的方式接入网络)进行差异化控制。例如,当网络希望优先接纳通过外部认证的方式接入网络的终端设备时,可以调整用于外部认证的UAC参数(例如,提高禁止因子、或降低禁止时间),使得尝试通过外部认证的方式接入网络的终端设备接入网络的概率更大。
一种可能的实现方式中,用于外部认证的统一接入控制UAC参数包括:一个或者多个接入类别(access category,AC)分别对应的一组UAC参数。
在该可能的实现方式中,用于外部认证的UAC参数可以包括一个或多个AC对应的UAC参数。这样终端设备可以根据终端设备的接入尝试对应的AC选择对应的一组用于外部认证的UAC参数。然后,终端设备再根据该UAC参数进行接入尝试。
本申请实施例第二十四方面提供一种通信方法,方法包括:
终端设备与接入网设备建立RRC连接;然后,终端设备接收来自核心网设备的归属服务商或归属服务商群组的信息。
本实施例中,在终端设备的初始接入过程中,核心网设备可以向终端设备发送归属服务商或归属服务商群组的信息。终端设备可以根据该归属服务商或归属服务商群组的信息选择从支持该归属服务商或归属服务商群组的小区中重选一个小区进行驻留或移动。避免终端设备移动或驻留的小区不支持外部认证导致终端设备无法完成二次认证。避免终端设备无法进行相应的业务,保障正常通信进行。
一种可能的实现方式中,方法还包括:终端设备选择支持归属服务商或归属服务商群组的小区中进行驻留。
在该可能的实现方式中,终端设备可以选择支持归属服务商或归属服务商群组的小区中进行驻留。避免终端设备驻留到不支持外部认证的小区而导致终端设备无法进行相应的业务。避免终端设备无法进行相应的业务,从而保障通信正常进行。
本申请实施例第二十五方面提供一种通信方法,方法包括:
核心网设备接收来自接入网设备的初始UE消息;核心网设备对终端设备进行外部认证;核心网设备向终端设备发送归属服务商或归属服务商群组的信息;核心网设备向接入网设备发送初始上下文建立请求消息。
本实施例中,在终端设备的初始接入过程中,核心网设备可以向终端设备发送归属服务商或归属服务商群组的信息。终端设备可以选择从支持该归属服务商或归属服务商群组的小区中重选一个小区进行驻留或移动。避免终端设备移动或驻留的小区不支持外部认证导致终端设备无法完成二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
本申请实施例第二十六方面提供一种通信方法,方法包括:
接入网设备与终端设备建立RRC连接;接入网设备向核心网设备发送初始UE消息;接入网设备接收来自核心网设备的初始上下文建立请求消息,初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持在线签约的小区中移动;第二信息包括终端设备的待签约网络的信息;接入网设备向核心网设备发送初始上下建立响应消息。
本实施例中,在终端设备的初始接入过程中,接入网设备从核心网设备获取第一信息和/或第二信息。这样接入网设备可以根据第一信息和/或第二信息限制终端设备只能在支持在线签约的小区中移动。避免终端设备移动至不支持在线签约的小区而导致终端设备无法获取到终端设备的待签约网络的证书。
一种可能的实现方式中,终端设备的待签约网络的信息包括待签约网络的标识。
该实现方式中,接入网设备根据待签约网络的标识可以限制终端设备在支持待签约网络的在线签约的小区中移动。避免终端设备移动至不支持在线签约的小区而导致终端设备无法获取到终端设备的待签约网络的证书。
本申请实施例第二十七方面提供一种通信方法,方法包括:
核心网设备接收来自接入网设备的初始UE消息;核心网设备向接入网设备发送初始上下文建立请求消息,初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持在线签约的小区中移动;第二信息包括终端设备的待签约网络的信息;核心网设备接收来自接入网设备的初始上下文建立响应消息。
本实施例中,在终端设备的初始接入过程中,核心网设备向接入网设备发送第一信息和/或第二信息。这样接入网设备可以根据第一信息和/或第二信息限制终端设备只能在支持在线签约的小区中移动。避免终端设备移动至不支持在线签约的小区而导致终端设备无法获取到终端设备的待签约网络的证书。
一种可能的实现方式中,终端设备的待签约网络的信息包括待签约网络的标识。
该实现方式中,核心网设备向接入网设备发送待签约网络的标识。接入网设备根据待签约网络的标识可以限制终端设备在支持待签约网络的在线签约的小区中移动。避免终端设备移动至不支持在线签约的小区而导致终端设备无法获取到终端设备的待签约网络的证书。
本申请实施例第二十八方面提供一种通信方法,方法包括:
终端设备接收来自接入网设备的用于在线签约的UAC参数;然后,终端设备根据所述用于在线签约的UAC参数确定是否接入接入网设备。
本实施例中,终端设备接收接入网设备广播的一组用于在线签约的UAC参数。然后,终端设备根据用于在线签约的UAC参数确定是否接入接入网设备。本实施例中,接入网设备可以对两个接入方式(包括在线签约的方式接入网络或非在线签约的方式接入网络)进行差异化控制。例如,当网络希望优先接纳通过在线签约的方式接入网络的终端设备时,可以调整用于在线签约的UAC参数(例如,提高禁止因子、或降低禁止时间),使得尝试通过在线签约的方式接入网络的终端设备接入网络的概率更大。
一种可能的实现方式中,用于在线签约的UAC参数包括:AC所对应的一组UAC参数,AC为在线签约接入对应的AC。
在该可能的实现方式中,接入网设备广播在线签约接入对应的AC的一组UAC参数。这样终端设备根据用于在线签约的UAC参数确定是否接入接入网设备。
本申请实施例第二十九方面提供一种通信方法,方法包括:
接入网设备确定用于在线签约的UAC参数;接入网设备向终端设备发送所述用于在线签约的UAC参数。
本实施例中,接入网设备确定用于在线签约的UAC参数,并广播该用于在线签约的UAC参数。这样,终端设备可以根据用于在线签约的UAC参数确定是否接入接入网设备。本实施例中,接入网设备可以对两个接入方式(包括在线签约的方式接入网络或非在线签约的方式接入网络)进行差异化控制。例如,当网络希望优先接纳通过在线签约的方式接入网络的终端设备时,可以调整用于在线签约的UAC参数(例如,提高禁止因子、或降低禁止时间),使得尝试通过在线签约的方式接入网络的终端设备接入网络的概率更大。
一种可能的实现方式中,用于在线签约的UAC参数包括:AC所对应的一组UAC参数,AC为在线签约接入对应的AC。
在该可能的实现方式中,接入网设备广播在线签约接入对应的AC的一组UAC参数。这样终端设备根据用于在线签约的UAC参数确定是否接入接入网设备。
本申请实施例第三十方面提供一种通信装置,通信装置包括:
接收单元,用于与终端设备建立无线资源控制RRC连接;
发送单元,用于向核心网设备发送初始UE消息;
接收单元,还用于接收来自核心网设备的初始上下文建立请求消息,初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区移动;
第二信息包括归属服务商或归属服务商群组的信息;
发送单元,还用于向核心网设备发送初始上下文响应消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,初始上下文建立请求消息包括移动性限制列表,第一信息和/或第二信息位于移动性限制列表中。
另一种可能的实现方式中,归属服务商包括:对终端设备进行外部认证的第一归属服务商,和/或,与第一归属服务商关联的第二归属服务商;
归属服务商群组包括:对终端设备进行外部认证的第一归属服务商群组,和/或,与第一归属服务商群组关联的第二归属服务商群组。
另一种可能的实现方式中,通信装置包括处理单元;
处理单元,用于为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。
另一种可能的实现方式中,发送单元还用于:
向目标接入网设备发送切换请求消息,切换请求消息包括以下至少一项:第一信息、或第二信息;或者,
向核心网设备发送切换需求消息。
另一种可能的实现方式中,切换请求消息包括选择外部认证的小区的标识,或包括支持归属服务商或归属服务商群组的小区的标识;
切换需求消息包括支持外部认证的小区的标识,或包括支持所述归属服务商或归属服务商群组的小区的标识。
另一种可能的实现方式中,接收单元还用于:
接收来自目标接入网设备的提取UE上下文请求消息,目标接入网设备为终端设备发起RRC恢复请求的接入网设备;
发送单元,还用于向所述目标接入网设备发送提取UE上下文响应消息,提取UE上下文响应消息包括以下至少一项:第一信息、或第二信息。
另一种可能的实现方式中,接收单元还用于:
接收来自目标接入网设备的提取UE上下文请求消息,目标接入网设备为终端设备发起RRC恢复请求的接入网设备;
发送单元,用于向目标接入网设备发送提取上下文失败消息,提取上下文失败消息包括失败原因;失败原因包括外部认证信息不匹配。
另一种可能的实现方式中,发送单元还用于:
向目标接入网设备发送辅节点新增请求消息,辅节点新增请求消息包括以下至少一项:第一信息、或第二信息。
本申请实施例第三十一方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自接入网设备的初始UE消息;
处理单元,用于对终端设备进行外部认证;
发送单元,用于向接入网设备发送初始上下文建立请求消息,初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;
第二信息包括归属服务商或归属服务商群组的信息;
接收单元,还用于接收来自接入网设备的初始上下文响应消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息所述归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,初始上下文建立请求消息包括移动性限制列表,第一信息和/或第二信息位于移动性限制列表中。
另一种可能的实现方式中,归属服务商包括:对终端设备进行外部认证的第一归属服务商,和/或,与第一归属服务商关联的第二归属服务商;
归属服务商群组包括:对终端设备进行外部认证的第一归属服务商群组,和/或,与第一归属服务商群组关联的第二归属服务商群组。
另一种可能的实现方式中,接收单元还用于:
接收来自接入网设备的切换需求消息,切换需求消息包括支持外部认证的小区的标识,或包括支持所述归属服务商或归属服务商群组的小区的标识。
本申请实施例第三十二方面提供一种通信装置,通信装置包括:
发送单元,用于向目标接入网设备发送切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
接收单元,用于接收来自目标接入网设备的切换请求确认消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
本申请实施例第三十三方面提供一种通信装置,通信装置包括:
发送单元,用于向目标接入网设备发送切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
接收单元,用于接收来自目标接入网设备的切换准备失败消息;
切换准备失败消息包括失败原因;失败原因包括以下任一项:
目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
一种可能的实现方式中,切换准备失败消息还包括目标小区支持归属服务商或归属服务商群组的信息。
本申请实施例第三十四方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自源接入网设备的切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
处理单元,用于进行接入控制,确定是否允许终端设备切换至目标小区;
发送单元,用于向源接入网设备发送切换请求确认消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,处理单元具体用于:
若切换请求消息包括第一信息而不包括所述第二信息,且目标小区支持外部认证,允许终端设备切换至目标小区;
若切换请求消息包括所述第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则允许终端设备切换至目标小区。
本申请实施例第三十五方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自源接入网设备的切换请求消息,切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
处理单元,用于进行接入控制,确定是否允许终端设备切换至目标小区;
发送单元,用于向源接入网设备发送切换准备失败消息;
切换准备失败消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
一种可能的实现方式中,切换准备失败消息还包括目标小区支持归属服务商或归属服务商群组的信息。
另一种可能的实现方式中,处理单元具体用于:
若切换请求消息包括第一信息而不包括所述第二信息,且目标小区不支持外部认证,不允许终端设备切换至目标小区;
若切换请求消息包括第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持的归属服务商或归属服务商群组的标识不包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则不允许终端设备切换至目标小区。
本申请实施例第三十六方面提供一种通信装置,通信装置包括:
发送单元,用于向核心网设备发送切换需求消息;
接收单元,用于接收来自核心网设备的切换准备失败消息;
切换准备失败消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
一种可能的实现方式中,切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
本申请实施例第三十七方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自源接入网设备发送切换需求消息;
发送单元,用于向目标接入网设备发送切换请求消息;
切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;
第二信息包括归属服务商或归属服务商群组的信息;
接收单元,还用于接收来自目标接入网设备的切换请求确认消息;
发送单元,还用于向源接入网设备发送切换命令。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,切换失败消息包括还包括目标小区支持的归属服务商或归 属服务商群组的信息;切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
本申请实施例第三十八方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自源接入网设备发送切换需求消息;
发送单元,用于向目标接入网设备发送切换请求消息;
切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;
第二信息包括归属服务商或归属服务商群组的信息;
接收单元,还用于若目标接入网设备不允许终端设备切换至目标小区,接收来自目标接入网设备的切换失败消息;
切换失败消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络;
发送单元还用于:
向源接入网设备发送切换准备失败消息,切换准备失败消息包括失败原因。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,切换失败消息包括还包括目标小区支持的归属服务商或归属服务商群组的信息;切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
本申请实施例第三十九方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自核心网设备的切换请求消息;切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
处理单元,用于进行接入控制,确定是否允许终端设备切换至目标小区;
发送单元,用于向核心网设备发送切换请求确认消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
另一种可能的实现方式中,处理单元具体用于:
若切换请求消息包括第一信息而不包括第二信息,且目标小区支持外部认证,允许所述终端设备切换至所述目标小区;
若切换请求消息包括第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持外部认证的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属 服务商或归属服务商群组的标识,则允许终端设备切换至目标小区。
本申请实施例第四十方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自核心网设备的切换请求消息;切换请求消息用于请求将终端设备切换至目标小区;切换请求消息包括以下至少一项:第一信息、或第二信息;第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
处理单元,用于进行接入控制,确定是否允许终端设备切换至目标小区;
发送单元,还用于向核心网设备发送切换失败消息;
切换失败消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
另一种可能的实现方式中,处理单元具体用于:
若切换请求消息包括第一信息而不包括第二信息,且目标小区不支持外部认证,不允许终端设备切换至目标小区;
若切换请求消息包括第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持外部认证的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则允许终端设备切换至目标小区。
本申请实施例第四十一方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自终端设备的RRC恢复请求消息;
发送单元,用于向源接入网设备发送提取UE上下文请求消息;
接收单元,用于接收来自源接入网设备的提取UE上下文响应消息;
提取UE上下文响应消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
发送单元,还用于向终端设备发送RRC恢复消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
本申请实施例第四十二方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自终端设备的RRC恢复请求消息;
发送单元,用于向源接入网设备发送提取UE上下文请求消息;
接收单元,用于接收来自源接入网设备的提取UE上下文失败消息;
提取UE上下文失败消息包括失败原因,失败原因包括外部认证信息不匹配;
发送单元,还用于向终端设备发送RRC建立消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
本申请实施例第四十三方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自第一接入网设备的提取UE上下文请求消息;
发送单元,用于若通信装置允许第一接入网设备提取终端设备的上下文,向第一接入网设备发送提取UE上下文响应消息;
提取UE上下文响应消息包括以下至少一项:第一信息、或第二信息,第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
本申请实施例第四十四方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自第一接入网设备的提取UE上下文请求消息;
发送单元,用于若通信装置确定不允许第一接入网设备提取终端设备的上下文,向第一接入网设备发送提取上下文失败消息;
提取UE上下文失败消息包括失败原因,失败原因包括外部认证信息不匹配。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
本申请实施例第四十五方面提供一种通信装置,通信装置包括:
发送单元,用于向第二接入网设备发送辅节点新增请求消息;辅节点新增请求消息包括终端设备请求双连接的目标小区的标识;辅节点新增请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
接收单元,用于接收来自第二接入网设备的辅节点新增请求确认消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
本申请实施例第四十六方面提供一种通信装置,通信装置包括:
发送单元,用于向第二接入网设备发送辅节点新增请求消息;辅节点新增请求消息包括终端设备请求双连接的目标小区的标识;辅节点新增请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
接收单元,用于接收来自第二接入网设备的辅节点新增请求拒绝消息;
新增请求拒绝消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持一个或多个归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,新增请求拒绝消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
本申请实施例第四十七方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自第一接入网设备的辅节点新增请求消息;
辅节点新增请求消息包括终端设备请求双连接的目标小区的标识;辅节点新增请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
处理单元,用于进行接入控制,确定是否允许终端设备双连接至目标小区;
发送单元,用于向第一接入网设备发送辅节点新增请求确认消息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,处理单元具体用于:
若辅节点新增请求消息包括第一信息而不包括第二信息,且目标小区支持外部认证,则允许终端设备双连接至目标小区;
若辅节点新增请求消息包括第二信息,或辅节点新增请求消息包括第一信息和第二信息,且目标小区支持外部认证的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则允许终端设备双连接至目标小区。
本申请实施例第四十八方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自第一接入网设备的辅节点新增请求消息;
辅节点新增请求消息包括终端设备请求双连接的目标小区的标识;辅节点新增请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
处理单元,用于进行接入控制,确定是否允许终端设备双连接至目标小区;
发送单元,用于向第一接入网设备发送辅节点新增请求拒绝消息;
新增请求拒绝消息包括失败原因,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持一个或多个归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
一种可能的实现方式中,新增请求拒绝消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
另一种可能的实现方式中,处理单元具体用于:
若辅节点新增请求消息包括第一信息而不包括第二信息,且目标小区不支持外部认证,则不允许终端设备双连接至目标小区;
若辅节点新增请求消息包括第二信息,或辅节点新增请求消息包括第一信息和第二信 息,且目标小区支持外部认证的归属服务商或归属服务商群组的标识不包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则不允许终端设备双连接至目标小区。
本申请实施例第四十九方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自第二网元寻呼消息,寻呼消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息;
处理单元,用于根据寻呼消息选择目标小区;在目标小区寻呼终端设备。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,通信装置为第一接入网设备,第二网元为第二接入网设备,寻呼消息为接入网寻呼消息。
另一种可能的实现方式中,通信装置为接入网设备,第二网元为核心网设备。
另一种可能的实现方式中,处理单元具体用于:
若寻呼消息包括第一信息且不包括第二信息,选择支持外部认证的小区作为目标小区;
若寻呼消息包括所述第二信息,或寻呼消息包括第一信息和第二信息,选择支持归属服务商或归属服务商群组的小区作为目标小区。
本申请实施例第五十方面提供一种通信装置,通信装置包括:
发送单元,用于向第一网元发送寻呼消息,寻呼消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持外部认证的小区中移动;第二信息包括归属服务商或归属服务商群组的信息。
一种可能的实现方式中,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
另一种可能的实现方式中,第一网元为第一接入网设备,通信装置为第二接入网设备,寻呼消息为接入网寻呼消息。
另一种可能的实现方式中,第一网元为接入网设备,通信装置为核心网设备。
本申请实施例第五十一方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自接入网设备的用于外部认证的统一接入控制(unified access control,UAC)参数;
处理单元,用于根据用于外部认证的UAC参数确定是否接入接入网设备。
一种可能的实现方式中,用于外部认证的统一接入控制UAC参数包括:一个或者多个AC分别对应的一组UAC参数。
本申请实施例第五十二方面提供一种通信装置,通信装置包括:
处理单元,用于确定用于外部认证的UAC参数;
发送单元,用于向终端设备发送用于外部认证的UAC参数。
一种可能的实现方式中,用于外部认证的统一接入控制UAC参数包括:一个或者多个 接入类别(access category,AC)分别对应的一组UAC参数。
本申请实施例第五十三方面提供一种通信装置,通信装置包括:
发送单元,用于与接入网设备建立RRC连接;
接收单元,用于接收来自核心网设备的归属服务商或归属服务商群组的信息。
一种可能的实现方式中,通信装置还包括处理单元;处理单元用于:
选择支持归属服务商或归属服务商群组的小区中进行驻留。
本申请实施例第五十四方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自接入网设备的初始UE消息;
处理单元,用于对终端设备进行外部认证;
发送单元,用于向终端设备发送归属服务商或归属服务商群组的信息;向接入网设备发送初始上下文建立请求消息。
本申请实施例第五十五方面提供一种通信装置,通信装置包括:
发送单元,用于与终端设备建立RRC连接;向核心网设备发送初始UE消息;
接收单元,用于接收来自核心网设备的初始上下文建立请求消息,初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持在线签约的小区中移动;第二信息包括终端设备的待签约网络的信息;
发送单元,还用于核心网设备发送初始上下建立响应消息。
一种可能的实现方式中,终端设备的待签约网络的信息包括待签约网络的标识。
本申请实施例第五十六方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自接入网设备的初始UE消息;
发送单元,用于向接入网设备发送初始上下文建立请求消息,初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;
第一信息用于指示终端设备限制于支持在线签约的小区中移动;第二信息包括终端设备的待签约网络的信息;
接收单元,还用于接收来自接入网设备的初始上下文建立响应消息。
一种可能的实现方式中,终端设备的待签约网络的信息包括待签约网络的标识。
本申请实施例第五十七方面提供一种通信装置,通信装置包括:
接收单元,用于接收来自接入网设备的用于在线签约的UAC参数;
处理单元,用于根据所述用于在线签约的UAC参数确定是否接入接入网设备。
一种可能的实现方式中,用于在线签约的UAC参数包括:AC所对应的一组UAC参数,AC为在线签约接入对应的AC。
本申请实施例第五十八方面提供一种通信装置,通信装置包括:
处理单元,用于确定用于在线签约的UAC参数;
发送单元,用于向终端设备发送所述用于在线签约的UAC参数。
一种可能的实现方式中,用于在线签约的UAC参数包括:AC所对应的一组UAC参数,AC为在线签约接入对应的AC。
本申请实施例第五十九方面提供一种通信装置,通信装置包括:处理器和存储器。存储器中存储有计算机程序或计算机指令,处理器还用于调用并运行存储器中存储的计算机程序或计算机指令,使得处理器实现如第一方面至第二十九方面中的任一方面中的任意一种实现方式。
可选的,通信装置包括收发器;处理器用于控制收发器执行如第一方面至第二十九方面中的任一方面中的任意一种实现方式。
本申请实施例第六十方面提供一种包括计算机指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得计算机执行如第一方面至第二十九方面中任一种的实现方式。
本申请实施例第六十一方面提供一种计算机可读存储介质,包括计算机指令,当计算机指令在计算机上运行时,使得计算机执行如第一方面至第二十九方面任一方面中的任一种实现方式。
本申请实施例第六十二方面提供一种通信装置,通信装置包括网络设备、终端设备或芯片等实体,通信装置包括处理器,用于调用存储器中的计算机程序或计算机指令,以使得处理器执行上述第一方面至第二十九方面中的任一方面中的任一种实现方式。
可选的,处理器通过接口与存储器耦合。
本申请实施例第六十三方面提供一种通信系统,通信系统包括第三十方面的通信装置和如第三十一方面的通信装置;或者通信系统包括第三十二方面的通信装置和第三十四方面的通信装置;或者通信系统包括第三十三方面的通信装置和第三十五方面的通信装置;或者通信系统包括第三十七方面的通信装置和第三十九方面的通信装置;或者通信系统包括第三十六方面的通信装置、第三十八方面的通信装置和第四十方面的通信装置;或者通信系统包括第四十一方面的通信装置和第四十三方面的通信装置;或者通信装置包括四十二方面的通信装置和第四十四方面的通信装置;或者通信系统包括第四十五方面的通信装置和第四十七方面的通信装置;或者通信系统包括第四十六方面的通信装置和第四十八方面的通信装置;或者通信系统包括第四十九方面的通信装置和第五十方面的通信装置;或者通信系统包括第五十五方面的通信装置和第五十六方面的通信装置。
本申请实施例第六十四方面提供一种芯片,包括处理器,用于与存储器相连,调用该存储器中存储的程序,以使得该处理器执行上述第一方面至第二十九方面中的任一种实现方式。
附图说明
图1为本申请实施例终端设备通过外部认证的方式接入网络的一个场景示意图;
图2为本申请实施例网络架构的一个示意图;
图3为本申请实施例通信方法的一个实施例示意图;
图4为本申请实施例通信方法的另一个实施例示意图;
图5为本申请实施例通信方法的另一个实施例示意图;
图6为本申请实施例通信方法的另一个实施例示意图;
图7为本申请实施例通信方法的另一个实施例示意图;
图8为本申请实施例通信方法的另一个实施例示意图;
图9A为本申请实施例通信方法的另一个实施例示意图;
图9B为本申请实施例通信方法的另一个实施例示意图;
图10A为本申请实施例在线签约的一个场景示意图;
图10B为本申请实施例在线签约的另一个场景示意图;
图11为本申请实施例通信方法的另一个实施例示意图;
图12为本申请实施例通信装置的一个结构示意图;
图13为本申请实施例通信装置的另一个结构示意图;
图14为本申请实施例通信装置的另一个结构示意图;
图15为本申请实施例通信装置的另一个结构示意图;
图16为本申请实施例通信装置的另一个结构示意图;
图17为本申请实施例终端设备一个结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
在本说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
在本申请实施例中,终端设备(terminal equipment)也可称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal)、客户端(station,STA)等,是一种向用户提供语音和/或数据连通性的设备。例如,终端设备可以包括无线连接功能的手持式设备、车载设备等。
终端设备可以经无线接入网(radio access network,RAN)与一个或多个核心网进行通信,目前,终端设备可以是移动电话(或称为“蜂窝”电话)、具有移动终端的计算机、手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet  device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self-driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端,或智慧家庭(smart home)中的无线终端等。终端设备还可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,以及5G通信网络中的终端设备或者未来演进网络中的终端设备等。终端设备还可以是工业物联网设备。例如,终端设备为工业园区的园区监控设备。
在本申请实施例中,接入网设备是为终端设备提供无线通信功能的设备,也可以称为接入设备、(R)AN设备或网络设备等。接入网设备包括但不限于:5G通信系统中的下一代基站(next generation node base station,gNB)、LTE系统中的演进型基站(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(home evolved nodeB,或home node B,HNB)、基带单元(base band unit,BBU)、传输接收点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、小基站设备(pico)、移动交换中心,或者未来网络中的网络设备等。本申请对无线接入网设备的具体类型不作限定。采用不同无线接入技术的系统中,具备无线接入网设备功能的设备的名称可能会有所不同。
在本申请实施例中,核心网设备负责终端设备接入网络的接入控制、注册管理、业务管理、移动性管理等。本申请实施例中,核心网设备可以5G通信系统中的接入和移动性管理功能(access and mobility management function,AMF),或者未来网络中的核心网设备等。本申请对核心网设备的具体类型不作限定。在不同的通信系统中,核心网设备的名称可能会有所不同。
接入网设备和核心网设备可以是NPN网络中的专用设备。例如,在工业园区中建立NPN网络。接入网设备和核心网设备只用于园区范围内的通信。
NPN网络是第三代移动通信伙伴项目(3rd generation partnership project,3GPP)第五代无线通信(5th generation,5G)标准中正在讨论的一种网络,区别于传统蜂窝网络(cellular network),NPN网络允许某些具有特定权限的用户接入。NPN网络分为独立组网(standalone)和非独立组网(non-standalone)两种组网方式。本申请实施例适用于任意一种组网方式的NPN网络,具体本申请不作限定。
接入网设备可以为独立组网的NPN网络中的接入网设备或者为非独立组网的NPN网络中的接入网设备。核心网设备可以为独立组网的NPN网络中的核心网设备或者为非独立组网的NPN网络中的核心网设备。
请参阅图1,图1为本申请实施例终端设备通过外部认证的方式接入网络的一个示意图。在图1中,终端设备通过外部认证的方式接入网络。外部认证包括:终端设备拥有外部实体的证书,终端设备通过外部实体的证书(the credential owned by the external entity)接入网络,网络根据该外部实体的证书在外部实体上对终端设备进行认证 (authentication)。为了描述方便,在后文简称外部认证。
其中,外部实体是独立于终端设备所接入的网络的实体。即外部实体不属于终端设备接入的网络的接入网和核心网。
外部实体可以是另外一个网络中的实体,或者为一个独立的认证服务器。
具体的,外部实体可以包括另外一个网络的一个或多个实体。另外一个网络是与终端设备接入的网络不同的网络。另外一个网络的核心网与终端设备接入的网络的核心网相互独立。但是两个网络的核心网之间存在接口连接,用于信息交换。
外部实体或外部实体的拥有者可以称为归属服务商(home-service provider,H-SP)。若干个归属服务商可以形成一个归属服务商群组(H-SP group)。例如,外部实体108可以是苹果(apple)服务器,那么外部实体108的拥有者可以是苹果服务商。
在图1中,终端设备所接入的网络可以为公共陆地移动网(public land mobile network,PLMN),或者为NPN,具体本申请不做限定。而公共陆地移动网也可以称为公网,非公共网络也可以称为私网。
NPN网络的相关介绍请参阅前述,这里不再赘述。
PLMN网络是由政府或其所批准的经营者,为公众提供陆地移动通信业务目的而建立和经营的网络,主要是移动网络运营商(mobile network operator,MNO)为用户提供移动宽带接入服务的公共网络。本申请中所描述的PLMN,具体可为符合第三代合作伙伴项目(3rd generation partnership project,3GPP)标准要求的网络,简称3GPP网络。3GPP网络通常包括但不限于第二代移动通信(second generation)(简称2G网络),第三代移动通信(3rd generation)网络(简称3G网络),第四代移动通信(4th-generation,4G)网络(简称4G网络),第五代移动通信(5th-generation,5G)网络(简称5G网络),或未来第六代移动通信网络(简称6G网络)等。
上述图1所示的架构中,终端设备通过其拥有的外部实体的证书接入网络,网络根据该外部实体的证书在外部实体上对终端设备进行认证。这样用户的签约信息和认证信息等私密信息都保存在外部实体上,不会被网络获取,从而实现了对私密信息的保护和网络的中立。在工业场景或商业场景,都有保护私密信息的需求。
因此,非公共网络和公共网络可以具备外部认证的功能,以提高信息安全性。例如,非公共网络可以包括工业非公共网络或商业非公共网络。例如,公共网络可以包括联网公共网络或移动公共网络。
例如,一个工业园区内有多家工厂,各工厂有对应的认证服务器。园区建立一个NPN网络,并连接到各工厂部署的认证服务器。例如,某工厂员工使用终端设备接入该NPN网络后,通过该工厂的认证服务器进行认证。认证成功后,该终端设备再进行一些相应的业务通信等。
例如,终端设备为苹果设备,终端设备没有联通公共网络的签约信息。终端设备通过接入联通公共网络在苹果服务器上进行认证,认证通过后终端设备可以使用联通公共网络进行通信。
下面结合图2介绍本申请实施例终端设备接入的网络。
请参阅图2,图2为本申请实施例网络架构的一个示意图。在图2中,终端设备101请求接入的网络包括接入网和核心网。该网络与外部实体108连接。
接入网包括接入网设备102。需要说明的是,图2中仅示出一个接入网设备,实际应用中,该网络的接入网中可以包括一个或多个接入网设备。
核心网包括接入与移动性管理功能(access and mobility management function,AMF)103、统一数据管理(unified data management,UDM)104、策略控制管理(policy control function,PCF)105、会话管理功能(session management function,SMF)106和用户面功能(user plane function,UPF)107。
接入网设备102在接入网设备102的小区分别广播对应的外部认证指示。外部认证指示用于指示该接入网设备102的对应小区支持外部认证。
可选的,接入网设备102在接入网设备102的小区分别广播对应小区支持的归属服务商或归属服务商群组的标识。例如,接入网设备102包括小区1和小区2。小区1支持苹果服务商1的认证,小区2支持大众(volkswagen)服务商1的认证。那么,接入网设备102在小区1广播苹果服务商1的标识,在小区2广播大众服务商1的标识。
需要说明的是,接入网设备102的小区中每个小区支持的归属服务商或归属服务商群组可以是由服务商或运营商按照相应的策略确定。
终端设备101接收接入网设备102广播的外部认证信息。例如,接入网设备102的小区分别对应的外部认证指示。接入网设备102的小区支持的归属服务商或归属服务商群组的标识。然后,终端设备101根据该终端设备101所拥有的外部实体的证书选择从接入网设备102的小区中选择一个小区,并通过该外部实体的证书请求接入该小区。
AMF103负责终端设备接入网络的接入控制、注册管理、业务管理、移动性管理等。AMF103可以从接入网设备102获取终端设备101的外部实体的证书。然后,AMF103从核心网中选择合适的网元,并将该外部实体的证书发送给该网元。然后,该网元根据该外部实体的证书在外部实体108上对该终端设备101进行认证。
UDM104负责存储网络中签约用户的用户永久标识符(subscriber permanent identifier,SUPI)、安全上下文(security context)、签约数据等信息。上述网络的签约用户具体可为使用网络提供的业务的用户,例如使用中国电信的用户身份识别卡(subscriber identification module,SIM卡)的用户,或者使用中国移动的SIM卡的用户等。示例性的,签约用户的SUPI可为SIM卡的号码等。上述安全上下文可以为存储在本地终端设备(例如手机)上的数据(cookie)或者令牌(token)等。上述签约用户的签约数据可以为SIM卡的配套业务,例如手机SIM卡的流量套餐等。
PCF105用于向SMF106提供协议数据单元(protocol data unit,PDU)会话的策略。策略可以包括计费相关策略、QoS相关策略和授权相关策略等。
SMF106负责管理终端设备101的协议数据单元(protocol data unit,PDU)会话。PDU会话是一个用于传输PDU的通道,终端设备需要通过PDU会话与数据网络互相传输PDU。PDU会话可以由SMF106负责建立、维护和删除等。SMF106还用于会话管理(如会话建立、修改和释放等)、业务和会话连续性(service and session continuity,SSC)模式选择 以及漫游等会话相关的功能。
UPF107是网络与数据网络通信的网关。UPF107包括数据包路由和传输、包检测、业务用量上报、服务质量(quality of service,QoS)处理、合法监听、上行包检测、下行数据包存储等用户面相关的功能。
下面结合具体的实施例介绍本申请的技术方案。
请参阅图3,图3为本申请实施例通信方法的一个实施例示意图。在图3中,通信方法包括:
301、终端设备与接入网设备建立RRC连接。
终端设备向接入网设备发送RRC建立请求(RRC setup request)消息。然后,接入网设备向终端设备回复RRC建立(RRC setup)消息。终端设备建立终端设备与接入网设备之间的RRC连接。然后,终端设备向接入网设备反馈RRC建立完成(RRC setup complete)消息,以告知接入网设备RRC连接建立完成。
本实施例中,终端设备通过外部认证的方式接入网络。外部认证包括:终端设备拥有外部实体的证书,终端设备通过终端设备拥有的外部实体的证书接入网络,网络根据该外部实体的证书在外部实体上对终端设备进行认证。
其中,外部实体是独立于终端设备所接入的网络的实体。即外部实体不属于终端设备接入的网络的接入网和核心网。
外部实体可以是另外一个网络中的实体,或者为一个独立的认证服务器。
具体的,外部实体可以包括另外一个网络的一个或多个实体。另外一个网络是与终端设备接入的网络不同的网络。另外一个网络的核心网与终端设备接入的网络的核心网相互独立。但是两个网络的核心网之间存在接口连接,用于信息交换。
外部实体或外部实体的拥有者可以称为归属服务商。多个归属服务商可以形成一个归属服务商群组。
例如,如图1所示,外部实体108与终端设备101接入的网络连接,外部实体108独立于终端设备101接入的网络。例如,外部实体108可以是苹果服务器,那么外部实体108的拥有者可以是苹果服务商。
可选的,该苹果服务商可以是苹果服务商群组中的一个苹果服务商。每个苹果服务器有一个对应的标识,具体可以称为苹果服务商的标识或苹果服务商群组的标识。
一种可能的实现方式中,RRC建立请求消息中包括第一指示信息。第一指示信息用于指示使用终端设备拥有的外部实体的证书接入网络;或者第一指示信息用于指示终端设备通过外部认证的方式接入网络。
具体的,终端设备通过第一指示信息指示接入网设备:终端设备通过外部认证的方式接入网络。
需要说明的是,当步骤304中初始上下文建立请求消息包括第一信息和/或第二信息时,第一指示信息用于指示终端设备通过外部认证的方式接入网络。其中,第一信息用于指示终端设备限制于支持外部认证的小区中移动。
302、接入网设备向核心网设备发送初始UE消息(initial UE message)。相应的,核 心网设备接收来自接入网设备的初始UE消息。
本实施例中,终端设备通过外部认证的方式接入网络。一种可能的实现方式中,接入网设备通过上述步骤301中的RRC建立请求消息包括的第一指示信息确定终端设备通过外部认证的方式接入网络。接入网设备向核心网设备发送初始UE消息。初始UE消息包括第一指示信息,以指示核心网设备该终端设备通过外部认证的方式接入网络。
303、核心网设备对终端设备进行外部认证。
具体的,核心网设备接收来自终端设备的外部实体的证书。核心网设备选择网络中对应的网元。例如,SMF、UDM、或鉴权服务功能(authentication server function,AUSF)。然后,网元根据终端设备拥有的外部实体的证书在外部实体上对该终端设备进行认证。也就是网元根据外部实体的证书请求外部实体对终端设备进行认证。然后,外部实体根据该证书对该终端设备进行认证,从而实现对终端设备的外部认证。
304、核心网设备向接入网设备发送初始上下文建立请求(initial context setup request)消息。相应的,接入网设备接收来自核心网设备的初始上下文建立请求消息。
本实施例中,初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息。下面先介绍第一信息。
第一种可能的实现方式,第一信息用于指示终端设备限制(restricted)于支持外部认证的小区中移动;或者第一信息用于指示终端设备仅(only)在支持外部认证的小区中移动。
在该可能的实现方式中,第一信息指示终端设备只能在支持外部认证的小区中移动。那么接入网设备可以限制终端设备只能在支持外部认证的小区中移动。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证的问题。二次认证是指终端设备再次进行外部认证。
例如,终端设备移动至不支持外部认证的小区后,终端设备发起业务请求时需要二次认证。由于终端设备所移动至的小区不支持外部认证而导致该终端设备的二次认证失败,那么终端设备将无法进行相应的业务。
需要说明的是,在该可能的实现方式中,可选的,如果初始上下文建立请求消息包括第一信息,表示终端设备限制于支持外部认证的小区中移动。如果初始上下文建立请求消息不包括第一信息,表示终端设备可以在不支持外部认证的小区或不支持外部认证的小区中移动。本实施例中,终端设备是通过外部认证的方式接入网络。因此本实施例中,初始上下文建立请求消息包括第一信息。
第二种可能的实现方式中,第一信息用于指示终端设备是/否限制于支持外部认证的小区中移动,或者第一信息用于指示终端设备是/否仅在支持外部认证的小区中移动。
例如,第一信息为第二指示信息。第二指示信息的取值为“真”(true)或者“限制”(restricted)时,表示该终端设备只能在支持外部认证的小区中移动。第二指示信息的取值为“假”(false)或者为“非限制”(not-restricted)时,表示该终端设备可以在支持外部认证的小区或不支持外部认证的小区中移动。
在该可能的实现方式中,本实施例中,终端设备是通过外部认证的方式接入网络。因 此,本实施例中,第一信息指示的是:终端设备限制于支持外部认证的小区中移动。
上述第一信息可以为指示信息,也可以是其他形式的信息,具体本申请不做限定。
本实施例中,第二信息包括归属服务商或归属服务商群组的信息。
其中,第二信息用于指示终端设备仅在支持归属服务商或归属服务商群组的小区移动;或者第二信息用于指示终端设备限制于支持归属服务商或归属服务商群组的小区移动。也就是说,终端设备只能在支持归属服务商或归属服务商群组的小区中移动。
例如,第二信息包括一个或多个苹果服务商的标识。一个或多个苹果服务商中每个苹果服务商有一个对应的外部实体。终端设备在支持该一个或多个苹果服务商的小区中移动。
具体的,由上述步骤301至步骤303可知,终端设备通过外部认证的方式接入网络。在步骤303中核心网设备选择对应的网元,并由该网元向外部实体请求对该终端设备进行认证。该外部实体或该外部实体的拥有者称为第一归属服务商。可选的,该第一归属服务商为第一归属服务商群组中的一个归属服务商。
可选的,第二信息的归属服务商包括:对终端设备进行外部认证的第一归属服务商,和/或,与该第一归属服务商关联的第二归属服务商。
第二归属服务商的一个例子为:终端设备请求接入的网络连接的与第一归属服务商同一类型的归属服务商。
例如,第一归属服务商为苹果服务商1,终端设备请求接入的网络还连接苹果服务商2和苹果服务商3(也可以称为该网络还连接苹果服务商2的外部实体和苹果服务商3的外部实体)。那么第二归属服务商包括苹果服务商2和苹果服务商3。
第二归属服务商的另一个例子为:终端设备请求接入的网络连接与第一归属服务商之间存在签约协议的归属服务商。
例如,第一归属服务商为大众服务商。终端设备请求接入的网络还连接苹果服务商的外部实体。大众服务商和苹果服务商之间存在签约协议。具体为:终端设备只要在大众服务商和苹果服务商中的一个服务商完成认证,就相当于终端设备在大众服务商和苹果服务商完成认证。那么,第二归属服务商包括苹果服务商。
可选的,第二信息包括的归属服务商群组包括:第一归属服务商群组,和/或,与该第一归属服务商群组关联的第二归属服务商群组。
第二归属服务商群组的一个例子为:终端设备请求接入的网络中与第一归属服务商群组包括的第一归属服务商同一类型的归属服务商群组。
例如,第一归属服务商为苹果服务商1,第一归属服务商群组包括苹果服务商1。终端设备请求接入的网络还连接苹果服务商2的外部实体和苹果服务商3的外部实体。苹果服务商2和苹果服务商3包含于第二归属服务商群组中。那么第二归属服务商群组可以理解为与第一归属服务商群组关联的归属服务商群组。
第二归属服务商群组的另一个例子为:终端设备请求接入的网络中与第一归属服务商群组包括的第一归属服务商之间存在签约协议的归属服务商。
例如,第一归属服务商为苹果服务商。第一归属服务商群组包括苹果服务商。终端设备请求接入的网络还连接大众服务商的外部实体。大众服务商和苹果服务商之间存在签约 协议。具体为:终端设备只要在大众服务商和苹果服务商中的一个服务商完成认证,就相当于终端设备在大众服务商和苹果服务商完成认证。苹果服务商包含于第二归属服务商群组中。那么,第二归属服务商群组可以理解为与第一归属服务商群组关联的归属服务商群组。
接入网设备获取到归属服务商或归属服务商群组的信息之后,接入网设备可以确定对终端设备进行外部认证的第一归属服务商或第一归属服务商群组。这样,接入网设备可以为终端设备选择支持第一归属服务商或第一归属服务商群组的小区。避免终端设备移动至不支持第一归属服务商或第一归属服务商群组的小区。
其次,核心网设备还可以提供与第一归属服务商关联的第二归属服务商信息或与第一归属服务商群组关联的第二归属服务商群组的信息。那么可用于对终端设备进行认证的归属服务商或归属服务商群组有多个,那么终端设备可接入的小区数量增加,增大了终端设备的移动范围。增大了终端设备选择到合适的小区的概率,间接提高终端设备通过外部认证的方式接入网络的成功率。
可选的,归属服务商或归属服务商群组的信息包括归属服务商或归属服务商群组的标识。
具体的,第二信息包括一个或多个归属服务商或归属服务商群组的标识。第二信息具体可以以列表的形式表示,或者其他形式表示,具体本申请不做限定。
例如,第二信息包括{归属服务商1的标识,归属服务商2的标识,归属服务商3的标识}。或者,第二信息包括{归属服务商群组1的标识,归属服务商群组2的标识,归属服务商群组3的标识}。
本实施例中,可选的,归属服务商或归属服务商群组的标识可以位于SNPN ID。也就是对SNPN ID中的部分比特位进行取值。部分比特位用于表示归属服务商或归属服务商群组。
本实施例中,可选的,终端设备在某个小区移动包括以下任一项可能的实现方式:终端设备切换至该小区;或者,终端设备在该小区进行RRC恢复;或者,终端设备双连接至该小区。具体终端设备的移动场景可以参阅后文图4、图5、图6以及图7所示的实施例的介绍。
一种可能的实现方式中,初始上下文建立请求消息包括移动性限制列表(mobility restriction list)。第一信息和/或第二信息位于该移动性限制列表中。
在该实现方式中,采用初始上下文建立请求消息中的移动性限制列表携带第一信息和/或第二信息,即提供了一种具体的携带方式。其次,移动性限制列表通常是用来指示终端设备的网络行为的一些限制条件。因此,核心网设备通过移动性限制列表向接入网设备下发第一信息和/或第二信息。无需通过其他指示字段或指示信令指示第一信息和第二信息为终端设备的关于外部认证的相关限制信息,节省信令开销或比特开销。
并且,接入网设备可以根据移动性限制列表确定第一信息和/或第二信息。接入网设备可以根据第一信息和/或第二信息为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区而 无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,从而保障通信正常进行。
305、接入网设备向核心网设备发送初始上下文建立响应(initial context setup response)消息。相应的,核心网设备接收来自接入网设备的初始上下文建立响应消息。
上述步骤304中,接入网设备接收到核心网设备的初始上下文建立请求消息之后,接入网设备建立终端设备的上下文。该终端设备的上下文包括第一信息和/或第二信息。然后,接入网设备向核心网设备发送初始上下文建立响应消息。
在终端设备的初始上下文建立过程中,核心网设备向接入网设备提供终端设备的移动限制列表。对于通过外部认证的方式接入NPN网络的终端设备,移动限制列表用于限制终端设备在支持外部认证小区中移动,或者用于限制支持归属服务商或归属服务商群组的小区中移动。接入网设备需要为终端设备选择支持外部认证的小区或支持归属服务商或归属服务商群组的小区。
例如,在终端设备的切换过程中,接入网设备根据第一信息和/或第二信息选择支持外部认证的小区或支持归属服务商或归属服务商群组的小区。或者,在终端设备的双连接过程中,接入网设备根据第一信息和/或第二信息为终端设备选择支持外部认证的小区或支持归属服务商或归属服务商群组的小区。避免终端设备切换或双连接至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区而导致终端设备无法完成二次认证。避免终端设备无法进行相应的业务,从而保障正常通信进行。
可选的,本实施例还包括步骤306和步骤307。步骤306和步骤307在步骤305之后执行。
306、核心网设备向终端设备发送第二信息。相应的,终端设备接收来自核心网设备的第二信息。
第二信息的相关介绍请参阅前述步骤304中的相关介绍,这里不再赘述。
307、终端设备选择在支持第二信息包括的归属服务商或归属服务商群组的小区中移动或驻留。
具体的,终端设备接收来自核心网设备的第二信息之后,终端设备在移动或驻留时,终端设备可以选择在支持第二信息包括的归属服务商或归属服务商群组的小区移动或驻留。这样可以避免终端设备移动或驻留到不支持外部认证的小区。
本申请实施例中,在终端设备的初始接入过程中,接入网设备从核心网设备获取第一信息和/或第二信息。第一信息用于指示终端设备限制于支持外部认证的小区移动;第二信息包括归属服务商或归属服务商群组的信息。接入网设备获取这些信息后,可以参考这些信息为终端设备选择支持外部认证的小区,或为终端设备选择支持归属服务商或归属服务商群组的小区。避免终端设备移动至不支持外部认证的小区而终端设备无法完成二次认证,以避免终端设备无法进行相应的业务,从而保障通信正常进行。
例如,在终端设备的切换过程中,接入网设备可以根据第一信息和/或第二信息为终端设备选择支持外部认证的小区或支持第二信息包括的归属服务商或归属服务商群组的小区,再向网络发起切换请求。
进一步的,接入网设备可以向目标接入网设备发送第一信息和/或第二信息,用于目标接入网设备进一步接入控制。支持外部认证的小区或支持归属服务商或归属服务商群组的小区为目标接入网设备下的小区。并且,目标接入网设备还可以在后续的终端设备移动过程中向终端设备所移动的接入网设备传递第一信息和/或第二信息,以用于限制终端设备移动的小区。避免终端设备切换至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区导致终端设备无法完成二次认证。避免终端设备无法进行相应的业务。从而保障正常通信进行。
例如,在终端设备的RRC恢复过程中,接入网设备可以向目标接入网设备传递第一信息和/或第二信息。目标接入网设备为终端设备发起RRC恢复请求所在的小区的接入网设备。这样目标接入网设备可以根据第一信息和/或第二信息判断是否允许终端设备接入终端设备发起RRC恢复请求所在的小区。避免终端设备切换至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区导致终端设备无法完成二次认证,避免终端设备无法进行相应的业务。从而保障正常通信进行。
例如,在终端设备的双连接过程中,接入网设备根据第一信息和/或第二信息为终端设备选择支持外部认证的小区或支持归属服务商或归属服务商群组的小区,并向网络发起双连接请求。
进一步的,接入网设备可以向目标接入网设备传递第一信息和/或第二信息,用于目标接入网设备进一步接入控制。支持外部认证的小区或支持归属服务商或归属服务商群组的小区为目标接入网设备下的小区。并且,目标接入网设备还可以在后续的终端设备移动过程中向终端设备所移动的接入网设备传递第一信息和/或第二信息,以用于限制终端设备移动的小区。避免终端设备切换至不支持外部认证的小区或不支持归属服务商或归属服务商群组的小区导致终端设备无法完成二次认证。避免终端设备无法进行相应的业务,从而保障正常通信进行。
下面结合图4至图7所示的实施例介绍在终端设备的一些移动场景下应用本申请实施例提供的通信方法的技术方案。
请参阅图4,图4为本申请实施例通信方法的另一个实施例示意图。在图4中,通信方法包括:
401、源接入网设备选择目标小区。
其中,目标小区为目标接入网设备的小区。也就是目标小区为目标接入网设备管理的小区。
例如,源接入网设备接收来自终端设备测量的多个小区的信号质量。源接入网设备根据该多个小区的信号质量选择目标小区。例如,源接入网设备选择信号质量最佳的小区作为目标小区。
需要说明的是,本实施例中,终端设备通过外部认证的方式接入源接入网设备。具体的接入过程可以参阅前述图3所示的实施例的相关介绍。步骤401为可选步骤。
可选的,步骤401中,源接入网设备可以根据第一信息和/或第二信息选择目标小区。例如,目标小区为支持外部认证的小区,或者,目标小区为支持第二信息包括的归属服务 商或归属服务商群组的小区。
需要说明的是,源接入网设备可以是通过上述图3所示的实施例中终端设备的初始接入过程获取到第一信息和/或第二信息。或者,源接入网设备也可以是在终端设备的切换过程获取到第一信息和/或第二信息,具体本申请不做限定。也就是说在本实施例之前,终端设备切换至源接入网设备,源接入网设备通过终端设备的切换过程获取第一信息和/或第二信息。
402、源接入网设备向目标接入网设备发送切换请求(handover request)消息。相应的,目标接入网设备接收来自源接入网设备的切换请求消息。
切换请求消息包括目标小区的标识。切换请求消息用于请求将终端设备切换至目标小区。
本实施例中,切换请求消息包括以下至少一项:第一信息、或第二信息。
关于第一信息和第二信息的相关介绍请参阅前述图3所示的实施例步骤304中的相关介绍,这里不再赘述。
需要说明的是,第一信息用于指示终端设备限制于支持外部认证的小区中移动。如果切换请求消息包括第一信息,则表示终端设备只能在支持外部认证的小区中移动。如果切换请求消息不包括第一信息,则表示终端设备可以在不支持外部认证的小区中移动。本实施例中,终端设备可以通过外部认证的方式接入源接入网设备。
403、目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区。
本实施例中,切换请求消息包括第一信息和/或第二信息。目标接入网设备根据第一信息和/或第二信息进行接入控制,确定是否允许终端设备切换至目标小区。
下面结合第一信息和/或第二信息介绍目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区的一种可能的实现方式。对于其他确定方式仍适用本申请的技术方案。下述实现方式并不属于对本申请的限定。
1、若切换请求消息包括第一信息而不包括第二信息,且目标小区支持外部认证,则目标接入网设备允许终端设备切换至目标小区。
2、若切换请求消息包括第一信息而不包括第二信息,且目标小区不支持外部认证,则目标接入网设备不允许终端设备切换至目标小区。
3、若切换请求消息包括第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持的归属服务商或归属服务商群组的标识包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则目标接入网设备允许终端设备切换至目标小区。
例如,目标小区支持苹果服务商1和苹果服务商2,那么目标小区支持的归属服务商的标识包括苹果服务商1的标识和苹果服务商2的标识。第二信息包括苹果服务商1的标识和苹果服务商3的标识。那么,目标接入网设备确定该目标小区支持苹果服务商1的认证。因此,目标接入网设备允许终端设备切换至目标小区。
在目标小区中,终端设备发起业务请求时,若终端设备需要在网络进行二次认证。那么,终端设备可以通过苹果服务商1的证书接入网络。网络通过该苹果服务商1的证书到苹果服务商1的外部实体上对终端设备进行认证,以保障终端设备的二次保证成功。这样 终端设备可以进行相应的业务。
4、若切换请求消息包括第二信息,或切换请求消息包括第一信息和第二信息,且目标小区支持的归属服务商或归属服务商群组的标识不包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,则目标接入网设备不允许终端设备切换至目标小区。
例如,目标小区支持苹果服务商1和苹果服务商2。那么目标小区支持的归属服务商的标识包括苹果服务商1的标识和苹果服务商2的标识。第二信息包括苹果服务商3的标识和大众服务商1的标识。那么,目标接入网设备确定该目标小区支持的服务商的标识不包括第二信息中的至少一个归属服务商的标识。那么,目标接入网设备不允许终端设备切换至目标小区,以避免终端设备移动至目标小区。
在上述步骤403中,若目标接入网设备允许终端设备切换至目标小区,则执行步骤404a;若目标接入网设备不允许终端设备切换至目标小区,则执行步骤404b。
404a、若目标接入网设备允许终端设备切换至目标小区,目标接入网设备向源接入网设备发送切换请求确认(handover request acknowledge)消息。相应的,若目标接入网设备允许终端设备切换至目标小区,源接入网设备接收来自目标接入网设备的切换请求消息。
如果目标接入网设备允许终端设备切换至目标小区,则目标接入网设备向源接入网设备发送切换请求确认消息。那么在该实现方式下,可选的,本实施例还包括步骤404c。步骤404c可以在步骤404a之后执行。
404c、源接入网设备向终端设备发送切换指示。相应的,终端设备接收来自源接入网设备的切换指示。
其中,切换指示用于指示终端设备切换至目标小区。
本实施例中,在终端设备的切换过程中,源接入网设备向目标接入网设备发送第一信息和/或第二信息。这样目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。如果目标接入网设备允许终端设备切换至目标小区,则源接入网设备向终端设备发送切换指示,以指示终端设备切换至目标小区。从而限制终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。
404b、若目标接入网设备不允许终端设备切换至目标小区,目标接入网设备向源接入网设备发送切换准备失败(handover preparation failure)消息。相应的,若目标接入网设备不允许终端设备切换至目标小区,源接入网设备接收来自目标接入网设备的切换准备失败消息。
如果目标接入网设备不允许终端设备切换至目标小区,则目标接入网设备向源接入网设备发送切换准备失败消息。那么源接入网设备可以重新为终端设备选择其他小区,并向管理该小区的接入网设备发起切换请求。
可选的,切换准备失败消息包括失败原因(cause)。
失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
具体的,切换准备失败消息包括原因信元,在原因信元中包括该失败原因。
例如,如果由于目标小区不支持外部认证导致切换失败,那么失败原因可以包括目标小区不支持外部认证,或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
例如,如果由于目标小区支持的归属服务商或归属服务商群组的标识不包括第二信息包括的至少一个归属服务商或归属服务商群组的标识,那么失败原因可以包括目标小区不支持归属服务商或归属服务商群组的外部认证。
可选的,切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
具体的,目标小区支持的归属服务商或归属服务商群组的信息包括:目标小区支持的归属服务商或归属服务商群组的标识。目标小区支持的归属服务商可以为一个或多个归属上商,目标小区支持的归属服务商群组可以为一个或多个归属服务商群组。
例如,目标小区支持苹果服务商1和苹果服务商2的认证。那么切换准备失败消息包括苹果服务商1的标识和苹果服务商2的标识。
例如,目标小区支持苹果服务商1和大众服务商1的认证。那么切换准备失败消息包括苹果服务商1的标识和大众服务商1的标识。
本实施例中,在终端设备的切换过程中,源接入网设备向目标接入网设备发送第一信息和/或第二信息。这样目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。如果目标接入网设备不允许终端设备切换至目标小区,目标接入网设备向源接入网设备发送切换准备失败消息。并且,切换准备失败消息包括失败原因。这样源接入网设备可以结合失败原因确定切换失败的原因,并重新为终端设备选择小区请求切换。从而避免终端设备移动至不支持外部认证的小区。
需要说明的是,源接入网设备在接收到步骤404b的切换准备失败消息之后,源接入网设备可以修改或更新源接入网设备上保存的关于目标小区的信息,以避免源接入网设备误将终端设备切换至目标小区而导致终端设备无法完成二次认证。避免终端设备无法进行相应的业务,保障正常通信进行。例如,源接入网设备更新目标小区支持的归属服务商或归属服务商群组的标识。
上述图4所示的实施例示出源接入网设备通过源接入网设备与目标接入网设备之间的接口将终端设备切换至目标接入网设备的切换过程。在该切换过程中,源接入网设备向目标接入网设备发送第一信息和/或第二信息。这样目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。从而使得终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。从而避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证。避免终端设备无法进行相应的业务,保障正常通信进行。
请参阅图5,图5为本申请实施例通信方法的另一个实施例示意图。在图5中,通信方法包括:
501、源接入网设备为终端设备选择目标小区。
步骤501与前述图4所示的实施例中的步骤401类似,具体请参阅前述图4所示的实施例中的步骤401的相关介绍,这里不再赘述。步骤501为可选步骤。
需要说明的是,本实施例中,终端设备通过外部认证的方式接入源接入网设备。具体的接入过程可以参阅前述图3所示的实施例的相关介绍。
502、源接入网设备向核心网设备发送切换需求(handover required)消息。相应的,核心网设备接收来自源接入网设备的切换需求消息。
切换需求消息包括目标小区的标识。切换需求消息用于请求将终端设备切换至目标小区。本实施例中,核心网设备可以为AMF。
503、核心网设备向目标接入网设备发送切换请求(handover request)消息。相应的,目标接入网设备接收来自核心网设备的切换请求消息。
其中,切换请求消息包括目标小区的标识。切换请求消息用于请求将终端设备切换至目标小区。目标小区为目标接入网设备下的小区。即目标小区为目标接入网设备管理的小区。
本实施例中,切换请求消息包括以下至少一项:第一信息、或第二信息。
关于第一信息和第二信息的相关介绍请参阅前述图3所示的实施例中的步骤304的相关介绍,这里不再赘述。
需要说明的是,第一信息用于指示终端设备限制于支持外部认证的小区中移动。如果切换请求消息包括第一信息,则表示终端设备只能在支持外部认证的小区中移动。如果切换请求消息不包括第一信息,则表示终端设备可以在不支持外部认证的小区中移动。本实施例中,终端设备通过外部认证的方式接入源接入网设备。因此,切换请求消息包括第一信息。
504、目标接入网设备进行接入控制,确定是否允许终端设备切换至目标小区。
步骤504与前述图4所示的实施例中步骤403类似,具体请参阅前述图4所示的实施例中步骤403的相关介绍,这里不再赘述。
在上述步骤504中,若目标接入网设备允许终端设备切换至目标小区,则执行步骤505a和步骤506a;若目标接入网设备不允许终端设备切换至目标小区,则执行步骤505b和506b。
505a、若目标接入网设备允许终端设备切换至目标小区,则目标接入网设备向核心网设备发送切换请求确认(handoverrequest acknowledge)消息。相应的,核心网设备接收来自目标接入网设备的切换请求确认消息。
506a、核心网设备向源接入网设备发送切换命令(handover command)。相应的,源接入网设备接收来自核心网设备的切换命令。
上述步骤505a中,目标接入网设备向核心网设备发送切换请求确认消息,以指示目标接入网设备允许终端设备切换至目标小区。那么,核心网设备向源接入网设备发起切换命令。
那么在该实现方式下,本实施例还包括步骤506c。步骤506c在步骤506a之后执行。
506c、源接入网设备向终端设备发送切换指示。相应的,终端设备接收来自源接入网设备的切换指示。
其中,切换指示用于指示终端设备切换至目标小区。
具体的,终端设备接收到切换指示之后,终端设备切换至目标小区。
本实施例中,在终端设备的切换过程中,核心网设备向目标接入网设备发送第一信息和/或第二信息。这样目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区。如果目标接入网设备允许终端设备切换至目标小区,源接入网设备指示终端设备切换至目标小区。从而限制终端设备在支持外部认证的小区或在支持归属服务商或归属服务商群组的小区移动。避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证。
505b、目标接入网设备向核心网设备发送切换失败(handover failure)消息。相应的,核心网设备接收来自目标接入网设备的切换失败消息。
其中,切换失败消息包括失败原因(cause)。
可选的,失败原因包括以下任一项:目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组的外部认证、或者拒绝终端设备使用外部实体所拥有的证书接入目标小区所属的网络。
关于失败原因的相关介绍与前述图4所示的实施例中的步骤404b中的失败原因类似,具体可以参阅前述图4所示的实施例中的步骤404b的相关介绍,这里不再赘述。
可选的,切换失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
关于目标小区支持的归属服务商或归属服务商群组的信息的相关介绍与前述图4所示的实施例中步骤404b的相关介绍类似,具体请参前述图4所示的实施例中步骤404b的相关介绍,这里不再赘述。
506b、核心网设备向源接入网设备发送切换准备失败(handover preparation failure)消息。相应的,源接入网设备接收来自核心网设备的切换准备失败消息。
其中,切换准备失败消息包括失败原因。
失败原因与前述图4所示的实施例中的步骤404b中的失败原因类似,具体可以参阅前述图4所示的实施例中的步骤404b的相关介绍,这里不再赘述。
可选的,切换准备失败消息还包括目标小区支持的归属服务商或归属服务商群组的信息。
关于目标小区支持的归属服务商或归属服务商群组的信息的相关介绍与前述图4所示的实施例中步骤405的相关介绍类似,具体请参前述图4所示的实施例中步骤405的相关介绍,这里不再赘述。
上述步骤505b中,目标接入网设备向核心网设备发送切换失败消息。切换失败消息用于指示目标接入网设备不允许终端设备切换至目标小区。核心网设备可以向源接入网设备发送切换准备失败消息,以指示目标接入网设备不允许终端设备切换至目标小区。这样源接入网设备可以重新为终端设备选择其他小区,并向网络请求将终端设备切换至该其他小区。
需要说明的是,源接入网设备在接收到步骤506b的切换准备失败消息之后,源接入网设备可以修改或更新源接入网设备上保存的关于目标小区的信息,以避免源接入网设备将 终端设备误切换至目标小区而导致终端设备无法完成二次认证。避免终端设备无法进行相应的业务,保障正常通信进行。例如,源接入网设备更新目标小区支持的归属服务商或归属服务商群组的标识。
上述图5所示的实施例示出源接入网设备基于核心网设备与目标接入网设备之间的NG接口请求将终端设备切换至目标接入网设备的切换过程。在该切换过程中,核心网设备向目标接入网设备发送切换请求消息。该切换请求消息包括第一信息和/或第二信息。目标接入网设备可以根据第一信息和/或第二信息可以确定是否允许终端设备切换至目标小区,以限制终端设备只能在支持外部认证的小区中移动。从而避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证的问题。避免终端设备无法进行相应的业务,保障正常通信进行。
请参阅图6,图6为本申请实施例通信方法的另一个实施例示意图。在图6中,通信方法包括:
601、终端设备向第一接入网设备发送RRC恢复请求(RRC resume request)消息。相应的,第一接入网设备接收来自终端设备的RRC恢复请求消息。
具体的,终端设备处于非激活(inactive)态。终端设备选择小区,并在该小区向第一接入网设备发起RRC恢复请求。该小区为第一接入网设备下的小区,即第一接入网设备为管理该小区的接入网设备。后文将该小区称为终端设备发起RRC恢复请求所在的小区。
其中,RRC恢复请求消息包括源接入网设备为终端设备分配的标识。例如,非激活态无线网络临时标识(inactive radio network temporary identifier,I-RNTI)。
源接入网设备为最近为终端设备服务的接入网设备。源接入网设备中保存有终端设备的上下文。源接入网设备与AMF之间有终端设备关联的NG连接。源接入网设备可以称为终端设备的最近服务接入网设备(last serving RAN)。
需要说明的是,本实施例中,终端设备通过外部认证的方式接入源接入网设备。具体的接入过程可以参阅前述图3所示的实施例的相关介绍。
602、第一接入网设备向源接入网设备发送提取UE上下文请求(retrieve UE context request)消息。相应的,源接入网设备接收来自核心网设备的提取UE上下文请求消息。
提取上下文请求消息包括终端设备发起RRC恢复请求所在的小区的标识。提取上下文请求消息用于向源接入网设备请求终端设备的上下文。
第一接入网设备根据源接入网设备为终端设备分配的标识确定源接入网设备。具体的,源接入网设备为终端设备分配的标识为I-RNTI。I-RNTI包括源接入网设备的标识。第一接入网设备根据I-RNTI可以识别源接入网设备的标识。
源接入网设备为最近为终端设备服务的接入网设备。源接入网设备中保存有终端设备的上下文。第一接入网设备向源接入网设备发送提取上下文请求消息,以向源接入网设备请求终端设备的上下文。
603、源接入网设备根据第一信息和/或第二信息确定是否允许第一接入网设备提取终端设备的上下文。
具体的,源接入网设备为最近服务接入网设备。源接入网设备上保存有终端设备的上 下文。终端设备的上下文包括第一信息和/或第二信息。源接入网设备可以从终端设备的上下文获取第一信息和/或第二信息。然后,源接入网设备根据第一信息和/或第二信息确定是否允许第一接入网设备提取终端设备的上下文。
由前述图3所示的实施例中可知,源接入网设备可以是在终端设备的初始接入过程中获取到该第一信息和/或第二信息。或者,由前述图4或图5所示的实施例可知,源接入网设备也可以是在终端设备的切换过程中获取终端设备的上下文,该终端设备的上下文包括第一信息和/或第二信息,具体本申请不做限定。也就是说在本实施例之前,终端设备切换至源接入网设备,源接入网设备通过终端设备的切换过程获取第一信息和/或第二信息。
源接入网设备根据第一信息和/或第二信息确定是否允许第一接入网设备提取终端设备的上下文的过程与步骤603与前述图4所示的实施例中步骤403类似,具体可以参阅前述图4所示的实施例中步骤403的相关介绍,这里不再赘述。不同的地方还在于,上述步骤603中源接入网设备从该终端设备的上下文中获取第一信息和/或第二信息。而步骤401是从切换请求消息获取第一信息和/或第二信息。
若源接入网设备允许第一接入网设备提取终端设备的上下文,则执行步骤604a和步骤605a;若源接入网设备不允许第一接入网设备提取终端设备的上下文,则执行步骤604b和步骤605b。
604a、源接入网设备向第一接入网设备发送提取UE上下文响应(retrieve UE context response)消息。相应的,第一接入网设备接收来自源接入网设备的提取上下文响应消息。
其中,提取UE上下文响应消息用于指示源接入网设备允许第一接入网设备提取终端设备的上下文。提取UE上下文响应消息包括以下任一项:第一信息、或第二信息。
关于第一信息和第二信息的相关介绍请参阅前述图3所示的实施例的相关介绍,这里不再赘述。
605a、第一接入网设备向终端设备发送RRC恢复(RRC resume)消息。
如果源接入网设备允许第一接入网设备提取终端设备的上下文,那么源接入网设备向第一接入网设备发送提取UE上下文响应消息。那么第一接入网设备可以向终端设备发送RRC恢复消息,以指示终端设备RRC恢复请求成功。实现限制终端设备在支持外部认证的小区移动,避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证。
并且,提取UE上下文响应消息包括第一信息和/或第二信息。这样第一接入网设备可以获取关于终端设备的外部认证的相关信息,以便于后续第一接入网设备限制终端设备移动的小区。避免终端设备移动至不支持外部认证的小区而导致终端设备无法完成二次认证,避免终端设备无法进行相应的业务。
604b、源接入网设备向第一接入网设备发送提取UE上下文失败(retrieve UE context failure)消息。相应的,第一接入网设备接收来自源接入网设备的提取UE上下文失败消息。
提取UE上下文失败消息包括失败原因。可选的,失败原因包括:外部认证信息不匹配。
示例性的,外部认证信息不匹配包括以下任一种情况:
1、终端设备发起RRC恢复请求所在的小区不支持外部认证。第一信息指示终端设备仅 在支持外部认证的小区中移动。
2、终端设备发起RRC恢复请求所在的小区支持外部认证。第一信息指示终端设备仅在支持外部认证的小区中移动。终端设备发起RRC恢复所在的小区支持的归属服务商或归属服务商群组的标识不包括第二信息包括的至少一个归属服务商或归属服务商群组的标识。
例如,终端设备发起RRC恢复请求所在的小区支持苹果服务商1和大众服务商1的认证。第二信息包括苹果服务商2的标识和大众服务商2的标识。源接入网设备可以确定终端设备发起RRC恢复请求所在的小区的外部认证信息与第二信息不匹配。
605b、第一接入网设备向终端设备发送RRC建立(RRC setup)消息。
如果源接入网设备不允许第一接入网设备提取终端设备的上下文,那么源接入网设备向第一接入网设备发送提取UE上下文失败消息。那么第一接入网设备可以向终端设备发送RRC建立消息,以指示终端设备建立RRC连接。从而避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证。
上述图6所示的实施例示出了终端设备的RRC恢复过程。在终端设备的RRC恢复过程中,源接入网设备根据终端设备的上下文中的第一信息和/或第二信息确定是否允许第一接入网设备提取终端设备的上下文。从而限制终端设备在支持外部认证的小区或支持归属服务商或归属服务商群组的小区中移动。避免终端设备移动至不支持外部认证的小区而无法完成终端设备的二次认证的问题。进一步避免终端设备无法进行相应的业务,保障正常通信进行。
请参阅图7,图7为本申请实施例通信方法的另一个实施例示意图。在图7中,通信方法包括:
701、第一接入网设备向第二接入网设备发送辅节点新增请求(s-node addition request)消息。相应的,第二接入网设备接收来自第一接入网设备的辅节点新增请求消息。
其中,辅节点新增请求消息包括以下至少一项:第一信息、或第二信息。
关于第一信息和第二信息的相关介绍请参阅前述图3所示的实施例中步骤304的相关介绍,这里不再赘述。
本实施例中,终端设备通过外部认证的方式接入第一接入网设备。具体的接入过程可以参阅前述图3所示的实施例的相关介绍。
当终端设备进行双连接时,第一接入网设备可以向第二接入网设备发送辅节点新增请求消息。辅节点新增请求消息包括终端设备请求双连接的目标小区的标识。
其中,目标小区为第二接入网设备下的小区。即目标小区为第二接入网设备管理的小区。第一接入网设备可以理解为终端设备的主接入网设备,第二接入网设备可以理解为终端设备请求双连接的辅接入网设备。
可选的,本实施例还包括步骤701a。步骤701a在步骤701之前执行。
701a、第一接入网设备选择目标小区。
步骤701a与前述图4所示的实施例中步骤401类似,具体可以参阅前述图4所示的实施例中的步骤401相关介绍,具体此处不再赘述。
702、第二接入网设备进行接入控制,确定是否允许终端设备双连接至目标小区。
辅节点新增请求消息包括至少以下任一项:第一信息、或第二信息。第二接入网设备根据第一信息和/或第二信息确定是否允许终端设备双连接至目标小区。
第二接入网设备根据第一信息和/或第二信息进行接入控制,确定是否允许终端设备双连接至目标小区的过程与前述图4所示的实施例中步骤403类似,具体可以参阅前述图4所示的实施例中步骤403的相关介绍,这里不再赘述。
703a、若第二接入网设备允许终端设备双连接至目标小区,第二接入网设备向第一接入网设备发送辅节点新增请求确认(s-node addition request acknowledge)消息。相应的,若第二接入网设备允许终端设备双连接至目标小区,第一接入网设备接收来自第二接入网设备的辅节点新增请求确认消息。
如果第二接入网设备允许终端设备双连接至目标小区,即第二接入网设备允许将第二接入网设备新增为终端设备的辅接入网设备,第二接入网设备向第一接入网设备发送辅节点新增请求确认消息。辅节点新增请求确认消息用于指示允许终端设备双连接至目标小区,或用于指示允许将第二接入网设备新增为终端设备的辅接入网设备。那么第一接入网设备可以向终端设备发起双连接指示,以指示终端设备双连接至目标小区。
703b、若第二接入网设备不允许终端设备双连接至目标小区,第二接入网设备向第一接入网设备辅节点新增请求拒绝(s-node addition request reject)消息。相应的,若第二接入网设备不允许终端设备双连接至目标小区,则第一接入网设备接收来自第二接入网设备的辅节点新增请求拒绝消息。
其中,辅节点新增请求拒绝消息包括失败原因。
可选的,失败原因包括以下任一项:终端设备请求双连接的目标小区不支持外部认证、目标小区不支持归属服务商或归属服务商群组、或拒绝终端设备使用外部实体所拥有的证书接入网络。
关于失败原因的相关介绍与前述图4所示的实施例中的步骤404b中的失败原因类似,具体可以参阅前述图4所示的实施例中的步骤404b的相关介绍,这里不再赘述。
可选的,辅节点新增请求拒绝消息包括终端设备请求双连接的目标小区支持的归属服务商或归属服务商群组的信息。
终端设备请求双连接的目标小区支持的归属服务商或归属服务商群组的信息包括:终端设备请求双连接的目标小区支持的归属服务商或归属服务商群组的标识。终端设备请求双连接的目标小区支持的归属服务商可以是一个或多个归属服务商。目标小区支持归属服务商群组可以是一个或多个归属服务商群组。那么,辅节点新增请求拒绝消息包括:目标小区支持的一个或多个归属服务商的标识,或目标小区支持的一个或多个归属服务商群组的标识。
例如,目标小区支持苹果服务商1和苹果服务商2的认证。那么辅节点新增请求拒绝消息包括苹果服务商1的标识和苹果服务商2的标识。
例如,目标小区支持苹果服务商1和大众服务商1的认证。那么辅节点新增请求拒绝消息包括苹果服务商1的标识和大众服务商1的标识。
如果第二接入网设备不允许终端设备双连接至目标小区,即第二接入网设备不允许将 第二接入网设备新增为终端设备的辅接入网设备,第二接入网设备向第一接入网设备发送辅节点新增请求拒绝消息,以指示不允许终端设备双连接至目标小区。
需要说明的是,第一接入网设备在接收到上述步骤703b的辅节点新增请求拒绝消息之后,第一接入网设备根据第一信息和/或第二信息修改或更新第一接入网设备上保存的关于目标小区的信息。避免第一接入网设备误将终端设备切换至目标小区而导致终端设备无法完成二次认证。避免终端设备无法进行相应的业务,保障正常通信进行。例如,第一接入网设备更新第一接入网设备上保存的目标小区支持的归属服务商或归属服务商的标识。
上述图7所示的实施例示出了终端设备进行双连接的过程。在该过程中,第一接入网设备向第二接入网设备发送第一信息和/或第二信息。这样第二接入网设备可以根据第一信息和/或第二信息确定是否允许终端设备双连接至目标小区,以限制终端设备只能在支持外部认证的小区移动。避免终端设备双连接至不支持外部认证的小区而无法完成终端设备的二次认证。进一步避免终端设备无法进行相应的业务,保障正常通信进行。
本申请还提供一种实施例,应用于终端设备的初始接入过程。下面结合图8对该实施例的技术方案进行介绍。
请参阅图8,图8为本申请实施例通信方法的另一个实施例示意图。在图8中,通信方法包括:
801、终端设备与接入网设备建立RRC连接。
802、接入网设备向核心网设备发送初始UE消息。相应的,核心网设备接收来自接入网设备的初始UE消息。
803、核心网设备对终端设备进行外部认证。
804、核心网设备向接入网设备发送初始上下文建立请求消息。相应的,接入网设备接收来自核心网设备的初始上下文建立请求消息。
805、核心网设备接收来自接入网设备的初始上下文建立响应消息。相应的,接入网设备接收来自核心网设备的初始上下文建立响应消息。
步骤801至步骤805与前述图3所示的实施例中的步骤301至步骤305类似,具体可以参阅前述图3所示的实施例中的步骤301至步骤305的相关介绍。不同之处在于:上述步骤804中的初始上下文建立请求消息不包括第一信息和/或第二信息。
806、核心网设备向终端设备发送归属服务商或归属服务商群组的信息。相应的,终端设备接收来自核心网设备的归属服务商或归属服务商群组的信息。
具体的,核心网设备向终端设备发送NAS消息,该NAS消息包括归属服务商或归属服务商群组的信息。该归属服务商或归属服务商群组的信息用于指示终端设备仅在支持该归属服务商或归属服务商群组的小区移动。
其中,该归属服务商或归属服务商群组的信息与前述第二信息包括的归属服务商或归属服务商群组的信息类似,具体请参阅前述第二信息的相关介绍,这里不再赘述。
由步骤806可知,终端设备获得该归属服务商或归属服务商群组的信息。这样终端设备仅在支持该归属服务商或归属服务商群组的小区移动,以避免终端设备移动至不支持外部认证的小区中。
可选的,本实施例还包括步骤807,步骤807在步骤806之后执行。
807、终端选择该归属服务商或归属服务商群组的小区进行驻留。
具体的,终端设备返回空闲(idle)态或者非激活(inactive)态。终端设备从支持该归属服务商或归属服务商群组的小区中重选一个小区进行驻留。
需要说明的是,上述图8所示的实施例可以前述图6所示的实施例中步骤601之前执行。基于图8所示的实施例,上述步骤601中,终端设备处于RRC非激活态,终端设备可以选择支持步骤806中的归属服务商或归属服务商群组的小区,并发起RRC恢复请求。
上述图8所示的实施例中,在终端设备的初始接入过程中,核心网设备可以向终端设备发送归属服务商或归属服务商群组的信息。该归属服务商或归属服务商群组的信息用于指示终端设备仅在支持该归属服务商或归属服务商群组的小区移动。这样,终端设备可以根据终端设备所拥有的外部实体的证书以及该归属服务商或归属服务商群组的信息选择从支持该归属服务商或归属服务商群组的小区中重选一个小区进行驻留或移动。从而避免终端设备驻留或移动到不支持外部认证的小区。避免终端设备移动或驻留的小区不支持外部认证导致终端设备无法完成二次认证。进一步避免终端设备无法进行相应的业务,保障正常通信进行。
本申请还提供另一个实施例,下面结合图9A介绍该实施例的技术方案。
请参阅图9A,图9A为本申请实施例通信方法的另一个实施例示意图。在图9A中,通信方法包括:
901、接入网设备确定用于外部认证的UAC参数。
其中,用于外部认证的UAC参数包括一个或者多个接入类别(access category,AC)分别对应的一组UAC参数。
可选的,每组UAC参数包括以下至少一项:接入标识禁止列表(uac-BarringForAccessIdentity)、禁止因子(uac-BarringFactor)、或禁止时间(uac-BarringTime)。
具体的,接入网设备在接入网设备的小区分别广播对应的外部认证指示,以指示该接入网设备的小区是否支持外部认证。可选的,接入网设备在接入网设备的小区分别广播对应小区支持的归属服务商或归属服务商群组的标识。
本实施例中,接入网设备确定一套用于外部认证的UAC参数。用于非外部认证的UAC参数用于通过非外部认证方式接入网络的终端设备接入网络。用于外部认证的UAC参数用于终端设备通过外部认证方式接入网络的终端设备接入网络。
用于非外部认证的UAC参数和用于外部认证的UAC参数包括的参数类型相同。例如,两套参数都包括接入标识禁止列表、禁止因子、以及禁止时间等参数。但是,两套参数中同类型的参数的取值相互独立。也就是说两套参数中同类型的参数的取值可以相同,也可以不同。
例如,用于非外部认证的UAC参数和用于外部认证的UAC参数都包括禁止时间。其中,用于非外部认证的UAC参数包括的禁止时间的取值为A,而用于外部认证的UAC参数包括的禁止时间的取值为B。A,B均大于0,A不等于B。
例如,如表1所示,每种接入尝试对应一个AC。接入网设备针对每种AC广播一组用于外部认证的UAC参数。即用于外部认证的UAC参数包括一个或多个AC分别对应的一组UAC参数。
表1
Figure PCTCN2021072769-appb-000001
902、接入网设备向终端设备发送用于外部认证的UAC参数。
接入网设备可以广播一套用于外部认证的UAC参数。可选地,接入网设备可以广播一套用于外部认证的UAC参数和一套用于非外部认证的UAC参数。
903、终端设备根据用于外部认证的UAC参数确定是否接入接入网设备。
终端设备接收接入网设备在该接入网设备的小区广播的用于外部认证的UAC参数。然后,终端设备根据该用于外部认证的UAC参数进行接入尝试。
下面结合图9B介绍终端设备根据用于外部认证的UAC参数进行接入尝试。如图9B所示,步骤903具体包括步骤9031至步骤9038。
步骤9031、终端设备确定一个或多个接入标识(access identity,AI)和终端设备的接入尝试对应的第一AC。
具体的,终端设备需要执行业务或传输数据时,终端设备可以进行接入尝试。终端设备的接入尝试对应的第一AC可以根据终端设备的待执行业务或待传输数据确定。
例如,如表1所示,如果终端设备需要执行紧急接入,那么终端设备的接入尝试对应的第一AC等于2。
例如,如表1所示,如果终端设备需要传输语音数据,那么终端设备的接入尝试对应的第一AC等于4。
终端设备有对应的签约信息。终端设备通过终端设备的签约信息确定一个或多个AI。
例如,如表2所示,终端设备的签约信息包括常规业务的签约信息,那么可知该一个或多个AI包括0。
例如,如表2所示,终端设备的签约信息包括常规业务的签约信息和关键业务的签约信息,那么可知该一个或多个AI包括0和2。
表2
Figure PCTCN2021072769-appb-000002
步骤9032、终端设备从用于外部认证的UAC参数中选择第一AC对应的UAC参数。
其中,第一AC对应的UAC参数包括AI禁止列表、禁止因子F以及禁止时间T1。
具体的,AI禁止列表用于指示上述步骤1的一个或多个AI是否被允许。
步骤9033、终端设备根据AI禁止列表判断一个或多个AI中是否有至少一个被允许;若是,则终端设备确定终端设备的接入尝试被允许;若否,则终端设备执行步骤9024。
例如,一个或多个AI包括0和2,AI禁止列表中取值为0的AI被允许,取值为2的AI不被允许。那么终端设备可以确定终端设备本次的接入尝试被允许。
例如,一个或多个AI包括1,AI禁止列表中取值为1的AI不被允许,那么终端设备执行步骤9034。
步骤9034、终端设备生成第一随机数m。
其中,m大于或等于0且小于1。
步骤9035、若第一随机数m小于禁止因子F,则终端设备确定终端设备的接入尝试被允许。
步骤9036、若第一随机数m大于或等于禁止因子F,终端设备生成第二随机数n。
其中,n大于或等于0且小于1。
步骤9037、终端设备等待第一时长后,终端设备生成第三随机数p。
其中,第一时长等于(0.7+0.6*n)*T1,p大于0且小于1。
步骤9038、如果该第三随机数p小于禁止因子F,则终端设备确定终端设备的接入尝试被允许。
如果第三随机数p大于或等于禁止因子F,则终端设备按照步骤9034至步骤9037的 执行方式再次判断是否允许接入尝试。当达到一定时长或执行次数达到预设的次数时,那么终端设备可以使用用于非外部认证的UAC参数请求接入网络。
如果终端设备确定终端设备的接入尝试被允许(即终端设备确定接入接入网设备),那么终端设备与接入网设备建立RRC连接。接入网设备向核心网设备发送初始UE消息。然后,核心网设备对终端设备进行外部认证,再向接入网设备发送初始上下文请求消息。接入网设备建立终端设备的上下文后,接入网设备向核心网设备发送初始上下文建立响应消息。
上述图9A所示的实施例中,接入网设备原本会广播一套用于非外部认证的UAC参数。本实施例中,接入网设备新增广播一套用于外部认证的UAC参数。这样终端设备可以在接入网设备的小区接收到接入网设备广播的用于外部认证的UAC参数。然后,终端设备根据用于外部认证的UAC参数确定是否接入接入网设备。如果终端设备确定接入接入网设备,终端设备与接入网设备建立RRC连接。本实施例中,接入网设备可以对关于外部认证的两种接入方式(包括通过外部认证的方式接入网络和通过非外部认证的方式接入网络)进行差异化控制。例如,当网络希望优先接纳通过外部认证的方式接入网络的终端设备时,可以调整用于外部认证的UAC参数(例如,提高禁止因子、或降低禁止时间),使得尝试通过外部认证的方式接入网络的终端设备接入网络的概率更大。
一种可能的实现方式中,上述图9A所示的实施例中的步骤901至步骤903可以在前述图3所示的实施例中的步骤301之前执行。结合上述图3所示的实施例,如果步骤903中终端设备确定接入接入网设备,那么终端设备执行上述图3所示的实施例的步骤301。
另一种可能的实现方式中,上述图9A所示的实施例中的步骤901至步骤903可以在前述图8所示的实施例中的步骤801之前执行。结合上述图8所示的实施例,如果步骤903中终端设备确定接入接入网设备,那么终端设备执行上述图8所示的实施例的步骤801。
本申请提供的通信方法同样适用于在线签约(onboarding)场景。下面结合图10A和图10B介绍两种可能的在线签约场景。
下面结合图10A介绍第一种可能的在线签约场景。请参阅图10A,网络2为终端设备的待签约网络。终端设备上没有网络2的证书。终端设备通过接入网络1获取网络2的证书。网络1和网络2为不同的两个网络。
下面结合图10B介绍第二种在线签约场景。请参阅图10A,网络1为终端设备的待签约网络。终端设备上没有网络1的证书。终端设备通过接入网络1获取网络1的证书。
在线签约场景中,如何限制终端设备仅在支持在线签约的小区中移动,以避免终端设备接入不支持在线签约的小区而无法获取到待签约网络的证书。
针对在线签约场景,本申请还提供实施例一。实施例一与前述图3所示的实施例类似。不同的地方在于:上述图3所示的实施例中的步骤304和步骤306。上述步骤304替换为步骤304a。上述步骤306替换为步骤306a。
替换后的步骤304a为:核心网设备向接入网设备发送初始上下文建立请求消息。
初始上下文建立请求消息包括以下至少一项:第三信息、或第四信息。
一种可能的实现方式中,第三信息用于指示终端设备限制于支持在线签约的小区中移动;或者,第三信息用于指示终端设备仅在支持在线签约的小区中移动。
需要说明的是,在该可能的实现方式中,可选的,如果初始上下文建立请求消息包括第三信息,表示终端设备限制于支持在线签约的小区中移动。如果初始上下文建立请求消息包括第三信息,表示终端设备可以在支持在线签约的小区或不支持在线签约的小区中移动。本实施例中,终端设备是通过在线签约的方式接入网络,因此初始上下文建立请求消息包括第三信息。
另一种可能的实现方式中,第三信息用于指示终端设备是否限制于支持在线签约的小区中移动;或者,第三信息用于终端设备是否仅在支持在线签约的小区中移动。
例如,第三信息为第三指示信息。第三指示信息的取值为真(true)或者限制(restricted)时,表示终端设备限制于支持在线签约的小区中移动。第三指示信息的取值为假(false)或者为非限制(not-restricted)时,表示终端设备可以在支持在线签约的小区或不支持在线签约的小区中移动。本实施例中,终端设备是通过在线签约的方式接入网络,因此第三信息指示的是:终端设备限制于支持在线签约的小区中移动。
第四信息包括终端设备的待签约网络的信息。第四信息用于指示终端设备限制于支持待签约网络的小区中移动;或者,第四信息用于指示终端设备仅在支持待签约网络的小区中移动。
可选的,终端设备的待签约网络的信息包括终端设备的待签约网络的标识。
具体的,终端设备的待签约网络包括一个或多个待签约网络。那么终端设备的待签约网络的信息包括一个或多个待签约网络的标识。
替换后的步骤306a为:核心网设备向终端设备发送第四信息。关于第四信息请参阅前述的介绍。
本实施例中,在步骤301之前,终端设备可以根据接入网设备广播的小区信息和终端设备的待签约网络选择小区。该小区支持待签约网络的在线签约。然后,终端设备再执行步骤301。
需要说明的是,在线签约的场景下,终端设备可以是通过非外部认证的方式接入网络。那么在该情况下,则本实施例不包括上述步骤303。
结合图10A的在线签约场景,终端设备接入网络1,上述图3中的接入网设备和核心网设备属于网络1。终端设备可以通过接入网络1获取网络2的证书。
结合图10B的在线签约场景,终端设备接入网络1,上述图3中的接入网设备和核心网设备属于网络1。终端设备可以通过接入网络1获取网络1的证书。
本实施例中,在终端设备的初始接入过程中,接入网设备从核心网设备获取第三信息和/或第四信息。这样接入网设备可以根据第三信息和/或第四信息限制终端设备只能在支持在线签约的小区或支持待签约网络的在线签约的小区中移动。避免终端设备移动至不支持在线签约的小区而导致终端设备无法获取到终端设备的待签约网络的证书。
针对在线签约场景,本申请还提供实施例二,实施例二与前述图4所示的实施例类似。不同的地方在于:步骤402和步骤404b。步骤402替换为步骤402a。步骤403替换为步骤403a。步骤404b替换为步骤405。
步骤402a、源接入网设备向目标接入网设备发送切换请求消息。相应的,目标接入网 设备接收来自源接入网设备的切换请求消息。切换请求消息包括以下至少一项:第三信息、或第四信息。关于第三信息和第四信息请参阅前述实施例一中的相关介绍,这里不再赘述。
步骤403a、目标接入网设备根据第三信息和/或第四信息确定是否允许终端设备切换至目标小区。
切换请求消息包括第三信息和/或第四信息。第三信息和第四信息的相关介绍请参阅前述相关介绍,这里不再赘述。
下面结合第三信息和第四信息介绍目标小区确定是否允许终端设备切换至目标小区的一种可能的实现方式。对于其他确定方式仍适用本申请的技术方案。下述实现方式并不属于对本申请的限定。
1、若切换请求消息包括第三信息而不包括第四信息,且目标小区支持在线签约,则源接入网设备允许终端设备切换至目标小区。
2、若切换请求消息包括第三信息而不包括第四信息,且目标小区不支持在线签约,则源接入网设备不允许终端设备切换至目标小区。
3、若切换请求消息包括第四信息,或切换请求消息包括第三信息和第四信息,且目标小区支持在线签约的网络的标识包括第四信息中的至少一个待签约网络的标识,则源接入网设备允许终端设备切换至目标小区。
例如,目标小区为网络1的小区。目标小区支持在线签约的网络包括网络2和网络3。第四信息包括网络2的标识。那么源接入网设备可以允许终端设备切换至目标小区。这样终端设备可以通过终端设备接入的网络获取网络2的证书。
4、若切换请求消息包括第四信息,或切换请求消息包括第三信息和第四信息,且目标小区支持在线签约的网络的标识不包括第四信息中的至少一个待签约网络的标识,则源接入网设备不允许终端设备切换至目标小区。
例如,目标小区为网络1的小区。目标小区支持在线签约的网络包括网络2和网络3。第四信息包括网络4的标识。那么源接入网设备不允许终端设备切换至目标小区。避免终端设备切换至目标小区之后,无法获取网络4的证书。
步骤405、目标接入网设备向源接入网设备发送切换准备失败消息。切换准备失败消息包括失败原因。相应的,源接入网设备接收来自目标接入网设备的切换准备失败消息。
可选的,失败原因包括以下任一项:目标小区不支持在线签约、目标小区不支持终端设备的待签约网络的在线签约、或者拒绝终端设备通过接入网络获取待签约网络的证书。
例如,目标小区不支持在线签约,那么目标接入网设备可以拒绝终端设备切换至目标小区。避免终端设备切换至目标小区之后无法获取待签约网络的证书。
例如,目标小区支持在线签约的网络包括网络2和网络3。终端设备的待签约网络包括网络4。那么目标接入网设备可以拒绝终端设备切换至目标小区。避免终端设备切换至目标小区之后无法获取待签约网络的证书。
可选的,切换准备失败消息还包括目标小区支持在线签约的网络的信息。
具体的,目标小区支持在线签约的网络的信息包括目标小区支持在线签约的网络的标识。例如,目标小区支持在线签约的网络包括网络2和网络3。那么切换准备失败消息包 括网络2的标识和网络3的标识。
需要说明的是,在步骤404b之后,源接入网设备可以更新或修改关于目标小区的信息,以避免将终端设备误切换至目标小区导致终端设备无法获取待签约网络的证书。例如,源接入网设备更新目标小区支持在线签约的网络。
源接入网设备可以是通过初始接入过程获取第三信息和/或第四信息;或者,源接入网设备也可以通过终端设备的切换过程获取第三信息和/或第四信息,具体本申请不做限定。
例如,本实施例可以是在实施例一之后执行的。源接入网设备可以理解为实施例一的接入网设备。也就是终端设备通过初始接入过程接入源接入网设备,源接入网设备在终端设备的初始接入过程中获得第三信息和/或第四信息。
例如,在实施例二之前,终端设备从其他接入网设备切换至源接入网设备,源接入网设备在该切换过程中获得第三信息和/或第四信息。
本实施例示出了源接入网设备通过源接入网设备与目标接入网设备之间的Xn接口将终端设备切换至目标接入网设备的切换过程。在该切换过程中,源接入网设备向目标接入网设备发送第三信息和/或第四信息。这样,目标接入网设备可以根据第三信息和/或第四信息可以确定是否允许终端设备切换至目标小区。从而限制终端设备只能在支持在线签约的小区或支持待签约网络的在线签约的小区移动。避免终端设备移动至不在线签约的小区而无法获取待签约网络的证书。
针对在线签约场景,本申请还提供一个实施例三。实施例三与前述图5所示的实施例类似。不同的地方在于:步骤503、步骤504、步骤505b和步骤506b。步骤503替换为步骤503a。步骤504替换为步骤504a。步骤505b替换为步骤507。步骤506b替换为步骤508。
步骤503a、核心网设备向目标接入网设备发送切换请求消息。相应的,目标接入网设备接收来自核心网设备的切换请求消息。切换请求消息包括以下至少一项:第三信息、或第四信息。关于第三信息和第四信息请参阅前述相关介绍,这里不再赘述。
步骤504a、目标接入网设备根据第三信息和/或第四信息确定是否允许终端设备切换至目标小区。
步骤504a与前述步骤403a类似,具体请参阅前述步骤403b的相关介绍,这里不再赘述。
步骤507、目标接入网设备向核心网设备发送切换失败消息。相应的,核心网设备接收来自目标接入网设备的切换失败消息。切换失败消息包括失败原因。
可选的,失败原因包括以下任一项:目标小区不支持在线签约、目标小区不支持终端设备的待签约网络的在线签约、或者拒绝终端设备通过接入网络获取待签约网络的证书。关于失败原因的相关介绍请参阅前述实施例二的步骤405的相关介绍,这里不再赘述。
可选的,切换失败消息还包括目标小区支持在线签约的网络的信息。关于目标小区支持在线签约的网络的信息的相关介绍请参阅前述实施例二的步骤405的相关介绍,这里不再赘述。
步骤508、核心网设备向源接入网设备发送切换准备失败消息。相应的,源接入网设备接收来自核心网设备的切换准备失败消息。切换准备失败消息包括失败原因。
可选的,失败原因包括以下任一项:目标小区不支持在线签约、目标小区不支持终端设备的待签约网络的在线签约、或者拒绝终端设备通过接入网络获取待签约网络的证书。关于失败原因的相关介绍请参阅前述实施例二的步骤405的相关介绍,这里不再赘述。
可选的,切换准备失败消息还包括目标小区支持在线签约的网络的信息。关于目标小区支持在线签约的网络的信息的相关介绍请参阅前述实施例二的步骤405的相关介绍,这里不再赘述。
需要说明的是,本实施例可以是在实施例一之后执行的。源接入网设备可以理解为实施例一的接入网设备。也就是终端设备通过初始接入过程接入源接入网设备。然后,终端设备通过实施例三的技术方案执行切换过程。
本实施例示出源接入网设备基于核心网设备与目标接入网设备之间的NG接口请求将终端设备切换至目标接入网设备的切换过程。在该切换过程中,核心网设备向目标接入网设备发送切换请求消息。该切换请求消息包括第三信息和/或第四信息。目标接入网设备可以根据第三信息和/或第四信息可以确定是否允许终端设备切换至目标小区。从而限制终端设备只能在支持在线签约的小区或支持终端设备的待签约网络的在线签约的小区移动。避免终端设备移动至不在线签约的小区而无法获取待签约网络的证书。
针对在线签约场景,本申请还提供一个实施例四。实施例四与前述图9A所示的实施例类似,不同的地方在于:上述步骤901至上述步骤903。其中,步骤901可以替换为904,上述步骤902可以替换为步骤905,步骤903可以替换为步骤906。
步骤904、接入网设备确定用于在线签约的UAC参数。
其中,用于在线签约的UAC参数包括第二AC所对应的UAC参数。第二AC为在线签约接入对应的AC。
可选的,第二AC所对应的UAC参数包括以下至少一项:接入标识禁止列表、禁止因子、或禁止时间。
具体的,接入网设备原本会广播一套UAC参数。本实施例中,接入网设备在原本广播的一套UAC参数中新增一组用于在线签约的UAC参数。用于在线签约的UAC参数用于通过在线签约的方式接入网络的终端设备接入网络。
例如,如表3所示,接入尝试的类型新增一项:在线签约接入。在线签约接入对应的AC为64。因此,接入网设备在原本广播的一套UAC参数中增加一组用于在线签约的UAC参数。
表3
接入类别(AC) 接入尝试的类型
0 寻呼触发的用户信令传输
1 时延容忍接入
2 紧急接入
3 非寻呼触发的NAS信令传输
4 语音
5 视频
6 短消息
7 用户发起的数据传输
8 非寻呼触发的用户RRC信令传输
9 用户发起的IMS注册信令传输
10 用户发起的异常数据传输
11-31 预留
32-63 运营商自定义
64 在线签约接入
再例如,接入尝试的类型新增一项:在线签约接入。在线签约接入对应的AC采用预留的AC值中的任一个。例如,如表4所示,在线签约接入对应的AC采用预留的AC值中的11。
表4
接入类别(AC) 接入尝试的类型
0 寻呼触发的用户信令传输
1 时延容忍接入
2 紧急接入
3 非寻呼触发的NAS信令传输
4 语音
5 视频
6 短消息
7 用户发起的数据传输
8 非寻呼触发的用户RRC信令传输
9 用户发起的IMS注册信令传输
10 用户发起的异常数据传输
11 在线签约接入
12-31 预留
32-63 运营商自定义
步骤905、终端设备接收来自接入网设备用于在线签约的UAC参数。相应的,接入网设备向终端设备发送用于在线签约的UAC参数。
具体的,接入网设备原本会广播一套UAC参数。本实施例中,接入网设备在原本广播的一套UAC参数中新增一组用于在线签约的UAC参数。
步骤906、终端设备根据用于在线签约的UAC参数确定是否接入接入网设备。
终端设备接收接入网设备在接入网设备的小区广播的一套UAC参数。终端设备需要进行在线签约接入的接入尝试,那么终端设备从接入网设备广播的一套UAC参数中确定用于在线签约的UAC参数。然后,终端设备根据用于在线签约的UAC参数进行接入尝试。
下面结合步骤9061至步骤9067介绍终端设备根据用于在线签约的UAC参数进行接入尝试的过程。
步骤9061、终端设备确定一个或多个AI。
步骤9061与前述图9B所示的实施例中步骤9031中终端设备确定一个或多个AI的过程类似,具体请参阅前述图9B所示的实施例中步骤9031的相关介绍,这里不再赘述。
步骤9062、终端设备根据用于在线签约的UAC参数中的AI禁止列表判断一个或多个AI中是否有至少一个被允许;若是,则终端设备确定终端设备的接入尝试被允许;若否,则终端设备执行步骤9063。
由上述步骤904可知,用于在线签约的UAC参数包括第二AC所对应的一组UAC参数。第二AC为在线签约接入对应的AC。
其中,第二AC对应的一组UAC参数包括AI禁止列表、禁止因子E、以及禁止时间T2。
步骤9063、终端设备生成第四随机数x。
其中,x大于或等于0且小于1。
步骤9064、若第四随机数x小于禁止因子E,则终端设备确定终端设备的接入尝试被允许。
步骤9065、若第四随机数x大于或等于禁止因子E,终端设备生成第五随机数y。
其中,y大于或等于0且小于1。
步骤9066、终端设备等待第二时长后,终端设备生成第六随机数z。
其中,第二时长等于(0.7+0.6*y)*T2,z大于0且小于1。
步骤9067、若第六随机数z小于禁止因子E,则终端设备确定终端设备的接入尝试被允许。
如果第六随机数z大于或等于禁止因子E,则终端设备按照步骤9063至步骤9067的执行方式再次判断是否允许接入尝试。当达到一定时长或执行次数达到预设的次数时,那么终端设备可以退出。
本实施例中,接入网设备在原本广播的一套UAC参数中增加一组用于在线签约的UAC参数。这样终端设备可以在接入网设备的小区接收接入网设备广播的一组用于在线签约的UAC参数。然后,终端设备根据该用于在线签约的UAC参数确定是否接入接入网设备。如果终端设备确定接入接入网设备,终端设备与接入网设备建立RRC连接。本实施例中,可以对两个接入方式(包括在线签约的方式接入网络或非在线签约的方式接入网络)进行差异化控制。例如,当网络希望优先接纳通过在线签约的方式接入网络的终端设备时,可以调整用于在线签约的UAC参数(例如,提高禁止因子、或降低禁止时间),使得尝试通过在线签约的方式接入网络的终端设备接入网络的概率更大。
本申请中,终端设备通过外部认证的方式接入网络。当终端设备处于空闲(idle)态或非激活(inactive)态时,终端设备可以驻留在支持外部认证的小区,而不会驻留在不支持外部认证的小区。
例如,终端设备可以通过已有小区的广播信息包括的外部认证指示确定支持外部认证的小区,并在该小区进行驻留。或者,终端设备也可以通过上述图8中的步骤807的方式选择支持小区,并进行驻留。
终端设备只会驻留在支持外部认证的小区,而不会驻留在不支持外部认证的小区。因 此网络寻呼终端设备时,网络可以只在支持外部认证的小区中寻呼终端设备。避免在不支持外部认证的小区中寻呼终端设备,以减少寻呼终端设备带来的信令开销。下面结合图11详细具体的寻呼过程。
请参阅图11,图11为本申请实施例通信方法的另一个实施例示意图。在图11中,通信方法包括:
1101、第一网元接收来自第二网元的寻呼消息。相应的,第二网元向第一网元发送寻呼消息。
其中,寻呼消息包括以下至少一项:第一信息、或第二信息。
关于第一信息和第二信息的相关介绍,请参阅前述图3所示的实施例的步骤304中的相关介绍,这里不再赘述。
本实施例中,终端设备是通过外部认证的方式接入网络。然后,终端设备返回空闲态或非激活态。例如,终端设备可以通过已有小区的广播信息包括的外部认证指示确定支持外部认证的小区,并在该小区进行驻留。或者,终端设备也可以通过上述图8中的步骤807的方式选择支持小区,并进行驻留。
一种可能的实现方式中,当终端设备处于空闲态时,第一网元为接入网设备,第二网元为核心网设备。
在该实现方式下,本实施例可以理解为核心网发起的寻呼过程(core network paging,CN paging)。具体的,核心网设备向接入网设备发送寻呼(paging)消息。其中,核心网设备可以是AMF。
另一种可能的实现方式中,当终端设备处于非激活态时,第一网元为第一接入网设备,第二网元为源接入网设备。
在该可能的实现方式下,本实施例可以理解为是接入网发起的寻呼过程(RAN paging)。具体的,第一接入网设备向源接入网设备发送接入网寻呼(RAN paging)消息。
可选的,源接入网设备可以是最近为终端设备服务的接入网设备。源接入网设备中保存有终端设备的上下文以及源接入网设备与AMF之间的终端设备关联的NG连接。源接入网设备可以称为终端设备的最近服务接入网设备(last serving RAN)。
1102、第一网元根据寻呼消息选择目标小区。
具体的,寻呼消息包括第一信息和/或第二信息。第一网元根据第一信息和/或第二信息选择目标小区。
下面结合第一信息和/或第二信息介绍第一网元选择目标小区的一种可能的实现方式。对于其他选择方式仍适用本申请的技术方案。下述实现方式并不属于对本申请的限定。
1、若寻呼消息包括第一信息而不包括第二信息,第一网元将第一网元管理的且支持外部认证的小区作为目标小区。
例如,第一信息用于指示终端设备限制于支持外部认证的小区中移动。第一网元管理的小区包括小区1、小区2和小区3。小区1和小区2均支持外部认证。小区3不支持外部认证。那么,第一网元将小区1和小区2作为目标小区。
2、若寻呼消息包括第二信息,或寻呼消息包括第一信息和第二信息,第一网元将第一 网元管理的且支持第二信息包括的归属服务商或归属服务商群组的小区作为目标小区。
例如,第一信息用于指示终端设备限制于支持外部认证的小区中移动。第二信息包括归属服务商1的标识和归属服务商2的标识。第一网元管理的小区中支持归属服务商1的小区包括小区1和小区2,支持归属服务商2的小区包括小区1和小区3。因此,第一网元可以将小区1、小区2和小区3作为目标小区。
1103、第一网元在目标小区寻呼终端设备。
第一网元选择目标小区之后,第一网元可以在目标小区向终端设备发送寻呼消息。
可选的,本实施例还包括步骤1104。步骤1104可以在步骤1103之后执行。
1104、终端设备与第一网元之间建立RRC连接。
终端设备向第一网元发送RRC建立请求消息。然后,第一网元向终端设备回复RRC建立消息。终端设备建立与第一网元之间的RRC连接。然后,终端设备向第一网元反馈RRC建立完成消息。这样终端设备与第一网元之间的RRC连接建立完成。
上述图11所示的实施例中,第二网元向第一网元发送寻呼消息。寻呼消息包括以下至少一项:第一信息、或第二信息。这样第一网元可以根据第一信息和/或第二信息选择目标小区。对于通过外部认证的方式接入网络的终端设备,第一网元可以只在支持外部认证的小区或在支持第二信息包括的归属服务商或归属服务商群组的小区中寻呼终端设备。避免在不支持外部认证的小区中寻呼终端设备。减少第一网元发送的寻呼消息的数量,节省信令开销。
下面对本申请实施例提供的一种通信装置进行描述。请参阅图12,本申请实施例通信装置1200的一种结构示意图。通信装置1200包括发送单元1201和接收单元1202。
当通信装置1200为接入网设备,或者接入网设备内的芯片时,通信装置1200可以用于执行上述图3所示的实施例中接入网设备执行的全部或部分步骤,用于执行图6和图7所示的实施例中第一接入网设备执行的全部或部分步骤。可以参考上述图3、图6和图7所示的方法实施例中的相关描述。
例如,发送单元1201用于执行上述图3所示的实施例中的步骤302和步骤305。接收单元1202用于执行上述图3所示的实施例中的步骤301和步骤304。
例如,发送单元1201用于执行图6所示的实施例中的步骤602、步骤605a和步骤605b。接收单元1202用于执行图6所示的实施例中的步骤601、步骤604a和步骤604b。
例如,发送单元1201用于执行图7所示的实施例中的步骤701。接收单元1202用于执行图7所示的实施例中的步骤703a和步骤703b。
当通信装置1200为核心网设备,或者核心网设备内的芯片时,通信装置1200可以用于执行上述图5所示的实施例中核心网设备执行的全部或部分步骤。可以参考上述图5所示的方法实施例的相关描述。
例如,发送单元1201用于执行步骤503、步骤506a和步骤506b。接收单元1202用于执行步骤502、步骤505a和步骤505b。
下面对本申请实施例提供的一种通信装置进行描述。请参阅图13,本申请实施例通信装置1300的一种结构示意图。通信装置1300包括接收单元1301、处理单元1302和发送单元 1303。
当通信装置1300为核心网设备,或者为核心网设备内的芯片时,通信装置1300可以用于执行上述图3和图8所示的实施例中核心网设备执行的全部或部分步骤。可以参考上述图3和图8所示的方法实施例的相关描述。
例如,接收单元1301用于执行图3所示的实施例中的步骤302和步骤305。处理单元1302用于执行图3所示的实施例中的步骤303。发送单元1303用于执行图3所示的实施例中的步骤304和步骤306。
例如,接收单元1301用于执行图8所示的实施例中的步骤802和步骤805。处理单元1302用于执行步骤803。发送单元1303用于执行图8所示的实施例中的步骤804和步骤806。
当通信装置1300为接入网设备,或者为接入网设备内的芯片时,通信装置1300可以用于执行上述图4和图5所示的实施例中目标接入网设备执行的全部或部分步骤,可以用于执行上述图4和图5所示的实施例中源接入网设备执行的全部或部分步骤,还可以用于执行上述图7所示的实施例中第二接入网设备执行的全部或部分步骤。
例如,接收单元1301用于执行图4所示的实施例中的步骤402。处理单元1302用于执行图4所示的实施例中的步骤403。发送单元1303用于执行图4所示的实施例中的步骤404a和步骤404b。
例如,接收单元1301用于执行图5所示的实施例中的步骤503。处理单元1302用于执行图5所示的实施例中的步骤504。发送单元1303用于执行图5所示的实施例中的步骤505a和步骤505b。
例如,接收单元1301用于执行图4所示的实施例中的步骤404a和步骤404b。处理单元1302用于执行图4所示的实施例中的步骤401。发送单元1303用于执行图4所示的实施例中的步骤402。
例如,接收单元1301用于执行图5所示的实施例中的步骤506a和步骤506b。处理单元1302用于执行图5所示的实施例中的步骤501。发送单元1303用于执行图5所示的实施例中的步骤502。
例如,接收单元1301用于执行图7所示的实施例中的步骤701。处理单元1302用于执行图7所示的实施例中的步骤702。发送单元1303用于执行图7所示的实施例中的步骤703a和步骤703b。
当通信装置1300为终端设备,或者为终端设备内的芯片时,通信装置1300可以用于执行上述图8所示的实施例中终端设备执行的全部或部分步骤。可以参考上述图8所示的方法实施例的相关描述。
例如,接收单元1301用于执行图8所示的实施例中的步骤806。处理单元1302用于执行上述图8所示的实施例中的步骤807。发送单元1303用于执行上述图8所示的实施例中的步骤801。
下面对本申请实施例提供的一种通信装置进行描述。请参阅图14,本申请实施例通信装置1400的一种结构示意图。通信装置1400包括接收单元1401和处理单元1402。
当通信装置1400为终端设备,或者为终端设备内的芯片时,通信装置1400可以用于执行上述图9A和图9B所示的实施例中终端设备执行的全部或部分步骤,可以参考上述图9A和图9B所示的方法实施例的相关描述。
例如,接收单元1401用于执行上述图9A所示的实施例中的步骤903。处理单元1402用于执行上述图9A所示的实施例中的步骤903。
例如,处理单元1402具体可以执行上述图9B所示的实施例中的步骤9031至步骤9038。
当通信装置1400为第一网元,或第一网元内的芯片时,通信装置1400可以用于执行上述图11所示的实施例第一网元执行的全部或部分步骤。可以参考上述图11所示的方法实施例的相关描述。
例如,接收单元1401用于执行上述图11所示的实施例中的步骤1101。处理单元1402用于执行上述图11所示的实施例中的步骤1102和步骤1103。
下面对本申请实施例提供的一种通信装置进行描述。请参阅图15,本申请实施例通信装置1500的一种结构示意图。通信装置1500包括处理单元1501和发送单元1502。
通信装置1500为第一网元,或者为第一网元内的芯片时,通信装置1500可以用于执行上述图11所示的实施例中第二网元执行的全部或部分步骤。可以参考前述图11所示的方法实施例的相关描述。在该可能的实现方式中,处理单元1501为可选单元。
例如,发送单元1502用于执行上述图11所示的实施例中的步骤1101。
通信装置1500为接入网设备,或者为接入网设备内的芯片时,通信装置1500可以用于执行上述图9A所示的实施例中接入网设备执行的全部或部分步骤。可以参考前述图9A所示的方法实施例的相关描述。
例如,处理单元1501用于执行上述图9A所示的实施例中的步骤901。发送单元1502用于执行上述图9A所示的实施例中的步骤902。
本申请还提供一种通信装置,请参阅图16,本申请实施例中通信装置1600的另一个结构示意图。
通信装置1600包括:处理器1601、存储器1602和收发器1603。
处理器1601、存储器1602和收发器1603分别通过总线相连,存储器中存储有计算机指令。
当通信装置1600为接入网设备,或接入网设备内的芯片时,通信装置1600可以用于执行图3、图8和图9A所示的实施例中接入网设备执行的步骤。通信装置1600可以用于执行上述图4和图5所示的实施例源接入网设备或目标接入网设备执行的步骤。通信装置1600可以用于执行上述图6所示的实施例中的第一接入网设备执行的步骤。通信装置1600可以用于执行上述图7所示的实施例中第一接入网设备或第二接入网设备执行的步骤。通信装置1600可以执行上述图11所示的实施例中第一网元或第二网元执行的步骤。可以参考上述方法实施例中的相关描述。
当通信装置1600为核心网设备,或核心网设备内的芯片时,通信装置1600可以用于执行图3、图5、和图8所示的实施例中核心网设备执行的步骤,还可以用于执行上述图11所示的实施例中第二网元执行的步骤,可以参考上述方法实施例中的相关描述。
前述图12中的发送单元1201和接收单元1202则具体可以是本实施例中的收发器1603,因此收发器1603的具体实现不再赘述。或者,
前述图13中的接收单元1301和发送单元1303具体可以是本实施例中的收发器1603,因此收发器1603的具体实现不再赘述。处理单元1302具体可以用于本实施例中的处理器1601,因此处理器1601的具体实现不再赘述。或者,
前述图14中的接收单元1401具体可以是本实施例中的收发器1603,因此收发器1603的具体实现不再赘述。处理单元1402具体可以用于本实施例中的处理器1601,因此处理器1601的具体实现不再赘述。或者,
前述图15中的发送单元1502具体可以是本实施例中的收发器1603,因此收发器1603的具体实现不再赘述。处理单元1501具体可以用于本实施例中的处理器1601,因此处理器1601的具体实现不再赘述。
下面通过图17示出终端设备的一种可能的结构示意图。
图17示出了一种简化的终端设备的结构示意图。为了便于理解和图示方式,图17中,终端设备以手机作为例子。如图17所示,终端设备包括处理器、存储器、射频电路、天线及输入输出装置。
处理器主要用于对通信协议以及通信数据进行处理,以及对终端设备进行控制,执行软件程序,处理软件程序的数据等。
存储器主要用于存储软件程序和数据。
射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。
天线主要用于收发电磁波形式的射频信号。
输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的终端设备可以不具有输入输出装置。
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对数据进行处理。
为便于说明,图17中仅示出了一个存储器和处理器。在实际的终端设备产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。
在本申请实施例中,可以将具有收发功能的天线和射频电路视为终端设备的收发单元,将具有处理功能的处理器视为终端设备的处理单元。如图17所示,终端设备包括收发单元1710和处理单元1720。收发单元也可以称为收发器、收发机、收发装置等。处理单元也可以称为处理器,处理单板,处理模块、处理装置等。
可选的,可以将收发单元1710中用于实现接收功能的器件视为接收单元,将收发单元1710中用于实现发送功能的器件视为发送单元,即收发单元1710包括接收单元和发送单元。收发单元有时也可以称为收发机、收发器、或收发电路等。接收单元有时也可以称为 接收机、接收器、或接收电路等。发送单元有时也可以称为发射机、发射器或者发射电路等。
应理解,收发单元1710用于执行上述方法实施例中终端设备的发送操作和接收操作,处理单元1720用于执行上述方法实施例中终端设备上除了收发操作之外的其他操作。
一种可能的实现方式,收发单元1710用于执行上述图3所示的实施例中的步骤301和步骤306。
另一种可能的实现方式中,收发单元1710用于执行上述图6所示的实施例中的步骤601、步骤605a和步骤605b。
另一种可能的实现方式中,收发单元1710用于执行上述图8所示的实施例中的步骤801、步骤806。处理单元1720用于执行上述图8所示的实施例中的步骤807。
另一种可能的实现方式中,收发单元1710用于执行上述图9A所示的实施例中的步骤902。处理单元1720用于执行上述图9A所示的实施例中的步骤903。
可选的,处理单元1720用于执行上述图9B所示的实施例中的步骤9031至步骤9038。
另一种可能的实现方式中,收发单元1710用于执行上述图11所示的实施例中的步骤1103。
当终端设备为芯片时,芯片包括收发单元和处理单元。其中,收发单元可以是输入输出电路或通信接口;处理单元为芯片上集成的处理器或者微处理器或者集成电路或者逻辑电路。上述方法实施例中,发送操作对应输入输出电路的输出,接收操作对应输入输出电路的输入。
本申请实施例还提供一种通信系统,通信系统包括接入网设备和核心网设备。接入网设备用于执行如图3和图8所示的实施例中接入网设备执行的全部或部分步骤。核心网设备用于执行如图3和图8所示的实施例中核心网设备执行的全部或部分步骤。
本申请实施例还提供另一种通信系统,通信系统包括源接入网设备和目标接入网设备。源接入网设备用于执行如图4和图5所示的实施例中源接入网设备执行的全部或部分步骤。目标接入网设备用于执行如图4和图5所示的实施例中目标接入网设备执行的全部或部分步骤。
可选的,该通信系统还包括核心网设备。核心网设备用于执行图5所示的实施例中核心网设备执行的全部或部分步骤。
本申请实施例还提供另一种通信系统,通信系统包括第一接入网设备和源接入网设备。第一接入网设备用于执行如图6所示的实施例中第一接入网设备执行的全部或部分步骤。源接入网设备用于执行如图6所示的实施例中源接入网设备执行的全部或部分步骤。
本申请实施例还提供另一种通信系统,通信系统包括第一接入网设备和第二接入网设备。第一接入网设备用于执行如图7所示的实施例中第一接入网设备执行的全部或部分步骤。第二接入网设备用于执行如图7所示的实施例中源接入网设备执行的全部或部分步骤。
本申请实施例还提供另一种通信系统,通信系统包括第一网元和第二网元。第一网元用于执行如图11所示的实施例中第一网元执行的全部或部分步骤。第二网元用于执行如图11所示的实施例中第二网元执行的全部或部分步骤。
本申请实施例还提供一种包括计算机指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如上述图3、图4、图5、图6、图7、图8、图9A、图9B以及图11所示的实施例的通信方法。
本申请实施例还提供了一种计算机可读存储介质,包括计算机指令,当计算机指令在计算机上运行时,使得计算机执行如上述图3、图4、图5、图6、图7、图8、图9A、图9B以及图11所示的实施例的通信方法。
本申请实施例还提供一种芯片装置,包括处理器,用于调用存储器中存储的计算机程序或计算机指令,以使得处理器执行上述图3、图4、图5、图6、图7、图8、图9A、图9B以及图11所示的实施例的通信方法。
可选的,处理器通过接口与存储器耦合。
可选的,芯片装置还包括存储器,存储器中存储有计算机程序或计算机指令。
上述任一处提到的处理器,可以是一个通用中央处理器,微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制上述图3、图4、图5、图6、图7、图8、图9A、图9B以及图11所示的实施例的通信方法的程序执行的集成电路。
上述任一处提到的存储器可以为只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。
另外需说明的是,以上所描述的装置实施例仅仅是示意性的,其中作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。另外,本申请提供的装置实施例附图中,模块之间的连接关系表示它们之间具有通信连接,具体可以实现为一条或多条通信总线或信号线。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件的方式来实现,当然也可以通过专用硬件包括专用集成电路、专用CPU、专用存储器、专用元器件等来实现。一般情况下,凡由计算机程序完成的功能都可以很容易地用相应的硬件来实现,而且,用来实现同一功能的具体硬件结构也可以是多种多样的,例如模拟电路、数字电路或专用电路等。但是,对本申请而言更多情况下软件程序实现是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,计算机软件产品存储在可读取的存储介质中,如计算机的软盘、U盘、移动硬盘、ROM、RAM、磁碟或者光盘等,包括若干指令用以使得一台计算机设备执行本申请各个实施例的方法。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。
计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例的流程或功能。计算机可以是通用计算机、专用 计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、网络设备、或本地计算设备、计算设备或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、网络设备、或本地计算设备、计算设备或数据中心进行传输。计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的网络设备、或本地计算设备、数据中心等数据存储设备。可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。
应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在一实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对 现有技术做出贡献的部分或者技术方案的全部或部分可以以软件产品的形式体现出来,计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例方法的全部或部分步骤。
总之,以上所述仅为本申请技术方案的较佳实施例而已,并非用于限定本申请的保护范围。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (26)

  1. 一种通信方法,其特征在于,所述方法包括:
    接入网设备与终端设备建立无线资源控制RRC连接;
    所述接入网设备向核心网设备发送初始UE消息;
    所述接入网设备接收来自所述核心网设备的初始上下文建立请求消息,所述初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;
    所述第一信息用于指示所述终端设备限制于支持外部认证的小区移动;
    所述第二信息包括归属服务商或归属服务商群组的信息;
    所述接入网设备向所述核心网设备发送初始上下文响应消息。
  2. 根据权利要求1所述的方法,其特征在于,所述归属服务商或归属服务商群组的信息包括所述归属服务商或归属服务商群组的标识。
  3. 根据权利要求1或2所述的方法,其特征在于,所述初始上下文建立请求消息包括移动性限制列表,所述第一信息和/或所述第二信息位于所述移动性限制列表中。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述方法还包括:
    所述接入网设备为所述终端设备选择支持外部认证的小区,或为所述终端设备选择支持所述归属服务商或归属服务商群组的小区。
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    所述接入网设备向目标接入网设备发送切换请求消息,所述切换请求消息包括以下至少一项:所述第一信息、或所述第二信息。
  6. 根据权利要求1至3中任一项所述的方法,其特征在于,所述方法还包括:
    所述接入网设备接收来自目标接入网设备的提取UE上下文请求消息,所述目标接入网设备为所述终端设备发起无线资源控制RRC恢复请求的接入网设备;
    所述接入网设备向所述目标接入网设备发送提取UE上下文响应消息,所述提取UE上下文响应消息包括以下至少一项:所述第一信息、或所述第二信息。
  7. 根据权利要求1至3中任一项所述的方法,其特征在于,所述方法还包括:
    所述接入网设备接收来自目标接入网设备的提取UE上下文请求消息,所述目标接入网设备为所述终端设备发起无线资源控制RRC恢复请求的接入网设备;
    所述接入网设备向所述目标接入网设备发送提取上下文失败消息,所述提取上下文失败消息包括失败原因,所述失败原因包括外部认证信息不匹配。
  8. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    所述接入网设备向所述目标接入网设备发送辅节点新增请求消息,所述辅节点新增请求消息包括以下至少一项:所述第一信息、或所述第二信息。
  9. 一种通信方法,其特征在于,所述方法包括:
    核心网设备接收来自接入网设备的初始UE消息;
    所述核心网设备对终端设备进行外部认证;
    所述核心网设备向所述接入网设备发送初始上下文建立请求消息,所述初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;
    所述第一信息用于指示所述终端设备限制于支持外部认证的小区中移动;
    所述第二信息包括归属服务商或归属服务商群组的信息;
    所述核心网设备接收来自所述接入网设备的初始上下文响应消息。
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:
    所述核心网设备向所述终端设备发送所述第二信息。
  11. 一种通信方法,其特征在于,所述方法包括:
    终端设备与接入网设备建立无线资源控制RRC连接;
    所述终端设备接收来自所述核心网设备的第二信息,所述第二信息包括归属服务商或归属服务商群组的信息。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    所述终端设备选择支持所述第二信息包括的所述归属服务商或归属服务商群组的小区中进行移动或驻留。
  13. 一种通信装置,其特征在于,所述通信装置包括:
    接收单元,用于与终端设备建立无线资源控制RRC连接;
    发送单元,用于向核心网设备发送初始UE消息;
    所述接收单元,用于接收来自所述核心网设备的初始上下文建立请求消息,所述初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;
    所述第一信息用于指示所述终端设备限制于支持外部认证的小区移动;
    所述第二信息包括归属服务商或归属服务商群组的信息;
    所述发送单元,用于向所述核心网设备发送初始上下文响应消息。
  14. 根据权利要求13所述的通信装置,其特征在于,所述归属服务商或归属服务商群组的信息包括所述归属服务商或归属服务商群组的标识。
  15. 根据权利要求13或14所述的通信装置,其特征在于,所述初始上下文建立请求消息包括移动性限制列表,所述第一信息和/或所述第二信息位于所述移动性限制列表中。
  16. 根据权利要求13至15中任一项所述的通信装置,其特征在于,所述通信装置还包括处理单元;
    所述处理单元,用于为所述终端设备选择支持外部认证的小区,或为所述终端设备选择支持所述归属服务商或归属服务商群组的小区。
  17. 根据权利要求14至16中任一项所述的通信装置,其特征在于,
    所述发送单元,还用于向目标接入网设备发送切换请求消息,所述切换请求消息包括以下至少一项:所述第一信息、或所述第二信息。
  18. 根据权利要求14至15中任一项所述的通信装置,其特征在于,
    所述接收单元,还用于接收来自目标接入网设备的提取UE上下文请求消息,所述目标接入网设备为所述终端设备发起无线资源控制RRC恢复请求的接入网设备;
    所述发送单元,还用于向所述目标接入网设备发送提取UE上下文响应消息,所述提取UE上下文响应消息包括以下至少一项:所述第一信息、或所述第二信息。
  19. 根据权利要求13至15中任一项所述的通信装置,其特征在于,
    所述接收单元,还用于接收来自目标接入网设备的提取UE上下文请求消息,所述目标接入网设备为所述终端设备发起无线资源控制RRC恢复请求的接入网设备;
    所述发送单元,还用于向所述目标接入网设备发送提取上下文失败消息,所述提取上下文失败消息包括失败原因;所述失败原因包括外部认证信息不匹配。
  20. 根据权利要求13至16中任一项所述的通信装置,其特征在于,
    所述发送单元,还用于向所述目标接入网设备发送辅节点新增请求消息;
    所述辅节点新增请求消息包括以下至少一项:所述第一信息、或所述第二信息。
  21. 一种通信装置,其特征在于,所述通信装置包括:
    接收单元,用于接收来自接入网设备的初始UE消息;
    处理单元,用于对终端设备进行外部认证;
    发送单元,用于向所述接入网设备发送初始上下文建立请求消息,所述初始上下文建立请求消息包括以下至少一项:第一信息、或第二信息;
    所述第一信息用于指示所述终端设备限制于支持外部认证的小区中移动;
    所述第二信息包括归属服务商或归属服务商群组的信息;
    所述接收单元,还用于接收来自所述接入网设备的初始上下文响应消息。
  22. 根据权利要求21所述的通信装置,其特征在于,所述发送单元还用于:
    向所述终端设备发送所述第二信息。
  23. 一种通信装置,其特征在于,所述通信装置包括:
    发送单元,用于与接入网设备建立无线资源控制RRC连接;
    接收单元,用于接收来自所述核心网设备的第二信息,所述第二信息包括归属服务商或归属服务商群组的信息。
  24. 根据权利要求23所述的通信装置,其特征在于,所述通信装置还包括处理单元;
    所述处理单元,用于选择支持所述第二信息包括的所述归属服务商或归属服务商群组的小区中进行移动或驻留。
  25. 一种通信装置,其特征在于,所述通信装置包括处理器,所述处理器用于调用所述存储器中的计算机程序或计算机指令,使得所述通信装置执行如权利要求1至8中任一项所述的方法;或者,使得所述通信装置执行如权利要求9或10所述的方法;或者,使得所述通信装置执行如权利要求11或12所述的方法。
  26. 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在计算机上运行时,使得计算机执行如权利要求1至8中任一项所述的方法;或者,使得计算机执行如权利要求9或10所述的方法,或者,使得计算机执行如权利要求11或12所述的方法。
PCT/CN2021/072769 2021-01-19 2021-01-19 通信方法以及相关装置 WO2022155796A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/072769 WO2022155796A1 (zh) 2021-01-19 2021-01-19 通信方法以及相关装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/072769 WO2022155796A1 (zh) 2021-01-19 2021-01-19 通信方法以及相关装置

Publications (1)

Publication Number Publication Date
WO2022155796A1 true WO2022155796A1 (zh) 2022-07-28

Family

ID=82548166

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/072769 WO2022155796A1 (zh) 2021-01-19 2021-01-19 通信方法以及相关装置

Country Status (1)

Country Link
WO (1) WO2022155796A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107660346A (zh) * 2015-03-25 2018-02-02 三星电子株式会社 用于在无线通信系统中下载简档的方法和设备
CN110235423A (zh) * 2017-01-27 2019-09-13 瑞典爱立信有限公司 对用户设备的辅认证
WO2020173863A1 (en) * 2019-02-27 2020-09-03 Telefonaktiebolaget Lm Ericsson (Publ) Non-public network authentication in 5g
WO2020224622A1 (zh) * 2019-05-07 2020-11-12 华为技术有限公司 一种信息配置方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107660346A (zh) * 2015-03-25 2018-02-02 三星电子株式会社 用于在无线通信系统中下载简档的方法和设备
CN110235423A (zh) * 2017-01-27 2019-09-13 瑞典爱立信有限公司 对用户设备的辅认证
WO2020173863A1 (en) * 2019-02-27 2020-09-03 Telefonaktiebolaget Lm Ericsson (Publ) Non-public network authentication in 5g
WO2020224622A1 (zh) * 2019-05-07 2020-11-12 华为技术有限公司 一种信息配置方法及装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "SNPN and Service Provider (SP) separation", 3GPP DRAFT; R3-210637, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG3, no. Online; 20210125 - 20210205, 14 January 2021 (2021-01-14), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051973082 *
HUAWEI, HISILICON: "New Solution external authentication and authorization", 3GPP DRAFT; S2-2000646, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Incheon, South Korea; 20200113 - 20200117, 7 January 2020 (2020-01-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051842703 *

Similar Documents

Publication Publication Date Title
US11849385B2 (en) Target cell access method and device
US11510059B2 (en) Data security processing method and apparatus
US10313997B2 (en) User equipment registration method for network slice selection and network controller and network communication system using the same
US20200128614A1 (en) Session processing method and device
US11576112B2 (en) Discovery and security in LWA communication
JPWO2018029933A1 (ja) 無線アクセスネットワークノード、無線端末、コアネットワークノード、及びこれらの方法
US20210051746A1 (en) Multi-Connectivity Communication Method and Device
WO2020135850A1 (zh) 通信方法和装置
US11871223B2 (en) Authentication method and apparatus and device
US11425764B2 (en) Communication method and communications apparatus for reporting establishment causes
CN113286332B (zh) 一种信息传输方法及设备
US20190349406A1 (en) Method, Apparatus, And System For Protecting Data
US20230048066A1 (en) Slice authentication method and apparatus
US20220086145A1 (en) Secondary Authentication Method And Apparatus
WO2022155796A1 (zh) 通信方法以及相关装置
TWI799064B (zh) 一種金鑰標識的生成方法以及相關裝置
US11368949B2 (en) Information indication method and apparatus
TW202306403A (zh) 用於使用使用者裝備識別符進行認證之方法、設備及電腦程式產品
AU2017443403A1 (en) Method and terminal for redirecting network, access network device, and mobile management device
WO2021254172A1 (zh) 一种通信方法以及相关装置
EP4156741A1 (en) Slice service verification method and apparatus
WO2022073236A1 (zh) 一种支持在线签约的网络注册方法及其装置
CN115567934A (zh) 一种认证方法及通信装置
CN115250511A (zh) 通信方法及通信装置
CN115396873A (zh) 一种通信方法、装置、服务器及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21920201

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21920201

Country of ref document: EP

Kind code of ref document: A1