WO2022160315A1 - Procédé et appareil de communication - Google Patents

Procédé et appareil de communication Download PDF

Info

Publication number
WO2022160315A1
WO2022160315A1 PCT/CN2021/074556 CN2021074556W WO2022160315A1 WO 2022160315 A1 WO2022160315 A1 WO 2022160315A1 CN 2021074556 W CN2021074556 W CN 2021074556W WO 2022160315 A1 WO2022160315 A1 WO 2022160315A1
Authority
WO
WIPO (PCT)
Prior art keywords
network device
terminal device
network
ncc
rnti
Prior art date
Application number
PCT/CN2021/074556
Other languages
English (en)
Chinese (zh)
Inventor
陈磊
李秉肇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2021/074556 priority Critical patent/WO2022160315A1/fr
Publication of WO2022160315A1 publication Critical patent/WO2022160315A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity

Definitions

  • the present application relates to the field of communication, and in particular, to a communication method and device.
  • RRC radio resource control
  • the terminal device in the connected state can perform data transmission with network devices, such as with a base station (basic station, BS), while the terminal device in the non-active state wants to perform data transmission with the network device.
  • Enter connected state That is to say, the terminal device in the inactive state needs to enter the connection state first, and then perform data transmission with the network device. In this way, unnecessary power consumption and signaling overhead will be caused. Therefore, in the 5G communication system, a data transmission method called "data early transmission” or “data forward transmission” is introduced, that is, the terminal device can perform data transmission with the network device without entering the connection state, which can effectively improve the Data transmission efficiency, reducing the energy consumption of terminal equipment.
  • data early transmission or “data forward transmission”
  • the embodiments of the present application provide a communication method and device, which can effectively reduce data transmission delay and improve data transmission efficiency and reliability.
  • a communication method includes sending a first radio resource control RRC message to a first network device, and reselection from a cell of the first network device to a cell of the second network device. Wherein, the terminal device remains in an inactive state.
  • the terminal device since the terminal device performs cell reselection after sending the first RRC message to the first network device, it can still remain in the inactive state, and will not be released to the idle state. As a result, the data transmission is interrupted and the data transmission delay increases, so that the terminal device can still directly use the inactive state to transmit data after cell reselection, so as to effectively reduce the data transmission delay and improve the data transmission efficiency and reliability.
  • the method described in the first aspect may further include: sending a second RRC message to the second network device.
  • the second RRC message may include: the first inactive wireless network temporary identifier I-RNTI.
  • the first I-RNTI may be allocated by the third network device to the terminal device.
  • the third network device may be an anchor network device of the terminal device.
  • the second RRC message may further include: the first truncated integrity message authentication code MAC-I.
  • the first truncated MAC-I may be determined according to a cell configuration parameter of the third network device and the first key.
  • the first key may be determined by calculating the NCC according to the first next-hop chain.
  • the first NCC is allocated by the third network device to the terminal device.
  • the anchor network device after the terminal device performs cell reselection is still the third network device, the resource overhead caused by switching the anchor network device can be avoided, and the communication efficiency can be further improved.
  • the method described in the first aspect may further include: before performing cell reselection, receiving the first information from the first network device.
  • the first information may include: the second I-RNTI and the second NCC.
  • the second I-RNTI may be allocated by the first network device or the third network device for the terminal device.
  • the second NCC may be allocated to the terminal device by the first network device or by the third network device.
  • the third network device is the anchor network device of the terminal device.
  • the method described in the first aspect may further include: sending a second RRC message to the second network device.
  • the second RRC message may carry the second I-RNTI and the second truncated MAC-I.
  • the second truncated MAC-I may be determined according to a cell configuration parameter of the first network device and the second key.
  • the second key is determined according to the second NCC.
  • the first network device may send the first RRC message to the terminal device after the first RRC message, for example, after the data transmission ends or the connection state is restored.
  • the first information is sent to the terminal device before the RRC release message indicating the end of data transmission or the end of connection state data transmission is sent, and the second I-RNTI and the second NCC are sent by prepending.
  • the terminal device is instructed to remain in the inactive state, so that the terminal device can continue to transmit data according to the pre-obtained second I-RNTI and the second NCC before and after cell reselection, so as to effectively improve the data transmission efficiency.
  • the method of the first aspect may further include: receiving a third RRC message from the second network device.
  • the third RRC message may be an RRC release message, where the third RRC message may include: a third I-RNTI and a third NCC.
  • the third I-RNTI and the third NCC may be allocated by the second network device to the terminal device.
  • the third I-RNTI may be different from the second I-RNTI, and/or the third NCC may be different from the second NCC.
  • the third RRC message may further instruct the terminal device to use the second I-RNTI and the second NCC. In this way, the terminal device can be flexibly instructed to update or continue to use the original I-RNTI and/or NCC according to the actual application scenario.
  • the terminal device is instructed to use the updated I-RNTI and NCC.
  • the terminal device is instructed to use the original I-RNTI and NCC to avoid the resource overhead caused by updating the I-RNTI and/or NCC.
  • the method described in the first aspect may further include: sending a Packet Data Convergence Protocol PDCP status report to the second network device, so that the second network device can send the terminal device to the terminal device according to the PDCP status report. Data not received by the device.
  • the terminal device when sending the RRC message, the terminal device can package and send the PDCP status report with the RRC message, thereby reducing signaling overhead and further improving communication efficiency.
  • the method described in the first aspect may be executed by a terminal device, a chip (system) or other components or components provided in the terminal device, and may also be executed by an apparatus including a terminal device. This is not limited.
  • a communication method includes receiving a first RRC message from a terminal device. Wherein, if the terminal device performs cell reselection after sending the RRC message, the terminal device remains in an inactive state.
  • the terminal device is reselected from the cell of the first network device to the cell of the second network device
  • the method described in the second aspect may further include: sending the first data of the terminal device to the second network device .
  • the terminal device is reselected from the cell of the first network device to the cell of the second network device
  • the method described in the second aspect may further include: sending the first network device of the terminal device to the third network device.
  • the third network device is an anchor network device of the terminal device. In this way, the third network device can forward the first data to the terminal device, thereby avoiding data loss of the terminal device, and further improving the reliability of communication.
  • the method described in the second aspect may further include: sending the first information to the terminal device.
  • the first information may include: the second I-RNTI and the second NCC.
  • the second I-RNTI is allocated by the first network device or the third network device to the terminal device
  • the second NCC is allocated by the first network device or the third network device for the terminal device
  • the third The network device is the anchor network device of the terminal device.
  • the method described in the second aspect may further include: sending a context recovery request message to a third network device, and receiving a context recovery response message from the third network device.
  • the third network device may be: an anchor network device of the terminal device.
  • the context restoration response message may include the first information.
  • the method described in the second aspect may further include: receiving a PDCP status report from the terminal device.
  • the method described in the second aspect may be executed by the first network device, or may be executed by a chip (system) or other components or components provided in the first network device, or may be executed by the first network device including the first network device. This is not limited in this application.
  • a communication method is provided.
  • the method is applied to the second network device or a chip in the second network device.
  • the method includes: sending the second information to the third network device, thereby receiving the first data from the first network device, so as to send the first data to the terminal device.
  • the second information is used to request the first data of the terminal device.
  • the third network device may be an anchor network device of the terminal device.
  • the first network device may reselection for the terminal device to a device corresponding to a cell in which the cell of the second network device resided before.
  • the third network device can instruct the first network device to send the legacy first data to the second network device, so that the terminal device can finally obtain the the first data, thereby avoiding data loss caused by the terminal equipment due to cell reselection, thereby improving the reliability of communication.
  • the method described in the third aspect may further include: receiving a second RRC message from the terminal device.
  • the second RRC message may include: the first I-RNTI.
  • the first I-RNTI may be allocated by the third network device to the terminal device.
  • the second RRC message may further include: the first truncated MAC-I.
  • the first truncated MAC-I may be determined according to the cell configuration parameters of the third network device and the first key, the first key may be determined according to the first NCC, and the first NCC may be the third network
  • the second RRC message may include: the second I-RNTI.
  • the second I-RNTI may be allocated by the first network device or the third network device for the terminal device.
  • the second RRC message may further include: a second truncated MAC-I.
  • the second truncated MAC-I may be determined according to a cell configuration parameter of the first network device and a second key, the second key may be determined according to a second NCC, and the second NCC may be the first network The device or the third network device is allocated for the terminal device.
  • the third network device may be an anchor network device of the terminal device.
  • the method described in the third aspect may further include: receiving a PDCP status report from the terminal device, and sending the PDCP status report to the third network device, so that the third network device can, according to the PDCP status report, Send data to a terminal device that the terminal device has not received. In this way, not only data loss can be avoided, but also redundant data can be avoided to further improve communication efficiency.
  • sending the PDCP status report to the third network device may include: sending a context recovery request message to the third network device.
  • the context recovery request message may include a PDCP status report.
  • the PDCP status report is sent by multiplexing the context recovery request message, which further reduces resource overhead and further improves communication efficiency.
  • the method described in the third aspect may be executed by the second network device, or may be executed by a chip (system) or other components or components provided in the second network device, or may be executed by the second network device including the second network device. This is not limited in this application.
  • a communication device in a fourth aspect, includes: a transceiver module and a processing module.
  • the transceiver module is configured to send the first radio resource control RRC message to the first network device.
  • the processing module is used for the communication apparatus to perform reselection from the cell of the first network device to the cell of the second network device. Wherein, the communication device remains in an inactive state.
  • the transceiver module is further configured to send the second RRC message to the second network device.
  • the second RRC message may include: the first I-RNTI.
  • the first I-RNTI may be allocated by the third network device to the communication apparatus.
  • the third network device may be an anchor network device of the communication apparatus.
  • the second RRC message may further include: the first truncated MAC-I.
  • the first truncated MAC-I may be determined according to a cell configuration parameter of the third network device and the first key.
  • the first key may be determined according to the first NCC.
  • the first NCC is allocated to the communication apparatus by the third network device.
  • the transceiver module is further configured to receive the first information from the first network device.
  • the first information may include: the second I-RNTI and the second NCC.
  • the second I-RNTI may be allocated by the first network device or the third network device for the communication apparatus.
  • the second NCC may be allocated to the communication apparatus by the first network device or the third network device.
  • the third network device may be an anchor network device of the communication apparatus.
  • the transceiver module is further configured to send the second RRC message to the second network device.
  • the second RRC message may carry the second I-RNTI and the second truncated MAC-I.
  • the second truncated MAC-I may be determined according to a cell configuration parameter of the first network device and the second key.
  • the second key may be determined according to the second NCC.
  • the transceiver module is further configured to receive a third RRC message from the second network device.
  • the third RRC message may include: the third I-RNTI and the third NCC.
  • the third I-RNTI and the third NCC may be allocated by the second network device for the communication apparatus.
  • the third I-RNTI may be different from the second I-RNTI, and/or the third NCC may be different from the second NCC; alternatively, the third RRC message instructs the communication apparatus to use the second I-RNTI and the second NCC.
  • the transceiver module is further configured to send a packet data convergence protocol PDCP status report to the second network device.
  • the transceiver module may include a receiving module and a sending module.
  • the receiving module is configured to implement the receiving function of the apparatus described in the fourth aspect.
  • the sending module is configured to implement the sending function of the apparatus described in the fourth aspect.
  • the apparatus according to the fourth aspect may further include a storage module, where the storage module stores programs or instructions.
  • the processing module executes the program or instruction, the apparatus can execute the communication method described in the first aspect.
  • the device described in the fourth aspect may be a terminal device, a chip (system) or other components or components that can be set in the terminal device, or a device including a terminal device. Not limited.
  • a communication device in a fifth aspect, includes: a receiving module.
  • the receiving module is configured to receive the first RRC message from the terminal device. Wherein, if the terminal device performs cell reselection after sending the RRC message, the terminal device remains in an inactive state.
  • the terminal equipment is reselected from the cell of the communication apparatus to the cell of the second network equipment
  • the apparatus according to the fifth aspect may further include: a sending module.
  • the sending module is configured to send the first data of the terminal device to the second network device.
  • the terminal equipment is reselected from the cell of the communication apparatus to the cell of the second network equipment, and the apparatus according to the fifth aspect may further include: a sending module.
  • the sending module is configured to send the first data of the terminal device to the third network device.
  • the third network device may be an anchor network device of the terminal device.
  • the apparatus described in the fifth aspect may further include: a sending module.
  • the sending module is configured to send the first information to the terminal device.
  • the first information may include: the second I-RNTI and the second NCC.
  • the second I-RNTI may be allocated to the terminal device by the communication apparatus or the third network device.
  • the second NCC may be allocated to the terminal device by the communication apparatus or the third network device.
  • the third network device may be an anchor network device of the terminal device.
  • the sending module before the sending module sends the first information to the terminal device, the sending module is further configured to send a context recovery request message to the third network device, and the receiving module is further configured to receive a context recovery response from the third network device.
  • the third network device may be an anchor network device of the terminal device.
  • the context restoration response message may include the first information.
  • the receiving module is further configured to receive the PDCP status report from the terminal device.
  • the sending module and the receiving module can also be integrated into one module, such as a transceiver module.
  • the transceiver module is used to realize the sending function and the receiving function of the device.
  • the apparatus of the fifth aspect may further include a processing module.
  • the processing module is used to realize the processing function of the device.
  • the apparatus of the fifth aspect may further include a storage module, where the storage module stores programs or instructions.
  • the processing module executes the program or instruction, the apparatus can execute the method described in the second aspect.
  • the device described in the fifth aspect may be a network device, a chip (system) or other components or components that can be arranged in the network device, or a device including a network device. Not limited.
  • a communication device in a sixth aspect, includes: a receiving module and a sending module.
  • the sending module is configured to send the second information to the third network device.
  • the receiving module is configured to receive the first data from the first network device, so that the sending module sends the first data to the terminal device.
  • the second information is used to request the first data of the terminal device.
  • the third network device may be an anchor network device of the terminal device.
  • the first network device may be a device corresponding to a cell in which the terminal device reselection to the cell of the communication apparatus resides before.
  • the receiving module is further configured to receive the second RRC message from the terminal device.
  • the second RRC message may include: the first I-RNTI.
  • the first I-RNTI may be allocated by the third network device to the terminal device.
  • the second RRC message may further include: the first truncated MAC-I.
  • the first truncated MAC-I may be determined according to a cell configuration parameter of the third network device and a first key, and the first key may be determined according to the first NCC.
  • the first NCC may be allocated by the third network device to the terminal device.
  • the second RRC message may include: the second I-RNTI.
  • the second I-RNTI may be allocated by the first network device or the third network device for the terminal device.
  • the second RRC message may further include: a second truncated MAC-I.
  • the second truncated MAC-I may be determined according to a cell configuration parameter of the first network device and a second key, and the second key may be determined according to the second NCC.
  • the second NCC may be allocated to the terminal device by the first network device or by the third network device.
  • the third network device may be an anchor network device of the terminal device.
  • the receiving module is further configured to receive the PDCP status report from the terminal device.
  • the sending module is further configured to send the PDCP status report to the third network device, so that the third network device can send data that the terminal device has not received to the terminal device according to the PDCP status report.
  • the sending module is further configured to send a context recovery request message to the third network device.
  • the context recovery request message may include a PDCP status report.
  • the sending module and the receiving module can also be integrated into one module, such as a transceiver module.
  • the transceiver module is used to realize the sending function and the receiving function of the device.
  • the apparatus of the sixth aspect may further include a processing module.
  • the processing module is used to realize the processing function of the device.
  • the apparatus of the sixth aspect may further include a storage module, where the storage module stores programs or instructions.
  • the processing module executes the program or instruction, the apparatus can execute the method described in the third aspect.
  • the device described in the sixth aspect may be a network device, a chip (system) or other components or components that can be arranged in a network device, or a device including a network device. Not limited.
  • a communication device in a seventh aspect, may comprise means for performing the method as described in the first aspect.
  • the communication apparatus described in the seventh aspect includes corresponding modules, units, or means for implementing the method described in the first aspect, and the modules, units, or means may be implemented by hardware, software, or by The hardware executes the corresponding software implementation.
  • the hardware or software includes one or more modules or units for performing the functions involved in the above communication method.
  • a communication device comprising means for performing the method as described in the second aspect or the third aspect.
  • the communication device described in the eighth aspect includes corresponding modules, units, or means for implementing the methods described in the second aspect or the third aspect, and the modules, units, or means may be implemented by hardware, and software Realize, or execute corresponding software through hardware.
  • the hardware or software includes one or more modules or units for performing the functions involved in the above communication method.
  • a communication device may include: a processor and a memory, the processor and the memory are coupled, and the processor is configured to control the apparatus to implement the method as described in the first aspect.
  • the apparatus of the ninth aspect may further include: a receiver and a transmitter.
  • the receiver is used to implement the receiving function of the device
  • the transmitter is used to implement the transmitting function of the device.
  • the transmitter and receiver can also be integrated into one device, such as a transceiver. Wherein, the transceiver is used to realize the sending function and the receiving function of the device.
  • the device described in the ninth aspect may be a terminal device, a chip (system) or other components or components that can be provided in the terminal device, or a device including a terminal device, which is not covered in this application. Do limit.
  • a tenth aspect provides a communication device.
  • the apparatus may comprise: a processor and a memory, the processor and the memory being coupled, and the processor is configured to control the apparatus to implement the method as described in the second aspect or the third aspect.
  • the apparatus of the tenth aspect may further include: a receiver and a transmitter.
  • the receiver is used to implement the receiving function of the device
  • the transmitter is used to implement the transmitting function of the device.
  • the transmitter and receiver can also be integrated into one device, such as a transceiver. Wherein, the transceiver is used to realize the sending function and the receiving function of the device.
  • the device described in the tenth aspect may be a network device, a chip (system) or other components or components that can be provided in a network device, or a device including a network device, which is not covered in this application. Do limit.
  • a communication device may comprise: a processor and an interface circuit for receiving signals from other communication apparatuses other than the communication apparatus and transmitting to the processor or sending signals from the processor to other communication apparatuses than the communication apparatus
  • An apparatus, a processor, is used to implement the method according to the first aspect by means of logic circuits or executing code instructions.
  • the apparatus of the eleventh aspect may further include: a receiver and a transmitter.
  • the receiver is used to implement the receiving function of the device
  • the transmitter is used to implement the transmitting function of the device.
  • the transmitter and receiver can also be integrated into one device, such as a transceiver. Wherein, the transceiver is used to realize the sending function and the receiving function of the device.
  • the apparatus of the eleventh aspect may further include a memory, where the memory stores programs or instructions.
  • the processor described in the eleventh aspect executes the program or the instruction, the apparatus can execute the method described in the first aspect.
  • the device described in the eleventh aspect may be a terminal device, a chip (system) or other components or components that can be provided in the terminal device, or a device including a terminal device. Not limited.
  • a twelfth aspect provides a communication device.
  • the apparatus may comprise: a processor and an interface circuit for receiving signals from other communication apparatuses other than the communication apparatus and transmitting to the processor or sending signals from the processor to other communication apparatuses than the communication apparatus
  • An apparatus, a processor, is used to implement the method according to the second aspect or the third aspect by means of a logic circuit or executing code instructions.
  • the apparatus of the twelfth aspect may further include: a receiver and a transmitter.
  • the receiver is used to implement the receiving function of the device
  • the transmitter is used to implement the transmitting function of the device.
  • the transmitter and receiver can also be integrated into one device, such as a transceiver. Wherein, the transceiver is used to realize the sending function and the receiving function of the device.
  • the apparatus of the twelfth aspect may further include a memory, where the memory stores programs or instructions.
  • the processor of the twelfth aspect executes the program or the instruction, the apparatus can execute the method of the second aspect or the third aspect.
  • the device described in the twelfth aspect may be a network device, a chip (system) or other components or components that can be provided in a network device, or a device including a network device. Not limited.
  • a thirteenth aspect provides a computer-readable storage medium.
  • the computer-readable storage medium may include a computer program or instructions that, when run on a computer, cause the computer to perform the method as described in the first, second or third aspects.
  • a fourteenth aspect provides a computer program product.
  • the computer program product may comprise a computer program or instructions which, when run on a computer, cause the computer to perform the method of the first, second or third aspect.
  • FIG. 1 is a schematic diagram of state transition of a terminal device according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a deduction process of a key in an embodiment of the present application
  • FIG. 3 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a communication method provided by an embodiment of the present application in a first application scenario
  • FIG. 6 is a schematic flowchart of a communication method provided by an embodiment of the present application in a second application scenario
  • FIG. 7 is a schematic structural diagram 1 of a communication device provided by an embodiment of the present application.
  • FIG. 8 is a second schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 9 is a third schematic structural diagram of a communication apparatus according to an embodiment of the present application.
  • the idle state may be the state in which the terminal device is not connected to the network device.
  • the idle state referred to in this application generally refers to the RRC idle state without special description.
  • the terminal device may perform procedures such as public land mobile network (public land mobile network, PLMN) selection, cell selection, cell reselection, and system message broadcasting.
  • PLMN public land mobile network
  • the terminal device because the terminal device is not connected to the network device, does not access the network, does not occupy the service resources of the network device, and does not obtain the context and key of the terminal device, so the service data cannot be transmitted.
  • the connected state may be the state in which the terminal device completes the connection with the network device.
  • the connected state referred to in this application generally refers to the radio resource control RRC connected state unless otherwise specified.
  • the terminal device may obtain the context and the key from the network device, so as to transmit service data by using the context and the key.
  • the terminal device can enter the connected state from the idle state.
  • the terminal device in the idle state, can establish a connection with the network device by sending an RRC message, such as an RRC connection establishment request (RRC concept establish request) message, to the network device.
  • RRC connection establishment request
  • the RRC is connected to enter the connected state.
  • the terminal device can also enter the connected state from the inactive state.
  • the terminal device in the inactive state, can send an RRC message to the network device, such as an RRC resume request (RRC Resume request) message, to resume and RRC connection between network devices, thus entering the connected state.
  • RRC Resume request RRC resume request
  • the terminal device in the connected state, can also be released to the idle state or inactive state according to the RRC message sent by the network device, such as the RRC release message, thereby reducing resource overhead, reducing power consumption, and improving the terminal device. of endurance.
  • the inactive state may be an intermediate state between the connected state and the idle state.
  • the inactive state referred to in this application generally refers to the RRC inactive state without special description, and may also be referred to as the "third state". ".
  • the key can be deleted, but the context is retained, so that it can be quickly restored to the connected state subsequently.
  • the terminal device can perform cell reselection, and can also send an RRC message, such as an RRC recovery request message, to perform early data transmission, so as to reduce resource overhead and improve communication efficiency.
  • the terminal device in the inactive state, can enter the idle state and delete the context after sending an RRC recovery request message, such as receiving an RRC release message.
  • Both terminal equipment and network equipment need to perform key derivation to ensure that the key used for data encryption can be continuously updated to ensure the security of data transmission.
  • the terminal device can perform key deduction by using the algorithm in the context of the terminal device.
  • the terminal device may obtain the key K AMF from the core network in advance, use the key K AMF to deduce the initial key K gNB for key deduction, and use the key K AMF and the initial key K gNB to deduce Show the next hop parameter (NH) used for key derivation, referred to here as NH1.
  • the terminal device may associate a preset next hop chaining count (NCC) 0 with a value of 0 with the initial keys K gNB and NH1 respectively.
  • NCC next hop chaining count
  • the terminal device can determine whether the value of the NCC and the above-mentioned NCC0 are the same. If the same, the terminal device performs horizontal deduction according to the initial key K gNB associated with NCC0, otherwise, performs vertical deduction according to NH1 associated with NCC0, thereby determining the latest key. The following describes the process of horizontal deduction and vertical deduction respectively.
  • the terminal device can perform horizontal deduction, that is, according to the initial key K gNB (the initial key K gNB can be considered as K gNB1 ), the physical cell identity of the cell where the terminal device currently resides (physical cell identifier, PCI) and carrier frequency, deduce the key K gNB2 .
  • the pair of K gNB and NH saved by the terminal device can be updated from the initial keys K gNB and NH1 to the keys K gNB2 and NH1, and the association relationship of NCC0 can be updated as: NCC0 is associated with the keys K gNB2 and NH1 respectively .
  • the terminal device can deduce the key K_RRCint, the key K_RRCenc, the key K_UPenc and the key K_UPint according to the key K gNB2 .
  • the key K_Upint and the key K_RRCint can be used for data integrity protection
  • the key K_RRCenc and the key K_UPenc can be used for data encryption.
  • the terminal device receives the above-mentioned NCC0 from the network device again, it can continue to perform horizontal deduction, that is, deduce the key K gNB3 according to the key K gNB2 , the PCI and carrier frequency of the cell where the terminal device currently resides.
  • the pair of K gNB and NH saved by the terminal device can be updated from the keys K gNB2 and NH1 to the keys K gNB3 and NH1, and the association relationship of NCC0 can also be updated as: NCC0 is associated with the keys K gNB3 and NH1 respectively.
  • the terminal device can deduce the key K_RRCint, the key K_RRCenc, the key K_UPenc and the key K_UPint according to the key K gNB3 , and delete the key K_RRCint, the key K_RRCenc, the key K_UPenc and the key K_UPint derived last time , and so on.
  • the terminal device receives the NCC2 from the network device, and the value of the NCC2 is 2, which is different from the value of the NCC0 of 0, the vertical deduction can be performed, that is, the NH2 can be deduced according to the keys KAMF and NH1. And according to the key NH1, the PCI and carrier frequency of the cell where the terminal device currently resides, the key K gNB4 is deduced .
  • the pair of K gNB and NH stored by the terminal device can be updated from the initial keys K gNB and NH1 to the keys K gNB4 and NH4, and the association relationship can also be updated so that NCC2 is associated with the keys K gNB4 and NH2 respectively.
  • the terminal device can deduce the key K_RRCint, the key K_RRCenc, the key K_UPenc and the key K_UPint according to the key K gNB4 .
  • the terminal device After that, if the terminal device receives NCC3 from the network device again, and the value of NCC3 is 3, which is different from the value of NCC2 of 2, it can continue to perform vertical deduction, that is, it can be deduced according to the keys K AMF and NH2. Perform NH3, and deduce the performance key K gNB7 according to NH2, the PCI and carrier frequency of the cell where the terminal device currently resides. In this way, a pair of K gNB and NH saved by the terminal device can be updated from K gNB4 and NH2 to keys K gNB7 and NH3, and the association relationship can also be updated so that NCC3 is associated with keys K gNB7 and NH3 respectively.
  • the terminal device can deduce the key K_RRCint, the key K_RRCenc, the key K_UPenc and the key K_UPint according to the key K gNB7 , and delete the key K_RRCint, the key K_RRCenc, the key K_UPenc and the key that were previously derived K_UPint, and so on.
  • NCC0 can associate the initial key K gNB and NH1 or associate K gNB2 and NH1
  • NCC2 can associate K gNB4 and NH2 or associate K gNB5 and NH2
  • NCC3 can be associated with K gNB7 and NH3 or associated with K gNB8 and NH3. In this way, the terminal device can quickly perform horizontal deduction or vertical deduction according to a pair of NH and K gNB associated with NCC to ensure the deduction efficiency of the key.
  • the terminal device can reselect to another cell from the cell it is currently camping on, such as reselecting to a cell with better signal and completing the camping in the reselected cell.
  • the cell reselection may include intra-site reselection and inter-site reselection. Intra-site reselection refers to terminal equipment reselection from one cell of the same base station to another cell, while inter-site reselection refers to terminal equipment reselection from a cell of one base station to a cell of another base station.
  • the terminal device if the terminal device is in the inactive state and performs cell reselection after sending the RRC message, the terminal device will be released from the inactive state to the idle state, thereby causing data transmission in the inactive state to be interrupted, thereby affecting data transmission. Efficiency and reliability. After the data transmission is interrupted, since the terminal device can only retransmit when it enters the connected state next time, the data transmission delay will also be increased.
  • WiFi wireless fidelity
  • V2X vehicle-to-everything
  • D2D device-todevie
  • Communication systems Internet of Vehicles communication systems
  • 4th generation (4G) mobile communication systems such as long term evolution (LTE) systems
  • WiMAX worldwide interoperability for microwave access
  • 5th generation (5G) mobile communication systems such as new radio (NR) systems
  • 6G 6th generation
  • the network architecture and service scenarios described in the embodiments of the present application are for the purpose of illustrating the technical solutions of the embodiments of the present application more clearly, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application.
  • the evolution of the architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
  • FIG. 3 is a schematic structural diagram of a communication system to which the communication method provided by the embodiment of the present application is applied.
  • the communication system may include: at least one network device, such as a first network device, a second network device and a third network device, and at least one terminal device.
  • the above-mentioned first network device, second network device and third network device may be collectively referred to as network device, and the network device is located on the network side of the above-mentioned communication system and has a wireless transceiver function or a chip that can be installed in the device. or system-on-chip.
  • the network devices include but are not limited to: access points (APs) in wireless fidelity (WiFi) systems, such as home gateways, routers, servers, switches, bridges, etc., evolved Node B (evolved Node B (eNB), Radio Network Controller (RNC), Node B (Node B, NB), Base Station Controller (BSC), Base Transceiver Station (BTS), Home Base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (BBU), wireless relay node, wireless backhaul node, transmission point (transmission and reception point, TRP or transmission point, TP) etc., it can also be 5G, such as a gNB in a new radio (NR) system, or a transmission point (TRP or TP), one or a group (including multiple antenna panels) antennas of a base station in a 5G system
  • the panel alternatively, can also be a network node that constitutes a gNB or a transmission point, such as a baseband
  • the above-mentioned terminal equipment is a terminal that is connected to the above-mentioned communication system and has a wireless transceiver function, or a chip or a chip system that can be provided in the terminal.
  • the terminal equipment may also be referred to as user equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, User Agent or User Device.
  • UE user equipment
  • the terminal device in the embodiment of the present application may be a mobile phone, a tablet computer, a computer with a wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless device in industrial control Terminal, wireless terminal in unmanned driving, wireless terminal in telemedicine, wireless terminal in smart grid, wireless terminal in transportation safety, wireless terminal in smart city, wireless terminal in smart home, in-vehicle terminal, terminal with terminal Functional RSU et al.
  • the terminal device of the present application may also be an on-board module, on-board module, on-board component, on-board chip or on-board unit built into the vehicle as one or more components or units.
  • the vehicle-mounted component, the vehicle-mounted chip or the vehicle-mounted unit can implement the communication method provided in this application.
  • the communication method provided by the embodiment of the present application can be applied between any two, three or four nodes shown in FIG. 3 , such as between a terminal device and a first network device, and the specific implementation can refer to The following method embodiments will not be repeated here.
  • FIG. 3 is only a simplified schematic diagram for easy understanding, and the communication system may further include other network devices and/or other terminal devices, which are not shown in FIG. 3 .
  • FIG. 4 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • the method may be performed by a terminal device, a chip (system) or other components or components in the terminal device, or an apparatus including the terminal device, the first network device, a chip (system) or other components or components in the first network device, or An apparatus including the first network device, a second network device (not shown in FIG. 3 ), a chip (system) or other component or component in the second network device, or an apparatus including the second network device, and a third network
  • the device (not shown in FIG. 3 ), the chip (system) or other components or components in the third network device, or the apparatus including the third network device cooperate and execute, so as to realize the connection between any number of nodes shown in FIG. 3 Communication.
  • terminal equipment terminal equipment, chips (systems) or other components or components in terminal equipment, or devices including terminal equipment
  • terminal equipment terminal equipment
  • terminal equipment the first network equipment, the first network equipment in the first network equipment
  • the chip (system) or other components or components of the second network device, or the device including the first network device” are collectively referred to as “the first network device”, and the “second network device, the chip (system) or other components in the second network device or components, or devices including the second network equipment” are collectively referred to as “second network equipment”, and “third network equipment, chips (systems) or other components or components in third network equipment, or including third network equipment” “devices” are collectively referred to as "third network equipment”.
  • the communication method may include the following steps:
  • a terminal device sends a first radio resource control RRC message to a first network device, and the first network device receives the first RRC message from the terminal device.
  • the first RRC message may be an RRC resume request message (RRC resume request message).
  • RRC resume request message RRC resume request message
  • the first RRC message may be used for the terminal device to transmit the second data in an inactive state.
  • the second data may be data used by the terminal device for early transmission.
  • the terminal device may package the first RRC message and the second data to generate a protocol data unit (protocol data unit, PDU) of the media access control sublayer protocol (media access control, MAC) layer, Then, it is sent to the first network device through the physical layer, so as to realize early data transmission.
  • the second data may be included in the first RRC message.
  • the first RRC message may not only be used for the above-mentioned data transmission, but also may be used for the terminal device to request to restore from the inactive state to the connected state.
  • the terminal device may send the first RRC message alone without carrying the second data, so as to request to restore from the inactive state to the connected state.
  • the first RRC message may include: a first inactive wireless network temporary identifier (inactive-radio network temporary identifier, I-RNTI), and a third truncated (short) integrity message authentication code (message authentication code for integrity, MAC-I).
  • I-RNTI active-radio network temporary identifier
  • MAC-I third truncated integrity message authentication code
  • the first I-RNTI may be allocated by the third network device for the terminal device, which corresponds to the context of the terminal device and indicates that the context is stored in the third network device.
  • the third network device may be a different network device from the first network device, and is the anchor network device of the terminal device, that is, the terminal device is released to the inactive state by the third network device, or the third network device is a terminal device The network device to which the last cell before entering the inactive state belongs.
  • the third truncated MAC-I can be used for security verification. It is calculated by the terminal device using the integrity protection algorithm in the stored security context, the third key and the first related parameters, and the length can be 16 bits. .
  • the above-mentioned third key may be K_RRCint 1 .
  • the above-mentioned first related parameters may include: a radio network temporary identifier (cell radio network temporary identifier, C-RNTI) used by the terminal device when camping on the cell of the third network device, the PCI of the cell of the third network device, the first network The cell identity document (cell-ID) of the cell of the device.
  • the cell of the first network device is the cell where the terminal device currently resides.
  • the terminal device may also camp on or enter the connected state in the cell of the third network device.
  • the third network device may send a fourth RRC message to the terminal device, such as sending an RRC release message.
  • the fourth RRC message may carry the first I-RNTI and the first NCC allocated by the third network device to the terminal device.
  • the terminal device may also determine whether the first NCC in the fourth RRC message is associated with a pair of NH and KgNB saved by the terminal device. If associated, the terminal device may retain the KgNB1 for subsequent execution of the horizontal deduction; otherwise, the terminal device may delete the KgNB1 for subsequent execution of the vertical deduction.
  • the terminal device may send the above-mentioned first RRC message to the first network device.
  • the terminal device may start a timer (timer) with a predetermined duration, so that the terminal device can determine whether the data transmission ends or whether to return to the connected state. For example, if the terminal device receives a response message from the first network device before the timing ends, or the terminal device does not receive the response message after the timing ends, it is determined that the data transmission ends or the connection state is restored.
  • the response message may be an RRC release message.
  • the terminal device can also use the algorithm in the context of the terminal device and the first NCC to perform horizontal deduction or vertical deduction, so as to obtain the latest key K gNB2 to derive K_RRCint 2 (the first key K gNB2 ) according to the key K gNB2 ), the key K_RRCenc 2 , the key K_UPenc 2 , and the key K_UPint 2 , and delete the key K_RRCint 1 (the third key) derived last time.
  • the terminal device may continue to retain the first NCC, so that the first NCC can be used in subsequent horizontal deduction.
  • the first network device receives the first RRC message, it can determine that the anchor network device is the third network device according to the first I-RNTI in the first RRC message, so as to send the context recovery to the third network device.
  • a request (retrieve UE context rquest) message for example, a context recovery request message may be sent to the third network device through the Xn interface.
  • the context recovery request message may carry the first I-RNTI, the third truncated MAC-I, and the PCI of the cell of the first network device.
  • the third network device can determine whether there is a context corresponding to the first I-RNTI (the context of the terminal device) according to the context recovery request message, and determine the third truncated MAC-I and the fourth truncated MAC-I Whether the MAC-I is consistent.
  • the fourth truncated MAC-I may be determined by the third network device according to the above-mentioned first relevant parameter and the above-mentioned third key.
  • the third network device determines that there is no context corresponding to the first I-RNTI, and/or the third truncated MAC-I is inconsistent with the fourth truncated MAC-I, it means that the verification fails, and the process of the method ends . If the third network device determines that there is a context corresponding to the first I-RNTI, and the third truncated MAC-I is consistent with the fourth truncated MAC-I, it indicates that the verification is passed. In this way, the third network device can use the algorithm in the context and the first NCC to perform horizontal deduction or vertical deduction to obtain a key corresponding to the first key, and send a context recovery response (retrieve UE) to the first network device context response) message.
  • the key corresponding to the first key may be K gNB2 , or may also be the key K_RRCint 2 (the first key), the key K_RRCenc2 , the key K_UPenc2 and the key K_UPint derived from the K gNB2 2 .
  • the first network device can use the K gNB2 to deduce the key K_RRCint 2 , the key K_RRCenc 2 , the key K_UPenc 2 , and the key K_UPint 2 again.
  • the context recovery response message may carry the corresponding key, the first NCC and the context of the terminal device, so that the first network device can communicate with the terminal device according to the corresponding key, the first NCC and the context of the terminal device.
  • the third network device can send the first data to the first network device, so that the first network device can forward the first data to the terminal device.
  • the first data may be service data of the terminal device received by the third network device from a core network element, such as a user plane function (user plane function, UPF) network element.
  • a core network element such as a user plane function (user plane function, UPF) network element.
  • the context of the terminal device in the context recovery response message can be returned to the access and mobility management function (access and mobility management function, AMF) according to the context of the terminal device in the context recovery response message.
  • AMF access and mobility management function
  • the bearer can be changed from “terminal device ⁇ third network device ⁇ UPF network element” ” is modified to “terminal device ⁇ first network device ⁇ UPF network element”, so that the first network device can receive the first data from the terminal device of the core network and forward it to the terminal device.
  • the AFM network element may send a path switch request acknowledgment (path switch request ACK) message to the first network device to inform the first network device that the path switch is completed.
  • path switch request ACK path switch request acknowledgment
  • the first network device receives the path switching request confirmation message from the AMF network element, and the terminal device is still resident in the cell of the first network device, it can send (UE context rlease message) to the third network device, So that the third network device releases the context of the terminal device and the first I-RNTI to save resources; otherwise, it is not necessary to send the terminal device context release message to the third network device, so that the terminal device can be reselected to the second network device (specifically Please refer to the following cell in S402, step 1), the second network device can find the third network device according to the first I-RNTI, and obtain the context of the terminal device from the third network device.
  • the first network device receives the above-mentioned second data, it may send the second data to the UPF network element (not shown in FIG. 4 ) after receiving the path switching request confirmation message.
  • the above content is introduced by taking the inter-site cell reselection as an example, that is, the first network device and the third network device are different network devices, but this is not a limitation.
  • the third network device may receive the above-mentioned first RRC message from the terminal device, and use the above-mentioned first key and the pre-stored context of the terminal device , communicate with the terminal device normally.
  • the terminal device reselects from the cell of the first network device to the cell of the second network device.
  • the terminal device performs cell reselection, such as reselection from the cell of the first network device to the cell of the second network device, before the data transmission ends or is restored to the connected state, the terminal device remains in the inactive state instead of will be released to idle state.
  • the second network device and the first network device may be different network devices.
  • the specific implementation of the terminal device performing cell reselection before the data transmission ends or before returning to the connected state and remains in the inactive state may refer to the following related content in the second implementation scenario.
  • the method may further include: Step 1, the terminal device sends a second RRC message to the second network device, and the second network device sends a second RRC message to the second network device. A second RRC message from the terminal device is received.
  • the second RRC message may be an RRC recovery request message, including: the above-mentioned first I-RNTI and the first truncated MAC-I.
  • the first truncated MAC-I can be used for security verification, and is determined by the terminal device according to the second related parameter and the above-mentioned first key, and the length can also be 16 bits.
  • the above-mentioned second related parameters may include: C-RNTI used by the terminal device when camping on the cell of the first network device, PCI of the cell of the first network device, and cell-ID of the cell of the second network device.
  • the cell of the second network device is the cell where the terminal device currently resides.
  • the second RRC message may be used by the terminal device to transmit third data in an inactive state.
  • the third data may be data used by the terminal device for early transmission, and may be the same as or different from the second data.
  • the terminal device may package the second RRC message and the third data to generate a PDU of the MAC layer, and then send it to the PDU through the physical layer, thereby realizing early data transmission.
  • the third data may also be included in the second RRC message.
  • the second RRC message may not only be used for the above-mentioned data transmission, but also may be used for the terminal device to request to restore from the inactive state to the connected state.
  • the terminal device may send the second RRC message alone without carrying the third data, so as to request to restore from the inactive state to the connected state.
  • the terminal device after the terminal device sends the second RRC message, it can also use the algorithm in the context of the terminal device and the pre-reserved first NCC to perform horizontal deduction, so as to obtain the key Kg NB3 , which can be deduced according to the key Kg NB3 K_RRCint 3 , key K_RRCenc 3 , key K_UPenc 3 , and key K_UPint 3 , and delete key K_RRCint 2 (first key), key K_RRCenc 2 , key K_UPenc 2 , and key K_UPint 2 from the last derivation .
  • the second network device receives the second RRC message, it can determine that the anchor network device is the third network device according to the first I-RNTI in the second RRC message, so as to send the context recovery to the third network device.
  • a context recovery request message may be sent to the third network device through the Xn interface.
  • the context recovery request message may carry the first I-RNTI, the first truncated MAC-I, and the PCI of the cell of the second network device.
  • the third network device can determine whether there is a context corresponding to the first I-RNTI (the context of the terminal device) according to the context recovery request message, and determine the first truncated MAC-I and the fifth truncated MAC-I Is I consistent.
  • the fifth truncated MAC-I may be determined by the third network device according to the second related parameter and the first key.
  • the third network device determines that the first truncated MAC-I is inconsistent with the fifth truncated MAC-I, it indicates that the verification fails, and the process of the method ends. If the third network device determines that the first truncated MAC-I is consistent with the fifth truncated MAC-I, it indicates that the verification is passed. In this way, the third network device can use the algorithm in the context and the first NCC to perform horizontal deduction to obtain a key corresponding to K_RRCint 3 , and send a context recovery response message to the second network device.
  • the corresponding key may be Kg NB3 , or may also be the key K_RRCint 3 , the key K_RRCenc 3 , the key K_UPenc 3 , and the key K_UPint 3 derived by using the Kg NB3 .
  • the second network device can use the KgNB 3 to deduce the key K_RRCint 3 , the key K_RRCenc 3 , the key K_UPenc 3 and the key K_UPint 3 again.
  • the context recovery response message may carry the corresponding key, the first NCC and the context of the terminal device, so that the second network device can communicate with the terminal device according to the corresponding key, the first NCC and the context of the terminal device.
  • step 1 since the anchor network device after the terminal device performs cell reselection is still the third network device, the resource overhead caused by switching the anchor network device can be avoided, and the communication efficiency can be further improved.
  • the method may further include: step 2, the second network device sends second information to the third network device, and the third The network device receives the second information from the second network device.
  • the second information can be used to request the first data of the terminal device, and can be carried in an address indication (address indication) message, including one or more of the following: the identification of the terminal device, the first address or the second address.
  • the first data may be data obtained by the first network device from the third network device and/or from the core network.
  • the first address may be an address allocated by the second network device for a quality of service (quality of service, QoS) flow of the terminal device
  • the second address may be a data radio bearer (data radio bearer) mapped by the second network device for the QoS flow, DRB) assigned address.
  • the second network device may send the second information to the third network device according to the context in the context recovery response message, for example, may send the second information to the third network device through the Xn interface An address indication message carrying the second information.
  • the third network device may instruct the first network device to send the first data to the second network device according to the second information.
  • the third network device may forward the second information to the second network device, such as forwarding the address indication carrying the second information to the second network device through the Xn interface. information.
  • the second network device can find the corresponding first data according to the identifier of the terminal device in the second information.
  • the first network device may send the data corresponding to the QoS flow in the first data to the second network device according to the first address, and/or send the data corresponding to the DRB in the first data to the second network device according to the second address .
  • the third network device may send the address of the third network device and the identifier of the terminal device to the second network device.
  • the address of the third network device may be an internet protocol (internet protocol, IP) address
  • the address and the identifier may be carried in an address indication message
  • the address indication message may be sent to the first network device through the Xn interface.
  • the second network device can find the corresponding first data according to the identifier, and send the first data to the third network device according to the address.
  • the third network can send the data corresponding to the QoS flow in the first data to the sending second network device according to the first address in the second information, and/or, according to the second address in the second indication information, Send the data corresponding to the DRB in the first data to the sending second network device.
  • the second network device receives the first data from the first network device, and sends the first data to the terminal device to implement data retransmission, thereby avoiding data loss.
  • the method may further include: Step 3, the first network device sends the first information to the terminal device, and the terminal The device receives the first information from the first network device.
  • the first information may include: the second I-RNTI and the second NCC.
  • the second I-RNTI may be allocated by the first network device or the third network device for the terminal device, corresponds to the context of the terminal device and indicates that the context is stored in the first network device, and is the same as the above-mentioned first I-RNTI or different.
  • the second NCC may be used for key derivation, is allocated by the first network device or the third network device for the terminal device, and is the same as or different from the above-mentioned first NCC.
  • the terminal device After receiving the first information, if the terminal device performs cell reselection before data transmission ends or before returning to the connected state, the terminal device remains in the inactive state.
  • the first information is carried in the RRC release message, and at this time, the first information may further include: indication information.
  • the indication information may be a field, such as a field with a length of one bit, used to instruct the terminal device to store the second I-RNTI and the second NCC after receiving the RRC release message, without terminating the current RRC connection and continuing the current data transfer process.
  • the first information may be generated in two ways, which may be generated by a third network device, or may also be generated by a first network device. They are introduced separately below.
  • the first network device generates
  • the first network device may generate a first message carrying the first information, and send the first message to the terminal device, so as to send the first message to the terminal device.
  • Send the first message can be any of the following: RRC message, such as RRC release message, media access control address control element (media access control address control element, MAC CE) message or downlink control information (downlink control information) , DCI) message.
  • RRC message such as RRC release message, media access control address control element (media access control address control element, MAC CE) message or downlink control information (downlink control information) , DCI) message.
  • the third network device generates
  • the third network device may generate the first information, and send the first information to the first network device carrying the first information
  • the context recovery response message may be directly carried in the context recovery response message, or the first information may be carried in a fifth RRC message, such as an RRC release message, and the fifth RRC message may be further encapsulated in the context recovery response message .
  • the context recovery response message received by the first network device may include the first information or include a fifth RRC message carrying the first information.
  • the first network device can not only obtain the deduced key and the context of the terminal device, but also directly obtain the first information or the fifth RRC message carrying the first information, further reducing resource overhead and further improve communication efficiency.
  • the first network device directly obtains the above-mentioned fifth RRC message from the context recovery response message, it can directly forward the fifth RRC message to the terminal device.
  • the first network device directly obtains the above-mentioned first information from the context recovery response message, it may generate a second message carrying the first information, and send the second message to the terminal device.
  • the second message and the first message may be the same or different messages, and the second message may also be any of the following: an RRC message, such as an RRC release message, a MAC CE message, or a DCI message.
  • the terminal device can continue to remain in the inactive state after reselection to the cell of the second network device.
  • the first network device may, after the first RRC message, for example, end data transmission or return to the connected state. Afterwards, an RRC release message is sent to the terminal device, so as to indicate the end of data transmission or return to the connected state through the I-RNTI and NCC carried in the RRC release message.
  • the first network device sends the first information to the terminal device before the data transmission ends or returns to the connected state, and instructs the terminal device by sending the second I-RNTI and the second NCC in advance.
  • the terminal device can continue to transmit data according to the second I-RNTI and the second NCC obtained in advance before and after performing cell reselection, so as to effectively improve the data transmission efficiency.
  • the first network device may still send an RRC release message to the terminal device according to the existing protocol flow after data transmission ends or after the data transmission is restored to the connected state, so as to Indicates that the data transfer is over or the connection state has been restored.
  • the above implementation manner in which the terminal device is kept in the inactive state is based on the message indication as an example, but it is not limited.
  • the terminal device can also be automatically kept in the inactive state in a way predefined by the protocol, without the need for a network device. give instructions.
  • the method may further include: Step 4, the terminal device sends a second RRC message to the second network device, and the second network device A second RRC message from the terminal device is received.
  • the second RRC message may include: the above-mentioned second I-RNTI and the second truncated MAC-I.
  • the second truncated MAC-I may be determined by the terminal device according to the above-mentioned second related parameters and the second key, and the length may be 16 bits.
  • the second key may be determined by the terminal device according to the second NCC in the first information and the algorithm in the context of the terminal device.
  • the terminal device may use the algorithm in the context of the terminal device and the second NCC to execute the level of or vertical deduction, so as to obtain the key Kg NB4 to deduce K_RRCint 4 (the second key), the key K_RRCenc 4 , the key K_UPenc 4 and the key K_UPint 4 according to the key Kg NB4 , and delete the last deduction key K_RRCint 2 (first key), key K_RRCenc 2 , key K_UPenc 2 and key K_UPint 2 .
  • the terminal device after the terminal device sends the second RRC message, it can also perform horizontal deduction by using the context of the terminal device and the second NCC, so as to obtain the key Kg NB5 , so as to deduce K_RRCint 5 , the key K_RRCenc 5 , the key K_RRCenc 5 , key K_UPenc 5 and key K_UPint 5 , and delete K_RRCint 4 (second key), key K_RRCenc 4 , key K_UPenc 4 and key K_UPint 4 .
  • the second network device may determine that the anchor network device is the first network device according to the second I-RNTI in the second RRC message. In this way, the first network device may send a context recovery request message to the first network device, such as sending a context recovery request message to the first network device through the Xn interface.
  • the context recovery request message may carry the second I-RNTI, the second truncated MAC-I, and the PCI of the cell of the second network device.
  • the first network device can determine whether there is a context corresponding to the second I-RNTI (the context of the terminal device) according to the context recovery request message, and determine the second truncated MAC-I and the sixth truncated MAC-I Is I consistent.
  • the sixth truncated MAC-I may be determined by the first network device according to the above-mentioned second related parameters and the second key, and the second key may be determined by the first network device according to the algorithm in the context of the terminal device and the second key. 2. NCC determined.
  • the first network device determines that there is no context corresponding to the second I-RNTI, and/or the second truncated MAC-I is inconsistent with the sixth truncated MAC-I, it means that the verification fails, and the process of the method ends. . If the first network device determines that there is a context corresponding to the second I-RNTI, and the second truncated MAC-I is consistent with the sixth truncated MAC-I, it indicates that the verification is passed. In this way, the first network device may also perform horizontal deduction by using the context and the second NCC to obtain a key corresponding to K_RRCint 5 , and send a context recovery response message to the second network device.
  • the key corresponding to K_RRCint 5 may be K gNB5 , or the key K_RRCint 5 , the key K_RRCenc 5 , the key K_UPenc 5 , and the key K_UPint 5 derived by using the K gNB5 .
  • the second network device can use the K gNB5 to deduce the key K_RRCint 5 , the key K_RRCenc 5 , the key K_UPenc 5 and the key K_UPint 5 again.
  • the context recovery response message may carry the corresponding key, the second NCC and the context of the terminal device, so that the second network device can communicate with the terminal device according to the corresponding key, the second NCC and the context of the terminal device.
  • the first network device stores the fourth data of the terminal device, after the verification is passed, the first network device can send the fourth data to the second network device, so that the second network device can forward the fourth data to the terminal device.
  • the fourth data may be service data of the terminal device received by the first network device from a core network element, such as a UPF network element, and may be the same or different data from the above-mentioned first data.
  • the second network device receives the context recovery response message from the third network device, it can send a path switching request message to the AMF network element according to the context of the terminal device in the context recovery response message.
  • the AMF network element can modify the bearer on the UPF network element according to the path switching request message. For example, the bearer is changed from "terminal device ⁇ first network device ⁇ UPF network element" to "terminal device ⁇ second network device” ⁇ UPF network element", so that the second network device can receive the fourth data from the terminal device of the core network and forward it to the terminal device.
  • the AMF network element may send a path switching request confirmation message to the second network device to inform the second network device that the path switching is completed.
  • the anchor network device of the terminal device is changed from the first network device to the second network device.
  • the second network device may send the third data to the UPF network element after receiving the confirmation of the path switching request.
  • the content in step 4 is introduced by taking the inter-site cell reselection as an example, that is, the first network device and the second network device are different network devices, but this is not a limitation.
  • the terminal device performs cell reselection in the station of the first network device
  • the first network device may receive the above-mentioned second RRC message from the terminal device, and use the above-mentioned key and the pre-stored context of the terminal device and the terminal device Normal communication without requesting the context of the end device from other network devices.
  • the method may further include: step 5, the second network device sends a third RRC message to the terminal device, and the terminal device receives the third RRC message. A third RRC message from the second network device.
  • the third RRC message may be an RRC release message, which is used to indicate the end of data transmission or the connection state has been restored, and also used to indicate which pair of I-RNTI and NCC the terminal device uses.
  • the third RRC message may include: the third I-RNTI and the third NCC. Both the third I-RNTI and the third NCC may be allocated by the second network device to the terminal device. Wherein, if the third I-RNTI is the same as the second I-RNTI, the terminal device may be instructed to use the second I-RNTI; or, if the third I-RNTI is different from the second I-RNTI, the terminal device may be instructed to use the second I-RNTI Third I-RNTI. Wherein, if the third NCC is the same as the second NCC, the terminal device may be instructed to use the second NCC; or, if the third NCC is different from the second NCC, the terminal device may be instructed to use the third NCC.
  • the terminal device can be flexibly instructed to update or continue to use the original I-RNTI and/or NCC according to the actual application scenario. For example, if communication security needs to be guaranteed, the terminal device is instructed to use the updated I-RNTI and NCC. For another example, if the resource overhead needs to be reduced, the terminal device is instructed to use the original I-RNTI and NCC to avoid the resource overhead caused by updating the I-RNTI and/or NCC.
  • the method may further include: Step 6, the terminal device sends a packet data convergence protocol (packet data convergence protocol, PDCP) to the second network device. Status report, the second network device receives the PDCP status report from the terminal device.
  • PDCP packet data convergence protocol
  • the PDCP status report records data that the terminal device has not received.
  • the terminal device can package and send the RRC message, such as the second RRC message, with the PDCP status report, thereby reducing signaling overhead and further improving communication efficiency.
  • the terminal device can also send the PDCP status report to the second network device independently, so as to realize more flexible sending.
  • the data received by the terminal device corresponds to different. Therefore, the following describes how the second network device processes the PDCP status report in combination with the first and second implementation scenarios described above.
  • the second network device may forward the PDCP status report to the third network device.
  • the second network device may send a context recovery request message including the PDCP status report to the third network device, or may send an address indication message including the PDCP status report to the third network device to implement signaling multiplexing , further reducing resource overhead and further improving communication efficiency.
  • the second network device may also send the PDCP status report to the third network device independently, so as to realize more flexible sending.
  • the third network device may continue to forward the PDCP status report to the first network device, so that the first network device can, according to the PDCP status report, For example, according to the FMC field and the bitmap (Bitmap) field in the PDCP status report, the data that is not received by the terminal device in the first data is sent to the second network device or the third network device.
  • the PDCP status report For example, according to the FMC field and the bitmap (Bitmap) field in the PDCP status report, the data that is not received by the terminal device in the first data is sent to the second network device or the third network device.
  • the second network device may directly forward the unreceived data to the terminal device. If the first network device sends the unreceived data to the third network device, the third network device may first forward the unreceived data to the second network device, so that the second network device can then forward the unreceived data to the terminal device data.
  • the third network device may save the PDCP status report, so that the third network device can save the PDCP status report after receiving the first network device from the first network device.
  • the unreceived data can be directly sent to the terminal device according to the PDCP status report.
  • the second network device may send, according to the PDCP status report, data that is not received by the terminal device in the fourth data to the terminal device.
  • the above-mentioned fourth data may be data obtained by the second network device from the first network device and/or from the core network.
  • FIG. 5 shows a schematic flowchart of a communication method in a first application scenario.
  • the UE is the above-mentioned terminal equipment
  • the first gNB is the above-mentioned first network equipment
  • the second gNB is the above-mentioned second network equipment
  • the second gNB is the above-mentioned third network equipment.
  • the equipment suitable for the first application scenario may also include one or more of the following: a UPF network element, an AMF network element, and a policy control function (PCF) network element (Fig.
  • PCF policy control function
  • a session management function (SMF) network element (not shown in Figure 5), a session management function (SMF) network element (not shown in Figure 5), a unified data repository (unified data repository, UDR) network element (not shown in Figure 5), Unified data management (unified data management, UDM) network element (not shown in FIG. 5 ), etc.
  • the AMF network element may also be correspondingly replaced with a mobility management entity (mobility management entity, MME) network element and the UPF network element may also be correspondingly replaced with a serving gateway (serving gateway, S-GW) network element, which is not limited.
  • MME mobility management entity
  • serving gateway serving gateway
  • the communication method may include:
  • the third gNB sends a first RRC release message to the UE, and the third gNB receives the first RRC release message from the UE.
  • the first RRC release message may carry the above-mentioned first I-RNTI and the first NCC, and the third gNB is the anchor network device of the terminal device.
  • the UE is released from the connected state to the inactive state.
  • the UE can retain its own context and key K_RRCint1.
  • the UE reselects from the cell of the third gNB to the cell of the first gNB.
  • the UE remains in the inactive state after reselecting to the cell of the first gNB.
  • the UE sends a first RRC recovery request message to the first gNB, and the first gNB receives the first RRC recovery request message from the UE.
  • the first RRC recovery request message may carry the first I-RNTI and the third truncated MAC-I.
  • the third truncated MAC-I may be determined by the UE according to the cell configuration parameters of the third gNB and the key K_RRCint1.
  • the UE determines the key K_RRCint2.
  • the first gNB sends a first context recovery request message to the third gNB, and the third gNB receives the first context recovery request message from the first gNB.
  • the first context recovery request message may carry the first I-RNTI, the third truncated MAC-I, and the PCI of the cell of the first gNB.
  • the execution order of S505 and S506 is not limited.
  • the third gNB determines the key corresponding to the UE.
  • the specific implementation of determining the corresponding key by the third gNB may refer to the relevant content in the above S401, which will not be repeated here.
  • the third gNB sends a first context recovery response message to the first gNB, and the first gNB receives the first context recovery response message from the third gNB.
  • the first context recovery response message may carry the context of the UE and the key determined in S507.
  • the first gNB sends a first address indication message to the third gNB, and the third gNB receives the first address indication message from the first gNB.
  • the third gNB sends the first downlink data to the first gNB, and the first gNB receives the first downlink data from the third gNB.
  • the first gNB sends the first downlink data to the UE.
  • S510-S511 are optional steps. If the third gNB obtains the first downlink data in advance, such as receiving the first downlink data from the core network in advance, S510-S511 may be performed, otherwise, S510-S511 may not be performed.
  • the first gNB sends a first path switching request message to the AMF network element.
  • the AMF network element modifies the bearer of the UE on the UPF network element.
  • the bearer of the UE on the UPF network element may be changed from "UE ⁇ third gNB ⁇ UPF network element" to "UE ⁇ first gNB ⁇ UPF network element".
  • the first gNB receives the first path switching request confirmation message sent from the AMF network element.
  • the first gNB sends the first uplink data to the UPF network element.
  • S515 is an optional step. If the UE multiplexes the first RRC recovery request message to send the first uplink data to the first gNB in S504, the first gNB can perform S515; otherwise, it is not necessary to perform S515.
  • the first gNB receives the second downlink data from the UPF network element.
  • the first gNB sends the second downlink data to the UE.
  • S516-S517 are optional steps. If the UPF network element receives the second downlink data from the core network, S516-S517 may be executed, otherwise, S516-S517 may not be executed. In addition, the execution order of S509-S511 and S512-S517 is not limited, and the execution order of S515 and S516 is also not limited.
  • the UE reselects from the cell of the first gNB to the cell of the second gNB.
  • the UE may remain in the inactive state after reselection to the cell of the second gNB according to the procedure predefined in the protocol.
  • the execution order of S518 and S505-S517 is not limited.
  • the first gNB may execute S511 and/or S517; if the UE executes S518 before S511 and/or S517, because the UE is no longer in the first gNB A cell of a gNB camps on, so the first gNB cannot perform S511 and/or S517.
  • the UE sends a second RRC recovery request message to the second gNB, and the second gNB receives the second RRC recovery request message from the UE.
  • the second RRC recovery request message may carry the first I-RNTI and the first truncated MAC-I.
  • the first truncated MAC-I may be determined by the UE according to the cell configuration parameters of the first gNB and the key K_RRCint2.
  • the UE sends a PDCP status report to the second gNB, and the second gNB receives the PDCP status report from the UE.
  • S520 is an optional step. For example, if the amount of data needs to be reduced to ensure communication efficiency, S520 may be executed. For another example, if data loss needs to be avoided to ensure communication reliability, S520 may not be performed.
  • the UE determines the key K_RRCint3.
  • the second gNB sends a second context recovery request message to the third gNB, and the third gNB receives the second context recovery request message from the second gNB.
  • the second context recovery request message may carry the first I-RNTI, the first truncated MAC-I and the PCI of the cell of the second gNB.
  • the execution order of S521 and S522 is not limited.
  • the second gNB sends a PDCP status report to the third gNB, and the third gNB receives the PDCP status report from the second gNB.
  • S523 is an optional step. According to the above S520, if the UE executes S520, the second gNB correspondingly executes S523; otherwise, the second gNB may not execute S523.
  • the third gNB determines the key corresponding to the UE.
  • the third gNB sends a second context recovery response message to the second gNB, and the second gNB receives the second context recovery response message from the third gNB.
  • the second context recovery response message may carry the context of the UE and the key determined in S523.
  • the second gNB sends the second address indication message to the third gNB, and the third gNB receives the second address indication message from the second gNB.
  • the second address indication message may carry the identifier of the UE, the above-mentioned first address and the above-mentioned second address.
  • S519, S521, S522, S524 and S525 can refer to the above step 1
  • the specific implementation of S520, S523 and S526 can refer to the relevant content in the above step 6, which will not be repeated here.
  • the first downlink data and the second downlink data on the first gNB can be sent by the first gNB to the second gNB, or can also be sent by the third gNB to the second gNB.
  • the second gNB sends. They are introduced separately below.
  • the specific process for the first gNB to send downlink data to the second gNB may include the following S527-S529:
  • the third gNB sends the second address indication message to the first gNB, and the second gNB receives the second address indication message from the third gNB.
  • the third gNB sends a PDCP status report to the first gNB, and the first gNB receives the PDCP status report from the third gNB.
  • S528 is an optional step. According to the above S523, if the second gNB executes S523, the third gNB correspondingly executes S528; otherwise, the third gNB may not execute S528.
  • the first gNB sends the first downlink data and the second downlink data to the second gNB, or sends the third downlink data that is not received by the terminal device in the first downlink data and the second downlink data; the second gNB receives the The first downlink data and the second downlink data of the first gNB, or receive the third downlink data.
  • the first gNB can send the third downlink data to the second gNB; otherwise, the first gNB sends the first downlink data and the second downlink data to the second gNB.
  • the specific process of the third gNB sending downlink data to the second gNB may include the following S530-S533:
  • the third gNB sends a third address indication message to the first gNB, and the first gNB receives the third address indication message from the third gNB.
  • the third address indication message may carry the identity of the UE and the address of the third gNB.
  • the third gNB sends a PDCP status report to the first gNB, and the first gNB receives the PDCP status report from the third gNB.
  • S531 is an optional step. For example, if the amount of data needs to be reduced to ensure communication efficiency, S531 may be executed. For another example, if data loss needs to be avoided to ensure communication reliability, S531 may not be performed.
  • the first gNB sends the first downlink data and the second downlink data to the third gNB, or sends the third downlink data; the third gNB receives the first downlink data and the second downlink data from the first gNB, Or, the above-mentioned third downlink data is received.
  • the third gNB can directly receive the third downlink data; otherwise, the third gNB receives the first downlink data and the second downlink data.
  • the third gNB sends the first downlink data and the second downlink data to the second gNB, or sends the third downlink data; the second gNB receives the first downlink data and the second downlink data from the third gNB, Or, the above-mentioned third downlink data is received.
  • the third gNB can send the above-mentioned third downlink data to the second gNB, otherwise, the third gNB sends the above-mentioned third downlink data to the second gNB.
  • the gNB sends the above-mentioned first downlink data and second downlink data.
  • the second gNB sends the first downlink data and the second downlink data to the UE, or sends the third downlink data; the UE receives the first downlink data and the second downlink data from the second gNB, or receives the above-mentioned third downlink data; The third downstream data.
  • the second gNB can send the third downlink data to the UE, otherwise, the second gNB sends the first downlink data and the second downlink data to the UE .
  • the second gNB sends a second path switching request message to the AMF network element.
  • the AMF network element modifies the bearer of the UE on the UPF network element.
  • the bearer of the UE on the UPF network element may be modified from "UE ⁇ first gNB ⁇ UPF network element" to "UE ⁇ second gNB ⁇ UPF network element”.
  • the second gNB receives the second path switching request confirmation message sent from the AMF network element.
  • the second gNB sends an RRC release message to the UE, and the UE receives the RRC release message from the second gNB.
  • S534 and S535-S537 is not limited.
  • S534 reference may be made to the relevant content in the foregoing step 6, and for the specific implementation of the S535-S538, reference may be made to the foregoing S401 and the relevant content in the step 5, which will not be repeated here.
  • FIG. 6 shows a schematic flowchart of the communication method in the second application scenario.
  • the UE is the above-mentioned terminal equipment
  • the first gNB is the above-mentioned first network equipment
  • the second gNB is the above-mentioned second network equipment
  • the second gNB is the above-mentioned third network equipment.
  • the equipment suitable for the first application scenario may also include one or more of the following: AMF network element, UPF network element, UPF network element, and AMF network element (not shown in FIG. 6 ) ), PCF network element (not shown in Figure 6), SMF network element (not shown in Figure 6), UDR network element (not shown in Figure 6), UDM network element (not shown in Figure 6), etc. .
  • the flow of the communication method may include:
  • the third gNB sends a first RRC release message to the UE, and the third gNB receives the first RRC release message from the UE.
  • the first RRC release message may carry the above-mentioned first I-RNTI and the first NCC, and the third gNB is the anchor network device of the terminal device.
  • the UE is released from the connected state to the inactive state.
  • the UE can retain its own context and key K_RRCint1.
  • the UE reselects from the cell of the third gNB to the cell of the first gNB.
  • the UE remains in the inactive state after reselecting to the cell of the first gNB.
  • the UE sends a first RRC recovery request message to the first gNB, and the first gNB receives the first RRC recovery request message from the UE.
  • the first RRC recovery request message may carry the first I-RNTI and the third truncated MAC-I.
  • the third truncated MAC-I may be determined by the UE according to the cell configuration parameters of the third gNB and the key K_RRCint1.
  • the UE determines the key K_RRCint2.
  • the first gNB sends the first context recovery request message to the third gNB, and the third gNB receives the first context recovery request message from the first gNB.
  • the third gNB determines the key corresponding to the UE.
  • the first context recovery request message may carry the first I-RNTI, the third truncated MAC-I, and the PCI of the cell of the first gNB.
  • the execution order of S605 and S606 is not limited.
  • S601-S607 reference may be made to the relevant content in the above-mentioned S401, which will not be repeated here.
  • the above-mentioned first information can be generated in two ways, which can be generated by the third gNB, or can also be generated by the first gNB. They are introduced separately below.
  • the specific process of generating the above-mentioned first information by the first gNB may include the following S608-S609:
  • the third gNB generates the above-mentioned first information.
  • the execution order of S607 and S608 is not limited.
  • the third gNB sends a first context recovery response message to the first gNB, and the first gNB receives the first context recovery response message from the third gNB.
  • the first context recovery response message may carry the context of the UE, the first information determined in S608, and the key determined in S607.
  • S608-S609 reference may be made to the relevant content in the foregoing step 3, which will not be repeated here.
  • the specific process of generating the above-mentioned first information by the second gNB may include the following S610-S611:
  • the first gNB generates the above-mentioned first information.
  • the above-mentioned first information may include the second I-RNTI and the second NCC.
  • the execution order of S610 and S607 is not limited.
  • the third gNB sends a first context recovery response message to the first gNB, and the first gNB receives the first context recovery response message from the third gNB.
  • the first context recovery response message may carry the context of the UE and the key determined in S607.
  • S610-S611 reference may be made to the relevant content in the foregoing step 3, which will not be repeated here.
  • the first gNB sends a first RRC release message to the UE.
  • the first RRC release message may carry the first information.
  • S612 reference may be made to the relevant content in the foregoing step 3, which will not be repeated here.
  • the first gNB sends the first address indication message to the third gNB, and the third gNB receives the first address indication message from the first gNB.
  • the third gNB sends the first downlink data to the first gNB, and the first gNB receives the first downlink data from the third gNB.
  • S614 is an optional step. If the third gNB obtains the first downlink data in advance, such as receiving the first downlink data from the core network in advance, S614 may be performed, otherwise, S614 may not be performed.
  • the first gNB sends a first path switching request message to the AMF network element.
  • the AMF network element modifies the bearer of the UE on the UPF network element.
  • the bearer of the UE on the UPF network element may be changed from "UE ⁇ third gNB ⁇ UPF network element" to "UE ⁇ first gNB ⁇ UPF network element".
  • the first gNB receives the first path switching request confirmation message sent from the AMF network element.
  • the first gNB sends a second RRC release message to the third gNB, and the third gNB receives the second RRC release message from the first gNB.
  • the first gNB receives the second downlink data from the UPF network element.
  • the execution order of S612 and S613-S619 is not limited, and the execution order of S613-S614 and S615-S619 is also not limited.
  • the first gNB sends the first uplink data to the UPF network element.
  • S619 and S620 are not limited.
  • S619 is an optional step. If the UPF network element receives the second downlink data from the core network, S619 may be executed, otherwise, S619 may not be executed.
  • S620 is also an optional step. If the UE multiplexes the first RRC recovery request message in S604 to send the first uplink data to the first gNB, the first gNB can perform S620; otherwise, it is unnecessary to perform S620.
  • S613-S620 reference may be made to the relevant content in the above-mentioned S401, which will not be repeated here.
  • the UE reselects from the cell of the first gNB to the cell of the second gNB.
  • the UE may, according to the indication of the first information, remain in the inactive state after reselecting to the cell of the second gNB.
  • the UE sends a second RRC recovery request message to the second gNB, and the second gNB receives the second RRC recovery request message from the UE.
  • the second RRC recovery request message may carry the above-mentioned second I-RNTI and the second truncated MAC-I.
  • the second truncated MAC-I may be determined by the UE according to the cell configuration parameters of the second gNB and the key K_RRCint4.
  • the UE sends a PDCP status report to the second gNB, and the second gNB receives the PDCP status report from the UE.
  • S623 is an optional step. For example, if the amount of data needs to be reduced to ensure communication efficiency, S623 may be executed. For another example, if data loss needs to be avoided to ensure communication reliability, S623 may not be performed.
  • the UE determines the key K_RRCint5.
  • the second gNB sends a second context recovery request message to the first gNB, and the first gNB receives the second context recovery request message from the second gNB.
  • the second context recovery request message may carry the second I-RNTI, the second truncated MAC-I, and the PCI of the cell of the second gNB.
  • the execution order of S624 and S625 is not limited.
  • the second gNB sends a PDCP status report to the first gNB, and the first gNB receives the PDCP status report from the second gNB.
  • S626 is an optional step. According to the above S623, if the UE executes S623, the second gNB correspondingly executes S626; otherwise, the second gNB may not execute S626.
  • the first gNB determines the key corresponding to the UE.
  • the first gNB sends a second context recovery response message to the second gNB, and the second gNB receives the second context recovery response message from the first gNB.
  • the second context recovery response message may carry the context of the UE and the key determined in S627.
  • the second gNB sends a second address indication message to the first gNB, and the first gNB receives the first address indication message from the second gNB.
  • the second address indication message may carry the identifier of the UE, the above-mentioned first address and the above-mentioned second address.
  • the first gNB sends the first downlink data and/or the second downlink data to the second gNB, or sends the third downlink data in the first downlink data and the second downlink data that is not received by the terminal device; the first gNB Receive the first downlink data and the second downlink data from the second NB, or receive the third downlink data.
  • the second gNB sends the first downlink data and the second downlink data to the UE, or sends the third downlink data; the UE receives the first downlink data and the second downlink data from the second NB, or receives the first downlink data and the second downlink data from the second NB.
  • S630-S631 are optional steps. If S614 and/or S619 are executed as described above, then S630-S631 may continue to be executed, otherwise, S630-S631 may not be executed.
  • the specific implementation of S623, S626, and S629-S631 can refer to the relevant content in the above-mentioned step 6, and the specific implementation of S622, S624, S625, S627, and S628 can refer to the relevant content in the above-mentioned step 4, which is not repeated here. Repeat.
  • the second gNB sends a second path switching request message to the AMF network element.
  • the AMF network element modifies the bearer of the UE on the UPF network element.
  • the bearer of the UE on the UPF network element may be modified from "UE ⁇ first gNB ⁇ UPF network element" to "UE ⁇ second gNB ⁇ UPF network element”.
  • the second gNB receives the second path switching request confirmation message sent from the AMF network element.
  • the second gNB sends a second RRC release message to the first gNB, and the first gNB receives the second RRC release message from the second gNB.
  • the second gNB sends a third RRC release message to the UE, and the UE receives the second RRC release message from the third gNB.
  • S629-S631 and S632-S635 are not limited.
  • S632-S635 reference may be made to the relevant content in the foregoing step 4
  • S636 reference may be made to the relevant content in the foregoing step 5, which will not be repeated here.
  • the terminal device since the terminal device performs cell reselection after sending the first RRC message to the first network device, it can still remain in the inactive state, so that the terminal device is in the cell After reselection, data can still be directly transmitted in the inactive state, so as to improve the efficiency and reliability of data transmission.
  • the communication method provided by the embodiment of the present application has been described in detail above with reference to FIG. 4 to FIG. 6 .
  • a communication apparatus for executing the communication method provided by the embodiments of the present application will be described in detail below with reference to FIGS. 7 to 8 .
  • FIG. 7 is a first structural schematic diagram of a communication apparatus provided by an embodiment of the present application.
  • the communication apparatus 700 may include: a processing module 701 and a transceiver module 702 .
  • FIG. 7 only shows the main components of the communication device 700 .
  • the communication apparatus 700 can be applied to the communication system shown in FIG. 2 to perform the functions of the terminal device in the communication method shown in FIG. 4 , or to perform the functions shown in FIGS. 5-6 .
  • the transceiver module 702 is configured to send the first radio resource control RRC message to the first network device.
  • the processing module 701 is used for the communication apparatus to perform reselection from the cell of the first network device to the cell of the second network device. Wherein, the communication device remains in an inactive state.
  • the transceiver module 702 is further configured to send the second RRC message to the second network device.
  • the second RRC message may include: the first I-RNTI.
  • the first I-RNTI may be allocated by the third network device to the communication apparatus.
  • the third network device may be an anchor network device of the communication apparatus.
  • the second RRC message may further include: the first truncated MAC-I.
  • the first truncated MAC-I may be determined according to a cell configuration parameter of the third network device and the first key.
  • the first key may be determined according to the first NCC.
  • the first NCC is allocated to the communication apparatus by the third network device.
  • the transceiver module 702 is further configured to receive the first information from the first network device.
  • the first information may include: the second I-RNTI and the second NCC.
  • the second I-RNTI may be allocated by the first network device or the third network device for the communication apparatus.
  • the second NCC may be allocated to the communication apparatus by the first network device or the third network device.
  • the third network device may be an anchor network device of the communication apparatus.
  • the transceiver module 702 is further configured to send the second RRC message to the second network device.
  • the second RRC message may carry the second I-RNTI and the second truncated MAC-I.
  • the second truncated MAC-I may be determined according to a cell configuration parameter of the first network device and the second key.
  • the second key may be determined according to the second NCC.
  • the transceiver module 702 is further configured to receive a third RRC message from the second network device.
  • the third RRC message may include: the third I-RNTI and the third NCC.
  • the third I-RNTI and the third NCC may be allocated by the second network device for the communication apparatus.
  • the third I-RNTI may be different from the second I-RNTI, and/or the third NCC may be different from the second NCC; alternatively, the third RRC message instructs the communication apparatus to use the second I-RNTI and the second NCC.
  • the transceiver module 702 is further configured to send a PDCP status report to the second network device.
  • the transceiver module 702 may include a receiving module and a transmitting module (not shown in FIG. 7 ).
  • the receiving module is used to implement the receiving function of the communication device 700
  • the transmitting module is used to implement the transmitting function of the communication device 700 .
  • the communication apparatus 700 may further include a storage module (not shown in FIG. 7 ), where the storage module stores programs or instructions.
  • the processing module 701 executes the program or instruction, the communication apparatus 700 can perform the function of the terminal device in the communication method shown in FIG. 4 and the function of the UE in the communication method shown in FIG. 5 to FIG. 6 .
  • the processing module 701 involved in the communication device 700 may be implemented by a processor or a processor-related circuit component, and may be a processor or a processing unit;
  • the transceiver module 702 may be implemented by a transceiver or a transceiver-related circuit component, and may be a transceiver module Receiver or Transceiver Unit.
  • the communication device 700 may be a terminal device, a chip (system) or other components or components that can be provided in the terminal device, or a device including a terminal device, which is not limited in this application.
  • FIG. 8 is a second schematic structural diagram of a communication apparatus provided by an embodiment of the present application.
  • the communication apparatus 800 may include: a receiving module 801 and a sending module 802 .
  • FIG. 8 only shows the main components of the communication device 800 .
  • the communication apparatus 800 may be applied to the communication system shown in FIG. 2 to perform the function of the first network device in the communication method shown in FIG. The function of gNB1 in the communication method shown.
  • the receiving module 801 is configured to receive the first RRC message from the terminal device. Wherein, if the terminal device performs cell reselection after sending the RRC message, the terminal device remains in an inactive state.
  • the terminal device is reselected from the cell of the communication apparatus to the cell of the second network device, and the sending module 802 is configured to send the first data of the terminal device to the second network device.
  • the terminal device is reselected from the cell of the communication apparatus to the cell of the second network device, and the sending module 802 is configured to send the first data of the terminal device to the third network device.
  • the third network device may be an anchor network device of the terminal device.
  • the sending module 802 is configured to send the first information to the terminal device.
  • the first information may include: the second I-RNTI and the second NCC.
  • the second I-RNTI may be allocated to the terminal device by the communication apparatus or the third network device.
  • the second NCC may be allocated to the terminal device by the communication apparatus or the third network device.
  • the third network device may be an anchor network device of the terminal device.
  • the sending module 802 before the sending module 802 sends the first information to the terminal device, the sending module 802 is further configured to send a context recovery request message to the third network device, and the sending module 801 is further configured to receive a message from the third network device.
  • Context recovery response message The third network device may be an anchor network device of the terminal device.
  • the context restoration response message may include the first information.
  • the receiving module 801 is further configured to receive the PDCP status report from the terminal device.
  • the receiving module 801 and the sending module 802 may also be integrated into one module, such as a transceiver module (not shown in FIG. 8 ).
  • the transceiver module is used to implement the sending function and the receiving function of the communication device 800 .
  • the communication apparatus 800 may further include a processing module 803 (shown with a dashed box in FIG. 8 ).
  • the processing module 803 is used to implement the processing function of the communication device 800 .
  • the communication apparatus 800 may further include a storage module (not shown in FIG. 8 ), where the storage module stores programs or instructions.
  • the communication apparatus 800 can perform the function of the first network device in the communication method shown in FIG. 4 and the function of gNB1 in the communication method shown in FIG. 5-FIG. 6 . .
  • the processing module 803 involved in the communication apparatus 800 may be implemented by a processor or a processor-related circuit component, and may be a processor or a processing unit;
  • the transceiver module may be implemented by a transceiver or a transceiver-related circuit component, and may be a transceiver or transceiver unit.
  • the communication device 800 may be a network device, a chip (system) or other components or components that can be provided in the network device, or a device including a network device, which is not limited in this application.
  • the communication apparatus 800 may be applied to the communication system shown in FIG. 2 to perform the function of the second network device in the communication method shown in FIG. 4 , or to perform the functions of the second network device in the communication method shown in FIG. The functions of gNB2 in the communication method shown.
  • the sending module 802 is configured to send the second information to the third network device.
  • the receiving module 801 is configured to receive the first data from the first network device, so that the sending module 802 sends the first data to the terminal device.
  • the second information is used to request the first data of the terminal device.
  • the third network device may be an anchor network device of the terminal device.
  • the first network device may be a device corresponding to a cell in which the terminal device reselection to the cell of the communication apparatus resides before.
  • the receiving module 801 is further configured to receive the second RRC message from the terminal device.
  • the second RRC message may include: the first I-RNTI.
  • the first I-RNTI may be allocated by the third network device to the terminal device.
  • the second RRC message may further include: the first truncated MAC-I.
  • the first truncated MAC-I may be determined according to a cell configuration parameter of the third network device and a first key, and the first key may be determined according to the first NCC.
  • the first NCC may be allocated by the third network device to the terminal device.
  • the second RRC message may include: the second I-RNTI.
  • the second I-RNTI may be allocated by the first network device or the third network device for the terminal device.
  • the second RRC message may further include: a second truncated MAC-I.
  • the second truncated MAC-I may be determined according to a cell configuration parameter of the first network device and a second key, and the second key may be determined according to the second NCC.
  • the second NCC may be allocated to the terminal device by the first network device or by the third network device.
  • the third network device may be an anchor network device of the terminal device.
  • the receiving module 801 is further configured to receive the PDCP status report from the terminal device.
  • the sending module is further configured to send the PDCP status report to the third network device, so that the third network device can send data that the terminal device has not received to the terminal device according to the PDCP status report.
  • the sending module 802 is further configured to send a context recovery request message to the third network device.
  • the context recovery request message may include a PDCP status report.
  • the receiving module 801 and the sending module 802 may also be integrated into one module, such as a transceiver module (not shown in FIG. 8 ).
  • the transceiver module is used to implement the sending function and the receiving function of the communication device 800 .
  • the communication apparatus 800 may further include a processing module 803 (shown with a dashed box in FIG. 8 ).
  • the processing module 803 is used to implement the processing function of the communication device 800 .
  • the communication apparatus 800 may further include a storage module (not shown in FIG. 8 ), where the storage module stores programs or instructions.
  • the communication apparatus 800 can perform the function of the second network device in the communication method shown in FIG. 4 and the function of gNB2 in the communication method shown in FIG. 5-FIG. 6 .
  • the processing module 803 involved in the communication apparatus 800 may be implemented by a processor or a processor-related circuit component, and may be a processor or a processing unit;
  • the transceiver module may be implemented by a transceiver or a transceiver-related circuit component, and may be a transceiver or transceiver unit.
  • the communication device 800 may be a network device, a chip (system) or other components or components that can be provided in the network device, or a device including a network device, which is not limited in this application.
  • FIG. 9 is a schematic structural diagram of a communication apparatus provided by an embodiment of the present application.
  • the communication device may be a terminal device or a network device, or may be a chip (system) or other components or assemblies that can be provided in the terminal device or the network device.
  • the communication apparatus 900 may include a processor 901 .
  • the communication device 900 may further include a memory 902 and/or a transceiver 903 .
  • the processor 901 is coupled with the memory 902 and the transceiver 903, such as can be connected through a communication bus.
  • Each component of the communication device 900 will be described in detail below with reference to FIG. 9 :
  • the processor 901 is the control center of the communication device 900, which may be one processor or a general term for multiple processing elements.
  • the processor 901 is one or more central processing units (central processing units, CPUs), may also be a specific integrated circuit (application specific integrated circuit, ASIC), or is configured to implement one or more of the embodiments of the present application
  • An integrated circuit such as: one or more microprocessors (digital signal processor, DSP), or, one or more field programmable gate array (field programmable gate array, FPGA).
  • the processor 901 may execute various functions of the communication device 900 by running or executing software programs stored in the memory 902 and calling data stored in the memory 902 .
  • the processor 901 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 9 .
  • the communication apparatus 900 may also include multiple processors, for example, the processor 901 and the processor 904 shown in FIG. 9 .
  • processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU).
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the memory 902 is used to store the software program for executing the solution of the present application, and is controlled and executed by the processor 901.
  • the memory 902 is used to store the software program for executing the solution of the present application, and is controlled and executed by the processor 901.
  • the processor 901. For the specific implementation, reference may be made to the above method embodiments, which will not be repeated here.
  • memory 902 may be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types of static storage devices that can store information and instructions.
  • ROM read-only memory
  • RAM random access memory
  • Other types of dynamic storage devices for instructions which may also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM), or other optical disks storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage medium or other magnetic storage device, or capable of carrying or storing desired program code in the form of instructions or data structures and any other medium that can be accessed by a computer, but is not limited thereto.
  • the memory 902 may be integrated with the processor 901, or may exist independently, and be coupled to the processor 901 through an interface circuit (not shown in FIG. 9) of the communication device 900, which is not specifically limited in this embodiment of the present application.
  • the transceiver 903 is used for communication with other communication devices.
  • the communication apparatus 900 is a terminal device, and the transceiver 903 may be used to communicate with a network device or communicate with another terminal device.
  • the data communication apparatus 900 is a network device, and the transceiver 903 can be used to communicate with a terminal device or communicate with another network device.
  • transceiver 903 may include a receiver and a transmitter (not shown separately in FIG. 9). Among them, the receiver is used to realize the receiving function, and the transmitter is used to realize the sending function.
  • the transceiver 903 may be integrated with the processor 901, or may exist independently, and be coupled to the processor 901 through an interface circuit (not shown in FIG. 9 ) of the communication device 900, which is not made in this embodiment of the present application Specific restrictions.
  • the structure of the communication device 900 shown in FIG. 9 does not constitute a limitation on the communication device, and an actual communication device may include more or less components than those shown in the figure, or combine some components, or Different component arrangements.
  • An embodiment of the present application further provides a chip system, which may include: a processor, where the processor is coupled with a memory, and the memory is used for storing a program or an instruction, and when the program or instruction is executed by the processor, the processor causes the The chip system implements the method in any of the above method embodiments.
  • the number of processors in the chip system may be one or more.
  • the processor can be implemented by hardware or by software.
  • the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor may be a general-purpose processor implemented by reading software codes stored in memory.
  • the memory may be integrated with the processor, or may be provided separately from the processor, which is not limited in this application.
  • the memory can be a non-transitory processor, such as a read-only memory ROM, which can be integrated with the processor on the same chip, or can be provided on different chips.
  • the setting method of the processor is not particularly limited.
  • the system-on-chip may be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), or a system on chip (SoC), It can also be a central processing unit (CPU), a network processor (NP), a digital signal processing circuit (DSP), or a microcontroller (microcontroller).
  • controller unit, MCU it can also be a programmable logic device (PLD) or other integrated chips.
  • Embodiments of the present application provide a communication system.
  • the communication system may include one or more terminal devices described above, and one or more network devices.
  • the processor in this embodiment of the present application may be a central processing unit (central processing unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), special integrated Circuit (application specific integrated circuit, ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be random access memory (RAM), which acts as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • enhanced SDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous connection dynamic random access memory Fetch memory
  • direct memory bus random access memory direct rambus RAM, DR RAM
  • the above embodiments may be implemented in whole or in part by software, hardware (eg, circuits), firmware, or any other combination.
  • the above-described embodiments may be implemented in whole or in part in the form of a computer program product.
  • the computer program product may comprise one or more computer instructions or computer programs.
  • the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server or data center by wire (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that contains one or more sets of available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media.
  • the semiconductor medium may be a solid state drive.
  • At least one means one or more, and “plurality” means two or more.
  • At least one item(s) below” or its similar expressions refers to any combination of these items, which may include any combination of single item(s) or plural items(s).
  • at least one item (a) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c may be single or multiple .
  • the size of the sequence numbers of the above-mentioned processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not be dealt with in the embodiments of the present application. implementation constitutes any limitation.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
  • the computer software product is stored in a storage medium, which can Several instructions are included to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium may include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or CD, etc. that can store program codes. medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande concerne un procédé et un appareil de communication, qui sont capables de résoudre le problème selon lequel un dispositif terminal effectue une resélection de cellule après l'envoi d'un message de commande de ressource radio (RRC) et se libère d'un état inactif à un état de repos, ce qui permet de réduire efficacement un retard de transmission de données, et d'améliorer l'efficacité et la fiabilité de transmission de données. L'invention est applicable à un système de communication 4G ou 5G, tel que LTE et NR. Ledit procédé consiste à : envoyer un premier message RRC à un premier dispositif de réseau (S401), et resélectionner une cellule d'un second dispositif de réseau à partir d'une cellule d'un premier dispositif de réseau (S402), le dispositif terminal restant dans un état inactif.
PCT/CN2021/074556 2021-01-30 2021-01-30 Procédé et appareil de communication WO2022160315A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/074556 WO2022160315A1 (fr) 2021-01-30 2021-01-30 Procédé et appareil de communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/074556 WO2022160315A1 (fr) 2021-01-30 2021-01-30 Procédé et appareil de communication

Publications (1)

Publication Number Publication Date
WO2022160315A1 true WO2022160315A1 (fr) 2022-08-04

Family

ID=82652944

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/074556 WO2022160315A1 (fr) 2021-01-30 2021-01-30 Procédé et appareil de communication

Country Status (1)

Country Link
WO (1) WO2022160315A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024032405A1 (fr) * 2022-08-10 2024-02-15 华为技术有限公司 Procédé de communication et appareil de communication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108541034A (zh) * 2017-03-03 2018-09-14 宏达国际电子股份有限公司 处理状态的转换的装置及方法
CN108632815A (zh) * 2017-03-24 2018-10-09 华为技术有限公司 通信方法与设备
CN108632922A (zh) * 2017-03-23 2018-10-09 中兴通讯股份有限公司 一种移动性管理方法及装置
CN109246777A (zh) * 2017-06-16 2019-01-18 华为技术有限公司 一种通信方法及装置
US20200053821A1 (en) * 2018-08-10 2020-02-13 FG Innovation Company Limited Method and apparatus for rrc state transition

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108541034A (zh) * 2017-03-03 2018-09-14 宏达国际电子股份有限公司 处理状态的转换的装置及方法
CN108632922A (zh) * 2017-03-23 2018-10-09 中兴通讯股份有限公司 一种移动性管理方法及装置
CN108632815A (zh) * 2017-03-24 2018-10-09 华为技术有限公司 通信方法与设备
CN109246777A (zh) * 2017-06-16 2019-01-18 华为技术有限公司 一种通信方法及装置
US20200053821A1 (en) * 2018-08-10 2020-02-13 FG Innovation Company Limited Method and apparatus for rrc state transition

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "Cell reselection for inactive UEs", 3GPP DRAFT; R2-1805236 CELL RESELECTION FOR INACTIVE UES, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Sanya, China; 20180416 - 20180420, 14 April 2018 (2018-04-14), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051428911 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024032405A1 (fr) * 2022-08-10 2024-02-15 华为技术有限公司 Procédé de communication et appareil de communication

Similar Documents

Publication Publication Date Title
WO2018027988A1 (fr) Procédé de sélection de tranches de réseau, dispositif d'accès sans fil, et terminal
EP4120774A1 (fr) Transmission en liaison descendante dans un mode inactif ran
WO2018165996A1 (fr) Procédé et appareil de commutation
US10893574B2 (en) Packet data unit session release method and network entity performing the same
EP3457722B1 (fr) Système de communication radio
WO2018126961A1 (fr) Procédé de communication, dispositif de réseau d'accès et terminal
WO2019192445A1 (fr) Procédé et dispositif de création et de jonction d'un groupe de multidiffusion
KR20200019789A (ko) 무선 단말, 무선국, 코어 네트워크 노드, 및 그것들에서의 방법
WO2019179315A1 (fr) Procédé de communication sans fil, nœud source et nœud cible
EP3614708A1 (fr) Dispositif de réseau sans fil et procédé de communication sans fil
US10638443B2 (en) Deregistration method of user equipment in network and user equipment performing the same
WO2017054183A1 (fr) Procédé et appareil de régulation de l'encombrement de support de services
WO2023066383A1 (fr) Procédé et appareil de transmission de données, et support de stockage
WO2023061255A1 (fr) Procédé de communication
US20180270889A1 (en) Method and apparatus for uplink data transmission using multiple radio access technologies
EP3993558A1 (fr) Noeud ran, terminal radio et procédé associé
WO2022011618A1 (fr) Procédé de traitement d'informations, dispositif terminal et dispositif de réseau
WO2020042037A1 (fr) Procédé de communication sans fil et dispositif de communication
WO2019157712A1 (fr) Procédé de communication, dispositif de réseau et dispositif terminal
WO2022160315A1 (fr) Procédé et appareil de communication
WO2023186028A1 (fr) Procédé et appareil de communication
JP6966624B2 (ja) 無線通信システム、セキュリティプロキシ装置及び中継装置
WO2022206393A1 (fr) Procédé et appareil de communication
WO2022148469A1 (fr) Procédé, appareil et système de protection de sécurité
WO2021056386A1 (fr) Procédé de communication sans fil et dispositif terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21921916

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21921916

Country of ref document: EP

Kind code of ref document: A1