WO2022171099A1 - 用户设备移动性管理方法及装置、计算机可读存储介质 - Google Patents

用户设备移动性管理方法及装置、计算机可读存储介质 Download PDF

Info

Publication number
WO2022171099A1
WO2022171099A1 PCT/CN2022/075587 CN2022075587W WO2022171099A1 WO 2022171099 A1 WO2022171099 A1 WO 2022171099A1 CN 2022075587 W CN2022075587 W CN 2022075587W WO 2022171099 A1 WO2022171099 A1 WO 2022171099A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
information
target cell
mobility management
control information
Prior art date
Application number
PCT/CN2022/075587
Other languages
English (en)
French (fr)
Inventor
刘莹莹
Original Assignee
展讯半导体(南京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202110179240.2A external-priority patent/CN112954686B/zh
Priority claimed from CN202110176532.0A external-priority patent/CN112929878B/zh
Application filed by 展讯半导体(南京)有限公司 filed Critical 展讯半导体(南京)有限公司
Publication of WO2022171099A1 publication Critical patent/WO2022171099A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0686Additional information in the notification, e.g. enhancement of specific meta-data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a user equipment mobility management method and apparatus, and a computer-readable storage medium.
  • AP indoor 5G access point
  • PUG Private User Group
  • 5G AP defines three types of cells: open cells, hybrid cells and closed cells.
  • open cells refer to cells that any user equipment can access, which is equivalent to the cells defined by macro stations; closed cells are PUG cells, which only support authorized users. Equipment access; in a hybrid cell, any cell can access, but the quality of service of authorized user equipment will be guaranteed first.
  • PUG cell different methods can be used to authorize the access of the user equipment. For example, the password-based method: the 5G AP tells the authorized user the password, which can complete the authorization of the user equipment; the synchronous authorization method: the authorized user information is synchronized between the core network and the authorized user.
  • the user equipment selects/reselects a cell, the user equipment does not know whether it can access the network normally.
  • One purpose of the embodiments of the present invention is: in a 5G AP scenario, the user equipment can know whether it can access the network normally.
  • an embodiment of the present invention provides a method for managing user equipment mobility, including: acquiring network access authorization control information, where the network access authorization control information is used to determine whether the user equipment accesses the network with authority; sending the network access authorization control information.
  • the sending the network access authorization control information includes: sending the network access authorization control information in a broadcast manner.
  • the network access authorization control information is sent in a broadcast manner.
  • the user equipment mobility management method further includes: determining that network access authorization control information is updated; sending first indication information, where the first indication information is used to indicate that the network access authorization control information is updated .
  • the sending the first indication information includes: sending a paging message, where the paging message carries the first indication information.
  • the paging message includes a new paging cause value, and the new paging cause value is used to indicate that the paging message carries the first indication information.
  • the sending the first indication information includes: sending downlink control information, where the downlink control information carries the first indication information.
  • the user equipment mobility management method further includes: when the user equipment does not provide valid network access authorization control information, redirecting the user equipment to another cell.
  • the user equipment mobility management method further includes: when the user equipment does not provide valid network access authorization control information, denying the user equipment access.
  • the rejecting the user equipment access includes: sending a rejection reason value to the user equipment.
  • An embodiment of the present invention further provides a user equipment mobility management device, comprising: an acquisition unit configured to acquire network access authorization control information, where the network access authorization control information is used to determine whether the user equipment accesses the network with authority ; a sending unit, configured to send the network access authorization control information.
  • An embodiment of the present invention also provides another user equipment mobility management apparatus, including a memory and a processor, where the memory stores a computer program that can run on the processor, and the processor runs the computer program The steps of any one of the above-mentioned user equipment mobility management methods are executed.
  • an embodiment of the present invention also provides another user equipment mobility management method, including: receiving network access authorization control information; the network access authorization control information is used to determine whether the user equipment accesses with authority network; according to the network access authorization control information, determine whether to access the network.
  • the receiving the network access authorization control information includes: receiving a broadcast system message, and acquiring the network access authorization control information from the system message.
  • the network access authorization control information includes message integrity check information, and the message integrity check information is generated based on a network access control key.
  • the user equipment mobility management method further includes: receiving first indication information, where the first indication information is used to indicate that the network access authorization control information is updated.
  • the receiving the first indication information includes: receiving a paging message, where the paging message carries the first indication information.
  • the paging message includes a new paging cause value, and the new paging cause value is used to indicate that the paging message carries the first indication information.
  • the receiving the first indication information includes: receiving downlink control information, where the downlink control information carries the first indication information.
  • the method further includes: performing cell reselection.
  • An embodiment of the present invention further provides another user equipment mobility management device, including: an acquisition unit configured to acquire network access authorization control information, where the network access authorization control information is used to determine whether the user equipment accesses with authority a network; a sending unit, configured to send the network access authorization control information.
  • Another object of the embodiments of the present invention is: how the source base station learns whether the user equipment can be handed over to the PUG cell.
  • an embodiment of the present invention provides a user equipment mobility management method, including: determining information of a target cell, where the information of the target cell is used to indicate whether the user equipment is an authorized user of the target cell; information of the target cell is sent.
  • the determining the information of the target cell includes: receiving first indication information, where the first indication information is used to determine the information of the target cell.
  • the information of the target cell includes: identification information of the target cell, authorization information of the target cell; the authorization information of the target cell is used to indicate that the user equipment is an authorized user of the target cell .
  • the authorization information of the target cell further includes: message integrity check information.
  • the authorization information of the target cell further includes: a random number corresponding to the message integrity check information.
  • the user equipment mobility management method further includes: when receiving the handover indication information, sending the authorization information of the target cell to the target base station corresponding to the target cell.
  • An embodiment of the present invention further provides a user equipment mobility management device, comprising: a determining unit configured to determine information of a target cell, where the information of the target cell is used to represent whether the user equipment is authorized by the target cell a user; and a first sending unit, configured to send the information of the target cell.
  • An embodiment of the present invention further provides another user equipment mobility management apparatus, including a memory and a processor, where the memory stores a computer program that can run on the processor, and the processor runs the computer program The steps of any one of the above-mentioned user equipment mobility management methods are executed.
  • an embodiment of the present invention further provides another user equipment mobility management method, including: receiving information of a target cell, where the information of the target cell is used to indicate whether the user equipment is a member of the target cell or not. Authorize the user; send the information of the target cell to the target base station corresponding to the target cell.
  • the user equipment mobility management method further includes: sending first indication information; the first indication information is used by the user equipment to determine the information of the target cell.
  • the information of the target cell includes: identification information of the target cell, authorization information of the target cell; the authorization information of the target cell is used to indicate that the user equipment is an authorized user of the target cell .
  • the authorization information of the target cell further includes: message integrity check information.
  • the authorization information of the target cell further includes: a random number corresponding to the message integrity check information.
  • the user equipment mobility management method further includes: sending handover indication information to the user equipment, where the handover indication information is used to instruct the user equipment to perform cell handover.
  • An embodiment of the present invention further provides a user equipment mobility management device, comprising: a receiving unit configured to receive information of a target cell, where the information of the target cell is used to indicate whether the user equipment is authorized by the target cell a user; and a second sending unit, configured to send the authorization information of the target cell to the base station corresponding to the target cell.
  • An embodiment of the present invention also provides another user equipment mobility management apparatus, including a memory and a processor, where the memory stores a computer program that can run on the processor, and the processor runs the computer program The steps of any one of the above-mentioned user equipment mobility management methods are executed.
  • An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium is a non-volatile storage medium or a non-transitory storage medium, on which a computer program is stored, and the computer program is executed by a processor
  • the steps of any one of the above-mentioned user equipment mobility management methods are executed at runtime.
  • the user equipment determines the information of the target cell, the information of the target cell can represent whether the user equipment is an authorized user of the target cell, and sends the information of the target cell to the source base station. According to the information of the target cell sent by the user equipment, the source base station can know whether the user equipment has the corresponding authority to camp in the target cell, and then determines whether to hand over the user equipment to the target cell.
  • FIG. 1 is a flowchart of a user equipment mobility management method in an embodiment of the present invention
  • FIG. 2 is a flowchart of another user equipment mobility management method in an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a user equipment mobility management apparatus in an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of another user equipment mobility management apparatus in an embodiment of the present invention.
  • FIG. 5 is a flowchart of a user equipment mobility management method in an embodiment of the present invention.
  • FIG. 6 is a flowchart of another user equipment mobility management method in an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a user equipment mobility management apparatus in an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of another user equipment mobility management apparatus in an embodiment of the present invention.
  • 5G AP defines three types of cells: open cells, hybrid cells and closed cells.
  • open cells refer to cells that any user equipment can access, which is equivalent to the cells defined by macro stations; closed cells are PUG cells, which only support authorized users.
  • Equipment access in a hybrid cell, any cell can access, but the quality of service of authorized user equipment will be guaranteed first.
  • a key-based method may be used to authorize user equipment access
  • a synchronization authorization-based method may be used to authorize user equipment access.
  • the user equipment may use the obtained authorization to complete.
  • the method based on synchronization authorization is used to authorize the access of the user equipment, the authorization information is synchronized between the core network and the authorized user equipment.
  • For access control and charging methods it usually includes the following scenarios: 1. Open cells, all user equipment accessed through 5G APs are charged separately; 2. Hybrid cells or closed cells, such as restaurants, hotels and other scenarios, are charged by the work The staff tells the customer the key, the customer uses the user equipment to access through the key, and there is no additional separate billing; 3. Hybrid cell or closed cell, private deployment, for some user equipment, key access is required and separate billing, for another part User equipment does not need key access and is not billed separately. For scenarios such as hospitals, user equipment corresponding to medical staff does not need key access and is not billed separately; 4. Hybrid or closed cells, home deployment, homeowners and Families don’t pay, and visitors need a key to access, and there’s no extra charge.
  • the user equipment may not know which cells are open cells and which cells are closed cells or hybrid cells. Therefore, the user equipment may not be able to know whether it has the right to access the measured cell, and there is a situation in which the user equipment cannot access normally.
  • network access authorization control information is acquired, and the acquired network access authorization control information is sent to the user equipment, so that the user equipment is informed of the network access authorization control information, and then the user equipment is made according to the corresponding network access authorization control information.
  • the access method is used to effectively avoid the situation that the user equipment cannot access the network normally.
  • An embodiment of the present invention provides a method for managing user equipment mobility. Referring to FIG. 1 , the following describes in detail through specific steps.
  • the user equipment mobility management method provided by the following steps S101 to S102 may be executed by an access point device. Specifically, the following steps S101 to S102 may be performed by a chip with a data processing capability in the access point device, or by a chip module including a data processing chip in the access point device.
  • Step S101 acquiring network access authorization control information.
  • the network access authorization control information may be used to determine whether the user equipment accesses the network with the authorization.
  • the network access authorization control information can be acquired by the access point device.
  • the access point device can be a 5G AP access point device.
  • Step S102 sending the network access authorization control information.
  • the access point device may send the network access authorization control information to the user equipment in a broadcast manner.
  • the user equipment can receive the broadcast, and obtain the network access authorization control information from it, and then determine whether the target cell needs authorization verification, or whether the target cell has authorization access.
  • the access point device may broadcast the network access authorization control information to the user equipment through a system message block (SIB) 1.
  • SIB system message block
  • the access point device may also send network access authorization control information to the user equipment in other ways, such as sending network access authorization control information to the user equipment through high-level signaling, which is not described in detail in this embodiment of the present invention.
  • the network access authorization control information may be different according to different ways in which the user equipment accesses the network to access the CUG cell.
  • the network access authorization control information may include a Closed User Group (Closed User Group, CUG) identifier and message integrity check information; if the user equipment is based on If the synchronous authorization method is used to access the CUG cell, the network access authorization control information may include a Closed User Group (Closed User Group, CUG) identifier.
  • CUG Closed User Group
  • the user equipment can obtain the CUG identifier from it, and then determine whether the cell to be camped on (hereinafter referred to as the target cell) is a closed cell or a hybrid cell.
  • the CUG identifier may be used to represent the type of the target cell for cell selection or cell reselection. Further, the CUG identifier can be used to characterize whether the target cell is a closed cell, a hybrid cell or an open cell.
  • multiple CUG cells corresponding to the same user equipment may use the same CUG identifier. That is to say, corresponding to different CUG cells such as rooms, factories, companies, etc., the same CUG identifier can be used. It can be understood that the CUG identifiers corresponding to different CUG cells may also be different.
  • the message integrity check information may be a MIC value.
  • the MIC value can be generated from the CUG key, or from a derived key of the CUG key.
  • the MIC value can also be the integrity check key generated based on the CUG key and all other information except the MIC in the system message, or the derived key based on the CUG key and all other information except the MIC in the system message.
  • the CUG key is the key required by the user equipment to access the target cell, that is, the user equipment needs to input the corresponding key to obtain authorization when accessing the CUG cell.
  • the staff tells the customer the key, and the customer enters the key on the user equipment to access the CUG cell.
  • the user equipment may try to use the pre-stored key to verify the MIC information, Determine whether the CUG cell can be accessed. If the user equipment passes the verification of the MIC information using the pre-stored key, the user equipment can access the CUG cell.
  • the network access authorization control information may be updated.
  • the update of the network access authorization control information means that the user equipment needs to acquire the network access authorization control information again.
  • the access point device may send first indication information to the user equipment, where the first indication information is used to indicate that the network access authorization control information is changed. After receiving the first indication information, the user equipment can learn that the network access authorization control information is changed.
  • the access point device may deliver a paging message to the user equipment, and the paging message carries the first indication information. Specifically, the access point device may set a new paging cause value in the paging message, and use the new paging cause value to carry the first indication information.
  • the access point device may also deliver downlink control information (Downlink Control Information, DCI) to the user equipment, and the downlink control information carries the first indication information.
  • DCI Downlink Control Information
  • the access point device may also deliver the first indication information to the user equipment in other manners, which is not limited to the examples provided in the foregoing embodiments.
  • the access point device may deliver the first indication information to the user equipment to inform the user equipment to input The new key completes the CUG cell camping. After receiving the first indication information, the user equipment can obtain and input a new key.
  • the user can obtain the key from the background staff, or obtain the key from the background server.
  • the CUG cell is deployed by a hotel, and the user can ask the hotel service staff for the updated key of the CUG cell, and then input the updated key for corresponding access.
  • the access point device determines that the user equipment does not provide valid network access authorization control information, the user equipment may be redirected to another cell, or the access of the user equipment may be rejected.
  • the access point device denies the access of the user equipment, it may send a denial reason value to the user equipment, so that the user equipment can learn the specific reason for the denied access.
  • the Reject Reason value could be "Key Error". After receiving the rejection reason value, the user equipment can learn that the reason for not being able to access the CUG cell is the key error.
  • the access point device may determine that the user equipment does not provide valid network access authorization control information. At this time, the access point device may redirect the user equipment to other cells, or deny the access of the user equipment.
  • the user equipment accesses the CUG cell based on the synchronous authorization method
  • the access point device when the access point device detects that the network access authorization control information changes, it can also send the first indication information to the user equipment. After receiving the first indication information, the user equipment can learn that the network access authorization control information has changed.
  • the user equipment after learning that the network access authorization control information has changed, the user equipment can re-read the network access authorization control information table, or request the network to send the updated network access authorization control information table.
  • the access point device may continue to forward the paging message corresponding to the user equipment to ensure that the user equipment is reachable.
  • the network side also needs to continue to send the paging message to the user equipment according to the condition that the network access authorization control information has not changed.
  • access in the embodiment of the present invention may refer to the user equipment camping on the network, or may refer to the user equipment establishing a connection with the network.
  • the network access authorization control information is acquired, and the acquired network access authorization control information is sent to the user equipment, so that the user equipment can know the network access authorization control information, and then the user equipment can obtain the network access authorization control information according to the corresponding access method. Access, effectively avoid the situation that the user equipment cannot access the network normally.
  • An embodiment of the present invention further provides another method for managing user equipment mobility. Referring to FIG. 2 , the following describes in detail through specific steps.
  • the user equipment mobility management method provided by the following steps S201 to S202 may be executed by the user equipment.
  • the following steps S201 to S202 may be performed by a chip with data processing capability in the user equipment, such as a baseband chip; or by a chip module including a baseband chip in the user equipment.
  • Step S201 receiving network access authorization control information.
  • the network access authorization control information may be used to determine whether the user equipment accesses the network with the authorization.
  • the network access authorization control information can be acquired by the access point device.
  • the access point device can be a 5G AP access point device.
  • Step S202 according to the network access authorization control information, determine whether to access the network.
  • the access point device may send the network access authorization control information to the user equipment in a broadcast manner.
  • the user equipment can receive the broadcast of the access point equipment, and obtain the network access authorization control information from it, and then determine whether the cell to be camped on (hereinafter referred to as the target cell) requires authorization verification.
  • the access point device may broadcast the network access authorization control information to the user equipment through a system message block (SIB) 1.
  • SIB system message block
  • the user equipment receives the network access authorization control information sent by the access point device through the SIB1.
  • the access point device may also send network access authorization control information to the user equipment in other ways, such as sending network access authorization control information to the user equipment through high-level signaling, which is not described in detail in this embodiment of the present invention.
  • the network access authorization control information may be different according to different ways in which the user equipment accesses the network to access the CUG cell.
  • the network access authorization control information may include a Closed User Group (Closed User Group, CUG) identifier and message integrity check information; if the user equipment is based on If the method of synchronous authorization is used to access the CUG cell, the network access authorization control information may include a Closed User Group (Closed User Group, CUG) identifier.
  • CUG Closed User Group
  • the user equipment can obtain the CUG identifier therefrom, and then determine whether the cell to be camped on (hereinafter referred to as the target cell) is a closed cell or a hybrid cell.
  • the CUG identifier may be used to represent the type of the target cell for cell selection or cell reselection. Further, the CUG identifier can be used to characterize whether the target cell is a closed cell, a hybrid cell or an open cell.
  • multiple CUG cells corresponding to the same user equipment may use the same CUG identifier.
  • the same CUG identifier can be used. It can be understood that the CUG identifiers corresponding to different CUG cells may also be different.
  • the message integrity check information may be a MIC value.
  • the MIC value can be generated from the CUG key, or from a derived key of the CUG key.
  • the MIC value can also be the integrity check key generated based on the CUG key and all other information except the MIC in the system message, or the derived key based on the CUG key and all other information except the MIC in the system message.
  • the CUG key is the key required by the user equipment to access the target cell, that is, the user equipment needs to input the corresponding key to obtain authorization when accessing the CUG cell.
  • the staff tells the customer the key, and the customer enters the key on the user equipment to access the CUG cell.
  • the user equipment may try to use the pre-stored key to verify the MIC information, Determine whether the CUG cell can be accessed. If the user equipment passes the verification of the MIC information using the pre-stored key, the user equipment can access the CUG cell.
  • the network access authorization control information may be updated.
  • the update of the network access authorization control information means that the user equipment needs to acquire the network access authorization control information again.
  • the access point device when the access point device determines that the network access authorization control information is updated, it may send first indication information to the user equipment, where the first indication information is used to indicate that the network access authorization control information is changed. After receiving the first indication information, the user equipment can learn that the network access authorization control information is changed.
  • the access point device may deliver a paging message to the user equipment, and the paging message carries the first indication information. Specifically, the access point device may set a new paging cause value in the paging message, and use the new paging cause value to carry the first indication information.
  • the access point device may also deliver downlink control information (Downlink Control Information, DCI) to the user equipment, and the downlink control information carries the first indication information.
  • DCI Downlink Control Information
  • the access point device may also deliver the first indication information to the user equipment in other manners, which is not limited to the examples provided in the foregoing embodiments.
  • the access point device may deliver the first indication information to the user equipment to inform the user equipment to input The new key completes the CUG cell camping. After receiving the first indication information, the user equipment can obtain and input a new key.
  • the user can obtain the key from the background staff, or obtain the key from the background server.
  • the CUG cell is deployed by a hotel, and the user can ask the hotel service staff for the updated key of the CUG cell, and then input the updated key for corresponding access.
  • the access point device determines that the user equipment does not provide valid network access authorization control information, the user equipment may be redirected to another cell, or the access of the user equipment may be rejected.
  • the access point device denies the access of the user equipment, it may send a denial reason value to the user equipment, so that the user equipment can learn the specific reason for the denied access.
  • the Reject Reason value could be "Key Error". After receiving the rejection reason value, the user equipment can learn that the reason for not being able to access the CUG cell is the key error.
  • the access point device may determine that the user equipment does not provide valid network access authorization control information. At this time, the access point device may redirect the user equipment to other cells, or deny the access of the user equipment.
  • the user equipment accesses the CUG cell based on the synchronous authorization method
  • the access point device when the access point device detects that the network access authorization control information changes, it can also send the first indication information to the user equipment. After receiving the first indication information, the user equipment can learn that the network access authorization control information has changed.
  • the user equipment after learning that the network access authorization control information has changed, the user equipment can re-read the network access authorization control information table, or request the network to send the updated network access authorization control information table.
  • the access point device before the network access authorization control information is changed, the access point device can still continue to forward the paging message corresponding to the user equipment to ensure that the user equipment is reachable.
  • the network side also needs to continue to send the paging message to the user equipment according to the condition that the network access authorization control information has not changed.
  • access in the embodiment of the present invention may refer to the user equipment camping on the network, or may refer to the user equipment establishing a connection with the network.
  • the network access authorization control information is acquired, and the acquired network access authorization control information is sent to the user equipment, so that the user equipment can know the network access authorization control information, and then the user equipment can obtain the network access authorization control information according to the corresponding access method. Access, effectively avoid the situation that the user equipment cannot access the network normally.
  • a user equipment mobility management apparatus 30 in an embodiment of the present invention is given, including: an obtaining unit 301 and a sending unit 302, wherein:
  • an obtaining unit 301 configured to obtain network access authorization control information, where the network access authorization control information is used to determine whether the user equipment accesses the network with authority;
  • the sending unit 302 is configured to send the network access authorization control information.
  • the above-mentioned user equipment mobility management apparatus 30 may correspond to a chip with a data processing function in the access point device, such as a data signal processing chip; or correspond to a chip with a data processing function included in the access point device Chip module, or corresponding to the access point device.
  • another user equipment mobility management apparatus 40 in an embodiment of the present invention including: a receiving unit 401 and a determining unit 402, wherein:
  • a receiving unit 401 configured to receive network access authorization control information; the network access authorization control information is used to determine whether the user equipment accesses the network with authority;
  • the determining unit 402 is configured to determine whether to access the network according to the network access authorization control information.
  • the above-mentioned user equipment mobility management apparatus 40 may correspond to a chip with a data processing function in the user equipment, such as a baseband chip; or a chip module including a chip with a data processing function in the user equipment, or correspond to on user equipment.
  • the source base station when performing cell handover, does not know whether the user equipment can be handed over to the PUG cell.
  • the user equipment determines the information of the target cell
  • the information of the target cell can represent whether the user equipment is an authorized user of the target cell, and sends the information of the target cell to the source base station.
  • the source base station can know whether the user equipment has the corresponding authority to camp in the target cell, and then determines whether to hand over the user equipment to the target cell.
  • An embodiment of the present invention provides another user equipment mobility management method. Referring to FIG. 5 , the following describes in detail through specific steps.
  • the user equipment mobility management method provided by the following steps S501 to S502 may be executed by the user equipment.
  • the following steps S501 to S502 may be executed by a chip with data processing capability in the user equipment, such as a baseband chip; or by a chip module including a baseband chip in the user equipment.
  • Step S501 determine the information of the target cell.
  • the source base station may not configure the measurement configuration of the target cell for the user equipment in the neighboring cell measurement configuration configured for the user equipment. Therefore, the source base station can configure the user equipment to feed back information of the target cell.
  • the source base station device may deliver the first indication information to the user equipment, and the first indication information may be used to trigger the user equipment to feed back the information of the target cell.
  • the user equipment may receive the first indication information delivered by the source base station, and determine the information of the target cell according to the first indication information delivered by the source base station.
  • the source base station may issue the first indication information to the user equipment through high-layer signaling, or may issue the first indication information to the user equipment through downlink control information (Downlink Control Information, DCI), and may also use MAC address Other types of signaling such as CE deliver the first indication information to the user equipment.
  • the high-layer signaling may be Radio Resource Control (Radio Resource Control, RRC) signaling.
  • the information of the target cell may include identification information of the target cell and authorization information of the target cell.
  • the identification information of the target cell may be used to indicate which cell the target cell is, and the authorization information of the target cell The information can be used to characterize whether the user equipment is an authorized user of the target cell.
  • the user equipment may not generate the information of the target cell, and does not need to send the information of the target cell subsequently. Therefore, when the user equipment determines that it is an authorized user of the target cell, it can determine the information of the target cell, and perform subsequent operations of sending the information of the target cell.
  • the user equipment determines the information of the target cell only when the user equipment is an authorized user of the target cell.
  • the authorization information of the target cell may be used to characterize that the user equipment is an authorized user of the target cell.
  • the target cell may be a closed cell or a hybrid cell.
  • a closed cell only supports access by authorized user equipment; in a hybrid cell, any user equipment can access, but the quality of service of the authorized user equipment will be preferentially guaranteed.
  • the target cell may be a Closed User Group (Closed User Group, CUG) cell where the user equipment can camp.
  • CUG Closed User Group
  • the CUG cell currently covering the user equipment 1 is the CUG cell 1, and the user equipment 1 is not an authorized user of the CUG cell 1.
  • the identification information of the target cell fed back to the source base station is: the identification information of the CUG cell is 1; the user equipment 1 of the target cell fed back to the source base station is not an authorized user equipment.
  • the CUG cell currently covering the user equipment 2 is the CUG cell 1
  • the user equipment 2 is an authorized user of the CUG cell 1
  • the authorization information of the target cell fed back to the source base station is: the identification information of the CUG cell is 1, and the user equipment 2 is an authorized user equipment of the CUG cell 1 .
  • Step S502 Send the information of the target cell.
  • the user equipment may send the determined information of the target cell.
  • the determined information of the target cell may be sent to the source base station.
  • the source base station may learn whether the user equipment can camp on the target cell. After determining to hand over the user equipment to the target cell, the source base station may send information of the target cell to the target base station corresponding to the target cell.
  • the source base station may send handover indication information to the user equipment.
  • the user equipment may send the authorization information of the target cell to the target base station.
  • the target base station After receiving the information of the target cell sent by the source base station and the authorization information of the target cell sent by the user equipment, the target base station can judge the authorization relationship of the user equipment to determine whether the user equipment is an authorized user, and then determine the user equipment. Whether the device can camp on the target cell.
  • the source base station may be a macro base station, or may be a 5G access point device or other types of base stations.
  • the user equipment can access the target cell through the key.
  • the information of the target cell sent by the user equipment to the source base station may include message integrity check information corresponding to the target cell in addition to the identification information of the target cell and the authorization information of the target cell.
  • the message integrity check information may be a message integrity check (Messages Integrity Check, MIC) value.
  • the MIC value can be generated from the CUG key, or from a derived key of the CUG key.
  • the MIC value can also be the integrity check key generated based on the CUG key and all other information except the MIC in the system message, or the derived key based on the CUG key and all other information except the MIC in the system message.
  • the integrity check code generated by the message.
  • the CUG key is the key required by the user equipment to access the target cell, that is, the user equipment needs to input the corresponding key to obtain authorization when accessing the CUG cell.
  • the authorization information of the target cell may further include a random number corresponding to the message integrity check information.
  • the user equipment may also send the random number corresponding to the message integrity check information to the source base station.
  • the information of the target cell sent by the user equipment received by the source base station includes: identification information of the target cell, authorization information of the target cell, message integrity check information of the target cell, and random numbers corresponding to the message integrity check information .
  • the information of the target cell sent by the user equipment to the target base station includes: authorization information of the target cell, message integrity check information of the target cell, and random numbers corresponding to the message integrity check information.
  • the user equipment may use msg3 or msg5 to send the authorization information of the target cell to the target base station.
  • the authorization information of the target cell is sent to the target base station during the first uplink data transmission after the RAR.
  • the user equipment can carry the authorization information of the target cell in the msgA and send it to the target base station.
  • the user equipment may also access the target cell based on the synchronization authorization method. After receiving the handover indication information, the user equipment sends the authorization information of the target cell to the target base station.
  • the target base station can determine whether to allow the user equipment to reside according to the synchronization authorization relationship stored by itself.
  • the target base station may also send a request to the core network, and the core network determines whether to allow the user equipment to camp.
  • the target base station may also request authorization information from the core network. After receiving the request from the target base station, the core network sends authorization information to the target base station, and the target base station determines whether the user equipment is allowed to camp.
  • the core network before the user equipment is handed over to the target cell, the core network still needs to continue to send paging messages according to the situation that the user equipment has not been handed over, so as to ensure that the user equipment is reachable.
  • the core network may send a paging message according to the fact that the user equipment is handed over to ensure that the user equipment is reachable.
  • the user equipment determines the information of the target cell
  • the information of the target cell can indicate whether the user equipment is an authorized user of the target cell, and sends the information of the target cell to the source base station.
  • the source base station can know whether the user equipment has the corresponding authority to camp in the target cell, and then determines whether to hand over the user equipment to the target cell.
  • FIG. 6 another user equipment mobility management method in an embodiment of the present invention is given, which is described in detail below through specific steps.
  • the user equipment mobility management method provided by the following steps S601 to S602 may be executed by the source base station.
  • the following steps S601 to S602 may be executed by a chip with data processing capability in the source base station, or executed by a chip module including a data processing chip in the source base station.
  • Step S601 receiving the information of the target cell.
  • Step S602 the information of the target cell is sent to the target base station corresponding to the target cell.
  • the source base station may not configure the measurement configuration of the target cell for the user equipment in the neighboring cell measurement configuration configured for the user equipment. Therefore, the source base station can configure the user equipment to feed back information of the target cell.
  • the source base station device may deliver first indication information to the user equipment, and the first indication information may be used to trigger the user equipment to feed back information of the target cell.
  • the user equipment After receiving the first indication information delivered by the source base station, the user equipment can determine the information of the target cell according to the first indication information delivered by the source base station, and send the determined information of the target cell to the source base station.
  • the source base station may issue the first indication information to the user equipment through high-layer signaling, or may issue the first indication information to the user equipment through downlink control information (Downlink Control Information, DCI), and may also use MAC address Other types of signaling such as CE deliver the first indication information to the user equipment.
  • the high-layer signaling may be Radio Resource Control (Radio Resource Control, RRC) signaling.
  • the information of the target cell may include identification information of the target cell and authorization information of the target cell.
  • the identification information of the target cell may be used to indicate which cell the target cell is, and the authorization information of the target cell The information can be used to characterize whether the user equipment is an authorized user of the target cell.
  • the user equipment may not generate the information of the target cell, and does not need to send the information of the target cell subsequently. Therefore, when the user equipment determines that it is an authorized user of the target cell, it can determine the information of the target cell, and perform subsequent operations of sending the information of the target cell.
  • the user equipment determines the information of the target cell only when the user equipment is an authorized user of the target cell.
  • the authorization information of the target cell can be used to characterize that the user equipment is an authorized user of the target cell.
  • the target cell may be a closed cell or a hybrid cell.
  • a closed cell only supports access by authorized user equipment; in a hybrid cell, any user equipment can access, but the quality of service of the authorized user equipment will be preferentially guaranteed.
  • the target cell may be a Closed User Group (Closed User Group, CUG) cell where the user equipment can camp.
  • CUG Closed User Group
  • the CUG cell currently covering the user equipment 1 is the CUG cell 1, and the user equipment 1 is not an authorized user of the CUG cell 1.
  • the identification information of the target cell fed back to the source base station is: the identification information of the CUG cell is 1; the user equipment 1 of the target cell fed back to the source base station is not an authorized user equipment.
  • the CUG cell currently covering the user equipment 2 is the CUG cell 1
  • the user equipment 2 is an authorized user of the CUG cell 1
  • the authorization information of the target cell fed back to the source base station is: the identification information of the CUG cell is 1, and the user equipment 2 is an authorized user equipment of the CUG cell 1 .
  • the source base station may learn whether the user equipment can camp on the target cell. After determining to hand over the user equipment to the target cell, the source base station may send information of the target cell to the target base station corresponding to the target cell.
  • the source base station may send handover indication information to the user equipment.
  • the user equipment may send the authorization information of the target cell to the target base station.
  • the target base station After receiving the information of the target cell sent by the source base station and the authorization information of the target cell sent by the user equipment, the target base station can judge the authorization relationship of the user equipment to determine whether the user equipment is an authorized user, and then determine the user equipment. Whether the device can camp on the target cell.
  • the source base station may be a macro base station, or may be a 5G access point device or other types of base stations.
  • the user equipment can access the target cell through the key.
  • the information of the target cell sent by the user equipment to the source base station may include message integrity check information corresponding to the target cell in addition to the identification information of the target cell and the authorization information of the target cell.
  • the message integrity check information may be a MIC value.
  • the MIC value can be generated from the CUG key, or from a derived key of the CUG key.
  • the MIC value can also be the integrity check key generated based on the CUG key and all other information except the MIC in the system message, or the derived key based on the CUG key and all other information except the MIC in the system message.
  • the CUG key is the key required by the user equipment to access the target cell, that is, the user equipment needs to input the corresponding key to obtain authorization when accessing the CUG cell.
  • the authorization information of the target cell may further include a random number corresponding to the message integrity check information.
  • the user equipment may also send the random number corresponding to the message integrity check information to the source base station.
  • the information of the target cell sent by the user equipment received by the source base station includes: identification information of the target cell, authorization information of the target cell, message integrity check information of the target cell, and random numbers corresponding to the message integrity check information .
  • the information of the target cell sent by the user equipment to the target base station includes: authorization information of the target cell, message integrity check information of the target cell, and random numbers corresponding to the message integrity check information.
  • the user equipment may use msg3 or msg5 to send the authorization information of the target cell to the target base station.
  • the authorization information of the target cell is sent to the target base station during the first uplink data transmission after the RAR.
  • the user equipment can carry the authorization information of the target cell in the msgA and send it to the target base station.
  • the user equipment may also access the target cell based on the synchronization authorization method. After receiving the handover indication information, the user equipment sends the authorization information of the target cell to the target base station.
  • the target base station can determine whether to allow the user equipment to reside according to the synchronization authorization relationship stored by itself.
  • the target base station may also send a request to the core network, and the core network determines whether to allow the user equipment to camp.
  • the target base station may also request authorization information from the core network. After receiving the request from the target base station, the core network sends authorization information to the target base station, and the target base station determines whether the user equipment is allowed to camp.
  • the core network before the user equipment is handed over to the target cell, the core network still needs to continue to send paging messages according to the situation that the user equipment has not been handed over, so as to ensure that the user equipment is reachable.
  • the core network may send a paging message according to the fact that the user equipment is handed over to ensure that the user equipment is reachable.
  • the user equipment determines the information of the target cell
  • the information of the target cell can indicate whether the user equipment is an authorized user of the target cell, and sends the information of the target cell to the source base station.
  • the source base station can know whether the user equipment has the corresponding authority to camp in the target cell, and then determines whether to hand over the user equipment to the target cell.
  • a user equipment mobility management apparatus 70 in an embodiment of the present invention including: a determining unit 701 and a first sending unit 702, wherein:
  • a determining unit 701 configured to determine information of a target cell, where the information of the target cell is used to characterize whether the user equipment is an authorized user of the target cell;
  • the first sending unit 702 is configured to send the information of the target cell.
  • the above-mentioned user equipment mobility management apparatus 70 may correspond to a chip with a data processing function in the user equipment, such as a baseband chip; or a chip module including a chip with a data processing function in the user equipment, or correspond to on user equipment.
  • a user equipment mobility management apparatus 80 in an embodiment of the present invention including: a receiving unit 801 and a second sending unit 802, wherein:
  • a receiving unit 801 configured to receive information of a target cell, where the information of the target cell is used to characterize whether the user equipment is an authorized user of the target cell;
  • the second sending unit 802 is configured to send the authorization information of the target cell to the target base station corresponding to the target cell.
  • the above-mentioned user equipment mobility management device 80 may correspond to a chip with a data processing function in the source base station, such as a data signal processing chip; or correspond to a chip module including a chip with a data processing function in the source base station, Or corresponding to the source base station.
  • each module/unit included in each device and product described in the above embodiments it may be a software module/unit, a hardware module/unit, or a part of a software module/unit, a part of which is a software module/unit. is a hardware module/unit.
  • each module/unit included therein may be implemented by hardware such as circuits, or at least some of the modules/units may be implemented by a software program.
  • Running on the processor integrated inside the chip the remaining (if any) part of the modules/units can be implemented by hardware such as circuits; for each device and product applied to or integrated in the chip module, the modules/units contained therein can be They are all implemented by hardware such as circuits, and different modules/units can be located in the same component of the chip module (such as chips, circuit modules, etc.) or in different components, or at least some of the modules/units can be implemented by software programs.
  • the software program runs on the processor integrated inside the chip module, and the remaining (if any) part of the modules/units can be implemented by hardware such as circuits; for each device and product applied to or integrated in the terminal, each module contained in it
  • the units/units may all be implemented in hardware such as circuits, and different modules/units may be located in the same component (eg, chip, circuit module, etc.) or in different components in the terminal, or at least some of the modules/units may be implemented in the form of software programs Realization, the software program runs on the processor integrated inside the terminal, and the remaining (if any) part of the modules/units can be implemented in hardware such as circuits.
  • An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium is a non-volatile storage medium or a non-transitory storage medium, on which a computer program is stored, and the computer program is executed by a processor
  • the steps of the user equipment mobility management method provided by any of the foregoing embodiments are executed at runtime.
  • An embodiment of the present invention further provides another user equipment mobility management apparatus, including a memory and a processor, where the memory stores a computer program that can run on the processor, and the processor runs the computer program When executing the steps of the user equipment mobility management method corresponding to the above steps S101 to S102; or, the processor executes the steps of the user equipment mobility management method corresponding to the above steps S201 to S202 when running the computer program; or , the processor executes the steps of the user equipment mobility management method corresponding to the above steps S501 to S502 when running the computer program; or, the processor executes the steps corresponding to the above steps S601 to S602 when running the computer program. Steps of a user equipment mobility management method.

Abstract

一种用户设备移动性管理方法及装置、计算机可读存储介质,所述方法包括:获取网络接入授权控制信息,所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;发送所述网络接入授权控制信息。上述方案能够使得用户设备可以获知是否能够正常接入网络。

Description

用户设备移动性管理方法及装置、计算机可读存储介质
本申请要求于2021年2月9日提交中国专利局、申请号为202110176532.0、发明名称为“用户设备移动性管理方法及装置、计算机可读存储介质”的中国专利申请的优先权,以及于2021年2月9日提交中国专利局、申请号为202110179240.2、发明名称为“用户设备移动性管理方法及装置、计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及无线通信技术领域,尤其涉及一种用户设备移动性管理方法及装置、计算机可读存储介质。
背景技术
在3GPP R18中开始研究residential 5G,一个主要的应用场景是:定义室内的5G接入点(AP)用于做室内的5G覆盖。5G AP可以等同于微型接入点设备。类似于H(e)NB中的封闭用户组(Closed Subscriber Group,CSG),5G AP可能会定义一个小区,该小区只限定特定的用户设备接入,假定5G AP定义私人用户组(Private User Group,PUG),并且,只支持PUG用户接入的小区称为PUG小区。
5G AP定义三类小区:开放小区、混合小区以及封闭小区,其中:开放小区是指任何用户设备都能够接入的小区,相当于宏站定义的小区;封闭小区为PUG小区,只支持授权用户设备接入;混合小区中,任何小区都能够接入,但是会优先保障授权用户设备的服务质量。对于PUG小区,可以采用不同的方法授权用户设备的接入。比如,基 于密码的方法:5G AP告诉授权用户密码,既可以完成用户设备授权;同步授权法:授权用户信息在核心网和授权用户之间完成同步。
然而,用户设备在小区选择/重选时,用户设备并不知道是否能够正常接入网络。
发明内容
本发明实施例的一个目的在于:在5G AP的场景下,用户设备能够知道是否能够正常接入网络。
为实现上述目的,本发明实施例提供一种用户设备移动性管理方法,包括:获取网络接入授权控制信息,所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;发送所述网络接入授权控制信息。
可选的,所述发送所送网络接入授权控制信息,包括:通过广播的方式发送所述网络接入授权控制信息。
可选的,通过广播的方式发送所述网络接入授权控制信息。
可选的,所述用户设备移动性管理方法还包括:确定网络接入授权控制信息发生更新;发送第一指示信息,所述第一指示信息用于指示所述网络接入授权控制信息发生更新。
可选的,所述发送第一指示信息,包括:发送寻呼消息,所述寻呼消息承载所述第一指示信息。
可选的,所述寻呼消息包括新的寻呼原因值,所述新的寻呼原因值用于指示所述寻呼消息承载所述第一指示信息。
可选的,所述发送第一指示信息,包括:发送下行控制信息,所述下行控制信息承载所述第一指示信息。
可选的,所述用户设备移动性管理方法还包括:在所述用户设备未提供有效的网络接入授权控制信息时,将所述用户设备重定向到其 他小区。
可选的,所述用户设备移动性管理方法还包括:在所述用户设备未提供有效的网络接入授权控制信息时,拒绝所述用户设备接入。
可选的,所述拒绝所述用户设备接入,包括:向所述用户设备发送拒绝原因值。
本发明实施例还提供了一种用户设备移动性管理装置,包括:获取单元,用于获取网络接入授权控制信息,所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;发送单元,用于发送所述网络接入授权控制信息。
本发明实施例还提供了又一种用户设备移动性管理装置,包括存储器和处理器,所述存储器上存储有可在所述处理器上运行的计算机程序,所述处理器运行所述计算机程序时执行上述任一种所述的用户设备移动性管理方法的步骤。
为实现上述目的,本发明实施例还提供了另一种用户设备移动性管理方法,包括:接收网络接入授权控制信息;所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;根据所述网络接入授权控制信息,确定是否接入网络。
可选的,所述接收网络接入授权控制信息,包括:接收广播的系统消息,从所述系统消息中获取所述网络接入授权控制信息。
可选的,所述网络接入授权控制信息包括消息完整性校验信息,所述消息完整性校验信息基于网络接入控制密钥生成。
可选的,所述用户设备移动性管理方法还包括:接收第一指示信息,所述第一指示信息用于指示所述网络接入授权控制信息发生更新。
可选的,所述接收第一指示信息,包括:接收寻呼消息,所述寻呼消息承载所述第一指示信息。
可选的,所述寻呼消息包括新的寻呼原因值,所述新的寻呼原因值用于指示所述寻呼消息承载所述第一指示信息。
可选的,所述接收第一指示信息,包括:接收下行控制信息,所述下行控制信息承载所述第一指示信息。
可选的,在接收到所述第一指示信息之后,还包括:执行小区重选。
本发明实施例还提供了另一种用户设备移动性管理装置,包括:获取单元,用于获取网络接入授权控制信息,所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;发送单元,用于发送所述网络接入授权控制信息。
本发明实施例的另一个目的是:源基站怎样获知用户设备是否能够切换至PUG小区。
为实现上述目的,本发明实施例提供一种用户设备移动性管理方法,包括:确定目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;发送所述目标小区的信息。
可选的,所述确定目标小区的信息,包括:接收第一指示信息,所述第一指示信息用于确定所述目标小区的信息。
可选的,所述目标小区的信息包括:所述目标小区的标识信息,所述目标小区的授权信息;所述目标小区的授权信息用于表征所述用户设备为所述目标小区的授权用户。
可选的,所述目标小区的授权信息还包括:消息完整性校验信息。
可选的,所述目标小区的授权信息还包括:所述消息完整性校验信息对应的随机数。
可选的,所述用户设备移动性管理方法还包括:在接收到切换指示信息时,向所述目标小区对应的目标基站发送所述目标小区的授权 信息。
本发明实施例还提供了一种用户设备移动性管理装置,包括:确定单元,用于确定目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;第一发送单元,用于发送所述目标小区的信息。
本发明实施例还提供了另一种用户设备移动性管理装置,包括存储器和处理器,所述存储器上存储有可在所述处理器上运行的计算机程序,所述处理器运行所述计算机程序时执行上述任一种所述的用户设备移动性管理方法的步骤。
为实现上述目的,本发明实施例还提供了另一种用户设备移动性管理方法,包括:接收目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;向所述目标小区对应的目标基站发送所述目标小区的信息。
可选的,所述用户设备移动性管理方法还包括:发送第一指示信息;所述第一指示信息用于所述用户设备确定所述目标小区的信息。
可选的,所述目标小区的信息包括:所述目标小区的标识信息,所述目标小区的授权信息;所述目标小区的授权信息用于表征所述用户设备为所述目标小区的授权用户。
可选的,所述目标小区的授权信息还包括:消息完整性校验信息。
可选的,所述目标小区的授权信息还包括:所述消息完整性校验信息对应的随机数。
可选的,所述用户设备移动性管理方法还包括:向所述用户设备发送切换指示信息,所述切换指示信息用于指示所述用户设备进行小区切换。
本发明实施例还提供了一种用户设备移动性管理装置,包括:接收单元,用于接收目标小区的信息,所述目标小区的信息用于表征所 述用户设备是否为所述目标小区的授权用户;第二发送单元,用于向所述目标小区对应的基站发送所述目标小区的授权信息。
本发明实施例还提供了又一种用户设备移动性管理装置,包括存储器和处理器,所述存储器上存储有可在所述处理器上运行的计算机程序,所述处理器运行所述计算机程序时执行上述任一种所述的用户设备移动性管理方法的步骤。
本发明实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质为非易失性存储介质或非瞬态存储介质,其上存储有计算机程序,所述计算机程序被处理器运行时执行上述任一种所述的用户设备移动性管理方法的步骤。
与现有技术相比,本发明实施例的技术方案具有以下有益效果:
获取网络接入授权控制信息,并将获取到的网络接入授权控制信息发送至用户设备,从而使得用户设备获知网络接入授权控制信息,进而使得用户设备根据相应的接入方式接入,有效避免用户设备无法正常接入网络的情况出现。
用户设备确定目标小区的信息,目标小区的信息能够表征该用户设备是否为目标小区的授权用户,将目标小区的信息发送至源基站。源基站根据用户设备发送的目标小区的信息,即可获知用户设备是否具有相应的权限驻留在目标小区中,进而确定是否将用户设备切换至目标小区中。
附图说明
图1是本发明实施例中的一种用户设备移动性管理方法的流程图;
图2是本发明实施例中的另一种用户设备移动性管理方法的流程图;
图3是本发明实施例中的一种用户设备移动性管理装置的结构示意图;
图4是本发明实施例中的另一种用户设备移动性管理装置的结构示意图;
图5是本发明实施例中的一种用户设备移动性管理方法的流程图;
图6是本发明实施例中的另一种用户设备移动性管理方法的流程图;
图7是本发明实施例中的一种用户设备移动性管理装置的结构示意图;
图8是本发明实施例中的另一种用户设备移动性管理装置的结构示意图。
具体实施方式
5G AP定义三类小区:开放小区、混合小区以及封闭小区,其中:开放小区是指任何用户设备都能够接入的小区,相当于宏站定义的小区;封闭小区为PUG小区,只支持授权用户设备接入;混合小区中,任何小区都能够接入,但是会优先保障授权用户设备的服务质量。
对于PUG小区,可以采用不同的方法授权用户设备的接入。在实际应用中,可以采用基于密钥的方法授权用户设备接入,或者采用基于同步授权的方法授权用户设备接入。在采用基于密钥的方法授权用户设备接入时,用户设备可以采用获取到的要完成授权。在采用基于同步授权的方法授权用户设备接入时,授权信息在核心网与授权用户设备之间完成同步。
针对接入控制和计费方式,通常包括如下场景:1、开放小区,所有通过5G AP接入的用户设备都单独计费;2、混合小区或者封闭 小区,例如饭店、酒店等场景,由工作人员告诉顾客密钥,顾客通过密钥使用用户设备接入,不额外单独计费;3、混合小区或者封闭小区,私人部署,针对部分用户设备需要密钥接入并单独计费,针对另一部分用户设备不需要密钥接入也不单独计费,如医院等场景,医护人员对应的用户设备无需密钥接入也不单独计费;4、混合小区或者封闭小区,家庭部署,房主及家人无需付费,访客需要密钥才能访问,也无需额外付费。
然而,在5G AP所定义的三类小区中,用户设备可能并不知道哪些小区是开放小区,哪些小区是封闭小区或者混合小区。因此,用户设备可能无法获知是否有权限接入测量得到的小区,存在用户设备无法正常接入的情况。
在本发明实施例中,获取网络接入授权控制信息,并将获取到的网络接入授权控制信息发送至用户设备,从而使得用户设备获知网络接入授权控制信息,进而使得用户设备根据相应的接入方式接入,有效避免用户设备无法正常接入网络的情况出现。
为使本发明的上述目的、特征和有益效果能够更为明显易懂,下面结合附图对本发明的具体实施例做详细的说明。
本发明实施例提供了一种用户设备移动性管理方法,参照图1,以下通过具体步骤进行详细说明。
在本发明实施例中,下述步骤S101~步骤S102所提供的用户设备移动性管理方法可以由接入点设备所执行。具体的,下述步骤S101~步骤S102可以由接入点设备中具有数据处理能力的芯片所执行,或者由接入点设备中包含数据处理芯片的芯片模组所执行。
步骤S101,获取网络接入授权控制信息。
在具体实施中,网络接入授权控制信息可以用于判断用户设备是否用权限接入网络。网络接入授权控制信息可以由接入点设备获取。接入点设备可以为5G AP接入点设备。
步骤S102,发送所述网络接入授权控制信息。
在具体实施中,可以由接入点设备通过广播的方式向用户设备发送网络接入授权控制信息。用户设备可以接收广播,并从中获取网络接入授权控制信息,进而确定目标小区是否需要权限验证,或者是否有权限接入。
在本发明实施例中,接入点设备可以通过系统消息块(SIB)1向用户设备广播网络接入授权控制信息。
可以理解的是,接入点设备也可以采用其他的方式向用户设备发送网络接入授权控制信息,如通过高层信令向用户设备发送网络接入授权控制信息,本发明实施例不做赘述。
在具体实施中,根据用户设备接入网络接入CUG小区的方式不同,网络接入授权控制信息可以不同。
在本发明实施例中,若用户设备使用密钥接入CUG小区,则网络接入授权控制信息可以包括封闭用户组(Closed User Group,CUG)标识以及消息完整性校验信息;若用户设备基于同步授权的方法接入CUG小区,则网络接入授权控制信息可以包括封闭用户组(Closed User Group,CUG)标识。
在具体实施中,用户设备在接收到网络接入授权控制信息之后,可以从中获取CUG标识,进而确定所要驻留的小区(以下简称目标小区)是否为封闭小区还是混合小区。
在本发明实施例中,CUG标识可以用于表征进行小区选择或者小区重选的目标小区的类型。进一步而言,CUG标识可以用于表征目标小区是封闭小区、混合小区还是开放小区。
在具体实施中,同一个用户设备对应的多个CUG小区可以使用相同的CUG标识。也就是说,对应于房间、工厂、公司等不同的CUG小区,可以使用相同的CUG标识。可以理解的是,不同的CUG小区对应的CUG标识也可以不同。
在本发明实施例中,消息完整性校验信息可以为MIC值。MIC值可以根据CUG密钥生成,或者根据CUG密钥的派生密钥生成。MIC值也可以为基于CUG密钥以及系统消息中除MIC之外的其他所有信息生成的完整性校验密钥,或者根据CUG密钥的派生密钥以及系统消息中除MIC之外的其他所有信息生成的完整性校验码。CUG密钥即为用户设备接入目标小区所需的密钥,也即用户设备在接入该CUG小区时需要输入相应的密钥才能够获得授权。
例如,在饭店、酒店等场景,由工作人员告诉顾客密钥,顾客在用户设备上输入密钥接入CUG小区。
在具体实施中,若用户设备确定当前所要驻留的小区为CUG小区,且用户设备基于密钥的方法接入CUG小区,则用户设备可以尝试使用预先存储的密钥对MIC信息进行验证,以确定是否能够接入CUG小区。若用户设备使用预先存储的密钥对MIC信息通过验证,则用户设备可以接入该CUG小区。
在具体应用中,网络接入授权控制信息可能会发生更新。网络接入授权控制信息发生更新,意味着用户设备需要重新获取网络接入授权控制信息。
当接入点设备确定网络接入授权控制信息发生更新时,可以向用户设备发送第一指示信息,第一指示信息用于指示网络接入授权控制信息发生变更。用户设备在接收到第一指示信息后,即可获知网络接入授权控制信息发生变更。
在具体实施中,接入点设备可以向用户设备下发寻呼消息,由寻呼消息承载第一指示信息。具体而言,接入点设备可以在寻呼消息中设置新的寻呼原因值,通过新的寻呼原因值来承载第一指示信息。
在具体实施中,接入点设备也可以向用户设备下发下行控制信息(Downlink Control Information,DCI),在下行控制信息中承载有第一指示信息。
可以理解的是,接入点设备也可以通过其他方式向用户设备下发第一指示信息,并不仅限于上述实施例中提供的示例。
在本发明实施例中,若用户设备基于密钥接入CUG小区,则接入点设备在检测到CUG小区的密钥更新后,可以向用户设备下发第一指示信息,以告知用户设备输入新的密钥,完成CUG小区驻留。用户设备在接收到第一指示信息后,可以获取新的密钥并输入。
在具体应用中,若CUG小区的密钥更新,则用户可以向后台工作人员索取密钥,或者向后台服务器索取密钥。
例如,CUG小区由酒店部署,用户可以向酒店服务人员询问更新后的CUG小区的密钥,进而输入更新后的密钥进行相应的接入。
在具体实施中,若接入点设备判定用户设备未提供有效的网络接入授权控制信息时,可以将用户设备重定向到其他小区,或者拒绝该用户设备的接入。当接入点设备拒绝该用户设备的接入时,可以向用户设备发送拒绝原因值,使得用户设备能够获知被拒绝接入的具体原因。
例如,拒绝原因值可以为“密钥错误”。用户设备在接收到拒绝原因值之后,即可获知无法接入CUG小区的原因为密钥错误。
在本发明实施例中,若接入点设备判定用户设备输入的密钥错误,则接入点设备可以判定用户设备没有提供有效的网络接入授权控制信息。此时接入点设备可以将用户设备重定向至其他的小区,或者拒绝用户设备的接入。
在具体实施中,若用户设备基于同步授权的方法接入CUG小区,则当接入点设备检测到网络接入授权控制信息发生变化时,也可以向用户设备发送第一指示信息。用户设备在接收到第一指示信息后,即可获知网络接入授权控制信息发生变化。
在本发明实施例中,用户设备在获知网络接入授权控制信息发生变化后,可以重新读取网络接入授权控制信息表,或者请求网络发送 更新后的网络接入授权控制信息表。
在具体实施中,在网络接入授权控制信息完成变更之前,接入点设备仍可以继续转发用户设备对应的寻呼消息,以保证用户设备可达。相应地,网络侧也需要按照网络接入授权控制信息没有发生变化的情况继续向用户设备发送寻呼消息。
需要说明的是,本发明实施例中所述的“接入”可以是指用户设备驻留到网络,也可以是指用户设备与网络建立连接。
由此可见,获取网络接入授权控制信息,并将获取到的网络接入授权控制信息发送至用户设备,从而使得用户设备获知网络接入授权控制信息,进而使得用户设备根据相应的接入方式接入,有效避免用户设备无法正常接入网络的情况出现。
本发明实施例还提供了另一种用户设备移动性管理方法,参照图2,以下通过具体步骤进行详细说明。
在本发明实施例中,下述步骤S201~步骤S202所提供的用户设备移动性管理方法可以由用户设备所执行。具体的,下述步骤S201~步骤S202可以由用户设备中具有数据处理能力的芯片所执行,如基带芯片;或者由用户设备中包含基带芯片的芯片模组所执行。
步骤S201,接收网络接入授权控制信息。
在具体实施中,网络接入授权控制信息可以用于判断用户设备是否用权限接入网络。网络接入授权控制信息可以由接入点设备获取。接入点设备可以为5G AP接入点设备。
步骤S202,根据所述网络接入授权控制信息,确定是否接入网络。
在具体实施中,接入点设备可以通过广播的方式,向用户设备发送网络接入授权控制信息。用户设备可以接收接入点设备的广播,并从中获取网络接入授权控制信息,进而确定所要驻留的小区(以下简 称目标小区)是否需要权限验证。
在本发明实施例中,接入点设备可以通过系统消息块(SIB)1向用户设备广播网络接入授权控制信息。用户设备接收接入点设备通过SIB1发送的网络接入授权控制信息。
可以理解的是,接入点设备也可以采用其他的方式向用户设备发送网络接入授权控制信息,如通过高层信令向用户设备发送网络接入授权控制信息,本发明实施例不做赘述。
在具体实施中,根据用户设备接入网络接入CUG小区的方式不同,网络接入授权控制信息可以不同。
在本发明实施例中,若用户设备使用密钥接入CUG小区,则网络接入授权控制信息可以包括封闭用户组(Closed User Group,CUG)标识以及消息完整性校验信息;若用户设备基于同步授权的方法接入CUG小区,则网络接入授权控制信息可以包括封闭用户组(Closed User Group,CUG)标识。
在具体实施中,用户设备在接收到网络接入授权控制信息之后,可以从中获取CUG标识,进而确定所要驻留的小区(以下简称目标小区)是否为封闭小区或混合小区。
在本发明实施例中,CUG标识可以用于表征进行小区选择或者小区重选的目标小区的类型。进一步而言,CUG标识可以用于表征目标小区是封闭小区、混合小区还是开放小区。
在具体实施中,同一个用户设备对应的多个CUG小区可以使用相同的CUG标识。换而言之,对应于房间、工厂、公司等不同的CUG小区,可以使用相同的CUG标识。可以理解的是,不同的CUG小区对应的CUG标识也可以不同。
在本发明实施例中,消息完整性校验信息可以为MIC值。MIC值可以根据CUG密钥生成,或者根据CUG密钥的派生密钥生成。MIC值也可以为基于CUG密钥以及系统消息中除MIC之外的其他所 有信息生成的完整性校验密钥,或者根据CUG密钥的派生密钥以及系统消息中除MIC之外的其他所有信息生成的完整性校验码。CUG密钥即为用户设备接入目标小区所需的密钥,也即用户设备在接入该CUG小区时需要输入相应的密钥才能够获得授权。
例如,在饭店、酒店等场景,由工作人员告诉顾客密钥,顾客在用户设备上输入密钥接入CUG小区。
在具体实施中,若用户设备确定当前所要驻留的小区为CUG小区,且用户设备基于密钥的方法接入CUG小区,则用户设备可以尝试使用预先存储的密钥对MIC信息进行验证,以确定是否能够接入CUG小区。若用户设备使用预先存储的密钥对MIC信息通过验证,则用户设备可以接入该CUG小区。
在具体应用中,网络接入授权控制信息可能会发生更新。网络接入授权控制信息发生更新,意味着用户设备需要重新获取网络接入授权控制信息。
在本发明实施例中,当接入点设备确定网络接入授权控制信息发生更新时,可以向用户设备发送第一指示信息,第一指示信息用于指示网络接入授权控制信息发生变更。用户设备在接收到第一指示信息后,即可获知网络接入授权控制信息发生变更。
在具体实施中,接入点设备可以向用户设备下发寻呼消息,由寻呼消息承载第一指示信息。具体而言,接入点设备可以在寻呼消息中设置新的寻呼原因值,通过新的寻呼原因值来承载第一指示信息。
在具体实施中,接入点设备也可以向用户设备下发下行控制信息(Downlink Control Information,DCI),在下行控制信息中承载有第一指示信息。
可以理解的是,接入点设备也可以通过其他方式向用户设备下发第一指示信息,并不仅限于上述实施例中提供的示例。
在本发明实施例中,若用户设备基于密钥接入CUG小区,则接 入点设备在检测到CUG小区的密钥更新后,可以向用户设备下发第一指示信息,以告知用户设备输入新的密钥,完成CUG小区驻留。用户设备在接收到第一指示信息后,可以获取新的密钥并输入。
在具体应用中,若CUG小区的密钥更新,则用户可以向后台工作人员索取密钥,或者向后台服务器索取密钥。
例如,CUG小区由酒店部署,用户可以向酒店服务人员询问更新后的CUG小区的密钥,进而输入更新后的密钥进行相应的接入。
在具体实施中,若接入点设备判定用户设备未提供有效的网络接入授权控制信息时,可以将用户设备重定向到其他小区,或者拒绝该用户设备的接入。当接入点设备拒绝该用户设备的接入时,可以向用户设备发送拒绝原因值,使得用户设备能够获知被拒绝接入的具体原因。
例如,拒绝原因值可以为“密钥错误”。用户设备在接收到拒绝原因值之后,即可获知无法接入CUG小区的原因为密钥错误。
在本发明实施例中,若接入点设备判定用户设备输入的密钥错误,则接入点设备可以判定用户设备没有提供有效的网络接入授权控制信息。此时,接入点设备可以将用户设备重定向至其他的小区,或者拒绝用户设备的接入。
在具体实施中,若用户设备基于同步授权的方法接入CUG小区,则当接入点设备检测到网络接入授权控制信息发生变化时,也可以向用户设备发送第一指示信息。用户设备在接收到第一指示信息后,即可获知网络接入授权控制信息发生变化。
在本发明实施例中,用户设备在获知网络接入授权控制信息发生变化后,可以重新读取网络接入授权控制信息表,或者请求网络发送更新后的网络接入授权控制信息表。
在具体实施中,在网络接入授权控制信息完成变更之前,接入点设备仍可以继续转发用户设备对应的寻呼消息,以保证用户设备可 达。相应地,网络侧也需要按照网络接入授权控制信息没有发生变化的情况继续向用户设备发送寻呼消息。
需要说明的是,本发明实施例中所述的“接入”可以是指用户设备驻留到网络,也可以是指用户设备与网络建立连接。
由此可见,获取网络接入授权控制信息,并将获取到的网络接入授权控制信息发送至用户设备,从而使得用户设备获知网络接入授权控制信息,进而使得用户设备根据相应的接入方式接入,有效避免用户设备无法正常接入网络的情况出现。
参照图3,给出了本发明实施例中的一种用户设备移动性管理装置30,包括:获取单元301以及发送单元302,其中:
获取单元301,用于获取网络接入授权控制信息,所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;
发送单元302,用于发送所述网络接入授权控制信息。
在具体实施中,上述的获取单元301以及发送单元302的具体执行流程可以对应参照上述S101~步骤S102,本发明实施例不做赘述。
在具体实施中,上述的用户设备移动性管理装置30可以对应于接入点设备中具有数据处理功能的芯片,如数据信号处理芯片;或者对应于接入点设备中包括具有数据处理功能芯片的芯片模组,或者对应于接入点设备。
参照图4,给出了本发明实施例中的另一种用户设备移动性管理装置40,包括:接收单元401以及确定单元402,其中:
接收单元401,用于接收网络接入授权控制信息;所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;
确定单元402,用于根据所述网络接入授权控制信息,确定是否接入网络。
在具体实施中,接收单元401以及确定单元402的具体执行流程 可以对应参照上述S201~步骤S202,本发明实施例不做赘述。
在具体实施中,上述的用户设备移动性管理装置40可以对应于用户设备中具有数据处理功能的芯片,如基带芯片;或者对应于用户设备中包括具有数据处理功能芯片的芯片模组,或者对应于用户设备。
现有技术中,在进行小区切换时,源基站并不知道用户设备是否能够切换至PUG小区。
在本发明实施例中,用户设备确定目标小区的信息,目标小区的信息能够表征该用户设备是否为目标小区的授权用户,将目标小区的信息发送至源基站。源基站根据用户设备发送的目标小区的信息,即可获知用户设备是否具有相应的权限驻留在目标小区中,进而确定是否将用户设备切换至目标小区中。
为使本发明的上述目的、特征和有益效果能够更为明显易懂,下面结合附图对本发明的具体实施例做详细的说明。
本发明实施例提供了另一种用户设备移动性管理方法,参照图5,以下通过具体步骤进行详细说明。
在本发明实施例中,下述步骤S501~步骤S502所提供的用户设备移动性管理方法可以由用户设备所执行。具体的,下述步骤S501~步骤S502可以由用户设备中具有数据处理能力的芯片所执行,如基带芯片;或者由用户设备中包含基带芯片的芯片模组所执行。
步骤S501,确定目标小区的信息。
在具体应用中可知,源基站在为用户设备配置的邻区测量配置中,可能没有为用户设备配置目标小区的测量配置,因此,源基站可以配置用户设备反馈目标小区的信息。
在具体实施中,可以由源基站设备向用户设备下发第一指示信息,第一指示信息可以用于触发用户设备反馈目标小区的信息。用户 设备可以接收源基站下发的第一指示信息,根据源基站下发的第一指示信息确定目标小区的信息。
在本发明实施例中,源基站可以通过高层信令向用户设备下发第一指示信息,也可以通过下行控制信息(Downlink Control Information,DCI)向用户设备下第一指示信息,还可以通过MAC CE等其他类型的信令向用户设备下发第一指示信息。其中,高层信令可以为无线资源控制(Radio Resource Control,RRC)信令。
在具体实施中,目标小区的信息可以包括目标小区的标识信息以及目标小区的授权信息,在本发明实施例中,目标小区的标识信息可以用于表征目标小区是哪一个小区,目标小区的授权信息可以用于表征用户设备是否为目标小区的授权用户。
需要说明的是,若用户设备判断自身不是目标小区的授权用户,则用户设备可以不生成目标小区的信息,后续也无需发送目标小区的信息。因此,可以当用户设备判断自身为目标小区的授权用户时,才确定目标小区的信息,并执行后续发送目标小区的信息的操作。
也就是说,若用户设备没有执行确定目标小区的信息的操作,则可以确认该用户设备不是目标小区的授权用户。仅在用户设备为目标小区的授权用户时,该用户设备才确定目标小区的信息。此时,所述目标小区的授权信息可以用于表征用户设备是所述目标小区的授权用户。
在具体实施中,目标小区可以为封闭小区或混合小区。其中,封闭小区只支持授权用户设备接入;混合小区中,任何用户设备都能够接入,但是会优先保障授权用户设备的服务质量。
在本发明实施例中,目标小区可以为用户设备所能够驻留的封闭用户组(Closed User Group,CUG)小区。
例如,当前覆盖用户设备1的CUG小区为CUG小区1,用户设备1不是CUG小区1的授权用户。用户设备1在接收到第一指示信 息后,向源基站反馈的目标小区的标识信息为:CUG小区的标识信息为1;向源基站反馈的目标小区的该用户设备1不是授权用户设备。
又如,当前覆盖用户设备2的CUG小区为CUG小区1,用户设备2是CUG小区1的授权用户。用户设备2在接收到第一指示信息后,向源基站反馈的目标小区的授权信息为:CUG小区的标识信息为1,该用户设备2是CUG小区1的授权用户设备。
步骤S502,发送所述目标小区的信息。
在具体实施中,用户设备在确定目标小区的授权信息之后,可以发送所确定的目标小区的信息。在本发明实施例中,可以将所确定的目标小区的信息发送至源基站。
在具体实施中,源基站在接收到用户设备反馈的目标小区的信息之后,可以获知用户设备是否能够驻留在目标小区。源基站在确定将用户设备切换至目标小区之后,可以向目标小区对应的目标基站发送目标小区的信息。
源基站在确定将用户设备切换至目标小区之后,可以向用户设备发送切换指示信息。用户设备在接收到切换指示信息之后,可以将目标小区的授权信息发送至目标基站。
目标基站在接收到源基站发送的目标小区的信息以及用户设备发送的目标小区的授权信息之后,即可对用户设备的授权关系进行判断,以确定该用户设备是否为授权用户,进而确定该用户设备是否能够驻留到目标小区。
在本发明实施例中,源基站可以为宏基站,也可以为5G接入点设备或者其他类型的基站。
在具体实施中,用户设备可以通过密钥接入目标小区。此时,用户设备向源基站发送的目标小区的信息中,除了目标小区的标识信息以及目标小区的授权信息之外,还可以包括目标小区对应的消息完整性校验信息。
在本发明实施例中,消息完整性校验信息可以为消息完整性校验(Messages Integrity Check,MIC)值。MIC值可以根据CUG密钥生成,或者根据CUG密钥的派生密钥生成。MIC值也可以为基于CUG密钥以及系统消息中除MIC之外的其他所有信息生成的完整性校验密钥,或者根据CUG密钥的派生密钥以及系统消息中除MIC之外的其他所有信息生成的完整性校验码。CUG密钥即为用户设备接入目标小区所需的密钥,也即用户设备在接入该CUG小区时需要输入相应的密钥才能够获得授权。
在本发明实施例中,目标小区的授权信息还可以包括消息完整性校验信息对应的随机数。此时,用户设备还可以将消息完整性校验信息对应的随机数发送至源基站。
此时,源基站接收到的用户设备发送的目标小区的信息包括:目标小区的标识信息,目标小区的授权信息,目标小区的消息完整性校验信息,消息完整性校验信息对应的随机数。用户设备向目标基站发送的目标小区的信息包括:目标小区的授权信息,目标小区的消息完整性校验信息,消息完整性校验信息对应的随机数。
在具体实施中,在4步竞争随机接入信道(Random Access Channel,RACH)时,用户设备可以使用msg3或者msg5向目标基站发送目标小区的授权信息。在非竞争RACH时,在RAR后的第一个上行数据传输时,向目标基站发送目标小区的授权信息。在两步RACH时,用户设备可以在msgA中携带目标小区的授权信息并发送至目标基站。
在具体实施中,用户设备也可以基于同步授权的方法接入目标小区。用户设备在接收切换指示信息之后,向目标基站发送目标小区的授权信息。目标基站可以根据自身存储的同步授权关系,判断是否允许该用户设备驻留。目标基站也可以向核心网发送请求,由核心网判断是否允许该用户设备驻留。
在本发明实施例中,目标基站也可以向核心网请求授权信息。核 心网在接收到目标基站的请求后,向目标基站发送授权信息,由目标基站判断是否允许用户设备驻留。
在具体实施中,在用户设备切换至目标小区之前,核心网仍需要继续按照用户设备没有发生切换的情况继续发送寻呼消息,以保证用户设备可达。在用户设备切换至目标小区之后,核心网可以按照用户设备切换完成的情况发送寻呼消息,以保证用户设备可达。
由此可见,在本发明实施例中,用户设备确定目标小区的信息,目标小区的信息能够表征该用户设备是否为目标小区的授权用户,将目标小区的信息发送至源基站。源基站根据用户设备发送的目标小区的信息,即可获知用户设备是否具有相应的权限驻留在目标小区中,进而确定是否将用户设备切换至目标小区中。
参照图6,给出了本发明实施例中的另一种用户设备移动性管理方法,以下通过具体步骤进行详细说明。
在本发明实施例中,下述步骤S601~步骤S602所提供的用户设备移动性管理方法可以由源基站所执行。具体的,下述步骤S601~步骤S602可以由源基站中具有数据处理能力的芯片所执行,或者由源基站中包含数据处理芯片的芯片模组所执行。
步骤S601,接收目标小区的信息。
步骤S602,在向所述目标小区对应的目标基站发送所述目标小区的信息。
在具体应用中可知,源基站在为用户设备配置的邻区测量配置中,可能没有为用户设备配置目标小区的测量配置,因此,源基站可以配置用户设备反馈目标小区的信息。
在具体实施中,源基站设备可以向用户设备下发第一指示信息,第一指示信息可以用于触发用户设备反馈目标小区的信息。用户设备在接收源基站下发的第一指示信息之后,可以根据源基站下发的第一指示信息确定目标小区的信息,并将所确定的目标小区的信息发送至 源基站。
在本发明实施例中,源基站可以通过高层信令向用户设备下发第一指示信息,也可以通过下行控制信息(Downlink Control Information,DCI)向用户设备下第一指示信息,还可以通过MAC CE等其他类型的信令向用户设备下发第一指示信息。其中,高层信令可以为无线资源控制(Radio Resource Control,RRC)信令。
在具体实施中,目标小区的信息可以包括目标小区的标识信息以及目标小区的授权信息,在本发明实施例中,目标小区的标识信息可以用于表征目标小区是哪一个小区,目标小区的授权信息可以用于表征用户设备是否为目标小区的授权用户。
需要说明的是,若用户设备判断自身不是目标小区的授权用户,则用户设备可以不生成目标小区的信息,后续也无需发送目标小区的信息。因此,可以当用户设备判断自身为目标小区的授权用户时,才确定目标小区的信息,并执行后续发送目标小区的信息的操作。
也就是说,若用户设备没有执行确定目标小区的信息的操作,则可以确认该用户设备不是目标小区的授权用户。仅在用户设备为目标小区的授权用户时,该用户设备才确定目标小区的信息。此时,目标小区的授权信息可以用于表征用户设备是目标小区的授权用户。
在具体实施中,目标小区可以为封闭小区或混合小区。其中,封闭小区只支持授权用户设备接入;混合小区中,任何用户设备都能够接入,但是会优先保障授权用户设备的服务质量。
在本发明实施例中,目标小区可以为用户设备所能够驻留的封闭用户组(Closed User Group,CUG)小区。
例如,当前覆盖用户设备1的CUG小区为CUG小区1,用户设备1不是CUG小区1的授权用户。用户设备1在接收到第一指示信息后,向源基站反馈的目标小区的标识信息为:CUG小区的标识信息为1;向源基站反馈的目标小区的该用户设备1不是授权用户设备。
又如,当前覆盖用户设备2的CUG小区为CUG小区1,用户设备2是CUG小区1的授权用户。用户设备2在接收到第一指示信息后,向源基站反馈的目标小区的授权信息为:CUG小区的标识信息为1,该用户设备2是CUG小区1的授权用户设备。
在具体实施中,源基站在接收到用户设备反馈的目标小区的信息之后,可以获知用户设备是否能够驻留在目标小区。源基站在确定将用户设备切换至目标小区之后,可以向目标小区对应的目标基站发送目标小区的信息。
源基站在确定将用户设备切换至目标小区之后,可以向用户设备发送切换指示信息。用户设备在接收到切换指示信息之后,可以将目标小区的授权信息发送至目标基站。
目标基站在接收到源基站发送的目标小区的信息以及用户设备发送的目标小区的授权信息之后,即可对用户设备的授权关系进行判断,以确定该用户设备是否为授权用户,进而确定该用户设备是否能够驻留到目标小区。
在本发明实施例中,源基站可以为宏基站,也可以为5G接入点设备或者其他类型的基站。
在具体实施中,用户设备可以通过密钥接入目标小区。此时,用户设备向源基站发送的目标小区的信息中,除了目标小区的标识信息以及目标小区的授权信息之外,还可以包括目标小区对应的消息完整性校验信息。
在本发明实施例中,消息完整性校验信息可以为MIC值。MIC值可以根据CUG密钥生成,或者根据CUG密钥的派生密钥生成。MIC值也可以为基于CUG密钥以及系统消息中除MIC之外的其他所有信息生成的完整性校验密钥,或者根据CUG密钥的派生密钥以及系统消息中除MIC之外的其他所有信息生成的完整性校验码。CUG密钥即为用户设备接入目标小区所需的密钥,也即用户设备在接入该 CUG小区时需要输入相应的密钥才能够获得授权。
在本发明实施例中,目标小区的授权信息还可以包括消息完整性校验信息对应的随机数。此时,用户设备还可以将消息完整性校验信息对应的随机数发送至源基站。
此时,源基站接收到的用户设备发送的目标小区的信息包括:目标小区的标识信息,目标小区的授权信息,目标小区的消息完整性校验信息,消息完整性校验信息对应的随机数。用户设备向目标基站发送的目标小区的信息包括:目标小区的授权信息,目标小区的消息完整性校验信息,消息完整性校验信息对应的随机数。
在具体实施中,在4步竞争随机接入信道(Random Access Channel,RACH)时,用户设备可以使用msg3或者msg5向目标基站发送目标小区的授权信息。在非竞争RACH时,在RAR后的第一个上行数据传输时,向目标基站发送目标小区的授权信息。在两步RACH时,用户设备可以在msgA中携带目标小区的授权信息并发送至目标基站。
在具体实施中,用户设备也可以基于同步授权的方法接入目标小区。用户设备在接收切换指示信息之后,向目标基站发送目标小区的授权信息。目标基站可以根据自身存储的同步授权关系,判断是否允许该用户设备驻留。目标基站也可以向核心网发送请求,由核心网判断是否允许该用户设备驻留。
在本发明实施例中,目标基站也可以向核心网请求授权信息。核心网在接收到目标基站的请求后,向目标基站发送授权信息,由目标基站判断是否允许用户设备驻留。
在具体实施中,在用户设备切换至目标小区之前,核心网仍需要继续按照用户设备没有发生切换的情况继续发送寻呼消息,以保证用户设备可达。在用户设备切换至目标小区之后,核心网可以按照用户设备切换完成的情况发送寻呼消息,以保证用户设备可达。
由此可见,在本发明实施例中,用户设备确定目标小区的信息,目标小区的信息能够表征该用户设备是否为目标小区的授权用户,将目标小区的信息发送至源基站。源基站根据用户设备发送的目标小区的信息,即可获知用户设备是否具有相应的权限驻留在目标小区中,进而确定是否将用户设备切换至目标小区中。
参照图7,给出本发明实施例中的一种用户设备移动性管理装置70,包括:确定单元701以及第一发送单元702,其中:
确定单元701,用于确定目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;
第一发送单元702,用于发送所述目标小区的信息。
在具体实施中,确定单元701以及第一发送单元702的具体执行流程可以对应参照上述S501~步骤S502,本发明实施例不做赘述。
在具体实施中,上述的用户设备移动性管理装置70可以对应于用户设备中具有数据处理功能的芯片,如基带芯片;或者对应于用户设备中包括具有数据处理功能芯片的芯片模组,或者对应于用户设备。
参照图8,给出了本发明实施例中的一种用户设备移动性管理装置80,包括:接收单元801以及第二发送单元802,其中:
接收单元801,用于接收目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;
第二发送单元802,用于向所述目标小区对应的目标基站发送所述目标小区的授权信息。
在具体实施中,上述的接收单元801以及第二发送单元802的具体执行流程可以对应参照上述S601~步骤S602,本发明实施例不做赘述。
在具体实施中,上述的用户设备移动性管理装置80可以对应于 源基站中具有数据处理功能的芯片,如数据信号处理芯片;或者对应于源基站中包括具有数据处理功能芯片的芯片模组,或者对应于源基站。
在具体实施中,关于上述实施例中描述的各个装置、产品包含的各个模块/单元,其可以是软件模块/单元,也可以是硬件模块/单元,或者也可以部分是软件模块/单元,部分是硬件模块/单元。
例如,对于应用于或集成于芯片的各个装置、产品,其包含的各个模块/单元可以都采用电路等硬件的方式实现,或者,至少部分模块/单元可以采用软件程序的方式实现,该软件程序运行于芯片内部集成的处理器,剩余的(如果有)部分模块/单元可以采用电路等硬件方式实现;对于应用于或集成于芯片模组的各个装置、产品,其包含的各个模块/单元可以都采用电路等硬件的方式实现,不同的模块/单元可以位于芯片模组的同一组件(例如芯片、电路模块等)或者不同组件中,或者,至少部分模块/单元可以采用软件程序的方式实现,该软件程序运行于芯片模组内部集成的处理器,剩余的(如果有)部分模块/单元可以采用电路等硬件方式实现;对于应用于或集成于终端的各个装置、产品,其包含的各个模块/单元可以都采用电路等硬件的方式实现,不同的模块/单元可以位于终端内同一组件(例如,芯片、电路模块等)或者不同组件中,或者,至少部分模块/单元可以采用软件程序的方式实现,该软件程序运行于终端内部集成的处理器,剩余的(如果有)部分模块/单元可以采用电路等硬件方式实现。
本发明实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质为非易失性存储介质或非瞬态存储介质,其上存储有计算机程序,所述计算机程序被处理器运行时执行上述任一实施例提供的用户设备移动性管理方法的步骤。
本发明实施例还提供了另一种用户设备移动性管理装置,包括存储器和处理器,所述存储器上存储有可在所述处理器上运行的计算机程序,所述处理器运行所述计算机程序时执行上述步骤S101~步骤 S102对应的用户设备移动性管理方法的步骤;或者,所述处理器运行所述计算机程序时执行上述步骤S201~步骤S202对应的用户设备移动性管理方法的步骤;或者,所述处理器运行所述计算机程序时执行上述步骤S501~步骤S502对应的用户设备移动性管理方法的步骤;或者,所述处理器运行所述计算机程序时执行上述步骤S601~步骤S602对应的用户设备移动性管理方法的步骤。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指示相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:ROM、RAM、磁盘或光盘等。
虽然本发明披露如上,但本发明并非限定于此。任何本领域技术人员,在不脱离本发明的精神和范围内,均可作各种更动与修改,因此本发明的保护范围应当以权利要求所限定的范围为准。

Claims (36)

  1. 一种用户设备移动性管理方法,其特征在于,包括:
    获取网络接入授权控制信息,所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;
    发送所述网络接入授权控制信息。
  2. 如权利要求1所述的用户设备移动性管理方法,其特征在于,所述发送所送网络接入授权控制信息,包括:
    通过广播的方式发送所述网络接入授权控制信息。
  3. 如权利要求1所述的用户设备移动性管理方法,其特征在于,所述网络接入授权控制信息包括消息完整性校验信息,所述消息完整性校验信息基于网络接入控制密钥生成。
  4. 如权利要求1~3任一项所述的用户设备移动性管理方法,其特征在于,还包括:
    确定网络接入授权控制信息发生更新;
    发送第一指示信息,所述第一指示信息用于指示所述网络接入授权控制信息发生更新。
  5. 如权利要求4所述的用户设备移动性管理方法,其特征在于,所述发送第一指示信息,包括:
    发送寻呼消息,所述寻呼消息承载所述第一指示信息。
  6. 如权利要求5所述的用户设备移动性管理方法,其特征在于,所述寻呼消息包括新的寻呼原因值,所述新的寻呼原因值用于指示所述寻呼消息承载所述第一指示信息。
  7. 如权利要求4所述的用户设备移动性管理方法,其特征在于,所述发送第一指示信息,包括:
    发送下行控制信息,所述下行控制信息承载所述第一指示信息。
  8. 如权利要求4所述的用户设备移动性管理方法,其特征在于,还包括:
    在所述用户设备未提供有效的网络接入授权控制信息时,将所述用户设备重定向到其他小区。
  9. 如权利要求4所述的用户设备移动性管理方法,其特征在于,还包括:在所述用户设备未提供有效的网络接入授权控制信息时,拒绝所述用户设备接入。
  10. 如权利要求9所述的用户设备移动性管理方法,其特征在于,所述拒绝所述用户设备接入,包括:向所述用户设备发送拒绝原因值。
  11. 一种用户设备移动性管理方法,其特征在于,包括:
    接收网络接入授权控制信息;所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;
    根据所述网络接入授权控制信息,确定是否接入网络。
  12. 如权利要求11所述的用户设备移动性管理方法,其特征在于,所述接收网络接入授权控制信息,包括:
    接收广播的系统消息,从所述系统消息中获取所述网络接入授权控制信息。
  13. 如权利要求11所述的用户设备移动性管理方法,其特征在于,所述网络接入授权控制信息包括消息完整性校验信息,所述消息完整性校验信息基于网络接入控制密钥生成。
  14. 如权利要求11~13任一项所述的用户设备移动性管理方法,其特征在于,还包括:接收第一指示信息,所述第一指示信息用于指示所述网络接入授权控制信息发生更新。
  15. 如权利要求14所述的用户设备移动性管理方法,其特征在于,所述接收第一指示信息,包括:接收寻呼消息,所述寻呼消息承载所述第一指示信息。
  16. 如权利要求15所述的用户设备移动性管理方法,其特征在于,所述寻呼消息包括新的寻呼原因值,所述新的寻呼原因值用于指示所述寻呼消息承载所述第一指示信息。
  17. 如权利要求14所述的用户设备移动性管理方法,其特征在于,所述接收第一指示信息,包括:接收下行控制信息,所述下行控制信息承载所述第一指示信息。
  18. 如权利要求14所述的用户设备移动性管理方法,其特征在于,在接收到所述第一指示信息之后,还包括:执行小区重选。
  19. 一种用户设备移动性管理装置,其特征在于,包括:
    获取单元,用于获取网络接入授权控制信息,所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;
    发送单元,用于发送所述网络接入授权控制信息。
  20. 一种用户设备移动性管理装置,其特征在于,包括:
    接收单元,用于接收网络接入授权控制信息;所述网络接入授权控制信息用于判断用户设备是否用权限接入网络;
    确定单元,用于根据所述网络接入授权控制信息,确定是否接入网络。
  21. 一种用户设备移动性管理方法,其特征在于,包括:
    确定目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;
    发送所述目标小区的信息。
  22. 如权利要求21所述的用户设备移动性管理方法,其特征在于,所述确定目标小区的信息,包括:
    接收第一指示信息,所述第一指示信息用于确定所述目标小区的信息。
  23. 如权利要求21所述的用户设备移动性管理方法,其特征在于,所 述目标小区的信息包括:所述目标小区的标识信息,所述目标小区的授权信息;所述目标小区的授权信息用于表征所述用户设备为所述目标小区的授权用户。
  24. 如权利要求23所述的用户设备移动性管理方法,其特征在于,所述目标小区的授权信息还包括:消息完整性校验信息。
  25. 如权利要求24所述的用户设备移动性管理方法,其特征在于,所述目标小区的授权信息还包括:所述消息完整性校验信息对应的随机数。
  26. 如权利要求23~25任一项所述的用户设备移动性管理方法,其特征在于,还包括:
    在接收到切换指示信息时,向所述目标小区对应的目标基站发送所述目标小区的授权信息。
  27. 一种用户设备移动性管理方法,其特征在于,包括:
    接收目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;
    向所述目标小区对应的目标基站发送所述目标小区的信息。
  28. 如权利要求27所述的用户设备移动性管理方法,其特征在于,还包括:
    发送第一指示信息,所述第一指示信息用于所述用户设备确定所述目标小区的信息。
  29. 如权利要求27所述的用户设备移动性管理方法,其特征在于,所述目标小区的信息包括:所述目标小区的标识信息,所述目标小区的授权信息;所述目标小区的授权信息用于表征所述用户设备为所述目标小区的授权用户。
  30. 如权利要求29所述的用户设备移动性管理方法,其特征在于,所述目标小区的授权信息还包括:消息完整性校验信息。
  31. 如权利要求30所述的用户设备移动性管理方法,其特征在于,所述目标小区的授权信息还包括:所述消息完整性校验信息对应的随机数。
  32. 如权利要求27所述的用户设备移动性管理方法,其特征在于,还包括:向所述用户设备发送切换指示信息,所述切换指示信息用于指示所述用户设备进行小区切换。
  33. 一种用户设备移动性管理装置,其特征在于,包括:
    确定单元,用于确定目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;
    第一发送单元,用于发送所述目标小区的信息。
  34. 一种用户设备移动性管理装置,其特征在于,包括:
    接收单元,用于接收目标小区的信息,所述目标小区的信息用于表征所述用户设备是否为所述目标小区的授权用户;
    第二发送单元,用于发送所述目标小区的授权信息。
  35. 一种计算机可读存储介质,所述计算机可读存储介质为非易失性存储介质或非瞬态存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器运行时执行权利要求1~18或21~32任一项所述的用户设备移动性管理方法的步骤。
  36. 一种用户设备移动性管理装置,包括存储器和处理器,所述存储器上存储有可在所述处理器上运行的计算机程序,其特征在于,所述处理器运行所述计算机程序时执行权利要求1~10任一项所述的用户设备移动性管理方法的步骤;或者,执行权利要求11~18任一项所述的用户设备移动性管理方法的步骤;或者,执行权利要求21~26任一项所述的用户设备移动性管理方法的步骤;或者,执行权利要求27~32任一项所述的用户设备移动性管理方法的步骤。
PCT/CN2022/075587 2021-02-09 2022-02-09 用户设备移动性管理方法及装置、计算机可读存储介质 WO2022171099A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202110179240.2A CN112954686B (zh) 2021-02-09 2021-02-09 用户设备移动性管理方法及装置、计算机可读存储介质
CN202110176532.0 2021-02-09
CN202110179240.2 2021-02-09
CN202110176532.0A CN112929878B (zh) 2021-02-09 2021-02-09 用户设备移动性管理方法及装置、计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2022171099A1 true WO2022171099A1 (zh) 2022-08-18

Family

ID=82838271

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/075587 WO2022171099A1 (zh) 2021-02-09 2022-02-09 用户设备移动性管理方法及装置、计算机可读存储介质

Country Status (1)

Country Link
WO (1) WO2022171099A1 (zh)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101801089A (zh) * 2009-02-05 2010-08-11 中兴通讯股份有限公司 一种寻呼优化方法和系统
WO2011012160A1 (en) * 2009-07-30 2011-02-03 Nokia Siemens Networks Oy Identification of a network node by combining a first and a second information
US20110261777A1 (en) * 2008-12-23 2011-10-27 Mitsubishi Electric Corporation Mobile communication system
WO2013048301A1 (en) * 2011-09-26 2013-04-04 Telefonaktiebolaget L M Ericsson (Publ) Methods and apparatuses for enabling access control in a network
WO2020156447A1 (zh) * 2019-02-03 2020-08-06 中兴通讯股份有限公司 小区切换方法及装置、用户处理方法及装置
CN112929878A (zh) * 2021-02-09 2021-06-08 展讯半导体(南京)有限公司 用户设备移动性管理方法及装置、计算机可读存储介质
CN112954686A (zh) * 2021-02-09 2021-06-11 展讯半导体(南京)有限公司 用户设备移动性管理方法及装置、计算机可读存储介质

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110261777A1 (en) * 2008-12-23 2011-10-27 Mitsubishi Electric Corporation Mobile communication system
CN101801089A (zh) * 2009-02-05 2010-08-11 中兴通讯股份有限公司 一种寻呼优化方法和系统
WO2011012160A1 (en) * 2009-07-30 2011-02-03 Nokia Siemens Networks Oy Identification of a network node by combining a first and a second information
WO2013048301A1 (en) * 2011-09-26 2013-04-04 Telefonaktiebolaget L M Ericsson (Publ) Methods and apparatuses for enabling access control in a network
WO2020156447A1 (zh) * 2019-02-03 2020-08-06 中兴通讯股份有限公司 小区切换方法及装置、用户处理方法及装置
CN112929878A (zh) * 2021-02-09 2021-06-08 展讯半导体(南京)有限公司 用户设备移动性管理方法及装置、计算机可读存储介质
CN112954686A (zh) * 2021-02-09 2021-06-11 展讯半导体(南京)有限公司 用户设备移动性管理方法及装置、计算机可读存储介质

Similar Documents

Publication Publication Date Title
US11265809B2 (en) Method and apparatus for selecting core network in mobile communication system
US11419020B2 (en) Method and apparatus for performing a handover in a wireless communication system
RU2524175C2 (ru) Способ, устройство и система для передачи управления доступом пользователя между базовыми станциями
JP5342015B2 (ja) 家庭用基地局のハンドオーバー時のネットワークアクセスの制御方法及びシステム
WO2020191096A1 (en) Cloud radio access network implementing a citizens broadband radio service system
US8880688B2 (en) Apparatus and method for providing profile of terminal in communication system
US11683749B2 (en) Network selection for supported standalone non-public network (S-SNPN)
US20140370890A1 (en) Method and apparatus for access class barring
KR20110091305A (ko) Mocn에서 긴급 호를 위한 plmn 선택 방법 및 장치
WO2015055257A1 (en) Selection and use of a security agent for device-to-device (d2d) wireless communications
WO2016177025A1 (zh) 一种基于伪基站实现移动通讯的方法及装置、存储介质
KR20160084330A (ko) 사설망 서비스 제공 방법과 시스템 및 이를 위한 장치
US8428599B2 (en) System and method for mobility restriction in wireless communications systems
TWI488514B (zh) 用於行動通訊系統之細胞重新選擇方法及行動裝置
KR101680107B1 (ko) 무선 통신 시스템에서 소스 기지국이 타겟 기지국의 설정 정보를 획득하는 방법과 장치 및 그 시스템
CN112929878B (zh) 用户设备移动性管理方法及装置、计算机可读存储介质
WO2022171099A1 (zh) 用户设备移动性管理方法及装置、计算机可读存储介质
CN101990207A (zh) 接入控制方法、家用基站及家用基站授权服务器
KR20110003228A (ko) 무선 통신 시스템에서 사용자 액세스 제어 방법 및 장치
CN112954686B (zh) 用户设备移动性管理方法及装置、计算机可读存储介质
WO2022161458A1 (zh) 终端接入方法及装置、存储介质、接入点、核心网、终端
US8472953B2 (en) Apparatus and method for registering temporary subscriber of small base station in wireless communication system
WO2013010402A1 (zh) 混合模式家庭基站的接入控制方法及系统
KR101629925B1 (ko) 사설망 서비스 제공 방법과 시스템 및 이를 위한 장치
GB2458102A (en) Providing authorised access to a cellular communication network (100) via an access point using the transmitted identification of wireless communication units

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22752259

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22752259

Country of ref document: EP

Kind code of ref document: A1