WO2022251993A1 - 一种标签的管理方法以及相关装置 - Google Patents
一种标签的管理方法以及相关装置 Download PDFInfo
- Publication number
- WO2022251993A1 WO2022251993A1 PCT/CN2021/097129 CN2021097129W WO2022251993A1 WO 2022251993 A1 WO2022251993 A1 WO 2022251993A1 CN 2021097129 W CN2021097129 W CN 2021097129W WO 2022251993 A1 WO2022251993 A1 WO 2022251993A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- management function
- tag
- mobility management
- label
- information
- Prior art date
Links
- 238000007726 management method Methods 0.000 title claims abstract description 471
- 238000013523 data management Methods 0.000 claims abstract description 126
- 238000000034 method Methods 0.000 claims abstract description 125
- 230000006870 function Effects 0.000 claims description 617
- 238000004891 communication Methods 0.000 claims description 122
- 238000012545 processing Methods 0.000 claims description 68
- 230000015654 memory Effects 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 17
- 230000004044 response Effects 0.000 description 64
- 230000008569 process Effects 0.000 description 55
- 230000011664 signaling Effects 0.000 description 23
- 239000003795 chemical substances by application Substances 0.000 description 20
- 230000001413 cellular effect Effects 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 10
- 230000007774 longterm Effects 0.000 description 7
- 238000013475 authorization Methods 0.000 description 6
- 238000012790 confirmation Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 238000013461 design Methods 0.000 description 5
- 101100240462 Homo sapiens RASAL2 gene Proteins 0.000 description 4
- 102100035410 Ras GTPase-activating protein nGAP Human genes 0.000 description 4
- 235000013305 food Nutrition 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 239000004065 semiconductor Substances 0.000 description 3
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 229910052710 silicon Inorganic materials 0.000 description 2
- 239000010703 silicon Substances 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001537 neural effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
Definitions
- the present application relates to the field of communication technology, and in particular to a tag management method and a related device.
- Passive or semi-active IoT technology is a type of automatic identification technology.
- the reader performs non-contact two-way data communication through radio frequency, and uses radio frequency to read and write electronic tags (Tag), so as to achieve the purpose of identifying targets and data exchange.
- Passive or semi-active IoT systems use dedicated spectrum. When it is necessary to deploy passive or semi-active IoT systems and cellular networks at the same time, it is necessary to build and maintain two independent networks, which is costly. By incorporating passive or semi-active IoT technologies (or, alternatively, passive or semi-active IoT network architectures) into cellular networks, costs can be significantly reduced.
- the network side cannot know the status of the passive tag in real time. Therefore, there is a lack of a status management mechanism for the tag in the cellular network.
- the first aspect of the embodiment of the present application provides a tag management method ,include:
- the first mobility management function receives a registration request message sent by the access network device, where the registration request message is used to request registration of the label to the core network.
- the first mobility management function obtains the identification information of the second mobility management function from the unified data management function according to the registration request message, and the second mobility management function stores the label context information.
- the first mobility management function obtains the tag's context information from the second mobility management function.
- the first mobility management function establishes a connection for the tag according to the context information of the tag.
- the first mobility management function obtains the context information of the label from the mobility management function (such as the second mobility management function) serving the label, so that the first mobility management function can continue to use Some or all of the tag's context information, without completely rebuilding the tag's context.
- the mobility management function such as the second mobility management function
- the second mobility management function can also release the context information of the label, thereby saving communication resources.
- the tag context information includes tag key, security algorithm (for example: air interface encryption and integrity protection algorithm), tag security capability, counter value, Or information such as the timer value, which is not limited here.
- the first mobility management function establishes a connection for the tag according to the context information of the tag, including: according to the security context information in the context information (for example: one or more of the tag's key, security algorithm, and tag security capabilities) (1) establishes a secure connection for the label, and the secure connection includes: an air interface secure connection and a non-access layer secure connection.
- the context information of the label also includes the context information of the session.
- the context information of the session includes a session identifier, information related to a session management function that provides services for the session, and the like.
- the first mobility management function updates the user plane connection for the label according to the context information of the session.
- the first mobility management function reestablishes or updates the N3 user plane connection for the label.
- the registration request message may be non-access stratum signaling based on a non-access stratum (Non-Access Stratum, NAS) protocol stack, and the registration request message is sent by using the non-access stratum signaling on the existing network side, Changes to the network side are reduced, effectively ensuring information security.
- the registration request message may also be next-generation application protocol signaling based on the Next Generation Application Protocol (Next Generation Application Protocol, NGAP) protocol stack, which is not limited here.
- the second mobility management function stores the context information of the label, which can also be understood as the second mobility management function serves the label, or the second mobility management function once served the label.
- the first mobility management function does not perform an authentication process on the tag based on the context information of the tag. In this way, frequent authentication in the process of accessing new access network equipment during the movement of the label is avoided, and network resources are saved.
- the registration request message includes identification information of the tag, and the identification information of the tag includes a hidden user ID of the tag, and a part of the hidden user ID of the tag is plaintext information
- the acquiring, by the first mobility management function, the context information of the label from the second mobility management function includes: acquiring, by the first mobility management function, the context information of the label indicated by the plaintext information from the second mobility management function.
- the plaintext information includes: the electronic product code of the label, the unique identification of the label, the permanent identification of the label, the external identification of the label, or the temporary identification of the label. one or more.
- the electronic product code of the label may be an electronic product code (Electronic Product Code, EPC).
- EPC Electronic Product Code
- EPC Electronic Product Code
- “urn:epc:id:sgtin:CompanyPrefix.ItemRefAndIndicator.SerialNumber” where "sgtin” indicates that the object or object identified by the product electronic code is a commodity
- “CompanyPrefix” is used to identify a management entity or representative, understandably It is used to identify the enterprise (or manufacturer)
- “ItemRefAndIndicator” can also be called “Item Reference”, which is used to identify a specific object type, such as clothes, daily necessities, food, etc.
- “SerialNumber” that is, the serial number , used to identify this object or the object itself.
- the electronic product code of the label can also be a deformation of the electronic product code, which is not limited here.
- the unique identifier of the label may be the Media Access Control Address (MAC) of the label.
- MAC Media Access Control Address
- the tag's permanent identifier may be: the tag's permanent identity (subscriber permanent identifier, SUPI), or the tag's credential (credential) and other information.
- the external identifier of the tag may be another identifier assigned to the tag by the access network device or other external devices (eg, a server).
- the access network device e.g, a server
- the generic public subscription identifier (GPSI) for this tag.
- the temporary identifier of the label may be a temporarily used identifier assigned to the label by the access network device or other external devices (eg, a server).
- the identification information of the tag may be a subscription concealed identifier (SUCI).
- the hidden identity of the user is the identification information generated after the encryption of the permanent identity.
- the mobility management network element may acquire the identification information of the second mobility management network element from the unified data management function according to the identification information of the label in the registration message.
- the identification information of the label There are many ways to realize the identification information of the label, which improves the flexibility of the realization of the scheme.
- the identification information of the label includes: the electronic product code of the label, the unique identification of the label, the permanent identification of the label, the external identification of the label, or the temporary identification of the label , one or more of the user-hidden identifiers for the label.
- the identification information of the tag that can be used in the cellular network includes one or more of the following: a unique identification of the tag, a permanent identification of the tag, an external identification of the tag, or a temporary identification of the tag or SUCI of the tag.
- the registration request message further includes first indication information, and the first indication information indicates whether there is a mobility management function that stores tagged context information, and the first The mobility management function acquires the identification information of the second mobility management function from the unified data management function according to the registration request message, including: the first mobility management function acquires the second mobility management function from the unified data management function according to the first indication information identification information.
- the first mobility management function queries in the unified data management function whether there is a mobility management function that stores the context information of the tag; if it exists, the first mobility management function obtains the second mobility Identification information for sexual management functions.
- the first indication information may also indicate that the registration status of the tag needs to be queried, or the first indication information indicates that it is necessary to inquire whether there is a mobility management function serving the tag; in a possible implementation manner, the first indication
- the information is registration check indication (registration check indication, RCI).
- the first mobility management function obtains the identification information of the second mobility management function from the unified data management function, including: the first mobility management function sends the unified The data management function sends a query message, and the query message includes the identification information of the label; the first mobility management function receives the permanent identification information of the label from the unified data management function and the identification information of the second mobility management function; the first mobility The management function obtains the context information of the label from the second mobility management function, including: the first mobility management function obtains the context of the label from the second mobility management function according to the permanent identification information of the label and the identification information of the second mobility management function information.
- the query message may include tag identification information.
- the unified data management function obtains the corresponding permanent identity according to the identification information of the tag.
- the unified data management function looks up the mobility management function that provides services for the tag according to the permanent identity. Further, the unified data management function obtains the corresponding permanent identity according to the identification information of the tag, including: the unified data management function maps the identification information of the tag to the corresponding permanent identity.
- the unified data management function acquires the permanent identity corresponding to the hidden user ID.
- the unified data management function stores the permanent identity and the relevant context information of the permanent identity.
- the context information includes but is not limited to: the registration status of the tag corresponding to the permanent identity, and the network function (or network element) that serves the tag. ) related information.
- the relevant information of the network function includes identification information of the network function, and/or address information of the network function.
- the unified data management function acquires the permanent identity corresponding to the hidden user identity, including: the unified data management function maps the hidden user identity to the corresponding permanent identity.
- the unified data management function queries the registration status of the permanent identity (also referred to as the label corresponding to the permanent identity). If it is registered, the unified data management function will query the mobility management function serving the permanent identity, and feed back the identification information of the mobility management function to the querying mobility management function (the first mobility management function).
- the unified data management function obtains the corresponding permanent identity according to the public subscription identifier.
- the first mobility management function acquires the second mobility management function that provides services for the tag by sending a query message to the unified data management function. Furthermore, the first mobility management function acquires the context information of the label from the second mobility management function.
- the first mobility management function sends a query message to the unified data management function, and the query message is used to query whether there is a second mobility that stores tagged context information. If it does not exist, the first mobility management function receives the third indication information sent by the unified data management function, and the third indication information indicates that there is no second mobility management function that currently stores the context information of the tag; the first The mobility management function executes a tag registration process according to the third indication information.
- the query message includes tag identification information and/or first indication information.
- the first mobility management function obtains the identification information of the second mobility management function from the unified data management function, including:
- the first mobility management function sends a query message to the unified data management function, where the query message includes first indication information; the first mobility management function receives identification information of the second mobility management function from the unified data management function.
- the unified data management function queries whether there is a second mobility management function that stores the context information of the tag according to the tag identification information and/or the first indication information in the query message. If the unified data management function queries the second mobility management function that stores the tag context information, the first mobility management function receives the identification information of the second mobility management function from the unified data management function.
- the second mobility management function is the same as the first mobility management function.
- the first mobility management function after the first mobility management function acquires the context information of the label, the first mobility management function sends the context information of the label to the access network device. After obtaining the context information of the label, the access network equipment can establish an air interface security channel with the label according to the context information of the label.
- the The first mobility management function determines that the first mobility management function does not store the context information of the tag.
- the first mobility management function first determines that the context information of the tag is not stored locally, and then obtains the identification information of the second mobility management function from the unified data management function, saving communication resources.
- an embodiment of the present application proposes a label management method, including:
- the first mobility management function receives the registration request message sent by the access network device.
- the registration request message is used to request the label to be registered with the core network.
- the registration request message includes the hidden user identification of the label, and a part of the hidden user identification of the label is plaintext information , the plaintext information is used to indicate the label; the first mobility management function acquires context information of the label from the first mobility management function according to the plaintext information.
- the first mobility management obtains the context information of the tag from the mobility management function (for example, the first mobility management function) serving the tag according to the plaintext information in the tag's hidden user identification, so that the second A mobility management function can continue to use part or all of the context information of the label without completely rebuilding the context of the label.
- the mobility management function for example, the first mobility management function
- the second A mobility management function can continue to use part or all of the context information of the label without completely rebuilding the context of the label.
- the registration request message may be non-access stratum signaling based on a non-access stratum (Non-Access Stratum, NAS) protocol stack, and the registration request message is sent by using the non-access stratum signaling on the existing network side, Changes to the network side are reduced, effectively ensuring information security.
- the registration request message may also be next-generation application protocol signaling based on the Next Generation Application Protocol (Next Generation Application Protocol, NGAP) protocol stack, which is not limited here.
- the plaintext information includes: the electronic product code of the label, the unique identification of the label, the permanent identification of the label, the external identification of the label, or the temporary identification of the label. one or more.
- the registration request message further includes second indication information, and the second indication information instructs the first mobility management function to query whether the tag context information is stored.
- the first mobility management function acquires the context information of the label indicated by the plaintext information from the first mobility management function, including: the first mobility management function acquires the context information of the label indicated by the plaintext information from the first mobility management function according to the second indication information. contextual information.
- the second indication information may also indicate that the registration status of the tag needs to be queried; in a possible implementation manner, the second indication information is registration check indication information (registration check indication, RCI).
- the first mobility management function obtains the context information of the tag according to the second indication information, avoiding the first mobility management function analyzing each received registration request message to obtain the context information of the tag. Simplify the operation process and save resources.
- the first mobility management function acquires the context information of the tag from the first mobility management function, including: the first mobility management function determines that the first mobility Whether the tag context information is stored in the mobility management function; when the first mobility management function stores the tag context information, the first mobility management function obtains the tag context information from the first mobility management function according to the registration request message.
- the method further includes: the first mobility management function sends the unified data management function Sending a query message, the query message is used to query whether there is a second mobility management function that stores the context information of the label; if it exists, the first mobility management function receives the permanent identification information of the label sent by the unified data management function and the second mobility management function
- the identification information of the mobility management function the first mobility management function obtains the context information of the label from the second mobility management function according to the permanent identification information of the label and the identification information of the second mobility management function.
- the query message may include tag identification information.
- the unified data management function obtains the corresponding permanent identity according to the identification information of the tag.
- the unified data management function looks up the mobility management function that provides services for the tag according to the permanent identity. Further, the unified data management function obtains the corresponding permanent identity according to the identification information of the tag, including: the unified data management function maps the identification information of the tag to the corresponding permanent identity.
- the unified data management function acquires the permanent identity corresponding to the hidden user ID.
- the unified data management function stores the permanent identity and the relevant context information of the permanent identity.
- the context information includes but is not limited to: the registration status of the tag corresponding to the permanent identity, and the network function (or network element) that serves the tag. ) related information.
- the relevant information of the network function includes identification information of the network function, and/or address information of the network function.
- the unified data management function acquires the permanent identity corresponding to the hidden user identity, including: the unified data management function maps the hidden user identity to the corresponding permanent identity.
- the unified data management function queries the registration status of the permanent identity (also referred to as the label corresponding to the permanent identity). If it is registered, the unified data management function will query the mobility management function serving the permanent identity, and feed back the identification information of the mobility management function to the querying mobility management function (the first mobility management function).
- the unified data management function obtains the corresponding permanent identity according to the public subscription identifier.
- the first mobility management function acquires the second mobility management function that provides services for the tag by sending a query message to the unified data management function. Furthermore, the first mobility management function acquires the context information of the label from the second mobility management function.
- the query message includes tag identification information and/or second indication information.
- the tag's context information includes a tag's key.
- the tag's context information may also be a variant of the tag's key, which is not limited here.
- the embodiment of the present application proposes a label management method, including:
- the unified data management function receives the query message sent by the first mobility management function, and the query message includes the identification information of the tag; the unified data management function determines the second mobility management function according to the query message, and the second mobility management function stores the tagged Context information: the unified data management function sends the identification information of the second mobility management function to the first mobility management function.
- the unified data management function queries whether there is a mobility management function serving the tag according to the query message sent by the first mobility management function, so as to obtain the context information of the tag.
- the first mobility management function acquires the context information of the label from the mobility management function serving the label (such as the second mobility management function), so that the first mobility management function can continue to use the context information of the label, avoiding Frequent authentication during the tag access to new access network equipment saves communication resources.
- the unified data management function queries the registration status of the tag. If it is unregistered or unregistered, there is no mobility management function for this tag. Furthermore, the unified data management function feeds back third indication information to the first mobility management function, where the third indication information is used to indicate that the query fails or no information is found.
- the query message includes identification information of the tag, and the identification information of the tag is used to identify the tag;
- the identification information of the tag includes: the electronic product code of the tag, the unique One or more of an identification, a permanent identification of the tag, an external identification of the tag, or a temporary identification of the tag.
- the identification information of the tag may also be a user concealed identifier (subscription concealed identifier, user concealed identifier).
- the hidden identity of the user is the identification information generated after the encryption of the permanent identity.
- the plaintext information included in the user hidden identification may also be used to indicate the label.
- the query message further includes first indication information, where the first indication information indicates whether there is a mobility management function that stores the context information of the tag.
- the first indication information indicates that the registration status of the tag needs to be queried, or the first indication information indicates that it is necessary to inquire whether there is a mobility management function serving the tag; in a possible implementation manner, the first The indication information is registration check indication information (registration check indication, RCI).
- registration check indication information registration check indication, RCI
- the identification information of the label further includes a user hidden identification of the label
- the user hidden identification further includes plaintext information
- the plaintext information is used to indicate the label.
- the identification information of the label included in the registration request message is a hidden user identification
- the hidden user identification includes plaintext information.
- the first mobility management function acquires the context information of the tag according to the plaintext information in the hidden identifier of the user.
- the unified data management function determines the permanent identification information of the label according to the hidden user identification of the label in the query message;
- the unified data management function sends the permanent identification information of the tag to the first mobility management function.
- the permanent identification information of the label includes but is not limited to: the product electronic code of the label, the permanent identification, or the MAC address of the label, etc. So that the first mobility management function acquires the context information of the tag according to the permanent identification information of the tag.
- the unified data management function sends third indication information to the first mobility management function, where the third indication information indicates that the first mobile device that does not currently store tagged context information 2.
- Mobility management functions queries the registration status of the permanent identity. If it is unregistered or deregistered, there is no mobility management function serving the permanent identity. Furthermore, the unified data management function feeds back third indication information to the first mobility management function, where the third indication information is used to indicate that the query fails or no information is found.
- the identification information of the second mobility management function includes: address information of the second mobility management function. For example: the IP address of the second mobility management function, or the MAC address of the second mobility management function.
- the embodiment of the present application proposes a label management method, which is applied to the Internet of Things system.
- the Internet of Things system includes access network equipment and labels, including: the access network equipment sends a request message, and the request message instructs the label to send a request to the access network.
- the network access device sends a response message to the request message; the access network device confirms that the target tag has lost connection; the access network device releases the context information of the target tag.
- the network side cannot know the connectivity of the tag in real time.
- the access network device sends a request message, which is used to instruct the tag to send a response message to the request message to the access network device, and the access network device performs statistics and judgment based on the response message to determine the connectivity of the passive tag . If the tag does not reply a response message in multiple inventory events, or does not reply a response message for a long time, the network side will confirm that the tag is not in the area covered by the current access network equipment or the tag has expired, or the network side believes that the current The server does not need to obtain the relevant information of the tag temporarily.
- the access network device confirms that the tag is the target tag, and the target tag loses connection, and the access network device does not need to save the context information of the tag for the target tag. Therefore, the access network device can initiate an access network release procedure for the target label, so that the target label enters an idle state, so as to save resources such as storage space on the network side.
- the access network device broadcasts the request message, or the access network device sends the request message to the tag.
- the access network device confirming that the target tag is out of connection includes: when the response message received by the access network device does not include the identification information of the target tag, accessing The network device updates the first value corresponding to the target label; when the first value corresponding to the target label reaches the first threshold value, the access network device releases the context information corresponding to the target label.
- the access network device updates the first value corresponding to the target tag.
- the identification information of the target tag includes, but is not limited to, one or more of the electronic product code of the tag, the unique ID of the tag, the permanent ID of the tag, the external ID of the tag, or the temporary ID of the tag, and the data information of the target tag. Instructions are given below:
- the electronic product code of the label may be an electronic product code (Electronic Product Code, EPC).
- EPC Electronic Product Code
- EPC Electronic Product Code
- “urn:epc:id:sgtin:CompanyPrefix.ItemRefAndIndicator.SerialNumber” where "sgtin” indicates that the object or object identified by the product electronic code is a commodity
- “CompanyPrefix” is used to identify a management entity or representative, understandably It is used to identify the enterprise (or manufacturer)
- “ItemRefAndIndicator” can also be called “Item Reference”, which is used to identify a specific object type, such as clothes, daily necessities, food, etc.
- “SerialNumber” that is, the serial number , used to identify this object or the object itself.
- the unique identifier of the label may be the Media Access Control Address (MAC) of the label.
- MAC Media Access Control Address
- the tag's permanent identifier may be: the tag's permanent identity (subscriber permanent identifier, SUPI), or the tag's credential (credential) and other information.
- the external identifier of the tag may be another identifier assigned to the tag by the access network device or other external devices (eg, a server).
- the general public subscription identifier generator public subscription identifier, GPSI
- the temporary identifier of the label may be a temporarily used identifier allocated for the label by the access network device or other external devices (such as a server).
- the identification information of the target tag may also be a subscription concealed identifier (SUCI).
- SUCI subscription concealed identifier
- the hidden identity of the user is the identification information generated after the encryption of the permanent identity.
- the identification information of the target tag may also be a deformation of the above-mentioned various identifications, which is not limited here.
- the tags managed by the access network device include: tag 1, tag 2, tag 3, and tag 4.
- the response message of the request message does not include the identification information of the target label, for example: label 2 is the target label
- the response message of the request message received by the access network equipment does not include the identification information of the label 2.
- the access network equipment updates the label 2 The corresponding first value. For example: in the initial state, the first value corresponding to the label 2 is 0.
- the access network device updates the first value corresponding to the label 2 to 1.
- the access network device confirms that the target tag is out of connection, including: when the access network device does not receive the response message sent by the target tag, the access network device updates the The first numerical value corresponding to the target label; when the first numerical value corresponding to the target label reaches the first threshold value, the access network device releases the context information corresponding to the target label. Specifically, when the access network device does not receive a response message to the request message sent by the target tag, the access network device updates the first value corresponding to the target tag.
- the response message of the request message sent by the target tag includes the identification information of the target tag.
- the access network device confirms that the target label is disconnected, including: the access network device starts a timer; when the timer expires, the access network device receives the When none of the response messages includes the identification information of the target tag, the access network device confirms that the target tag has lost connection.
- the timer may be a label granularity timer. For example, each label counted by the access network device corresponds to a timer.
- the access network device After the access network device sends a request message, the access network device starts the timer corresponding to each label.
- the timer may also be a timer at the granularity of the access network device, for example, the access network device starts a timer each time after sending the request message.
- the access network device starts a timer after the access network device takes inventory of the tags for the first time.
- the access network device after the access network device takes inventory of the tag for the first time, the access network device obtains the context information of the tag. After the access network device obtains the context information of the tag, the access network device starts a timer.
- the tag's context information includes tag's key, security algorithm (for example: air interface encryption and integrity protection algorithm), tag security capability, counter value, timer value and other information, which is not limited here.
- the access network device confirms that the target label is disconnected, including: the access network device starts a timer; when the timer expires, the access network device does not receive When receiving the response message sent by the target tag, the access network device confirms that the target tag has lost connection.
- the access network device confirms that the target tag is disconnected, and the access network device releases the context information corresponding to the target tag.
- the identification information of the target tag includes but is not limited to one or more of the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary identifier of the tag.
- the countdown of the timer is 10 seconds or 70 seconds.
- the response message of the request message received by the access network device does not include the identification information of the target tag.
- the access network device confirms that the target tag is disconnected, and the access network device releases the context information corresponding to the target tag.
- the N2 context information corresponding to the target tag is released, and the target tag enters an idle state (CM-IDLE state).
- the timer includes: a de-registration timer and an implicit de-registration timer.
- the access network device starts a de-registration timer.
- the mobility management function starts an implicit de-registration timer.
- the request message includes identification information of the target tag.
- the identification information of the target label is the product electronic code of the target label, the temporary identification of the target label, the unique identification of the target label, the permanent identification of the target label, the target One or more of the tag's external identifier and the data information of the target tag.
- the embodiment of the present application proposes a communication device, including:
- a transceiver module configured to receive a registration request message sent by the access network device, where the registration request message is used to request that the tag be registered to the core network;
- the transceiver module is also used to obtain the identification information of the mobility management function of the second access and mobility management function from the unified data management function according to the registration request message, and the second mobility management function stores the tagged context information;
- the transceiver module is further configured to acquire context information of the label from the second mobility management function.
- the registration request message includes identification information of the label, and the identification information of the label includes a hidden user identification of the label, and a part of the hidden user identification of the label is plaintext information;
- the transceiving module is specifically configured to acquire context information of the label indicated by the plaintext information from the second mobility management function.
- the plaintext information includes: the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary ID of the tag One or more of the identities.
- the transceiver module is specifically configured to send a query message to the unified data management function, where the query message includes identification information of the tag;
- the transceiver module is specifically configured to receive the permanent identification information of the tag and the identification information of the second mobility management function from the unified data management function;
- the transceiving module is specifically configured to acquire context information of the tag from the second mobility management function according to the permanent identification information of the tag and the identification information of the second mobility management function.
- the registration request message further includes first indication information, where the first indication information indicates whether there is a mobility management function that stores the context information of the label,
- the transceiver module is specifically configured to acquire the identification information of the second mobility management function from the unified data management function according to the first indication information.
- the transceiver module is specifically configured to send a query message to the unified data management function, where the query message includes first indication information
- the transceiving module is specifically configured to receive the identification information of the second mobility management function from the unified data management function.
- the second mobility management function is the same as the first mobility management function.
- the transceiving module is further configured to send the tag context information to the access network device.
- the processing module is configured to determine that the first mobility management function does not store the context information of the tag.
- the processing module is a processor.
- the processing module is a processor
- the sending and receiving module is a transceiver
- the embodiment of the present application proposes a communication device, including:
- the transceiver module is configured to receive a registration request message sent by the access network device, the registration request message is used to request the tag to be registered to the core network, the registration request message includes the hidden user identification of the tag, and part of the hidden user identification of the tag is plaintext information;
- the transceiver module is further configured to acquire context information of the label from the first mobility management function according to the plaintext information.
- the plaintext information includes: the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary ID of the tag One or more of the identities.
- the registration request message further includes second indication information
- a processing module configured to acquire context information of the label indicated by the plaintext information from the first mobility management function according to the second indication information.
- the processing module is further configured to determine whether the first mobility management function stores context information of the tag;
- the processing module is further configured to obtain the context information of the tag from the first mobility management function according to the registration request message when the context information of the tag is stored in the first mobility management function.
- the transceiving module is further configured to send the tag context information to the access network device.
- the processing module is a processor.
- the processing module is a processor
- the sending and receiving module is a transceiver
- the embodiment of the present application proposes a communication device, including:
- a transceiver module configured to receive a query message sent by the first mobility management function, where the query message is used to query whether there is a second mobility management function that stores tagged context information;
- a processing module configured to determine a second mobility management function according to the query message
- the transceiver module is further configured to send the identification information of the second mobility management function to the first mobility management function.
- the query message includes identification information of the tag, and the identification information of the tag is used to identify the tag;
- the identification information of the label includes: one or more of the electronic product code of the label, the unique identification of the label, the permanent identification of the label, the external identification of the label, or the temporary identification of the label.
- the query message further includes first indication information, where the first indication information indicates to query whether there is a mobility management function that stores the context information of the label.
- the identification information of the label further includes a hidden user identification of the label, and the hidden user identification further includes plaintext information, and the plaintext information is used to indicate the label.
- the processing module is further configured to determine the permanent identification information of the label according to the user hidden identification of the label in the query message;
- the transceiver module is further configured to send the permanent identification information of the tag to the first mobility management function.
- the transceiving module is further configured to send third indication information to the first mobility management function, where the third indication information indicates the second mobility management function that currently does not store the context information of the tag.
- the identification information of the second mobility management function includes: address information of the second mobility management function.
- the processing module is a processor.
- the processing module is a processor
- the sending and receiving module is a transceiver
- the embodiment of the present application proposes a communication device, including:
- the transceiver module is used to send a request message, and the request message indicates that the tag sends a response message of the request message to the access network device;
- a processing module configured to confirm that the target tag has lost connection
- the processing module is also used to release the context information of the target tag.
- the processing module is further configured to update the first value corresponding to the target tag when the response message received by the access network device does not include the identification information of the target tag;
- the processing module is further configured to release the context information corresponding to the target tag when the first value corresponding to the target tag reaches a first threshold.
- the processing module is further configured to update the first value corresponding to the target tag when the response message sent by the target tag is not received;
- the processing module is further configured to release the context information corresponding to the target tag when the first value corresponding to the target tag reaches a first threshold.
- the processing module is also used to start the timer
- the processing module is further configured to release the context information corresponding to the target tag when the response message received by the access network device does not include the identification information of the target tag after the timer expires.
- the processing module is also used to start the timer
- the processing module is also used to release the context information corresponding to the target tag when the access network device has not received the response message sent by the target tag after the timer expires.
- the request message includes identification information of the target tag.
- the identification information of the target label is the product electronic code of the target label, the temporary identification of the target label, the unique identification of the target label, the permanent identification of the target label, the external identification of the target label, the data of the target label One or more of the information.
- the processing module is a processor.
- the processing module is a processor
- the sending and receiving module is a transceiver
- a communication device is provided to implement the above various methods.
- the communication device may be the first mobility management function, the second mobility management function, the unified data management function and/or the access network device in the first aspect, the second aspect, the third aspect and/or the fourth aspect , or include the first mobility management function, the second mobility management function, the unified data management function and/or the access network device in the above-mentioned first aspect, second aspect, third aspect and/or fourth aspect device, or the first mobility management function, the second mobility management function, the unified data management function and/or the access network device in the above-mentioned first aspect, second aspect, third aspect and/or fourth aspect Included devices, such as system-on-a-chip.
- the communication device provided in the fifth aspect includes a corresponding module, unit, or means (means) for implementing the above method, and the module, unit, or means can be implemented by hardware, software, or by executing corresponding software by hardware.
- the hardware or software includes one or more modules or units corresponding to the above functions.
- a communication device including: a processor and a memory; the memory is used to store computer instructions, and when the processor executes the instructions, the communication device executes the method of any aspect above.
- the communication device may be the first mobility management function, the second mobility management function, the unified data management function, or the access network device in the first aspect, the second aspect, the third aspect, or the fourth aspect, or include the above-mentioned The device of the first mobility management function, the second mobility management function, the unified data management function and/or the access network device in the first aspect, the second aspect, the third aspect or the fourth aspect above, or the above-mentioned first The first mobility management function, the second mobility management function, the unified data management function or a device included in the access network equipment in the first aspect, the second aspect, the third aspect or the fourth aspect, such as a system chip.
- a communication device including: a processor; after the processor reads an instruction in a memory, the processor executes the method according to any one of the above aspects according to the instruction, and the memory and the communication device are independent of each other.
- the communication device may be the first mobility management function, the second mobility management function, the unified data management function, or the access network device in the first aspect, the second aspect, the third aspect, or the fourth aspect, or include the above-mentioned
- the device of the first mobility management function, the second mobility management function, the unified data management function, or the access network device in the first aspect, the second aspect, the third aspect, or the fourth aspect, or the first aspect above the first mobility management function, the second mobility management function, the unified data management function or a device included in the access network equipment in the second aspect, the third aspect or the fourth aspect, such as a system chip.
- a computer-readable storage medium is provided. Instructions are stored in the computer-readable storage medium. When the instructions are run on a communication device, the communication device can execute the method of any aspect above.
- the communication device may be the first mobility management function, the second mobility management function, the unified data management function, or the access network device in the first aspect, the second aspect, the third aspect, or the fourth aspect, or include the above-mentioned
- the device of the first mobility management function, the second mobility management function, the unified data management function, or the access network device in the first aspect, the second aspect, the third aspect, or the fourth aspect, or the first aspect above the first mobility management function, the second mobility management function, the unified data management function or a device included in the access network equipment in the second aspect, the third aspect or the fourth aspect, such as a system chip.
- a computer program product containing instructions is provided, and when the instructions are run on the communication device, the communication device can execute the method of any aspect above.
- the communication device may be the first mobility management function, the second mobility management function, the unified data management function, or the access network device in the first aspect, the second aspect, the third aspect, or the fourth aspect, or include the above-mentioned
- the device of the first mobility management function, the second mobility management function, the unified data management function, or the access network device in the first aspect, the second aspect, the third aspect, or the fourth aspect, or the first aspect above the first mobility management function, the second mobility management function, the unified data management function or a device included in the access network equipment in the second aspect, the third aspect or the fourth aspect, such as a system chip.
- a communication device for example, the communication device may be a chip or a chip system
- the communication device includes a processor configured to implement the functions involved in any one of the above aspects.
- the communication device further includes a memory, and the memory is used for storing necessary program instructions and data.
- the communication device is a system-on-a-chip, it may consist of chips, or may include chips and other discrete devices.
- a chip in a fifteenth aspect, includes a processor and a communication interface, the communication interface is used to communicate with modules other than the shown chip, the processor is used to run computer programs or instructions, so that the chip installed
- the device can execute the method of any one of the above aspects.
- a sixteenth aspect provides a communication system including: the first mobility management function of the first aspect and the unified data management function of the third aspect.
- the communication system may further include the access network device of the fourth aspect.
- the communication system includes the first mobility management function and the unified data management function of the second aspect above.
- the communication system includes at least one of the communication devices in the above aspects.
- the technical effect brought by any one of the design methods in the fifth aspect to the sixteenth aspect can refer to the technical effects brought by the different design methods in the first aspect, the second aspect, the third aspect or the fourth aspect , which will not be repeated here.
- the first mobility management function and the second mobility management function may be the mobility management function of the cellular network
- the access network device may be the access network device of the cellular network
- the unified data management function label may be It can be the unified data management function of the cellular network
- the tag can also be a passive or semi-active IoT device.
- Figure 1a is a schematic diagram of a passive or semi-active Internet of Things system involved in an embodiment of the present application
- FIG. 1b is a schematic diagram of the RFID system in the embodiment of the present application.
- FIG. 1c is a schematic diagram of a network architecture of a communication system
- FIG. 2 is a schematic diagram of the hardware structure of the communication device in the embodiment of the present application.
- Fig. 3 is a schematic flow chart of label inventory in the embodiment of the present application.
- FIG. 4 is a schematic flow chart of tag reading and writing in the embodiment of the present application.
- FIG. 5 is a schematic flow diagram of (R)AN agent establishing a control plane channel in an embodiment of the present application
- Fig. 6a is a schematic flow chart of an embodiment of a label management method proposed in the embodiment of the present application.
- Fig. 6b is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application.
- FIG. 7 is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application.
- FIG. 8 is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application.
- Fig. 9a is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application.
- Fig. 9b is a schematic flowchart of an embodiment of a label management method proposed in the embodiment of the present application.
- FIG. 10 is a schematic diagram of an embodiment of a communication device in an embodiment of the present application.
- At least one item (piece) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple .
- LTE Long Term Evolution
- FDD frequency division duplex
- TDD time division duplex
- 5th generation 5G
- 5G fifth generation
- NR future sixth generation communication system
- the part operated by an operator in various communication systems may be referred to as an operator network.
- the operator network can also be called the public land mobile network (PLMN) network, which is a network established and operated by the government or an operator approved by the government for the purpose of providing land mobile communication services for the public, mainly A mobile network operator (MNO) is a public network that provides mobile broadband access services for users.
- PLMN public land mobile network
- MNO mobile network operator
- the operator network or PLMN network described in the embodiments of the present application may be a network conforming to the requirements of the third generation partnership project (3rd generation partnership project, 3GPP) standard, referred to as a 3GPP network.
- 3GPP third generation partnership project
- 3GPP networks are operated by operators, including but not limited to the fifth-generation mobile communication (5th-generation, 5G) network (referred to as 5G network), the fourth-generation mobile communication (4th-generation, 4G) network (referred to as 4G network) Or a third-generation mobile communication technology (3rd-generation, 3G) network (3G network for short). Also includes future 6G networks.
- 5G network the fifth-generation mobile communication
- 4G network the fourth-generation mobile communication (4th-generation, 4G) network
- 3G network for short
- 3G network for short.
- an operator network such as a mobile network operator (mobile network operator, MNO) network
- MNO mobile network operator
- Fig. 1a is a schematic diagram of a passive or semi-active Internet of Things system involved in the embodiment of the present application.
- the passive or semi-active IoT system in the embodiment of the present application may be a radio frequency identification system, or a radio frequency identification (Radio Frequency Identification, RFID) system.
- RFID Radio Frequency Identification
- the RFID system in the embodiment of the present application is only an example of the passive or semi-active Internet of Things system in the embodiment of the present application, and the passive or semi-active Internet of Things system in the embodiment of the present application is not Not limited to RFID systems.
- the name of “passive or semi-active Internet of Things” may also change.
- the "passive or semi-active Internet of Things” involved in the embodiment of this application may also be the above-mentioned Internet of Things in future communication systems.
- "Passive or semi-active IoT” systems (or communication technologies) that structure or function.
- RFID is a kind of automatic identification technology.
- the reader performs non-contact two-way data communication through radio frequency, and uses radio frequency to read and write electronic tags (Tag), so as to achieve the purpose of identifying targets and data exchange. It works in two ways, one is when the RFID tag enters the effective identification range of the reader, it receives the radio frequency signal sent by the reader, and sends out the information stored in the chip by virtue of the energy obtained by the induced current (corresponding to Passive Tag); the other is that the RFID tag actively sends a signal of a certain frequency (corresponding to the active Tag), and after the reader receives the information, the middleware and the encoder decode the information.
- the information service system, the back-end application system or other enterprise back-end systems perform relevant data processing on the above-mentioned decoded data. This technology is widely used in various industries. The following briefly introduces two application scenarios.
- Items are embedded with RFID tags.
- the relevant information of the goods is automatically collected by the reader, and the management personnel can quickly query the information of the goods in the system, reducing the risk of discarding or being stolen, which can improve the delivery speed of goods, improve the accuracy rate, and realize anti-counterfeiting and Prevent cross-selling.
- RFID system includes: tags, readers, middleware and servers.
- the reader can take inventory of the tags, and the middleware can collect the tag information from one or more readers, filter and deduplicate the tag information, generate a server-readable inventory report, and send it to the server the report.
- the tag and the reader RFID Reader
- use an air interface protocol for example: the second generation air interface Gen 2Air Interface protocol
- the reader and the middleware use a low-level reader protocol (Low Level Reader Protocol, LLRP) to communicate.
- the middleware and the server use the Application Level Event (ALE) protocol to communicate.
- ALE Application Level Event
- the communication network architecture based on the embodiment of the present application is introduced, as shown in FIG. 1c.
- the network architecture may include: a label, an operator network part and a data network 104 (data network, DN) part.
- the label section includes a label 101 .
- the tag 101 involved in the embodiment of this application can pass through a (wireless) access network 102 ((radio) access network, (R) AN) with a reader-writer function
- the access network device in the network communicates with one or more core networks (core network, CN).
- the tags in the embodiment of this application include but are not limited to: electronic price tags for supermarkets, medical bracelets for mothers and babies, asset tags for smart parks, or radio frequency cards, etc.
- the communication network may include unified data management 108 (unified data management, UDM), access and mobility management function 105 (access and mobility management function, AMF), session management function 106 (session management function, SMF), policy control network element 107 (Policy Control Function, PCF), user plane function 103 (user plane function, UPF) and (R)AN102, etc.
- unified data management 108 unified data management, UDM
- access and mobility management function 105 access and mobility management function, AMF
- session management function 106 session management function, SMF
- policy control network element 107 Policy Control Function, PCF
- user plane function 103 user plane function, UPF
- (R)AN102 etc.
- core network core network, CN
- the data network DN104 may also be called a protocol data network (protocol data network, PDN), which may be a data network of an operator or an enterprise, or a third-party data network.
- the communication network can access multiple data networks DN104, and various services can be deployed on the data network DN104, which can provide data and/or voice services for tags.
- the data network DN104 can be a private network of a smart factory, and the sensors installed in the workshop of the smart factory can be tags, and the control server of the sensors is deployed in the data network DN104, and the control server can provide services for the sensors.
- the sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server based on the instructions.
- the data network DN104 may be an internal office network of a certain company, and the mobile phones or computers of the employees of the company may be tags, and the mobile phones or computers of the employees may access information and data resources on the internal office network of the company.
- the tag can establish a connection with the communication network through an interface provided by the communication network (such as N1, etc.), and use services such as data and/or voice provided by the communication network.
- the tag can also access the data network DN104 through the communication network, and use the operator services deployed on the data network DN104, and/or services provided by a third party.
- the above-mentioned third party can be a service provider other than the communication network and the tag, and can provide other data and/or voice services for the tag.
- the specific form of expression of the above-mentioned third party can be determined based on actual application scenarios, and is not limited here.
- the (R)AN102 is a device that provides wireless communication functions for tags. To access the communication network, the tag first passes through the (R)AN102, and then can be connected to the service node of the communication network through the (R)AN102.
- the access network device 102 ((R)AN device) in the embodiment of this application, the (R)AN device includes but is not limited to: the next generation base station node (next generation node base station, gNB) in the 5G system, the long term evolution ( Evolved node B (evolved node B, eNB) in long term evolution (LTE), radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC) ), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), base band unit (base bAnd unit, BBU), transmission point (transmitting and receiving point, TRP)
- the names of devices that function as access network devices may be different.
- the above-mentioned devices providing wireless communication functions for tags are collectively referred to as access network equipment or (R)AN102 or AN102 for short.
- R access network equipment
- the access network device integrates some or all functions of the reader in the passive or semi-active Internet of Things.
- the tag inventory flow and the tag reading and writing flow reference may be made to the descriptions in FIG. 3 and FIG. 4 .
- the (R)AN also has the function of a label, that is, it requests the core network to establish a control plane channel, or it is called (R)AN to build a control plane channel for the label.
- a label that is, it requests the core network to establish a control plane channel, or it is called (R)AN to build a control plane channel for the label.
- the access and mobility management function AMF105 (also called AMF network element, AMF network function or AMF network function entity) is a control plane network function provided by the communication network, responsible for the access control and mobility of tags accessing the communication network Management, for example, includes mobility status management, assigning user temporary identities, authenticating and authorizing users, and other functions.
- the session management function SMF106 (also referred to as SMF network element, SMF network function or SMF network function entity) is a control plane network function provided by the communication network, and is responsible for managing label protocol data unit (protocol data unit, PDU) sessions.
- the PDU session is a channel for transmitting PDUs, and the label needs to transmit PDUs with the data network DN104 through the PDU session.
- the PDU session is established, maintained and deleted by the SMF106 network function.
- SMF106 network functions include session management (such as session establishment, modification and release, including tunnel maintenance between user plane functions UPF103 and (R)AN102), selection and control of UPF103 network functions, service and session continuity (service and session continuity) , SSC) mode selection, roaming and other session-related functions.
- the user plane function UPF103 (also called UPF network element, UPF network function or UPF network function entity) is a gateway provided by the operator, and is a gateway for communication between the communication network and the data network DN104.
- UPF103 network functions include data packet routing and transmission, data packet detection, service usage reporting, quality of service (QoS) processing, legal interception, uplink data packet detection, downlink data packet storage and other user-plane-related functions.
- QoS quality of service
- the unified data management network element UDM108 (also called UDM network element, UDM network function or UDM network function entity) is a control plane function provided by an operator, and is responsible for storing the permanent identity (subscriber permanent identifier, SUPI), the subscriber's public subscription identifier (generic public subscription identifier, GPSI), credential (credential) and other information. Among them, SUPI will be encrypted first during transmission, and the encrypted SUPI is called a hidden user subscription identifier (subscription concealed identifier, SUCI). The information stored by UDM 108 can be used for authentication and authorization of tags accessing the communication network.
- the subscribers of the above-mentioned communication network may specifically be users who use services provided by the communication network, for example, users who use a mobile phone chip card of operator A.
- the credential of the above-mentioned contracted user may be: a long-term key stored in the mobile phone chip card or a small file stored in encrypted information related to the mobile phone chip card, for authentication and/or authorization.
- permanent identifiers, credentials, security contexts, authentication data (cookies), and information related to token equivalent verification/authentication and authorization are not distinguished and limited in this embodiment of the application for the convenience of description.
- PCF Policy control entity
- the PCF 107 can interact with the AF to obtain Quality of Service (Qos) parameters, or provide QoS parameters to the AF, thereby realizing a function that can affect application data transmission.
- Qos Quality of Service
- the application function AF interacts with the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) core network to provide application layer services.
- the application function AF may be located in a data network (data network, DN). For example: provide data routing on the application layer and provide access to the network capability.
- AF can interact with PCF107.
- the location of AF can be inside the 5G core network or outside the 5G core network. If the AF is inside the 5G core network, it can directly interact with the PCF107. If the AF is outside the 5G core network, the Network Exposure Function (NEF) acts as an intermediate node to forward the interaction content between the AF and the PCF107. For example, forwarding through NEF.
- NEF Network Exposure Function
- the authentication server function (authentication server function, AUSF) (also called AUSF network element, AUSF network function or AUSF network function entity) is a control plane function provided by the operator, usually used for primary authentication, that is, label 101 (subscription user) and the authentication between the communication network.
- the AUSF may authenticate and/or authorize the subscriber through the authentication information and/or authorization information stored in the UDM 108, or generate the authentication and/or authorization information of the subscriber through the UDM 108.
- AUSF can feed back authentication information and/or authorization information to the subscriber.
- the AUSF can also be co-located with the UDM.
- network elements in the core network can be co-located.
- the access and mobility management function can be co-located with the session management function; the session management function can be co-located with the user plane function.
- the interaction between the two network elements provided by the embodiment of the present application becomes an internal operation of the co-located network element or can be omitted.
- the access and mobility management network function is taken as an example for description. It can also be other network functions having the above-mentioned AMF network function in the future communication system.
- the access and mobility management network function 105 in this application may also be a mobility management network element (Mobility Management Entity, MME) in LTE, etc.
- MME Mobility Management Entity
- the AMF network function is referred to as AMF for short, and the label is called UE, that is, the AMF described later in the embodiments of this application can be replaced by the access and mobility management network function, and the UE can be replaced by a label.
- the user plane function UPF103 in the embodiment of the present application may also be other network functions having the above-mentioned UPF network function in the future communication system. There is no limitation here.
- a tag management method provided by this application can be applied to various communication systems, for example, it can be Internet of Things (Internet of Things, IoT), Narrow Band Internet of Things (NB-IoT), Long Term Evolution (long term evolution, LTE), it can also be the fifth generation (5G) communication system, it can also be a hybrid architecture of LTE and 5G, it can also be a 5G new radio (new radio, NR) system, and new technologies emerging in future communication development. communication system, etc.
- the 5G communication system of the present application may include at least one of a non-standalone (NSA) 5G communication system and a standalone (standalone, SA) 5G communication system.
- NSA non-standalone
- SA standalone
- the communication system may also be a public land mobile network (public land mobile network, PLMN) network, a device-to-device (device-to-device, D2D) network, a machine-to-machine (machine to machine, M2M) network or other networks.
- PLMN public land mobile network
- D2D device-to-device
- M2M machine to machine
- the "message” involved in the embodiment of the present application may also be replaced with "data packet”, “data”, “instruction” or “signaling”, etc., which is not limited here.
- embodiments of the present application may also be applicable to other future-oriented communication technologies, such as 6G and the like.
- FIG. 2 is a schematic diagram of a hardware structure of a communication device in an embodiment of the present application.
- the communication apparatus may be a possible implementation manner of the first AMF, UDM and/or access network device in the embodiment of the present application.
- the communication device includes at least a processor 204, a memory 203, and a transceiver 202, the memory 203 is further used to store instructions 2031 and data 2032, an I/O (input/output, Input/Output) interface 210 and a bus 212.
- the communication device may further include an antenna 206 .
- the transceiver 202 further includes a transmitter 2021 and a receiver 2022 .
- the processor 204 , the transceiver 202 , the memory 203 and the I/O interface 210 are communicatively connected to each other through the bus 212 , and the antenna 206 is connected to the transceiver 202 .
- the processor 204 can be a general-purpose processor, such as but not limited to, a central processing unit (Central Processing Unit, CPU), and can also be a special-purpose processor, such as but not limited to, a digital signal processor (Digital Signal Processor, DSP), application Application Specific Integrated Circuit (ASIC) and Field Programmable Gate Array (Field Programmable Gate Array, FPGA), etc.
- the processor 204 may also be a neural network processing unit (neural processing unit, NPU).
- the processor 204 may also be a combination of multiple processors.
- the processor 204 may be used to execute the relevant steps of the method for managing the seed tags in the subsequent method embodiments.
- the processor 204 may be a processor specially designed to perform the above steps and/or operations, or may be a processor that performs the above steps and/or operations by reading and executing the instructions 2031 stored in the memory 203.
- the processor 204 The data 2032 may be needed during the execution of the above steps and/or operations.
- the transceiver 202 includes a transmitter 2021 and a receiver 2022.
- the transmitter 2021 is used to send signals through the antenna 206.
- the receiver 2022 is used for receiving signals through at least one antenna among the antennas 206 .
- the transmitter 2021 can be used to implement at least one of the antennas 206, for example, a label management method in the subsequent method embodiments is applied to the first When the AMF, UDM and/or access network device is used, the operations performed by the receiving module or the sending module in the first AMF, UDM and/or access network device.
- the transceiver 202 is used to support the communication device to perform the aforementioned receiving function and sending function.
- a processor having a processing function is considered to be the processor 204 .
- the receiver 2022 may also be called an input port, a receiving circuit, etc., and the transmitter 2021 may be called a transmitter or a transmitting circuit, etc.
- the processor 204 can be used to execute the instructions stored in the memory 203 to control the transceiver 202 to receive messages and/or send messages, so as to complete the functions of the communication device in the method embodiments of the present application.
- the function of the transceiver 202 may be considered to be realized by a transceiver circuit or a dedicated chip for transceiver.
- receiving a message by the transceiver 202 may be understood as an input message by the transceiver 202
- sending a message by the transceiver 202 may be understood as an output message by the transceiver 202.
- Memory 203 can be various types of storage media, such as random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), non-volatile RAM (Non-Volatile RAM, NVRAM), can Programmable ROM (Programmable ROM, PROM), erasable PROM (Erasable PROM, EPROM), electrically erasable PROM (Electrically Erasable PROM, EEPROM), flash memory, optical memory and registers, etc.
- the memory 203 is specifically used to store instructions 2031 and data 2032.
- the processor 204 can read and execute the instructions 2031 stored in the memory 203 to perform the steps and/or operations described in the method embodiments of the present application.
- the data 2032 may be required during operations and/or steps in the method embodiments.
- the label inventory process is used to take stock of existing labels.
- Each label has its identifying information.
- the identification information may be an electronic product code (Electronic Product Code, EPC).
- EPC Electronic Product Code
- the tag will send the EPC code to the reader, so that the reader can know which tags are within its coverage. This information will eventually be reported by the reader to the middleware and server. Please refer to FIG. 3 .
- FIG. 3 is a schematic flowchart of label inventory in the embodiment of the present application.
- the reader sends a selection command to the tag.
- step A1 the reader/writer receives an inventory command. After receiving the inventory command, the reader/writer generates a select command.
- the command includes the label range, for example: EPC code within a specific range.
- the tag After the tag listens to the selection command, it judges whether it belongs to the tag range in the selection command. If it does, the tag listens to the Query command in the subsequent process and feeds back information; if it does not belong, the tag is in the subsequent process. No action is performed.
- the reader sends an inquiry command to the tag.
- step A2 the reader/writer continues to send the inquiry command.
- the tag sends a random number to the reader.
- step A3 when the tag confirms that it belongs to the range of tags in the selection command, the tag sends a random number, such as RN16, to the reader through competition.
- the reader sends a confirmation command to the tag.
- step A4 after the reader/writer receives the random number from the tag, the reader/writer sends an acknowledgment (ACK) command, and the acknowledgment command includes the random number (RN16) received in step A3.
- ACK acknowledgment
- R16 random number
- the tag sends the EPC code to the reader.
- step A5 after the tag receives the confirmation command sent by the reader, the tag verifies the random number in the confirmation command. When the verification is successful, the tag feeds back its own EPC code to the reader to complete the inventory process.
- Tag read and write process that is, to write or read tags. If it is a write operation, the data will be written into the storage area of the tag; if it is a read operation, the data in the tag storage area will be read.
- the reader In the process of reading and writing, the reader will set the label range in the Select command to the label range to be read and written (for example, if the range in the Select command is a certain EPC code, it will tags for read and write operations). Please refer to FIG. 4 .
- FIG. 4 is a schematic flow chart of tag reading and writing in the embodiment of the present application.
- the reader sends a selection command to the tag.
- the reader sends an inquiry command to the tag.
- the tag sends a random number to the reader.
- the reader/writer sends a confirmation command to the tag.
- the tag sends the EPC code to the reader.
- Steps B1-B5 are consistent with the aforementioned steps A1-A5, and will not be repeated here.
- the reader/writer sends a random number request (Req_RN) command to the tag.
- step B6 the reader sends a Req_RN command to the tag, and the Req_RN command includes the random number RN16 received in step B3.
- the tag sends a handle to the reader.
- step B7 after the tag verifies that the random number received in step B6 is correct, the tag sends a handle to the reader.
- the handle In the subsequent read and write processes, the handle (handle) needs to be included.
- the reader/writer sends a read or write command to the tag.
- step B8 the reader/writer sends a read command or a write command to the tag, and the handle needs to be included in the read command or write command.
- the write command it is also necessary to include the data written into the tag memory area.
- the tag sends data to the reader.
- step B8 is a read command, then execute step B9.
- step B9 the tag sends the data in its storage area to the reader-writer, including the handle.
- the registration management state of the UE includes: a registered state (RM-REGISTERED) and a de-registered state (RM-DEREGISTERED).
- the connection management state of the UE includes: connected state (CM-CONNECTED) and idle state (CM-IDLE).
- the network side When the UE is in the CM-CONNECTED state (connected state), there is connectivity between the network side and the UE.
- the network side will periodically ask the UE to report a signal measurement report between the UE and a network device near the UE.
- the network side When the UE moves (that is, when moving from one (R) AN to another (R) AN), the network side will perceive that the connection signal between the current UE and another (R) AN is better, so it will let the UE perform handover The procedure is to switch from the original (R)AN to the target (R)AN.
- the network side can perceive the mobility of the UE.
- the network side cannot know the location of the UE in the same manner as the UE is in the connected state. However, the UE can listen to the tracking area (Tracking Area, TA) of its own area through the broadcast signal. If the UE finds that the TA in the area where it is located is not in the TA list maintained by itself, it will trigger the UE to initiate a mobility registration update process, that is, tell The UE on the network side is no longer in the original TA list. In this process, the identity carried by the UE is the 5G-Globally Unique Temporary UE Identity (GUTI), and the 5G-GUTI is a temporary identity of the UE. Through 5G-GUTI, the network side can know the AMF serving the UE when it originally registered, so as to obtain the context information of the UE.
- GUI 5G-Globally Unique Temporary UE Identity
- the (R)AN agent establishes a control plane channel.
- (R)AN In order to transmit passive or semi-active IoT instructions, the (R)AN agent needs to establish a control plane (or user plane) channel with (R)AN as the granularity or label as the granularity, "agent establishment” In the embodiment of the present application, it may also be referred to as “agent construction” for short.
- the control plane (or user plane) channel with granularity as (R)AN means that each (R)AN establishes a control plane (or user plane) channel, and each (R)AN has a corresponding terminal at this time (It can also be referred to as SUPI established by (R)AN for the label agent), (R)AN supports the function of the terminal, and uses the identity of the terminal to establish the control plane (or user plane) channel of the terminal with the core network .
- the control plane (or user plane) channel of the terminal is used to transmit control signaling or user plane data of all labels within the coverage of the (R)AN.
- the control plane (or user plane) channel whose particle is a label means that the (R)AN establishes a control plane (or user plane) channel for each label agent.
- (R) AN uses the identification of the corresponding label to construct a terminal identification (also referred to as the SUPI established by (R) AN for the label agent), and uses the constructed terminal identification to establish a control plane (or user plane) for the label aisle.
- the control plane (or user plane) channel is a channel between the (R)AN and the core network, and is used to transmit control plane signaling or user plane data of a corresponding label.
- FIG. 5 is a schematic flowchart of the establishment of the control plane channel by the (R)AN agent in the embodiment of the present application.
- step C1 (R)AN selects an appropriate AMF.
- (R)AN sends N2UE initial message to AMF.
- step C2 the (R)AN sends an N2UE initial message (N2UE initial message) to the AMF.
- (R)AN supports the non-access stratum (Non-access stratum, NAS) protocol stack.
- (R)AN proxy label (label) establishes NAS signaling, and the specific process of (R)AN proxy label establishing NAS signaling is similar to that of a wired access gateway function (W-AGF) as a fixed network home gateway (fixed network)
- W-AGF wired access gateway function
- FN-RG proxy establishes NAS signaling.
- W-AGF wired access gateway function
- FN-RG proxy establishes NAS signaling.
- the N2UE initial message includes non-access stratum (Non-access stratum, NAS) signaling, and the NAS signaling is a registration request message, and the registration request message includes a subscription concealed identifier (subscription concealed identifier, SUCI).
- NAS non-access stratum
- SUCI subscription concealed identifier
- AMF chooses AUSF.
- step C3 the AMF selects an appropriate AUSF.
- the network authenticates the tag.
- step C4 the network performs an authentication process on the label.
- UDM matches SUCI to the corresponding subscription permanent identifier (SUPI), and sends it to AMF through AUSF. That is, the AMF knows the SUPI corresponding to the SUCI.
- SUPI subscription permanent identifier
- the NAS security mode command flow is performed between C5, (R)AN, and AMF.
- step C5 after the authentication is successful, the AMF initializes the NAS security mode command procedure (NAS Security Mode Command procedure).
- the AN responds to the AMF with a N2 uplink NAS message (NAS Security Mode Complete message).
- (R)AN establishes a NAS security context (NAS security context) between the label and the AMF instead.
- NAS security context NAS security context
- step C6 when the AMF receives the NAS security mode completion message of (R)AN, it will send an initial context request (N2 Initial Ctx Request) to (R)AN; when (R)AN completes the context establishment, it will send a response Message (N2 Initial Ctx Response) to AMF. At this time, (R)AN establishes the context instead of the label.
- the AMF sends a NAS registration acceptance message.
- Steps C7-C8 indicate that (R)AN completes the process of establishing a control plane channel for the tag proxy, and the tag is successfully registered to the core network.
- FIG. 6a is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application.
- a label management method proposed in the embodiment of the present application includes:
- the access network device sends a registration request message to the first mobility management function, where the registration request message is used to request registration of the label to the core network.
- the registration request message may be non-access stratum signaling based on a non-access stratum (Non-Access Stratum, NAS) protocol stack, and the registration request message is sent by using the non-access stratum signaling on the existing network side, Changes to the network side are reduced, effectively ensuring information security.
- the registration request message may also be next-generation application protocol signaling based on the Next Generation Application Protocol (Next Generation Application Protocol, NGAP) protocol stack, which is not limited here.
- the registration request message includes the identification information of the tag, and the identification information of the tag is used to identify the tag or indicate the identity information of the tag.
- the identification information of the label includes but is not limited to: one or more of the electronic product code of the label, the unique identification of the label, the permanent identification of the label, the external identification of the label, or the temporary identification of the label. Instructions are given below:
- the electronic product code of the label may be an electronic product code (Electronic Product Code, EPC).
- EPC Electronic Product Code
- EPC Electronic Product Code
- “urn:epc:id:sgtin:CompanyPrefix.ItemRefAndIndicator.SerialNumber” where "sgtin” indicates that the object or object identified by this EPC code is a commodity
- “CompanyPrefix” is used to identify a management entity or representative, which can be understood as It is used to identify the enterprise (or manufacturer)
- “ItemRefAndIndicator” can also be called “Item Reference”, which is used to identify a specific object type, such as clothes, daily necessities, food, etc.
- “SerialNumber” that is, the serial number, Used to identify this object or the object itself.
- the electronic product code of the label may also be a deformation of the EPC code, which is not limited here.
- the unique identifier of the label may be the Media Access Control Address (MAC) of the label.
- MAC Media Access Control Address
- the tag's permanent identifier may be: the tag's permanent identity (subscriber permanent identifier, SUPI), or the tag's credential (credential) and other information.
- the external identifier of the tag may be another identifier assigned to the tag by the access network device or other external devices (eg, a server).
- the publicly used subscription identifier generator public subscription identifier, GPSI
- the temporary identifier of the tag may be a temporary identifier assigned to the tag by the access network device or other external devices (such as a server).
- the identification information of the tag may also be a subscription concealed identifier (SUCI).
- SUCI is the identification information generated after SUPI encryption.
- the identification information of the label may also be a deformation of the above-mentioned various identifications, which is not limited here.
- the identification information of the label is a hidden user identification of the label, and part of the hidden user identification of the label is plaintext information.
- the plaintext information includes: one or more of the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary identifier of the tag.
- the registration request message may include the tag's SUCI (the tag's SUCI is the tag's identification information) and first indication information, the first indication information indicating that the registration status of the tag needs to be queried, Or the first indication information indicates that it is necessary to query whether there is a mobility management function serving the label; in a possible implementation manner, the first indication information is registration check indication information (registration check indication, RCI).
- the identification information of the tag that can be used in the cellular network includes one or more of the following: a unique identification of the tag, a permanent identification of the tag, an external identification of the tag, or a temporary identification of the tag or SUCI of the tag.
- the first mobility management function sends a query message to the unified data management function, where the query message is used to query whether there is a mobility management function serving the label.
- the first mobility management function sends a query message to the unified data management function, where the query message is used to query whether there is a mobility management function serving the tag.
- the query message includes, but is not limited to: tag identification information.
- the tag's identification information includes: one or more of: the tag's hidden user ID SUCI, the tag's electronic product code, the tag's unique ID, the tag's permanent ID, the tag's external ID, or the tag's temporary ID.
- the identification information of the above label please refer to the aforementioned step S1, which will not be repeated here.
- the unified data management function determines the second mobility management function that provides services for the tag according to the query message.
- the unified data management function queries whether there is a mobility management function serving the tag according to the query message.
- the mobility management function serving the label is referred to as the second mobility management function.
- the query message includes tag identification information.
- the unified data management function when the query message includes the SUCI of the tag, the unified data management function first maps the SUCI to a corresponding SUPI.
- the unified data management function stores SUPI and related context information of SUPI, the context information includes but not limited to: the registration status of the label, the network function (or network element) serving the SUPI (or the label corresponding to the SUPI) Related Information.
- the relevant information includes identification information of the network element, and/or address information of the network element.
- the unified data management function queries the registration status of the SUPI. If it is registered, the unified data management function will inquire which mobility management function is serving the SUPI, and feed back the identification information of the mobility management function to the inquired mobility management function (the first mobility management function),
- the identification information of the mobility management function may be address information of the mobility management function, for example: an Internet Protocol address (Internet Protocol address, IP address) of the mobility management function.
- the unified data management function sends the identification information of the second mobility management function to the first mobility management function.
- the identification information of the second mobility management function includes but is not limited to: the IP address of the second mobility management function, or the MAC address of the second mobility management function.
- the unified data management function further sends the permanent identification information of the tag to the first mobility management function.
- the permanent identification information of the tag includes, but is not limited to: the EPC code of the tag, the SUPI of the tag, or the MAC address of the tag.
- step S2 the first mobility management function sends the SUCI to the unified data management function, the unified data management function obtains the SUPI corresponding to the SUCI, and the unified data management function sends the SUPI to the first mobility management function.
- the unified data management function may also send other identification information of the tag to the first mobility management function.
- other identification information please refer to the aforementioned step S1, which will not be repeated here.
- the above S2-S4 is taken as a possible implementation manner, so that the first mobility management function obtains the identification information of the second mobility management function from the unified data management function according to the registration request message, and the second mobility management function stores the context of the tag information.
- the first mobility management function acquires the context information of the label from the second mobility management function.
- the first mobility management function acquires the context information of the tag from the second mobility management function according to the permanent identification information of the tag and the identification information of the second mobility management function.
- the first mobility management function determines the second mobility management function after receiving the identification information of the second mobility management function sent by the unified data management function.
- the first mobility management function acquires the context information of the tag from the second mobility management function according to the permanent identification information of the tag.
- the tag's context information includes but not limited to: tag's key, security algorithm (for example: air interface encryption and integrity protection algorithm), tag security capability, counter value, or timer value and other information, which is not limited here.
- the first mobility management function establishes a connection for the tag according to the context information of the tag, including: establishing a secure connection for the tag according to security context information in the context information (for example: tag key, security algorithm, and tag security capability) , the secure connection includes: an air interface secure connection and a non-access layer secure connection.
- the context information of the label also includes the context information of the session.
- the context information of the session includes a session identifier, information related to a session management function that provides services for the session, and the like.
- the first mobility management function updates the user plane connection for the label according to the context information of the session.
- the first mobility management function reestablishes or updates the N3 user plane connection for the label.
- the first mobility management function acquires the context information of the tag from the second mobility management function according to the identification information of other tags sent by the unified data management function.
- the first mobility management function obtains the context information of the label from itself.
- the first mobility management function requests the second mobility management function for the context information of the tag through a service interface message (Namf_Communication_UEContextTransfer).
- the second mobility management function sends the label context information to the first mobility management function through a service interface message (Namf_Communication_UEContextTransfer).
- the passive tag itself does not store identification information about the tag in the cellular network.
- identification information For example: permanent or temporary logos such as SUCI, SUPI, 5G-GUTI, etc. Therefore, when a passive tag is moved to a new access network device, the network side cannot know the mobility of the passive tag based on the label information of the tag, that is, it cannot know the source access network serving the passive tag. Device or source mobility management functions. And because the passive tag itself has no connectivity, the network side cannot perceive the mobility of the tag.
- the registration request message sent by the access network device to the first mobility management function includes the identification information of the tag and/or the first indication information, so that the first mobility management function performs the registration process of the tag Before, go to the unified data management function to check whether there is a mobility management function serving the label, so as to obtain the context information of the label.
- the registration request message sent by the access network device to the first mobility management function includes the identification information of the tag and/or the first indication information, so that the first mobility management function performs the registration process of the tag Before, go to the unified data management function to check whether there is a mobility management function serving the label, so as to obtain the context information of the label.
- the first mobility management function when the first mobility management function receives the identification information of the label in the registration request message, the first mobility management function obtains the context of the label from the first mobility management function according to the registration request message information.
- the tag's identification information is the tag's hidden user ID
- part of the tag's user hidden ID is plaintext information
- the plaintext information is used to indicate the tag. function to get contextual information for a label.
- the first mobility management function acquires the context information of the label indicated by the plaintext information.
- the registration request message includes second indication information
- the first mobility management function acquires the context information of the tag indicated by the plaintext information from the first mobility management function according to the second indication information.
- the first mobility management function may also execute S2-S5 to acquire the context of the tag from the second mobility management function fed back by the unified data management function information.
- FIG. 6b is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application.
- a label management method proposed in the embodiment of the present application includes:
- the source (R)AN initiates a process of establishing a control plane channel.
- the (R)AN establishes a control plane channel with the (R)AN as the granularity or with the label as the granularity.
- the specific establishment method please refer to the aforementioned steps C1-C9.
- step 601 the (R)AN currently serving the label is called the source (R)AN.
- the label moves to the target (R)AN.
- step 602 the tag moves from the coverage (or service area) of the source (R)AN to the coverage (or service area) of the target (R)AN. That is, the tag needs the target (R)AN to provide communication services.
- the target (R)AN discovers that the tag has moved to the coverage of the target (R)AN through the inventory process.
- (R)AN is used as a reader, and will not be described here.
- the AMF serving the source (R)AN is the same as the AMF serving the target (R)AN. That is, the first AMF serves the source (R)AN and the target (R)AN.
- the AMF serving the source (R)AN is different from the AMF serving the target (R)AN. That is, the first AMF serves the target (R) AN, and the second AMF serves the source (R) AN.
- the target (R)AN sends a registration request message to the first AMF, where the registration request message is used to request to register the label with the core network.
- the registration request message may be non-access stratum signaling based on a non-access stratum (Non-Access Stratum, NAS) protocol stack, and the registration request message is sent by using the non-access stratum signaling on the existing network side, Changes to the network side are reduced, effectively ensuring information security.
- the registration request message may also be next-generation application protocol signaling based on the Next Generation Application Protocol (Next Generation Application Protocol, NGAP) protocol stack, which is not limited here.
- the registration request message includes the identification information of the tag, and the identification information of the tag is used to identify the tag or indicate the identity information of the tag.
- the identification information of the label includes but is not limited to: one or more of the electronic product code of the label, the unique identification of the label, the permanent identification of the label, the external identification of the label, or the temporary identification of the label.
- the specific identification information of the label please refer to the aforementioned step S1, which will not be repeated here.
- the identification information of the label includes a hidden user identification of the label, and a part of the hidden user identification of the label is plaintext information.
- the plaintext information includes: one or more of the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary identifier of the tag.
- the registration request message may include the tag's SUCI and first indication information, the first indication information indicates that the registration status of the tag needs to be queried, or the first indication information indicates that it is necessary to inquire whether there is a The AMF that serves the label; in a possible implementation manner, the first indication information is registration check indication information (registration check indication, RCI).
- a possible implementation scenario is as follows: when the target (R)AN takes inventory of each tag (tag) currently managed, and the target (R)AN finds a new tag (tag), then the target (R)AN initiates a In the agent registration process of the label, the agent establishes the control plane channel of the new label, and then executes step 603 .
- the first AMF sends a query message to the UDM, where the query message is used to query whether there is an AMF serving the label.
- the first AMF sends a query message to the UDM, where the query message is used to query whether there is an AMF serving the label.
- the query message includes, but is not limited to: tag identification information.
- the tag's identification information includes: one or more of: the tag's hidden user ID SUCI, the tag's electronic product code, the tag's unique ID, the tag's permanent ID, the tag's external ID, or the tag's temporary ID.
- the identification information of the above-mentioned tags please refer to the foregoing step 603, and details are not repeated here.
- the first AMF sends a query message to the UDM according to the first indication information in the registration request message.
- the first indication information indicates to query the registration status of the tag, or the first indication information indicates to query whether there is an AMF serving the tag, or the first indication information indicates to query whether there is an AMF storing the context information of the tag.
- the query message may be "Nudm_UECM_Get Request”.
- the first mobility management function determines that the first mobility management function does not store tag context information. Specifically, the first AMF detects whether the context information of the tag is locally stored according to the registration request message. If it is determined that it is not stored, go to step 605.
- the UDM determines the second AMF that provides the service for the tag according to the query message.
- the UDM queries whether there is an AMF serving the label according to the query message.
- the AMF serving the label is referred to as the second AMF.
- the query message includes tag identification information.
- the UDM when the query message includes the SUCI of the label, the UDM first maps the SUCI to the corresponding SUPI.
- UDM stores SUPI and related context information of SUPI, the context information includes but not limited to: the registration status of the label, and the related information of the network function (or network element) serving the SUPI (or the label corresponding to the SUPI).
- the relevant information includes identification information of the network element, and/or address information of the network element.
- the UDM queries the registration status of the SUPI. If it is registered, the UDM will query which AMF is serving the SUPI, and feed back the identification information of the AMF to the inquiring AMF (the first AMF).
- the identification information of the AMF can be the address information of the AMF, for example: The Internet Protocol address (IP address) of the AMF. If it is unregistered or unregistered, there is no AMF serving the SUPI. Further, the UDM feeds back third indication information to the first AMF, where the third indication information is used to indicate that the query fails or no information is found (step 610).
- IP address Internet Protocol address
- the UDM determines, according to the query message, that there is a second AMF providing services for the tag, and then enters step 606 .
- the SUCI when the identification information of the tag included in the query message is SUCI, the SUCI includes plaintext information.
- the UDM inquires whether there is a second AMF providing a server for the label according to the plaintext information in the SUCI.
- the UDM sends the identification information of the second AMF to the first AMF.
- the identification information of the second AMF includes but not limited to: the IP address of the second AMF, or the MAC address of the second AMF, and the like.
- the UDM also sends the permanent identification information of the label to the first AMF.
- the permanent identification information of the tag includes, but is not limited to: the EPC code of the tag, the SUPI of the tag, or the MAC address of the tag.
- the first AMF sends the SUCI to the UDM
- the UDM acquires the SUPI corresponding to the SUCI
- the UDM sends the SUPI to the first AMF.
- the UDM may also send the identification information of other labels of the label to the first AMF.
- identification information of the label please refer to the aforementioned step 603, which will not be repeated here.
- the first AMF acquires the context information of the tag from the second AMF.
- the first mobility management function acquires the context information of the tag from the second mobility management function according to the permanent identification information of the tag and the identification information of the second mobility management function. Further, after receiving the identification information of the second AMF sent by the UDM, the first AMF determines the second AMF. The first AMF acquires the context information of the tag from the second AMF according to the permanent identification information of the tag.
- the tag's context information includes but not limited to: tag's key, security algorithm (for example: air interface encryption and integrity protection algorithm), tag security capability, counter value, or timer value and other information, which is not limited here.
- the first mobility management function establishes a connection for the tag according to the context information of the tag, including: establishing a secure connection for the tag according to security context information in the context information (for example: tag key, security algorithm, and tag security capability) , the secure connection includes: an air interface secure connection and/or a non-access layer secure connection.
- the context information of the label may also include the context information of the session.
- the context information of the session includes a session identifier, information related to a session management function that provides services for the session, and the like.
- the first mobility management function updates the user plane connection for the label according to the context information of the session.
- the first mobility management function reestablishes or updates the N3 user plane connection for the label.
- the first AMF acquires the context information of the tag from the second AMF according to the identification information of the other tag sent by the UDM.
- the first AMF obtains the context information of the tag from itself.
- the first AMF requests the second AMF for the context information of the label through a service interface message (Namf_Communication_UEContextTransfer).
- the second AMF sends the context information of the label to the first AMF through a service interface message (Namf_Communication_UEContextTransfer).
- the first AMF notifies the UDM to update the mobility management function serving the label.
- the first AMF after the first AMF acquires the context information of the label, the first AMF notifies the UDM to update the mobility management function serving the label to the first AMF.
- the first AMF sends a Nudm_UECM_Registration Request message to the UDM, and the message carries NF ID, SUPI, and NF Type.
- NF ID is a network function (Network Function, NF) identification, here is the identification of the first AMF
- SUPI is the identification of the label
- NF Type is the type of the first AMF.
- step 607 and step 608 is not limited here.
- the first AMF sends the label context information to the target (R)AN.
- step 609 may be executed.
- step 608 may be executed first, and then step 609 may be executed; or step 609 may be executed first, and then step 608 may be executed, which is not limited here.
- the first AMF After the first AMF acquires the context information of the tag, the first AMF establishes a communication connection with the tag according to the context information of the tag.
- the communication connection may be an N2 connection, which is not limited here.
- the first AMF sends the label context information to the target (R)AN.
- the target (R)AN After obtaining the context information of the label, the target (R)AN can establish a security air interface with the label according to the context information of the label.
- the context information of the label sent by the first AMF to the target (R) AN may be part or all of the context information of the label acquired by the first AMF, for example, the air interface related information of the label sent by the first AMF to the target (R) AN Security context information.
- the target (R)AN establishes a security air interface according to the security context information and labels related to the air interface.
- the first AMF sends a registration accept (registration accept) message to the target (R)AN, indicating that a communication connection has been established with the tag.
- 609 can be composed of 609a and 609b, described as follows:
- the first AMF sends a registration acceptance message to the target (R)AN.
- the second AMF and the source (R)AN release the context information of the label.
- the second AMF and the source (R)AN execute the N2 context release process, and the source (R)AN provides the label with (R)AN for communication services.
- the UDM sends third indication information to the first AMF, where the third indication information indicates that there is currently no AMF serving the tag.
- the UDM queries the registration status of the SUPI (corresponding to the label). If it is in an unregistered or deregistered state, it is determined that there is no AMF serving the SUPI. That is, there is no AMF serving the label, and then the UDM feeds back third indication information to the first AMF, where the third indication information is used to indicate that the query fails or no information is found.
- UDM performs step 606 or 610 .
- the first AMF executes the registration process of the label.
- step 610 if the first AMF receives the third indication information, the first AMF executes the registration procedure of the label.
- the passive tag since the registration process of the passive tag is performed by the (R)AN agent, the passive tag itself does not save the identification information about the tag in the cellular network. For example: permanent or temporary logos such as SUCI, SUPI, 5G-GUTI, etc. Therefore, when a passive tag moves to a new (R)AN, the network side cannot know the mobility of the passive tag based on the tag’s tag identification information, that is, it cannot know the source (R) of the passive tag. AN or source AMF. And because the passive tag itself has no connectivity, the network side cannot perceive the mobility of the tag.
- the registration request message sent by (R)AN to the first AMF includes the identification information of the label and/or the first indication information, so that the first AMF first goes to the UDM before performing the registration process of the label.
- Query whether there is an AMF serving the label and obtain the context information of the label.
- the mobility management of tags is realized, frequent authentication is avoided in the process of tags accessing a new (R) AN, and communication resources are saved.
- an application scenario involved in the embodiment of the present application is introduced next.
- the application scenario is: a tag moves from a source (R)AN to a target (R)AN, and the AMF serving the source (R)AN is the same as the AMF serving the target (R)AN.
- the tag management method in this application scenario will be described in detail below with reference to the accompanying drawings.
- FIG. 7 is a schematic flowchart of an embodiment of the present application.
- a label management method proposed in the embodiment of the present application includes:
- the source (R)AN initiates a process of establishing a label-granularity control plane channel.
- the label moves to the target (R)AN.
- the target (R)AN sends a registration request message to the first AMF, where the registration request message is used to request to register the label with the core network.
- Steps 701-703 are consistent with the aforementioned steps 601-603, and will not be repeated here.
- the first AMF sends a query message to the UDM, where the query message is used to query whether there is an AMF serving the label.
- Step 704 is consistent with the foregoing step 604, and details are not repeated here.
- the UDM determines the second AMF that provides services for the tag according to the query message.
- the UDM sends the identification information of the second AMF to the first AMF.
- Steps 705-706 are consistent with the aforementioned steps 605-606, and will not be repeated here.
- the first AMF acquires the context information of the tag according to the permanent identification information of the tag.
- the UDM sends the identification information of the second AMF and the permanent identification information of the tag to the first AMF.
- the identification information of the second AMF includes but is not limited to: the IP address of the second AMF, or the MAC address of the second AMF, and the like.
- the permanent identification information of the tag includes, but is not limited to: the EPC code of the tag or the MAC address of the tag, and the like.
- the first AMF sends the label context information to the target (R)AN.
- Step 708 is consistent with the foregoing step 609, and details are not repeated here.
- the first AMF notifies the UDM to update the status information of the label.
- Step 709 is consistent with the foregoing step 608, and details are not repeated here.
- the UDM sends third indication information to the first AMF, where the third indication information indicates that there is currently no AMF serving the tag.
- the first AMF executes the registration process of the tag.
- Steps 710-711 are consistent with the aforementioned steps 610-611, and will not be repeated here.
- FIG. 8 is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application.
- a tag management method proposed in an embodiment of the present application includes:
- the source (R)AN initiates a label-granularity control plane channel establishment process.
- the label moves to the target (R)AN.
- the target (R)AN sends a registration request message to the first AMF, where the registration request message is used to request to register the label with the core network.
- Steps 801-803 are consistent with the aforementioned steps 601-603, and will not be repeated here.
- the first AMF acquires context information of the tag according to the registration request message.
- the first AMF acquires the context information of the tag according to the identification information of the tag included in the registration request message. Specifically, the first AMF checks whether the data stored by itself includes the context information of the tag.
- the registration request message includes the hidden user identification of the label, and a part of the hidden user identification of the label is plain text information.
- the plaintext information includes: one or more of the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary identifier of the tag.
- the registration request message further includes second indication information, and the second indication information instructs the first mobility management function to query whether the tag context information is stored.
- the first mobility management function acquires the context information of the label indicated by the plaintext information from the first mobility management function, including: the first mobility management function acquires the context information of the label indicated by the plaintext information from the first mobility management function according to the second indication information. contextual information.
- step 810 When the first AMF stores the context information of the tag, step 810 is executed, and steps 805-808 are not executed. It should be noted that, when step 810 is performed, step 809 may be performed (step 809 is an optional step).
- step 804 When step 804 is executed, if the first AMF does not store the context information of the tag, then execute steps 805-808 (steps 805-808 are optional steps).
- the first AMF sends a query message to the UDM, where the query message is used to query whether there is an AMF serving the label.
- the UDM determines the second AMF serving the tag according to the query message.
- the UDM sends the identification information of the second AMF to the first AMF.
- the first AMF acquires the context information of the tag from the second AMF.
- Steps 805-808 are similar to the aforementioned steps 604-607, and will not be repeated here.
- the difference is that the query message includes second indication information, and the second indication information instructs the UDM to query whether there is an AMF serving the label.
- the first AMF notifies the UDM to update the status information of the label.
- the first AMF sends the context information of the label to the target (R)AN.
- the UDM sends third indication information to the first AMF, where the third indication information indicates that there is currently no AMF serving the tag.
- the first AMF executes the registration process of the tag.
- Steps 809-812 are consistent with the foregoing steps 709-711, and will not be repeated here.
- the passive tag since the registration process of the passive tag is performed by the (R)AN agent, the passive tag itself does not save the identification information about the tag in the cellular network. For example: permanent or temporary signs such as SUCI, SUPI, 5G-GUTI, etc. Therefore, when a passive tag moves to a new (R)AN, the network side cannot know the mobility of the passive tag based on the tag’s tag identification information, that is, it cannot know the source (R) of the passive tag. AN or source AMF. And because the passive tag itself has no connectivity, the network side cannot perceive the mobility of the tag.
- the registration request message sent by the access network device to the first AMF includes the identification information of the tag and/or the second indication information, so that the first AMF detects itself (the first AMF) before performing the registration process of the tag AMF) stores the context information of the label, and then obtains the context information of the label.
- the first AMF detects itself (the first AMF) before performing the registration process of the tag AMF) stores the context information of the label, and then obtains the context information of the label.
- FIG. 9a is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application. It should be noted that the embodiment shown in Fig. 9a can be combined with the foregoing embodiments.
- a label management method proposed in the embodiment of the present application includes:
- the access network device sends a request message, and the request message is used to instruct the tag to send a response message to the request message.
- the request message may be an operation instruction related to the Internet of Things, for example: it may be the selection command of the aforementioned step B1, or the query command of the aforementioned step B2, or the confirmation command of the aforementioned step B4, or other Newly defined messages are not limited here.
- the request message can be a broadcast message, that is, a response message that instructs all tags managed by the current access network device to send the request message; the request message can also be a unicast or multicast message, that is, a One or more Tags send response messages to the request message.
- the access network device when the access network device takes an inventory of the tags managed by the current access network device, there is a new unregistered tag. Then the access network device establishes a control plane channel for the label proxy.
- the access network device may also enable a counter and/or a timer corresponding to the label. For specific methods, please refer to the subsequent embodiments.
- the access network device receives the response message of the request message.
- the access network device confirms that the target tag loses connection.
- the target label refers to the label that the access network device expects to obtain a response through step K1. If the tag does not reply a response message in multiple inventory events, or does not reply a response message for a long time, the network side confirms that the tag is not in the area covered by the current access network equipment or the tag is invalid. The tag is called a target tag, and the access network device confirms that the target tag has lost connection. The access network device does not need to store the context information of the tag for the target tag.
- the access network device releases the context information corresponding to the target label.
- the access network device releases the context information corresponding to the target label. Specifically, the N2 context information corresponding to the target tag is released, and the target tag enters an idle state (CM-IDLE state).
- the context information corresponding to the target tag includes but not limited to the target tag's key, security algorithm (for example: air interface encryption and integrity protection algorithm), target tag security capability, counter value, or timer value and other information.
- security algorithm for example: air interface encryption and integrity protection algorithm
- target tag security capability for example: counter value, or timer value and other information.
- the access network device obtains the context information of the target label from the AMF.
- the network side cannot know the connectivity of the tag in real time.
- the access network device agent completes the label registration process, it starts a counter or a timer.
- the access network device sends a request message, which is used to instruct the tag to send a response message to the request message to the access network device, and the access network device performs statistics and judgment based on the response message to determine the connectivity of the passive tag .
- the network side will confirm that the tag is not in the area managed by the current access network device or the tag has expired, or the network side believes that the current The server does not need to obtain the relevant information of the tag temporarily. Therefore, the access network device does not need to store the context information of the label for the label. Therefore, the access network device can initiate an access network release procedure for the label, so that the label enters an idle state, so as to save resources such as storage space on the network side.
- FIG. 9b is a schematic flowchart of an embodiment of a tag management method proposed in the embodiment of the present application.
- a label management method proposed in the embodiment of the present application includes:
- the (R)AN sends a request message, where the request message is used to instruct the tag to send a response message to the request message.
- the request message may be an operation instruction related to the Internet of Things, for example: it may be the selection command of the aforementioned step B1, or the query command of the aforementioned step B2, or the confirmation command of the aforementioned step B4, or other Newly defined messages are not limited here.
- the request message may be a broadcast message, that is, a response message indicating that all labels managed by the current (R)AN send the request message; the request message may also be a unicast or multicast message, that is, a One or more Tags send response messages to the request message.
- (R)AN may also start a counter and/or a timer corresponding to the tag. Specifically, the technical solution of starting the timer of the tag corresponds to steps 906-908; the technical solution of starting the counter of the tag corresponds to steps 903-905. It should be noted that (R)AN establishes a control plane channel for the label agent, and the execution sequence between step 901 is not limited here.
- the (R)AN receives a response message of the request message.
- steps 903-905 may be performed, and steps 906-908 may also be performed, which will be described respectively below.
- the (R)AN updates the first value corresponding to the target tag.
- the network side confirms that the tag is not in the area covered by the current (R)AN or the tag is invalid.
- the label is a target label, and the target label loses connection with the (R)AN, and the (R)AN does not need to store the context information of the label for the target label.
- the identification information of the target tag includes, but is not limited to, one of the electronic product code of the target tag, the unique identification of the target tag, the permanent identification of the target tag, the external identification of the target tag, the temporary identification of the target tag, and the data information of the target tag or Multiple. Instructions are given below:
- the electronic product code of the target label may be an electronic product code (Electronic Product Code, EPC).
- EPC Electronic Product Code
- EPC Electronic Product Code
- “urn:epc:id:sgtin:CompanyPrefix.ItemRefAndIndicator.SerialNumber” where "sgtin” indicates that the object or object identified by this EPC code is a commodity
- “CompanyPrefix” is used to identify a management entity or representative, which can be understood as It is used to identify the enterprise (or manufacturer)
- “ItemRefAndIndicator” can also be called “Item Reference”, which is used to identify a specific object type, such as clothes, daily necessities, food, etc.
- “SerialNumber” that is, the serial number, Used to identify this object or the object itself.
- the unique identifier of the target tag may be a Media Access Control Address (Media Access Control Address, MAC) of the target tag.
- Media Access Control Address Media Access Control Address, MAC
- the permanent identifier of the target tag may be: a permanent identifier (subscriber permanent identifier, SUPI) of the target tag, or information such as a credential (credential) of the target tag.
- SUPI subscriber permanent identifier
- credential credential
- the external identifier of the target tag may be another identifier assigned to the target tag by (R)AN or other external devices (such as a server).
- the general public subscription identifier generator public subscription identifier, GPSI
- the temporary identifier of the target tag may be a temporarily used identifier assigned by (R)AN or other external devices (such as a server) for the target tag.
- the identification information of the target tag may also be a subscription concealed identifier (SUCI).
- SUCI is the identification information generated after SUPI encryption.
- the identification information of the target tag may also be a deformation of the above-mentioned various identifications, which is not limited here.
- the tags managed by the (R)AN include: tag 1, tag 2, tag 3, and tag 4.
- the response message of the request message does not include the identification information of the target label, for example: label 2 is the target label
- the response message of the request message received by (R)AN does not include the identification information of label 2
- (R)AN updates the label 2 The corresponding first value. For example: before step 901, the first value corresponding to the label 2 is 0.
- the (R)AN updates the first value corresponding to the tag 2 to 1.
- Step 905 is executed after step 903 .
- the (R)AN updates the first value corresponding to the target tag.
- step 904 is another possible implementation manner paralleled with step 903 after step 902 .
- the (R)AN does not receive a response message to the request message sent by the target tag
- the (R)AN updates the first value corresponding to the target tag.
- the response message of the request message sent by the target tag includes the identification information of the target tag, which is similar to the identification information of the target tag in step 903, and will not be described here.
- Step 905 is executed after step 904 .
- the (R)AN releases the context information corresponding to the target label.
- the first threshold may be configured on (R)AN.
- (R)AN confirms that the target label is disconnected, and (R)AN releases the context information corresponding to the target label.
- the N2 context information corresponding to the target tag is released, and the target tag enters an idle state (CM-IDLE state).
- the (R)AN starts a de-registration timer.
- (R)AN marks the label as de-registration state.
- the AMF starts an implicit de-registration timer.
- the de-registration timer started by the AMF expires, the AMF marks the label as a de-registration state.
- the first value corresponding to the counter of the target tag is reset.
- the (R)AN After the (R)AN sends the request message in step 901, the (R)AN starts a timer.
- the timer may be a tag-granular timer. For example, each tag counted by the (R)AN corresponds to a timer.
- the (R)AN After the (R)AN sends a request message, the (R)AN starts the timer corresponding to each tag.
- the timer may also be a timer at the (R)AN granularity, for example, after each time the (R)AN sends a request message, a timer is started.
- the (R)AN after the (R)AN takes inventory of the tags for the first time, the (R)AN starts a timer.
- the (R)AN after the (R)AN takes inventory of the tag for the first time, the (R)AN obtains the context information of the tag. After the (R)AN obtains the context information of the tag, the (R)AN starts a timer.
- the tag's context information includes but not limited to the tag's key, security algorithm (for example: air interface encryption and integrity protection algorithm), tag security capability, counter value, or timer value and other information.
- the (R)AN obtains the context information of the label from the AMF.
- step 906 execute step 907 or 908.
- the (R)AN releases the context information corresponding to the target tag.
- the identification information of the target tag includes but is not limited to one or more of the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary identifier of the tag.
- the countdown of the timer is 10 seconds or 70 seconds.
- the response message of the request message received by the (R)AN does not include the identification information of the target tag.
- (R)AN confirms that the target label is disconnected, and (R)AN releases the context information corresponding to the target label.
- the N2 context information corresponding to the target tag is released, and the target tag enters an idle state (CM-IDLE state).
- the (R)AN starts a de-registration timer.
- (R)AN marks the label as de-registration state.
- the AMF starts an implicit de-registration timer.
- the de-registration timer started by the AMF expires, the AMF marks the label as a de-registration state.
- the (R)AN releases the context information corresponding to the target tag.
- the (R)AN confirms that the target tag is disconnected, and (R)AN releases the context information corresponding to the target tag.
- the identification information of the target tag includes but is not limited to one or more of the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary identifier of the tag.
- the countdown of the timer is 10 seconds or 70 seconds.
- the (R)AN does not receive the response message of the request message sent by the target tag.
- (R)AN confirms that the target label is disconnected, and (R)AN releases the context information corresponding to the target label.
- the N2 context information corresponding to the target tag is released, and the target tag enters an idle state (CM-IDLE state).
- the (R)AN starts a de-registration timer.
- (R)AN marks the label as de-registration state.
- the AMF starts an implicit de-registration timer.
- the de-registration timer started by the AMF expires, the AMF marks the label as a de-registration state.
- the network side cannot know the connectivity of the tag in real time.
- the (R)AN agent completes the label registration process, it starts a counter or a timer.
- (R)AN sends a request message, which is used to instruct the label to send a response message to the request message to (R)AN, and (R)AN makes statistics and judgments based on the response message to determine the connectivity of the passive label .
- the network side will confirm that the tag is not in the area managed by the current (R)AN or the tag has expired, or the network side considers that the current The server does not need to obtain the relevant information of the tag temporarily. Therefore (R)AN does not need to save context information of the label for the label. Therefore, the (R)AN can initiate an access network release process related to the label, so that the label enters an idle state, so as to save resources such as storage space on the network side.
- the communication device (the first AMF, the second AMF, the UDM and/or the access network device) includes corresponding hardware structures and/or software modules for performing various functions.
- the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software drives hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
- the functional modules of the communication device may be divided according to the above method example.
- each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
- the above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic, and is only a logical function division, and there may be other division methods in actual implementation.
- FIG. 10 is a schematic diagram of an embodiment of a communication device in an embodiment of this application.
- the communication device may be deployed in a network device or in a chip system, and the communication device 1000 may be used to perform some or all of the steps performed by the first mobility management function in the above-mentioned embodiments shown in FIG. 6a, FIG. 6b, FIG. 7 and FIG. 8
- FIG. 6 a , FIG. 6 b , FIG. 7 and FIG. 8 For details, reference may be made to relevant descriptions of the embodiments shown in FIG. 6 a , FIG. 6 b , FIG. 7 and FIG. 8 .
- the transceiver module 1001 is configured to receive a registration request message sent by the access network device, and the registration request message is used to request the tag to be registered to the core network;
- the transceiver module 1001 is further configured to obtain the identification information of the mobility management function of the second access and mobility management function from the unified data management function according to the registration request message, and the second mobility management function stores the context information of the label;
- the transceiver module 1001 is further configured to acquire context information of the tag from the second mobility management function.
- the registration request message includes identification information of the tag, and the identification information of the tag includes a hidden user ID of the tag, and a part of the hidden user ID of the tag is plaintext information;
- the transceiving module 1001 is specifically configured to acquire the context information of the label indicated by the plaintext information from the second mobility management function.
- the plaintext information includes: one or more of the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary identifier of the tag.
- the transceiver module 1001 is specifically configured to send a query message to the unified data management function, where the query message includes identification information of the tag;
- the transceiver module 1001 is specifically configured to receive the permanent identification information of the tag from the unified data management function and the identification information of the second mobility management function;
- the transceiving module 1001 is specifically configured to obtain the context information of the tag from the second mobility management function according to the permanent identification information of the tag and the identification information of the second mobility management function.
- the registration request message further includes first indication information, where the first indication information indicates whether there is a mobility management function that stores tagged context information,
- the transceiver module 1001 is specifically configured to acquire the identification information of the second mobility management function from the unified data management function according to the first indication information.
- the transceiver module 1001 is specifically configured to send a query message to the unified data management function, where the query message includes first indication information;
- the transceiver module 1001 is specifically configured to receive identification information from the second mobility management function of the unified data management function.
- the second mobility management function is the same as the first mobility management function.
- the transceiver module 1001 is further configured to send the context information of the tag to the access network device.
- the processing module 1002 is configured to determine that the first mobility management function does not store tagged context information.
- the processing module 1002 is a processor.
- the processing module 1002 is a processor
- the transceiver module 1001 is a transceiver.
- the processing module 1002 is a processor.
- the processing module 1002 is a processor
- the transceiver module 1001 is a transceiver.
- the transceiver module 1001 is configured to receive a registration request message sent by an access network device.
- the registration request message is used to request the tag to be registered with the core network.
- the registration request message includes the hidden user identification of the tag, and a part of the hidden user identification of the tag is plaintext information ;
- the transceiving module 1001 is further configured to obtain the context information of the label from the first mobility management function according to the plaintext information.
- the plaintext information includes: one or more of the electronic product code of the tag, the unique identifier of the tag, the permanent identifier of the tag, the external identifier of the tag, or the temporary identifier of the tag.
- the registration request message further includes second indication information
- the processing module 1002 is configured to acquire the context information of the label indicated by the plaintext information from the first mobility management function according to the second indication information.
- the processing module 1002 is further configured to determine whether the first mobility management function stores tag context information
- the processing module 1002 is further configured to acquire the context information of the tag from the first mobility management function according to the registration request message when the first mobility management function stores the context information of the tag.
- the transceiver module 1001 is further configured to send the context information of the tag to the access network device.
- the communication device 1000 can be used to execute some or all of the steps performed by the unified data management function in the embodiment shown in the above-mentioned Figure 6a, Figure 6b, Figure 7 and Figure 8, for details, please refer to the above-mentioned Figure 6a, Figure 6b, Figure 7 and Figure The relevant description of the embodiment shown in 8.
- the transceiver module 1001 is configured to receive a query message sent by the first mobility management function, where the query message is used to query whether there is a second mobility management function that stores tagged context information;
- a processing module 1002 configured to determine a second mobility management function according to the query message
- the transceiver module 1001 is further configured to send the identification information of the second mobility management function to the first mobility management function.
- the query message includes identification information of the tag, and the identification information of the tag is used to identify the tag;
- the identification information of the label includes: one or more of the electronic product code of the label, the unique identification of the label, the permanent identification of the label, the external identification of the label, or the temporary identification of the label.
- the query message further includes first indication information, where the first indication information indicates to query whether there is a mobility management function that stores the context information of the label.
- the identification information of the label further includes a hidden user identification of the label, and the hidden user identification further includes plaintext information, and the plaintext information is used to indicate the label.
- the processing module 1002 is further configured to determine the permanent identification information of the label according to the user hidden identification of the label in the query message;
- the transceiver module 1001 is further configured to send the tag's permanent identification information to the first mobility management function.
- the transceiving module 1001 is further configured to send third indication information to the first mobility management function, where the third indication information indicates the second mobility management function that currently does not store the tagged context information.
- the identification information of the second mobility management function includes: address information of the second mobility management function.
- the processing module 1002 is a processor.
- the processing module 1002 is a processor
- the transceiver module 1001 is a transceiver.
- the communications apparatus 1000 may be configured to perform some or all of the steps performed by the access network device in the embodiment shown in FIG. 9a or FIG. 9b . For details, reference may be made to relevant descriptions of the embodiment shown in FIG. 9a or FIG. 9b .
- the transceiver module 1001 is configured to send a request message, and the request message indicates that the tag sends a response message of the request message to the access network device;
- the processing module 1002 is further configured to release the context information of the target tag.
- the processing module 1002 is further configured to update the first value corresponding to the target tag when the response message received by the access network device does not include the identification information of the target tag;
- the processing module 1002 is further configured to release the context information corresponding to the target tag when the first value corresponding to the target tag reaches a first threshold.
- the processing module 1002 is further configured to update the first value corresponding to the target tag when the response message sent by the target tag is not received;
- the processing module 1002 is further configured to release the context information corresponding to the target tag when the first value corresponding to the target tag reaches a first threshold.
- the processing module 1002 is also configured to start a timer
- the processing module 1002 is further configured to release the context information corresponding to the target tag when the response message received by the access network device does not include the identification information of the target tag after the timer expires.
- the processing module 1002 is also configured to start a timer
- the processing module 1002 is further configured to release the context information corresponding to the target tag when the access network device has not received the response message sent by the target tag after the timer expires.
- the request message includes identification information of the target tag.
- the identification information of the target label is the product electronic code of the target label, the temporary identification of the target label, the unique identification of the target label, the permanent identification of the target label, the external identification of the target label, the data of the target label One or more of the information.
- the processing module 1002 is a processor.
- the processing module 1002 is a processor
- the transceiver module 1001 is a transceiver.
- An embodiment of the present application further provides a processing device, the processing device includes a processor and an interface; the processor is configured to execute a label management method in any one of the above method embodiments.
- the above-mentioned processing device may be a chip, and the processor may be implemented by hardware or by software.
- the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, etc.; when implemented by software, the processor may be a general-purpose processor, and may be implemented by reading software codes stored in a memory.
- the memory may be integrated in the processor, or may be located outside the processor and exist independently.
- the hardware processing circuit can include ASIC (application-specific integrated circuit, application-specific integrated circuit), or PLD (programmable logic device, programmable logic device); wherein, PLD can include FPGA (field programmable gate array, field programmable gate array) , CPLD (complex programmable logic device, complex programmable logic device) and so on.
- ASIC application-specific integrated circuit, application-specific integrated circuit
- PLD programmable logic device, programmable logic device
- FPGA field programmable gate array
- CPLD complex programmable logic device, complex programmable logic device
- These hardware processing circuits can be a semiconductor chip packaged separately (such as packaged into an ASIC); they can also be integrated with other circuits (such as CPU, DSP) and packaged into a semiconductor chip, for example, can be formed on a silicon base.
- a variety of hardware circuits and CPUs are packaged separately into a chip.
- This chip is also called SoC, or circuits and CPUs for realizing FPGA functions can also be formed on a silicon base, and separately sealed into a chip.
- SoPC system on a programmable chip, programmable system on a chip.
- the present application also provides a communication system, which includes a tag and at least one or more of the first AMF, the second AMF, (R)AN or UDM.
- An embodiment of the present application further provides a computer-readable storage medium, including instructions, which, when run on a computer, enable the computer to control the communication device to execute any implementation manner as shown in the foregoing method embodiments.
- the embodiment of the present application also provides a computer program product, the computer program product includes computer program code, and when the computer program code is run on the computer, the computer is made to execute any one of the implementation manners shown in the foregoing method embodiments.
- the embodiment of the present application also provides a chip system, including a memory and a processor, the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that the chip performs any implementation as shown in the foregoing method embodiments Way.
- the embodiment of the present application also provides a chip system, including a processor, and the processor is configured to call and run a computer program, so that the chip executes any one of the implementation manners shown in the foregoing method embodiments.
- the device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be A physical unit can be located in one place, or it can be distributed to multiple network units. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- the connection relationship between the modules indicates that they have communication connections, which can be specifically implemented as one or more communication buses or signal lines.
- the essence of the technical solution of this application or the part that contributes to the prior art can be embodied in the form of a software product, and the computer software product is stored in a readable storage medium, such as a floppy disk of a computer , U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk, etc., including several instructions to make a computer device execute the method described in each embodiment of the present application.
- a readable storage medium such as a floppy disk of a computer , U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk, etc.
- all or part of them may be implemented by software, hardware, firmware or any combination thereof.
- software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, communication device, computing equipment or data center to another website site, computer, communication device, computing device or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) transmission.
- wired such as coaxial cable, optical fiber, digital subscriber line (DSL)
- wireless such as infrared, wireless, microwave, etc.
- the computer-readable storage medium may be any available medium that can be stored by a computer, or a data storage device such as a communication device or a data center integrated with one or more available media.
- the available medium may be a magnetic medium (such as a floppy disk, a hard disk, or a magnetic tape), an optical medium (such as a DVD), or a semiconductor medium (such as a solid state disk (Solid State Disk, SSD)), etc.
- the disclosed system, device and method can be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components can be combined or integrated. to another system, or some features may be ignored, or not implemented.
- the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
- a unit described as a separate component may or may not be physically separated, and a component displayed as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
- the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods in various embodiments of the present application.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (33)
- 一种标签的管理方法,其特征在于,包括:第一移动性管理功能接收接入网设备发送的注册请求消息,所述注册请求消息用于请求将标签注册到核心网;所述第一移动性管理功能根据所述注册请求消息从统一数据管理功能获取第二移动性管理功能的标识信息,所述第二移动性管理功能存储有所述标签的上下文信息;所述第一移动性管理功能从所述第二移动性管理功能获取所述标签的上下文信息。
- 根据权利要求1所述的方法,其特征在于,所述注册请求消息包括所述标签的标识信息,所述标签的标识信息包括所述标签的用户隐藏标识,所述标签的用户隐藏标识的一部分为明文信息;所述第一移动性管理功能从所述第二移动性管理功能获取所述标签的上下文信息,包括:所述第一移动性管理功能从所述第二移动性管理功能获取所述明文信息指示的所述标签的上下文信息。
- 根据权利要求2中所述的方法,其特征在于,所述明文信息包括:所述标签的电子产品代码、所述标签的唯一标识、所述标签的永久标识、所述标签的外部标识、或者所述标签的临时标识中的一个或多个。
- 根据权利要求2或3所述的方法,其特征在于,所述第一移动性管理功能从所述统一数据管理功能获取所述第二移动性管理功能的标识信息,包括:所述第一移动性管理功能向所述统一数据管理功能发送查询消息,所述查询消息包括所述标签的标识信息;所述第一移动性管理功能接收来自于所述统一数据管理功能的所述标签的永久标识信息和所述第二移动性管理功能的标识信息;所述第一移动性管理功能从所述第二移动性管理功能获取所述标签的上下文信息,包括:所述第一移动性管理功能根据所述标签的永久标识信息和所述第二移动性管理功能的标识信息从所述第二移动性管理功能获取所述标签的上下文信息。
- 根据权利要求1所述的方法,其特征在于,所述注册请求消息还包括第一指示信息,所述第一指示信息指示查询是否存在存储有所述标签的上下文信息的移动性管理功能,所述第一移动性管理功能根据所述注册请求消息从所述统一数据管理功能获取所述第二移动性管理功能的标识信息,包括:所述第一移动性管理功能根据所述第一指示信息,从所述统一数据管理功能获取所述第二移动性管理功能的标识信息。
- 根据权利要求5所述的方法,其特征在于,所述第一移动性管理功能从所述统一数据管理功能获取所述第二移动性管理功能的标识信息,包括:所述第一移动性管理功能向所述统一数据管理功能发送查询消息,所述查询消息包括第一指示信息;所述第一移动性管理功能接收来自于所述统一数据管理功能的所述第二移动性管理功能的标识信息。
- 根据权利要求1-6中任一项所述的方法,其特征在于,所述第二移动性管理功能与所述第一移动性管理功能相同。
- 根据权利要求1-7中任一项所述的方法,其特征在于,所述方法还包括:所述第一移动性管理功能向所述接入网设备发送所述标签的上下文信息。
- 根据权利要求1-7中任一项所述的方法,其特征在于,在所述第一移动性管理功能根据所述注册请求消息从统一数据管理功能获取第二移动性管理功能的标识信息之前,所述方法还包括:所述第一移动性管理功能确定所述第一移动性管理功能未存储有所述标签的上下文信息。
- 一种标签的管理方法,其特征在于,包括:第一移动性管理功能接收接入网设备发送的注册请求消息,所述注册请求消息用于请求将标签注册到核心网,所述注册请求消息包括所述标签的用户隐藏标识,所述标签的用户隐藏标识的一部分为明文信息;所述第一移动性管理功能从所述第一移动性管理功能获取所述明文信息指示的所述标签的上下文信息。
- 根据权利要求10中所述的方法,其特征在于,所述明文信息包括:所述标签的电子产品代码、所述标签的唯一标识、所述标签的永久标识、所述标签的外部标识、或者所述标签的临时标识中的一个或多个。
- 根据权利要求10-11中任一项所述的方法,其特征在于,所述注册请求消息还包括第二指示信息;所述第一移动性管理功能从所述第一移动性管理功能获取所述明文信息指示的所述标签的上下文信息,包括:所述第一移动性管理功能根据所述第二指示信息从所述第一移动性管理功能获取所述明文信息指示的所述标签的上下文信息。
- 根据权利要求10-12中任一项所述的方法,其特征在于,所述第一移动性管理功能从所述第一移动性管理功能获取所述明文信息指示的所述标签的上下文信息,包括:所述第一移动性管理功能,确定所述第一移动性管理功能是否存储有所述标签的上下文信息;当所述第一移动性管理功能存储有所述标签的上下文信息时,所述第一移动性管理功能根据所述注册请求消息从所述第一移动性管理功能获取所述标签的上下文信息。
- 根据权利要求10-13中任一项所述的方法,其特征在于,所述方法还包括:所述第一移动性管理功能向所述接入网设备发送所述标签的上下文信息。
- 一种通信装置,其特征在于,包括:收发模块,用于接收接入网设备发送的注册请求消息,所述注册请求消息用于请求将标签注册到核心网;所述收发模块,还用于根据所述注册请求消息从统一数据管理功能获取第二接入与移动管理功能的标识信息,所述第二移动性管理功能存储有所述标签的上下文信息;所述收发模块,还用于从所述第二移动性管理功能获取所述标签的上下文信息。
- 根据权利要求15所述的装置,其特征在于,所述注册请求消息包括所述标签的标识信息,所述标签的标识信息包括所述标签的用户隐藏标识,所述标签的用户隐藏标识的一部分为明文信息;所述收发模块,具体用于从所述第二移动性管理功能获取所述明文信息指示的所述标签的上下文信息。
- 根据权利要求16中所述的装置,其特征在于,所述明文信息包括:所述标签的电子产品代码、所述标签的唯一标识、所述标签的永久标识、所述标签的外部标识、或者所述标签的临时标识中的一个或多个。
- 根据权利要求16或17所述的装置,其特征在于,所述收发模块,具体用于能向所述统一数据管理功能发送查询消息,所述查询消息包括所述标签的标识信息;所述收发模块,具体用于接收来自于所述统一数据管理功能的所述标签的永久标识信息和所述第二移动性管理功能的标识信息;所述收发模块,具体用于根据所述标签的永久标识信息和所述第二移动性管理功能的标识信息从所述第二移动性管理功能获取所述标签的上下文信息。
- 根据权利要求15所述的装置,其特征在于,所述注册请求消息还包括第一指示信息,所述第一指示信息指示查询是否存在存储有所述标签的上下文信息的移动性管理功能,所述收发模块,具体用于根据所述第一指示信息,从所述统一数据管理功能获取所述第二移动性管理功能的标识信息。
- 根据权利要求19所述的装置,其特征在于,所述收发模块,具体用于向所述统一数据管理功能发送查询消息,所述查询消息包括第一指示信息;所述收发模块,具体用于接收来自于所述统一数据管理功能的所述第二移动性管理功能的标识信息。
- 根据权利要求15-20中任一项所述的装置,其特征在于,所述第二移动性管理功能与第一移动性管理功能相同。
- 根据权利要求15-21中任一项所述的装置,其特征在于,所述收发模块,还用于向所述接入网设备发送所述标签的上下文信息。
- 根据权利要求15-21中任一项所述的装置,其特征在于,处理模块,用于确定所述第一移动性管理功能未存储有所述标签的上下文信息。
- 一种通信装置,其特征在于,包括:收发模块,用于接收接入网设备发送的注册请求消息,所述注册请求消息用于请求将标签注册到核心网,所述注册请求消息包括所述标签的用户隐藏标识,所述标签的用户隐藏标识的一部分为明文信息;所述收发模块,还用于从所述第一移动性管理功能获取所述明文信息指示的所述标签的上下文信息。
- 根据权利要求24中所述的装置,其特征在于,所述明文信息包括:所述标签的电子产品代码、所述标签的唯一标识、所述标签的永久标识、所述标签的外部标识、或者所述标签的临时标识中的一个或多个。
- 根据权利要求24-25中任一项所述的装置,其特征在于,所述注册请求消息还包括第二指示信息;处理模块,用于根据所述第二指示信息从第一移动性管理功能获取所述明文信息指示的所述标签的上下文信息。
- 根据权利要求24-26中任一项所述的装置,其特征在于,所述处理模块,还用于确定所述第一移动性管理功能是否存储有所述标签的上下文信息;所述处理模块,还用于当所述第一移动性管理功能存储有所述标签的上下文信息时,根据所述注册请求消息从所述第一移动性管理功能获取所述标签的上下文信息。
- 根据权利要求24-27中任一项所述的装置,其特征在于,所述收发模块,还用于向所述接入网设备发送所述标签的上下文信息。
- 一种通信装置,其特征在于,所述通信装置包括:至少一个处理器;所述至少一个处理器,用于执行存储器中存储的计算机程序或指令,以使所述通信装置执行如权利要求1-9中任一项所述的方法,或以使所述通信装置执行如权利要求10至14中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质具有程序指令,当所述程序指令被直接或者间接执行时,使得如权利要求1-9,或权利要求10至14中任一所述的方法被实现。
- 一种计算机程序产品,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行权利要求1-9,或权利要求10至14中任一项所述的方法。
- 一种芯片系统,其特征在于,所述芯片系统包括至少一个处理器,所述处理器用于执行存储器中存储的计算机程序或指令,当所述计算机程序或所述指令在所述至少一个处理器中执行时,使得如权利要求1-9,或权利要求10至14中任一所述的方法被实现。
- 一种通信系统,其特征在于,所述通信系统包括第一移动性管理功能;所述第一移动性管理功能用于实现权利要求1-9中任一项所述的方法;或者所述第一移动性管理功能用于实现权利要求10-14中任一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21943375.2A EP4329345A1 (en) | 2021-05-31 | 2021-05-31 | Tag management method and related apparatus |
CN202180098657.4A CN117461339A (zh) | 2021-05-31 | 2021-05-31 | 一种标签的管理方法以及相关装置 |
PCT/CN2021/097129 WO2022251993A1 (zh) | 2021-05-31 | 2021-05-31 | 一种标签的管理方法以及相关装置 |
US18/523,262 US20240098675A1 (en) | 2021-05-31 | 2023-11-29 | Tag management method and related apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/097129 WO2022251993A1 (zh) | 2021-05-31 | 2021-05-31 | 一种标签的管理方法以及相关装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/523,262 Continuation US20240098675A1 (en) | 2021-05-31 | 2023-11-29 | Tag management method and related apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022251993A1 true WO2022251993A1 (zh) | 2022-12-08 |
Family
ID=84323740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/097129 WO2022251993A1 (zh) | 2021-05-31 | 2021-05-31 | 一种标签的管理方法以及相关装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20240098675A1 (zh) |
EP (1) | EP4329345A1 (zh) |
CN (1) | CN117461339A (zh) |
WO (1) | WO2022251993A1 (zh) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108024296A (zh) * | 2016-11-04 | 2018-05-11 | 华为技术有限公司 | 切换网络的方法、系统和移动性管理网元 |
WO2018205114A1 (zh) * | 2017-05-08 | 2018-11-15 | 华为技术有限公司 | 一种状态切换方法及装置 |
WO2019063098A1 (en) * | 2017-09-29 | 2019-04-04 | Telefonaktiebolaget Lm Ericsson (Publ) | METHODS AND NODES FOR RECORDING DURING MOBILITY |
US20200228936A1 (en) * | 2019-01-15 | 2020-07-16 | Peyman TALEBI FARD | Session Establishment To Join A Group Communication |
CN112312539A (zh) * | 2019-07-30 | 2021-02-02 | 华为技术有限公司 | 策略控制功能网元的选择方法、装置、系统及存储介质 |
CN112866932A (zh) * | 2019-11-28 | 2021-05-28 | 中兴通讯股份有限公司 | 一种通信连接方法、设备和存储介质 |
-
2021
- 2021-05-31 EP EP21943375.2A patent/EP4329345A1/en active Pending
- 2021-05-31 WO PCT/CN2021/097129 patent/WO2022251993A1/zh active Application Filing
- 2021-05-31 CN CN202180098657.4A patent/CN117461339A/zh active Pending
-
2023
- 2023-11-29 US US18/523,262 patent/US20240098675A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108024296A (zh) * | 2016-11-04 | 2018-05-11 | 华为技术有限公司 | 切换网络的方法、系统和移动性管理网元 |
WO2018205114A1 (zh) * | 2017-05-08 | 2018-11-15 | 华为技术有限公司 | 一种状态切换方法及装置 |
WO2019063098A1 (en) * | 2017-09-29 | 2019-04-04 | Telefonaktiebolaget Lm Ericsson (Publ) | METHODS AND NODES FOR RECORDING DURING MOBILITY |
US20200228936A1 (en) * | 2019-01-15 | 2020-07-16 | Peyman TALEBI FARD | Session Establishment To Join A Group Communication |
CN112312539A (zh) * | 2019-07-30 | 2021-02-02 | 华为技术有限公司 | 策略控制功能网元的选择方法、装置、系统及存储介质 |
CN112866932A (zh) * | 2019-11-28 | 2021-05-28 | 中兴通讯股份有限公司 | 一种通信连接方法、设备和存储介质 |
Non-Patent Citations (1)
Title |
---|
3GPP PROTOCOL TS 23.316 |
Also Published As
Publication number | Publication date |
---|---|
CN117461339A (zh) | 2024-01-26 |
EP4329345A1 (en) | 2024-02-28 |
US20240098675A1 (en) | 2024-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11963091B2 (en) | Method and system for handling paging in wireless communication system | |
US11240655B2 (en) | Address assignment for initial authentication | |
US10349321B2 (en) | Extended service set transitions in wireless networks | |
CA2854947C (en) | Caching network discovery responses in wireless networks | |
US8634393B2 (en) | Channel scanning in a network having one or more access points | |
US20130272164A1 (en) | Systems and methods of wi-fi enabled device configuration | |
US10045282B2 (en) | System and method for optimizing scanning from a multi-band communications device | |
CN103945507A (zh) | 用于叠接连接的省电控制的方法、装置和计算机程序产品 | |
US20170006536A1 (en) | Method of and apparatus for network access in wireless communication system supporting isolated e-utran operation for public safety | |
US10887804B2 (en) | Pre-roaming security key distribution for faster roaming transitions over cloud-managed Wi-Fi networks of heterogeneous IP subnets | |
CN108605277B (zh) | 建立无线局域网连接的方法及装置 | |
KR101606811B1 (ko) | 무선랜 시스템에서 고속 링크 셋업 방법 및 이를 위한 장치 | |
EP4061092A1 (en) | Access point supporting at least two virtual networks and method performed thereby for communicating with wireless device | |
CN108702650A (zh) | 建立lwa-wlan通信 | |
US20240098145A1 (en) | Packet transmission method and related apparatus | |
WO2022251993A1 (zh) | 一种标签的管理方法以及相关装置 | |
KR20140128986A (ko) | 무선랜 시스템에서 고속 링크 셋업 방법 및 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21943375 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021943375 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202180098657.4 Country of ref document: CN |
|
ENP | Entry into the national phase |
Ref document number: 2021943375 Country of ref document: EP Effective date: 20231124 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |