WO2022267824A1 - 一种策略控制的方法、装置和系统 - Google Patents

一种策略控制的方法、装置和系统 Download PDF

Info

Publication number
WO2022267824A1
WO2022267824A1 PCT/CN2022/095672 CN2022095672W WO2022267824A1 WO 2022267824 A1 WO2022267824 A1 WO 2022267824A1 CN 2022095672 W CN2022095672 W CN 2022095672W WO 2022267824 A1 WO2022267824 A1 WO 2022267824A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobility management
network element
policy
information
pcf
Prior art date
Application number
PCT/CN2022/095672
Other languages
English (en)
French (fr)
Inventor
周晓云
丁辉
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022267824A1 publication Critical patent/WO2022267824A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation

Definitions

  • the present application relates to the communication field, and more specifically, relates to a policy control method, device and system.
  • AM PCF access and mobility management
  • AMF access and mobility management
  • AM Policy includes service area restrictions (service area restrictions) and wireless spectrum selection priority (RAT/frequency selection priority, RFSP), where RAT is radio access technology (radio access technology, RAT), that is, the network standard; service area restrictions
  • RAT radio access technology
  • RAT radio access technology
  • the information is used to indicate the area that the UE is allowed to access or the area that the UE is not allowed to access, and the AMF will send the service area restriction information to the RAN and the UE; the radio spectrum selection priority information is used by the RAN to determine the radio resource management strategy, and the AMF will send RFSP is sent to RAN.
  • AM PCF can formulate AM policies based on user subscription and network policies, and can further formulate AM policies based on application layer information provided by UE.
  • AM policies will be updated frequently and repeatedly, resulting in a waste of resources and cannot guarantee User experience when terminal devices access applications.
  • the present application provides a method, device and system for policy control, which can avoid waste of resources caused by repeated updates of mobility management policies, and can also ensure user experience when terminal devices access applications.
  • a policy control method including: a mobility management network element receives first information from a policy control network element that provides a mobility management policy, and the first information is used to indicate the first mobility management of terminal equipment The policy is determined according to the application layer information of the terminal device; the mobility management network element receives second information from the data management network element, and the second information is used to indicate the subscription of the terminal device corresponding to the first mobility management policy The information is deleted by the data management network element; the mobility management network element determines a target mobility management policy applied to the terminal device according to the first information.
  • the first mobility management policy may include service area restriction (hereinafter referred to as the first parameter) and/or radio access technology or radio spectrum selection priority (hereinafter referred to as the second parameter).
  • the first parameter service area restriction
  • the second parameter radio access technology or radio spectrum selection priority
  • the first information may be independent indication information, which is used to indicate that the mobility management network element (that is, the mobility management network element) obtains the first information of the terminal device from the policy control network element (that is, the policy control network element).
  • a mobility management policy is formulated according to the application layer information of the terminal equipment.
  • the first information may also be a special information element carrying the authorized first mobility management policy. According to the special information element, it can be determined that the mobility management policy is It is determined based on the application layer information of the terminal device.
  • the mobility management network element may acquire the first information while acquiring the first mobility management policy.
  • the mobility management network element may receive the first information before receiving the second information sent by the data management network element, or may receive the first information after receiving the second information sent by the data management network element. This is not limited.
  • the method further includes: the mobility management network element receives the first mobility management policy sent by the policy control network element, and the first mobility management policy is an application of the policy control network element according to the terminal equipment.
  • the layer information is the mobility management policy applied to the terminal equipment formulated by the policy control network element, and the application layer information may be received by the policy control network element from the application function network element.
  • the method further includes: after receiving the target mobility management policy, the mobility management network element executes the target mobility management policy on the terminal device.
  • the target mobility management policy may be the first mobility management policy.
  • the mobility management The network element may also receive the first information from the source mobility management network element before the terminal device executes the mobility management network element reset.
  • the network element when the subscription information of the user changes and the data management network element deletes the subscription information of the terminal device, it will send a notification of deletion of the subscription information of the terminal device to the mobility management network element.
  • the network element may determine the target mobility management policy according to the received first information. It can avoid that the mobility management network element directly deletes the differentiated first mobility management policy for the terminal device when it receives the deletion notification of the terminal device's subscription information sent by the data management network element and formulates a general policy based on the local configuration.
  • the mobility management strategy is applied to the terminal device, which can avoid the unnecessary deletion of the differentiated first mobility management strategy in the mobility management network element caused by the deletion of the subscription information of the terminal device in the data management network element, and also avoids the application Functional network elements make repeated requests to formulate or update mobility management policies based on application layer information, and avoid repeated updates of mobility management policies by policy control network elements caused by repeated requests, saving signaling resources and ensuring The request for formulating or updating the mobility management policy is satisfied, thereby ensuring the user experience of the terminal device accessing the application.
  • the determining, by the mobility management network element, the target mobility management policy applied to the terminal device according to the first information includes: the mobility management network element determines, according to the first information, A piece of information determines the first mobility management policy as the target mobility management policy applied to the terminal device; or the mobility management network element sends the second information to the policy control network element according to the first information; the The mobility management network element receives third information from the policy control network element, where the third information is used to indicate that the target mobility management policy applied to the terminal device is the first mobility management policy or the second mobility management policy , the second mobility management policy is an updated policy of the first mobility management policy determined by the policy control network element.
  • the above-mentioned target mobility management policy may be the first mobility management policy, for example, the mobility management network element determines the first mobility management policy as the target according to the first information Mobility management policy, or, the mobility management network element sends the second information to the policy control network element according to the first information, and at the same time requests the policy control network element for a mobility management policy applied to the terminal device, and the policy control network element Judging that the first mobility management policy does not need to be updated, or in other words, the policy control network element determines to continue to execute the previously authorized first mobility management policy; the above-mentioned target mobility management policy may also be the first mobility management policy formulated by the policy control network element Two mobility management policies, the second mobility management policy is an updated policy of the first mobility management policy determined by the policy control network element, for example, the mobility management network element reports to the policy control network according to the first information The element sends the second information, and at the same time requests the policy control network element for the mobility management policy applied to the terminal device, and the policy control network element
  • the mobility management network element sends the second information to the policy control network element according to the first information At the same time, request the policy control network element for the mobility management policy applied to the terminal device, the policy control network element judges to delete the first mobility management policy, and the mobility management network element also deletes the first mobility management policy Delete and determine the common mobility management strategy according to the local configuration of the mobility management network element.
  • the above third information may be used to indicate that the target mobility management policy applied to the terminal device is the first mobility management policy, for example, the third information indicates that the mobility The management network element continues to execute the instruction information of the first mobility management strategy, or the third information may include the first parameter and/or the second parameter in the first mobility management strategy; the above third information may also be used To indicate that the target mobility management policy applied to the terminal device is the second mobility management policy, for example, the third information may include the first parameter and/or the second parameter in the second mobility management policy ; The above third information may be used to indicate that the first mobility management policy is deleted, and at this time the mobility management network element may determine a general mobility management policy according to the local configuration.
  • the subscription information of the user changes and the data management network element deletes the subscription information of the terminal device, it will send a notification of deletion of the subscription information of the terminal device to the mobility management network element.
  • the network element receives the deletion notification of the terminal equipment's subscription information sent by the data management network element
  • the mobility management network element receives the deletion notification of the terminal equipment's subscription information sent by the data management network element, it can according to the first
  • the information continues to execute the authorized first mobility management policy; it may also interact with the policy control network element according to the first information to further determine the target mobility management policy.
  • the mobility management network element directly deletes the differentiated first mobility management policy for the terminal device when it receives the deletion notification of the terminal device's subscription information sent by the data management network element and formulates a general policy based on the local configuration.
  • the mobility management strategy is applied to the terminal device, which can avoid the unnecessary deletion of the differentiated first mobility management strategy in the mobility management network element caused by the deletion of the subscription information of the terminal device in the data management network element, and also avoids the application Functional network elements make repeated requests to formulate or update mobility management policies based on application layer information, and avoid repeated updates of mobility management policies by policy control network elements caused by repeated requests, saving signaling resources and ensuring The request for formulating or updating the mobility management policy is satisfied, thereby ensuring the user experience of the terminal device accessing the application.
  • the mobility management policy of the terminal device includes at least one of the following: service area restriction (that is, the first parameter), radio access technology or spectrum selection priority index (i.e. the second parameter).
  • the subscription information of the terminal device includes at least one of the following: the service area restriction of the subscription (ie, the first parameter), the radio access technology or spectrum selection priority index of the subscription (ie, the second parameter ).
  • the user subscription information of the terminal device may include the first parameter and/or the second parameter of the subscription
  • the application layer information of the terminal device may also include the first parameter and/or the second parameter corresponding to the application layer information
  • the mobility management policy may also include the authorized first parameter and/or the second parameter.
  • the subscription information corresponds to a mobility management policy.
  • the subscription information is limited to the service area of the subscription, the mobility management policy of the terminal device The service area is restricted; and/or, if the subscription information is the subscribed radio access technology or spectrum selection priority index, the mobility management policy of the terminal device is the radio access technology or spectrum selection priority index.
  • a policy control method including: a first policy control network element acquires a first mobility management policy, and the first policy control network element is the first mobility management network element reselected for a terminal device A mobility management network element is a policy control network element that provides a mobility management strategy. The first mobility management strategy is executed by the terminal device before the second mobility management network element reselects the terminal device. mobility management policy; the first policy control network element determines the first mobility management network element according to the first mobility management policy and the second mobility management policy formulated by the first policy control network element for the terminal equipment A target mobility management policy to be executed on the terminal device; the first policy control network element sends first information to the first mobility management network element, where the first information is used to indicate the target mobility management policy.
  • the target mobility management policy may be the first mobility management policy.
  • the first policy control network element formulates and applies to the terminal The second mobility management policy of the device, the first policy control network element judges whether the first mobility management policy is the same as the second mobility management policy, if they are the same, the first policy control network element determines that there is no need to The first mobility management policy is updated, and at this time the target mobility management policy is the first mobility management policy, and the first policy control network element instructs the first mobility management network element to perform the first mobility management Strategy.
  • the target mobility management policy may be a second mobility management policy
  • the first policy control network element formulates a second mobility policy applied to the terminal device for the first mobility management network element.
  • mobility management policy the first policy control network element judges whether the first mobility management policy is the same as the second mobility management policy, if not, the first policy control network element determines the first mobility management The policy is updated, and at this time the target mobility management policy is the second mobility management policy, and the first policy control network element instructs the first mobility management network element to execute the second mobility management policy.
  • the method may further include: the first policy control network element receives second information from the first mobility management network element, the first The second information is used to request the first mobility management network element to implement a target mobility management policy for the terminal device.
  • the first policy control network element after reselection can obtain the first mobility management policy executed by the second mobility management network element before reselection on the terminal device, and can according to the first mobility management policy and the first
  • the policy control network element judges whether the mobility management policy needs to be updated for the second mobility management policy applied to the terminal equipment developed by the first mobility management network element, so as to avoid the reselection of the first policy control network element to the second mobility management policy. Repeated updating of a mobility management policy saves signaling resources and time, and further ensures user experience.
  • obtaining the first mobility management policy by the first policy control network element includes: the first policy control network element receives from the first mobility management network element The first mobility management policy, or, the first policy control network element receives the first mobility management policy from the data storage network element.
  • the first policy control network element receives the first mobility management policy from the first mobility management network element.
  • the process may be: the first mobility management network element Obtain the first mobility management policy from the second mobility management network element, and send the first mobility management policy to the first policy control network element.
  • the first policy control network element receives the first mobility management policy from the data storage network element.
  • the process may be: the second policy control network element will determine the authorized The first mobility management policy is saved to the data storage network element; the first policy control network element acquires the first mobility management policy corresponding to the second policy control network element from the data storage network element.
  • the first policy control network element controls the network element according to the first mobility management policy and the second mobility management policy formulated by the first policy control network element for the terminal device
  • the strategy determining the target mobility management strategy executed by the first mobility management network element on the terminal device includes: if the first mobility management strategy is the same as the second mobility management strategy, the first strategy control network element determines the The target mobility management policy is the first mobility management policy or the second mobility management policy; if the first mobility management policy is different from the second mobility management policy, the first policy control network element determines The target mobility management policy is the second mobility management policy.
  • the first policy control network element also acquires first indication information from the first mobility management network element, where the first indication information is used to indicate that the first The mobility management policy is determined according to the application layer information related to the terminal equipment, and the method further includes: the first policy control network element formulates a second mobility management policy for the terminal equipment according to the first indication information.
  • the first policy control network element determines not to immediately Formulating the second mobility management strategy corresponding to the first mobility management network element with the network strategy
  • the first strategy control network element receives the first parameter and/or the first mobility management strategy in the first mobility management strategy
  • the second parameter or the above-mentioned first indication information, determines that the mobility management policy corresponding to the terminal device is formulated according to the application layer information, so it will wait until the corresponding application layer information is subsequently received and then determine the terminal according to the application layer information A second mobility management policy corresponding to the device.
  • the method further includes: the first policy control network element receives a mobility management policy establishment request from the first mobility management network element, and the mobility management policy establishment request is used to request the The target mobility management policy executed by the first mobility management network element on the terminal device.
  • the first indication information may be carried in the mobility management policy establishment request, and the first mobility management policy may also be carried in the mobility management policy establishment request.
  • the first policy control network element immediately determines the mobility management policy according to the subscription information and network information of the terminal equipment when it receives the mobility management policy establishment request from the first mobility management network element , the waste of resources caused by updating the mobility management policy again when receiving the application layer information corresponding to the terminal device.
  • the target mobility management policy includes the first mobility management policy or the second mobility management policy
  • the second mobility management policy is the first mobility management policy Controls the mobility management policy formulated by the network element for the terminal equipment.
  • the method further includes: sending the first policy control network element to the application function network element The second mobility management policy.
  • the application function network element subscribes to the first policy control network element for the service area restriction (ie, the first parameter) change event and/or the radio access technology or wireless spectrum selection priority (ie, the second parameter) change event, when the first policy control network element determines that the target mobility management policy is the second mobility management policy, that is, the first policy control network element performs the first parameter and/or After updating, the first policy control network element sends the updated first parameter and/or second parameter of the second mobility management policy to the application function network element.
  • the service area restriction ie, the first parameter
  • the radio access technology or wireless spectrum selection priority ie, the second parameter
  • the method further includes: the first policy controlling the network element according to the application layer information of the terminal device, the session information of the terminal device and/or the accessed application information
  • the second mobility management policy is determined.
  • the first policy control network element determines the second mobility management policy according to the application layer information of the terminal device and the session information of the terminal device, where the session information of the terminal device is used for Triggering the first policy control network element to formulate the second mobility management policy, the application layer information of the terminal device is used by the first policy control network element to determine the first parameter and/or the second mobility management policy in the second mobility management policy Two parameters, or it can be said that the application layer information of the terminal device is used by the first policy control network element to determine the first parameter and/or the updated first parameter and/or the second parameter in the first mobility management policy or the second argument.
  • the session information of the terminal device may include the establishment and/or termination event of the first session corresponding to the terminal device, such as the registration/de-registration information of the binding information of the policy control network element providing the session management policy for the first session,
  • the application layer information of the terminal device may include service area coverage information and/or high throughput indication information.
  • the first policy control network element determines the second mobility management policy according to the application layer information of the terminal device and the application information accessed by the terminal device, wherein the application information accessed by the terminal device Used to trigger the first policy control network element to formulate the second mobility management policy, the application layer information of the terminal device is used by the first policy control network element to determine the first parameter in the second mobility management policy and/or or the second parameter, or it can be said that the application layer information of the terminal device is used by the first policy control network element to determine the first parameter in the first mobility management policy and/or the updated first parameter of the second parameter and/or the second parameter.
  • the application information accessed by the terminal device may include the start and/or end event of the first application accessed by the terminal device through the first session, and the application layer information of the terminal device may include service area coverage information and/or high throughput instructions for the .
  • the application layer information of the terminal device may also include an identifier of the terminal device, a data network name (data network name, DNN) corresponding to the session, and network slice selection assistance information (single-network slice selection assistance information, S -NSSAI).
  • a data network name data network name, DNN
  • network slice selection assistance information single-network slice selection assistance information, S -NSSAI
  • the method further includes: the first policy control network element sends a first request message to the binding support network element, and the first request message is used to request subscription as The first session of the terminal device provides a third policy of the session management policy to control the registration or de-registration notification of the binding information of the network element; the first policy controls the network element to receive the first notification message from the binding support network element,
  • the first notification message includes a registration notification message of the binding information of the third policy-controlled network element or a de-registration notification message of the binding information of the third policy-controlled network element.
  • the first policy control network element determines the second mobility management policy according to the application layer information of the terminal device and the session information of the terminal device, the first policy control network element sends The binding support network element sends the above-mentioned first request message.
  • the first policy control network element will accept the establishment and/or termination event of the first session corresponding to the terminal device, such as A registration/de-registration notification message corresponding to the binding information of the policy control network element providing the session policy from the binding support network element for the session.
  • the registration/deregistration notification message providing the binding information of the policy control network element of the session policy can be used to trigger the first policy control network element to formulate the second mobility management policy, or in other words, can be used to trigger the first policy control network element A policy control network element updates the first mobility management policy.
  • the session information includes establishment and/or termination events of the first session corresponding to the terminal device.
  • the application information includes a start and/or end event of the first application accessed by the terminal device through the first session
  • the method further includes: the first The policy control network element sends a second request message to the third policy control network element, where the second request message is used to request to subscribe to the start and/or end event of the first application; the first policy control network element receives the first application The three-policy control network element sends a second response message, where the second response message includes the start or end event of the first application.
  • the first policy control network element determines the second mobility management policy according to the application layer information of the terminal device and the application information accessed by the terminal device, the first policy control network element will sending the above second request message to the binding support network element, when the terminal device starts/ends the first application accessed through the first session, the first policy control network element will accept the start and/or end of the first application events, such as events of starting and/or ending events of the first application of the policy control network element providing session policies corresponding to the session from the policy control network element providing session policies.
  • the event of the start and/or end of the first application may be used to trigger the first policy control network element to formulate the second mobility management policy, or in other words, may be used to trigger the first policy control network element to formulate the second mobility management policy.
  • a mobility management policy is updated.
  • the mobility management policy of the terminal device includes at least one of the following: service area restriction, radio access technology, or spectrum selection priority index.
  • the second mobility management policy of the terminal device includes the service area restriction, and/or, the radio access technology or spectrum selection priority index
  • the first A policy control network element determining the second mobility management policy includes: the first policy control network element determines the service area restriction corresponding to the second mobility management policy according to the service area coverage information in the application layer information, and/or Or, the first policy control network element determines the radio access technology or spectrum selection priority index corresponding to the second mobility management policy according to the high throughput indication information in the application layer information.
  • the application layer information of the terminal device includes service area coverage information and/or high throughput indication information
  • the service area coverage information is used by the first policy control network element to determine the second mobile
  • the first parameter in the mobility management strategy or in other words, the service area coverage information is used for the first strategy control network element to update the first parameter in the first mobility management strategy
  • the high throughput information is used for the The first policy control network element determines the second parameter in the second mobility management policy, or in other words, the high throughput information is used by the first policy control network element to update the second parameter in the first mobility management policy .
  • a policy control method including: a binding support network element receives a first message from a first policy control network element, and the first message is used to request the binding support network element to delete the first policy control network element.
  • the first binding information of the network element, the first message includes a reason value for requesting deletion of the first binding information, and the first binding information includes the terminal device identifier, data network name, and single network slice selection auxiliary information; when When the cause value is service and session continuity mode 2, the binding support network element delays sending a second message to the second policy control network element, and the second message includes information indicating that the first binding information is supported by the binding Instruction information for network element deletion, the second policy control network element includes a policy control network element that has subscribed to the binding support network element for the first binding information.
  • the session released by the terminal device can be called the first session, and the session newly created by the terminal device can be called the second session, and the session subscribed to the binding support network element will be the first session.
  • a policy control network element that binds information is denoted as the second policy control network element, and the policy control network element that provides the session policy for the first session is denoted as the first policy control network element, and the policy that provides the session policy for the second session.
  • the control network element may be denoted as the third strategy control network element, .
  • the above-mentioned delayed sending can be understood as not sending immediately, or not sending within a predetermined time period, wherein the predetermined time period can be from receiving the above-mentioned first message to receiving the third policy control by the binding support network element.
  • the time period between registration and binding notifications of network elements may also be a predefined time period, which is not limited here.
  • the second policy control network element subscribes to the binding support network element for the registration/deregistration of the binding information of the policy control network element that provides the session policy corresponding to the terminal device identifier and the session identifier Registration event, the session ID includes data network name and single network slice selection auxiliary information, when the session corresponding to the session ID is released or established, the second policy control network element will receive the terminal device ID and The session identifier corresponds to the registration/de-registration notification of the policy control network element binding information of the session policy, and then the second policy control network element updates the currently authorized mobility management policy.
  • the data network names corresponding to the first session and the second session are the same as the single network slice selection auxiliary information.
  • the second policy controls the mobile
  • the first mobility management policy performed by the mobility management network element on the terminal device in the first session and the second mobility management policy performed by the mobility management network element on the terminal device in the second session may be the same, therefore In the process of releasing the first session, if the second policy control network element receives a deregistration or deletion notification of the first binding information of the first policy control network element sent by the binding support network element, the second policy control network element The element may not update the first mobility management policy.
  • the second policy control network element can formulate (determine) the mobility management policy according to the release (termination) of the first session and the establishment of the second session, which can be understood as The first mobility management policy corresponding to the session is updated or the second mobility management policy corresponding to the second session is formulated.
  • the second policy control network element in the SSC mode 2 scenario, when the first session is released, the second policy control network element will not receive the request to delete the first policy control network element from the binding support network element. Registering for the notification of the binding information does not update the mobility management strategy, thereby avoiding repeated updates of the mobility management strategy and waste of signaling resources.
  • the method further includes: the binding support network element marks the first binding information as invalid according to the first message.
  • the first message carries indication information indicating that the registration and binding information of the first policy control network element is invalid, and the binding support network element will register and bind the first policy control network element according to the first message If the information is invalidated, the binding support network element will not send the second message to the second policy control network element, and will not trigger the second policy control network element to repeatedly update the mobility management policy, saving communication resources .
  • the method further includes: the binding support network element receives a third message from a third policy control network element, and the third message is used to request the binding support
  • the network element registers the second binding information of the third policy control network element, where the second binding information includes the terminal device identifier, the data network name, and the single network slice selection auxiliary information.
  • the data network names corresponding to the first session and the second session are the same as the single network slice selection auxiliary information.
  • the second policy controls the mobility specified by the network element.
  • the first mobility management policy performed by the management network element on the terminal device in the first session and the second mobility management policy performed by the mobility management network element on the terminal device in the second session may be the same, so in In the process of creating a second session, when the second policy control network element receives the registration notification of the second binding information of the third policy control network element corresponding to the second session sent by the binding support network element, it may not The first mobility management policy is updated.
  • the binding support network element will receive the second binding information of the third policy control network element corresponding to the second session. According to the second policy control network element to subscribe to the binding support network element, the binding support network element will send the registration of the second binding information to the second policy control network element notification, the registration notification of the second binding information may indicate that the establishment of the second session is completed.
  • the binding support network element may store the second binding information.
  • the method further includes: the binding support network element deletes the first binding information according to the second binding information; and the binding support network element delays Sending the second message to the second policy control network element includes: the binding support network element deletes the first binding information according to the second binding information and then sends the second message to the second policy control network element.
  • the binding support network element receives the message sent by the first policy control network element to delete the first binding information of the first policy control network element
  • the first binding information will not be deleted immediately, but the first binding information will be deleted after the binding support network element receives the above-mentioned third message (or the second binding information)
  • the The second policy controls the network element to send a deletion (de-registration) notification (that is, a second message) of the first binding information.
  • the binding support network element may simultaneously send the deletion notification of the first binding information and the registration notification of the second binding information to the second policy control network element.
  • the method further includes: if the binding support network element does not receive the third message within a predetermined period of time, the binding support network element deletes the first Binding information, the third message is used to request the binding support network element to register the second binding information of the third policy control network element, the second binding information includes the terminal device identifier, the data network name and the single network The slice selection auxiliary information; and the binding support network element delaying sending the second message to the second policy control network element includes: the binding support network element deletes the first binding information and then sends the second message to the second policy control network element Second message.
  • the binding support network element receives the message sent by the first policy control network element to delete the first binding information of the first policy control network element
  • the first binding information will not be deleted immediately, but the first binding information will not be deleted until the binding support network element has not received the above-mentioned third message (or the second binding information) within a predetermined period of time.
  • the first binding information and send a deletion (de-registration) notification of the first binding information to the second policy control network element.
  • the binding support network element may simultaneously send the deletion notification of the first binding information and the registration notification of the second binding information to the second policy control network element.
  • a policy control method including: a second policy control network element receives a fourth message from a first policy control network element that provides a session management policy for a first session, and the fourth message is used to request the first session
  • the second policy controls the network element to delete the first application layer session of the terminal device.
  • the fourth message includes the reason value for requesting deletion of the first application layer session.
  • the first application layer session is the first application layer session accessed by the terminal device through the first session.
  • the second policy control network element can formulate (determine) the mobility management policy according to the start/end event of the first application accessed by the terminal device, which can be understood as corresponding to the first session
  • the first mobility management policy is updated or the second mobility management policy corresponding to the second session is formulated.
  • the second policy control network element in the SSC mode 2 scenario, during the process of releasing the first session, when the second policy control network element receives the mobility management that triggers the second policy control network element to update the current authorization policy or a trigger message for formulating a new mobility management policy, such as the fourth message sent by the first policy control network element, the second policy control network element can learn that the corresponding reason is SSC mode 2, so as not to The management policy is updated, which avoids the repeated update of the mobility management policy and avoids the waste of communication resources.
  • the first mobility management policy is determined according to application layer information of the terminal device.
  • the method further includes: sending the second policy control network element to The first policy control network element sends a fifth message, and the fifth message is used to subscribe to the start and/or end event of the first application; the second policy control network element receives the first policy control network element. An application start event.
  • the second policy control network element subscribes to the first policy control network element corresponding to the first session for the start and/or end event of the first application, and the first application
  • the start and/or end event of the first application sent by a policy control network element may be used to trigger the second policy control network element to formulate the first mobility management policy corresponding to the first session according to the application layer information.
  • delaying the update of the first mobility management policy by the second policy control network element includes: the second policy control network element receives an The network element updates the sixth message of the first mobility management policy, where the sixth message includes at least one of the following: the fourth message, the first binding information of the first policy control network element sent by the binding support network element The deletion notification of the binding support network element, the registration notification of the second binding information of the third policy control network element that provides the session management policy for the second session of the terminal device sent by the binding support network element, the registration notification of the second binding information sent by the third policy control network element The event notification of the start of the first application; the second policy control network element delays updating the first mobility management policy after receiving the sixth information.
  • the binding support network element sends the first binding of the first policy control network element Information deletion/de-registration notification, the second binding information sent by the binding support network element of the third policy control network element, the fourth message sent by the first policy control network element, the third policy control network element sent Notification of the start time of the first application, etc.
  • the second policy control network element can learn that the corresponding reason is SSC mode 2, so as not to update the mobility management policy, avoiding repeated updates of the mobility management policy and communication Waste of resources.
  • the method further includes: the second policy The control network element sends a seventh message to the third policy control network element, where the seventh message is used to subscribe the first application start and/or end event to the third policy control network element.
  • the second policy control network element subscribes the start and/or end event of the first application to the third policy control network element corresponding to the second session
  • the The start and/or end event of the first application sent by the third policy control network element can be used to trigger the second policy control network element to formulate the second mobility management policy corresponding to the second session according to the application layer information or to update the first application layer.
  • the first mobility management policy corresponding to the session but because the second policy control network element has learned that the reason for its update is SSC mode 2, the second policy control network element will not update the first mobility management policy, thus Repeated updating of mobility management policies is avoided, and communication resources are saved.
  • the embodiment of the present application provides a communication device, and the device has a function of implementing the method in any of the foregoing aspects or any possible implementation manners of any of the aspects.
  • the device may be the mobility management network element in the first aspect, or a chip for the mobility management network element; it may also be the first policy control network element in the second aspect, or a chip for the first policy control network element ; It can also be the binding support network element of the third aspect, or a chip used for binding support network elements; it can also be the second policy control network element of the fourth aspect, or a chip used for the second policy control network element .
  • This function may be realized by hardware, or may be realized by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • a policy control system including: a data management network element and a mobility management network element; the data management network element is configured to send second information to the mobility management network element, and the second information is used Indicates that the subscription information of the terminal device corresponding to the first mobility management policy is deleted by the data management network element; the mobility management network element is configured to receive first information from the policy control network element, and the first information is used to indicate that the The first mobility management policy is determined according to the application layer information of the terminal device; the second information is received; and the target mobility management policy applied to the terminal device is determined according to the first information.
  • the determining, by the mobility management network element, the target mobility management policy applied to the terminal device according to the first information includes: the mobility management network element determines, according to the first information, A piece of information determines the first mobility management policy as the target mobility management policy applied to the terminal device; or the mobility management network element sends the second information to the policy control network element according to the first information; from The policy control network element receives third information, where the third information is used to indicate that the target mobility management policy applied to the terminal device is the first mobility management policy or the second mobility management policy, and the second mobility The management policy is an updated policy of the first mobility management policy.
  • the first mobility management network element is further configured to send a second message to the first policy control network element, where the second message is used to request that the first mobility management network element A target mobility management policy executed by a mobility management network element on the terminal equipment;
  • the apparatus further includes: a policy control network element, configured to determine the target mobility management policy, where the target mobility management policy includes the first mobility management policy or the second mobility management policy; receive the second information; and send the third information.
  • a policy control network element configured to determine the target mobility management policy, where the target mobility management policy includes the first mobility management policy or the second mobility management policy; receive the second information; and send the third information.
  • the policy control network element is further configured to send the second mobile gender management strategies.
  • a policy control system including: a first mobility management network element and a first policy control network element, wherein the first mobility management network element performs mobility management network element reselection for a terminal device
  • the next target mobility management network element the first policy control network element is a policy control network element that provides mobility management policies for the first mobility management network element
  • the first policy control network element is used to obtain the first Mobility management policy, where the first mobility management policy is a mobility management policy implemented by a second mobility management network element on the terminal device, and the second mobility management network element performs mobility management network element re-routing for the terminal device
  • the previously selected source mobility management network element determine the target mobility management policy that the first mobility management network element executes on the terminal device according to the first mobility management policy; send the first mobility management network element to the first mobility management network element A piece of information, where the first information is used to indicate the target mobility management policy; the first mobility management network element is used to receive the first information.
  • the first mobility management network element is configured to send a second message to the first policy control network element, and the second message is used to request the first mobility The target mobility management policy implemented by the mobility management network element for the terminal equipment.
  • the system further includes the second mobility management network element, and the second mobility management network element is configured to send the first mobility management network element Sending the first mobility management policy; the first mobility management network element is also used to receive the first mobility management policy.
  • the second mobility management network element is further configured to send first indication information, where the first indication information is used to indicate the first mobility of the terminal device
  • the management policy is determined according to the application layer information of the terminal equipment; the first mobility management network element is also used to receive the first indication information; and send the first indication information and the second indication information to the first policy control network element A mobility management policy; the first policy control network element is also used to receive the first indication information and the first mobility management policy; determine the target movement according to the first indication information and the first mobility management policy gender management strategies.
  • the target mobility management policy includes the first mobility management policy or the second mobility management policy
  • the second mobility management policy is the first mobility management policy Controls the mobility management policy formulated by the network element and applied to the terminal equipment.
  • a policy control system including: a first policy control network element that provides a session management policy for a first session management network element and a binding support network element; the first policy control network element is used to send A first message, where the first message is used to request the binding support network element to delete the first binding information of the first policy control network element, where the first message includes a reason value for requesting deletion of the first binding information,
  • the first binding information includes a terminal device identifier, a data network name, and single network slice selection auxiliary information; the binding support network element is used to receive the first message; when the cause value is service and session continuity mode 2 delay sending a second message to the second policy control network element, the second message includes indication information indicating that the first binding information is deleted by the binding support network element, and the second policy control network element includes A policy control network element that supports the network element subscribing to the first binding information.
  • the system further includes: a first session management network element, configured to determine the reselection of a user plane function network element adopting service and session continuity mode 2;
  • the first policy control network element sends a third message, the third message is used to request the first policy control network element to delete the policy session association between the first session management network element and the first policy control network element, the The third message includes a reason value for requesting to delete the policy session association, and the reason value is service and session continuity mode 2; and the first policy control network element is further configured to receive the first session management network element from the first session management network element Three news.
  • a policy control system including: a first policy control network element and a second policy control network element, where the first policy control network element is a policy control network element that provides a session management policy for a first session,
  • the second policy control network element is a policy control network element that provides mobility management policies for terminal devices;
  • the first policy control network element is used to send a fourth message, and the fourth message is used to request the second policy control network
  • the fourth message includes a reason value for requesting deletion of the first application layer session, the first application layer session is created when the terminal device accesses the first application through the first session The application layer session used;
  • the second policy control network element is used to receive the fourth message; when the cause value is service and session continuity mode 2, delay updating the second policy control network element to formulate for the terminal equipment
  • the first mobility management strategy where the first policy control network element is a policy control network element that provides a session management policy for a first session,
  • the second policy control network element is a policy control network element that provides mobility management policies for terminal devices;
  • the system further includes a binding support network element, where the binding support network element is configured to send the first binding information of the first policy control network element and/or a registration notification of the second binding information of the third policy control network element that provides the session management policy for the second session of the terminal device; the second policy control network element is configured to receive the first A policy controls the deletion notification of the first binding information of the network element, and/or, a third policy that provides a session management policy for the second session of the terminal device controls the registration notification of the second binding information of the network element.
  • a computer-readable medium stores a computer program (also referred to as code, or instruction) when it is run on a computer, so that the above-mentioned first aspect to the fourth aspect, The method in any possible implementation manner of the first aspect and the fourth aspect thereof is executed.
  • a computer program also referred to as code, or instruction
  • a chip system including a memory and a processor, the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a communication device installed with the chip system executes
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program from the memory, so that a communication device installed with the chip system executes
  • a chip in the twelfth fifth aspect, includes a processor and a communication interface, the communication interface is used to communicate with external devices or internal devices, the processor is used to implement the first aspect and the fourth aspect above, and The method in any possible implementation manner of the first aspect and the fourth aspect.
  • the chip may further include a memory, where instructions are stored, and the processor is configured to execute the instructions stored in the memory or instructions derived from other instructions.
  • the processor is configured to implement the method in the above-mentioned first aspect and the fourth aspect, and any possible implementation manners of the first aspect and the fourth aspect.
  • a computer program product includes: a computer program (also referred to as code, or an instruction), when the computer program is executed, the computer executes the above-mentioned first aspect and the fourth aspect. aspect, and the method in any possible implementation manner of the first aspect and the fourth aspect.
  • a communication device including a processor, and may further include a memory, the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that the communication device executes the first A communication method in the encryption aspect and any possible implementation thereof, or execute the communication method in the second aspect and any possible implementation thereof, or execute the communication method in the third aspect and any possible implementation thereof communication method, or perform the communication method in the fourth aspect and any possible implementation thereof.
  • the processor is one or more, and the memory is one or more.
  • the memory can be integrated with the processor, or the memory can be separated from the processor.
  • a communication device including a communication interface, a processor, and a memory.
  • the processor is used to control the communication interface to send and receive signals
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program from the memory, so that the communication device executes the first aspect and the fourth aspect above, and the first aspect thereof.
  • Fig. 1 is a schematic diagram of a system applicable to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a 5G network architecture based on a service-based architecture applicable to an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a 5G network architecture based on a point-to-point interface applicable to an embodiment of the present application.
  • Fig. 4 is a schematic flowchart of an embodiment of a policy control method provided by the present application.
  • Fig. 5 is a schematic flowchart of another embodiment of the policy control method provided by the present application.
  • Fig. 6 is a schematic flowchart of another embodiment of the policy control method provided by the present application.
  • Fig. 7 is a schematic flowchart of another embodiment of the policy control method provided by the present application.
  • Fig. 8 is a schematic flowchart of another embodiment of the policy control method provided by the present application.
  • Fig. 9 is a schematic flowchart of another embodiment of the policy control method provided by the present application.
  • Fig. 10 is a schematic flowchart of another embodiment of the policy control method provided by the present application.
  • FIG. 11 is a schematic structural diagram of a communication device provided by the present application.
  • Fig. 12 is another schematic structural diagram of the communication device provided by the present application.
  • the technical solution of the embodiment of the present application can be applied to various communication systems, for example: the fifth generation (5th generation, 5G) system, the fifth and fifth generation (5.5th generation, 5.5G), the sixth generation (6th generation, 6G ) or new wireless (new radio, NR), etc.
  • Fig. 1 shows four systems to which the policy control method of the present application is applicable.
  • the system 100 in FIG. 1(a) includes: a data management network element 101 and a mobility management network element 102; the mobility management network element 102 is used to receive the first information, and the first information is used to instruct the terminal device
  • the first mobility management policy is determined according to the application layer information of the terminal device; the data management network element 101 is configured to send a second message to the mobility management network element 102, and the second information is used to indicate that the first
  • the subscription information of the terminal device corresponding to a mobility management policy is deleted by the data management network element; the mobility management network element 102 is also used to receive the second information; determine the policy applied to the terminal device according to the first information Target mobility management strategy.
  • system 100 may further include a policy control network element 103, configured to send the first information.
  • a policy control network element 103 configured to send the first information.
  • the data management network element 101 may be a unified data management (unified data management, UDM) network element
  • the mobility management network element may be an access and mobility network element.
  • the policy control network element 103 may be a policy control (policy control function, PCF) network element
  • the policy control network element 103 may be an access and mobility management Policy control (access and mobility management policy control function, AM PCF) network element (also called PCF serving UE, PCF for a UE).
  • the system 110 in FIG. 1(b) includes: a first mobility management network element 112 and a first policy control network element 111, wherein the first mobility management network element 112 performs mobility management network element reselection for terminal equipment
  • the first policy control network element 111 is a policy control network element that provides mobility management policies for the first mobility management network element 112;
  • the first policy control network element 111 is used to Obtaining a first mobility management policy, where the first mobility management policy is a mobility management policy implemented by a second mobility management network element for the terminal device, where the second mobility management network element performs mobility management for the terminal device
  • the source mobility management network element before network element reselection determine the target mobility management policy that the first mobility management network element 112 executes on the terminal device according to the first mobility management policy;
  • the network element 112 sends a first message, where the first message is used to indicate the target mobility management policy; the first mobility management network element 112 is configured to receive the first message.
  • the system 110 may also include a second mobility management network element 113, configured to send the first mobility management policy for sending to the first mobility management network element 112; the first mobility management network element 112, It is also used for receiving the first mobility management policy.
  • a second mobility management network element 113 configured to send the first mobility management policy for sending to the first mobility management network element 112; the first mobility management network element 112, It is also used for receiving the first mobility management policy.
  • the first mobility management network element 112 and the second mobility management network element 113 may be AMF network elements
  • the first policy control network element 111 may be is a PCF network element
  • the first policy control network element 111 may be an AM PCF network element.
  • the system 120 in Fig. 1 (c) includes: a first policy control network element 121 and a binding support network element 122 that provide a session management policy for the first session management network element; the first policy control network element 121 is used to send A first message, where the first message is used to request the binding support network element to delete the first binding information of the first policy control network element, where the first message includes a reason value for requesting deletion of the first binding information,
  • the first binding information includes a terminal device identifier, a data network name, and single network slice selection auxiliary information;
  • the binding support network element 122 is used to receive the first message; when the cause value is business and session continuity mode 2
  • the second message includes indication information indicating that the first binding information is deleted by the binding support network element 122, and the second policy control network element includes information to the The binding support network element 122 subscribes to the policy control network element of the first binding information.
  • the system 120 may also include a first session management network element 123, which is used to determine the reselection of the user plane function network element adopting service and session continuity mode 2; Three messages, the third message is used to request the first policy control network element 121 to delete the policy session association between the first session management network element 123 and the first policy control network element 121, the third message includes request A reason value for deleting the policy session association, where the cause value is service and session continuity mode 2; and the first policy control network element 121 is further configured to receive the third message from the first session management network element 123 .
  • a first session management network element 123 which is used to determine the reselection of the user plane function network element adopting service and session continuity mode 2
  • Three messages the third message is used to request the first policy control network element 121 to delete the policy session association between the first session management network element 123 and the first policy control network element 121, the third message includes request A reason value for deleting the policy session association, where the cause value is service and session continuity mode 2; and the first
  • the first policy control network element 121 may be a PCF network element, or the first policy control network element 121 may be a session management policy control (session Management policy control function, SM PCF) network element (also can be called the PCF of service protocol data unit (protocol data unit, PDU) session), the binding support network element 122 can be binding support function (binding support function, BSF) The network element, the first session management network element 123 may be a session management function (session management function, SMF) network element.
  • SM PCF session Management policy control function
  • SMF session management function
  • the system 130 in Fig. 1(d) includes: a first policy control network element 131 and a second policy control network element 132, the first policy control network element is a policy control network element that provides a session management policy for the first session, the The second policy control network element is a policy control network element that provides mobility management policies for terminal devices; the first policy control network element is used to send a fourth message, and the fourth message is used to request the second policy control network element Deleting the first application layer session of the terminal device, the fourth message includes a reason value for requesting deletion of the first application layer session, the first application layer session is used when the terminal device accesses the first application through the first session The second policy control network element is used to receive the fourth message; the second policy control network element is also used to delay updating the fourth message when the cause value is service and session continuity mode 2
  • the second strategy controls the first mobility management strategy formulated by the network element for the terminal device.
  • the system 130 may also include a binding support network element 133, configured to send a deletion notification of the first binding information of the first policy control network element 131, and/or send a notification for the second binding information of the terminal device.
  • the session provides a registration notification of the second binding information of the third policy control network element of the session management policy; the second policy control network element 132 is used to receive the deletion of the first binding information of the first policy control network element 131 Notifying, and/or receiving a registration notification of the second binding information of the third policy control network element that provides the session management policy for the second session of the terminal device.
  • the first policy control network element 131 may be a PCF network element, or the first policy control network element 131 may be an SM PCF network element, and the second policy control network element 131 may be an SM PCF network element.
  • the policy control network element 132 may be a PCF network element, or the second policy control network element 132 may be an AM PCF network element, and the binding support network element 133 may be a BSF network element.
  • the 5G network architecture shown in FIG. 2 may include a data network (data network, DN) and an operator network.
  • the network architecture may also include terminal equipment.
  • the operator network may include one or more of the following network elements: binding support function BSF network element, policy control function PCF network element, unified data management UDM network element, application function (application function, AF) network element, Access and mobility management function AMF network element, session management function SMF network element, (wireless) access network ((radio) access network, (R)AN) and user plane function (user plane function, UPF) network element, Network storage function (network repository, NRF) network element, network exposure function (network exposure function, NEF) network element, etc.
  • the part other than the (wireless) access network part may be referred to as the core network part.
  • the (R)AN is referred to as RAN as an example in the following description.
  • the terminal equipment in the embodiment of the present application may also be referred to as: user equipment (user equipment, UE), mobile station (mobile station, MS), mobile terminal (mobile terminal, MT), access terminal, subscriber unit, subscriber station, Mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc.
  • user equipment user equipment
  • MS mobile station
  • MS mobile terminal
  • MT mobile terminal
  • access terminal subscriber unit, subscriber station, Mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc.
  • a terminal device may be a device that provides voice/data connectivity to users, for example, a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
  • some terminals are: mobile phone (mobile phone), tablet computer, notebook computer, palmtop computer, mobile internet device (mobile internet device, MID), wearable device, virtual reality (virtual reality, VR) device, enhanced Augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving or autopilot, wireless terminals in remote medical surgery, smart grid ( Wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, cellular phones, cordless phones, session initiation protocol (session initiation protocol, SIP) telephones, wireless local loop (wireless local loop, WLL) stations, personal digital assistants (personal digital assistant, PDA), handheld devices with wireless communication capabilities, computing devices, or other devices connected to wireless modems Processing devices, vehicle-mounted devices, wearable devices, terminal devices in the future 5G network or terminal devices
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices, which is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not only a hardware device, but also achieve powerful functions through software support, data interaction, and cloud interaction.
  • the terminal device may also be a terminal device in an Internet of Things (Internet of Things, IoT) system.
  • IoT Internet of Things
  • the terminal device may also communicate with terminal devices in other communication systems, for example, communication between devices.
  • the above-mentioned terminal device can establish a connection with the operator network through an interface provided by the operator network (such as N1, etc.), and use services such as data and/or voice provided by the operator network.
  • the terminal device can also access the DN through the operator's network, and use the operator's service deployed on the DN, and/or the service provided by a third party.
  • the above-mentioned third party may be a service party other than the operator's network and the terminal device, and may provide other services such as data and/or voice for the terminal device.
  • the specific form of expression of the above-mentioned third party can be determined according to the actual application scenario, and is not limited here.
  • the RAN is an access network that implements access network functions based on wireless communication technology.
  • the RAN is a sub-network of the operator's network and an implementation system between service nodes and terminal equipment in the operator's network.
  • the wireless access network can manage wireless resources, provide wireless access or air interface access services for terminals, and then complete the forwarding of control signals and user data between terminals and the core network.
  • the radio access network may be an evolved base station (evolved NodeB, eNB or eNodeB) in an LTE system, or a wireless controller in a cloud radio access network (cloud radio access network, CRAN) scenario , or the access device can be a relay station, an access point, a vehicle-mounted device, a wearable device, an access device in a 5G network or an access device in a future evolved PLMN network, etc., and can be an access point in a WLAN ( The access point, AP), may be the gNB in the NR system.
  • This embodiment of this application is not limited.
  • the SMF network element is a control plane network element provided by the operator network, which is mainly used to realize protocol data unit PDU session management (such as session establishment, modification and release, including tunnel maintenance between UPF and AN), service and session continuity (service and session continuity, SSC) mode selection, selection can manage user plane functions UPF network elements, roaming and other session-related functions. In the embodiment of the present application, it can be used to realize the function of the session management network element.
  • protocol data unit PDU session management such as session establishment, modification and release, including tunnel maintenance between UPF and AN
  • service and session continuity (service and session continuity, SSC) mode selection selection can manage user plane functions UPF network elements, roaming and other session-related functions.
  • SSC service and session continuity
  • the 5G communication system supports three different SSC modes: SSC mode 1, SSC mode 2 and SSC mode 3, wherein, for the PDU session of SSC mode 1, the change of the access technology used by the UE to access the network ( For example, access type and cell) will not affect UPF, and the network will always maintain the UPF that acts as the anchor of the PDU session when the PDU session is established; The PDU session connection of the anchor point (access the same DN), and then release the previous PDU session connection of the anchor point.
  • SSC mode 1 the change of the access technology used by the UE to access the network
  • the PDU session connection of the anchor point access the same DN
  • SSC mode 2 can be understood as first releasing the previous anchor connection and then immediately establishing a new anchor connection to ensure the continuity of the service.
  • SSC mode of a PDU session will not change during the entire life cycle of the PDU session. It can be understood that if a PDU session connection is set to SSC mode X (SSC mode-X) when it is established, then this PDU session The mode cannot be modified until it is deactivated is SSC mode X.
  • the AMF network element is a control plane network element provided by the operator network, which is responsible for the access control and mobility management of the terminal equipment accessing the operator network, and can be used to implement the functions of the mobility management entity (MME) except Functions other than session management, such as lawful interception, mobile status management, assigning temporary user IDs, authenticating and authorizing users, etc. In the embodiment of the present application, it can be used to implement functions of access and mobility management network elements.
  • MME mobility management entity
  • the PCF network element is a control plane network element provided by the operator, which is used to provide policies to network network elements, guide a unified policy framework for network behavior, and provide policies for control plane functional network elements (such as AMF network elements, SMF network elements, etc.) rule information, etc.
  • the policies may include access control policies, mobility management policies, charging-related policies, QoS-related policies, and authorization-related policies.
  • the PCF can also access the subscription information of the UDR network element.
  • the PCF may include AM PCF (also called PCF for a UE) and SM PCF, where AM PCF is used to provide access control and mobility management policies to AMF and provide UE Policy, SM PCF is used to provide session management related policies to SMF.
  • AM PCF also called PCF for a UE
  • SM PCF is used to provide session management related policies to SMF.
  • the AM PCF and the SM PCF can be deployed together on the same physical device, or can be deployed separately on different physical devices, which is not limited in this application.
  • the AF network element mainly provides application layer services, and also supports interaction with the 5G core network to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side.
  • the AF network element communicates with the application server, and the application server refers to a third-party server.
  • User plane functional network elements can be used for data packet routing and transmission, packet detection, service usage reporting, user plane data Quality of Service (QoS) parameter processing, legal interception, uplink packet detection, downlink data packet storage, etc. surface-related functions.
  • User data can be accessed to the data network DN through this network element. In the embodiment of the present application, it can be used to realize the functions of the user plane network element.
  • QoS Quality of Service
  • the NEF network element is the control plane network element provided by the operator, and is used to open the service and network capability information (such as terminal location and whether the session is reachable) provided by the 3GPP network function to the third party in a secure manner.
  • the NEF network element can serve as a relay for the communication between the SMF network element and the third-party network element.
  • the NEF network element When the NEF network element is used as a relay, it can be used as the translation of the identification information of the subscriber and the translation of the identification information of the third-party network element.
  • the UDM network element is a control plane network element provided by the operator, which is responsible for storing and managing information such as SUPI, subscription data, authentication data, credentials, and security context of subscribers in the operator's network.
  • the UDM network element is also responsible for the registration management of the user's service network element, such as the AMF and SMF that currently provide services for the terminal. Delete user related information.
  • UDR network elements are used to store and obtain policy data, subscription data and contract data, as well as structured data for exposure to the outside. In this embodiment of the application, it can be used to support the storage and retrieval of subscription data and subscription data by UDM network elements and the storage and retrieval of policy data by PCF network elements.
  • the UDR and the NF entity that uses the Nudr interface to store and retrieve data are located in the same public land mobile network (PLMN) (generally referring to the network coverage area of an operator).
  • PLMN public land mobile network
  • the Nudr interface is the internal interface of the PLMN.
  • a DN is a network outside the operator's network.
  • the operator's network can access multiple DNs.
  • Various services can be deployed on the DN, which can provide data and/or voice services for terminal devices.
  • BSF network elements are used to implement user session binding functions, support BSF service registration, deregistration and update, Nbsf service authentication (such as verifying that BSF supports service authentication for service consumers), and connection detection with NRF network elements , PDU session binding information creation, deletion and query, UE information acquisition, etc.
  • the network storage function network element can be used to support the network element service or network element discovery function, receive the NF discovery request from the network function (network function, NF) instance, and provide the information of the discovered NF instance to the NF instance. and NF configuration files to support maintaining available NF instances and the services they support. In this embodiment of the application, it can be used to support network element services or network element discovery functions.
  • the N2 interface is the interface between the RAN and the AMF network element, which is used for sending wireless parameters and non-access stratum (non-access stratum, NAS) signaling, etc.
  • the N3 interface is between the RAN and the UPF network element The interface is used to transmit user plane data, etc.
  • the N4 interface is the interface between the SMF network element and the UPF network element, and is used to transmit such as service policy, tunnel identification information of the N3 connection, data cache indication information, and downlink data notification news and other information.
  • the N6 interface is an interface between the DN network element and the UPF network element, and is used to transmit user plane data and the like.
  • Nbsf, Nnef, Nnrf, Npcf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are the serial numbers of service interfaces between network elements.
  • the meanings of these interface serial numbers may refer to the meanings defined in the 3rd generation partnership project (3rd generation partnership project, 3GPP) standard agreement, and will not be repeated here.
  • FIG. 3 shows a schematic diagram of a 5G network architecture based on a point-to-point interface applicable to the present application, taking the fifth generation system as an example.
  • the functions of the network elements reference may be made to the introduction of the functions of the corresponding network elements in FIG. 2 , which will not be repeated here.
  • the UE is connected to the AMF through the N1 interface
  • the RAN is connected to the AMF through the N2 interface
  • the UPF through the N3 interface
  • the SMF controls the UPF through the N4 interface.
  • the AMF is connected to the SMF through the N11 interface.
  • AMF and SMF obtain user subscription data from UDM through N8 and N10 interfaces respectively, and obtain policy data from PCF through N15 and N7 interfaces.
  • the interface between network elements in FIG. 3 is a point-to-point interface.
  • the interface between the UE and the AMF network element is called the N1 interface
  • the interface between the AMF network element and the RAN device is called the N2 interface
  • the RAN device and the UPF network element The interface between them can be called the N3 interface
  • the interface between the SMF network element and the UPF network element is called the N4 interface
  • the interface between the SM PCF network element (or the PCF network element serving the PDU session) and the AF network element is called the N4 interface.
  • N5 interface the interface between UPF network element and DN is called N6 interface
  • the interface between SMF network element and SM PCF network element is called N7 interface
  • the interface between AMF network element and UDM network element is called N8 interface
  • the interface between UDM NE and SMF NE is called N10 interface
  • the interface between AMF NE and SMF NE is called N11 interface
  • the interface between different AMF NEs is called N14 interface
  • AMF NE AM PCF Interfaces between network elements (or PCF network elements serving UEs) are called N15 interfaces.
  • the name of the interface between each network element in FIG. 2 and FIG. 3 is just an example, and the name of the interface in a specific implementation may be another name, which is not specifically limited in the present application.
  • the name of the message (or signaling) transmitted between network elements in this application is only an example, and does not constitute any limitation on the function of the message itself.
  • the above-mentioned network architecture applied to the embodiment of the present application is only an example of a network architecture described from the perspective of a traditional point-to-point architecture and a service-oriented architecture, and the network architecture applicable to the embodiment of the present application is not limited thereto. Any network architecture capable of implementing the functions of the foregoing network elements is applicable to this embodiment of the present application.
  • the foregoing network element may also be called an entity, device, device, or module, which is not specifically limited in this application.
  • the foregoing network element or function may be a network element in a hardware device, or a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
  • the foregoing network element or function may be implemented by one device, or jointly implemented by multiple devices, or may be a functional module in one device, which is not specifically limited in this embodiment of the present application.
  • the description of the network element is omitted in some descriptions.
  • the SMF network element is referred to as SMF.
  • the "SMF" should be understood as the SMF network element. The following , omitting descriptions for the same or similar situations.
  • the network element with network capability opening function can be AMF, SMF, PCF (or AM PCF and SM PCF), AF, RAN, BSF, UDR, UDM, NEF in Figure 2 or Figure 3 respectively, or it can be a future communication system (such as The network elements in the sixth generation (6th generation, 6G) that have the above-mentioned functions of AMF, SMF, PCF, AF, RAN, BSF, UDR, UDM, and NEF are not limited in this application.
  • this application refers to mobility management network elements, session management network elements, policy control network elements, application function network elements, access network equipment, binding support function network elements, unified data storage function network elements, and unified data management network elements.
  • the network element and the network element with the network capability opening function are respectively described by taking the above-mentioned AMF, SMF, PCF, AF, RAN, BSF, UDR, UDM, and NEF as examples.
  • the terminal device is referred to as UE for short.
  • each component network element is only exemplary, and when each component network element is applied to the embodiment of the present application, not all functions are required.
  • AM PCF also called PCF for a UE
  • the AM Policy includes service area restriction information and radio access technology or radio spectrum selection priority RFSP information; the service area restriction information is used to indicate the allowed area or disallowed area of the UE.
  • the UE In the allowed area, the UE is allowed to communicate with the network according to the subscription of the UE; while in the unallowed area, AMF will send the service area restriction information to the RAN and UE; radio access technology or radio spectrum selection priority RFSP is used for RAN determination Radio resource management policy, AMF will send RFSP to RAN.
  • the above-mentioned AM PCF formulates the AM strategy. It may be that the AM PCF formulates the AM strategy according to the subscription information of the UE and the network strategy.
  • the subscription information of the UE may include the service area restriction and the wireless access technology or wireless spectrum subscribed by the UE.
  • the above-mentioned network strategy can include determining different service area restrictions or RFSP index (RFSP index) according to the current position of the UE; it can also be that the AM PCF formulates the AM strategy according to one or more application layer information applicable to the UE, It should be noted that the AM PCF may also consider the subscription information and network policies of the corresponding UE when formulating an AM policy based on one or more application layer information applicable to the UE.
  • the AM policy when the UE registers with the AMF and establishes an AM policy with the AM PCF During policy association, the AM policy will be formulated according to the subscription information of the UE and the network policy, and when one or more application layer information applicable to the UE is subsequently received, the AM policy will be updated considering the application layer information.
  • the SMF If after formulating the AM policy, it is necessary to reselect the AMF and the corresponding AM PCF (such as AMF and PCF reselection when the position of the UE moves) or to reselect the SMF and the corresponding SM PCF (such as SSC mode In 2, the SMF first requests to release the PDU session and at the same time requests the UE to establish a new PDU session, and needs to reselect the SMF and SM PCF corresponding to the new PDU session), which may repeatedly update the AM policy, resulting in waste of resources.
  • AMF and PCF reselection when the position of the UE moves or to reselect the SMF and the corresponding SM PCF (such as SSC mode In 2
  • the SMF first requests to release the PDU session and at the same time requests the UE to establish a new PDU session, and needs to reselect the SMF and SM PCF corresponding to the new PDU session), which may repeatedly update the
  • the new AM PCF (or the target AM PCF) cannot know the AM strategy formulated by the previous AM PCF (or the source AM PCF), and the new AM PCF
  • the AM strategy will be formulated again according to the subscription information of the UE and the network strategy. If the application layer information provided by the UE is received, the AM strategy will be updated again according to the application layer information, and the updated AM strategy may be different from the previous one.
  • the AM strategy formulated by the AM PCF is the same, resulting in repeated updates of the AM strategy (for example, the first parameter).
  • the SMF will first request to release the PDU session, and at the same time request the UE to establish a new PDU session.
  • the AM PCF will trigger the AM policy update and notify the AF.
  • the DNN corresponding to the session is the same as the N-SSIAI, and the AM policy formulated in the released PDU session is likely to be the same as the updated AM policy. Therefore, repeated updates to the AM policy cause unnecessary waste of resources.
  • the UDM when the subscription of the user changes, the UDM will delete the previously stored service area restriction information and RFSP signed by the UE, and the UDM will notify the AMF to delete the service area restriction information and RFSP in the authorized AM policy provided by the AM PCF, and Applying the service area restriction information and RFSP locally configured by AMF, AMF will not interact with AM PCF in this process, and AM PCF cannot know the change of AM policy, which may cause the request of UE to provide application layer information for formulating AM policy not to be executed. Moreover, the AM PCF cannot notify the change of the AM strategy, and the AF cannot update the information about the AM strategy in time.
  • radio spectrum selection priority RFSP
  • radio access technology RFSP index
  • RFSP index spectrum selection priority index
  • the embodiment of the present application provides a policy control method, which can avoid resource waste caused by repeated updates of AM policies, and can also avoid unnecessary deletion of AM policies formulated by PCF based on application layer information provided by UEs by AMF.
  • the embodiment of the present application can be applied to the AM policy formulated for the application layer information provided by a single UE, and can also be applied to the AM policy formulated for the application layer information provided by multiple UEs or any UE.
  • the AM PCF can request the AF to obtain relevant parameters for formulating AM policies.
  • the AM PCF can pass UDR and NEF to obtain relevant parameters for formulating an AM strategy.
  • the AM strategy formulated for the application layer information provided by a single UE will be used as an example in the following description. .
  • the policy control method 200 in this application will be introduced in conjunction with FIG. 4 .
  • the subscription of the UE changes and the UDM deletes the first parameter and/or the second parameter of the subscription, it will send a request to the AMF to delete the first parameter and/or the second parameter of the subscription.
  • the purpose of the request is The main purpose is to allow the AMF to determine that it is not necessary to implement differentiated first parameters and/or second parameters for the UE, but only need to implement a network-wide AM policy for the UE.
  • the AMF can determine the network based on local configuration. common AM strategy.
  • the AM policy is formulated according to the application layer information, in order to ensure the user experience of the UE accessing the application, the AMF should not delete the authorized AM policy.
  • the AMF cannot determine the first parameter in the authorized AMF policy. And/or whether the second parameter is formulated according to the subscription information or the application layer information, so the first parameter and/or the second parameter in the authorized AM policy will be deleted, and the first parameter configured locally by the AMF will be applied And/or the second parameter, resulting in the request to formulate the AM policy based on the application layer information is not executed, and AM PCF and AF (that is, the network element that requests to formulate the AM policy based on the application layer information) cannot know the change of the AM policy, which affects the user experience .
  • the AMF acquires information #c (that is, the first information), and the information #c is used to indicate that the currently authorized AM strategy (that is, the AM strategy #2 in FIG. 5, that is, the first AM strategy in the first aspect) is It is formulated according to information #a (corresponding to application layer information), that is, it is used to indicate that the first parameter of authorization is formulated according to application layer information and/or the second parameter of authorization is formulated according to application layer information.
  • information #c that is, the first information
  • the information #c is used to indicate that the currently authorized AM strategy (that is, the AM strategy #2 in FIG. 5, that is, the first AM strategy in the first aspect) is It is formulated according to information #a (corresponding to application layer information), that is, it is used to indicate that the first parameter of authorization is formulated according to application layer information and/or the second parameter of authorization is formulated according to application layer information.
  • the information #c may be referred to as AF Influence Indication
  • AF Influence Indication may be an independent indication information, which is used to indicate that the AM strategy acquired by the AMF from the AM PCF is formulated according to the application layer information of the UE, and the information #c is also It may be a special information element carrying the authorized first parameter or the authorized second parameter, and according to the special information element, it can be determined that the first parameter and/or the second parameter is determined according to the application layer information of the UE.
  • the AMF may acquire the acquisition information #c before receiving the request message #a sent by the UDM, or may acquire the acquisition information #c after receiving the request message #a sent by the UDM, which is not limited in this application.
  • the AMF receives the request message #a (corresponding to the second information) sent by the UDM, and the request message #a is used to notify the AMF of the corresponding UE's subscription information (ie, the first parameter of the subscription and/or the second parameter of the subscription) Deleted by UDM.
  • the AMF after the AMF receives the request message #a sent by the UDM, it can implement the solution of the following method #A, or the solution of the following method #B, so as to ensure the user experience when the UE accesses the application.
  • the AMF sends a request message #b to the AM PCF according to the information #c, and the request message #b is used to request the AM PCF to determine the target AM strategy for the AMF to be applied to the UE (or to request the AM strategy of the AM PCF to the UE re-authorization), for example, the AM PCF can determine whether to update the AM policy #2, and the request message #b includes indication information for indicating the deletion of the first parameter and/or the second parameter of the subscription.
  • the AM PCF determines whether it is necessary to update the AM policy #2 currently authorized by the UE. For example, the AM PCF may Parameters such as the network status determine whether the AM policy #2 currently authorized by the UE needs to be updated, and send a response message #b to the AMF.
  • the request information #b may also include the above information #c, and the information #c can be used by the AM PCF to determine the following AM strategy #3.
  • the AM PCF determines the UE's The AM policy is formulated based on the application layer information, so when the AM PCF receives the request message #b, it will not immediately determine the AM policy based on the subscription information of the UE and the network policy, but after receiving the application layer information of the UE
  • the AM policy #3 is determined according to the application layer information of the UE.
  • this step also includes that the AM PCF receives the request information #b sent by the AMF, and the AM PCF sends a response message #b to the AMF.
  • the AM PCF receives and determines the authorized AM strategy #4 (i.e. the target AM strategy) according to the request message #b, or in other words, determines the AM strategy applied to the UE, and sends a response message #b to the AMF, the response message #b AM policy #4 for AMF to determine authorization.
  • the authorized AM strategy #4 i.e. the target AM strategy
  • the AM PCF determines to update the first parameter and/or the second parameter in the currently authorized AM policy #2, and the updated AM policy is called AM policy #3 (corresponding to second AM strategy in the first aspect).
  • the response message #b (recorded as response message #b1) is used by the AMF to determine that the authorized AM policy #4 is AM policy #3.
  • the response message #b1 may include the updated AM policy (i.e. The first parameter and/or the second parameter corresponding to AM strategy #3).
  • the AM PCF can also send a notification message to the AF, and the notification message is used to notify the AF network element of the AM strategy #2
  • the notification message may carry the first parameter and/or the second parameter corresponding to the updated AM policy #3.
  • the AM PCF determines not to update the first parameter and/or the second parameter in the AM policy #2, or in other words, if the AM PCF determines to continue to execute the previously authorized AM policy #2, this
  • the response message #b (recorded as response message #b2) is used by the AMF to determine that the authorized AM policy #4 is the AM policy #2
  • the response message #b2 may include an The indication information of policy #2, or the response message #b2 may include the first parameter and/or the second parameter corresponding to AM policy #2.
  • the AM PCF determines to delete the AM policy #2, or the AM PCF determines to delete the first parameter and/or the second parameter in the AM policy #2, and at this time, the response message #b (may Denoted as response message #b3) AM policy #4 for AMF to determine authorization is a general AM policy determined by AMF according to local configuration.
  • the response message #b3 may include an instructions for the .
  • the AM PCF may also send a notification message to the AF, and the notification message is used to notify the AF network element of the deletion of the AM policy #2.
  • the AMF receives the AM PCF and sends a response message #b, the response message #b is used by the AMF to determine the authorized AM policy #4 (ie, the target AM policy), or in other words, the response message #b is used by the AMF to determine the policy applied to the UE AM strategy.
  • the authorized AM policy #4 ie, the target AM policy
  • the response message #b is used by the AMF to determine the policy applied to the UE AM strategy.
  • the AMF determines the AM policy #4 (that is, the target AM policy) according to the response message #b.
  • the AMF determines that the authorized AM policy #4 is the above-mentioned AM policy #3.
  • the AMF determines that the authorized AM policy #4 is the above-mentioned AM policy #2.
  • the AMF determines that the first parameter and/or the second parameter in the AM strategy #2 is deleted and determines the general AM strategy according to the local configuration The first parameter and/or the second parameter in are applied to the UE.
  • the AMF executes AM strategy #4 (ie, the target AM strategy).
  • the AMF may send the first parameter and/or the second parameter corresponding to the AM strategy #4 to the RAN. Two parameters, sending the first parameter corresponding to AM policy #4 to the UE.
  • the AMF executes the AM policy #2 according to the information #c.
  • the AMF determines according to the information #c that the currently authorized AM policy #2 is an AM policy formulated according to the UE's application layer information. Therefore, when receiving a request to delete the first parameter and/or the first parameter in the subscription information For the request message #a of two parameters, the AMF will not delete the first parameter and/or the second parameter in the AM strategy #2, so that the AMF can still continue to execute the AM strategy #2.
  • the AMF may acquire the information #c during the process of acquiring the AM policy #2.
  • the AM PCF determines AM policy #1 through interaction with the AMF.
  • the AMF sends an AM policy establishment request (Npcf_AMPolicyControl_Create request) message to the AM PCF, and the request message may include user subscription information (such as the user identifier, the first parameter and/or the second parameter of the subscription, etc.
  • the AM PCF determines the authorized AM strategy #1 of the UE according to the user subscription information and the network strategy, and the authorized AM strategy #1 includes the first parameter and/or the second parameter of the authorization; the AM PCF then sends the AM strategy establishment to the AMF Response (Npcf_AMPolicyControl_Create response) message, the response message is used for the authorized AM policy determined by the AMF, and the response message may include relevant parameters of the authorized AM policy #1, such as the first parameter and/or the second parameter of authorization.
  • AMF Response Npcf_AMPolicyControl_Create response
  • the manner in which the above-mentioned AMF obtains information such as the user ID, the first parameter of the subscription and/or the second parameter may be: the AMF interacts with the UDM to obtain the user's subscription information, and the user's subscription information includes the above-mentioned user ID , the first parameter and/or the second parameter of the contract.
  • the AMF acquires the user identifier, the first parameter of the subscription and/or the second parameter through the UDM during the registration process of the UE.
  • the AM PCF acquires information #a, and the information #a is used to determine the updated AM strategy #2 for the AM strategy #1.
  • the AM PCF obtains the information #a in the following manner: the AM PCF receives the AM policy authorization creation request (Npcf_AMPolicyAuthorization_Create request) message sent by the AF, and the request message includes the above information #a.
  • the AM PCF sends an AM policy authorization establishment response (Npcf_AMPolicyAuthorization_Create response) message to the AF after saving the information #a.
  • the information #a includes UE identity (such as SUPI or GPSI), service area coverage (service area coverage) information and/or high throughput (high throughput) indication information, and its association
  • the combination of (DNN, S-NSSAI) can be recorded as information #a1, that is, information #a that does not include the application identification), at this time, the information #b that triggers the AM PCF to update the AM policy #1 can be understood as Information indicating that the corresponding PDU session in the information #a (the PDU session corresponding to (DNN, S-NSSAI) in the information #a) has been established.
  • the above information #a may also include an associated application ID (application Id(s)) (which may be recorded as information #a2, that is, information #a including the application ID).
  • application ID application Id(s)
  • the AF may also subscribe to the AM PCF for service area restriction information (ie, the first parameter) change events and/or RFSP Index (ie, the second parameter) change events.
  • service area restriction information ie, the first parameter
  • RFSP Index ie, the second parameter
  • the AM PCF acquires information #b according to the information #a, and the information #b is used to trigger the AM PCF to update the AM policy #1.
  • the manner in which the AM PCF acquires the information #b according to the information #a may be the following manner 1 and/or manner 2.
  • the information #b that triggers the AM PCF to update the AM policy #1 can be understood as the binding information of the SM PCF, indicating the PDU corresponding to (DNN, S-NSSAI) in the information #a The completion of session establishment; further, in the following manner 2, the information #b that triggers AM PCF to update AM policy #1 can be understood as being used to represent the corresponding application in information #a2 after the PDU session establishment is completed (corresponding to information The application Id(s) in #a2 starts to enable information.
  • AM PCF obtains information #b (that is, the binding information of SM PCF, which can be recorded as information #b1) according to information #a1.
  • the AM PCF sends a subscription request message to the BSF according to information #a1.
  • the subscription request message is used to subscribe to SM PCF binding information.
  • the subscription request message can carry the UE's identity and (DNN, S-NSSAI) combination; BSF according to the subscription
  • the identification of the UE in the request message, (DNN, S-NSSAI) combination determines the binding information of the corresponding SM PCF, and sends a subscription response message to the AM PCF, which includes the binding information of the SM PCF in the subscription response message (i.e. Information #b1).
  • the information #b1 may indicate the completion of the establishment of the PDU session corresponding to (DNN, S-NSSAI) in the information #a.
  • the BSF needs to acquire the binding information of the SM PCF.
  • the acquisition process may be: the UE establishes the corresponding (DNN, S-NSSAI)
  • the SMF assigns the UE address to the PDU session.
  • the SMF interacts with the SM PCF to establish an SM policy association and registers with the BSF carrying the binding information of the SM PCF.
  • the binding information of the SM PCF includes the UE address, UE ID, PCF ID 2, (DNN, S-NSSAI).
  • PCF identification 2 is the resource identification of the SM PCF supporting policy authorization (Npcf_PolicyAuthorization) service, which can be understood as the corresponding PCF identification of the SM PCF.
  • the process in which the above-mentioned SMF establishes the SM policy association by interacting with the SM PCF may be: the SMF sends a message SM policy establishment request (Npcf_SMPolicyControl_Create request) message to the SM PCF, and the request message includes user identification, UE address #1, etc. .
  • the SM PCF determines SM policies based on information such as user subscription and network policies.
  • the SM PCF sends an SM policy establishment response (Npcf_SMPolicyControl_Create response) message to the SMF, and the response message includes relevant parameters of the SM policy.
  • the SM PCF does not have the UE's subscription data, it can obtain the user's subscription data by interacting with the UDR.
  • AM PCF obtains information #b (that is, application start event information, which can be recorded as information #b2) according to information #a2.
  • AM PCF sends a policy authorization subscription request (Npcf_PolicyAuthorization_Subscribe request) message to SM PCF according to the information #a2.
  • the policy authorization subscription request message is used to subscribe to the application start (Application Start) event, and the message carries Application Id(s);
  • AM PCF receives SM
  • the policy authorization subscription response (Npcf_PolicyAuthorization_Subscribe response) message sent by the PCF includes the Application Start event corresponding to the above Application Id(s) (that is, information #b2).
  • the information #b2 may indicate that the UE starts to activate the application corresponding to the Application Id(s) in the information #a2.
  • the SM PCF needs to acquire the Application Start event corresponding to the Application Id(s).
  • the acquisition process can be as follows: SM PCF passes Interact with SMF, request SMF to detect the Application Start event corresponding to the Application Id(s), SMF further interacts with UPF, request UPF to detect the Application Start event corresponding to Application Id(s), UPF detects the Application Id(s) ) to send the Application Start event corresponding to the Application Id(s) to the SMF, and then the SMF sends the Application Start event corresponding to the Application Id(s) to the SM PCF.
  • the policy authorization subscription request message may also be used to subscribe to an application stop (Application Stop) event.
  • Application Stop Application Stop
  • the AM PCF determines the updated AM strategy #2 according to the information #b, the information #a and the AM strategy #1.
  • the AM PCF determines that the AM policy #1 needs to be updated according to the information #b, further, the AM PCF updates the AM policy # according to the service area coverage (service area coverage) information in the information #a 1, and/or, the AM PCF updates the second parameter in AM strategy #1 according to the high throughput indication information in information #a, and updates the first parameter and/or the second parameter
  • AM strategy #2 The AM strategy #1 after two parameters is denoted as AM strategy #2.
  • the AM PCF sends information #c to the AMF, and the information #c is used to indicate that the AM policy #2 is determined according to the information #a.
  • the AM PCF will also send the updated AM policy #2 to the AMF, where the AM policy #2 includes the first parameter and/or the second parameter updated according to the information #a.
  • the AM PCF may also send the first parameter and/or the second parameter in the updated AM strategy #2 to the RAN, and the AM PCF may also send the first parameter in the updated AM strategy #2 to the UE.
  • the AM PCF can also send event notifications and updates to the AF The first parameter and/or the second parameter in the following AM strategy #2.
  • the subscription information of the user changes and the UDM deletes the subscription information of the UE
  • the subscription information includes the service area restriction information of the subscription (ie, the first parameter) and/or the RFSP of the subscription (ie, the second parameter)
  • the UE’s subscription information deletion notification will be sent to the AMF.
  • the AMF receives the UE’s subscription information deletion notification sent by the UDM, it can continue to execute the authorized AM strategy #2 (that is, the above method #B) according to the information #c.
  • Information #c can be sent to AMF after AM PCF formulates AM policy #2 according to the application layer information, or can be sent to AMF by AM PCF while sending AM policy #2 to AMF; it can also be based on the information# c Interact with the AM PCF (that is, the above method #A), and determine the authorized AM policy #4.
  • FIG. 6 shows a policy control method 400 in this application, and the policy control method 400 is a possible implementation manner of applying the policy control method 200 in a 5G system.
  • the UE registers.
  • the UE registers with the AMF, and the AMF determines the first parameter and the second parameter subscribed by the UE.
  • the manner in which the AMF determines the first parameter and the second parameter subscribed by the UE may be: the AMD interacts with the UDM to obtain the user subscription information of the UE, and the user subscription information includes the user subscription information of the UE. first parameter and second parameter.
  • the AMF establishes an AM policy association with the AM PCF, and determines AM policy #1.
  • the process of establishing an AM policy association between the AMF and the AM PCF may be: the AMF sends a message AM policy control establishment request (Npcf_AMPolicyControl_Create request) message to the AM PCF, and the request message includes the user identifier of the UE, The first parameter and the second parameter of the subscription, etc.; the AM PCF determines the authorized AM strategy #1 of the UE according to the first parameter and the second parameter of the subscription, and the network strategy, and the authorized AM strategy #1 includes the authorized AM strategy #1 of the UE The first parameter and the second parameter; the AM PCF returns an AM policy control establishment response (Npcf_AMPolicyControl_Create response) message to the AMF, and the response message includes the AM policy #1 authorized by the UE.
  • Npcf_AMPolicyControl_Create request AM policy control establishment request
  • the AM PCF obtains the application layer information of the UE from the AF.
  • the AF sends an AM policy authorization establishment request (Npcf_AMPolicyAuthorization_Create request) message to the AM PCF, and the request message includes a UE identifier (such as SUPI or GPSI) and the application layer information corresponding to the UE identifier.
  • the layer information includes service area coverage (service area coverage) information and/or high throughput (high throughput) indication information, and a combination of (DNN, S-NSSAI) associated therewith.
  • the AF After saving the application layer information corresponding to the UE identifier, the AF returns an AM policy authorization establishment response (Npcf_AMPolicyAuthorization_Create response) message to the AF.
  • the UE's application layer information may also include an application ID (application Id(s)) associated with the UE ID.
  • an application ID application Id(s)
  • step S403 that is, before the AF sends a message to the AM PCF, the AF needs to determine the AM PCF corresponding to the UE.
  • the process of the AF determining the AM PCF corresponding to the UE can be Yes: AM policy association is established through interaction between AM PCF and AMF; AM PCF carries AM PCF binding information to register with BSF, and the AM PCF binding information includes PCF ID 1 and UE ID corresponding to AM PCF (such as SUPI Or generic public subscription identifier (generic public subscription identifier, GPSI)), where PCF identifier 1 is the resource identifier of the AM policy authorization (Npcf_AMPolicyAuthorization) service supported by AM PCF, which can be understood as the PCF identifier corresponding to the AM PCF; AF carries UE identifier Request the BSF to subscribe to the binding information of the AM PCF corresponding to the UE ID; the BSF determines the binding information of the
  • the AM PCF subscribes the binding information of the SM PCF to the BSF.
  • the AM PCF sends a subscription request (Nbsf_Management_Subscribe request) message to the BSF, where the request message carries a combination of the UE identity of the UE and its associated (DNN, S-NSSAI), and the request message uses To request the binding information of the SM PCF corresponding to the combination of the UE identity and its associated (DNN, S-NSSAI).
  • Nbsf_Management_Subscribe request a subscription request
  • this step also includes: the BSF receives the subscription request message sent by the AM PCF.
  • the UE establishes a PDU session corresponding to the (DNN, S-NSSAI), and the SMF allocates UE address #1 to the PDU session.
  • the SMF allocates UE address #1 to the PDU session.
  • the SMF establishes SM policy association with the SM PCF.
  • the process of establishing the SM policy association between the SMF and the SM PCF may be: the SMF sends a message SM policy control establishment request (Npcf_SMPolicyControl_Create request) message to the SM PCF, and the request message includes the user identifier of the UE, UE address #1, etc.; SM PCF determines the authorized SM policy of the UE according to the UE's user subscription information and network policies; SM PCF returns the SM policy control establishment response (Npcf_AMPolicyControl_Create response) message to the SMF, and the response message includes the UE authorized SM policy.
  • Npcf_SMPolicyControl_Create request SM policy control establishment request
  • Npcf_AMPolicyControl_Create response SM policy control establishment response
  • the SM PCF can obtain the user subscription information of the UE by interacting with the UDR.
  • the SM PCF initiates registration to the BSF, and registers the binding information of the SM PCF.
  • the SM PCF sends a registration request (Nbsf_Management_Register request) message to the BSF, and the request message carries the binding information of the SM PCF, such as UE address #1, UE identifier, PCF identifier 2, (DNN , S-NSSAI) etc.
  • PCF identification 2 is the resource identification of the SM PCF supporting policy authorization (Npcf_PolicyAuthorization) service, which can be understood as the corresponding PCF identification of the SM PCF.
  • this step also includes: the BSF receives the registration request message sent by the SM PCF.
  • the BSF returns the binding information of the SM PCF to the AM PCF.
  • the BSF after receiving the binding information of the SM PCF corresponding to the UE, the BSF will send a notification (Nbsf_Management_Notify request) message to the AM PCF based on the subscription request of the AM PCF in S404, in the notification message Carry the binding information of the SM PCF.
  • a notification Nbsf_Management_Notify request
  • this step also includes: the AM PCF receives the notification message sent by the BSF.
  • the following steps S409-S411 may be performed.
  • the AM PCF subscribes the application start/end event to the SM PCF.
  • the AM PCF sends a policy authorization subscription request (Npcf_PolicyAuthorization_Subscribe request) message to the SM PCF, where the request message is used to subscribe to the application start/end (Application Start) event corresponding to the application identifier.
  • Npcf_PolicyAuthorization_Subscribe request a policy authorization subscription request
  • this step also includes: the SM PCF receives the policy authorization subscription request sent by the AM PCF.
  • the SM PCF interacts with the SMF, and requests to detect the start/end event of the application corresponding to the application identifier.
  • the SMF further interacts with the UPF to request the UPF to detect the start/end event of the application corresponding to the application identifier.
  • the UPF After detecting the start event of the application corresponding to the application identifier, the UPF sends the start event of the application corresponding to the application identifier to the SMF, and the SMF receives After the start event of the application corresponding to the application identifier is sent to the SM PCF, the start event of the application corresponding to the application identifier is sent.
  • this step also includes: the SM PCF receives the start event of the application corresponding to the application identifier sent by the SMF.
  • the SM PCF returns the application start event to the AM PCF.
  • the SM PCF sends a notification (Npcf_PolicyAuthorization_Notify request) message to the AM PCF after receiving the start event of the application corresponding to the application identifier, and the notification message carries the detected cause identifier and the corresponding application ID Start the event.
  • a notification Npcf_PolicyAuthorization_Notify request
  • this step also includes: the AM PCF receives the notification message sent by the SM PCF.
  • the AM PCF makes an AM policy decision, and determines AM policy #2.
  • the UE application layer information obtained by the AM PCF in S403 includes service area coverage information and/or high throughput indication information, and its associated (DNN, S-NSSAI)
  • the AM PCF receives the SM PCF binding information sent by the BSF in S408, the AM PCF makes an AM policy decision and determines AM policy #2.
  • the AM PCF determines the first parameter in the AM strategy #2 according to the service area coverage information, and/or determines the second parameter in the AM strategy #2 according to the high throughput indication information.
  • the UE's application layer information acquired by the AM PCF in S403 includes service area coverage information and/or high throughput indication information, and its associated application identifier.
  • the AM PCF receives After the application start event sent by the SM PCF in S411, the AM PCF makes an AM policy decision and determines AM policy #2. Specifically, the AM PCF determines the first parameter in the AM strategy #2 according to the service area coverage information, and/or determines the second parameter in the AM strategy #2 according to the high throughput indication information.
  • the AM PCF sends the AM policy #2 and information #c to the AMF, the information #c is used to indicate that the AM policy #2 is formulated according to the application layer information of the UE, or in other words, it is used to indicate the first AM policy #2
  • One parameter is formulated according to application layer information and/or the second parameter of AM policy #2 is formulated according to application layer information.
  • the AM PCF sends an AM policy control update notification request (Npcf_AM PolicyControl_UpdateNotify request) message to the AMF, and the request message carries the AM policy #2 and the information #c, or in other words, the request message carries The first parameter and/or the second parameter in the updated AM strategy #2, and the information #c.
  • Npcf_AM PolicyControl_UpdateNotify request an AM policy control update notification request
  • this step also includes: the AMF receives the AM policy control update notification request message sent by the AM PCF.
  • the AMF sends the first parameter in the AM strategy #2 to the RAN and the UE, and the AMF sends the second parameter in the AM strategy #2 to the RAN.
  • the AM PCF sends AM policy #2 to the AF.
  • the AM PCF sends an AM policy authorization notification request (Npcf_AMPolicyAuthorization_Notify request) message to the AF, and the request message carries AM policy #2, or in other words, carries the updated first parameter in AM policy #2 and/or the second parameter.
  • Npcf_AMPolicyAuthorization_Notify request an AM policy authorization notification request
  • the AMF receives the request message #a sent by the UDM.
  • request message #a sent by the UDM.
  • the AMF sends a direction request message #b to the AM PCF.
  • a direction request message #b to the AM PCF.
  • the AM PCF makes an AM policy decision, and determines AM policy #4.
  • the AM PCF sends a response message #b to the AMF.
  • a response message #b to the AMF.
  • step S420 the AMF executes AM policy #4, and here, reference may be made to related descriptions in step S207.
  • the AM strategy #4 (ie, the target AM strategy) can be the above-mentioned AM strategy #2, or It may be the above-mentioned AM policy #3, or it may be a general AM policy determined by the AMF according to the local configuration.
  • the relevant description in step S206 can be made to the relevant description in step S206.
  • the AM PCF determines that the above AM strategy #2 has been updated, that is, the AM strategy #4 is the AM strategy For the updated policy of #2 (namely AM policy #3), the following step S421 is performed.
  • the AM PCF sends AM policy #4 to the AF.
  • the AM PCF sends an AM policy authorization notification request (Npcf_AMPolicyAuthorization_Notify request) message to the AF, and the request message carries AM policy #3, or in other words, carries the updated first parameter in AM policy #2 and/or the second argument.
  • Npcf_AMPolicyAuthorization_Notify request an AM policy authorization notification request
  • the AMF may not interact with the AM PCF, and determines that the AM strategy #2 of the UE is formulated according to the application layer information according to the information #c. After receiving the request message #a, the AMF The first parameter and/or the second parameter in the AM strategy #2 will not be deleted, so that the AMF can continue to execute the AM strategy #2.
  • the policy control method 500 in this application is introduced in conjunction with FIG. 7 .
  • the AMF after reselection and the corresponding AM PCF are recorded as AMF#1 (ie, the first mobility management network element in the second aspect) and AM PCF#1 (ie, the second aspect The first strategy control network element in the), the AM strategy determined by AM PCF#1 according to the application layer information (corresponding to information #d) is recorded as AM strategy #1 (ie the second mobility management strategy in the second aspect) , the AMF before reselection and the corresponding AM PCF are recorded as AMF#2 (corresponding to AMF in Fig. 5-Fig.
  • AM policy #2 (ie the first mobility management policy in the second aspect).
  • the AM PCF #1 obtains the AM policy #2, and the AM policy #2 is an AM policy formulated by the AM PCF #2 for the UE.
  • the manner in which AM PCF#1 obtains AM policy #2 may be: AMF#1 obtains AM policy #2 from AMF#2, and sends the AM policy #2 to AM PCF#1.
  • the process may be: AMF#1 sends a context request (Namf_Communication_UEContextTransfer request) message to AMF#2, AMF#2 sends a context response (Namf_Communication_UEContextTransfer response) message to AMF#1, and the context response message includes AMF#2 from The authorized AM strategy #2 received by AM PCF#2, AMF#1 sends an AM strategy establishment request (Npcf_AMPolicyControl_Create request) message to AM PCF#1, and the AM strategy establishment request message includes the first parameter in AM strategy #2 and / or the second parameter.
  • AMF#1 sends a context request (Namf_Communication_UEContextTransfer request) message to AMF#2
  • AMF#2 sends a context response (Namf_Communication_UEContextTransfer response) message to AMF#1
  • the context response message includes AMF#2 from The authorized AM strategy #2 received by AM PCF#2
  • AMF#1 sends an
  • AMF#1 sends the AM policy #2 to AM PCF#1, AMF will first determine the AM PCF#1.
  • the above-mentioned context response message may also include the above-mentioned information #c (may be referred to as AF Influence Indication) (that is, the first indication information in the second aspect), and the above-mentioned AM policy establishment request message may also include the above-mentioned information #c .
  • AMF#1 may determine to send AM policy #2 to AM PCF#1 according to the above information #c.
  • AM PCF#1 determines not to formulate the corresponding AMF immediately according to user subscription and network policy
  • the AM policy #5 of #1 can also be understood as, AM PCF #1 determines the UE corresponding
  • the AM policy is formulated according to the application layer information (namely the above information #a), so the AM policy corresponding to the UE (ie AM policy #5) will be determined according to the application layer information after receiving the corresponding application layer information subsequently.
  • the manner in which AM PCF#1 obtains AM policy #2 may be: AMF#1 obtains AM policy #2 from UDR.
  • AM PCF#1 may determine to obtain AM policy #2 from the UDR according to the acquired information #c.
  • the process may be: AM PCF #2 (that is, the second AM PCF in the second aspect) saves the first parameter and/or the second parameter in the determined authorized AM policy #2 to the UDR.
  • the AM PCF#1 acquires the first parameter and/or the second parameter in the AM strategy #2 corresponding to the AM PCF#2 from the UDR.
  • AM PCF#1 receives the AM strategy establishment request of AMF#1, it immediately determines the AM strategy according to the subscription information and network information of the UE. Resource waste caused by policy updates.
  • AM PCF#1 obtains information #d, and the information #d is used to determine AM strategy #5 after updating AM strategy #2 (that is, the second AM strategy in the second aspect).
  • this information #d is similar to the definition of information #a in FIG. 5 , and can be understood as application layer information provided by the UE.
  • this information #d can be made to the relevant description of S302 in FIG. 5 , and details will not be described here.
  • AM PCF#1 Before AM PCF#1 receives the AM policy authorization establishment request message sent by AF, AF needs to determine the AM PCF#1.
  • the process for AF to determine the AM PCF#1 can be: AM PCF# 1 interacts with AMF#1 to establish an AM policy association; AM PCF#1 carries the binding information of AM PCF#1 to register with the BSF, and the binding information of AM PCF#1 includes the PCF identifier 3 corresponding to AM PCF#1 and UE identity (such as SUPI or GPSI), where PCF identity 3 is the resource identity of the AM policy authorization (Npcf_AMPolicy Authorization) service supported by AM PCF#1, which can be understood as the PCF identity corresponding to the AM PCF#1; AF carries the UE identity to The BSF requests to subscribe to the binding information of the AM PCF corresponding to the UE identity; the BSF determines the binding information of the corresponding AM PCF#1 according to the UE identity in the subscription request message of the AF,
  • the information #d includes UE identity (such as SUPI or generic public subscription identifier (GPSI)), service area coverage (service area coverage) information and/or high throughput
  • UE identity such as SUPI or generic public subscription identifier (GPSI)
  • service area coverage service area coverage
  • high throughput The combination of indication information and its associated (DNN, S-NSSAI) (can be recorded as information #d1) (corresponding to the application layer information of the UE), at this time triggers AM PCF #1 to update the information of AM policy #2 #d can be understood as the information used to indicate that the corresponding PDU session (corresponding to the DNN and S-NSSAI in the information #d) in the information #d has been established.
  • the above information #d may also include associated application identifiers (application Id(s)) (may be recorded as information #d2) (corresponding to the application layer information of the UE).
  • application Id(s) may be recorded as information #d2 (corresponding to the application layer information of the UE).
  • AM PCF #1 acquires information #e according to information #d, and the information #e is used to trigger AM PCF #1 to update AM policy #2.
  • this information #e is similar to the definition of information #b in Figure 5, and can be understood as the trigger information for AM policy update.
  • This information #e can be the binding information of SM PCF, or the application start event information , here you can refer to the related description of S303 in FIG. 5 , and no further details are given here.
  • AM PCF#1 determines AM strategy #5 according to information #e, information #d and AM strategy #2.
  • AM PCF#1 determines that AM policy #2 needs to be updated according to information #d, further, AM PCF#1 according to the service area coverage (service area coverage) information in information #d
  • the first parameter in the AM strategy #2 is updated, and/or, the AM PCF#1 updates the second parameter in the AM strategy #2 according to the indication information of high throughput in the information #d, and the updated first parameter
  • the AM strategy #2 after the first parameter and/or the second parameter is denoted as AM strategy #5.
  • AM PCF#1 determines whether AM strategy #2 needs to be updated according to AM strategy #2 and AM strategy #5.
  • the first parameter and/or the second parameter in AM strategy #2 and AM strategy #5 are the same, and AM strategy #2 does not need to be updated, and AMF#1 executes AM strategy #2 .
  • AM PCF#1 determines not to update AM strategy #2, it can send information #p (which can be carried in the first message in the second aspect) to AMF#1 to instruct AMF#1 to execute the AM strategy #2.
  • the information #p may be indication information instructing AMF#1 to execute the AM strategy #2, or the information #p may include the first parameter and/or the second parameter in the AM strategy #2 parameter.
  • AM strategy #2 needs to be updated, and AM PCF#1 uses AM strategy # 5 is determined to be the updated AM policy, and sends an AM policy establishment response message (Npcf_AmPolicyControl_Create Response) to AMF#1, carrying AM policy #5 (including the first parameter and/or the first parameter corresponding to AM policy #5) in the response message Two parameters), AMF#1 executes AM strategy #5 after receiving it, AMF#1 can send the first parameter and/or second parameter corresponding to AM strategy #5 to RAN, and send the first parameter corresponding to AM strategy #5 to UE .
  • AM policy establishment response message Npcf_AmPolicyControl_Create Response
  • AM PCF#1 determines to update AM strategy #2, it can send information #p (which can be carried in the first message in the second aspect) to AMF#1 to instruct AMF#1 to execute AM strategy# 5.
  • information #p may include the first parameter and/or the second parameter in the AM policy #5.
  • AM PCF#1 determines to update the first parameter and/or the second parameter in AM policy #2, and the AF subscribes to AM PCF#1 for the change of the service area restriction information (ie, the first parameter) event, then AM PCF#1 can also send a notification message to AF, which is used to notify the AF network element of the update of the first parameter in AM strategy #2, optionally, the notification message can carry the updated AM strategy# 5 corresponds to the first parameter. If AF subscribes to the event that the RFSP Index (i.e.
  • AM PCF#1 can also send a notification message to AF, which is used to notify the AF network element of the second parameter in AM strategy #2 Parameter update, optionally, the notification message may carry the second parameter corresponding to the updated AM policy #5.
  • AMF#2 and AM PCF#2 will also perform corresponding operations such as deletion, de-registration or de-subscription, for example, AMF#2 sends AM policy deletion to AM PCF#2
  • the request (Npcf_AMPolicyControl_Delete Request) message is used to request AM PCF#2 to delete AM policy #2;
  • AM PCF#2 sends an unsubscribe request (Nbsf_Management_Unsubscribe Request) message to BSF to request BSF to delete the registration binding information of AM PCF#2 ;
  • AM PCF#2 sends policy authorization to SM PCF to subscribe request (Npcf_PolicyAuthorization_Unsubscribe Request) message, used to request SM PCF to delete the subscription information related to AM PCF#2;
  • AM PCF#2 sends AM policy authorization notification (Npcf_AMPolicyAuthorization_Notify) message to AF , used to request deletion of the corresponding AF session.
  • the new AM PCF i.e. AM PCF #1
  • the new AM PCF can obtain the AM policy #2 of the previous AM PCF (i.e. AM PCF #2), and After reaching information #d, compare whether the AM strategy formulated according to information #d (i.e. AM strategy #5) is the same as AM strategy #2, and only update AM strategy #2 under different circumstances, avoiding the UE's subscription information and network policies, or information #d (for example, AF request information) frequently updates the first parameter and/or the second parameter in the authorized AM policy, which saves certain signaling resources.
  • information #d for example, AF request information
  • FIG. 8 shows a policy control method 600 in this application, and the policy control method 600 is a possible implementation manner of applying the policy control method 500 in a 5G system.
  • the UE initiates registration with the RAN.
  • the UE moves, and the UE carries its user identifier to initiate a registration request to the RAN.
  • the RAN selects AMF#1.
  • the RAN selects a new AMF (namely AMF#1) for the UE after receiving the UE's registration request.
  • the RAN initiates registration to the AMF#1.
  • AMF#1 sends a context request message to AMF#2, AMF#1 returns a context request response message to AMF#1, the context response message carries the context information of the UE, and the context information of the UE may include the The authorized AM policy #2 received by the AM PCF #2, the AM policy #2 includes the authorized first parameter and the authorized second parameter.
  • the context information of the UE may further include the information #c, where the information #c is used to indicate that the AM policy #2 is formulated according to the application layer information of the UE.
  • AMF#1 sends a status update message to AMF#2.
  • AMF#1 selects a new AM PCF (namely AM PCF#1).
  • AMF#1 sends an AM policy control establishment request (Npcf_AMPolicyControl_Create request) message to the AM PCF#1, the request message is used to request the target AM policy applied to the UE, and the request message may carry the AM policy #2 (That is, the first parameter and the second parameter authorized by AM PCF#2).
  • the request message may also carry the information #c.
  • the AM PCF #1 in S607 cannot obtain the AM policy #2 from the AMF #1 through the above-mentioned AM policy control establishment request, at this time S608 may be executed, so that AM PCF#1 can obtain AM policy #2.
  • the AM PCF#1 determines that the AM policy of the UE is formulated according to the application layer information according to the AM policy #2 and/or information #c in the received AM policy control establishment request message, so it will not immediately Formulate AM policy #5' according to the user's subscription information and network policy, but wait until the UE's application layer information is received and then formulate AM policy #5 according to the application layer information.
  • the AM PCF#1 obtains the AM policy #2 from the UDR, for example, the AM PCF#1 obtains the first parameter and/or the second parameter in the AM policy #2 corresponding to the AM PCF#2 from the UDR.
  • S609 may also be executed.
  • the UDR saves the AM strategy #2 sent by the AM PCF#2, or in other words, the first parameter and/or in the authorized AM strategy #2 that will be determined by the AM PCF#2 (ie the second AM PCF in the second aspect) Or save the second parameter to UDR.
  • the AM PCF#1 obtains the application layer information (namely information #d) of the UE from the AF.
  • application layer information namely information #d
  • the AM PCF#1 subscribes to the BSF for binding information of the SM PCF.
  • S404 the relevant description of S404 in FIG. 6 , and details are not repeated here.
  • the BSF returns the binding information of the SM PCF to the AM PCF#1.
  • S408 in FIG. 6 and details are not repeated here.
  • S613-S615 may be performed.
  • S613-S615 reference may be made to the related descriptions of S409-S411 in FIG. 6 , and details are not repeated here.
  • the AM PCF#1 subscribes to the SM PCF for the application start/end event.
  • the SM PCF returns the application start event to the AM PCF#1.
  • AM PCF#1 makes AM strategy decision, determines AM strategy #5, and decides whether to update AM strategy #2.
  • the UE application layer information obtained by AM PCF#1 in S610 includes service area coverage information and/or high throughput indication information, and its associated (DNN, S-NSSAI ), when AM PCF#1 receives the binding information of SM PCF sent by BSF in S612, AM PCF#1 makes AM strategy decision and determines AM strategy #5. Specifically, the AM PCF#1 determines the first parameter in the AM strategy #5 according to the service area coverage information, and/or determines the second parameter in the AM strategy #5 according to the high throughput indication information.
  • the UE application layer information obtained by AM PCF#1 in S610 includes service area coverage information and/or high throughput indication information, and its associated application identification, when AM PCF After #1 receives the application start event sent by SM PCF in S615, AM PCF #1 makes AM policy decision and determines AM policy #5 according to the application layer information. Specifically, the AM PCF#1 determines the first parameter in the AM strategy #5 according to the service area coverage information, and/or determines the second parameter in the AM strategy #5 according to the high throughput indication information.
  • the first parameter and/or the second parameter in AM strategy #2 and AM strategy #5 are the same, and AM strategy #2 does not need to be updated, and AMF#1 executes AM strategy #2 .
  • AM PCF#1 may send information #p1 (corresponding to the first information in the second aspect) to AMF#1 to instruct AMF#1 to execute AM strategy #2,
  • the information #p1 may be indication information instructing the AMF #1 to execute the AM strategy #2, or the information #p1 may include the first parameter and/or the second parameter in the AM strategy #2.
  • AM strategy #2 needs to be updated, and AM PCF#1 uses AM strategy # 5 is determined as the updated AM strategy.
  • AM PCF#1 sends an AM policy control establishment response (Npcf_AmPolicyControl_Create Response) message to AMF#1, and the response message includes the information #p1 or the information #p2.
  • Npcf_AmPolicyControl_Create Response AM policy control establishment response
  • the response message includes the information #p1, and AMF #1 executes AM policy #2 after receiving the response message.
  • the response message includes the information #p2, AMF#1 executes AM policy #5 after receiving the response message, AMF#1 can send the first parameter corresponding to AM policy #5 and /or the second parameter, sending the first parameter corresponding to the AM policy #5 to the UE.
  • the AM PCF #1 determines to update the AM policy #2, and determines the AM policy #5 as the updated AM policy, the following S618-S622 may also be executed.
  • AM PCF#1 sends AM policy #5 to AF.
  • AM PCF#1 determines to update the first parameter and/or the second parameter in AM policy #2, and the AF subscribes to AM PCF#1 for service area restriction information (that is, the first One parameter) change event, then AM PCF#1 can also send a notification message to AF, the notification message is used to notify the AF network element of the update of the first parameter in the AM policy #2, optionally, the notification message can carry The first parameter corresponding to the updated AM strategy #5. If AF subscribes to the event that the RFSP Index (i.e. the second parameter) changes to AM PCF#1, then AM PCF#1 can also send a notification message to AF, which is used to notify the AF network element of the second parameter in AM strategy #2 Parameter update. Optionally, the notification message may carry the second parameter corresponding to the updated AM policy #5.
  • AMF#2 sends AM policy deletion request (Npcf_AMPolicyControl_Delete Request) message to AM PCF#2, is used for requesting AM PCF#2 to delete AM policy #2; AM PCF#2 returns AM policy deletion to AMF#2 after deletion Response (Npcf_AMPolicyControl_Delete Response) message.
  • AM policy deletion request Npcf_AMPolicyControl_Delete Request
  • Npcf_AMPolicyControl_Delete Response deletion Response
  • AM PCF#2 sends a management unsubscribe request (Nbsf_Management_Unsubscribe Request) message to the BSF, which is used to request the BSF to delete the registration binding information of AM PCF#2.
  • Nbsf_Management_Unsubscribe Request a management unsubscribe request
  • the AM PCF#2 sends a policy authorization unsubscribe request (Npcf_PolicyAuthorization_Unsubscribe Request) message to the SM PCF, for requesting the SM PCF to delete the subscription information related to the AM PCF#2.
  • Npcf_PolicyAuthorization_Unsubscribe Request a policy authorization unsubscribe request
  • AM PCF#2 requests to delete the AF session.
  • the AM PCF#2 sends an AM policy authorization notification (Npcf_AMPolicyAuthorization_Notify) message to the AF for requesting deletion of the corresponding AF session.
  • Npcf_AMPolicyAuthorization_Notify an AM policy authorization notification
  • AM PCF#1 can obtain the AM strategy #2 formulated by previous AM PCF#2, and AM PCF#1 receives the binding information of SM PCF, Or after the application start event notification corresponding to the application identifier, formulate AM policy #5 according to the application layer information, and compare whether AM policy #5 and AM policy #2 are the same, and only update AM policy #2 under different circumstances, It avoids frequently updating the first parameter and/or the second parameter in the authorized AM strategy according to the subscription information of the UE and the network strategy, or the application layer information, and saves certain signaling resources.
  • the policy control method 700 and the policy control method 800 in this application will be introduced with reference to FIG. 9 and FIG. 10 .
  • the SMF corresponding to the newly created PDU session in SSC mode 2 (denoted as PDU session #1, i.e. the second session in the third aspect and the fourth aspect) and the corresponding SM PCF are respectively denoted as SMF#1 and SM PCF#1 (corresponding to PCF identification 4), the PDU session released in SSC mode 2 (or called the previous PDU session, or the old PDU session) (recorded as PDU session #2, i.e. the third Aspect and the first session in the fourth aspect)) SMF and corresponding SM PCF are respectively denoted as SMF#2 (corresponding to the SMF in Fig.
  • AM strategy #2 (corresponding to AM strategy #2 in FIG. It is formulated by the application layer information.
  • SMF#2 decides to reselect the UPF and terminates
  • the established PDU session #2 (corresponding to (DNN, S-NSSAI) in information #a1 in Figure 5) and the request to establish a new PDU session #1, these two PDU sessions are connected to the same DN, or , the DNN and N-SSIAI corresponding to the two PDU sessions are the same.
  • the BSF will notify the AM PCF to delete the registration binding information and trigger the update of the AM policy. Since the PDU session #2 in SSC mode 2 and The DNN and S-NSSAI of the PDU #1 session are the same, and the AM policy #2 corresponding to the PDU #2 session is likely to be the same as the updated AM policy corresponding to the PDU #1 session, which will lead to repeated updates of the AM policy, resulting in a waste of resources .
  • the AM PCF (that is, the second policy control network element in the third aspect) needs to be combined according to (DDN, S-NSSAI) (corresponding to the DNN, S-NSSAI in information #a1 -NSSAI) corresponding PDU session #2 establishment and termination to determine the AM policy #2, or in other words, the application layer information based on which the AM PCF formulates the AM policy #2 does not include the application identifier (that is, the information # in Figure 5 a1); in the policy control method 800 of FIG.
  • the AM PCF (i.e., the second policy control network element in the fourth aspect) needs to correspond according to the application identification (corresponding to the application identification (application Id(s)) in the information #a2)
  • the AM policy #2 is determined by the start and end of the application, or in other words, the application layer information based on which the AM PCF formulates the AM policy #2 includes the application identifier (ie, the information #a2 in FIG. 5 ).
  • the AM PCF can combine (corresponding to DNN, S-NSSAI in information #a1) corresponding PDU session #2 and PDU session #1 according to (DDN, S-NSSAI) Establish and terminate to determine the AM strategy.
  • the AM PCF obtains the PDU session #2 and the establishment process of the PDU session #1 may be: the AM PCF obtains the above information #a1, and the information #a1 may include UE identification (such as SUPI or GPSI), service area coverage information and/or high-throughput indication information, and its associated (DNN, S-NSSAI), the AM PCF sends a subscription request message to the BSF according to information #a1, and the subscription request message is used to subscribe to the identity of the UE and (DNN , S-NSSAI) combination corresponding to the registration/de-registration event of the SM PCF binding information; BSF determines the corresponding SM PCF#1 or SM PCF according to the UE identifier and (DNN, S-NSSAI) combination in the subscription request message Binding information of #2, and send a subscription response message to AM PCF, the subscription response message includes the binding information of SM PCF#1 or SM PCF#2 (ie information #b1).
  • UE identification such as SUPI or
  • the information #b1 sent by the BSF to the AM PCF can indicate the completion of the establishment of the PDU session #2 or PDU session #1 corresponding to (DNN, S-NSSAI) in the information #a; the AM PCF knows the PDU session #2 and the PDU session # 1
  • the termination process may be: when the binding information of the SM PCF corresponding to the combination of the UE's identity and (DNN, S-NSSAI) is deleted by the BSF, the BSF sends a corresponding deletion notification to the AM PCF, and the BSF sends the AM PCF the
  • the deletion notification may indicate the termination of PDU session #2 or PDU session #1 corresponding to the combination of the UE identity and (DDN, S-NSSAI).
  • SMF#2 decides to adopt UPF reselection in SSC mode 2.
  • SMF#2 determines that the current path is not the optimal path, and therefore decides to reselect the UPF based on the SSC mode 2.
  • step S701 steps S401-S415 in FIG. 6 may also be performed.
  • step S701 the PDU session #2 has been established, and the AMF has received the AM policy #2 sent by the AM PCF.
  • the AM policy #2 is formulated according to the application layer information corresponding to the UE.
  • the formulation process of the AM policy #2 may be: the AM PCF receives the binding information of the SM PCF (which can be understood as the information triggering the update of the AM policy, such as the information #b1 in the method 300), and according to the UE identification , service area coverage information and/or high throughput indication information, and its associated (DNN, S-NSSAI) combination (corresponding to information #a1 in method 300) determines authorized AM policy #2, and sends to AMF; or, after the PDU session #2 is established, the AM PCF receives the application start event information (which can be understood as the information triggering the AM policy update, such as the information #b2 in the method 300), and according to the UE identity, service area coverage information and The/or high throughput indication information and its associated application ID (application Id(s)) (corresponding to information #a2 in method 300) determine authorized AM policy #2 and send it to AMF.
  • the AM PCF receives the binding information of the SM PCF (which can be understood as the information triggering the update of the AM
  • S702 SMF#2 requests UE to release PDU session #2 and establish PDU session #1, and PDU session #2 and PDU session #1 correspond to the same (DDN, S-NSSAI).
  • S703, SMF#2 sends a request message #c1 to SM PCF#2, and the request message #c1 is used to request to delete the SM policy association between SMF#2 and SM PCF#2 (or the SM policy association corresponding to PDU session #2) , the request message #c1 includes information #f, and the information #f is used to indicate that the deletion reason is service continuity of SSC mode 2.
  • the request message #c1 is an SM policy control deletion request (Npcf_SMPolicyControl_Delete request) message.
  • this step also includes: SM PCF#2 receives the request message #c1 sent by SMF#2, similarly, if the embodiment in this application only describes the steps of sending or receiving, it should be understood that if there is no special Instructions should also include the corresponding receiving or sending steps.
  • SM PCF#2 sends a request message #d1 (i.e. the first message in the third aspect) to the BSF, the request message #d1 is used to request the BSF to delete the binding information of the SM PCF#2, in the request message #d Including information #f and invalid indication information, the information #f is used to indicate that the deletion reason is the service continuity of SSC mode 2, and the invalid indication information is used to instruct the BSF to mark the binding information registered by SM PCF #2 as invalid.
  • a request message #d1 i.e. the first message in the third aspect
  • the request message #d1 is used to request the BSF to delete the binding information of the SM PCF#2
  • the request message #d Including information #f and invalid indication information
  • the information #f is used to indicate that the deletion reason is the service continuity of SSC mode 2
  • the invalid indication information is used to instruct the BSF to mark the binding information registered by SM PCF #2 as invalid.
  • the request message #d is a management desubscription request (Nbsf_Management_Deregister request) message.
  • the BSF receives the request message #d and marks the binding information of the SM PCF #2 as invalid.
  • BSF does not delete the binding information of SM PCF #2 after receiving the request message #d, but marks it as invalid, so that BSF will not notify AM PCF to delete the registration binding information, and will not trigger AM PCF's update to AM Policy #2.
  • UE establishes the same PDU session #1 as that of PDU session #2 (DDN, S-NSSAI), AMF selects SMF #1, and SMF #1 allocates UE address # for PDU session #1 2.
  • SMF#1 establishes SM policy association with SM PCF#1.
  • the process of establishing SM policy association between SMF#1 and SM PCF#1 may be: SMF#1 sends a message SM policy control establishment request (Npcf_SMPolicyControl_Createrequest) message to SM PCF#1, in the request message Including the UE's user ID, UE address #2, DDN and S-NSSAI, etc.; SM PCF #1 determines the UE's authorized SM policy according to the UE's user subscription information and network policies; SM PCF #1 sends SMF # 1. Return the SM policy control establishment response (Npcf_AMPolicyControl_Create response) message, which includes the SM policy authorized by the UE.
  • Npcf_SMPolicyControl_Createrequest SM policy control establishment request
  • SM PCF#1 registers with the BSF the binding information of SM PCF#1 (corresponding to the third message in the third aspect), the binding information includes UE address #2, UE identifier, PCF identifier 4, DNN, S-NSSAI.
  • PCF ID 4 is the resource ID that SM PCF#1 supports Npcf_PolicyAuthorization service, which can be understood as the PCF ID corresponding to SM PCF#1.
  • steps S705-S708 reference may be made to the relevant descriptions of S405-S407 in FIG. 6 , and details are not described here.
  • the BSF deletes the binding information of SM PCF#2.
  • the BSF saves the SM PCF#1's binding information, and deletes the invalid SM PCF#2 according to the UE identity, DDN and S-NSSAI binding information.
  • the timing for the BSF to delete the binding information of SM PCF#2 may also be: the BSF does not receive the request message of registering its binding information from SM PCF#1 in S708 within a predetermined period of time, and the BSF deletes the binding information of the SM PCF The binding information of #2 is deleted.
  • the BSF sends a request message #e1 (that is, the second message in the third aspect) to the AM PCF, and the request message #e1 is used to notify the AM PCF of deletion of the binding information of the SM PCF#2.
  • the request message #e1 may carry the binding information of the SM PCF #1.
  • the AM PCF determines not to update the AM policy #2 after receiving the request message #e1
  • the BSF will delete the binding information of SM PCF #2 immediately after receiving the request message #d, and send a message to AM PCF to notify AM
  • the PCF deletes the binding information of the SM PCF#2.
  • the BSF can carry this information #f when sending the deletion notification message to the AM PCF, which is used to indicate that the reason for the deletion is the service continuity of SSC mode 2 , the AM PCF can know that the reason for deletion is the service continuity of SSC mode 2 when receiving the notification message, so it is not necessary to repeatedly update the AM policy #2.
  • the BSF will immediately delete the binding information of SM PCF #2 after receiving the request message #d.
  • the BSF according to The information #f already knows that the reason for the deletion is the business continuity of SSC mode 2, so it is possible not to send the deletion notification message (that is, the request message #e1) to the AM PCF after deletion, so the AM PCF will not respond to the AM policy# 2 for repeated updates.
  • timing for BSF to delete the registration binding information of SM PCF#2 may be when BSF does not receive the request message of registration of binding information of SM PCF#1 in S708 within a predetermined period of time, and BSF deletes the registration binding information of SM PCF#2.
  • the binding information of PCF#2 is deleted; it can also be that BSF deletes after receiving the deregister (Nbsf_Management_Deregister) message (ie request message #d) sent by SM PCF#2; it can also be that when BSF receives SM PCF# After the request message of the registration binding information of 1, delete the previously invalid registration binding information of SM PCF#2 according to the UE identity, DDN and S-NSSAI corresponding to SM PCF#1.
  • the AM PCF can combine the establishment and termination of the corresponding PDU session #2 and PDU session #1, application identification (corresponding to Application Id(s)) corresponds to the start and end of the application (or the establishment/termination of the application layer session) to determine the AM policy.
  • application identification corresponding to Application Id(s)
  • the AM PCF learns the establishment and termination of the PDU session #2 and the PDU session #1 can refer to the relevant description in FIG. 9 , which will not be repeated here.
  • the manner in which the above-mentioned AM PCF learns the start and end of the application corresponding to the application identifier may be: the AM PCF obtains the above-mentioned information #a2, and the information #a2 may include UE identifier, service area coverage information and/or high throughput Quantity indication information, associated (DNN, S-NSSAI) combination, and associated application identifier; AM PCF sends a policy authorization subscription request message (that is, the fifth message in the fourth aspect) to SM PCF according to information #a2 , the policy authorization subscription request message is used to subscribe to the application start/end event corresponding to the application identifier; the AM PCF receives the policy authorization subscription response message sent by the SM PCF, and the response message includes the application start/end event corresponding to the above application identifier (ie Information #b2).
  • the information #b2 may indicate the application corresponding to the application identifier in the UE start/stop activation information #a2.
  • AM PCF can obtain information #f before receiving the notification of deletion of registration and binding information of SM PCF #2 sent by BSF, the information #f
  • the reason for indicating the deletion is the business continuity of SSC mode 2, so the AM PCF will not update the AM policy #2; after the PDU session #1 is established, the AM PCF receives the registration binding information of the SM PCF #1 , AM PCF will not update AM policy #2 according to the information #f; after PDU session #1 is established, when AM PCF receives the application start event information sent by SM PCF #1, AM PCF #f also does not update AM strategy #2.
  • S801, SMF#2 decides to adopt UPF reselection in SSC mode 2.
  • step S801 steps S401-S415 in FIG. 6 may also be performed.
  • step S801 the PDU session #2 has been established, and the AMF has received the AM policy #2 sent by the AM PCF.
  • the AM policy #2 is formulated according to the application layer information corresponding to the UE, and the application layer information includes the information accessed by the UE.
  • Application ID of the application (corresponding to information #a2 in method 300).
  • the formulation process of the AM strategy #2 may be: after the PDU session #2 is established, the AM PCF receives the application start event information (which can be understood as the information that triggers the update of the AM strategy, such as the information #b2 in the method 300) , and determine the authorized AM policy #2 according to the UE identity, service area coverage information and/or highthroughput indication information, and its associated application identity, and send it to the AMF.
  • the application start event information which can be understood as the information that triggers the update of the AM strategy, such as the information #b2 in the method 300
  • the authorized AM policy #2 according to the UE identity, service area coverage information and/or highthroughput indication information, and its associated application identity, and send it to the AMF.
  • S802 SMF#2 requests UE to release PDU session #2 and establish PDU session #1, and PDU session #2 and PDU session #1 correspond to the same (DDN, S-NSSAI).
  • SMF#2 sends a request message #c2 to SM PCF#2, and the request message #c2 is used to request to delete the SM policy association between SMF#2 and SM PCF#2 (or the SM policy association corresponding to PDU session #2) , the request message #c1 includes information #f, and the information #f is used to indicate that the deletion reason is service continuity of SSC mode 2.
  • steps S801-S803 reference may be made to the related description of steps S701-S703 in FIG. 9 , and details are not described here.
  • SM PCF#2 sends a request message #f (that is, the fourth message in the fourth aspect) to AM PCF, the request message #f is used to request the AM PCF to delete the application layer session of the UE, and the request message #f includes Information #f, the information #f is used to indicate that the deletion reason is the service continuity of SSC mode 2.
  • the AM PCF determines not to repeatedly update the AM policy #2 according to the information #f.
  • SM PCF#2 sends a request message #d2 to the BSF, and the request message #d2 is used to request the BSF to delete the binding information of the SM PCF#2.
  • the BSF deletes the binding information of SM PCF#2.
  • the BSF sends a request message #e2 to the AM PCF, and the request message #e1 is used to notify the AM PCF to delete the binding information of the SM PCF#2.
  • SMF#1 establishes SM policy association with SM PCF#1.
  • SM PCF#1 registers the binding information of SM PCF#1 with the BSF.
  • steps S808-S809 reference may be made to the related descriptions of S706-S708 in FIG. 9 , which are not described in detail here.
  • the BSF returns the binding information of the SM PCF#1 to the AM PCF.
  • S408 in FIG. 6 , and details are not repeated here.
  • the AM PCF determines not to update the AM policy #2 after receiving the binding information of the SM PCF#1.
  • the AM PCF receives the SM PCF#2 registration binding message deletion notification message sent by the BSF, the SM PCF#1 binding information, and the application end event sent by the SM PCF#2 (or delete the application layer session After the application start event (corresponding to the sixth message in the fourth aspect) sent by SM PCF #1, since AM PCF has obtained information #f, it knows that the reason for triggering the update of AM policy #2 is the SSC mode 2 business continuity (for example, the AM PCF already knows that the reason for the deletion of the registration binding message of SM PCF #2 is the business continuity of SSC mode 2), so the AM PCF will not repeatedly update the AM policy #2.
  • the AM PCF can also determine the AM policy #6 according to the user subscription, network policy, and UE application layer information corresponding to the PDU session #1, and compare whether the AM policy #2 is the same as the AM policy #6, if the AM policy # 2 Same as AM strategy #6, AM PCF determines not to update AM strategy #2, if AM strategy #2 is different from AM strategy #6, AM PCF can update AM strategy #2, the update process of AM strategy here can be Referring to the foregoing embodiments, details are not repeated here.
  • AM PCF when releasing PDU session #2 based on SSC mode 2, AM PCF will not receive the notification of deleting the registration binding information of SM PCF #2, and will not update the AM policy ; Or, the AM PCF can know the reason for deleting the SM PCF policy association through the information #f, and does not update the AM policy, thereby avoiding the repeated update of the AM policy and avoiding the waste of signaling resources.
  • AMF#1 may also be referred to as a new AMF or a target AMF
  • AMF#2 may also be referred to as an old AMF or a source AMF.
  • AM PCF#1, AM PCF#2, and SMF#1 And SMF#2 SM PCF#1 and SM PCF#2 can also adopt similar definitions, and will not repeat them here.
  • the policy control method provided by the present application has been described in detail above with reference to FIG. 4 to FIG. 10 . Based on the same technical concept, this application also provides a corresponding communication device.
  • the communication device provided by this application may include modules or units corresponding to one-to-one execution of the methods/operations/steps/actions in the above method embodiments. This unit may be The hardware circuit may also be software, or may be implemented by combining hardware circuits with software.
  • the communication device provided by this application will be described below with reference to FIG. 11 to FIG. 12 . These communication devices can be used to implement the functions of the AMF, AM PCF, and BSF in the method embodiments in FIGS.
  • the communication device may be an AMF, AM PCF, or BSF, or may be a module (such as a chip) applied to the AMF, AM PCF, or BSF.
  • FIG. 11 shows a schematic structural diagram of a communication device 900 .
  • the communication device includes a transceiver unit 910 and a processing unit 920 .
  • the communication device 900 is configured to implement the functions of the AMF, AM PCF, and BSF in the method embodiments shown in FIGS. 4 to 10 above.
  • the policy control network element receives first information, where the first information is used to indicate that the first mobility management policy of the terminal device is determined according to the application layer information of the terminal device.
  • the transceiving unit 910 is further configured to receive second information from a data management network element, where the second information is used to indicate that the subscription information of the terminal device corresponding to the first mobility management policy is deleted by the data management network element.
  • the processing unit 920 is configured to determine a target mobility management policy applied to the terminal device according to the first information.
  • the processing unit 920 is configured to determine the first mobility management policy as the target mobility management policy applied to the terminal device according to the first information; or, the processing unit 920 is configured to determine according to the The first information is sent to the policy control network element through the transceiving unit 910; and the transceiving unit 910 is further configured to receive third information from the policy control network element, the third information is used to indicate the The target mobility management policy of the terminal device is the first mobility management policy or the second mobility management policy, and the second mobility management policy is an updated version of the first mobility management policy determined by the policy control network element. a policy; and the processing unit 920, configured to determine the target mobility management policy according to the third information.
  • the control network element is a policy control network element that provides a mobility management policy for the first mobility management network element after the terminal equipment performs mobility management network element reselection, and the first mobility management policy performs mobility management for the terminal equipment
  • the mobility management policy executed by the second mobility management network element before network element reselection on the terminal device.
  • the transceiving unit 910 is configured to receive the first mobility management policy from the first mobility management network element, or the transceiving unit 910 is configured to receive the first mobility management policy from the data storage network element Strategy.
  • the transceiving unit 910 is further configured for the first mobility management network element to send first information, where the first information is used to indicate the target mobility management policy.
  • the transceiving unit 910 is further configured to acquire first indication information from the first mobility management network element, where the first indication information is used to indicate that the first mobility management policy is determined according to application layer information related to the terminal device of.
  • the processing unit 920 is further configured to determine a target mobility management policy to be executed by the first mobility management network element on the terminal device according to the first mobility management policy.
  • the processing unit 920 is further configured to formulate a second mobility management policy for the terminal device according to the first indication information.
  • the target mobility management policy includes the first mobility management policy or the second mobility management policy
  • the second mobility management policy is that the first policy controls the network element to be the terminal device Developed mobility management strategies.
  • the processing unit 920 is further configured to determine the second mobility management policy.
  • the processing unit 920 is further configured to determine the second mobility management policy according to the application layer information of the terminal device, the session information of the terminal device and/or the accessed application information.
  • the transceiving unit 910 is further configured to send a first request message to a binding support network element, where the first request message is used to request subscription to provide a session management policy for the first session of the terminal device
  • the third policy controls the registration or de-registration notification of the binding information of the network element
  • the transceiver unit 910 is further configured to receive a first notification message from the binding support network element, the first notification message includes the third The registration notification message of the binding information of the policy control network element or the de-registration notification message of the binding information of the third policy control network element.
  • the session information includes establishment and/or termination events of the first session corresponding to the terminal device.
  • the application information includes the start and/or end event of the first application accessed by the terminal device through the first session
  • the transceiver unit 910 is further configured to send the third policy control network
  • the element sends a second request message, and the second request message is used to request to subscribe to the start and/or end event of the first application; the transceiver unit 910 is also used to receive the second response message sent by the third policy control network element , the second response message includes a start or end event of the first application.
  • the second mobility management policy of the terminal device includes the service area restriction, and/or, a radio access technology or spectrum selection priority index
  • the processing unit 920 is configured to determine the second
  • the second mobility management policy includes: the processing unit 920, configured to determine the service area restriction corresponding to the second mobility management policy according to the service area coverage information in the application layer information, and/or, the processing unit 920, using The method is to determine the radio access technology or spectrum selection priority index corresponding to the second mobility management policy according to the high throughput indication information in the application layer information.
  • the first message when the communication device 900 is used to realize the function of the BSF in the method embodiment shown in FIG. Used to request the binding support network element to delete the first binding information of the first policy control network element, the first message includes a reason value for requesting deletion of the first binding information, and the first binding information includes End device identification, data network name and auxiliary information for single network slice selection.
  • the transceiving unit 910 is further configured to receive a third message from a third policy control network element, where the third message is used to request the binding support network element to register the second binding information of the third policy control network element, the first The second binding information includes the terminal device identifier, the data network name and the single network slice selection auxiliary information.
  • the processing unit 920 is configured to delay sending a second message to a second policy control network element when the cause value is service and session continuity mode 2, where the second message includes an Instruction information supporting network element deletion, the second policy control network element includes a policy control network element that has subscribed to the binding support network element for the first binding information.
  • the processing unit 920 is further configured to mark the first binding information as invalid according to the first message.
  • the processing unit 920 is further configured to delete the first binding information according to the second binding information.
  • the processing unit 920 is configured to delete the first binding information according to the second binding information
  • the transceiving unit 910 is further configured to send the second binding information to the second policy control network element Two news.
  • the processing unit 920 is further configured to delete the first binding information if the binding support network element does not receive a third message within a predetermined time period, and the third message is used to request the binding support network element to register the first binding information.
  • the second binding information of the policy control network element includes the terminal device identifier, the data network name, and the single network slice selection auxiliary information; and the processing unit 920 is used to delay sending to the second policy control network
  • the element sending the second message includes: the processing unit 920, configured to delete the first binding information, and the transceiving unit 910, further configured to send the second message to the second policy control network element.
  • the transceiver unit 910 is used to control
  • the network element receives a fourth message, the fourth message is used to request the second policy control network element to delete the first application layer session of the terminal device, the fourth message includes a reason value for requesting to delete the first application layer session, the The first application layer session is the application layer session used when the terminal device accesses the first application through the first session.
  • the processing unit 920 is configured to delay updating the first mobility management policy formulated by the second policy control network element for the terminal equipment when the cause value is service and session continuity mode 2.
  • the processing unit 920 is further configured to formulate the first mobility management policy according to the application layer information of the terminal device.
  • the transceiving unit 910 is further configured to send a fifth message, the fifth message is used to subscribe to the start and/or end event of the first application; the transceiving unit 910 is also used to receive the start event of the first application sent by the first policy control network element.
  • the processing unit 920 being configured to delay updating the first mobility management policy includes: the receiving unit 910 is further configured to receive the information used to trigger the second policy control network element to update the first mobility management policy.
  • the sixth message of the property management policy includes at least one of the following: a deletion notification of the first binding information of the first policy control network element sent by the binding support network element, a notification sent by the binding support network element providing a registration notification of the second binding information of the third policy control network element of the session management policy for the second session of the terminal device, and an event notification of the start of the first application sent by the third policy control network element; the processing unit 920, configured to delay updating the first mobility management policy after receiving the sixth information.
  • the transceiving unit 910 is further configured to send the third policy control network element Sending a seventh message, where the seventh message is used to subscribe the third policy control network element to the start and/or end event of the first application.
  • Fig. 12 is a structural block diagram of a communication device 1000 provided according to an embodiment of the present application.
  • the communication device 1000 shown in FIG. 12 includes: a processor 1010 and a communication interface 1030 .
  • the communication device 1000 may further include a memory 1020 .
  • the memory 1020 may be coupled with the processor 1010 for executing instructions stored in the memory to control the communication interface 1030 to send and/or receive signals.
  • processor 1010 and memory 1020 may be combined into one processing device, and the processor 1010 is configured to execute program codes stored in the memory 1020 to implement the foregoing functions.
  • the memory 1020 may also be integrated in the processor 1010, or be independent of the processor 1010, which is not limited in this application.
  • the communication device 1000 may be the communication device corresponding to the above method embodiment, or may be a chip for realizing the function of the communication device corresponding to the above method embodiment.
  • the communication device 1000 may correspond to the communication device corresponding to the communication method in FIG. 4 to FIG. 10 according to the embodiment of the present application, and the communication device 1000 may include a unit for executing the communication method in FIG. 4 to FIG. 10 .
  • each unit in the communication device 1000 and the above-mentioned other operations and/or functions are for executing corresponding procedures of the communication method. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • the chip When the communication device 1000 is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input-output circuit or a communication interface;
  • the processing unit may be a processor or a microprocessor or an integrated circuit integrated on the chip.
  • the embodiment of the present application also provides a processing device, including a processor and an interface.
  • the processor may be used to execute the communication method in the foregoing method embodiments.
  • the above processing device may be a chip.
  • the processing device may be a field programmable gate array (field programmable gate array, FPGA), an application specific integrated circuit (ASIC), or a system chip (system on chip, SoC). It can be a central processor unit (CPU), a network processor (network processor, NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller unit) , MCU), can also be a programmable controller (programmable logic device, PLD) or other integrated chips.
  • CPU central processor unit
  • NP network processor
  • DSP digital signal processor
  • microcontroller micro controller unit
  • PLD programmable logic device
  • each step of the above method can be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software.
  • the steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
  • the processor in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
  • each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components .
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field-programmable gate array
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • static RAM static random access memory
  • dynamic RAM dynamic random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory direct ram-bus RAM, DR RAM
  • direct ram-bus RAM direct ram-bus RAM
  • the chip implements the functions of the communication device in the above method embodiment.
  • the chip receives information from other modules in the communication device (such as a radio frequency module or an antenna); or, the chip sends information to other modules in the communication device (such as a radio frequency module or an antenna).
  • the present application also provides a computer program product, the computer program product including: a computer program or instruction, when the computer program or instruction is run on a computer, the Any policy control method in any one of the illustrated embodiments is executed.
  • the present application also provides a computer program, when the computer program is run on the computer, any policy control method in any one of the embodiments shown in Figure 4 and Figure 10 method is executed.
  • the present application also provides a computer-readable medium, the computer-readable medium stores a program or an instruction, and when the program or instruction is run on a computer, the Any communication method in any one of the embodiments is executed.
  • the present application further provides a system, which includes the foregoing apparatus or equipment.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transferred from a website, computer, server, or data center by wire (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc, SSD) ))Wait.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state disk (solid state disc, SSD)
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computing device and the computing device can be components.
  • One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • a component may, for example, be based on a signal having one or more packets of data (e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems). Communicate through local and/or remote processes.
  • packets of data e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems.
  • the transceiver unit executes the steps of receiving, sending or acquiring in the method embodiments, except Steps other than sending and receiving may be performed by a processing unit (processor).
  • a processing unit processor
  • the functions of the specific units reference may be made to the corresponding method embodiments. Wherein, there may be one or more processors.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or can be Integrate into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the unit described as a separate component may or may not be physically separated, and the component shown as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种策略控制的方法、装置和系统,该策略控制的方法包括:移动性管理网元从提供移动性管理策略的策略控制网元接收第一信息,所述第一信息用于指示终端设备的第一移动性管理策略是根据所述终端设备的应用层信息确定的;所述移动性管理网元从数据管理网元接收第二信息,所述第二信息用于指示所述第一移动性管理策略对应的所述终端设备的签约信息被所述数据管理网元删除;所述移动性管理网元根据所述第一信息确定应用于所述终端设备的目标移动性管理策略。本申请提供的策略控制方法、装置和系统,能够避免移动性管理策略的重复更新对资源造成的浪费,还能够保证终端设备访问应用时的用户体验。

Description

一种策略控制的方法、装置和系统
本申请要求于2021年6月25日提交中国专利局、申请号为202110714623.5、申请名称为“一种策略控制的方法、装置和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,并且更具体地,涉及一种策略控制的方法、装置和系统。
背景技术
在5G通信系统中,当UE注册到AMF时,AMF会与AM PCF(也称为服务UE的PCF,a PCF for UE)交互,建立接入和移动性管理(access and mobility management,AM)策略关联(AM policy association)。AM PCF制定AM策略提供给AMF,用于AMF的策略执行。其中AM Policy包括服务区域限制(service area restrictions)和无线频谱选择优先级(RAT/frequency selection priority,RFSP),其中RAT为无线接入技术(radio access technology,RAT),即网络制式;服务区域限制信息用于表示允许UE接入的区域或不允许UE接入的区域,AMF会将服务区域限制信息发送给RAN和UE;无线频谱选择优先级信息用于RAN确定无线资源管理策略,AMF会将RFSP发送给RAN。
AM PCF可以根据用户签约和网络策略制定AM策略,也可以进一步地根据UE提供的应用层信息制定AM策略,现有机制中AM策略会进行频繁重复的更新,造成了资源的浪费,也无法保障终端设备访问应用时的用户体验。
发明内容
本申请提供一种策略控制的方法、装置和系统,能够避免移动性管理策略的重复更新对资源造成的浪费,还能够保证终端设备访问应用时的用户体验。
第一方面,提供了一种策略控制方法,包括:移动性管理网元从提供移动性管理策略的策略控制网元接收第一信息,该第一信息用于指示终端设备的第一移动性管理策略是根据该终端设备的应用层信息确定的;该移动性管理网元从数据管理网元接收第二信息,该第二信息用于指示该第一移动性管理策略对应的该终端设备的签约信息被该数据管理网元删除;该移动性管理网元根据该第一信息确定应用于该终端设备的目标移动性管理策略。
需要说明的是,该第一移动性管理策略可以包括服务区域限制(以下称为第一参数)和/或无线接入技术或无线频谱选择优先级(以下称为第二参数)。
可选地,该第一信息可以是一个独立的指示信息,用于指示移动性管理网元(即移动性管理网元)从策略控制网元(即策略控制网元)获取的终端设备的第一移动性管理策略是根据终端设备的应用层信息制定的,该第一信息也可以是携带授权的第一移动性管理策略的特殊信元,根据该特殊信元可以确定该移动性管理策略是根据终端设备的应用层信息 确定的。
可选地,移动性管理网元可以在获取该第一移动性管理策略的同时获取该第一信息。
应理解,移动性管理网元可以在接收数据管理网元发送的第二信息之前接收该第一信息,也可以在接收数据管理网元发送的第二信息之后接收该第一信息,本申请在此不作限定。
在一种可能的实现方式中,该方法还包括:移动性管理网元接收策略控制网元发送的第一移动性管理策略,该第一移动性管理策略是策略控制网元根据终端设备的应用层信息为策略控制网元制定的应用于终端设备的移动性管理策略,该应用层信息可以是策略控制网元从应用功能网元接收的。
在一种可能的实现方式中,该方法还包括:移动性管理网元在接收到目标移动性管理策略后对该终端设备执行该目标移动性管理策略。
在一种可能的实现方式中,该目标移动性管理策略可以是该第一移动性管理策略。
可选地,在重选移动性管理网元和对应的策略控制网元的场景下(例如终端设备位置的移动导致的移动性管理网元和策略控制网元的重选),该移动性管理网元还可以从该终端设备执行移动性管理网元重前的源移动性管理网元接收该第一信息。
根据本申请实施例的策略控制方法,当用户的签约信息改变,数据管理网元删除终端设备的签约信息时,会向移动性管理网元发送终端设备的签约信息删除的通知,当移动性管理网元接收到数据管理网元发送的该终端设备的签约信息的删除通知时,可以根据接收到的第一信息确定目标移动性管理策略。可以避免移动性管理网元接收到数据管理网元发送的该终端设备的签约信息的删除通知时直接将针对于该终端设备的差异化的第一移动性管理策略删除并根据本地配置制定通用的移动性管理策略应用于该终端设备,可以避免数据管理网元中终端设备的签约信息的删除导致的移动性管理网元中差异化的第一移动性管理策略不必要的删除,也避免了应用功能网元重复请求根据应用层信息制定或者更新移动性管理策略,还避免了重复请求导致的策略控制网元对移动性管理策略的重复更新,节省了信令资源,同时可以保障根据应用层信息制定或者更新移动性管理策略的请求得到满足,从而保障了终端设备访问应用的用户体验。
结合第一方面,在第一方面的某些实现方式中,该移动性管理网元根据该第一信息确定应用于该终端设备的目标移动性管理策略包括:该移动性管理网元根据该第一信息将该第一移动性管理策略确定为应用于该终端设备的该目标移动性管理策略;或者该移动性管理网元根据该第一信息向该策略控制网元发送该第二信息;该移动性管理网元从该策略控制网元接收第三信息,该第三信息用于指示应用于该终端设备的该目标移动性管理策略为该第一移动性管理策略或者第二移动性管理策略,该第二移动性管理策略为该策略控制网元确定的该第一移动性管理策略更新后的策略。
在一种可能的实现方式中,上述目标移动性管理策略可以是该第一移动性管理策略,示例性地,移动性管理网元根据该第一信息将该第一移动性管理策略确定为目标移动性管理策略,或者,移动性管理网元根据该第一信息向策略控制网元发送该第二信息,同时向策略控制网元请求应用于该终端设备的移动性管理策略,策略控制网元判断不需要对该第一移动性管理策略进行更新,或者说,策略控制网元确定继续执行之前授权的第一移动性管理策略;上述目标移动性管理策略还可以是策略控制网元制定的第二移动性管理策略, 该第二移动性管理策略为策略控制网元确定的该第一移动性管理策略更新后的策略,示例性地,移动性管理网元根据该第一信息向策略控制网元发送该第二信息,同时向策略控制网元请求应用于该终端设备的移动性管理策略,策略控制网元判断需要对该第一移动性管理策略进行更新并确定该第二移动性管理策略;上述目标移动性管理策略还可以是移动性管理网元根据本地配置确定的通用的移动性管理策略,示例性地,移动性管理网元根据该第一信息向策略控制网元发送该第二信息,同时向策略控制网元请求应用于该终端设备的移动性管理策略,策略控制网元判断对该第一移动性管理策略进行删除,移动性管理网元也对该第一移动性管理策略删除并根据移动性管理网元的本地配置确定通用的移动性管理策略。
在一种可能的实现方式中,上述第三信息可以用于指示应用于该终端设备的该目标移动性管理策略为该第一移动性管理策略,示例性地,该第三信息为指示移动性管理网元继续执行该第一移动性管理策略的指示信息,或者,该第三信息可以包括该第一移动性管理策略中的第一参数和/或第二参数;上述第三信息也可以用于指示应用于该终端设备的该目标移动性管理策略为第二移动性管理策略,示例性地,该第三信息可以包括该第二移动性管理策略中的第一参数和/或第二参数;上述第三信息可以用于指示该第一移动性管理策略被删除,此时移动性管理网元可以根据本地配置确定通用的移动性管理策略。
根据本申请实施例的策略控制方法,当用户的签约信息改变,数据管理网元删除终端设备的签约信息时,会向移动性管理网元发送终端设备的签约信息删除的通知,当移动性管理网元接收到数据管理网元发送的该终端设备的签约信息的删除通知时,当移动性管理网元接收到数据管理网元发送的终端设备的签约信息的删除通知时,可以根据该第一信息继续执行授权的第一移动性管理策略;也可以根据该第一信息与策略控制网元进行交互,进一步确定目标移动性管理策略。可以避免移动性管理网元接收到数据管理网元发送的该终端设备的签约信息的删除通知时直接将针对于该终端设备的差异化的第一移动性管理策略删除并根据本地配置制定通用的移动性管理策略应用于该终端设备,可以避免数据管理网元中终端设备的签约信息的删除导致的移动性管理网元中差异化的第一移动性管理策略不必要的删除,也避免了应用功能网元重复请求根据应用层信息制定或者更新移动性管理策略,还避免了重复请求导致的策略控制网元对移动性管理策略的重复更新,节省了信令资源,同时可以保障根据应用层信息制定或者更新移动性管理策略的请求得到满足,从而保障了终端设备访问应用的用户体验。
结合第一方面,在第一方面的某些实现方式中,该终端设备的移动性管理策略中包括以下至少一项:业务区域限制(即第一参数)、无线接入技术或频谱选择优先级索引(即第二参数)。
在一种可能的实现方式中,终端设备的签约信息中包括以下至少一项:签约的业务区域限制(即第一参数)、签约的无线接入技术或频谱选择优先级索引(即第二参数)。
需要说明的是,终端设备的用户签约信息中可以包括签约的第一参数和/或第二参数,终端设备的应用层信息也可以包括应用层信息对应的第一参数和/或第二参数,移动性管理策略中也可以包括授权的第一参数和/或第二参数。
结合第一方面,在第一方面的某些实现方式中,该签约信息与移动性管理策略相对应,示例性地,若该签约信息为签约的业务区域限制,该终端设备的移动性管理策略为业务区 域限制;和/或,若该签约信息为签约的无线接入技术或频谱选择优先级索引,该终端设备的移动性管理策略为无线接入技术或频谱选择优先级索引。
第二方面,提供了一种策略控制方法,包括:第一策略控制网元获取第一移动性管理策略,该第一策略控制网元为给终端设备执行移动性管理网元重选后的第一移动性管理网元提供移动性管理策略的策略控制网元,该第一移动性管理策略为该终端设备执行移动性管理网元重选前的第二移动性管理网元对该终端设备执行的移动性管理策略;该第一策略控制网元根据该第一移动性管理策略和该第一策略控制网元为该终端设备制定的第二移动性管理策略确定该第一移动性管理网元对该终端设备执行的目标移动性管理策略;该第一策略控制网元向该第一移动性管理网元发送第一信息,该第一信息用于指示该目标移动性管理策略。
还需要说明的是,该第一移动性管理策略可参考第一方面的相关描述,在此不再赘述。在一种可能的实现方式中,该目标移动性管理策略可以为该第一移动性管理策略,示例性地,该第一策略控制网元为该第一移动性管理网元制定应用于该终端设备的第二移动性管理策略,该第一策略控制网元判断该第一移动性管理策略与该第二移动性管理策略是否相同,若相同,则该第一策略控制网元确定不需要对该第一移动性管理策略进行更新,此时该目标移动性管理策略为该第一移动性管理策略,该第一策略控制网元指示该第一移动性管理网元执行该第一移动性管理策略。
在一种可能的实现方式中,该目标移动性管理策略可以为第二移动性管理策略,该第一策略控制网元为该第一移动性管理网元制定应用于该终端设备的第二移动性管理策略,该第一策略控制网元判断该第一移动性管理策略与该第二移动性管理策略是否相同,若不相同,则该第一策略控制网元确定对该第一移动性管理策略进行更新,此时该目标移动性管理策略为该第二移动性管理策略,该第一策略控制网元指示该第一移动性管理网元执行该第二移动性管理策略。
可选地,在该第一策略控制网元确定该目标移动性管理策略之前,该方法还可以包括:该第一策略控制网元从该第一移动性管理网元接收第二信息,该第二信息用于请求该第一移动性管理网元对该终端设备执行的目标移动性管理策略。
根据本申请实施例的策略控制方法,在重选移动性管理网元和对应的策略控制网元的场景下(例如终端设备位置的移动导致的移动性管理网元和策略控制网元的重选),重选后的第一策略控制网元能够获取到重选前的第二移动性管理网元对终端设备执行的第一移动性管理策略,能够根据该第一移动性管理策略和第一策略控制网元为第一移动性管理网元制定的应用于该终端设备的第二移动性管理策略判断是否需要更新移动性管理策略,避免了重选后的第一策略控制网元对该第一移动性管理策略的重复更新,节省了信令资源和时间,进一步保障了用户体验。
结合第二方面,在第二方面的某些实现方式中,该第一策略控制网元获取该第一移动性管理策略包括:该第一策略控制网元从该第一移动性管理网元接收该第一移动性管理策略,或者,该第一策略控制网元从数据仓储网元接收该第一移动性管理策略。
在一种可能的实现方式中,该第一策略控制网元从该第一移动性管理网元接收该第一移动性管理策略,示例性地,该过程可以是:第一移动性管理网元从第二移动性管理网元获取第一移动性管理策略,并向第一策略控制网元发送该第一移动性管理策略。
在一种可能的实现方式中,该第一策略控制网元从数据仓储网元接收该第一移动性管理策略,示例性地,该过程可以是:第二策略控制网元将确定的授权的第一移动性管理策略保存到数据仓储网元;第一策略控制网元向数据仓储网元获取该第二策略控制网元对应的第一移动性管理策略。
结合第二方面,在第二方面的某些实现方式中,该第一策略控制网元根据该第一移动性管理策略和该第一策略控制网元为该终端设备制定的第二移动性管理策略确定该第一移动性管理网元对该终端设备执行的目标移动性管理策略包括:若该第一移动性管理策略与该第二移动性管理策略相同,该第一策略控制网元确定该目标移动性管理策略为该该第一移动性管理策略或者该第二移动性管理策略;若该第一移动性管理策略与该第二移动性管理策略不相同,该第一策略控制网元确定该目标移动性管理策略为该该第二移动性管理策略。
结合第二方面,在第二方面的某些实现方式中,该第一策略控制网元还从该第一移动性管理网元获取第一指示信息,该第一指示信息用于指示该第一移动性管理策略是根据与该终端设备相关的应用层信息确定的,以及该方法还包括:该第一策略控制网元根据该第一指示信息为该终端设备制定第二移动性管理策略。
在一种可能的实现方式中,第一策略控制网元根据接收到的第一移动性管理策略中的第一参数和/或第二参数,或者上述第一指示信息,确定不立即根据用户签约和网络策略制定对应于第一移动性管理网元的第二移动性管理策略,也可以理解为,第一策略控制网元根据接收到的第一移动性管理策略中的第一参数和/或第二参数,或者上述第一指示信息,确定该终端设备对应的移动性管理策略是根据应用层信息制定的,因此会等到后续接收到相应的应用层信息时再根据该应用层信息确定该终端设备对应的第二移动性管理策略。
在一种可能的实现方式中,所述方法还包括:该第一策略控制网元接收来自第一移动性管理网元的移动性管理策略建立请求,该移动性管理策略建立请求用于请求该第一移动性管理网元对该终端设备执行的目标移动性管理策略。可选地,该第一指示信息可以携带于该移动性管理策略建立请求中,上述第一移动性管理策略也可以携带于该移动性管理策略建立请求中。
根据本申请实施例的策略控制方法,避免了第一策略控制网元接收到第一移动性管理网元的移动性管理策略建立请求时立即根据终端设备的签约信息和网络信息确定移动性管理策略,在收到终端设备对应的应用层信息时再次对该移动性管理策略进行更新导致的资源浪费。
结合第二方面,在第二方面的某些实现方式中,该目标移动性管理策略包括该第一移动性管理策略或者第二移动性管理策略,该第二移动性管理策略为该第一策略控制网元为该终端设备制定的移动性管理策略。
结合第二方面,在第二方面的某些实现方式中,若该目标移动性管理策略包括该第二移动性管理策略,该方法还包括:该第一策略控制网元向应用功能网元发送该第二移动性管理策略。
示例性地,若应用功能网元向第一策略控制网元订阅了服务区域限制(即第一参数)改变的事件和/或无线接入技术或无线频谱选择优先级(即第二参数)改变的事件,当第 一策略控制网元确定该目标移动性管理策略为该第二移动性管理策略,即第一策略控制网元对该第一移动性管理策略中的第一参数和/或进行了更新,第一策略控制网元会向应用功能网元发送更新后的该第二移动性管理策略的第一参数和/或第二参数。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该第一策略控制网元根据该终端设备的应用层信息、该终端设备的会话信息和/或访问的应用信息确定该第二移动性管理策略。
在一种可能的实现方式中,该第一策略控制网元根据该终端设备的应用层信息和该终端设备的会话信息确定该第二移动性管理策略,其中,该终端设备的会话信息用于触发该第一策略控制网元制定该第二移动性管理策略,该终端设备的应用层信息用于该第一策略控制网元确定该第二移动性管理策略中的第一参数和/或第二参数,或者可以说,该终端设备的应用层信息用于该第一策略控制网元确定该第一移动性管理策略中的第一参数和/或第二参数更新后的第一参数和/或第二参数。该终端设备的会话信息可以包括该终端设备对应的第一会话的建立和/或终结事件,比如为该第一会话提供会话管理策略的策略控制网元的绑定信息的注册/去注册信息,该终端设备的应用层信息可以包括服务区域覆盖范围信息和/或高吞吐量的指示信息。
在一种可能的实现方式中,该第一策略控制网元根据该终端设备的应用层信息和该终端设备访问的应用信息确定该第二移动性管理策略,其中,该终端设备访问的应用信息用于触发该第一策略控制网元制定该第二移动性管理策略,该终端设备的应用层信息用于该第一策略控制网元确定该第二移动性管理策略中的第一参数和/或第二参数,或者可以说,该终端设备的应用层信息用于该第一策略控制网元确定该第一移动性管理策略中的第一参数和/或第二参数更新后的第一参数和/或第二参数。该终端设备访问的应用信息可以包括该终端设备通过第一会话访问的第一应用的开始和/或结束的事件,该终端设备的应用层信息可以包括服务区域覆盖范围信息和/或高吞吐量的指示信息。
可选地,该终端设备的应用层信息还可以包括该终端设备的标识、该会话对应的数据网络名称(data network name,DNN)和网络切片选择辅助信息(single-network slice selection assistance information,S-NSSAI)。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该第一策略控制网元向绑定支持网元发送第一请求消息,该第一请求消息用于请求订阅为该终端设备的第一会话提供会话管理策略的第三策略控制网元的绑定信息的注册或者去注册通知;该第一策略控制网元接收来自该绑定支持网元的第一通知消息,该第一通知消息包括该第三策略控制网元的绑定信息的注册通知消息或者该第三策略控制网元的绑定信息的去注册通知消息。
在一种可能的实现方式中,若该第一策略控制网元根据该终端设备的应用层信息和该终端设备的会话信息确定该第二移动性管理策略,该第一策略控制网元会向绑定支持网元发送上述第一请求消息,当该终端设备的会话建立完成或者释放后,该第一策略控制网元会接受该终端设备对应的第一会话的建立和/或终结事件,比如来自绑定支持网元的该会话对应的提供会话策略的策略控制网元的绑定信息的注册/去注册通知消息。应理解,该提供会话策略的策略控制网元的绑定信息的注册/去注册通知消息可用于触发该第一策略控制网元制定该第二移动性管理策略,或者说,可用于触发该第一策略控制网元对该第一移动性管理策略进行更新。
结合第二方面,在第二方面的某些实现方式中,该会话信息包括该终端设备对应的第一会话的建立和/或终结事件。
结合第二方面,在第二方面的某些实现方式中,述应用信息包括该终端设备通过第一会话访问的第一应用的开始和/或结束的事件,以及该方法还包括:该第一策略控制网元向该第三策略控制网元发送第二请求消息,该第二请求消息用于请求订阅该第一应用的开始和/或结束的事件;该第一策略控制网元接收该第三策略控制网元发送第二响应消息,该第二响应消息包括该第一应用的开始或者结束的事件。
在一种可能的实现方式中,若该第一策略控制网元根据该终端设备的应用层信息和该终端设备访问的应用信息确定该第二移动性管理策略,该第一策略控制网元会向绑定支持网元发送上述第二请求消息,当该终端设备开始/结束通过第一会话访问的第一应用后,该第一策略控制网元会接受该第一应用的开始和/或结束的事件,比如来自提供会话策略的策略控制网元的该会话对应的提供会话策略的策略控制网元的该第一应用的开始和/或结束的事件。应理解,该第一应用的开始和/或结束的事件可用于触发该第一策略控制网元制定该第二移动性管理策略,或者说,可用于触发该第一策略控制网元对该第一移动性管理策略进行更新。
结合第二方面,在第二方面的某些实现方式中,该终端设备的移动性管理策略包括以下至少一项:业务区域限制、无线接入技术或频谱选择优先级索引。
结合第二方面,在第二方面的某些实现方式中,该终端设备的第二移动性管理策略包括该业务区域限制,和/或,无线接入技术或频谱选择优先级索引,以及该第一策略控制网元确定该第二移动性管理策略包括:该第一策略控制网元根据该应用层信息中的服务区域覆盖范围信息确定该第二移动性管理策略对应的业务区域限制,和/或,该第一策略控制网元根据该应用层信息中的高吞吐量指示信息确定该第二移动性管理策略对应的无线接入技术或频谱选择优先级索引。
在一种可能的实现方式中,该终端设备的应用层信息包括服务区域覆盖范围信息和/或高吞吐量指示信息,该服务区域覆盖范围信息用于该第一策略控制网元确定第二移动性管理策略中的第一参数,或者说,该服务区域覆盖范围信息用于该第一策略控制网元对第一移动性管理策略中的第一参数进行更新,该高吞吐量信息用于该第一策略控制网元确定第二移动性管理策略中的第二参数,或者说,该高吞吐量信息用于该第一策略控制网元对第一移动性管理策略中的第二参数进行更新。
第三方面,提供了一种策略控制方法,包括:绑定支持网元从第一策略控制网元接收第一消息,该第一消息用于请求该绑定支持网元删除该第一策略控制网元的第一绑定信息,该第一消息中包括请求删除该第一绑定信息的原因值,该第一绑定信息中包括终端设备标识、数据网络名和单个网络切片选择辅助信息;当该原因值为业务和会话连续性模式2时,该绑定支持网元延迟向第二策略控制网元发送第二消息,该第二消息中包括指示该第一绑定信息被该绑定支持网元删除的指示信息,该第二策略控制网元包括向该绑定支持网元订阅了该第一绑定信息的策略控制网元。
需要说明的是,在SSC模式2的场景下,可将终端设备释放的会话称为第一会话,将终端设备新建的会话称为第二会话,将向该绑定支持网元订阅了该第一绑定信息的策略控制网元记做第二策略控制网元,为该第一会话提供会话策略的策略控制网元记做第一策 略控制网元,为该第二会话提供会话策略的策略控制网元可记做第三策略控制网元,。
还需要说明的是,上述延迟发送可以理解为不立即发送,或者在预定时间段内不发送,其中,该预定时间段可以是绑定支持网元从接收上述第一消息到接收第三策略控制网元的注册绑定通知(即下述第三消息)之间的时间段,也可以是预定义的时间段,在此不做限定。
还需要说明的是,现有技术中,若第二策略控制网元向绑定支持网元订阅了终端设备标识和会话标识对应的提供会话策略的策略控制网元的绑定信息的注册/去注册事件,该会话标识包括数据网络名和单个网络切片选择辅助信息,当该会话标识对应的会话释放或者建立完成后,第二策略控制网元会接收到绑定支持网元发送的终端设备标识和会话标识对应的提供会话策略的策略控制网元的绑定信息的注册/去注册通知,之后第二策略控制网元会对当前授权的移动性管理策略进行更新。
还需要说明的是,在SSC模式2的场景下,该第一会话和该第二会话对应的数据网络名和单个网络切片选择辅助信息相同,在此情况下,第二策略控制网元制定的移动性管理网元在第一会话中对该终端设备执行的第一移动性管理策略和移动性管理网元在第二会话中对该终端设备执行的第二移动性管理策略可以是相同的,因此在释放第一会话的过程中,若第二策略控制网元收到绑定支持网元发送的该第一策略控制网元的第一绑定信息的去注册或者删除通知,第二策略控制网元可以不对该第一移动性管理策略进行更新。
还需要说明的是,在该实现方式中,第二策略控制网元可以根据第一会话的释放(终结)和第二会话是建立来制定(确定)移动性管理策略,可以理解为对第一会话对应的第一移动性管理策略进行更新或者制定第二会话对应的第二移动性管理策略。
根据本申请实施例的策略控制方法,在SSC模式2的场景下,当释放第一会话时,第二策略控制网元不会接收到来自绑定支持网元的删除第一策略控制网元的注册绑定信息的通知,也就不会对移动性管理策略进行更新,从而避免了移动性管理策略的重复更新,避免了信令资源的浪费。
结合第三方面,在第三方面的某些实现方式中,该方法还包括:该绑定支持网元根据该第一消息将该第一绑定信息标记为无效。
在一种可能的实现方式中,该第一消息携带无效第一策略控制网元注册绑定信息的指示信息,绑定支持网元会根据该第一消息对第一策略控制网元注册绑定信息进行无效,绑定支持网元也就不会向第二策略控制网元发送该第二消息,也就不会触发第二策略控制网元对移动性管理策略进行重复更新,节省了通信资源。
结合第三方面,在第三方面的某些实现方式中,该方法还包括:该绑定支持网元从第三策略控制网元接收第三消息,该第三消息用于请求该绑定支持网元注册该第三策略控制网元的第二绑定信息,该第二绑定信息包括该终端设备标识、该数据网络名和该单个网络切片选择辅助信息。
需要说明的是,在SSC模式2的场景下,该第一会话和该第二会话对应的数据网络名和单个网络切片选择辅助信息相同,在此情况下,第二策略控制网元制定的移动性管理网元在第一会话中对该终端设备执行的第一移动性管理策略和移动性管理网元在第二会话中对该终端设备执行的第二移动性管理策略可以是相同的,因此在新建第二会话的过程中,当第二策略控制网元收到绑定支持网元发送的该第二会话对应的第三策略控制网元的 第二绑定信息的注册通知时,可以不对该第一移动性管理策略进行更新。
在一种可能的实现方式中,在SSC模式2的场景下,在第二会话的新建过程中,绑定支持网元会接收到该第二会话对应的第三策略控制网元的第二绑定信息的注册请求(即第三消息),根据第二策略控制网元向绑定支持网元的订阅,绑定支持网元会向第二策略控制网元发送该第二绑定信息的注册通知,该第二绑定信息的注册通知可以标识该第二会话的建立完成。
可选地,绑定支持网元可以存储该第二绑定信息。
结合第三方面,在第三方面的某些实现方式中,该方法还包括:该绑定支持网元根据该第二绑定信息删除该第一绑定信息;以及该绑定支持网元延迟向第二策略控制网元发送第二消息包括:该绑定支持网元根据该第二绑定信息删除该第一绑定信息后向该第二策略控制网元发送该第二消息。
在一种可能的实现方式中,在释放该第一会话的过程中,当绑定支持网元接收到第一策略控制网元发送的删除该第一策略控制网元的第一绑定信息的请求时不会立即对该第一绑定信息进行删除,而是等到绑定支持网元收到上述第三消息(或者该第二绑定信息)后再删除该第一绑定信息,并向第二策略控制网元发送该第一绑定信息的删除(去注册)通知(即第二消息)。可选地,绑定支持网元可以同时向第二策略控制网元发送该第一绑定信息的删除通知和该第二绑定信息的注册通知。可以减少移动性管理策略的重复更新,节省通信资源。
结合第三方面,在第三方面的某些实现方式中,该方法还包括:若该绑定支持网元在预定时间段内未接收到第三消息,该绑定支持网元删除该第一绑定信息,该第三消息用于请求该绑定支持网元注册第三策略控制网元的第二绑定信息,该第二绑定信息包括该终端设备标识、该数据网络名和该单个网络切片选择辅助信息;以及该绑定支持网元延迟向第二策略控制网元发送第二消息包括:该绑定支持网元删除该第一绑定信息后向该第二策略控制网元发送该第二消息。
在一种可能的实现方式中,在释放该第一会话的过程中,当绑定支持网元接收到第一策略控制网元发送的删除该第一策略控制网元的第一绑定信息的请求时不会立即对该第一绑定信息进行删除,而是等到当绑定支持网元在预定时间段内还未收到上述第三消息(或者该第二绑定信息)后再删除该第一绑定信息,并向第二策略控制网元发送该第一绑定信息的删除(去注册)通知。可选地,绑定支持网元可以同时向第二策略控制网元发送该第一绑定信息的删除通知和该第二绑定信息的注册通知。可以减少移动性管理策略的重复更新,节省通信资源。
第四方面,提供了一种策略控制方法,包括:第二策略控制网元从为第一会话提供会话管理策略的第一策略控制网元接收第四消息,该第四消息用于请求该第二策略控制网元删除终端设备的第一应用层会话,该第四消息中包括请求删除该第一应用层会话的原因值,该第一应用层会话为该终端设备通过该第一会话访问第一应用时所使用的应用层会话;当该原因值为业务和会话连续性模式2时,该第二策略控制网元延迟更新该第二策略控制网元为该终端设备制定的第一移动性管理策略。
还需要说明的是,上述延迟发送、第一策略控制网元、第二策略控制网元和第三策略控制网元的理解可以参考第三方面中的相关描述,在此不再赘述。
需要说明的是,在该实现方式中,第二策略控制网元可以根据该终端设备访问的第一应用的开始/结束事件来制定(确定)移动性管理策略,可以理解为对第一会话对应的第一移动性管理策略进行更新或者制定第二会话对应的第二移动性管理策略。
根据本申请实施例的策略控制方法,在SSC模式2的场景下,在释放第一会话的过程中,当第二策略控制网元接收到触发第二策略控制网元更新当前授权的移动性管理策略或制定新的移动性管理策略的触发消息时,比如第一策略控制网元发送的该第四消息,第二策略控制网元能够通过获知其对应的原因为SSC模式2,从而不对移动性管理策略进行更新,避免了移动性管理策略的重复更新,避免了通信资源的浪费。
结合第四方面,在第四方面的某些实现方式中,该第一移动性管理策略是根据该终端设备的应用层信息确定的。
结合第四方面,在第四方面的某些实现方式中,在该第二策略控制根据该应用层信息制定该第一移动性管理策略之前,该方法还包括:该第二策略控制网元向该第一策略控制网元发送第五消息,该第五消息用于订阅该第一应用的开始和/或结束事件;该第二策略控制网元接收该第一策略控制网元发送的该第一应用的开始事件。
在一种可能的实现方式中,在第一会话释放前,第二策略控制网元会向第一会话对应的第一策略控制网元订阅该第一应用的开始和/或结束事件,该第一策略控制网元发送的该第一应用的开始和/或结束事件可以用于触发第二策略控制网元根据应用层信息制定第一会话对应的第一移动性管理策略。
结合第四方面,在第四方面的某些实现方式中,该第二策略控制网元延迟更新该第一移动性管理策略包括:该第二策略控制网元接收用于触发该第二策略控制网元更新该第一移动性管理策略的第六消息,该第六消息包括以下至少一项:该第四消息、绑定支持网元发送的该第一策略控制网元的第一绑定信息的删除通知、该绑定支持网元发送的为该终端设备的第二会话提供会话管理策略的第三策略控制网元的第二绑定信息的注册通知、该第三策略控制网元发送的该第一应用开始的事件通知;该第二策略控制网元在接收到该第六信息后延迟更新该第一移动性管理策略。
根据本申请实施例的策略控制方法,在SSC模式2的场景下,在释放第一会话和建立第二会话的过程中,当第二策略控制网元接收到触发第二策略控制网元更新当前授权的移动性管理策略或制定新的移动性管理策略的触发消息(即第六消息)时,比如释放第一会话时绑定支持网元发送的该第一策略控制网元的第一绑定信息的删除/去注册通知、绑定支持网元发送的该第三策略控制网元的第二绑定信息、第一策略控制网元发送的该第四消息、第三策略控制网元发送的该第一应用开始的时间通知等,第二策略控制网元能够通过获知其对应的原因为SSC模式2,从而不对移动性管理策略进行更新,避免了移动性管理策略的重复更新,避免了通信资源的浪费。
结合第四方面,在第四方面的某些实现方式中,若该第六信息包括该第三策略控制网元发送的该第一应用开始的事件通知,则该方法还包括:该第二策略控制网元向该第三策略控制网元发送第七消息,该第七消息用于向该第三策略控制网元订阅该第一应用的开始和/或结束事件。
在一种可能的实现方式中,在该第二会话建立后,第二策略控制网元会向第二会话对应的第三策略控制网元订阅该第一应用的开始和/或结束事件,该第三策略控制网元发送 的该第一应用的开始和/或结束事件可以用于触发第二策略控制网元根据应用层信息制定第二会话对应的第二移动性管理策略或者说更新第一会话对应的第一移动性管理策略,但是由于第二策略控制网元已经获知其更新的原因为SSC模式2,因此第二策略控制网元不会对该第一移动性管理策略进行更新,从而避免了移动性管理策略的重复更新,节省了通信资源。
第五方面,本申请实施例提供了一种通信装置,该装置具有实现上述任一方面或任一方面中任意可能的实现方式中的方法的功能。该装置可以是第一方面的移动性管理网元,或用于移动性管理网元的芯片;也可以是第二方面的第一策略控制网元,或用于第一策略控制网元的芯片;也可以是第三方面的绑定支持网元,或用于绑定支持网元的芯片;也可以是第四方面的第二策略控制网元,或用于第二策略控制网元的芯片。该功能可以是通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第五方面提供的通信装置的有益效果参考上述任一方面及其各种可能的实现的有益效果,此处不再赘述。
第六方面,提供了一种策略控制系统,包括:数据管理网元和移动性管理网元;该数据管理网元,用于向该移动性管理网元发送第二信息,该第二信息用于指示第一移动性管理策略对应的终端设备的签约信息被该数据管理网元删除;该移动性管理网元,用于从策略控制网元接收第一信息,该第一信息用于指示该第一移动性管理策略是根据该终端设备的应用层信息确定的;接收该第二信息;根据该第一信息确定应用于该终端设备的目标移动性管理策略。
结合第六方面,在第六方面的某些实现方式中,该移动性管理网元根据该第一信息确定应用于该终端设备的目标移动性管理策略包括:该移动性管理网元根据该第一信息将该第一移动性管理策略确定为应用于该终端设备的该目标移动性管理策略;或者该移动性管理网元根据该第一信息向该策略控制网元发送该第二信息;从该策略控制网元接收第三信息,该第三信息用于指示应用于该终端设备的该目标移动性管理策略为该第一移动性管理策略或者第二移动性管理策略,该第二移动性管理策略为该第一移动性管理策略更新后的策略。
结合第六方面,在第六方面的某些实现方式中,该第一移动性管理网元,还用于向该第一策略控制网元发送第二消息,该第二消息用于请求该第一移动性管理网元对该终端设备执行的目标移动性管理策略;
结合第六方面,在第六方面的某些实现方式中,所述装置还包括:策略控制网元,用于确定该目标移动性管理策略,该目标移动性管理策略包括该第一移动性管理策略或者该第二移动性管理策略;接收该第二信息;发送该第三信息。
结合第六方面,在第六方面的某些实现方式中,若该目标移动性管理策略包括该第二移动性管理策略,该策略控制网元还用于向应用功能网元发送该第二移动性管理策略。
第六方面提供的策略控制系统的有益效果可以参考第一方面及其各种可能的实现的有益效果,此处不再赘述。
第七方面,提供了一种策略控制系统,包括:第一移动性管理网元和第一策略控制网元,其中,该第一移动性管理网元为终端设备执行移动性管理网元重选后的目标移动性管 理网元,该第一策略控制网元为给该第一移动性管理网元提供移动性管理策略的策略控制网元;该第一策略控制网元,用于获取第一移动性管理策略,该第一移动性管理策略为第二移动性管理网元对该终端设备执行的移动性管理策略,该第二移动性管理网元为该终端设备执行移动性管理网元重选前的源移动性管理网元;根据该第一移动性管理策略确定该第一移动性管理网元对该终端设备执行的目标移动性管理策略;向该第一移动性管理网元发送第一信息,该第一信息用于指示该目标移动性管理策略;该第一移动性管理网元,用于接收该第一信息。
结合第七方面,在第七方面的某些实现方式中,该第一移动性管理网元用于向该第一策略控制网元发送第二消息,该第二消息用于请求该第一移动性管理网元对该终端设备执行的目标移动性管理策略。
结合第七方面,在第七方面的某些实现方式中,该系统还包括该第二移动性管理网元,以及该第二移动性管理网元,用于向该第一移动性管理网元发送该第一移动性管理策略;该第一移动性管理网元,还用于接收该第一移动性管理策略。
结合第七方面,在第七方面的某些实现方式中,该第二移动性管理网元,还用于发送第一指示信息,该第一指示信息用于指示该终端设备的第一移动性管理策略是根据该终端设备的应用层信息确定的;该第一移动性管理网元,还用于接收该第一指示信息;向该第一策略控制网元发送该第一指示信息和该第一移动性管理策略;该第一策略控制网元,还用于接收该第一指示信息和该第一移动性管理策略;根据该第一指示信息和该第一移动性管理策略确定该目标移动性管理策略。
结合第七方面,在第七方面的某些实现方式中,该目标移动性管理策略包括该第一移动性管理策略或者第二移动性管理策略,该第二移动性管理策略为该第一策略控制网元制定的应用于该终端设备的移动性管理策略。
第七方面提供的策略控制系统的有益效果可以参考第二方面及其各种可能的实现的有益效果,此处不再赘述。
第八方面,提供了一种策略控制系统,包括:为第一会话管理网元提供会话管理策略的第一策略控制网元和绑定支持网元;该第一策略控制网元,用于发送第一消息,该第一消息用于请求该绑定支持网元删除该第一策略控制网元的第一绑定信息,该第一消息中包括请求删除该第一绑定信息的原因值,该第一绑定信息中包括终端设备标识、数据网络名和单个网络切片选择辅助信息;该绑定支持网元,用于接收该第一消息;当该原因值为业务和会话连续性模式2时,延迟向第二策略控制网元发送第二消息,该第二消息中包括指示该第一绑定信息被该绑定支持网元删除的指示信息,该第二策略控制网元包括向该绑定支持网元订阅了该第一绑定信息的策略控制网元。
结合第八方面,在第八方面的某些实现方式中,该系统还包括:第一会话管理网元,用于决定采用业务和会话连续性模式2的用户面功能网元的重选;向该第一策略控制网元发送第三消息,该第三消息用于请求该第一策略控制网元删除该第一会话管理网元与该第一策略控制网元之间的策略会话关联,该第三消息中包括请求删除该策略会话关联的原因值,该原因值为业务和会话连续性模式2;以及该第一策略控制网元,还用于从该第一会话管理网元接收该第三消息。
第八方面提供的策略控制系统的有益效果可以参考第三方面及其各种可能的实现的 有益效果,此处不再赘述。
第九方面,提供了一种策略控制系统,包括:第一策略控制网元和第二策略控制网元,该第一策略控制网元为给第一会话提供会话管理策略的策略控制网元,该第二策略控制网元为给终端设备提供移动性管理策略的策略控制网元;该第一策略控制网元,用于发送第四消息,该第四消息用于请求该第二策略控制网元删除终端设备的第一应用层会话,该第四消息中包括请求删除该第一应用层会话的原因值,该第一应用层会话为该终端设备通过该第一会话访问第一应用时所使用的应用层会话;该第二策略控制网元,用于接收该第四消息;当该原因值为业务和会话连续性模式2时,延迟更新该第二策略控制网元为该终端设备制定的第一移动性管理策略。
结合第九方面,在第十二方面的某些实现方式中,该系统还包括绑定支持网元,该绑定支持网元,用于发送该第一策略控制网元的第一绑定信息的删除通知,和/或,为该终端设备的第二会话提供会话管理策略的第三策略控制网元的第二绑定信息的注册通知;该第二策略控制网元,用于接收该第一策略控制网元的第一绑定信息的删除通知,和/或,为该终端设备的第二会话提供会话管理策略的第三策略控制网元的第二绑定信息的注册通知。
第九方面提供的策略控制系统的有益效果可以参考第四方面及其各种可能的实现的有益效果,此处不再赘述。
第十方面,提供了一种计算机可读介质,该计算机可读介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得上述第一方面至第四方面,及其第一方面及第四方面任一种可能的实现方式中的方法被执行。
第十一方面,提供了一种芯片系统,包括存储器和处理器,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得安装有该芯片系统的通信设备执行上述第一方面及第四方面,及其第一方面及第四方面任一种可能的实现方式中的方法。
第十二五方面,提供了一种芯片,芯片包括处理器和通信接口,该通信接口用于与外部器件或内部器件进行通信,该处理器用于实现上述第一方面及第四方面,及其第一方面及第四方面任一种可能的实现方式中的方法。
在一种可能的实现方式中,该芯片还可以包括存储器,该存储器中存储有指令,处理器用于执行存储器中存储的指令或源于其他的指令。当该指令被执行时,处理器用于实现上述第一方面及第四方面,及其第一方面及第四方面任一种可能的实现方式中的方法。
第十三方面,提供了一种计算机程序产品,该计算机程序产品包括:计算机程序(也可以称为代码,或指令),当该计算机程序被运行时,使得计算机执行上述第一方面及第四方面,及其第一方面及第四方面任一种可能的实现方式中的方法。
第十四方面,提供了一种通信设备,包括,处理器,还可以包括存储器,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得该通信装置执行第一方密方面及其任一种可能的实现方式中的通信方法,或者执行第二方面及其任一种可能实现方式中的通信方法,或者执行第三方面及其任一种可能实现方式中的通信方法,或者执行第四方面及其任一种可能实现方式中的通信方法。
该处理器为一个或多个,该存储器为一个或多个。该存储器可以与该处理器集成在一 起,或者该存储器与处理器分离设置。
一个可能的设计中,提供了一种通信设备,包括通信接口、处理器和存储器。该处理器用于控制通信接口收发信号,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得该通信设备执行上述第一方面及第四方面,及其第一方面及第四方面任一种可能的实现方式中的方法。
附图说明
图1是本申请实施例适用的系统示意图。
图2是本申请实施例适用的基于服务化架构的5G网络架构示意图。
图3是本申请实施例适用的基于点对点接口的5G网络架构示意图。
图4是本申请提供的策略控制方法的一例实施例的示意性流程图。
图5是本申请提供的策略控制方法的又一例实施例的示意性流程图。
图6是本申请提供的策略控制方法的又一例实施例的示意性流程图。
图7是本申请提供的策略控制方法的又一例实施例的示意性流程图。
图8是本申请提供的策略控制方法的又一例实施例的示意性流程图。
图9是本申请提供的策略控制方法的又一例实施例的示意性流程图。
图10是本申请提供的策略控制方法的又一例实施例的示意性流程图。
图11是本申请提供的通信装置的一种结构示意图。
图12是本申请提供的通信装置的又一种结构示意图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:第五代(5th generation,5G)系统、第五点五代(5.5th generation,5.5G)、第六代(6th generation,6G)或新无线(new radio,NR)等。
图1示出了本申请策略控制方法适用的四种系统。
其中,图1(a)中的系统100包括:数据管理网元101和移动性管理网元102;该移动性管理网元102,用于接收第一信息,该第一信息用于指示终端设备的第一移动性管理策略是根据该终端设备的应用层信息确定的;该数据管理网元101,用于向该移动性管理网元102发送第二消息,该第二信息用于指示该第一移动性管理策略对应的该终端设备的签约信息被该数据管理网元删除;该移动性管理网元102,还用于接收该第二信息;根据该第一信息确定应用于该终端设备的目标移动性管理策略。
可选地,该系统100还可以包括策略控制网元103,用于发送该第一信息。
需要说明的是,对应于下述图2或图3中的5G系统,数据管理网元101可以是统一数据管理(unified data management,UDM)网元,移动性管理网元可以是接入和移动性管理功能(access and mobility management function,AMF)网元,策略控制网元103可以是策略控制(policy control function,PCF)网元,或者,策略控制网元103可以是接入和移动性管理的策略控制(access and mobility management policy control function,AM PCF)网元(也可以称为服务UE的PCF,PCF for a UE)。
图1(b)中的系统110包括:第一移动性管理网元112和第一策略控制网元111,其中,该第一移动性管理网元112为终端设备执行移动性管理网元重选后的目标移动性管理网元,该第一策略控制网元111为给该第一移动性管理网元112提供移动性管理策略的策略控制网元;该第一策略控制网元111,用于获取第一移动性管理策略,该第一移动性管理策略为第二移动性管理网元对该终端设备执行的移动性管理策略,该第二移动性管理网元为该终端设备执行移动性管理网元重选前的源移动性管理网元;根据该第一移动性管理策略确定该第一移动性管理网元112对该终端设备执行的目标移动性管理策略;向该第一移动性管理网元112发送第一消息,该第一消息用于指示该目标移动性管理策略;该第一移动性管理网元112,用于接收该第一消息。
可选地,该系统110还可以包括第二移动性管理网元113,用于发送用于向第一移动性管理网元112发送第一移动性管理策略;第一移动性管理网元112,还用于接收该第一移动性管理策略。
需要说明的是,对应于下述图2或图3中的5G系统,第一移动性管理网元112和第二移动性管理网元113可以是AMF网元,第一策略控制网元111可以是PCF网元,或者,第一策略控制网元111可以是AM PCF网元。
图1(c)中的系统120包括:为第一会话管理网元提供会话管理策略的第一策略控制网元121和绑定支持网元122;该第一策略控制网元121,用于发送第一消息,该第一消息用于请求该绑定支持网元删除该第一策略控制网元的第一绑定信息,该第一消息中包括请求删除该第一绑定信息的原因值,该第一绑定信息中包括终端设备标识、数据网络名和单个网络切片选择辅助信息;该绑定支持网元122,用于接收该第一消息;当该原因值为业务和会话连续性模式2时,延迟向第二策略控制网元发送第二消息,该第二消息中包括指示该第一绑定信息被该绑定支持网元122删除的指示信息,该第二策略控制网元包括向该绑定支持网元122订阅了该第一绑定信息的策略控制网元。
可选地,该系统120还可以包括第一会话管理网元123,用于决定采用业务和会话连续性模式2的用户面功能网元的重选;向该第一策略控制网元121发送第三消息,该第三消息用于请求该第一策略控制网元121删除该第一会话管理网元123与该第一策略控制网元121之间的策略会话关联,该第三消息中包括请求删除该策略会话关联的原因值,该原因值为业务和会话连续性模式2;以及该第一策略控制网元121,还用于从该第一会话管理网元123接收该第三消息。
需要说明的是,对应于下述图2或图3中的5G系统,第一策略控制网元121可以是PCF网元,或者,第一策略控制网元121可以是会话管理的策略控制(session management policy control function,SM PCF)网元(也可以称为服务协议数据单元(protocol data unit,PDU)会话的PCF),绑定支持网元122可以是绑定支持功能(binding support function,BSF)网元,第一会话管理网元123可以是会话管理功能(session management function,SMF)网元。
图1(d)中的系统130包括:第一策略控制网元131和第二策略控制网元132,该第一策略控制网元为给第一会话提供会话管理策略的策略控制网元,该第二策略控制网元为给终端设备提供移动性管理策略的策略控制网元;该第一策略控制网元,用于发送第四消息,该第四消息用于请求该第二策略控制网元删除终端设备的第一应用层会话,该第四消 息中包括请求删除该第一应用层会话的原因值,该第一应用层会话为该终端设备通过该第一会话访问第一应用时所使用的应用层会话;该第二策略控制网元,用于接收该第四消息;该第二策略控制网元,还用于当该原因值为业务和会话连续性模式2时,延迟更新该第二策略控制网元为该终端设备制定的第一移动性管理策略。
可选地,该系统130还可以包括绑定支持网元133,用于发送该第一策略控制网元131的第一绑定信息的删除通知,和/或,发送为该终端设备的第二会话提供会话管理策略的第三策略控制网元的第二绑定信息的注册通知;该第二策略控制网元132,用于接收该第一策略控制网元131的第一绑定信息的删除通知,和/或,接收为该终端设备的第二会话提供会话管理策略的第三策略控制网元的第二绑定信息的注册通知。
需要说明的是,对应于下述图2或图3中的5G系统,第一策略控制网元131可以是PCF网元,或者,第一策略控制网元131可以是SM PCF网元,第二策略控制网元132可以是PCF网元,或者,第二策略控制网元132可以是AM PCF网元,绑定支持网元133可以是BSF网元。
下面以第五代系统为例,结合图2对本申请适用的一种基于服务化架构的5G网络架构进行说明。
图2所示的5G网络架构中可以包括数据网络(data network,DN)和运营商网络部分。可选地,该网络架构还可以包括终端设备部分。其中,运营商网络可包括以下网元中的一个或多个:绑定支持功能BSF网元、策略控制功能PCF网元、统一数据管理UDM网元、应用功能(application function,AF)网元、接入与移动性管理功能AMF网元、会话管理功能SMF网元、(无线)接入网((radio)access network,(R)AN)以及用户面功能(user plane function,UPF)网元、网络存储功能(network repository,NRF)网元、网络开放功能(network exposure function,NEF)网元等。上述运营商网络中,除(无线)接入网部分之外的部分可以称为核心网络部分。为方便说明,后续以(R)AN称为RAN为例进行说明。
下面对其中的部分网元的功能进行简单介绍。
1、终端设备
本申请实施例中的终端设备也可以称为:用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。
终端设备可以是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例为:移动手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self-driving or autopilot)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接 到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。此外,在本申请实施例中,终端设备还可以是物联网(internet of things,IoT)系统中的终端设备。
另外,在本申请实施例中,终端设备还可与其他通信系统的终端设备进行通信,例如,设备间通信等。
上述终端设备可通过运营商网络提供的接口(例如N1等)与运营商网络建立连接,使用运营商网络提供的数据和/或语音等服务。终端设备还可通过运营商网络访问DN,使用DN上部署的运营商业务,和/或第三方提供的业务。其中,上述第三方可为运营商网络和终端设备之外的服务方,可为终端设备提供他数据和/或语音等服务。其中,上述第三方的具体表现形式,具体可根据实际应用场景确定,在此不做限制。
2、(无线)接入网
RAN是基于无线通信技术实现接入网络功能的接入网。RAN是运营商网络的子网络,是运营商网络中业务节点与终端设备之间的实施系统。无线接入网能够管理无线资源,为终端提供无线接入或者空口接入服务,进而完成控制信号和用户数据在终端和核心网之间的转发。
作为示例而非限定,无线接入网可以是LTE系统中的演进型基站(evolved NodeB,eNB或eNodeB),还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器,或者该接入设备可以为中继站、接入点、车载设备、可穿戴设备以及5G网络中的接入设备或者未来演进的PLMN网络中的接入设备等,可以是WLAN中的接入点(access point,AP),可以是NR系统中的gNB本申请实施例并不限定。
3、会话管理功能网元
SMF网元是由运营商网络提供的控制面网元,主要用于实现协议数据单元PDU会话管理(如会话建立、修改和释放,包含UPF和AN之间的隧道维护)、业务和会话连续性(service and session continuity,SSC)模式选择、选择可管理用户面功能UPF网元、漫游等会话相关的功能。在本申请实施例中,可用于实现会话管理网元的功能。
需要说明的是,5G通信系统支持SSC模式1、SSC模式2和SSC模式3三种不同的SSC模式,其中,对于SSC模式1的PDU会话,UE用于接入网络的接入技术的变化(例如,接入类型和小区)不会影响UPF,网络会一直维持在PDU会话建立时充当PDU会话锚的UPF;对于SSC模式3的PDU会话,在迁移会话锚点时,会先建立一条经过新锚点的PDU会话连接(接入相同DN),然后再释放之前的锚点PDU会话连接。
值得说明的是,对于SSC模式2的PDU会话,若该PDU会话有一个PDU会话锚点,网络如果要迁移锚点UPF和服务SMF时,为了保持连续性服务,网络会让UE释放之前的PDU会话并重新立刻发起新的PDU会话建立流程,这两次PDU会话连接到相同的DN,或者说,这两次PDU会话对应的数据网络名称DNN和网络切片选择辅助信息S-NSSAI相同,SSC模式2可以理解为先释放之前的锚点连接再立刻建新锚点连接来保证服务的连续性。
应理解,一个PDU会话的SSC模式在该PDU会话的整个生命周期内不会改变,可以理解为,一条PDU会话连接在建立时设置为SSC模式X(SSC mode-X),那么这条PDU会话的模式是不能修改的,直至其被去激活都是SSC模式X。
4、接入和移动性管理功能网元
AMF网元是由运营商网络提供的控制面网元,负责终端设备接入运营商网络的接入控制和移动性管理,可以用于实现移动性管理实体(mobility management entity,MME)功能中除会话管理之外的其它功能,例如合法监听、移动状态管理,分配用户临时身份标识,认证和授权用户等功能。在本申请实施例中,可用于实现接入和移动管理网元的功能。
5、策略控制网元
PCF网元是由运营商提供的控制面网元,用于向网络网元提供策略、指导网络行为的统一策略框架、为控制平面功能网元(例如AMF网元,SMF网元等)提供策略规则信息等。示例性地,策略可以包括接入控制策略、移动性管理策略、计费相关策略、QoS相关策略和授权相关策略等。此外,PCF还可以访问UDR网元的订阅信息。
在一种可能的实现方式中,PCF可以包括AM PCF(也可以称为PCF for a UE)和SM PCF,其中,AM PCF用于向AMF提供接入控制和移动性管理策略以及向UE提供UE策略,SM PCF用于向SMF提供会话管理相关策略。在具体实现中,AM PCF和SM PCF可以合一部署为同一个物理设备上,也可以分开部署在不同的物理设备上,本申请不做限定。
6、应用功能网元
AF网元主要提供应用层服务,还支持与5G核心网交互来提供服务,例如影响数据路由决策,策略控制功能或者向网络侧提供第三方的一些服务。本申请中,AF网元与应用服务器通信,该应用服务器指的是第三方服务器。
7、用户面功能网元
用户面功能网元可用于括数据包路由和传输、包检测、业务用量上报、用户面数据的服务质量(Quality of Service,QoS)参数处理、合法监听、上行包检测、下行数据包存储等用户面相关的功能。用户数据可通过该网元接入到数据网络DN。在本申请实施例中,可用于实现用户面网元的功能。
8、网络能力开放功能网元
NEF网元是由运营商提供控制面网元,用于以安全的方式向第三方开放由3GPP网络功能提供的业务和网络能力信息(如终端位置、会话是否可达)等。在SMF网元需要与第三方的网元通信时,NEF网元可作为SMF网元与第三方的网元通信的中继。NEF网元作为中继时,可作为签约用户的标识信息的翻译,以及第三方的网元的标识信息的翻译。
9、统一数据管理网元
UDM网元是由运营商提供的控制面网元,负责存储和管理运营商网络中签约用户的 SUPI、签约数据、鉴权数据、信任状(credential)、安全上下文(security context)等信息。
UDM网元还负责用户的服务网元注册管理,比如当前为终端提供业务的AMF、SMF等,如当用户切换了访问的AMF时,UDM还会向旧的AMF发起注销消息,要求旧的AMF删除用户相关信息。
10、统一数据仓储功能网元
UDR网元用于存储和获取策略数据、订阅数据和签约数据、以及用来暴露给外部的结构化的数据。在本申请实施例中,可用于支持UDM网元对签约数据和订阅数据的存储和检索和PCF网元对策略数据的存储和检索。UDR与使用Nudr接口存储和检索数据的NF实体位于同一公共陆地移动网(public land Mobile network,PLMN)(一般特指某个运营商的网络覆盖区域)中。Nudr接口是PLMN内部接口。
11、数据网络
DN是位于运营商网络之外的网络,运营商网络可以接入多个DN,DN上可部署多种业务,可为终端设备提供数据和/或语音等服务。
12、绑定支持功能网元
BSF网元用于实现用户会话绑定功能,支持BSF服务的注册、注销和更新、Nbsf服务鉴权(如验证BSF支持对服务用户(service consumer)进行服务鉴权)、与NRF网元连接检测、PDU会话绑定信息创建、删除和查询、UE信息获取等。
13、网络存储功能网元
网络存储功能网元可用于支持网元服务或者网元发现功能,从网络功能(network function,NF)实例接收NF发现请求,并将发现的NF实例的信息提供给NF实例。以及用于支持维护可用NF实例及其支持的服务的NF配置文件。在本申请实施例中,可用于支持网元服务或者网元发现功能。
在上述网络架构中,N2接口为RAN和AMF网元的接口,用于无线参数、非接入层(non-access stratum,NAS)信令的发送等;N3接口为RAN和UPF网元之间的接口,用于传输用户面的数据等;N4接口为SMF网元和UPF网元之间的接口,用于传输例如业务策略、N3连接的隧道标识信息,数据缓存指示信息,以及下行数据通知消息等信息。N6接口为DN网元和UPF网元之间的接口,用于传输用户面的数据等。
图2中Nbsf、Nnef、Nnrf、Npcf、Nudm、Naf、Namf、Nsmf、N1、N2、N3、N4,以及N6为网元之间服务化接口的序列号。这些接口序列号的含义可参见第三代合作伙伴计划(3rd g enera tion pa rtnershi pproject,3GPP)标准协议中定义的含义,在此不做赘述。
图3以第五代系统为例,示出了本申请适用的一种基于点对点接口的5G网络架构示意图。其中关于网元的功能的介绍述可参考图2中对应的网元的功能的介绍,在此不作赘述。
其中,UE通过N1接口与AMF连接,RAN通过N2接口与AMF连接,通过N3接口与UPF连接。SMF通过N4接口控制UPF。AMF通过N11接口与SMF相连。AMF和SMF分别通过N8和N10接口从UDM获取用户签约数据,通过N15和N7接口从PCF获取策略数据。
需要说明的是,与图2中各个网元之间的接口为服务化的接口不同,图3中的各个网元之间的接口为点对点的接口。示例性地,在图3所示的架构中,其中,UE与AMF网 元之间的接口称为N1接口,AMF网元与RAN设备之间的接口称为N2接口,RAN设备与UPF网元之间的接口可以称为N3接口,SMF网元与UPF网元之间的接口称为N4接口,SM PCF网元(或者服务PDU会话的PCF网元)与AF网元之间的接口称为N5接口,UPF网元与DN之间的接口称为N6接口,SMF网元与SM PCF网元之间的接口称为N7接口,AMF网元与UDM网元之间的接口称为N8接口,UDM网元与SMF网元之间的接口称为N10接口,AMF网元与SMF网元之间的接口称为N11接口,不同AMF网元之间的接口称为N14接口,AMF网元AM PCF网元(或者服务UE的PCF网元)之间的接口称为N15接口。
应理解,图2和图3中的各个网元之间的接口名称只是一个示例,具体实现中接口的名称可能为其他的名称,本申请对此不作具体限定。此外,本申请中各个网元之间的所传输的消息(或信令)的名称也仅仅是一个示例,对消息本身的功能不构成任何限定。
应理解,上述应用于本申请实施例的网络架构仅是举例说明的从传统点到点的架构和服务化架构的角度描述的网络架构,适用本申请实施例的网络架构并不局限于此,任何能够实现上述各个网元的功能的网络架构都适用于本申请实施例。
需要说明的是,上述网元也可以称为实体、设备、装置或模块等,本申请并未特别限定。上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。可选的,上述网元或者功能可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。并且,在本申请中,为了便于理解和说明,在对部分描述中省略网元这一描述,例如,将SMF网元简称SMF,此情况下,该“SMF”应理解为SMF网元,以下,省略对相同或相似情况的说明。
本申请中的移动性管理网元、会话管理网元、策略控制网元、应用功能网元、接入网设备、绑定支持功能网元、统一数据仓储功能网元、统一数据管理网元、网络能力开放功能网元分别可以是图2或图3中的AMF、SMF、PCF(或者AM PCF和SM PCF)、AF、RAN、BSF、UDR、UDM、NEF,也可以是未来通信系统(如第六代(6th generation,6G))中具有上述AMF、SMF、PCF、AF、RAN、BSF、UDR、UDM、NEF的功能的网元,本申请对此不限定。为方便说明,本申请以移动性管理网元、会话管理网元、策略控制网元、应用功能网元、接入网设备、绑定支持功能网元、统一数据仓储功能网元、统一数据管理网元、网络能力开放功能网元分别为上述AMF、SMF、PCF、AF、RAN、BSF、UDR、UDM、NEF为例进行说明。并且,本申请中将终端设备简称为UE。
可以理解的是,在图2和图3所示的通信系统中,各组成网元的功能仅为示例性的,各个组成网元在应用于本申请的实施例中时,并非全部功能都是必需的。
以5G系统为例,当UE注册到AMF时,AMF会与AM PCF(也可以称为PCF for a UE)交互,建立AM策略关联。AM PCF制定AM Policy提供给AMF,用于AMF的策略执行,或者说,用于AMF对UE进行移动性管理。其中AM Policy包括服务区域限制信息和无线接入技术或无线频谱选择优先级RFSP信息;服务区域限制信息用于指示UE的允许区域或不允许区域。在允许区域内,根据UE的签约允许UE与网络进行通信;而在不允许区域,AMF会将服务区域限制信息发送给RAN和UE;无线接入技术或无线频谱选择优先级RFSP用于RAN确定无线资源管理策略,AMF会将RFSP发送给RAN。
上述AM PCF制定AM策略,可以是AM PCF根据UE的签约信息和网络策略制定AM策略,示例性的,上述UE的签约信息可以包括UE签约的服务区域限制和签约的无线接入技术或无线频谱选择优先级,上述网络策略可以包括根据UE当前的位置确定不同的服务区域限制或者RFSP索引(RFSP index);也可以是AM PCF根据一个或多个可应用于UE的应用层信息制定AM策略,需要说明的是,AM PCF根据一个或多个可应用于UE的应用层信息制定AM策略时也可以考虑对应的UE的签约信息和网络策略,比如,在UE注册到AMF并与AM PCF建立AM策略关联时,会先根据UE的签约信息和网络策略制定AM策略,在后续收到一个或多个可应用于UE的应用层信息时,会再考虑该应用层信息对AM策略进行更新。
若在制定AM策略后,需要对AMF以及对应的AM PCF进行重选(例如当UE的位置发生移动时的AMF及PCF重选)或者需要对SMF以及对应的SM PCF进行重选(例如SSC模式2中,SMF先请求释放PDU会话同时请求UE建立新的PDU会话,需要对新的PDU会话对应的SMF以及SM PCF进行重选),可能会对AM策略进行重复更新,导致资源的浪费。
比如,当对AMF以及对应的AM PCF进行重选时,新的AM PCF(或者称为目标AM PCF)无法获知之前的AM PCF(或者称为源AM PCF)制定的AM策略,新的AM PCF会根据UE的签约信息和网络策略再次制定AM策略,若收到UE提供的应用层信息时,会再次根据该应用层信息对AM策略进行更新,且有可能更新后的AM策略与之前的的AM PCF制定的AM策略相同,造成了AM策略(例如第一参数)的重复更新。
再比如,在SSC模式2中,SMF会先请求释放PDU会话,同时请求UE建立新的PDU会话,在此过程中AM PCF会触发AM策略的更新以及向AF的通知消息,但是由于前后两次会话对应的DNN与N-SSIAI相同,上述释放的PDU会话中制定的AM策略与更新的AM策略很有可能是相同的,因此对AM策略的重复更新对资源造成了不必要的浪费。
此外,当用户的签约改变时,UDM会删除之前存储的UE签约的服务区域限制信息和签约的RFSP,UDM会通知AMF删除AM PCF提供的授权的AM策略中的服务区域限制信息和RFSP,并应用AMF本地配置的服务区域限制信息和RFSP,该过程AMF不会与AM PCF交互,AM PCF无法获知AM策略的改变,这样可能导致UE提供应用层信息用于制定AM策略的请求没有被执行,而且AM PCF也不能通知AM策略的改变,AF无法及时更新有关AM策略的信息。
应理解,若无特殊说明,本申请中的无线频谱选择优先级(RFSP)、无线接入技术或频谱选择优先级索引(RFSP索引)可以互相替换。
针对上述问题,本申请实施例提供了一种策略控制方法,能够避免AM策略的重复更新对资源造成的浪费,还能够避免PCF根据UE提供应用层信息制定的AM策略被AMF不必要的删除。
需要说明的是,本申请实施例既可以适用于针对单个UE提供的应用层信息制定的AM策略,也可以适用于针对多个UE或者任意UE提供的应用层信息制定的AM策略,本申请在此不作任何限定,示例性地,针对单个UE提供的应用层信息,AM PCF可以向AF请求获取制定AM策略的相关参数,针对多个UE或者任意UE提供的应用层信息,AM PCF可以通过UDR和NEF获取制定AM策略的相关参数,此处可参考现有技术,本 申请在此不作过多赘述,为了方便描述,后续将以针对单个UE提供的应用层信息制定的AM策略为例进行描述。
接下来以UDM删除签约的服务区域限制信息(以下称为第一参数)和/或RFSP(以下称为第二参数)的场景为例,将结合图4对本申请中的策略控制方法200进行介绍。
需要说明的是,当UE的签约发生改变,UDM删除签约的第一参数和/或第二参数时,会向AMF发送删除签约的第一参数和/或第二参数的请求,该请求的目的主要为了让AMF确定不需要为UE执行差异化的第一参数和/或第二参数,而只需对UE执行网路通用的AM策略即可,示例性地,AMF可以根据本地配置确定该网路通用的AM策略。但若AM策略是根据应用层信息制定的,为了能够保证UE访问应用的用户体验,AMF不应对授权的AM策略进行删除,但由于现有技术中AMF无法判断授权的AMF策略中的第一参数和/或第二参数是根据签约信息制定的还是根据应用层信息制定的,因此会对授权的AM策略中的第一参数和/或第二参数进行删除,并应用AMF本地配置的第一参数和/或第二参数,导致根据应用层信息制定AM策略的请求没有被执行,AM PCF和AF(即请求根据应用层信息制定AM策略的网元)也无法获知AM策略的改变,影响用户体验。
S201,AMF获取信息#c(即第一信息),该信息#c用于指示当前授权的AM策略(即图5中的AM策略#2,也即第一方面中的第一AM策略)是根据信息#a(对应于应用层信息)制定的,即用于指示授权的第一参数是根据应用层信息制定的和/或授权的第二参数是根据应用层信息制定的。
可选地,该信息#c(可称为AF Influence Indication)可以是一个独立的指示信息,用于指示AMF从AM PCF获取的AM策略是根据UE的应用层信息制定的,该信息#c也可以是携带授权的第一参数或授权的第二参数的特殊信元,根据该特殊信元可以确定该第一参数和/或第二参数是根据UE的应用层信息确定的。
应理解,AMF可以在接收UDM发送的请求消息#a之前获取获取信息#c,也可以在接收UDM发送的请求消息#a之后获取获取信息#c,本申请在此不作任何限定。
S202,AMF接收UDM发送的请求消息#a(对应于第二信息),该请求消息#a用于通知AMF对应的UE的签约信息(即签约的第一参数和/或签约的第二参数)被UDM所删除。
需要说明的是,AMF接收到UDM发送的请求消息#a后,可以执行下述方式#A的方案,也可以执行下述方式#B的方案,以保障UE访问应用时的用户体验。
方式#A
S203,AMF根据信息#c向AM PCF发送请求消息#b,该请求消息#b用于请求AM PCF确定用于AMF应用于UE的目标AM策略(或者说用于请求AM PCF对UE的AM策略进行重新授权),比如AM PCF可以判断是否对AM策略#2进行更新,该请求消息#b包括用于指示删除签约的第一参数和/或第二参数的指示信息。
在一种可能的实现方式中,AM PCF接收到该请求消息#b后,确定是否需要对UE当前授权的AM策略#2进行更新,示例性地,AM PCF可以根据UE的当前位置和当前的网络状态等参数确定是否需要对UE当前授权的AM策略#2进行更新,并向AMF发送响应消息#b。
可选地,该请求信息#b中还可以包括上述信息#c,该信息#c可用于AM PCF确定下 述AM策略#3,示例性地,AM PCF根据该信息#c确定定该UE的AM策略是根据应用层信息制定的,因此AM PCF在收到请求消息#b时不会立即根据该UE的签约信息以及网络策略确定AM策略,而是会在收到该UE的应用层信息后根据该UE的应用层信息确定该AM策略#3。
应理解,相应的,该步骤还包括,AM PCF接收该AMF发送的该请求信息#b,以及AM PCF向AMF发送响应消息#b。
S204,AM PCF接收并根据请求消息#b确定授权的AM策略#4(即目标AM策略),或者说,确定应用于UE的AM策略,并向AMF发送响应消息#b,该响应消息#b用于AMF确定授权的AM策略#4。
在第一种可能的实现方式中,AM PCF确定对当前授权的AM策略#2中的第一参数和/或第二参数进行更新,将更新后的AM策略称为AM策略#3(对应于第一方面中的第二AM策略)。此时该响应消息#b(可记为响应消息#b1)用于AMF确定授权的AM策略#4为AM策略#3,示例性地,该响应消息#b1可以包括更新后的AM策略(即AM策略#3)对应的第一参数和/或第二参数。
可选地,若AM PCF确定对AM策略#2中的第一参数和/或第二参数进行更新,AM PCF还可以向AF发送通知消息,该通知消息用于通知AF网元AM策略#2的更新,可选地,该通知消息中可以携带更新后AM策略#3对应的第一参数和/或第二参数。
在第二种可能的实现方式中,AM PCF确定不对AM策略#2中的第一参数和/或第二参数进行更新,或者说,若AM PCF确定继续执行之前授权的AM策略#2,此时该响应消息#b(可记为响应消息#b2)用于AMF确定授权的AM策略#4为AM策略#2,示例性地,该响应消息#b2中可以包括用于指示AMF继续执行AM策略#2的指示信息,或者该响应消息#b2中可以包括AM策略#2对应的第一参数和/或第二参数。
在第三种可能的实现方式中,AM PCF确定删除AM策略#2,或者说AM PCF确定删除AM策略#2中的第一参数和/或第二参数,此时该响应消息#b(可记为响应消息#b3)用于AMF确定授权的AM策略#4为AMF根据本地配置确定的通用的AM策略,示例性地,该响应消息#b3中可以包括用于指示AMF删除AM策略#2的指示信息。
可选地,若AM PCF确定删除AM策略#2,AM PCF还可以向AF发送通知消息,该通知消息用于通知AF网元AM策略#2的删除。
S205,AMF接收AM PCF发送响应消息#b,该响应消息#b用于AMF确定授权的AM策略#4(即目标AM策略),或者说,该响应消息#b用于AMF确定应用于UE的AM策略。
S206,AMF根据响应消息#b确定AM策略#4(即目标AM策略)。
在第一种可能的实现方式中,若AMF接收AM PCF发送响应消息#b1,AMF确定授权的AM策略#4为上述AM策略#3。
在第二种可能的实现方式中,若AMF接收AM PCF发送响应消息#b2,AMF确定授权的AM策略#4为上述AM策略#2。
在第三种可能的实现方式中,若AMF接收AM PCF发送的响应消息#b3,AMF确定AM策略#2中的第一参数和/或第二参数被删除并根据本地配置确定通用的AM策略中的第一参数和/或第二参数,应用于该UE。
S207,AMF执行AM策略#4(即目标AM策略)。
在一种可能的实现方式中,若AM PCF确定对AM策略#2中的第一参数和/或第二参数进行更新,AMF可以向RAN发送AM策略#4对应的第一参数和/或第二参数,向UE发送AM策略#4对应的第一参数。
方式#B
S208,AMF根据信息#c执行AM策略#2。
在一种可能的实现方式中,AMF根据信息#c确定当前授权的AM策略#2为根据UE的应用层信息制定的AM策略,因此当收到请求删除签约信息中第一参数和/或第二参数的请求消息#a时,AMF不会对AM策略#2中的第一参数和/或第二参数进行删除,使得AMF仍然能够继续执行AM策略#2。
接下来结合图5,对上述AMF获取信息#c的方式进行进一步说明。示例性地,AMF可以在获取AM策略#2的过程中获取该信息#c。
S301,AM PCF通过与AMF交互确定AM策略#1。
在一种可能的实现方式中,AMF向AM PCF发送AM策略建立请求(Npcf_AMPolicyControl_Create request)消息,该请求消息中可以包括用户签约信息(比如用户标识、签约的第一参数和/或第二参数等),AM PCF根据该用户签约信息和网络策略等确定UE的授权AM策略#1,该授权AM策略#1包括授权的第一参数和/或第二参数;AM PCF再向AMF发送AM策略建立响应(Npcf_AMPolicyControl_Create response)消息,该响应消息用于AMF确定的授权的AM策略,该响应消息中可以包括授权AM策略#1的相关参数,比如授权的第一参数和/或第二参数。
需要说明的是,上述AMF获取用户标识、签约的第一参数和/或第二参数等信息的方式可以是:AMF通过与UDM交互获取用户的签约信息,该用户的签约信息包括上述取用户标识、签约的第一参数和/或第二参数。可选地,该AMF通过UDM获取用户标识、签约的第一参数和/或第二参数可以发生在UE注册的过程中。
S302,AM PCF获取信息#a,该信息#a用于确定对AM策略#1更新后的AM策略#2。
在一种可能的实现方式中,AM PCF获取信息#a的方式可以是:AM PCF接收AF发送的AM策略授权建立请求(Npcf_AMPolicyAuthorization_Create request)消息,该请求消息中包含上述信息#a。可选地,AM PCF在保存信息#a后向AF发送AM策略授权建立响应(Npcf_AMPolicyAuthorization_Create response)消息。
在一种可能的实现方式中,该信息#a包括UE标识(如SUPI或GPSI)、服务区域覆盖范围(service area coverage)信息和/或高吞吐量(high throughput)的指示信息、以及其关联的(DNN,S-NSSAI)的组合(可记做信息#a1,即不包括应用标识的信息#a),此时触发AM PCF对AM策略#1进行更新的信息#b可以理解为用于表示信息#a中对应的PDU会话(对应于信息#a中的(DNN,S-NSSAI)的PDU会话)建立完成的信息。
可选地,上述信息#a中还可以包括关联的应用标识(application Id(s))(可记做信息#a2,即包括应用标识的信息#a)。
可选地,AF还可以向AM PCF订阅服务区域限制信息(即第一参数)改变的事件和/或RFSP Index(即第二参数)改变的事件。
S303,AM PCF根据信息#a获取信息#b,该信息#b用于触发AM PCF对AM策略# 1的更新。
在一种可能的实现方式中,AM PCF根据信息#a获取信息#b的方式可以是下面的方式①和/或方式②。
需要说明的是,在以下方式①中,触发AM PCF对AM策略#1进行更新的信息#b可以理解为SM PCF的绑定信息,表示信息#a中(DNN,S-NSSAI)对应的PDU会话建立的完成;进一步地,在以下方式②中,触发AM PCF对AM策略#1进行更新的信息#b可以理解为用于表示PDU会话建立完成后信息#a2中对应的应用(对应于信息#a2中的application Id(s))开始启用的信息。
在方式①中,AM PCF根据信息#a1获取信息#b(即SM PCF的绑定信息,可记做信息#b1)。AM PCF根据信息#a1向BSF发送订阅请求消息,该订阅请求消息用于订阅SM PCF绑定信息,该订阅请求消息中可以携带UE的标识、(DNN,S-NSSAI)组合;BSF根据该订阅请求消息中的UE的标识、(DNN,S-NSSAI)组合确定对应的SM PCF的绑定信息,并向AM PCF发送订阅响应消息,该订阅响应消息中包括该SM PCF的绑定信息(即信息#b1)。该信息#b1可以表示信息#a中(DNN,S-NSSAI)对应的PDU会话建立的完成。
需要说明的是,在BSF向AM PCF发送订阅响应消息之前,BSF需要获取SM PCF的绑定信息,示例性地,该获取的过程可以是:UE建立起对应于上述(DNN,S-NSSAI)的PDU会话,SMF为PDU会话分配了UE地址,SMF通过与SM PCF交互建立了SM策略关联并携带SM PCF的绑定信息向BSF进行了注册,该SM PCF的绑定信息包括UE地址、UE标识、PCF标识2,(DNN,S-NSSAI)。其中,PCF标识2为该SM PCF支持策略授权(Npcf_PolicyAuthorization)服务的资源标识,可以理解为该SM PCF对应的PCF标识。
示例性地,上述SMF通过与SM PCF交互建立了SM策略关联的过程可以是:SMF向SM PCF发送消息SM策略建立请求(Npcf_SMPolicyControl_Create request)消息,该请求消息中包括用户标识、UE地址#1等。SM PCF根据用户签约和网络策略等信息确定SM策略。SM PCF向SMF发送SM策略建立响应(Npcf_SMPolicyControl_Create response)消息,该响应消息中包括SM策略的相关参数。可选地,若SM PCF没有UE的签约数据,可以通过与UDR交互获取用户的签约数据。
在方式②中,AM PCF根据信息#a2获取信息#b(即应用开始事件信息,可记做信息#b2)。AM PCF根据信息#a2向SM PCF发送策略授权订阅请求(Npcf_PolicyAuthorization_Subscribe request)消息,该策略授权订阅请求消息用于订阅应用开始(Application Start)事件,消息中携带Application Id(s);AM PCF接收SM PCF发送的策略授权订阅响应(Npcf_PolicyAuthorization_Subscribe response)消息,该响应消息中包括上述Application Id(s)对应的Application Start事件(即信息#b2)。该信息#b2可以表示UE开始启用信息#a2中Application Id(s)对应的应用。
需要说明的是,在上述SM PCF向AM PCF发送策略授权订阅响应消息之前,SM PCF需要获取该Application Id(s)对应的Application Start事件,示例性地,该获取的过程可以为:SM PCF通过与SMF进行交互,请求SMF检测该Application Id(s)对应的Application Start事件,SMF与UPF进行进一步交互,请求UPF检测Application Id(s)对应的A pplication Start事件,UPF检测到该Application Id(s)对应的Application Start事件后向SMF发送该Application Id(s)对应的Application Start事件,SMF再向SM PCF发送该Application Id(s)对应的Application Start事件。
可选地,该策略授权订阅请求消息还可以用于订阅应用结束(Application Stop)事件。
S304,AM PCF根据信息#b、信息#a和AM策略#1确定更新后的AM策略#2。
在一种可能的实现方式中,AM PCF根据信息#b确定需要对AM策略#1进行更新,进一步地,AM PCF根据信息#a中的服务区域覆盖范围(service area coverage)信息对AM策略#1中的第一参数进行更新,和/或,AM PCF根据信息#a中的高吞吐量的指示信息对AM策略#1中的第二参数进行更新,将更新了第一参数和/或第二参数后的AM策略#1记做AM策略#2。
S305,AM PCF向AMF发送信息#c,该信息#c用于指示AM策略#2是根据信息#a确定的。
应理解,AM PCF还会向AMF发送更新后的AM策略#2,该AM策略#2包括根据信息#a更新后的第一参数和/或第二参数。
可选地,AM PCF还可以向RAN发送更新后的AM策略#2中的第一参数和/或第二参数,AM PCF还可以向UE发送更新后的AM策略#2中的第一参数。
可选地,若AF向AM PCF订阅了服务区域限制信息(即第一参数)改变的事件和/或RFSP Index(即第二参数)改变的事件,AM PCF还可以向AF发送事件通知和更新后的AM策略#2中的第一参数和/或第二参数。
在上述实施例中,当用户的签约信息改变,UDM删除UE的签约信息时,该签约信息包括签约的服务区域限制信息(即第一参数)和/或签约的RFSP(即第二参数),会向AMF发送UE的签约信息删除的通知,当AMF接收到UDM发送的UE的签约信息的删除通知时,可以根据信息#c继续执行授权的AM策略#2(即上述方式#B),该信息#c可以是AM PCF根据应用层信息制定了AM策略#2后发送给AMF的,也可以是AM PCF在向AMF发送该AM策略#2的同时发送给AMF的;也可以根据该信息#c与AM PCF进行交互(即上述方式#A),确定授权的AM策略#4。可以避免UDM中签约的第一参数和/或第二参数的删除导致的AMF中根据信息#a确定的AM策略#2中第一参数和/或第二参数的不必要的删除,也避免了AF重复请求根据应用层信息制定或者更新AM策略,还避免了重复请求导致的AM PCF对AM策略的重复更新,节省了信令资源,同时可以保障根据应用层信息制定或者更新AM策略的请求得到满足,从而保障了用户体验。
图6示出了本申请中的策略控制方法400,策略控制方法400为策略控制方法200在5G系统中应用的一种可能的实现方式。
S401,UE注册。UE注册到AMF,AMF确定该UE签约的第一参数和第二参数。
在一种可能的实现方式中,AMF确定该UE签约的第一参数和第二参数的方式可以是:AMD与UDM进行交互,获取该UE的用户签约信息,该用户签约信息包括该UE签约的第一参数和第二参数。
S402,AMF与AM PCF建立AM策略关联,确定AM策略#1。
在一种可能的实现方式中,AMF与AM PCF建立AM策略关联的过程可以是:AMF向AM PCF发送消息AM策略控制建立请求(Npcf_AMPolicyControl_Create request)消 息,该请求消息中包括该UE的用户标识、签约的第一参数和第二参数等;AM PCF根据签约的第一参数和第二参数、以及网络策略等确定该UE的授权的AM策略#1,该授权的AM策略#1包括该UE授权的第一参数和第二参数;AM PCF向AMF返回AM策略控制建立响应(Npcf_AMPolicyControl_Create response)消息,该响应消息中包括该UE授权的AM策略#1。
S403,AM PCF从AF获取UE的应用层信息。
在一种可能的实现方式中,AF向AM PCF发送AM策略授权建立请求(Npcf_AMPolicyAuthorization_Create request)消息,该请求消息中包括UE标识(如SUPI或GPSI)和该UE标识对应的应用层信息,该应用层信息包括服务区域覆盖范围(service area coverage)信息和/或高吞吐量(high throughput)的指示信息、以及其关联的(DNN,S-NSSAI)的组合。AF保存该UE标识对应的应用层信息后向AF返回AM策略授权建立响应(Npcf_AMPolicyAuthorization_Create response)消息。
可选地,该UE的应用层信息还可以包括该UE标识关联的应用标识(application Id(s))。
需要说明的是,在步骤S403之前,即在AF向AM PCF发送消息之前,AF需要确定该UE对应的该AM PCF,作为示例而非限定,该AF确定该UE对应的该AM PCF的过程可以是:AM PCF与AMF之间通过交互建立AM策略关联;AM PCF携带AM PCF的绑定信息向BSF进行注册,该AM PCF的绑定信息包括AM PCF对应的PCF标识1和UE标识(例如SUPI或通用公共用户标识(generic public subscription identifier,GPSI)),其中PCF标识1为AM PCF支持的AM策略授权(Npcf_AMPolicyAuthorization)服务的资源标识,可以理解为该AM PCF对应的PCF标识;AF携带UE标识向BSF请求订阅该UE标识对应的AM PCF的绑定信息;BSF根据AF的订阅请求消息中UE标识确定其对应AM PCF的绑定信息,向AF发送订阅响应消息,该订阅响应消息中包括AM PCF对应的标识(即PCF标识1);AF接收到该订阅响应消息并确定该AM PCF。
S404,AM PCF向BSF订阅SM PCF的绑定信息。
在一种可能的实现方式中,AM PCF向BSF发送订阅请求(Nbsf_Management_Subscribe request)消息,该请求消息中携带该UE的UE标识和其关联的(DNN,S-NSSAI)的组合,该请求消息用于请求该UE标识和其关联的(DNN,S-NSSAI)的组合所对应的SM PCF的绑定信息。
应理解,相应的,该步骤还包括:BSF接收AM PCF发送的该订阅请求消息。
S405,UE建立该(DNN,S-NSSAI)对应的PDU会话,SMF为该PDU会话分配UE地址#1。此处可参考现有技术中PDU会话的建立流程,本申请在此不作赘述。
S406,SMF与SM PCF建立SM策略关联。
在一种可能的实现方式中,SMF与SM PCF建立SM策略关联的过程可以是:SMF向SM PCF发送消息SM策略控制建立请求(Npcf_SMPolicyControl_Create request)消息,该请求消息中包括该UE的用户标识、UE地址#1等;SM PCF根据该UE的用户签约信息和网络策略等确定该UE的授权的SM策略;SM PCF向SMF返回SM策略控制建立响应(Npcf_AMPolicyControl_Create response)消息,该响应消息中包括该UE授权的SM策略。
可选地,SM PCF可以通过与UDR进行交互来获取该UE的用户签约信息。
S407,SM PCF向BSF发起注册,注册SM PCF的绑定信息。
在一种可能的实现方式中,SM PCF向BSF发送注册请求(Nbsf_Management_Register request)消息,该请求消息中携带该SM PCF的绑定信息,例如UE地址#1、UE标识、PCF标识2,(DNN,S-NSSAI)等。其中,PCF标识2为该SM PCF支持策略授权(Npcf_PolicyAuthorization)服务的资源标识,可以理解为该SM PCF对应的PCF标识。
应理解,相应的,该步骤还包括:BSF接收SM PCF发送的该注册请求消息。
S408,BSF向AM PCF返回SM PCF的绑定信息。
在一种可能的实现方式中,BSF接收到该UE对应的SM PCF的绑定信息后,会基于S404中AM PCF的订阅请求,向AM PCF发送通知(Nbsf_Management_Notify request))消息,该通知消息中携带该SM PCF的绑定信息。
应理解,相应的,该步骤还包括:AM PCF接收BSF发送的该通知消息。
可选地,若S403中AM PCF获取到的UE的应用层信息中包括该UE标识关联的应用标识(application Id(s)),可执行下述步骤S409-S411。
S409,AM PCF向SM PCF订阅应用开始/结束事件。
在一种可能的实现方式中,AM PCF向SM PCF发送策略授权订阅请求(Npcf_PolicyAuthorization_Subscribe request)消息,该请求消息用于订阅该应用标识对应的应用的开始/结束(Application Start)事件。
应理解,相应的,该步骤还包括:SM PCF接收AM PCF发送的该策略授权订阅请求。
S410,检测应用开始/结束事件。
在一种可能的实现方式中,SM PCF与SMF交互,请求检测该应用标识对应的应用的开始/结束事件。SMF进一步与UPF交互,请求UPF检测该应用标识对应的应用的开始/结束事件,UPF检测到该应用标识对应的应用的开始事件后向SMF发送该应用标识对应的应用的开始事件,SMF接收到该应用标识对应的应用的开始事件后向SM PCF发送该应用标识对应的应用的开始事件。
应理解,相应的,该步骤还包括:SM PCF接收SMF发送的该应用标识对应的应用的开始事件。
S411,SM PCF向AM PCF返回该应用开始事件。
在一种可能的实现方式中,SM PCF接收到该应用标识对应的应用的开始事件后向AM PCF发送通知(Npcf_PolicyAuthorization_Notify request)消息,该通知消息中携带检测到的原因标识以及其对应的应用的开始事件。
应理解,相应的,该步骤还包括:AM PCF接收SM PCF发送的该通知消息。
S412,AM PCF进行AM策略决策,确定AM策略#2。
在一种可能的实现方式中,S403中AM PCF获取到的UE的应用层信息中包括服务区域覆盖范围信息和/或高吞吐量的指示信息、以及其关联的(DNN,S-NSSAI)的组合,当AM PCF收到S408中BSF发送的SM PCF的绑定信息后,AM PCF进行AM策略决策并确定AM策略#2。具体的,AM PCF根据服务区域覆盖范围信息确定AM策略#2中的第一参数,和/或,根据高吞吐量的指示信息确定AM策略#2中的第二参数。
在一种可能的实现方式中,S403中AM PCF获取到的UE的应用层信息中包括服务 区域覆盖范围信息和/或高吞吐量的指示信息、以及其关联的应用标识,当AM PCF收到S411中SM PCF发送的应用开始事件后,AM PCF进行AM策略决策并确定AM策略#2。具体的,AM PCF根据服务区域覆盖范围信息确定AM策略#2中的第一参数,和/或,根据高吞吐量的指示信息确定AM策略#2中的第二参数。
S413,AM PCF向AMF发送AM策略#2和信息#c,该信息#c用于指示AM策略#2是根据该UE的应用层信息制定的,或者说,用于指示AM策略#2的第一参数是根据应用层信息制定的和/或AM策略#2的第二参数是根据应用层信息制定的。
在一种可能的实现中,AM PCF向AMF发送AM策略控制更新通知请求(Npcf_AM PolicyControl_UpdateNotify request)消息,该请求消息中携带该AM策略#2和该信息#c,或者说,该请求消息中携带更新后的AM策略#2中的第一参数和/或第二参数、以及该信息#c。
应理解,相应的,该步骤还包括:AMF接收AM PCF发送的该AM策略控制更新通知请求消息。
S414,AMF执行AM策略#2。
在一种可能的实现方式中,AMF向RAN和UE发送该AM策略#2中的第一参数,AMF向RAN发送该AM策略#2中的第二参数。
可选地,若AF向AM PCF订阅了该UE对应的第一参数和/或第二参数改变的事件,执行下述步骤S415。
S415,AM PCF向AF发送AM策略#2。
在一种可能的实现方式中,AM PCF向AF发送AM策略授权通知请求(Npcf_AMPolicyAuthorization_Notify request)消息,该请求消息中携带AM策略#2,或者说,携带AM策略#2中更新后的第一参数和/或第二参数。
S416,AMF接收UDM发送的请求消息#a,此处可参考步骤S202中的相关描述。
S417,AMF向AM PCF发送向请求消息#b,此处可参考步骤S203中的相关描述。
S418,AM PCF进行AM策略决策,确定AM策略#4。此处可参考步骤S204中的相关描述。
S419,AM PCF向AMF发送响应消息#b,此处可参考步骤S205中的相关描述。
S420,AMF执行AM策略#4,此处可参考步骤S207中的相关描述。
需要说明的是,在步骤S420AMF执行该AM策略#4之前,AMF需要现根据响应消息#b确定AM策略#4,该AM策略#4(即目标AM策略)可以是上述AM策略#2,也可以是上述AM策略#3,还可以是AMF根据本地配置确定的通用的AM策略,此处可参考步骤S206中的相关描述。
可选地,若AF向AM PCF订阅了该UE对应的第一参数和/或第二参数改变的事件,而且AM PCF确定对上述AM策略#2进行了更新,即AM策略#4为AM策略#2更新后的策略(即AM策略#3),执行下述步骤S421。
S421,AM PCF向AF发送AM策略#4。
在一种可能的实现方式中,AM PCF向AF发送AM策略授权通知请求(Npcf_AMPolicyAuthorization_Notify request)消息,该请求消息中携带AM策略#3,或者说,携带AM策略#2中更新后的第一参数和/或第二参数。
可选地,在步骤S416后,AMF也可以不与AM PCF进行交互,根据信息#c确定该UE的AM策略#2是根据应用层信息制定的,当收到该请求消息#a后,AMF不会对AM策略#2中的第一参数和/或第二参数进行删除,使得AMF仍然能够继续执行AM策略#2。
接下来以重选AMF和对应的AM PCF的场景为例(例如UE位置的移动导致的AMF和AM PCF的重选),结合图7对本申请中的策略控制方法500进行介绍。
为了便于描述和理解,以下,将重选后的AMF和对应的AM PCF分别记做AMF#1(即第二方面中的第一移动性管理网元)和AM PCF#1(即第二方面中的第一策略控制网元),将AM PCF#1根据应用层信息(对应于信息#d)确定的AM策略记做AM策略#1(即第二方面中的第二移动性管理策略),将重选前的AMF和对应的AM PCF分别记做AMF#2(对应于图5-图6中的AMF)(即第二方面中的第二移动性管理网元)和AM PCF#2(对应于上述实施例中的AM PCF及PCF标识1)(即第二方面中的第二策略控制网元),将AMF#2执行的根据应用层信息(对应于上述信息#a)确定的AM策略记做AM策略#2(即第二方面中的第一移动性管理策略)。
S510,AM PCF#1获取AM策略#2,该AM策略#2为AM PCF#2为UE制定的AM策略。
在一种可能的实现方式中,AM PCF#1获取AM策略#2的方式可以是:AMF#1从AMF#2获取AM策略#2,并向AM PCF#1发送该AM策略#2。
示例性地,该过程可以是:AMF#1向AMF#2发送上下文请求(Namf_Communication_UEContextTransfer request)消息,AMF#2向AMF#1发送上下文响应(Namf_Communication_UEContextTransfer response)消息,该上下文响应消息包括AMF#2从AM PCF#2接收到的授权的AM策略#2,AMF#1向AM PCF#1发送AM策略建立请求(Npcf_AMPolicyControl_Create request)消息,该AM策略建立请求消息中包括AM策略#2中第一参数和/或第二参数。
应理解,AMF#1向AM PCF#1发送该AM策略#2之前,AMF会先确定该AM PCF#1。
可选的,上述上下文响应消息还可以包括上述信息#c(可称为AF Influence Indication)(即第二方面中的第一指示信息),上述AM策略建立请求消息中也可以包括上述信息#c。AMF#1可以根据上述信息#c确定向AM PCF#1发送AM策略#2。
需要说明的是,AM PCF#1根据接收到的授权的AM策略#2中的第一参数和/或第二参数,或者上述信息#c,确定不立即根据用户签约和网络策略制定对应于AMF#1的AM策略#5,也可以理解为,AM PCF#1根据接收到的授权的AM策略#2中的第一参数和/或第二参数,或者上述信息#c,确定该UE对应的AM策略是根据应用层信息(即上述信息#a)制定的,因此会等到后续接收到相应的应用层信息时再根据该应用层信息确定该UE对应的AM策略(即AM策略#5)。
在另一种可能的实现方式中,AM PCF#1获取AM策略#2的方式可以是:AMF#1从UDR获取AM策略#2。示例性地,AM PCF#1可以根据获取的上述信息#c,确定从UDR获取AM策略#2。
示例性地,该过程可以是:AM PCF#2(即第二方面中的第二AM PCF)将确定的授权的AM策略#2中的第一参数和/或第二参数保存到UDR。AM PCF#1向UDR获取该A M PCF#2对应的AM策略#2中的第一参数和/或第二参数。
在上述实现方式中,避免了AM PCF#1接收到AMF#1的AM策略建立请求时立即根据UE的签约信息和网络信息确定AM策略,在收到UE对应的应用层信息时再次对该AM策略进行更新导致的资源浪费。
S520,AM PCF#1获取信息#d,该信息#d用于确定对AM策略#2更新后的AM策略#5(即第二方面中的第二AM策略)。
需要说明的是,该信息#d与图5中信息#a的定义类似,可以理解为UE提供的应用层信息,这里可以参考图5中S302的相关描述,在此不再进行详述。
需要说明的是,在AM PCF#1接收AF发送的AM策略授权建立请求消息之前,AF需要确定该AM PCF#1,示例性地,AF确定该AM PCF#1的过程可以是:AM PCF#1与AMF#1交互建立起AM策略关联;AM PCF#1携带AM PCF#1的绑定信息向BSF进行注册,该AM PCF#1的绑定信息包括AM PCF#1对应的PCF标识3和UE标识(例如SUPI或GPSI),其中PCF标识3为AM PCF#1支持的AM策略授权(Npcf_AMPolicy Authorization)服务的资源标识,可以理解为该AM PCF#1对应的PCF标识;AF携带UE标识向BSF请求订阅该UE标识对应的AM PCF的绑定信息;BSF根据AF的订阅请求消息中UE标识确定其对应AM PCF#1的绑定信息,向AF发送订阅响应消息,该订阅响应消息中包括AM PCF#1对应的标识(即PCF标识3);AF接收到该订阅响应消息并确定该AM PCF#1。
在一种可能的实现方式中,该信息#d包括UE标识(如SUPI或通用公共用户标识(generic public subscription identifier,GPSI))、服务区域覆盖范围(service area coverage)信息和/或高吞吐量的指示信息、以及其关联的(DNN,S-NSSAI)的组合(可记做信息#d1)(对应UE的应用层信息),此时触发AM PCF#1对AM策略#2进行更新的信息#d可以理解为用于表示信息#d中对应的PDU会话(对应于信息#d中的DNN,S-NSSAI)建立完成的信息。
可选地,上述信息#d中还可以包括关联的应用标识(application Id(s))(可记做信息#d2)(对应UE的应用层信息)。
S530,AM PCF#1根据信息#d获取信息#e,该信息#e用于触发AM PCF#1对AM策略#2的更新。
需要说明的是,该信息#e与图5中信息#b的定义类似,可以理解为AM策略更新的触发信息,该信息#e可以是SM PCF的绑定信息,也可以是应用开始事件信息,这里可以参考图5中S303的相关描述,在此不再进行详述。
S540,AM PCF#1根据信息#e、信息#d和AM策略#2确定AM策略#5。
在一种可能的实现方式中,AM PCF#1根据信息#d确定需要对AM策略#2进行更新,进一步地,AM PCF#1根据信息#d中的服务区域覆盖范围(service area coverage)信息对AM策略#2中的第一参数进行更新,和/或,AM PCF#1根据信息#d中的高吞吐量的指示信息对AM策略#2中的第二参数进行更新,将更新了第一参数和/或第二参数后的AM策略#2记做AM策略#5。
S550,AM PCF#1根据AM策略#2和AM策略#5确定是否需要更新AM策略#2。
在一种可能的实现方式中,AM策略#2和AM策略#5中的第一参数和/或第二参数相 同,则不需要对AM策略#2进行更新,AMF#1执行AM策略#2。
可选地,若AM PCF#1确定不更新AM策略#2后,可以向AMF#1发送信息#p(可携带于第二方面中的第一消息中)用于指示AMF#1执行AM策略#2,示例性地,该信息#p可以为指示AMF#1执行该AM策略#2的指示信息,或者,该信息#p可以包括该AM策略#2中的第一参数和/或第二参数。
在一种可能的实现方式中,AM策略#2和AM策略#5中的第一参数和/或第二参数不相同,则需要对AM策略#2进行更新,AM PCF#1将AM策略#5确定为更新后的AM策略,并向AMF#1发送AM策略建立响应消息(Npcf_AmPolicyControl_Create Response),在该响应消息中携带AM策略#5(包括AM策略#5对应的第一参数和/或第二参数),AMF#1接收后执行AM策略#5,AMF#1可以向RAN发送AM策略#5对应的第一参数和/或第二参数,向UE发送AM策略#5对应的第一参数。
可选地,若AM PCF#1确定更新AM策略#2后,可以向AMF#1发送信息#p(可携带于第二方面中的第一消息中)用于指示AMF#1执行AM策略#5,示例性地,该信息#p可以包括该AM策略#5中的第一参数和/或第二参数。
可选地,若AM PCF#1确定对AM策略#2中的第一参数和/或第二参数进行更新,且AF向AM PCF#1订阅了服务区域限制信息(即第一参数)改变的事件,那么AM PCF#1还可以向AF发送通知消息,该通知消息用于通知AF网元AM策略#2中第一参数的更新,可选地,该通知消息中可以携带更新后AM策略#5对应的第一参数。若AF向AM PCF#1订阅了RFSP Index(即第二参数)改变的事件,那么AM PCF#1还可以向AF发送通知消息,该通知消息用于通知AF网元AM策略#2中第二参数的更新,可选地,该通知消息中可以携带更新后AM策略#5对应的第二参数。
应理解,重选AMF和AM PCF后,AMF#2和AM PCF#2还会进行相应的删除、去注册或去订阅等操作,示例性地,AMF#2向AM PCF#2发送AM策略删除请求(Npcf_AMPolicyControl_Delete Request)消息,用于请求AM PCF#2删除AM策略#2;AM PCF#2向BSF发送去订阅请求(Nbsf_Management_Unsubscribe Request)消息,用于请求BSF删除AM PCF#2的注册绑定信息;AM PCF#2向SM PCF发送策略授权去订阅请求(Npcf_PolicyAuthorization_Unsubscribe Request)消息,用于请求SM PCF删除AM PCF#2相关的订阅信息;AM PCF#2向AF发送AM策略授权通知(Npcf_AMPolicyAuthorization_Notify)消息,用于请求删除相应的AF会话。
在该实施例中,在AMF和AM PCF重选过程中,新的AM PCF(即AM PCF#1)可以获取到之前的AM PCF(即AM PCF#2)的AM策略#2,并在收到信息#d后比较根据信息#d制定的AM策略(即AM策略#5)和AM策略#2是否相同,只在不同的情况下对AM策略#2进行更新,避免了根据UE的签约信息和网络策略,或者信息#d(比如AF的请求信息)频繁更新授权的AM策略中的第一参数和/或第二参数,节省了一定的信令资源。
图8示出了本申请中的策略控制方法600,策略控制方法600为策略控制方法500在5G系统中应用的一种可能的实现方式。
S601,UE向RAN发起注册。示例性地,该UE发生了移动,该UE携带其用户标识向RAN发起注册请求。
S602,RAN选择AMF#1。示例性地,该RAN收到该UE的注册请求后为该UE选择了一个新的AMF(即AMF#1)。
S603,RAN向AMF#1发起注册。
S604,AMF#1向AMF#2发送上下文请求消息,AMF#1向AMF#1返回上下文请求响应消息,该上下文响应消息中携带UE的上下文信息,该UE的上下文信息中可以包括AMF#2从AM PCF#2接收到的授权的AM策略#2,该AM策略#2包括授权的第一参数和授权的第二参数。
可选地,该UE的上下文信息中还可以包括该信息#c,该信息#c用于指示该AM策略#2是根据该UE的应用层信息制定的。
S605,AMF#1向AMF#2发送状态更新消息。
S606,AMF#1选择一个新的AM PCF(即AM PCF#1)。
S607,AMF#1向该AM PCF#1发送AM策略控制建立请求(Npcf_AMPolicyControl_Create request)消息,该请求消息用于请求应用于该UE的目标AM策略,该请求消息中可以携带该AM策略#2(即AM PCF#2授权的第一参数和第二参数)。可选地,该请求消息中还可以携带该信息#c。
可选地,若S604中UE的上下文信息中不包括该AM策略#2,S607中AM PCF#1也就无法通过上述AM策略控制建立请求从AMF#1获取到该AM策略#2,此时可执行S608,以使得AM PCF#1能够获取到AM策略#2。
需要说明的是,AM PCF#1根据接收到的AM策略控制建立请求消息中的AM策略#2和/或信息#c,确定该UE的AM策略是根据应用层信息制定的,因此不会立即根据用户的签约信息和网络策略等制定AM策略#5’,而是等到接收到该UE的应用层信息后再根据该应用层信息去制定AM策略#5,相比于接收到该AM策略控制建立请求消息立即制定AM策略#5’,待接收到应用层信息后再对AM策略#5’更新,即制定AM策略#5,节省了一定的通信资源。
S608,AM PCF#1从UDR获取AM策略#2,示例性地,AM PCF#1向UDR获取该AM PCF#2对应的AM策略#2中的第一参数和/或第二参数。
应理解,在S608之前,还可以执行S609。
S609,UDR保存AM PCF#2发送的AM策略#2,或者说,AM PCF#2(即第二方面中的第二AM PCF)将确定的授权的AM策略#2中的第一参数和/或第二参数保存到UDR。
S610,AM PCF#1从AF获取UE的应用层信息(即信息#d)。此处可参考图6中的S403或者图7中的S520的相关描述,在此不作赘述。
S611,AM PCF#1向BSF订阅SM PCF的绑定信息。此处可参考图6中的S404的相关描述,在此不作赘述。
S612,BSF向AM PCF#1返回SM PCF的绑定信息。此处可参考图6中的S408的相关描述,在此不作赘述。
可选地,若S610中的应用层信息中包括该UE访问应用的应用标识,可以执行S613-S615。下述S613-S615可以参考图6中S409-S411的相关描述,在此不作赘述。
S613,AM PCF#1向SM PCF订阅应用开始/结束事件。
S614,检测应用开始/结束事件。
S615,SM PCF向AM PCF#1返回应用开始事件。
S616,AM PCF#1进行AM策略决策,确定AM策略#5,决定是否更新AM策略#2。
在一种可能的实现方式中,S610中AM PCF#1获取到的UE的应用层信息中包括服务区域覆盖范围信息和/或高吞吐量的指示信息、以及其关联的(DNN,S-NSSAI)的组合,当AM PCF#1收到S612中BSF发送的SM PCF的绑定信息后,AM PCF#1进行AM策略决策并确定AM策略#5。具体的,AM PCF#1根据服务区域覆盖范围信息确定AM策略#5中的第一参数,和/或,根据高吞吐量的指示信息确定AM策略#5中的第二参数。
在一种可能的实现方式中,S610中AM PCF#1获取到的UE的应用层信息中包括服务区域覆盖范围信息和/或高吞吐量的指示信息、以及其关联的应用标识,当AM PCF#1收到S615中SM PCF发送的应用开始事件后,AM PCF#1进行AM策略决策并根据该应用层信息确定AM策略#5。具体的,AM PCF#1根据服务区域覆盖范围信息确定AM策略#5中的第一参数,和/或,根据高吞吐量的指示信息确定AM策略#5中的第二参数。
在一种可能的实现方式中,AM策略#2和AM策略#5中的第一参数和/或第二参数相同,则不需要对AM策略#2进行更新,AMF#1执行AM策略#2。
可选地,若AM PCF#1确定不更新AM策略#2后,可以向AMF#1发送信息#p1(对应第二方面中的第一信息)用于指示AMF#1执行AM策略#2,示例性地,该信息#p1可以为指示AMF#1执行该AM策略#2的指示信息,或者,该信息#p1可以包括该AM策略#2中的第一参数和/或第二参数。
在一种可能的实现方式中,AM策略#2和AM策略#5中的第一参数和/或第二参数不相同,则需要对AM策略#2进行更新,AM PCF#1将AM策略#5确定为更新后的AM策略。并向AMF#1发送信息#p2(对应第二方面中的第一信息),该信息#p2可以包括AM策略#5(包括AM策略#5对应的第一参数和/或第二参数)。
S617,AM PCF#1向AMF#1发送AM策略控制建立响应(Npcf_AmPolicyControl_Create Response)消息,该响应消息中包括该信息#p1或该信息#p2。
在一种可能的实现方式中,该响应消息中包括该信息#p1,AMF#1接收该响应消息后执行AM策略#2。
在一种可能的实现方式中,该响应消息中包括该信息#p2,AMF#1接收该响应消息后执行AM策略#5,AMF#1可以向RAN发送AM策略#5对应的第一参数和/或第二参数,向UE发送AM策略#5对应的第一参数。
可选地,若AM PCF#1确定对AM策略#2进行更新,将AM策略#5确定为更新后的AM策略,则还可以执行下述S618-S622。
S618,AM PCF#1向AF发送AM策略#5。
在一种可能的实现方式中,若AM PCF#1确定对AM策略#2中的第一参数和/或第二参数进行更新,且AF向AM PCF#1订阅了服务区域限制信息(即第一参数)改变的事件,那么AM PCF#1还可以向AF发送通知消息,该通知消息用于通知AF网元AM策略#2中第一参数的更新,可选地,该通知消息中可以携带更新后AM策略#5对应的第一参数。若AF向AM PCF#1订阅了RFSP Index(即第二参数)改变的事件,那么AM PCF#1还可以向AF发送通知消息,该通知消息用于通知AF网元AM策略#2中第二参数的更新, 可选地,该通知消息中可以携带更新后AM策略#5对应的第二参数。
S619,AMF#2与AM PCF#2删除AM策略关联。示例性地,AMF#2向AM PCF#2发送AM策略删除请求(Npcf_AMPolicyControl_Delete Request)消息,用于请求AM PCF#2删除AM策略#2;AM PCF#2删除后向AMF#2返回AM策略删除响应(Npcf_AMPolicyControl_Delete Response)消息。
S620,AM PCF#2向BSF发送管理去订阅请求(Nbsf_Management_Unsubscribe Request)消息,用于请求BSF删除AM PCF#2的注册绑定信息。
S621,AM PCF#2向SM PCF发送策略授权去订阅请求(Npcf_PolicyAuthorization_Unsubscribe Request)消息,用于请求SM PCF删除AM PCF#2相关的订阅信息。
S622,AM PCF#2请求删除AF会话。示例性地,AM PCF#2向AF发送AM策略授权通知(Npcf_AMPolicyAuthorization_Notify)消息,用于请求删除相应的AF会话。
在该实施例中,在AMF和AM PCF重选过程中,AM PCF#1可以获取到之前的AM PCF#2制定的AM策略#2,AM PCF#1在收到SM PCF的绑定信息,或者该应用标识对应的应用开始事件通知后,根据应用层信息制定AM策略#5,并比较AM策略#5和AM策略#2是否相同,只在不同的情况下对AM策略#2进行更新,避免了根据UE的签约信息和网络策略,或者应用层信息频繁更新授权的AM策略中的第一参数和/或第二参数,节省了一定的信令资源。
接下来以5G系统中的SSC模式2的场景为例,将结合图9和图10对本申请中的策略控制方法700和策略控制方法800进行介绍。
为了便于描述和理解,以下,将SSC模式2中新建的PDU会话(记做PDU会话#1,即第三方面和第四方面中的第二会话)对应的SMF和对应的SM PCF分别记做SMF#1和SM PCF#1(对应于PCF标识4),将SSC模式2中释放的PDU会话(或者称为之前的PDU会话、或旧PDU会话)(记做PDU会话#2,即第三方面和第四方面中的第一会话))的SMF和对应的SM PCF分别记做SMF#2(对应于图6中的SMF、第三方面和第四方面中的第一策略控制网元)和SM PCF#2(对应于图6中的SM PCF及PCF标识2、即第三方面和第四方面中的第三策略控制网元),将SSC模式2中释放的PDU#2会话中AMF执行的AM策略记做AM策略#2(对应于图6中的AM策略#2)(即第三方面和第四方面中的第二移动性管理策略),该AM策略#2是根据UE的应用层信息制定的。
需要说明的是,在SSC模式2的场景下,基于SSC Mode 2的会话业务连续性,UE发生移动后,SMF#2判断当前的路径不是最优路径时,SMF#2决定重选UPF,终结已建立的PDU会话#2(对应于图5中的信息#a1中的(DNN,S-NSSAI))以及请求建立新的PDU会话#1,这两次PDU会话连接到相同的DN,或者说,这两次PDU会话对应的DNN和N-SSIAI相同。
需要说明的是,在SSC模式2的场景下,当释放PDU会话#2时,BSF会通知AM PCF注册绑定信息删除,触发对AM策略的更新,由于SSC模式2中PDU会话#2时和PDU#1会话的DNN和S-NSSAI相同,PDU会话#2对应AM策略#2很可能与PDU#1会话对应的更新后的AM策略相同,这样会导致AM策略的重复更新,导致资源的浪费。
需要说明的是,在图9的策略控制方法700中AM PCF(即第三方面中的第二策略控制网元)需要根据(DDN,S-NSSAI)组合(对应于信息#a1中DNN,S-NSSAI)对应的 PDU会话#2的建立和终结来确定AM策略#2,或者说,AM PCF制定该AM策略#2所根据的应用层信息中不包括应用标识(即图5中的信息#a1);在图10的策略控制方法800中AM PCF(即第四方面中的第二策略控制网元)需要根据应用标识(对应于信息#a2中应用标识(application Id(s)))对应的应用的开始和结束来确定AM策略#2,或者说,AM PCF制定该AM策略#2所根据的应用层信息中包括应用标识(即图5中的信息#a2)。
首先,对图9中的策略控制方法700进行介绍。
应理解,在图9的策略控制方法700中,AM PCF可以根据(DDN,S-NSSAI)组合(对应于信息#a1中DNN,S-NSSAI)对应的PDU会话#2和PDU会话#1的建立和终结来确定AM策略。其中,AM PCF获知该PDU会话的#2和PDU会话#1建立的过程可以是:AM PCF获取上述信息#a1,该信息#a1可以包括UE标识(如SUPI或GPSI)、服务区域覆盖范围信息和/或高吞吐量的指示信息、以及其关联的(DNN,S-NSSAI)的组合,AM PCF根据信息#a1向BSF发送订阅请求消息,该订阅请求消息用于订阅UE的标识和(DNN,S-NSSAI)组合对应的SM PCF绑定信息的注册/去注册事件;BSF根据该订阅请求消息中的UE的标识、(DNN,S-NSSAI)组合确定对应的SM PCF#1或SM PCF#2的绑定信息,并向AM PCF发送订阅响应消息,该订阅响应消息中包括该SM PCF#1或SM PCF#2的绑定信息(即信息#b1)。BSF向AM PCF发送该信息#b1可以表示信息#a中(DNN,S-NSSAI)对应的PDU会话#2或PDU会话#1建立的完成;AM PCF获知该PDU会话的#2和PDU会话#1终结的过程可以是:当该UE的标识、(DNN,S-NSSAI)组合对应的SM PCF的绑定信息被BSF删除时,BSF向AM PCF发送相应的删除通知,BSF向AM PCF发送该删除通知可以表示该UE标识、(DDN,S-NSSAI)组合对应的PDU会话#2或PDU会话#1的终结。
S701,SMF#2决定采用SSC模式2的UPF的重选。示例性地,UE发生移动后,SMF#2判断当前的路径不是最优路径时,因此决定基于SSC模式2对UPF进行重选。
应理解,在执行步骤S701之前,还可以执行图6中S401-S415的步骤。在步骤S701之前,PDU会话#2已经建立,AMF已经接收到了AM PCF发送AM策略#2,该AM策略#2是根据UE对应的应用层信息制定的。示例性地,该AM策略#2的制定过程可以是:AM PCF接收到了SM PCF的绑定信息(可以理解为触发AM策略更新的信息,如方法300中的信息#b1),并根据UE标识、service area coverage信息和/或high throughput的指示信息、以及其关联的(DNN,S-NSSAI)的组合(对应于方法300中的信息#a1)确定了授权AM策略#2,并发送给了AMF;或者,PDU会话#2建立后,AM PCF接收到了应用开始事件信息(可以理解为触发AM策略更新的信息,如方法300中的信息#b2),并根据UE标识、service area coverage信息和/或high throughput的指示信息、以及其关联的应用标识(application Id(s))(对应于方法300中的信息#a2)确定了授权AM策略#2,并发送给了AMF。这里PDU会话的具体建立过程可参考现有技术,本申请在此不作过多赘述。
S702,SMF#2向UE请求释放PDU会话#2和建立PDU会话#1,PDU会话#2和PDU会话#1对应同一个(DDN,S-NSSAI)。
S703,SMF#2向SM PCF#2发送请求消息#c1,该请求消息#c1用于请求删除SMF#2与SM PCF#2的SM策略关联(或者说PDU会话#2对应的SM策略关联),该请求消息#c1中包括信息#f,该信息#f用于指示删除原因为SSC模式2的业务连续性。
在一种可能的实现方式中,该请求消息#c1为SM策略控制删除请求(Npcf_SMPolicyControl_Delete request)消息。
应理解,相应的,该步骤还包括:SM PCF#2接收SMF#2发送的请求消息#c1,类似的,本申请中的实施例若只描述发送或者接收的步骤,应理解,若无特别说明,应该还包括其相应的接收或者发送步骤。
S704,SM PCF#2向BSF发送请求消息#d1(即第三方面中的第一消息),该请求消息#d1用于请求BSF删除SM PCF#2的绑定信息,该请求消息#d中包括信息#f和无效指示信息,该信息#f用于指示删除原因为SSC模式2的业务连续性,该无效指示信息用于指示BSF将SM PCF#2注册的绑定信息标记为无效。
在一种可能的实现方式中,该请求消息#d为管理去订阅请求(Nbsf_Management_Deregister request)消息。
S705,BSF接收该请求消息#d并将SM PCF#2的绑定信息标记为无效。
需要说明的是,BSF接收该请求消息#d不对SM PCF#2的绑定信息进行删除,只是将其标记为无效,这样BSF就不会通知AM PCF注册绑定信息删除,也就不会触发AM PCF对AM策略#2的更新。
S706,建立PDU会话#1。
在一种可能的实现方式中,UE建立到与PDU会话#2的(DDN,S-NSSAI)相同的PDU会话#1,AMF选择SMF#1,SMF#1为PDU会话#1分配UE地址#2。
S707,SMF#1与SM PCF#1建立SM策略关联。
在一种可能的实现方式中,SMF#1与SM PCF#1建立SM策略关联的过程可以是:SMF#1向SM PCF#1发送消息SM策略控制建立请求(Npcf_SMPolicyControl_Createrequest)消息,该请求消息中包括该UE的用户标识、UE地址#2、DDN和S-NSSAI等;SM PCF#1根据该UE的用户签约信息和网络策略等确定该UE的授权的SM策略;SM PCF#1向SMF#1返回SM策略控制建立响应(Npcf_AMPolicyControl_Create response)消息,该响应消息中包括该UE授权的SM策略。
S708,SM PCF#1向BSF注册SM PCF#1的绑定信息(对应于第三方面中的第三消息),该绑定信息包括包括UE地址#2、UE标识、PCF标识4,DNN,S-NSSAI。PCF标识4为SM PCF#1支持Npcf_PolicyAuthorization服务的资源标识,可以理解为该SM PCF#1对应的PCF标识。
需要说明的是,步骤S705-S708可参考图6中S405-S407的相关描述,在此不作详述。
S709,BSF删除SM PCF#2的绑定信息。示例性地,BSF在接收到SM PCF#1注册其绑定信息的请求消息后,保存该SM PCF#1的绑定信息,并根据UE标识、DDN和S-NSSAI删除无效的SM PCF#2的绑定信息。
可选地,BSF删除SM PCF#2的绑定信息的时机也可以是:BSF在预定时间段内未收到S708中SM PCF#1的注册其绑定信息的请求消息,BSF对该SM PCF#2的绑定信息进行删除。
S710,BSF向AM PCF发送请求消息#e1(即第三方面中的第二消息),该请求消息#e1用于通知AM PCF该SM PCF#2的绑定信息的删除。
可选地,该请求消息#e1中可以携带该SM PCF#1的绑定信息。
S711,AM PCF在接收到该请求消息#e1后确定不更新AM策略#2
需要说明的是,在PDU会话#2的释放过程中,当BSF删除PDU会话#2对应的SM PCF#2的注册绑定信息或者将PDU会话#2对应的SM PCF#2的注册绑定信息标记为无效时,AM PCF不会收到SM PCF#2的注册绑定信息删除的通知,不会对AM策略#2进行更新;PDU会话#1建立完成后,AM PCF在接收到SM PCF#1的注册绑定信息时,和/或,AM PCF延迟收到SM PCF#2的注册绑定信息删除的通知时候,也不会对AM策略#2进行更新。
可选地,若上述请求信息#d中不包括该无效指示信息,即BSF在收到请求消息#d后会立即对SM PCF#2的绑定信息进行删除,并向AM PCF发送消息通知AM PCF该SM PCF#2的绑定信息的删除,在此情况下,BSF可以在向AM PCF发送删除的通知消息时携带该信息#f,用于指示删除的原因为SSC模式2的业务连续性,AM PCF在接收到该通知消息时能够知道删除的原因为SSC模式2的业务连续性,因此也就可以不对AM策略#2进行重复更新。
可选地,若上述请求信息#d中不包括该无效指示信息,即BSF在收到请求消息#d后会立即对SM PCF#2的绑定信息进行删除,在此情况下,由于BSF根据信息#f已经知道删除的原因为SSC模式2的业务连续性,因此可以在删除后不向AM PCF发送删除的通知消息(即请求消息#e1),因此AM PCF也就不会对AM策略#2进行重复更新。
需要说明的是,BSF删除SM PCF#2的注册绑定信息的时机可以是,BSF在预定时间段内未收到S708中SM PCF#1的注册其绑定信息的请求消息,BSF对该SM PCF#2的绑定信息进行删除;也可以是,BSF接收到SM PCF#2发送的去注册(Nbsf_Management_Deregister)消息(即请求消息#d)后删除;还可以是,当BSF接收到SM PCF#1的注册绑定信息的请求消息后,根据SM PCF#1对应的UE标识、DDN和S-NSSAI删除之前无效的SM PCF#2的注册绑定信息。
接下来,对图10中的策略控制方法800进行介绍。
应理解,在图10的策略控制方法800中,AM PCF可以根据(DDN,S-NSSAI)组合对应的PDU会话#2和PDU会话#1的建立和终结、应用标识(对应于信息#a2中application Id(s))对应的应用的开始和结束(或者说应用层会话的建立/终结)来确定AM策略。其中,AM PCF获知该PDU会话的#2和PDU会话#1建立和终结的方式可参考图9中的相关描述,在此不作赘述。
示例性地,上述AM PCF获知该应用标识对应的应用的开始和结束的方式可以是:AM PCF获取上述信息#a2,该信息#a2可以包括UE标识、服务区域覆盖范围信息和/或高吞吐量的指示信息、关联的(DNN,S-NSSAI)的组合、以及关联的应用标识;AM PCF根据信息#a2向向SM PCF发送策略授权订阅请求消息(即第四方面中的第五消息),该策略授权订阅请求消息用于订阅应用标识对应的应用开始/结束事件;AM PCF接收SM PCF发送的策略授权订阅响应消息,该响应消息中包括上述应用标识对应的应用开始/结束事件(即信息#b2)。该信息#b2可以表示UE开始/结束启用信息#a2中应用标识对应的应用。
在图10的实施例中,在PDU会话#2的释放过程中,AM PCF能够在接收到BSF发送的SM PCF#2的注册绑定信息删除的通知前获取到信息#f,该信息#f用于指示删除的原 因为SSC模式2的业务连续性,因此AM PCF不会对AM策略#2进行更新;PDU会话#1建立完成后,AM PCF在接收到SM PCF#1的注册绑定信息时,AM PCF根据该信息#f也不会对AM策略#2进行更新;PDU会话#1建立完成后,AM PCF在接收到SM PCF#1发送的应用开始事件信息时,AM PCF根据该信息#f也不会对AM策略#2进行更新。
S801,SMF#2决定采用SSC模式2的UPF的重选。
应理解,在执行步骤S801之前,还可以执行图6中S401-S415的步骤。在步骤S801之前,PDU会话#2已经建立,AMF已经接收到了AM PCF发送AM策略#2,该AM策略#2是根据UE对应的应用层信息制定的,该应用层信息中包括该UE访问的应用的应用标识(对应于方法300中的信息#a2)。示例性地,该AM策略#2的制定过程可以是:PDU会话#2建立后,AM PCF接收到了应用开始事件信息(可以理解为触发AM策略更新的信息,如方法300中的信息#b2),并根据UE标识、service area coverage信息和/或highthroughput的指示信息、以及其关联的应用标识确定了授权AM策略#2,并发送给了AMF。这里PDU会话的具体建立过程可参考现有技术,本申请在此不作过多赘述。
S802,SMF#2向UE请求释放PDU会话#2和建立PDU会话#1,PDU会话#2和PDU会话#1对应同一个(DDN,S-NSSAI)。
S803,SMF#2向SM PCF#2发送请求消息#c2,该请求消息#c2用于请求删除SMF#2与SM PCF#2的SM策略关联(或者说PDU会话#2对应的SM策略关联),该请求消息#c1中包括信息#f,该信息#f用于指示删除原因为SSC模式2的业务连续性。
需要说明的是,步骤S801-S803可参考图9中S701-S703的相关描述,在此不作详述。
S804,SM PCF#2向AM PCF发送请求消息#f(即第四方面中的第四消息),该请求消息#f用于请求AM PCF删除该UE的应用层会话,请求消息#f中包括信息#f,该信息#f用于指示删除原因为SSC模式2的业务连续性。
需要说明的是,AM PCF接收到SM PCF#2发送的请求消息#f后,根据该信息#f确定不对AM策略#2进行重复更新。
S805,SM PCF#2向BSF发送请求消息#d2,该请求消息#d2用于请求BSF删除SM PCF#2的绑定信息。
S806,BSF删除SM PCF#2的绑定信息。
S807,BSF向AM PCF发送请求消息#e2,该请求消息#e1用于通知AM PCF该SM PCF#2的绑定信息的删除。
S808,建立PDU会话#1。
S809,SMF#1与SM PCF#1建立SM策略关联。
S810,SM PCF#1向BSF注册SM PCF#1的绑定信息。
需要说明的是,步骤S808-S809可参考图9中S706-S708的相关描述,在此不作详述。
S811,BSF向AM PCF返回SM PCF#1的绑定信息。此处可参考图6中的S408的相关描述,在此不做赘述。
S812,AM PCF在接收到该SM PCF#1的绑定信息后确定不更新AM策略#2。
需要说明的是,AM PCF收到BSF发送的SM PCF#2的注册绑定消息删除的通知消息和SM PCF#1的绑定信息、SM PCF#2发送的应用结束事件(或者删除应用层会话的请求)、SM PCF#1发送的应用开始事件(对应于第四方面中的第六消息)后,由于AM PCF已经 获取到了信息#f,知道了触发AM策略#2更新的原因为SSC模式2的业务连续性(比如AM PCF已经知道了SM PCF#2的注册绑定消息删除的原因为SSC模式2的业务连续性),因此AM PCF不会对AM策略#2进行重复更新。
可选地,AM PCF也可以根据PDU会话#1对应的用户签约、网络策略和UE的应用层信息确定AM策略#6,并比较AM策略#2与AM策略#6是否相同,若AM策略#2与AM策略#6相同,AM PCF确定不更新AM策略#2,若AM策略#2与AM策略#6不相同,AM PCF可以对AM策略#2进行更新,这里的AM策略的更新过程可参考前述实施例,在此不作赘述。
在图9和图10的实施例中,基于SSC模式2释放PDU会话#2时,AM PCF不会接收到删除SM PCF#2的注册绑定信息的通知,也就不会对AM策略进行更新;或者,AM PCF能够通过信息#f获知删除SM PCF策略关联的原因,不对AM策略进行更新,从而避免了AM策略的重复更新,避免了信令资源的浪费。
应理解,以上实施例只对关键步骤进行了详细说明,但实际上本申请并不仅限于此,本申请实施例该也可以包括其余步骤,比如,可以包括UE的注册过程、建立PDU会话#2的过程、AMF和AM PCF建立AM策略的关联过程、SMF#2和SM PCF#2建立SM策略关联的过程等等,其余步骤的实现可参考现有技术,本申请在此不作过多赘述。
需要说明的是,上述实施例中,AMF#1也可以称为新AMF或者目标AMF,AMF#2也可以称为旧AMF或源AMF,对于AM PCF#1和AM PCF#2、SMF#1和SMF#2、SM PCF#1和SM PCF#2也可采用类似的定义,在此不作赘述。
以上结合图4至图10,对本申请提供的策略控制方法作了详细说明。基于同一技术构思,本申请还提供了相应的通信装置,本申请提供的通信装置可以包括执行上述方法实施例中的方法/操作/步骤/动作所一一对应的模块或单元,该单元可以是硬件电路,也可是软件,也可以是硬件电路结合软件实现。下面结合图11至图12,对本申请提供的通信装置进行说明。这些通信装置可以用于实现上述图4至图10的方法实施例中AMF、AM PCF、BSF的功能,因此也能实现上述方法实施例所具备的有益效果。在本申请的实施例中,该通信装置可以是AMF、AM PCF、BSF,也可以是应用于AMF、AM PCF、BSF的模块(如芯片)。
图11给出了一种通信装置900的结构示意图。该通信装置包括收发单元910和处理单元920。通信装置900用于实现上述图4至图10中所示的方法实施例中AMF、AM PCF、BSF的功能。
在一种可能的设计中,通信装置900用于实现图4至图6中任一图所示的方法实施例中AMF的功能时:其中,收发单元910,用于从提供移动性管理策略的策略控制网元接收第一信息,该第一信息用于指示终端设备的第一移动性管理策略是根据该终端设备的应用层信息确定的。
该收发单元910,还用于从数据管理网元接收第二信息,该第二信息用于指示该第一移动性管理策略对应的该终端设备的签约信息被该数据管理网元删除。
处理单元920,用于根据该第一信息确定应用于该终端设备的目标移动性管理策略。
示例性地,该处理单元920,用于根据该第一信息将该第一移动性管理策略确定为应用于该终端设备的该目标移动性管理策略;或者,该处理单元920,用于根据该第一信息 通过该收发单元910向该策略控制网元发送该第二信息;以及该收发单元910,还用于从该策略控制网元接收第三信息,该第三信息用于指示应用于该终端设备的该目标移动性管理策略为该第一移动性管理策略或者第二移动性管理策略,该第二移动性管理策略为该策略控制网元确定的该第一移动性管理策略更新后的策略;以及该处理单元920,用于根据该第三信息确定该目标移动性管理策略。
在一种可能的设计中,通信装置900用于实现图7或图8所示的方法实施例中AM PCF的功能时:收发单元910,用于获取第一移动性管理策略,该第一策略控制网元为给终端设备执行移动性管理网元重选后的第一移动性管理网元提供移动性管理策略的策略控制网元,该第一移动性管理策略为该终端设备执行移动性管理网元重选前的第二移动性管理网元对该终端设备执行的移动性管理策略。
示例性地,该收发单元910,用于从该第一移动性管理网元接收该第一移动性管理策略,或者,该收发单元910,用于从数据仓储网元接收该第一移动性管理策略。
该收发单元910,还用于该第一移动性管理网元发送第一信息,该第一信息用于指示该目标移动性管理策略。
该收发单元910,还用于从该第一移动性管理网元获取第一指示信息,该第一指示信息用于指示该第一移动性管理策略是根据与该终端设备相关的应用层信息确定的。
该处理单元920,还用于根据该第一移动性管理策略确定该第一移动性管理网元对该终端设备执行的目标移动性管理策略。
该处理单元920,还用于根据该第一指示信息为该终端设备制定第二移动性管理策略。
在一种可能的实现方式中,该目标移动性管理策略包括该第一移动性管理策略或者第二移动性管理策略,该第二移动性管理策略为该第一策略控制网元为该终端设备制定的移动性管理策略。
该处理单元920,还用于确定该第二移动性管理策略。
示例性地,该处理单元920,还用于根据该终端设备的应用层信息、该终端设备的会话信息和/或访问的应用信息确定该第二移动性管理策略。
在一种可能的实现方式中,该收发单元910,还用于向绑定支持网元发送第一请求消息,该第一请求消息用于请求订阅为该终端设备的第一会话提供会话管理策略的第三策略控制网元的绑定信息的注册或者去注册通知;以及该收发单元910,还用于接收来自该绑定支持网元的第一通知消息,该第一通知消息包括该第三策略控制网元的绑定信息的注册通知消息或者该第三策略控制网元的绑定信息的去注册通知消息。可选地,该会话信息包括该终端设备对应的第一会话的建立和/或终结事件。
在一种可能的实现方式中,该应用信息包括该终端设备通过第一会话访问的第一应用的开始和/或结束的事件,以及该收发单元910,还用于向该第三策略控制网元发送第二请求消息,该第二请求消息用于请求订阅该第一应用的开始和/或结束的事件;该收发单元910,还用于接收该第三策略控制网元发送第二响应消息,该第二响应消息包括该第一应用的开始或者结束的事件。
在一种可能的实现方式中,该终端设备的第二移动性管理策略包括该业务区域限制,和/或,无线接入技术或频谱选择优先级索引,以及该处理单元920用于确定该第二移动性管理策略包括:该处理单元920,用于根据该应用层信息中的服务区域覆盖范围信息确 定该第二移动性管理策略对应的业务区域限制,和/或,该处理单元920,用于根据该应用层信息中的高吞吐量指示信息确定该第二移动性管理策略对应的无线接入技术或频谱选择优先级索引。
在一种可能的设计中,通信装置900用于实现图9所示的方法实施例中BSF的功能时:收发单元910,用于从第一策略控制网元接收第一消息,该第一消息用于请求该绑定支持网元删除该第一策略控制网元的第一绑定信息,该第一消息中包括请求删除该第一绑定信息的原因值,该第一绑定信息中包括终端设备标识、数据网络名和单个网络切片选择辅助信息。
该收发单元910,还用于从第三策略控制网元接收第三消息,该第三消息用于请求该绑定支持网元注册该第三策略控制网元的第二绑定信息,该第二绑定信息包括该终端设备标识、该数据网络名和该单个网络切片选择辅助信息。
处理单元920,当该原因值为业务和会话连续性模式2时,用于延迟向第二策略控制网元发送第二消息,该第二消息中包括指示该第一绑定信息被该绑定支持网元删除的指示信息,该第二策略控制网元包括向该绑定支持网元订阅了该第一绑定信息的策略控制网元。
该处理单元920,还用于根据该第一消息将该第一绑定信息标记为无效。
该处理单元920,还用于根据该第二绑定信息删除该第一绑定信息。
在一种可能的实现方式中,该处理单元920,用于根据该第二绑定信息删除该第一绑定信息,以及该收发单元910还用于向该第二策略控制网元发送该第二消息。
该处理单元920,若该绑定支持网元在预定时间段内未接收到第三消息,还用于删除该第一绑定信息,该第三消息用于请求该绑定支持网元注册第三策略控制网元的第二绑定信息,该第二绑定信息包括该终端设备标识、该数据网络名和该单个网络切片选择辅助信息;以及该处理单元920用于延迟向第二策略控制网元发送第二消息包括:该处理单元920,用于删除该第一绑定信息,以及该收发单元910,还用于向该第二策略控制网元发送该第二消息。
在一种可能的设计中,通信装置900用于实现图10中所示的方法实施例中AM PCF的功能时:收发单元910,用于从为第一会话提供会话管理策略的第一策略控制网元接收第四消息,该第四消息用于请求该第二策略控制网元删除终端设备的第一应用层会话,该第四消息中包括请求删除该第一应用层会话的原因值,该第一应用层会话为该终端设备通过该第一会话访问第一应用时所使用的应用层会话。
处理单元920,当该原因值为业务和会话连续性模式2时,用于延迟更新该第二策略控制网元为该终端设备制定的第一移动性管理策略。
该处理单元920,还用于根据该终端设备的应用层信息制定该第一移动性管理策略。
在一种可能的实现方式中,在该处理单元920用于根据该应用层信息制定该第一移动性管理策略之前,该收发单元910,还用于向该第一策略控制网元发送第五消息,该第五消息用于订阅该第一应用的开始和/或结束事件;该收发单元910,还用于接收该第一策略控制网元发送的该第一应用的开始事件。
在一种可能的实现方式中,该处理单元920用于延迟更新该第一移动性管理策略包括:该接收单元910,还用于接收用于触发该第二策略控制网元更新该第一移动性管理策略的第六消息,该第六消息包括以下至少一项:绑定支持网元发送的该第一策略控制网元的第 一绑定信息的删除通知、该绑定支持网元发送的为该终端设备的第二会话提供会话管理策略的第三策略控制网元的第二绑定信息的注册通知、该第三策略控制网元发送的该第一应用开始的事件通知;该处理单元920,用于在接收到该第六信息后延迟更新该第一移动性管理策略。
在一种可能的实现方式中,若该第六信息包括该第三策略控制网元发送的该第一应用开始的事件通知,则该收发单元910,还用于向该第三策略控制网元发送第七消息,该第七消息用于向该第三策略控制网元订阅该第一应用的开始和/或结束事件。
图12是根据本申请实施例所提供的通信装置1000的结构框图。图12所示的通信置1000包括:处理器1010和通信接口1030。可选地,该通信装置1000还可以包括存储器1020。该存储器1020可以与处理器1010耦合,用于执行存储器中存储的指令,以控制通信接口1030发送信号和/或接收信号。
应理解,上述处理器1010和存储器1020可以合成一个处理装置,处理器1010用于执行存储器1020中存储的程序代码来实现上述功能。具体实现时,该存储器1020也可以集成在处理器1010中,或者独立于处理器1010,本申请在此不作限定。
在一种可能的设计中,该通信装置1000可以是上文方法实施例对应的通信装置,也可以是用于实现上文方法实施例对应的通信装置的功能的芯片。
具体地,该通信装置1000可对应于根据本申请实施例中图4至图10中通信方法所对应的通信设备,该通信装置1000可以包括用于执行图4至图10中通信方法的单元。并且,该通信装置1000中的各单元和上述其他操作和/或功能分别为了执行通信方法的相应流程。应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
当该通信装置1000为芯片时,该芯片包括收发单元和处理单元。其中,收发单元可以是输入输出电路或通信接口;处理单元可以为该芯片上集成的处理器或者微处理器或者集成电路。
本申请实施例还提供了一种处理装置,包括处理器和接口。该处理器可用于执行上述方法实施例中的通信方法。
应理解,上述处理装置可以是一个芯片。例如,该处理装置可以是现场可编程门阵列(field programmable gate array,FPGA),可以是专用集成芯片(application specific integrated circuit,ASIC),还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。
在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。
应注意,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。 在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch-link DRAM,SLDRAM)和直接内存总线随机存取存储器(direct ram-bus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
当上述通信装置为应用于通信装置的芯片时,该芯片实现上述方法实施例中通信装置的功能。该芯片从通信装置中的其它模块(如射频模块或天线)接收信息;或者,该芯片向通信装置中的其它模块(如射频模块或天线)发送信息。
根据本申请实施例提供的策略控制方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序或指令,当该计算机程序或指令在计算机上运行时,使得图4和图10所示实施例中任意一个实施例的任意一种策略控制方法被执行。
根据本申请实施例提供的策略控制方法,本申请还提供一种计算机程序,当计算机程序在计算机上运行时,使得图4和图10所示实施例中任意一个实施例的任意一种策略控制方法被执行。
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序或指令,当该程序或指令在计算机上运行时,使得图4和图7所示实施例中任意一个实施例的任意一种通信方法被执行。
根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的装置或设备。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行该计算机指令时,全部或部分地产生按照本申请实施例该的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网 络、或者其他可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,该计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disc,SSD))等。
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在两个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进程来通信。
上述各个装置实施例中通信装置和方法实施例中的策略控制方法,由相应的模块或单元执行相应的步骤,例如收发单元(通信接口)执行方法实施例中接收或发送或获取的步骤,除发送、接收外的其它步骤可以由处理单元(处理器)执行。具体单元的功能可以参考相应的方法实施例。其中,处理器可以为一个或多个。
还应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
还应理解,本申请实施例中引入编号“第一”、“第二”、“第三”、“第四”、“#1”、“#2”、“#3”、“#a”、“#b”、“#c”等只是为了区分不同的对象,比如,区分不同类型的“信息”,或,“请求消息”,或,“响应消息”,或,“AM策略”等等,对具体对象以及不同对象间的对应关系的理解应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,该单元的划 分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
该作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
以上该,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以该权利要求的保护范围为准。

Claims (27)

  1. 一种策略控制方法,其特征在于,包括:
    移动性管理网元从提供移动性管理策略的策略控制网元接收第一信息,所述第一信息用于指示终端设备的第一移动性管理策略是根据所述终端设备的应用层信息确定的;
    所述移动性管理网元从数据管理网元接收第二信息,所述第二信息用于指示所述第一移动性管理策略对应的所述终端设备的签约信息被所述数据管理网元删除;
    所述移动性管理网元根据所述第一信息确定应用于所述终端设备的目标移动性管理策略。
  2. 根据权利要求1所述的方法,其特征在于,所述移动性管理网元根据所述第一信息确定应用于所述终端设备的目标移动性管理策略包括:
    所述移动性管理网元根据所述第一信息将所述第一移动性管理策略确定为应用于所述终端设备的所述目标移动性管理策略;或者
    所述移动性管理网元根据所述第一信息向所述策略控制网元发送所述第二信息;
    所述移动性管理网元从所述策略控制网元接收第三信息,所述第三信息用于指示应用于所述终端设备的所述目标移动性管理策略为所述第一移动性管理策略或者第二移动性管理策略,所述第二移动性管理策略为所述策略控制网元确定的所述第一移动性管理策略更新后的策略。
  3. 根据权利要求1或2所述的方法,其特征在于,所述终端设备的移动性管理策略中包括以下至少一项:业务区域限制、无线接入技术或频谱选择优先级索引。
  4. 根据权利要求1-3中任一项所述的方法,其特征在于,若所述签约信息为签约的业务区域限制,所述终端设备的移动性管理策略为业务区域限制;和/或,
    若所述签约信息为签约的无线接入技术或频谱选择优先级索引,所述终端设备的移动性管理策略为无线接入技术或频谱选择优先级索引。
  5. 一种策略控制方法,其特征在于,包括:
    第一策略控制网元获取第一移动性管理策略,所述第一策略控制网元为给终端设备执行移动性管理网元重选后的第一移动性管理网元提供移动性管理策略的策略控制网元,所述第一移动性管理策略为所述终端设备执行移动性管理网元重选前的第二移动性管理网元对所述终端设备执行的移动性管理策略;
    所述第一策略控制网元根据所述第一移动性管理策略和所述第一策略控制网元为所述终端设备制定的第二移动性管理策略确定所述第一移动性管理网元对所述终端设备执行的目标移动性管理策略;
    所述第一策略控制网元向所述第一移动性管理网元发送第一信息,所述第一信息用于指示所述目标移动性管理策略。
  6. 根据权利要求5所述的方法,其特征在于,所述第一策略控制网元获取所述第一移动性管理策略包括:
    所述第一策略控制网元从所述第一移动性管理网元接收所述第一移动性管理策略,或者
    所述第一策略控制网元从数据仓储网元接收所述第一移动性管理策略。
  7. 根据权利要求5或6所述的方法,其特征在于,所述第一策略控制网元根据所述第一移动性管理策略和所述第一策略控制网元为所述终端设备制定的第二移动性管理策略确定所述第一移动性管理网元对所述终端设备执行的目标移动性管理策略包括:
    若所述第一移动性管理策略与所述第二移动性管理策略相同,所述第一策略控制网元确定所述目标移动性管理策略为所述所述第一移动性管理策略或者所述第二移动性管理策略;
    若所述第一移动性管理策略与所述第二移动性管理策略不相同,所述第一策略控制网元确定所述目标移动性管理策略为所述所述第二移动性管理策略。
  8. 根据权利要求5-7中任一项所述的方法,其特征在于,所述第一策略控制网元还从所述第一移动性管理网元获取第一指示信息,所述第一指示信息用于指示所述第一移动性管理策略是根据与所述终端设备相关的应用层信息确定的,以及
    所述方法还包括:
    所述第一策略控制网元根据所述第一指示信息为所述终端设备制定第二移动性管理策略。
  9. 根据权利要求5-8中任一项所述的方法,其特征在于,所述目标移动性管理策略包括所述第一移动性管理策略或者第二移动性管理策略,所述第二移动性管理策略为所述第一策略控制网元为所述终端设备制定的移动性管理策略。
  10. 根据权利要求5-9中任一项所述的方法,其特征在于,若所述目标移动性管理策略包括所述第二移动性管理策略,所述方法还包括:
    所述第一策略控制网元向应用功能网元发送所述第二移动性管理策略。
  11. 根据权利要求5-10中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元根据所述终端设备的应用层信息、所述终端设备的会话信息和/或访问的应用信息确定所述第二移动性管理策略。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元向绑定支持网元发送第一请求消息,所述第一请求消息用于请求订阅为所述终端设备的第一会话提供会话管理策略的第三策略控制网元的绑定信息的注册或者去注册通知;
    所述第一策略控制网元接收来自所述绑定支持网元的第一通知消息,所述第一通知消息包括所述第三策略控制网元的绑定信息的注册通知消息或者所述第三策略控制网元的绑定信息的去注册通知消息。
  13. 根据权利要求11或12所述的方法,其特征在于,所述会话信息包括所述终端设备对应的第一会话的建立和/或终结事件。
  14. 根据权利要求11或12所述的方法,其特征在于,所述应用信息包括所述终端设备通过第一会话访问的第一应用的开始和/或结束的事件,以及
    所述方法还包括:
    所述第一策略控制网元向所述第三策略控制网元发送第二请求消息,所述第二请求消息用于请求订阅所述第一应用的开始和/或结束的事件;
    所述第一策略控制网元接收所述第三策略控制网元发送第二响应消息,所述第二响应消息包括所述第一应用的开始或者结束的事件。
  15. 根据权利要求5-14中任一项所述的方法,其特征在于,所述终端设备的移动性管理策略包括以下至少一项:业务区域限制、无线接入技术或频谱选择优先级索引。
  16. 根据权利要求15所述的方法,其特征在于,所述终端设备的第二移动性管理策略包括所述业务区域限制,和/或,无线接入技术或频谱选择优先级索引,以及
    所述第一策略控制网元确定所述第二移动性管理策略包括:
    所述第一策略控制网元根据所述应用层信息中的服务区域覆盖范围信息确定所述第二移动性管理策略对应的业务区域限制,和/或,
    所述第一策略控制网元根据所述应用层信息中的高吞吐量指示信息确定所述第二移动性管理策略对应的无线接入技术或频谱选择优先级索引。
  17. 一种策略控制系统,其特征在于,包括:数据管理网元和移动性管理网元;
    所述数据管理网元,用于向所述移动性管理网元发送第二信息,所述第二信息用于指示第一移动性管理策略对应的终端设备的签约信息被所述数据管理网元删除;
    所述移动性管理网元,用于从策略控制网元接收第一信息,所述第一信息用于指示所述第一移动性管理策略是根据所述终端设备的应用层信息确定的;接收所述第二信息;根据所述第一信息确定应用于所述终端设备的目标移动性管理策略。
  18. 根据权利要求17所述的系统,其特征在于,所述移动性管理网元根据所述第一信息确定应用于所述终端设备的目标移动性管理策略包括:
    所述移动性管理网元根据所述第一信息将所述第一移动性管理策略确定为应用于所述终端设备的所述目标移动性管理策略;或者
    所述移动性管理网元根据所述第一信息向所述策略控制网元发送所述第二信息;从所述策略控制网元接收第三信息,所述第三信息用于指示应用于所述终端设备的所述目标移动性管理策略为所述第一移动性管理策略或者第二移动性管理策略,所述第二移动性管理策略为所述第一移动性管理策略更新后的策略。
  19. 根据权利要求18所述的系统,其特征在于,所述装置还包括:
    策略控制网元,用于确定所述目标移动性管理策略,所述目标移动性管理策略包括所述第一移动性管理策略或者所述第二移动性管理策略;接收所述第二信息;发送所述第三信息。
  20. 根据权利要求17-19中任一项所述的系统,其特征在于,若所述目标移动性管理策略包括所述第二移动性管理策略,所述策略控制网元还用于向应用功能网元发送所述第二移动性管理策略。
  21. 一种策略控制系统,其特征在于,包括:第一移动性管理网元和第一策略控制网元,其中,所述第一移动性管理网元为终端设备执行移动性管理网元重选后的目标移动性管理网元,所述第一策略控制网元为给所述第一移动性管理网元提供移动性管理策略的策略控制网元;
    所述第一策略控制网元,用于获取第一移动性管理策略,所述第一移动性管理策略为第二移动性管理网元对所述终端设备执行的移动性管理策略,所述第二移动性管理网元为所述终端设备执行移动性管理网元重选前的源移动性管理网元;根据所述第一移动性管理策略确定所述第一移动性管理网元对所述终端设备执行的目标移动性管理策略;向所述第一移动性管理网元发送第一信息,所述第一信息用于指示所述目标移动性管理策略;
    所述第一移动性管理网元,用于接收所述第一信息。
  22. 根据权利要求21所述的系统,其特征在于,所述系统还包括所述第二移动性管理网元,以及
    所述第二移动性管理网元,用于向所述第一移动性管理网元发送所述第一移动性管理策略;
    所述第一移动性管理网元,还用于接收所述第一移动性管理策略。
  23. 根据权利要求22所述的系统,其特征在于,
    所述第二移动性管理网元,还用于发送第一指示信息,所述第一指示信息用于指示所述终端设备的第一移动性管理策略是根据所述终端设备的应用层信息确定的;
    所述第一移动性管理网元,还用于接收所述第一指示信息;向所述第一策略控制网元发送所述第一指示信息和所述第一移动性管理策略;
    所述第一策略控制网元,还用于接收所述第一指示信息和所述第一移动性管理策略;根据所述第一指示信息和所述第一移动性管理策略确定所述目标移动性管理策略。
  24. 根据权利要求21-23中任一项所述的系统,其特征在于,所述目标移动性管理策略包括所述第一移动性管理策略或者第二移动性管理策略,所述第二移动性管理策略为所述第一策略控制网元制定的应用于所述终端设备的移动性管理策略。
  25. 一种通信装置,其特征在于,包括用于执行如权利要求1至4中任一项所述的方法的模块,或者如权利要求5至16中任一项所述的方法的模块。
  26. 一种计算机可读存储介质,包括计算机程序,当其在计算机上运行时,使得所述计算机执行如权利要求1-4任一项,或权利要求5-16任一项所述的策略控制方法。
  27. 一种计算机程序产品,所述计算机程序产品包括计算机程序,当所述计算机程序在计算机上运行时,使得计算机执行如权利要求1-4任一项,或权利要求5-16任一项所述的策略控制方法。
PCT/CN2022/095672 2021-06-25 2022-05-27 一种策略控制的方法、装置和系统 WO2022267824A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110714623.5 2021-06-25
CN202110714623.5A CN115529636A (zh) 2021-06-25 2021-06-25 一种策略控制的方法、装置和系统

Publications (1)

Publication Number Publication Date
WO2022267824A1 true WO2022267824A1 (zh) 2022-12-29

Family

ID=84544106

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/095672 WO2022267824A1 (zh) 2021-06-25 2022-05-27 一种策略控制的方法、装置和系统

Country Status (2)

Country Link
CN (1) CN115529636A (zh)
WO (1) WO2022267824A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016000842A1 (en) * 2014-06-30 2016-01-07 Telefonaktiebolaget L M Ericsson (Publ) Aggregation of congestion information
CN110505663A (zh) * 2018-05-16 2019-11-26 华为技术有限公司 一种策略控制方法、装置及系统
CN110519746A (zh) * 2018-05-21 2019-11-29 华为技术有限公司 一种用于终止接入和移动性管理策略关联的方法和装置
CN114302355A (zh) * 2021-12-28 2022-04-08 中国电信股份有限公司 策略和计费控制方法、装置、电子设备以及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016000842A1 (en) * 2014-06-30 2016-01-07 Telefonaktiebolaget L M Ericsson (Publ) Aggregation of congestion information
CN110505663A (zh) * 2018-05-16 2019-11-26 华为技术有限公司 一种策略控制方法、装置及系统
CN110519746A (zh) * 2018-05-21 2019-11-29 华为技术有限公司 一种用于终止接入和移动性管理策略关联的方法和装置
CN114302355A (zh) * 2021-12-28 2022-04-08 中国电信股份有限公司 策略和计费控制方法、装置、电子设备以及存储介质

Also Published As

Publication number Publication date
CN115529636A (zh) 2022-12-27

Similar Documents

Publication Publication Date Title
JP7187580B2 (ja) セッション管理の方法、装置、およびシステム
US20210250890A1 (en) Methods, apparatuses, and computer program products for handling emergency services in private networks
WO2019158109A1 (zh) 一种网元的选择方法及装置
EP3737126B1 (en) Communication method and communication apparatus
KR20210126584A (ko) 슬라이스-특정 2차 인증 및 인가의 디바이스 트리거되는 재인증을 지원하는 시스템들 및 방법들
US10448290B2 (en) User equipment, base station, and connection establishment method
EP3337285B1 (en) Base station, user apparatus, and capability information transmission methods
WO2018161796A1 (zh) 多接入场景中的连接处理方法和装置
TW201831038A (zh) 用以選擇網路切片的使用者設備註冊方法、及使用此方法的網路控制器與網路通訊系統
WO2019137553A1 (zh) 一种配置ue的策略的方法、装置和系统
EP4027684A1 (en) Service configuration method, communication device, and communication system
JP5524338B2 (ja) 移動局の無線アクセス技術機能に関する情報の受信
US11943674B2 (en) Conditional handover of master node in the presence of secondary node
WO2020057625A1 (zh) 网关切换方法、网关重选方法和通信装置
WO2021203947A1 (zh) 一种通信方法及装置
US20210258857A1 (en) Methods, apparatuses, and computer program products for managing a devices network capabilities in private networks
WO2020001226A1 (zh) 重定向的方法、通信系统和通信装置
WO2022247812A1 (zh) 一种鉴权方法、通信装置和系统
WO2022199451A1 (zh) 会话切换的方法和装置
KR20230063879A (ko) 사용자 장비 네트워크 슬라이스 관리를 위한 향상들
WO2023051430A1 (zh) 通信的方法和装置
WO2023011630A1 (zh) 授权验证的方法及装置
WO2022267824A1 (zh) 一种策略控制的方法、装置和系统
WO2020001465A1 (zh) 管理用户数据的方法和装置
WO2022214094A1 (zh) 一种网络切换方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22827321

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE