WO2023077917A1 - 一种通信方法和设备 - Google Patents
一种通信方法和设备 Download PDFInfo
- Publication number
- WO2023077917A1 WO2023077917A1 PCT/CN2022/113815 CN2022113815W WO2023077917A1 WO 2023077917 A1 WO2023077917 A1 WO 2023077917A1 CN 2022113815 W CN2022113815 W CN 2022113815W WO 2023077917 A1 WO2023077917 A1 WO 2023077917A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- target
- random access
- indication information
- message
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 196
- 238000004891 communication Methods 0.000 title claims abstract description 67
- 230000005540 biological transmission Effects 0.000 claims abstract description 136
- 230000008569 process Effects 0.000 claims description 66
- 230000011664 signaling Effects 0.000 claims description 39
- 230000010287 polarization Effects 0.000 claims description 11
- 241000169170 Boreogadus saida Species 0.000 claims 3
- 230000015654 memory Effects 0.000 description 56
- 230000006870 function Effects 0.000 description 27
- 238000012545 processing Methods 0.000 description 20
- 238000003860 storage Methods 0.000 description 11
- 238000004590 computer program Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 230000007774 longterm Effects 0.000 description 6
- 230000004044 response Effects 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 230000002776 aggregation Effects 0.000 description 2
- 238000004220 aggregation Methods 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 239000000969 carrier Substances 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/04—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/006—Transmission of channel access control information in the downlink, i.e. towards the terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Definitions
- the present application relates to the communication field, and more particularly, to a communication method and device.
- Radio Frequency Identification technology is a non-contact automatic identification technology.
- RFID systems generally include readers, tags and data management systems. Using radio frequency signals and their spatial coupling and transmission characteristics, automatic identification of stationary or moving items can be realized.
- RFID can be used to track and manage management objects in many fields. It has the characteristics of high accuracy, long reading distance, large amount of stored data, and strong durability. It is widely used in product production, logistics, sales and other links.
- the power supply mode of RFID it can be divided into three categories, namely passive RFID, active RFID and semi-active RFID.
- passive RFID active RFID
- semi-active RFID the capability information can be sent to the reader. That is, the efficiency of tag random access is low, which results in poor performance of subsequent data transmission.
- the present application provides a communication method and device.
- the first device can select the target second device based on different types or different capabilities of the target second device. Random access improves the efficiency of random access between the second device and the first device.
- the first device can configure the data transmission of the second device based on the first information, thereby also improving the performance of subsequent data transmission.
- a communication method includes: a second device receives first indication information from a first device, the first indication information includes first information, the first information is used to determine a target second device, and the first The information includes at least one or more of the following: information of the first type of the target second device, information encoded by the polar code of the target second device, information about the authentication and registration of the target second device, wherein the first indication information is used to indicate The first device selects the target second device to initiate a random access request, or the first indication information is used to indicate that the first device supports the target second device to initiate a random access request, and the target second device is in accordance with the first information A second device with one or more pieces of information in the information; if the second device is the target second device, the second device initiates a random access request to the first device.
- the first information may also include other characteristic information such as mask information, flag bit information, and identification information of the target second device.
- the target second device is a second device that meets one or more items in the first information, and it can be understood that the target second device satisfies the conditions for selecting or supporting the target second device in the first information.
- the second device when the first information includes multiple pieces of information, the second device can become the target second device only if it meets the selection conditions of one of the pieces of information; The selection criteria of the information are thus targeted to the second device.
- the one or more second devices may all receive the first indication information sent by the first device, and the first indication information may include the information for determining the target second device . That is, during subsequent random access, the determined target second device may initiate a random access request.
- the second device mentioned in the following possible implementation manners may be understood as a target second device that can perform random access.
- the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
- the first indication information is used to indicate that the first device supports the target second device to initiate a random access request. It can also be understood that the first device not only supports the target second device to initiate a random access request, the first device also supports It is also supported that other second devices initiate random access requests.
- the first indication information may be, for example, inventory indication information (which may also be understood as inventory signaling). For example, it may be selection (select) signaling, query (query) signaling, paging signaling or other signaling sent by the first device.
- the terminal supports the "polar code encoding” capability, which can also be understood as the terminal supports the “polar code encoding and decoding” capability.
- the second device may be a terminal device, for example, the second device is an electronic tag; for example, the second device is a RedCap UE; and for example, the second device is an Internet of Things device, etc.
- the first device in this application may refer to a reader, may refer to a network device, may also be an Internet of Things device, and so on.
- the first device can select the target second device for random access based on different types or different capabilities of the target second device, thereby It is realized that the first device can select the second device to perform random access, thereby improving the efficiency of random access.
- the first device may configure the data transmission of the second device based on the first information, so as to improve the performance of subsequent data transmission.
- the second device may also send first configuration information when sending the first indication information, the first configuration information may be determined based on the first indication information, and the first configuration information is used to configure subsequent data of the second device Information Used When Transmitting.
- the first indication information sent by the second device includes the first configuration information.
- the first indication information and the first configuration information may be one message or multiple messages.
- the first configuration information may include authentication and registration indication information, application polar code indication information, and configuration rate indication information when the first device configures subsequent data transmission for the second device.
- the indication information of authentication and registration is used to indicate that the second device needs to initiate a registration process with the core network during data transmission;
- the application polarization code indication information is used to indicate that the second device uses polarization when transmitting uplink data and/or downlink data.
- code for data transmission; configuring the rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the second device when the second device transmits data, it can directly use the corresponding configuration to perform data transmission according to the instruction of the configuration information. After successful random access, the second device does not need to wait for the configuration information of the first device.
- the flexibility of network configuration is improved, the delay of data transmission is saved, and the rate of data transmission is increased.
- the first indication information is used to instruct the first device to select a target second device to initiate random access
- the information of the first type of the target second device is used Instructing the first device to select the second device of the first type to initiate a random access request
- the information about the polar code encoding of the target second device is used to instruct the first device to select support for having a polar code encoding
- the capable second device initiates a random access request
- the information about the authentication and registration of the target second device is used to instruct the first device to choose to support the second device with authentication and registration capabilities to initiate the random access request.
- the information about the authentication and registration of the target second device may also be used to indicate that the selected target second device may perform an authentication and registration process after successful random access.
- the information about the type of the target second device is used to indicate that the target second device performs random access.
- the first device supports a random access request initiated by a second device of the first type
- the polar code-coded information of the target second device is used to indicate that the first device supports a second device with polar code coding capability to initiate a random access request
- the authentication and registration information of the target second device is used to indicate that the first device supports a random access request initiated by a second device capable of authentication and registration.
- the first device can select the target second device to perform random access by sending the first instruction information, or indicate to support the target second device to perform random access, so as to realize the group access of the electronic tag .
- the second device initiates random access to the first device, including: the second device sends a first message to the first device to perform random access; wherein, the first message Include capability information of the second device, where the capability information includes one or more of the following: information about the first type of the second device, information about whether the second device supports polar code encoding, the Whether the second device supports authentication registration information.
- the first message may be, for example, a random access request message or a response message to the first indication information, and this application does not limit the specific name of the first message.
- the method further includes: the second device sends capability information to the first device, where the capability information includes one or more of the following: information of the first type of the second device, Information about whether the second device supports polar code encoding, and information about whether the target second device supports authentication and registration.
- the target second device when the target second device randomly accesses, it can also report its capability information, so that the first device can obtain the capability information of the target second device in a timely manner, and can timely determine data transmission based on its capability information Required configuration information.
- the data transmission process is simple, so reporting the capability information as early as possible can improve the performance of data transmission and ensure the reliability of data transmission. .
- the method further includes: the second device receiving configuration information from the first device, the configuration information is obtained by the first device according to the first indication information and/or the Determined by the capability information, the configuration information is used to configure information used by the second device for data transmission or signaling transmission.
- the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the first device can determine the configuration information of the target second device based on the indication information and/or capability information, so that the first device can enable different target second devices according to different capabilities and types. process, or configure different parameters, etc., so that the target second device can transmit data better, thereby improving data transmission performance.
- the second device receiving the configuration information from the first device includes: the second device receiving a second message from the first device, the second message including the The above configuration information, wherein the second message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
- the configuration information can be flexibly carried in each signaling.
- a communication method includes: a second device receives second indication information from a first device, where the second indication information is used to instruct the second device to initiate a random access request; the The second device sends a first message to the first device to perform random access, where the first message includes capability information of the second device, and the capability information includes one or more of the following: Information about the type of the second device, information about whether the second device supports polar code encoding, and information about whether the second device supports authentication and registration.
- the second device in the above technical solution may be understood as a group of second devices selected by the first device, for example, second devices that meet certain conditions and can perform random access.
- the second indication information can also be understood as a trigger message of the network device, and once the network device sends the trigger message, the second device can perform random access.
- the second device can actively report the capability information during the random access process, so that the first device can obtain the capability information of the target second device in a timely manner, so that the first device can timely
- the capabilities of the second device are configured accordingly.
- the data transmission process is simple. Therefore, reporting the capability information as early as possible can improve the performance of data transmission and ensure the reliability of data transmission.
- the information of the second device type is used to indicate that the type of the second device is the first type
- the information encoded by the polar code of the second device is used to indicate that the second device supports Polar code encoding
- the authentication registration information of the second device is used to indicate that the second device supports authentication registration.
- the method further includes: the second device receiving configuration information from the first device, the configuration information is determined by the first device according to the capability information, and the configuration information It is used to configure the information used when the second device performs data transmission.
- the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the second device can report capability information before transmitting service data, so that the reader can obtain terminal capability information in time, and perform corresponding configuration on the terminal, thereby improving transmission performance and transmission reliability.
- the second device receiving configuration information from the first device includes: the second device receiving a second message from the first device, the second message including the configuration information information, wherein the first message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
- the configuration information can be flexibly carried in each signaling.
- a communication method includes: a first device sends first indication information to a second device, the first indication information includes first information, and the first information is used to determine the target second device, the first information includes at least one or more of the following: information of the first type of the target second device, polar code-encoded information of the target second device, authentication and registration information of the target second device, the first The indication information is used to instruct the first device to select a target second device to initiate random access, or the first indication information is used to indicate that the first device supports the target second device to initiate random access, and the target The second device is a second device conforming to one or more pieces of information in the first information; the first device receives a random access request from the target second device, where the second device is the target the second device.
- the first indication information is used to instruct the first device to select a target second device to initiate random access
- the information of the first type of the target second device is used Instructing the first device to select a second device of the first type to initiate a random access request
- the polar code coding information of the target second device is used to instruct the first device to select a device that supports polar code coding capabilities.
- the second device initiates a random access request
- the authentication and registration information of the target second device is used to instruct the first device to select a second device capable of authentication and registration to initiate the random access request.
- the information of the first type of the target second device is used for instructing the first device to support the first type of second device to initiate a random access request
- the information about the polar code encoding of the target second device is used to indicate that the first device supports the first device with polar code encoding capability
- the second device initiates a random access request
- the authentication and registration information of the target second device is used to indicate that the first device supports a random access request initiated by a second device capable of authentication and registration.
- the receiving the random access request from the second device by the first device includes: the first device receiving a first message from the second device; wherein the first message includes the second Capability information of the device, where the capability information includes one or more of the following: information about the type of the second device, information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration information.
- the method further includes: the first device receives capability information from the second device, and the capability information includes one or more of the following : Information about the type of the second device, information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration.
- the method further includes: the first device determines configuration information according to the first indication information and/or the capability information, and the configuration information is used to configure the second device to perform data processing. Information used during transmission or signaling transmission; the first device sends the configuration information to the second device.
- the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the first device sending the configuration information to the second device includes: the first device sending a second message to the second device, the second message including the The above configuration information, wherein the second message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
- the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
- a communication method includes: a first device sends second indication information to a second device, where the second indication information is used to instruct the second device to initiate a random access request; the The first device receives a first message from the second device, where the first message includes capability information of the second device, and the capability information includes one or more of the following: the type of the second device information, information about whether the second device supports polar code encoding, and information about whether the second device supports authentication and registration.
- the information of the second device type is used to indicate that the type of the second device is the first type
- the information encoded by the polar code of the second device is used to indicate that the second device supports Polar code encoding
- the authentication registration information of the second device is used to indicate that the second device supports authentication registration.
- the method further includes: the first device determines configuration information according to the capability information, and the configuration information is used to configure information used by the second device for data transmission; the The first device sends the configuration information to the second device.
- the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the first device sending the configuration information to the second device includes: the first device sending a second message to the second device, the second message including the The above configuration information, wherein the first message is specifically: a conflict resolution message or an acknowledgment message.
- the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
- a communication device includes a transceiver unit, the transceiver unit is configured to receive first indication information, the first indication information includes first information, and the first information is used to determine the first information of the target.
- the first information includes at least one or more of the following: information about the first type of the target second device, information encoded by a polar code of the target second device, authentication registration of the target second device information, wherein the first indication information is used to instruct the first device to select the target second device to initiate a random access request, or the first indication information is used to indicate that the first device supports the
- the target second device initiates a random access request, the target second device is a second device conforming to one or more pieces of information in the first information; when the second device is the target second device
- the transceiving unit is further configured to initiate a random access request to the first device.
- the first indication information is used to instruct the first device to select a target second device to initiate random access
- the information of the first type of the target second device is used Instructing the first device to select a second device of the first type to initiate a random access request
- the polar code coding information of the target second device is used to instruct the first device to select a device that supports polar code coding capabilities.
- the second device initiates a random access request
- the authentication and registration information of the target second device is used to instruct the first device to select a second device capable of authentication and registration to initiate the random access request.
- the information about the type of the target second device is used to indicate that the target second device performs random access.
- the first device supports a random access request initiated by a second device of the first type
- the polar code-coded information of the target second device is used to indicate that the first device supports a second device with polar code coding capability to initiate a random access request
- the authentication and registration information of the target second device is used to indicate that the first device supports a random access request initiated by a second device capable of authentication and registration.
- the transceiver unit is configured to initiate random access to the first device, including: the transceiver unit is configured to send a first message to the first device to perform random access; wherein, The first message includes capability information of the target second device, and the capability information includes one or more of the following: information about the type of the second device, information about whether the second device supports polar coding . Information about whether the second device supports authentication and registration.
- the transceiving unit is configured to send capability information to the first device, where the capability information includes one or more of the following: information about the target second device type, the target second device Information about whether the device supports polar code encoding, and information about whether the target second device supports authentication and registration.
- the transceiving unit is configured to receive configuration information from the first device, where the configuration information is determined by the first device according to the first indication information and/or the capability information, The configuration information is used to configure information used by the second device for data transmission or signaling transmission.
- the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the target second device to use the polar code for data transmission when transmitting uplink data and/or downlink data; the configuration rate The indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the transceiving unit is configured to receive the configuration information from the first device, including: the transceiving unit is configured to receive a second message from the first device, and the second message includes The configuration information is included, wherein the second message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
- the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
- a communication device includes: a transceiver unit, configured to receive second indication information, where the second indication information is used to instruct a second device to initiate a random access request; the The transceiver unit is further configured to send a first message for random access, wherein the first message includes capability information of the second device, and the capability information includes one or more of the following: the type of the second device Information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration.
- the information of the second device type is used to indicate that the type of the second device is the first type
- the information encoded by the polarization code of the second device is used to indicate that the device supports polarization Code encoding, where the information about the authentication registration of the second device is used to indicate that the second device supports authentication registration.
- the transceiver unit is configured to receive configuration information, the configuration information is determined by the first device according to the capability information, and the configuration information is used to configure the second device to perform data transmission. information used.
- the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate The second device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data ; The configured rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the transceiver unit is configured to receive configuration information from the first device, including: the transceiver unit is configured to receive a second message from the first device, and the second message includes the configuration information. information, wherein the first message is specifically: a conflict resolution message or an acknowledgment message.
- the target second device type includes one or more of the following: active type, passive type, and semi-passive type.
- a communication device includes: a transceiver unit configured to send first indication information, the first indication information includes first information, and the first information is used to determine a target For the second device, the first information includes at least one or more of the following: information about the first type of the target second device, information encoded by the polar code of the target second device, information about the authentication and registration of the target second device, the The first indication information is used to instruct the first device to select the target second device to initiate random access, or the first indication information is used to indicate that the first device supports the target second device to initiate random access, the The target second device is a second device conforming to one or more pieces of information in the first information; the transceiver unit is further configured to receive a random access request from the second device, wherein the second device for the target second device.
- the first indication information is used to instruct the first device to select a target second device to initiate random access
- the information about the type of the target second device is used to indicate that the target second device
- the first device selects a second device of the first type to initiate a random access request
- the polar code-encoded information of the target second device is used to instruct the first device to select a second device that supports polar code encoding capabilities.
- a random access request is initiated, and the authentication and registration information of the target second device is used to instruct the first device to select a second device capable of authentication and registration to initiate a random access request.
- the information of the first type of the target second device is used for instructing the first device to support the first type of second device to initiate a random access request
- the information about the polar code encoding of the target second device is used to indicate that the first device supports the first device with polar code encoding capability
- the second device initiates a random access request
- the authentication and registration information of the target second device is used to indicate that the first device supports a random access request initiated by a second device capable of authentication and registration.
- the transceiver unit is configured to receive a random access request from the second device, comprising: the transceiver unit is configured to receive a first message from the second device; wherein the first message includes the Capability information of the second device, where the capability information includes one or more of the following: information about the type of the second device, information about whether the second device supports polar code encoding, whether the second device supports authentication registered information.
- the transceiving unit is configured to receive capability information from the second device, and the capability information includes one or more of the following: information about the type of the second device, whether the second device information supporting polar code encoding, and information indicating whether the second device supports authentication and registration.
- the device further includes: a processing unit, configured to determine configuration information according to the first indication information and/or the capability information, and the configuration information is used to configure the first Information used by the second device for data transmission or signaling transmission; the transceiver unit is configured to send the configuration information to the second device.
- a processing unit configured to determine configuration information according to the first indication information and/or the capability information, and the configuration information is used to configure the first Information used by the second device for data transmission or signaling transmission
- the transceiver unit is configured to send the configuration information to the second device.
- the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the transceiving unit is configured to send the configuration information to the target second device, including: the transceiving unit is configured to send a second message to the target second device, the second The configuration information is included in the message, where the second message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
- the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
- a communication device includes a transceiver unit, the transceiver unit is configured to send second indication information, and the second indication information is used to instruct the second device to initiate a random access request; the transceiver The unit is further configured to receive a first message from the second device, where the first message includes capability information of the second device, and the capability information includes one or more of the following: Type information, information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration.
- the information of the second device type is used to indicate that the type of the second device is the first type
- the information encoded by the polar code of the second device is used to indicate that the second device supports Polar code encoding
- the authentication registration information of the second device is used to indicate that the second device supports authentication registration.
- the device further includes: a processing unit, configured to determine configuration information according to the capability information, and the configuration information is used to configure the second device used for data transmission. information; the transceiving unit is configured to send the configuration information to the second device.
- the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the transceiving unit is configured to send the configuration information to the second device, including: the transceiving unit is configured to send a second message to the second device, and the second message includes The configuration information is included, wherein the first message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
- the type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
- a communication device including a processor is provided.
- the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to implement the method in any possible implementation manner of any one of the first aspect or the second aspect above.
- the device also includes memory.
- the device further includes a communication interface, and the processor is coupled to the communication interface.
- the device is a terminal device.
- the communication interface may be a transceiver, or an input/output interface.
- the device is a chip configured in a terminal device.
- the communication interface may be an input/output interface.
- the device is a host node device.
- the communication interface may be a transceiver, or an input/output interface.
- the device is a chip configured in the host node.
- the communication interface may be an input/output interface.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- a communication device including a processor is provided.
- the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to implement the method in any possible implementation manner of any one of the third aspect or the fourth aspect above.
- the device also includes memory.
- the device further includes a communication interface, and the processor is coupled to the communication interface.
- the device is a network device.
- the communication interface may be a transceiver, or an input/output interface.
- the device is a chip configured in a network device.
- the communication interface may be an input/output interface.
- the device is a host node device.
- the communication interface may be a transceiver, or an input/output interface.
- the device is a chip configured in the host node device.
- the communication interface may be an input/output interface.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- a processor including: an input circuit, an output circuit, and a processing circuit.
- the processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor executes the method in any possible implementation manner of any one of the first aspect to the fourth aspect .
- the above-mentioned processor can be one or more chips
- the input circuit can be an input pin
- the output circuit can be an output pin
- the processing circuit can be a transistor, a gate circuit, a flip-flop and various logic circuits, etc.
- the input signal received by the input circuit may be received and input by, for example but not limited to, a transceiver
- the output signal of the output circuit may be, for example but not limited to, output to the transmitter and transmitted by the transmitter
- the circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times.
- the embodiment of the present application does not limit the specific implementation manners of the processor and various circuits.
- a processing device including a processor and a memory.
- the processor is used to read instructions stored in the memory, and can receive signals through the transceiver and transmit signals through the transmitter, so as to execute the method in any possible implementation manner of any one of the first aspect to the fourth aspect.
- processors there are one or more processors, and one or more memories.
- the memory may be integrated with the processor, or the memory may be set separately from the processor.
- the memory can be a non-transitory (non-transitory) memory, such as a read-only memory (read only memory, ROM), which can be integrated with the processor on the same chip, or can be respectively arranged in different On the chip, the embodiment of the present application does not limit the type of the memory and the configuration of the memory and the processor.
- a non-transitory memory such as a read-only memory (read only memory, ROM)
- ROM read only memory
- a related data interaction process such as sending indication information may be a process of outputting indication information from a processor
- receiving capability information may be a process of receiving input capability information from a processor.
- the data output by the processor may be output to the transmitter, and the input data received by the processor may be from the transceiver.
- the transmitter and the transceiver may be collectively referred to as a transceiver.
- the processing device in the above twelfth aspect may be one or more chips.
- the processor in the processing device may be implemented by hardware or by software.
- the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, etc.; when implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in a memory, which can Integrated in a processor, it can exist independently of that processor.
- a computer-readable medium stores a computer program (also called code, or instruction), and when it is run on a computer, it causes the computer to execute the above-mentioned first aspect to the method in any possible implementation manner in any aspect of the fourth aspect.
- a computer program also called code, or instruction
- the present application provides a computer program product including instructions.
- the computer program product is run on a computer, the computer is instructed to execute the method in any one of the first aspect to the fourth aspect above.
- a chip system including a processor, configured to call and run a computer program from a memory, so that a device installed with the chip system performs any one of the first to fourth aspects above.
- a sixteenth aspect provides a communication system, where the communication system includes the device involved in any implementation manner of any one of the fifth aspect to the eighth aspect.
- Fig. 1 is a schematic diagram of a scenario applicable to this application.
- Fig. 2 is a schematic diagram of the RFID system in this application.
- FIG. 3 is a flow chart of a communication method 300 provided by the present application.
- FIG. 4 is a flowchart of a communication method 400 provided by the present application.
- FIG. 5 is a flowchart of a communication method 500 provided by the present application.
- Fig. 6 is a schematic block diagram of a communication device 100 provided by the present application.
- Fig. 7 is a schematic block diagram of a communication device 200 provided in this application.
- the wireless communication systems applicable to the embodiments of the present application include but are not limited to: global system of mobile communication (GSM) system, long term evolution (long term evolution, LTE) frequency division duplex (frequency division duplex, FDD) system , LTE time division duplex (time division duplex, TDD), LTE system, advanced long-term evolution (LTE-Advanced, LTE-A) system, next-generation communication system (for example, 5G communication system), integration of multiple access systems system, or an evolved system (eg, 6G communication system).
- GSM global system of mobile communication
- LTE long term evolution
- FDD frequency division duplex
- FDD frequency division duplex
- TDD time division duplex
- LTE-A advanced long-term evolution
- next-generation communication system for example, 5G communication system
- integration of multiple access systems system or an evolved system (eg, 6G communication system).
- the technical solution provided by this application can also be applied to machine type communication (machine type communication, MTC), inter-machine communication long-term evolution technology (Long Term Evolution-machine, LTE-M), device to device (device to device, D2D) network , machine to machine (machine to machine, M2M) network, Internet of things (internet of things, IoT) network or other networks.
- MTC machine type communication
- LTE-M inter-machine communication long-term evolution technology
- D2D device to device
- machine to machine machine to machine
- M2M machine to machine
- IoT Internet of things
- the IoT network may include, for example, the Internet of Vehicles.
- the communication methods in the Internet of Vehicles system are collectively referred to as vehicle to other devices (vehicle to X, V2X, X can represent anything), for example, the V2X can include: vehicle to vehicle (vehicle to vehicle, V2V) communication, vehicle and Infrastructure (vehicle to infrastructure, V2I) communication, vehicle to pedestrian (vehicle to pedestrian, V2P) or vehicle to network (vehicle to network, V2N) communication, etc.
- vehicle to vehicle vehicle to vehicle
- V2V vehicle to vehicle
- V2I vehicle to infrastructure
- V2P vehicle to pedestrian
- V2N vehicle to network
- the terminal equipment in this application can also be referred to as user equipment (user equipment, UE), mobile station (mobile station, MS), mobile terminal (mobile terminal, MT), etc., which provide voice and/or data connectivity to users.
- sexual equipment For example, handheld devices with wireless connectivity, vehicle-mounted devices, etc.
- examples of some terminals are: mobile phone (mobile phone), tablet computer, notebook computer, palmtop computer, mobile internet device (mobile internet device, MID), wearable device, virtual reality (virtual reality, VR) device, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control, wireless terminals in self driving, wireless terminals in remote medical surgery, smart grid Wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, etc.
- the access network device in this application may refer to a radio access network (radio access network, RAN) node (or device) that connects a terminal to a wireless network, and may also be called a base station.
- radio access network radio access network
- RAN radio access network
- examples of some RAN nodes are: evolving Node B (gNB), transmission reception point (transmission reception point, TRP), evolved Node B (evolved Node B, eNB), radio network controller (radio network controller, RNC), node B (Node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB) , base band unit (base band unit, BBU), or wireless fidelity (wireless fidelity, Wifi) access point (access point, AP), etc.
- gNB Node B
- TRP transmission reception point
- eNB evolved Node B
- RNC
- the access network device may include a centralized unit (centralized unit, CU) node, or a distributed unit (distributed unit, DU) node, or a RAN device including a CU node and a DU node.
- the RAN equipment including the CU node and the DU node separates the protocol layer of the eNB in the long term evolution (LTE) system, and the functions of some protocol layers are placed in the centralized control of the CU, and some or all of the functions of the protocol layer are left Distributed in the DU, the CU centrally controls the DU.
- the access network device may also be a reader device.
- the core network equipment in this application can be a general term for various functional entities used to manage users, data transmission and base station configuration on the network side, including mobile management function network element (AMF), user plane function network element (UPF), session Management function element (SMF), etc.
- AMF mobile management function network element
- UPF user plane function network element
- SMF session Management function element
- this application can be applied to a 5G new radio (new radio, NR) system.
- This application can also be applied to other communication systems. For example, an entity in this communication system needs to send transmission direction indication information, and another entity needs to receive the indication information and determine the transmission direction within a certain period of time according to the indication information.
- Figure 1 is a schematic diagram of a scenario applicable to this application.
- the UE is located within the coverage of one or more cells (also known as carriers) provided by the base station equipment, and the UE There can be one or more cells served.
- the UE can work in accordance with carrier aggregation (carrier aggregation, CA), or dual connectivity (dual connectivity, DC), or coordinated multi-point transmission (coordinated multiple points, CoMP), where at least A cell provides more than one subcarrier spacing (numerology) and provides radio resources for UEs.
- carrier aggregation carrier aggregation
- CA dual connectivity
- CoMP coordinated multi-point transmission
- at least A cell provides more than one subcarrier spacing (numerology) and provides radio resources for UEs.
- the UE may also be located within the coverage provided by a reader (reader), and the communication between the reader and the UE may be regarded as terminal-to-terminal transmission.
- the transmission between the terminal or reader and the macro base station (may be referred to as "macro station") or pole base station (may be referred to as "pole station”) belongs to uu interface transmission, that is, air interface transmission.
- Radio Frequency Identification It is a non-contact automatic identification technology. Automatic recognition of objects. Usually, the identification process can be: after the tag enters the reader (reader) (also can be understood as a reader), it receives the radio frequency signal sent by the reader, and the tag can rely on the energy obtained by the induced current Send out product information stored in the chip (for example, passive tags or passive tags), or a signal of a certain frequency is actively sent by the tag (for example, active tags or active tags), the reader reads and decodes the information , sent to the central information system for relevant data processing.
- the reader also can be understood as a reader
- the tag can rely on the energy obtained by the induced current Send out product information stored in the chip (for example, passive tags or passive tags), or a signal of a certain frequency is actively sent by the tag (for example, active tags or active tags), the reader reads and decodes the information , sent to the central information system for relevant data processing.
- FIG. 2 shows the RFID system, as shown in Figure 2, in general, a complete RFID system can be composed of three parts: reader, electronic tag and data management system. Its working principle is: the reader emits radio wave energy of a specific frequency to drive the circuit, so as to send out the internal data. At this time, the reader can receive and interpret the data in sequence, and send it to the application program for corresponding processing.
- a typical reader includes a high-frequency module (eg, a transmitter or a receiver), a control unit, and a reader antenna.
- An RFID reader can also be understood as a device that communicates with tags. It can be a terminal, a base station, or a device with read and write functions.
- Electronic tag It consists of a tag antenna and a tag-specific chip, as shown in (b) in Figure 2.
- electronic tags can be divided into active electronic tags (active tag), passive electronic tags (passive tag) and semi-passive electronic tags (semi-passive tag).
- Active electronic tags are equipped with batteries, passive RFID tags do not have internal batteries, and semi-passive electronic tags rely on batteries to work partly.
- electronic tags can be divided into low frequency electronic tags, high frequency electronic tags, ultra high frequency electronic tags and microwave electronic tags. Of course, they can also be classified according to different packaging forms, which will not be described in detail here.
- Passive tags can also be called passive Internet of things (IOT). Therefore, RFID electronic tags can also be regarded as a terminal.
- IOT passive Internet of things
- IoT Internet of Things
- M2M is an abbreviation for the transmission of information and data between machines through wireless networks, and is an important direction for the development of IoT.
- IoT technologies include narrowband (narrow band) IoT, low capacity (reduced capacity, RedCap) user equipment, etc.
- the power consumption of the prior art is still above the milliwatt level, and there is no way to further save power consumption.
- the passive RFID technology can achieve microwatt-level power consumption and ultra-low cost, and has become an important branch of the future evolution of cellular technology.
- RFID can be used to track and manage management objects in many fields. It has the characteristics of high accuracy, long reading distance, large amount of stored data, and strong durability. It is widely used in product production, logistics, and sales. middle.
- the existing reader-writer interacts with multiple tags in the same process, and the reader-writer cannot identify different types of tags during the inventory process. According to the inventory process, after the random access of the tag is successful, it is possible to send its capability information to the reader. That is, the efficiency of tag random access is low, which results in poor performance of subsequent data transmission.
- the present application provides a communication method, which can select different tags to be connected to the reader-writer based on the type of the tag, thereby improving the random access efficiency between the tag and the reader-writer.
- the reader can use different processes or configure different parameters according to different capabilities and types of tags, thereby improving data transmission performance.
- Fig. 3 is a method 300 provided by the present application. As shown in Fig. 3, the method includes:
- the second device receives first indication information from the first device, where the first indication information includes first information, and the first information is used to determine a target second device.
- the one or more second devices may all receive the first indication information sent by the first device, and the first indication information may include determining the target first 2. Device information. That is, during subsequent random access, the determined target second device may initiate a random access request.
- the first indication information may be, for example, inventory indication information (which may also be understood as inventory signaling). For example, it may be selection (select) signaling, query (query) signaling, paging signaling or other signaling sent by the first device.
- the first information may include at least one or more of the following: first type information of the target second device, polar code-encoded information of the target second device, and authentication and registration information of the target second device.
- the first information may also include mask information, flag bit information, identification information and other characteristic information of the target second device.
- the first indication information may be used to instruct the first device to select the target second device to initiate a random access request, or the first indication information may also be used to indicate that the first device supports the target second device to initiate a random access request .
- the target second device is a second device conforming to one or more items in the first information.
- the target second device is a second device that meets one or more items in the first information, and it can be understood that the target second device satisfies the conditions for selecting or supporting the target second device in the first information.
- the second device when the first information includes multiple pieces of information, the second device can become the target second device only if it meets the selection conditions of one of the pieces of information; The selection criteria of the information are thus targeted to the second device.
- the target second device type information may be used to instruct the first device to select the first type of second device Initiate a random access request
- the target second device polar code encoding information can be used to indicate that the first device chooses to support the second device with polar code encoding capability to initiate a random access request
- the target second device authentication registration information can be It is used to instruct the first device to choose to support the second device with authentication and registration capability to initiate a random access request; or the second device that chooses to access needs to perform the authentication and registration process.
- the information about the type of the target second device may be used to indicate that the first device supports the first type of the second device.
- the second device initiates a random access request; the polar code-encoded information of the target second device can be used to indicate that the first device supports the random access request initiated by the second device with polar code encoding capabilities, and the authentication registration information of the target second device It may be used to instruct the first device to support the random access request initiated by the second device capable of authentication and registration.
- the first indication information is used to indicate that the first device supports the target second device to initiate a random access request. It can also be understood that the first device not only supports the target second device to initiate a random access request, the first device also supports It is also supported that other second devices initiate random access requests.
- the target second device when the target second device is an electronic tag, its type includes one or more of the following: an active type electronic tag, a passive type electronic tag, and a semi-passive type electronic tag.
- the second device may also send first configuration information when sending the first indication information, the first configuration information may be determined based on the first indication information, and the first configuration information is used to configure subsequent data of the second device Information or parameters used during transmission.
- the first indication information sent by the second device includes the first configuration information.
- the first indication information and the first configuration information may be one message or multiple messages.
- the first configuration information may include authentication and registration indication information, application polar code indication information, and configuration rate indication information when the first device configures subsequent data transmission for the second device.
- the indication information of authentication and registration is used to indicate that the second device needs to initiate a registration process with the core network during data transmission;
- the application polarization code indication information is used to indicate that the second device uses polarization when transmitting uplink data and/or downlink data.
- code for data transmission; configuring the rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
- the second device when the second device transmits data, it can directly use the corresponding configuration to perform data transmission according to the instruction of the configuration information. After successful random access, the second device does not need to wait for the configuration information of the first device.
- the flexibility of network configuration is improved, the delay of data transmission is saved, and the rate of data transmission is increased.
- Step 302 if the second device is the target second device, the second device initiates a random access request to the first device.
- the target second device may be determined according to the first indication information, and the target second device may initiate a random access request to the first device or send a response message of the first indication information to the first device, and the response message indicates that the second
- the device is a second device that meets the selection condition of the first device (it can also be understood as a target second device).
- the first device may select a target second device for random access based on target second devices of different types or capabilities, thereby improving the random access efficiency of the second device.
- the second device may send the first message to the first device to perform random access.
- the first message may include capability information of the second device.
- the second device may send a first message to the first device, where the first message includes capability information of the second device.
- the first message may be, for example, RN16 signaling, and the first message may also be other uplink signaling.
- the capability information may include one or more of the following: for example, information about the type of the second device, information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration, and so on.
- step 303 may also be included, the second device receives a second message from the first device, the second message includes configuration information, the configuration information is determined by the first device according to the first indication information and/or capability information of.
- the configuration information in this embodiment may be used to configure information used when the target second device performs data transmission or signaling transmission.
- the second message may be, for example: a conflict resolution message or an acknowledgment message of a random access request.
- the configuration information may include at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, where the authentication registration indication information may be used to indicate that the second device needs to send data to The core network initiates the registration process; the application polar code indication information can be used to instruct the second device to use the polar code for data transmission when transmitting uplink data and/or downlink data; the configuration rate indication information can be used to indicate that the second device is transmitting The rate or code rate of the transmission information used in uplink data and/or downlink data.
- the first device may also use different processes or configure different parameters according to different capabilities and types of second devices, so as to improve data transmission performance.
- the second device may be a terminal device, for example, the second device is an electronic tag; for example, the second device is a RedCap UE; and for example, the second device is an Internet of Things device, etc.
- the first device in this application may refer to a reader-writer or a network device, and for example, a passive IoT device.
- the second device is an electronic tag as an example
- the first device is a reader as an example.
- tags in the following embodiments can be understood as “electronic tags” or passive IoT devices.
- FIG. 4 is a communication method 400 of a specific embodiment provided by the present application. As shown in FIG. 4, the method includes:
- Step 401 the data network sends inventory instruction information #1 to the core network, and the inventory instruction information #1 can be used to instruct the target electronic tag to initiate a random access request to the reader.
- the inventory instruction information #1 may include first information, and the first information is used to determine the target electronic tag.
- the first information may include type information of the target electronic tag.
- the target electronic tag is an active tag
- the target electronic tag is a passive tag
- the target electronic tag is a semi-passive tag, and so on.
- the first information may further include information encoded by a polar code (polar).
- polar polar
- the target electronic label is a label that supports polar encoding.
- the polar encoding capability can also be subdivided into using polar in the uplink, or supporting polar encoding in the downlink.
- the first information may also include information about whether the target electronic tag requires authentication and registration. For example, during random access, the target electronic tag needs to initiate a registration process to the core network.
- the data network when the data network sends the inventory indication information #1 to the core network, it also sends configuration information #1, the configuration information #1 can be determined based on the first indication information, and the configuration information #1 is used to configure the selected The information or parameters used in the subsequent data transmission of the tag.
- Indication information #1 and configuration information #1 may be one message or multiple messages. For example, indication information #1 and configuration information #1 may be carried in one signaling or transmitted separately in different signalings.
- the inventory indication information #1 sent by the data network to the core network includes the configuration information #1.
- configuration information #1 may include authentication registration indication information, application polar code indication information, and configuration rate indication information when the data network is the selected tag for subsequent data transmission.
- the indication information of authentication and registration is used to indicate that the selected tag needs to initiate a registration process with the core network during data transmission;
- the application polarization code indication information is used to indicate that the selected tag uses polarization when transmitting uplink data and/or downlink data. code for data transmission;
- the configured rate indication information is used to indicate the rate or code rate of the transmission information used by the selected tag in transmitting uplink data and/or downlink data.
- Subsequent selected tags can directly use the corresponding configuration for data transmission according to the instruction of the configuration information when transmitting data.
- the selected tag does not need to wait for the configuration information of the network device after the random access is successful.
- the flexibility of network configuration is improved, the delay of data transmission is saved, and the rate of data transmission is increased.
- the inventory indication information #1 may include information about the passive tag type of the target electronic tag. In a possible implementation manner, it indicates that only the reader-writer selects passive tags to initiate access to the reader-writer, or only selects passive tags meeting certain conditions to initiate access to the reader-writer.
- the information of the passive tag type can indicate that the reader can support the access of passive tags, that is, the passive tag can be connected to the reader, and also implicitly indicates that Support other types of tag access, for example, the reader also supports the access of active tags or semi-passive tags.
- the inventory indication information #1 may include the information of the semi-passive tag type of the target electronic tag.
- the information of the semi-passive tag type can indicate that the reader supports the access of semi-passive tags, that is, the semi-passive tag can be connected to the reader, which also implicitly indicates Other types of tag access may also be supported.
- the inventory instruction information #1 may also include information encoded by the polar of the target electronic label.
- it indicates that the reader supports electronic tags with polar encoding to initiate access to the reader, or the reader only selects electronic tags that meet certain conditions and supports polar encoding to initiate access to the reader .
- the polar-coded information indicates that the reader supports the access of polar-coded electronic tags, that is, the polar-coded tags can be connected to the reader, and also implicitly indicate that it may also support Other types of electronic tag access.
- the inventory instruction information #1 may also include information indicating the target electronic label authentication. In a possible implementation, whether the registration process is required may be bound to the type of the target electronic label. For example, if the inventory instruction If the information #1 contains the passive tag type information of the target electronic tag, it indicates that the tag does not need the certification and registration process; if the inventory instruction information #1 contains the information of the semi-passive tag type of the target electronic tag, it indicates that the type Tags are required to go through a certification registration process. Specifically, the binding may be a relationship stipulated by the protocol. In another possible implementation manner, whether the target electronic tag requires a registration process may be combined with its tag type.
- the passive electronic tag does not need to go through the registration process, and the semi-passive electronic tag needs to go through the registration process; if the inventory instruction information #1 does not include the authentication registration process Passive tags and semi-passive tags do not require a registration process when information is provided.
- the inventory instruction information #1 includes the information indicated by the target electronic tag authentication, it means that all the tags that choose to access (which can also be understood as the target electronic tag) need to perform the authentication and registration process.
- the conditions for selecting the target second device are not limited to the situations described above, and there may be other situations, which can be flexibly set by those skilled in the art according to actual situations. And it can also support the combination of multiple conditions.
- the first device can select a passive electronic tag, and the tag corresponding to the value greater than 100 can be randomly accessed.
- the information sent by the above-mentioned first device may also indicate support or non-support for the function, or selection or non-selection of the function by carrying certain capability information or not carrying certain capability information; it may also be set by setting the field, for example , "true” (true) or "false” (or false), indicating support and non-support, or selection and non-selection.
- the tag reports if it carries the capability information, it indicates that the capability is supported, and if it does not carry the capability information, it indicates that it does not support it.
- the data network can also be understood as the application layer, that is, the application layer sends inventory indication information #1 to the core network.
- Step 402 After receiving the inventory indication information #1 from the data network, the core network forwards the indication information #1 to the reader.
- the core network may first send the inventory instruction information #1 to the base station, and then the base station forwards it to the reader/writer. If the reader is the base station, the core network can directly send to the reader.
- the inventory indication information #1 sent by the core network may include first information, the first information is used to determine the target second device, and the first information may include at least one or more of the following information: target electronic label Type information, target electronic tag polar encoding information, information on whether the target electronic tag requires authentication and registration.
- Step 403 After receiving the inventory instruction information #1, the reader/writer sends the inventory instruction information #1 to the electronic tag.
- the inventory instruction information #1 may include first information, the first information is used to determine the target second device, and the first information may include at least one or more of the following information: information on the type of the target electronic label, Information about the polar encoding of the target electronic tag, and information about whether the target electronic tag requires authentication and registration.
- the first information can be issued by the network side, for example, the data network, core network, base station, etc. are sent to the reader, and the reader forwards it to the electronic tag; it can also be that the network side
- the sent inventory instruction information #1 does not include the first information, and the first information is directly sent to the electronic tag by the reader; it can also be that the instruction information of the first information is sent to the reader, and the reader First information is generated after decoding the indication information.
- the reader/writer may send a selection (select) signaling, an inquiry (Query) signaling, a paging signaling or other signaling to the electronic tag, and so on.
- the first indication information may be carried in the above signaling.
- the one or more electronic tags can all receive inventory instruction information #1. Since the inventory indication information #1 includes the first information, and the first information is used to determine the target electronic tag, therefore, the target electronic tag may subsequently initiate random access to the reader.
- Step 404 the target electronic tag initiates a random access request to the reader.
- the target electronic tag sends a first message to the reader to perform random access.
- the first message may be RN16 signaling or a random number, and so on.
- the first message indicates that the tag meets the selection condition of the reader, so a random access message is sent.
- the name of the first message may be a random access request, or it may also be a response message to inventory indication information #1, and this application does not limit the specific name of the first message.
- the inventory indication information #1 contains passive tag type information, it indicates that only passive tags are selected to initiate a random access request to the reader, or only passive tags that meet certain conditions are selected to initiate a random access request to the reader. Random access request. At this time, the passive tag can initiate a random access request to the reader.
- the information of the passive tag type indicates that the reader supports the random access request initiated by the passive tag, that is, it indicates that the passive tag can access the reader, and also implicitly indicates that the reader A writer may also support other types of tags to initiate random access requests.
- the inventory indication information #1 contains semi-passive tag type information, it indicates that only semi-passive tags are selected to initiate a random access request to the reader, or only semi-passive tags that meet certain conditions are selected to send a random access request to the reader.
- the reader initiates a random access request.
- the information of the semi-passive tag type can indicate that the reader supports the random access request initiated by the semi-passive tag, which means that the semi-passive tag can be connected to the reader, and also implicitly Other types of tag access may also be supported with indications.
- the target electronic tag when the target electronic tag initiates a random access request to the reader, it can also report its capability information.
- the first message may include capability information of the target electronic tag.
- the capability information of the target electronic tag may be sent to the reader.
- the capability information includes one or more of the following: for example, information about the type of the target electronic tag, information about whether the target electronic tag supports polar code encoding, and information about whether the target electronic tag supports authentication and registration.
- step 405 is also included, the reader/writer determines configuration information, and the configuration information is used to configure the information used by the target electronic tag for data transmission or signaling transmission.
- the reader/writer may determine the configuration information based on the inventory indication information #1.
- the reader/writer may also determine configuration information based on the target electronic tag capability information.
- the reader/writer may jointly determine the configuration information based on the inventory indication information and the capability information.
- the configuration information may include at least one of the following: for example, authentication registration indication information, application polar code indication information, and configuration rate indication information.
- the indication information of authentication and registration can be used to indicate that the target electronic tag needs to initiate a registration process with the core network during data transmission
- the application polar code indication information can be used to indicate that the target electronic tag uses The polar code is used for data transmission
- the configuration rate indication information can be used to indicate the rate or code rate of the transmission information used by the target electronics in transmitting uplink data and/or downlink data.
- the target second device when the target second device randomly accesses, it can also report its capability information, so that the first device can obtain the capability information of the target second device in a timely manner, and subsequently determine the data transmission requirements based on its capability information. configuration information, thereby improving transmission performance and transmission reliability.
- Step 406 the reader/writer sends a second message to the target electronic tag, and the second message includes configuration information.
- the second message may be a conflict resolution message, or the second message may be an acknowledgment message, and so on.
- the second message may be determined according to the first indication information.
- the first indication information includes the passive tag type, indicating that passive tag access is selected. Source tags are configured accordingly.
- Step 407 the target electronic tag receives configuration information, and performs uplink data transmission according to the configuration information.
- the random access process can be initiated based on tag type and capability.
- the reader can select different tags to connect to the reader based on electronic tags with different capabilities or different types of electronic tags.
- the reader can enable different processes or configure different parameters according to different capabilities and types of tags, so that the electronic tags can transmit data better, thereby improving data transmission performance.
- FIG. 5 is a schematic diagram of a communication method 500 provided by the present application. As shown in FIG. 5, the method includes:
- step 501 the data network sends inventory instruction information #2 to the core network.
- the inventory instruction information #2 may be used to indicate that a group of tags are randomly connected to the reader, or the inventory instruction information #2 is used to indicate that all tags can be randomly connected to the reader.
- step 502 the core network forwards the instruction information #2 to the reader after receiving the inventory instruction information #2 from the data network.
- the core network may first send the inventory instruction information #2 to the base station, and then the base station forwards it to the reader/writer. If the reader is the base station, the core network can directly send to the reader.
- Step 503 after the reader/writer receives the inventory instruction information #2, it sends the inventory instruction information #2 to the tag,
- the inventory indication information #2 may be carried in select (select) signaling, query (Query) signaling, paging signaling or other signaling.
- steps 501 to 503 are optional.
- Step 504 after receiving the inventory indication information #2, the electronic tag sends a first message to the reader to perform random access.
- the first message may include the capability information of the electronic tag, and the capability information includes one or more of the following: information about the type of electronic tag (for example, passive electronic tag type, semi-passive electronic tag type, active electronic tag type), information about whether the electronic tag supports polar encoding, and information about whether the electronic tag supports authentication and registration.
- the first message indicates that the tag conforms to the response message sent by the reader-writer for the inventory instruction.
- the capability information of electronic tag #1 may include one or more of the following information: electronic tag #1 is a passive electronic tag type, electronic tag #1 supports polar encoding, and electronic tag #1 does not support authentication register.
- the capability information of the electronic tag #2 may include: the electronic tag #2 is an active electronic tag type, the electronic tag #2 supports polar encoding, and the electronic tag #2 does not support authentication registration. That is, in this embodiment, one or more electronic tags may report capability information during the random access process. For example, a passive tag can also indicate that the authentication registration process is not supported.
- the RN16 signaling may include the capability information of the electronic tag.
- RN16 may mean sending a 16-bit random number, and its signaling name is not limited, and it may not be called RN16. This application only uses RN16 as an example.
- the first message may be a message during the random access process, or may be a message reported by the second device capability after the random access is successful.
- Step 505 after receiving the first message, the reader/writer determines the configuration information of the electronic tag according to the capability information of the electronic tag.
- the configuration information may include at least one of the following: for example, authentication registration indication information, application polar code indication information, and configuration rate indication information.
- the indication information of authentication and registration can be used to indicate that the electronic tag needs to initiate a registration process with the core network during data transmission
- the application polarization code indication information can be used to indicate that the electronic tag uses polarization when transmitting uplink data and/or downlink data. code for data transmission
- the configuration rate indication information may be used to indicate the rate or code rate of the transmission information used by the electronics in transmitting uplink data and/or downlink data.
- the reader can determine its configuration information based on its capability information.
- the configuration information of electronic tag #1 can be: polar encoding is used for data transmission, and electronic tag #2 There is no need to initiate a registration process to the core network during transmission.
- the configuration information may also include the uplink data transmission rate of the electronic tag #2.
- Step 506 the reader/writer sends a second message to the electronic tag, and the second message includes configuration information of the electronic tag.
- the second message may be, for example, an acknowledgment (acknowledge, ACK) message, or a contention resolution message, or other messages.
- Step 507 after receiving the second message, the electronic tag performs uplink data transmission according to the configuration information instruction.
- the configured electronic tag needs to initiate the registration process.
- the electronic tag can use the polar code when sending data to the reader, for example, the polar code can be used when sending the electronic product code (electronic product code, EPC) .
- EPC electronic product code
- the uplink supports polar encoding it can be configured to use polar encoding for uplink, such as configuring a code rate. You can also indicate that the downlink supports polar encoding, and configure it accordingly.
- the terminal indicates whether uplink or downlink is supported, or both are supported, and the base station is configured to use polar coding for uplink or downlink, or both.
- the reader can first send the configuration of the polar code, such as the code rate, etc., in the message of sending the inventory command, etc., and save the configuration information for the tag that meets the inventory command selection or access conditions, and the tag subsequently reports its own capabilities.
- the base station sends to the tag the configuration information that can be applied to the aforementioned sending.
- the terminal may report the capability in the first message, and the base station may configure label usage in the contention resolution message.
- the electronic tag actively reports capability information during the random access process, so that the reader/writer can perform corresponding configuration based on the capability of the tag.
- the electronic tag before the electronic tag transmits business data, it can report the capability information first, so that the reader can obtain the terminal capability information in time, and perform corresponding configuration on the terminal, thereby improving the transmission performance and transmission reliability.
- the communication method provided by the embodiment of the present application is described in detail with reference to FIG. 3 to FIG. 5 .
- the communication device provided by the embodiment of the present application is introduced below with reference to FIG. 6 and FIG. 7 . It should be understood that the descriptions of the device embodiments correspond to the descriptions of the method embodiments. Therefore, for content that is not described in detail, reference may be made to the method embodiments above, and details are not repeated here for brevity.
- each node such as a terminal device or a network device, includes a corresponding hardware structure and/or software module for performing each function in order to realize the above functions.
- the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software drives hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
- the embodiment of the present application may divide the terminal device or the terminal device into functional modules according to the above method examples.
- each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
- the above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic, and is only a logical function division, and there may be other division methods in actual implementation. In the following, description will be made by taking the division of each functional module corresponding to each function as an example.
- Fig. 6 is a schematic block diagram of a communication device 100 provided by an embodiment of the present application. As shown in the figure, the device 100 may include: a transceiver unit 110 and a processing unit 120 .
- the device 100 may be the second device or the target second device (for example, a terminal device) in the above method embodiment, or may be a terminal device used to realize the above method embodiment function chip. It should be understood that the device 100 may correspond to the terminal device in the method 300, method 400, and method 500 according to the embodiment of the present application, and the device 100 may execute the terminal device in the method 300, method 400, and method 500 of the embodiment of the present application corresponding steps. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
- the transceiver unit is configured to receive first indication information, the first indication information includes first information, the first information is used to determine the target second device, and the first information includes at least one or more of the following Item: information about the first type of the target second device, information about the polar code encoding of the target second device, information about the authentication and registration of the target second device, wherein the first indication information is used to indicate that the target second device
- the first device selects the target second device to initiate a random access request, or the first indication information is used to indicate that the first device supports the target second device to initiate a random access request, and the target second device
- the second device is a second device conforming to one or more pieces of information in the first information; in the case that the second device is the target second device, the transceiving unit is further configured to initiate a random access request.
- the transceiver unit is configured to send the first message to perform random access.
- the first message includes capability information of the second device, and the capability information includes one or more of the following: information about the type of the second device, whether the second device supports polar coding information, information about whether the second device supports authentication and registration.
- the transceiver unit is configured to send capability information, and the capability information includes one or more of the following: information about the type of the second device, information about whether the second device supports polar coding, Information about whether the second device supports authentication and registration.
- the transceiver unit is further configured to receive configuration information, the configuration information is determined by the first device according to the first indication information and/or the capability information, and the configuration information is used to configure the Information used when the second device performs data transmission or signaling transmission.
- the transceiving unit is configured to receive a second message, the second message includes configuration information, and the second message is specifically a conflict resolution message or an acknowledgment message of a random access request.
- the device 100 may be the first device (for example, a reader or network device) in the above method embodiment, or the second device used to implement the above method embodiment function of the chip. It should be understood that the device 100 may correspond to the second device in the method 300, the method 400, and the method 500 according to the embodiment of the present application, and the device 100 may execute the network in the method 300, the method 400, and the method 500 of the embodiment of the present application The steps corresponding to the device. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
- the transceiver unit is configured to send first indication information, the first indication information includes first information, the first information is used to determine the target second device, and the first information includes at least one or more of the following Item: information about the first type of the target second device, information encoded by the polar code of the target second device, information about the authentication and registration of the target second device, the first indication information is used to instruct the first device to select the target second device
- the device initiates random access, or the first indication information is used to indicate that the first device supports a target second device to initiate random access, and the target second device conforms to one of the first information or A second device with multiple pieces of information;
- the transceiving unit is further configured to receive a random access request from the second device, where the second device is the target second device.
- the transceiver unit is configured to receive a first message, the first message includes capability information of the second device, and the capability information includes one or more of the following: the type of the second device information, information about whether the second device supports polar code encoding, and information about whether the second device supports authentication and registration.
- the transceiver unit is configured to receive capability information, and the capability information includes one or more of the following: information about the type of the second device, whether the second device supports polar code encoding information, information about whether the second device supports authentication and registration.
- the processing unit is configured to determine configuration information according to the first indication information and/or the capability information, and the configuration information is used to configure the second device to perform data transmission or signaling transmission The information used during the configuration; the transceiver unit is used to send the configuration information.
- the transceiver unit is configured to send a second message, where the second message includes the configuration information, where the second message is specifically: a conflict resolution message or an acknowledgment of a random access request information.
- FIG. 7 is a schematic block diagram of a communication device 200 provided by an embodiment of the present application.
- the device 200 includes: at least one processor 220 .
- the processor 220 is coupled with the memory for executing instructions stored in the memory to send signals and/or receive signals.
- the device 200 further includes a memory 230 for storing instructions.
- the device 200 further includes a transceiver 210, and the processor 220 controls the transceiver 210 to send signals and/or receive signals.
- processor 220 and the memory 230 may be combined into one processing device, and the processor 220 is configured to execute the program codes stored in the memory 230 to implement the above functions.
- the memory 230 may also be integrated in the processor 220 , or be independent of the processor 220 .
- the transceiver 210 may include a transceiver (or a receiver) and a transmitter (or a transmitter).
- the transceiver may further include antennas, and the number of antennas may be one or more.
- the transceiver 210 may be a communication interface or an interface circuit.
- the transceiver 210 in the device 200 may correspond to the transceiver unit 110 in the device 100
- the processor 220 in the device 200 may correspond to the processing unit 120 in the device 200 .
- each step of the above method can be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software.
- the steps of the method disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
- the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
- the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
- the processor in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
- each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
- the above-mentioned processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application-specific integrated circuit (application-specific integrated circuit, ASIC), a field-programmable gate array (field-programmable gate array, FPGA) or Other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
- DSP digital signal processor
- ASIC application-specific integrated circuit
- FPGA field-programmable gate array
- Other programmable logic devices discrete gate or transistor logic devices, discrete hardware components.
- a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
- the steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
- the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
- the memory in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
- the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- Volatile memory can be random access memory (RAM), which acts as external cache memory.
- RAM random access memory
- static RAM static random access memory
- dynamic RAM dynamic random access memory
- DRAM dynamic random access memory
- synchronous dynamic random access memory synchronous DRAM, SDRAM
- double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
- enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
- synchronous connection dynamic random access memory direct ram-bus RAM, DR RAM
- direct ram-bus RAM direct ram-bus RAM
- the present application also provides a computer program product, the computer program product stores computer program code, and when the computer program code is run on the computer, the computer executes method 300 and method 400 .
- the method in any one embodiment of the method 500 embodiment.
- the present application also provides a computer-readable medium, the computer-readable medium stores program code, and when the program code is run on the computer, the computer is made to execute the method 300, method 400, The method in any one of the embodiments of the method 500.
- the present application further provides a system, which includes the aforementioned device or device.
- all or part of them may be implemented by software, hardware, firmware or any combination thereof.
- software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
- the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
- the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
- the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc, SSD)) etc.
- a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
- an optical medium for example, a high-density digital video disc (digital video disc, DVD)
- a semiconductor medium for example, a solid state disk (solid state disc, SSD)
- the network-side device in each of the above-mentioned device embodiments corresponds to the terminal device and the network-side device or terminal device in the method embodiments, and the corresponding modules or units perform corresponding steps, for example, the communication unit (transceiver) executes the receiving in the method embodiments Or the step of sending, other steps besides sending and receiving may be performed by a processing unit (processor).
- a processing unit for the functions of the specific units, reference may be made to the corresponding method embodiments. Wherein, there may be one or more processors.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a computing device and the computing device can be components.
- One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
- these components can execute from various computer readable media having various data structures stored thereon.
- a component may, for example, be based on a signal having one or more packets of data (e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems). Communicate through local and/or remote processes.
- packets of data e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems.
- the disclosed systems, devices and methods may be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
- the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
- the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
- the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (30)
- 一种通信的方法,其特征在于,包括:第二设备从第一设备接收第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:所述目标第二设备的第一类型的信息、所述目标第二设备极化码编码的信息、所述目标第二设备认证注册的信息,其中,所述第一指示信息用于指示所述第一设备选择所述目标第二设备发起随机接入请求,或者,所述第一指示信息用于指示所述第一设备支持所述目标第二设备发起随机接入请求,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;在所述第二设备为所述目标第二设备的情况下,第二设备向所述第一设备发起随机接入请求。
- 根据权利要求1所述的方法,其特征在于,在所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入的情况下,其中,所述目标第二设备的第一类型的信息用于指示所述第一设备选择所述第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备选择具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备选择具有认证注册能力的第二设备发起随机接入请求。
- 根据权利要求1所述的方法,其特征在于,在所述第一指示信息用于指示所述第一设备支持目标第二设备进行随机接入的情况下,其中,所述目标第二设备类型的信息用于指示所述第一设备支持所述第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备支持具有认证注册能力的第二设备发起随机接入请求。
- 根据权利要求1至3中任一项所述的方法,其特征在于,所述第二设备向所述第一设备发起随机接入,包括:所述第二设备向所述第一设备发送第一消息;其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备的第一类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
- 根据权利要求1至3中任一项所述的方法,其特征在于,所述第二设备随机接入成功后,所述方法还包括:所述第二设备向所述第一设备发送能力信息,所述能力信息包括以下一项或者多项:所述第二设备的第一类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
- 根据权利要求4或5所述的方法,其特征在于,所述方法还包括:所述第二设备从所述第一设备接收配置信息,所述配置信息是所述第一设备根据所述第一指示信息和/或所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息。
- 根据权利要求6所述的方法,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
- 根据权利要求6或7所述的方法,其特征在于,所述第二设备从所述第一设备接收配置信息,包括:所述第二设备从所述第一设备接收第二消息,所述第二消息中包括所述配置信息,其中,所述第二消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
- 根据权利要求1至8中任一项所述的方法,其特征在于,所述目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
- 一种通信的方法,其特征在于,包括:第二设备从第一设备接收第二指示信息,所述第二指示信息用于指示所述第二设备发起随机接入请求;所述第二设备向所述第一设备发送第一消息,进行随机接入,其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备的类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
- 根据权利要求10所述的方法,其特征在于,所述第二设备的类型的信息用于指示所述第二设备的类型为第一类型,所述第二设备极化码编码的信息用于指示所述第二设备支持极化码编码,所述第二设备认证注册的信息用于指示所述第二设备支持认证注册。
- 根据权利要求10或11所述的方法,其特征在于,所述方法还包括:所述第二设备从所述第一设备接收配置信息,所述配置信息是所述第一设备根据所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输时所使用的信息。
- 根据权利要求10至12中任一项所述的方法,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
- 根据权利要求12或13所述的方法,其特征在于,所述第二设备从所述第一设备接收配置信息,包括:所述第二设备从所述第一设备接收第二消息,所述第二消息中包括所述配置信息,其中,所述第一消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
- 一种通信的方法,其特征在于,包括:第一设备向第二设备发送第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:目标第二设备的第一类型的信息、目标第二设备极化码编码的信息、目标第二设备认证注册的信息,所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入,或者,所述第一指示信息用于指示所述第一设备支持目标第二设备发起随机接入,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;所述第一设备从第二设备接收随机接入请求,其中,所述第二设备为所述目标第二设备。
- 根据权利要求15所述的方法,其特征在于,在所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入的情况下,其中,所述目标第二设备的第一类型的信息用于指示所述第一设备选择所述第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备选择具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备选择具有认证注册能力的第二设备发起随机接入请求。
- 根据权利要求15所述的方法,其特征在于,在所述第一指示信息用于指示所述第一设备支持目标第二设备进行随机接入的情况下,其中,所述目标第二设备的第一类型的信息用于指示所述第一设备支持所述第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备支持具有认证注册能力的第二设备发起随机接入请求。
- 根据权利要求15至17中任一项所述的方法,其特征在于,所述第一设备从第二设备接收随机接入请求,包括:所述第一设备从第二设备接收第一消息;其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
- 根据权利要求15至18中任一项所述的方法,其特征在于,所述第二设备随机接入成功后,所述方法还包括:所述第一设备从所述第二设备接收能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
- 根据权利要求15至19中任一项所述的方法,其特征在于,所述方法还包括:所述第一设备根据所述第一指示信息和/或所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息;所述第一设备向所述第二设备发送所述配置信息。
- 根据权利要求15至20中任一项所述的方法,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
- 根据权利要求15至21中任一项所述的方法,其特征在于,所述第一设备向所述目标第二设备发送所述配置信息,包括:所述第一设备向所述第二设备发送第二消息,所述第二消息中包括所述配置信息,其中,所述第二消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
- 根据权利要求1至8中任一项所述的方法,其特征在于,所述目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
- 一种通信的方法,其特征在于,包括:第一设备向第二设备发送第二指示信息,所述第二指示信息用于指示所述第二设备发起随机接入请求;所述第一设备从所述第二设备接收第一消息,其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备的类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
- 根据权利要求24所述的方法,其特征在于,所述第二设备类型的信息用于指示所述第二设备的类型为第一类型,所述第二设备极化码编码的信息用于指示所述第二设备支持极化码编码,所述第二设备认证注册的信息用于指示所述第二设备支持认证注册。
- 根据权利要求24或者25所述的方法,其特征在于,所述方法还包括:所述第一设备根据所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输时所使用的信息;所述第一设备向所述第二设备发送所述配置信息。
- 根据权利要求24至26中任一项所述的方法,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
- 根据权利要求26或27所述的方法,其特征在于,所述第一设备向所述第二设备发送所述配置信息,包括:所述第一设备向所述第二设备发送第二消息,所述第二消息中包括所述配置信息,其中,所述第一消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
- 一种通信装置,其特征在于,包括用于执行权利要求1至9中任一项或者10至 14中任一项所述的法的单元。
- 一种通信装置,其特征在于,包括用于执行权利要求15至23中任一项或者24至28中任一项所述方法的单元。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22888950.7A EP4422228A1 (en) | 2021-11-05 | 2022-08-22 | Communication method and device |
US18/654,605 US20240284519A1 (en) | 2021-11-05 | 2024-05-03 | Communication method and device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111303422.2 | 2021-11-05 | ||
CN202111303422.2A CN116095645A (zh) | 2021-11-05 | 2021-11-05 | 一种通信方法和设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/654,605 Continuation US20240284519A1 (en) | 2021-11-05 | 2024-05-03 | Communication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023077917A1 true WO2023077917A1 (zh) | 2023-05-11 |
Family
ID=86203050
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/113815 WO2023077917A1 (zh) | 2021-11-05 | 2022-08-22 | 一种通信方法和设备 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20240284519A1 (zh) |
EP (1) | EP4422228A1 (zh) |
CN (1) | CN116095645A (zh) |
WO (1) | WO2023077917A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4258164A4 (en) * | 2020-12-31 | 2024-06-19 | Huawei Technologies Co., Ltd. | COMMUNICATION METHOD AND ASSOCIATED DEVICE |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117376893A (zh) * | 2022-06-30 | 2024-01-09 | 华为技术有限公司 | 一种终端的接入方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200146070A1 (en) * | 2018-11-01 | 2020-05-07 | Samsung Electronics Co., Ltd. | Random access method, terminal equipment and computer storage medium |
WO2020182267A1 (en) * | 2019-03-08 | 2020-09-17 | Nokia Technologies Oy | Informing network on ue capability |
CN111867130A (zh) * | 2019-04-30 | 2020-10-30 | 华为技术有限公司 | 一种随机接入方法、装置及存储介质 |
WO2021062688A1 (zh) * | 2019-09-30 | 2021-04-08 | 华为技术有限公司 | 一种随机接入方法及装置 |
-
2021
- 2021-11-05 CN CN202111303422.2A patent/CN116095645A/zh active Pending
-
2022
- 2022-08-22 WO PCT/CN2022/113815 patent/WO2023077917A1/zh active Application Filing
- 2022-08-22 EP EP22888950.7A patent/EP4422228A1/en active Pending
-
2024
- 2024-05-03 US US18/654,605 patent/US20240284519A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200146070A1 (en) * | 2018-11-01 | 2020-05-07 | Samsung Electronics Co., Ltd. | Random access method, terminal equipment and computer storage medium |
WO2020182267A1 (en) * | 2019-03-08 | 2020-09-17 | Nokia Technologies Oy | Informing network on ue capability |
CN111867130A (zh) * | 2019-04-30 | 2020-10-30 | 华为技术有限公司 | 一种随机接入方法、装置及存储介质 |
WO2021062688A1 (zh) * | 2019-09-30 | 2021-04-08 | 华为技术有限公司 | 一种随机接入方法及装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4258164A4 (en) * | 2020-12-31 | 2024-06-19 | Huawei Technologies Co., Ltd. | COMMUNICATION METHOD AND ASSOCIATED DEVICE |
Also Published As
Publication number | Publication date |
---|---|
US20240284519A1 (en) | 2024-08-22 |
EP4422228A1 (en) | 2024-08-28 |
CN116095645A (zh) | 2023-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2023077917A1 (zh) | 一种通信方法和设备 | |
US10375671B2 (en) | Paging with enhanced beamforming | |
US11700660B2 (en) | Method and device for providing vehicle communication service | |
US20190021120A1 (en) | User equipment and base station | |
WO2022160265A1 (zh) | 通信方法和通信装置 | |
CN117204085A (zh) | 一种信息传输方法、系统及装置 | |
WO2023000209A1 (zh) | 无线通信方法、终端设备和网络设备 | |
WO2021114043A1 (zh) | 设备到设备的通信方法和通信装置 | |
US11711779B2 (en) | Method and UE for triggering registration procedure within registration area of wireless communication network | |
CN110880963B (zh) | 上行控制信息的传输方法及相关装置 | |
KR20210149106A (ko) | 무선 통신 네트워크에서 충돌을 처리하기 위한 방법 및 ue | |
JP7400363B2 (ja) | 通信端末、基地局、及び通信方法 | |
WO2023165456A1 (zh) | 通信方法和通信装置 | |
WO2024041309A1 (zh) | 一种通信方法及装置 | |
WO2023116429A1 (zh) | 随机接入方法及装置 | |
CN111147114A (zh) | 波束训练的方法和装置 | |
WO2023124985A1 (zh) | 一种识别方法和装置 | |
WO2024088147A1 (zh) | 通信方法及装置 | |
WO2024140533A1 (zh) | 一种通信方法及装置 | |
US20240354544A1 (en) | Identification method and apparatus | |
WO2024021935A1 (zh) | 一种通信方法及装置 | |
WO2024017049A1 (zh) | Bsc设备的识别方法、装置及通信设备 | |
WO2024093740A1 (zh) | 一种通信方法及装置 | |
WO2023184283A1 (zh) | 无线通信的方法及装置 | |
WO2024082967A1 (zh) | 通信方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22888950 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112024008768 Country of ref document: BR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022888950 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2022888950 Country of ref document: EP Effective date: 20240521 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112024008768 Country of ref document: BR Kind code of ref document: A2 Effective date: 20240503 |