WO2023077917A1 - 一种通信方法和设备 - Google Patents

一种通信方法和设备 Download PDF

Info

Publication number
WO2023077917A1
WO2023077917A1 PCT/CN2022/113815 CN2022113815W WO2023077917A1 WO 2023077917 A1 WO2023077917 A1 WO 2023077917A1 CN 2022113815 W CN2022113815 W CN 2022113815W WO 2023077917 A1 WO2023077917 A1 WO 2023077917A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
target
random access
indication information
message
Prior art date
Application number
PCT/CN2022/113815
Other languages
English (en)
French (fr)
Inventor
李晨琬
吴毅凌
唐瑜键
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP22888950.7A priority Critical patent/EP4422228A1/en
Publication of WO2023077917A1 publication Critical patent/WO2023077917A1/zh
Priority to US18/654,605 priority patent/US20240284519A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/04Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Definitions

  • the present application relates to the communication field, and more particularly, to a communication method and device.
  • Radio Frequency Identification technology is a non-contact automatic identification technology.
  • RFID systems generally include readers, tags and data management systems. Using radio frequency signals and their spatial coupling and transmission characteristics, automatic identification of stationary or moving items can be realized.
  • RFID can be used to track and manage management objects in many fields. It has the characteristics of high accuracy, long reading distance, large amount of stored data, and strong durability. It is widely used in product production, logistics, sales and other links.
  • the power supply mode of RFID it can be divided into three categories, namely passive RFID, active RFID and semi-active RFID.
  • passive RFID active RFID
  • semi-active RFID the capability information can be sent to the reader. That is, the efficiency of tag random access is low, which results in poor performance of subsequent data transmission.
  • the present application provides a communication method and device.
  • the first device can select the target second device based on different types or different capabilities of the target second device. Random access improves the efficiency of random access between the second device and the first device.
  • the first device can configure the data transmission of the second device based on the first information, thereby also improving the performance of subsequent data transmission.
  • a communication method includes: a second device receives first indication information from a first device, the first indication information includes first information, the first information is used to determine a target second device, and the first The information includes at least one or more of the following: information of the first type of the target second device, information encoded by the polar code of the target second device, information about the authentication and registration of the target second device, wherein the first indication information is used to indicate The first device selects the target second device to initiate a random access request, or the first indication information is used to indicate that the first device supports the target second device to initiate a random access request, and the target second device is in accordance with the first information A second device with one or more pieces of information in the information; if the second device is the target second device, the second device initiates a random access request to the first device.
  • the first information may also include other characteristic information such as mask information, flag bit information, and identification information of the target second device.
  • the target second device is a second device that meets one or more items in the first information, and it can be understood that the target second device satisfies the conditions for selecting or supporting the target second device in the first information.
  • the second device when the first information includes multiple pieces of information, the second device can become the target second device only if it meets the selection conditions of one of the pieces of information; The selection criteria of the information are thus targeted to the second device.
  • the one or more second devices may all receive the first indication information sent by the first device, and the first indication information may include the information for determining the target second device . That is, during subsequent random access, the determined target second device may initiate a random access request.
  • the second device mentioned in the following possible implementation manners may be understood as a target second device that can perform random access.
  • the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
  • the first indication information is used to indicate that the first device supports the target second device to initiate a random access request. It can also be understood that the first device not only supports the target second device to initiate a random access request, the first device also supports It is also supported that other second devices initiate random access requests.
  • the first indication information may be, for example, inventory indication information (which may also be understood as inventory signaling). For example, it may be selection (select) signaling, query (query) signaling, paging signaling or other signaling sent by the first device.
  • the terminal supports the "polar code encoding” capability, which can also be understood as the terminal supports the “polar code encoding and decoding” capability.
  • the second device may be a terminal device, for example, the second device is an electronic tag; for example, the second device is a RedCap UE; and for example, the second device is an Internet of Things device, etc.
  • the first device in this application may refer to a reader, may refer to a network device, may also be an Internet of Things device, and so on.
  • the first device can select the target second device for random access based on different types or different capabilities of the target second device, thereby It is realized that the first device can select the second device to perform random access, thereby improving the efficiency of random access.
  • the first device may configure the data transmission of the second device based on the first information, so as to improve the performance of subsequent data transmission.
  • the second device may also send first configuration information when sending the first indication information, the first configuration information may be determined based on the first indication information, and the first configuration information is used to configure subsequent data of the second device Information Used When Transmitting.
  • the first indication information sent by the second device includes the first configuration information.
  • the first indication information and the first configuration information may be one message or multiple messages.
  • the first configuration information may include authentication and registration indication information, application polar code indication information, and configuration rate indication information when the first device configures subsequent data transmission for the second device.
  • the indication information of authentication and registration is used to indicate that the second device needs to initiate a registration process with the core network during data transmission;
  • the application polarization code indication information is used to indicate that the second device uses polarization when transmitting uplink data and/or downlink data.
  • code for data transmission; configuring the rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the second device when the second device transmits data, it can directly use the corresponding configuration to perform data transmission according to the instruction of the configuration information. After successful random access, the second device does not need to wait for the configuration information of the first device.
  • the flexibility of network configuration is improved, the delay of data transmission is saved, and the rate of data transmission is increased.
  • the first indication information is used to instruct the first device to select a target second device to initiate random access
  • the information of the first type of the target second device is used Instructing the first device to select the second device of the first type to initiate a random access request
  • the information about the polar code encoding of the target second device is used to instruct the first device to select support for having a polar code encoding
  • the capable second device initiates a random access request
  • the information about the authentication and registration of the target second device is used to instruct the first device to choose to support the second device with authentication and registration capabilities to initiate the random access request.
  • the information about the authentication and registration of the target second device may also be used to indicate that the selected target second device may perform an authentication and registration process after successful random access.
  • the information about the type of the target second device is used to indicate that the target second device performs random access.
  • the first device supports a random access request initiated by a second device of the first type
  • the polar code-coded information of the target second device is used to indicate that the first device supports a second device with polar code coding capability to initiate a random access request
  • the authentication and registration information of the target second device is used to indicate that the first device supports a random access request initiated by a second device capable of authentication and registration.
  • the first device can select the target second device to perform random access by sending the first instruction information, or indicate to support the target second device to perform random access, so as to realize the group access of the electronic tag .
  • the second device initiates random access to the first device, including: the second device sends a first message to the first device to perform random access; wherein, the first message Include capability information of the second device, where the capability information includes one or more of the following: information about the first type of the second device, information about whether the second device supports polar code encoding, the Whether the second device supports authentication registration information.
  • the first message may be, for example, a random access request message or a response message to the first indication information, and this application does not limit the specific name of the first message.
  • the method further includes: the second device sends capability information to the first device, where the capability information includes one or more of the following: information of the first type of the second device, Information about whether the second device supports polar code encoding, and information about whether the target second device supports authentication and registration.
  • the target second device when the target second device randomly accesses, it can also report its capability information, so that the first device can obtain the capability information of the target second device in a timely manner, and can timely determine data transmission based on its capability information Required configuration information.
  • the data transmission process is simple, so reporting the capability information as early as possible can improve the performance of data transmission and ensure the reliability of data transmission. .
  • the method further includes: the second device receiving configuration information from the first device, the configuration information is obtained by the first device according to the first indication information and/or the Determined by the capability information, the configuration information is used to configure information used by the second device for data transmission or signaling transmission.
  • the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the first device can determine the configuration information of the target second device based on the indication information and/or capability information, so that the first device can enable different target second devices according to different capabilities and types. process, or configure different parameters, etc., so that the target second device can transmit data better, thereby improving data transmission performance.
  • the second device receiving the configuration information from the first device includes: the second device receiving a second message from the first device, the second message including the The above configuration information, wherein the second message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
  • the configuration information can be flexibly carried in each signaling.
  • a communication method includes: a second device receives second indication information from a first device, where the second indication information is used to instruct the second device to initiate a random access request; the The second device sends a first message to the first device to perform random access, where the first message includes capability information of the second device, and the capability information includes one or more of the following: Information about the type of the second device, information about whether the second device supports polar code encoding, and information about whether the second device supports authentication and registration.
  • the second device in the above technical solution may be understood as a group of second devices selected by the first device, for example, second devices that meet certain conditions and can perform random access.
  • the second indication information can also be understood as a trigger message of the network device, and once the network device sends the trigger message, the second device can perform random access.
  • the second device can actively report the capability information during the random access process, so that the first device can obtain the capability information of the target second device in a timely manner, so that the first device can timely
  • the capabilities of the second device are configured accordingly.
  • the data transmission process is simple. Therefore, reporting the capability information as early as possible can improve the performance of data transmission and ensure the reliability of data transmission.
  • the information of the second device type is used to indicate that the type of the second device is the first type
  • the information encoded by the polar code of the second device is used to indicate that the second device supports Polar code encoding
  • the authentication registration information of the second device is used to indicate that the second device supports authentication registration.
  • the method further includes: the second device receiving configuration information from the first device, the configuration information is determined by the first device according to the capability information, and the configuration information It is used to configure the information used when the second device performs data transmission.
  • the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the second device can report capability information before transmitting service data, so that the reader can obtain terminal capability information in time, and perform corresponding configuration on the terminal, thereby improving transmission performance and transmission reliability.
  • the second device receiving configuration information from the first device includes: the second device receiving a second message from the first device, the second message including the configuration information information, wherein the first message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
  • the configuration information can be flexibly carried in each signaling.
  • a communication method includes: a first device sends first indication information to a second device, the first indication information includes first information, and the first information is used to determine the target second device, the first information includes at least one or more of the following: information of the first type of the target second device, polar code-encoded information of the target second device, authentication and registration information of the target second device, the first The indication information is used to instruct the first device to select a target second device to initiate random access, or the first indication information is used to indicate that the first device supports the target second device to initiate random access, and the target The second device is a second device conforming to one or more pieces of information in the first information; the first device receives a random access request from the target second device, where the second device is the target the second device.
  • the first indication information is used to instruct the first device to select a target second device to initiate random access
  • the information of the first type of the target second device is used Instructing the first device to select a second device of the first type to initiate a random access request
  • the polar code coding information of the target second device is used to instruct the first device to select a device that supports polar code coding capabilities.
  • the second device initiates a random access request
  • the authentication and registration information of the target second device is used to instruct the first device to select a second device capable of authentication and registration to initiate the random access request.
  • the information of the first type of the target second device is used for instructing the first device to support the first type of second device to initiate a random access request
  • the information about the polar code encoding of the target second device is used to indicate that the first device supports the first device with polar code encoding capability
  • the second device initiates a random access request
  • the authentication and registration information of the target second device is used to indicate that the first device supports a random access request initiated by a second device capable of authentication and registration.
  • the receiving the random access request from the second device by the first device includes: the first device receiving a first message from the second device; wherein the first message includes the second Capability information of the device, where the capability information includes one or more of the following: information about the type of the second device, information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration information.
  • the method further includes: the first device receives capability information from the second device, and the capability information includes one or more of the following : Information about the type of the second device, information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration.
  • the method further includes: the first device determines configuration information according to the first indication information and/or the capability information, and the configuration information is used to configure the second device to perform data processing. Information used during transmission or signaling transmission; the first device sends the configuration information to the second device.
  • the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the first device sending the configuration information to the second device includes: the first device sending a second message to the second device, the second message including the The above configuration information, wherein the second message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
  • the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
  • a communication method includes: a first device sends second indication information to a second device, where the second indication information is used to instruct the second device to initiate a random access request; the The first device receives a first message from the second device, where the first message includes capability information of the second device, and the capability information includes one or more of the following: the type of the second device information, information about whether the second device supports polar code encoding, and information about whether the second device supports authentication and registration.
  • the information of the second device type is used to indicate that the type of the second device is the first type
  • the information encoded by the polar code of the second device is used to indicate that the second device supports Polar code encoding
  • the authentication registration information of the second device is used to indicate that the second device supports authentication registration.
  • the method further includes: the first device determines configuration information according to the capability information, and the configuration information is used to configure information used by the second device for data transmission; the The first device sends the configuration information to the second device.
  • the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the first device sending the configuration information to the second device includes: the first device sending a second message to the second device, the second message including the The above configuration information, wherein the first message is specifically: a conflict resolution message or an acknowledgment message.
  • the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
  • a communication device includes a transceiver unit, the transceiver unit is configured to receive first indication information, the first indication information includes first information, and the first information is used to determine the first information of the target.
  • the first information includes at least one or more of the following: information about the first type of the target second device, information encoded by a polar code of the target second device, authentication registration of the target second device information, wherein the first indication information is used to instruct the first device to select the target second device to initiate a random access request, or the first indication information is used to indicate that the first device supports the
  • the target second device initiates a random access request, the target second device is a second device conforming to one or more pieces of information in the first information; when the second device is the target second device
  • the transceiving unit is further configured to initiate a random access request to the first device.
  • the first indication information is used to instruct the first device to select a target second device to initiate random access
  • the information of the first type of the target second device is used Instructing the first device to select a second device of the first type to initiate a random access request
  • the polar code coding information of the target second device is used to instruct the first device to select a device that supports polar code coding capabilities.
  • the second device initiates a random access request
  • the authentication and registration information of the target second device is used to instruct the first device to select a second device capable of authentication and registration to initiate the random access request.
  • the information about the type of the target second device is used to indicate that the target second device performs random access.
  • the first device supports a random access request initiated by a second device of the first type
  • the polar code-coded information of the target second device is used to indicate that the first device supports a second device with polar code coding capability to initiate a random access request
  • the authentication and registration information of the target second device is used to indicate that the first device supports a random access request initiated by a second device capable of authentication and registration.
  • the transceiver unit is configured to initiate random access to the first device, including: the transceiver unit is configured to send a first message to the first device to perform random access; wherein, The first message includes capability information of the target second device, and the capability information includes one or more of the following: information about the type of the second device, information about whether the second device supports polar coding . Information about whether the second device supports authentication and registration.
  • the transceiving unit is configured to send capability information to the first device, where the capability information includes one or more of the following: information about the target second device type, the target second device Information about whether the device supports polar code encoding, and information about whether the target second device supports authentication and registration.
  • the transceiving unit is configured to receive configuration information from the first device, where the configuration information is determined by the first device according to the first indication information and/or the capability information, The configuration information is used to configure information used by the second device for data transmission or signaling transmission.
  • the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the target second device to use the polar code for data transmission when transmitting uplink data and/or downlink data; the configuration rate The indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the transceiving unit is configured to receive the configuration information from the first device, including: the transceiving unit is configured to receive a second message from the first device, and the second message includes The configuration information is included, wherein the second message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
  • the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
  • a communication device includes: a transceiver unit, configured to receive second indication information, where the second indication information is used to instruct a second device to initiate a random access request; the The transceiver unit is further configured to send a first message for random access, wherein the first message includes capability information of the second device, and the capability information includes one or more of the following: the type of the second device Information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration.
  • the information of the second device type is used to indicate that the type of the second device is the first type
  • the information encoded by the polarization code of the second device is used to indicate that the device supports polarization Code encoding, where the information about the authentication registration of the second device is used to indicate that the second device supports authentication registration.
  • the transceiver unit is configured to receive configuration information, the configuration information is determined by the first device according to the capability information, and the configuration information is used to configure the second device to perform data transmission. information used.
  • the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate The second device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data ; The configured rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the transceiver unit is configured to receive configuration information from the first device, including: the transceiver unit is configured to receive a second message from the first device, and the second message includes the configuration information. information, wherein the first message is specifically: a conflict resolution message or an acknowledgment message.
  • the target second device type includes one or more of the following: active type, passive type, and semi-passive type.
  • a communication device includes: a transceiver unit configured to send first indication information, the first indication information includes first information, and the first information is used to determine a target For the second device, the first information includes at least one or more of the following: information about the first type of the target second device, information encoded by the polar code of the target second device, information about the authentication and registration of the target second device, the The first indication information is used to instruct the first device to select the target second device to initiate random access, or the first indication information is used to indicate that the first device supports the target second device to initiate random access, the The target second device is a second device conforming to one or more pieces of information in the first information; the transceiver unit is further configured to receive a random access request from the second device, wherein the second device for the target second device.
  • the first indication information is used to instruct the first device to select a target second device to initiate random access
  • the information about the type of the target second device is used to indicate that the target second device
  • the first device selects a second device of the first type to initiate a random access request
  • the polar code-encoded information of the target second device is used to instruct the first device to select a second device that supports polar code encoding capabilities.
  • a random access request is initiated, and the authentication and registration information of the target second device is used to instruct the first device to select a second device capable of authentication and registration to initiate a random access request.
  • the information of the first type of the target second device is used for instructing the first device to support the first type of second device to initiate a random access request
  • the information about the polar code encoding of the target second device is used to indicate that the first device supports the first device with polar code encoding capability
  • the second device initiates a random access request
  • the authentication and registration information of the target second device is used to indicate that the first device supports a random access request initiated by a second device capable of authentication and registration.
  • the transceiver unit is configured to receive a random access request from the second device, comprising: the transceiver unit is configured to receive a first message from the second device; wherein the first message includes the Capability information of the second device, where the capability information includes one or more of the following: information about the type of the second device, information about whether the second device supports polar code encoding, whether the second device supports authentication registered information.
  • the transceiving unit is configured to receive capability information from the second device, and the capability information includes one or more of the following: information about the type of the second device, whether the second device information supporting polar code encoding, and information indicating whether the second device supports authentication and registration.
  • the device further includes: a processing unit, configured to determine configuration information according to the first indication information and/or the capability information, and the configuration information is used to configure the first Information used by the second device for data transmission or signaling transmission; the transceiver unit is configured to send the configuration information to the second device.
  • a processing unit configured to determine configuration information according to the first indication information and/or the capability information, and the configuration information is used to configure the first Information used by the second device for data transmission or signaling transmission
  • the transceiver unit is configured to send the configuration information to the second device.
  • the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the transceiving unit is configured to send the configuration information to the target second device, including: the transceiving unit is configured to send a second message to the target second device, the second The configuration information is included in the message, where the second message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
  • the first type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
  • a communication device includes a transceiver unit, the transceiver unit is configured to send second indication information, and the second indication information is used to instruct the second device to initiate a random access request; the transceiver The unit is further configured to receive a first message from the second device, where the first message includes capability information of the second device, and the capability information includes one or more of the following: Type information, information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration.
  • the information of the second device type is used to indicate that the type of the second device is the first type
  • the information encoded by the polar code of the second device is used to indicate that the second device supports Polar code encoding
  • the authentication registration information of the second device is used to indicate that the second device supports authentication registration.
  • the device further includes: a processing unit, configured to determine configuration information according to the capability information, and the configuration information is used to configure the second device used for data transmission. information; the transceiving unit is configured to send the configuration information to the second device.
  • the configuration information includes at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, wherein the authentication registration indication information is used to indicate that the second The device needs to initiate a registration process to the core network during data transmission; the application polar code indication information is used to instruct the second device to use polar code for data transmission when transmitting uplink data and/or downlink data; the configuration The rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the transceiving unit is configured to send the configuration information to the second device, including: the transceiving unit is configured to send a second message to the second device, and the second message includes The configuration information is included, wherein the first message is specifically: a conflict resolution message or an acknowledgment message of the random access request.
  • the type of the target second device includes one or more of the following: active type, passive type, and semi-passive type.
  • a communication device including a processor is provided.
  • the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to implement the method in any possible implementation manner of any one of the first aspect or the second aspect above.
  • the device also includes memory.
  • the device further includes a communication interface, and the processor is coupled to the communication interface.
  • the device is a terminal device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the device is a chip configured in a terminal device.
  • the communication interface may be an input/output interface.
  • the device is a host node device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the device is a chip configured in the host node.
  • the communication interface may be an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • a communication device including a processor is provided.
  • the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to implement the method in any possible implementation manner of any one of the third aspect or the fourth aspect above.
  • the device also includes memory.
  • the device further includes a communication interface, and the processor is coupled to the communication interface.
  • the device is a network device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the device is a chip configured in a network device.
  • the communication interface may be an input/output interface.
  • the device is a host node device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the device is a chip configured in the host node device.
  • the communication interface may be an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • a processor including: an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor executes the method in any possible implementation manner of any one of the first aspect to the fourth aspect .
  • the above-mentioned processor can be one or more chips
  • the input circuit can be an input pin
  • the output circuit can be an output pin
  • the processing circuit can be a transistor, a gate circuit, a flip-flop and various logic circuits, etc.
  • the input signal received by the input circuit may be received and input by, for example but not limited to, a transceiver
  • the output signal of the output circuit may be, for example but not limited to, output to the transmitter and transmitted by the transmitter
  • the circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times.
  • the embodiment of the present application does not limit the specific implementation manners of the processor and various circuits.
  • a processing device including a processor and a memory.
  • the processor is used to read instructions stored in the memory, and can receive signals through the transceiver and transmit signals through the transmitter, so as to execute the method in any possible implementation manner of any one of the first aspect to the fourth aspect.
  • processors there are one or more processors, and one or more memories.
  • the memory may be integrated with the processor, or the memory may be set separately from the processor.
  • the memory can be a non-transitory (non-transitory) memory, such as a read-only memory (read only memory, ROM), which can be integrated with the processor on the same chip, or can be respectively arranged in different On the chip, the embodiment of the present application does not limit the type of the memory and the configuration of the memory and the processor.
  • a non-transitory memory such as a read-only memory (read only memory, ROM)
  • ROM read only memory
  • a related data interaction process such as sending indication information may be a process of outputting indication information from a processor
  • receiving capability information may be a process of receiving input capability information from a processor.
  • the data output by the processor may be output to the transmitter, and the input data received by the processor may be from the transceiver.
  • the transmitter and the transceiver may be collectively referred to as a transceiver.
  • the processing device in the above twelfth aspect may be one or more chips.
  • the processor in the processing device may be implemented by hardware or by software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, etc.; when implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in a memory, which can Integrated in a processor, it can exist independently of that processor.
  • a computer-readable medium stores a computer program (also called code, or instruction), and when it is run on a computer, it causes the computer to execute the above-mentioned first aspect to the method in any possible implementation manner in any aspect of the fourth aspect.
  • a computer program also called code, or instruction
  • the present application provides a computer program product including instructions.
  • the computer program product is run on a computer, the computer is instructed to execute the method in any one of the first aspect to the fourth aspect above.
  • a chip system including a processor, configured to call and run a computer program from a memory, so that a device installed with the chip system performs any one of the first to fourth aspects above.
  • a sixteenth aspect provides a communication system, where the communication system includes the device involved in any implementation manner of any one of the fifth aspect to the eighth aspect.
  • Fig. 1 is a schematic diagram of a scenario applicable to this application.
  • Fig. 2 is a schematic diagram of the RFID system in this application.
  • FIG. 3 is a flow chart of a communication method 300 provided by the present application.
  • FIG. 4 is a flowchart of a communication method 400 provided by the present application.
  • FIG. 5 is a flowchart of a communication method 500 provided by the present application.
  • Fig. 6 is a schematic block diagram of a communication device 100 provided by the present application.
  • Fig. 7 is a schematic block diagram of a communication device 200 provided in this application.
  • the wireless communication systems applicable to the embodiments of the present application include but are not limited to: global system of mobile communication (GSM) system, long term evolution (long term evolution, LTE) frequency division duplex (frequency division duplex, FDD) system , LTE time division duplex (time division duplex, TDD), LTE system, advanced long-term evolution (LTE-Advanced, LTE-A) system, next-generation communication system (for example, 5G communication system), integration of multiple access systems system, or an evolved system (eg, 6G communication system).
  • GSM global system of mobile communication
  • LTE long term evolution
  • FDD frequency division duplex
  • FDD frequency division duplex
  • TDD time division duplex
  • LTE-A advanced long-term evolution
  • next-generation communication system for example, 5G communication system
  • integration of multiple access systems system or an evolved system (eg, 6G communication system).
  • the technical solution provided by this application can also be applied to machine type communication (machine type communication, MTC), inter-machine communication long-term evolution technology (Long Term Evolution-machine, LTE-M), device to device (device to device, D2D) network , machine to machine (machine to machine, M2M) network, Internet of things (internet of things, IoT) network or other networks.
  • MTC machine type communication
  • LTE-M inter-machine communication long-term evolution technology
  • D2D device to device
  • machine to machine machine to machine
  • M2M machine to machine
  • IoT Internet of things
  • the IoT network may include, for example, the Internet of Vehicles.
  • the communication methods in the Internet of Vehicles system are collectively referred to as vehicle to other devices (vehicle to X, V2X, X can represent anything), for example, the V2X can include: vehicle to vehicle (vehicle to vehicle, V2V) communication, vehicle and Infrastructure (vehicle to infrastructure, V2I) communication, vehicle to pedestrian (vehicle to pedestrian, V2P) or vehicle to network (vehicle to network, V2N) communication, etc.
  • vehicle to vehicle vehicle to vehicle
  • V2V vehicle to vehicle
  • V2I vehicle to infrastructure
  • V2P vehicle to pedestrian
  • V2N vehicle to network
  • the terminal equipment in this application can also be referred to as user equipment (user equipment, UE), mobile station (mobile station, MS), mobile terminal (mobile terminal, MT), etc., which provide voice and/or data connectivity to users.
  • sexual equipment For example, handheld devices with wireless connectivity, vehicle-mounted devices, etc.
  • examples of some terminals are: mobile phone (mobile phone), tablet computer, notebook computer, palmtop computer, mobile internet device (mobile internet device, MID), wearable device, virtual reality (virtual reality, VR) device, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control, wireless terminals in self driving, wireless terminals in remote medical surgery, smart grid Wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, etc.
  • the access network device in this application may refer to a radio access network (radio access network, RAN) node (or device) that connects a terminal to a wireless network, and may also be called a base station.
  • radio access network radio access network
  • RAN radio access network
  • examples of some RAN nodes are: evolving Node B (gNB), transmission reception point (transmission reception point, TRP), evolved Node B (evolved Node B, eNB), radio network controller (radio network controller, RNC), node B (Node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB) , base band unit (base band unit, BBU), or wireless fidelity (wireless fidelity, Wifi) access point (access point, AP), etc.
  • gNB Node B
  • TRP transmission reception point
  • eNB evolved Node B
  • RNC
  • the access network device may include a centralized unit (centralized unit, CU) node, or a distributed unit (distributed unit, DU) node, or a RAN device including a CU node and a DU node.
  • the RAN equipment including the CU node and the DU node separates the protocol layer of the eNB in the long term evolution (LTE) system, and the functions of some protocol layers are placed in the centralized control of the CU, and some or all of the functions of the protocol layer are left Distributed in the DU, the CU centrally controls the DU.
  • the access network device may also be a reader device.
  • the core network equipment in this application can be a general term for various functional entities used to manage users, data transmission and base station configuration on the network side, including mobile management function network element (AMF), user plane function network element (UPF), session Management function element (SMF), etc.
  • AMF mobile management function network element
  • UPF user plane function network element
  • SMF session Management function element
  • this application can be applied to a 5G new radio (new radio, NR) system.
  • This application can also be applied to other communication systems. For example, an entity in this communication system needs to send transmission direction indication information, and another entity needs to receive the indication information and determine the transmission direction within a certain period of time according to the indication information.
  • Figure 1 is a schematic diagram of a scenario applicable to this application.
  • the UE is located within the coverage of one or more cells (also known as carriers) provided by the base station equipment, and the UE There can be one or more cells served.
  • the UE can work in accordance with carrier aggregation (carrier aggregation, CA), or dual connectivity (dual connectivity, DC), or coordinated multi-point transmission (coordinated multiple points, CoMP), where at least A cell provides more than one subcarrier spacing (numerology) and provides radio resources for UEs.
  • carrier aggregation carrier aggregation
  • CA dual connectivity
  • CoMP coordinated multi-point transmission
  • at least A cell provides more than one subcarrier spacing (numerology) and provides radio resources for UEs.
  • the UE may also be located within the coverage provided by a reader (reader), and the communication between the reader and the UE may be regarded as terminal-to-terminal transmission.
  • the transmission between the terminal or reader and the macro base station (may be referred to as "macro station") or pole base station (may be referred to as "pole station”) belongs to uu interface transmission, that is, air interface transmission.
  • Radio Frequency Identification It is a non-contact automatic identification technology. Automatic recognition of objects. Usually, the identification process can be: after the tag enters the reader (reader) (also can be understood as a reader), it receives the radio frequency signal sent by the reader, and the tag can rely on the energy obtained by the induced current Send out product information stored in the chip (for example, passive tags or passive tags), or a signal of a certain frequency is actively sent by the tag (for example, active tags or active tags), the reader reads and decodes the information , sent to the central information system for relevant data processing.
  • the reader also can be understood as a reader
  • the tag can rely on the energy obtained by the induced current Send out product information stored in the chip (for example, passive tags or passive tags), or a signal of a certain frequency is actively sent by the tag (for example, active tags or active tags), the reader reads and decodes the information , sent to the central information system for relevant data processing.
  • FIG. 2 shows the RFID system, as shown in Figure 2, in general, a complete RFID system can be composed of three parts: reader, electronic tag and data management system. Its working principle is: the reader emits radio wave energy of a specific frequency to drive the circuit, so as to send out the internal data. At this time, the reader can receive and interpret the data in sequence, and send it to the application program for corresponding processing.
  • a typical reader includes a high-frequency module (eg, a transmitter or a receiver), a control unit, and a reader antenna.
  • An RFID reader can also be understood as a device that communicates with tags. It can be a terminal, a base station, or a device with read and write functions.
  • Electronic tag It consists of a tag antenna and a tag-specific chip, as shown in (b) in Figure 2.
  • electronic tags can be divided into active electronic tags (active tag), passive electronic tags (passive tag) and semi-passive electronic tags (semi-passive tag).
  • Active electronic tags are equipped with batteries, passive RFID tags do not have internal batteries, and semi-passive electronic tags rely on batteries to work partly.
  • electronic tags can be divided into low frequency electronic tags, high frequency electronic tags, ultra high frequency electronic tags and microwave electronic tags. Of course, they can also be classified according to different packaging forms, which will not be described in detail here.
  • Passive tags can also be called passive Internet of things (IOT). Therefore, RFID electronic tags can also be regarded as a terminal.
  • IOT passive Internet of things
  • IoT Internet of Things
  • M2M is an abbreviation for the transmission of information and data between machines through wireless networks, and is an important direction for the development of IoT.
  • IoT technologies include narrowband (narrow band) IoT, low capacity (reduced capacity, RedCap) user equipment, etc.
  • the power consumption of the prior art is still above the milliwatt level, and there is no way to further save power consumption.
  • the passive RFID technology can achieve microwatt-level power consumption and ultra-low cost, and has become an important branch of the future evolution of cellular technology.
  • RFID can be used to track and manage management objects in many fields. It has the characteristics of high accuracy, long reading distance, large amount of stored data, and strong durability. It is widely used in product production, logistics, and sales. middle.
  • the existing reader-writer interacts with multiple tags in the same process, and the reader-writer cannot identify different types of tags during the inventory process. According to the inventory process, after the random access of the tag is successful, it is possible to send its capability information to the reader. That is, the efficiency of tag random access is low, which results in poor performance of subsequent data transmission.
  • the present application provides a communication method, which can select different tags to be connected to the reader-writer based on the type of the tag, thereby improving the random access efficiency between the tag and the reader-writer.
  • the reader can use different processes or configure different parameters according to different capabilities and types of tags, thereby improving data transmission performance.
  • Fig. 3 is a method 300 provided by the present application. As shown in Fig. 3, the method includes:
  • the second device receives first indication information from the first device, where the first indication information includes first information, and the first information is used to determine a target second device.
  • the one or more second devices may all receive the first indication information sent by the first device, and the first indication information may include determining the target first 2. Device information. That is, during subsequent random access, the determined target second device may initiate a random access request.
  • the first indication information may be, for example, inventory indication information (which may also be understood as inventory signaling). For example, it may be selection (select) signaling, query (query) signaling, paging signaling or other signaling sent by the first device.
  • the first information may include at least one or more of the following: first type information of the target second device, polar code-encoded information of the target second device, and authentication and registration information of the target second device.
  • the first information may also include mask information, flag bit information, identification information and other characteristic information of the target second device.
  • the first indication information may be used to instruct the first device to select the target second device to initiate a random access request, or the first indication information may also be used to indicate that the first device supports the target second device to initiate a random access request .
  • the target second device is a second device conforming to one or more items in the first information.
  • the target second device is a second device that meets one or more items in the first information, and it can be understood that the target second device satisfies the conditions for selecting or supporting the target second device in the first information.
  • the second device when the first information includes multiple pieces of information, the second device can become the target second device only if it meets the selection conditions of one of the pieces of information; The selection criteria of the information are thus targeted to the second device.
  • the target second device type information may be used to instruct the first device to select the first type of second device Initiate a random access request
  • the target second device polar code encoding information can be used to indicate that the first device chooses to support the second device with polar code encoding capability to initiate a random access request
  • the target second device authentication registration information can be It is used to instruct the first device to choose to support the second device with authentication and registration capability to initiate a random access request; or the second device that chooses to access needs to perform the authentication and registration process.
  • the information about the type of the target second device may be used to indicate that the first device supports the first type of the second device.
  • the second device initiates a random access request; the polar code-encoded information of the target second device can be used to indicate that the first device supports the random access request initiated by the second device with polar code encoding capabilities, and the authentication registration information of the target second device It may be used to instruct the first device to support the random access request initiated by the second device capable of authentication and registration.
  • the first indication information is used to indicate that the first device supports the target second device to initiate a random access request. It can also be understood that the first device not only supports the target second device to initiate a random access request, the first device also supports It is also supported that other second devices initiate random access requests.
  • the target second device when the target second device is an electronic tag, its type includes one or more of the following: an active type electronic tag, a passive type electronic tag, and a semi-passive type electronic tag.
  • the second device may also send first configuration information when sending the first indication information, the first configuration information may be determined based on the first indication information, and the first configuration information is used to configure subsequent data of the second device Information or parameters used during transmission.
  • the first indication information sent by the second device includes the first configuration information.
  • the first indication information and the first configuration information may be one message or multiple messages.
  • the first configuration information may include authentication and registration indication information, application polar code indication information, and configuration rate indication information when the first device configures subsequent data transmission for the second device.
  • the indication information of authentication and registration is used to indicate that the second device needs to initiate a registration process with the core network during data transmission;
  • the application polarization code indication information is used to indicate that the second device uses polarization when transmitting uplink data and/or downlink data.
  • code for data transmission; configuring the rate indication information is used to indicate the rate or code rate of the transmission information used by the second device in transmitting uplink data and/or downlink data.
  • the second device when the second device transmits data, it can directly use the corresponding configuration to perform data transmission according to the instruction of the configuration information. After successful random access, the second device does not need to wait for the configuration information of the first device.
  • the flexibility of network configuration is improved, the delay of data transmission is saved, and the rate of data transmission is increased.
  • Step 302 if the second device is the target second device, the second device initiates a random access request to the first device.
  • the target second device may be determined according to the first indication information, and the target second device may initiate a random access request to the first device or send a response message of the first indication information to the first device, and the response message indicates that the second
  • the device is a second device that meets the selection condition of the first device (it can also be understood as a target second device).
  • the first device may select a target second device for random access based on target second devices of different types or capabilities, thereby improving the random access efficiency of the second device.
  • the second device may send the first message to the first device to perform random access.
  • the first message may include capability information of the second device.
  • the second device may send a first message to the first device, where the first message includes capability information of the second device.
  • the first message may be, for example, RN16 signaling, and the first message may also be other uplink signaling.
  • the capability information may include one or more of the following: for example, information about the type of the second device, information about whether the second device supports polar code encoding, information about whether the second device supports authentication and registration, and so on.
  • step 303 may also be included, the second device receives a second message from the first device, the second message includes configuration information, the configuration information is determined by the first device according to the first indication information and/or capability information of.
  • the configuration information in this embodiment may be used to configure information used when the target second device performs data transmission or signaling transmission.
  • the second message may be, for example: a conflict resolution message or an acknowledgment message of a random access request.
  • the configuration information may include at least one of the following: authentication registration indication information, application polar code indication information, and configuration rate indication information, where the authentication registration indication information may be used to indicate that the second device needs to send data to The core network initiates the registration process; the application polar code indication information can be used to instruct the second device to use the polar code for data transmission when transmitting uplink data and/or downlink data; the configuration rate indication information can be used to indicate that the second device is transmitting The rate or code rate of the transmission information used in uplink data and/or downlink data.
  • the first device may also use different processes or configure different parameters according to different capabilities and types of second devices, so as to improve data transmission performance.
  • the second device may be a terminal device, for example, the second device is an electronic tag; for example, the second device is a RedCap UE; and for example, the second device is an Internet of Things device, etc.
  • the first device in this application may refer to a reader-writer or a network device, and for example, a passive IoT device.
  • the second device is an electronic tag as an example
  • the first device is a reader as an example.
  • tags in the following embodiments can be understood as “electronic tags” or passive IoT devices.
  • FIG. 4 is a communication method 400 of a specific embodiment provided by the present application. As shown in FIG. 4, the method includes:
  • Step 401 the data network sends inventory instruction information #1 to the core network, and the inventory instruction information #1 can be used to instruct the target electronic tag to initiate a random access request to the reader.
  • the inventory instruction information #1 may include first information, and the first information is used to determine the target electronic tag.
  • the first information may include type information of the target electronic tag.
  • the target electronic tag is an active tag
  • the target electronic tag is a passive tag
  • the target electronic tag is a semi-passive tag, and so on.
  • the first information may further include information encoded by a polar code (polar).
  • polar polar
  • the target electronic label is a label that supports polar encoding.
  • the polar encoding capability can also be subdivided into using polar in the uplink, or supporting polar encoding in the downlink.
  • the first information may also include information about whether the target electronic tag requires authentication and registration. For example, during random access, the target electronic tag needs to initiate a registration process to the core network.
  • the data network when the data network sends the inventory indication information #1 to the core network, it also sends configuration information #1, the configuration information #1 can be determined based on the first indication information, and the configuration information #1 is used to configure the selected The information or parameters used in the subsequent data transmission of the tag.
  • Indication information #1 and configuration information #1 may be one message or multiple messages. For example, indication information #1 and configuration information #1 may be carried in one signaling or transmitted separately in different signalings.
  • the inventory indication information #1 sent by the data network to the core network includes the configuration information #1.
  • configuration information #1 may include authentication registration indication information, application polar code indication information, and configuration rate indication information when the data network is the selected tag for subsequent data transmission.
  • the indication information of authentication and registration is used to indicate that the selected tag needs to initiate a registration process with the core network during data transmission;
  • the application polarization code indication information is used to indicate that the selected tag uses polarization when transmitting uplink data and/or downlink data. code for data transmission;
  • the configured rate indication information is used to indicate the rate or code rate of the transmission information used by the selected tag in transmitting uplink data and/or downlink data.
  • Subsequent selected tags can directly use the corresponding configuration for data transmission according to the instruction of the configuration information when transmitting data.
  • the selected tag does not need to wait for the configuration information of the network device after the random access is successful.
  • the flexibility of network configuration is improved, the delay of data transmission is saved, and the rate of data transmission is increased.
  • the inventory indication information #1 may include information about the passive tag type of the target electronic tag. In a possible implementation manner, it indicates that only the reader-writer selects passive tags to initiate access to the reader-writer, or only selects passive tags meeting certain conditions to initiate access to the reader-writer.
  • the information of the passive tag type can indicate that the reader can support the access of passive tags, that is, the passive tag can be connected to the reader, and also implicitly indicates that Support other types of tag access, for example, the reader also supports the access of active tags or semi-passive tags.
  • the inventory indication information #1 may include the information of the semi-passive tag type of the target electronic tag.
  • the information of the semi-passive tag type can indicate that the reader supports the access of semi-passive tags, that is, the semi-passive tag can be connected to the reader, which also implicitly indicates Other types of tag access may also be supported.
  • the inventory instruction information #1 may also include information encoded by the polar of the target electronic label.
  • it indicates that the reader supports electronic tags with polar encoding to initiate access to the reader, or the reader only selects electronic tags that meet certain conditions and supports polar encoding to initiate access to the reader .
  • the polar-coded information indicates that the reader supports the access of polar-coded electronic tags, that is, the polar-coded tags can be connected to the reader, and also implicitly indicate that it may also support Other types of electronic tag access.
  • the inventory instruction information #1 may also include information indicating the target electronic label authentication. In a possible implementation, whether the registration process is required may be bound to the type of the target electronic label. For example, if the inventory instruction If the information #1 contains the passive tag type information of the target electronic tag, it indicates that the tag does not need the certification and registration process; if the inventory instruction information #1 contains the information of the semi-passive tag type of the target electronic tag, it indicates that the type Tags are required to go through a certification registration process. Specifically, the binding may be a relationship stipulated by the protocol. In another possible implementation manner, whether the target electronic tag requires a registration process may be combined with its tag type.
  • the passive electronic tag does not need to go through the registration process, and the semi-passive electronic tag needs to go through the registration process; if the inventory instruction information #1 does not include the authentication registration process Passive tags and semi-passive tags do not require a registration process when information is provided.
  • the inventory instruction information #1 includes the information indicated by the target electronic tag authentication, it means that all the tags that choose to access (which can also be understood as the target electronic tag) need to perform the authentication and registration process.
  • the conditions for selecting the target second device are not limited to the situations described above, and there may be other situations, which can be flexibly set by those skilled in the art according to actual situations. And it can also support the combination of multiple conditions.
  • the first device can select a passive electronic tag, and the tag corresponding to the value greater than 100 can be randomly accessed.
  • the information sent by the above-mentioned first device may also indicate support or non-support for the function, or selection or non-selection of the function by carrying certain capability information or not carrying certain capability information; it may also be set by setting the field, for example , "true” (true) or "false” (or false), indicating support and non-support, or selection and non-selection.
  • the tag reports if it carries the capability information, it indicates that the capability is supported, and if it does not carry the capability information, it indicates that it does not support it.
  • the data network can also be understood as the application layer, that is, the application layer sends inventory indication information #1 to the core network.
  • Step 402 After receiving the inventory indication information #1 from the data network, the core network forwards the indication information #1 to the reader.
  • the core network may first send the inventory instruction information #1 to the base station, and then the base station forwards it to the reader/writer. If the reader is the base station, the core network can directly send to the reader.
  • the inventory indication information #1 sent by the core network may include first information, the first information is used to determine the target second device, and the first information may include at least one or more of the following information: target electronic label Type information, target electronic tag polar encoding information, information on whether the target electronic tag requires authentication and registration.
  • Step 403 After receiving the inventory instruction information #1, the reader/writer sends the inventory instruction information #1 to the electronic tag.
  • the inventory instruction information #1 may include first information, the first information is used to determine the target second device, and the first information may include at least one or more of the following information: information on the type of the target electronic label, Information about the polar encoding of the target electronic tag, and information about whether the target electronic tag requires authentication and registration.
  • the first information can be issued by the network side, for example, the data network, core network, base station, etc. are sent to the reader, and the reader forwards it to the electronic tag; it can also be that the network side
  • the sent inventory instruction information #1 does not include the first information, and the first information is directly sent to the electronic tag by the reader; it can also be that the instruction information of the first information is sent to the reader, and the reader First information is generated after decoding the indication information.
  • the reader/writer may send a selection (select) signaling, an inquiry (Query) signaling, a paging signaling or other signaling to the electronic tag, and so on.
  • the first indication information may be carried in the above signaling.
  • the one or more electronic tags can all receive inventory instruction information #1. Since the inventory indication information #1 includes the first information, and the first information is used to determine the target electronic tag, therefore, the target electronic tag may subsequently initiate random access to the reader.
  • Step 404 the target electronic tag initiates a random access request to the reader.
  • the target electronic tag sends a first message to the reader to perform random access.
  • the first message may be RN16 signaling or a random number, and so on.
  • the first message indicates that the tag meets the selection condition of the reader, so a random access message is sent.
  • the name of the first message may be a random access request, or it may also be a response message to inventory indication information #1, and this application does not limit the specific name of the first message.
  • the inventory indication information #1 contains passive tag type information, it indicates that only passive tags are selected to initiate a random access request to the reader, or only passive tags that meet certain conditions are selected to initiate a random access request to the reader. Random access request. At this time, the passive tag can initiate a random access request to the reader.
  • the information of the passive tag type indicates that the reader supports the random access request initiated by the passive tag, that is, it indicates that the passive tag can access the reader, and also implicitly indicates that the reader A writer may also support other types of tags to initiate random access requests.
  • the inventory indication information #1 contains semi-passive tag type information, it indicates that only semi-passive tags are selected to initiate a random access request to the reader, or only semi-passive tags that meet certain conditions are selected to send a random access request to the reader.
  • the reader initiates a random access request.
  • the information of the semi-passive tag type can indicate that the reader supports the random access request initiated by the semi-passive tag, which means that the semi-passive tag can be connected to the reader, and also implicitly Other types of tag access may also be supported with indications.
  • the target electronic tag when the target electronic tag initiates a random access request to the reader, it can also report its capability information.
  • the first message may include capability information of the target electronic tag.
  • the capability information of the target electronic tag may be sent to the reader.
  • the capability information includes one or more of the following: for example, information about the type of the target electronic tag, information about whether the target electronic tag supports polar code encoding, and information about whether the target electronic tag supports authentication and registration.
  • step 405 is also included, the reader/writer determines configuration information, and the configuration information is used to configure the information used by the target electronic tag for data transmission or signaling transmission.
  • the reader/writer may determine the configuration information based on the inventory indication information #1.
  • the reader/writer may also determine configuration information based on the target electronic tag capability information.
  • the reader/writer may jointly determine the configuration information based on the inventory indication information and the capability information.
  • the configuration information may include at least one of the following: for example, authentication registration indication information, application polar code indication information, and configuration rate indication information.
  • the indication information of authentication and registration can be used to indicate that the target electronic tag needs to initiate a registration process with the core network during data transmission
  • the application polar code indication information can be used to indicate that the target electronic tag uses The polar code is used for data transmission
  • the configuration rate indication information can be used to indicate the rate or code rate of the transmission information used by the target electronics in transmitting uplink data and/or downlink data.
  • the target second device when the target second device randomly accesses, it can also report its capability information, so that the first device can obtain the capability information of the target second device in a timely manner, and subsequently determine the data transmission requirements based on its capability information. configuration information, thereby improving transmission performance and transmission reliability.
  • Step 406 the reader/writer sends a second message to the target electronic tag, and the second message includes configuration information.
  • the second message may be a conflict resolution message, or the second message may be an acknowledgment message, and so on.
  • the second message may be determined according to the first indication information.
  • the first indication information includes the passive tag type, indicating that passive tag access is selected. Source tags are configured accordingly.
  • Step 407 the target electronic tag receives configuration information, and performs uplink data transmission according to the configuration information.
  • the random access process can be initiated based on tag type and capability.
  • the reader can select different tags to connect to the reader based on electronic tags with different capabilities or different types of electronic tags.
  • the reader can enable different processes or configure different parameters according to different capabilities and types of tags, so that the electronic tags can transmit data better, thereby improving data transmission performance.
  • FIG. 5 is a schematic diagram of a communication method 500 provided by the present application. As shown in FIG. 5, the method includes:
  • step 501 the data network sends inventory instruction information #2 to the core network.
  • the inventory instruction information #2 may be used to indicate that a group of tags are randomly connected to the reader, or the inventory instruction information #2 is used to indicate that all tags can be randomly connected to the reader.
  • step 502 the core network forwards the instruction information #2 to the reader after receiving the inventory instruction information #2 from the data network.
  • the core network may first send the inventory instruction information #2 to the base station, and then the base station forwards it to the reader/writer. If the reader is the base station, the core network can directly send to the reader.
  • Step 503 after the reader/writer receives the inventory instruction information #2, it sends the inventory instruction information #2 to the tag,
  • the inventory indication information #2 may be carried in select (select) signaling, query (Query) signaling, paging signaling or other signaling.
  • steps 501 to 503 are optional.
  • Step 504 after receiving the inventory indication information #2, the electronic tag sends a first message to the reader to perform random access.
  • the first message may include the capability information of the electronic tag, and the capability information includes one or more of the following: information about the type of electronic tag (for example, passive electronic tag type, semi-passive electronic tag type, active electronic tag type), information about whether the electronic tag supports polar encoding, and information about whether the electronic tag supports authentication and registration.
  • the first message indicates that the tag conforms to the response message sent by the reader-writer for the inventory instruction.
  • the capability information of electronic tag #1 may include one or more of the following information: electronic tag #1 is a passive electronic tag type, electronic tag #1 supports polar encoding, and electronic tag #1 does not support authentication register.
  • the capability information of the electronic tag #2 may include: the electronic tag #2 is an active electronic tag type, the electronic tag #2 supports polar encoding, and the electronic tag #2 does not support authentication registration. That is, in this embodiment, one or more electronic tags may report capability information during the random access process. For example, a passive tag can also indicate that the authentication registration process is not supported.
  • the RN16 signaling may include the capability information of the electronic tag.
  • RN16 may mean sending a 16-bit random number, and its signaling name is not limited, and it may not be called RN16. This application only uses RN16 as an example.
  • the first message may be a message during the random access process, or may be a message reported by the second device capability after the random access is successful.
  • Step 505 after receiving the first message, the reader/writer determines the configuration information of the electronic tag according to the capability information of the electronic tag.
  • the configuration information may include at least one of the following: for example, authentication registration indication information, application polar code indication information, and configuration rate indication information.
  • the indication information of authentication and registration can be used to indicate that the electronic tag needs to initiate a registration process with the core network during data transmission
  • the application polarization code indication information can be used to indicate that the electronic tag uses polarization when transmitting uplink data and/or downlink data. code for data transmission
  • the configuration rate indication information may be used to indicate the rate or code rate of the transmission information used by the electronics in transmitting uplink data and/or downlink data.
  • the reader can determine its configuration information based on its capability information.
  • the configuration information of electronic tag #1 can be: polar encoding is used for data transmission, and electronic tag #2 There is no need to initiate a registration process to the core network during transmission.
  • the configuration information may also include the uplink data transmission rate of the electronic tag #2.
  • Step 506 the reader/writer sends a second message to the electronic tag, and the second message includes configuration information of the electronic tag.
  • the second message may be, for example, an acknowledgment (acknowledge, ACK) message, or a contention resolution message, or other messages.
  • Step 507 after receiving the second message, the electronic tag performs uplink data transmission according to the configuration information instruction.
  • the configured electronic tag needs to initiate the registration process.
  • the electronic tag can use the polar code when sending data to the reader, for example, the polar code can be used when sending the electronic product code (electronic product code, EPC) .
  • EPC electronic product code
  • the uplink supports polar encoding it can be configured to use polar encoding for uplink, such as configuring a code rate. You can also indicate that the downlink supports polar encoding, and configure it accordingly.
  • the terminal indicates whether uplink or downlink is supported, or both are supported, and the base station is configured to use polar coding for uplink or downlink, or both.
  • the reader can first send the configuration of the polar code, such as the code rate, etc., in the message of sending the inventory command, etc., and save the configuration information for the tag that meets the inventory command selection or access conditions, and the tag subsequently reports its own capabilities.
  • the base station sends to the tag the configuration information that can be applied to the aforementioned sending.
  • the terminal may report the capability in the first message, and the base station may configure label usage in the contention resolution message.
  • the electronic tag actively reports capability information during the random access process, so that the reader/writer can perform corresponding configuration based on the capability of the tag.
  • the electronic tag before the electronic tag transmits business data, it can report the capability information first, so that the reader can obtain the terminal capability information in time, and perform corresponding configuration on the terminal, thereby improving the transmission performance and transmission reliability.
  • the communication method provided by the embodiment of the present application is described in detail with reference to FIG. 3 to FIG. 5 .
  • the communication device provided by the embodiment of the present application is introduced below with reference to FIG. 6 and FIG. 7 . It should be understood that the descriptions of the device embodiments correspond to the descriptions of the method embodiments. Therefore, for content that is not described in detail, reference may be made to the method embodiments above, and details are not repeated here for brevity.
  • each node such as a terminal device or a network device, includes a corresponding hardware structure and/or software module for performing each function in order to realize the above functions.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software drives hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
  • the embodiment of the present application may divide the terminal device or the terminal device into functional modules according to the above method examples.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic, and is only a logical function division, and there may be other division methods in actual implementation. In the following, description will be made by taking the division of each functional module corresponding to each function as an example.
  • Fig. 6 is a schematic block diagram of a communication device 100 provided by an embodiment of the present application. As shown in the figure, the device 100 may include: a transceiver unit 110 and a processing unit 120 .
  • the device 100 may be the second device or the target second device (for example, a terminal device) in the above method embodiment, or may be a terminal device used to realize the above method embodiment function chip. It should be understood that the device 100 may correspond to the terminal device in the method 300, method 400, and method 500 according to the embodiment of the present application, and the device 100 may execute the terminal device in the method 300, method 400, and method 500 of the embodiment of the present application corresponding steps. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • the transceiver unit is configured to receive first indication information, the first indication information includes first information, the first information is used to determine the target second device, and the first information includes at least one or more of the following Item: information about the first type of the target second device, information about the polar code encoding of the target second device, information about the authentication and registration of the target second device, wherein the first indication information is used to indicate that the target second device
  • the first device selects the target second device to initiate a random access request, or the first indication information is used to indicate that the first device supports the target second device to initiate a random access request, and the target second device
  • the second device is a second device conforming to one or more pieces of information in the first information; in the case that the second device is the target second device, the transceiving unit is further configured to initiate a random access request.
  • the transceiver unit is configured to send the first message to perform random access.
  • the first message includes capability information of the second device, and the capability information includes one or more of the following: information about the type of the second device, whether the second device supports polar coding information, information about whether the second device supports authentication and registration.
  • the transceiver unit is configured to send capability information, and the capability information includes one or more of the following: information about the type of the second device, information about whether the second device supports polar coding, Information about whether the second device supports authentication and registration.
  • the transceiver unit is further configured to receive configuration information, the configuration information is determined by the first device according to the first indication information and/or the capability information, and the configuration information is used to configure the Information used when the second device performs data transmission or signaling transmission.
  • the transceiving unit is configured to receive a second message, the second message includes configuration information, and the second message is specifically a conflict resolution message or an acknowledgment message of a random access request.
  • the device 100 may be the first device (for example, a reader or network device) in the above method embodiment, or the second device used to implement the above method embodiment function of the chip. It should be understood that the device 100 may correspond to the second device in the method 300, the method 400, and the method 500 according to the embodiment of the present application, and the device 100 may execute the network in the method 300, the method 400, and the method 500 of the embodiment of the present application The steps corresponding to the device. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • the transceiver unit is configured to send first indication information, the first indication information includes first information, the first information is used to determine the target second device, and the first information includes at least one or more of the following Item: information about the first type of the target second device, information encoded by the polar code of the target second device, information about the authentication and registration of the target second device, the first indication information is used to instruct the first device to select the target second device
  • the device initiates random access, or the first indication information is used to indicate that the first device supports a target second device to initiate random access, and the target second device conforms to one of the first information or A second device with multiple pieces of information;
  • the transceiving unit is further configured to receive a random access request from the second device, where the second device is the target second device.
  • the transceiver unit is configured to receive a first message, the first message includes capability information of the second device, and the capability information includes one or more of the following: the type of the second device information, information about whether the second device supports polar code encoding, and information about whether the second device supports authentication and registration.
  • the transceiver unit is configured to receive capability information, and the capability information includes one or more of the following: information about the type of the second device, whether the second device supports polar code encoding information, information about whether the second device supports authentication and registration.
  • the processing unit is configured to determine configuration information according to the first indication information and/or the capability information, and the configuration information is used to configure the second device to perform data transmission or signaling transmission The information used during the configuration; the transceiver unit is used to send the configuration information.
  • the transceiver unit is configured to send a second message, where the second message includes the configuration information, where the second message is specifically: a conflict resolution message or an acknowledgment of a random access request information.
  • FIG. 7 is a schematic block diagram of a communication device 200 provided by an embodiment of the present application.
  • the device 200 includes: at least one processor 220 .
  • the processor 220 is coupled with the memory for executing instructions stored in the memory to send signals and/or receive signals.
  • the device 200 further includes a memory 230 for storing instructions.
  • the device 200 further includes a transceiver 210, and the processor 220 controls the transceiver 210 to send signals and/or receive signals.
  • processor 220 and the memory 230 may be combined into one processing device, and the processor 220 is configured to execute the program codes stored in the memory 230 to implement the above functions.
  • the memory 230 may also be integrated in the processor 220 , or be independent of the processor 220 .
  • the transceiver 210 may include a transceiver (or a receiver) and a transmitter (or a transmitter).
  • the transceiver may further include antennas, and the number of antennas may be one or more.
  • the transceiver 210 may be a communication interface or an interface circuit.
  • the transceiver 210 in the device 200 may correspond to the transceiver unit 110 in the device 100
  • the processor 220 in the device 200 may correspond to the processing unit 120 in the device 200 .
  • each step of the above method can be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software.
  • the steps of the method disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
  • the processor in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
  • each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application-specific integrated circuit (application-specific integrated circuit, ASIC), a field-programmable gate array (field-programmable gate array, FPGA) or Other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field-programmable gate array
  • Other programmable logic devices discrete gate or transistor logic devices, discrete hardware components.
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • static RAM static random access memory
  • dynamic RAM dynamic random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory direct ram-bus RAM, DR RAM
  • direct ram-bus RAM direct ram-bus RAM
  • the present application also provides a computer program product, the computer program product stores computer program code, and when the computer program code is run on the computer, the computer executes method 300 and method 400 .
  • the method in any one embodiment of the method 500 embodiment.
  • the present application also provides a computer-readable medium, the computer-readable medium stores program code, and when the program code is run on the computer, the computer is made to execute the method 300, method 400, The method in any one of the embodiments of the method 500.
  • the present application further provides a system, which includes the aforementioned device or device.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc, SSD)) etc.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state disk (solid state disc, SSD)
  • the network-side device in each of the above-mentioned device embodiments corresponds to the terminal device and the network-side device or terminal device in the method embodiments, and the corresponding modules or units perform corresponding steps, for example, the communication unit (transceiver) executes the receiving in the method embodiments Or the step of sending, other steps besides sending and receiving may be performed by a processing unit (processor).
  • a processing unit for the functions of the specific units, reference may be made to the corresponding method embodiments. Wherein, there may be one or more processors.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computing device and the computing device can be components.
  • One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • a component may, for example, be based on a signal having one or more packets of data (e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems). Communicate through local and/or remote processes.
  • packets of data e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disc and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种通信方法和设备,该方法包括:网络设备向终端设备发送的盘存指示信息中包括确定目标终端设备的信息,该盘存指示信息用于指示网络设备选择目标终端设备发起随机接入请求,或者,该盘存指示信息用于指示网络设备支持目标终端设备发起随机接入请求。使得网络设备可以基于不同的类型或者不同能力的目标终端设备,选择目标设备进行随机接入,从而提高第二设备的随机接入的效率以及后续目标终端设备数据传输的性能。

Description

一种通信方法和设备
本申请要求于2021年11月5日提交中国专利局、申请号为202111303422.2、申请名称为“一种通信方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,并且更具体地,涉及一种通信方法和设备。
背景技术
射频识别(radio frequency identification,RFID)技术,是一种非接触式的自动识别技术,RFID系统一般包括读写器(reader)、标签(tag)和数据管理系统。利用射频信号及其空间耦合、传输的特性,可以实现对静止或移动物品的自动识别。RFID可以用来追踪和管理很多领域的管理对象,具有准确率高、读取距离远、存储数据量大、耐用性强等特点,广泛应用于产品生产、物流、销售等环节中。
通常情况下,依据RFID的供电方式可分为三类,即无源RFID、有源RFID和半有源RFID。但是,目前技术中,在标签随机接入成功之后,可以将其能力信息发送给读写器。即,标签随机接入的效率较低,从而造成后续数据传输的性能较差。
发明内容
本申请提供一种通信方法和设备,通过在第一指示信息中包含确定目标第二设备的信息,使得第一设备可以基于不同的类型或者不同能力的目标第二设备,选择目标第二设备进行随机接入,提高了第二设备和第一设备之间的随机接入的效率。并且,第一设备可以基于第一信息对第二设备的数据传输进行配置,从而也提高了后续数据传输的性能。
第一方面,提供了一种通信方法,该方法包括:第二设备从第一设备接收第一指示信息,第一指示信息包括第一信息,第一信息用于确定目标第二设备,第一信息至少包括以下一项或者多项:目标第二设备的第一类型的信息、目标第二设备极化码编码的信息、目标第二设备认证注册的信息,其中,第一指示信息用于指示第一设备选择目标第二设备发起随机接入请求,或者,第一指示信息用于指示第一设备支持目标第二设备发起随机接入请求,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;在所述第二设备为所述目标第二设备的情况下,所述第二设备向所述第一设备发起随机接入请求。
本申请中,第一信息也可以包括目标第二设备的掩码信息、标志位信息、标识信息等其他特性信息。
本申请中,目标第二设备为符合所述第一信息中的一项或多项的第二设备,可以理解为,目标第二设备满足第一信息中选择或者支持目标第二设备的条件。
本申请中,在第一信息中包括多个信息时,第二设备可以仅仅只符合其中一个信息的选择条件,就可以成为目标第二设备;也可以是,第二设备也可以是符合多个信息的选择 条件从而成为目标第二设备。
本申请中,第二设备可以有一个或者多个,该一个或者多个第二设备都可以接收第一设备发送的第一指示信息,该第一指示信息中可以包括确定目标第二设备的信息。即,后续随机接入时,可以是由所确定的目标第二设备发起随机接入请求。
应理解,本申请中,下述可能的实现方式提及的第二设备可以理解为,可以进行随机接入的目标第二设备。
本申请中,目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
本申请中,第一指示信息用于指示第一设备支持目标第二设备发起随机接入请求,也可以理解为,第一设备不仅仅支持目标第二设备发起随机接入请求,第一设备也同样支持其他第二设备发起随机接入请求。
本申请中,第一指示信息例如,可以是盘存指示信息(也可以理解为,盘存信令)。例如,可以是第一设备发送的选择(select)信令、查询(query)信令、寻呼信令或者其他信令。
本申请中,终端支持“极化码编码”能力,也可以理解为,终端支持“极化码编解码”的能力。
需要说明的是,本申请中,第二设备可以是终端设备,例如,第二设备为电子标签;例如,第二设备为RedCap UE;又例如,第二设备为物联网设备等。本申请中的第一设备可以是指读写器、可以是指网络设备也可以是物联网设备,等等。
基于上述技术方案,通过在第一指示信息中包含确定目标第二设备的信息,使得第一设备可以基于不同的类型或者不同能力的目标第二设备,选择目标第二设备进行随机接入,从而实现第一设备可以选择第二设备进行随机接入,提高随机接入的效率。并且,第一设备可以基于第一信息对第二设备的数据传输进行配置,便于提高后续数据传输的性能。
在一种实现方式中,第二设备在发送第一指示信息时还可以发送第一配置信息,该第一配置信息可以基于第一指示信息确定,第一配置信息用于配置第二设备后续数据传输时所使用的信息。
在另一实现方式中,第二设备发送的第一指示信息中包括了第一配置信息。
本申请中,第一指示信息和第一配置信息可以是一条消息,也可以是多条消息。
例如,第一配置信息可以包括第一设备为第二设备配置的后续数据传输时的认证注册指示信息、应用极化码指示信息、配置速率指示信息。
例如,认证注册的指示信息用于指示第二设备在数据传输时需要向核心网发起注册流程;应用极化码指示信息用于指示第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;配置速率指示信息用于指示第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
后续第二设备在传输数据时可以直接按照配置信息的指示使用相应的配置进行数据传输。第二设备在随机接入成功后,无须等待第一设备的配置信息。提高了网络配置的灵活性,节省数据传输的时延,提高数据传输的速率。
在一种实现方式中,在所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入的情况下,其中,所述目标第二设备的第一类型的信息用于指示所述第一设备 选择所述第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备选择支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备选择支持具有认证注册能力的第二设备发起随机接入请求。
在一种实现方式中,所述目标第二设备认证注册的信息也可以用于指示选择的目标第二设备在随机接入成功后,可以执行认证注册流程。
在一种实现方式中,在所述第一指示信息用于指示所述第一设备支持目标第二设备进行随机接入的情况下,其中,所述目标第二设备类型的信息用于指示所述第一设备支持第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备支持具有认证注册能力的第二设备发起随机接入请求。
基于上述技术方案,本申请中,第一设备可以通过发送第一指示信息选择目标第二设备进行随机接入,或者,指示支持目标第二设备进行随机接入,从而实现电子标签的分组接入。
在一种实现方式中第二设备向所述第一设备发起随机接入,包括:所述第二设备向所述第一设备发送第一消息,进行随机接入;其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备的第一类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
本申请中,第一消息例如可以是随机接入请求消息或者是第一指示信息的响应消息,本申请对第一消息的具体名称不做限定。
在一种实现方式中,所述方法还包括:第二设备向所述第一设备发送能力信息,所述能力信息包括以下一项或者多项:所述第二设备的第一类型的信息、所述第二设备是否支持极化码编码的信息、所述目标第二设备是否支持认证注册的信息。
基于上述技术方案,本申请中,目标第二设备随机接入时,还可以上报其能力信息,从而便于第一设备及时获取目标第二设备的能力信息,可以及时的基于其能力信息确定数据传输所需的配置信息。例如,在无源物联网场景中,数据传输过程简单,因此尽早的将能力信息上报,可以实现提高数据传输的性能,以及保障数据传输的可靠性。。
在一种实现方式中,所述方法还包括:所述第二设备从所述第一设备接收配置信息,所述配置信息是所述第一设备根据所述第一指示信息和/或所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息。
在一种实现方式中,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
基于上述技术方案,本申请中,第一设备可以基于指示信息和/或能力信息确定目标第二设备的配置信息,从而使得第一设备可以根据不同能力、类型的目标第二设备,使能不同的流程,或者配置不同的参数等,使得目标第二设备更好的传输数据,从而提高数据传输性能。
在一种实现方式中,所述第二设备从所述第一设备接收所述配置信息,包括:所述第二设备从所述第一设备接收第二消息,所述第二消息中包括所述配置信息,其中,所述第二消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
基于上述技术方案,本申请中,配置信息可以灵活承载于各个信令中。
第二方面,提供了一种通信方法,该方法包括:第二设备从第一设备接收第二指示信息,所述第二指示信息用于指示所述第二设备发起随机接入请求;所述第二设备向所述第一设备发送第一消息,进行随机接入,其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
上述技术方案中的第二设备可以理解为,第一设备所选择的一组第二设备,例如,符合一些条件的可以进行随机接入的第二设备。
上述技术方案中,第二指示信息也可以理解为网络设备的触发消息,一旦网络设备发送该触发消息,第二设备就可以进行随机接入。
基于上述技术方案,本申请中,通过第二设备在随机接入过程中,可以主动上报能力信息,从而便于第一设备及时获取目标第二设备的能力信息,使得第一设备可以及时的基于该第二设备的能力进行相应的配置。例如,在无源物联网场景中,数据传输过程简单,因此,尽早的将能力信息上报,可以实现提高数据传输的性能,以及保障数据传输的可靠性。
在一种实现方式中,所述第二设备类型的信息用于指示所述第二设备的类型为第一类型,所述第二设备极化码编码的信息用于指示所述第二设备支持极化码编码,所述第二设备认证注册的信息用于指示所述第二设备支持认证注册。
在一种实现方式中,所述方法还包括:所述第二设备从所述第一设备接收配置信息,所述配置信息是所述第一设备根据所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输时所使用的信息。
在一种实现方式中,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
基于上述技术方案,本申请中,第二设备在传输业务数据之前,可以先上报能力信息,使得读写器可以及时获取终端能力信息,对进行相应的配置,从而提高传输性能以及传输可靠性。
在一种实现方式中,所述第二设备从所述第一设备接收配置信息,包括:所述第二设备从所述第一设备接收第二消息,所述第二消息中包括所述配置信息,其中,所述第一消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
本申请中,配置信息可以灵活承载于各个信令中。
第三方面,提供了一种通信方法,该方法包括:第一设备向第二设备发送第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:目标第二设备的第一类型的信息、目标第二设备极化码编 码的信息、目标第二设备认证注册的信息,所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入,或者,所述第一指示信息用于指示所述第一设备支持目标第二设备发起随机接入,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;所述第一设备从所述目标第二设备接收随机接入请求,其中,所述第二设备为所述目标第二设备。
在一种实现方式中,在所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入的情况下,其中,所述目标第二设备的第一类型的信息用于指示所述第一设备选择第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备选择支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备选择具有认证注册能力的第二设备发起随机接入请求。
在一种实现方式中,在所述第一指示信息用于指示所述第一设备支持目标第二设备进行随机接入的情况下,其中,所述目标第二设备的第一类型的信息用于指示所述第一设备支持第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备支持具有认证注册能力的第二设备发起随机接入请求。
在一种实现方式中,所述第一设备从第二设备接收随机接入请求,包括:所述第一设备从第二设备接收第一消息;其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述第二设备随机接入成功后,所述方法还包括:所述第一设备从所述第二设备接收能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述方法还包括:所述第一设备根据所述第一指示信息和/或所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息;所述第一设备向所述第二设备发送所述配置信息。
在一种实现方式中,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
在一种实现方式中,所述第一设备向所述第二设备发送所述配置信息,包括:所述第一设备向所述第二设备发送第二消息,所述第二消息中包括所述配置信息,其中,所述第二消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
在一种实现方式中,所述目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
第四方面,提供了一种通信方法,该方法包括:第一设备向第二设备发送第二指示信 息,所述第二指示信息用于指示所述第二设备发起随机接入请求;所述第一设备从所述第二设备接收第一消息,其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述第二设备类型的信息用于指示所述第二设备的类型为第一类型,所述第二设备极化码编码的信息用于指示所述第二设备支持极化码编码,所述第二设备认证注册的信息用于指示所述第二设备支持认证注册。
在一种实现方式中,所述方法还包括:所述第一设备根据所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输时所使用的信息;所述第一设备向所述第二设备发送所述配置信息。
在一种实现方式中,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
在一种实现方式中,所述第一设备向所述第二设备发送所述配置信息,包括:所述第一设备向所述第二设备发送第二消息,所述第二消息中包括所述配置信息,其中,所述第一消息具体为:冲突解决消息或者肯定应答消息。
在一种实现方式中,所述目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
第五方面,提供了一种通信设备,该设备包括收发单元,所述收发单元用于接收第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:所述目标第二设备第一类型的信息、所述目标第二设备极化码编码的信息、所述目标第二设备认证注册的信息,其中,所述第一指示信息用于指示所述第一设备选择所述目标第二设备发起随机接入请求,或者,所述第一指示信息用于指示所述第一设备支持所述目标第二设备发起随机接入请求,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;在所述第二设备为所述目标第二设备的情况下,所述收发单元还用于向第一设备发起随机接入请求。
在一种实现方式中,在所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入的情况下,其中,所述目标第二设备的第一类型的信息用于指示所述第一设备选择第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备选择支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备选择具有认证注册能力的第二设备发起随机接入请求。
在一种实现方式中,在所述第一指示信息用于指示所述第一设备支持目标第二设备进行随机接入的情况下,其中,所述目标第二设备类型的信息用于指示所述第一设备支持第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备支持具有认证注册能力的第二设备发起随机接入请求。
在一种实现方式中,所述收发单元用于向所述第一设备发起随机接入,包括:所述收发单元用于向所述第一设备发送第一消息,进行随机接入;其中,所述第一消息包括所述目标第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述收发单元用于向所述第一设备发送能力信息,所述能力信息包括以下一项或者多项:所述目标第二设备类型的信息、所述目标第二设备是否支持极化码编码的信息、所述目标第二设备是否支持认证注册的信息。
在一种实现方式中,所述收发单元用于从所述第一设备接收配置信息,所述配置信息是所述第一设备根据所述第一指示信息和/或所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息。
在一种实现方式中,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示目标第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
在一种实现方式中,所述收发单元用于从所述第一设备接收所述配置信息,包括:所述收发单元用于从所述第一设备接收第二消息,所述第二消息中包括所述配置信息,其中,所述第二消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
在一种实现方式中,所述目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
第六方面,提供了一种通信设备,该设备包括:收发单元,所述收发单元用于接收第二指示信息,所述第二指示信息用于指示第二设备发起随机接入请求;所述收发单元还用于发送第一消息,进行随机接入,其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、第二设备是否支持认证注册的信息。
在一种实现方式中,所述第二设备类型的信息用于指示所述第二设备的类型为第一类型,所述第二设备极化码编码的信息用于指示所述设备支持极化码编码,所述第二设备认证注册的信息用于指示所述第二设备支持认证注册。
在一种实现方式中,所述收发单元用于接收配置信息,所述配置信息是第一设备根据所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输时所使用的信息。
在一种实现方式中,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
在一种实现方式中,所述收发单元用于从所述第一设备接收配置信息,包括:所述收发单元用于从第一设备接收第二消息,所述第二消息中包括所述配置信息,其中,所述第一消息具体为:冲突解决消息或者肯定应答消息。
在一种实现方式中,所述目标第二设备类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
第七方面,提供了一种通信设备,该设备包括:收发单元,所述收发单元用于发送第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:目标第二设备第一类型的信息、目标第二设备极化码编码的信息、目标第二设备认证注册的信息,所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入,或者,所述第一指示信息用于指示所述第一设备支持目标第二设备发起随机接入,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;所述收发单元还用于从所述第二设备接收随机接入请求,其中,所述第二设备为所述目标第二设备。
在一种实现方式中,在所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入的情况下,其中,所述目标第二设备类型的信息用于指示所述第一设备选择第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备选择支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备选择具有认证注册能力的第二设备发起随机接入请求。
在一种实现方式中,在所述第一指示信息用于指示所述第一设备支持目标第二设备进行随机接入的情况下,其中,所述目标第二设备的第一类型的信息用于指示所述第一设备支持第一类型的第二设备发起随机接入请求,所述目标第二设备极化码编码的信息用于指示所述第一设备支持具有极化码编码能力的第二设备发起随机接入请求,所述目标第二设备认证注册的信息用于指示所述第一设备支持具有认证注册能力的第二设备发起随机接入请求。
在一种实现方式中,所述收发单元用于从第二设备接收随机接入请求,包括:所述收发单元用于从第二设备接收第一消息;其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述收发单元用于从所述第二设备接收能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述设备还包括:处理单元,所述处理单元用于根据所述第一指示信息和/或所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息;所述收发单元用于向所述第二设备发送所述配置信息。
在一种实现方式中,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
在一种实现方式中,所述收发单元用于向所述目标第二设备发送所述配置信息,包括:所述收发单元用于向所述目标第二设备发送第二消息,所述第二消息中包括所述配置信息, 其中,所述第二消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
在一种实现方式中,所述目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
第八方面,提供了一种通信设备,该设备包括收发单元,所述收发单元用于发送第二指示信息,所述第二指示信息用于指示第二设备发起随机接入请求;所述收发单元还用于从所述第二设备接收第一消息,其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备的类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述第二设备类型的信息用于指示所述第二设备的类型为第一类型,所述第二设备极化码编码的信息用于指示所述第二设备支持极化码编码,所述第二设备认证注册的信息用于指示所述第二设备支持认证注册。
在一种实现方式中,所述设备还包括:处理单元,所述处理单元用于根据所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输时所使用的信息;所述收发单元用于向所述第二设备发送所述配置信息。
在一种实现方式中,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
在一种实现方式中,所述收发单元用于向所述第二设备发送所述配置信息,包括:所述收发单元用于向所述第二设备发送第二消息,所述第二消息中包括所述配置信息,其中,所述第一消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
在一种实现方式中,所述目标第二设备的类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
第九方面,提供了一种通信设备,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第一方面或第二方面中任意一方面中的任一种可能实现方式中的方法。可选地,该设备还包括存储器。可选地,该设备还包括通信接口,处理器与通信接口耦合。
在一种实现方式中,该设备为终端设备。当该设备为终端设备时,该通信接口可以是收发器,或,输入/输出接口。
在另一种实现方式中,该设备为配置于终端设备中的芯片。当该设备为配置于终端设备中的芯片时,该通信接口可以是输入/输出接口。
在一种实现方式中,该设备为宿主节点设备。当该设备为宿主节点设备时,该通信接口可以是收发器,或,输入/输出接口。
在另一种实现方式中,该设备为配置于宿主节点中的芯片。当该设备为配置于宿主节点中的芯片时,该通信接口可以是输入/输出接口。可选地,该收发器可以为收发电路。可选地,该输入/输出接口可以为输入/输出电路。
第十方面,提供了一种通信设备,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第三方面或第四方面中任意一方面中的任一种可能实现方式 中的方法。可选地,该设备还包括存储器。可选地,该设备还包括通信接口,处理器与通信接口耦合。
在一种实现方式中,该设备为网络设备。当该设备为网络设备时,该通信接口可以是收发器,或,输入/输出接口。
在另一种实现方式中,该设备为配置于网络设备中的芯片。当该设备为配置于网络设备中的芯片时,该通信接口可以是输入/输出接口。
在一种实现方式中,该设备为宿主节点设备。当该设备为宿主节点设备时,该通信接口可以是收发器,或,输入/输出接口。
在另一种实现方式中,该设备为配置于宿主节点设备中的芯片。当该设备为配置于宿主节点设备中的芯片时,该通信接口可以是输入/输出接口。
可选地,该收发器可以为收发电路。可选地,该输入/输出接口可以为输入/输出电路。
第十一方面,提供了一种处理器,包括:输入电路、输出电路和处理电路。所述处理电路用于通过所述输入电路接收信号,并通过所述输出电路发射信号,使得所述处理器执行第一方面至第四方面中任一方面中任一种可能实现方式中的方法。
在具体实现过程中,上述处理器可以为一个或多个芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是由例如但不限于收发器接收并输入的,输出电路所输出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。
第十二方面,提供了一种处理设备,包括处理器和存储器。该处理器用于读取存储器中存储的指令,并可通过收发器接收信号,通过发射器发射信号,以执行第一方面至第四方面中任一方面中任一种可能实现方式中的方法。
可选地,所述处理器为一个或多个,所述存储器为一个或多个。
可选地,所述存储器可以与所述处理器集成在一起,或者所述存储器与处理器分离设置。
在具体实现过程中,存储器可以为非瞬时性(non-transitory)存储器,例如只读存储器(read only memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限定。
应理解,相关的数据交互过程例如发送指示信息可以为从处理器输出指示信息的过程,接收能力信息可以为处理器接收输入能力信息的过程。具体地,处理器输出的数据可以输出给发射器,处理器接收的输入数据可以来自收发器。其中,发射器和收发器可以统称为收发器。
上述第十二方面中的处理设备可以是一个或多个芯片。该处理设备中的处理器可以通过硬件来实现也可以通过软件来实现。当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,可以位于该处理器之外,独立存在。
第十三方面,提供了一种计算机可读介质,所述计算机可读介质存储有计算机程序(也可以称为代码,或指令),当其在计算机上运行时,使得计算机执行上述第一方面至第四 方面中任一方面中的任一种可能实现方式中的方法。
第十四方面,本申请提供了一种包含指令的计算机程序产品。当该计算机程序产品在计算机上运行时,使得计算机执行上述第一方面至第四方面中任一方面中的方法的指令。
第十五方面,提供了一种芯片系统,包括处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片系统的设备执行上述第一方面至第四方面中任一方面中任一种可能实现方式中的方法。
第十六方面,提供了一种通信系统,所述通信系统包括第五方面至第八方面中任一方面中任一实现方式中涉及的设备。
附图说明
图1是本申请适用的一种场景示意图。
图2是本申请中RFID系统的示意图。
图3是本申请提供的通信方法300的流程图。
图4是本申请提供的通信方法400的流程图。
图5是本申请提供的通信方法500的流程图。
图6是本申请提供的通信设备100的示意性框图。
图7是本申请提供的通信设备200的示意性框图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例可应用的无线通信系统包括但不限于:全球移动通信(global system of mobile communication,GSM)系统、长期演进(long term evolution,LTE)频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、LTE系统、先进的长期演进(LTE-Advanced,LTE-A)系统、下一代通信系统(例如,5G通信系统)、多种接入系统的融合系统,或演进系统(例如,6G通信系统)。
本申请提供的技术方案还可以应用于机器类通信(machine type communication,MTC)、机器间通信长期演进技术(Long Term Evolution-machine,LTE-M)、设备到设备(device to device,D2D)网络、机器到机器(machine to machine,M2M)网络、物联网(internet of things,IoT)网络或者其他网络。其中,IoT网络例如可以包括车联网。其中,车联网系统中的通信方式统称为车到其他设备(vehicle to X,V2X,X可以代表任何事物),例如,该V2X可以包括:车辆到车辆(vehicle to vehicle,V2V)通信,车辆与基础设施(vehicle to infrastructure,V2I)通信、车辆与行人之间的通信(vehicle to pedestrian,V2P)或车辆与网络(vehicle to network,V2N)通信等。
本申请中的终端设备,又可以称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等,是指向用户提供语音和/或数据连通性的设备。例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例为:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving) 中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。
本申请中的接入网设备,可以是指将终端接入到无线网络的无线接入网(radio access network,RAN)节点(或设备),又可以称为基站。目前,一些RAN节点的举例为:继续演进的节点B(gNB)、传输接收点(transmission reception point,TRP)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU),或无线保真(wireless fidelity,Wifi)接入点(access point,AP)等。另外,在一种网络结构中,接入网设备可以包括集中单元(centralized unit,CU)节点、或分布单元(distributed unit,DU)节点、或包括CU节点和DU节点的RAN设备。其中包括CU节点和DU节点的RAN设备将长期演进(long term evolution,LTE)系统中eNB的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。接入网设备也可以为读写器设备。
本申请中的核心网设备,可以是网络侧用于管理用户,数据传输以及基站配置的多种功能实体的统称,包括移动管理功能网元(AMF),用户面功能网元(UPF),会话管理功能网元(SMF)等。
如前所述,本申请的技术方案,可以应用于5G新无线(new radio,NR)系统。本申请也可以应用于其它的通信系统,例如,该通信系统中存在实体需要发送传输方向指示信息,另一个实体需要接收该指示信息,并根据该指示信息确定一定时间内的传输方向。
图1是本申请适用的一种场景示意图,如图1所示,以基础覆盖为例,UE位于基站设备提供的一个或多个小区(也可以理解为,载波)的覆盖范围内,为UE服务的小区可以为一个或多个。当为UE的服务小区有多个时,UE可以按照载波聚合(carrier aggregation,CA),或者双连接(dual connectivity,DC),或者协作多点传输(coordinated multiple points,CoMP)方式工作,其中至少一个小区提供多于一种子载波间隔(numerology)同时为UE提供无线资源。以补充覆盖为例,UE也可以位于读写器(reader)提供的覆盖范围内,reader与UE之间的通信可以看做终端于终端之间的传输。终端或读写器与宏基站(可简称“宏站”)或者杆基站(可简称“杆站”)之间属于uu接口传输,即空口传输。
为了便于理解本申请的技术方案,下面首先对本申请涉及的若干技术名称进行简单的描述。
无线射频识别(radio frequency identification,RFID):是一种非接触的自动识别技术,其基本原理是利用射频信号和空间耦合(例如,电感或电磁耦合)或雷达反射的传输特性,实现对被识别物体的自动识别。通常情况下,识别过程可以是:标签(tag)进入读写器(reader)(也可以理解为是,阅读器)后,接收读写器发出的射频信号,标签可以凭借感应电流所获得的能量发送出存储在芯片中的产品信息(例如,无源标签或被动标签),或者由标签主动发送某一频率的信号(例如,有源标签或主动标签),读写器读取信息并解码后,送至中央信息系统进行有关数据处理。
图2示出了RFID系统,如图2所示,一般情况下,一套完整的RFID系统,可以是 由读写器、电子标签及数据管理系统三个部分所组成。其工作原理是:读写器发射特定频率的无线电波能量用以驱动电路,从而将内部的数据送出,此时读写器便可以依序接收解读数据,送给应用程序做相应的处理。
RFID读写器:可以通过天线与RFID电子标签进行无线通信,可以实现对标签识别码和内存数据的读出或写入操作。如图2中的(a)所示,典型的阅读器包含有高频模块(例如,发送器或者接收器)、控制单元以及阅读器天线。RFID读写器也可以理解为是与标签通信的设备,形态可以为终端,也可以是基站,或者是一个具有读写功能的设备。
电子标签:由标签天线和标签专用芯片组成,如图2中的(b)所示。通常情况下,依据电子标签供电方式的不同,电子标签可以分为有源电子标签(active tag)、无源电子标签(passive tag)和半无源电子标签(semi-passive tag)。有源电子标签内装有电池,无源射频标签没有内接电池,半无源电子标签部分依靠电池工作。依据频率的不同,电子标签可以分为低频电子标签、高频电子标签、超高频电子标签和微波电子标签。当然,也可以依据封装形式的不同进行分类,此处不再详细介绍。对于无源标签也可以称为是无源的物联网设备(passive Internet of things,IOT)。因此,RFID电子标签也可以看成一种终端。
本申请中的“盘存”可以理解为:电子标签接收读写器指定的掩码信息和标志位后,若标签存储区的信息与收到的掩码信息匹配,以及标签保存的标志位与读写器指示的一致时,即可进入盘存流程中,即电子标签发起随机接入到读写器,并完成读写器相应的指令。
随着无线通信的快速发展,为满足和丰富人们的日益增长的需求,第五代移动通信(5G)系统应运而生。能够有效的应对未来爆炸性的移动数据流量增长,并支持海量的设备连接和不断涌现的各类新业务。
物联网(IoT)作为5G的组成部分,其市场需求增长迅猛。其中M2M,是机器与机器之间通过无线网络互相传递信息和数据的简称,是IoT发展的重要方向。现有物联网技术包括窄带(narrow band)物联网、低能力(reduced capacity,RedCap)用户设备等。但现有技术功耗依然是毫瓦量级以上的,没有办法进一步节省功耗。而无源RFID的技术可以实现微瓦级功耗和超低成本,成为蜂窝技术未来演进技术的一个重要分支。
如前所述,RFID可以用来追踪和管理很多领域的管理对象,具有准确率高、读取距离远、存储数据量大、耐用性强等特点,广泛应用于产品生产、物流、销售等环节中。但是,现有读写器对多个标签的交互过程是相同的,在盘存过程中,读写器无法识别不同类型的标签。根据盘存流程,标签随机接入成功之后,才可能将其能力信息发送给读写器。即,标签随机接入的效率较低,从而造成后续数据传输的性能较差。
有鉴于此,本申请提供了一种通信方法,可以基于标签的类型,选择不同的标签接入读写器,提高了标签和读写器之间的随机接入效率。并且,基于本申请的技术方案,读写器可以根据不同能力、类型的标签,使用不同的流程,或者配置不同的参数等,从而提高数据传输性能。
图3是本申请提供的方法300,如图3所示,该方法包括:
步骤301,第二设备从第一设备接收第一指示信息,第一指示信息包括第一信息,第一信息用于确定目标第二设备。
也可以理解为,本申请中第二设备可以有一个或者多个,该一个或者多个第二设备都 可以接收第一设备发送的第一指示信息,该第一指示信息中可以包括确定目标第二设备的信息。即,后续随机接入时,可以是由所确定的目标第二设备发起随机接入请求。
本申请中,第一指示信息例如,可以是盘存指示信息(也可以理解为,盘存信令)。例如,可以是第一设备发送的选择(select)信令、查询(query)信令、寻呼信令或者其他信令。
本申请中,例如,第一信息可以至少包括以下一项或者多项:目标第二设备的第一类型的信息、目标第二设备极化码编码的信息、目标第二设备认证注册的信息。例如,第一信息也可以包括目标第二设备的掩码信息、标志位信息、标识信息等其他特性信息。
本申请中,第一指示信息可以用于指示第一设备选择目标第二设备发起随机接入请求,或者;第一指示信息也可以用于指示第一设备支持目标第二设备发起随机接入请求。其中,目标第二设备为符合第一信息中的一项或多项的第二设备。
本申请中,目标第二设备为符合所述第一信息中的一项或多项的第二设备,可以理解为,目标第二设备满足第一信息中选择或者支持目标第二设备的条件。
本申请中,在第一信息中包括多个信息时,第二设备可以仅仅只符合其中一个信息的选择条件,就可以成为目标第二设备;也可以是,第二设备也可以是符合多个信息的选择条件从而成为目标第二设备。
作为一个示例,如果第一指示信息用于指示第一设备选择目标第二设备发起随机接入时,其中,目标第二设备类型的信息可以用于指示第一设备选择第一类型的第二设备发起随机接入请求;目标第二设备极化码编码的信息可以用于指示第一设备选择支持具有极化码编码能力的第二设备发起随机接入请求;目标第二设备认证注册的信息可以用于指示第一设备选择支持具有认证注册能力的第二设备发起随机接入请求;或者选择接入的第二设备都需要执行认证注册流程。
作为另一个示例,如果第一指示信息具体用于指示第一设备支持目标第二设备进行随机接入时,其中,目标第二设备类型的信息可以用于指示第一设备支持第一类型的第二设备发起随机接入请求;目标第二设备极化码编码的信息可以用于指示第一设备支持具有极化码编码能力的第二设备发起随机接入请求,目标第二设备认证注册的信息可以用于指示第一设备支持具有认证注册能力的第二设备发起随机接入请求。
本申请中,第一指示信息用于指示第一设备支持目标第二设备发起随机接入请求,也可以理解为,第一设备不仅仅支持目标第二设备发起随机接入请求,第一设备也同样支持其他第二设备发起随机接入请求。
本申请中,作为一个示例,目标第二设备为电子标签时,其类型包括以下一项或者多项:有源类型的电子标签、无源类型的电子标签、半无源类型的电子标签。
在一种实现方式中,第二设备在发送第一指示信息时还可以发送第一配置信息,该第一配置信息可以基于第一指示信息确定,第一配置信息用于配置第二设备后续数据传输时所使用的信息或者参数。
在另一实现方式中,第二设备发送的第一指示信息中包括了第一配置信息。
本申请中,第一指示信息和第一配置信息可以是一条消息,也可以是多条消息。
例如,第一配置信息可以包括第一设备为第二设备配置的后续数据传输时的认证注册指示信息、应用极化码指示信息、配置速率指示信息。
例如,认证注册的指示信息用于指示第二设备在数据传输时需要向核心网发起注册流程;应用极化码指示信息用于指示第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;配置速率指示信息用于指示第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
后续第二设备在传输数据时可以直接按照配置信息的指示使用相应的配置进行数据传输。第二设备在随机接入成功后,无须等待第一设备的配置信息。提高了网络配置的灵活性,节省数据传输的时延,提高数据传输的速率。
步骤302,在所述第二设备为所述目标第二设备的情况下,第二设备向第一设备发起随机接入请求。
本申请中,可以根据第一指示信息确定目标第二设备,目标第二设备可以向第一设备发起随机接入请求或者向第一设备发送第一指示信息的响应消息,该响应消息表明第二设备是符合第一设备选择条件的第二设备(也可以理解为,目标第二设备)。
基于上述技术方案,本申请中,第一设备可以基于不同的类型或者不同能力的目标第二设备,选择目标第二设备进行随机接入,从而提高了第二设备随机接入的效率。
其中,在一种实现方式中,第二设备可以向第一设备发送第一消息,进行随机接入。该第一消息可以包括第二设备的能力信息。
在另一种实现方式中,第二设备随机接入成功后,可以向第一设备发送第一消息,该第一消息中包括第二设备的能力信息。
本申请中,第一消息例如可以是RN16信令,第一消息也可以是其他上行信令。
本申请中,该能力信息可以包括以下一项或者多项:例如,第二设备类型的信息、第二设备是否支持极化码编码的信息、第二设备是否支持认证注册的信息,等等。
在一些实施例中,还可以包括步骤303,第二设备从第一设备接收第二消息,第二消息中包括配置信息,该配置信息是第一设备根据第一指示信息和/或能力信息确定的。
本实施例中的配置信息可以用于配置目标第二设备进行数据传输或者信令传输时所使用的信息。
本申请中,第二消息例如可以是:冲突解决消息或者随机接入请求的肯定应答消息。
作为一个示例,配置信息可以包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,认证注册的指示信息可以用于指示第二设备在数据传输时需要向核心网发起注册流程;应用极化码指示信息可以用于指示第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;配置速率指示信息可以用于指示第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
基于上述技术方案,本申请中,第一设备还可以根据不同能力、类型的第二设备,使用不同的流程,或者配置不同的参数等,从而提高数据传输性能。
需要说明的是,本申请中,第二设备可以是终端设备,例如,第二设备为电子标签;例如,第二设备为RedCap UE;又例如,第二设备为物联网设备等。本申请中的第一设备可以是指读写器也可以是指网络设备,又例如,无源物联网设备(passive iot)。
本申请中的下述实施例中,以第二设备为电子标签为例进行说明,以第一设备为读写器为例进行说明。
需要说明的是,下述实施例中有关“标签”的描述,可以理解为“电子标签”或者无 源物联网设备。
图4是本申请提供的具体的实施例通信方法400,如图4所示,该方法包括:
步骤401,数据网络向核心网发送盘存指示信息#1,盘存指示信息#1可以用于指示目标电子标签向读写器发起随机接入请求。
可选的,盘存指示信息#1中可以包括第一信息,第一信息用于确定目标电子标签。
本步骤中,在一种实现方式中,第一信息可以包括目标电子标签的类型信息。例如,目标电子标签为有源标签、目标电子标签为无源标签、目标电子标签为半无源标签,等等。
本步骤中,在一种实现方式中,第一信息中还可以包含极化码(polar)编码的信息。例如,目标电子标签为支持polar编码的标签。具体地polar编码能力也可以细分为上行使用polar,或者下行支持polar编码。
本步骤中,在另一种实现方式中,第一信息中还可以包括目标电子标签是否需要认证注册的信息。例如,随机接入时目标电子标签需要向核心网发起注册流程。
在一种实现方式中,数据网络向核心网发送的盘存指示信息#1的时候还会发送配置信息#1,配置信息#1可以基于第一指示信息确定,配置信息#1用于配置所选择的标签后续数据传输时所使用的信息或者参数。指示信息#1和配置信息#1可以是一条消息,也可以是多条消息。例如,指示信息#1和配置信息#1可以承载在一条信令中也可以在不同的信令中分别传输。
在另一实现方式中,数据网络向核心网发送的盘存指示信息#1中包括了配置信息#1。
例如,配置信息#1可以包括数据网络为选择的标签的后续数据传输时的认证注册指示信息、应用极化码指示信息、配置速率指示信息。
例如,认证注册的指示信息用于指示选择的标签在数据传输时需要向核心网发起注册流程;应用极化码指示信息用于指示选择的标签在传输上行数据和/或下行数据时使用极化码进行数据传输;配置速率指示信息用于指示选择的标签在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
后续选择的标签在传输数据时可以直接按照配置信息的指示使用相应的配置进行数据传输。选择的标签在随机接入成功后,无须等待网络设备的配置信息。提高了网络配置的灵活性,节省数据传输的时延,提高数据传输的速率。
具体实施方式例如可以是:
作为一个示例,盘存指示信息#1中可以包含目标电子标签无源标签类型的信息。在一种可能的实现方式中,表明只读写器选择无源标签向读写器发起接入,或者只选择符合一定条件的无源标签向读写器发起接入。在另一种可能的实现方式中,该无源标签类型的信息可以指示,读写器可以支持无源标签的接入,即无源标签可以接入该读写器,也隐含指示也可能支持其他类型的标签接入,例如,该读写器也支持有源标签或者半无源标签的接入。
作为一个示例,盘存指示信息#1中可以包含目标电子标签半无源标签类型的信息。在一种可能的实现方式中,表明读写器只选择半无源标签向读写器发起接入,或者只选择符合一定条件的半无源标签向读写器发起接入。在另一种可能的实现方式中,该半无源标签类型的信息可以指示,读写器支持半无源标签的接入,即半无源标签可以接入该读写器,也隐含指示也可能支持其他类型的标签接入。
作为一个示例,盘存指示信息#1中还可以包含目标电子标签polar编码的信息。在一种可能的实现方式中,表明读写器支持polar编码的电子标签向读写器发起接入,或者读写器只选择符合一定条件的支持polar编码的电子标签向读写器发起接入。在另一种可能的实现方式中,该polar编码的信息表示,读写器支持polar编码的电子标签的接入,即支持polar编码标签可以接入该读写器,也隐含指示也可能支持其他类型的电子标签接入。
作为另一个示例,盘存指示信息#1中还可以包含目标电子标签认证指示的信息,在一种可能的实现方式中,是否需要注册流程可以与目标电子标签的类型绑定,例如,若盘存指示信息#1中包含目标电子标签的无源标签类型的信息,则表明该标签不需要认证注册流程;若盘存指示信息#1中包含目标电子标签的半无源标签类型的信息,则表明该类型标签需要执行认证注册流程。具体地,绑定可以为协议规定的关系。在另一种可能的实现方式中,目标电子标签是否需要注册流程可以与其标签类型相结合。例如,若盘存指示信息#1中包括注册流程的信息时,则无源电子标签不需要进行注册流程,半无源电子标签则需要进行注册流程;若盘存指示信息#1中不包括认证注册流程的信息时,则无源标签和半无源标签都不需要注册流程。在一种实现方式中,盘存指示信息#1中包含目标电子标签认证指示的信息,则表示选择接入的标签(也可以理解为,目标电子标签)都需要执行认证注册流程。
需要说明的是,本申请中,选择目标第二设备条件不仅仅限于上述描述的各个情况,还可以有其他情况,本领域人员可以根据实际情况灵活设定。并且还可以支持多种条件的结合,比如第一设备可以选择无源电子标签,且标识对应数值大于100的标签进行随机接入。
应理解,上述第一设备发送的信息,还可以通过携带某种能力信息或者不携带某种能力信息来表示对功能的支持和不支持,或者选择和不选择;也可以通过对字段设置,例如,“真”(true)或“假”(or false),表明支持和不支持,或者选择和不选择。进一步的,标签上报时,若携带该能力信息则表示支持该能力,不携带能力信息则表明不支持。
本申请中,数据网络也可以理解为是应用层,即,应用层向核心网发送盘存指示信息#1。
步骤402,核心网接从数据网络接收盘存指示信息#1后,向读写器转发指示信息#1。
作为一个示例,核心网可以将该盘存指示信息#1先发送至基站,由基站再转发至读写器。若读写器就是基站时,则核心网可以直接发送至读写器。
可选的,核心网发送的盘存指示信息#1中可以包含第一信息,第一信息用于确定目标第二设备,第一信息可以至少包括一下信息中的一项或者多项:目标电子标签类型的信息、目标电子标签polar编码的信息、目标电子标签是否需要认证注册的信息。
步骤403,读写器收到盘存指示信息#1后,向电子标签发送盘存指示信息#1。
本步骤中,盘存指示信息#1中可以包含第一信息,第一信息用于确定目标第二设备,第一信息可以至少包括一下信息中的一项或者多项:目标电子标签类型的信息、目标电子标签polar编码的信息、目标电子标签是否需要认证注册的信息。
也可以理解为,本申请中,第一信息可以网络侧下发的,例如,数据网络、核心网、基站等发送给读写器,读写器再转发给电子标签;也可以是,网络侧发送的盘存指示信息#1中没有包括第一信息,第一信息是由读写器直接下发给电子标签的;也可以是,第一 信息的指示信息下发至读写器,读写器解码指示信息后生成第一信息。
本步骤中,例如,读写器可以向电子标签发送选择(select)信令、询问(Query)信令、寻呼信令或者其他信令,等等。其中,第一指示信息中可以承载于上述信令中。
本申请中,如前所述电子标签可以有一个或者多个,该一个或者多个电子标签都可以接收盘存指示信息#1。由于盘存指示信息#1中包括第一信息,第一信息用于确定目标电子标签,因此,后续可以是由目标电子标签向读写器发起随机接入。
步骤404,目标电子标签向读写器发起随机接入请求。
例如,目标电子标签向读写器发送第一消息,进行随机接入。例如,该第一消息可以RN16信令或者随机数,等等。第一消息表明标签是符合读写器选择条件的标签,因此发送随机接入消息。
本申请中,该第一消息的名称可以是随机接入请求,或者也可以是盘存指示信息#1的响应消息,本申请对第一消息的具体名称不做限定。
作为一个示例,若盘存指示信息#1包含无源标签类型的信息,则表明只选择无源标签向读写器发起随机接入请求,或者只选择符合一定条件的无源标签向读写器发起随机接入请求。此时无源标签可以向读写器发起随机接入请求。在另一种实现方式中,该无源标签类型的信息表示,读写器支持无源标签的发起随机接入请求,即表明无源标签可以接入该读写器,也隐含指示该读写器也可能支持其他类型的标签发起随机接入请求。
作为一个示例,若盘存指示信息#1中包含半无源标签类型的信息,则表明只选择半无源标签向读写器发起随机接入请求,或者只选择符合一定条件的半无源标签向读写器发起随机接入请求。在另一种实现方式中,该半无源标签类型的信息,可以指示读写器支持半无源标签的发起随机接入请求,即表明半无源标签可以接入该读写器,也隐含指示也可能支持其他类型的标签接入。
盘存指示信息#1中包含的各种信息的实现方式,具体可以参加步骤401中的描述,为了描述简洁,此处不再赘述。
在一些实施例中,目标电子标签向读写器发起随机接入请求时,还可以上报其能力信息。例如,第一消息中可以包括目标电子标签的能力信息。
在另一些实施例中,目标电子标签随机接入成功之后,可以向读写器发送器能力信息。
本申请中,该能力信息包括以下一项或者多项:例如,目标电子标签类型的信息、目标电子标签是否支持极化码编码的信息、目标电子标签是否支持认证注册的信息。
在一些实施例中,还包括步骤405,读写器确定配置信息,该配置信息用于配置目标电子标签进行数据传输或者信令传输时所使用的信息。
在一种实现方式中,读写器可以基于盘存指示信息#1,确定配置信息。
在一种实现方式中,如果目标电子标签上报了能力信息,此时,读写器还可以基于目标电子标签能力信息确定配置信息。
在另一种实现方式中,读写器可以基于盘存指示信息和能力信息共同确定配置信息。
本申请中,配置信息可以包括以下至少一项:例如,认证注册指示信息、应用极化码指示信息、配置速率指示信息。其中,认证注册的指示信息可以用于指示目标电子标签在数据传输时需要向核心网发起注册流程;应用极化码指示信息可以用于指示目标电子标签在传输上行数据和/或下行数据时使用极化码进行数据传输;配置速率指示信息可以用于 指示目标电子在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
基于上述技术方案,本申请中,目标第二设备随机接入时,还可以上报其能力信息,从而便于第一设备及时获取目标第二设备的能力信息,后续基于其能力信息确定数据传输所需的配置信息,从而提高传输性能以及传输可靠性。
步骤406,读写器向目标电子标签发送第二消息,该第二消息中包括配置信息。
例如,第二消息可以是冲突解决消息,或者,第二消息可以是肯定应答消息,等等。第二消息可以是根据第一指示信息确定的,比如,第一指示信息包含无源标签类型,表示选择无源标签接入,则可在第二消息中,对接入或者尝试接入的无源标签进行对应的配置。
步骤407,目标电子标签接收配置信息,根据配置信息进行上行数据传输。
根据本申请提供的方法,通过在盘存触发的命令中包含不同能力电子标签和不同类型电子标签指示信息,使得可以基于标签类型、能力发起随机接入过程。换句话说,读写器可以基于不同能力的电子标签或者不同类型的电子标签,选择不同的标签接入读写器。并且,读写器可以根据不同能力、类型的标签,使能不同的流程,或者配置不同的参数等,使得电子标签更好的传输数据,从而提高数据传输性能。
图5是本申请提供的通信方法500的示意图,如图5所示,该方法包括:
步骤501,数据网络向核心网发送盘存指示信息#2。
本申请中,盘存指示信息#2可以用于指示,选择一组标签随机接入该读写器,或者盘存指示信息#2用于指示所有标签都可以随机接入该读写器。
步骤502,核心网从数据网络接收盘存指示信息#2后,向读写器转发指示信息#2。
作为一个示例,核心网可以将该盘存指示信息#2先发送至基站,由基站再转发至读写器。若读写器就是基站时,则核心网可以直接发送至读写器。
步骤503,读写器收到盘存指示信息#2后,向标签发送盘存指示信息#2,
例如,该盘存指示信息#2可以承载于选择(select)信令、询问(Query)信令、寻呼信令或者其他信令中。
本申请中,在一种实现方式中,步骤501-步骤503为可选的。
步骤504,电子标签接收盘存指示信息#2后,向读写器发送第一消息,进行随机接入。
本申实施例中,第一消息中可以包括电子标签的能力信息,该能力信息包括以下一项或者多项:电子标签类型的信息(例如,无源电子标签类型、半无源电子标签类型、有源电子标签类型)、电子标签是否支持polar编码的信息、电子标签是否支持认证注册的信息。其中,第一消息表明标签符合读写器发送盘存指示的响应消息。
作为一个示例,例如,电子标签#1的能力信息可以包括以下信息的一项或者多项:电子标签#1为无源电子标签类型、电子标签#1支持polar编码、电子标签#1不支持认证注册。例如,电子标签#2的能力信息可以包括:电子标签#2为有源电子标签类型、电子标签#2支持polar编码、电子标签#2不支持认证注册。即,本实施例中,一个或者多个电子标签可以在随机接入过程中上报能力信息。例如,无源标签也可以表示不支持认证注册流程。
例如,电子标签随机接入过程中,以第一消息为RN16信令为例,RN16信令中可以包含电子标签的能力信息。其中,本申请中,RN16可以表示发送16位的随机数,对其信令名称不限制,也可以不叫RN16,本申请仅以RN16为例。
在一种实现方式中,第一消息可以是随机接入过程中的消息,也可以是随机接入成功后,第二设备能力上报的消息。
步骤505,读写器接收第一消息后,根据电子标签的能力信息确定电子标签的配置信息。
本申请中,配置信息可以包括以下至少一项:例如,认证注册指示信息、应用极化码指示信息、配置速率指示信息。其中,认证注册的指示信息可以用于指示电子标签在数据传输时需要向核心网发起注册流程;应用极化码指示信息可以用于指示电子标签在传输上行数据和/或下行数据时使用极化码进行数据传输;配置速率指示信息可以用于指示电子在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
作为一个示例,以电子标签#1为例,读写器可以基于其能力信息确定其配置信息,例如,电子标签#1的配置信息可以是:数据传输时采用polar编码,电子标签#2在数据传输时不需要向核心网发起注册流程。另外,配置信息中还可以包括电子标签#2上行数据传输的速率。
步骤506,读写器向电子标签发送第二消息,该第二消息中包括电子标签的配置信息。
本申请中,该第二消息例如可以是肯定应答(acknowledge,ACK)消息,或者竞争解决消息,或者其他消息。
步骤507,电子标签接收到第二消息后,根据配置信息指示进行上行数据传输。
例如,如果读写器配置了注册流程,则被配置的电子标签需要发起注册流程。又例如,如果读写器配置了polar编码,则该电子标签可以向读写器发送数据时可以使用极化码,例如,在发送产品电子代码(electronic product code,EPC)时可以使用极化码。具体地,若指示上行支持polar编码,可以对其配置上行使用polar编码,比如配置码率等。也可以指示下行支持polar编码,并对其进行相应的配置。还可以,终端指示上行或者下行是否支持,或者都支持,基站配置上行或者下行或者都配置使用polar编码。
另外,读写器可以在发送盘存命令等消息中先发送对polar编码进行配置,比如码率等等,符合盘存命令选择或者接入条件的标签,将配置信息进行保存,标签后续上报自己的能力,基站向该标签发送可以应用前述发送的配置信息。示例性的,终端可以在第一消息中上报能力,基站可以在竞争解决消息中配置标签使用。
根据本申请提供的方法,通过电子标签在随机接入过程中,主动上报能力信息,使得读写器可以基于该标签的能力进行相应的配置。换句话说,电子标签在传输业务数据之前,可以先上报能力信息,使得读写器可以及时获取终端能力信息,对进行相应的配置,从而提高传输性能以及传输可靠性。
需要说明的是,在本申请中,“如果…时”以及“如果”均指在某种客观情况下设备会做出相应的处理,并非是限定时间,且也不要求设备实现时一定要有判断的动作,也不意味着存在其它限定。
以上,结合图3至图5详细说明了本申请实施例提供的通信方法。下面结合图6和图7介绍本申请实施例提供的通信设备。应理解,设备实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,这里不再赘述。
上述主要从各个节点之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,各个节点,例如终端设备或者网络设备,为了实现上述功能,其包含了执行各个 功能相应的硬件结构和/或软件模块。本领域技术人员应该可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对终端设备或者终端设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。下面以采用对应各个功能划分各个功能模块为例进行说明。
图6是本申请实施例提供的通信设备100的示意性框图。如图所示,该设备100可以包括:收发单元110和处理单元120。
在一种可能的设计中,该设备100可以是上文方法实施例中的第二设备或者目标第二设备(例如,终端设备),也可以是用于实现上文方法实施例中终端设备的功能的芯片。应理解,该设备100可对应于根据本申请实施例的方法300、方法400、方法500中的终端设备,该设备100可以执行本申请实施例的方法300、方法400、方法500中的终端设备所对应的步骤。应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
具体地,收发单元用于,接收第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:所述目标第二设备第一类型的信息、所述目标第二设备极化码编码的信息、所述目标第二设备认证注册的信息,其中,所述第一指示信息用于指示所述第一设备选择所述目标第二设备发起随机接入请求,或者,所述第一指示信息用于指示所述第一设备支持所述目标第二设备发起随机接入请求,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;在所述第二设备为所述目标第二设备的情况下,收发单元还用于发起随机接入请求。
在一种实现方式中,收发单元用于发送第一消息,进行随机接入。其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,收发单元用于发送能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,收发单元还用于接收配置信息,所述配置信息是第一设备根据所述第一指示信息和/或所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息。
在一种实现方式中,所述收发单元用于接收第二消息,所述第二消息中包括配置信息,所述第二消息具体为冲突解决消息或者随机接入请求的肯定应答消息。
在另一种可能的设计中,该设备100可以是上文方法实施例中的第一设备(例如,读 写器或者网络设备),也可以是用于实现上文方法实施例中第二设备的功能的芯片。应理解,该设备100可对应于根据本申请实施例的方法300、方法400、方法500中的第二设备,该设备100可以执行本申请实施例的方法300、方法400、方法500中的网络设备所对应的步骤。应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
具体地,收发单元用于,发送第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:目标第二设备第一类型的信息、目标第二设备极化码编码的信息、目标第二设备认证注册的信息,所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入,或者,所述第一指示信息用于指示所述第一设备支持目标第二设备发起随机接入,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;所述收发单元还用于从所述第二设备接收随机接入请求,其中,所述第二设备为所述目标第二设备。
在一种实现方式中,所述收发单元用于接收第一消息,所述第一消息包括第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述收发单元用于接收能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
在一种实现方式中,所述处理单元用于根据所述第一指示信息和/或所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息;所述收发单元用于发送所述配置信息。
在一种实现方式中,所述收发单元用于发送第二消息,所述第二消息包括所述配置信息,其中,所述第二消息具体为:冲突解决消息或者随机接入请求的肯定应答消息。
图7是本申请实施例提供的通信设备200的示意性框图。如图所示,该设备200包括:至少一个处理器220。该处理器220与存储器耦合,用于执行存储器中存储的指令,以发送信号和/或接收信号。可选地,该设备200还包括存储器230,用于存储指令。可选的,该设备200还包括收发器210,处理器220控制收发器210发送信号和/或接收信号。
应理解,上述处理器220和存储器230可以合成一个处理设备,处理器220用于执行存储器230中存储的程序代码来实现上述功能。具体实现时,该存储器230也可以集成在处理器220中,或者独立于处理器220。
还应理解,收发器210可以包括收发器(或者称,接收机)和发射器(或者称,发射机)。收发器还可以进一步包括天线,天线的数量可以为一个或多个。收发器210有可以是通信接口或者接口电路。
具体的,该设备200中的收发器210可以对应于设备100中的收发单元110,该设备200中的处理器220可对应于设备200中的处理单元120。
应理解,各收发器处理器执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行 完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。
应注意,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application-specific integrated circuit,ASIC)、现场可编程门阵列(field-programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch-link DRAM,SLDRAM)和直接内存总线随机存取存储器(direct ram-bus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品上存储有计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行方法300、方法400、方法500实施例中任意一个实施例的方法。
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行方法300、方法400、方法500实施例中任意一个实施例的方法。
根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的设备或设备。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、 计算机网络、或者其他可编程设备。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disc,SSD))等。
上述各个设备实施例中网络侧设备与终端设备和方法实施例中的网络侧设备或终端设备对应,由相应的模块或单元执行相应的步骤,例如通信单元(收发器)执行方法实施例中接收或发送的步骤,除发送、接收外的其它步骤可以由处理单元(处理器)执行。具体单元的功能可以参考相应的方法实施例。其中,处理器可以为一个或多个。
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在2个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进程来通信。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所述领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、设备和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、设备和方法,可以通过其它的方式实现。例如,以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各 个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (30)

  1. 一种通信的方法,其特征在于,包括:
    第二设备从第一设备接收第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:所述目标第二设备的第一类型的信息、所述目标第二设备极化码编码的信息、所述目标第二设备认证注册的信息,其中,所述第一指示信息用于指示所述第一设备选择所述目标第二设备发起随机接入请求,或者,所述第一指示信息用于指示所述第一设备支持所述目标第二设备发起随机接入请求,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;
    在所述第二设备为所述目标第二设备的情况下,第二设备向所述第一设备发起随机接入请求。
  2. 根据权利要求1所述的方法,其特征在于,在所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入的情况下,其中,
    所述目标第二设备的第一类型的信息用于指示所述第一设备选择所述第一类型的第二设备发起随机接入请求,
    所述目标第二设备极化码编码的信息用于指示所述第一设备选择具有极化码编码能力的第二设备发起随机接入请求,
    所述目标第二设备认证注册的信息用于指示所述第一设备选择具有认证注册能力的第二设备发起随机接入请求。
  3. 根据权利要求1所述的方法,其特征在于,在所述第一指示信息用于指示所述第一设备支持目标第二设备进行随机接入的情况下,其中,
    所述目标第二设备类型的信息用于指示所述第一设备支持所述第一类型的第二设备发起随机接入请求,
    所述目标第二设备极化码编码的信息用于指示所述第一设备支持具有极化码编码能力的第二设备发起随机接入请求,
    所述目标第二设备认证注册的信息用于指示所述第一设备支持具有认证注册能力的第二设备发起随机接入请求。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述第二设备向所述第一设备发起随机接入,包括:
    所述第二设备向所述第一设备发送第一消息;
    其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备的第一类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
  5. 根据权利要求1至3中任一项所述的方法,其特征在于,所述第二设备随机接入成功后,所述方法还包括:
    所述第二设备向所述第一设备发送能力信息,所述能力信息包括以下一项或者多项:所述第二设备的第一类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
  6. 根据权利要求4或5所述的方法,其特征在于,所述方法还包括:
    所述第二设备从所述第一设备接收配置信息,所述配置信息是所述第一设备根据所述第一指示信息和/或所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息。
  7. 根据权利要求6所述的方法,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,
    所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;
    所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;
    所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
  8. 根据权利要求6或7所述的方法,其特征在于,所述第二设备从所述第一设备接收配置信息,包括:
    所述第二设备从所述第一设备接收第二消息,所述第二消息中包括所述配置信息,其中,所述第二消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
  9. 根据权利要求1至8中任一项所述的方法,其特征在于,所述目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
  10. 一种通信的方法,其特征在于,包括:
    第二设备从第一设备接收第二指示信息,所述第二指示信息用于指示所述第二设备发起随机接入请求;
    所述第二设备向所述第一设备发送第一消息,进行随机接入,其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备的类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
  11. 根据权利要求10所述的方法,其特征在于,所述第二设备的类型的信息用于指示所述第二设备的类型为第一类型,所述第二设备极化码编码的信息用于指示所述第二设备支持极化码编码,所述第二设备认证注册的信息用于指示所述第二设备支持认证注册。
  12. 根据权利要求10或11所述的方法,其特征在于,所述方法还包括:
    所述第二设备从所述第一设备接收配置信息,所述配置信息是所述第一设备根据所述能力信息确定的,所述配置信息用于配置所述第二设备进行数据传输时所使用的信息。
  13. 根据权利要求10至12中任一项所述的方法,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,
    所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
  14. 根据权利要求12或13所述的方法,其特征在于,所述第二设备从所述第一设备接收配置信息,包括:
    所述第二设备从所述第一设备接收第二消息,所述第二消息中包括所述配置信息,其中,所述第一消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
  15. 一种通信的方法,其特征在于,包括:
    第一设备向第二设备发送第一指示信息,所述第一指示信息包括第一信息,所述第一信息用于确定目标第二设备,所述第一信息至少包括以下一项或者多项:目标第二设备的第一类型的信息、目标第二设备极化码编码的信息、目标第二设备认证注册的信息,所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入,或者,所述第一指示信息用于指示所述第一设备支持目标第二设备发起随机接入,所述目标第二设备为符合所述第一信息中的一项或多项信息的第二设备;
    所述第一设备从第二设备接收随机接入请求,其中,所述第二设备为所述目标第二设备。
  16. 根据权利要求15所述的方法,其特征在于,在所述第一指示信息用于指示所述第一设备选择目标第二设备发起随机接入的情况下,其中,
    所述目标第二设备的第一类型的信息用于指示所述第一设备选择所述第一类型的第二设备发起随机接入请求,
    所述目标第二设备极化码编码的信息用于指示所述第一设备选择具有极化码编码能力的第二设备发起随机接入请求,
    所述目标第二设备认证注册的信息用于指示所述第一设备选择具有认证注册能力的第二设备发起随机接入请求。
  17. 根据权利要求15所述的方法,其特征在于,在所述第一指示信息用于指示所述第一设备支持目标第二设备进行随机接入的情况下,其中,
    所述目标第二设备的第一类型的信息用于指示所述第一设备支持所述第一类型的第二设备发起随机接入请求,
    所述目标第二设备极化码编码的信息用于指示所述第一设备支持具有极化码编码能力的第二设备发起随机接入请求,
    所述目标第二设备认证注册的信息用于指示所述第一设备支持具有认证注册能力的第二设备发起随机接入请求。
  18. 根据权利要求15至17中任一项所述的方法,其特征在于,所述第一设备从第二设备接收随机接入请求,包括:
    所述第一设备从第二设备接收第一消息;
    其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
  19. 根据权利要求15至18中任一项所述的方法,其特征在于,所述第二设备随机接入成功后,所述方法还包括:
    所述第一设备从所述第二设备接收能力信息,所述能力信息包括以下一项或者多项:所述第二设备类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
  20. 根据权利要求15至19中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一设备根据所述第一指示信息和/或所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输或者信令传输时所使用的信息;
    所述第一设备向所述第二设备发送所述配置信息。
  21. 根据权利要求15至20中任一项所述的方法,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,
    所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
  22. 根据权利要求15至21中任一项所述的方法,其特征在于,所述第一设备向所述目标第二设备发送所述配置信息,包括:
    所述第一设备向所述第二设备发送第二消息,所述第二消息中包括所述配置信息,其中,所述第二消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
  23. 根据权利要求1至8中任一项所述的方法,其特征在于,所述目标第二设备的第一类型包括以下一项或者多项:有源类型、无源类型、半无源类型。
  24. 一种通信的方法,其特征在于,包括:
    第一设备向第二设备发送第二指示信息,所述第二指示信息用于指示所述第二设备发起随机接入请求;
    所述第一设备从所述第二设备接收第一消息,其中,所述第一消息包括所述第二设备的能力信息,所述能力信息包括以下一项或者多项:所述第二设备的类型的信息、所述第二设备是否支持极化码编码的信息、所述第二设备是否支持认证注册的信息。
  25. 根据权利要求24所述的方法,其特征在于,所述第二设备类型的信息用于指示所述第二设备的类型为第一类型,所述第二设备极化码编码的信息用于指示所述第二设备支持极化码编码,所述第二设备认证注册的信息用于指示所述第二设备支持认证注册。
  26. 根据权利要求24或者25所述的方法,其特征在于,所述方法还包括:
    所述第一设备根据所述能力信息确定配置信息,所述配置信息用于配置所述第二设备进行数据传输时所使用的信息;
    所述第一设备向所述第二设备发送所述配置信息。
  27. 根据权利要求24至26中任一项所述的方法,其特征在于,所述配置信息包括以下至少一项:认证注册指示信息、应用极化码指示信息、配置速率指示信息,其中,
    所述认证注册的指示信息用于指示所述第二设备在数据传输时需要向核心网发起注册流程;所述应用极化码指示信息用于指示所述第二设备在传输上行数据和/或下行数据时使用极化码进行数据传输;所述配置速率指示信息用于指示所述第二设备在传输上行数据和/或下行数据中所使用的传输信息的速率或者码率。
  28. 根据权利要求26或27所述的方法,其特征在于,所述第一设备向所述第二设备发送所述配置信息,包括:
    所述第一设备向所述第二设备发送第二消息,所述第二消息中包括所述配置信息,其中,所述第一消息具体为:冲突解决消息或者所述随机接入请求的肯定应答消息。
  29. 一种通信装置,其特征在于,包括用于执行权利要求1至9中任一项或者10至 14中任一项所述的法的单元。
  30. 一种通信装置,其特征在于,包括用于执行权利要求15至23中任一项或者24至28中任一项所述方法的单元。
PCT/CN2022/113815 2021-11-05 2022-08-22 一种通信方法和设备 WO2023077917A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP22888950.7A EP4422228A1 (en) 2021-11-05 2022-08-22 Communication method and device
US18/654,605 US20240284519A1 (en) 2021-11-05 2024-05-03 Communication method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111303422.2 2021-11-05
CN202111303422.2A CN116095645A (zh) 2021-11-05 2021-11-05 一种通信方法和设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/654,605 Continuation US20240284519A1 (en) 2021-11-05 2024-05-03 Communication method and device

Publications (1)

Publication Number Publication Date
WO2023077917A1 true WO2023077917A1 (zh) 2023-05-11

Family

ID=86203050

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/113815 WO2023077917A1 (zh) 2021-11-05 2022-08-22 一种通信方法和设备

Country Status (4)

Country Link
US (1) US20240284519A1 (zh)
EP (1) EP4422228A1 (zh)
CN (1) CN116095645A (zh)
WO (1) WO2023077917A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4258164A4 (en) * 2020-12-31 2024-06-19 Huawei Technologies Co., Ltd. COMMUNICATION METHOD AND ASSOCIATED DEVICE

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117376893A (zh) * 2022-06-30 2024-01-09 华为技术有限公司 一种终端的接入方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200146070A1 (en) * 2018-11-01 2020-05-07 Samsung Electronics Co., Ltd. Random access method, terminal equipment and computer storage medium
WO2020182267A1 (en) * 2019-03-08 2020-09-17 Nokia Technologies Oy Informing network on ue capability
CN111867130A (zh) * 2019-04-30 2020-10-30 华为技术有限公司 一种随机接入方法、装置及存储介质
WO2021062688A1 (zh) * 2019-09-30 2021-04-08 华为技术有限公司 一种随机接入方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200146070A1 (en) * 2018-11-01 2020-05-07 Samsung Electronics Co., Ltd. Random access method, terminal equipment and computer storage medium
WO2020182267A1 (en) * 2019-03-08 2020-09-17 Nokia Technologies Oy Informing network on ue capability
CN111867130A (zh) * 2019-04-30 2020-10-30 华为技术有限公司 一种随机接入方法、装置及存储介质
WO2021062688A1 (zh) * 2019-09-30 2021-04-08 华为技术有限公司 一种随机接入方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4258164A4 (en) * 2020-12-31 2024-06-19 Huawei Technologies Co., Ltd. COMMUNICATION METHOD AND ASSOCIATED DEVICE

Also Published As

Publication number Publication date
US20240284519A1 (en) 2024-08-22
EP4422228A1 (en) 2024-08-28
CN116095645A (zh) 2023-05-09

Similar Documents

Publication Publication Date Title
WO2023077917A1 (zh) 一种通信方法和设备
US10375671B2 (en) Paging with enhanced beamforming
US11700660B2 (en) Method and device for providing vehicle communication service
US20190021120A1 (en) User equipment and base station
WO2022160265A1 (zh) 通信方法和通信装置
CN117204085A (zh) 一种信息传输方法、系统及装置
WO2023000209A1 (zh) 无线通信方法、终端设备和网络设备
WO2021114043A1 (zh) 设备到设备的通信方法和通信装置
US11711779B2 (en) Method and UE for triggering registration procedure within registration area of wireless communication network
CN110880963B (zh) 上行控制信息的传输方法及相关装置
KR20210149106A (ko) 무선 통신 네트워크에서 충돌을 처리하기 위한 방법 및 ue
JP7400363B2 (ja) 通信端末、基地局、及び通信方法
WO2023165456A1 (zh) 通信方法和通信装置
WO2024041309A1 (zh) 一种通信方法及装置
WO2023116429A1 (zh) 随机接入方法及装置
CN111147114A (zh) 波束训练的方法和装置
WO2023124985A1 (zh) 一种识别方法和装置
WO2024088147A1 (zh) 通信方法及装置
WO2024140533A1 (zh) 一种通信方法及装置
US20240354544A1 (en) Identification method and apparatus
WO2024021935A1 (zh) 一种通信方法及装置
WO2024017049A1 (zh) Bsc设备的识别方法、装置及通信设备
WO2024093740A1 (zh) 一种通信方法及装置
WO2023184283A1 (zh) 无线通信的方法及装置
WO2024082967A1 (zh) 通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22888950

Country of ref document: EP

Kind code of ref document: A1

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112024008768

Country of ref document: BR

WWE Wipo information: entry into national phase

Ref document number: 2022888950

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022888950

Country of ref document: EP

Effective date: 20240521

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 112024008768

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20240503