WO2024001782A1 - 一种通信方法及装置 - Google Patents
一种通信方法及装置 Download PDFInfo
- Publication number
- WO2024001782A1 WO2024001782A1 PCT/CN2023/100183 CN2023100183W WO2024001782A1 WO 2024001782 A1 WO2024001782 A1 WO 2024001782A1 CN 2023100183 W CN2023100183 W CN 2023100183W WO 2024001782 A1 WO2024001782 A1 WO 2024001782A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- uav
- message
- terminal device
- session
- service
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
Definitions
- the present application relates to the field of communication technology, and in particular, to a communication method and device.
- the unmanned/uncrewed aerial system includes an unmanned/uncrewed aerial vehicle (UAV) and a UAV remote controller (UAV controller, UAVC).
- UAV unmanned/uncrewed aerial vehicle
- UAV controller UAV controller
- UAVC UAV remote controller
- the remote control of the drone may be referred to as a remote control or remote control device, etc.
- the drone can fly autonomously or according to the control instructions of the remote controller. That is, communication can be carried out between the drone and the remote controller.
- the remote controller can send control instructions to the drone, so that the drone sends the captured photos or videos to the remote controller after taking aerial photography.
- UAV systems can be combined with mobile communication networks to make full use of the advantages of mobile communication networks, such as wide-area coverage, high reliability, and support for high-speed mobile services, and expand UAV systems to achieve beyond-line-of-sight (long-range) high-speed Reliable flight, thus enabling UAV systems to gain wider applications and markets. That is, the drone has two roles at the same time: one is a terminal in the mobile communication network, and the other is a drone that can fly in the drone system.
- mobile communication networks can not only provide UAVs with services enjoyed by ordinary terminals (such as multimedia communications, data services, etc.), but also provide UAVs with UAV-specific services (such as remote positioning, no-fly fence, etc.).
- drones face the following problems:
- DoS denial of service
- the drone sends a large amount of non-drone business data, maliciously occupying the drone's resources (such as network resources, computing resources, battery resources, etc.), affecting the normal operation of the drone, causing the drone to deviate from the route and fail to reach its intended destination. address, even causing problems such as the drone crashing. Therefore, how to reduce attackers’ use of non-drone services to attack drones is an issue that needs to be solved urgently.
- Embodiments of the present application provide a communication method and device to reduce attacks on drones by attackers using non-drone services and improve the security of drones.
- the present application provides a communication method, which may be executed by a first device or by a component (such as a chip) of the first device.
- the first device determines that the first condition is met, and the first condition includes one or more of the following conditions: the terminal device is authorized to operate the drone service, and the terminal device initiates the establishment of the first described A session corresponding to the drone service, or the terminal device is in a flight state; the first device restricts the non-drone business of the terminal device and/or restricts the first control plane process of the terminal device, wherein, The first control plane process is not a process exclusive to the UAV business.
- the first device conditionally restricts the non-drone services of the terminal device to reduce the number of attackers. Use non-UAV services to attack terminal equipment to improve the security of terminal equipment.
- the first device conditionally limits the first control plane process of the terminal device, releasing resources required to execute the first control plane process, thereby providing more usable resources for the UAV business.
- the terminal device is authorized to perform drone services, it means that the terminal device supports the simultaneous execution of drone services and non-drone services.
- the first device limits the non-drone services of the terminal device and can Reduce attackers' use of non-UAV services to attack terminal devices and prevent non-UAV services from invading UAV business resources.
- the terminal device is authorized for the drone service, the first device can restrict the first control plane process and release the resources required to execute the first control plane process, thereby reserving more authorized drones for the terminal device. Resources available for machine business.
- the terminal device initiates the establishment of a session corresponding to the first drone service, which means that the terminal device will perform the drone service.
- the first device restricts the non-drone business of the terminal device, which can reduce attacks.
- the attacker uses non-UAV services to attack the terminal equipment while the terminal equipment is performing UAV services, and prevents non-UAV services from encroaching on the UAV business while the terminal equipment is performing UAV services. resource.
- the terminal device initiates the establishment of a session corresponding to the first drone service, and the first device restricts the first control plane process, which can release the resources required to execute the first control plane process and increase the usability of the drone service.
- the first device when the terminal device is in flight, the first device restricts non-UAV services of the terminal device, which can reduce attacks by attackers using non-UAV services to attack the terminal device in flight, and avoid occupying the terminal equipment due to non-UAV services.
- the large amount of resources of the terminal equipment causes problems such as the terminal equipment deviating from the route and being unable to reach the expected destination address, etc., which improves the security of the terminal equipment.
- the first device restricts the first control plane process, which can reserve more resources that can be used by the UAV business for the terminal device in flight, thus preventing the terminal device in flight from causing a terminal failure due to insufficient resources. Problems such as equipment not working properly or even crashing.
- the first device limits the non-UAV services of the terminal device, which may be any one of the following:
- the first device is a first session management function device, and the first device releases all or part of the sessions corresponding to the non-UAV services managed by the first device, and/or prohibits the establishment or modification of all Describe the sessions corresponding to non-drone services.
- the first device is a short message service center, and the first device does not send or suspends sending the first message to the terminal device, and the first message is used to request the establishment or modification of the non-UAV.
- the first device is the terminal device, and the first device does not send or suspends sending a first message to the first session management function device, and the first message is used to request the establishment or modification of the non-unmanned device.
- the session corresponding to the machine service.
- the first device can release the session corresponding to the non-UAV service, prohibit the establishment or modification of the session corresponding to the non-UAV service, or not send a request for establishment to the terminal device or the session management function device. Or modifying the session messages corresponding to non-UAV services and other measures to limit the non-UAV services of terminal devices, and the implementation method is flexible.
- the method may further include: the first device receiving a second message from the terminal device, the second message being used to request Establishing a first session; and, based on the second message, the first device determines that the first session belongs to a session corresponding to the drone service.
- the first device can determine whether the received session establishment request message is used to establish a session corresponding to the drone service. For example, the first session For a session corresponding to the drone service, the first device restricts the drone service and/or restricts the first control plane process. For another example, the first session belongs to the session corresponding to the non-UAV service, which means that the first device has released the session corresponding to the non-UAV service and/or the terminal device has not established the first session corresponding to the UAV service.
- the resource Sufficient, in this case, the first device may not restrict non-UAV services and/or, thereby improving resource utilization while reducing the impact on UAV services.
- the method may further include: the first device sending a third message to the second device, the third message being used to request restriction of the non-UAV business of the terminal device. .
- the first device may send a third message to the second device, so that the second device limits the non-UAV services of the terminal device.
- the method may further include: the first device receiving first indication information from the second device, the first indication information being used to indicate releasing one or more of the non- Session corresponding to drone business.
- the first device may limit the non-UAV services of the terminal device by: the first device releases one or more sessions corresponding to the non-UAV services according to the first instruction information.
- the first device restricting the non-UAV services of the terminal device includes the first device releasing all or part of the non-UAV services managed by the first device.
- sessions corresponding to the service the method may further include: the first device determines that N is greater than M, where the N is the number of sessions corresponding to the non-UAV service managed by the first device, and the M is the number of sessions corresponding to the non-UAV services that the terminal device allows to establish at the first device when executing the UAV service; the first device determines to release H of the non-UAV services.
- the H is a positive integer greater than or equal to (N-M).
- the first device can release one or more sessions corresponding to non-UAV services according to the instruction information of the second device, or can also release one or more sessions corresponding to non-UAV services according to N and M.
- Flexible implementation
- the first device restricts the non-UAV business of the terminal device, which may be: the first device sends second instruction information to the terminal device, and the second instruction The information indicates that establishment of a session corresponding to the non-UAV service is prohibited.
- the first device instructs the terminal device to prohibit the establishment of sessions corresponding to non-UAV services. This prevents the terminal device from initiating sessions corresponding to non-UAV services, thereby limiting the non-UAV services of the terminal device. the goal of.
- the first control plane process includes one or more of a first authentication process, a de-registration process, a slice authentication process or a secondary authentication process.
- the first device restricts the first control plane process of the terminal device, which may be: the first device suspends or terminates the first control plane process.
- the first device can suspend or terminate the first control plane process.
- the first control plane process is not a proprietary process of the drone business, so the suspension or termination of the first control plane process will not be detrimental to the drone. execution of the business, and can release the resources required to execute the first control plane process, thereby providing more available resources for the drone business, which is beneficial to the execution of the drone business.
- the method further includes: the first device starts a first timer; the first device determines that the The terminal device satisfies the first condition during the running of the first timer; the first device terminates the first control plane process when the first timer ends.
- the first device can first suspend the first control plane process. If the terminal device meets the first condition during the timer running period, the first device can terminate the first control plane process. If the terminal device does not meet the first condition during the period, the first device can execute the first control plane process.
- the method may further include: the first device receiving a fourth message from a third device, the fourth message being used to request execution of the first control plane process; A device sends a fifth message to the third device, where the fifth message includes the reason for not performing the first control process.
- the first device when the first device suspends or terminates the first control plane process, the first device can feed back to the third device the reason why the first control plane process is not executed.
- the reason for not executing the first control plane process may be, for example, that the terminal device satisfies the first condition.
- the first device determines that the terminal device is in a flight state, which may be: the first device receives third indication information from the access and mobility management function device, and the third indication The information indicates that the terminal device is in a flight state.
- the first device sends a sixth message to the access and mobility management function network element, where the sixth message is used to obtain the status of the terminal device, and the status of the terminal device includes Flight status or/and non-flight status.
- the first device can obtain the status of the terminal device from the access and mobility management function device.
- the status of the terminal device may be actively pushed by the access and mobility management functional device, or may be obtained by the first device by subscribing to the status of the terminal device from the access and mobility management functional device.
- the implementation method is flexible.
- the first device is an access and mobility management function device; the first device determines that the terminal device is in a flight state, specifically: the first device receives a message from a fourth device.
- the fourth indication information is used to indicate that the terminal device is in a flight state; or, the first device determines according to the movement information of the terminal device and/or the flight information of the terminal device.
- the terminal device is in flight state.
- the access and mobility management function device can obtain from the fourth device that the terminal device is in the flight state, and can also determine that the terminal device is in the flight state based on the movement information and/or flight information of the terminal device.
- the implementation method is flexible.
- the first device is the terminal device; the first device determines that the terminal device is in a flight state, which may be: the first device determines that the terminal device is in a flight state based on movement information and/or information from the application layer.
- the fifth indication information determines that the terminal device is in a flight state, wherein the fifth indication information instructs the terminal device to enter the flight mode.
- the terminal device can determine whether it is in a flight state.
- the method may further include: the first device determining that a second condition is met, wherein the second condition includes one or more of the following conditions: the terminal device is revoked Authorization of the drone service, the terminal device is not authorized to the drone service, the drone service of the terminal device is de-registered, or the terminal device releases the last drone The session corresponding to the machine service;
- the first device is a first session management function device, the first device receives the seventh message from the terminal device, and establishes or modifies the session corresponding to the non-UAV service according to the seventh message, Wherein, the seventh message is used to request the establishment or modification of a session corresponding to the non-UAV service;
- the first device is a short message service center, and the first device sends an eighth message to the terminal device, where the eighth message is used to request the establishment or modification of a session corresponding to the non-UAV service. ;
- the first device is the terminal device, and the first device sends an eighth message to the first session management function device, where the eighth message is used to request the establishment or modification of the non-UAV service corresponding to the session.
- the first device when the first device determines that the second condition is met, the first device cancels the configuration of the terminal.
- the restrictions on non-UAV services of the equipment enable the first device to perform non-UAV services and improve compatibility.
- the method may further include: the first device determining that a second condition is met, wherein the second condition includes one or more of the following conditions: the terminal device is revoked Authorization of the drone service, the terminal device is not authorized to the drone service, the drone service of the terminal device is de-registered, or the terminal device releases the last drone session corresponding to the machine service; the first device receives a fourth message from the third device, the fourth message is used to request execution of the first control plane process; the first device executes the first control plane process process.
- the first device when the first device determines that the second condition is met, the first device cancels the restriction on the first control plane process, so that the first device can execute the first control plane process, which can improve compatibility.
- the present application provides a communication method, which can be executed by a second device or by a component (such as a chip) of the second device.
- the second device receives a message from the first session management function device requesting to limit the non-drone services of the terminal device; the second device determines the second session management function based on the message
- the device manages a session corresponding to the non-UAV service of the terminal device; the second device sends indication information to the second session management function device, wherein the indication information is used to instruct release of the second session
- the management function device manages all or part of the sessions corresponding to the non-UAV services, and/or instructs that establishment or modification of the sessions corresponding to the non-UAV services is prohibited.
- the second device responds to a message restricting the non-UAV service of the terminal device, determines the session management function device that manages the session corresponding to the non-UAV service of the terminal device, and provides the session management function to the session management device.
- the functional device sends instruction information to instruct the session management functional device to restrict the non-UAV business of the terminal device, thereby reducing attackers' use of non-UAV services to attack UAVs and preventing non-UAV services from encroaching on UAVs. Machine business resources.
- the method may further include: the second device sending first indication information to the first session management function device, the first indication information being used to indicate releasing one or more non- Session corresponding to drone business.
- the method may further include: the second device receiving N from the first session management function device, where the N is managed by the first session management function device.
- the number of sessions corresponding to the non-UAV service ; the second device determines the first value based on the number of sessions corresponding to the non-UAV service established by the terminal device, the N and M
- the session management function device needs to release one or more sessions corresponding to the non-UAV service, where M is the number of sessions allowed by the terminal device when executing the UAV service.
- the second device can maintain the number of sessions corresponding to the non-drone services that have been established by the terminal device, and determine each session in one or more session management function devices corresponding to the terminal device in combination with N and M. The number of sessions corresponding to non-UAV services that need to be released by the management function device.
- the present application provides a communication device.
- the communication device is configured to perform the method described in the above first aspect and any possible implementation manner of the first aspect.
- the communication device is, for example, a first device, or a functional module in the first device, such as a baseband device or a chip system.
- the communication device includes a baseband device and a radio frequency device.
- the communication device includes a processing unit (sometimes also called a processing module) and a transceiver unit (sometimes also called a transceiver module).
- the transceiver unit can realize the sending function and the receiving function.
- a sending unit sometimes also called a sending module
- a receiving unit sometimes also called a sending module
- receiving module The sending unit and the receiving unit can be the same functional unit, which is called the sending and receiving unit. This functional unit can realize the sending function and the receiving function; or, the sending unit and the receiving unit can be different functional units, and the sending and receiving unit is a general term for these functional units.
- the present application provides a communication device.
- the communication device is configured to perform the method described in the above second aspect and any possible implementation manner of the second aspect.
- the communication device is, for example, a second device, or a functional module in the second device, such as a baseband device or a chip system.
- the communication device includes a baseband device and a radio frequency device.
- the communication device includes a processing unit (sometimes also called a processing module) and a transceiver unit (sometimes also called a transceiver module).
- the transceiver unit can realize the sending function and the receiving function.
- a sending unit sometimes also called a sending module
- a receiving unit sometimes also called a sending module
- receiving module sometimes also called a sending module
- the sending unit and the receiving unit can be the same functional unit, which is called the sending and receiving unit, and the functional unit can realize the sending function and the receiving function; or the sending unit and the receiving unit can be different functional units, and the sending and receiving unit is responsible for these functions.
- the present application provides a communication device.
- the communications device may include one or more processors.
- the communication device may also include a memory.
- the memory is used to store one or more computer programs or instructions.
- the one or more processors are configured to execute the one or more computer programs or instructions stored in the memory, so that the communication device executes the first aspect and any of the possible implementations of the first aspect. method described.
- the present application provides a communication device.
- the communications device may include one or more processors.
- the communication device may also include a memory.
- the memory is used to store one or more computer programs or instructions.
- the one or more processors are configured to execute the one or more computer programs or instructions stored in the memory, so that the communication device executes the second aspect and any of the possible implementations of the second aspect. method described.
- the present application provides a communication system.
- the communication system includes the communication device described in the fifth aspect, and/or the communication device described in the sixth aspect.
- the present application provides a computer-readable storage medium, which is used to store computer programs or instructions that, when executed, make any one of the above-mentioned aspects possible.
- the method described in the implementation manner is implemented, or the method described in the above second aspect and any possible implementation manner of the second aspect is implemented.
- the present application provides a computer program product containing instructions, which, when run on a computer, enables the method described in the above first aspect and any possible implementation of the first aspect to be implemented, or causes The method described in the above second aspect and any possible implementation manner of the second aspect is implemented.
- the present application also provides a chip, which is coupled to a memory and used to read and execute program instructions in the memory, so that the device where the chip is located implements the above first aspect and any of the first aspects.
- a chip which is coupled to a memory and used to read and execute program instructions in the memory, so that the device where the chip is located implements the above first aspect and any of the first aspects.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- Figure 1 is a schematic diagram of the network architecture
- Figure 2 is another schematic diagram of the network architecture
- Figure 3 is a schematic diagram of drone business and non-drone business
- Figure 4 is a schematic flow chart of a communication method provided by an embodiment of the present application.
- Figure 5 is another schematic flow diagram of a communication method provided by an embodiment of the present application.
- Figure 6 is another schematic flowchart of a communication method provided by an embodiment of the present application.
- Figure 7 is another schematic flow diagram of a communication method provided by an embodiment of the present application.
- Figure 8 is another schematic flow diagram of a communication method provided by an embodiment of the present application.
- Figure 9 is another schematic flow diagram of a communication method provided by an embodiment of the present application.
- Figure 10 is a schematic flowchart of yet another communication method provided by an embodiment of the present application.
- FIG 11 is a schematic flowchart of yet another communication method provided by an embodiment of the present application.
- Figure 12 is a schematic flowchart of yet another communication method provided by an embodiment of the present application.
- Figure 13 is a schematic flowchart of yet another communication method provided by an embodiment of the present application.
- Figure 14 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- Figure 15 is another structural schematic diagram of a communication device provided by an embodiment of the present application.
- Terminal equipment also known as user equipment (UE), access terminal, terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile equipment, user terminal, user Agent or user device, etc.
- the terminal device may be, for example, a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a smart phone, a mobile phone, a wireless local loop (WLL) ) website, personal digital assistant (PDA), etc.
- SIP session initiation protocol
- WLL wireless local loop
- PDA personal digital assistant
- the terminal device can also be a handheld device with wireless communication capabilities, a computing device or other device connected to a wireless modem, a vehicle-mounted device, a wearable device, a drone or the Internet of Things, a terminal in the Internet of Vehicles, a 5G network and in the future Any form of terminal in the network, relay user equipment or terminals in the future evolved 6G network, etc.
- the embodiments of the present application do not limit the type or type of terminal equipment.
- the functions of the terminal device may be implemented by hardware components inside the terminal device, and the hardware components may be processors and/or programmable chips inside the terminal device.
- the chip can be implemented by an application-specific integrated circuit (ASIC) or a programmable logic device (PLD).
- ASIC application-specific integrated circuit
- PLD programmable logic device
- the above-mentioned PLD can be a complex programmable logical device (CPLD), a field-programmable gate array (FPGA), a general array logic (GAL), a system on a chip (system on a chip) , SOC) or any combination thereof.
- CPLD complex programmable logical device
- FPGA field-programmable gate array
- GAL general array logic
- SOC system on a chip
- the following introduction takes the terminal device as a drone as an example.
- Drone business refers to the business or services exclusively for drones enjoyed by drones.
- the UAV service may be a communication service provided by the network for UAVs on the control plane and/or the user plane. or services.
- the drone business can be a drone-specific or control plane process specifically used for drones (such as drone certification, authorization, or flight route authorization, etc.), command and control (C2) Communication, remote identification of drones, remote positioning, no-fly fences, or flight map download services, etc.
- C2 command and control
- the types of drone services in the embodiments of the present application are not limited to this.
- Non-drone services refer to services other than drone services, which can be understood as services enjoyed by ordinary terminal equipment.
- the non-UAV service may be, for example, a multimedia communication service, a data service or an Internet service, etc., but the embodiment of the present application is not limited to this type of non-UAV service.
- the network cannot identify the type of drone (for example, when identifying the drone as an ordinary terminal) or when there is no drone business authorized for the drone, the drone can be regarded as an ordinary terminal device.
- the services provided by the network to the drone are non-drone services.
- “plurality” means two or more.
- “plurality” in the embodiments of this application can also be understood as “at least two”.
- “At least one” can be understood as one or more, for example, one, two or more.
- including at least one means including one, two or more, and it does not limit which ones are included.
- it includes at least one of A, B and C, then it can include A, B, C, A and B, A and C, B and C, or A and B and C.
- “And/or” describes the relationship between related objects, indicating that there can be three relationships.
- a and/or B can mean: A exists alone, A and B exist simultaneously, and B exists alone.
- the character "/" unless otherwise specified, generally indicates that the related objects are in an "or” relationship.
- the terms “system” and “network” in the embodiments of this application may be used interchangeably.
- ordinal numbers such as “first" and "second” mentioned in the embodiments of this application are used to distinguish multiple objects and are not used to limit the order, timing, priority or importance of multiple objects.
- first device, the second device, the third device and the fourth device involved in the embodiments of the present application are used to distinguish multiple devices and do not limit the priority or importance of the multiple devices.
- first message, second message, third message, fourth message, etc. involved in the embodiment of the present application are used to distinguish multiple messages and do not limit the order, timing, priority or importance of the multiple messages. degree.
- the word "exemplary” is used to mean an example, illustration or explanation. Any embodiment or design described herein as “exemplary” is not intended to be construed as preferred or advantageous over other embodiments or designs. Rather, the use of the word “exemplary” is intended to present the concept in a concrete manner.
- PLMN public land mobile network
- MNO mobile network operators
- 3GPP 3rd generation partnership project
- 3GPP networks usually include but are not limited to fifth-generation mobile communications (5th-generation, 5G) networks (referred to as 5G networks), fourth-generation mobile communications (4th-generation, 4G) networks (referred to as 4G networks), and other future communication systems Such as 6G network, etc.
- 5G networks fifth-generation mobile communications
- 4th-generation, 4G networks fourth-generation mobile communications
- 6G networks 6th-generation networks
- 6G networks 6th-generation network
- Figure 1 is a schematic diagram of a network architecture according to an embodiment of the present application. It takes the 5G network architecture based on service-based architecture in the non-roaming scenario defined in the 3GPP standardization process as an example.
- the network architecture can include three parts, namely the terminal equipment part, the data network (DN) part and the PLMN part.
- the terminal device part may include the terminal device 110, which can establish a connection with the operator network through an interface (such as N1, etc.) provided by the operator network, and use data and/or voice services provided by the operator network.
- the terminal device 110 can also access the data network 120 through the operator network, and use the operator services deployed on the data network 120, and/or services provided by third parties.
- the above-mentioned third party may be a service provider other than the operator's network and the terminal device 110, and may provide other data and/or voice services for the terminal device 110.
- the specific manifestations of the above-mentioned third parties can be determined according to the actual application scenarios and are not limited here.
- For an introduction to the terminal device 110 please refer to the introduction of the terminal device in the foregoing explanation of terminology section, and will not be described again here.
- the data network 120 which may also be called a packet data network (PDN), is usually a network located outside the operator's network, such as a third-party network.
- the operator's network can access multiple data networks 120, and a variety of services can be deployed on the data networks 120 to provide data and/or voice services to the terminal device 110.
- the data network 120 can be a private network of a smart factory.
- the sensors installed in the workshop of the smart factory can be the terminal devices 110.
- the data network 120 is deployed with a control server of the sensor, and the control server can provide services for the sensor.
- the sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
- the data network 120 may be an internal office network of a certain company, and the mobile phones or computers of the company's employees may be the terminal devices 110. The employees' mobile phones or computers may access information, data resources, etc. on the company's internal office network.
- PLMN can include but is not limited to: network exposure function (NEF)131, network function repository function (NRF)132, policy control function (PCF)133, unified data management (unified data management (UDM) 134. Unmanned/uncrewed aerial system (UAS) 135. Authentication server function (AUSF) 136. Access and mobility management function (AMF) 137. Session management function (SMF) 138. User plane function (UPF) 139. (Radio) access network ((R)AN) 140. Application function function, AF) 141, network slice authentication and authorization function (network slice specific authentication and authorization function, NSSAAF) 142, etc.
- the part other than the (wireless) access network 140 part may be called the core network (core network, CN) part.
- AN 140 also called wireless (Radio) AN
- the terminal device 110 To access the operator's network, the terminal device 110 first passes through the (R)AN 140, and then can connect to the service node of the operator's network through the (R)AN 140.
- the access network device (RAN device) in the embodiment of this application is a device that provides wireless communication functions for the terminal device 110, and may also be called a network.
- Equipment, RAN equipment includes but is not limited to: next generation node base station (gNB) in the 5G system, evolved node B (evolved node B, eNB) in the long term evolution (long term evolution, LTE), Radio network controller (RNC), Node B (NB), Base Station Controller (BSC), Base Transceiver Station (BTS), Home Base Station (e.g., home evolved nodeB, or home node B, HNB), base band unit (BBU), transmission point (transmitting and receiving point, TRP), transmitting point (transmitting point, TP), small base station equipment (pico), mobile switching center , or network equipment in future networks, etc.
- gNB next generation node base station
- eNB evolved node B
- eNB long term evolution
- RNC Radio network controller
- NB Node B
- BSC Base Station Controller
- BTS Base Transceiver Station
- HNB home evolved nodeB
- BBU base band unit
- TRP transmitting and receiving point
- TP
- access network equipment For convenience of description, in all embodiments of this application, the above-mentioned devices that provide wireless communication functions for the terminal equipment 110 are collectively called access network equipment or simply RAN or AN. It should be understood that this article does not limit the specific type of access network equipment.
- the network opening function 131 is a control plane function provided by the operator to enable third parties to use services provided by the network.
- the network opening function 131 can be NEF, as shown in Figure 1; in future communication systems, such as the 6G communication system, the network opening function 131 can still be NEF, or may have other names.
- the application examples are not limiting.
- the network storage function 132 is a control plane function provided by the operator and can be used to maintain real-time information of all network function services in the network.
- the network storage function 132 may be an NRF, as shown in Figure 1; in a future communication system, such as a 6G communication system, the network storage function 132 may still be an NRF, or may have other names.
- the application examples are not limiting.
- the policy control function 133 is a control plane function provided by the operator. It supports a unified policy framework to govern network behavior, and provides policy rules and contract information related to policy decisions to other control functions.
- the policy control function 133 may be a PCF, as shown in Figure 1; in a future communication system, such as a 6G communication system, the policy control function 133 may still be a PCF, or may have other names.
- the application examples are not limiting.
- Unified data management 134 is a control plane function provided by the operator. It is responsible for storing the user permanent identifier (subscriber permanent identifier, SUPI) and the publicly used subscription identifier (generic public subscription identifier) of the subscribed users in the operator's network. GPSI), credential and other information. SUPI is first encrypted during transmission, and the encrypted SUPI is called a hidden user subscription identifier (SUCI). The information stored in the unified data management 134 can be used for authentication and authorization of the terminal device 110 to access the operator's network.
- the contract users of the above-mentioned operator network can specifically be users who use services provided by the operator network, such as users who use China Telecom's mobile phone chip cards, or users who use China Mobile's mobile phone chip cards, etc.
- the trust certificate of the above-mentioned contract user can be a long-term key stored in the mobile phone chip card or a small file stored in information related to the encryption of the mobile phone chip card, which can be used for authentication and/or authorization.
- permanent identifiers, credentials, security contexts, authentication data (cookies), and information related to token verification/authentication and authorization are not distinguished or limited for the convenience of description. .
- the unified data management 134 can be UDM, as shown in Figure 1; in future communication systems, such as the 6G communication system, the unified data management 134 can still be UDM, or may have other names.
- the application examples are not limiting.
- UAV system function 135 is a control plane function provided by the operator to serve the UAV system. It is responsible for opening the network's UAV business capabilities to external networks. For example, it can open UAV authentication/authorization services, UAV flight authorization service, pairing authorization of UAV and remote controller, UAV re-authentication/authorization/revocation, UAV location information report, UAV quality of service (QoS) control, As well as traffic filtering for command and control (C2) communications, etc.
- UAV authentication/authorization services UAV flight authorization service
- pairing authorization of UAV and remote controller For example, it can open UAV authentication/authorization services, UAV flight authorization service, pairing authorization of UAV and remote controller, UAV re-authentication/authorization/revocation, UAV location information report, UAV quality of service (QoS) control, As well as traffic filtering for command and control (C2) communications, etc.
- QoS quality of service
- C2 traffic filtering for command and control
- Unmanned aerial vehicle system functions 135 may be generated by network open functions 131 An instance (instance), or a sub-function of the common network opening function 131, or it can be an independent function specifically used to provide UAV services, so it is usually marked as UAS NF/NEF, but the embodiment of this application does not It is not limited to this.
- the authentication server function 136 is a control plane function provided by the operator, and is usually used for first-level authentication, that is, network authentication between the terminal device 110 (subscriber) and the PLMN. After receiving the authentication request initiated by the contracted user, the authentication server function 136 can authenticate and/or authorize the contracted user through the authentication information and/or authorization information stored in the unified data management 134, or generate the contracted user's profile through the unified data management 134. Authentication and/or authorization information. The authentication server function 136 may feed back authentication information and/or authorization information to the subscriber.
- the authentication server function 136 may be AUSF, as shown in Figure 1; in future communication systems, such as a 6G communication system, the authentication server function 136 may still be AUSF, or may have other names.
- the application examples are not limiting.
- the access and mobility management function 137 is a control plane network function provided by the PLMN. It is responsible for the access control and mobility management of the terminal device 110 accessing the PLMN, including, for example, mobility status management, allocation of user temporary identities, authentication and authorization. User functions.
- the access and mobility management function 137 can be an AMF, as shown in Figure 1; in a future communication system, such as a 6G communication system, the access and mobility management function 137 can still be an AMF. Or it may have other names, which are not limited by the embodiments of this application.
- the session management function 138 is a control plane network function provided by the PLMN and is responsible for managing the protocol data unit (PDU) of the terminal device 110.
- PDU session is a channel used to transmit PDU. Terminal devices need to transmit data to and from DN 120 through PDU session.
- PDU sessions may be established, maintained, deleted, etc., by the session management function 138.
- Session management function 138 includes session management (such as session establishment, modification and release, including tunnel maintenance between user plane function 139 and AN 140, etc.), selection and control of user plane function 139, service and session continuity (service and session continuity, SSC) mode selection, roaming and other session-related functions.
- the session management function 138 may be SMF, as shown in Figure 1; in future communication systems, such as a 6G communication system, the session management function 138 may still be an SMF, or may have other names.
- SMF Session Management Function
- future communication systems such as a 6G communication system
- the session management function 138 may still be an SMF, or may have other names.
- the application examples are not limiting.
- the user plane function 139 is a gateway provided by the PLMN to communicate with the data network DN 120.
- User plane functions 139 include data packet routing and transmission, data packet detection, business usage reporting, quality of service (QoS) processing, legal interception, uplink data packet detection, downlink data packet storage and other user plane related functions.
- QoS quality of service
- the user plane function 139 can be UPF, as shown in Figure 1; in future communication systems, such as the 6G communication system, the user plane function 139 can still be UPF, or may have other names.
- the application examples are not limiting.
- Application function 141 is a control plane function that can be deployed by the operator or an external third party.
- the application function 141 supports services such as traffic routing control, policy control function 133 interaction, and access network function opening by interacting with other network functions of the core network.
- the application function 141 may be AF, as shown in Figure 1; in future communication systems, such as a 6G communication system, the application function 141 may still be AF, or may have other names.
- This application implements Examples are not limited.
- the network slice authentication and authorization function 142 is a control plane network function provided by the PLMN and is used to support slice authentication between the terminal device 110 and the data network 120 .
- the network slice authentication and authorization function 142 can be NSSAAF, as shown in Figure 1; in future communication systems, such as the 6G communication system, the network slice authentication and authorization function NSSAAF can still be SMF, or there may be other
- NSSAAF NSSAAF
- SMF SMF
- each network function in PLMN can be either a network element implemented on dedicated hardware, a software instance running on dedicated hardware, or an instance of a virtualized function on an appropriate platform, for example, the above-mentioned virtualization
- the platform can be a cloud platform.
- each network function in the PLMN can also be called a network element, functional entity or device.
- the access and mobility management function can also be called the access and mobility management function network element, access and mobility management Functional entities or access and mobility management functional equipment, etc.
- the session management function can also be called session management functional network elements, session management functional entities or session management functional equipment, etc., which will not be listed here.
- the network functions in the PLMN shown in Figure 1 may also include other network functions.
- the PLMN also includes unified data repository (UDR), etc. (not shown in Figure 1).
- the PLMN includes Other network functions are not limited.
- the names of the network functions shown in Figure 1 are only used as examples here, and are not used as a limitation on the network functions included in the network architecture to which the methods of the embodiments of the present application are applicable.
- the names of devices that implement network functions in systems with different access technologies may be different, and the embodiments of this application do not limit this.
- Nnef, Nnrf, Npcf, Nudm, Nausf, Namf, Nsmf, Nnssaaf, Naf, N1, N2, N3, N4, and N6 are interface serial numbers.
- the meaning of the above interface serial number may refer to the meaning defined in the 3GPP standard protocol. This application does not limit the meaning of the above interface serial number.
- the interface names between various network functions in Figure 1 are only examples. In specific implementations, the interface names of the system architecture may also be other names, and this application does not limit this.
- the network architecture shown in Figure 1 does not constitute a limitation of the communication systems to which the embodiments of the present application can be applied.
- the network architecture shown in Figure 1 is a 5G system architecture.
- the technical solution provided by the embodiment of the present application can be applied not only to the 5G system, but also to the fourth generation mobile communication technology (the 4th generation, 4G) system. , such as LTE systems, or may also be applied to next-generation mobile communication systems or other similar communication systems, without specific limitations.
- Figure 2 provides a schematic diagram of the combination of 5G mobile network and UAV system.
- the network entity of UAS service suppliers (USS) 121 is added in Figure 2. It usually does not belong to the operator network, but is deployed in the third-party data network 120, but this application The embodiment is not limited to this.
- the UAS service 121 communicates with the UAS function 135 of the 3GPP network via the N33 interface.
- the UAV system service 121 can store UAS-related information, such as UAS authentication information. Based on this information, the UAV system service 121 can perform identity authentication, flight authorization, etc. on the UAS.
- the UAS regulatory department can also supervise the operation of UAS through UAS system service 121 to ensure the safety of UAS flight control and public safety.
- the UAV system service 121 can also establish channels with other regulatory or safety flight departments to obtain flight-related information.
- the UAV system service 121 can not only communicate with the UAV/remote controller through the operator's network, but also have the function of remote control of the UAV flight, which is not limited here.
- the UAS service 121 may also represent an UAS traffic management entity (UAS traffic management, UTM) or an entity that integrates USS and UTM, which is not limited by this application.
- the UAV can play two roles at the same time: one is a terminal in the operator network (ie PLMN, or mobile communication network), and the other is A drone that can be flown in UAS.
- the operator network can not only provide UAVs with the services enjoyed by ordinary terminals (such as multimedia communications, data services, Internet, etc.), but also provide UAVs with UAV-specific services.
- Some services include drone type certification and authorization (including drone-specific certification, authorization, flight route authorization, etc.), C2 communications, remote identification of drones, remote positioning, no-fly fences, flight map downloads, etc.
- services exclusive to drones are called drone services, and services that are not exclusive to drones are called non-drone services.
- non-drone services are examples, please refer to the aforementioned terminology explanation section and will not be repeated here.
- drones can play two roles at the same time, they are vulnerable to potential security risks of denial of service (DoS) attacks.
- DoS denial of service
- the attacker can use the drone's non-drone business to send a large amount of videos, Internet data, etc. unrelated to the drone business, to maliciously consume the drone's resources ( Network resources, computing resources, battery resources, etc.), occupying the resources required by the drone to perform drone services, thereby affecting the normal operation of the drone (such as delaying the drone's response to C2 communication instructions, rapid battery depletion, etc.), Safety accidents causing the drone to deviate from its course, fail to arrive as expected, or even crash.
- Network resources, computing resources, battery resources, etc. occupying the resources required by the drone to perform drone services, thereby affecting the normal operation of the drone (such as delaying the drone's response to C2 communication instructions, rapid battery depletion, etc.)
- Figure 3 shows a schematic diagram of the relationship between PDU session and DN.
- DN 1 is a DN specifically used for drone services and only supports sessions for drone services (PDU session 1).
- DN 2 is a DN used for drone services and non-drone services. It supports both PDU sessions for drone services (PDU session 2) and PDU sessions for non-drone services (PDU session 3).
- DN 3 is a DN exclusively used for non-UAV services and only supports PDU sessions for non-UAV services (PDU Session 4).
- embodiments of the present application provide a communication method and device.
- the first device determines that the conditions are met, the non-UAV business of the terminal device is restricted and/or the first control plane process of the terminal device is restricted.
- the first control plane process is not a process exclusive to the UAV service.
- the first condition includes that the terminal device is authorized for the UAV service, the terminal device initiates the establishment of a session corresponding to the first UAV service, or the terminal device is in At least one of the flight status.
- the first device's conditional restriction of non-drone services of the terminal device can reduce attackers' use of non-drone services to attack the terminal device and prevent non-drone services from occupying the resources of the drone service.
- the first device conditionally limits the first control plane process, releasing the resources required to execute the first control plane process, thereby reserving more usable resources for the UAV business, thereby preventing the terminal device from Insufficient resources cause terminal equipment to fail to work properly or even crash.
- the embodiment of the present application takes the drone service and non-drone business of the terminal device as an example, and prevents the non-drone business from encroaching on the drone service by restricting the non-drone business and/or the first control plane process. resources for the human-machine business, and reserve more available resources for the drone business. It should be understood that the replacement of the UAV service with the first type of service of the terminal device and the replacement of the non-UAV service with the second type of service of the terminal device are also applicable to the embodiments of the present application. That is, the embodiment of the present application is not limited to the first type of business being drone business and the second type of business being non-drone business.
- the first type of business is a business with high reliability and low latency requirements
- the second type of business is a business with non-high reliability and non-low latency requirements.
- the first type of service is a high-priority service
- the second type of service is a low-priority service.
- the first device may be a session management function device, a short message service-service center (SMS-SC), a terminal device, or a security anchor function (SEAF) device.
- SMS-SC short message service-service center
- SEAF security anchor function
- equipment access and mobility management function equipment, unified data management equipment, authentication server function equipment, authentication credential repository and processing function (ARPF) equipment; or other devices that include the functions of one of the aforementioned devices device; or a component (such as a chip or functional module) in one of the aforementioned devices.
- ARPF authentication credential repository and processing function
- the specific implementation form of the first device in the embodiments of the present application is not limited to this.
- the second device may be a unified data management device, a unified data storage device, or a policy control function device; or other devices that include the functions of one of the aforementioned devices; or a component (such as a chip or functional module) within one of the aforementioned devices,
- the specific implementation form of the second device in the embodiment of the present application is not limited thereto.
- the third device can be a security anchoring function device, an access and mobility management function device, a unified data management device, a network slicing authentication and authorization function device, an authentication, authorization and accounting server (authentication authorization and accounting-server, AAA-S) ), a data network; or other equipment that has the function of one of the foregoing devices; or a component (such as a chip or functional module) within one of the foregoing devices.
- the specific implementation form of the third device in the embodiment of the present application is not limited to this.
- the fourth device may be a terminal device, an access network device, an unmanned aerial vehicle system service, or an unmanned aerial vehicle system functional device; or other equipment that has the function of one of the foregoing devices; or a component (such as a chip) within one of the foregoing devices. or functional module), the specific implementation form of the fourth device in the embodiment of the present application is not limited to this.
- the session management function device is replaced by SMF
- the short message service center is replaced by SMS-SC
- the terminal device is replaced by UE
- the security anchoring function device is replaced by SEAF.
- replace the access and mobility management functional equipment with AMF replace the unified data management equipment with UDM
- replace the authentication server functional equipment with AUSF replace the authentication credential storage and processing functional equipment with ARPF
- replace the policy control function device with PCF replace the network slice authentication and authorization function device with NSSAAF
- replace the authentication, authorization and accounting server with AAA-S replace the data network with DN
- replace the access network Replace equipment with RAN UAS services with USS, UAS functional equipment with UAS NF/NEF or UAS NF, and application functional equipment with AF.
- the embodiment of the present application can support multiple session management function devices to manage the session of the UE at the same time.
- the embodiment of this application takes as an example that the first session management function device and the second session management function device can manage the session of the UE at the same time.
- the first session management function device is replaced by SMF 1
- the second session management function device is replaced by SMF 2.
- the session involved in the embodiment of the present application may be a PDU session or other sessions.
- the embodiment of the present application does not limit the specific implementation form of the session.
- Figure 4 is a schematic flow chart of a communication method provided by an embodiment of the present application. As shown in Figure 4, the method may include the following content.
- S401 The first device determines that the first condition is met.
- the first condition includes one or more of the following conditions: the UE is authorized for the drone service, the UE initiates the establishment of a session corresponding to the first drone service, or the UE is in a flight state.
- the first device may determine that the UE is authorized for the drone service.
- the drone service authorized by the UE can be understood as one or more of the registration authorization of the UE as a drone, the session authorization corresponding to the drone business, the pairing authorization or the flight authorization, but the embodiment of the present application is not limited to this.
- the registration authorization of the UE as a drone can be understood as the UE obtaining authorization from the USS during the registration process as a drone.
- the session authorization corresponding to the drone service can be understood as that the UE has obtained authorization from the USS during its session establishment or modification process as a drone.
- Pairing authorization can be understood as the pairing relationship between the USS and the UE and the corresponding remote control.
- Authorization is performed to allow the UE and the remote controller in a pairing relationship to communicate, for example, C2 information is transmitted between the UE and the remote controller. It should be understood that pairing authorization can be performed in the session establishment or modification process, or in other processes, and is not limited by this application.
- Flight authorization refers to the USS authorizing flight-related information such as the UE's flight route, flight plan, etc. The flight authorization can be performed during the session establishment or modification process, or in other processes, and is not limited by this application.
- the USS can notify the network of the authorization result indicating that the UE is authorized to the drone service, so the device in the network, such as the first device, can obtain the above authorization result.
- the AMF initiates the authentication and authorization between the drone and the USS to the USS (via UAS NF) process.
- the USS completes the authentication and authorization of the UE (that is, it completes the registration and authorization of the drone), and can send the authorization result indicating that the UE has been successfully registered and authorized as a drone to the UAS NF and/or AMF in the network.
- the AMF or UAS NF can send the authorization result to the SMF. Therefore, the first device in the network (such as SMF, or AMF, etc.) can determine that the UE has obtained registration authorization from the USS based on the authorization result, and store the authorization result.
- the SMF initiates to the USS (via UAS NF) the communication between the drone and the USS. Session authorization process for drone business.
- the USS completes the session authorization for the UE and can send the authorization result to the UAS NF and/or SMF.
- the SMF or UAS NF may send an authorization result indicating that the session corresponding to the UAV service is authorized to the AMF. Therefore, the first device (such as SMF, or AMF, etc.) can determine that the UE has obtained the drone session authorization of the USS based on the authorization result, and store the authorization result.
- the SMF initiates to the USS (via UAS NF) the drone business between the drone and the USS. Session authorization process.
- the USS determines whether to authorize the UE to pair with the corresponding remote control based on the pairing information in the message sent by the SMF or the pairing information stored by the USS, and sends the pairing authorization result to the UAS NF and/or SMF.
- the SMF or UAS NF can send the results of the pairing authorization to the AMF. Therefore, the first device (such as SMF, or AMF, etc.) can determine that the UE has obtained the USS pairing authorization for the UE and its corresponding remote controller based on the result of the pairing authorization, and store the result of the pairing authorization.
- the SMF initiates to the USS (via UAS NF) the drone business between the drone and the USS. Session authorization process.
- the USS determines whether to authorize the UE's flight route (and/or flight plan) based on the UE's flight route information (and/or flight plan and other information), and sends the flight authorization result to the UAS NF and/or SMF.
- the flight route and/or flight plan information may be information from the UE, or may be information stored in the USS, which is not limited in the embodiments of this application.
- the SMF or UAS NF can send the results of the flight authorization to the AMF. Therefore, the first device (such as SMF, or AMF, etc.) can determine that the UE has obtained flight authorization for the UAV from the USS based on the result of the flight authorization, and store the result of the flight authorization.
- the authorization process involved above may be a process initiated by the network side (such as AMF, or SMF, etc.); or it may also be a process initiated by the USS, which is not limited in this application.
- the above-mentioned pairing authorization and flight authorization are performed during the session establishment or modification process as an example, but the embodiments of the present application are not limited thereto.
- the pairing authorization and flight authorization can also be performed during the registration process.
- the above description serves as an example to illustrate the specific implementation process of the first device determining that the UE is authorized to have drone services.
- the embodiment of the present application is not applicable to the first device to determine that the UE is authorized to have drone services.
- the specific methods and procedures for authorized drone business are not limited to Set on this.
- the first device may determine that the UE initiates the establishment of a session corresponding to the first drone service.
- the first device is SMF 1
- SMF 1 can determine whether the UE initiates the establishment of a session corresponding to the first drone service based on the stored information of the UE (such as the context information of the UE, etc.).
- the context information of the UE may include sessions corresponding to different services that the UE has established.
- SMF 1 receives a message from the UE for requesting the establishment of a session (for example, recorded as a second message, the second message is used to request the establishment of the first session); SMF 1 can determine whether the first session is based on the context information of the UE.
- the session corresponding to the first drone service of this UE may determine whether the first session belongs to the session corresponding to the UAV service, and if it is determined that the first session belongs to the session corresponding to the UAV service, then determine whether the first session belongs to the session corresponding to the UAV service according to the context information of the UE. It is the session corresponding to the first drone service of the UE. For example, the first session belongs to a session not corresponding to the drone service, or the first session belongs to a session corresponding to the drone service but the context information of the UE includes other sessions corresponding to the drone service, SMF 1 can determine the second message It is not a message used to establish the session corresponding to the first drone service.
- the first session belongs to the session corresponding to the drone service, and the context information of the UE does not include the session corresponding to the drone service.
- SMF 1 can determine that the second message is used to request the establishment of the first drone of the UE.
- the session corresponding to the service means that it is determined that the UE initiates the establishment of the session corresponding to the first drone service.
- SMF 1 may determine whether the first session belongs to a session corresponding to the drone service. For example, SMF 1 can determine whether the first session belongs to the session corresponding to the drone service according to the second message.
- the second message may include one or more of the following information: UE type indication information, UAV identification (identity, ID), data network name (DN name, DNN), USS address information, USS ID, single network slice selection Auxiliary information (single network slice selection assistance information, S-NSSAI) identification, AF ID, or session service type, etc. It should be understood that this information may be included in the second message and sent to SMF 1, or may be included in other messages and sent to SMF 1, which is not limited in the embodiment of this application. This information is introduced below.
- UE type indication information which can indicate whether the UE is a drone or an ordinary UE.
- the second message includes the type indication information of the UE, and the type indication information of the UE indicates that the UE is a drone.
- SMF 1 can determine that the first session belongs to the session corresponding to the drone service.
- the second message includes the type indication information of the UE, and the type indication information of the UE indicates that the UE is an ordinary UE. Based on the second message, SMF 1 can determine that the first session belongs to a session corresponding to the non-UAV service.
- UAV ID which can be the ID of the drone registered for the UE, or the ID assigned by the USS to the UE as the drone. If the second message includes the UAV ID, SMF 1 can determine based on the second message that the first session belongs to the session corresponding to the UAV service.
- the DN can be a DN related to the drone service or a DN related to the non-drone service. This is not limited in the embodiment of the present application.
- the second message includes a DNN, and the DN indicated by the DNN is a DN related to the drone service. Based on the second message, SMF 1 can determine that the first session belongs to the session corresponding to the drone service.
- the second message includes a DNN, and the DN indicated by the DNN is a DN related to non-UAV services. SMF 1 can determine based on the second message that the first session belongs to a session corresponding to the non-UAV service.
- USS address information or USS ID which can be used to indicate the USS serving the first session. If the second message includes USS address information and/or USS ID, SMF 1 can determine based on the second message that the first session belongs to the session corresponding to the UAV service.
- the S-NSSAI identifier can be used to indicate the slice service type corresponding to the first session.
- the slice service type can Whether it is a slicing service corresponding to a UAV service or a slicing service corresponding to a non-UAV service, the embodiment of the present application does not limit this.
- the second message includes S-NSSAI, and the S-NSSAI indicates the slice service corresponding to the drone service. Based on the second message, SMF 1 can determine that the first session belongs to the session corresponding to the drone service.
- the second message includes S-NSSAI, and the S-NSSAI indicates the slice service corresponding to the non-UAV service. Based on the second message, SMF 1 can determine that the first session belongs to the session corresponding to the non-UAV service.
- AF ID can be used to indicate the AF corresponding to the establishment of the first session.
- the AF can be an AF related to the drone service or an AF related to the non-drone service. This is not limited in the embodiment of the present application.
- the second message includes an AF ID, and the AF indicated by the AF ID is an AF related to the drone service.
- SMF 1 can determine that the first session belongs to the session corresponding to the drone service.
- the second message includes an AF ID, and the AF indicated by the AF ID is an AF related to non-UAV services. SMF 1 can determine based on the second message that the first session belongs to a session corresponding to the non-UAV service.
- the service type of the session can be used to indicate the service type corresponding to the first session.
- the service type can be, for example, drone service, non-drone service, etc., which is not limited in the embodiment of this application.
- the second message includes the service type of the session, and the service type of the session is used to indicate the drone service. Based on the second message, SMF 1 can determine that the first session belongs to the session corresponding to the drone service.
- the second message includes the service type of the session, and the service type of the session is used to indicate the non-UAV service. Based on the second message, SMF 1 can determine that the first session belongs to the session corresponding to the non-UAV service.
- SMF 1 can also determine whether the first session belongs to the session corresponding to the drone service based on the combination of the above information.
- the second message includes DNN and S-NSSAI, and the combination of DNN and S-NSSAI indicates the drone service. Based on the second message, SMF 1 can determine that the first session belongs to the session corresponding to the drone service.
- the second message includes DNN and S-NSSAI, and the combination of DNN and S-NSSAI indicates a non-UAV service. Based on the second message, SMF 1 can determine that the first session belongs to a session corresponding to the non-UAV service. .
- SMF 1 can also determine whether the first session belongs to a session corresponding to the drone service based on the other two or more combinations of the above information. The embodiments of this application will not be listed one by one here.
- the first device is SMF 1.
- SMF 1 can determine whether the UE initiates the establishment of a session corresponding to the first drone service based on the UE information stored in SMF 1 (such as the context information of the UE, etc.).
- the first device can also be SMF 2, or other SMF.
- the relevant content of the first device being SMF 1, which will not be described again here.
- the first device is not the SMF, and the first device can determine from the SMF whether the UE initiates the establishment of a session corresponding to the first drone service.
- the first device may subscribe to the SMF for the session information of the UE, or send a message to the SMF for requesting the session information of the UE; after the SMF determines that the UE initiates the establishment of a session corresponding to the first UAV service, the SMF may The first device sends instruction information for instructing the UE to initiate the establishment of a session corresponding to the first UAV service; the first device receives the instruction information, and determines based on the instruction information that the UE initiates the establishment of a session corresponding to the first UAV service. session.
- the first device determines that the UE is authorized for the drone service, and determines that the UE initiates the establishment of the first session corresponding to the drone service. Next, the first device determines that the UE is in the flight state.
- the first device is a UE, and the first device may determine that the UE is in the flight state according to the mobility information, or according to the fifth indication information from the application layer, or according to the mobility information and the fifth indication information from the application layer.
- the movement information may include height and/or movement speed.
- the UE can measure its own horizontal height. If the measured horizontal height is greater than or equal to the height threshold, the UE can determine that it is in a flight state.
- the height threshold may be preset, which is not limited in the embodiments of this application.
- the UE can measure its own movement speed, If the measured movement speed is greater than or equal to the speed threshold, the UE can determine that it is in a flight state.
- the speed threshold may be preset, which is not limited in the embodiments of the present application.
- the fifth indication information may instruct the UE to enter flight mode.
- the first device is an AMF, and the first device can maintain the status of the UE.
- the state of the UE includes a flight state and/or a non-flight state.
- the first device may acquire the status of the UE periodically or aperiodically.
- the first device may receive fourth indication information from the fourth device, where the fourth indication information is used to indicate that the UE is in the flight state. Further, the first device may determine that the UE is in the flight state according to the fourth indication information.
- the fourth device may actively send the fourth indication information to the first device, or may send the fourth indication information to the first device after receiving a message from the first device for requesting the status of the UE. According to the embodiment of the present application There is no limit to this.
- the first device may determine that the UE is in a flight state based on the UE's movement information, or based on the UE's flight information, or based on the UE's movement information and the UE's flight information.
- the first device can obtain the mobility information of the UE from a base station, a gateway mobile location center (GMLC) or a location management function (LMF) device.
- GMLC gateway mobile location center
- LMF location management function
- the first device determines that the UE is in a flying state; otherwise, the first device determines that the UE is in a non-flying state.
- the first device may obtain the flight information of the UE from the USS.
- the flight information may include flight paths, flight schedules, etc.
- the first device may determine whether the current time and the UE's current location match the flight path and flight schedule. If the current time and the current position of the UE match the flight path and flight schedule, the first device determines that the UE is in the flight state; otherwise, the first device determines that the UE is in the non-flight state.
- the first device may obtain the status of the UE from the AMF.
- the first device may receive third indication information from the AMF, the third indication information indicating that the UE is in the flight state. Further, the first device may determine that the UE is in the flight state according to the third indication information.
- the AMF may actively push the status of the UE to the first device, or the AMF may also send a message (such as the sixth message) sent by the first device for subscribing (or requesting) the status of the UE to the first device.
- the status of the UE is sent, which is not limited in the embodiment of this application.
- the first device restricts the non-UAV services of the UE and/or restricts the first control plane process of the UE.
- the first device limits the non-UAV services of the UE, or limits the first control plane process of the UE, or limits the non-UAV services of the UE and limits the first control plane process of the UE.
- the first device may limit the non-UAV services of the UE in one or more of the following ways.
- the first device is SMF 1.
- the first device releases the session corresponding to the non-UAV business of the UE managed by SMF 1, or prohibits (or refuses) the establishment or modification of the session corresponding to the non-UAV business of the UE. , or release the session corresponding to the non-UAV service of the UE managed by SMF1 and prohibit the establishment or modification of the session corresponding to the non-UAV service of the UE.
- the first device may release sessions corresponding to all non-UAV services of the UE managed by SMF 1, or the first device may release sessions corresponding to part of the non-UAV services of the UE managed by SMF 1.
- SMF 1 can actively trigger the release process of sessions corresponding to non-UAV services. For example, SMF 1 releases the IP address allocated to the session corresponding to the non-UAV service, or sends a session release message for releasing the session corresponding to the non-UAV service to the UPF so that the UPF releases the IP address corresponding to the non-UAV service. Session-related resources (such as discarding the remaining data packets corresponding to the session corresponding to the non-UAV business and releasing the corresponding tunnel resources and stored context, etc.).
- SMF 1 notifies the corresponding AMF, so that the AMF releases the session-related resources (such as session ID, SMF ID, etc.) corresponding to the non-UAV business, and notifies AN to release the session-related resources corresponding to the non-UAV business.
- session-related resources such as session ID, SMF ID, etc.
- AN resources, etc. should be understood It should be noted that the specific implementation solution of SMF releasing sessions corresponding to non-UAV services in the embodiment of the present application is not limited to this.
- the first device determines that N is greater than M, and determines to release all or part of the sessions corresponding to the non-UAV services of the UE managed by SMF 1.
- N may be the number of sessions corresponding to the non-UAV services of the UE managed by SMF 1.
- the first device may determine the N based on the context information of the UE stored in the first device, or obtain the N from UDM, UDR, or AMF. The method of obtaining N in the embodiment of the present application is not limited to this.
- M may be the number of sessions corresponding to non-UAV services that the UE is allowed to establish at SMF 1 when performing UAV services.
- the M may be preset, or configured in PCF, or obtained from UDM, UDR, or AMF.
- the first device may determine to release H sessions corresponding to non-UAV services, where H may be a positive integer greater than or equal to (N-M).
- the first device may prohibit the establishment of some or all of the sessions corresponding to non-UAV services of the UE (including prohibiting the modification of some of the sessions corresponding to the UAV services of the UE into sessions corresponding to non-UAV services) or It is prohibited to modify some or all of the sessions corresponding to non-UAV services of the UE.
- the first device prohibits the establishment or modification of the session corresponding to the non-UAV service of the UE, which can be understood as the first device rejects the message from the UE requesting the establishment or modification of the session corresponding to the non-UAV service; or It is understood that the first device rejects the message from the UE for requesting to modify the session corresponding to the drone service to a session corresponding to the non-drone service; or it is understood that the first device does not respond or rejects the message from the AF for requesting establishment.
- the first device does not respond or rejects the message from the AF requesting to modify the session corresponding to the UAV service to a session corresponding to the non-UAV service; or It is understood that the first device deletes or discards a message from the UE or AF for requesting to establish or modify a session corresponding to the non-UAV service; or it is understood that the first device deletes or discards a message from the UE or AF for requesting the establishment or modification of a session corresponding to the unmanned aerial vehicle service.
- the session corresponding to the drone service is modified into a message corresponding to the session not corresponding to the drone service, etc.
- the first device receives a message from the UE or AF requesting to establish or modify a session, and determines whether the session used in the message to request the establishment or modification belongs to a session corresponding to the UAV service. If the session used by this message to request establishment or modification belongs to the session corresponding to the UAV business (it should be noted that, according to the above understanding, modifying the session corresponding to the UAV business in this application also includes changing the session corresponding to the non-UAV business). The session is modified to a session corresponding to the drone service (which will not be repeated later), and the first device continues to perform the process of establishing or modifying the session according to the message.
- modifying a session corresponding to a non-UAV service in this application also includes changing the session corresponding to the UAV service
- the session is modified to a session corresponding to the non-UAV service (which will not be repeated later), and the first device rejects the request or does not respond to the message.
- the first device For the first device to determine whether the session belongs to the session corresponding to the drone service, reference may be made to the relevant content of S401, which will not be described again here.
- the first device is AMF, or other devices (such as UDM, PCF, etc.).
- the first device triggers or notifies the SMF to release the sessions corresponding to all or part of the non-UAV services of the UE managed by the SMF, or prohibit (or refuse) the establishment or modification of the sessions corresponding to all or part of the non-UAV services of the UE.
- the first device determines to limit the non-drone services of the UE, determines the SMF that manages the session of the UE (such as SMF 1 and/or SMF 2), and sends to the SMF all the information for releasing the UE managed by the SMF. Or some notification messages for sessions corresponding to non-UAV services.
- the first device determines the SMF that manages the session corresponding to the non-UAV service of the UE, and sends the notification message to the SMF.
- the specific implementation method of releasing the session corresponding to the non-UAV service of the UE please refer to the relevant description of the aforementioned method 1, and the steps will be repeated here.
- Method 3 The first device is SMS-SC, and the first device does not send or suspends sending to the UE a session corresponding to the request to establish or modify the non-UAV service (for example, recorded as the first message).
- the first message may be a short message, for example, but the embodiment of the present application does not limit the specific implementation form of the first message.
- the first message may come from AF.
- the AF can determine the need to establish or modify a session corresponding to the UE's non-UAV business based on the application requirements (such as actively pushing video, data, etc.
- SMS- SC sends the first message (so that after SMS-SC receives the first message, it notifies the UE, and the UE sends a request message to establish or modify the session corresponding to the UE's non-UAV service); SMS-SC receives the first message Finally, it is determined that the first condition is met, and the first message is not sent to or is suspended from being sent to the UE.
- Method 4 The first device is the UE, and the first device does not or suspends sending the first message to SMF 1.
- the first message is used to request the establishment or modification of a session corresponding to the non-UAV service.
- the AF can determine the need to establish or modify a session corresponding to the UE's non-UAV business based on application requirements (such as actively pushing video data, image data, etc. to the UE) or the UE's application requirements, and generate a session to trigger the UE to request the establishment Or modify the request message of the session corresponding to the UE's non-UAV service, and send the request message to SMS-SC; after receiving the request message, SMS-SC forwards the request message to the UE; the UE receives the request message Finally, it is determined that the first condition is met, and the first message is not or suspended from being sent to SMF 1. In this method, the first message is used to request the establishment or modification of a session corresponding to the non-UAV service.
- application requirements such as actively pushing video data, image data, etc. to the UE
- the UE's application requirements such as actively pushing video data, image data, etc. to the UE
- the first device may send the second indication information to the UE.
- the second indication information may indicate that establishing a session corresponding to non-UAV services is prohibited. In this way, the UE may not initiate the establishment or modification of the session corresponding to the non-UAV service according to the second indication information.
- the first device restricts the non-UAV services of the UE.
- the first control plane process of the first device restricting the UE is introduced.
- the first control plane process is not unique to the drone business.
- the first control plane process is not a process exclusive to the UAV business. It can be understood that the non-execution of the first control plane process will not have a negative impact on the UE's UAV business; or it can be understood as the non-execution of the first control plane process. It will not affect the normal execution of the UE's drone business; or it is understood that the first control plane process is not a necessary process for the normal execution of the UE's drone business; or it is understood that executing the first control plane process is not only detrimental to the UE's drone business.
- executing the first control plane process is not only a necessary process for the normal execution of the UE's UAV business, but also a necessary process for the normal execution of the UE's non-UAV business.
- the process, etc. are not limited by the embodiments of this application.
- the first control plane process may include one or more of the following processes: a primary authentication process, a de-registration process, a slice authentication process, or a secondary authentication process, etc. This embodiment of the present application does not Limited to this.
- the first device may limit the first control plane process by suspending or terminating the first control plane process.
- the first device receives a fourth message from the third device, the fourth message is used to request execution of the first control plane process; the first device determines that the first condition is met, and may suspend or terminate the first control plane process.
- the first device may send a fifth message to the third device, the fifth message including the reason for not performing (or not executing) the first control plane process.
- the reason for not executing the first control plane process may be, for example, that the first condition is met or a timeout occurs, which is not limited in the embodiments of this application.
- the first device can start the first timer and determine whether the UE satisfies the first condition during the running of the first timer (or at the end of the running). If the first device determines that the UE meets the first condition during the running of the first timer (or at the end of the running), the first device may terminate the first control plane process at the end of the first timer. If the first device determines that the UE does not meet the first condition during the running of the first timer, the first device may execute the first control plane process.
- the first condition determined by the first device includes that the UE is authorized for the drone service and/or the UE is in a flight state. Further, the first device may also receive a third condition from the UE. Two messages, and It is determined whether the first session requested to be established by the second message belongs to the session corresponding to the drone service. Wherein, if the first device determines that the first session belongs to a session corresponding to the drone service, the first device can perform the content shown in S402; or, if the first device determines that the first session belongs to a session corresponding to the non-drone service, then The first device may not execute the content shown in S402. The first device determines whether the first session is a session corresponding to the drone service.
- the first session requested to be established by the second message belongs to the session corresponding to the drone service, which means that the UE is about to perform the drone service.
- the first device restricts the non-drone services of the UE and/or restricts the first control plane process of the UE, which can prevent non-drone services from occupying the resources of the drone business and prepare for the drone business. Leave more usable resources; or, the first session requested by the second message belongs to a session corresponding to a non-UAV service, which means that the UE has not yet executed the UAV service.
- the first device allows Executing non-UAV services and allowing the execution of first control plane processes can improve resource utilization and improve compatibility.
- the first condition determined by the first device includes that the UE is authorized for the drone service and/or the UE is in a flight state. Further, the first device may also receive a message from the UE. second message, and determine whether the first session requested by the second message belongs to a session corresponding to the UAV service. Wherein, the first device determines that the first session belongs to a session corresponding to the drone service, and the first device may not execute the content shown in S402. For another example, the first device determines that the first session belongs to a session corresponding to a non-UAV service, and the first device may reject the request to establish the first session. The first device determines whether the first session is a session corresponding to the drone service.
- the first session requested to be established by the second message belongs to the session corresponding to the drone service.
- the first device does not perform S402 , but when the first session belongs to a session corresponding to a non-UAV service, the first device will refuse to establish a session corresponding to the non-UAV service, so that it can execute the existing (or ongoing) session while executing the UAV service. Executing) non-UAV services and executing the first control plane process can improve resource utilization, while rejecting new sessions corresponding to non-UAV services can prevent attackers from using newly created non-UAV services to attack the UE.
- the first condition determined by the first device includes that the UE is authorized for the drone service and/or the UE is in a flight state. Further, the first device may also receive a message from the UE. second message, and determine whether the first session requested to be established by the second message is a session corresponding to the first drone service initiated by the UE. For example, the first device may determine whether the first session is a session corresponding to the first drone service initiated by the UE according to the context information of the UE stored in the first device.
- the first device may send a request to SMF, UDR or UDM to obtain information about whether the UE has established a session corresponding to the drone service. If yes, it can be determined that the first session is not the session corresponding to the first drone service initiated by the UE, otherwise it can be determined that the first session is the session corresponding to the first drone service initiated by the UE.
- the first session is not the session corresponding to the first drone service initiated by the UE, which means that before the first device receives the first session establishment request (that is, when the first session corresponding to the drone service is established) , the session corresponding to the UE's non-UAV service has been released.
- the first device does not need to repeatedly request to limit the non-UAV service and/or limit the first control plane process, thereby eliminating unnecessary message interaction. , improve resource utilization. That is, if the first device determines that the first session is not a session corresponding to the first drone service initiated by the UE, the first device may not perform the content shown in S402; or, the first device determines that the first session is initiated by the UE.
- the first device can execute the content shown in S402.
- the first device may send a request (or notification) to the second device to restrict the UE.
- the non-UAV business message (for example, recorded as the third message) is to execute the content shown in S403.
- S403 The first device sends the third message to the second device. Accordingly, the second device receives the third message.
- the third message may be used to request (or notify) to limit the UE's non-UAV services.
- S404 The second device determines that SMF 2 manages a session corresponding to the UE's non-UAV service.
- the second device may determine the SMF that manages the session of the UE.
- the second device determines the SMF that manages the session corresponding to the non-UAV service of the UE.
- the second device may determine the SMF that manages the session of the UE or manages the non-UAV service of the UE based on the stored context information of the UE and/or based on the context information of the UE obtained from the UDM or UDR or PCF.
- the SMF of the corresponding session may be determined.
- the PCF may send a message for requesting the session information of the UE or the association information with the SMF to the UDM (or UDR); and receive the session information of the UE (including the association information with the SMF) from the UDM (or UDR) or the association information with the SMF. associated information.
- the context information of the UE may include association information between the UE and the SMF.
- the association information between the UE and the SMF may include the identity of the SMF that manages the session corresponding to the non-UAV service of the UE or the identity of the SMF that manages the session of the UE.
- the association information between the UE and the SMF may also include the identification of the SMF that manages the session corresponding to the UE's drone service.
- SMF 1 and SMF 2 simultaneously manage sessions with UE's non-UAV services as an example. Then in S404, the second device can determine that SMF 2 manages a session corresponding to the non-UAV service of the UE.
- S405 The second device sends the sixth instruction information to SMF 2.
- SMF 2 receives the sixth indication information.
- the sixth instruction information is used to instruct to release the session corresponding to the non-UAV business of the UE managed by SMF 2, or to prohibit the establishment or modification of the session corresponding to the non-UAV business of the UE, or to instruct the release of SMF 2 management.
- the sixth indication information may be used to instruct to release the sessions corresponding to all or part of the non-UAV services of the UE managed by SMF 2.
- the first device determines to release all or part of the sessions corresponding to the non-UAV services of the UE managed by SMF 1.
- the first device receives the first indication information from the second device, and releases the data corresponding to one or more non-UAV services of the UE managed by SMF 1 according to the first indication information. session.
- the first indication information may indicate releasing one or more sessions corresponding to non-UAV services.
- the second device determines the SMF that manages sessions corresponding to the UE's non-UAV services, and determines the number of sessions corresponding to the UE's non-UAV services released by the SMF.
- the second device receives N from SMF 1, and determines that SMF 1 needs to release one or more non-drone services based on the number of sessions corresponding to the non-drone business established by the UE, N and M. Sessions corresponding to the service, or determine the number of sessions corresponding to the non-UAV service of the UE that SMF 1 needs to release (or to be released).
- the first device can revoke restrictions on non-UAV services and/or revoke restrictions on the first control plane process. For example, if the first device determines that the second condition is met, the first device may revoke restrictions on non-UAV services and/or revoke restrictions on the first control plane process.
- the first device is SMF 1.
- the first device determines that the second condition is met, receives the seventh message from the UE, and establishes or modifies a session corresponding to the non-UAV service based on the seventh message.
- the seventh message is used to Request to establish or modify a session corresponding to non-UAV services.
- the first device is SMS-SC, the first device determines that the second condition is met, receives an eighth message from the AF, and sends the eighth message to the UE.
- the eighth message is used to request the establishment or modification of a non-unmanned network.
- the session corresponding to the machine service.
- the first device is a UE, the first device determines that the second condition is met, receives an eighth message from the SMS-SC, and sends the eighth message to SMF 1.
- the eighth message is used to request the establishment or modification of a non-None. Conversations corresponding to human-machine services.
- the first device determines that it is full If the second condition is met, a message (for example, recorded as a fourth message) for requesting execution of the first control plane process is received from the third device, and the first control plane process is executed.
- the second condition includes one or more of the following conditions: the UE is revoked from the drone business authorization, the UE is not authorized to the drone business, the UE's drone business is de-registered, or the UE releases the last Sessions corresponding to drone business, etc.
- the USS when the USS is ready to revoke the authorization for the drone service of the UE, it can send the revocation request (through the UAS NF) to the AMF (or SMF), and the AMF (or SMF) will continue to execute the drone service for the UE.
- Authorization revocation process the revocation result will be sent to the UE through AMF (or SMF).
- the AMF and SMF can subscribe to the authorization information from each other, that is, they can receive the authorization revocation results from each other. Therefore, the first device (such as UE, SMF, or AMF) can determine that the UE is revoked from the drone service authorization, but the embodiment of the present application is not limited thereto. For example, when the UE needs to be de-registered, the AMF will receive the de-registration request and execute the de-registration process with the UE, so the AMF and the UE can obtain information about the completion of the de-registration process.
- the SMF can obtain the deregistration information of the UE through the AMF (the SMF subscribes to the notification service of related information), but the embodiment of the present application is not limited to this.
- the first device is an SMF
- the first device can determine whether the UE releases the session corresponding to the last drone service according to the stored context information of the UE. For another example, if the first device is not the SMF, the first device may obtain from the SMF whether the UE releases the session corresponding to the last drone service.
- the AMF can maintain the status of the UE.
- Figure 5 is a schematic flowchart of a communication method provided by an embodiment of the present application.
- the first device is AMF
- the fourth device is RAN, or UE, or USS, or UAS NF/NEF.
- the AMF can obtain the status of the UE according to one or more of the four methods shown in Figure 5.
- Method 1 includes steps S501 to S503, method 2 includes steps S504 and S505, method 3 includes steps S506 to S508, and method 4 includes steps S509 to S511.
- the method may also include the following processes.
- AMF sends the ninth message to RAN; accordingly, RAN receives the ninth message from AMF.
- the AMF may send the ninth message to the RAN to obtain the status of the UE; or the RAN may actively report the status of the UE to the AMF; this is not limited in the embodiments of this application.
- the RAN determines the status of the UE according to the mobility information of the UE.
- the movement information includes one or more of height, movement speed, position or movement trajectory.
- the RAN can measure the UE and obtain the mobility information of the UE.
- the RAN may receive mobility information from the UE. It should be understood that the embodiments of the present application do not limit the specific implementation manner in which the RAN obtains mobility information.
- the RAN may determine whether the UE is in a flight state or a non-flight state according to the UE's mobility information. For example, if the altitude is greater than or equal to the altitude threshold, the RAN may determine that the UE is in a flight state.
- the height threshold may be preset, which is not limited in the embodiments of this application.
- the RAN may determine that it is in a flight state.
- the speed threshold may be preset, which is not limited in the embodiments of the present application.
- the RAN sends the fourth indication information to the AMF; accordingly, the AMF receives the fourth indication information from the RAN.
- the fourth indication information may be used to indicate that the UE is in a flight state, or to indicate that the UE is in a non-flight state.
- the RAN may send fourth indication information to the AMF to indicate the status of the UE.
- FIG. 5 takes the fourth indication information indicating that the UE is in the flight state as an example.
- S504 The UE determines the status of the UE according to the mobility information and/or the fifth indication information.
- the UE can measure one or more of its own height, movement speed, position, or movement trajectory, or can calculate the movement information of the UE by measuring the received wireless signal of the RAN.
- the fifth indication information may come from the application layer of the UE.
- the application layer triggers the UE to enter the flight mode.
- the application layer may generate the fifth indication information.
- the fifth indication information is used to instruct the UE to enter the flight mode. Further, the UE enters the flight mode according to The fifth indication information determines that the UE is in a flight state.
- the UE sends the fourth indication information to the AMF; accordingly, the AMF receives the fourth indication information from the UE.
- S506 AMF obtains the mobility information of the UE.
- the AMF may obtain the UE's mobility information from the RAN and/or GMLC (or LMF).
- the RAN may proactively report the UE's mobility information to the AMF; or, after receiving a message from the AMF requesting to obtain the UE's mobility information, the RAN may send the UE's mobility information to the AMF.
- the GMLC (or LMF) can actively push the UE's mobility information to the AMF; or, after receiving a message from the AMF requesting to obtain the UE's mobility information, the GMLC (or LMF) can send the UE's mobility information to the AMF.
- Mobile information It should be understood that the embodiment of the present application does not limit the specific implementation manner in which the AMF obtains the mobility information of the UE.
- S507 AMF obtains the flight information of the UE.
- the flight information may include, for example, flight route and/or flight time.
- the AMF can obtain the UE's flight information from the UAS NF/NEF (or USS).
- the UAS NF/NEF or USS
- the UAS NF/NEF can actively push the UE's flight information to the AMF; or, the UAS NF/NEF (or the USS) can receive a message from the AMF requesting the UE's flight information and send it to the AMF.
- the flight information of the UE; the embodiment of this application does not limit the specific implementation method for the AMF to obtain the flight information of the UE.
- the AMF determines the status of the UE based on the mobility information and flight information.
- the AMF may determine whether the current time and the UE's current location match the flight path and flight schedule. If the current time and the current position of the UE match the flight path and flight schedule, the AMF determines that the UE is in the flight state; otherwise, the AMF determines that the UE is in the non-flight state. For another example, the AMF may determine the status of the UE based on mobility information. For example, if the altitude is greater than or equal to the altitude threshold, the AMF may determine that the UE is in the flight state; or if the movement speed is greater than or equal to the speed threshold, the AMF may determine that it is in the flight state.
- the AMF can send a status request message for obtaining the UE to other devices (such as network data analytics function (NWDAF) device); NWDAF can collect UE-related information (such as mobility information and/or flight information, etc.), determine the status of the UE, and send the status of the UE to the AMF.
- NWDAF may send the mobility information and/or flight information obtained by the AMF to the NWDAF; the NWDAF determines the status of the UE based on the received mobility information and/or flight information, and sends the status of the UE to the AMF.
- Figure 5 takes the AMF as an example to determine the status of the UE based on mobility information and flight information.
- AMF has completed obtaining the status of the UE through method 3.
- the AMF obtains the status of the UE through method 4.
- AMF sends the ninth message to UAS NF/NEF; accordingly, UAS NF/NEF receives the ninth message from AMF.
- the AMF can send the ninth message to the UAS NF/NEF (or USS) to obtain the status of the UE; or, the UAS NF/NEF (or the USS) can also actively push the status of the UE to the AMF; the embodiment of this application is Not limited.
- UAS NF/NEF determines the status of the UE.
- UAS NF/NEF can obtain the status of the UE based on the locally stored status of the UE, or the UAS NF/NEF can also obtain the status of the UE from the USS, such as sending a request message to the USS to obtain the status of the UE.
- the USS can obtain the status of the UE based on the communication content between itself and the UE, or the USS can also determine the status of the UE based on the UE's flight authorization information and/or flight schedule.
- there is a dedicated communication channel (such as C2 communication) between the USS and the UE as a drone and the USS can obtain the status of the UE based on the communication content of the communication channel.
- the USS may determine the status of the UE based on the stored flight authorization information and/or flight schedule of the UE.
- UAS NF/NEF sends the fourth indication information to AMF; accordingly, AMF receives the fourth indication information from UAS NF/NEF.
- the AMF has completed obtaining the status of the UE through method 4.
- AMF can determine the status of the UE based on mobility information and flight information, and can also obtain the status of the UE from the RAN or UE or UAS NF/NEF or USS.
- the implementation method is flexible and adaptable.
- the AMF can maintain (or save) the status of the UE and send the status of the UE to other devices (such as SMF, SMS-SC, UDM, AUSF, ARPF or NSSAAF, etc.) so that the other devices can determine whether the UE is in flight. state.
- FIG. 5 introduces how AMF obtains the status of the UE in various ways. Next, the process shown in Figure 4 will be introduced with reference to Figures 6 to 13.
- Figure 6 is another schematic flowchart of a communication method provided by an embodiment of the present application.
- the first device is SMF 1
- SMF 1 releases sessions corresponding to all non-UAV services of the UE managed by SMF 1.
- the second device is PCF, UDM, UDR, or AMF.
- the method may include the following processes.
- S601 The UE sends the second message to SMF 1; accordingly, SMF 1 receives the second message from the UE.
- S601 is an optional step, that is, SMF 1 can determine whether the first condition is met in response to the second message, or SMF 1 can also determine whether the first condition is met periodically or aperiodically. This is not limited in the embodiment of the present application.
- the second message is used to request the establishment of the first session.
- the second message may be, for example, a PDU session establishment request (PDU session establishment request) message.
- the second message may be used to request modification of the first session.
- the second message may be, for example, a PDU session modification request (PDU session modification request) message. This embodiment of the present application does not limit the name of the second message.
- S602 SMF 1 determines that the first condition is met.
- the first condition includes one or more of the following conditions: the UE is authorized for the drone service, the UE initiates the establishment of a session corresponding to the first drone service, or the UE is in a flight state.
- SMF 1 may determine whether the first condition is satisfied. For example, SMF 1 may determine whether the UE is authorized for the drone service according to the stored context information of the UE. For example, SMF 1 can obtain from AMF whether the UE is authorized for the drone service (subscribe to AMF's service about the UE's drone authorization status, and when the drone is authorized, AMF will notify SMF 1; or SMF 1 will notify AMF Send a request message to obtain the UE's drone service authorization status).
- SMF 1 may Determine whether the first session is a session corresponding to the first drone service initiated by the UE.
- SMF 1 may obtain the status of the UE from the AMF, and determine whether the UE is in the flight status according to the status of the UE.
- SMF 1 satisfies the first condition as an example.
- S603 SMF 1 determines that the first session belongs to the session corresponding to the drone service, and determines that the first session is the session corresponding to the first drone service of the UE.
- S603 is an optional step.
- the first condition determined by SMF 1 in S602 includes that the UE is authorized for the drone service and/or the UE is in a flight state. After executing S602, SMF 1 may execute S603 or not execute S603.
- the first condition determined by SMF 1 includes the UE initiating the establishment of the first session corresponding to the drone service, then S603 and S602 can be understood as one step, and SMF 1 does not need to execute S603.
- the second message is used to request the creation of a first session.
- SMF 1 determines that the first session belongs to a session corresponding to the drone service, and determines whether the first session is a session corresponding to the first drone service. If the first session is a session corresponding to the first drone service, SMF 1 can execute the contents shown in S604-S609; otherwise, the contents shown in S604-S609 will not be executed.
- the second message is used to request modification of the first session.
- SMF 1 can determine that the first session belongs to a session corresponding to the non-UAV service, and determine whether the modified first session is the first UAV. The session corresponding to the business. If the modified first session is the session corresponding to the first drone service, SMF 1 executes the content shown in S604-S609, otherwise, the content shown in S604-S609 is not executed.
- the second message is used to request modification of the first session.
- SMF 1 determines that the first session belongs to the session corresponding to the drone service. Further, SMF 1 can also determine whether the second message requests to modify the drone service. The session is modified to a session corresponding to the non-UAV business. If the second message requests to modify the session corresponding to the drone service to a session corresponding to the non-drone service, SMF 1 executes the content shown in S604-S609; otherwise, the content shown in S604-S609 is not executed.
- S604 SMF 1 releases the session corresponding to the non-UAV service of the UE managed by SMF 1, and/or prohibits the establishment or modification of the session corresponding to the non-UAV service.
- SMF 1 can release all sessions corresponding to non-UAV services of the UE managed by SMF 1, or prohibit the establishment or modification of sessions corresponding to non-UAV services, or release the UE managed by SMF 1 All sessions corresponding to non-UAV services and prohibit the creation or modification of sessions corresponding to non-UAV services.
- SMF 1 can initiate the session release process and notify relevant NFs, network elements (such as UPF, AMF, RAN, etc.), UE, etc. to release resources related to the session.
- SMF 1 can be configured as a policy that prohibits the establishment or modification of sessions corresponding to non-UAV services. If SMF 1 receives a request message from the UE for establishing or modifying a session, SMF 1 can determine whether the session corresponds to non-UAV services. If the session is a session corresponding to the UAV business, SMF 1 establishes or modifies the session; or, if the session is a session corresponding to a non-UAV business, SMF 1 can suspend or terminate the establishment or modification of the session. Optionally, after SMF 1 suspends establishing or modifying the session, if SMF 1 determines that the second condition is met, SMF 1 continues to establish or modify the session.
- step S603 determines that the first session belongs to a session corresponding to a non-UAV service
- SMF 1 may reject the establishment request of the first session or reject the modification request of the first session.
- the second message is a request to modify the first session to a session corresponding to the drone service
- SMF 1 may not reject the request.
- SMF 1 determines that the first session is No is the session corresponding to the first drone service. If the first session is a session corresponding to the first drone service, the contents shown in S605-S609 can be executed; otherwise, the contents shown in S605-S609 will not be executed.
- step S603 determines that the first session belongs to the session corresponding to the UAV service and the second message is used to request the creation of the first session
- SMF 1 determines whether the first session is a session corresponding to the first UAV service. If the first session is a session corresponding to the first drone service, the contents shown in S605-S609 can be executed; otherwise, the contents shown in S605-S609 will not be executed.
- step S603 determines that the first session belongs to the session corresponding to the UAV service and the second message is used to request to modify the first session
- SMF 1 determines whether the request modifies the session corresponding to the UAV service to a session corresponding to the non-UAV service. session. If so, SMF 1 rejects the request; otherwise, the contents shown in S605-S609 can be executed.
- SMF 1 sends the second indication information to the UE; accordingly, the UE receives the second indication information from SMF 1.
- SMF 1 may send second indication information to the UE.
- the second indication information may be used to indicate that the establishment of a session corresponding to the non-UAV service of the UE is prohibited, or may indicate that the establishment of the non-UAV service of the UE at SMF 1 is prohibited. corresponding session.
- the UE can first determine whether the session belongs to a session corresponding to the UAV service before initiating session establishment. If the session is a session corresponding to the UAV service, the UE initiates the process of establishing the session; or, if the session is a session corresponding to a non-UAV service, the UE may suspend the process of establishing the session.
- the UE may initiate a process for establishing the session.
- the UE may initiate a process for establishing the session.
- the UE to determine whether the session belongs to the session corresponding to the drone service please refer to the relevant content of SMF 1 to determine whether the first session belongs to the session corresponding to the drone service, which will not be described again here.
- the second instruction information sent by SMF 1 can also be used to indicate that it is prohibited to modify the session corresponding to the drone service to a session corresponding to the non-drone service.
- the UE can first determine whether the session modification request belongs to modifying the session corresponding to the drone service to a session corresponding to the non-drone service before initiating the session modification process. If the session modification request does not belong to modifying the session corresponding to the drone service to a session corresponding to the non-drone service, the UE initiates the session modification process; or, if the session modification request belongs to modifying the session corresponding to the drone service For a session corresponding to non-UAV services, the UE may suspend the process of initiating modification of the session.
- the UE may initiate the session modification process.
- the UE may initiate the session modification process.
- the UE to determine whether the session belongs to the session corresponding to the drone service please refer to the relevant content of SMF 1 to determine whether the first session belongs to the session corresponding to the drone service, which will not be described again here.
- SMF 1 has completed the restrictions on non-drone services.
- SMF 1 can also perform the content shown in S606.
- S606 SMF 1 sends the third message to PCF; accordingly, PCF receives the third message from SMF 1.
- the third message may be used to request or notify to limit the session corresponding to the non-UAV service of the UE. It should be noted that the steps performed by PCF in this embodiment can also be performed by UDM, UDR, or AMF.
- S607 The PCF determines that SMF 2 manages a session corresponding to the UE's non-UAV service.
- the PCF can determine the SMF that manages the session corresponding to the non-UAV service of the UE or the PCF determines the SMF that manages the session of the UE (in Figure 6, the PCF determines that SMF 2 manages the non-UAV session of the UE. Taking the session corresponding to the human-machine business as an example). For example, the PCF may determine the SMF that manages the session corresponding to the non-UAV service of the UE based on the context information of the UE and/or the association information between the UE and the SMF obtained from the UDM or UDR.
- the PCF can be based on the context information of the UE and/or the association information between the UE and the SMF obtained from the UDM or UDR, Determine the SMF that manages the session with the UE. It should be noted that if the PCF determines that SMF 2 manages the session of the UE and does not determine whether SMF 2 manages the session corresponding to the UE's non-UAV service, SMF 2 can determine whether it manages the UE's non-UAV session in step S609. The session corresponding to the human-machine business and perform the corresponding operations.
- PCF sends the sixth indication information to SMF 2; accordingly, SMF 2 receives the sixth indication information from PCF.
- the sixth instruction information may be used to instruct (or notify) to release all sessions corresponding to non-UAV services of the UE managed by SMF 2, or to indicate that the establishment or modification of sessions corresponding to non-UAV services is prohibited. session, or release all sessions corresponding to non-UAV services of the UE managed by SMF 2 and prohibit the establishment or modification of sessions corresponding to non-UAV services.
- S609 SMF 2 releases the session corresponding to the non-UAV business of the UE managed by SMF 2, and/or prohibits the establishment or modification of the session corresponding to the non-UAV business.
- SMF 2 can release all sessions corresponding to non-UAV services of the UE managed by SMF 2 according to the sixth instruction information and/or prohibit the establishment or modification of sessions corresponding to non-UAV services.
- SMF 2 may send indication information to the UE indicating that it is prohibited to establish (or to prohibit establishing at SMF 2) a session corresponding to a non-UAV service.
- Figure 7 is another schematic flowchart of a communication method provided by an embodiment of the present application.
- the first device is SMF 1
- SMF 1 releases sessions corresponding to some non-UAV services of the UE managed by SMF 1.
- the second device is PCF, UDM, UDR, or AMF.
- the method may include the following processes.
- S701 to S703, S706, S707, and S711 in Figure 7 are the same as S601 to S603, S606, S607, and S605 in Figure 6. The difference is:
- S704 SMF 1 determines that N is greater than M.
- S704 is an optional step.
- SMF 1 can determine the number of sessions corresponding to the non-UAV service of the UE to be released based on N and M, that is, perform the content shown in S704 and S705; or, SMF 1 can also determine the release based on the first instruction information from the PCF.
- the number of sessions corresponding to the UE's non-UAV services is to perform the contents shown in S706, S708 and S709.
- N may be the number of sessions corresponding to the non-UAV services of the UE managed by SMF 1.
- the first device may determine the N according to the context information of the UE, or obtain the N from the UDM or UDR.
- the method of obtaining N in the embodiment of the present application is not limited to this.
- M may be the number of sessions corresponding to non-UAV services that the UE is allowed to establish at SMF 1 when performing UAV services.
- the M may be preset, or configured in PCF, or obtained from UDM or UDR.
- the embodiment of this application does not limit the implementation of M.
- SMF 1 can determine whether N is greater than M. If N is less than or equal to M and step S701 is executed, the process of establishing or modifying the first session is executed; if N is less than or equal to M and step S701 is not executed, the process End; if N is greater than M, SMF 1 executes the content shown in S705.
- SMF 1 determines to release H sessions corresponding to non-UAV services.
- H is a positive integer greater than or equal to (NM).
- SMF 1 may determine to release H sessions corresponding to non-UAV services among N sessions corresponding to non-UAV services.
- SMF 1 can arbitrarily select H sessions corresponding to non-UAV services from the N sessions corresponding to non-UAV services.
- SMF 1 can select H sessions corresponding to the N non-UAV services based on the priorities of the sessions corresponding to the N non-UAV services. For example, the N non-UAV services Sessions corresponding to the H non-UAV services with lower priorities in the corresponding sessions.
- SMF 1 may select H sessions corresponding to non-UAV services from the N sessions corresponding to non-UAV services based on the session establishment duration and/or resources consumed by the sessions, such as those with a longer establishment time. H sessions corresponding to (or shorter) non-UAV services, or H sessions corresponding to H non-UAV services that consume more resources (or less), etc. It should be understood that the embodiment of the present application does not limit the selection of H sessions corresponding to non-UAV services.
- S708 PCF determines that SMF 1 releases H sessions corresponding to non-UAV services and SMF 2 releases Q sessions corresponding to non-UAV services.
- SMF 1 can send N to PCF, such as carrying N in the third message and sending it to PCF; PCF can determine that N is greater than M based on N and M and determine that SMF 1 releases the H non-digital data of the UE. Drone business.
- the PCF maintains the number of sessions corresponding to the non-UAV services that the UE has established. For example, the PCF receives N from SMF 1 and receives the non-UAV from SMF 2 for the UE it manages.
- PCF can be based on the number of sessions corresponding to non-UAV services that the UE has established (for example, recorded as (For example, recorded as Y, Y is a positive integer) Determine whether the SMF releases the session corresponding to the UE's non-UAV business. Y may be predefined, which is not limited in the embodiments of this application. If session.
- the PCF may determine that SMF 1 releases one or more (e.g., recorded as H) sessions corresponding to non-UAV services of the UE managed by it, and determines that SMF 2 releases Q (Q is Positive number) Sessions corresponding to non-UAV services. For example, the PCF can determine based on X, Y, N and M that SMF 1 releases the sessions corresponding to the H non-UAV services of the UE that it manages.
- PCF determines that SMF 2 releases Q sessions corresponding to non-UAV services please refer to the implementation process of PCF determining that SMF 1 releases H sessions corresponding to non-UAV services, which will not be described again here.
- the number of sessions corresponding to the non-drone services to be released determined by SMF 1 based on N and M is different from the non-drone services to be released determined by PCF based on N and M, or based on X, Y, N and M.
- the number of corresponding sessions may be the same or different, which is not limited in the embodiment of this application.
- PCF can also be performed by UDM, UDR or AMF.
- PCF sends the first indication information to SMF 1; accordingly, SMF 1 receives the first indication information from PCF.
- the first indication information is used to instruct to release sessions corresponding to the H non-UAV services of the UE.
- SMF 1 releases sessions corresponding to the H non-UAV services of the UE managed by SMF 1.
- SMF 1 releases the H sessions corresponding to the non-UAV services of the UE managed by the SMF 1, and/or prohibits the establishment or modification of the sessions corresponding to the non-UAV services.
- SMF 1 For the specific implementation process, please refer to S604. Description will not be repeated here.
- Figure 7 takes SMF 1 as an example to release sessions corresponding to H non-UAV services of UE managed by SMF 1.
- PCF sends the sixth indication information to SMF 2; accordingly, SMF 2 receives the sixth indication information from PCF.
- the sixth instruction information may be used to instruct to release Q sessions corresponding to non-UAV services of the UE managed by SMF 2, and/or to instruct that establishment or modification of sessions corresponding to non-UAV services is prohibited.
- FIG. 7 takes the sixth instruction information as an example to indicate releasing sessions corresponding to Q non-UAV services of the UE managed by SMF 2.
- S713 SMF 2 releases Q sessions corresponding to non-UAV services of the UE managed by SMF 2 and/or prohibits the establishment or modification of sessions corresponding to non-UAV services.
- SMF 2 releases Q sessions corresponding to non-UAV services of the UE managed by SMF 2, and/or prohibits the establishment or modification of sessions corresponding to non-UAV services.
- SMF 2 For the specific implementation process, please refer to S604. Description will not be repeated here.
- Figure 7 takes SMF 2 as an example to release sessions corresponding to Q non-UAV services of UE managed by SMF 2.
- Figure 8 is another schematic flowchart of a communication method provided by an embodiment of the present application.
- the first device is a UE, and the UE does not send or suspends sending to SMF 1 a request to establish or modify a session corresponding to the non-UAV service.
- the method may include the following processes.
- S801 AF sends the tenth message to SMS-SC. Accordingly, the SMS-SC receives the tenth message from the AF.
- the tenth message is used to trigger the UE to request to establish or modify the second session.
- the tenth message may be an SMS message, for example, but the embodiment of the present application does not limit the specific implementation form of the tenth message.
- the AF may determine to trigger the UE to initiate establishment or modification of the second session, generate a tenth message, and send the tenth message to the SMS-SC.
- the AF may determine to trigger the UE to initiate a second session establishment or modification process based on application requirements (such as actively pushing video data to the UE, etc.) or the UE's application requirements.
- the AF sends a tenth message to the SMS-SC, and the tenth message can reach the SMS-SC via NEF and UDM.
- NEF and UDM can verify the AF and determine that the receiving end device of the tenth message is SMS-SC. It should be understood that the embodiment of the present application does not limit the transmission path of the tenth message.
- SMS-SC sends the eleventh message to the UE.
- the UE receives the eleventh message from the SMS-SC.
- the SMS-SC After receiving the tenth message, the SMS-SC sends an eleventh message to the UE.
- the eleventh message is used to notify the UE to trigger the establishment or modification process of the second session.
- the SMS-SC may send a response message to the AF indicating that the eleventh message has been sent to the UE.
- S803 The UE determines that the first condition is met.
- the first condition may include one or more of the following conditions: the UE is authorized for the drone service, the UE initiates the establishment of a session corresponding to the first drone service, or the UE is in a flight state.
- the UE can determine whether it is authorized for the drone service based on the stored context information or drone authorization status.
- the UE may determine based on the stored context information or session state that the session establishment to be initiated is a session corresponding to the first drone service.
- the UE may determine that it is in the flight state according to the mobility information and/or the fifth indication information.
- S803 please refer to the relevant content of S401 and will not be repeated here.
- S804 The UE determines whether the second session belongs to a session corresponding to non-UAV services.
- S804 is an optional step. For example, after the UE determines that the first condition is met, it may not send or suspend sending the twelfth message to SMF 1.
- the twelfth message is used to request the establishment or modification of the second session.
- the UE may determine whether the second session belongs to a session corresponding to non-UAV services according to the eleventh message.
- the eleventh message may include one or more of the following information: UE type indication information, UAV ID, DNN, USS address information, USS ID, S-NSSAI identification, AF ID, or session service type, etc.
- the eleventh message may include a UE identity (such as a general public subscription identifier (GPSI), SUPI, UAV ID, etc.) and/or an AF identity.
- the UE can identify the and/or the AF identifier determines the service type of the second session. For example, if the UE identity is a common terminal identity rather than a UAV identity (such as a UAV ID), the UE may determine that the second session belongs to a session corresponding to a non-UAV service.
- the UE may determine that the second session belongs to the session corresponding to the non-UAV service.
- the content shown in S805 is executed; or, if the UE determines that the second session belongs to a session corresponding to a non-UAV service, the content shown in S806 is executed.
- the UE determines that the second session belongs to a session corresponding to the drone service and is ready to trigger the modification of the session to a session not corresponding to the drone service then perform the content shown in S806; Alternatively, if the UE determines that the second session belongs to a session corresponding to a non-UAV service and is ready to trigger modification of the session to a session corresponding to the UAV service, then the content shown in S805 is executed.
- S805 The UE sends the twelfth message to SMF 1; accordingly, SMF 1 receives the twelfth message from the UE.
- the second session belongs to the session corresponding to the drone service, and the UE can trigger the modification or establishment of the second session, that is, trigger the modification or establishment of the session corresponding to the drone service.
- the UE sends the twelfth message to SMF 1.
- S806 The UE does not or suspends sending the twelfth message to SMF 1.
- the second session belongs to the session corresponding to the non-UAV service, and the UE does not trigger the modification or establishment of the second session, that is, the UE does not trigger the modification or establishment of the session corresponding to the non-UAV service.
- the UE does not or suspends sending the twelfth message to SMF1.
- the UE can start the second timer.
- the UE does not send the twelfth message to SMF 1; or if the second condition is met during the running of the second timer, the UE sends the twelfth message to SMF 1 Send the twelfth message.
- the second condition please refer to the relevant content in Figure 4 and will not be repeated here.
- the UE after receiving the eleventh message from the AF for requesting to establish or modify the second session through SMS-SC, the UE can determine that the first condition is met, and determine that the second session is not In the case of a session corresponding to the drone business, the twelfth message is not sent or suspended to SMF 1, which avoids initiating the establishment or modification of a session corresponding to the non-drone business, thereby reducing the attacker's use of non-drone services. Attacks on UE by human-machine services and avoid non-UAV services from encroaching on the resources of UAV services.
- Figure 9 is another schematic flowchart of a communication method provided by an embodiment of the present application.
- the first device is the SMS-SC, and the SMS-SC does not or suspends sending to the UE a request to establish or modify a session corresponding to the non-UAV service.
- the method may include the following processes.
- S901 AF sends the tenth message to SMS-SC. Accordingly, the SMS-SC receives the tenth message from the AF.
- SMS-SC determines that the first condition is met.
- the first condition may include one or more of the following conditions: the UE is authorized for the drone service, the UE initiates the establishment of a session corresponding to the first drone service, or the UE is in a flight state.
- the SMS-SC may subscribe to services of the AMF (or SMF or UAS NF) regarding the UE's drone authorization status or flight status.
- the AMF or SMF or UAS NF
- the SMS-SC can also send a message to the AMF (or SMF or UAS NF). Request message to obtain the UE's drone authorization status or flight status.
- SMS-SC can subscribe to AMF (or SMF or UDR or UDM) for services related to session status. For example, when the number of sessions corresponding to the UE's drone service changes, the AMF (or SMF or UDR or UDM) can notify SMS-SC of the number of sessions corresponding to the existing drone service of the UE, so that SMS-SC can determine whether the second session is a session corresponding to the first drone service initiated and established by the UE; Alternatively, the SMS-SC may also send a request message to the AMF (or SMF or UDR or UDM) to obtain the number of sessions corresponding to the UE's drone service, thereby determining whether the session initiated by the UE (i.e., the second session) is the first session to be established.
- AMF or SMF or UDR or UDM
- the SMS-SC can locally store the context information of the UE, which includes the drone authorization status and flight status of the UE. In this way, the SMS-SC can determine the drone status of the UE based on the locally stored context information of the UE. aircraft authorization status or flight status.
- the specific implementation process of S902 please refer to the relevant content of S401 and will not be repeated here.
- SMS-SC determines whether the second session belongs to a session corresponding to non-UAV services.
- S903 is an optional step.
- the SMS-SC may not send or suspend sending the eleventh message to the UE.
- the eleventh message is used to trigger the UE to request to establish or modify the second session.
- the SMS-SC may determine whether the second session belongs to a session corresponding to non-UAV services according to the tenth message.
- the tenth message may include one or more of the following information: UE type indication information, UAV ID, DNN, USS address information, USS ID, S-NSSAI identification, AF ID, or session service type, etc.
- SMS-SC can send a message to other devices (such as SMF or UDM or UDR) to request whether the second session belongs to a session corresponding to non-UAV services. (That is, obtaining from other devices whether the second session belongs to a session corresponding to non-UAV services).
- devices such as SMF or UDM or UDR
- the tenth message may include a UE identity (such as a general public subscription identifier (GPSI) or SUPI, UAV ID, etc.) and/or an AF identity.
- SMS-SC may determine the service type of the second session according to the UE identity and/or AF identity. For example, if the UE identity is a common terminal identity rather than a UAV identity (such as a UAV ID), the UE can determine that the second session belongs to a session corresponding to a non-UAV service.
- the UE may determine that the second session belongs to the session corresponding to the non-UAV service.
- the SMS-SC determines that the second session belongs to a session corresponding to the drone service, it executes the contents shown in S904 and S905; or, if the SMS-SC determines that the second session belongs to a session corresponding to the non-drone service, it executes the contents shown in S906. displayed content.
- the SMS-SC determines that the second session belongs to the session corresponding to the drone service and is ready to trigger the modification of the session to a session not corresponding to the drone service, then perform S906 content; or, if the SMS-SC determines that the second session belongs to a session corresponding to a non-UAV service, and is ready to trigger the modification of the session to a session corresponding to the UAV service, then execute the contents shown in S904 and S905.
- SMS-SC sends the eleventh message to the UE; accordingly, the UE receives the eleventh message from the SMS-SC.
- the second session belongs to a session corresponding to the drone service or is to be modified to a session corresponding to the drone service, and the SMS-SC may send an eleventh message to the UE.
- S905 The UE sends the twelfth message to SMF 1; accordingly, SMF 1 receives the twelfth message from the UE.
- the UE After receiving the eleventh message, the UE triggers the modification or establishment of the session corresponding to the drone service, and sends the twelfth message to SMF 1.
- the twelfth message is used to request the establishment or modification of the second session.
- SMS-SC does not or suspends sending the eleventh message to the UE.
- the second session belongs to a session corresponding to non-UAV services, and the SMS-SC does not or suspends sending the eleventh message to the UE.
- the SMS-SC can start the second timer.
- the SMS-SC does not send a message to The UE sends the eleventh message; or if the second condition is met during the running of the second timer, the SMS-SC sends the eleventh message to the UE.
- the second condition please refer to the relevant content in Figure 4 and will not be repeated here.
- the SMS-SC can determine that the first condition is met, and determine that the second session belongs to a non-UAV.
- the eleventh message is not sent or suspended to the UE, which avoids establishing or modifying a session corresponding to the non-UAV service, thereby reducing attackers' attacks on the UE using non-UAV services. , and to prevent non-drone businesses from encroaching on the resources of the drone business.
- Figure 10 is another schematic flowchart of a communication method provided by an embodiment of the present application.
- the first control plane process is the first authentication process.
- the first authentication process may be initiated by SEAF or AMF or UDM.
- the first device may be SEAF or AMF; or the first device may also be UDM, AUSF or ARPF.
- the third device may be SEAF or AMF.
- the method includes two implementation methods, one of which includes the content shown in steps S1002 to S1004, and the other implementation method includes the content shown in steps S1005 to S1009.
- S1001 SEAF determines to initiate the first authentication process.
- SEAF can initiate the first authentication process of the UE. For example, when the UE registers with the network for the first time or when SEAF does not store the UE's security context, SEAF can initiate the UE's first authentication process. For another example, SEAF can initiate the first authentication process of the UE periodically or aperiodically according to the network configuration. It should be understood that the embodiment of the present application does not limit the reason and time for SEAF to initiate the first authentication process.
- the steps performed by SEAF can also be performed by AMF.
- SEAF Before SEAF initiates the first authentication process, SEAF may perform the content shown in S1002 to S1004, or perform the content shown in S1005.
- S1002 SEAF determines that the UE is in flight state.
- SEAF can determine the status of the UE through AMF.
- One implementation method is that SEAF and AMF are merged and implemented in the same network function. AMF stores the status of the UE, so that SEAF can read the status of the UE.
- SEAF and AMF are independent network functions, and SEAF can obtain the status of the UE from AMF. For example, the SEAF may send a message to the AMF to request the status of the UE; after receiving the message, the AMF sends indication information to the SEAF to indicate that the UE is in the flight state or in the non-flight state.
- SEAF can subscribe to the AMF for the UE's status; when the UE's status is updated (such as the UE switching from flying state to non-flying state, or the UE switching from non-flying state to flying state), AMF can push the UE's status to SEAF. .
- the AMF can obtain the status of the UE, please refer to the relevant content in Figure 5, which will not be described again here.
- SEAF determines that the UE is in the flight state, it executes the content shown in S1003; if SEAF determines that the UE is in the non-flight state, it executes the first authentication process, such as sending a request (or notification) to UDM (or AUSF, or ARPF) for execution News about the first-time certification process.
- Figure 10 takes SEAF's determination that the UE is in the flight state as an example.
- Figure 10 takes SEAF determining that the UE is in the flight state as an example.
- S1002 can be replaced by SEAF determining that the first condition is met.
- S401 which will not be repeated here. Repeat.
- S1003 SEAF suspends or terminates the first certification process.
- SEAF may suspend or terminate the first authentication process.
- S1004 is an optional step.
- the SEAF may start a first timer and determine the status of the UE during the running of the first timer. For example, during the running of the timer, SEAF obtains the status of the UE from the AMF. For the specific implementation method, please refer to the content of S1002, which will not be described again here. If SEAF obtains from the AMF that the UE is in a non-flight state during the running of the first timer, SEAF can end the running of the first timer and prepare to initiate the first authentication process, such as sending a request to UDM (or AUSF, or ARPF) for ( or notification) message to perform the first authentication process.
- UDM or AUSF, or ARPF
- SEAF may terminate the first Authentication process, such as terminating the first authentication process when the first timer runs out.
- Figure 10 shows an example when the UE is in the flight state during the running of the first timer.
- SEAF sends the fourth message to UDM; accordingly, UDM receives the fourth message from SEAF.
- the fourth message may be, for example, an authenticate request message, but the name of the fourth message in this embodiment is not limited to this.
- the fourth message may be used to request (or notify) to perform the first authentication process.
- the steps performed by UDM can also be performed by AUSF or ARPF.
- UDM determines that the UE is in flight state.
- UDM can determine the status of the UE. For example, UDM can obtain the status of the UE from the AMF. For specific implementation methods, please refer to the description of SEAF obtaining the status of the UE from the AMF, which will not be described again here. If the UDM determines that the UE is in the flight state, the content shown in S1007 is executed; if the UDM determines that the UE is in the non-flight state, the first authentication process is executed, such as generating the authentication vector of the UE according to the fourth message, and executing step S1009.
- Figure 10 takes UDM as an example to determine that the UE is in the flight state.
- Figure 10 takes UDM determining that the UE is in the flight state as an example.
- S1006 can be replaced by UDM determining that the first condition is met.
- S401 please refer to S401, which will not be repeated here. Repeat.
- the UDM may suspend or terminate the first authentication process.
- S1008 is an optional step.
- the UDM can start the first timer and determine the status of the UE during the running of the first timer. Please refer to the relevant content of S1004 for the specific implementation process, which will not be described again here. If the UDM obtains from the AMF that the UE is in the non-flight state during the running of the first timer (or at the end of the running), the UDM can end the running of the first timer and perform the first authentication process.
- the UDM may terminate the first Authentication process, such as terminating the first authentication process when the first timer runs out.
- Figure 10 shows an example when the UE is in the flight state during the running of the first timer.
- timer started by SEAF in S1004 and the timer started by UDM in S1008 may be the same or different, and this is not limited in the embodiment of the present application.
- UDM sends the fifth message to SEAF; accordingly, SEAF receives the fifth message from UDM.
- the fifth message may be, for example, an authenticate response message, but the name of the fifth message in this embodiment is not limited to this.
- the fifth message may include the authentication vector described in step S1006.
- the fifth message may be used to indicate that the first authentication process is not performed.
- the fifth message may include the reason for not performing the first authentication process.
- the reason for not executing the first authentication process may be, for example, timeout, and/or the UE is in a flight state, etc.
- the first device before executing (or initiating) the first authentication process of the UE, can determine the status of the UE, and when determining that the UE is in the flight state, suspend or terminate the first authentication process of the UE, so that It can avoid problems such as an increase in the UE's power consumption due to the execution of the UE's first authentication process during the UE's flight, causing the UE's power to be exhausted in advance and unable to complete the flight mission. Furthermore, suspending or terminating the execution of the first authentication process can release the resources required to execute the first authentication process, thereby providing the flying UE with more usable resources for executing drone services.
- Figure 11 is another schematic flowchart of a communication method provided by an embodiment of the present application.
- the first control plane process is a de-registration process, which may be initiated by UDM or AMF.
- the first device may be a UDM; or the first device may also be an AMF.
- the third device may be a UDM.
- the method includes two implementation methods, one of which includes the content shown in steps S1102 to S1104, and the other implementation method includes the content shown in steps S1105 to S1109.
- steps S1101-S1105 are not executed.
- UDM determines to initiate the de-registration process.
- the UDM can initiate the de-registration process of the UE.
- UDM may determine to initiate the de-registration process of the UE based on operational requirements (such as changes in the UE's subscription information, the UE's subscription not supporting the current usage conditions, usage regions, etc.). It should be understood that the embodiment of the present application does not limit the reason and time for the UDM to initiate the de-registration process.
- the UDM may execute the content shown in S1102 to S1104, or execute the content shown in S1105.
- UDM determines that the UE is in flight state.
- UDM can determine the status of the UE. For example, UDM can obtain the status of the UE from the AMF or UDR. For the specific implementation process, please refer to the relevant content of SEAF obtaining the status of the UE from the AMF in Figure 10, which will not be described again here. If the UDM determines that the UE is in the flight state, the content shown in S1103 is executed; if the UDM determines that the UE is in the non-flight state, the de-registration process is executed, such as sending a message requesting (or notifying) the de-registration process to the AMF.
- Figure 11 uses UDM to determine that the UE is in the flight state as an example.
- Figure 11 takes UDM determining that the UE is in the flight state as an example.
- S1102 can be replaced by UDM determining that the first condition is met.
- S401 please refer to S401, which will not be repeated here. Repeat.
- S1103 UDM suspends or terminates the de-registration process.
- the UDM may suspend or terminate the de-registration process.
- S1104 During the running of the first timer, the UE is in the flight state, and the UDM terminates the de-registration process.
- S1104 is an optional step.
- the UDM can start the first timer and determine the status of the UE during the running of the first timer. Please refer to the relevant content of S1004 for the specific implementation process, which will not be described again here.
- the UDM obtains from the AMF that the UE is in the non-flight state during the running of the first timer, the UDM can end the running of the first timer and prepare to initiate the de-registration process, such as sending a request (or notification) to the AMF to execute the de-registration process. news.
- the UDM may terminate the de-registration process, as in the first timer running period.
- the de-registration process is terminated when a timer runs out.
- Figure 11 is an example when the UE is in the flight state during the running of the first timer.
- UDM sends the fourth message to AMF; accordingly, AMF receives the fourth message from UDM.
- the fourth message may be, for example, a deregistration notification message, but the name of the fourth message in this embodiment is not limited to this.
- the fourth message can be used to request (or notify) to perform the de-registration process.
- S1106 The AMF determines that the UE is in flight state.
- AMF can determine the status of the UE. Please refer to Figure 5 for the specific implementation process, which will not be described again here. If the AMF determines that the UE is in the flight state, it executes the content shown in S1107; if the AMF determines that the UE is in the non-flight state, it executes the de-registration process, for example, initiates the process of releasing all sessions of the UE. Optionally, the AMF may send a request message for deregistration to the UE. Figure 11 takes the AMF determining that the UE is in the flight state as an example.
- Figure 11 takes the AMF determining that the UE is in the flight state as an example.
- S1106 can be replaced by the AMF determining that the first condition is met.
- S401 please refer to S401, which will not be repeated here. Repeat.
- S1101-S1105 are not executed, but S1106 is executed.
- the AMF may be allowed based on operational or management requirements, the AMF is unable to support the UE, or the scheduled de-registration time has expired. It should be understood that the embodiment of the present application does not limit the reason and time for the AMF to initiate the de-registration process.
- S1107 AMF suspends or terminates the de-registration process.
- the AMF may suspend or terminate the de-registration process.
- S1108 is an optional step.
- the AMF can start the first timer and determine the status of the UE during the running of the first timer. Please refer to the relevant content of S1104 for the specific implementation process, which will not be described again here.
- the AMF may end running the first timer and execute the de-registration process.
- the AMF may terminate the de-registration process, such as terminating the de-registration process when the first timer runs.
- Figure 11 is an example when the UE is in the flight state during the running of the first timer.
- timer started by UDM in S1104 and the timer started by AMF in S1108 may be the same or different, and this is not limited in the embodiment of the present application.
- AMF sends the fifth message to UDM; accordingly, UDM receives the fifth message from AMF.
- the fifth message may be, for example, a deregistration notification response message, but the name of the fifth message in this embodiment is not limited to this. If the de-registration process is not executed, the fifth message may be used to indicate that the de-registration process is not executed. If the de-registration process is performed in S1106 (the UE is not in the flight state or does not meet the first condition), the fifth message may be used to confirm receipt of the fourth message.
- the fifth message may include the reason for not performing the de-registration process. The reason for not executing the de-registration process may be, for example, timeout and/or the UE is in a flight state, etc.
- the first device before executing (or initiating) the de-registration process of the UE, can determine the status of the UE, and when determining that the UE is in the flight state, suspend or terminate the de-registration process of the UE, so that It can be avoided that the connection between the UE and the mobile communication network is disconnected due to the completion of the UE's de-registration process while the UE is flying, causing the UE to be unable to communicate with the mobile communication network, making the UE unable to respond to the control instructions of the remote controller and unable to execute the drone.
- the suspension or termination of the de-registration process can release the resources required to execute the de-registration process, thereby providing the flying UE with more usable resources for executing drone services.
- FIG 12 is a schematic flowchart of yet another communication method provided by an embodiment of the present application.
- the first control The noodle making process is a slice authentication process.
- the slice authentication process can be initiated by AAA-S, or it can be initiated by DN, or it can be initiated by AMF.
- the first device may be NSSAAF; or the first device may also be AMF.
- the third device is AAA-S or DN; or, when the first device is AMF, the third device may be NSSAAF.
- the method when the slice authentication process is initiated by AAA-S (or DN), the method includes two implementations, one of which includes the content shown in steps S1203 to S1206, and the other implementation Including the contents shown in steps S1207 to S1212.
- the implementation When the slice authentication process is initiated by the AMF, the implementation includes the contents shown in steps S1208 to S1212.
- AAA-S determines to initiate the slice authentication process or the slice re-authentication process.
- Figure 12 takes the AAA-S determination and sending slice authentication process as an example.
- AAA-S can initiate the UE's slice authentication process.
- AAA-S may determine to initiate the UE's slice authentication process based on the AAA-S detecting an abnormality in the UE's slice usage.
- AAA-S may initiate the UE's slice authentication process periodically or aperiodically. It should be understood that the embodiment of the present application does not limit the reason and time for AAA-S to initiate the slice authentication process.
- AAA-S can also be performed by DN.
- AAA-S sends the fourth message to NSSAAF; accordingly, NSSAAF receives the fourth message from AAA-S.
- the fourth message may be, for example, an authentication request message or a re-authenticate request message, but the name of the fourth message in this embodiment is not limited to this.
- the fourth message may be used to request (or notify) to perform the slice authentication process.
- NSSAAF may execute the content shown in S1203 to S1206, or execute the content shown in S1207.
- NSSAAF determines that the UE is in flight state.
- NSSAAF can determine the status of the UE.
- NSSAAF can obtain the status of the UE from the AMF.
- the content shown in S1204 is executed; if the NSSAAF determines that the UE is in the non-flight state, the slice authentication process is executed, such as sending a message to the AMF for requesting (or notifying) the execution of the slice authentication process.
- Figure 12 takes NSSAAF’s determination that the UE is in flight status as an example.
- Figure 12 takes NSSAAF determining that the UE is in the flight state as an example.
- S1202 can be replaced by NSSAAF determining that the first condition is met.
- S401 please refer to S401, which will not be repeated here. Repeat.
- S1204 NSSAAF suspends or terminates the slice authentication process.
- NSSAAF may suspend or terminate the slice authentication process.
- S1205 During the running of the first timer, the UE is in the flight state, and NSSAAF terminates the slice authentication process.
- S1205 is an optional step.
- the NSSAAF can start the first timer and determine the status of the UE during the running of the first timer. Please refer to the relevant content of S1004 for the specific implementation process, which will not be described again here.
- the NSSAAF obtains from the AMF that the UE is in a non-flight state during the running of the first timer, the NSSAAF can end the running of the first timer and perform the slice authentication process, such as sending a request (or notification) to the AMF to perform the slice authentication process. information.
- NSSAAF may terminate the slice authentication process, as in the first timer running.
- the slice authentication process is terminated when a timer runs out.
- Figure 12 is an example when the UE is in the flight state during the running of the first timer.
- NSSAAF sends the fifth message to AAA-S; accordingly, AAA-S receives the fifth message from NSSAAF.
- the fifth message may be, for example, an authentication response or a re-authenticate response message, but the name of the fifth message in this embodiment of the application is not limited thereto.
- This fifth message may be used to indicate that the slice authentication process is not performed.
- the fifth message may include the reason for not performing the slice authentication process.
- the reason for not executing the slice authentication process may be, for example, timeout, and/or the UE is in a flight state, etc.
- NSSAAF sends the fourth message to AMF; accordingly, AMF receives the fourth message from NSSAAF.
- S1208 The AMF determines that the UE is in flight state.
- S1201-S1207 are not executed, but S1208 is executed directly.
- the AMF may determine that the UE needs to perform slice authentication based on the received registration request message of the UE, and thereby prepare to initiate slice authentication.
- the AMF determines that slice authentication needs to be initiated. It should be understood that the embodiment of the present application does not limit the reason and time for the AMF to initiate the slice authentication process.
- AMF can determine the status of the UE. Please refer to Figure 5 for the specific implementation process, which will not be described again here.
- the AMF determines that the UE is in the flight state, the content shown in S1209 is executed.
- AMF may send a response message of the fourth message to NSSAAF.
- the AMF may send a slice authentication message to the UE before sending the response message of the fourth message.
- the AMF can also send a slice authentication request message to AAA-S (via NSSAAF).
- Figure 12 does not show steps regarding performing slice authentication. And, Figure 12 takes the AMF determining that the UE is in the flight state as an example.
- Figure 12 takes the AMF determining that the UE is in the flight state as an example.
- S1208 can be replaced by the AMF determining that the first condition is met.
- S401 please refer to S401, which will not be repeated here. Repeat.
- S1209 AMF suspends or terminates the slice authentication process.
- the AMF may suspend or terminate the slice authentication process.
- S1210 is an optional step.
- the AMF can start the first timer and determine the status of the UE during the running of the first timer. Please refer to the relevant content of S1205 for the specific implementation process, which will not be described again here.
- the AMF may end running the first timer and perform the slice authentication process.
- the AMF may terminate the slice authentication process, such as terminating the slice authentication process when the first timer runs.
- Figure 12 is an example when the UE is in the flight state during the running of the first timer.
- timer started by NSSAAF in S1205 and the timer started by AMF in S1210 may be the same or different, and this is not limited in the embodiment of the present application.
- AMF sends the fifth message to NSSAAF; accordingly, NSSAAF receives the fifth message from AMF.
- NSSAAF sends the fifth message to AAA-S; accordingly, AAA-S receives the fifth message from NSSAAF.
- NSSAAF After receiving the fifth message, NSSAAF can forward the fifth message to AAA-S.
- AAA-S For details, please refer to the relevant description of S1206, which will not be described again here.
- the first device before executing the slice authentication process of the UE, can determine the status of the UE, and when it is determined that the UE is in the flight state, suspend or terminate the slice authentication process of the UE. This can avoid During flight, the UE's power consumption increases due to the execution of the UE's slice authentication process, causing the UE's power to be exhausted in advance and unable to complete the flight mission. In addition, the suspension or termination of the slice authentication process can release the resources required to execute the slice authentication process, thereby providing the flying UE with more usable resources for executing drone services.
- Figure 13 is another schematic flowchart of a communication method provided by an embodiment of the present application.
- the first control plane process is a secondary authentication process.
- the secondary authentication process may be initiated by AAA-S, or may be initiated by DN, or may be initiated by SMF.
- the first device is SMF, and the third device is AAA-S or DN.
- the method includes the following steps.
- AAA-S determines to initiate the secondary authentication process or the re-authentication process of the secondary authentication.
- AAA-S determines to initiate the secondary authentication process as an example.
- AAA-S can initiate the secondary authentication process of the UE.
- AAA-S may determine to initiate the secondary authentication process of the UE based on the AAA-S detecting an abnormality in the UE's session.
- AAA-S may initiate the secondary authentication process of the UE periodically or aperiodically. It should be understood that the embodiment of the present application does not limit the reason and time for AAA-S to initiate the secondary authentication process.
- AAA-S can also be performed by DN.
- AAA-S sends the fourth message to SMF; accordingly, SMF receives the fourth message from AAA-S.
- the fourth message may be, for example, a re-authenticate request (re-authenticate request) or an authentication request message, but the name of the fourth message in this embodiment is not limited to this.
- the fourth message may be used to request (or notify) to perform the secondary authentication process.
- the SMF determines that the UE is in flight state.
- SMF does not execute S1301-S1302, but directly initiates S1303.
- the SMF may determine that the UE needs to perform secondary authentication based on the received session establishment request message of the UE. It should be understood that the embodiment of the present application does not limit the reason and time for the SMF to initiate the secondary authentication process.
- SMF can determine the status of the UE.
- SMF can obtain the status of the UE from the AMF.
- the SMF determines that the UE is in the flight state, it executes the content shown in S1304; if the SMF determines that the UE is in the non-flight state, it executes the secondary authentication process (the secondary authentication process initiated by AAA-S) or initiates the secondary authentication process (AMF The secondary authentication process initiated), the secondary authentication process is not shown in Figure 13.
- Figure 13 takes SMF to determine that the UE is in the flight state as an example.
- Figure 13 takes the SMF to determine that the UE is in the flight state as an example.
- S1302 can be replaced by the SMF to determine that the first condition is met.
- S401 please refer to S401, which will not be repeated here. Repeat.
- S1304 SMF suspends or terminates the secondary authentication process.
- the SMF may suspend or terminate the secondary authentication process.
- S1305 is an optional step.
- the SMF can start the first timer. And determine the status of the UE during the running of the first timer. Please refer to the relevant content of S1004 for the specific implementation process, which will not be described again here.
- the SMF can end the running of the first timer and prepare to initiate the secondary authentication process, such as sending a request (or notification) to the AMF to perform the secondary authentication process. Information about the authentication process.
- the SMF may terminate the secondary authentication process, such as The secondary authentication process is terminated when the first timer runs out.
- Figure 13 is an example when the UE is in the flight state during the running of the first timer.
- S1306 SMF sends the fifth message to AAA-S; accordingly, AAA-S receives the fifth message from SMF.
- the fifth message may be, for example, a re-authenticate response message, but the name of the fifth message in this embodiment is not limited to this.
- the fifth message may be used to indicate that the secondary authentication process is not performed.
- the fifth message may include the reason for not performing the secondary authentication process.
- the reason for not performing the secondary authentication process may be, for example, timeout, and/or the UE is in a flight state, etc.
- the first device before executing the secondary authentication process of the UE, can determine the status of the UE, and when determining that the UE is in the flight state, suspend or terminate the secondary authentication process of the UE, which can avoid During the UE's flight, the power consumption of the UE increases due to the secondary authentication process of the UE, causing the UE's power to be exhausted in advance and unable to complete the flight mission.
- the suspension or termination of the secondary authentication process can release the resources required to execute the secondary authentication process, thereby providing the flying UE with more usable resources for executing drone services.
- the methods provided by the embodiments of the present application are introduced from the perspective of interaction between the first device and the second device.
- the first device or the second device may include a hardware structure and/or a software module to implement the above-mentioned functions in the form of a hardware structure, a software module, or a hardware structure plus a software module. Each function.
- FIG. 14 shows a schematic structural diagram of a communication device 1400.
- the communication device 1400 can correspondingly implement the functions or steps implemented by the first device or the second device in each of the above method embodiments.
- the communication device may include a processing unit 1401 and a transceiver unit 1402.
- the communication device 1400 may also include a storage unit (not shown in FIG. 14), which may be used to store instructions (code or programs) and/or data.
- the processing unit 1401 and the transceiver unit 1402 can be coupled with the storage unit.
- the processing unit 1401 can read the instructions (code or program) and/or data in the storage unit to implement the corresponding method.
- Each of the above units can be set up independently or partially or fully integrated.
- the transceiver unit 1402 may include a sending unit and a receiving unit.
- the communication device 1400 can implement the functions or steps implemented by the first device in each of the above method embodiments.
- the processing unit 1401 is used to determine that the first condition is met, and the first condition includes one or more of the following conditions: the terminal device is authorized for the drone service, and the terminal device initiates the establishment of the first A session corresponding to the drone service, or the terminal device is in a flight state; and, restricting the non-drone business of the terminal device and/or restricting the first control plane process of the terminal device, wherein the third A control plane process is not a process exclusive to the drone business.
- the processing unit 1401 when restricting non-UAV services of the terminal device, the processing unit 1401 may be used to:
- the first device is a first session management function device that releases all or part of the sessions corresponding to the non-UAV services managed by the first device, and/or prohibits the establishment or modification of the non-UAV services.
- the session corresponding to the business is a first session management function device that releases all or part of the sessions corresponding to the non-UAV services managed by the first device, and/or prohibits the establishment or modification of the non-UAV services.
- the first device is a short message service center and does not send or suspends sending the first message to the terminal device, where the first message is used to request the establishment or modification of a session corresponding to the non-UAV service.
- the first device is the terminal device and does not send or suspends sending the first message to the first session management function device.
- the first message is used to request the establishment or modification of the session corresponding to the non-UAV service. .
- the transceiver unit 1402 is configured to receive a second message from the terminal device, where the second message is used to request the establishment of a first session; And, the processing unit 1401 is further configured to determine, according to the second message, that the first session belongs to the session corresponding to the drone service.
- the transceiver unit 1402 is further configured to: send a third message to the second device, where the third message is used to request restriction of the non-UAV service of the terminal device.
- the transceiver unit 1402 is further configured to receive first instruction information from the second device, where the first instruction information is used to instruct the release of one or more of the non-UAVs.
- the processing unit 1401 is specifically configured to: release one or more sessions corresponding to the non-UAV services according to the first instruction information.
- the first device restricting the non-UAV services of the terminal device includes the first device releasing all or part of the non-UAV services managed by the first device.
- Sessions corresponding to the service the processing unit 1401 is further configured to: determine that N is greater than M, where N is the number of sessions corresponding to the non-UAV service managed by the first device, and M is the number of sessions corresponding to the non-UAV service managed by the first device.
- the H is a positive integer greater than or equal to (N-M).
- the transceiver unit 1402 when restricting non-UAV services of the terminal device, is configured to send second instruction information to the terminal device, the second instruction information indicating that the establishment of all Describe the sessions corresponding to non-drone services.
- the first control plane process includes one or more of a first authentication process, a de-registration process, a slice authentication process or a secondary authentication process.
- the processing unit 1401 when restricting the first control plane process of the terminal device, is configured to suspend or terminate the first control plane process.
- the processing unit 1401 is further configured to: start a first timer; determine that during the running of the first timer The terminal device satisfies the first condition; and the first control plane process is terminated when the first timer ends.
- the transceiving unit 1402 is further configured to receive a fourth message from a third device, where the fourth message is used to request execution of the first control plane process; and, to the third device The device sends a fifth message, where the fifth message includes the reason for not performing the first control process.
- the transceiver unit 1402 when it is determined that the terminal device is in the flight state, is configured to receive third indication information from the access and mobility management function device, where the third indication information indicates that the terminal The device is in flight mode.
- the transceiver unit 1402 is further configured to send a sixth message to the access and mobility management function network element, wherein, the sixth message is used to obtain the status of the terminal device, and the status of the terminal device includes a flight state or/and a non-flight state.
- the first device is an access and mobility management function device; when it is determined that the terminal device is in the flight state, the transceiver unit 1402 is configured to receive fourth indication information from the fourth device, The fourth indication information is used to indicate that the terminal device is in a flight state; or, the processing unit 1401 is configured to determine that the terminal device is in a flight state based on the movement information of the terminal device and/or the flight information of the terminal device. Flight status.
- the first device is the terminal device; when it is determined that the terminal device is in the flight state, the processing unit 1401 is configured to determine based on the movement information and/or the fifth indication information from the application layer In the flight state, the fifth indication information instructs the terminal device to enter the flight mode.
- the processing unit 1401 is further configured to determine that a second condition is met, wherein the second condition includes one or more of the following conditions: the terminal device is revoked and the unmanned The drone service is authorized, the terminal device is not authorized for the drone service, the drone service of the terminal device is deregistered, or the terminal device releases the last drone service corresponding to Conversation;
- the first device is a first session management function device.
- the transceiver unit 1402 is further configured to receive the seventh message from the terminal device, and the processing unit 1401 is further configured to establish or modify the seventh message according to the seventh message.
- a session corresponding to non-UAV services wherein the seventh message is used to request the establishment or modification of a session corresponding to non-UAV services;
- the first device is a short message service center
- the transceiver unit 1402 is further configured to send an eighth message to the terminal device, where the eighth message is used to request the establishment or modification of the non-UAV service correspondence. conversation;
- the first device is the terminal device, and the transceiver unit 1402 is further configured to send an eighth message to the first session management function device, where the eighth message is used to request the establishment or modification of the non-UAV service. corresponding session.
- the processing unit 1401 is further configured to determine that a second condition is met, wherein the second condition includes one or more of the following conditions: the terminal device is revoked and the unmanned The drone service is authorized, the terminal device is not authorized for the drone service, the drone service of the terminal device is deregistered, or the terminal device releases the last drone service corresponding to Session; transceiver unit 1402, further configured to receive a fourth message from a third device, the fourth message being used to request execution of the first control plane process; processing unit 1401, further configured to execute the first control plane process process.
- the communication device 1400 can implement the functions or steps implemented by the second device in each of the above method embodiments.
- the transceiver unit 1402 is configured to receive a message from the first session management function device requesting restriction of non-UAV services of the terminal device.
- the processing unit 1401 is configured to determine, according to the message, that the second session management function device manages a session corresponding to the non-UAV service of the terminal device.
- the transceiver unit 1402 is further configured to send instruction information to the second session management function device, where the instruction information is used to instruct the release of all or part of the non-UAV services managed by the second session management function device.
- the corresponding session and/or indicates that establishment or modification of the session corresponding to the non-UAV business is prohibited.
- the transceiver unit 1402 is further configured to send first instruction information to the first session management function device, where the first instruction information is used to instruct the release of one or more non-UAV services. corresponding session.
- the transceiving unit 1402 is further configured to receive information from the first session management function.
- N is the number of sessions corresponding to the non-UAV business managed by the first session management function device;
- the processing unit 1401 is further configured to be configured according to the The number of sessions corresponding to the non-UAV service, the N and M, determine that the first session management function device needs to release one or more sessions corresponding to the non-UAV service, wherein the M is the number of sessions corresponding to the non-UAV service that the terminal device allows to be established at the first session management function device when executing the UAV service.
- FIG. 15 shows a communication device 1500 provided by an embodiment of the present application.
- the communication device 1500 may be a first device capable of realizing the functions of the first device in the method provided by an embodiment of the present application.
- the communication device 1500 may be The second device can realize the functions of the second device in the method provided by the embodiments of this application; or, the communication device 1500 can also be a device that can support the first device to realize the corresponding functions in the method provided by the embodiments of this application, or can A device that supports the second device to implement the corresponding function in the method provided by the embodiment of the present application.
- the communication device 1500 may be a chip system. In the embodiments of this application, the chip system may be composed of chips, or may include chips and other discrete devices.
- the communication device 1500 includes at least one processor 1520, which is used to implement or support the communication device 1500 to implement the functions of the first device or the second device in the method provided by the embodiment of the present application. For details, please refer to the detailed description in the method example and will not be repeated here.
- the communication device 1500 may also include at least one memory 1530 for storing program instructions and/or data.
- Memory 1530 and processor 1520 are coupled.
- the coupling in the embodiment of this application is an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information interaction between devices, units or modules.
- the processor 1520 may cooperate with the memory 1530.
- the processor 1520 may execute program instructions and/or data stored in the memory 1530, so that the communication device 1500 implements the corresponding method.
- At least one of the at least one memory may be included in the processor.
- the memory 1530 may exist independently, such as an off-chip memory, and is connected to the processor 1520 through a communication bus (indicated by a thick line 1540 in Figure 15).
- the memory 1530 may also be integrated with the processor 1520.
- the communication device 1500 may also include a communication interface 1510 for communicating with other devices through a transmission medium, so that the devices used in the communication device 1500 can communicate with other devices.
- a communication interface 1510 for communicating with other devices through a transmission medium, so that the devices used in the communication device 1500 can communicate with other devices.
- Processor 1520 may utilize communication interface 1510 to send and receive data.
- the communication interface 1510 may specifically be a transceiver.
- the above-mentioned transceiver unit 1402 may be a transceiver, and the transceiver is integrated in the communication device 1500 to form the communication interface 1510.
- connection medium between the communication interface 1510, the processor 1520 and the memory 1530 is not limited in the embodiment of the present application.
- the memory 1530, the processor 1520 and the communication interface 1510 are connected through the communication bus 1540.
- the connection methods between other components are only schematically illustrated and are not limiting.
- the communication bus 1540 can be divided into an address bus, a data bus, a control bus, etc. For ease of presentation, only one thick line is used in Figure 15, but it does not mean that there is only one communication bus or one type of communication bus.
- the processor 1520 may be a general processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which can be implemented Or execute the disclosed methods, steps and logical block diagrams in the embodiments of this application.
- general purpose processor It can be a microprocessor or any conventional processor, etc.
- the steps of the methods disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware processor, or executed by a combination of hardware and software modules in the processor.
- the memory 1530 can be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or it can also be a volatile memory (volatile memory), For example, random-access memory (RAM).
- Memory is, but is not limited to, any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
- the memory in the embodiment of the present application can also be a circuit or any other device capable of realizing a storage function, used to store program instructions and/or data.
- An embodiment of the present application also provides a communication system.
- the communication system includes a first device and/or a second device.
- An embodiment of the present application also provides a computer-readable storage medium, which includes instructions that, when run on a computer, cause the computer to execute the methods in each of the above embodiments.
- An embodiment of the present application also provides a computer program product, which includes instructions that, when run on a computer, cause the computer to execute the methods in each of the above embodiments.
- Embodiments of the present application provide a chip system, which includes a processor and may also include a memory for implementing the functions of the first device or the second device in the foregoing method.
- the chip system can be composed of chips or include chips and other discrete devices.
- the size of the sequence numbers of the above-mentioned processes does not mean the order of execution.
- the execution order of each process should be determined by its functions and internal logic, and should not be used in the embodiments of the present application.
- the implementation process constitutes any limitation.
- the disclosed systems, devices and methods can be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
- the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
- the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
- the technical solution of this application is essentially The part that has made technical contributions or the part of the technical solution can be embodied in the form of a software product.
- the computer software product is stored in a storage medium and includes a number of instructions to enable a computer device (which can be a personal computer, server , or network equipment, etc.) perform all or part of the steps of the methods described in various embodiments of this application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (51)
- 一种通信方法,其特征在于,所述方法包括:第一设备确定满足第一条件,所述第一条件包括如下条件中的一种或多种:终端设备被授权无人机业务,所述终端设备发起建立第一个所述无人机业务对应的会话,或者所述终端设备处于飞行状态;所述第一设备限制所述终端设备的非无人机业务和/或限制所述终端设备的第一控制面流程,其中,所述第一控制面流程不是所述无人机业务专有的流程。
- 根据权利要求1所述的方法,其特征在于,所述第一设备限制所述终端设备的非无人机业务,包括:所述第一设备是第一会话管理功能设备,所述第一设备释放所述第一设备管理的全部或部分的所述非无人机业务对应的会话,和/或禁止建立或禁止修改所述非无人机业务对应的会话;或者,所述第一设备是短消息业务服务中心,所述第一设备不向或暂停向所述终端设备发送第一消息,所述第一消息用于请求建立或修改所述非无人机业务对应的会话;或者,所述第一设备是所述终端设备,所述第一设备不向或暂停向第一会话管理功能设备发送第一消息,所述第一消息用于请求建立或修改所述非无人机业务对应的会话。
- 根据权利要求1或2所述的方法,其特征在于,若所述第一设备确定所述终端设备被授权所述无人机业务,和/或所述终端设备处于飞行状态;在所述第一设备限制所述终端设备的非无人机业务和/或限制所述第一控制面流程之前,所述方法还包括:所述第一设备接收来自所述终端设备的第二消息,所述第二消息用于请求建立第一会话;所述第一设备根据所述第二消息,确定所述第一会话属于所述无人机业务对应的会话。
- 根据权利要求1至3中所述的方法,其特征在于,所述方法还包括:所述第一设备向第二设备发送第三消息,所述第三消息用于请求限制所述终端设备的所述非无人机业务。
- 根据权利要求4所述的方法,其特征在于,所述方法还包括:所述第一设备接收来自所述第二设备的第一指示信息,所述第一指示信息用于指示释放一个或多个所述非无人机业务对应的会话;所述第一设备限制所述终端设备的非无人机业务,包括:所述第一设备根据所述第一指示信息释放一个或多个所述非无人机业务对应的会话。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述第一设备限制所述终端设备的非无人机业务包括所述第一设备释放所述第一设备管理的全部或部分的所述非无人机业务对应的会话,所述方法还包括:所述第一设备确定N大于M,其中,所述N是所述第一设备所管理的所述非无人机业务对应的会话的数量,所述M是所述终端设备在执行所述无人机业务时允许在所述第一设备处建立的所述非无人机业务对应的会话的数量;所述第一设备确定释放H个所述非无人机业务对应的会话,所述H为大于或等于(N-M)的正整数。
- 根据权利要求1至6中任一项所述的方法,其特征在于,所述第一设备限制所述终端设备的非无人机业务,包括:所述第一设备向所述终端设备发送第二指示信息,所述第二指示信息指示禁止建立所述非无人机业务对应的会话。
- 根据权利要求1至7中任一项所述的方法,其特征在于,所述第一控制面流程包括首次认证流程、去注册流程、切片认证流程或二次认证流程中的一项或多项。
- 根据权利要求8所述的方法,其特征在于,所述第一设备限制所述终端设备的第一控制面流程,包括:所述第一设备暂停或终止所述第一控制面流程。
- 根据权利要求9所述的方法,其特征在于,在所述第一设备暂停所述第一控制面流程之后,所述方法还包括:所述第一设备启动第一计时器;所述第一设备确定在所述第一计时器的运行期间所述终端设备满足所述第一条件;所述第一设备在所述第一计时器运行结束时终止所述第一控制面流程。
- 根据权利要求9或10所述的方法,其特征在于,所述方法还包括:所述第一设备接收来自第三设备的第四消息,所述第四消息用于请求执行所述第一控制面流程;所述第一设备向所述第三设备发送第五消息,所述第五消息包括不进行所述第一控制流程的原因。
- 根据权利要求1至11中任一项所述的方法,其特征在于,所述第一设备确定终端设备处于飞行状态,包括:所述第一设备接收来自接入与移动性管理功能设备的第三指示信息,所述第三指示信息指示所述终端设备处于飞行状态。
- 根据权利要求12所述的方法,其特征在于,所述方法还包括:所述第一设备向所述接入与移动性管理功能网元发送第六消息,其中,所述第六消息用于获取所述终端设备的状态,所述终端设备的状态包括飞行状态或/和非飞行状态。
- 根据权利要求1至11中任一项所述的方法,其特征在于,所述第一设备为接入与移动性管理功能设备;所述第一设备确定终端设备处于飞行状态,包括:所述第一设备接收来自第四设备的第四指示信息,所述第四指示信息用于指示所述终端设备处于飞行状态;或者,所述第一设备根据所述终端设备的移动信息和/或所述终端设备的飞行信息,确定所述终端设备处于飞行状态。
- 根据权利要求1至11中任一项所述的方法,其特征在于,所述第一设备为所述终端设备;所述第一设备确定终端设备处于飞行状态,包括:所述第一设备根据移动信息和/或来自应用层的第五指示信息确定处于飞行状态,其中,所述第五指示信息指示所述终端设备进入飞行模式。
- 根据权利要求1至15中任一项所述的方法,其特征在于,所述方法还包括:所述第一设备确定满足第二条件,其中,所述第二条件包括如下条件中的一种或多种: 所述终端设备被撤销所述无人机业务的授权,所述终端设备不被授权所述无人机业务,所述终端设备的所述无人机业务被去注册,或者所述终端设备释放最后一个所述无人机业务对应的会话;所述第一设备是第一会话管理功能设备,所述第一设备接收来自所述终端设备的第七消息,并根据所述第七消息建立或修改所述非无人机业务对应的会话,其中,所述第七消息用于请求建立或修改所述非无人机业务对应的会话;或者,所述第一设备是短消息业务服务中心,所述第一设备向所述终端设备发送第八消息,所述第八消息用于请求建立或修改所述非无人机业务对应的会话;或者,所述第一设备是所述终端设备,所述第一设备向第一会话管理功能设备发送第八消息,所述第八消息用于请求建立或修改所述非无人机业务对应的会话。
- 根据权利要求1至16中任一项所述的方法,其特征在于,所述方法还包括:所述第一设备确定满足第二条件,其中,所述第二条件包括如下条件中的一种或多种:所述终端设备被撤销所述无人机业务的授权,所述终端设备不被授权所述无人机业务,所述终端设备的所述无人机业务被去注册,或者所述终端设备释放最后一个所述无人机业务对应的会话;所述第一设备接收来自第三设备的第四消息,所述第四消息用于请求执行所述第一控制面流程;所述第一设备执行所述第一控制面流程。
- 一种通信方法,其特征在于,包括:第二设备接收来自第一设备的用于请求限制所述终端设备的非无人机业务的消息,所述第一设备为第一会话管理功能设备;所述第二设备根据所述消息,确定第二会话管理功能设备管理有所述终端设备的非无人机业务对应的会话;所述第二设备向所述第二会话管理功能设备发送指示信息,其中,所述指示信息用于指示释放所述第二会话管理功能设备管理的全部或部分所述非无人机业务对应的会话,和/或指示禁止建立或禁止修改所述非无人机业务对应的会话。
- 根据权利要求18所述的方法,其特征在于,所述方法还包括:所述第二设备向所述第一会话管理功能设备发送第一指示信息,所述第一指示信息用于指示释放一个或多个非无人机业务对应的会话。
- 根据权利要求19所述的方法,其特征在于,所述方法还包括:所述第二设备接收来自所述第一会话管理功能设备的N,其中,所述N是所述第一会话管理功能设备所管理的所述非无人机业务对应的会话的数量;所述第二设备根据所述终端设备已建立的所述非无人机业务对应的会话的数量,所述N和M,确定所述第一会话管理功能设备需要释放一个或多个所述非无人机业务对应的会话,其中,所述M是所述终端设备在执行所述无人机业务时允许在所述第一会话管理功能设备处建立的所述非无人机业务对应的会话的数量。
- 一种通信装置,其特征在于,包括处理单元和收发单元;其中,所述处理单元,用于确定满足第一条件,所述第一条件包括如下条件中的一种或多种:终端设备被授权无人机业务,所述终端设备发起建立第一个所述无人机业务对应的会话,或者所述终端设备处于飞行状态;以及,限制所述终端设备的非无人机业务和/ 或限制所述终端设备的第一控制面流程,其中,所述第一控制面流程不是所述无人机业务专有的流程;所述收发单元,用于执行所述通信装置的接收和发送。
- 根据权利要求21所述的装置,其特征在于,在限制所述终端设备的非无人机业务时:所述通信装置是第一会话管理功能设备,所述处理单元具体用于:释放所述通信装置管理的全部或部分的所述非无人机业务对应的会话,和/或禁止建立或禁止修改所述非无人机业务对应的会话;或者,所述通信装置是短消息业务服务中心,所述收发单元具体用于:不向或暂停向所述终端设备发送第一消息,所述第一消息用于请求建立或修改所述非无人机业务对应的会话;或者,所述通信装置是所述终端设备,所述收发单元具体用于:不向或暂停向第一会话管理功能设备发送第一消息,所述第一消息用于请求建立或修改所述非无人机业务对应的会话。
- 根据权利要求21或22所述的装置,其特征在于,若确定所述终端设备被授权所述无人机业务,和/或所述终端设备处于飞行状态;在限制所述终端设备的非无人机业务和/或限制所述第一控制面流程之前,所述收发单元还用于:接收来自所述终端设备的第二消息,所述第二消息用于请求建立第一会话;所述处理单元还用于:根据所述第二消息,确定所述第一会话属于所述无人机业务对应的会话。
- 根据权利要求21至23中所述的装置,其特征在于,所述收发单元还用于:向第二设备发送第三消息,所述第三消息用于请求限制所述终端设备的所述非无人机业务。
- 根据权利要求24所述的装置,其特征在于,所述收发单元还用于:接收来自所述第二设备的第一指示信息,所述第一指示信息用于指示释放一个或多个所述非无人机业务对应的会话;在限制所述终端设备的非无人机业务时,所述处理单元具体用于:根据所述第一指示信息释放一个或多个所述非无人机业务对应的会话。
- 根据权利要求21至24中任一项所述的装置,其特征在于,所述限制所述终端设备的非无人机业务包括释放所述通信装置管理的全部或部分的所述非无人机业务对应的会话,所述处理单元还用于:确定N大于M,其中,所述N是所述通信装置所管理的所述非无人机业务对应的会话的数量,所述M是所述终端设备在执行所述无人机业务时允许在所述通信装置处建立的所述非无人机业务对应的会话的数量;确定释放H个所述非无人机业务对应的会话,所述H为大于或等于(N-M)的正整数。
- 根据权利要求21至26中任一项所述的装置,其特征在于,在限制所述终端设备的非无人机业务时,所述收发单元用于:向所述终端设备发送第二指示信息,所述第二指示信息指示禁止建立所述非无人机业务对应的会话。
- 根据权利要求21至27中任一项所述的装置,其特征在于,所述第一控制面流程包括首次认证流程、去注册流程、切片认证流程或二次认证流程中的一项或多项。
- 根据权利要求28所述的装置,其特征在于,在限制所述终端设备的第一控制面流程时,所述处理单元具体用于:暂停或终止所述第一控制面流程。
- 根据权利要求29所述的装置,其特征在于,在暂停所述第一控制面流程之后,所述处理单元还用于:启动第一计时器;确定在所述第一计时器的运行期间所述终端设备满足所述第一条件;在所述第一计时器运行结束时终止所述第一控制面流程。
- 根据权利要求29或30所述的装置,其特征在于,所述收发单元还用于:接收来自第三设备的第四消息,所述第四消息用于请求执行所述第一控制面流程;向所述第三设备发送第五消息,所述第五消息包括不进行所述第一控制流程的原因。
- 根据权利要求21至31中任一项所述的装置,其特征在于,在确定终端设备处于飞行状态时,所述收发单还元用于:接收来自接入与移动性管理功能设备的第三指示信息,所述第三指示信息指示所述终端设备处于飞行状态。
- 根据权利要求32所述的装置,其特征在于,所述收发单元还用于:向所述接入与移动性管理功能网元发送第六消息,其中,所述第六消息用于获取所述终端设备的状态,所述终端设备的状态包括飞行状态或/和非飞行状态。
- 根据权利要求21至31中任一项所述的装置,其特征在于,所述通信装置为接入与移动性管理功能设备;在确定终端设备处于飞行状态时:所述收发单元用于接收来自第四设备的第四指示信息,所述第四指示信息用于指示所述终端设备处于飞行状态;或者,所述处理单元用于根据所述终端设备的移动信息和/或所述终端设备的飞行信息,确定所述终端设备处于飞行状态。
- 根据权利要求21至31中任一项所述的装置,其特征在于,所述通信装置为所述终端设备;在确定终端设备处于飞行状态时,所述处理单元具体用于:根据移动信息和/或来自应用层的第五指示信息确定处于飞行状态,其中,所述第五指示信息指示所述终端设备进入飞行模式。
- 根据权利要求21至35中任一项所述的装置,其特征在于,所述处理单元还用于:确定满足第二条件,其中,所述第二条件包括如下条件中的一种或多种:所述终端设备被撤销所述无人机业务的授权,所述终端设备不被授权所述无人机业务,所述终端设备的所述无人机业务被去注册,或者所述终端设备释放最后一个所述无人机业务对应的会话;所述通信装置是第一会话管理功能设备,所述收发单元还用于接收来自所述终端设备的第七消息,并根据所述第七消息建立或修改所述非无人机业务对应的会话,其中,所述第七消息用于请求建立或修改所述非无人机业务对应的会话;或者,所述通信装置是短消息业务服务中心,所述收发单元还用于向所述终端设备发送第八消息,所述第八消息用于请求建立或修改所述非无人机业务对应的会话;或者,所述通信装置是所述终端设备,所述收发单元还用于向第一会话管理功能设备发送第 八消息,所述第八消息用于请求建立或修改所述非无人机业务对应的会话。
- 根据权利要求21至36中任一项所述的装置,其特征在于,所述处理单元还用于:确定满足第二条件,其中,所述第二条件包括如下条件中的一种或多种:所述终端设备被撤销所述无人机业务的授权,所述终端设备不被授权所述无人机业务,所述终端设备的所述无人机业务被去注册,或者所述终端设备释放最后一个所述无人机业务对应的会话;所述收发单元还用于接收来自第三设备的第四消息,所述第四消息用于请求执行所述第一控制面流程;所述处理单元还用于执行所述第一控制面流程。
- 一种通信装置,其特征在于,包括处理单元和收发单元;其中,所述收发单元,用于接收来自第一会话管理功能设备的用于请求限制所述终端设备的非无人机业务的消息;所述处理单元,用于根据所述消息,确定第二会话管理功能设备管理有所述终端设备的非无人机业务对应的会话;所述收发单元,还用于向所述第二会话管理功能设备发送指示信息,其中,所述指示信息用于指示释放所述第二会话管理功能设备管理的全部或部分所述非无人机业务对应的会话,和/或指示禁止建立或禁止修改所述非无人机业务对应的会话。
- 根据权利要求38所述的装置,其特征在于,所述收发单元还用于:向所述第一会话管理功能设备发送第一指示信息,所述第一指示信息用于指示释放一个或多个非无人机业务对应的会话。
- 根据权利要求39所述的装置,其特征在于,所述收发单元还用于:接收来自所述第一会话管理功能设备的N,其中,所述N是所述第一会话管理功能设备所管理的所述非无人机业务对应的会话的数量;所述处理单元,还用于根据所述终端设备已建立的所述非无人机业务对应的会话的数量,所述N和M,确定所述第一会话管理功能设备需要释放一个或多个所述非无人机业务对应的会话,其中,所述M是所述终端设备在执行所述无人机业务时允许在所述第一会话管理功能设备处建立的所述非无人机业务对应的会话的数量。
- 一种通信装置,其特征在于,包括一个或多个处理器和存储器,所述一个或多个处理器与所述存储器耦合;所述存储器,用于存储计算机程序;所述一个或多个处理器,用于执行所述存储器中存储的计算机程序,以使得所述通信装置执行如权利要求1至17中任一项所述的方法,或执行如权利要求18至20中任一项所述的方法。
- 一种芯片,其特征在于,所述芯片与存储器耦合,用于读取并执行所述存储器中存储的程序指令,以执行如权利要求1至17中任一项所述的方法,或者执行如权利要求18至20中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,包括程序或指令,当所述程序或指令在计算机上运行时,执行如权利要求1至17中任一项所述的方法,或者执行如权利要求18至20中任一项所述的方法。
- 一种通信系统,其特征在于,包括用于执行如权利要求1至17中任一项所述方法的第一设备,和/或,包括用于执行如权利要求18至20中任一项所述方法的第二设备。
- 一种计算机程序产品,其特征在于,包括程序或指令,当所述程序或指令在计算机上运行时,如权利要求1至17中任一项所述的方法被执行,或者如权利要求18至20中任一项所述的方法被执行。
- 一种通信方法,其特征在于,所述方法包括:第一设备确定满足第一条件,限制终端设备的非无人机业务和/或限制终端设备的第一控制面流程,以及向第二设备发送第三消息,其中,所述第一控制面流程不是所述无人机业务专有的流程,所述第三消息用于请求限制所述终端设备的所述非无人机业务,所述第一条件包括如下条件中的一种或多种:所述终端设备被授权无人机业务,所述终端设备发起建立第一个所述无人机业务对应的会话,或者所述终端设备处于飞行状态;所述第二设备接收所述第三消息,向第二会话管理功能设备发送指示信息;其中,所述第二会话管理功能设备是根据所述第三消息确定的用于管理所述终端设备的非无人机业务对应的会话的设备。
- 根据权利要求46所述的方法,其特征在于,所述方法还包括:所述第二会话管理功能设备接收所述指示信息,根据所述指示信息释放所述第二会话管理功能设备管理的全部或部分所述非无人机业务对应的会话,和/或禁止建立或禁止修改所述非无人机业务对应的会话。
- 一种通信方法,其特征在于,所述方法包括:第二设备接收来自第一设备的第三消息,所述第三消息用于请求限制所述终端设备的所述非无人机业务;所述第二设备根据所述第三消息,确定第二会话管理功能设备管理有所述终端设备的非无人机业务对应的会话,以及向所述第二会话管理功能设备发送指示信息;所述第二会话管理功能设备接收所述指示信息,根据所述指示信息释放所述第二会话管理功能设备管理的全部或部分所述非无人机业务对应的会话,和/或禁止建立或禁止修改所述非无人机业务对应的会话。
- 一种通信系统,其特征在于,所述系统包括第一设备和第二设备,其中,所述第一设备用于:确定满足第一条件,限制终端设备的非无人机业务和/或限制终端设备的第一控制面流程,以及向第二设备发送第三消息,其中,所述第一控制面流程不是所述无人机业务专有的流程,所述第三消息用于请求限制所述终端设备的所述非无人机业务,所述第一条件包括如下条件中的一种或多种:所述终端设备被授权无人机业务,所述终端设备发起建立第一个所述无人机业务对应的会话,或者所述终端设备处于飞行状态;所述第二设备用于:接收所述第三消息,向第二会话管理功能设备发送指示信息;其中,所述第二会话管理功能设备是根据所述第三消息确定的用于管理所述终端设备的非无人机业务对应的会话的设备。
- 根据权利要求49所述的系统,其特征在于,所述系统还包括:所述第二会话管理功能设备,用于:接收所述指示信息,根据所述指示信息释放所述第二会话管理功能设备管理的全部或部分所述非无人机业务对应的会话,和/或禁止建立或禁止修改所述非无人机业务对应的会话。
- 一种通信系统,其特征在于,所述系统包括第二设备和第二会话管理功能设备,其 中,所述第二设备用于:接收来自第一设备的第三消息,所述第三消息用于请求限制所述终端设备的所述非无人机业务;根据所述第三消息,确定所述第二会话管理功能设备管理有所述终端设备的非无人机业务对应的会话,以及向所述第二会话管理功能设备发送指示信息;所述第二会话管理功能设备用于:接收所述指示信息;根据所述指示信息释放所述第二会话管理功能设备管理的全部或部分所述非无人机业务对应的会话,和/或禁止建立或禁止修改所述非无人机业务对应的会话。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP23829964.8A EP4539525A4 (en) | 2022-06-28 | 2023-06-14 | COMMUNICATION METHOD AND DEVICE |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210752034.0 | 2022-06-28 | ||
CN202210752034.0A CN117354804A (zh) | 2022-06-28 | 2022-06-28 | 一种通信方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024001782A1 true WO2024001782A1 (zh) | 2024-01-04 |
Family
ID=89361929
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/100183 WO2024001782A1 (zh) | 2022-06-28 | 2023-06-14 | 一种通信方法及装置 |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4539525A4 (zh) |
CN (1) | CN117354804A (zh) |
WO (1) | WO2024001782A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104281154A (zh) * | 2014-10-17 | 2015-01-14 | 中国电子科技集团公司第二十七研究所 | 一种可控功耗的无人机飞行控制系统及方法 |
CN108614577A (zh) * | 2018-05-30 | 2018-10-02 | 中国联合网络通信集团有限公司 | 无人机的信息传输方法与装置 |
KR20190131337A (ko) * | 2018-05-16 | 2019-11-26 | 한양대학교 산학협력단 | 인지 무선 통신 기반의 중계 장치 및 이를 포함하는 무인 항공기와, 상기 무인 항공기를 이용한 인지 무선 통신 기반의 중계 방법 |
CN110673640A (zh) * | 2019-10-21 | 2020-01-10 | 深圳市道通智能航空技术有限公司 | 一种无人机控制方法、装置、设备和存储介质 |
CN113676936A (zh) * | 2020-05-15 | 2021-11-19 | 华为技术有限公司 | 一种异常行为无人机的处理方法、网元、系统及存储介质 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602735B (zh) * | 2018-06-13 | 2021-06-29 | 华为技术有限公司 | 一种受限服务的提供方法及通信设备 |
WO2021196185A1 (zh) * | 2020-04-03 | 2021-10-07 | Oppo广东移动通信有限公司 | 无线通信方法、终端设备和网络设备 |
EP4136777A1 (en) * | 2020-04-17 | 2023-02-22 | Telefonaktiebolaget LM ERICSSON (PUBL) | A method of and an unmanned aerial vehicle for acting upon a restriction in services for the uav, a uav control server and a base station |
-
2022
- 2022-06-28 CN CN202210752034.0A patent/CN117354804A/zh active Pending
-
2023
- 2023-06-14 EP EP23829964.8A patent/EP4539525A4/en active Pending
- 2023-06-14 WO PCT/CN2023/100183 patent/WO2024001782A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104281154A (zh) * | 2014-10-17 | 2015-01-14 | 中国电子科技集团公司第二十七研究所 | 一种可控功耗的无人机飞行控制系统及方法 |
KR20190131337A (ko) * | 2018-05-16 | 2019-11-26 | 한양대학교 산학협력단 | 인지 무선 통신 기반의 중계 장치 및 이를 포함하는 무인 항공기와, 상기 무인 항공기를 이용한 인지 무선 통신 기반의 중계 방법 |
CN108614577A (zh) * | 2018-05-30 | 2018-10-02 | 中国联合网络通信集团有限公司 | 无人机的信息传输方法与装置 |
CN110673640A (zh) * | 2019-10-21 | 2020-01-10 | 深圳市道通智能航空技术有限公司 | 一种无人机控制方法、装置、设备和存储介质 |
CN113676936A (zh) * | 2020-05-15 | 2021-11-19 | 华为技术有限公司 | 一种异常行为无人机的处理方法、网元、系统及存储介质 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4539525A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP4539525A4 (en) | 2025-05-07 |
CN117354804A (zh) | 2024-01-05 |
EP4539525A1 (en) | 2025-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4305877B1 (en) | Mobility in non-public networks | |
US20240073848A1 (en) | Network Slice in a Wireless Network | |
EP4082291B1 (en) | Uplink data indication | |
US20240015630A1 (en) | Routing Between Networks Based on Identifiers | |
US20230328821A1 (en) | Modifying PDU Sessions In Underlay Networks | |
US20230319685A1 (en) | Access Restriction of Wireless Device | |
US20240298253A1 (en) | Network Slice for Access of Wireless Device to a Network | |
US20230354463A1 (en) | State Transition of Wireless Device | |
US20240129794A1 (en) | Network Congestion Control | |
US20240022952A1 (en) | Resource Allocation in Non-Public Network | |
US12335833B2 (en) | Emergency service | |
US20240381081A1 (en) | Alternative Slice Authentication | |
US20240129793A1 (en) | Network Overload Control | |
US20250184279A1 (en) | Data Unit Discard Report | |
US20240298229A1 (en) | Change of Serving Node | |
WO2024001782A1 (zh) | 一种通信方法及装置 | |
EP4535846A1 (en) | Communication method and apparatus | |
US20250220431A1 (en) | Security Negotiation | |
WO2022206296A1 (zh) | 一种会话控制的方法、装置和系统 | |
WO2024060894A1 (zh) | 一种通信方法及装置 | |
WO2024102238A1 (en) | Media data delivery | |
WO2024097090A1 (en) | Media data reporting | |
WO2024254163A1 (en) | Admission control of wireless device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23829964 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2024575161 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202517000526 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023829964 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2023829964 Country of ref document: EP Effective date: 20250107 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 202517000526 Country of ref document: IN |
|
WWP | Wipo information: published in national office |
Ref document number: 2023829964 Country of ref document: EP |