WO2024037512A1 - Procédés et appareils d'accès au réseau, terminal, et dispositif de communication - Google Patents

Procédés et appareils d'accès au réseau, terminal, et dispositif de communication Download PDF

Info

Publication number
WO2024037512A1
WO2024037512A1 PCT/CN2023/113010 CN2023113010W WO2024037512A1 WO 2024037512 A1 WO2024037512 A1 WO 2024037512A1 CN 2023113010 W CN2023113010 W CN 2023113010W WO 2024037512 A1 WO2024037512 A1 WO 2024037512A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
information
network
selection policy
policy information
Prior art date
Application number
PCT/CN2023/113010
Other languages
English (en)
Chinese (zh)
Inventor
于航
康艳超
张鹏飞
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024037512A1 publication Critical patent/WO2024037512A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a network access method, device, terminal and communication equipment.
  • the network-side device configures the slices that the terminal is allowed to use in the current network for the terminal.
  • the slice that the terminal expects to activate and use it is possible that the terminal is unavailable in the current network, which will cause the terminal to be unable to use the slice and thus be unable to use the corresponding services of the slice.
  • Embodiments of the present application provide a network access method, device, terminal and communication equipment, which can solve the problem of the terminal being unable to use services corresponding to certain slices.
  • the first aspect provides a network access method, including:
  • the terminal receives network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the terminal performs network access based on the network selection policy information.
  • a network access method including:
  • the first communication device sends network selection policy information to the terminal, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the network selection policy information is used for the terminal to access the network.
  • a terminal includes the network access device, and the device includes:
  • a first receiving module configured to receive network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • An access module configured to perform network access based on the network selection policy information.
  • a network access device in a fourth aspect, includes the first communication device, and the device includes:
  • a first sending module configured to send network selection policy information to the terminal, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the network selection policy information is used for the terminal to access the network.
  • a terminal in a fifth aspect, includes a processor and a memory, and the memory stores information that can be stored in the A program or instructions running on a processor, which when executed by the processor implement the steps of the method described in the first aspect.
  • a terminal including a processor and a communication interface, wherein the communication interface is used to receive network selection policy information, and the network selection policy information indicates at least one network used to provide target slicing services, so The target slice is a slice that the terminal expects to query and/or use; and the processor is configured to perform network access based on the network selection policy information.
  • a communication device is provided.
  • the communication device is a first communication device.
  • the communication device includes a processor and a memory.
  • the memory stores a program or instructions that can be run on the processor.
  • the program or The instructions when executed by the processor, implement the steps of the method of the second aspect.
  • a communication device is provided.
  • the communication device is a first communication device and includes a processor and a communication interface.
  • the communication interface is used to send network selection strategy information to a terminal, and the network selection strategy information indication is used to At least one network that provides a target slice service, and the target slice is a slice that the terminal desires to query and/or use; wherein the network selection policy information is used for network access by the terminal.
  • a ninth aspect provides a network access system, including: a terminal and a first communication device.
  • the terminal can be used to perform the steps of the network access method as described in the first aspect.
  • the first communication device can be used to Perform the steps of the network access method described in the second aspect.
  • a readable storage medium In a tenth aspect, a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the second aspect.
  • a chip in an eleventh aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. method, or implement a method as described in the second aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement as described in the first aspect the steps of the method, or implement the method as described in the second aspect.
  • the terminal receives network selection policy information, the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the terminal performs network access based on the network selection policy information. In this way, the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • Figure 1 is a block diagram of a wireless communication system applicable to the embodiment of the present application.
  • Figure 2 is a flow chart of a network access method provided by an embodiment of the present application.
  • Figure 3 is a flow chart of another network access method provided by an embodiment of the present application.
  • Figure 4 is a flow chart of another network access method provided by an embodiment of the present application.
  • Figure 5 is a flow chart of another network access method provided by an embodiment of the present application.
  • Figure 6 is a flow chart of another network access method provided by an embodiment of the present application.
  • Figure 7 is a schematic diagram of the format of an information element provided by an embodiment of the present application.
  • Figure 8 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 9 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 10 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 11 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 12 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 13 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 14 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 15 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 16 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 17 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 18 is a structural diagram of a network access device provided by an embodiment of the present application.
  • Figure 19 is a structural diagram of another network access device provided by an embodiment of the present application.
  • Figure 20 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 21 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • Figure 22 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • MID mobile Internet Device
  • AR augmented reality
  • VR virtual reality
  • robots wearable devices
  • WUE Vehicle User Equipment
  • PUE Pedestrian User Equipment
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • game consoles personal computers (personal computer, PC), teller machine or self-service machine and other terminal-side devices.
  • Wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets) bracelets, smart anklets, etc.), smart wristbands, smart clothing, etc.
  • the network side device 12 may include an access network device or a core network device, where the access network device may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a wireless access network unit.
  • Access network equipment may include a base station, a Wireless Local Area Network (WLAN) access point or a WiFi node, etc.
  • WLAN Wireless Local Area Network
  • the base station may be called a Node B, an Evolved Node B (eNB), an access point, a base transceiver station ( Base Transceiver Station (BTS), radio base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), home B-node, home evolved B-node, transmitting and receiving point ( Transmitting Receiving Point (TRP) or some other appropriate terminology in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only in the NR system The base station is introduced as an example, and the specific type of base station is not limited.
  • Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), centralized network configuration ( Centralized network configuration (CNC), Network Repository Function (NRF), Network Exposure Function (NEF), Local NEF (Local NEF, or L-NEF), Binding Support Function (Binding Support Function, BSF), application function (Application Function, AF), etc.
  • MME mobility management entities
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • PCF Policy Control Function
  • the UE will send a registration request message to the network side, and the UE will report the requested slice (for example, the requested (requested) Network Slice Selection Assistance Information (NSSAI)) to the network, requested NSSAI contains one or more single-Network Slice Selection Assistance Information (NSSAI).
  • the network determines whether to provide services for the requested S-NSSAI based on the UE contract status and current network conditions. If the requested S-NSSAI can be served, the S-NSSAI will be placed in the allowed (allowed) NSSAI and replied to the UE; if the requested NSSAI cannot be served, the S-NSSAI will be placed in the rejected (rejected) Reply to UE in NSSAI.
  • the network side will also be unable to serve.
  • the slice is put into the extended rejected NSSAI and returned to the UE.
  • Figure 2 is a flow chart of a network access method provided by an embodiment of the present application. As shown in Figure 2, the network access method includes the following steps:
  • Step 101 The terminal receives network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal desires to query and/or use.
  • the network selection policy information may also be called roaming network selection information, or slice-based roaming network selection information, or roaming network selection policy information, or slice-based roaming network selection policy information, and so on.
  • the terminal receives the network selection policy information, which may be that the terminal receives the network selection policy information sent by the first communication device or the second communication device.
  • the terminal receives the network selection policy information, which may be: the terminal receives the network selection policy information associated with the target slice.
  • the terminal receives the network selection policy information.
  • the terminal may receive the network selection policy information associated with the target slice sent by the first communication device.
  • the network selection policy information is carried in a downlink (DL) non-access-stratum (NAS) transmission message or a registration acceptance message.
  • DL downlink
  • NAS non-access-stratum
  • the network selection policy information is transmitted in a manner of encapsulating it in a container for transparent transmission.
  • the network selection policy information is carried in a Steering of Roaming (SOR) transmission container for transparent transmission.
  • SOR Steering of Roaming
  • Step 102 The terminal performs network access based on the network selection policy information.
  • the terminal may perform network access based on at least one network indicated by the network selection policy information.
  • the network selection policy information may include the identification of one or more public land mobile networks (Public Land Mobile Network, PLMN) used to provide the target slice service, and the terminal may select a PLMN from the one or more PLMNs.
  • Network access; and/or, the network selection policy information may include network priority information of the at least one network, and the terminal may select a network from the at least one network for access based on the network priority information; and/or, network selection
  • the policy information may include a network access type, and the terminal may select a network from the at least one network to perform network access according to the network access type; and so on.
  • the network side will allow slices to provide services in the current network.
  • slices that the UE wants to activate and use if they are available in neighboring or other networks but are not available in the current network, in related technologies, The current network will not provide it to the terminal.
  • the slice that the UE wants to activate and use it is available in neighboring or other networks.
  • the relevant mechanism does not support the network to tell the terminal which network is available and other information.
  • the terminal receives the network selection policy information and performs network access based on the network selection policy information, so that the UE supports transferring to a network that can provide services for registration and attempts to activate the service.
  • Embodiments of the present application provide a network that notifies terminals of slice-based network selection policy information to solve the problem that terminals cannot flexibly register to corresponding networks according to business requirements.
  • the embodiments of the present application solve the problem that the current network cannot provide slices in other networks for terminals, allowing the terminal to more flexibly select slices according to the business, and access appropriate networks and services.
  • the terminal receives network selection policy information, the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the terminal performs network access based on the network selection policy information. In this way, the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • the method before the terminal receives the network selection policy information, the method further includes:
  • the terminal sends a first message to the first communication device, where the first message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first communication device may be a first core network device. Specifically, the first communication device may be a first core network device in a network where the current terminal is located. By way of example, the first communication device may be an AMF.
  • the first message may also include slice information of the target slice.
  • the target slice may be one or more slices requested by the terminal.
  • the first message may be a registration request message.
  • the location information of the terminal may include a cell (Cell) identifier (Identifier, ID), a tracking area identifier (Tracking Area Identity, TAI), or a UE location (location).
  • the UE location is represented by the location services (Location Services, LCS) architecture. Obtain the geographical location of the UE.
  • LCS Location Services
  • the first indication information may be a slice-based SoR support indication (Slice-based SoR support indication), which may be used to indicate whether the terminal supports network selection policy information.
  • Slice-based SoR support indication Slice-based SoR support indication
  • the first communication device may perform a first operation, and the first operation includes at least one of the following: determining whether the terminal supports network selection based on the policy information Perform network access; when the message sent by the terminal does not carry the target slice and none of the subscribed slices of the terminal can provide services, trigger the second communication device to provide the network selection policy information to the terminal ; When the terminal carries the target slice and the requested slices are all rejected slices, that is, if the current network cannot provide services for the slices requested by the terminal, the second core network device is triggered Provide the network selection policy information to the terminal. Therefore, the first communication device can trigger the second communication device to provide the network selection policy information to the terminal based on the received first message.
  • the terminal sends the first message to the first communication device, so that the first communication device can determine the network used to provide the target slicing service for the terminal based on the location information of the terminal in the first message; the first communication device can determine based on the location information of the terminal in the first message; The first indication information in the first message determines whether the terminal supports network access based on network selection policy information, thereby determining whether to provide the terminal with network selection policy information.
  • the network selection policy information includes at least one of the following:
  • Radio Access Technology (RAT)
  • the terminal identification (for example, UE ID) may be used to represent the identification of the terminal to which the network selection policy information applies.
  • the identity of the PLMN used to provide the target slice service may include the identities of one or more PLMNs.
  • the slice information of the target slice may include NSSAI.
  • the network priority information may be used to represent the priority of at least one network and/or the priority of slices under the network. For example, the network priority information includes: for the same slice, the priorities corresponding to different networks. The higher the priority, the terminal will preferentially select the network for access.
  • the network access type may include 3GPP access type (access type) or non-3GPP (non-3GPP) access type, etc.
  • Radio access technology can include access technologies such as NR, LTE or Universal Terrestrial Radio Access Network (UTRAN).
  • the validity time information of the network selection policy information may include the validity time of the network selection policy information, or the validity period of the network selection policy information, or the validity period of the network selection policy information.
  • the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
  • an indication may be added to the 5G mobility management capability information element, and the new indication may be used to carry the first indication information.
  • the new indication may be slice-based SoR support (SBSS).
  • SBSS slice-based SoR support
  • the terminal When the value of the first indication information is the first preset value, the terminal is instructed not to support network access based on the network selection policy information; when the value of the first indication information is the second preset value, the terminal is instructed to support network access based on the network selection policy information.
  • the network selection policy information is used for network access. For example, when the value of the first indication information is 0, it indicates that the terminal does not support network access based on the network selection policy information; when the value of the first indication information is 1, it indicates that the terminal supports network access based on the network selection policy information. Use the following information to access the network.
  • the first indication information may be carried in a target information element, and the target information element may be an existing information element other than the 5G mobility management capability information element, or the target information element may be a newly added information element.
  • the target information element can be a new IE, and the new IE is a slice-based SOR container (Slice-based SOR container) IE.
  • the terminal performs network access based on the network selection policy information, including:
  • the terminal In the case where the terminal desires to use the target slice to access the network and/or establish a session, and the target slice belongs to the rejected slice corresponding to the terminal, the terminal performs the following operations:
  • the terminal When the terminal detects that the network selection policy information includes the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access.
  • the PLMN corresponding to the target slice may be a slice available under the PLMN to which the target slice belongs.
  • the terminal may select a PLMN for network access based on the network priority information.
  • the terminal may select a PLMN for network access according to a preset selection rule (for example, the first one is selected by default).
  • the terminal may perform a re-selection process.
  • the terminal when the terminal desires to use the target slice to access the network and/or establish a session, and the target slice belongs to the rejection slice corresponding to the terminal, if the terminal detects the selected If the network policy information includes the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access, so that the PLMN accessed by the terminal can provide the target slice for the terminal. Serve.
  • the terminal when the terminal detects that the network selection policy information includes slice information of the target slice, the terminal selects a PLMN corresponding to the target slice in the network selection policy information.
  • the method also includes:
  • the terminal detects whether the network selection policy information includes the slice information of the target slice.
  • the validity time information corresponding to the network selection policy information may include the validity period of the network selection policy information.
  • the terminal may perform a re-selection process.
  • the terminal when the terminal detects that the network selection policy information satisfies the valid time information corresponding to the network selection policy information, the terminal detects whether the network selection policy information includes the target slice. slice information, so that network access can be performed based on the network selection policy information when the network selection policy information is in a valid state.
  • the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access, including:
  • the terminal Information selects PLMN for network access.
  • the network priority information may include the priorities of one or more PLMNs in the network selection policy information, and the terminal may select the PLMN with the highest priority in the network selection policy information for network access.
  • the terminal when the network selection policy information includes network priority information, the terminal selects a PLMN for network access based on the network priority information. In this way, the terminal can select a higher priority PLMN. Perform network access.
  • the network priority information includes PLMN identification priority and access technology identification priority.
  • the network priority information can be carried in the PLMN ID and access technology list (PLMN ID and access technology list).
  • the priority of PLMN ID and access technology identifier can be expressed in descending order in the PLMN ID and access technology list.
  • the PLMN ID and access technology list includes PLMN ID. There are a total of n PLMN IDs from 1 to PLMN ID n, PLMN ID 1 indicates the highest priority, and PLMN ID n indicates the lowest priority.
  • the terminal can select the PLMN corresponding to the PLMN ID with the highest priority for network access.
  • the method before the terminal receives the network selection policy information, the method further includes:
  • the terminal sends a second message to the first communication device, where the second message is used to query the network selection policy information.
  • the terminal receives the network selection policy information, which may be: the terminal receives the network selection policy information sent by the first communication device.
  • the terminal sends a second message to the first communication device, and the second message is used to query the network selection policy information, so that the first communication device can provide the terminal with the query based on the terminal's query.
  • Network selection strategy information is used to query the network selection policy information, so that the first communication device can provide the terminal with the query based on the terminal's query.
  • the terminal sends a second message to the first communication device, including:
  • the terminal When the first condition is met, the terminal sends a second message to the first communication device;
  • the first condition includes at least one of the following:
  • the target slice belongs to the rejected slice corresponding to the terminal
  • the target slice does not belong to the configuration slice of the terminal
  • the first communication device indicates to the terminal that the target slice is not supported
  • the terminal desires to use the target slice.
  • the first condition may include that the target slice belongs to the rejection slice corresponding to the terminal, and the timer associated with the target slice is not 0.
  • a timer is associated with each slice that is a rejected slice. When the value of the timer is 0, the slice's status as a rejected slice is invalid; when the timer value is not 0, the slice's status as a rejected slice is valid. . For example, if the value of the timer is 0 or an invalid value (eg, a negative value), the terminal will not treat the slice as a rejected slice.
  • the target slice does not belong to the configuration slice of the terminal. It may be that the target slice is not in the configuration slice of the terminal.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the location information of the terminal may include Cell ID, or TAI, or UE location (location).
  • the UE location represents the geographical location of the UE obtained through the LCS architecture.
  • the first message identifier may be a query indication of network selection policy information (for example, Slice-based SOR information), used to indicate that the current message is used to query the network selection policy information on the network side.
  • the second message may be an uplink (UL) NAS TRANSPORT message or a registration request (registration request) message.
  • UL uplink
  • registration request registration request
  • the terminal can inform the network side of the slice that it expects to query and/or use; through the location information of the terminal in the second message, it can facilitate the network side according to the terminal's location information.
  • the location information provides the terminal with network selection strategy information; through the first message identifier in the second message, the terminal can inform the network side that the second message is used to query the network selection strategy information; through the first indication information in the second message , the terminal can inform the network side whether it supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element may be a new information element, and the new information element used to carry the first message identifier may be named the first SOR container information element. Other names may also be set, for example, based on slices. SOR container information element (Slice-based SOR container), etc., this embodiment does not limit this.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the terminal receives network selection policy information, including:
  • the terminal receives the network selection policy information sent by the first communication device through the third message;
  • the method also includes:
  • the terminal performs an integrity check on the third message, and performs a target operation based on the integrity check result.
  • the third message may include network selection policy information.
  • the terminal receives the network selection policy information sent by the first communication device through the third message, the terminal performs an integrity check on the third message, and performs the target operation based on the integrity check result. In this way, the terminal can complete the A sex check determines whether the third message is complete.
  • performing the target operation based on the integrity check result includes at least one of the following:
  • the terminal sends a message to the first communication device.
  • Prepare to send a confirmation message the confirmation message being used to indicate confirmation of receipt of the network selection policy information;
  • the terminal stores the network selection policy information in the third message; or, when the integrity check result indicates that the third message is complete In the case of , the terminal updates the stored network selection policy information based on the network selection policy information in the third message;
  • the terminal discards the network selection policy information in the third message.
  • the terminal when the integrity check result indicates that the third message is complete, and the third message indicates that the terminal needs to reply a confirmation message to the first communication device, the terminal sends a confirmation message to the first communication device.
  • the communications device sends a confirmation message.
  • the confirmation message can be a UL NAS transmission message or a registration completion message.
  • the method also includes:
  • the terminal When the network selection policy information is updated, the terminal receives a fourth message sent by the first communication device, and the fourth message carries the updated network selection policy information.
  • the fourth message may be a configuration update command message.
  • the terminal receives the network selection policy information. It may be that the terminal receives the network selection policy information sent by the first communication device.
  • the terminal when the network selection policy information is updated, the terminal receives a fourth message sent by the first communication device, and the fourth message carries the updated network selection policy information, so that the terminal can Network access is performed based on the updated network selection policy information.
  • the method further includes:
  • the terminal sends a fifth message to the first communication device, where the fifth message is used to indicate confirmation of receipt of the updated network selection policy information.
  • the fifth message may be a configuration update complete message.
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, a PLMN identification and access technology list, and slice information of at least one of the target slices.
  • the second SOR container information element can be a new information element, and the new information element used to carry network selection policy information can be named the second SOR container information element.
  • Other names can also be set, for example, based on slices.
  • SOR container information element (Slice-based SOR container), etc., this embodiment does not limit this.
  • the second container value includes at least one slice-based SOR element field (Slice-based SOR element).
  • PLMN logo The PLMN ID and access technology list includes a total of n PLMN IDs from PLMN ID 1 to PLMN ID n, PLMN ID 1 indicates the highest priority, and PLMN ID n indicates the lowest priority.
  • the PLMN ID and access technology list carries at least 0 PLMN ID and access technology identifier combinations and at most 16 PLMN ID and access technology identifier combinations.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • the second indication information may be newly added indication information in the SOR transmission container information element, and may be SBS, for example.
  • the second indication information may be used to indicate that the SOR transmission container information element carries the network selection policy information, or to indicate that the SOR transmission container information element does not carry the network selection policy information. For example, when the value of the second indication information is the third preset value, the SOR transmission container information element is instructed to carry the network selection policy information; when the value of the second indication information is the fourth preset value, Indicate that the SOR transmission container information element does not carry the network selection policy information.
  • the SOR transmission container information element when the value of the second indication information is 1, it indicates that the SOR transmission container information element carries the network selection policy information; when the value of the second indication information is 0, it indicates that the SOR transmission container information element carries the network selection policy information. does not carry the network selection policy information.
  • Figure 3 is a flow chart of a network access method provided by an embodiment of the present application. As shown in Figure 3, the network access method includes the following steps:
  • Step 201 The first communication device sends network selection policy information to the terminal, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the network selection policy information is used for the terminal to access the network.
  • the method before the first communication device sends the network selection policy information to the terminal, the method further includes:
  • the first communication device receives a first message sent by the terminal, and the first message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the method further includes:
  • the first communication device performs a first operation, and the first operation includes at least one of the following:
  • the second communication device When the first message carries the target slice, and the target slice belongs to the rejection slice corresponding to the terminal, the second communication device is triggered to provide the network selection policy information to the terminal.
  • the network selection policy information includes at least one of the following:
  • Radio access technology RAT Radio access technology
  • the method before the first communication device sends the network selection policy information to the terminal, the method further includes:
  • the first communication device receives a second message sent by the terminal, and the second message is used to query the network selection policy information.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the method further includes:
  • the first communication device sends a query message to the second communication device based on the second message, where the query message is used to query the network selection policy information.
  • the method also includes:
  • the first communication device When the network selection policy information is updated, the first communication device sends a fourth message to the terminal, where the fourth message carries the updated network selection policy information.
  • the method further includes:
  • the first communication device receives a fifth message sent by the terminal, where the fifth message is used to indicate confirmation of receipt of the updated network selection policy information.
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, a PLMN identification and access technology list, and slice information of at least one of the target slices.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • this embodiment is an implementation of the first communication device corresponding to the embodiment shown in Figure 2.
  • the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • the network side actively informs the terminal of the network selection strategy information, and the network side sends the network selection strategy information to the terminal (UE) through the network registration process.
  • the first communication device is the first core network device
  • the second communication device is the second core network device
  • the first core network device is the Visited Public Land Mobile Network (VPLMN) AMF
  • the second core network device It is the local public land mobile network (Home Public Land Mobile Network, HPLMN) UDM or roaming guidance application server (Steering of Roaming application function, SoR-AF).
  • the specific process is as follows:
  • Step (1) The terminal sends the first message to the first core network device
  • the first message contains at least one of the following:
  • Requested NSSAI used to indicate slices requested by one or more terminals
  • the location information of the UE includes the cell (Cell) identifier (Identifier, ID) or the tracking area identifier (Tracking Area Identity, TAI) or the UE location (location).
  • the UE location represents the location through location services (Location Services, LCS). ) The geographical location of the UE obtained by the architecture;
  • Slice-based SoR support indication (Slice-based SoR support indication) is used to indicate that the terminal supports network selection policy information.
  • One implementation method is to express it in the 5G mobility management capability (5GMM capability) information element.
  • 5GMM capability 5G mobility management capability
  • the first message may be a registration request message.
  • Step (2) After receiving the first message, the first core network device performs a first operation.
  • the first operation includes at least one of the following:
  • the requested slice is placed in the slice rejection message and sent to the terminal;
  • the first core network device triggers the second core network device to provide network selection to the terminal.
  • the first core network device Triggering the second core network device to provide the network selection policy information to the terminal;
  • the first core network device does not need to trigger the second core network device to provide network selection policy information to the terminal; when the second core network device confirms that it can When providing services for the slice requested by the terminal, the first core network device does not need to trigger the second core network device to provide network selection policy information to the terminal.
  • the network selection policy information includes at least one of the following:
  • UE ID indicating the identification of the terminal to which the network selection policy information applies
  • Public Land Mobile Network Public Land Mobile Network, PLMN ID list (list), including the identification of one or more public access networks. This is mainly information about other VPLMNs for terminals to use available slices when accessing;
  • NSSAI represents one or more slices available under the identity of each public access network
  • Network priority information represents the priority information of slices under the network
  • Access type indicating access type (Access type);
  • RAT Random Access Technology
  • the validity time information of the network selection policy information indicates the validity period of the current network selection policy information
  • Step (3) The first core network device sends a third message to the terminal, where the third message includes at least one of the following:
  • Allowed NSSAI indicating the slices accepted by the network side
  • One way to implement network selection policy information is to carry it to the terminal in the SOR TRANSPORT container.
  • the third message may be a registration accept message.
  • Step (4) After the terminal receives the third message, if the third message indicates that the terminal needs to reply a confirmation message to the first core network device, the terminal sends a confirmation message to the first core network device. Send a confirmation message (such as a registration complete message), which is used to confirm to the first core network device that the terminal has received the network selection policy information.
  • a confirmation message such as a registration complete message
  • Step (5) After receiving the network selection policy information, the terminal performs the second operation under the following conditions:
  • the network expects to use the target slice to access the network and/or establish a session, and the target slice belongs to the current network Rejecting the slice, the terminal performs the following actions:
  • the terminal checks whether the network selection policy information is within the validity period, and if it is within the validity period, performs subsequent operations; otherwise, the terminal performs a re-selection process;
  • the terminal selects a PLMN applicable to the target slice and attempts to initiate a network access process.
  • the terminal will preferentially access the PLMN network with higher network priority.
  • the terminal can follow the PLMN sequence in Embodiment 5. Sequential selection, that is, selecting the PLMN network for access in byte order and priority from high to low.
  • the first core network device after receiving the terminal's request, provides the terminal with slice-based network selection policy information according to network deployment.
  • the terminal actively inquires the network side for network selection policy information, and the network side sends the network selection policy information to the terminal through non-access stratum (Non-Access-Stratum, NAS) transmission (TRANSPORT) or registration process.
  • the first communication device is the first core network device
  • the second communication device is the second core network device
  • the first core network device is VPLMN AMF
  • the second core network device is HPLMN UDM or SoR-AF.
  • the specific process is as follows:
  • Steps (1)-(4) The terminal performs a registration operation with the first core network device and the second core network device, and the registration process is used to establish a service connection between the terminal and the network.
  • This embodiment is similar to Embodiment 1, except that steps (5)-(9) are actively triggered by the terminal to inquire about network selection policy information.
  • the network side may or may not issue the network selection policy information.
  • the terminal supports an active query function to actively ask the network side to select a network. Policy information.
  • Steps (5)-(6) Due to business requirements or user active selection, the target slice that the terminal expects to use is temporarily unavailable in the current network, then the terminal sends a second message to the first core network device, The second message may be used to query the network for network selection policy information associated with the target slice.
  • the target slice being temporarily unavailable in the current network includes at least one of the following situations:
  • the target slice belongs to the rejected slice of the terminal, and the associated timer is not 0;
  • the target slice is not in the configuration slice of the terminal
  • the first core network device informs the terminal in the third message that the current network does not support the target slice.
  • the second message includes at least one of the following:
  • Target slice used to represent the slice information that the terminal expects to use
  • the location information of the terminal including Cell ID and/or TAI and/or UE location, which refers to the geographical location of the UE obtained by the LCS architecture;
  • Query indication of network selection policy information (for example, Slice-based SOR information), used to indicate that the current message is used Query the network selection policy information associated with the target slice on the network side;
  • Requested NSSAI used to indicate one or more slices requested by the terminal
  • Slice-based SoR support indication is used to indicate that the terminal supports network selection policy information.
  • One implementation method is to express it in 5GMM capability.
  • the second message may be a UL NAS TRANSPORT message or a registration request (registration request) message.
  • the query instructions for the network selection policy information can be represented in a container (container).
  • the visited network is transparently transmitted, and only the network elements of the main network (for example, Access Management Function (AMF)) or unified database management
  • the network element Unified Data Management, UDM can be viewed.
  • the container can be an existing payload container or a new container.
  • Step (7) After receiving the second message from the terminal, the first core network device queries the second core network device for network selection policy information associated with the target slice.
  • the first core network device may encapsulate the second message in a container and transmit it transparently to the second core network device under the main network.
  • the second core network device under the main network replies the network selection policy information to the first core network device
  • the first core network device encapsulates the network selection policy information in a container and transmits it transparently to the terminal .
  • Step (8) The first core network device sends a third message to the terminal, where the third message is used to carry the network selection policy information.
  • the third message may be a downlink (DL) NAS TRANSPORT message or a registration accept (registration accept) message.
  • the network selection policy information can be represented in a container. It is transparently transmitted to the visited network and only the network elements of the main network (for example, AMF or UDM) can view it.
  • the container can be an existing payload container. It can also be a newly added container;
  • Step (9) After the terminal receives the third message, the terminal performs the following operations:
  • the terminal sends a confirmation message to the first core network device, and the confirmation message is used to Confirm to the network side that the terminal has received the network selection policy information.
  • the confirmation message can be a UL NAS transmission message or a registration completion message;
  • the terminal saves or updates the network selection policy information stored in the maintenance entity (Maintenance Entity, ME). ;
  • the terminal discards the network selection policy information in the third message
  • the terminal treats the current PLMN as a low-priority network.
  • the terminal actively queries the first core network device for slice-based network selection policy information based on service requirements.
  • the first communication device is a first core network device
  • the second communication device is a second core network device
  • the first core network device is VPLMN AMF
  • the second core network device is HPLMN UDM or SoR-AF.
  • the update of the network selection policy information is triggered by the network side.
  • Step (1) The network side triggers the terminal to update the network selection policy information of the VPLM slice.
  • Step (2) Due to network changes, the network selection policy information of the first core network device and the second core network device changes, then the first core network device sends a fourth message to the terminal, and the fourth message is To carry updated network selection policy information.
  • the fourth message may be a configuration update command message.
  • Step (3) After receiving the fourth message, the terminal sends a fifth message to the first core network device.
  • the fifth message is used to confirm to the network side that the terminal has received the network selection policy. information.
  • the fifth message may be a configuration update complete message.
  • Step (4) The terminal uses SOR slicing to select an appropriate VPLMN for service.
  • the first core network device updates slice-based network selection policy information for the terminal according to network changes.
  • the first indication information is carried in the 5G mobility management capability information element, and the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the 5G mobility management capability information element can add the following content:
  • SBSS Slice-based SoR support
  • Slice-based SoR support is a new part and carries the first instruction information.
  • SBSS Slice-based SoR support
  • Implementation Mode 1 The network selection policy information is carried in the SOR transmission container (transparent container).
  • the existing SOR transparent container can be enhanced and network selection policy information can be added to the existing SOR transparent container.
  • SBS and Slice-based SOR are added to the existing SOR transparent container.
  • Slice-based SOR is network selection strategy information.
  • the format of Slice-based SOR is shown in Figure 9.
  • Slice-based SOR includes the length of Slice-based SOR (Length of Slice-based SOR), S-NSSAI value (value) and PLMN ID and access technology list.
  • the above S-NSSAI value includes the length of S-NSSAI degree and content.
  • the S-NSSAI value is coded as the length and value part of the S-NSSAI information element starting with the second octet. octet).
  • PLMN ID and access technology list includes the length of PLMN ID and access technology list (Length of PLMN ID and access technology list), PLMN ID and access technology identifier.
  • the priorities of the PLMN ID and access technology identifier are provided in descending order, that is, PLMN ID 1 indicates the highest priority, and PLMN ID n indicates the lowest priority.
  • the PLMN ID and access technology list carries at least 0 and at most 16 PLMN ID and access technology identifier combinations.
  • Network selection policy information is carried in a new IE, which is a slice-based SOR container.
  • a new message type Slice-based SOR container is added to the Payload container type value, which is used by the network side to indicate that the network selection policy information has been carried to the UE in the container.
  • the Payload container type value can add the following content:
  • the slice-based SOR container information element is a new IE that carries the UE's request information and/or the network's reply information.
  • slice-based SOR container IE includes the length of Slice-based SOR container information element (Length of Slice-based SOR container IE), container header (Container header) and container value (Container value), among which, IEI Represents the identity of the information element.
  • the Container header includes a data type. When the data type is 0, it means that the UE requests the network side to provide network selection policy information for the target slice. At this time, the Container value is one or more of the target slices. As shown in Figure 14; when data type is 1, it means that the network side carries network selection policy information to the terminal. At this time, the container value is the Slice-based SOR element list in the format shown in Figure 15.
  • the format of the slice-based SOR container IE sent by the UE is as shown in Figure 14.
  • the UE requests the network side to provide network selection policy information for the target slice.
  • the format of the slice-based SOR container IE replied by the network side is shown in Figure 15.
  • the network selection policy information is sent to the terminal through the slice-based SOR container IE.
  • slice-based SOR container IE includes Length of Slice-based SOR information IE, Container header and Slice-based SOR element.
  • Slice-based SOR element includes Length of Slice-based SOR element, S-NSSAI and PLMN ID and access technology list.
  • the above-mentioned S-NSSAI includes the length and content of the S-NSSAI.
  • the format of PLMN ID and access technology list is shown in Figure 17.
  • PLMN ID and access technology list includes Length of PLMN ID and access technology list, PLMN ID and access technology identifier.
  • the priorities of the PLMN ID and access technology identifier are provided in descending order, that is, PLMN ID 1 indicates the highest priority, and PLMN ID n indicates the lowest priority.
  • the PLMN ID and access technology list carries at least 0 and at most 16 PLMN ID and access technology identifier combinations.
  • the execution subject may be a network access device.
  • a network access device executing a network access method is used as an example to illustrate the network access device provided by the embodiment of the present application.
  • Figure 18 is a structural diagram of a network access device provided by an embodiment of the present application.
  • a terminal includes the network access device.
  • the network access device 300 includes:
  • the first receiving module 301 is configured to receive network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the access module 302 is configured to perform network access based on the network selection policy information.
  • the device also includes:
  • a first sending module configured to send a first message to the first communication device, where the first message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the network selection policy information includes at least one of the following:
  • Radio access technology RAT Radio access technology
  • the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
  • the access module is specifically used for:
  • the terminal desires to use the target slice to access the network and/or establish a session, and the target slice belongs to the rejected slice corresponding to the terminal, perform the following operations:
  • the terminal When the terminal detects that the network selection policy information includes the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access.
  • the device also includes:
  • a detection module configured to detect at the terminal that the network selection policy information satisfies the requirements corresponding to the network selection policy information. In the case of valid time information, it is detected whether the network selection policy information includes slice information of the target slice.
  • the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access, including:
  • the terminal selects a PLMN for network access based on the network priority information.
  • the network priority information includes PLMN identification priority and access technology identification priority.
  • the device also includes:
  • the second sending module is configured to send a second message to the first communication device, where the second message is used to query the network selection policy information.
  • the second sending module is specifically used for:
  • the terminal When the first condition is met, the terminal sends a second message to the first communication device;
  • the first condition includes at least one of the following:
  • the target slice belongs to the rejected slice corresponding to the terminal
  • the target slice does not belong to the configuration slice of the terminal
  • the first communication device indicates to the terminal that the target slice is not supported
  • the terminal desires to use the target slice.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the first receiving module is specifically used for:
  • the device also includes:
  • a checking module configured to check the integrity of the third message and perform target operations based on the integrity check results.
  • the inspection module is specifically used for at least one of the following:
  • the network selection policy information in the third message is discarded.
  • the device also includes:
  • the second receiving module is configured to receive a fourth message sent by the first communication device when the network selection policy information is updated, where the fourth message carries the updated network selection policy information.
  • the device also includes:
  • a third sending module is configured to send a fifth message to the first communication device, where the fifth message is used to indicate confirmation of receipt of the updated network selection policy information.
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, a PLMN identification and access technology list, and slice information of at least one of the target slices.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • the first receiving module receives network selection policy information.
  • the network selection policy information indicates at least one network used to provide a target slice service.
  • the target slice is the terminal's desired query and /or slices used; the access module performs network access based on the network selection policy information. In this way, the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • the network access device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc.
  • NAS Network Attached Storage
  • the network access device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 2 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • the execution subject may be a network access device.
  • a network access device executing a network access method is used as an example to illustrate the network access device provided by the embodiment of the present application.
  • Figure 19 is a structural diagram of a network access device provided by an embodiment of the present application.
  • the first communication device includes the network access device.
  • the network access device 400 includes:
  • the first sending module 401 is configured to send network selection policy information to the terminal.
  • the network selection policy information indicates at least one network used to provide a target slice service.
  • the target slice is a slice that the terminal desires to query and/or use. ;
  • the network selection policy information is used for the terminal to access the network.
  • the device also includes:
  • a first receiving module configured to receive a first message sent by the terminal, where the first message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the device also includes:
  • Execution module used to perform a first operation, the first operation includes at least one of the following:
  • the second communication device When the first message carries the target slice, and the target slice belongs to the rejection slice corresponding to the terminal, the second communication device is triggered to provide the network selection policy information to the terminal.
  • the network selection policy information includes at least one of the following:
  • Radio access technology RAT Radio access technology
  • the device also includes:
  • the second receiving module is configured to receive a second message sent by the terminal, where the second message is used to query the network selection policy information.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the device also includes:
  • the second sending module is configured to send a query message to the second communication device based on the second message, where the query message is used to query the network selection policy information.
  • the device also includes:
  • a third sending module is configured to send a fourth message to the terminal when the network selection policy information is updated, where the fourth message carries the updated network selection policy information.
  • the device also includes:
  • the third receiving module is configured to receive a fifth message sent by the terminal, where the fifth message is used to indicate confirmation of receipt of the updated network selection policy information.
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, a PLMN identification and access technology list, and slice information of at least one of the target slices.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • the first sending module sends network selection policy information to the terminal.
  • the network selection policy information indicates at least one network used to provide a target slice service.
  • the target slice is what the terminal expects.
  • the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • the network access device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • NAS Network Attached Storage
  • the network access device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 3 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • this embodiment of the present application also provides a communication device 500, which includes a processor 501 and a memory 502.
  • the memory 502 stores programs or instructions that can be run on the processor 501, such as , when the communication device 500 is a terminal, when the program or instruction is executed by the processor 501, each step of the above embodiment of the network access method applied to the terminal is implemented, and the same technical effect can be achieved.
  • the communication device 500 is a first communication device
  • the program or instruction is executed by the processor 501
  • each step of the above embodiment of the network access method applied to the first communication device is implemented, and the same technical effect can be achieved.
  • I won’t go into details here.
  • An embodiment of the present application also provides a terminal, including a processor and a communication interface, wherein the communication interface is used to receive network selection policy information, and the network selection policy information indicates at least one network used to provide target slicing services, so The target slice is a slice that the terminal expects to query and/or use; and the processor is configured to perform network access based on the network selection policy information.
  • This terminal embodiment corresponds to the above-mentioned network access method embodiment.
  • Each implementation process and implementation method of the above-mentioned network access method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect.
  • FIG. 21 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 600 includes but is not limited to: a radio frequency unit 601, a network module 602, an audio output unit 603, an input unit 604, a sensor 605, a display unit 606, a user input unit 607, an interface unit 608, a memory 609, a processor 610, etc. At least some parts.
  • the terminal 600 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 610 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal structure shown in FIG. 21 does not limit the terminal.
  • the terminal may include more or fewer components than shown in the figure, or some components may be combined or arranged differently, which will not be described again here.
  • the input unit 604 may include a graphics processing unit (GPU) 6041 and a microphone 6042.
  • the graphics processor 6041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 606 may include a display panel 6061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, etc. Display panel 6061.
  • the user input unit 607 includes a touch panel 6071 and at least one of other input devices 6072 .
  • Touch panel 6071 also called touch screen.
  • the touch panel 6071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 6072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the radio frequency unit 601 after receiving downlink data from the network side device, can transmit it to the processor 610 for processing; in addition, the radio frequency unit 601 can send uplink data to the network side device.
  • the radio frequency unit 601 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
  • Memory 609 may be used to store software programs or instructions as well as various data.
  • the memory 609 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 609 may include volatile memory or non-volatile memory, or memory 609 may include both volatile and non-volatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM Double Data Rate SDRAM
  • DDRSDRAM double data rate synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM enhanced synchronous dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus
  • the processor 610 may include one or more processing units; optionally, the processor 610 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 610.
  • the radio frequency unit 601 is configured to receive network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
  • the processor 610 is configured to perform network access based on the network selection policy information.
  • the radio frequency unit 601 is also used for:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the network selection policy information includes at least one of the following:
  • Radio access technology RAT Radio access technology
  • the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
  • processor 610 is also used to:
  • the terminal desires to use the target slice to access the network and/or establish a session, and the target slice belongs to the rejected slice corresponding to the terminal, perform the following operations:
  • the terminal When the terminal detects that the network selection policy information includes the slice information of the target slice, it selects the PLMN corresponding to the target slice in the network selection policy information for network access.
  • processor 610 is also used to:
  • the terminal When the terminal detects that the network selection policy information satisfies the valid time information corresponding to the network selection policy information, it detects whether the network selection policy information includes the slice information of the target slice.
  • processor 610 is also used to:
  • the network selection policy information includes network priority information
  • a PLMN is selected for network access based on the network priority information.
  • the network priority information includes PLMN identification priority and access technology identification priority.
  • the radio frequency unit 601 is also used for:
  • the radio frequency unit 601 is also used for:
  • the first condition includes at least one of the following:
  • the target slice belongs to the rejected slice corresponding to the terminal
  • the target slice does not belong to the configuration slice of the terminal
  • the first communication device indicates to the terminal that the target slice is not supported
  • the terminal desires to use the target slice.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the radio frequency unit 601 is also used for:
  • Processor 610 is also used to:
  • processor 610 is also used for at least one of the following:
  • the network selection policy information in the third message is discarded.
  • the radio frequency unit 601 is also used for:
  • a fourth message sent by the first communication device is received, where the fourth message carries the updated network selection policy information.
  • the radio frequency unit 601 is also used for:
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, PLMN identification and access technology list and There is one less slice information of the target slice.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • An embodiment of the present application also provides a communication device.
  • the communication device is a first communication device.
  • the first communication device may be a core network device, including a processor and a communication interface.
  • the communication interface is used to send a network selection policy to a terminal.
  • Information, the network selection policy information indicates at least one network used to provide a target slice service, the target slice is a slice that the terminal expects to query and/or use; wherein the network selection policy information is used for the terminal Perform network access.
  • This communication device embodiment corresponds to the above-mentioned network access method embodiment.
  • Each implementation process and implementation manner of the above-mentioned network access method embodiment can be applied to this communication device embodiment, and can achieve the same technical effect.
  • the communication device 700 includes: an antenna 701, a radio frequency device 702, a baseband device 703, a processor 704 and a memory 705.
  • the antenna 701 is connected to the radio frequency device 702 .
  • the radio frequency device 702 receives information through the antenna 701 and sends the received information to the baseband device 703 for processing.
  • the baseband device 703 processes the information to be sent and sends it to the radio frequency device 702.
  • the radio frequency device 702 processes the received information and then sends it out through the antenna 701.
  • the method performed by the communication device in the above embodiment can be implemented in the baseband device 703, which includes a baseband processor.
  • the baseband device 703 may include, for example, at least one baseband board, which is provided with multiple chips, as shown in FIG. 22 .
  • One of the chips is, for example, a baseband processor, which is connected to the memory 705 through a bus interface to call the memory 705 .
  • the communication device may also include a network interface 706, such as a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the communication device 700 in the embodiment of the present application also includes: instructions or programs stored in the memory 705 and executable on the processor 704.
  • the processor 704 calls the instructions or programs in the memory 705 to execute the modules shown in Figure 19 The implementation method and achieve the same technical effect will not be repeated here to avoid repetition.
  • Embodiments of the present application also provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the above-mentioned network access method embodiment is implemented, and can To achieve the same technical effect, to avoid repetition, we will not repeat them here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium may be non-volatile or non-transient.
  • Readable storage media may include computer-readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disks or optical disks.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the above embodiments of the network access method. Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the above network access method.
  • Each process in the example can achieve the same technical effect. To avoid repetition, we will not repeat it here.
  • Embodiments of the present application also provide a network access system, including: a terminal and a first communication device.
  • the terminal can be used to perform the steps of the network access method applied to the terminal as described above.
  • the network side device can be used to The above steps of the network access method applied to the first communication device are performed.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to related technologies.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Abstract

La présente demande, qui appartient au domaine technique des communications, divulgue des procédés et des appareils d'accès au réseau, un terminal, et un dispositif de communication. Un procédé d'accès au réseau des modes de réalisation de la présente demande comprend les étapes suivantes : un terminal reçoit des informations de politique de sélection de réseau, les informations de politique de sélection de réseau indiquant au moins un réseau utilisé pour fournir un service d'une tranche cible, et la tranche cible étant une tranche que le terminal s'attend à interroger et/ou à utiliser; et le terminal réalise un accès au réseau sur la base des informations de politique de sélection de réseau.
PCT/CN2023/113010 2022-08-18 2023-08-15 Procédés et appareils d'accès au réseau, terminal, et dispositif de communication WO2024037512A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210996011.4 2022-08-18
CN202210996011.4A CN117641514A (zh) 2022-08-18 2022-08-18 网络接入方法、装置、终端及通信设备

Publications (1)

Publication Number Publication Date
WO2024037512A1 true WO2024037512A1 (fr) 2024-02-22

Family

ID=89940692

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/113010 WO2024037512A1 (fr) 2022-08-18 2023-08-15 Procédés et appareils d'accès au réseau, terminal, et dispositif de communication

Country Status (2)

Country Link
CN (1) CN117641514A (fr)
WO (1) WO2024037512A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210282084A1 (en) * 2020-03-09 2021-09-09 Qualcomm Incorporated Slice-aware plmn selection
CN113411781A (zh) * 2021-06-25 2021-09-17 Oppo广东移动通信有限公司 网络切片服务的请求方法、装置、终端及存储介质
CN113630783A (zh) * 2020-05-07 2021-11-09 华为技术有限公司 一种通信方法及装置
WO2022035512A1 (fr) * 2020-08-12 2022-02-17 Apple Inc. Pilotage de vérification de l'itinérance pendant un enregistrement de mobilité
CN114125809A (zh) * 2021-10-28 2022-03-01 展讯通信(上海)有限公司 切片服务获取方法及相关装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210282084A1 (en) * 2020-03-09 2021-09-09 Qualcomm Incorporated Slice-aware plmn selection
CN113630783A (zh) * 2020-05-07 2021-11-09 华为技术有限公司 一种通信方法及装置
WO2022035512A1 (fr) * 2020-08-12 2022-02-17 Apple Inc. Pilotage de vérification de l'itinérance pendant un enregistrement de mobilité
CN113411781A (zh) * 2021-06-25 2021-09-17 Oppo广东移动通信有限公司 网络切片服务的请求方法、装置、终端及存储介质
CN114125809A (zh) * 2021-10-28 2022-03-01 展讯通信(上海)有限公司 切片服务获取方法及相关装置

Also Published As

Publication number Publication date
CN117641514A (zh) 2024-03-01

Similar Documents

Publication Publication Date Title
US20230337128A1 (en) Network selection method and apparatus, device, and storage medium
US20230199633A1 (en) Network selection method, information sending method, information obtaining method, and apparatus
WO2024037512A1 (fr) Procédés et appareils d'accès au réseau, terminal, et dispositif de communication
WO2024032537A1 (fr) Procédé de communication, dispositif et support d'enregistrement lisible
WO2023213242A1 (fr) Procédé et appareil de configuration d'informations de politique d'ue, première fonction de réseau et terminal
WO2023143422A1 (fr) Procédé et appareil de commande d'itinérance en cas de sinistre, terminal et dispositif du côté réseau
WO2024037632A1 (fr) Procédé de communication, terminal et périphérique côté réseau
WO2024022398A1 (fr) Procédé d'acquisition d'informations de sélection de réseau d'un réseau hébergé, terminal et dispositif côté réseau
WO2023131286A1 (fr) Procédé et appareil de commande de ressources, terminal, dispositif côté réseau, et support de stockage lisible
WO2023185810A1 (fr) Procédé de détermination de politique de sélection d'itinéraire d'ue (ursp), équipement utilisateur et dispositif côté réseau
WO2024017023A1 (fr) Procédé d'acquisition de nssai autorisées, et terminal et dispositif côté réseau
WO2024032543A1 (fr) Procédé d'acquisition d'informations et terminal et dispositif de réseau d'accès
WO2023143423A1 (fr) Procédé et dispositif d'acquisition, de stockage et de rapport d'informations, terminal et fonction de réseau
WO2024051565A1 (fr) Procédé et appareil de traitement de sélection de réseau, terminal et support de stockage lisible
WO2023179571A1 (fr) Procédé et appareil d'accès à un réseau non public et terminal
WO2023165481A1 (fr) Procédé de traitement de défaillance de réseau, terminal, dispositif de réseau d'accès, et dispositif de réseau central
WO2024078589A1 (fr) Procédé et appareil de rapport d'informations, dispositif de communication et support de stockage
WO2024017244A1 (fr) Procédé et appareil d'envoi d'informations, procédé et appareil de réception d'informations, et dispositif associé
WO2023109686A1 (fr) Procédé et appareil de configuration de paramètres, et dispositif de communication, support de stockage et système
WO2024032499A1 (fr) Procédé d'interrogation dns et dispositif de communication
WO2023179595A1 (fr) Procédé et appareil d'établissement de canal de session pour un dispositif non 3gpp, et dispositif
WO2023185929A1 (fr) Procédé et appareil de commande de ressources, terminal et dispositif côté réseau
WO2024067437A1 (fr) Procédé et appareil de désactivation de modèle, procédé et appareil d'envoi d'informations, et dispositif
WO2024012373A1 (fr) Procédé et appareil de transmission d'informations de modèle d'ia, et dispositif
CN117835214A (zh) 通信方法、设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23854413

Country of ref document: EP

Kind code of ref document: A1