WO2024045970A1 - Procédés de traitement de résultat d'exécution de politique de sélection d'itinéraire, appareil et dispositif - Google Patents

Procédés de traitement de résultat d'exécution de politique de sélection d'itinéraire, appareil et dispositif Download PDF

Info

Publication number
WO2024045970A1
WO2024045970A1 PCT/CN2023/109998 CN2023109998W WO2024045970A1 WO 2024045970 A1 WO2024045970 A1 WO 2024045970A1 CN 2023109998 W CN2023109998 W CN 2023109998W WO 2024045970 A1 WO2024045970 A1 WO 2024045970A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication device
network
terminal
network side
verification
Prior art date
Application number
PCT/CN2023/109998
Other languages
English (en)
Chinese (zh)
Inventor
吕华章
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024045970A1 publication Critical patent/WO2024045970A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/20Traffic policing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/22Manipulation of transport tunnels

Definitions

  • the present application belongs to the field of communication technology, and specifically relates to a routing strategy execution result processing method, device and equipment.
  • the terminal's routing policy (UE Route Selection Policy, URSP) rule is a policy defined by the Third Generation Partnership Projects (3GPP) and sent to the terminal.
  • the terminal can match according to this rule.
  • the specific PDU session refers to various parameters of the PDU session, such as Data Network Name (DNN), Single Network Slice Selection Assistance Information (S-NSSAI), session and service continuity mode (Session and Service Continuity mode, SSC mode), etc., are all stipulated in the URSP rule.
  • DNN Data Network Name
  • S-NSSAI Single Network Slice Selection Assistance Information
  • SSC mode Session and Service Continuity mode
  • the APP can send the APP traffic characteristics to the terminal, and then the terminal matches the URSP rules in the terminal one by one according to the traffic characteristics of the APP. Among them, after the APP traffic characteristics match a certain URSP rule, you can further choose which PDU session to use to send the APP's traffic.
  • the operator hopes to know which rule the terminal finally matches for the traffic of these APPs (that is, it hopes to know the rules of the URSP rules). Results of the).
  • the terminal currently cannot know the execution results of the terminal's URSP rules.
  • Embodiments of the present application provide a routing policy execution result processing method, device and equipment to achieve the acquisition of the execution result of the URSP rule of the terminal.
  • the first aspect provides a routing policy execution result processing method, including:
  • the first network side device obtains the first information
  • the first information includes the terminal’s routing policy URSP rule execution result
  • the first information is used to verify the URSP rule execution result on the terminal.
  • a method for processing routing selection policy execution results including:
  • the second network side device receives the second information, where the second information includes the routing policy URSP rule execution result of the terminal, the protocol data unit PDU session identifier of the terminal, and the user permanent identifier.
  • the second information is Performing the second verification and/or the third verification on the URSP rule execution results of the terminal;
  • the second network side device performs a second verification and/or a third verification on the terminal's URSP rule execution result based on the second information.
  • a routing policy execution result processing device including:
  • the first acquisition module is used to acquire the first information
  • the first information includes the terminal’s routing policy URSP rule execution result
  • the first information is used to verify the URSP rule execution result on the terminal.
  • a routing policy execution result processing device including:
  • the first receiving module is configured to receive second information, where the second information includes the routing policy URSP rule execution result of the terminal, the protocol data unit PDU session identifier of the terminal, and the user permanent identifier, and the second The information is used to conduct the second verification and/or the third verification of the URSP rule execution result of the terminal;
  • the first verification module is configured to perform a second verification and/or a third verification on the URSP rule execution result of the terminal based on the second information.
  • a network-side device including a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor, the following implementations are implemented: The steps of the method described in the first aspect or the second aspect.
  • a sixth aspect provides a routing policy execution result processing system, including: a first network side device and a second network side device.
  • the first network side device can be used to perform routing as described in the first aspect.
  • the second network side device may be configured to perform the steps of the routing policy execution result processing method as described in the second aspect.
  • a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the second aspect.
  • a chip in an eighth aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. , or implement the method described in the second aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the first aspect or the second aspect. The steps of the method described in this aspect.
  • embodiments of the present application provide a routing policy execution result processing device, which is configured to perform the steps of the routing policy execution result processing method described in the first or second aspect.
  • the first network side device can obtain the first information, where the first information includes the URSP rule execution result of the terminal, and the first information is used to verify the URSP rule execution result of the terminal.
  • the URSP rule execution result of the terminal can be transmitted to the first network side device to verify the URSP rule execution result of the terminal, thereby realizing the acquisition of the URSP rule execution result of the terminal.
  • the operator can obtain the URSP rule execution result from the above when needed.
  • the first network side device obtains the execution result of the URSP rule of the terminal, so that the execution result of the URSP rule can be verified on the terminal, and it can be learned whether the URSP rule of the terminal is used correctly.
  • Figure 1 is a block diagram of a wireless communication system applicable to the embodiment of the present application.
  • Figure 2 is a flow chart of a routing policy execution result processing method in an embodiment of the present application
  • Figure 3 is a flow chart of another routing policy execution result processing method in the embodiment of the present application.
  • Figure 4 is one of the flow charts of a specific implementation method of the routing policy execution result processing method in the embodiment of the present application
  • Figure 5 is the second flow chart of a specific implementation of the routing policy execution result processing method in the embodiment of the present application.
  • Figure 6 is the third flow chart of a specific implementation of the routing policy execution result processing method in the embodiment of the present application.
  • Figure 7 is the fourth flowchart of a specific implementation of the routing policy execution result processing method in the embodiment of the present application.
  • Figure 8 is a structural block diagram of a routing policy execution result processing device in an embodiment of the present application.
  • FIG. 9 is a structural block diagram of another routing policy execution result processing device in an embodiment of the present application.
  • Figure 10 is a structural block diagram of a communication device in an embodiment of the present application.
  • Figure 11 is a structural block diagram of a network side device in an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and “first” and “second” are intended to distinguish It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 can be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • Mobile Internet Device MID
  • augmented reality augmented reality, AR
  • VR virtual reality
  • robots wearable devices
  • VUE vehicle-mounted equipment
  • PUE pedestrian terminal
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • game consoles personal computers (personal computers, PC), teller machines or self-service Terminal devices
  • wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets, smart anklets, etc.), Smart wristbands, smart clothing, etc.
  • the network side equipment 12 may include access network equipment or core network equipment, where the access network equipment 12 may also be called wireless access network equipment, radio access network (Radio Access Network, RAN), radio access network function or Wireless access network unit.
  • the access network device 12 may include a base station, a WLAN access point or a WiFi node, etc.
  • the base station may be called a Node B, an evolved Node B (eNB), an access point, a Base Transceiver Station (BTS), a radio Base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), Home B-Node, Home Evolved B-Node, Transmitting Receiving Point (TRP) or all
  • eNB evolved Node B
  • BTS Base Transceiver Station
  • BSS Basic Service Set
  • ESS Extended Service Set
  • Home B-Node Home Evolved B-Node
  • TRP Transmitting Receiving Point
  • the core network equipment may include but is not limited to at least one of the following: core network node, core network function, mobility management entity (Mobility Management Entity, MME), access mobility management function (Access and Mobility Management Function, AMF), session management function (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), centralized Network configuration (Centralized network configuration, CNC), network storage function (Network Repository Function, NRF), network exposure function (Network Exposure Function, NEF), local NEF (Local NEF, or L-NEF), binding support function (Binding Support Function (BSF), Application Function (Application Function, AF), etc.
  • MME mobility management entity
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • the first network side device and/or the second network side device are both core network devices, or both are one device or multiple devices among the core network devices.
  • the first communication device, the second communication device, the third communication device, the fourth communication device, the fifth communication device, the sixth communication device, and the seventh communication device are all core network devices, or are all core network devices.
  • V-AM-PCF can be the policy control function (Policy Control Function, PCF), or the roaming (visited) UE policy control function (visited UE Policy Control Function, V-UE-PCF);
  • PCF Policy Control Function
  • V-UE-PCF roaming UE policy control function
  • H-AM-PCF mentioned above can be PCF or home UE Policy Control Function (H-UE-PCF).
  • URSP is a strategy defined by the 3rd Generation Partnership Project (3GPP) and sent to the UE. According to this strategy, the UE can match the traffic of the application (APP) to a specific protocol data unit (Protocol Data Unit, PDU) session.
  • 3GPP 3rd Generation Partnership Project
  • PDU Protocol Data Unit
  • the APP can send APP traffic characteristics to the UE.
  • the traffic characteristics can include: destination Internet Protocol (IP) address, fully qualified domain name (Fully Qualified Domain) Name, FQDN), etc.; then, the UE matches the URSP rules in the UE one by one according to the traffic characteristics of the APP; among them, in the URSP rule, the specified traffic description/characteristics include the content shown in Table 1.
  • this Traffic descriptor happens to exist in the UE URSP rule, it means that the traffic of the APP can match a certain URSP rule.
  • the next step is to choose which PDU session to use to send the APP's traffic.
  • RSD Route Selection Descriptor
  • RSD priority (precedence) 1: S-NSSAI-a, (Non-3GPP Access) Non-3GPP Access;
  • NWDAF is introduced to perform some intelligent analysis.
  • NWDAF has a certain AI intelligent analysis function, that is, NWDAF collects some data and uses built-in algorithms and analysis Ability to analyze some results and provide them to 5G core network elements for some operational optimization or statistical analysis.
  • NWDAF can provide an Observed Service Experience related network data analytics function. Based on this function, the quality of service (QoS) information of a terminal accessing a server can be collected, such as uplink and downlink rates. Packet loss rate, etc., and output a statistical information, which includes the user experience of the terminal accessing the server; NWDAF can also predict based on the historical experience of the terminal accessing the server, for example, in a certain time period in the future, In a certain area, if this terminal accesses the server, the user's possible experience conditions (such as QoS conditions) can be predicted.
  • QoS Quality of service
  • the analysis or prediction content that NWDAF can provide is distinguished by analysis identification (Analytic ID).
  • Analytic ID Service Experience (Service Experience); therefore, as long as the network element of the NWDAF service is obtained and the Analytic ID is entered when requesting analysis, then NWDAF can provide the corresponding analyzed.
  • Table 2 it is the Analytic ID corresponding to all the analyzes currently provided by NWDAF.
  • routing policy execution result processing method provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings through some embodiments and application scenarios.
  • FIG. 2 is a flow chart of a routing policy execution result processing method provided by an embodiment of the present application.
  • the method may include the following steps 201:
  • Step 201 The first network side device obtains the first information.
  • the first information includes the terminal’s routing policy URSP rule execution result
  • the first information is used to verify the URSP rule execution result on the terminal.
  • the terminal is a roaming terminal.
  • verifying the URSP rule execution result on the terminal is to determine whether the terminal uses the URSP rule correctly.
  • the verification process includes three verifications, and the specific verification methods for each time will be introduced in detail later.
  • the URSP rule execution result includes at least one of the following:
  • the URSP rule executed by the terminal for application traffic is the URSP rule used by the terminal each time.
  • the terminal can report the URSP rule used; where, it can be reported
  • the URSP rule ID of the URSP rule used can also be reported as the specific URSP rule used (for example, the traffic descriptor used, the path selection description used);
  • the terminal is a traffic descriptor executed by the application traffic; here, the executed traffic descriptor is the traffic descriptor used by the terminal each time. After each use of the traffic descriptor by the terminal, the terminal can report the used traffic descriptor. ; The terminal can report the priority (traffic descriptor precedence) or traffic descriptor ID of the used traffic descriptor to identify the used traffic descriptor; optionally, the executed traffic descriptor includes connection capability (Connection Capability) ;
  • the path selection descriptor executed by the terminal for application traffic is the path selection descriptor used by the terminal each time.
  • the terminal can report the path selection descriptor used.
  • traffic descriptor the reported path selection descriptor also includes one or more RSC (route selection component) under each path selection descriptor executed or used by the terminal, such as DNN, S-NSSAI, SSC mode etc.
  • the terminal can report the priority (traffic descriptor precedence) or path selection descriptor ID of the used path selection descriptor to identify the used path selection descriptor;
  • the protocol data unit PDU session identifier that carries the application traffic.
  • the URSP rules configured on the terminal include At least one of the process descriptor, path selection descriptor, and PDU session identifier carrying the traffic.
  • the fundamental reason why the terminal needs to report the execution result of the URSP rule is: after the URSP rule designed by the operator is delivered to the terminal, the operator hopes to know the traffic of certain APPs that ultimately ends up on the terminal. Which rule is being executed, and then the operator can adjust the unreasonably designed URSP rule based on the feedback from the execution results. Therefore, operators hope to get feedback on the implementation of the URSP rule.
  • the first network side device can obtain the first information, where the first The information includes the URSP rule execution result of the terminal, and the first information is used to verify the URSP rule execution result of the terminal. It can be seen that the URSP rule execution result of the terminal can be transmitted to the first network side device to verify the URSP rule execution result of the terminal, thereby realizing the acquisition of the URSP rule execution result of the terminal. In this way, the operator can The execution result of the terminal's URSP rule is obtained from the above-mentioned first network side device, so that the terminal's URSP rule execution result can be verified, and further it can be learned whether the terminal's URSP rule is used correctly.
  • the first network side device is a first communication device or a fourth communication device, wherein the first communication device is the first device of the terminal under the second network, and the fourth communication device It is the fourth device of the terminal under the first network.
  • the first network is the network of the terminal's roaming or visiting place
  • the second network is the network of the terminal's home place; or, the first network is the home network of the terminal.
  • the second network is the network of the terminal's roaming place or visiting place.
  • the first network side device obtains the first information, including:
  • the first network side device receives the first information sent by the terminal through a seventh communication device and/or a fourth communication device;
  • the first network side device receives the first information sent by the terminal through at least one of the seventh communication device, the second communication device, the fifth communication device and the fourth communication device;
  • the seventh communication device is a device on the network side
  • the second communication device is the second device of the terminal under the first network
  • the fourth communication device is the terminal under the first network.
  • the fourth device, the fifth communication device is the fifth device in the roaming place of the terminal.
  • the first communication device can also receive the first information reported by the terminal through the seventh communication device and/or the fourth communication device.
  • the first communication device receives the first information through the seventh communication device and/or the fourth communication device.
  • the terminal uses the registration non-access stratum (Non-Access Stratum, NAS) message to report the first information.
  • Non-Access Stratum Non-Access Stratum
  • the first communication device may be Home Access and Mobility Management Policy Control Function (H-AM-PCF)
  • the fourth communication device may be Roaming Access and Mobility Management Policy Control.
  • V-AM-PCF Vehicle Access and Mobility Management Policy Control Function
  • the seventh communication device can be an AMF, that is, the transmission path of the registered NAS message carrying the first information (that is, the execution result of the URSP rule) can be: terminal ⁇ AMF ⁇ V-AM-PCF ⁇ H-AM-PCF.
  • the terminal can send the first information to the seventh communication device through at least one of the following:
  • Upstream NAS message (UL NAS message);
  • PDU session establishment request PDU session establishment request
  • PDU session modification request PDU session modification request
  • the seventh communication device may send the first information to the fourth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request Npcf_UEPolicyControl Update Request
  • Npcf_UEPolicyControl Create Request UE policy control creation request
  • N1 message notification (Namf_Communication_N1MessageNotify).
  • the fourth communication device may send the first information to the first communication device through at least one of the following:
  • Npcf_UEPolicyControl UpdateNotify Response UE policy control update notification response
  • the first communication device may receive the first information reported by the terminal through at least one of the seventh communication device, the second communication device, the fifth communication device, and the fourth communication device.
  • the first communication device may receive the first information reported by the terminal through the seventh communication device.
  • At least one of the device, the second communication device, the fifth communication device, and the fourth communication device receives the first information reported by the terminal using the session NAS message.
  • the first communication device may be H-AM-PCF
  • the fourth communication device may be V-AM-PCF
  • the seventh communication device may be AMF
  • the second communication device may be a roaming session management function (VisitedSession Management Function).
  • the fifth communication device can be the roaming session management policy control function (Visited Session Management Policy Control Function, V-SM-PCF), that is, the session NAS message carrying the first information (that is, the execution result of the URSP rule)
  • V-SM-PCF Visited Session Management Policy Control Function
  • the transmission path can be: terminal ⁇ AMF ⁇ V-SMF ⁇ V-SM-PCF ⁇ V-AM-PCF ⁇ H-AM-PCF.
  • the terminal can send the first information to the seventh communication device through at least one of the following:
  • Upstream NAS message (UL NAS message);
  • PDU session establishment request PDU session establishment request
  • PDU session modification request PDU session modification request
  • the seventh communication device may then send the first information to the second communication device through at least one of the following:
  • Nsmf_PDUSession CreateSMContext request Nsmf_PDUSession CreateSMContext request
  • Nsmf_PDUSession UpdateSMContext request Nsmf_PDUSession UpdateSMContext request
  • Nsmf_PDUSession Context request Nsmf_PDUSession Context request
  • the second communication device may send the first information to the fifth communication device through at least one of the following:
  • Session policy control creation request (Npcf_SMPolicyControl_Create Request);
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • the fifth communication device can send the first information to the fourth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the fourth communication device may send the first information to the first communication device through at least one of the following:
  • the first network side device obtains the first information, including:
  • the first network side device receives the first information sent by the terminal through a seventh communication device
  • the first network side device receives the first information sent by the terminal through at least one of the seventh communication device, the second communication device, and the fifth communication device;
  • the seventh communication device is a network side device
  • the second communication device is the second device of the terminal under the first network
  • the fifth communication device is the fifth communication device of the roaming place of the terminal. equipment.
  • the fourth communication device can also receive the first information reported by the terminal through the seventh communication device.
  • the fourth communication device receives the first information reported by the terminal using the registration NAS message through the seventh communication device.
  • the fourth communication device may be V-AM-PCF
  • the seventh communication device may be AMF, that is, the transmission path of the registration NAS message carrying the first information (i.e., the execution result of the URSP rule) may be: terminal ⁇ AMF ⁇ V -AM-PCF.
  • the terminal can send the first information to the seventh communication device through at least one of the following:
  • Uplink NAS message (UL NAS message);
  • PDU session establishment request PDU session establishment request
  • PDU session modification request PDU session modification request
  • the seventh communication device may send the first information to the fourth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request Npcf_UEPolicyControl Update Request
  • Npcf_UEPolicyControl Create Request UE policy control creation request
  • N1 message notification (Namf_Communication_N1MessageNotify).
  • the fourth communication device may receive the first information reported by the terminal through at least one of the seventh communication device, the second communication device, and the fifth communication device.
  • the first communication device may receive the first information reported by the terminal through at least one of the seventh communication device, the second communication device, and the fifth communication device.
  • At least one of the device and the fifth communication device receives the first information reported by the terminal using the session NAS message.
  • the fourth communication device may be V-AM-PCF
  • the seventh communication device may be AMF
  • the second communication device may be V-SMF
  • the fifth communication device may be V-SM-PCF, that is, it carries the first information ( That is, the transmission path of the session NAS message (that is, the execution result of the URSP rule) can be: terminal ⁇ AMF ⁇ V-SMF ⁇ V-SM-PCF ⁇ V-AM-PCF.
  • the terminal can send the first information to the seventh communication device through at least one of the following:
  • Upstream NAS message (UL NAS message);
  • PDU session establishment request PDU session establishment request
  • PDU session modification request PDU session modification request
  • the seventh communication device may then send the first information to the second communication device through at least one of the following:
  • Nsmf_PDUSession CreateSMContext request Nsmf_PDUSession CreateSMContext request
  • Nsmf_PDUSession UpdateSMContext request Nsmf_PDUSession UpdateSMContext request
  • Nsmf_PDUSession Context request Nsmf_PDUSession Context request
  • the second communication device may send the first information to the fifth communication device through at least one of the following:
  • Session policy control creation request (Npcf_SMPolicyControl_Create Request);
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • the fifth communication device can send the first information to the fourth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the first network side device obtains the first information, including:
  • the first network side device receives the first information sent by the terminal through at least one of the seventh communication device and the second communication device;
  • the seventh communication device is a network side device
  • the second communication device is the second device of the terminal under the first network
  • the third communication device is the terminal under the second network. Third device.
  • the third communication device can also receive the first information reported by the terminal through at least one of the seventh communication device and the second communication device.
  • the third communication device may be H-SMF
  • the seventh communication device may be AMF
  • the second communication device may be V-SMF. Therefore, the transmission of the first information (such as the execution result of the URSP rule (such as connection capability))
  • the path can be: terminal ⁇ AMF ⁇ V-SMF ⁇ H-SMF.
  • the terminal can send the first information to the seventh communication device through at least one of the following:
  • PDU session establishment request PDU session establishment request
  • PDU session modification request PDU session modification request
  • Uplink non-access layer message (UL NAS message).
  • the seventh communication device can send the first information to the second communication device through at least one of the following:
  • the second communication device can send the first information to the third communication device through at least one of the following:
  • the third communication device may also send it to the eighth communication device or the sixth communication device.
  • the eighth communication device is one of the devices in the terminal's home place.
  • the eighth communication device may be the Home Policy Control Function (H-PCF), and the H-PCF may be the home session PCF (PCF for session), or it may be the UE PCF (PCF for UE).
  • H-PCF Home Policy Control Function
  • the H-SMF can also send the first information to the H-PCF, so that the home network can learn the execution result of the URSP rules executed by the terminal in the roaming location, and adjust the rules to the roaming terminal based on this execution result. URSP rules sent.
  • the third communication device may first send the first information to the sixth communication device, and then the sixth communication device sends the first information to the eighth communication device (for example, PCF for UE).
  • the eighth communication device for example, PCF for UE.
  • the third communication device can send the first information to the eighth communication device through a session management policy association establishment or modification (SM policy association establishment/modification) process.
  • SM policy association establishment/modification SM policy association establishment/modification
  • the third communication device sends the first information to the session management policy association through signaling used to establish or modify the session management policy association (such as a session management policy control creation request (Npcf_SMPolicyControl_Create request) or a session management policy control update request (Npcf_SMPolicyControl_Update request)).
  • SM policy association establishment/modification session management policy association establishment/modification
  • the third communication device sends the first information to the session management policy association through signaling used to establish or modify the session management policy association (such as a session management policy control creation request (Npcf_SMPolicyControl_Create request) or a session management policy control update request (Npcf_SMPolicyControl_Update request)).
  • Npcf_SMPolicyControl_Create request a session management policy
  • H-SMF for example, set a Policy Control Request Triggers (PCRT)
  • PCT Policy Control Request Triggers
  • the Policy Control Request Triggers here refer to a condition defined on SMF (such as H-SMF). When this condition is met , SMF needs to interact with PCF, for example, to trigger the session management policy establishment or session management policy modification process through PCF, H-SMF forwards the first information sent by V-SMF to H-PCF (such as the home PCF for session).
  • PCF Policy Control Request Triggers
  • H-SMF after setting a trigger mechanism in H-SMF, as long as H-SMF receives the first information from V-SMF, then H-SMF must send the first information to H-PCF (for example, by The process related to the session management policy), please refer to Table 3 for details:
  • PCT Policy Control Request Triggers
  • the second communication device (such as V-SMF) is under the first network (which corresponds to the Public Land Mobile Network (PLMN) ID of the first network), or the second The communication device is located under the network corresponding to the first PLMN ID, or the second communication device is located under the roaming network; the third communication device, or the sixth communication device, or the eighth communication device (i.e. H-SMF or H-SM- PCF or H-PCF) under the second network (which corresponds to the PLMN ID of the second network), or the third communication device or the sixth communication device or the eighth communication device is located under the network corresponding to the second PLMN ID, or, Located under the home network.
  • PLMN Public Land Mobile Network
  • the home PCF for session after receiving the first information from H-SMF, the home PCF for session obtains the URSP rule execution result of the terminal in the roaming location (such as Connection capability), and then, the home PCF for session (used for session association) PCF) also needs to send the first information to the home PCF for UE (PCF for terminal policy association).
  • the home PCF for session (used for session association) PCF) also needs to send the first information to the home PCF for UE (PCF for terminal policy association).
  • H-SM-PCF or H-AM-PCF in this patent can be considered as H-PCF.
  • the method also includes:
  • the first network side device performs a first verification on the URSP rule execution result of the terminal based on the first information.
  • either the first communication device or the fourth communication device can perform the first verification on the URSP rule execution result of the terminal based on the first information.
  • the first network side device performs a first verification on the terminal's URSP rule execution result based on the first information, including the following steps I1 to I3:
  • Step I1 The first network side device compares the URSP rule of the first network saved in the first network side device with the first information; (for example, the first information will indicate the URSP used this time. rule.
  • the first information indicates URSP ruleID, or indicates the traffic descriptor and path selection descriptor used.
  • all the URSP rules sent to the terminal are also saved in the first network side device.
  • the URSP rule used indicated in the first information is different from the URSP rule saved in the first network side device ( That is, if the URSP rule stored in the first network side device does not contain the URSP rule indicated in the first information), it means that the rule is not used correctly, and the terminal uses a rule that is not sent by the network side. )
  • Step 12 In the case where the URSP rule indicated by the first information exists in the URSP rule of the first network, the first network side device determines that the terminal correctly uses the URSP rule of the first network;
  • Step 13 When the URSP rule indicated by the first information does not exist in the URSP rule of the first network, the first network side device determines that the terminal does not correctly use the URSP rule of the first network. .
  • the first verification is verification: whether the URSP rule reported by the terminal is consistent with the URSP rule issued by the first network side device to the terminal.
  • the first communication device for example, H-AM-PCF
  • the fourth communication device V-AM-PCF
  • the above method can be used to perform the first verification.
  • the verification method for the first verification is introduced above, and the verification methods for the second and third verification are introduced below.
  • the second verification is described with the second network side device (such as the second communication device or the third communication device) performing the second verification, specifically including the following steps H1 to H3:
  • Step H1 The second network side device obtains the first session parameter of the PDU session based on the PDU session identifier in the second information, and compares the first session parameter with the URSP rule execution result.
  • the second network side device obtains various parameters of the PDU session that actually carries application traffic, such as SSC mode, DNN, PDU session type, etc.)
  • Step H2 When each parameter in the first session parameter is the same as the corresponding parameter in the second session parameter, the second network side device determines that the terminal correctly uses the first network URSP rule;
  • Step H3 When at least one parameter of the first session parameter and the second session parameter are different, the second network side device determines that the terminal does not correctly use the URSP rule of the first network.
  • the second verification is to verify which PDU session the APP traffic is finally carried to. Therefore, the second verification process needs to compare: the parameters of the PDU session carrying APP traffic (for example, DNN, S-NSSAI, SSC mode, etc.) and the RSC in the URSP rule actually reported by the terminal (for example, DNN, S -NSSAI) are consistent.
  • the second communication device for example, V-SMF
  • the third communication device H-SMF
  • the third verification is also described with the second network side device (such as the second communication device or the third communication device) performing the second verification, specifically including the following steps J1 to J4:
  • Step J1 The second network side device generates a packet detection rule PDR according to the path selection descriptor in the URSP rule execution result, and configures the PDR to the eighth communication device, where the eighth communication device is another device on the network side; here, the packet detection rules can be generated based on the traffic descriptor.
  • the packet detection rules will be used to detect whether there are data packets of the application traffic in the PDU session (that is, the session indicated by the PDU session ID in the second information).
  • Step J2 The second network side device receives the detection result sent by the eighth communication device, wherein the detection result is a traffic detection result based on the PDR;
  • Step J3 When the detection result indicates that traffic is detected, the second network side device determines that the terminal correctly uses the URSP rule of the first network;
  • Step J4 When the detection result indicates that no traffic is detected, the second network side device determines that the terminal does not correctly use the URSP rule of the first network.
  • the third verification is verification: whether there is indeed traffic for the APP in the PDU session that passed the second verification.
  • This method is to generate a packet detection rule (PDR) based on the path selection descriptor in the URSP rule execution result reported by the terminal (that is, an IP five-tuple detection rule), and then in the actual Perform traffic detection in PDU session. If it is detected, it means that it is used correctly; if it is not detected, it means that the traffic of this APP is not transmitted in the PDU session. If the APP traffic is not transmitted in the PDU session, it means that the APP traffic is not actually transmitted in the PDU session.
  • PDR packet detection rule
  • the second communication device for example, V-SMF
  • the third communication device H-SMF
  • the method also includes:
  • the first network side device sends the verification result of the first verification
  • the verification result of the first verification includes at least one of the following:
  • the terminal correctly uses the URSP rule of the first network
  • the terminal does not correctly use the URSP rule of the first network.
  • the first network side device sends the verification result of the first verification, including:
  • the first network side device sends the verification of the first verification to the second communication device and/or the third communication device. Certification results;
  • the second communication device is a second device of the terminal under the first network
  • the third communication device is a third device of the terminal under the second network.
  • the first network side device can send the verification result of the first verification to the second communication device and/or the third communication device respectively.
  • Case 1-1 when the first network side device is the first communication device, the first network side device sends the verification result of the first verification to the second communication device. ,include:
  • the first network side device sends the verification result of the first verification to the second communication device through a fourth communication device and/or a fifth communication device;
  • the fifth communication device is the fifth device of the terminal under the first network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the first communication device can send the verification result of the first verification to the second communication device through the fourth communication device and/or the fifth communication device.
  • the first communication device may be H-AM-PCF
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the fourth communication device may be V-AM-PCF.
  • the transmission path of the verification result of one verification can be: H-AM-PCF ⁇ V-AM-PCF ⁇ V-SM-PCF ⁇ V-SMF.
  • the first communication device can send the verification result of the first verification to the fourth communication device through at least one of the following methods:
  • the fourth communication device may send the verification result of the first verification to the fifth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the fifth communication device sends the verification result of the first verification to the second communication device through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • Case 1-2 when the first network side device is the first communication device, the first network side device sends the verification result of the first verification to the third communication device.
  • the first network side device sends the verification result of the first verification to the third communication device through the sixth communication device;
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the first communication device can send the verification result of the first verification to the third communication device through the sixth communication device.
  • the first communication device may be H-AM-PCF
  • the sixth communication device may be home session management policy control function (H-SM-PCF)
  • the third communication device may be home session management policy control function (H-SM-PCF).
  • the session management function Home Session Management Function, H-SMF
  • H-SMF Home Session Management Function
  • the first communication device can send the verification result of the first verification to the sixth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the sixth communication device sends the verification result of the first verification to the third communication device through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • Case 1-3 when the first network side device is the fourth communication device, the first network side device sends the verification result of the first verification to the second communication device.
  • the first network side device sends the verification result of the first verification to the second communication device through the fifth communication device;
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the fourth communication device can send the verification result of the first verification to the second communication device through the fifth communication device.
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF. That is, the transmission path of the verification result of the first verification may be: V-AM-PCF ⁇ V-SM-PCF ⁇ V-SMF.
  • the fourth communication device can send the verification result of the first verification to the fifth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response Npcf_UEPolicyControl Create Request/Response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the fifth communication device sends the verification result of the first verification to the second communication device through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • Case 1-4 when the first network side device is the fourth communication device, the first network side device sends the verification result of the first verification to the third communication device.
  • the first network side device sends the verification result of the first verification to the third communication device through the sixth communication device and/or the first communication device;
  • the sixth communication device is the sixth device of the terminal under the second network
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device can send the verification result of the first verification to the third communication device through the sixth communication device and/or the first communication device.
  • the fourth communication device may be V-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the first communication device may be H-AM-PCF
  • the third communication device may be H-SMF, that is, the third communication device may be H-SM-PCF.
  • the transmission path of the verification result of one verification can be: V-AM-PCF ⁇ H-AM-PCF ⁇ H-SM-PCF ⁇ H-SMF.
  • the fourth communication device can send the verification result of the first verification to the first communication device through at least one of the following:
  • the first communication device may send the verification result of the first verification to the sixth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the sixth communication device sends the verification result of the first verification to the third communication device through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • the method also includes at least one of the following:
  • the first network side device sends second information
  • the first network side device receives third information
  • the second information includes the URSP rule execution result of the terminal, the PDU session identifier of the terminal, and the user permanent identifier, and the second information is used to perform a second test on the URSP rule execution result of the terminal. Verification and/or third verification;
  • the third information includes the verification result of the second verification and/or the verification result of the third verification
  • the third information is used for at least one of the following:
  • the first network side device can also send the second information to other devices, so that the other devices perform the second verification and/or the third verification of the URSP rule execution result of the terminal. And receive the verification results of the second verification and/or the verification results of the third verification returned by other devices.
  • the first network side device sends second information, including:
  • the first network side device sends the second information to the second communication device and/or the third communication device;
  • the second communication device is a second device of the terminal under the first network
  • the third communication device is a third device of the terminal under the second network.
  • the first network side device can send the above-mentioned second information to the second communication device and/or the third communication device respectively.
  • Case 2-1 when the first network side device is the first communication device, the first network side device sends the second information to the second communication device, including:
  • the first network side device sends the second information to the second communication device through a fourth communication device and/or a fifth communication device;
  • the fourth communication device is a fourth device of the terminal under the first network
  • the fifth communication device is a fifth device of the terminal under the first network
  • the first communication device can send the second information to the second communication device through the fourth communication device and/or the fifth communication device.
  • the first communication device may be H-AM-PCF
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the fourth communication device may be V-AM-PCF.
  • the transmission path of the second information can be: H-AM-PCF ⁇ V-AM-PCF ⁇ V-SM-PCF ⁇ V-SMF.
  • the first communication device can send the second information to the fourth communication device through at least one of the following methods:
  • the fourth communication device may send the second information to the fifth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the fifth communication device sends the second information to the second communication device through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • Case 2-2 when the first network side device is the first communication device, the first network side device sends the second information to the third communication device, including:
  • the first network side device sends the second information to the third communication device through a sixth communication device;
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the first communication device can send the second information to the third communication device through the sixth communication device.
  • the first communication device may be H-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the third communication device may be H-SMF, that is, the transmission path of the second information may be: H-AM- PCF ⁇ H-SM-PCF ⁇ H-SMF.
  • the first communication device may send the second information to the sixth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the sixth communication device sends the second information to the third communication device through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • Case 2-3 when the first network side device is a fourth communication device, the first network side device sends the second information to the second communication device, including:
  • the first network side device sends the second information to the second communication device through a fifth communication device;
  • the fourth communication device is a fourth device of the terminal under the first network
  • the fifth communication device is a fifth device of the terminal under the first network
  • the fourth communication device can send the second information to the second communication device through the fifth communication device.
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the transmission path of the second information may be: V-AM- PCF ⁇ V-SM-PCF ⁇ V-SMF.
  • the fourth communication device can send the second information to the fifth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the fifth communication device sends the second information to the second communication device through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • Case 2-4 when the first network side device is the fourth communication device, the first network side device sends the second information to the third communication device, including:
  • the first network side device sends the second information to the third communication device through the first communication device and/or the sixth communication device;
  • the first communication device is the first device of the terminal under the second network
  • the sixth communication device is the sixth device of the terminal under the second network
  • the fourth communication device can send the second information to the third communication device through the sixth communication device and/or the first communication device.
  • the fourth communication device may be V-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the first communication device may be H-AM-PCF
  • the third communication device may be H-SMF, that is, the third communication device may be H-SM-PCF.
  • the transmission path of the second information can be: V-AM-PCF ⁇ H-AM-PCF ⁇ H-SM-PCF ⁇ H-SMF.
  • the fourth communication device can send the second information to the first communication device through at least one of the following:
  • the first communication device may send the second information to the sixth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the sixth communication device sends the second information to the third communication device through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • the first network side device receives the third information, including:
  • the first network side device receives the third information from the second communication device and/or the third communication device;
  • the second communication device is a second device of the terminal under the first network
  • the third communication device is a third device of the terminal under the second network.
  • the first network side device can receive the above third information from the second communication device and/or the third communication device respectively.
  • Case 3-1 when the first network side device is the first communication device, the first network side device receives the third information from the second communication device, including:
  • the first network side device receives the third information sent by the second communication device through a fourth communication device and/or a fifth communication device;
  • the fourth communication device is a fourth device of the terminal under the first network
  • the fifth communication device is a fifth device of the terminal under the first network
  • the first communication device can receive the third information sent by the second communication device through the fourth communication device and/or the fifth communication device.
  • the first communication device may be H-AM-PCF
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the fourth communication device may be V-AM-PCF.
  • the transmission path of the three information can be: V-SMF ⁇ V-SM-PCF ⁇ V-AM-PCF ⁇ H-AM-PCF.
  • the second communication device may send the third information to the fifth communication device through at least one of the following:
  • Session policy control creation request (Npcf_SMPolicyControl_Create Request);
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • the fifth communication device can send the third information to the fourth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the fourth communication device may send the third information to the first communication device through at least one of the following:
  • the first network side device receives the third information from the third communication device, including:
  • the first network side device receives the third information sent by the third communication device through a sixth communication device;
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the first communication device can receive the third message sent by the third communication device through the sixth communication device.
  • the first communication device may be H-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the third communication device may be H-SMF, that is, the transmission path of the third information may be: H-SMF ⁇ H-SM-PCF ⁇ H-AM-PCF.
  • the third communication device can use at least one of the following to send the third information to the sixth communication device:
  • Session policy control creation request (Npcf_SMPolicyControl_Create Request);
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • the sixth communication device may send the third information to the first communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • Case 3-3 when the first network side device is the fourth communication device, the first network side device receives the third information sent by the second communication device, including:
  • the first network side device receives the third information sent by the second communication device through the fifth communication device;
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the fourth communication device can receive the third information sent by the second communication device through the fifth communication device.
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the transmission path of the third information may be: V-SMF ⁇ V-SM-PCF ⁇ V-AM-PCF.
  • the second communication device may send the third information to the fifth communication device through at least one of the following:
  • Session policy control creation request (Npcf_SMPolicyControl_Create Request);
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • the fifth communication device can send the third information to the fourth communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • Case 3-4 when the first network side device is the fourth communication device, the first network side device receives the third information sent by the third communication device, including:
  • the first network side device receives the third information sent by the third communication device through the first communication device and/or the sixth communication device;
  • the first communication device is the first device of the terminal under the second network
  • the sixth communication device The terminal is a sixth device under the second network.
  • the fourth communication device can receive the third information sent by the third communication device through the sixth communication device and/or the first communication device.
  • the fourth communication device may be V-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the first communication device may be H-AM-PCF
  • the third communication device may be H-SMF, that is, the third communication device may be H-SM-PCF.
  • the transmission path of the three information can be: H-SMF ⁇ H-SM-PCF ⁇ H-AM-PCF ⁇ V-AM-PCF.
  • the third communication device can use at least one of the following to send the third information to the sixth communication device:
  • Session policy control creation request (Npcf_SMPolicyControl_Create Reques);
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • the sixth communication device may send the third information to the first communication device through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the first communication device sends the third information to the fourth communication device according to at least one of the following:
  • Figure 3 is a flow chart of a routing policy execution result processing method provided by an embodiment of the present application.
  • the method may include the following steps 301 to 302:
  • Step 301 The second network side device receives the second information.
  • the second information includes the routing policy URSP rule execution result of the terminal, the protocol data unit PDU session identifier of the terminal, and the user permanent identifier.
  • the second information is used to evaluate the URSP rule execution result of the terminal. Perform a second verification and/or a third verification.
  • the terminal is a roaming terminal.
  • the URSP rule execution result includes at least one of the following:
  • the URSP rule executed by the terminal for application traffic
  • the terminal is a traffic descriptor executed by application traffic
  • the protocol data unit PDU session identifier that carries the application traffic.
  • the URSP rules configured on a terminal include At least one of the process descriptor, path selection descriptor, and PDU session identifier carrying the traffic.
  • Step 302 The second network side device performs a second verification and/or a third verification on the URSP rule execution result of the terminal based on the second information.
  • verifying the URSP rule execution result on the terminal is to determine whether the terminal uses the URSP rule correctly.
  • the verification process includes three verifications.
  • the first verification can be performed by the first network side device (such as the first communication device or the fourth communication device), thereby sending the verification result of the first verification to the second network side device.
  • the second network side device performs the second verification and/or the third verification.
  • the second network side device can obtain the second information, where the second information includes the terminal's URSP rule execution result, the terminal's protocol data unit PDU session identifier, and the user permanent identifier. , thereby performing the second verification and/or the third verification of the URSP rule on the terminal based on the second information. It can be seen that the terminal's URSP rule execution result can be transmitted to the second network side device to verify the terminal's URSP rule execution result, realizing the acquisition of the terminal's URSP rule execution result.
  • the execution result of the terminal's URSP rule is obtained from the above-mentioned second network side device, so that the terminal's URSP rule execution result can be verified, and thereby it can be learned whether the terminal's URSP rule is used correctly.
  • the first network side device (such as the first communication device or the fourth communication device) performs the first verification for illustration, which specifically includes the following steps I1 to I3:
  • Step I1 The first network side device compares the URSP rule of the first network saved in the first network side device with the first information
  • Step 12 In the case where the URSP rule indicated by the first information exists in the URSP rule of the first network, the first network side device determines that the terminal correctly uses the URSP rule of the first network;
  • Step 13 In the case where the URSP rule indicated by the first information does not exist in the URSP rule of the first network, the first network side device determines that the terminal has not correctly used the URSP rule of the first network. .
  • the first verification is verification: whether the URSP rule reported by the terminal is consistent with the URSP rule issued by the first network side device to the terminal.
  • the first communication device for example, H-AM-PCF
  • the fourth communication device V-AM-PCF
  • the above method can be used to perform the first verification.
  • the URSP rule execution result includes the path selection descriptor executed by the terminal for application traffic;
  • the second network side device performs a second verification on the terminal's URSP rule execution result based on the second information, including the following steps H1 to H3:
  • Step H1 The second network side device obtains the first session parameter of the PDU session based on the PDU session identifier in the second information, and compares the first session parameter with the URSP rule execution result.
  • Step H2 When each parameter in the first session parameter is the same as the corresponding parameter in the second session parameter, the second network side device determines that the terminal correctly uses the URSP of the first network. rule;
  • Step H3 When at least one parameter of the first session parameter and the second session parameter is different, the second network side device determines that the terminal does not correctly use the URSP rule of the first network.
  • the second verification is to verify which PDU session the APP traffic is finally carried to. Therefore, the second verification process needs to compare: the parameters of the PDU session carrying APP traffic (for example, DNN, S-NSSAI, SSC mode, etc.) and the RSC in the URSP rule actually reported by the terminal (for example, DNN, SSC mode, etc.) -NSSAI) are consistent.
  • the second communication device for example, V-SMF
  • the third communication device H-SMF
  • the URSP rule execution result includes the path selection descriptor executed by the terminal for application traffic;
  • the second network side device performs a third verification on the terminal's URSP rule execution result based on the second information, including the following steps J1 to J4:
  • Step J1 The second network side device generates a packet detection rule PDR according to the path selection descriptor in the URSP rule execution result, and configures the PDR to the eighth communication device, where the eighth communication device It is another device on the network side, or the eighth communication device is a device of the core network, or the eighth communication device is any one or more devices of the core network;
  • Step J2 The second network side device receives the detection result sent by the eighth communication device, wherein the detection result is a traffic detection result based on the PDR;
  • Step J3 When the detection result indicates that traffic is detected, the second network side device determines that the terminal correctly uses the URSP rule of the first network;
  • Step J4 When the detection result indicates that no traffic is detected, the second network side device determines that the terminal does not correctly use the URSP rule of the first network.
  • the third verification is verification: whether there is indeed traffic for the APP in the PDU session that passed the second verification.
  • This method is to generate a packet data rule (PDR) based on the path selection descriptor in the URSP rule execution result reported by the terminal (that is, an IP five-tuple detection rule). ), and then perform traffic detection in the actual PDU session. If it is detected, it means that it is used correctly; if it is not detected, it means that the traffic of this APP is not transmitted in the PDU session. If the APP traffic is not transmitted in the PDU session, it means that the APP traffic is not actually transmitted in the PDU session.
  • PDR packet data rule
  • the second communication device for example, V-SMF
  • the third communication device H-SMF
  • the second network side device is a second communication device or a third communication device, wherein the second communication device is a second device of the terminal under the first network, and the third communication device The terminal is a third device under the second network.
  • the first network is the network of the terminal's roaming or visiting place
  • the second network is the network of the terminal's home place; or, the first network is the home network of the terminal.
  • the second network is the network of the terminal's roaming place or visiting place.
  • the second network side device when the second network side device is the second communication device, the second network side device receives the second information, including at least one of the following:
  • the second network side device receives the second information sent by the first communication device through the fifth communication device and/or the fourth communication device;
  • the second network side device receives the second information sent by the fourth communication device through the fifth communication device;
  • the fifth communication device is the fifth device of the terminal under the first network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the first communication device is the The terminal is a first device under the second network.
  • the second communication device can receive the second information sent by the first communication device through the fourth communication device and/or the fifth communication device.
  • the first communication device may be H-AM-PCF
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the fourth communication device may be V-AM-PCF.
  • the transmission path of the second information can be: H-AM-PCF ⁇ V-AM-PCF ⁇ V-SM-PCF ⁇ V-SMF.
  • the second communication device may receive the second information sent by the fourth communication device through the fifth communication device.
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the transmission path of the second information may be: V-AM- PCF ⁇ V-SM-PCF ⁇ V-SMF.
  • the second network side device when the second network side device is the third communication device, the second network side device receives the second information, including at least one of the following:
  • the second network side device receives the second information sent by the first communication device through the sixth communication device;
  • the second network side device receives the second information sent by the fourth communication device through the sixth communication device and/or the first communication device;
  • the sixth communication device is the sixth device of the terminal under the second network
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device is the The terminal is a fourth device under the first network.
  • the third communication device can receive the second information sent by the first communication device through the sixth communication device.
  • the first communication device may be H-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the third communication device may be H-SMF, that is, the transmission path of the second information may be: H-AM- PCF ⁇ H-SM-PCF ⁇ H-SMF.
  • the third communication device may receive the second information sent by the fourth communication device through the sixth communication device and/or the first communication device.
  • the fourth communication device may be V-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the first communication device may be H-AM-PCF
  • the third communication device may be H-SMF, that is, the third communication device may be H-SM-PCF.
  • the transmission path of the second information can be: V-AM-PCF ⁇ H-AM-PCF ⁇ H-SM-PCF ⁇ H-SMF.
  • the method also includes at least one of the following:
  • the second network side device receives the verification result of the first verification of the URSP rule of the terminal
  • the second network side device sends third information
  • the verification result of the first verification includes at least one of the following:
  • the terminal correctly uses the URSP rule of the first network
  • the terminal does not correctly use the URSP rule of the first network
  • the third information includes the verification result of the second verification and/or the verification result of the third verification
  • the third information is used for at least one of the following:
  • the second network side device receives the verification result of the first verification, including:
  • the second network side device receives the verification result of the first verification sent by the first communication device and/or the fourth communication device;
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the second network side device can receive the verification result of the first verification from the first communication device and/or the fourth communication device respectively.
  • Case 4-1 Optionally, when the second network side device is the second communication device, the second network side device receives the verification of the first verification sent by the first communication device.
  • Results include:
  • the second network side device receives the verification result of the first verification sent by the first communication device through the fifth communication device and/or the fourth communication device;
  • the fifth communication device is the fifth device of the terminal under the first network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the first communication device can send the verification result of the first verification to the second communication device through the fourth communication device and/or the fifth communication device.
  • the first communication device may be H-AM-PCF
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the fourth communication device may be V-AM-PCF.
  • the transmission path of the verification result of one verification can be: H-AM-PCF ⁇ V-AM-PCF ⁇ V-SM-PCF ⁇ V-SMF.
  • Case 4-2 Optionally, when the second network side device is the second communication device, the second network side device receives the verification of the first verification sent by the fourth communication device.
  • Results include:
  • the second network side device receives the verification result of the first verification sent by the fourth communication device through the fifth communication device;
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the fourth communication device can send the verification result of the first verification to the second communication device through the fifth communication device.
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF. That is, the transmission path of the verification result of the first verification may be: V-AM-PCF ⁇ V-SM-PCF ⁇ V-SMF.
  • Case 4-3 Optionally, when the second network side device is the third communication device, the second network side device receives the verification of the first verification sent by the first communication device.
  • Results include:
  • the second network side device receives the verification result of the first verification sent by the first communication device through the sixth communication device;
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the first communication device can send the verification result of the first verification to the third communication device through the sixth communication device.
  • the first communication device may be H-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the third communication device may be H-SMF. That is, the transmission path of the verification result of the first verification may be: H-AM-PCF ⁇ H-SM-PCF ⁇ H-SMF.
  • Case 4-4 Optionally, when the second network side device is the third communication device, the second network side device receives the verification of the first verification sent by the fourth communication device.
  • Results include:
  • the second network side device receives the verification result of the first verification sent by the fourth communication device through the sixth communication device and/or the first communication device;
  • the sixth communication device is the sixth device of the terminal under the second network
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device can send the verification result of the first verification to the third communication device through the sixth communication device and/or the first communication device.
  • the fourth communication device may be V-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the first communication device may be H-AM-PCF
  • the third communication device may be H-SMF, that is, the third communication device may be H-SM-PCF.
  • the transmission path of the verification result of one verification can be: V-AM-PCF ⁇ H-AM-PCF ⁇ H-SM-PCF ⁇ H-SMF.
  • the second network side device sends the third information, including:
  • the second network side device sends the third information to the first communication device and/or the fourth communication device;
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the second network side device can send the above third information to the first communication device and/or the fourth communication device respectively.
  • Case 5-1 when the second network side device is the second communication device, the second network side device sends the third information to the first communication device, including:
  • the second network side device sends the third information to the first communication device through a fifth communication device and/or a fourth communication device;
  • the fifth communication device is the fifth device of the terminal under the first network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the first communication device can receive the third information sent by the second communication device through the fourth communication device and/or the fifth communication device.
  • the first communication device may be H-AM-PCF
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the fourth communication device may be V-AM-PCF.
  • the transmission path of the three information can be: V-SMF ⁇ V-SM-PCF ⁇ V-AM-PCF ⁇ H-AM-PCF.
  • Case 5-2 when the second network side device is the second communication device, the second network side device sends the third information to the fourth communication device, including:
  • the second network side device sends the third information to the fourth communication device through the fifth communication device;
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the fourth communication device can receive the third information sent by the second communication device through the fifth communication device.
  • the fourth communication device may be V-AM-PCF
  • the fifth communication device may be V-SM-PCF
  • the second communication device may be V-SMF, that is, the transmission path of the third information may be: V-SMF ⁇ V-SM-PCF ⁇ V-AM-PCF.
  • Case 5-3 when the second network side device is the third communication device, the second network side device sends the third information to the first communication device, including:
  • the second network side device sends the third information to the first communication device through a sixth communication device;
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the first communication device can receive the third information sent by the third communication device through the sixth communication device.
  • the first communication device may be H-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the third communication device may be H-SMF, that is, the transmission path of the third information may be: H-SMF ⁇ H-SM-PCF ⁇ H-AM-PCF.
  • Case 5-4 when the second network side device is the third communication device, the second network side device sends the third information to the fourth communication device, including:
  • the second network side device sends the third information to the fourth communication device through the sixth communication device and/or the first communication device;
  • the sixth communication device is the sixth device of the terminal under the second network
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device can receive the third information sent by the third communication device through the sixth communication device and/or the first communication device.
  • the fourth communication device may be V-AM-PCF
  • the sixth communication device may be H-SM-PCF
  • the first communication device may be H-AM-PCF
  • the third communication device may be H-SMF, that is, the third communication device may be H-SM-PCF.
  • the transmission path of the three information can be: H-SMF ⁇ H-SM-PCF ⁇ H-AM-PCF ⁇ V-AM-PCF.
  • the specific implementation method of the routing policy execution result processing method in the embodiment of the present application can be as follows:
  • LBO local offload
  • Method 1-1 The terminal uses the registration NAS message to report the URSP rule execution result to V-AM-PCF, so that V-AM-PCF performs the first verification mentioned above, and then V-AM-PCF performs the first verification.
  • the verification result of the first verification and the above-mentioned second information are sent to V-SMF, and V-SMF performs the above-mentioned second verification and third verification.
  • Method 1-2 The terminal uses the registration NAS message to report the URSP rule execution results to V-AM-PCF, and then V-AM-PCF reports the URSP rule execution results to H-AM-PCF, so that H-AM-PCF Perform the first verification as described above, and then H-AM-PCF sends the verification result of the first verification and the above-mentioned second information to V-SMF, and V-SMF performs the second verification and Third verification.
  • Method 1-3 The terminal uses the session NAS message to report the URSP rule execution result to V-AM-PCF, so that V-AM-PCF performs the first verification mentioned above, and then V-AM-PCF verifies the first
  • the verification result of the first verification and the above-mentioned second information are sent to V-SMF, and V-SMF performs the above-mentioned second verification and third verification.
  • Method 1-4 The terminal uses session NAS messages to report the URSP rule execution results to V-AM-PCF, and then V-AM-PCF reports the URSP rule execution results to H-AM-PCF, so that H-AM-PCF Perform the first verification as described above, and then H-AM-PCF sends the verification result of the first verification and the above-mentioned second information to V-SMF, and V-SMF performs the second verification and Third verification.
  • the implementation method in the home routed (HR) scenario can be described in the following methods 2-1 to 2-3:
  • Method 2-1 The terminal uses the registration NAS message to report the URSP rule execution result to V-AM-PCF, so that V-AM-PCF performs the first verification mentioned above, and V-SMF performs the above-mentioned third verification. Secondary verification and third verification.
  • Method 2-2 The terminal uses the registration NAS message to report the URSP rule execution result to V-AM-PCF, so that V-AM-PCF performs the first verification mentioned above, and V-SMF performs the above-mentioned third verification.
  • H-SMF performs the third verification described above (or H-SMF performs the second verification described above, and V-SMF performs the third verification described above).
  • Method 2-3 The terminal uses the registration NAS message to report the URSP rule execution results to V-AM-PCF, and then V-AM-PCF reports the URSP rule execution results to H-AM-PCF, so that H-AM-PCF Perform the first verification described above, and V-SMF performs the second verification and third verification described above.
  • Method 2-4 The terminal uses the registration NAS message to report the URSP rule execution results to V-AM-PCF, and then V-AM-PCF reports the URSP rule execution results to H-AM-PCF, so that H-AM-PCF Perform the first verification as described above, the second verification as described above by V-SMF, and the third verification as described above by H-SMF (or the second verification as described above by H-SMF). verification, V-SMF performs the third verification described above).
  • Implementation Mode 1 In the LBO scenario, the roaming UE reports the URSP rule execution results to H-AM-PCF through the registration NAS message. H-AM-PCF performs the first verification, and V-SMF performs the second verification and the second verification. Three times verified.
  • Step 41 The roaming UE obtains the URSP rule
  • V-AM-PCF or H-AM-PCF can provide URSP rule for roaming UE;
  • Step 42 The roaming UE executes the URSP rule and establishes an LBO session
  • Step 43 The roaming UE sends an uplink non-access layer (UL NAS) message to the AMF, where the UL NAS message carries the URSP rule execution result;
  • UL NAS uplink non-access layer
  • Step 44 The AMF sends an N1 message notification (Namf_Communication_N1Message Notify) to the V-AM-PCF, where the Namf_Communication_N1MessageNotify carries the URSP rule execution result; or, through the UE policy control update request (Npcf_UEPolicyControl Update Request), sends the URSP rule execution result;
  • Step 45 V-AM-PCF sends a UE policy control update notification (Npcf_UEPolicyControl UpdateNotify request) to H-AM-PCF, where the Npcf_UEPolicyControl UpdateNotify request carries the URSP rule execution result;
  • Step 46 H-AM-PCF performs the first verification, that is, based on the URSP rule execution result, it determines whether the roaming UE's URSP rule is used correctly;
  • Step 47 H-AM-PCF sends Npcf_UEPolicyControl UpdateNotify response to V-AM-PCF, where Npcf_UEPolicyControl UpdateNotify response carries the result of the first verification (that is, whether the URSP rule carrying the roaming UE uses the correct result);
  • Step 48 V-AM-PCF sends the second information to V-SM-PCF, where the second information includes URSP rule execution result, PDU session ID, and UE SUPI;
  • Step 49 V-SM-PCF sends the above-mentioned second information to V-SMF;
  • Step 410 V-SMF performs the second verification, that is, based on the received second information (i.e., URSP rule execution result, PDU session ID, UE SUPI), it determines the parameters of the PDU session carrying APP traffic (for example, DNN, S -NSSAI, SSC mode, etc.), and whether it is consistent with the RSC (for example, DNN, S-NSSAI) in the URSP rule actually reported by the roaming UE.
  • the received second information i.e., URSP rule execution result, PDU session ID, UE SUPI
  • the parameters of the PDU session carrying APP traffic for example, DNN, S -NSSAI, SSC mode, etc.
  • RSC for example, DNN, S-NSSAI
  • Step 411 V-SMF sends the result of the second verification to V-SM-PCF;
  • Step 4 12 V-SM-PCF sends the result of the second verification to V-AM-PCF;
  • Step 413 V-AM-PCF sends the result of the second verification to H-AM-PCF;
  • Step 414 H-AM-PCF determines whether packet detection needs to be performed based on the second verification result; where, when packet detection is required, step 415 is performed; for example, if the second verification result indicates that the roaming UE has not used URSP correctly rule, no three verifications are required;
  • Step 415 H-AM-PCF sends a packet detection indication to V-AM-PCF;
  • Step 416 V-AM-PCF sends a packet detection indication to V-SM-PCF;
  • Step 417 V-SM-PCF sends a packet detection indication to V-SMF;
  • Step 418 V-SMF performs the third verification, that is, generates PDR based on the URSP rule reported by the roaming UE (i.e., the URSP rule actually used by the roaming UE as indicated in the URSP rule execution result);
  • Step 419 V-SMF configures PDR to UPF
  • Step 420 UPF sends the detection result (that is, the detection result according to the configured PDR, that is, the result of the third verification mentioned above) to V-SMF;
  • Step 421 V-SMF sends the detection result to V-SM-PCF;
  • Step 422 V-SM-PCF sends the detection result to V-AM-PCF;
  • Step 423 V-AM-PCF sends the detection result to H-AM-PCF;
  • Step 424 H-AM-PCF determines whether to update the URSP rule based on the received detection results; where, when it is necessary to update the URSP rule, perform step 425;
  • Step 425 Update the URSP rule, that is, H-AM-PCF can send indication information to instruct V-SMF to refuse the establishment of LBO session; or perform the release of PDU session, and then rebuild the session. That is, the instruction information is used to instruct V-SMF to release the LBO session or reject the session establishment.
  • the instruction information also includes: PDU session ID, URSP rule verification result (including primary and secondary ,three times).
  • the method for H-AM-PCF to send the indication information includes: H-AM-PCF sends the indication information to V-AM-PCF, V-AM-PCF sends the indication information to V-SM-PCF, V-SM -PCF then sends indication information to V-SMF;
  • H-AM-PCF can send the instruction information to V-AM-PCF through at least one of the following methods:
  • the V-AM-PCF may send the indication information to the V-SM-PCF through at least one of the following:
  • Npcf_UEPolicyControl Update Request/Response UE policy control update request/response
  • Npcf_UEPolicyControl Create Request/Response UE policy control creation request/response
  • Npcf_UEPolicyControl UpdateNotify UE policy control update notification
  • the V-SM-PCF shall send the instruction information to the V-SMF through at least one of the following:
  • Session policy control update request (Npcf_SMPolicyControl_Update Request).
  • Implementation Mode 2 In the HR scenario, the roaming UE reports the URSP rule execution results to H-AM-PCF through the registration NAS message. H-AM-PCF performs the first verification, and V-SMF performs the second verification. -SMF performs third verification.
  • Step 51 The roaming UE obtains the URSP rule
  • V-AM-PCF or H-AM-PCF can provide URSP rules for roaming UEs
  • Step 52 The roaming UE executes the URSP rule and establishes an HR session
  • Step 53 The roaming UE sends a UL NAS message to the AMF, where the UL NAS message carries the URSP rule execution result;
  • Step 54 AMF sends Namf_Communication_N1MessageNotify to V-AM-PCF, where Namf_Communication_N1MessageNotify carries the URSP rule execution result and PDUsession ID;
  • Step 55 V-AM-PCF sends Npcf_UEPolicyControl UpdateNotify request to H-AM-PCF, where the Npcf_UEPolicyControl UpdateNotify request carries the URSP rule execution result and PDU session ID;
  • Step 56 H-AM-PCF performs the first verification, that is, judging whether the URSP rule of the roaming UE is used correctly based on the URSP rule execution result;
  • Step 57 H-AM-PCF sends Npcf_UEPolicyControl UpdateNotify response to V-AM-PCF, where Npcf_UEPolicyControl UpdateNotify response carries the result of the first verification (that is, whether the URSP rule carrying the roaming UE uses the correct result);
  • Step 58 H-AM-PCF sends the second information to V-AM-PCF, where the second information includes URSP rule execution result, PDU session ID, and UE SUPI;
  • Step 59 V-AM-PCF sends the above-mentioned second information to V-SM-PCF;
  • Step 510 V-SM-PCF sends the above-mentioned second information to V-SMF;
  • Step 511 V-SMF performs the second verification, that is, based on the received URSP rule execution results, PDU session ID, and UE SUPI, it determines the parameters of the PDU session carrying APP traffic (for example, DNN, S-NSSAI, SSC mode, etc. ), is consistent with the RSC (for example, DNN, S-NSSAI) in the URSP rule actually reported by the roaming UE.
  • the parameters of the PDU session carrying APP traffic for example, DNN, S-NSSAI, SSC mode, etc.
  • Step 512 V-SMF sends the result of the second verification to V-SM-PCF;
  • Step 5 13 V-SM-PCF sends the result of the second verification to V-AM-PCF;
  • Step 514 V-AM-PCF sends the result of the second verification to H-AM-PCF;
  • Step 515 H-AM-PCF determines whether packet detection needs to be performed based on the second verification result; where, when packet detection is required, step 516 is performed;
  • Step 516 H-AM-PCF sends a packet detection indication to H-SM-PCF;
  • Step 517 H-SM-PCF sends a packet detection instruction to H-SMF;
  • Step 518 H-SMF performs the third verification, that is, generating PDR based on the URSP rule reported by the roaming UE (i.e., the URSP rule actually used by the roaming UE as indicated in the URSP rule execution result);
  • Step 519 H-SMF configures PDR to UPF
  • Step 520 UPF sends the detection result (that is, the detection result according to the configured PDR, that is, the result of the third verification mentioned above) to H-SMF;
  • Step 521 H-SMF sends the detection result to H-SM-PCF;
  • Step 522 H-SM-PCF sends the detection result to H-AM-PCF;
  • Step 523 H-AM-PCF determines whether to update the URSP rule based on the received detection results; where, when it is necessary to update the URSP rule, perform step 524;
  • Step 524 Update the URSP rule, that is, H-AM-PCF can instruct V-SMF to refuse the establishment of HR session; or perform the release of PDU session, and then rebuild the session.
  • the instruction method is as described in Embodiment 1 above.
  • Implementation method three In the HR scenario, the roaming UE reports the URSP rule execution result to H-AM-PCF through the session NAS message. H-AM-PCF performs the first verification, and V-SMF performs the second verification. -SMF performs third verification.
  • Step 61 The roaming UE obtains the URSP rule
  • V-AM-PCF or H-AM-PCF can provide URSP rule for roaming UE;
  • Step 62 The roaming UE executes the URSP rule and establishes an HR session
  • Step 63 The roaming UE sends a PDU session establishment request (PDU session establishment request) or a PDU session modification request (PDU session modification request) to the AMF, where the PDU session establishment request or PDU session modification request carries the URSP rule execution of the roaming UE. result;
  • Step 64 AMF sends a PDU session management context creation request (Nsmf_PDUSession_CreateSMContext request) to V-SMF, in which the Nsmf_PDUSession_CreateSMContext request carries the URSP rule execution result;
  • Step 65 V-SMF sends SM Policy Association Modification (SM Policy Association Modification) to V-SM-PCF, where SM Policy Association Modification carries the URSP rule execution result;
  • Step 66 V-SM-PCF sends the URSP rule execution result to V-AM-PCF;
  • Step 67 V-AM-PCF sends Npcf_UEPolicyControl UpdateNotify request to H-AM-PCF, where Npcf_UEPolicyControl UpdateNotify request carries the URSP rule execution result;
  • Step 68 H-AM-PCF performs the first verification, that is, judging whether the URSP rule of the roaming UE is used correctly based on the URSP rule execution result;
  • Step 69 H-AM-PCF sends Npcf_UEPolicyControl UpdateNotify response to V-AM-PCF, where Npcf_UEPolicyControl UpdateNotify response carries the result of the first verification (that is, whether the URSP rule carrying roaming UE uses the correct result);
  • Step 610 H-AM-PCF sends second information to V-AM-PCF, where the second information includes URSP rule execution result, PDU session ID, and UE SUPI;
  • Step 611 V-AM-PCF sends the above-mentioned second information to V-SM-PCF;
  • Step 612 V-SM-PCF sends the above-mentioned second information to V-SMF;
  • Step 613 V-SMF performs the second verification, that is, based on the received URSP rule execution results, PDU session ID, and UE SUPI, it determines the parameters of the PDU session carrying APP traffic (for example, DNN, S-NSSAI, SSC mode, etc. ), is consistent with the RSC (for example, DNN, S-NSSAI) in the URSP rule actually reported by the roaming UE.
  • the parameters of the PDU session carrying APP traffic for example, DNN, S-NSSAI, SSC mode, etc.
  • Step 614 V-SMF sends the result of the second verification to V-SM-PCF;
  • Step 615 V-SM-PCF sends the result of the second verification to V-AM-PCF;
  • Step 616 V-AM-PCF sends the result of the second verification to H-AM-PCF;
  • Step 617 H-AM-PCF determines whether packet detection needs to be performed based on the second verification result; where, when packet detection is required, step 616 is performed;
  • Step 618 H-AM-PCF sends a packet detection indication to H-SM-PCF;
  • Step 619 H-SM-PCF sends a packet detection instruction to H-SMF;
  • Step 620 H-SMF performs the third verification, that is, generating PDR based on the URSP rule reported by the roaming UE (i.e., the URSP rule actually used by the roaming UE as indicated in the URSP rule execution result);
  • Step 621 H-SMF configures PDR to UPF
  • Step 622 UPF sends the detection result (that is, the detection result according to the configured PDR, that is, the result of the third verification mentioned above) to H-SMF;
  • Step 623 H-SMF sends the detection result to H-SM-PCF;
  • Step 624 H-SM-PCF sends the detection result to H-AM-PCF;
  • Step 625 H-AM-PCF determines whether to update the URSP rule based on the received detection results; where, when it is necessary to update the URSP rule, perform step 626;
  • Step 626 Update the URSP rule, that is, H-AM-PCF can instruct V-SMF to refuse the establishment of HR session; or perform the release of PDU session, and then rebuild the session.
  • Implementation Mode 4 The roaming UE sends the URSP rule execution result to the home network (such as H-PCF) through the home routed session in the following manner.
  • the home network such as H-PCF
  • the roaming UE sends the URSP rule execution results (for example, Connection Capability) to the AMF through PDU session establishment request or PDU session modification request;
  • URSP rule execution results for example, Connection Capability
  • AMF sends the URSP rule execution results to V-SMF through Nsmf_PDUSession_CreateSMContext Request or Nsmf_PDUSession_UpdateSMContext Request;
  • V-SMF sends the URSP rule execution results to H-SMF through Nsmf_PDUSession_Create request or Nsmf_PDUSession Update request;
  • H-SMF sends the URSP rule execution result to the session PCF through the SM policy association modification process (here refers to the home PCF for session). Then, the session PCF sends the URSP rule through the UE policy association modification/establishment process. The execution result is sent to the UE PCF (here refers to the home PCF for UE).
  • this implementation method realizes sending the URSP rule execution result from the roaming location to the UE PCF at the home location.
  • a new policy control request trigger may be set in H-SMF. That is, when H-SMF receives the URSP rule execution result from V-SMF, it will send the execution result to the session PCF. (Alternatively, when H-SMF receives the URSP rule execution result from V-SMF, it will send the execution result to PCF, where PCF includes PCF for session or PCF for UE).
  • the execution subject may be a routing policy execution result processing device.
  • the routing policy execution result processing method executed by the routing policy execution result processing device is used as an example to illustrate the routing policy execution result processing device provided by the embodiment of the present application.
  • FIG. 8 is a structural block diagram of a routing policy execution result processing device provided by an embodiment of the present application.
  • the routing policy execution result processing device can be applied to the first network side device.
  • the routing policy execution result processing device 70 includes:
  • the first acquisition module 701 is used to acquire the first information
  • the first information includes the terminal’s routing policy URSP rule execution result
  • the first information is used to verify the URSP rule execution result on the terminal.
  • the first network side device is a first communication device or a fourth communication device, wherein the first communication device is the first device of the terminal in the second network, and the fourth communication device It is the fourth device of the terminal under the first network.
  • the URSP rule execution result includes at least one of the following:
  • the URSP rule executed by the terminal for application traffic
  • the terminal is a traffic descriptor executed by application traffic
  • the protocol data unit PDU session identifier that carries the application traffic.
  • the device also includes:
  • the second verification module is used to perform the first verification on the URSP rule execution result of the terminal based on the first information.
  • the second verification module is specifically used to:
  • the terminal does not correctly use the URSP rule of the first network.
  • the device also includes:
  • a first sending module configured to send the verification result of the first verification
  • the verification result of the first verification includes at least one of the following:
  • the terminal correctly uses the URSP rule of the first network
  • the terminal does not correctly use the URSP rule of the first network.
  • the first sending module is specifically used for:
  • the second communication device is a second device of the terminal under the first network
  • the third communication device is a third device of the terminal under the second network.
  • the first sending module sends the verification result of the first verification to the second communication device, specifically for:
  • the fifth communication device is the fifth device of the terminal under the first network
  • the fourth communication device It is the fourth device of the terminal under the first network.
  • the first sending module is prepared to send the verification result of the first verification to the third communication device, specifically for:
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the first sending module sends the verification result of the first verification to the second communication device, specifically for:
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the first sending module sends the verification result of the first verification to the third communication device, specifically for:
  • the sixth communication device is the sixth device of the terminal under the second network
  • the first communication device is the first device of the terminal under the second network
  • the device further includes at least one of the following:
  • the second sending module is used to send the second information
  • the second receiving module is used to receive the third information
  • the second information includes the URSP rule execution result of the terminal, the PDU session identifier of the terminal, and the user permanent identifier, and the second information is used to perform a second test on the URSP rule execution result of the terminal. Verification and/or third verification;
  • the third information includes the verification result of the second verification and/or the verification result of the third verification
  • the third information is used for at least one of the following:
  • the second sending module is specifically used for:
  • the second communication device is a second device of the terminal under the first network
  • the third communication device is a third device of the terminal under the second network.
  • the second sending module sends the second information to the second communication device, specifically for:
  • the fourth communication device is a fourth device of the terminal under the first network
  • the fifth communication device is a fifth device of the terminal under the first network
  • the second sending module sends the second information to the third communication device, specifically for:
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the second sending module sends the second information to the second communication device, specifically for:
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the second sending module sends the second information to the third communication device, specifically for:
  • the first communication device is the first device of the terminal under the second network
  • the sixth communication device is the sixth device of the terminal under the second network
  • the second receiving module is specifically used for:
  • the second communication device is a second device of the terminal under the first network
  • the third communication device is a third device of the terminal under the second network.
  • the second receiving module receives the third information from the second communication device, specifically for:
  • the fourth communication device is a fourth device of the terminal under the first network
  • the fifth communication device is a fifth device of the terminal under the first network
  • the second receiving module receives the third information from the third communication device, specifically for:
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the second receiving module receives the third information sent by the second communication device, specifically for:
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the second receiving module receives the third information sent by the third communication device, specifically for:
  • the first communication device is the first device of the terminal under the second network
  • the sixth communication device is the sixth device of the terminal under the second network
  • the acquisition module is specifically configured to:
  • the seventh communication device is a device on the network side
  • the second communication device is the second device of the terminal under the first network
  • the fourth communication device is the terminal under the first network.
  • the fourth device, the fifth communication device is the fifth device in the roaming place of the terminal.
  • the first acquisition module is specifically configured to:
  • the seventh communication device is a network side device
  • the second communication device is the second device of the terminal under the first network
  • the fifth communication device is the fifth communication device of the roaming place of the terminal. equipment.
  • the terminal is a roaming terminal.
  • the first network is the network of the terminal's roaming or visiting place
  • the second network is the network of the terminal's home place; or, the first network is the home network of the terminal.
  • the second network is the network of the terminal's roaming place or visiting place.
  • the routing policy execution result processing device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a network side device.
  • the network-side device may be a server, a network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • NAS Network Attached Storage
  • the routing policy execution result processing device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 2 and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • FIG. 9 is a structural block diagram of a routing policy execution result processing device provided by an embodiment of the present application.
  • the routing policy execution result processing device can be applied to the second network side device.
  • the routing policy execution result processing device 80 includes:
  • the first receiving module 801 is configured to receive second information, where the second information includes the execution result of the routing policy URSP rule of the terminal, the protocol data unit PDU session identifier of the terminal, and the user permanent identifier.
  • the second information is used to conduct the second verification and/or the third verification of the URSP rule execution result of the terminal;
  • the first verification module 802 is configured to perform a second verification and/or a third verification on the URSP rule execution result of the terminal based on the second information.
  • the second network side device is a second communication device or a third communication device, wherein the second communication device is a second device of the terminal under the first network, and the third communication device The terminal is a third device under the second network.
  • the first receiving module is specifically configured to perform at least one of the following:
  • the fifth communication device is the fifth device of the terminal under the first network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the first communication device is the The terminal is a first device under the second network.
  • the first receiving module is specifically configured to perform at least one of the following:
  • the sixth communication device is the sixth device of the terminal under the second network
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device is the The terminal is a fourth device under the first network.
  • the URSP rule execution result includes the path selection descriptor executed by the terminal for application traffic;
  • the first verification module performs a second verification on the terminal's URSP rule execution result based on the second information, specifically for:
  • the PDU session identifier in the second information obtain the first session parameter of the PDU session, and compare the first session parameter with the second session parameter represented by the path selection descriptor in the URSP rule execution result ;
  • the URSP rule execution result includes the path selection descriptor executed by the terminal for application traffic;
  • the first verification module performs a third verification on the terminal's URSP rule execution result based on the second information, specifically for:
  • the terminal does not correctly use the URSP rule of the first network.
  • the device further includes at least one of the following:
  • the third receiving module is used to receive the verification result of the first verification of the URSP rule of the terminal;
  • the third sending module is used to send the third information
  • the verification result of the first verification includes at least one of the following:
  • the terminal correctly uses the URSP rule of the first network
  • the terminal does not correctly use the URSP rule of the first network
  • the third information includes the verification result of the second verification and/or the verification result of the third verification
  • the third information is used for at least one of the following:
  • the third receiving module is specifically used for:
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the third receiving module receives the verification result of the first verification sent by the first communication device, specifically for:
  • the fifth communication device is the fifth device of the terminal under the first network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the third receiving module receives the verification result of the first verification sent by the fourth communication device, specifically for:
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the third receiving module receives the verification result of the first verification sent by the first communication device, specifically for:
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the third receiving module receives the The verification result of the first verification sent by the four communication devices is specifically used for:
  • the sixth communication device is the sixth device of the terminal under the second network
  • the first communication device is the first device of the terminal under the second network
  • the third sending module is specifically used for:
  • the first communication device is the first device of the terminal under the second network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the third sending module sends the third information to the first communication device, specifically for:
  • the fifth communication device is the fifth device of the terminal under the first network
  • the fourth communication device is the fourth device of the terminal under the first network
  • the third sending module sends the third information to the fourth communication device, specifically for:
  • the fifth communication device is the fifth device of the terminal under the first network.
  • the third sending module sends the third information to the first communication device, specifically for:
  • the sixth communication device is a sixth device of the terminal under the second network.
  • the third sending module sends the third information to the fourth communication device, specifically for:
  • the sixth communication device is the sixth device of the terminal under the second network
  • the first communication device is the first device of the terminal under the second network
  • the terminal is a roaming terminal.
  • the first network is the network of the terminal's roaming or visiting place
  • the second network is the network of the terminal's home place; or, the first network is the home network of the terminal.
  • the second network is the network of the terminal's roaming place or visiting place.
  • the URSP rule execution result includes at least one of the following:
  • the URSP rule executed by the terminal for application traffic
  • the terminal is a traffic descriptor executed by application traffic
  • the protocol data unit PDU session identifier that carries the application traffic.
  • the routing policy execution result processing device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a network side device.
  • the network-side device may be a server, a network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • NAS Network Attached Storage
  • the routing policy execution result processing device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 3 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • this embodiment of the present application also provides a communication device 900, which includes a processor 901 and a memory 902.
  • the memory 902 stores programs or instructions that can be run on the processor 901, such as , when the communication device 900 is the first network side device, when the program or instruction is executed by the processor 901, each step of the routing policy execution result processing method embodiment described in the first aspect is implemented, and the same technology can be achieved Effect.
  • the communication device 900 is a second network side device, when the program or instruction is executed by the processor 901, each step of the routing policy execution result processing method embodiment described in the second aspect is implemented, and the same technical effect can be achieved. , to avoid repetition, will not be repeated here.
  • the embodiment of the present application also provides a network side device.
  • the network side device 1000 includes: a processor 1001, a network interface 1002, and a memory 1003.
  • the network interface 1002 is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 1000 in this embodiment of the present invention also includes: instructions or programs stored in the memory 1003 and executable on the processor 1001.
  • the processor 1001 calls the instructions or programs in the memory 1003 to execute the steps shown in Figure 2 or 3. The method shown above and achieve the same technical effect are not repeated here to avoid repetition.
  • Embodiments of the present application also provide a readable storage medium on which a program or instructions are stored.
  • the program or instructions are executed by a processor, the routing strategy described in the first aspect or the second aspect is implemented.
  • Each process of the result processing method embodiment is executed and the same technical effect can be achieved. To avoid repetition, details will not be described here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the first aspect or the second aspect.
  • Each process of the routing policy execution result processing method embodiment described in this aspect can achieve the same technical effect. To avoid duplication, it will not be described again here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the first aspect.
  • Each process of the routing policy execution result processing method embodiment described above or in the second aspect can achieve the same technical effect. To avoid duplication, it will not be described again here.
  • Embodiments of the present application also provide a routing policy execution result processing system, including: a first network side device and a second network side device.
  • the first network side device can be used to perform routing as described in the first aspect above.
  • the second network side device may be configured to perform the steps of the routing policy execution result processing method described in the second aspect above.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande appartient au domaine technique des communications. Sont divulgués des procédés de traitement de résultat d'exécution de politique de sélection d'itinéraire, un appareil et un dispositif. Un procédé de traitement de résultat d'exécution de politique de sélection d'itinéraire dans les modes de réalisation de la présente demande comprend l'étape suivante : un premier dispositif côté réseau acquiert des premières informations, les premières informations comprenant un résultat d'exécution de règle de politique de sélection d'itinéraire (URSP) d'un terminal, et les premières informations étant utilisées pour mettre en œuvre une vérification de résultat d'exécution de règle URSP sur le terminal.
PCT/CN2023/109998 2022-09-02 2023-07-28 Procédés de traitement de résultat d'exécution de politique de sélection d'itinéraire, appareil et dispositif WO2024045970A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211076061.7A CN117692982A (zh) 2022-09-02 2022-09-02 路由选择策略执行情况处理方法、装置及设备
CN202211076061.7 2022-09-02

Publications (1)

Publication Number Publication Date
WO2024045970A1 true WO2024045970A1 (fr) 2024-03-07

Family

ID=90100322

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/109998 WO2024045970A1 (fr) 2022-09-02 2023-07-28 Procédés de traitement de résultat d'exécution de politique de sélection d'itinéraire, appareil et dispositif

Country Status (2)

Country Link
CN (1) CN117692982A (fr)
WO (1) WO2024045970A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404814A (zh) * 2020-02-28 2020-07-10 华为技术有限公司 一种数据传输的方法及通信装置
CN112399523A (zh) * 2020-12-01 2021-02-23 中国联合网络通信集团有限公司 一种ursp核查方法及装置
US20220150991A1 (en) * 2019-08-05 2022-05-12 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Session verification method, user equipment, and policy control function entity
CN114845355A (zh) * 2022-04-29 2022-08-02 中国电信股份有限公司 网络接入方法及装置、终端设备、网络设备、存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220150991A1 (en) * 2019-08-05 2022-05-12 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Session verification method, user equipment, and policy control function entity
CN111404814A (zh) * 2020-02-28 2020-07-10 华为技术有限公司 一种数据传输的方法及通信装置
CN112399523A (zh) * 2020-12-01 2021-02-23 中国联合网络通信集团有限公司 一种ursp核查方法及装置
CN114845355A (zh) * 2022-04-29 2022-08-02 中国电信股份有限公司 网络接入方法及装置、终端设备、网络设备、存储介质

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE: "Optimal policy control support for PDU session establishment", 3GPP DRAFT; S2-1903692 OPT SM POLICY SUPPORT FOR PDU SESSION SETUP, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Xian, China; 20190407 - 20190412, 2 April 2019 (2019-04-02), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051719838 *

Also Published As

Publication number Publication date
CN117692982A (zh) 2024-03-12

Similar Documents

Publication Publication Date Title
EP4160995A1 (fr) Procédé et dispositif de traitement de données
US11950175B2 (en) Communication method and communications apparatus
CN108605383A (zh) 无线通信系统中执行用于基于网络切片的nr的小区规范过程的方法和装置
EP4383664A1 (fr) Procédé et appareil de communication
CN114365527A (zh) 用于无线通信系统中的网络自动化的装置和方法
US20240129710A1 (en) Methods and apparatus for subscription authorization enhancement
WO2024045970A1 (fr) Procédés de traitement de résultat d'exécution de politique de sélection d'itinéraire, appareil et dispositif
KR20230137998A (ko) Af 세션에 대한 외부 매개변수 프로비저닝을 위한 새로운 방법
KR102273390B1 (ko) 네트워크 기능 통합방법 및 장치
CN107333322A (zh) 一种家长控制方法和基站
EP3903449A1 (fr) Procédure améliorée d'association de pfcp pour rétablissement de session
WO2023216961A1 (fr) Procédé et appareil de traitement d'informations de protection de confidentialité, et dispositif de communication
WO2023179709A1 (fr) Procédé et appareil de traitement d'informations, dispositif de communication et support de stockage lisible
US20240031335A1 (en) Information processing method and apparatus, and communication device
WO2024120285A1 (fr) Procédé et appareil de transmission d'informations, ainsi que terminal et dispositif côté réseau
WO2023185810A1 (fr) Procédé de détermination de politique de sélection d'itinéraire d'ue (ursp), équipement utilisateur et dispositif côté réseau
WO2024027578A1 (fr) Procédé et appareil de routage de trafic, et dispositif
WO2024120286A1 (fr) Procédé et appareil de transmission, terminal et dispositif côté réseau
US20240205212A1 (en) Digital twin task authorization method and apparatus, communications device, and readable storage medium
WO2023185725A1 (fr) Procédé et appareil d'acquisition de données et dispositif côté réseau
WO2024061205A1 (fr) Procédé et appareil d'acquisition de paramètres, première fonction de réseau et seconde fonction de réseau
WO2023179571A1 (fr) Procédé et appareil d'accès à un réseau non public et terminal
WO2023185850A1 (fr) Procédés et appareils d'optimisation de règles de politique ursp, terminal, dispositif côté réseau et support
WO2023179595A1 (fr) Procédé et appareil d'établissement de canal de session pour un dispositif non 3gpp, et dispositif
WO2024067331A1 (fr) Procédé de commutation de dispositif dans un réseau personnel de l'internet des objets, et procédé et dispositif de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23859005

Country of ref document: EP

Kind code of ref document: A1