WO2024066436A1 - 一种通信方法及装置 - Google Patents
一种通信方法及装置 Download PDFInfo
- Publication number
- WO2024066436A1 WO2024066436A1 PCT/CN2023/097768 CN2023097768W WO2024066436A1 WO 2024066436 A1 WO2024066436 A1 WO 2024066436A1 CN 2023097768 W CN2023097768 W CN 2023097768W WO 2024066436 A1 WO2024066436 A1 WO 2024066436A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- information
- target terminal
- network element
- core network
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 217
- 238000004891 communication Methods 0.000 title claims abstract description 157
- 230000006870 function Effects 0.000 claims description 74
- 230000015654 memory Effects 0.000 claims description 69
- 230000008569 process Effects 0.000 claims description 58
- 238000012545 processing Methods 0.000 claims description 42
- 230000004044 response Effects 0.000 claims description 39
- 238000004590 computer program Methods 0.000 claims description 18
- 238000013461 design Methods 0.000 description 41
- 238000007726 management method Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 14
- 230000002441 reversible effect Effects 0.000 description 12
- 210000004027 cell Anatomy 0.000 description 9
- 210000001956 EPC Anatomy 0.000 description 7
- 102100029716 DnaJ homolog subfamily A member 3, mitochondrial Human genes 0.000 description 6
- 101000866012 Homo sapiens DnaJ homolog subfamily A member 3, mitochondrial Proteins 0.000 description 6
- 238000013475 authorization Methods 0.000 description 6
- 238000013523 data management Methods 0.000 description 5
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 4
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 3
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 2
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 2
- 235000014510 cooky Nutrition 0.000 description 2
- 230000009849 deactivation Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000000638 stimulation Effects 0.000 description 2
- 101150119040 Nsmf gene Proteins 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 235000019800 disodium phosphate Nutrition 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 229960005486 vaccine Drugs 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Definitions
- the present application relates to the field of communication technology, and in particular to a communication method and device.
- IoT terminal devices e.g., radio frequency identification (RFID) devices
- RFID radio frequency identification
- IoT terminal devices can be used to carry out inventory and tracking of goods, as well as environmental and cargo status monitoring during the transportation of high-value goods (e.g., vaccines); in industrial manufacturing scenarios, IoT terminal devices can be used to monitor the environment and equipment status.
- RFID radio frequency identification
- Passive or semi-passive IoT terminal devices have simple functions, which means they need to rely on external stimulation to send information.
- the stimulation usually comes from a card reader (or reader/writer).
- the card reader can be integrated into the access network device, and the access network device operates the IoT terminal device according to the instructions of the core network element.
- the present application provides a communication method and apparatus for improving the efficiency of operating an Internet of Things terminal device.
- an embodiment of the present application provides a communication method.
- the execution subject of the method may be a core network element, or a component applied in the core network element, such as a chip, a processor, etc.
- the following description is taken as an example that the execution subject is a core network element.
- the core network element may obtain first information of a target terminal device, and the first information may be used to determine second information, and the second information is used to indicate a storage area in the target terminal device corresponding to a first operation. Then, the core network element may send the second information and indication information of the first operation to the target terminal device, and receive the result of the target terminal device performing the first operation according to the second information.
- the core network element when instructing to operate the target terminal device, the core network element sends the second information and the instruction information of the first operation to the target terminal device, and the second information is used to indicate the storage area corresponding to the first operation in the target terminal device.
- the terminal device can determine the storage area corresponding to the first operation, thereby improving the efficiency of operating the terminal device.
- the first information includes at least one of the following: TID of the target terminal device, chip type information of the target terminal device, factory marking information of the target terminal device, storage area information of the target terminal device, and second information.
- TID of the target terminal device chip type information of the target terminal device
- factory marking information of the target terminal device storage area information of the target terminal device
- second information second information.
- the core network element may obtain the first information from the target terminal device.
- the core network element may obtain the first information from the target terminal device in one of the following ways:
- the core network element may send a first message to the target terminal device through the access network device, and the first message is used to trigger the target terminal device to initiate a random access process. Then, the core network element may receive a registration request from the target terminal device, and the registration request includes the first information. Through method 1, the core network element may obtain the first information through the registration request from the target terminal device. In this way, the core network element may obtain the first information from the target terminal device as early as possible.
- Method 2 After sending a read command to the target terminal device, the core network element may receive a read command response from the target terminal device.
- the read command is used to read the first information in the target terminal device; the read command response includes the first information.
- the core network element may trigger the target terminal device to send a read command response to the core network element through a read command, and the read command response includes the first information. In this way, the core network element may obtain the first information from the target terminal device as needed.
- the core network element may send a read command to the target terminal device after determining that the target terminal device is a passive tag or a semi-passive tag.
- the core network element may send a read command to the target terminal device in a targeted manner to obtain the first information of the target terminal device.
- the core network element can obtain the tag type indication information of the target terminal device from the first network element or the target terminal device, and determine whether the target terminal device is a passive tag or a semi-passive tag according to the tag type indication information.
- the core network element can flexibly determine whether the target terminal device is a passive tag or a semi-passive tag.
- the core network element may obtain the first information from the application function element.
- the core network element receives a service request from the application function element, and the service request includes the first information.
- the core network element may obtain the first information as early as possible through the service request.
- the core network element can obtain the correspondence between the first information and the storage area corresponding to the first operation in the target terminal device, and determine the second information based on the correspondence and the first information.
- the core network element can determine the second information based on the correspondence between the first information and the storage area corresponding to the first operation in the target terminal device, without obtaining the second information from other devices, thereby simplifying the process of obtaining the second information and improving the efficiency of obtaining the second information.
- the core network element may obtain the correspondence between the locally stored first information and the storage area corresponding to the first operation in the target terminal device, or obtain the correspondence between the first information and the storage area corresponding to the first operation in the target terminal device from the second network element.
- the core network element can flexibly obtain the correspondence between the first information and the storage area corresponding to the first operation in the target terminal device.
- the core network element may send the first information to the third network element and receive the second information determined by the third network element based on the first information.
- the core network element can obtain the second information from the third network element in a more flexible way.
- the core network element when the first information includes the storage area information of the target terminal device, before the core network element sends the second information and the indication information of the first operation to the target terminal device, the core network element can determine the second information based on the storage area information of the target terminal device and the indication information of the first operation.
- the core network element can determine the second information based on the storage area information of the target terminal device and the indication information of the first operation without obtaining the second information from other devices, thereby simplifying the process of obtaining the second information and improving the efficiency of obtaining the second information.
- the core network element may send an operation message to the target terminal device, where the operation message is used to instruct to perform a first operation on the target terminal device, and the operation message includes the second information and instruction information of the first operation.
- the core network element can send the second information and the instruction information of the first operation to the target terminal device through an operation message, which is easy to implement.
- the first operation may be one or more of a read operation, a write operation, an access operation, a kill operation, a lock operation, a block write operation, a block erase operation, and a write electronic product code (EPC) operation.
- EPC write electronic product code
- the second information includes an identifier of a storage area in the target terminal device corresponding to the first operation.
- the second information can flexibly and conveniently indicate the storage area in the target terminal device corresponding to the first operation.
- the second information further includes at least one of the following: a pointer value, used to indicate the location where the first operation starts to be performed in the storage area; a length, used to indicate the length of the data for performing the first operation in the storage area; a mask or a reverse mask, used to indicate the mask or reverse mask used to perform the first operation in the storage area.
- a pointer value used to indicate the location where the first operation starts to be performed in the storage area
- a length used to indicate the length of the data for performing the first operation in the storage area
- a mask or a reverse mask used to indicate the mask or reverse mask used to perform the first operation in the storage area.
- an embodiment of the present application provides a communication method.
- the execution subject of the method may be a terminal device, or a component applied in the terminal device, such as a chip, a processor, etc.
- the following description is taken as an example in which the execution subject is a target terminal device.
- the target terminal device may send a first information to a core network network element.
- the first information is used to determine the second information
- the second information is used to indicate a storage area in the target terminal device corresponding to the first operation.
- the target terminal device may receive the second information and the indication information of the first operation from the core network network element, and send the result of the target terminal device performing the first operation according to the second information to the core network network element.
- the core network element when instructing to operate the target terminal device, can obtain the first information from the target terminal device, and send the second information and the instruction information of the first operation to the target terminal device.
- the first information is used to determine the second information
- the second information is used to indicate the storage area corresponding to the first operation in the target terminal device.
- the terminal device can determine the storage area corresponding to the first operation, thereby improving the efficiency of operating the terminal device.
- the first information includes at least one of the following: TID of the target terminal device, chip type information of the target terminal device, factory marking information of the target terminal device, and storage area information of the target terminal device.
- the target terminal device may receive a first message sent by the core network element through the access network device, and the first message is used to trigger the target terminal device to initiate a random access process. Then, the target terminal device may send a registration request to the core network element, and the registration request includes the first information. With this design, the target terminal device may send the first information to the core network element through the registration request. In this way, the core network element can obtain the first information from the target terminal device as early as possible.
- the target terminal device may send a read command response to the core network element after receiving a read command from the core network element.
- the read command is used to read the first information in the target terminal device; the read command response includes the first information.
- the target terminal device may send a read command response including the first information to the core network element according to the read command from the core network element. In this way, the target terminal device may send the first information according to the needs of the core network element.
- the target terminal device may send tag type indication information of the target terminal device to the core network element, where the tag type indication information is used to indicate that the target terminal device is a passive tag or a semi-passive tag.
- the target terminal device may notify the core network element that the target terminal device is a passive tag or a semi-passive tag, so that the core network element can send a read command to the target terminal device in a targeted manner.
- the target terminal device may receive an operation message from a core network element.
- the operation message is used to indicate that a first operation is performed on the target terminal device, and the operation message includes the second information and an indication of the first operation.
- the target terminal device can obtain the second information and the instruction information of the first operation through the operation message, which is easy to implement.
- the first operation is one or more of a read operation, a write operation, an access operation, a kill operation, a lock operation, a block write operation, a block erase operation, and an electronic product code (EPC) write operation.
- EPC electronic product code
- the second information includes an identifier of a storage area in the target terminal device corresponding to the first operation.
- the second information can flexibly and conveniently indicate the storage area in the target terminal device corresponding to the first operation.
- the second information further includes at least one of the following: a pointer value, used to indicate the location where the first operation starts to be performed in the storage area; a length, used to indicate the length of the data for performing the first operation in the storage area; a mask or a reverse mask, used to indicate the mask or reverse mask used to perform the first operation in the storage area.
- a pointer value used to indicate the location where the first operation starts to be performed in the storage area
- a length used to indicate the length of the data for performing the first operation in the storage area
- a mask or a reverse mask used to indicate the mask or reverse mask used to perform the first operation in the storage area.
- an embodiment of the present application provides a communication method.
- the execution subject of the method may be a core network element, or a component applied in the core network element, such as a chip, a processor, etc.
- the following description is made by taking the execution subject being a core network element as an example.
- the core network element may receive a first request from an application function element. The first request is used to request to read data in a target terminal device, and the first request is also used to indicate that the storage area of the target terminal device is a single storage area.
- the core network element may send a first message to the target terminal device through an access network device.
- the first message is used to trigger the target terminal device to initiate a random access process, and the first message also includes a first indication, and the first indication is used to instruct the target terminal device to send the data in the target terminal device.
- the core network element may receive a registration request sent by the target terminal device according to the first indication, and the registration request includes the data in the target terminal device.
- the core network network element can send a first indication to the target terminal device.
- the target terminal device can send the data in the target terminal device to the core network network element through a registration request, thereby eliminating the need for the core network network element to send a read command to the target terminal device, thereby simplifying the process of obtaining data from a terminal device with a single storage area and reducing overhead.
- an embodiment of the present application provides a communication method.
- the execution subject of the method may be a terminal device, or a component applied in the terminal device, such as a chip, a processor, etc.
- the following description is taken as an example in which the execution subject is a target terminal device.
- the target terminal device may receive a first message sent by a core network network element through an access network device. Among them, the first message is used to trigger the target terminal device to initiate a random access process, and the first message also includes a first indication, and the first indication is used to instruct the target terminal device to send data in the target terminal device. Then, the target terminal device may send a registration request to the core network network element according to the first indication, and the registration request includes the data in the target terminal device.
- the core network network element can send a first indication to the target terminal device.
- the target terminal device can send the data in the target terminal device to the core network network element through a registration request, thereby eliminating the need for the core network network element to send a read command to the target terminal device, thereby simplifying the process of obtaining data from a terminal device with a single storage area and reducing overhead.
- an embodiment of the present application provides a communication device, comprising a unit for executing each step in any of the above aspects.
- an embodiment of the present application provides a communication device, comprising at least one processing element and at least one storage element, wherein the at least one storage element is used to store programs and data, and the at least one processing element is used to read and execute the programs and data stored in the storage element, so that the method provided in any one of the above aspects of the present application is implemented.
- an embodiment of the present application provides a communication system, including: a communication system for executing the method provided in the first aspect; A core network device, and a terminal device for executing the method provided by the second aspect.
- an embodiment of the present application provides a communication system, comprising: a core network device for executing the method provided in the third aspect, and a terminal device for executing the method provided in the fourth aspect.
- an embodiment of the present application further provides a computer program, which, when executed on a computer, enables the computer to execute the method provided in any of the above aspects.
- an embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored.
- the computer program is executed by a computer, the computer executes the method provided in any of the above aspects.
- an embodiment of the present application further provides a chip, which is used to read a computer program stored in a memory to execute the method provided in any of the above aspects.
- an embodiment of the present application further provides a chip system, which includes a processor for supporting a computer device to implement the method provided in any of the above aspects.
- the chip system also includes a memory, which is used to store the necessary programs and data of the computer device.
- the chip system can be composed of a chip, or it can include a chip and other discrete devices.
- FIG1 is a schematic diagram of a label structure provided in an embodiment of the present application.
- FIG2 is an architecture diagram of a communication system provided in an embodiment of the present application.
- FIG3 is an architecture diagram of another communication system provided in an embodiment of the present application.
- FIG4 is a flow chart of a first communication method provided in an embodiment of the present application.
- FIG5 is a flow chart of a second communication method provided in an embodiment of the present application.
- FIG6 is a flow chart of a third communication method provided in an embodiment of the present application.
- FIG7 is a flow chart of a fourth communication method provided in an embodiment of the present application.
- FIG8 is a flow chart of a fifth communication method provided in an embodiment of the present application.
- FIG9 is a flow chart of a sixth communication method provided in an embodiment of the present application.
- FIG10 is a flow chart of a seventh communication method provided in an embodiment of the present application.
- FIG11 is a structural diagram of a communication device provided in an embodiment of the present application.
- FIG. 12 is a structural diagram of another communication device provided in an embodiment of the present application.
- the present application provides a communication method and device for improving the efficiency of operating an IoT terminal device.
- the method and device are based on the same technical concept. Since the method and device solve the problem in a similar way, the implementation of the method and device can refer to each other, and the repeated parts will not be repeated.
- Figure 1 shows a schematic diagram of the storage area format of a tag in the current technology.
- the storage area includes: a reserved storage area, an (electronic product code, EPC) storage area, a tag identifier (TID) storage area, and a user storage area. The following is an introduction to each storage area.
- EPC electronic product code
- TID tag identifier
- Reserved storage area used to store passwords required for kill command and/or access command functions.
- EPC storage area used to store information associated with EPC.
- the information associated with EPC may include at least one of the following: a stored cyclic redundancy code (CRC) of the tag (StoredCRC), a stored product code (PC) of the tag (StoredPC), the EPC of the tag, and the extended product code (XPC) of the tag, etc.
- CRC stored cyclic redundancy code
- PC stored product code
- XPC extended product code
- Tag identifier (TID) storage area can be used to store tag and provider data, for example, it can be used to store the TAG manufacturer's identifier and/or the TAG type identifier, etc.
- User storage area This is an optional extension area that can be used to store user-specific data.
- FIG1 is only an example of the storage area format of a tag.
- the tag may include more or fewer storage areas.
- the memory bank (MemBank) corresponding to each storage area in the tag may be indicated by a binary or decimal identifier.
- the length of the binary identifier can be determined according to the number of storage areas in the tag. For example, there are 4 storage areas in the tag shown in Figure 1, and the memory bank corresponding to each storage area can be indicated by a 2-bit binary identifier.
- the reserved storage area corresponds to bank 00 in the memory bank
- the EPC storage area corresponds to bank 01 in the memory bank
- the TID storage area corresponds to bank 10 in the memory bank
- the user storage area corresponds to bank 11 in the memory bank.
- the reserved storage area may correspond to bank 0 in the memory bank
- the EPC storage area corresponds to bank 1 in the memory bank
- the TID storage area corresponds to bank 2 in the memory bank
- the user storage area corresponds to bank 3 in the memory bank.
- a tag includes four storage areas and a memory bank is indicated by a binary identifier.
- the inventory operation can also be called an inventory operation, which can obtain the EPC of the terminal device.
- the EPC of the terminal can be obtained through commands such as query and ack.
- the core network device can obtain the EPC of multiple terminal devices one by one or in batches through the access network device.
- the read operation can read the EPC, tag identifier (TID) in the storage area of the terminal device, the content stored in the reserved storage area, or the content stored in the user storage area.
- TID tag identifier
- the write operation can be performed on the storage area of the terminal device.
- the identification information such as EPC, TID
- the data in the reserved storage area or the user storage area can be written or rewritten.
- Kill operation can make the terminal device invalid. For example, the terminal device cannot work after being invalidated.
- Lock operation can lock the information of the terminal device, which can prevent the terminal device from being read or written.
- the lock operation can also lock the storage area (memory banks), which can prevent or allow the storage area to be read or written.
- Block write operation allows the reader to write multiple words to the storage area of the terminal device (for example, the reserved storage area, EPC storage area, TID storage area or user storage area) with a single command.
- Block erase operation allows the reader to perform multi-word erase operations on the storage area of the terminal device (for example, the reserved storage area, EPC storage area, TID storage area or user storage area).
- Access operation Change the terminal device with a non-zero access password from the open state to the secure state.
- the number of nouns means “singular noun or plural noun", that is, “one or more”. "At least one” means one or more, and “more” means two or more. "and/or” describes The association relationship of the associated objects indicates that there can be three types of relationships. For example, A and/or B can indicate the existence of A alone, A and B at the same time, and B alone. "At least one of the following" or similar expressions refers to any combination of these items, including any combination of a single item or plural items.
- FIG2 is an architecture diagram of a communication system provided in an embodiment of the present application, which shows a fifth generation (5G) network architecture based on a service-oriented architecture.
- the 5G network architecture shown in FIG2 may include terminal equipment, access network (AN) equipment, and core network (CN) equipment.
- the terminal equipment accesses the data network (DN) through the access network equipment and the core network equipment.
- the components of the communication system are described below.
- the terminal device may also be referred to as a tag, user equipment (UE), terminal, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless communication device, user agent, user device, target terminal, etc.
- the terminal device in this application may be a passive terminal device such as a passive tag or a semi-passive tag.
- passive tags include but are not limited to non-powered terminal tags such as RFID, Bluetooth, Zigbee, etc.
- Semi-passive tags may also be called sensor tags.
- Terminal devices can be widely used in various scenarios, for example, internet of things (IOT), device-to-device (D2D), vehicle to everything (V2X) communication, machine-type communication (MTC), virtual reality, augmented reality, industrial control, autonomous driving, telemedicine, smart grid, smart furniture, smart office, smart wearable, smart transportation, smart city, etc.
- IOT internet of things
- D2D device-to-device
- V2X vehicle to everything
- MTC machine-type communication
- virtual reality augmented reality
- industrial control autonomous driving
- telemedicine smart grid
- smart furniture smart office
- smart wearable smart transportation
- smart city etc.
- the terminal devices in the field of smart wearables can be called wearable devices or wearable smart devices. It is a general term for the application of wearable technology to intelligently design daily wearables and develop wearable devices, such as glasses, gloves, watches, clothing and shoes. Wearable devices are portable devices that are worn directly on the body or integrated into the user's clothes or accessories. Wearable devices are not only hardware devices, but also realize powerful functions through software support, data interaction, and cloud interaction. Wearable devices in a broad sense have the characteristics of full functions, large size, and can realize complete or partial functions without relying on smartphones, such as smart watches or smart glasses. Wearable devices in a broad sense can also include devices that focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various smart bracelets and smart jewelry for vital sign monitoring.
- the device for realizing the function of the passive terminal device can be a terminal device, or a device that can support the terminal device to realize the function, such as a chip system, which can be installed in the terminal device.
- the chip system can be composed of a chip, or it can include a chip and other discrete devices.
- the technical solution provided in the embodiment of the present application is described by taking the device for realizing the function of the tag as a terminal device as an example.
- Access network equipment is a device that provides wireless communication functions for terminal devices.
- Access network equipment includes, but is not limited to: next-generation base stations (g nodeB, gNB) in 5G, evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand unit, BBU), transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), mobile switching center, etc.
- next-generation base stations g nodeB, gNB
- 5G evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC), base
- the gNB may include a centralized unit (CU) and a distributed unit. (distributed unit, DU). gNB can also include an active antenna unit (AAU). CU can implement part of the functions of gNB, and DU can implement another part of the functions of gNB. For example, CU is responsible for processing non-real-time protocols and services, and implementing the functions of the radio resource control (RRC) layer and the packet data convergence protocol (PDCP) layer. DU is responsible for processing physical layer protocols and real-time services, and implementing the functions of the radio link control (RLC) layer, the media access control (MAC) layer and the physical (PHY) layer.
- RRC radio resource control
- PDCP packet data convergence protocol
- DU is responsible for processing physical layer protocols and real-time services, and implementing the functions of the radio link control (RLC) layer, the media access control (MAC) layer and the physical (PHY) layer.
- RLC radio link control
- MAC media access control
- PHY physical
- the information of the RRC layer is generated by the CU, and will eventually be encapsulated by the PHY layer of the DU to become the PHY layer information, or, it is converted from the PHY layer information. Therefore, under this architecture, high-level signaling such as RRC layer signaling can also be considered to be sent by the DU, or, sent by the DU+AAU.
- the access network device can include one or more of the CU node, DU node, and AAU node.
- the CU may be divided into an access network device in the access network, or the CU may be divided into an access network device in the CN, which is not limited in the present application.
- the access network equipment and terminal equipment can be fixed or movable.
- the access network equipment and terminal equipment can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on the water surface; they can also be deployed on airplanes, balloons and artificial satellites in the air.
- the embodiments of the present application do not limit the application scenarios of the access network equipment and terminal equipment.
- the core network equipment includes some or all of the following network elements: unified data management (UDM) network element, unified data repository (UDR) network element, network exposure function (NEF) network element (not shown in the figure), application function (AF) network element, policy control function (PCF) network element, access and mobility management function (AMF) network element, session management function (SMF) network element, user plane function (UPF) network element, network repository function (NRF) network element (not shown in the figure).
- UDM unified data management
- UDR unified data repository
- NEF network exposure function
- AF application function
- PCF policy control function
- AMF access and mobility management function
- SMF session management function
- UPF user plane function
- NRF network repository function
- the mobility management network element is a control plane network element provided by the operator network, which is responsible for the access control and mobility management of the terminal device accessing the operator network, such as mobile state management, allocation of user temporary identity, authentication and authorization of users, etc.
- the mobility management network element can be an AMF network element.
- future communications such as the 6th generation (6G)
- the mobility management network element can still be an AMF network element, or have other names, which are not limited in this application.
- the session management network element is a control plane network element provided by the operator network, which is responsible for managing the protocol data unit (PDU) session of the terminal device.
- the PDU session is a channel for transmitting PDUs, and the terminal device needs to transmit PDUs to each other with the DN through the PDU session.
- the PDU session is established, maintained and deleted by the SMF network element.
- the session management network element includes session management (such as session establishment, modification and release, including tunnel maintenance between user plane network elements and access network devices), selection and control of user plane network elements, service and session continuity (SSC) mode selection, roaming and other session-related functions.
- the session management network element can be an SMF network element.
- future communications such as 6G, the session management network element can still be an SMF network element, or have other names, which are not limited in this application.
- the user plane network element is a gateway provided by the operator, which is the gateway for the operator network to communicate with the DN.
- the UPF network element includes functions related to the user plane, such as data packet routing and transmission, packet detection, service usage reporting, Quality of Service (QoS) processing, legal monitoring, uplink packet detection, downlink packet storage, etc.
- QoS Quality of Service
- the user plane network element can be a UPF network element.
- future communications such as 6G, the user plane network element can still be a UPF network element, or there are other The name is not limited in this application.
- the data management network element is a control plane network element provided by the operator, which is responsible for storing information such as the subscriber permanent identifier (SUPI), credential, security context, and subscription data of the subscriber in the operator network.
- the information stored by the data management network element can be used for authentication and authorization of the terminal device to access the operator network.
- the subscriber of the above-mentioned operator network can specifically be a user who uses the service provided by the operator network, such as a user who uses a mobile phone chip card of China Telecom, or a user who uses a mobile phone chip card of China Mobile.
- the permanent subscription identifier (SUPI) of the above-mentioned subscriber can be the number of the mobile phone chip card, etc.
- the credential and security context of the above-mentioned subscriber can be a small file storing the encryption key of the mobile phone chip card or information related to the encryption of the mobile phone chip card, which is used for authentication and/or authorization.
- the above-mentioned security context can be data (cookie) or token stored on the user's local terminal (such as a mobile phone).
- the subscription data of the above-mentioned subscriber can be the supporting services of the mobile phone chip card, such as the traffic package of the mobile phone chip card or the network used. It should be noted that permanent identifiers, credentials, security contexts, authentication data (cookies), and tokens are equivalent to authentication and authorization-related information. In this application document, for the sake of convenience of description, no distinction or restriction is made.
- the embodiments of the present application will be described using security contexts as an example, but the embodiments of the present application are also applicable to authentication and/or authorization information expressed in other ways.
- the data management network element may be a UDM network element.
- future communications such as 6G, the data management network element may still be a UDM network element, or have other names, which are not limited in this application.
- the unified database network element is a control plane network element provided by the operator, which includes the access function of executing contract data, policy data, application data and other types of data.
- the unified database network element can be a UDR network element.
- future communications such as 6G, the unified database network element can still be a UDR network element, or have other names, which are not limited in this application.
- the network open network element is a control plane network element provided by the operator.
- the network open network element opens the external interface of the operator network to the third party in a secure manner.
- the network open network element can serve as a relay for the communication between the session management network element and the network element of the third party.
- the network open network element acts as a relay, it can be used as a translator for the identification information of the contracted user, as well as the identification information of the third-party network element. For example, when the network open network element sends the SUPI of the contracted user from the operator network to the third party, the SUPI can be translated into its corresponding external identity (identity, ID).
- the network open network element when it sends the external ID (third-party network element ID) to the operator network, it can be translated into SUPI.
- the network open network element can be a NEF network element.
- future communications such as 6G, the network open network element can still be a NEF network element, or have other names, which are not limited in this application.
- the application function network element is used to convey the application side's requirements to the network side, such as QoS requirements or user status event subscriptions.
- the application function network element can be a third-party functional entity or an application server deployed by an operator.
- the application function network element can be an AF network element.
- future communications such as 6G, the application function network element can still be an AF network element or have other names, which are not limited in this application.
- the policy control network element is a control plane function provided by the operator, which is used to provide the PDU session policy to the session management network element.
- the policy may include charging-related policies, QoS-related policies, and authorization-related policies.
- the policy control network element may be a PCF network element.
- future communications such as 6G, the policy control network element may still be a PCF network element, or have other names, which are not limited in this application.
- the network storage function network element can be used to provide network element discovery function, and provide network element information corresponding to the network element type based on the request of other network elements.
- the network storage function network element also provides network element management services, such as network element registration, update, deregistration, and network element status subscription and push.
- the network storage function network element can be an NRF network element.
- future communications such as 6G, the network storage function network element can still be an NRF network element, or have other names, which is not limited in this application.
- DN is a network outside the operator network.
- the operator network can access multiple DNs. Multiple services can be deployed on DN, which can provide data and/or voice services to terminal devices.
- DN is the private network of a smart factory.
- the sensors installed in the workshop of the smart factory can be terminal devices.
- the control server of the sensors is deployed in DN, and the control server can provide services for the sensors.
- the sensors can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
- DN is the internal office network of a company.
- the mobile phones or computers of the company's employees can be terminal devices.
- the employees' mobile phones or computers can access information and data resources on the company's internal office network.
- Npcf, Nudr, Nudm, Naf, Namf, and Nsmf are service-oriented interfaces provided by the above-mentioned PCF, UDR, UDM, AF, AMF, and SMF, respectively, and are used to call corresponding service-oriented operations.
- the N1 interface is the interface between the AMF and the terminal device, which can be used to transmit NAS signaling (such as QoS rules from the AMF) to the terminal device.
- the N2 interface is the interface between the AMF and the RAN, which can be used to transmit radio bearer control information from the core network side to the RAN.
- the N3 interface is the interface between the RAN and the UPF, which is mainly used to transmit uplink and downlink user plane data between the RAN and the UPF.
- the N4 interface is the interface between the SMF and the UPF, which can be used to transmit information between the control plane and the user plane, including the control of the forwarding rules, QoS control rules, traffic statistics rules, etc. for the user plane and the reporting of information on the user plane.
- the N6 interface is the interface between the UPF and the DN, which is used to transmit uplink and downlink user data flows between the UPF and the DN.
- FIG3 shows another schematic diagram of a communication system architecture applicable to an embodiment of the present application.
- the communication system may include a terminal device, an AN device, a tag management function (TMF) network element, a UDM/UDR, a NEF, and an AF.
- TMF tag management function
- the specific contents of the terminal device, the AN device, the UDM/UDR, the NEF, and the AF can be referred to the description of FIG2 , and the repeated parts will not be repeated.
- TMF can support the tag management function, which supports various operations for managing tags.
- the TMF can communicate with the AF directly or through the NEF network element.
- the TMF can operate the tag through the AN device after receiving the operation request from the AF.
- UDM/UDR can also communicate with AF directly or through NEF network elements. After receiving the signing request from AF, UDM/UDR can instruct TMF to write EPC to the tag through AN equipment.
- TMF can be used as an independent network element, or can be set up together with other network elements.
- TMF can be set up together with NEF, or with UDM, which is not limited in this application.
- TMF is only an exemplary name. Any device that can implement the functions corresponding to TMF in this application can be understood as the TMF described in this application.
- the dotted boxes and dotted lines in FIG3 represent optional network elements and optional connections, respectively.
- the above network element or function can be a network element in a hardware device, a software function running on dedicated hardware, or a virtualized function instantiated on a platform (e.g., a cloud platform).
- a platform e.g., a cloud platform.
- the above network element or function can be implemented by one device, or by multiple devices together, or can be a functional module in one device, which is not specifically limited in the embodiments of the present application.
- the communication system shown in FIG. 2 or FIG. 3 does not constitute a limitation on the communication system to which the embodiments of the present application can be applied. Therefore, the communication method provided in the embodiments of the present application can also be applied to communication systems of various standards, such as: long term evolution (LTE) communication system, 5G communication system, 6G communication system and future communication system, vehicle to everything (V2X), long term evolution-vehicle network (LTE-vehicle, LTE-V), vehicle to vehicle (V2V), Internet of Vehicles, Machine Type Communications (Machine Type Communications, MTC), IoT, LTE-machine to machine (LTE-M), machine to machine (M2M), Internet of Things, etc.
- LTE long term evolution
- 5G communication system 5G communication system
- V2X vehicle to everything
- LTE-vehicle network LTE-vehicle, LTE-V
- V2V vehicle to vehicle
- Internet of Vehicles Internet of Vehicles
- each network element may have other names; for another example, when multiple network elements are integrated into the same physical device, the physical device may also have other names.
- the card reader can be integrated into the access network equipment.
- the access network equipment can operate the terminal device according to the instructions of the core network element (for example, TMF).
- the core network element for example, TMF
- the core network element for example, TMF
- the EPC should be written in the EPC storage area; for another example, when performing the operation of writing the password required for the access function, the password required for the access function should be written in the reserved storage area.
- the core network element instructs the operation of the terminal device, the storage area corresponding to the operation in the terminal device is not considered, which causes the terminal device to not know which area to operate in, thereby reducing the efficiency of operating the terminal device.
- the embodiment of the present application provides a communication method, which can be applied to the communication system shown in Figure 2 or Figure 3.
- the method is specifically described by taking the application function network element as AF as an example.
- a core network element obtains first information of a target terminal device, where the first information may be used to determine second information, and the second information is used to indicate a storage area in the target terminal device corresponding to the first operation.
- the core network element may be TMF.
- the target terminal device may be a passive terminal device such as a passive tag or a semi-passive tag, for example, corresponding to the terminal device in FIG. 3 above.
- the first information may include at least one of the following:
- TID of the target terminal device can be used to indicate the hardware type of the target terminal device.
- the hardware type of the target terminal device can be used to determine the type of the target terminal device.
- Chip type information of the target terminal device can be used to indicate the chip type of the target terminal device.
- the chip type of the target terminal device can be used to determine the type of the target terminal device.
- the chip type information of the target terminal device can be a chip type identifier of the target terminal device.
- Factory marking information of the target terminal device can be used to indicate the factory information of the target terminal device.
- the factory information of the target terminal device can be used to determine the type of the target terminal device.
- the factory marking information of the target terminal device may include at least one of the following: the manufacturer information of the target terminal device, the production batch information of the target terminal device.
- Storage area information of the target terminal device can be used to indicate the storage area of the target terminal device.
- the reserved storage area is identified as 0 (corresponding to library 00 in the memory library)
- the EPC storage area is identified as 1 (corresponding to library 01 in the memory library)
- the TID storage area is identified as 2 (corresponding to library 10 in the memory library)
- the user storage area is identified as 3 (corresponding to library 11 in the memory library).
- the storage area information of the target terminal device may also include at least one of the following:
- the location where data storage starts in each storage area For example, in the EPC storage area, data storage starts from the 11th bit, and the storage area information of the target terminal device includes: the pointer value of the EPC storage area (for example, the pointer start value) is 11.
- each storage area For example, the size of the EPC storage area is 96 bits, and the storage area information of the target terminal device includes: the size of the EPC storage area is 96 bits.
- each storage area is used to store passwords and temperature data detected by the terminal device
- the storage area information of the target terminal device includes: the reserved storage area is used to store passwords and temperature data detected by the terminal device.
- Second information See the description of the second information below.
- the second information may include an identifier of a storage area (hereinafter referred to as the first storage area) corresponding to the first operation in the target terminal device.
- the second information may indicate that the first operation is performed on the entire first storage area.
- the target terminal device is the tag shown in FIG. 1, if the second information includes identifier 3, it indicates that the first operation is performed on the entire user storage area.
- the second information may further include at least one of the following:
- Pointer value used to indicate the position where the first operation starts in the first storage area. For example, if the first storage area is the user storage area, the first operation is a read operation, and the pointer value is 11, it means that data is read from the 11th bit of the user storage area.
- Length used to indicate the length of the data for performing the first operation in the first storage area. For example, if the first storage area is the user storage area, the first operation is a read operation, and the length is 20 bits, it means reading 20 bits of data in the user storage area.
- Mask or anti-mask used to indicate the mask or anti-mask used to perform the first operation in the first storage area.
- the first operation may include, but is not limited to, one of the following: a read operation, a write operation, an access operation, a kill operation, a lock operation, a block write operation, a block erase operation, and a write-in EPC operation.
- the core network element may obtain the first information of the target terminal device through one of the following implementation methods.
- Implementation method 1 The core network element obtains the first information from the target terminal device.
- the target terminal device sends the first information to the core network element; correspondingly, the core network element receives the first information from the target terminal device.
- the first information may include at least one of the following: TID of the target terminal device, chip type information of the target terminal device, factory marking information of the target terminal device, and storage area information of the target terminal device.
- the first information may be carried in an existing message (eg, a registration request or a read command response) or in a new message.
- the core network element may obtain the first information from the target terminal device through one of the following methods.
- S401 may include steps S401a1-S401a2:
- the core network element sends a first message to the target terminal device through the AN device, where the first message is used to trigger the target terminal device to initiate a random access process.
- the first message may be an existing message or a new message.
- the first message may include: an inventory command sent by the core network element to the AN device, and a label selection message sent by the AN device to the target terminal device.
- the core network element may send an inventory command to the AN device; then, the AN device may send a label selection message to the target terminal device.
- the first message includes a first setting identifier, and the first setting identifier can be used to instruct the target terminal device to send the first information.
- the first setting identifier may be an identifier that directly instructs the target terminal device to send the first information. After receiving the first setting identifier, the first information may be sent to the core network element.
- the first setting identifier may also be an identifier that indirectly indicates that the terminal device sends the first information.
- the first setting identifier is used to indicate that the inventory mode is a method of reading the EPC of the terminal device one by one. In this way, after receiving the first setting identifier, the terminal device can determine that the inventory mode is a method of reading the EPC of the terminal device one by one, and determine that the first information needs to be sent to the core network element based on the inventory mode.
- the target terminal device sends a registration request to a core network element, where the registration request includes first information.
- the target terminal device can initiate a random access process according to the first message, and after accessing the AN device, send the registration request to the core network network element through the AN device.
- the random access process may include: the target terminal device receives a first query request from the AN device, and the first query request includes a first random number.
- the target terminal device sets a second random number according to the first random number, and if the set second random number is 0, the target terminal device sends a third random number to the access network device. If the AN device can correctly receive the third random number, the AN device sends the third random number to the target terminal device.
- the target terminal device determines that the random access is successful.
- the target terminal device when the first message includes a first setting identifier, the target terminal device sends a registration request including the first information to the core network element.
- the core network element when the first operation is to be performed on the target terminal device, the core network element can receive a registration request from the target terminal device, and the registration request includes the first information. In this way, the core network element can obtain the first information from the target terminal device as soon as possible.
- S401 may include steps S401b1-S401b2:
- S401b1 The core network element sends a read command to the target terminal device, where the read command is used to read the first information in the target terminal device.
- the core network element may send a first message to the target terminal device through the AN device, and the first message is used to trigger the target terminal device to initiate a random access process.
- the target terminal device may initiate a random access process according to the first message and access the AN device.
- the specific content of the core network element sending the first message to the target terminal device through the AN device can refer to step S401a1, and the specific content of the random access process can also refer to step S401a1, which will not be repeated here.
- the core network network element may send a read command to the target terminal device after determining that the target terminal device is a passive tag or a semi-passive tag.
- the core network network element may obtain the tag type indication information of the target terminal device from the first network element or the target terminal device, and determine that the target terminal device is a passive tag or a semi-passive tag according to the tag type indication information.
- the first network element may be AF, UDM, UDR or server, etc.
- the core network network element may receive a read request from AF, the read request includes the tag type indication information of the target terminal device, and the tag type indication information indicates that the target terminal device is a passive tag or a semi-passive tag.
- the core network network element may receive a write EPC request from UDM, the write EPC request includes the tag type indication information of the target terminal device, and the tag type indication information indicates that the target terminal device is a passive tag or a semi-passive tag.
- the core network network element may receive a registration request from the target terminal device, the registration request includes the tag type indication information of the target terminal device, and the tag type indication information indicates that the target terminal device is a passive tag or a semi-passive tag.
- S401b2 The target terminal device sends a read command response to the core network element, where the read command response includes the first information.
- the core network element can trigger the target terminal device to send a read command response to the core network element through a read command, and the read command response includes the first information.
- the network element may obtain the first information from the target terminal device as needed.
- Implementation method 2 The core network element obtains the first information from the AF.
- the AF sends the first information to the core network element; correspondingly, the core network element receives the first information from the AF.
- S401 may include step S401c: the AF sends a service request to a core network element, where the service request includes the first information.
- the service request may be an operation request, and the operation request may also be used to request to perform a first operation on the target terminal device.
- the operation request is a read request or a write request, and is used to request to perform a read operation or a write operation on the target terminal device.
- the core network element sends a first message to the target terminal device through the AN device, and the first message is used to trigger the target terminal device to initiate a random access process.
- the target terminal device can initiate a random access process according to the first message and access the AN device.
- the specific content of the core network element sending the first message to the target terminal device through the AN device can refer to step S401a1, and the specific content of the random access process can also refer to step S401a1, which will not be repeated here.
- the AF when the first operation is to be performed on the target terminal device, the AF can carry the first information in the service request, so that the core network element can obtain the first information as early as possible.
- the core network element may obtain the second information according to the first information. This is described in detail below.
- the core network element may obtain the second information in one of the following implementation methods:
- the core network element may determine the second information based on the first information.
- the core network element may determine the second information through steps A1 and A2:
- the core network element obtains a correspondence between the first information and a storage area corresponding to the first operation in the target terminal device (hereinafter referred to as a first correspondence).
- the first correspondence may include a correspondence between at least one terminal device type, storage area information of the terminal device, and at least one operation.
- the terminal device type corresponds to one or more of the TID of the terminal device, the chip type information of the terminal device, and the factory marking information of the terminal device.
- the storage areas of different types of terminal devices may be different.
- the reserved storage area is identified as 0 (corresponding to bank 00 in the memory bank), with a size of 96 bits, which can be used to store passwords and temperature data detected by the terminal device;
- the EPC storage area is identified as 1 (corresponding to bank 01 in the memory bank), with a size of 96 bits, which can be used to store EPC;
- the TID storage area is identified as 2 (corresponding to bank 10 in the memory bank), with a size of 96 bits, which can be used to store TID;
- the user storage area is identified as 3 (corresponding to bank 11 in the memory bank), with a size of 96 bits, which can be used to store humidity data detected by the terminal device.
- the EPC storage area is identified as 0 (corresponding to library 00 in the memory bank), with a size of 128 bits, which can be used to store EPC and detected temperature data;
- the TID storage area is identified as 1 (corresponding to library 01 in the memory bank), with a size of 128 bits, which can be used to store TID;
- the reserved storage area is identified as 2 (corresponding to library 10 in the memory bank), with a size of 96 bits, which can be used to store passwords;
- the user storage area is identified as 3 (corresponding to library 11 in the memory bank), with a size of 128 bits, which can be used to store humidity data detected by the terminal device.
- Table 1 shows a possible implementation of the first corresponding relationship.
- the storage area information of the terminal device may include at least one of the following: the identifier of each storage area, the location where data starts to be stored in each storage area, the size of each storage area, and the function of each storage area, etc. At least one operation is an operation supported by each storage area.
- the specific content of the storage area information of the terminal device can refer to the above description of "storage area information of the target terminal device", except that the target terminal device is replaced by the terminal device, which will not be repeated here.
- the operations supported by each storage area may be information explicitly indicated, or information implicitly indicated by the function of each storage area.
- the EPC storage area is used to store EPC and detected temperature data, and the operations supported by the EPC storage area may include: write EPC operation, inventory operation, and read operation of reading temperature data.
- the first correspondence also includes a correspondence between at least one of the following items and the storage area information of the terminal device and at least one operation: the TID of the terminal device, the chip type information of the terminal device, and the factory marking information of the target terminal device.
- the type in Table 1 can be replaced by one or more of the TID of the terminal device, the chip type information of the terminal device, and the factory marking information of the target terminal device.
- the core network element may obtain the first corresponding relationship in one of the following ways:
- Mode 1 The core network element obtains the first corresponding relationship from the second network element.
- the second network element may be a UDM, a UDR, an AF or a server.
- the core network element may send a second query request to the UDM.
- the second query request is used to request to obtain the first corresponding relationship.
- the UDM may send a second query response to the core network element, and the second query response includes the first corresponding relationship.
- the core network element may save the first corresponding relationship.
- Method 2 The core network element obtains the first corresponding relationship stored locally.
- the first corresponding relationship may be pre-stored in the core network element, or may be obtained from the second network element through method 1 and then stored locally when operating other terminal devices.
- the core network element may first determine whether the first corresponding relationship is stored locally. If the core network element stores the first corresponding relationship locally, the core network element may obtain the first corresponding relationship through method 2; if the core network element does not store the first corresponding relationship locally, the core network element may obtain the first corresponding relationship through method 1.
- the core network element determines the second information according to the first corresponding relationship and the first information.
- the first information includes TID1, the type of terminal device corresponding to TID1 is type 1, the first corresponding relationship is the corresponding relationship shown in Table 1, and the first operation is a write EPC operation.
- the core network network element can determine in the second information that the identifier is 1, which is used to indicate the EPC storage area in the terminal device of type 1.
- the first information includes TID2, the type of terminal device corresponding to TID2 is type 2, the first corresponding relationship is the corresponding relationship shown in Table 1, and the first operation is a read operation of reading temperature data.
- the core network network element can determine in the second information that the identifier is 0, which is used to indicate the EPC storage area in the terminal device of type 2.
- the first information includes TID1, the type of terminal device corresponding to TID1 is type 1, and the first operation is a read operation to read temperature data.
- the first correspondence includes the correspondence shown in Table 1, and the storage area information of the terminal device also includes the location where data storage starts in each storage area. If the storage area information of the terminal device indicates that data is stored in the reserved storage area starting from the 15th bit, the core network network element can determine in the second information that the identifier is 0, which is used to indicate the reserved storage area in the terminal device of type 1; the pointer value is 15, which is used to indicate that data is read starting from the 15th bit.
- the first information includes TID2, the type of terminal device corresponding to TID2 is type 2, the first corresponding relationship is the corresponding relationship shown in Table 1, and the first operation is a read operation to read temperature data. If the core network element determines that the local temperature range is 0-40 degrees, it can be determined that the length of the temperature data to be read is 6 bits. At this time, the core network element can determine that in the second information, the identifier is 0, which is used to indicate the EPC storage area in the terminal device of type 2; the length is 6 bits.
- the first information includes TID1, the type of terminal device corresponding to TID1 is type 1, and the first operation is a read operation to read temperature data.
- the first corresponding relationship includes the corresponding relationship shown in Table 1.
- the storage area information of the terminal device also includes the location where data starts to be stored in each storage area.
- the storage area information of the terminal device indicates that data is stored starting from the 15th bit in the reserved storage area.
- the core network network element determines that the local temperature range is 0-40 degrees, so the length of the temperature data to be read is 6 bits.
- the core network network element can determine that in the second information, the identifier is 0, which is used to indicate the reserved storage area in the terminal device of type 1; the length of the mask is 96 bits, wherein the first 14 bits of the mask are all 0, the 15th to 20th bits of the mask are all 1, and the 21st bit of the mask is all 0, which is used to indicate the reading of the 15th to 20th bits of data in the reserved storage area.
- the core network element may determine in the second information that the identifier is 0, which is used to indicate the reserved storage area in the type 1 terminal device; the length of the reverse mask is 96 bits, wherein the first 14 bits of the reverse mask are all 1, the 15th to 20th bits of the reverse mask are all 0, and the 21st bit of the reverse mask is all 1, which is used to indicate reading the data of the 15th to 20th bits in the reserved storage area.
- the core network element can determine the second information based on the first information and the first corresponding relationship without obtaining the second information from other devices, thereby simplifying the process of obtaining the second information and improving the efficiency of obtaining the second information.
- Implementation method 2 The core network element obtains, from the third network element, second information determined by the third network element based on the first information.
- the third network element can be UDM, UDR, AF or server, etc.
- the core network element may obtain the second information through steps B1-B3:
- the core network element sends first information to the third network element.
- the first information may be carried in an existing message (e.g., a query response) or in a new message.
- the third network element is a UDM
- the core network element may send a third query request to the UDM, wherein the third query request includes the first information.
- the third query request is used to request the acquisition of the second information.
- the core network element may further send indication information of the first operation to the third network element.
- the third query request sent by the core network element to the UDM also includes indication information of the first operation.
- the indication information of the first operation may be indication information having a corresponding relationship with the first operation, for example, an identifier of the first operation.
- the read operation corresponds to operation identifier 1
- the write operation corresponds to operation identifier 2.
- the third network element determines the second information according to the first information.
- the specific process of the third network element determining the second information can refer to steps A1-A2, except that the core network element is replaced by the third network element, which will not be repeated here.
- the third network element sends the second information to the core network element.
- the core network element receives the second information from the third network element.
- the second information may be carried in an existing message (eg, a query response) or in a new message.
- the third network element is a UDM, and the UDM may send a third query response to the core network element, wherein the third query response includes the second information.
- the core network element may save the correspondence between the second information and the target terminal device.
- the core network element saves the correspondence between the EPC of the target terminal device, the storage area corresponding to the first operation, and the pointer value.
- the core network element may determine the second information based on the storage area information of the target terminal device and the indication information of the first operation.
- the target terminal device is a terminal device of type 1 or type 2 in step A1
- the correspondence between the storage area information and the operation of the target terminal device may satisfy the correspondence shown in Table 1.
- the manner in which the core network element determines the second information based on the storage area information of the target terminal device and the indication information of the first operation may refer to the description of implementation method 1, which will not be repeated here.
- the core network network element can obtain the indication information of the first operation according to the service request from the AF.
- the core network network element receives a read request from the AF, and the read request includes the indication information of the read operation, which is used to indicate the execution of the read operation on the target terminal device.
- the core network network element receives a read request from the AF, and the read request itself is the indication information of the read operation.
- the core network network element receives a write request from the AF, and the write request includes the indication information of the write operation, which is used to indicate the execution of the write operation on the target terminal device.
- the core network network element receives a write request from the AF, and the write request itself is the indication information of the write operation.
- the present application does not limit the order in which the core network element obtains the first information and the indication information of the first operation, as long as it is executed before S402.
- the core network element obtains the first information from the AF
- the AF may send the first information and the indication information of the first operation to the core network element through one message (for example, a service request), or may send the first information and the indication information of the first operation to the core network element through two messages respectively.
- the core network element sends the second information and the indication information of the first operation to the target terminal device.
- the target terminal device receives the second information and the indication information of the first operation from the core network element.
- the core network element may send the second information and the indication information of the first operation to the target terminal device via one message.
- the core network element may send the second information and the indication information of the first operation to the target terminal device via two messages respectively.
- the core network element may send an operation message to the target terminal device, the operation message including the second information and the indication information of the first operation.
- the core network element sends a read operation message to the target terminal device, the read operation message including the second information and the indication information of the first operation.
- the operation message itself may also be the indication information of the first operation.
- the core network element may send an operation message to the target terminal device, and the operation message includes the second information.
- the core network element sends a write operation message to the target terminal device, and the write operation message includes the second information, and the write operation message itself is the indication information of the write operation.
- the target terminal device sends the result of the target terminal device performing the first operation according to the second information to the core network element.
- the core network element receives the result of the target terminal device performing the first operation according to the second information.
- the target terminal device is a terminal device of type 1, and the specific content of the storage area of the terminal device of type 1 can refer to step A1.
- the first operation is a write EPC operation; in the second information, the identifier is 1.
- the target terminal device can determine that the storage area corresponding to the identifier 1 is the EPC storage area, which corresponds to the library 01 in the memory library.
- the target terminal device can write EPC in the library 01 in the memory library. After writing EPC, the target terminal device can send information to the core network network element indicating that the operation of writing EPC to the target terminal device is completed.
- the target terminal device is a terminal device of type 1.
- the first operation is a read operation of reading temperature data.
- the identifier is 0 and the pointer value is 15.
- the target terminal device may determine that the storage area corresponding to the identifier 0 is a reserved storage area, corresponding to the library 00 in the memory library.
- the target terminal device may read the temperature data starting from the 15th bit in the library 00 in the memory library. After reading the temperature data, the target terminal device may send the read temperature data to the core network element.
- the target terminal device is a type 2 terminal device, and the specific content of the storage area of the type 2 terminal device can refer to step A1.
- the identifier is 0, the pointer is 15, and the length is 6 bits.
- the target terminal device can determine that the storage area corresponding to the identifier 0 is the EPC storage area, which corresponds to the library 00 in the memory library.
- the target terminal device can read 6 bits of temperature data starting from the 15th bit in the library 00 in the memory library. After reading the temperature data, the target terminal device can send the read temperature data to the core network network element.
- the target terminal device is a terminal device of type 1.
- the first operation is a read operation of reading temperature data.
- the identifier is 0, the length of the mask is 96 bits, wherein the first 14 bits of the mask are all 0, the 15th to 20th bits of the mask are all 1, and the 21st bit of the mask is all 0.
- the target terminal device can determine that the storage area corresponding to the identifier 0 is a reserved storage area, corresponding to library 00 in the memory library.
- the target terminal device can determine to read the 15th to 20th bits in library 00 in the memory library according to the mask, thereby obtaining the temperature data located at the 15th to 20th bits.
- the target terminal device can send the read temperature data to the core network network element.
- the target terminal device is a terminal device of type 1.
- the first operation is a read operation of reading temperature data.
- the identifier is 0, the length of the inverse mask is 96 bits, wherein the first 14 bits of the inverse mask are all 1, the 15th to 20th bits of the inverse mask are all 0, and the 21st bit of the inverse mask is all 1.
- the target terminal device can determine that the storage area corresponding to the identifier 0 is a reserved storage area, corresponding to library 00 in the memory library.
- the target terminal device can determine to read the 15th to 20th bits in library 00 in the memory library according to the inverse mask in the second information, thereby obtaining the temperature data located at the 15th to 20th bits.
- the target terminal device can send the read temperature data to the core network network element.
- the core network element can obtain the first information, and obtain the second information indicating the storage area corresponding to the first operation in the target terminal device according to the first information.
- the core network element sends the second information and the indication information of the first operation to the target terminal device. In this way, the terminal device can determine the storage area corresponding to the first operation, thereby improving the efficiency of operating the terminal device.
- the embodiment of the present application provides another communication method, which can be applied to the communication system shown in Figure 2 or Figure 3.
- the method is specifically described by taking the application function network element as AF as an example.
- S501 AF sends a first request to a core network element.
- the core network element receives the first request from AF.
- the core network element can be TMF.
- the first request is used to request to read data in the target terminal device.
- the first request includes the EPC of the target terminal device, indicating a request to read data in the target terminal device.
- the first request includes the first EPC interval, indicating a request for data in the terminal device belonging to the first EPC interval.
- the first EPC interval includes the EPC of the target terminal device.
- the storage area of the target terminal device is a single storage area.
- the first request can be used to indicate that the storage area of the target terminal device is a single storage area in one of the following ways:
- the first request includes tag type indication information of the target terminal device, and the tag type indication information indicates that the storage area of the target terminal device is a single storage area.
- the storage area of a type 3 terminal device is a single storage area. If the type indicated by the tag type indication information is type 3, then the tag type indication information indicates that the storage area of the target terminal device is a single storage area.
- the first request is a request dedicated to reading data in a terminal device in a single storage area.
- the first request is a request dedicated to reading data in a terminal device in a single storage area.
- the core network element can determine that the first request is a request for reading data in a terminal device in a single storage area by parsing the format of the first request.
- the first request is a read request.
- the core network element sends a first message to the target terminal device through the AN device.
- the target terminal device receives the first message.
- the first message can be used to trigger the target terminal device to initiate a random access process.
- the first message may be an existing message or a new message.
- the first message may include: an inventory command sent by a core network element to an AN device, and a label selection message sent by the AN device to a target terminal device.
- the first message also includes: a first indication.
- the first indication can be used to instruct the target terminal device to send data in the target terminal device.
- the first indication can be tag type indication information of the target terminal device, the tag type indication information indicates that the storage area of the target terminal device is a single storage area, and the tag type indication information is used to instruct the target terminal device to send data in the target terminal device.
- the first indication can be a second setting identifier, and the second setting identifier is used to instruct the target terminal device to send data in the target terminal device.
- the target terminal device sends a registration request to the core network element according to the first instruction.
- the core network element receives the registration request from the target terminal device.
- the registration request includes data in the target terminal device.
- the data in the target terminal device is data stored in a single storage area of the target terminal device.
- the target terminal device may send a first indication to the core.
- the heart network element sends a registration request containing data in the target terminal device.
- the target terminal device may initiate a random access process according to the first message and access the AN device.
- S401a2 please refer to S401a2 and will not be repeated here.
- the core network network element can send a first indication to the target terminal device.
- the target terminal device can send the data in the target terminal device to the core network network element through a registration request, thereby eliminating the need for the core network network element to send a read command to the target terminal device, thereby simplifying the process of obtaining data from a terminal device with a single storage area and reducing overhead.
- the embodiment of the present application provides another communication method, which is a possible example of the method shown in Figure 4.
- the process of the method is specifically described by taking the core network element as TMF as an example.
- the AF sends an operation request to the TMF, where the operation request is used to request to perform a first operation on at least one terminal device.
- the terminal device in at least one terminal device may be a passive terminal device such as a passive tag or a semi-passive tag.
- the first operation may be at least one of the following: a read operation, a write operation, an access operation, a kill operation, a lock operation, a block write operation, a block erase operation, and a write EPC operation.
- the operation request may be a read request.
- the operation request may be a write request.
- the operation request may include: indication information of the target area and indication information of the target object.
- the target area refers to the area where the first operation needs to be performed on the terminal device.
- the indication information of the target area can be at least one of the following: geographic location information, municipal location information (for example, City A), 3GPP location information (for example, tracking area (TA) list, cell (Cell) list, etc.). For example, if the indication information of the target area is City A, it means that AF requests to perform the first operation on the terminal device in City A. For another example, if the indication information of the target area is Cell 1 and Cell 2, it means that AF requests to perform the first operation on the terminal devices in Cell 1 and Cell 2.
- the indication information of the target object may be the indication information of at least one terminal device.
- the specific form of the indication information of the terminal device may be various, and several possible forms are listed below. The several forms listed below may be used alone or in combination, and the embodiments of the present application do not limit them.
- the indication information of the terminal device includes the value interval of the EPC.
- the at least one terminal device may include a terminal device whose EPC is within the range of 1111000001-1111000098.
- the indication information of the terminal device includes an EPC list.
- the EPC list includes 1111000001, 1111000002, 1111000005 and 1111000006, and the at least one terminal device may include terminal devices whose EPCs are 1111000001, 1111000002, 1111000005 and 1111000006.
- the indication information of the terminal device includes the first n digits of the EPC, where n is a positive integer.
- the EPC of the terminal device has 10 digits, and the first 4 digits are 1111, then at least one terminal device may include a terminal device with an EPC of 111100000-11111999999.
- the operation request may further include indication information of the first operation.
- the indication information of the first operation may be indication information having a corresponding relationship with the first operation, for example, an identifier of the first operation.
- a read operation corresponds to operation identifier 1
- a write operation corresponds to operation identifier 2. If the operation request includes operation identifier 1, it indicates a request to perform a read operation on at least one terminal device.
- the operation request itself may also be the indication information of the first operation.
- the operation request is a read request
- the first operation is a read operation.
- the operation request is a write request
- the first operation is a write operation. do.
- the TMF determines the AN device and the at least one terminal device according to the operation request.
- TMF can determine the AN device according to the indication information of the target area in the operation request.
- TMF can determine one or more AN devices in the target area corresponding to the location information of 3GPP. For example, TMF can determine one or more AN devices corresponding to the cells in the cell list as one or more AN devices in the target area.
- TMF can map the non-3GPP location information to 3GPP location information. For example, TMF maps the municipal location information to a TA list or a cell list, thereby determining one or more AN devices in the target area.
- the TMF may determine at least one terminal device according to the indication information of the target object in the operation request.
- the corresponding relationship between the indication information of the target object and the at least one terminal device may refer to the description of "indication information of at least one terminal device" in S601, which will not be repeated here.
- TMF when TMF determines that at least one terminal device includes multiple terminal devices based on the indication information of the target object in the operation request, that is, when the first operation needs to be performed on multiple terminal devices, TMF can also determine that the inventory mode is a method of reading the EPC of the terminal device one by one.
- TMF sends an inventory command to the AN device.
- the inventory command is used to request to obtain the EPC of at least one terminal device, that is, to request to inventory at least one terminal device.
- the inventory command may include: indication information of the target object and a first setting identifier.
- the specific content of the indication information of the target object can be referred to S601 and will not be repeated here.
- the first setting identifier may be used to instruct the terminal device to send the first information.
- the first information may include at least one of the following: TID of the target terminal device, chip type information of the target terminal device, factory marking information of the target terminal device, and storage area information of the target terminal device.
- TID of the target terminal device For the specific content of the first setting identifier, refer to S401a1, and for the specific content of each information in the first information, refer to S401, which will not be repeated here.
- the inventory command includes a first setting identifier.
- the AN device sends a label selection message to one or more terminal devices.
- the tag selection message may include: indication information of the target object and a first setting identifier.
- the AN device may determine one or more terminal devices in at least one terminal device that are located within the coverage of the AN device according to the indication information of the target object, and then the AN device sends a label selection message to the one or more terminal devices.
- the target terminal device accesses the AN device through a random access process.
- the target terminal device is a terminal device that successfully accesses the AN device through a random access process among one or more terminal devices.
- the specific content of the random access process can be referred to S401a2, which will not be described here.
- the target terminal device sends a registration request 1 to the AN device.
- the registration request 1 may include: first information and the EPC of the target terminal device.
- the target terminal device may send a registration request 1 to the AN device.
- the tag selection message includes a first setting identifier.
- the indication information of the target object includes the first 4 digits of the EPC of the terminal device, and the first 4 digits are 1111. If the EPC of the target terminal device is 1111220000, the target terminal device may send a registration request 1 to the AN device.
- S607 The AN device sends a registration request 2 to the TMF.
- the registration request 2 may include: the first information and the EPC of the target terminal device.
- Registration Request 1 and Registration Request 2 may be the same or different.
- the AN device forwards the registration request from the target terminal device to the TMF.
- the AN device may process the registration request from the target terminal device (for example, encapsulate it, etc.) and then send Registration Request 2 to the TMF.
- the TMF obtains, based on the first information, indication information (ie, second information) of a storage area in the target terminal device corresponding to the first operation.
- indication information ie, second information
- the specific content of S608 can refer to the description of "TMF can obtain the second information according to the first information" in S401, which will not be repeated here.
- TMF sends an operation message to the target terminal device, where the operation message is used to request to perform a first operation on the target terminal device.
- the operation message includes second information.
- the specific content of the second information can be found in S401 and will not be described in detail here.
- the operation message also includes indication information of the first operation.
- the specific content of the indication information of the first operation can be referred to S601, which will not be described in detail here.
- the operation message itself may also be the indication information of the first operation.
- the operation message is a read operation message
- the first operation is a read operation.
- the operation message is a write operation message
- the first operation is a write operation.
- S610 The target terminal device sends operation result 1 to TMF.
- the operation result 1 is the result of the target terminal device performing the first operation according to the second information.
- the specific content of S610 can refer to S403, which will not be described here.
- TMF sends an inventory request to the AN device.
- the inventory request is used to request to obtain the EPC of the next terminal device, that is, to request to inventory the next terminal device.
- the inventory request may include information for indicating at least one of the following: completing a first operation on the target terminal device, querying an EPC of a next terminal device, or executing a next random access process.
- the process of performing the first operation on the next terminal device may refer to S604-S611, except that the target terminal device is replaced by the next terminal device, which will not be described in detail here.
- the AN device When the AN device no longer receives feedback information from the terminal device, the AN device sends an inventory completion message to the TMF, where the inventory completion message is used to indicate the end of executing the first operation on at least one terminal device.
- the feedback information of the terminal device may include at least one of the following: operation result 1 fed back by the terminal device, the EPC of the terminal device, or a third random number fed back by the terminal device.
- the operation result 2 may include: the operation result 1 fed back by at least one terminal device and the EPC of at least one terminal device.
- S611-S613 are optional steps.
- the method shown in FIG6 may not include S611-S613.
- the TMF determines that the operation result 1 of the at least one terminal device has been received, the method shown in FIG6 may not include S611-S613.
- the TMF when a first operation is performed on a terminal device, the TMF can obtain first information for determining second information from the terminal device, and the second information is used to indicate a storage area in the target terminal device corresponding to the first operation.
- the TMF may send second information to the target terminal device. In this way, the terminal device may determine the storage area corresponding to the first operation, thereby improving the efficiency of operating the terminal device.
- the embodiment of the present application provides another communication method, which is another possible example of the method shown in Figure 4.
- the process of the method is specifically described by taking the core network element as TMF as an example.
- S701 The AF sends a contract signing request to the UDM, where the contract signing request is used to request writing an EPC for at least one terminal device.
- the terminal device in at least one terminal device may be a passive terminal device such as a passive tag or a semi-passive tag.
- the terminal device in at least one terminal device may be a blank tag.
- a blank tag may be a tag without a uniquely specified EPC written therein, for example, the uniquely specified EPC may be specified by the AF.
- the AF may send a subscription request to the UDM directly, or may send a subscription request to the UDM through other network elements (eg, NEF).
- NEF network elements
- the contract signing request may include: indication information of the target area and indication information of the EPC range.
- the specific content of the indication information of the target area may be referred to S601, which will not be described in detail here.
- the specific form of the indication information of the EPC range can be various, and several possible forms are listed below.
- the several forms listed below can be used alone or in combination, and the embodiments of the present application do not limit them.
- the indication information of the EPC range includes the value interval of the EPC.
- the value interval of the EPC is 1111000001-1111000098.
- the indication information of the EPC range includes an EPC list.
- the EPC list includes 1111000001, 1111000002, 1111000005, and 1111000006.
- the indication information of the EPC range includes the first n digits of the EPC, where n is a positive integer.
- n is a positive integer.
- the EPC of the terminal device has 10 digits, and the first 4 digits are 1111, then the EPC range is 111100000-11111999999.
- the contract signing request may also include first type indication information, wherein the first type indication information may indicate that at least one terminal device is a passive tag or a semi-passive tag.
- the UDM may save one or more of the indication information of the target area, the indication information of the EPC range and the first type of indication information.
- UDM sends a contract signing response 1 to AF, where the contract signing response 1 is used to indicate that an EPC contract is signed for at least one terminal device.
- Company A after Company A attaches a blank label to at least one product, it can send a contract request to UDM through AF of Company A to request to write EPC for the blank label on at least one product. After Company A pays the operator to which UDM belongs, UDM can send a contract response 1 to AF.
- UDM sends a write EPC request to TMF, where the write EPC request is used to request to write EPC for at least one terminal device.
- the write EPC request may include: indication information of the target area and indication information of the EPC range.
- the write EPC request also includes first type indication information.
- TMF determines the AN device according to the write EPC request.
- TMF can determine the AN device according to the indication information of the target area written in the EPC request.
- the specific content can be referred to the method of "TMF determines the AN device according to the indication information of the target area" in S602, which will not be repeated here.
- TMF may also store the EPC range indicated by the indication information of the EPC range.
- the TMF sends an inventory command to the AN device, where the inventory command is used to request to obtain the EPC of at least one terminal device.
- the inventory command may include first blank label indication information.
- the first blank label indication information is used to inventory whether the EPC storage area contains a default EPC or the EPC storage area is a blank label.
- the first blank label indication information includes: a default EPC and/or a first TID.
- the terminal device may be considered as a blank label.
- the default EPC may be obtained by the TMF from other network elements (e.g., UDM), and the first TID may be obtained by the TMF from the AF.
- the first TID may be the TID in the first type indication information in S701.
- S706 The AN device sends a label selection message to one or more terminal devices.
- the AN device may select one or more terminal devices according to the default EPC and/or the first TID. For example, the AN device may determine that the one or more terminal devices include a terminal device whose EPC is the default EPC. For another example, the AN device may determine that the one or more terminal devices include a terminal device whose TID is the first TID.
- the target terminal device accesses the AN device through a random access process.
- the target terminal device is a terminal device that successfully accesses the AN device among one or more terminal devices.
- the target terminal device sends a registration request 1 to the AN device.
- the registration request 1 includes the default EPC of the target terminal device.
- the registration request 1 also includes type indication information of the target terminal device.
- the type indication information of the target terminal device can refer to the description of the first type indication information in S701, except that at least one terminal device is replaced by the target terminal device, which will not be repeated here.
- S709 The AN device sends a registration request 2 to the TMF.
- the registration request 2 includes the default EPC of the target terminal device.
- the registration request 2 also includes type indication information of the target terminal device.
- TMF determines that the target terminal device is a passive tag or a semi-passive tag.
- the TMF may determine whether the target terminal device is a passive tag or a semi-passive tag according to the first type indication information in S703 or the type indication information of the target terminal device in S709.
- TMF can also determine that the target terminal device is a blank tag according to the default EPC in the registration request 2.
- TMF sends a read command to the target terminal device, where the read command is used to read the first information.
- the first information may include at least one of the following: TID of the target terminal device, chip type information of the target terminal device, factory marking information of the target terminal device, and storage area information of the target terminal device.
- TID of the target terminal device chip type information of the target terminal device
- factory marking information of the target terminal device factory marking information of the target terminal device
- storage area information of the target terminal device storage area information of the target terminal device.
- the target terminal device sends a read command response to the TMF, where the read command response includes first information.
- the TMF obtains, based on the first information, indication information (ie, second information) of the storage area corresponding to the EPC write operation in the target terminal device.
- indication information ie, second information
- the specific content of S713 can refer to the description of "TMF can obtain the second information based on the first information" in S401, except that the first operation is replaced by the write EPC operation.
- the specific content of the second information can refer to the description of "the second information" in S401, which will not be repeated here.
- TMF sends a write command to the target terminal device.
- the write command includes: an EPC allocated to the target terminal device (hereinafter referred to as the first EPC) and second information.
- the first EPC belongs to the range indicated by the indication information of the EPC range.
- the target terminal device After writing the first EPC, the target terminal device sends a write command response to the TMF, where the write command response is used to indicate that the first EPC has been written for the target terminal device.
- the target terminal device may write the first EPC in the storage area indicated by the second information.
- the first EPC may overwrite the default EPC.
- the target terminal device is a terminal device of type 1, and the specific content of the storage area of the terminal device of type 1 can refer to step A1.
- the identifier is 1.
- the target terminal device can determine that the storage area corresponding to the identifier 1 is the EPC storage area, which corresponds to the library 01 in the memory library.
- the target terminal device can write the EPC in the library 01 in the memory library. After writing the EPC, the target terminal device can send a write command response to the TMF, and the write command response includes information indicating that the operation of writing the EPC to the target terminal device is completed.
- TMF sends an inventory request to the AN device.
- the inventory request is used to request to obtain the EPC of the next terminal device, that is, to request to inventory the next terminal device.
- the process of performing the write EPC operation on the next terminal device may refer to S706-S716, except that the target terminal device is replaced with the next terminal device, which will not be described in detail here.
- the AN device sends an inventory completion message to the TMF, where the inventory completion message is used to indicate the end of the write EPC operation on at least one terminal device.
- the AN device may execute S718.
- the coverage of the AN device may include multiple terminal devices with blank labels signed by company A.
- the AN device may execute S718.
- the feedback information from the terminal device may include at least one of the following: a default EPC fed back by the terminal device, label information of the terminal device, or a third random number fed back by the terminal device.
- TMF sends a write EPC response to UDM, where the write EPC response is used to indicate that the EPC is successfully written for at least one terminal device.
- the signing response 2 includes the allocated EPC range and indication information of successful writing.
- S702 and S716-S718 are optional steps.
- S716-S718 are optional steps.
- S716-S718 are optional steps.
- the TMF determines that the EPC has been written for the at least one terminal device.
- UDM may also be replaced by UDR.
- TMF when writing EPC for at least one terminal device, TMF can obtain first information for determining second information from the terminal device, and the second information is used to indicate a storage area corresponding to the first operation in the target terminal device.
- TMF can send the second information to the target terminal device. In this way, the terminal device can determine the storage area corresponding to the first operation, thereby improving the efficiency of operating the terminal device.
- the embodiment of the present application provides another communication method, which is another possible example of the method shown in Figure 4.
- the process of the method is specifically described by taking the core network element as TMF as an example.
- S801 AF sends an operation request to TMF, where the operation request is used to request to perform a first operation on at least one terminal device.
- the terminal device in at least one terminal device may be a passive terminal device such as a passive tag or a semi-passive tag.
- the operation request also includes: first information.
- the first information may include at least one of the following: TID of at least one terminal device, chip type information of at least one terminal device, factory marking information of at least one terminal device, and storage area information of at least one terminal device.
- TID of at least one terminal device
- chip type information of at least one terminal device chip type information of at least one terminal device
- factory marking information of at least one terminal device factory marking information of at least one terminal device
- storage area information of at least one terminal device The specific content of each information in the first information can refer to S401, except that the target terminal device is replaced by at least one terminal device, which will not be repeated here.
- the TMF determines the AN device and the at least one terminal device according to the operation request, and obtains indication information (ie, second information) of a storage area corresponding to the first operation in the at least one terminal device.
- TMF determining the AN device and the above-mentioned at least one terminal device according to the operation request can be referred to S602, which will not be repeated here.
- TMF when TMF determines that at least one terminal device includes multiple terminal devices based on the indication information of the target object in the operation request, that is, when the first operation needs to be performed on multiple terminal devices, TMF can also determine that the inventory mode is a method of reading the EPC of the terminal device one by one.
- TMF can obtain the second information based on the first information" in S401, except that the target terminal device is replaced by at least one terminal device, which will not be repeated here.
- TMF sends an inventory command to the AN device.
- the inventory command is used to request to obtain the EPC of at least one terminal device, that is, to request to inventory at least one terminal device.
- the inventory command may include: indication information of the target object.
- the specific content of the indication information of the target object can be referred to S601, which will not be described in detail here.
- the inventory command further includes: a third setting identifier.
- the third setting identifier can be used to indicate that the inventory mode is a method of reading the EPCs of the terminal devices one by one.
- S804 The AN device sends a label selection message to one or more terminal devices.
- the tag selection message may include: indication information of the target object.
- the tag selection message further includes: a third setting identifier.
- the manner in which the AN device sends the tag selection message may be referred to S604 and will not be described in detail here.
- the target terminal device accesses the AN device through a random access process.
- S805 The specific content of S805 can be found in S605 and will not be repeated here.
- the target terminal device sends a registration request 1 to the AN device.
- the registration request 1 includes the EPC of the target terminal device.
- S807 The AN device sends a registration request 2 to the TMF.
- the registration request 2 includes the EPC of the target terminal device.
- TMF sends an operation message to the target terminal device, where the operation message is used to request to perform a first operation on the target terminal device.
- TMF sends an inventory request to the AN device, where the inventory request is used to request to obtain the EPC of the next terminal device.
- the process of executing the first operation on the next terminal device may refer to S804-S810, except that the target terminal device is replaced by the next terminal device, which will not be described in detail here.
- the AN device When the AN device no longer receives feedback information from the terminal device, the AN device sends an inventory completion message to the TMF, where the inventory completion message is used to indicate the end of executing the first operation on at least one terminal device.
- S808-S813 can be referred to S609-S614 and will not be repeated here.
- the TMF may not obtain the indication information of the storage area corresponding to the first operation in at least one terminal device in S802. Before S808, the TMF only needs to obtain the indication information of the storage area corresponding to the first operation in the target terminal device.
- the first information in S801 may include the second information.
- the second information may be applicable to the M terminal devices; in other words, the second information is used to indicate the storage area corresponding to the first operation in the M terminal devices.
- M is an integer greater than 1.
- the second information may also be information dedicated to indicating the storage area corresponding to the first operation in the target terminal device.
- the TMF may save the second information.
- the TMF may obtain first information for determining second information from the AF, and the second information is used to indicate a storage area corresponding to the first operation in the target terminal device.
- the TMF may send the second information to the target terminal device. In this way, the terminal device may determine the storage area corresponding to the first operation, thereby improving the efficiency of operating the terminal device.
- the embodiment of the present application provides another communication method, which is a possible example of the method shown in Figure 5.
- the process of the method is specifically described by taking the core network element as TMF as an example.
- S901 AF sends a read request to TMF, where the read request is used to request to read data in at least one terminal device.
- the terminal device in at least one terminal device may be a passive terminal device such as a passive tag or a semi-passive tag.
- the terminal device in at least one terminal device is a terminal device with a single storage area. In other words, the terminal device in at least one terminal device has only one storage area.
- the read request may include: indication information of the target area and indication information of the target object, wherein the specific contents of the indication information of the target area and the indication information of the target object may be referred to S601 and will not be described in detail here.
- the specific content of the read request can be referred to the description of the first request in S501, which will not be repeated here.
- the TMF determines the AN device and the at least one terminal device according to the read request.
- TMF can determine the AN device according to the indication information of the target area in the read request, and determine at least one terminal device according to the indication information of the target object in the read request.
- the specific content can refer to S602 in which TMF determines the AN device according to the indication information of the target area and TMF determines at least one terminal device according to the indication information of the target object, which will not be repeated here.
- TMF sends an inventory command to the AN device.
- the inventory command is used to request to obtain the EPC of at least one terminal device, that is, to request to inventory at least one terminal device.
- the inventory command may include: indication information of the target object and a first indication.
- the specific content of the indication information of the target object may refer to S601; the first indication may be used to instruct the target terminal device to send data in the target terminal device, and the specific content may refer to S502, which will not be repeated here.
- the inventory command includes: a first indication.
- S904 The AN device sends a label selection message to one or more terminal devices.
- the tag selection message may include at least one of the following: indication information of the target object and the first indication.
- the manner in which the AN device sends the tag selection message may be referred to S604 and will not be described in detail here.
- the target terminal device accesses the AN device through a random access process.
- S905 The specific content of S905 can be found in S605 and will not be repeated here.
- the target terminal device sends a registration request 1 to the AN device.
- the registration request 1 includes: the EPC of the target terminal device and the data in the target terminal device.
- the data in the target terminal device is the data in the storage area of the target terminal device, for example, the temperature information measured and stored by the target terminal device.
- S907 The AN device sends a registration request 2 to the TMF.
- the registration request 2 may include at least one of the following: the EPC of the target terminal device and the data in the target terminal device.
- TMF sends an inventory request to the AN device.
- the inventory request is used to request to obtain the EPC of the next terminal device, that is, to request to inventory the next terminal device.
- the process of performing the read operation on the next terminal device may refer to S904-S908, except that the target terminal device is replaced by the next terminal device, which will not be described in detail here.
- the AN device When the AN device no longer receives feedback information from the terminal device, the AN device sends an inventory completion message to the TMF, where the inventory completion message is used to indicate the end of the read operation on at least one terminal device.
- the feedback information of the terminal device may include at least one of the following: data in the terminal device, the EPC of the terminal device, or a third random number fed back by the terminal device.
- TMF sends the read result 2 to AF.
- the read result may include: data in at least one terminal device and EPC of at least one terminal device.
- S908-S911 are optional steps.
- S908-S910 are optional steps.
- TMF determines that the data in at least one terminal device has been read
- S908-S910 are optional steps.
- TMF sends the EPC of the target terminal device and the data in the target terminal device to AF.
- S911 is an optional step.
- TMF can send a first indication to the target terminal device.
- the target terminal device can send the data in the target terminal device to TMF through a registration request, thereby eliminating the need for TMF to send a read command to the target terminal device, thereby simplifying the process of obtaining data from a terminal device with a single storage area and reducing overhead.
- An embodiment of the present application provides another communication method. Please refer to the flowchart shown in Figure 10 below, taking the core network element as TMF as an example, the process of the method is specifically described.
- S1001 AF sends a read request to TMF, where the read request is used to request to read data in at least one terminal device.
- the TMF determines the AN device and the at least one terminal device according to the read request.
- TMF sends an inventory command to the AN device.
- the inventory command is used to request to obtain the EPC of at least one terminal device, that is, to request to inventory at least one terminal device.
- the inventory command includes the indication information of the target object.
- the specific content of the indication information of the target object can be referred to S601, which will not be described in detail here.
- S1004 The AN device sends a label selection message to one or more terminal devices.
- the tag selection message may include: indication information of the target object.
- the manner in which the AN device sends the tag selection message may be referred to S604 and will not be described in detail here.
- the target terminal device accesses the AN device through a random access process.
- S1005 The specific content of S1005 can be found in S605 and will not be repeated here.
- the target terminal device sends a registration request 1 to the AN device.
- S1007 The AN device sends a registration request 2 to the TMF.
- the registration request 1 and the registration request 2 may include: the EPC of the target terminal device.
- the registration request 1 and the registration request 2 also include: a fourth setting identifier.
- the fourth setting identifier may be used to indicate that the storage area of the terminal device is a single storage area.
- the fourth setting identifier is, for example, tag type indication information, which may indicate that the storage area of the target terminal device is a single storage area.
- the specific content of the tag type indication information may refer to S501 and will not be repeated here.
- TMF sends a read command to the target terminal device, where the read command is used to read data in the target terminal device.
- the read command does not include indication information of a storage area corresponding to the read operation in the target terminal device.
- the TMF may determine that the storage area of the target terminal device is a single storage area according to the read request.
- the read request may indicate that the storage area of the target terminal device is a single storage area.
- the specific method may refer to the method in which the first request in S501 indicates that the storage area of the target terminal device is a single storage area, which will not be described in detail here.
- the read command includes information for indicating that the storage area of the target terminal device is a single storage area.
- the target terminal device sends a read result 1 to the TMF.
- read result 1 contains the data in the target terminal device.
- TMF sends an inventory request to the AN device.
- the inventory request is used to request to obtain the EPC of the next terminal device, that is, to request to inventory the next terminal device.
- the process of performing a read operation on the next terminal device may refer to S1004-S1010, except that the target terminal device is replaced by the next terminal device, which will not be described in detail here.
- S1012 When the AN device no longer receives feedback information from the terminal device, the AN device sends an inventory completion message to the TMF, where the inventory completion message is used to indicate the end of the read operation on at least one terminal device.
- S1010-S1012 can be referred to S909-S911, which will not be repeated here.
- TMF sends the read result 2 to AF.
- the read result 2 may include: data in at least one terminal device and the EPC of at least one terminal device.
- S1010-S1013 are optional steps.
- S1010-S1012 are optional steps.
- S1010-S1012 are optional steps.
- TMF determines that the data in at least one terminal device has been read
- S1010-S1012 are optional steps.
- TMF sends the EPC of the target terminal device and the data in the target terminal device to AF.
- S1013 is an optional step.
- AF can notify TMF in a read request that the storage area of the target terminal device is a single storage area, and then TMF can perform a read operation on the target terminal device to obtain data in the target terminal device.
- the present application embodiment provides a communication device through Figure 11, which can be used to perform the functions of the relevant steps in the above method embodiments.
- the functions can be implemented by hardware,
- the corresponding software implementation can also be performed by software or hardware.
- the hardware or software includes one or more modules corresponding to the above functions.
- the structure of the communication device is shown in Figure 11, including a communication unit 1101 and a processing unit 1102.
- the communication device 1100 can be applied to the TMF in the communication system shown in Figure 3, or the communication device 1100 can be applied to the terminal equipment in the communication system shown in Figure 2 or Figure 3, and can implement the communication method provided in the above embodiments and examples of the present application.
- the functions of each unit in the communication device 1100 are introduced below.
- the communication unit 1101 is used to receive and send data.
- the communication unit 1101 can be implemented by a physical interface, a communication module, a communication interface, and an input/output interface.
- the communication device 1100 can be connected to a network cable or a cable through the communication unit to establish a physical connection with other devices.
- the communication unit 1101 may be implemented by a transceiver, for example, a mobile communication module.
- the mobile communication module may include at least one antenna, at least one filter, a switch, a power amplifier, a low noise amplifier (LNA), etc.
- LNA low noise amplifier
- the processing unit 1102 can be used to support the communication device 1100 to perform the processing actions in the above method embodiment.
- the processing unit 1102 can be implemented by a processor.
- the processor can be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
- the general-purpose processor can be a microprocessor or any conventional processor.
- the communication device 1100 is applied to the core network element in the embodiment of the present application shown in Figure 4, or to the TMF in the embodiment of the present application shown in any one of Figures 6 to 8.
- the specific functions of the processing unit 1102 in this implementation are introduced below.
- the processing unit 1102 is used to: obtain first information of the target terminal device, the first information is used to determine second information, and the second information is used to indicate a storage area in the target terminal device corresponding to the first operation; send the second information and indication information of the first operation to the target terminal device through the communication unit 1101; receive the result of the target terminal device executing the first operation according to the second information through the communication unit 1101.
- the first information includes at least one of the following: a tag identifier TID of the target terminal device, chip type information of the target terminal device, factory marking information of the target terminal device, storage area information of the target terminal device, and the second information.
- the processing unit 1102 is specifically used to: send a first message to the target terminal device through the access network device via the communication unit 1101, and the first message is used to trigger the target terminal device to initiate a random access process; receive a registration request from the target terminal device through the communication unit 1101, and the registration request includes the first information.
- the processing unit 1102 is specifically used to: send a read command to the target terminal device through the communication unit 1101, and the read command is used to read the first information in the target terminal device; receive a read command response from the target terminal device through the communication unit 1101, and the read command response includes the first information.
- the processing unit 1102 is specifically configured to: before sending a read command to the target terminal device, determine whether the target terminal device is a passive tag or a semi-passive tag.
- the processing unit 1102 is specifically used to: obtain tag type indication information of the target terminal device from the first network element or the target terminal device through the communication unit 1101, and determine whether the target terminal device is a passive tag or a semi-passive tag according to the tag type indication information.
- the processing unit 1102 is specifically used to: receive a service request from an application function network element through the communication unit 1101, and the service request includes the first information.
- the processing unit 1102 is specifically used to: before sending the second information and the indication information of the first operation to the target terminal device, obtain the correspondence between the first information and the storage area in the target terminal device corresponding to the first operation; and determine the second information based on the correspondence and the first information.
- the processing unit 1102 is specifically used to: obtain the correspondence between the first information stored locally and the storage area corresponding to the first operation in the target terminal device; or obtain the correspondence between the first information and the storage area corresponding to the first operation in the target terminal device from the second network element through the communication unit 1101.
- the processing unit 1102 is specifically used to: send the first information to the third network element through the communication unit 1101; receive the second information determined by the third network element based on the first information through the communication unit 1101.
- the processing unit 1102 is specifically used to: determine the second information based on the storage area information of the target terminal device and the indication information of the first operation before sending the second information and the indication information of the first operation to the target terminal device.
- the processing unit 1102 is specifically used to: send an operation message to the target terminal device through the communication unit 1101, the operation message is used to indicate the execution of the first operation on the target terminal device, and the operation message includes the second information and indication information of the first operation.
- the first operation is one or more of a read operation, a write operation, an access operation, a deactivation operation, a lock operation, a block write operation, a block erase operation and an electronic product code (EPC) write operation.
- EPC electronic product code
- the second information includes an identifier of a storage area in the target terminal device corresponding to the first operation.
- the second information also includes at least one of the following: a pointer value, used to indicate the location in the storage area where the first operation starts to be executed; a length, used to indicate the length of the data for executing the first operation in the storage area; a mask or a reverse mask, used to indicate the mask or reverse mask used to execute the first operation in the storage area.
- a pointer value used to indicate the location in the storage area where the first operation starts to be executed
- a length used to indicate the length of the data for executing the first operation in the storage area
- a mask or a reverse mask used to indicate the mask or reverse mask used to execute the first operation in the storage area.
- the communication device 1100 is applied to the target terminal device in the embodiment of the present application shown in any one of Figures 4, 6 to 8.
- the specific functions of the processing unit 1102 in this implementation are introduced below.
- the processing unit 1102 is used to: send first information to a core network network element through the communication unit 1101, wherein the first information is used to determine second information, and the second information is used to indicate a storage area in the target terminal device corresponding to the first operation; receive the second information and indication information of the first operation from the core network network element through the communication unit 1101; and send the result of the target terminal device executing the first operation according to the second information to the core network network element through the communication unit 1101.
- the first information includes at least one of the following: a tag identifier TID of the target terminal device, chip type information of the target terminal device, factory marking information of the target terminal device, and storage area information of the target terminal device.
- the processing unit 1102 is specifically configured to: before sending the first information to the core network element,
- the communication unit 1101 receives a first message sent by the core network element through the access network device, where the first message is used to trigger the target terminal device to initiate a random access process; a registration request is sent to the core network element through the communication unit 1101, where the registration request includes the first information.
- the processing unit 1102 is specifically used to: before sending the first information to the core network network element, receive a read command from the core network network element through the communication unit 1101, and the read command is used to read the first information in the target terminal device; send a read command response to the core network network element through the communication unit 1101, and the read command response includes the first information.
- the processing unit 1102 is specifically used to: before receiving a read command from the core network network element, send tag type indication information of the target terminal device to the core network network element through the communication unit 1101, and the tag type indication information is used to indicate that the target terminal device is a passive tag or a semi-passive tag.
- the processing unit 1102 is specifically used to: receive an operation message from the core network element through the communication unit 1101, the operation message is used to indicate the execution of the first operation on the target terminal device, and the operation message includes the second information and indication information of the first operation.
- the first operation is one or more of a read operation, a write operation, an access operation, a deactivation operation, a lock operation, a block write operation, a block erase operation and an electronic product code (EPC) write operation.
- EPC electronic product code
- the second information includes an identifier of a storage area in the target terminal device corresponding to the first operation.
- the second information also includes at least one of the following: a pointer value, used to indicate the location in the storage area where the first operation starts to be executed; a length, used to indicate the length of the data for executing the first operation in the storage area; a mask or a reverse mask, used to indicate the mask or reverse mask used to execute the first operation in the storage area.
- a pointer value used to indicate the location in the storage area where the first operation starts to be executed
- a length used to indicate the length of the data for executing the first operation in the storage area
- a mask or a reverse mask used to indicate the mask or reverse mask used to execute the first operation in the storage area.
- the communication device 1100 is applied to the core network element in the embodiment of the present application shown in Figure 5, or applied to the TMF in the embodiment of the present application shown in Figure 9.
- the specific functions of the processing unit 1102 in this embodiment are introduced below.
- the processing unit 1102 is used to: receive a first request from an application function network element through the communication unit 1101, the first request is used to request to read data in a target terminal device, and the first request is also used to indicate that the storage area of the target terminal device is a single storage area; send a first message to the target terminal device through an access network device through the communication unit 1101, the first message is used to trigger the target terminal device to initiate a random access process, the first message also includes a first indication, and the first indication is used to instruct the target terminal device to send the data in the target terminal device; receive a registration request sent by the target terminal device according to the first indication through the communication unit 1101, and the registration request includes the data in the target terminal device.
- the communication device 1100 is applied to the terminal device in the embodiment of the present application shown in Fig. 5 or Fig. 9.
- the specific functions of the processing unit 1102 in this implementation are introduced below.
- the processing unit 1102 is used to: receive a first message sent by a core network element through an access network device through the communication unit 1101, the first message is used to trigger a target terminal device to initiate a random access process, and the first message also includes a first indication, and the first indication is used to instruct the target terminal device to send data in the target terminal device; according to the first indication, send a registration request to the core network element through the communication unit 1101, and the registration request includes data in the target terminal device.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or may exist physically separately, or two or more units may be integrated into one.
- the above integrated units can be implemented in the form of hardware or in the form of software functional units.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the technical solution of the present application is essentially or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product.
- the computer software product is stored in a storage medium, including several instructions to enable a computer device (which can be a personal computer, server, or network device, etc.) or a processor (processor) to perform all or part of the steps of the method described in each embodiment of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), disk or optical disk and other media that can store program code.
- the embodiment of the present application provides a communication device as shown in Figure 12, which can be used to perform the relevant steps in the above method embodiment.
- the communication device can apply the TMF in the communication system shown in Figure 3, or the communication device 1100 can be applied to the terminal equipment in the communication system shown in Figure 2 or Figure 3, and can implement the communication method provided by the above embodiments and examples of the present application, and has the function of the communication device shown in Figure 11.
- the communication device 1200 includes: a communication module 1201, a processor 1202 and a memory 1203. Among them, the communication module 1201, the processor 1202 and the memory 1203 are interconnected.
- the communication module 1201, the processor 1202 and the memory 1203 are interconnected via a bus 1204.
- the bus 1204 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus may be divided into an address bus, a data bus, a control bus, etc.
- FIG12 is represented by only one thick line, but it does not mean that there is only one bus or one type of bus.
- the communication module 1201 is used to receive and send data to realize communication interaction with other devices.
- the communication module 1201 can be realized through a physical interface, a communication module, a communication interface, and an input/output interface.
- the processor 1202 may be used to support the communication device 1200 in executing the processing actions in the above method embodiment. When the communication device 1200 is used to implement the above method embodiment, the processor 1202 may also be used to implement the functions of the above processing unit 1102.
- the processor 1202 may be a CPU, or other general-purpose processors, DSPs, ASICs, FPGAs, or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof.
- a general-purpose processor may be a microprocessor, or any conventional processor.
- the communication device 1200 is applied to the core network element in the embodiment of the present application shown in FIG4 , or to the TMF in the embodiment of the present application shown in any one of FIG6 to FIG8 .
- the processor 1202 is specifically used to: obtain first information of the target terminal device, the first information is used to determine second information, and the second information is used to indicate a storage area corresponding to the first operation in the target terminal device; send the second information and the indication information of the first operation to the target terminal device through the communication module 1201; receive the result of the target terminal device performing the first operation according to the second information through the communication module 1201.
- the communication device 1200 is applied to the target terminal device in the embodiment of the present application shown in any one of Figures 4, 6-8.
- the processor 1202 is specifically used to: send first information to the core network network element through the communication module 1201, the first information is used to determine the second information, and the second information is used to indicate the storage area corresponding to the first operation in the target terminal device; receive the second information and the indication information of the first operation from the core network network element through the communication module 1201; send the result of the target terminal device performing the first operation according to the second information to the core network network element through the communication module 1201.
- the communication device 1200 is applied to the core network element in the embodiment of the present application shown in Figure 5, or to the TMF in the embodiment of the present application shown in Figure 9.
- the processor 1202 is specifically used to: receive a first request from an application function network element through the communication module 1201, the first request is used to request to read data in the target terminal device, and the first request is also used to indicate that the storage area of the target terminal device is a single storage area; send a first message to the target terminal device through the access network device through the communication module 1201, the first message is used to trigger the target terminal device to initiate a random access process, and the first message also includes a first indication, and the first indication is used to instruct the target terminal device to send the data in the target terminal device; receive a registration request sent by the target terminal device according to the first indication through the communication module 1201, and the registration request includes the data in the target terminal device.
- the communication device 1200 is applied to the terminal device in the embodiment of the present application shown in Figure 5 or Figure 9.
- the processor 1202 is specifically used to: receive a first message sent by a core network element through an access network device through the communication module 1201, the first message is used to trigger the target terminal device to initiate a random access process, and the first message also includes a first indication, and the first indication is used to instruct the target terminal device to send data in the target terminal device; according to the first indication, send a registration request to the core network element through the communication module 1201, and the registration request includes data in the target terminal device.
- the specific functions of the processor 1202 can refer to the description of the communication method provided in the above embodiments and examples of the present application, as well as the specific functional description of the communication device 1100 in the embodiment of the present application shown in Figure 11, which will not be repeated here.
- the memory 1203 is used to store program instructions and data, etc.
- the program instructions may include program codes, and the program codes include computer operation instructions.
- the memory 1203 may include RAM, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
- the processor 1202 executes the program instructions stored in the memory 1203, and uses the data stored in the memory 1203 to implement the above functions, thereby realizing the communication method provided in the above embodiment of the present application.
- the memory 1203 in FIG. 12 of the present application can be a volatile memory or a non-volatile memory, or can include both volatile and non-volatile memories.
- the non-volatile memory can be a ROM, a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or a flash memory.
- the volatile memory can be a RAM, which is used as an external cache.
- RAM Direct Rambus RAM
- SRAM Static RAM
- DRAM Dynamic RAM
- SDRAM Synchronous DRAM
- DDR SDRAM Double Data Rate SDRAM
- ESDRAM Enhanced SDRAM
- SLDRAM Synchlink DRAM
- DR RAM Direct Rambus RAM
- the embodiments of the present application further provide a computer program, which, when executed on a computer, enables the computer to execute the methods provided in the above embodiments.
- the embodiments of the present application further provide a computer-readable storage medium, in which a computer program is stored.
- the computer program is executed by a computer, the computer executes the method provided in the above embodiments.
- the storage medium may be any available medium that can be accessed by a computer.
- a computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage medium or or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
- an embodiment of the present application further provides a chip, which is used to read a computer program stored in a memory to implement the method provided in the above embodiments.
- the embodiments of the present application provide a chip system, which includes a processor for supporting a computer device to implement the functions involved in each device in the above embodiments.
- the chip system also includes a memory, which is used to store the necessary programs and data for the computer device.
- the chip system can be composed of a chip, or it can include a chip and other discrete devices.
- the embodiments of the present application provide a communication method and apparatus, in which a core network network element can obtain first information of a target terminal device, and the first information can be used to determine second information, and the second information is used to indicate a storage area in the target terminal device corresponding to a first operation. Then, the core network network element can send the second information and the indication information of the first operation to the target terminal device, and receive the result of the target terminal device performing the first operation according to the second information.
- the core network network element when instructing to perform an operation on the target terminal device, the core network network element sends the second information for indicating the storage area in the target terminal device corresponding to the first operation to the target terminal device. In this way, the terminal device can determine the storage area corresponding to the first operation, thereby improving the efficiency of operating the terminal device.
- the embodiments of the present application may be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment in combination with software and hardware. Moreover, the present application may adopt the form of a computer program product implemented in one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) that contain computer-usable program code.
- a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer-readable memory produce a manufactured product including an instruction device that implements the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
- These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请公开了一种通信方法及装置。该方法为:核心网网元可获取目标终端设备的第一信息,该第一信息可用于确定第二信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。然后,核心网网元可向目标终端设备发送第二信息和第一操作的指示信息,并接收目标终端设备根据第二信息执行第一操作的结果。通过该方法,在指示对目标终端设备进行操作时,核心网网元向目标终端设备发送用于指示目标终端设备中与第一操作对应的存储区域的第二信息。这样,终端设备可确定该第一操作对应的存储区域,从而提高对终端设备进行操作的效率。
Description
相关申请的交叉引用
本申请要求在2022年09月30日提交中国专利局、申请号为202211231830.6、申请名称为“一种通信方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信技术领域,尤其涉及一种通信方法及装置。
目前,在无源物联(Passive IoT)场景下,物联终端设备(例如,射频识别(radio frequency identification,RFID)装置)具有大规模部署应用前景。例如,在物流及仓储场景中,可以通过物联终端设备进行货物盘存及跟踪、以及高价值货物(例如,疫苗)运输过程环境及货物状态监测;又例如,在工业制造场景中,可以通过物联终端设备进行环境及设备状态监测。
无源或者半无源的物联终端设备的功能简单,导致其需要依赖外部激励才能发送信息,该激励一般来自读卡器(或读写器)。读卡器可集成在接入网设备中,接入网设备根据核心网网元的指示,对物联终端设备进行操作。
现有技术中亟需可以高效的对物联网设备进行操作的方法。
发明内容
本申请提供了一种通信方法及装置,用于提高对物联终端设备进行操作的效率。
第一方面,本申请实施例提供了一种通信方法。该方法的执行主体可以是核心网网元,也可以是应用于核心网网元中的部件,例如芯片、处理器等。下面以执行主体是核心网网元为例进行描述。核心网网元可获取目标终端设备的第一信息,该第一信息可用于确定第二信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。然后,核心网网元可向目标终端设备发送第二信息和第一操作的指示信息,并接收目标终端设备根据第二信息执行第一操作的结果。
通过该方法,在指示对目标终端设备进行操作时,核心网网元向目标终端设备发送第二信息和第一操作的指示信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。这样,终端设备可确定该第一操作对应的存储区域,从而提高对终端设备进行操作的效率。
在一种可能的设计中,第一信息包括以下至少一项:目标终端设备的TID、目标终端设备的芯片类型信息、目标终端设备的出厂标记信息、目标终端设备的存储区域信息、第二信息。该设计提供了多种能用于确定第二信息的第一信息,实现较为灵活。
在一种可能的设计中,核心网网元可从目标终端设备获取第一信息。可选的,核心网网元可通过以下方式之一从目标终端设备获取第一信息:
方式一:核心网网元可通过接入网设备向目标终端设备发送第一消息,第一消息用于触发目标终端设备发起随机接入流程。然后,核心网网元可接收来自目标终端设备的注册请求,该注册请求包括第一信息。通过方式一,核心网网元可通过来自目标终端设备的注册请求获取第一信息。这样,核心网网元可尽早地从目标终端设备获取到第一信息。
方式二:核心网网元在向目标终端设备发送读命令后,可接收来自目标终端设备的读命令响应。其中,读命令用于读取目标终端设备中的第一信息;读命令响应包括第一信息。通过方式二,核心网网元可通过读命令来触发目标终端设备向核心网网元发送读命令响应,该读命令响应包含第一信息。这样,核心网网元可按需从目标终端设备获取第一信息。
在一种可能的设计中,核心网网元可在确定目标终端设备为无源标签或半无源标签之后,再向目标终端设备发送读命令。通过该设计,核心网网元可有针对性地向目标终端设备发送读命令,以获取目标终端设备的第一信息。
在一种可能的设计中,核心网网元可从第一网元或目标终端设备获取目标终端设备的标签类型指示信息,并根据标签类型指示信息确定目标终端设备为无源标签或半无源标签。通过该设计,核心网网元可灵活的确定目标终端设备是否为无源标签或半无源标签。
在一种可能的设计中,核心网网元可从应用功能网元获取第一信息。可选的,核心网网元接收来自应用功能网元的业务请求,该业务请求包括第一信息。通过该设计,核心网网元可通过业务请求尽早获得第一信息。
在一种可能的设计中,当第一信息包括目标终端设备的TID、目标终端设备的芯片类型信息和目标终端设备的出厂标记信息中的一项或多项时,在核心网网元向目标终端设备发送第二信息和第一操作的指示信息之前,核心网网元可获取第一信息和目标终端设备中与第一操作对应的存储区域的对应关系,并根据该对应关系和第一信息,确定第二信息。通过该设计,核心网网元可根据第一信息和目标终端设备中与第一操作对应的存储区域的对应关系,确定第二信息,无需从其他设备获取第二信息,从而可简化获取第二信息的流程,提高获取第二信息的效率。
在一种可能的设计中,核心网网元可获取本地存储的第一信息和目标终端设备中与第一操作对应的存储区域的对应关系,或者,从第二网元获取第一信息和目标终端设备中与第一操作对应的存储区域的对应关系。通过该设计,核心网网元可灵活地获取第一信息和目标终端设备中与第一操作对应的存储区域的对应关系。
在一种可能的设计中,当第一信息包括目标终端设备的TID、目标终端设备的芯片类型信息和目标终端设备的出厂标记信息中的一项或多项时,在核心网网元向目标终端设备发送第二信息和第一操作的指示信息之前,核心网网元可向第三网元发送第一信息,并接收第三网元根据第一信息确定的第二信息。通过该设计,核心网网元可从第三网元获取第二信息,获取方式较为灵活。
在一种可能的设计中,当第一信息包括目标终端设备的存储区域信息时,在核心网网元向目标终端设备发送第二信息和第一操作的指示信息之前,核心网网元可根据目标终端设备的存储区域信息和第一操作的指示信息,确定第二信息。通过该设计,核心网网元可根据目标终端设备的存储区域信息和第一操作的指示信息,确定第二信息,无需从其他设备获取第二信息,从而可简化获取第二信息的流程,提高获取第二信息的效率。
在一种可能的设计中,核心网网元可向目标终端设备发送操作消息,操作消息用于指示对目标终端设备执行第一操作,操作消息包括第二信息和第一操作的指示信息。通过该
设计,核心网网元可通过操作消息向目标终端设备发送第二信息和第一操作的指示信息,易于实现。
在一种可能的设计中,第一操作可为读操作、写操作、访问操作、灭活操作、锁定操作、块写操作、块擦操作和写入电子产品编码EPC操作中的一项或多项。
在一种可能的设计中,第二信息包括目标终端设备中与第一操作对应的存储区域的标识。通过第二信息可灵活、便捷指示目标终端设备中与第一操作对应的存储区域。
在一种可能的设计中,第二信息还包括以下至少一项:指针值,用于指示在存储区域中开始执行第一操作的位置;长度,用于指示在存储区域中执行第一操作的数据的长度;掩码或反掩码,用于指示在存储区域中执行第一操作所使用的掩码或反掩码。通过该设计,可准确指示出目标终端设备中与第一操作对应的存储区域。
第二方面,本申请实施例提供了一种通信方法。该方法的执行主体可以是终端设备,也可以是应用于终端设备中的部件,例如芯片、处理器等。下面以执行主体是目标终端设备为例进行描述。目标终端设备可向核心网网元发送第一信息。其中,第一信息用于确定第二信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。然后,目标终端设备可接收来自核心网网元的第二信息和第一操作的指示信息,并向核心网网元发送目标终端设备根据第二信息执行第一操作的结果。
通过该方法,在指示对目标终端设备进行操作时,核心网网元可从目标终端设备获取第一信息,并向目标终端设备发送第二信息和第一操作的指示信息。其中,第一信息用于确定第二信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。终端设备可确定该第一操作对应的存储区域,从而提高对终端设备进行操作的效率。
在一种可能的设计中,第一信息包括以下至少一项:目标终端设备的TID、目标终端设备的芯片类型信息、目标终端设备的出厂标记信息、目标终端设备的存储区域信息。该设计提供了多种能用于确定第二信息的第一信息,实现较为灵活。
在一种可能的设计中,目标终端设备可接收核心网网元通过接入网设备发送的第一消息,第一消息用于触发目标终端设备发起随机接入流程。然后,目标终端设备可向核心网网元发送注册请求,该注册请求包括第一信息。通过该设计,目标终端设备可通过注册请求向核心网网元发送第一信息。这样,核心网网元可尽早地从目标终端设备获取到第一信息。
在一种可能的设计中,目标终端设备可在接收来自核心网网元的读命令后,向核心网网元发送读命令响应。其中,读命令用于读取目标终端设备中的第一信息;读命令响应包括第一信息。通过该设计,目标终端设备可根据来自核心网网元的读命令,向核心网网元发送包含第一信息的读命令响应。这样,目标终端设备可根据核心网网元的需求发送第一信息。
在一种可能的设计中,在接收来自核心网网元的读命令之前,目标终端设备可向核心网网元发送目标终端设备的标签类型指示信息,该标签类型指示信息用于指示目标终端设备为无源标签或半无源标签。通过该设计,目标终端设备可通知核心网网元:目标终端设备为无源标签或半无源标签,从而使得核心网网元有针对性地向目标终端设备发送读命令。
在一种可能的设计中,目标终端设备可接收来自核心网网元的操作消息。其中,该操作消息用于指示对目标终端设备执行第一操作,操作消息包括第二信息和第一操作的指示
信息。通过该设计,目标终端设备可通过操作消息获取第二信息和第一操作的指示信息,易于实现。
在一种可能的设计中,第一操作为读操作、写操作、访问操作、灭活操作、锁定操作、块写操作、块擦操作和写入电子产品编码EPC操作中的一项或多项。
在一种可能的设计中,第二信息包括目标终端设备中与第一操作对应的存储区域的标识。通过第二信息可灵活、便捷指示目标终端设备中与第一操作对应的存储区域。
在一种可能的设计中,第二信息还包括以下至少一项:指针值,用于指示在存储区域中开始执行第一操作的位置;长度,用于指示在存储区域中执行第一操作的数据的长度;掩码或反掩码,用于指示在存储区域中执行第一操作所使用的掩码或反掩码。通过该设计,可准确指示出目标终端设备中与第一操作对应的存储区域。
第三方面,本申请实施例提供了一种通信方法。该方法的执行主体可以是核心网网元,也可以是应用于核心网网元中的部件,例如芯片、处理器等。下面以执行主体是核心网网元为例进行描述。核心网网元可接收来自应用功能网元的第一请求。第一请求用于请求读取目标终端设备中的数据,第一请求还用于指示目标终端设备的存储区域为单一存储区域。核心网网元可通过接入网设备向目标终端设备发送第一消息。其中,第一消息用于触发目标终端设备发起随机接入流程,第一消息中还包括第一指示,第一指示用于指示目标终端设备发送目标终端设备中的数据。然后,核心网网元可接收目标终端设备根据第一指示发送的注册请求,注册请求中包括目标终端设备中的数据。
通过该方法,当目标终端设备的存储区域为单一存储区域时,核心网网元可向目标终端设备发送第一指示,目标终端设备在接收到第一指示后,即可向通过注册请求向核心网网元发送目标终端设备中的数据,从而无需核心网网元向目标终端设备发送读命令,进而可简化从具有单一存储区域的终端设备获取数据的流程,降低开销。
第四方面,本申请实施例提供了一种通信方法。该方法的执行主体可以是终端设备,也可以是应用于终端设备中的部件,例如芯片、处理器等。下面以执行主体是目标终端设备为例进行描述。目标终端设备可接收核心网网元通过接入网设备发送的第一消息。其中,第一消息用于触发目标终端设备发起随机接入流程,第一消息中还包括第一指示,第一指示用于指示目标终端设备发送目标终端设备中的数据。然后,目标终端设备可根据第一指示向核心网网元发送注册请求,该注册请求中包括目标终端设备中的数据。
通过该方法,当目标终端设备的存储区域为单一存储区域时,核心网网元可向目标终端设备发送第一指示,目标终端设备在接收到第一指示后,即可向通过注册请求向核心网网元发送目标终端设备中的数据,从而无需核心网网元向目标终端设备发送读命令,进而可简化从具有单一存储区域的终端设备获取数据的流程,降低开销。
第五方面,本申请实施例提供了一种通信装置,包括用于执行以上任一方面中各个步骤的单元。
第六方面,本申请实施例提供了一种通信装置,包括至少一个处理元件和至少一个存储元件,其中该至少一个存储元件用于存储程序和数据,该至少一个处理元件用于读取并执行存储元件存储的程序和数据,以使得本申请以上任一方面提供的方法被实现。
第七方面,本申请实施例提供了一种通信系统,包括:用于执行第一方面提供的方法
的核心网设备,和用于执行第二方面提供的方法的终端设备。
第八方面,本申请实施例提供了一种通信系统,包括:用于执行第三方面提供的方法的核心网设备,和用于执行第四方面提供的方法的终端设备。
第九方面,本申请实施例还提供了一种计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述任一方面提供的方法。
第十方面,本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机程序,当所述计算机程序被计算机执行时,使得所述计算机执行上述任一方面提供的方法。
第十一方面,本申请实施例还提供了一种芯片,所述芯片用于读取存储器中存储的计算机程序,以执行上述任一方面提供的方法。
第十二方面,本申请实施例还提供了一种芯片系统,该芯片系统包括处理器,用于支持计算机装置实现上述任一方面提供的方法。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器用于保存该计算机装置必要的程序和数据。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。
上述第五方面至第十二方面中任一方面可以达到的技术效果可以参照上述第一方面至第四方面中任一方面中任一种可能设计可以达到的技术效果说明,重复之处不予论述。
图1为本申请实施例提供的一种标签结构的示意图;
图2为本申请实施例提供的一种通信系统的架构图;
图3为本申请实施例提供的另一种通信系统的架构图;
图4为本申请实施例提供的第一种通信方法的流程图;
图5为本申请实施例提供的第二种通信方法的流程图;
图6为本申请实施例提供的第三种通信方法的流程图;
图7为本申请实施例提供的第四种通信方法的流程图;
图8为本申请实施例提供的第五种通信方法的流程图;
图9为本申请实施例提供的第六种通信方法的流程图;
图10为本申请实施例提供的第七种通信方法的流程图;
图11为本申请实施例提供的一种通信装置的结构图;
图12为本申请实施例提供的另一种通信装置的结构图。
本申请提供一种通信方法及装置,用于提高对物联终端设备进行操作的效率。其中,方法和装置是基于同一技术构思的,由于方法及装置解决问题的原理相似,因此方法与装置的实施可以相互参见,重复之处不再赘述。
以下,对本申请中的部分用语进行解释说明,以便于本领域技术人员理解。
1)图1示出了目前技术中标签的存储区域格式示意图。如图1所示,存储区域包括:保留存储区(reserved)、(electronic product code,EPC)存储区、标签标识(tag identifier,TID)存储区、用户(user)存储区,以下对各个存储区进行介绍。
a)、保留存储区:用于存储灭活命令(kill)和/或接入命令(access)功能所需的密码。
b)、EPC存储区:用于存储与EPC关联的信息。其中,与EPC关联的信息可包括以下至少一项:标签的保存的循环冗余码(cyclic redundancy code,CRC)(StoredCRC)、标签的保存的产品码(product code,PC)(StoredPC)、标签的EPC和标签的扩展的产品码(extended product code,XPC)等。
c)、标签标识(tag identifier,TID)存储区:可用于存储标签和提供商的数据,例如,可用于存储TAG生产厂家的标识和/或TAG的类型标识等。
d)、用户(user)存储区:为可选的扩展区域,可用于存储用户特有的数据。
图1仅为标签的存储区域格式的一个示例。标签可包括更多或更少的存储区域。标签中各存储区域对应的内存库(MemBank)可通过二进制或十进制的标识来指示。
当通过二进制标识指示内存库时,二进制标识的长度可根据标签中存储区域的数量确定。例如,图1所示的标签中有4个存储区域,可通过2比特的二进制标识指示每个存储区域对应的内存库。示例性的,保留存储区对应于内存库中的库00,EPC存储区对应于内存库中的库01,TID存储区对应于内存库中的库10,用户存储区对应于内存库中的库11。
又例如,当通过十进制的标识来指示内存库时,保留存储区可对应于内存库中的库0,EPC存储区对应于内存库中的库1,TID存储区对应于内存库中的库2,用户存储区对应于内存库中的库3。
本申请中,以标签包括4个存储区域,通过二进制标识指示内存库为例进行说明。
2)盘点操作:盘点操作也可以称为盘存操作,该操作可以获取终端设备的EPC,例如,可以通过查询(query)、确认(ack)等命令用来获取终端的EPC。当要对多个终端设备执行盘点操作时,核心网设备可通过接入网设备来逐个获取或批量获取多个终端设备的EPC。
3)读(Read)操作:读操作可以读取终端设备的存储区中的EPC、标签标识(tag identifier,TID)、保留存储区中存储的内容或用户存储区中存储的内容等。
4)写(Write)操作:写操作可以对终端设备的存储区进行写入操作。示例性的,可以对存储区中的标识信息(例如EPC、TID)进行写入或改写。或者,可以对保留存储区或用户存储区中的数据进行写入或者改写操作。
5)灭活(Kill)操作:灭活操作可以让终端设备失效。示例性的,失效后的终端设备无法工作。
6)锁(Lock)操作:锁操作可以锁住终端设备的信息,可以防止对该终端设备进行读操作或写操作。或者,锁操作也可以锁住存储区域(memory banks),可以防止或允许对该存储区域进行读操作或写操作。
7)块写操作:可以让读写器以单命令对终端设备的存储区(例如,保留存储区、EPC存储区、TID存储区或用户存储区)进行多字的写操作。
8)块擦操作:可以让读写器对终端设备的存储区(例如,保留存储区、EPC存储区、TID存储区或用户存储区)进行多字的擦除操作。
9)访问操作:让具有非零值访问密码(access password)的终端设备从开(open)状态转变为安全(secured)状态。
本申请实施例中,对于名词的数目,除非特别说明,表示“单数名词或复数名词”,即“一个或多个”。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”描述
关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。“以下至少一项(个)”或其类似表达,是指这些项(个)中的任意组合,包括单项(个)或复数项(个)的任意组合。
另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不应理解为指示或暗示相对重要性,也不应理解为指示或暗示顺序。
下面将结合附图,对本申请实施例进行详细描述。
图2为本申请实施例提供的一种通信系统的架构图,其中示出了基于服务化架构的第五代(the 5th generation,5G)网络架构。图2所示的5G网络架构中可包括终端设备、接入网(access network,AN)设备以及核心网(core network,CN)设备。终端设备通过接入网设备和核心网设备接入数据网络(data network,DN)。下面对该通信系统的各组成部分进行说明。
本申请中,终端设备也可称为标签、用户设备(user equipment,UE)、终端、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、无线通信设备、用户代理、用户装置、目标终端等。本申请中的终端设备可以为无源标签或半无源标签等被动(passive)终端设备。其中,无源标签包括但不限于RFID、蓝牙、紫蜂(Zigbee)等无电源终端标签。半无源标签也可称为传感标签。
终端设备可以广泛应用于各种场景,例如,物联网(internet of things,IOT)、设备到设备(device-to-device,D2D)、车物(vehicle to everything,V2X)通信、机器类通信(machine-type communication,MTC)、虚拟现实、增强现实、工业控制、自动驾驶、远程医疗、智能电网、智能家具、智能办公、智能穿戴、智能交通、智慧城市等。
其中,智能穿戴领域的终端设备可称为可穿戴设备或穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,也是通过软件支持以及数据交互、云端交互来实现强大的功能。广义的可穿戴设备具有功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能等特点,例如:智能手表或智能眼镜等。广义的可穿戴设备也可包括专注于某一类应用功能的设备,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
本申请中,用于实现被动终端设备的功能的装置可以是终端设备,也可以是能够支持终端设备实现该功能的装置,例如芯片系统,该装置可以被安装在终端设备中。本申请中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。本申请提供的技术方案中,以用于实现标签的功能的装置是终端设备为例,描述本申请实施例提供的技术方案。
接入网设备,是一种为终端设备提供无线通信功能的设备。接入网设备例如包括但不限于:5G中的下一代基站(g nodeB,gNB)、演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(baseBand unit,BBU)、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、移动交换中心等。
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和分布式单元
(distributed unit,DU)。gNB还可以包括有源天线单元(active antenna unit,AAU)。CU可实现gNB的一部分功能,DU可实现gNB的另一部分功能。比如,CU负责处理非实时协议和服务,实现无线资源控制(radio resource control,RRC)层和分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能。DU负责处理物理层协议和实时服务,实现无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理(physical,PHY)层的功能。AAU实现部分物理层处理功能、射频处理及有源天线的相关功能。RRC层的信息由CU生成,最终会经过DU的PHY层封装变成PHY层信息,或者,由PHY层的信息转变而来。因而,在这种架构下,高层信令如RRC层信令,也可以认为是由DU发送的,或者,由DU+AAU发送的。可以理解的是,接入网设备可以为包括CU节点、DU节点、AAU节点中的一项或多项。此外,可以将CU划分为接入网中的接入网设备,也可以将CU划分为CN中的接入网设备,本申请对此不做限定。
接入网设备和终端设备可以是固定位置的,也可以是可移动的。接入网设备和终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上;还可以部署在空中的飞机、气球和人造卫星上。本申请的实施例对接入网设备和终端设备的应用场景不做限定。
核心网设备包括以下网元中的部分或者全部:统一数据管理(unified data management,UDM)网元、统一数据库(unified data repository,UDR)网元、网络开放功能(network exposure function,NEF)网元(图中未示出)、应用功能(application function,AF)网元、策略控制功能(policy control function,PCF)网元、接入与移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、用户面功能(user plane function,UPF)网元、网络存储功能(network repository function,NRF)网元(图中未示出)。
本申请中,移动性管理网元是由运营商网络提供的控制面网元,负责终端设备接入运营商网络的接入控制和移动性管理,例如包括移动状态管理,分配用户临时身份标识,认证和授权用户等功能。在5G中,移动性管理网元可以是AMF网元,在未来通信如第六代(the 6th generation,6G)中,移动性管理网元仍可以是AMF网元,或有其它的名称,本申请不做限定。
本申请中,会话管理网元是由运营商网络提供的控制面网元,负责管理终端设备的协议数据单元(protocol data unit,PDU)会话。PDU会话是一个用于传输PDU的通道,终端设备需要通过PDU会话与DN互相传送PDU。PDU会话由SMF网元负责建立、维护和删除等。会话管理网元包括会话管理(如会话建立、修改和释放,包含用户面网元和接入网设备之间的隧道维护)、用户面网元的选择和控制、业务和会话连续性(Service and Session Continuity,SSC)模式选择、漫游等会话相关的功能。在5G中,会话管理网元可以是SMF网元,在未来通信如6G中,会话管理网元仍可以是SMF网元,或有其它的名称,本申请不做限定。
本申请中,用户面网元是由运营商提供的网关,是运营商网络与DN通信的网关。UPF网元包括数据包路由和传输、包检测、业务用量上报、服务质量(Quality of Service,QoS)处理、合法监听、上行包检测、下行数据包存储等用户面相关的功能。在5G中,用户面网元可以是UPF网元,在未来通信如6G中,用户面网元仍可以是UPF网元,或有其它的
名称,本申请不做限定。
本申请中,数据管理网元是由运营商提供的控制面网元,负责存储运营商网络中签约用户的用户永久标识符(subscriber permanent identifier,SUPI)、信任状(credential)、安全上下文(security context)、签约数据等信息。数据管理网元所存储的这些信息可用于终端设备接入运营商网络的认证和授权。其中,上述运营商网络的签约用户具体可为使用运营商网络提供的业务的用户,例如使用中国电信的手机芯卡的用户,或者使用中国移动的手机芯卡的用户等。上述签约用户的永久签约标识(Subscription Permanent Identifier,SUPI)可为该手机芯卡的号码等。上述签约用户的信任状、安全上下文可为该手机芯卡的加密密钥或者跟该手机芯卡加密相关的信息等存储的小文件,用于认证和/或授权。上述安全上下文可为存储在用户本地终端(例如手机)上的数据(cookie)或者令牌(token)等。上述签约用户的签约数据可为该手机芯卡的配套业务,例如该手机芯卡的流量套餐或者使用网络等。需要说明的是,永久标识符、信任状、安全上下文、认证数据(cookie)、以及令牌等同认证、授权相关的信息,在本申请文件中,为了描述方便起见不做区分、限制。如果不做特殊说明,本申请实施例将以用安全上下文为例进行来描述,但本申请实施例同样适用于其他表述方式的认证、和/或授权信息。在5G中,数据管理网元可以是UDM网元,在未来通信如6G中,数据管理网元仍可以是UDM网元,或有其它的名称,本申请不做限定。
本申请中,统一数据库网元是由运营商提供的控制面网元,包含执行签约数据、策略数据、应用数据等类型数据的存取功能。在5G中,统一数据库网元可以是UDR网元,在未来通信如6G中,统一数据库网元仍可以是UDR网元,或有其它的名称,本申请不做限定。
本申请中,网络开放网元是由运营商提供控制面网元。网络开放网元以安全的方式对第三方开放运营商网络的对外接口。在会话管理网元需要与第三方的网元通信时,网络开放网元可作为会话管理网元与第三方的网元通信的中继。网络开放网元作为中继时,可作为签约用户的标识信息的翻译,以及第三方的网元的标识信息的翻译。比如,网络开放网元将签约用户的SUPI从运营商网络发送到第三方时,可以将SUPI翻译成其对应的外部身份标识(identity,ID)。反之,网络开放网元将外部ID(第三方的网元ID)发送到运营商网络时,可将其翻译成SUPI。在5G中,网络开放网元可以是NEF网元,在未来通信如6G中,网络开放网元仍可以是NEF网元,或有其它的名称,本申请不做限定。
本申请中,应用功能网元用于传递应用侧对网络侧的需求,例如,QoS需求或用户状态事件订阅等。应用功能网元可以是第三方功能实体,也可以是运营商部署的应用服务器。在5G中,应用功能网元可以是AF网元,在未来通信如6G中,应用功能网元仍可以是AF网元,或有其它的名称,本申请不做限定。
本申请中,策略控制网元是由运营商提供的控制面功能,用于向会话管理网元提供PDU会话的策略。策略可以包括计费相关策略、QoS相关策略和授权相关策略等。在5G中,策略控制网元可以是PCF网元,在未来通信如6G中,策略控制网元仍可以是PCF网元,或有其它的名称,本申请不做限定。
本申请中,网络存储功能网元可用于提供网元发现功能,基于其他网元的请求,提供网元类型对应的网元信息。网络存储功能网元还提供网元管理服务,如网元注册、更新、去注册以及网元状态订阅和推送等。在5G中,网络存储功能网元可以是NRF网元,在未
来通信如6G中,网络存储功能网元仍可以是NRF网元,或有其它的名称,本申请不做限定。
DN,是位于运营商网络之外的网络,运营商网络可以接入多个DN,DN上可部署多种业务,可为终端设备提供数据和/或语音等服务。例如,DN是某智能工厂的私有网络,智能工厂安装在车间的传感器可为终端设备,DN中部署了传感器的控制服务器,控制服务器可为传感器提供服务。传感器可与控制服务器通信,获取控制服务器的指令,根据指令将采集的传感器数据传送给控制服务器等。又例如,DN是某公司的内部办公网络,该公司员工的手机或者电脑可为终端设备,员工的手机或者电脑可以访问公司内部办公网络上的信息、数据资源等。
图2中Npcf、Nudr、Nudm、Naf、Namf、Nsmf分别为上述PCF、UDR、UDM、AF、AMF、SMF提供的服务化接口,用于调用相应的服务化操作。N1接口为AMF与终端设备之间的接口,可以用于向终端设备传递NAS信令(如包括来自AMF的QoS规则)等。N2接口为AMF与RAN之间的接口,可以用于传递核心网侧至RAN的无线承载控制信息等。N3接口为RAN与UPF之间的接口,主要用于传递RAN与UPF间的上下行用户面数据。N4接口为SMF与UPF之间的接口,可以用于控制面与用户面之间传递信息,包括控制面向用户面的转发规则、QoS控制规则、流量统计规则等的下发以及用户面的信息上报。N6接口为UPF与DN的接口,用于传递UPF与DN之间的上下行用户数据流。
图3示出了本申请实施例适用的另一种通信系统架构示意图。如图3所示,该通信系统可以包括终端设备、AN设备、标签管理功能(TAG Management Function,TMF)网元、UDM/UDR、NEF和AF。其中,终端设备、AN设备、UDM/UDR、NEF和AF的具体内容可参考对图2的说明,重复之处不再赘述。
TMF可以支持标签管理功能,该功能支持对标签的管理的各个操作。
TMF可以与AF进行直接通信,或通过NEF网元与AF进行通信。TMF可以在从AF接收操作请求后,通过AN设备对标签进行操作。
UDM/UDR也可以与AF进行直接通信,或通过NEF网元与AF进行通信。UDM/UDR可以在从AF接收签约请求后,指示TMF通过AN设备对标签执行写入EPC的操作。
此外,TMF可以作为一个独立的网元,或者也可以与其他网元合设,例如,TMF可以与NEF合设,或者与UDM合设,本申请对此不作限定。另外,TMF仅是一种示例性命名。可以实现本申请中TMF对应的功能的设备均可以理解为本申请所述的TMF。
图3中的虚线框和虚线分别表示可选网元和可选连接。
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。作为一种可能的实现方法,上述网元或者功能可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。
需要说明的是,图2或图3所示的通信系统并不构成对本申请实施例能够适用的通信系统的限定。因此本申请实施例提供的通信方法还可以适用于各种制式的通信系统,例如:长期演进(long term evolution,LTE)通信系统、5G通信系统、6G通信系统以及未来通信系统、车到万物(vehicle to everything,V2X)、长期演进-车联网(LTE-vehicle,LTE-V)、车到车(vehicle to vehicle,V2V)、车联网、机器类通信(Machine Type Communications,
MTC)、IoT、长期演进-机器到机器(LTE-machine to machine,LTE-M)、机器到机器(machine to machine,M2M)、物联网等。另外,还需要说明的是,本申请实施例也不对通信系统中各网元的名称进行限定,例如,在不同制式的通信系统中,各网元可以有其它名称;又例如,当多个网元融合在同一物理设备中时,该物理设备也可以有其他名称。
目前,读卡器可集成在接入网设备中。接入网设备可根据核心网网元(例如,TMF)的指示,对终端设备进行操作。如图1所示,终端设备中可能存在多个存储区域。操作通常与存储区域有关。例如,写入EPC操作时,应在EPC存储区内写入EPC;又例如,在执行写入access功能所需的密码的操作时,应在保留存储区内写入access功能所需的密码。目前,核心网网元指示对终端设备进行操作时,并没有考虑终端设备中与该操作对应的存储区域,这就导致终端设备不知道应该在哪个区域进行操作,从而降低了对终端设备进行操作的效率。
下面结合附图对本申请提供的方案进行说明。
本申请实施例提供了一种通信方法,该方法可应用于图2或图3所示的通信系统中。下面参阅图4所示的流程图,以应用功能网元为AF为例,对该方法的流程进行具体说明。
S401:核心网网元获取目标终端设备的第一信息,第一信息可用于确定第二信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。
其中,核心网网元可为TMF。目标终端设备可为无源标签或半无源标签等被动终端设备,例如,对应上述图3中的终端设备。
可选的,第一信息可以包括以下至少一项:
1、目标终端设备的TID:可用于指示目标终端设备的硬件类型。目标终端设备的硬件类型可用于确定目标终端设备的类型。
2、目标终端设备的芯片类型信息:可用于指示目标终端设备的芯片类型。目标终端设备的芯片类型可用于确定目标终端设备的类型。例如,目标终端设备的芯片类型信息可为目标终端设备的芯片类型标识等。
3、目标终端设备的出厂标记信息:可用于指示目标终端设备的出厂信息。目标终端设备的出厂信息可用于确定目标终端设备的类型。例如,目标终端设备的出厂标记信息可包括以下至少一项:目标终端设备的生产厂家信息、目标终端设备的生产批次信息。
4、目标终端设备的存储区域信息:可用于指示目标终端设备的存储区域。
例如,当目标终端设备为图1所示的标签时,在目标终端设备的存储区域信息中,保留存储区的标识为0(对应于内存库中的库00),EPC存储区的标识为1(对应于内存库中的库01),TID存储区的标识为2(对应于内存库中的库10),用户存储区的标识为3(对应于内存库中的库11)。
另外,目标终端设备的存储区域信息还可包括以下至少之一:
1)、每个存储区域中开始存储数据的位置:例如,在EPC存储区中,从第11个比特开始存储数据,则目标终端设备的存储区域信息包括:EPC存储区域的指针值(例如,指针开始值)为11。
2)、每个存储区域的大小:例如,EPC存储区的大小为96比特,则目标终端设备的存储区域信息包括:EPC存储区域的大小为96比特。
3)、每个存储区的作用:例如,保留存储区用于存储密码和终端设备检测到的温度数据,则目标终端设备的存储区域信息包括:保留存储区用于存储密码和终端设备检测到的温度数据。
5、第二信息:参见下文对第二信息的说明。
可选的,在S401中,第二信息可包括目标终端设备中与第一操作对应的存储区域(下面称为第一存储区)的标识。当第二信息包括第一存储区的标识时,可表示对整个第一存储区执行第一操作。例如,当目标终端设备为图1所示的标签时,若第二信息包括标识3,则表示对整个用户存储区执行第一操作。
另外,第二信息还可包括以下至少一项:
1、指针值:用于指示在第一存储区中开始执行第一操作的位置。例如,第一存储区为用户存储区,第一操作为读操作,指针值为11,则表示从用户存储区的第11个比特开始读取数据。
2、长度:用于指示在第一存储区中执行第一操作的数据的长度。例如,第一存储区为用户存储区,第一操作为读操作,长度为20比特,则表示读取用户存储区中20比特的数据。
3、掩码或反掩码:用于指示在第一存储区内执行第一操作所使用的掩码或反掩码。
示例性的,第一操作可以但不限于包括以下之一:读操作、写操作、访问操作、灭活操作、锁定操作、块写操作、块擦操作和写入EPC操作中。
可选的,核心网网元可通过以下实现方式之一获取目标终端设备的第一信息。
实现方式一:核心网网元从目标终端设备获取第一信息。换句话说,目标终端设备向核心网网元发送第一信息;相应的,核心网网元接收来自目标终端设备的第一信息。
在实现方式一中,第一信息可以包括以下至少一项:目标终端设备的TID、目标终端设备的芯片类型信息、目标终端设备的出厂标记信息和目标终端设备的存储区域信息。
其中,第一信息可承载在现有的消息(例如,注册请求或读命令响应)中,也可以承载在新的消息中。
在实现方式一中,核心网网元可通过以下方式之一从目标终端设备获取第一信息。
方式一:
在方式一中,S401可包括步骤S401a1-S401a2:
S401a1:核心网网元通过AN设备向目标终端设备发送第一消息,该第一消息用于触发目标终端设备发起随机接入流程。
其中,第一消息可为现有的消息,也可以为新的消息。当第一消息为现有的消息时,第一消息可包括:核心网网元向AN设备发送的盘点命令,以及AN设备向目标终端设备发送的标签选择消息。例如,在确定要对目标终端设备执行读操作或写操作后或确定要对目标终端设备执行盘点操作后,核心网网元可向AN设备发送盘点命令;然后,AN设备可向目标终端设备发送标签选择消息。
可选的,第一消息中包含第一设定标识,第一设定标识可用于指示目标终端设备发送第一信息。
第一设定标识可为直接指示目标终端设备发送第一信息的标识。这样,终端设备在接
收到第一设定标识后,可向核心网网元发送第一信息。
第一设定标识也可为间接指示终端设备发送第一信息的标识。例如,第一设定标识用于指示盘点模式为逐个读取终端设备的EPC的方式。这样,终端设备在接收到第一设定标识后,可确定盘点模式为逐个读取终端设备的EPC的方式,并基于该盘点模式确定需要向核心网网元发送第一信息。
S401a2:目标终端设备向核心网网元发送注册请求,该注册请求包括第一信息。
其中,目标终端设备可根据第一消息发起随机接入流程,并在接入到AN设备后,通过AN设备向核心网网元发送该注册请求。
该随机接入流程可包括:目标终端设备接收来自AN设备的第一查询请求,第一查询请求中包括第一随机数。目标终端设备根据第一随机数设置第二随机数,若设置的第二随机数为0,则目标终端设备向接入网设备发送第三随机数。若AN设备能够正确接收到第三随机数,则AN设备向目标终端设备发送第三随机数。当目标终端设备接收到第三随机数时,目标终端设备确定随机接入成功。
可选的,当第一消息中包含第一设定标识时,目标终端设备向核心网网元发送包含第一信息的注册请求。
通过方式一,在要对目标终端设备进行第一操作时,核心网网元可接收来自目标终端设备的注册请求,该注册请求中包含第一信息。这样,核心网网元可尽早地从目标终端设备获取到第一信息。
方式二:
在方式二中,S401可包括步骤S401b1-S401b2:
S401b1:核心网网元向目标终端设备发送读命令,读命令用于读取目标终端设备中的第一信息。
可选的,在步骤S401b1之前,核心网网元可通过AN设备向目标终端设备发送第一消息,该第一消息用于触发目标终端设备发起随机接入流程。目标终端设备可根据第一消息发起随机接入流程,并接入到AN设备。其中,核心网网元通过AN设备向目标终端设备发送第一消息的具体内容可参考步骤S401a1,随机接入流程的具体内容也可参考步骤S401a1,此处不再赘述。
可选的,核心网网元可在确定目标终端设备为无源标签或半无源标签后,向目标终端设备发送读命令。其中,核心网网元可从第一网元或目标终端设备获取目标终端设备的标签类型指示信息,并根据标签类型指示信息确定目标终端设备为无源标签或半无源标签。其中,第一网元可为AF、UDM、UDR或服务器等。例如,核心网网元可接收来自AF的读请求,该读请求中包含目标终端设备的标签类型指示信息,该标签类型指示信息指示目标终端设备为无源标签或半无源标签。又例如,核心网网元可接收来自UDM的写入EPC请求,该写入EPC请求中包含目标终端设备的标签类型指示信息,该标签类型指示信息指示目标终端设备为无源标签或半无源标签。再例如,核心网网元可接收来自目标终端设备的注册请求,该注册请求中包括目标终端设备的标签类型指示信息,该标签类型指示信息指示目标终端设备为无源标签或半无源标签。
S401b2:目标终端设备向核心网网元发送读命令响应,读命令响应包括第一信息。
通过方式二,在要对目标终端设备进行第一操作时,核心网网元可通过读命令来触发目标终端设备向核心网网元发送读命令响应,该读命令响应包含第一信息。这样,核心网
网元可按需从目标终端设备获取第一信息。
实现方式二:核心网网元从AF获取第一信息。换句话说,AF向核心网网元发送第一信息;相应的,核心网网元接收来自AF的第一信息。
在实现方式二中,S401可包括步骤S401c:AF向核心网网元发送业务请求,该业务请求中包含第一信息。
其中,该业务请求可为操作请求,该操作请求还可用于请求对目标终端设备执行第一操作。例如,操作请求为读请求或写请求,用于请求对目标终端设备执行读操作或写操作。
可选的,在S401c后,核心网网元通过AN设备向目标终端设备发送第一消息,该第一消息用于触发目标终端设备发起随机接入流程。目标终端设备可根据第一消息发起随机接入流程,并接入到AN设备。其中,核心网网元通过AN设备向目标终端设备发送第一消息的具体内容可参考步骤S401a1,随机接入流程的具体内容也可参考步骤S401a1,此处不再赘述。
通过实现方式二,在要对目标终端设备进行第一操作时,AF可在业务请求中携带第一信息,这样,核心网网元可尽早获取到第一信息。
在获取第一信息后,核心网网元可根据第一信息获取第二信息。下面对此进行具体说明。
可选的,当第一信息包括目标终端设备的TID、目标终端设备的芯片类型信息和目标终端设备的出厂标记信息中的一项或多项时,核心网网元可通过以下实现方式之一获取第二信息:
实现方式1:核心网网元可根据第一信息确定第二信息。
其中,核心网网元可通过步骤A1-步骤A2确定第二信息:
A1:核心网网元获取第一信息和目标终端设备中与第一操作对应的存储区域的对应关系(下面称为第一对应关系)。
其中,第一对应关系可包括至少一种终端设备类型、终端设备的存储区域信息、以及至少一个操作之间的对应关系。其中,终端设备类型与终端设备的TID、终端设备的芯片类型信息和终端设备的出厂标记信息中的一项或多项对应。
不同类型终端设备的存储区域可能不同。例如,对于类型1的终端设备,保留存储区的标识为0(对应于内存库中的库00),大小为96比特,可用于存储密码和终端设备检测到的温度数据;EPC存储区的标识为1(对应于内存库中的库01),大小为96比特,可用于存储EPC;TID存储区的标识为2(对应于内存库中的库10),大小为96比特,可用于存储TID;用户存储区的标识为3(对应于内存库中的库11),大小为96比特,可用于存储终端设备检测到的湿度数据。对于类型2的终端设备,EPC存储区的标识为0(对应于内存库中的库00),大小为128比特,可用于存储EPC和检测到的温度数据;TID存储区的标识为1(对应于内存库中的库01),大小为128比特,可用于存储TID;保留存储区的标识为2(对应于内存库中的库10),大小为96比特,可用于存储密码;用户存储区的标识为3(对应于内存库中的库11),大小为128比特,可用于存储终端设备检测到的湿度数据。表1示出了第一对应关系的一种可能的实现方式。
表1
表1仅为第一对应关系的一个示例。第一对应关系也可以为其他表现形式。例如,第一对应关系中,终端设备的存储区域信息可包括以下至少一项:每个存储区域的标识、每个存储区域中开始存储数据的位置、每个存储区域的大小和每个存储区域的作用等。至少一个操作为每个存储区域支持的操作。其中,终端设备的存储区域信息的具体内容可参考上文对“目标终端设备的存储区域信息”的说明,只是将目标终端设备替换为终端设备,此处不再赘述。每个存储区域支持的操作可为显式指示的信息,也可为通过每个存储区域的作用隐式指示的信息。比如,EPC存储区用于存储EPC和检测到的温度数据,则EPC存储区支持的操作可包括:写入EPC操作、盘点操作、读取温度数据的读操作。
可选的,第一对应关系也包括以下至少一项与终端设备的存储区域信息和至少一个操作之间的对应关系:终端设备的TID、终端设备的芯片类型信息和目标终端设备的出厂标记信息。例如,表1中的类型可替换为终端设备的TID、终端设备的芯片类型信息和目标终端设备的出厂标记信息中的一项或多项。
在步骤A1中,核心网网元可通过如下方式之一获取第一对应关系:
方式1:核心网网元从第二网元获取第一对应关系。
其中,第二网元可为UDM、UDR、AF或服务器等。
示例性的,当第二网元为UDM时,核心网网元可向UDM发送第二查询请求,该第
二查询请求用于请求获取第一对应关系。然后,UDM可向核心网网元发送第二查询响应,该第二查询响应中包含第一对应关系。
可选的,在获取第一对应关系后,核心网网元可保存第一对应关系。
方式2:核心网网元获取本地存储的第一对应关系。
其中,第一对应关系可是预先存储在核心网网元中的,也可以是在对其他终端设备进行操作时,通过方式1从第二网元获取后存储在本地的。
另外,在实际使用时,核心网网元也可以先确定本地是否存储有第一对应关系。如果核心网网元本地存储有第一对应关系,则核心网网元可通过方式2获取第一对应关系;如果核心网网元本地未存储第一对应关系,则核心网网元可通过方式1获取第一对应关系。
A2:核心网网元根据第一对应关系和第一信息,确定第二信息。
例如,第一信息包含TID1,TID1对应的终端设备的类型为类型1,第一对应关系为表1所示的对应关系,第一操作为写入EPC操作,则核心网网元可确定在第二信息中,标识为1,用于指示类型1的终端设备中的EPC存储区。
还例如,第一信息包含TID2,TID2对应的终端设备的类型为类型2,第一对应关系为表1所示的对应关系,第一操作为读取温度数据的读操作,则核心网网元可确定在第二信息中,标识为0,用于指示类型2的终端设备中的EPC存储区。
又例如,第一信息包含TID1,TID1对应的终端设备的类型为类型1,第一操作为读取温度数据的读操作。第一对应关系包含表1所示的对应关系,终端设备的存储区域信息还包括每个存储区域中开始存储数据的位置。若终端设备的存储区域信息指示保留存储区中从第15个比特开始存储数据,则核心网网元可确定在第二信息中,标识为0,用于指示类型1的终端设备中的保留存储区;指针值为15,用于指示从第15个比特开始读取数据。
再例如,第一信息包含TID2,TID2对应的终端设备的类型为类型2,第一对应关系为表1所示的对应关系,第一操作为读取温度数据的读操作。若核心网网元确定当地的温度范围为0-40度,则可确定需要读取的温度数据的长度为6个比特。此时,核心网网元可确定在第二信息中,标识为0,用于指示类型2的终端设备中的EPC存储区;长度为6个比特。
再例如,第一信息包含TID1,TID1对应的终端设备的类型为类型1,第一操作为读取温度数据的读操作。第一对应关系包含表1所示的对应关系。终端设备的存储区域信息还包括每个存储区域中开始存储数据的位置。终端设备的存储区域信息指示保留存储区中从第15个比特开始存储数据。核心网网元确定当地的温度范围为0-40度,从而需要读取的温度数据的长度为6个比特。此时,核心网网元可确定在第二信息中,标识为0,用于指示类型1的终端设备中的保留存储区;掩码的长度为96比特,其中,掩码的前14个比特均为0,掩码的第15-20个比特均为1,掩码的第21个比特均为0,用于指示读取保留存储区中第15-20个比特的数据。或者,核心网网元可确定在第二信息中,标识为0,用于指示类型1的终端设备中的保留存储区;反掩码的长度为96比特,其中,反掩码的前14个比特均为1,反掩码的第15-20个比特均为0,反掩码的第21个比特均为1,用于指示读取保留存储区中第15-20个比特的数据。
通过实现方式1,核心网网元可根据第一信息和第一对应关系确定出第二信息,无需从其他设备获取第二信息,从而可简化获取第二信息的流程,提高获取第二信息的效率。
实现方式2:核心网网元从第三网元获取第三网元根据第一信息确定的第二信息。
其中,第三网元可为UDM、UDR、AF或服务器等。
在实现方式2中,核心网网元可通过步骤B1-B3获取第二信息:
B1:核心网网元向第三网元发送第一信息。
其中,第一信息可承载现有的消息(例如,查询响应),也可承载在新的消息中。例如,第三网元为UDM,核心网网元可向UDM发送第三查询请求,该第三查询请求中包含第一信息。该第三查询请求用于请求获取第二信息。
可选的,当第三网元为UDM、UDR、或服务器时,核心网网元还可向第三网元发送第一操作的指示信息。例如,核心网网元向UDM发送的第三查询请求中还包括第一操作的指示信息。
其中,第一操作的指示信息可为与第一操作具有对应关系的指示信息,例如,第一操作的标识。示例性的,读操作对应操作标识1,写操作对应操作标识2。
B2:第三网元根据第一信息确定第二信息。
其中,第三网元确定第二信息的具体过程可参考步骤A1-A2,只是将其中的核心网网元替换为第三网元,此处不再赘述。
B3:第三网元向核心网网元发送第二信息。相应的,核心网网元接收来自第三网元的第二信息。
其中,第二信息可承载现有的消息(例如,查询响应),也可承载在新的消息中。例如,第三网元为UDM,UDM可向核心网网元发送第三查询响应,该第三查询响应中包含第二信息。
可选的,在接收到第二信息后,核心网网元可保存第二信息与该目标终端设备的对应关系。例如,核心网网元保存目标终端设备的EPC、第一操作对应的存储区域以及指针值之间的对应关系。
可选的,当第一信息包括目标终端设备的存储区域信息时,核心网网元可根据目标终端设备的存储区域信息和第一操作的指示信息,确定第二信息。
例如,目标终端设备为步骤A1中的类型1或类型2的终端设备时,目标终端设备的存储区域信息和操作之间的对应关系可满足表1中所示的对应关系。核心网网元根据目标终端设备的存储区域信息和第一操作的指示信息,确定第二信息的方式,可参考对实现方式1的说明,此处不再赘述。
其中,核心网网元可根据来自AF的业务请求获取第一操作的指示信息。例如,核心网网元接收来自AF的读请求,该读请求包括读操作的指示信息,用于指示对目标终端设备执行读操作。还例如,核心网网元接收来自AF的读请求,该读请求本身即为读操作的指示信息。又例如,核心网网元接收来自AF的写请求,该写请求包括写操作的指示信息,用于指示对目标终端设备执行写操作。再例如,核心网网元接收来自AF的写请求,该写请求本身即为写操作的指示信息。
当核心网网元从目标终端设备获取第一信息时,本申请对核心网网元获取第一信息和第一操作的指示信息的顺序不作限定,只要在S402之前执行即可。当核心网网元从AF获取第一信息时,AF可将第一信息和第一操作的指示信息通过一条消息(例如,业务请求)发送给核心网网元,也可以将第一信息和第一操作的指示信息通过两条消息分别发送给核心网网元。
S402:核心网网元向目标终端设备发送第二信息和第一操作的指示信息。相应的,目标终端设备接收来自核心网网元的第二信息和第一操作的指示信息。
其中,核心网网元可以将第二信息和第一操作的指示信息通过一条消息发送至目标终端设备。或者,核心网网元可以将第二信息和第一操作的指示信息通过两条消息分别发送至目标终端设备。
示例性的,核心网网元可向目标终端设备发送操作消息,该操作消息中包含第二信息和第一操作的指示信息。例如,核心网网元向目标终端设备发送读操作消息,读操作消息包含第二信息和第一操作的指示信息。
另外,操作消息本身也可为第一操作的指示信息。此时,在S402中,核心网网元可向目标终端设备发送操作消息,该操作消息中包含第二信息。例如,核心网网元向目标终端设备发送写操作消息,写操作消息包含第二信息,写操作消息本身即为写操作的指示信息。
S403:目标终端设备向核心网网元发送目标终端设备根据第二信息执行第一操作的结果。相应的,核心网网元接收目标终端设备根据第二信息执行第一操作的结果。
例如,目标终端设备为类型1的终端设备,类型1的终端设备存储区域的具体内容可参考步骤A1。第一操作为写入EPC操作;在第二信息中,标识为1。目标终端设备可确定标识1对应的存储区域为EPC存储区,对应于内存库中的库01。目标终端设备可在内存库中的库01内写入EPC。目标终端设备在写入EPC后,可向核心网网元发送指示对目标终端设备完成写入EPC的操作的信息。
还例如,目标终端设备为类型1的终端设备。第一操作为读取温度数据的读操作。在第二信息中,标识为0,指针值为15。目标终端设备可确定标识0对应的存储区域为保留存储区,对应于内存库中的库00。目标终端设备可在内存库中的库00内从第15个比特开始读取温度数据。目标终端设备在读取温度数据后,可向核心网网元发送读取的温度数据。
又例如,目标终端设备为类型2的终端设备,类型2的终端设备存储区域的具体内容可参考步骤A1。在第二信息中,标识为0,指针为15,长度为6个比特。目标终端设备可确定标识0对应的存储区域为EPC存储区,对应于内存库中的库00。目标终端设备可在内存库中的库00内从第15个比特开始读取6个比特的温度数据。目标终端设备在读取温度数据后,可向核心网网元发送读取的温度数据。
再例如,目标终端设备为类型1的终端设备。第一操作为读取温度数据的读操作。在第二信息中,标识为0,掩码的长度为96比特,其中,掩码的前14个比特均为0,掩码的第15-20个比特均为1,掩码的第21个比特均为0。目标终端设备可确定标识0对应的存储区域为保留存储区,对应于内存库中的库00。目标终端设备可根据掩码确定读取内存库中的库00中的第15-20个比特,从而获取位于第15-20个比特的温度数据。目标终端设备在读取温度数据后,可向核心网网元发送读取的温度数据。
再例如,目标终端设备为类型1的终端设备。第一操作为读取温度数据的读操作。在第二信息中,标识为0,反掩码的长度为96比特,其中,反掩码的前14个比特均为1,反掩码的第15-20个比特均为0,反掩码的第21个比特均为1。目标终端设备可确定标识0对应的存储区域为保留存储区,对应于内存库中的库00。目标终端设备可根据第二信息中的反掩码确定读取内存库中的库00中的第15-20个比特,从而获取位于第15-20个比特的温度数据。目标终端设备在读取温度数据后,可向核心网网元发送读取的温度数据。
通过图4所示的方法,核心网网元可获取第一信息,并根据第一信息获取到用于指示目标终端设备中与第一操作对应的存储区域的第二信息。在指示对目标终端设备进行操作时,核心网网元向目标终端设备发送第二信息和第一操作的指示信息。这样,终端设备可确定该第一操作对应的存储区域,从而提高对终端设备进行操作的效率。
本申请实施例提供了另一种通信方法,该方法可应用于图2或图3所示的通信系统中。下面参阅图5所示的流程图,以应用功能网元为AF为例,对该方法的流程进行具体说明。
S501:AF向核心网网元发送第一请求。相应的,核心网网元接收来自AF的第一请求。
其中,核心网网元可为TMF。
其中,第一请求用于请求读取目标终端设备中的数据。例如,该第一请求包含目标终端设备的EPC,表示请求读取目标终端设备中的数据。又例如,该第一请求包含第一EPC区间,表示请求属于第一EPC区间的终端设备中的数据。该第一EPC区间包含目标终端设备的EPC。
另外,目标终端设备的存储区域为单一存储区域。第一请求可用于通过以下方式之一指示目标终端设备的存储区域为单一存储区域:
方式A:第一请求包含目标终端设备的标签类型指示信息,该标签类型指示信息指示该所述目标终端设备的存储区域为单一存储区域。例如,类型3的终端设备的存储区域为单一存储区域。若该标签类型指示信息指示的类型为类型3,则该标签类型指示信息指示该所述目标终端设备的存储区域为单一存储区域。
方式B:第一请求为专用于读取单一存储区域的终端设备中数据的请求。例如,第一请求的消息格式为设定格式时,第一请求为专用于读取单一存储区域的终端设备中数据的请求。这样,核心网网元通过解析第一请求的格式,即可确定第一请求为用于读取单一存储区域的终端设备中数据的请求。
示例性的,第一请求为读请求。
S502:核心网网元通过AN设备向目标终端设备发送第一消息。相应的,目标终端设备接收第一消息。
其中,第一消息可用于触发目标终端设备发起随机接入流程。
第一消息可为现有的消息,也可以为新的消息。当第一消息为现有的消息时,第一消息可包括:核心网网元向AN设备发送的盘点命令,以及AN设备向目标终端设备发送的标签选择消息。
另外,第一消息中还包括:第一指示。该第一指示可用于指示目标终端设备发送目标终端设备中的数据。例如,该第一指示可为目标终端设备的标签类型指示信息,该标签类型指示信息指示该目标终端设备的存储区域为单一存储区域,且该标签类型指示信息用于指示目标终端设备发送目标终端设备中的数据。又例如,该第一指示可为第二设定标识,该第二设定标识用于指示目标终端设备发送目标终端设备中的数据。
S503:目标终端设备根据第一指示向核心网网元发送注册请求。相应的,核心网网元接收来自目标终端设备的注册请求。
其中,该注册请求中包含目标终端设备中的数据。目标终端设备中的数据为目标终端设备的单一存储区域中存储的数据。
本申请中,当目标终端设备接收的第一消息中包含第一指示时,目标终端设备可向核
心网网元发送包含目标终端设备中的数据的注册请求。
可选的,在向核心网网元发送注册请求前,目标终端设备可根据第一消息发起随机接入流程,并接入到AN设备,具体内容可参考S401a2,此处不再赘述。
通过图5所示的方法,当目标终端设备的存储区域为单一存储区域时,核心网网元可向目标终端设备发送第一指示,目标终端设备在接收到第一指示后,即可向通过注册请求向核心网网元发送目标终端设备中的数据,从而无需核心网网元向目标终端设备发送读命令,进而可简化从具有单一存储区域的终端设备获取数据的流程,降低开销。
本申请实施例提供了又一种通信方法,该方法为图4所示方法的一种可能的示例。下面参阅图6所示的流程图,以核心网网元为TMF为例,对该方法的流程进行具体说明。
S601:AF向TMF发送操作请求,该操作请求用于请求对至少一个终端设备执行第一操作。
其中,至少一个终端设备中的终端设备可以无源标签或半无源标签等被动终端设备。
第一操作可为以下至少一项:读操作、写操作、访问操作、灭活操作、锁定操作、块写操作、块擦操作和写入EPC操作。例如,当第一操作为读操作时,操作请求可为读请求。又例如,当第一操作为写操作时,操作请求可为写请求。
操作请求中可以包括:目标区域的指示信息和目标对象的指示信息。
其中,目标区域是指需要对终端设备执行第一操作的区域。目标区域的指示信息可以为以下至少之一:地理位置信息、市政位置信息(例如,甲市)、3GPP的位置信息(例如,跟踪区(track area,TA)列表,小区(Cell)列表等)。例如,目标区域的指示信息为甲市,则表示AF请求对甲市内的终端设备执行第一操作。又例如,目标区域的指示信息为小区1和小区2,则表示AF请求对小区1和小区2中的终端设备执行第一操作。
目标对象的指示信息可以为至少一个终端设备的指示信息。终端设备的指示信息的具体形式可以有多种,下面列举几种可能的形式。以下列举的几种形式可以单独使用,也可以组合使用,本申请实施例不做限制。
形式一,终端设备的指示信息包括EPC的取值区间。例如,EPC的取值区间为1111000001-1111000098,则至少一个终端设备可以包括EPC位于1111000001-1111000098区间内的终端设备。
形式二,终端设备的指示信息包括EPC列表。例如,EPC列表包括1111000001、1111000002、1111000005和1111000006,则至少一个终端设备可以包括EPC为1111000001、1111000002、1111000005和1111000006的终端设备。
形式三,终端设备的指示信息包括EPC的前n位,n为正整数。例如,终端设备的EPC有10位,前4位为1111,则至少一个终端设备可包括EPC为111100000-11111999999的终端设备。
在一些可能的方式中,操作请求中还可包括第一操作的指示信息。第一操作的指示信息可为与第一操作具有对应关系的指示信息,例如,第一操作的标识。示例性的,读操作对应操作标识1,写操作对应操作标识2。若操作请求中包含操作标识1,则表示请求对至少一个终端设备执行读操作。
在另一些可能的方式中,操作请求本身也可以为第一操作的指示信息。例如,当操作请求为读请求时,第一操作为读操作。又例如,当操作请求为写请求时,第一操作为写操
作。
S602:TMF根据操作请求,确定AN设备以及上述至少一个终端设备。
其中,TMF可根据操作请求中的目标区域的指示信息确定AN设备。
若目标区域的指示信息包括3GPP的位置信息,则TMF可确定出3GPP的位置信息对应的目标区域中的一个或多个AN设备。例如,TMF可确定小区列表中的小区对应的一个或多个AN设备为目标区域中的一个或多个AN设备。
若目标区域的指示信息包括地理位置信息、市政位置信息等非3GPP的位置信息,则TMF可以将非3GPP的位置信息映射为3GPP的位置信息。例如,TMF将市政位置信息映射为TA列表或小区列表,从而确定出目标区域内的一个或多个AN设备。
TMF可根据操作请求中的目标对象的指示信息确定出至少一个终端设备。目标对象的指示信息和至少一个终端设备的对应关系可参考S601中对“至少一个终端设备的指示信息”的说明,此处不再赘述。
可选的,当TMF根据操作请求中的目标对象的指示信息确定至少一个终端设备包括多个终端设备时,即需要对多个终端设备执行第一操作时,TMF还可确定盘点模式为逐个读取终端设备的EPC的方式。
S603:TMF向AN设备发送盘点命令,盘点命令用于请求获取至少一个终端设备的EPC,即用于请求盘点至少一个终端设备。
其中,盘点命令中可包括:目标对象的指示信息和第一设定标识。
目标对象的指示信息的具体内容可参考S601,此处不再赘述。
第一设定标识可用于指示终端设备发送第一信息。第一信息可以包括以下至少一项:目标终端设备的TID、目标终端设备的芯片类型信息、目标终端设备的出厂标记信息和目标终端设备的存储区域信息。第一设定标识的具体内容可参考S401a1,第一信息中各信息的具体内容可参考S401,此处不再赘述。
可选的,当TMF确定盘点模式为逐个读取终端设备的EPC的方式时,盘点命令中包括第一设定标识。
S604:AN设备向一个或多个终端设备发送标签选择消息。
其中,标签选择消息可包括:目标对象的指示信息和第一设定标识。
可选的,AN设备可根据目标对象的指示信息,确定出至少一个终端设备中位于AN设备覆盖范围内的一个或多个终端设备,然后,AN设备向该一个或多个终端设备发送标签选择消息。
S605:目标终端设备通过随机接入流程接入到AN设备。
其中,目标终端设备为一个或多个终端设备中成功通过随机接入流程接入到AN设备的终端设备。随机接入流程的具体内容可参考S401a2,此处不再赘述。
S606:目标终端设备向AN设备发送注册请求1。
其中,注册请求1中可包括:第一信息和目标终端设备的EPC。
可选的,当标签选择消息中包含第一设定标识,且目标终端设备属于目标对象的指示信息所指示的至少一个终端设备时,目标终端设备可向AN设备发送注册请求1。例如,标签选择消息中包含第一设定标识。目标对象的指示信息包括终端设备EPC的前4位,该前4位为1111。若目标终端设备的EPC为1111220000,则目标终端设备可向AN设备发送注册请求1。
S607:AN设备向TMF发送注册请求2。
其中,注册请求2中可包括:第一信息和目标终端设备的EPC。
注册请求1和注册请求2可以相同,也可以不同。当注册请求1和注册请求2相同时,AN设备向TMF转发来自目标终端设备的注册请求。当注册请求1和注册请求2不同时,示例性的,AN设备可对来自目标终端设备的注册请求进行处理(例如,进行封装等)后,向TMF发送注册请求2。
S608:TMF根据第一信息,获取目标终端设备中与第一操作对应的存储区域的指示信息(即第二信息)。
其中,S608的具体内容可参考S401中对“TMF可根据第一信息获取第二信息”的说明,此处不再赘述。
S609:TMF向目标终端设备发送操作消息,该操作消息用于请求对目标终端设备执行第一操作。
其中,该操作消息中包含第二信息。第二信息的具体内容可参考S401,此处不再赘述。
在一些可能的方式中,该操作消息中还包括第一操作的指示信息。第一操作的指示信息的具体内容可参考S601,此处不再赘述。
在另一些可能的方式中,操作消息本身也可以为第一操作的指示信息。例如,当操作消息为读操作消息时,第一操作为读操作。又例如,当操作消息为写操作消息时,第一操作为写操作。
S610:目标终端设备向TMF发送操作结果1。
其中,操作结果1为目标终端设备根据第二信息执行第一操作的结果。S610的具体内容可参考S403,此处不再赘述。
S611:TMF向AN设备发送盘点请求,该盘点请求用于请求获取下一个终端设备的EPC,即用于请求盘点下一个终端设备。
其中,该盘点请求可包括用于指示以下至少一项的信息:对所述目标终端设备完成第一操作,查询下一个终端设备的EPC,或执行下一次随机接入流程。
S612:对下一个终端设备执行第一操作。
其中,对下一个终端设备执行第一操作的过程可以参考S604-S611,只是将其中的目标终端设备替换为下一个终端设备,此处不再赘述。
S613:当AN设备不再收到终端设备的反馈信息时,AN设备向TMF发送盘点结束消息,盘点结束消息用于指示结束对至少一个终端设备执行第一操作。
其中,终端设备的反馈信息可包括以下至少一项:终端设备反馈的操作结果1,终端设备的EPC,或终端设备反馈的第三随机数。
S614:TMF向AF发送操作结果2。
其中,操作结果2可包括:至少一个终端设备反馈的操作结果1以及至少一个终端设备的EPC。
在图6所示方法中,S611-S613为可选的步骤。例如,当至少一个终端设备为一个终端设备时,图6所示方法可不包括S611-S613。又例如,当TMF确定已接收到至少一个终端设备的操作结果1时,图6所示方法可不包括S611-S613。
通过图6所示方法,当对终端设备执行第一操作时,TMF可从终端设备获取用于确定第二信息的第一信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。在
指示对目标终端设备进行第一操作时,TMF可向目标终端设备发送第二信息。这样,终端设备可确定该第一操作对应的存储区域,从而提高对终端设备进行操作的效率。
本申请实施例提供了再一种通信方法,该方法为图4所示方法的另一种可能的示例。下面参阅图7所示的流程图,以核心网网元为TMF为例,对该方法的流程进行具体说明。
S701:AF向UDM发送签约请求,签约请求用于请求为至少一个终端设备写入EPC。
其中,至少一个终端设备中的终端设备可以无源标签或半无源标签等被动终端设备。另外,至少一个终端设备中的终端设备可为空白标签。空白标签可为未写入唯一指定EPC的标签,例如,该唯一指定EPC可以是AF指定的。
AF可直接向UDM发送签约请求,也可通过其他网元(例如,NEF)向UDM发送签约请求。
另外,签约请求中可以包括:目标区域的指示信息和EPC范围的指示信息。其中,目标区域的指示信息的具体内容可参考S601,此处不再赘述。
EPC范围的指示信息的具体形式可以有多种,下面列举几种可能的形式。以下列举的几种形式可以单独使用,也可以组合使用,本申请实施例不做限制。
形式1,EPC范围的指示信息包括EPC的取值区间。例如,EPC的取值区间为1111000001-1111000098。
形式2,EPC范围的指示信息包括EPC列表。例如,EPC列表包括1111000001、1111000002、1111000005和1111000006。
形式3,EPC范围的指示信息包括EPC的前n位,n为正整数。例如,终端设备的EPC有10位,前4位为1111,则EPC范围为111100000-11111999999。
另外,签约请求中还可包括第一类型指示信息。其中,该第一类型指示信息可指示至少一个终端设备为无源标签或半无源标签。
可选的,UDM在接收到签约请求后,可保存目标区域的指示信息、EPC范围的指示信息和第一类型指示信息中的一项或多项。
S702:UDM向AF发送签约响应1,其中,签约响应1用于指示为至少一个终端设备签约了EPC。
示例性的,公司A为至少一件产品贴上空白标签后,可通过公司A的AF向UDM发送签约请求,以请求为至少一个产品上的空白标签写入EPC。在公司A向UDM所属的运营商缴费之后,UDM可向AF发送签约响应1。
S703:UDM向TMF发送写入EPC请求,写入EPC请求用于请求为至少一个终端设备写入EPC。
其中,写入EPC请求中可包括:目标区域的指示信息和EPC范围的指示信息。
可选的,写入EPC请求中还包括第一类型指示信息。
S704:TMF根据写入EPC请求,确定AN设备。
其中,TMF可根据写入EPC请求中的目标区域的指示信息确定AN设备,具体内容可参考S602中“TMF根据目标区域的指示信息确定AN设备”的方式,此处不再赘述。
另外,TMF还可保存EPC范围的指示信息所指示的EPC范围。
S705:TMF向AN设备发送盘点命令,盘点命令用于请求获取至少一个终端设备的EPC。
其中,盘点命令中可包括第一空白标签指示信息。第一空白标签指示信息用于盘点EPC存储区包含默认EPC或EPC存储区为空白的标签。示例性的,第一空白标签指示信息包括:默认EPC和/或第一TID。当终端设备的EPC为默认EPC或终端设备的TID为第一TID时,终端设备可认为是空白标签。其中,默认EPC可以是TMF从其他网元(例如,UDM)获取的,第一TID可以是TMF从AF获取的,例如,第一TID可为S701中第一类型指示信息中的TID。
S706:AN设备向一个或多个终端设备发送标签选择消息。
其中,AN设备可根据默认EPC和/或第一TID,选择一个或多个终端设备。例如,AN设备可确定一个或多个终端设备包括EPC为默认EPC的终端设备。又例如,AN设备可确定一个或多个终端设备包括TID为第一TID的终端设备。
S707:目标终端设备通过随机接入流程接入到AN设备。
其中,目标终端设备为一个或多个终端设备中成功接入到AN设备的终端设备。
随机接入流程的具体内容可参考S401a2,此处不再赘述。
S708:目标终端设备向AN设备发送注册请求1。
其中,注册请求1中包含目标终端设备的默认EPC。
可选的,注册请求1中还包含目标终端设备的类型指示信息。目标终端设备的类型指示信息可参考S701中对该第一类型指示信息的说明,只是将至少一个终端设备替换为目标终端设备,此处不再赘述。
S709:AN设备向TMF发送注册请求2。
其中,注册请求2中包含目标终端设备的默认EPC。
可选的,注册请求2中还包含目标终端设备的类型指示信息。
S710:TMF确定目标终端设备为无源标签或半无源标签。
其中,TMF可根据S703中的第一类型指示信息或S709中的目标终端设备的类型指示信息,确定目标终端设备为无源标签或半无源标签。
另外,TMF还可根据注册请求2中的默认EPC确定目标终端设备为空白标签。
S711:TMF向目标终端设备发送读命令,读命令用于读取第一信息。
其中,第一信息可包括以下至少一项:目标终端设备的TID、目标终端设备的芯片类型信息、目标终端设备的出厂标记信息、目标终端设备的存储区域信息。第一信息的具体内容可参考S401,此处不再赘述。
S712:目标终端设备向TMF发送读命令响应,读命令响应中包含第一信息。
S713:TMF根据第一信息,获取目标终端设备中与写入EPC操作对应的存储区域的指示信息(即第二信息)。
其中,S713的具体内容可参考S401中对“TMF可根据第一信息获取第二信息”的说明,只是将其中的第一操作替换为写入EPC操作,第二信息的具体内容可参考S401中对“第二信息”的说明,此处不再赘述。
S714:TMF向目标终端设备发送写命令。
其中,该写命令中包含:为该目标终端设备分配的EPC(下面简称为第一EPC)和第二信息。其中,第一EPC属于EPC范围的指示信息所指示的范围。
S715:在写入第一EPC后,目标终端设备向TMF发送写命令响应,写命令响应用于指示已为目标终端设备写入第一EPC。
其中,目标终端设备可在第二信息指示的存储区域写入为第一EPC。第一EPC可覆盖默认EPC。
示例性的,目标终端设备为类型1的终端设备,类型1的终端设备存储区域的具体内容可参考步骤A1。在第二信息中,标识为1。目标终端设备可确定标识1对应的存储区域为EPC存储区,对应于内存库中的库01。目标终端设备可在内存库中的库01内写入EPC。目标终端设备在写入EPC后,可向TMF发送写命令响应,写命令响应中包括指示对目标终端设备完成写入EPC的操作的信息。
S716:TMF向AN设备发送盘点请求,该盘点请求用于请求获取下一个终端设备的EPC,即用于请求盘点下一个终端设备。
S716的具体内容可参考S611,此处不再赘述。
S717:对下一个终端设备执行写入EPC操作。
其中,对下一个终端设备执行写入EPC操作的过程可以参见S706-S716,只是将其中的目标终端设备替换为下一个终端设备,此处不再赘述。
S718:AN设备向TMF发送盘点结束消息,盘点结束消息用于指示结束对至少一个终端设备执行写入EPC操作。
在一些可能的方式中,在将EPC范围的指示信息所指示的EPC范围内的EPC都写入终端设备后,AN设备可执行S718。
在另一些可能的方式中,AN设备覆盖范围内可包括公司A签约的作为空白标签的多个终端设备。当AN设备不再收到终端设备的反馈信息时,AN设备可执行S718。其中,终端设备的反馈信息可包括以下至少一项:终端设备反馈的默认EPC,终端设备的标签信息,或终端设备反馈的第三随机数。
S719:TMF给UDM发送写入EPC响应,写入EPC响应用于指示为至少一个终端设备成功写入EPC。
S720:UDM向AF发送签约响应2。
其中,签约响应2中包含分配的EPC范围及写入成功的指示信息。
在图7所示方法中,S702、S716-S718为可选的步骤。例如,当至少一个终端设备为一个终端设备时,S716-S718为可选的步骤。再例如,当TMF确定已为至少一个终端设备写入EPC时,S716-S718为可选的步骤。
可选的,在图7所示方法中,UDM也可被替换为UDR。
通过图7所示方法,当为至少一个终端设备写入EPC时,TMF可从终端设备获取用于确定第二信息的第一信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。在指示对目标终端设备进行第一操作时,TMF可向目标终端设备发送第二信息。这样,终端设备可确定该第一操作对应的存储区域,从而提高对终端设备进行操作的效率。
本申请实施例提供了再一种通信方法,该方法为图4所示方法的又一种可能的示例。下面参阅图8所示的流程图,以核心网网元为TMF为例,对该方法的流程进行具体说明。
S801:AF向TMF发送操作请求,操作请求用于请求对至少一个终端设备执行第一操作。
其中,至少一个终端设备中的终端设备可以无源标签或半无源标签等被动终端设备。
操作请求和第一操作的具体内容可参考S601,重复之处不再赘述。
另外,操作请求中还包括:第一信息。
其中,第一信息可包括以下至少一项:至少一个终端设备的TID、至少一个终端设备的芯片类型信息、至少一个终端设备的出厂标记信息、至少一个终端设备的存储区域信息。第一信息中各信息的具体内容可参考S401,只是将目标终端设备替换为至少一个终端设备,此处不再赘述。
S802:TMF根据操作请求,确定AN设备以及上述至少一个终端设备,并获取至少一个终端设备中与第一操作对应的存储区域的指示信息(即第二信息)。
其中,TMF根据操作请求确定AN设备以及上述至少一个终端设备的具体内容可参考S602,此处不再赘述。
可选的,当TMF根据操作请求中的目标对象的指示信息确定至少一个终端设备包括多个终端设备时,即需要对多个终端设备执行第一操作时,TMF还可确定盘点模式为逐个读取终端设备的EPC的方式。
另外,TMF获取至少一个终端设备中与第一操作对应的存储区域的指示信息(即第二信息)的具体内容可参考S401中对“TMF可根据第一信息获取第二信息”的说明,只是将其中的目标终端设备替换为至少一个终端设备,此处不再赘述。
S803:TMF向AN设备发送盘点命令,盘点命令用于请求获取至少一个终端设备的EPC,即用于请求盘点至少一个终端设备。
其中,盘点命令中可包括:目标对象的指示信息。目标对象的指示信息的具体内容可参考S601,此处不再赘述。
可选的,TMF确定盘点模式为逐个读取终端设备的EPC的方式时,盘点命令还包括:第三设定标识。第三设定标识可用于指示盘点模式为逐个读取终端设备的EPC的方式。
S804:AN设备向一个或多个终端设备发送标签选择消息。
其中,标签选择消息可包括:目标对象的指示信息。
可选的,TMF确定盘点模式为逐个读取终端设备的EPC的方式时,标签选择消息还包括:第三设定标识。
AN设备发送标签选择消息的方式可参考S604,此处不再赘述。
S805:目标终端设备通过随机接入流程接入到AN设备。
S805的具体内容可参考S605,此处不再赘述。
S806:目标终端设备向AN设备发送注册请求1。
其中,注册请求1中包含目标终端设备的EPC。
S807:AN设备向TMF发送注册请求2。
其中,注册请求2中包含目标终端设备的EPC。
S808:TMF向目标终端设备发送操作消息,该操作消息用于请求对目标终端设备执行第一操作。
S809:目标终端设备向TMF发送操作结果1。
S810:TMF向AN设备发送盘点请求,该盘点请求用于请求获取下一个终端设备的EPC。
S811:对下一个终端设备执行第一操作。
其中,对下一个终端设备执行第一操作的过程可以参见S804-S810,只是将其中的目标终端设备替换为下一个终端设备,此处不再赘述。
S812:当AN设备不再收到终端设备的反馈信息时,AN设备向TMF发送盘点结束消息,盘点结束消息用于指示结束对至少一个终端设备执行第一操作。
S813:TMF向AF发送操作结果2。
S808-S813的具体内容可参考S609-S614,此处不再赘述。
在一些可能的方式中,TMF可不在S802中获取至少一个终端设备中与第一操作对应的存储区域的指示信息。在S808之前,TMF获取目标终端设备中与第一操作对应的存储区域的指示信息即可。
在一些可能的方式中,S801中的第一信息可包括第二信息。当至少一个终端设备包含属于同一生产批次的M个终端设备,且M个终端设备包括目标终端设备时,第二信息可适用于该M个终端设备;换句话说,第二信息用于指示M个终端设备中与第一操作对应的存储区域。其中,M为大于1的整数。第二信息也可为专用于指示目标终端设备中与第一操作对应的存储区域的信息。在S802中,TMF可保存第二信息。
通过图8所示方法,当对终端设备执行第一操作时,TMF可从AF获取用于确定第二信息的第一信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。在指示对目标终端设备进行第一操作时,TMF可向目标终端设备发送第二信息。这样,终端设备可确定该第一操作对应的存储区域,从而提高对终端设备进行操作的效率。
本申请实施例提供了再一种通信方法,该方法为图5所示方法的一种可能的示例。下面参阅图9所示的流程图,以核心网网元为TMF为例,对该方法的流程进行具体说明。
S901:AF向TMF发送读请求,读请求用于请求读取至少一个终端设备中的数据。
其中,至少一个终端设备中的终端设备可以为无源标签或半无源标签等被动终端设备。
另外,至少一个终端设备中的终端设备为具有单一存储区域的终端设备,换句话说,至少一个终端设备中的终端设备的存储区域仅有一个。
读请求中可以包括:目标区域的指示信息和目标对象的指示信息。其中,目标区域的指示信息和目标对象的指示信息的具体内容可参考S601,此处不再赘述。
读请求的具体内容可参考S501中对第一请求的说明,此处不再赘述。
S902:TMF根据读请求,确定AN设备以及上述至少一个终端设备。
其中,TMF可根据读请求中的目标区域的指示信息确定AN设备,根据读请求中的目标对象的指示信息确定出至少一个终端设备,具体内容可参考S602中TMF根据目标区域的指示信息确定AN设备以及TMF根据目标对象的指示信息确定至少一个终端设备的方式,此处不再赘述。
S903:TMF向AN设备发送盘点命令,盘点命令用于请求获取至少一个终端设备的EPC,即用于请求盘点至少一个终端设备。
其中,盘点命令中可包括:目标对象的指示信息和第一指示。目标对象的指示信息的具体内容可参考S601;第一指示可用于指示目标终端设备发送目标终端设备中的数据,具体内容可参考S502,此处不再赘述。
可选的,当TMF确定盘点模式为逐个读取终端设备的EPC的方式时,盘点命令中包括:第一指示。
S904:AN设备向一个或多个终端设备发送标签选择消息。
其中,标签选择消息可包括以下至少一项:目标对象的指示信息和第一指示。
AN设备发送标签选择消息的方式可参考S604,此处不再赘述。
S905:目标终端设备通过随机接入流程接入到AN设备。
S905的具体内容可参考S605,此处不再赘述。
S906:目标终端设备向AN设备发送注册请求1。
其中,当标签选择消息中包含第一指示时,注册请求1中包括:目标终端设备的EPC和目标终端设备中的数据。其中,目标终端设备中的数据为目标终端设备的存储区域中的数据,例如,目标终端设备测量并存储的温度信息。
S907:AN设备向TMF发送注册请求2。
其中,注册请求2中可包括以下至少一项:目标终端设备的EPC和目标终端设备中的数据。
S908:TMF向AN设备发送盘点请求,该盘点请求用于请求获取下一个终端设备的EPC,即用于请求盘点下一个终端设备。
S909:对下一个终端设备执行读操作。
其中,对下一个终端设备执行读操作的过程可以参见S904-S908,只是将其中的目标终端设备替换为下一个终端设备,此处不再赘述。
S910:当AN设备不再收到终端设备的反馈信息时,AN设备向TMF发送盘点结束消息,盘点结束消息用于指示结束对至少一个终端设备执行读操作。
其中,终端设备的反馈信息可包括以下至少之一:终端设备中的数据,终端设备的EPC,或终端设备反馈的第三随机数。
S911:TMF向AF发送读结果2。
其中,读结果可包括:至少一个终端设备中的数据以及至少一个终端设备的EPC。
其中,S908-S911为可选的步骤。例如,当至少一个终端设备为一个终端设备时,S908-S910为可选的步骤。又例如,当TMF确定已读取至少一个终端设备中的数据时,S908-S910为可选的步骤。再例如,在S907后,TMF向AF发送目标终端设备的EPC和目标终端设备中的数据。此时,S911为可选的步骤。
通过图9所示方法,当目标终端设备的存储区域为单一存储区域时,TMF可向目标终端设备发送第一指示,目标终端设备在接收到第一指示后,即可向通过注册请求向TMF发送目标终端设备中的数据,从而无需TMF向目标终端设备发送读命令,进而可简化从具有单一存储区域的终端设备获取数据的流程,降低开销。
本申请实施例提供了再一种通信方法,下面参阅图10所示的流程图,以核心网网元为TMF为例,对该方法的流程进行具体说明。
S1001:AF向TMF发送读请求,读请求用于请求读取至少一个终端设备中的数据。
S1002:TMF根据读请求,确定AN设备以及上述至少一个终端设备。
S1001-1002的具体内容可参考S901-S902。
S1003:TMF向AN设备发送盘点命令,盘点命令用于请求获取至少一个终端设备的EPC,即用于请求盘点至少一个终端设备。
其中,盘点命令中包括目标对象的指示信息。目标对象的指示信息的具体内容可参考S601,此处不再赘述。
S1004:AN设备向一个或多个终端设备发送标签选择消息。
其中,标签选择消息中可包括:目标对象的指示信息。
AN设备发送标签选择消息的方式可参考S604,此处不再赘述。
S1005:目标终端设备通过随机接入流程接入到AN设备。
S1005的具体内容可参考S605,此处不再赘述。
S1006:目标终端设备向AN设备发送注册请求1。
S1007:AN设备向TMF发送注册请求2。
其中,注册请求1和注册请求2中可包括:目标终端设备的EPC。
可选的,注册请求1和注册请求2中还包括:第四设定标识。其中,第四设定标识可为用于指示终端设备的存储区域为单一存储区域。第四设定标识例如为标签类型指示信息,该标签类型指示信息可指示该所述目标终端设备的存储区域为单一存储区域。标签类型指示信息的具体内容可参考S501,此处不再赘述。
S1008:TMF向目标终端设备发送读命令,读命令用于读取目标终端设备中的数据。
其中,读命令中不包含目标终端设备中与读操作对应的存储区域的指示信息。
在向目标终端设备发送读命令之前,TMF可根据读请求确定目标终端设备的存储区域为单一存储区域。其中,读请求可指示目标终端设备的存储区域为单一存储区域,具体方式可参考S501中的第一请求指示目标终端设备的存储区域为单一存储区域的方式,此处不再赘述。
可选的,读命令中包含用于指示目标终端设备的存储区域为单一存储区域的信息。
S1009:目标终端设备向TMF发送读结果1。
其中,读结果1包含目标终端设备中的数据。
S1010:TMF向AN设备发送盘点请求,该盘点请求用于请求获取下一个终端设备的EPC,即用于请求盘点下一个终端设备。
S1011:对下一个终端设备执行读操作。
其中,对下一个终端设备执行读操作的过程可以参见S1004-S1010,只是将其中的目标终端设备替换为下一个终端设备,此处不再赘述。
S1012:当AN设备不再收到终端设备的反馈信息时,AN设备向TMF发送盘点结束消息,盘点结束消息用于指示结束对至少一个终端设备执行读操作。
其中,S1010-S1012的具体内容可参考S909-S911,此处不再赘述。
S1013:TMF向AF发送读结果2。
其中,读结果2可包括:至少一个终端设备中的数据以及至少一个终端设备的EPC。
其中,S1010-S1013为可选的步骤。例如,当至少一个终端设备为一个终端设备时,S1010-S1012为可选的步骤。又例如,当TMF确定已读取至少一个终端设备中的数据时,S1010-S1012为可选的步骤。再例如,在S1009后,TMF向AF发送目标终端设备的EPC和目标终端设备中的数据。此时,S1013为可选的步骤。
通过图10所示方法,当目标终端设备的存储区域为单一存储区域时,AF可在读请求中通知TMF目标终端设备的存储区域为单一存储区域,然后,TMF可对目标终端设备执行读操作,获取目标终端设备中的数据。
基于与图4至图10方法实施例相同的技术构思,本申请实施例通过图11提供了一种通信装置,可用于执行上述方法实施例中相关步骤的功能。所述功能可以通过硬件实现,
也可以通过软件或者硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。该通信装置的结构如图11所示,包括通信单元1101和处理单元1102。所述通信装置1100可以应用于图3所示的通信系统中的TMF,或者,所述通信装置1100可以应用于图2或图3所示的通信系统中的终端设备,并可以实现以上本申请实施例以及实例提供的通信方法。下面对所述通信装置1100中的各个单元的功能进行介绍。
所述通信单元1101,用于接收和发送数据。
当所述通信装置1100应用于TMF时,所述通信单元1101可以通过物理接口、通信模块、通信接口、输入输出接口实现。所述通信装置1100可以通过该通信单元连接网线或电缆,进而与其他设备建立物理连接。
当所述通信装置1100应用于终端设备时,所述通信单元1101可以通过收发器实现,例如,移动通信模块。其中,移动通信模块可以包括至少一个天线、至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。
所述处理单元1102可用于支持所述通信装置1100执行上述方法实施例中的处理动作。所述处理单元1102可以是通过处理器实现。例如,所述处理器可以为中央处理单元(central processing unit,CPU),还可以是其它通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其它可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。通用处理器可以是微处理器,也可以是任何常规的处理器。
在一种实施方式中,所述通信装置1100应用于图4所示的本申请实施例中的核心网网元、或者应用于图6-图8任一项所示的本申请实施例中的TMF。下面对该实施方式中的所述处理单元1102的具体功能进行介绍。
所述处理单元1102,用于:获取目标终端设备的第一信息,所述第一信息用于确定第二信息,所述第二信息用于指示所述目标终端设备中与第一操作对应的存储区域;通过所述通信单元1101向所述目标终端设备发送所述第二信息和所述第一操作的指示信息;通过所述通信单元1101接收所述目标终端设备根据所述第二信息执行所述第一操作的结果。
可选的,所述第一信息包括以下至少一项:所述目标终端设备的标签标识TID、所述目标终端设备的芯片类型信息、所述目标终端设备的出厂标记信息、所述目标终端设备的存储区域信息、所述第二信息。
可选的,所述处理单元1102具体用于:通过所述通信单元1101通过接入网设备向所述目标终端设备发送第一消息,所述第一消息用于触发所述目标终端设备发起随机接入流程;通过所述通信单元1101接收来自所述目标终端设备的注册请求,所述注册请求包括所述第一信息。
可选的,所述处理单元1102具体用于:通过所述通信单元1101向所述目标终端设备发送读命令,所述读命令用于读取所述目标终端设备中的所述第一信息;通过所述通信单元1101接收来自所述目标终端设备的读命令响应,所述读命令响应包括所述第一信息。
可选的,所述处理单元1102具体用于:在向所述目标终端设备发送读命令之前,确定所述目标终端设备为无源标签或半无源标签。
可选的,所述处理单元1102具体用于:通过所述通信单元1101从第一网元或所述目标终端设备获取所述目标终端设备的标签类型指示信息,并根据所述标签类型指示信息确定所述目标终端设备为无源标签或半无源标签。
可选的,所述处理单元1102具体用于:通过所述通信单元1101接收来自应用功能网元的业务请求,所述业务请求包括所述第一信息。
可选的,当所述第一信息包括所述目标终端设备的TID、所述目标终端设备的芯片类型信息和所述目标终端设备的出厂标记信息中的一项或多项时,所述处理单元1102具体用于:在向所述目标终端设备发送第二信息和第一操作的指示信息之前,获取所述第一信息和所述目标终端设备中与所述第一操作对应的存储区域的对应关系;根据所述对应关系和所述第一信息,确定所述第二信息。
可选的,所述处理单元1102具体用于:获取本地存储的所述第一信息和所述目标终端设备中与所述第一操作对应的存储区域的对应关系;或者通过所述通信单元1101从第二网元获取所述第一信息和所述目标终端设备中与所述第一操作对应的存储区域的对应关系。
可选的,当所述第一信息包括所述目标终端设备的TID、所述目标终端设备的芯片类型信息和所述目标终端设备的出厂标记信息中的一项或多项时,在向所述目标终端设备发送第二信息和第一操作的指示信息之前,所述处理单元1102具体用于:通过所述通信单元1101向第三网元发送所述第一信息;通过所述通信单元1101接收所述第三网元根据所述第一信息确定的所述第二信息。
可选的,当所述第一信息包括所述目标终端设备的存储区域信息时,所述处理单元1102具体用于:在向所述目标终端设备发送第二信息和第一操作的指示信息之前,根据所述目标终端设备的存储区域信息和所述第一操作的指示信息,确定所述第二信息。
可选的,所述处理单元1102具体用于:通过所述通信单元1101向所述目标终端设备发送操作消息,所述操作消息用于指示对所述目标终端设备执行所述第一操作,所述操作消息包括所述第二信息和所述第一操作的指示信息。
可选的,所述第一操作为读操作、写操作、访问操作、灭活操作、锁定操作、块写操作、块擦操作和写入电子产品编码EPC操作中的一项或多项。
可选的,所述第二信息包括所述目标终端设备中与所述第一操作对应的存储区域的标识。
可选的,所述第二信息还包括以下至少一项:指针值,用于指示在所述存储区域中开始执行所述第一操作的位置;长度,用于指示在所述存储区域中执行所述第一操作的数据的长度;掩码或反掩码,用于指示在所述存储区域中执行所述第一操作所使用的掩码或反掩码。
在另一种实施方式中,所述通信装置1100应用于图4、图6-图8任一项所示的本申请实施例中的目标终端设备。下面对该实施方式中的所述处理单元1102的具体功能进行介绍。
所述处理单元1102用于:通过所述通信单元1101向核心网网元发送第一信息,所述第一信息用于确定第二信息,所述第二信息用于指示所述目标终端设备中与第一操作对应的存储区域;通过所述通信单元1101接收来自所述核心网网元的所述第二信息和所述第一操作的指示信息;通过所述通信单元1101向所述核心网网元发送所述目标终端设备根据所述第二信息执行所述第一操作的结果。
可选的,所述第一信息包括以下至少一项:所述目标终端设备的标签标识TID、所述目标终端设备的芯片类型信息、所述目标终端设备的出厂标记信息、所述目标终端设备的存储区域信息。
可选的,所述处理单元1102具体用于:在向核心网网元发送第一信息之前,通过所述
通信单元1101接收所述核心网网元通过接入网设备发送的第一消息,所述第一消息用于触发所述目标终端设备发起随机接入流程;通过所述通信单元1101向所述核心网网元发送注册请求,所述注册请求包括所述第一信息。
可选的,所述处理单元1102具体用于:在向核心网网元发送第一信息之前,通过所述通信单元1101接收来自所述核心网网元的读命令,所述读命令用于读取所述目标终端设备中的所述第一信息;通过所述通信单元1101向所述核心网网元发送读命令响应,所述读命令响应包括所述第一信息。
可选的,所述处理单元1102具体用于:在接收来自所述核心网网元的读命令之前,通过所述通信单元1101向所述核心网网元发送所述目标终端设备的标签类型指示信息,所述标签类型指示信息用于指示所述目标终端设备为无源标签或半无源标签。
可选的,所述处理单元1102具体用于:通过所述通信单元1101接收来自所述核心网网元的操作消息,所述操作消息用于指示对所述目标终端设备执行所述第一操作,所述操作消息包括所述第二信息和所述第一操作的指示信息。
可选的,所述第一操作为读操作、写操作、访问操作、灭活操作、锁定操作、块写操作、块擦操作和写入电子产品编码EPC操作中的一项或多项。
可选的,所述第二信息包括所述目标终端设备中与所述第一操作对应的存储区域的标识。
可选的,所述第二信息还包括以下至少一项:指针值,用于指示在所述存储区域中开始执行所述第一操作的位置;长度,用于指示在所述存储区域中执行所述第一操作的数据的长度;掩码或反掩码,用于指示在所述存储区域中执行所述第一操作所使用的掩码或反掩码。
在又一种实施方式中,所述通信装置1100应用于图5所示的本申请实施例中的核心网网元、或者应用于图9所示的本申请实施例中的TMF。下面对该实施方式中的所述处理单元1102的具体功能进行介绍。
所述处理单元1102,用于:通过所述通信单元1101接收来自应用功能网元的第一请求,第一请求用于请求读取目标终端设备中的数据,第一请求还用于指示目标终端设备的存储区域为单一存储区域;通过所述通信单元1101通过接入网设备向目标终端设备发送第一消息,第一消息用于触发目标终端设备发起随机接入流程,第一消息中还包括第一指示,第一指示用于指示目标终端设备发送目标终端设备中的数据;通过所述通信单元1101接收目标终端设备根据第一指示发送的注册请求,注册请求中包括目标终端设备中的数据。
在又一种实施方式中,所述通信装置1100应用于图5或图9所示的本申请实施例中的终端设备。下面对该实施方式中的所述处理单元1102的具体功能进行介绍。
所述处理单元1102,用于:通过所述通信单元1101接收核心网网元通过接入网设备发送的第一消息,第一消息用于触发目标终端设备发起随机接入流程,第一消息中还包括第一指示,第一指示用于指示目标终端设备发送目标终端设备中的数据;根据第一指示,通过所述通信单元1101向核心网网元发送注册请求,该注册请求中包括目标终端设备中的数据。
需要说明的是,本申请以上实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是单独物理存在,也可以两个或两个以上单元集成在一
个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
基于相同的技术构思,本申请实施例通过图12所示提供了一种通信装置,可用于执行上述方法实施例中相关的步骤。所述通信装置可以应用图3所示的通信系统中的TMF,或者,所述通信装置1100可以应用于图2或图3所示的通信系统中的终端设备,可以实现以上本申请实施例以及实例提供的通信方法,具有图11所示的通信装置的功能。参阅图12所示,所述通信装置1200包括:通信模块1201、处理器1202以及存储器1203。其中,所述通信模块1201、所述处理器1202以及所述存储器1203之间相互连接。
可选的,所述通信模块1201、所述处理器1202以及所述存储器1203之间通过总线1204相互连接。所述总线1204可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图12中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
所述通信模块1201,用于接收和发送数据,实现与其他设备之间的通信交互。例如,所述通信模块1201可以通过物理接口、通信模块、通信接口、输入输出接口实现。
所述处理器1202可用于支持所述通信装置1200执行上述方法实施例中的处理动作。当所述通信装置1200用于实现上述方法实施例时,处理器1202还可用于实现上述处理单元1102的功能。所述处理器1202可以是CPU,还可以是其它通用处理器、DSP、ASIC、FPGA或者其它可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。通用处理器可以是微处理器,也可以是任何常规的处理器。
在一种实施方式中,所述通信装置1200应用于图4所示的本申请实施例中的核心网网元、或者应用于图6-图8任一项所示的本申请实施例中的TMF。所述处理器1202具体用于:获取目标终端设备的第一信息,所述第一信息用于确定第二信息,所述第二信息用于指示所述目标终端设备中与第一操作对应的存储区域;通过所述通信模块1201向所述目标终端设备发送所述第二信息和所述第一操作的指示信息;通过所述通信模块1201接收所述目标终端设备根据所述第二信息执行所述第一操作的结果。
在另一种实施方式中,所述通信装置1200应用于图4、图6-图8任一项所示的本申请实施例中的目标终端设备。所述处理器1202具体用于:通过所述通信模块1201向核心网网元发送第一信息,所述第一信息用于确定第二信息,所述第二信息用于指示所述目标终端设备中与第一操作对应的存储区域;通过所述通信模块1201接收来自所述核心网网元的所述第二信息和所述第一操作的指示信息;通过所述通信模块1201向所述核心网网元发送所述目标终端设备根据所述第二信息执行所述第一操作的结果。
在又一种实施方式中,所述通信装置1200应用于图5所示的本申请实施例中的核心网网元、或者应用于图9所示的本申请实施例中的TMF。所述处理器1202具体用于:通过所述通信模块1201接收来自应用功能网元的第一请求,第一请求用于请求读取目标终端设备中的数据,第一请求还用于指示目标终端设备的存储区域为单一存储区域;通过所述通信模块1201通过接入网设备向目标终端设备发送第一消息,第一消息用于触发目标终端设备发起随机接入流程,第一消息中还包括第一指示,第一指示用于指示目标终端设备发送目标终端设备中的数据;通过所述通信模块1201接收目标终端设备根据第一指示发送的注册请求,注册请求中包括目标终端设备中的数据。
在又一种实施方式中,所述通信装置1200应用于图5或图9所示的本申请实施例中的终端设备。所述处理器1202具体用于:通过所述通信模块1201接收核心网网元通过接入网设备发送的第一消息,第一消息用于触发目标终端设备发起随机接入流程,第一消息中还包括第一指示,第一指示用于指示目标终端设备发送目标终端设备中的数据;根据第一指示,通过所述通信模块1201向核心网网元发送注册请求,该注册请求中包括目标终端设备中的数据。
所述处理器1202的具体功能可以参考以上本申请实施例以及实例提供的通信方法中的描述,以及图11所示本申请实施例中对所述通信装置1100的具体功能描述,此处不再赘述。
所述存储器1203,用于存放程序指令和数据等。具体地,程序指令可以包括程序代码,该程序代码包括计算机操作指令。存储器1203可能包含RAM,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。处理器1202执行存储器1203所存放的程序指令,并使用所述存储器1203中存储的数据,实现上述功能,从而实现上述本申请实施例提供的通信方法。
可以理解,本申请图12中的存储器1203可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是ROM、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是RAM,其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
基于以上实施例,本申请实施例还提供了一种计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行以上实施例提供的方法。
基于以上实施例,本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,所述计算机程序被计算机执行时,使得计算机执行以上实施例提供的方法。
其中,存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括RAM、ROM、EEPROM、CD-ROM或其他光盘存储、磁盘存储介质或
者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。
基于以上实施例,本申请实施例还提供了一种芯片,所述芯片用于读取存储器中存储的计算机程序,实现以上实施例提供的方法。
基于以上实施例,本申请实施例提供了一种芯片系统,该芯片系统包括处理器,用于支持计算机装置实现以上实施例中各设备所涉及的功能。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器用于保存该计算机装置必要的程序和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
综上所述,本申请实施例提供了一种通信方法及装置,在该方法中,核心网网元可获取目标终端设备的第一信息,该第一信息可用于确定第二信息,第二信息用于指示目标终端设备中与第一操作对应的存储区域。然后,核心网网元可向目标终端设备发送第二信息和第一操作的指示信息,并接收目标终端设备根据第二信息执行第一操作的结果。通过该方法,在指示对目标终端设备进行操作时,核心网网元向目标终端设备发送用于指示目标终端设备中与第一操作对应的存储区域的第二信息。这样,终端设备可确定该第一操作对应的存储区域,从而提高对终端设备进行操作的效率。
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。
Claims (28)
- 一种通信方法,其特征在于,包括:核心网网元获取目标终端设备的第一信息,所述第一信息用于确定第二信息,所述第二信息用于指示所述目标终端设备中与第一操作对应的存储区域;所述核心网网元向所述目标终端设备发送所述第二信息和所述第一操作的指示信息;所述核心网网元接收所述目标终端设备根据所述第二信息执行所述第一操作的结果。
- 如权利要求1所述的方法,其特征在于,所述第一信息包括以下至少一项:所述目标终端设备的标签标识TID、所述目标终端设备的芯片类型信息、所述目标终端设备的出厂标记信息、所述目标终端设备的存储区域信息、所述第二信息。
- 如权利要求1或2所述的方法,其特征在于,核心网网元获取目标终端设备的第一信息,包括:所述核心网网元通过接入网设备向所述目标终端设备发送第一消息,所述第一消息用于触发所述目标终端设备发起随机接入流程;所述核心网网元接收来自所述目标终端设备的注册请求,所述注册请求包括所述第一信息。
- 如权利要求1或2所述的方法,其特征在于,核心网网元获取目标终端设备的第一信息,包括:所述核心网网元向所述目标终端设备发送读命令,所述读命令用于读取所述目标终端设备中的所述第一信息;所述核心网网元接收来自所述目标终端设备的读命令响应,所述读命令响应包括所述第一信息。
- 如权利要求4所述的方法,其特征在于,所述核心网网元向所述目标终端设备发送读命令之前,还包括:所述核心网网元确定所述目标终端设备为无源标签或半无源标签。
- 如权利要求5所述的方法,其特征在于,所述核心网网元确定所述目标终端设备为无源标签或半无源标签,包括:所述核心网网元从第一网元或所述目标终端设备获取所述目标终端设备的标签类型指示信息,并根据所述标签类型指示信息确定所述目标终端设备为无源标签或半无源标签。
- 如权利要求1或2所述的方法,其特征在于,核心网网元获取目标终端设备的第一信息,包括:所述核心网网元接收来自应用功能网元的业务请求,所述业务请求包括所述第一信息。
- 如权利要求1-7任一项所述的方法,其特征在于,当所述第一信息包括所述目标终端设备的TID、所述目标终端设备的芯片类型信息和所述目标终端设备的出厂标记信息中的一项或多项时,在所述核心网网元向所述目标终端设备发送第二信息和第一操作的指示信息之前,还包括:所述核心网网元获取所述第一信息和所述目标终端设备中与所述第一操作对应的存储区域的对应关系;所述核心网网元根据所述对应关系和所述第一信息,确定所述第二信息。
- 如权利要求8所述的方法,其特征在于,所述核心网网元获取所述第一信息和所述 目标终端设备中与所述第一操作对应的存储区域的对应关系,包括:所述核心网网元获取本地存储的所述第一信息和所述目标终端设备中与所述第一操作对应的存储区域的对应关系;或者所述核心网网元从第二网元获取所述第一信息和所述目标终端设备中与所述第一操作对应的存储区域的对应关系。
- 如权利要求1-7任一项所述的方法,其特征在于,当所述第一信息包括所述目标终端设备的TID、所述目标终端设备的芯片类型信息和所述目标终端设备的出厂标记信息中的一项或多项时,在所述核心网网元向所述目标终端设备发送第二信息和第一操作的指示信息之前,还包括:所述核心网网元向第三网元发送所述第一信息;所述核心网网元接收所述第三网元根据所述第一信息确定的所述第二信息。
- 如权利要求1-7任一项所述的方法,其特征在于,当所述第一信息包括所述目标终端设备的存储区域信息时,在所述核心网网元向所述目标终端设备发送第二信息和第一操作的指示信息之前,还包括:所述核心网网元根据所述目标终端设备的存储区域信息和所述第一操作的指示信息,确定所述第二信息。
- 如权利要求1-11任一项所述的方法,其特征在于,所述核心网网元向所述目标终端设备发送所述第二信息和所述第一操作的指示信息,包括:所述核心网网元向所述目标终端设备发送操作消息,所述操作消息用于指示对所述目标终端设备执行所述第一操作,所述操作消息包括所述第二信息和所述第一操作的指示信息。
- 如权利要求1-12任一项所述的方法,其特征在于,所述第一操作为读操作、写操作、访问操作、灭活操作、锁定操作、块写操作、块擦操作和写入电子产品编码EPC操作中的一项或多项。
- 如权利要求1-13任一项所述的方法,其特征在于,所述第二信息包括所述目标终端设备中与所述第一操作对应的存储区域的标识。
- 如权利要求14所述的方法,其特征在于,所述第二信息还包括以下至少一项:指针值,用于指示在所述存储区域中开始执行所述第一操作的位置;长度,用于指示在所述存储区域中执行所述第一操作的数据的长度;掩码或反掩码,用于指示在所述存储区域中执行所述第一操作所使用的掩码或反掩码。
- 一种通信方法,其特征在于,包括:目标终端设备向核心网网元发送第一信息;所述第一信息用于确定第二信息,所述第二信息用于指示所述目标终端设备中与第一操作对应的存储区域;所述目标终端设备接收来自所述核心网网元的所述第二信息和所述第一操作的指示信息;所述目标终端设备向所述核心网网元发送所述目标终端设备根据所述第二信息执行所述第一操作的结果。
- 如权利要求16所述的方法,其特征在于,所述第一信息包括以下至少一项:所述目标终端设备的标签标识TID、所述目标终端设备的芯片类型信息、所述目标终端设备的出厂标记信息、所述目标终端设备的存储区域信息。
- 如权利要求16或17所述的方法,其特征在于,目标终端设备向核心网网元发送第一信息之前,还包括:目标终端设备接收所述核心网网元通过接入网设备发送的第一消息,所述第一消息用于触发所述目标终端设备发起随机接入流程;目标终端设备向核心网网元发送第一信息,包括:目标终端设备向所述核心网网元发送注册请求,所述注册请求包括所述第一信息。
- 如权利要求16或17所述的方法,其特征在于,目标终端设备向核心网网元发送第一信息之前,还包括:目标终端设备接收来自所述核心网网元的读命令,所述读命令用于读取所述目标终端设备中的所述第一信息;目标终端设备向核心网网元发送第一信息,包括:目标终端设备向所述核心网网元发送读命令响应,所述读命令响应包括所述第一信息。
- 如权利要求19所述的方法,其特征在于,在接收来自所述核心网网元的读命令之前,所述方法还包括:所述目标终端设备向所述核心网网元发送所述目标终端设备的标签类型指示信息,所述标签类型指示信息用于指示所述目标终端设备为无源标签或半无源标签。
- 如权利要求16-20任一项所述的方法,其特征在于,所述目标终端设备接收来自所述核心网网元的所述第二信息和所述第一操作的指示信息,包括:所述目标终端设备接收来自所述核心网网元的操作消息,所述操作消息用于指示对所述目标终端设备执行所述第一操作,所述操作消息包括所述第二信息和所述第一操作的指示信息。
- 如权利要求16-21任一项所述的方法,其特征在于,所述第一操作为读操作、写操作、访问操作、灭活操作、锁定操作、块写操作、块擦操作和写入电子产品编码EPC操作中的一项或多项。
- 如权利要求16-22任一项所述的方法,其特征在于,所述第二信息包括所述目标终端设备中与所述第一操作对应的存储区域的标识。
- 如权利要求23所述的方法,其特征在于,所述第二信息还包括以下至少一项:指针值,用于指示在所述存储区域中开始执行所述第一操作的位置;长度,用于指示在所述存储区域中执行所述第一操作的数据的长度;掩码或反掩码,用于指示在所述存储区域中执行所述第一操作所使用的掩码或反掩码。
- 一种通信装置,其特征在于,包括:通信单元,用于接收和发送数据;处理单元,用于通过所述通信单元,执行如权利要求1至24任一项所述的方法。
- 一种通信系统,其特征在于,包括:核心网网元,用于实现如权利要求1-15任一项所述的方法;终端设备,用于实现如权利要求16-24任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至24任一项所述的方法。
- 一种芯片,其特征在于,所述芯片与存储器耦合,所述芯片读取所述存储器中存储的计算机程序,执行如权利要求1至24任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211231830.6A CN117835394A (zh) | 2022-09-30 | 2022-09-30 | 一种通信方法及装置 |
CN202211231830.6 | 2022-09-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024066436A1 true WO2024066436A1 (zh) | 2024-04-04 |
Family
ID=90475861
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/097768 WO2024066436A1 (zh) | 2022-09-30 | 2023-06-01 | 一种通信方法及装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN117835394A (zh) |
WO (1) | WO2024066436A1 (zh) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136933A (zh) * | 2010-09-30 | 2011-07-27 | 华为技术有限公司 | 设备管理方法、中间件及机器通信平台、设备和系统 |
CN105991595A (zh) * | 2015-02-15 | 2016-10-05 | 华为技术有限公司 | 网络安全防护方法及装置 |
JP2017100846A (ja) * | 2015-12-01 | 2017-06-08 | トヨタ自動車株式会社 | 部品管理システム |
CN114727275A (zh) * | 2022-03-24 | 2022-07-08 | 西安广和通无线通信有限公司 | 一种处理主动式命令的方法及相关装置 |
CN114980352A (zh) * | 2021-02-27 | 2022-08-30 | 上海华为技术有限公司 | 一种数据传输方法及其设备 |
CN115884176A (zh) * | 2021-09-26 | 2023-03-31 | 华为技术有限公司 | 一种通信方法及装置 |
-
2022
- 2022-09-30 CN CN202211231830.6A patent/CN117835394A/zh active Pending
-
2023
- 2023-06-01 WO PCT/CN2023/097768 patent/WO2024066436A1/zh unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136933A (zh) * | 2010-09-30 | 2011-07-27 | 华为技术有限公司 | 设备管理方法、中间件及机器通信平台、设备和系统 |
CN105991595A (zh) * | 2015-02-15 | 2016-10-05 | 华为技术有限公司 | 网络安全防护方法及装置 |
JP2017100846A (ja) * | 2015-12-01 | 2017-06-08 | トヨタ自動車株式会社 | 部品管理システム |
CN114980352A (zh) * | 2021-02-27 | 2022-08-30 | 上海华为技术有限公司 | 一种数据传输方法及其设备 |
CN115884176A (zh) * | 2021-09-26 | 2023-03-31 | 华为技术有限公司 | 一种通信方法及装置 |
CN114727275A (zh) * | 2022-03-24 | 2022-07-08 | 西安广和通无线通信有限公司 | 一种处理主动式命令的方法及相关装置 |
Also Published As
Publication number | Publication date |
---|---|
CN117835394A (zh) | 2024-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020073855A1 (zh) | 建立会话的方法和装置以及发送报文的方法和装置 | |
EP4322657A1 (en) | Information transmission method, system, and apparatus | |
JP7383834B2 (ja) | 機器インタラクション方法及びコアネットワーク機器 | |
CN110049485A (zh) | 一种配置ue的策略的方法、装置和系统 | |
WO2020147030A1 (zh) | 一种小区注册方法及终端设备 | |
CN103891176A (zh) | 用于m2m组的基于寻呼的代表指示的方法 | |
WO2021068830A1 (zh) | 用于多播传输的方法和装置 | |
WO2023116786A1 (zh) | 物联网设备的注册方法、装置、通信设备、核心网设备、存储介质及系统 | |
CN113573297B (zh) | 一种通信方法及装置 | |
WO2022252076A1 (zh) | 一种报文传输方法以及相关装置 | |
WO2021109868A1 (zh) | 一种通信方法与通信装置 | |
CN113746586B (zh) | 时钟源管理的方法和装置 | |
CN111557104B (zh) | 用于在plmn改变之后保护nas消息的装置和方法 | |
US20220377547A1 (en) | Wireless communication method, terminal device and network element | |
WO2024066436A1 (zh) | 一种通信方法及装置 | |
JP7428265B2 (ja) | 通信端末及びその方法 | |
CN113613248B (zh) | 认证事件处理方法及装置、系统 | |
EP4066518B1 (en) | Method and apparatus for group management for group event monitoring | |
WO2024217183A1 (zh) | 一种通信方法及装置 | |
WO2024179300A1 (zh) | 一种通信方法及装置 | |
WO2023246431A1 (zh) | 一种通信方法和装置 | |
WO2024067047A1 (zh) | 一种通信方法及装置 | |
WO2024001241A1 (zh) | 一种信息写入方法及装置 | |
WO2024217251A1 (zh) | 通信方法和通信装置 | |
WO2024179441A1 (zh) | 一种设备管理网元确定方法及通信装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23869689 Country of ref document: EP Kind code of ref document: A1 |