WO2024082880A1 - Procédé et appareil de communication - Google Patents

Procédé et appareil de communication Download PDF

Info

Publication number
WO2024082880A1
WO2024082880A1 PCT/CN2023/118582 CN2023118582W WO2024082880A1 WO 2024082880 A1 WO2024082880 A1 WO 2024082880A1 CN 2023118582 W CN2023118582 W CN 2023118582W WO 2024082880 A1 WO2024082880 A1 WO 2024082880A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
information
terminal device
emergency
service
Prior art date
Application number
PCT/CN2023/118582
Other languages
English (en)
Chinese (zh)
Inventor
窦凤辉
扎里米歇尔
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202211351677.0A external-priority patent/CN117956438A/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024082880A1 publication Critical patent/WO2024082880A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]

Definitions

  • the present application relates to the field of communication technology, and in particular to a communication method and device.
  • emergency calls are one of the most important services, which refers to calls to specific numbers initiated by terminal devices in emergency situations. Whether an emergency call can be successfully initiated is related to major security issues.
  • Emergency calls can be made directly on the 4th generation (4G) mobile communication system/5th generation (5G) mobile communication system through the Internet protocol (IP) multimedia subsystem (IMS), or they can be made from the 4G/5G network back to the 2nd generation (2G) mobile communication system/3rd generation (3G) mobile communication system network.
  • IP Internet protocol
  • IMS Internet protocol multimedia subsystem
  • a terminal device For a terminal device to make an emergency call through the IMS network, it needs to go through two processes: one is to establish an emergency bearer in the core network, and the other is to establish an emergency session with the IMS. In both processes, the network may not support the request of the terminal device, so the terminal device cannot make an emergency call. It can be seen that the success rate of emergency calls made by terminal devices is currently low.
  • the embodiments of the present application provide a communication method and apparatus for improving the success rate of executing emergency services by terminal devices.
  • a first communication method is provided, which can be executed by a terminal device, or by other devices including terminal device functions, or by a chip system (or, chip) or other functional modules, which can realize the functions of the terminal device, and the chip system or functional module is, for example, arranged in the terminal device.
  • the terminal device is, for example, a first terminal device.
  • the method includes: receiving a first message from a second terminal device, the first message being used to indicate the provision of a relay service for an emergency service; determining whether to select the second terminal device and/or the first network to provide the relay service for the emergency service based on the first information, wherein the first information includes information on whether the first network requires IMS registration, and/or includes network behavior information on the first network establishing an emergency bearer.
  • the first terminal device can determine whether to select the second terminal device and/or the first network to provide the relay service of the emergency service according to the first information. For example, if the first terminal device does not have an IMS certificate, then if the first network does not require the execution of IMS registration, the first terminal device can select the second terminal device and/or the first network to provide the relay service of the emergency service, and if the first network requires the execution of IMS registration, the first terminal device can not select the second terminal device and/or the first network to provide the relay service of the emergency service; for another example, if it is determined that the first network can support the first terminal device to establish an emergency bearer according to the network behavior information of the first network to establish an emergency bearer, the first terminal device can select the second terminal device and/or the first network to provide the relay service of the emergency service, and if it is determined that the first network does not support the first terminal device to establish an emergency bearer according to the network behavior information of the first network to establish an emergency bearer, the first terminal device can
  • the first terminal device can select a suitable terminal device and/or network to provide the relay service of the emergency service, which improves the success rate of the first terminal device to execute the emergency service, thereby reducing the security risk.
  • the first UE can determine whether to select the network to provide relay services for emergency services.
  • the first UE can determine whether to select some or all of the multiple networks to provide relay services for emergency services.
  • the first UE can separately determine whether each of the multiple networks can be selected to provide relay services for emergency services, or it can be described as the first UE determining which one or more of the multiple networks can be selected to provide relay services for emergency services.
  • the first UE can ultimately determine that some or all of the multiple networks can be selected to provide relay services for emergency services, or it can also determine that all of the multiple networks cannot be selected to provide relay services for emergency services.
  • the first UE can make separate judgments for each of the multiple networks, that is, it can Determine whether to select the network to provide the relay service for the emergency service respectively, instead of judging the first network as a whole.
  • the selection result of the first UE may also be an independent selection of each network in the multiple networks, for example, some or all of the multiple networks may be selected to provide the relay service for the emergency service, instead of selecting the first network as a whole.
  • the first network is a service network of the second terminal device, or the first network is a network that a service cell of the second terminal device can access.
  • the service cell of the second terminal device can support access to one or more networks, and the first network can be one of them.
  • the first network can also be a service network of the second terminal device.
  • the first message is a discovery message, or a response message to a connection establishment request message.
  • the first terminal device determines whether to select the second terminal device and/or the first network to provide a relay service for emergency services based on the first information, and this process may occur in a discovery process (e.g., a discovery process between the first terminal device and the second terminal device), or in a connection establishment process (e.g., a connection establishment process between the first terminal device and the second terminal device).
  • determining whether to select the second terminal device and/or the first network to provide the relay service for the emergency service based on the first information includes: when the first terminal device is a layer 3 type remote terminal device, determining whether to select the second terminal device to provide the relay service for the emergency service based on the first information; or, when the first terminal device is a layer 2 type remote terminal device, determining whether to select the first network to provide the relay service for the emergency service based on the first information (for example, the networks included in the first network are regarded as a candidate network set for the first terminal device, and the first terminal device can select a network from the candidate network set to provide the emergency service based on the first information.
  • the first terminal device selects one or more networks from the candidate set to provide the emergency service, the first terminal device needs to connect to the one or more networks with the help of a relay terminal device to perform the emergency service, or, the first terminal device needs to obtain the emergency service provided by the one or more networks with the help of the relay service provided by the relay terminal device); or, when the first terminal device is a layer 2 type remote terminal device, determining whether to select the second terminal device and the first network to provide the relay service for the emergency service based on the first information. If the first terminal device is a layer 3 type remote terminal device, the first terminal device does not need to be connected to the network. In this case, the first terminal device may not need to determine whether to select the first network to provide relay services for emergency services.
  • the first terminal device may not need to determine whether to select the first network to provide relay services for emergency services, so as to determine whether to use the emergency bearer between the second terminal device and the first network. If the first terminal device is a layer 2 type remote terminal device, the first terminal device may determine whether to select the second terminal device and the first network to provide relay services for emergency services based on the first information. Alternatively, if the first terminal device is a layer 2 type remote terminal device, the first terminal device may determine whether to select the first network to provide relay services for emergency services based on the first information. If it is determined to select the first network, the first terminal device may continue to select a relay terminal device within the first network.
  • the method further includes: receiving first configuration information from a first network device, the first configuration information including information on whether a second network requires IMS registration and/or network behavior information for establishing an emergency bearer, the second network including a network to which the first terminal device is authorized to access, and the second network including the first network; or, receiving second configuration information from a second network device, the second configuration information including information on whether a third network requires IMS registration and/or network behavior information for establishing an emergency bearer, the third network including a network to which the first terminal device is authorized to use relay services, and the third network including the first network; or, the first message including the first information.
  • the first terminal device can obtain the first information, which are not limited by the embodiments of the present application.
  • the method before determining whether to select the second terminal device and/or the first network to provide the relay service for the emergency service based on the first information, the method further includes: determining that the first network is different from the home network of the first terminal device. If the first network and the home network of the first terminal device are the same network, the first terminal device should be able to perform emergency services in the first network. Therefore, in this case, the first terminal device does not need to determine whether to select the second terminal device and/or the first network to provide the relay service for the emergency service based on the first information. For example, the first terminal device can directly select the second terminal device and/or the first network to provide the relay service for the emergency service.
  • the first terminal device may succeed or fail in performing the emergency service in the first network. Therefore, the first terminal device can determine whether to select the second terminal device and/or the first network to provide the relay service for the emergency service based on the first information.
  • the first information includes second information
  • the second information includes information on whether the first network requires IMS registration
  • determining whether to select the second terminal device and/or the first network to provide the relay service for the emergency service according to the first information includes one or more of the following: when the second information indicates that the first network does not require IMS registration, selecting the second terminal device and/or the first network to provide the relay service for the emergency service; or, when the second information indicates that the first network requires IMS registration and the first terminal device has an IMS certificate of the first network, selecting the second terminal device and/or the first network to provide the relay service for the emergency service; or, when the second information indicates that the first network requires IMS registration and the first terminal device has an IMS certificate of the first network, selecting the second terminal device and/or the first network to provide the relay service for the emergency service;
  • the first terminal device may determine whether to select the second terminal device and/or the first network to provide the relay service for the emergency service in the above manner. For example, if the first terminal device
  • the first terminal device has an IMS certificate for the first network, including: the first network is the home network of the first terminal device; or, the first network is different from the home network of the first terminal device, and the first network is a network that the first terminal device is authorized to access or a network that is authorized to use relay services; or, the first network is different from the home network of the first terminal device, and the first network is able to verify the IMS certificate of the first terminal device.
  • the first terminal device may also have an IMS certificate for the first network in other scenarios.
  • the first information includes third information
  • the third information includes network behavior information of the first network establishing an emergency bearer, and determining whether to select the second terminal device and/or the first network to provide the relay service for the emergency service based on the first information includes one or more of the following: when it is determined according to the third information that an emergency bearer can be established on the first network, the second terminal device and/or the first network is selected to provide the relay service for the emergency service; or, when it is determined according to the third information that an emergency bearer cannot be established on the first network, the second terminal device and/or the first network is not selected to provide the relay service for the emergency service.
  • the first terminal device can determine whether to select the second terminal device and/or the first network to provide the relay service for the emergency service in the above manner.
  • the first information includes second information and third information
  • the second information includes information on whether the first network requires IMS registration
  • the third information includes network behavior information of the first network establishing an emergency bearer
  • determining whether to select the second terminal device and/or the first network to provide the relay service for the emergency service based on the first information includes one or more of the following: when the second information indicates that the first network does not require IMS registration, and it is determined according to the third information that an emergency bearer can be established on the first network, the second terminal device and/or the first network is selected to provide the relay service for the emergency service; or, when the second information indicates that the first network does not require IMS registration, and it is determined according to the third information that an emergency bearer cannot be established on the first network, the second terminal device and/or the first network is not selected to provide the relay service for the emergency service; or, when the second information indicates that the first network requires IMS registration, and the first terminal device has an IMS certificate of the first network, and it is determined according to the third information that an emergency bear
  • the second terminal device and/or the first network are selected to provide the relay service of the emergency service; or, when the second information indicates that the first network requires IMS registration, and the first terminal device has an IMS certificate of the first network, and it is determined according to the third information that the emergency bearer cannot be established on the first network, the second terminal device and/or the first network are not selected to provide the relay service of the emergency service; or, when the second information indicates that the first network requires IMS registration, and the first terminal device does not have an IMS certificate of the first network, and it is determined according to the third information that the emergency bearer can be established on the first network, the second terminal device and/or the first network are not selected to provide the relay service of the emergency service; or, when the second information indicates that the first network requires IMS registration, and the first terminal device does not have an IMS certificate of the first network, and it is determined according to the third information that the emergency bearer cannot be established on the first network, the second terminal device and/or the first network are not
  • the first terminal device can determine whether to select the second terminal device and/or the first network to provide the relay service of the emergency service in the above manner. In simple terms, if the first terminal device satisfies the second information and the third information, the first terminal device may select the second terminal device and/or the first network to provide the relay service for the emergency service, and if the first terminal device does not satisfy the second information and/or the third information, the first terminal device may not select the second terminal device and/or the first network to provide the relay service for the emergency service. By combining the second information and the third information for judgment, the selection result of the first terminal device is more accurate.
  • the network behavior of the first network to establish an emergency bearer includes one or more of the following: only allowing terminal devices with a valid contract and successfully registered with the network to establish an emergency bearer, only allowing terminal devices with a valid contract to establish an emergency bearer, only allowing terminal devices with identification information to establish an emergency bearer, or allowing all terminal devices to establish an emergency bearer.
  • determining, based on the third information, that an emergency bearer can be established in the first network includes one or more of the following: when the third information indicates that the network behavior of the first network includes allowing all terminal devices to establish an emergency bearer, determining that an emergency bearer can be established in the first network; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with identification information to establish an emergency bearer, and the first terminal device has identification information, determining that an emergency bearer can be established in the first network.
  • the first network establishes an emergency bearer; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with a valid contract to establish an emergency bearer, and the first terminal device has a valid contract for the first network, it is determined that an emergency bearer can be established in the first network; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with a valid contract and successfully registered with the network to establish an emergency bearer, and the first terminal device has a valid contract for the first network, and the first terminal device is not in a restricted service state, it is determined that an emergency bearer can be established in the first network.
  • the first terminal device has a valid contract with the first network, including: the first network is the home network of the first terminal device; or the first network is different from the home network of the first terminal device, and the first network is a network that the first terminal device is authorized to access or a network that is authorized to use relay services.
  • the first terminal device may also have a valid contract with the first network in other scenarios.
  • the first message is used to indicate the relay service providing emergency services, including: the first message includes a first service code, the first service code is a service code corresponding to the emergency service, for example, the first service code is an emergency RSC.
  • a second communication method which can be executed by a terminal device, or by other devices including terminal device functions, or by a chip system (or, chip) or other functional modules, which can realize the functions of the terminal device, and the chip system or functional module is, for example, arranged in the terminal device.
  • the terminal device is, for example, a second terminal device.
  • the method includes: obtaining first information, the first information including information on whether the first network requires IMS registration, and/or network behavior information of the first network establishing an emergency bearer, the first network being a service network of the second terminal device; sending a first message to the first terminal device, the first message including the first information, and the first message is also used to indicate the relay service for providing emergency services.
  • the first network is a service network of the second terminal device, or the first network is a network accessible to a service cell of the second terminal device.
  • the first message is a discovery message, or a response message to a connection establishment request message.
  • obtaining the first information includes: receiving third configuration information from a fourth network device, the third configuration information including information on whether the fourth network requires IMS registration and/or network behavior information for establishing an emergency bearer, the fourth network including a network to which the second terminal device is authorized to access, and the fourth network including the first network; or, receiving fourth configuration information from a fifth network device, the fourth configuration information including information on whether the fifth network requires IMS registration and/or network behavior information for establishing an emergency bearer, the fifth network including a network to which the second terminal device is authorized to provide relay services, and the fifth network including the first network; or, receiving the first information from a third network device.
  • receiving the first information from a third network device includes: receiving the first information from the third network device during or after registering with the first network.
  • the method before sending the first discovery message to the first terminal device, the method further includes: receiving a second message from the first terminal device, the second message including a second service code, and the second service code is used to request a relay service for emergency services.
  • the second terminal device is a layer 3 type relay terminal device, or a layer 2 type relay terminal device.
  • the first information when the second terminal device is a layer 3 type relay terminal device, includes information on whether the first network requires IMS registration, and does not include network behavior information on establishing an emergency bearer by the first network; or, when the second terminal device is a layer 2 type relay terminal device, the first information includes information on whether the first network requires IMS registration, and includes network behavior information on establishing an emergency bearer by the first network.
  • the network behavior of the first network to establish an emergency bearer includes one or more of the following: only allowing terminal devices with a valid contract and successfully registered with the network to establish an emergency bearer, only allowing terminal devices with a valid contract to establish an emergency bearer, only allowing terminal devices with identification information to establish an emergency bearer, or allowing all terminal devices to establish an emergency bearer.
  • the first message is used to indicate the provision of a relay service for an emergency service, including: the first message includes a first service code, and the first service code is a service code corresponding to the emergency service.
  • a third communication method is provided, which can be executed by a terminal device, or by other devices including the functions of the terminal device, or by a chip system (or, chip) or other functional module, the chip system or functional module can realize the functions of the terminal device, the chip system or functional module is, for example, set in the terminal device.
  • the terminal device is, for example, a second terminal device.
  • the method includes: receiving a A first message from a first terminal device, the first message is used to request a relay service for an emergency service; determining whether to provide the relay service for the emergency service for the first terminal device based on the first information, wherein the first information includes information on whether the first network requires IMS registration, and/or includes network behavior information for the first network to establish an emergency bearer; and sending a second message to the first terminal device, the second message is used to indicate the provision of the relay service for the emergency service.
  • the first terminal device can select a suitable terminal device and/or network to provide the relay service for the emergency service, thereby improving the success rate of the first terminal device in executing the emergency service, thereby reducing security risks. It can be seen that whether the first terminal device can select a certain terminal device and/or network to provide the relay service for the emergency service can be determined by the first terminal device itself, or by other terminal devices (such as the second terminal device), and the method is relatively flexible.
  • the first network is a service network of the second terminal device, or the first network is a network accessible to a service cell of the second terminal device.
  • the first message also includes information about the home network of the first terminal device.
  • the first terminal device may inform the second terminal device of the home network of the first terminal device to assist the second terminal device in determining whether to provide a relay service for the emergency service for the first terminal device.
  • the first message further includes identification information of the first terminal device.
  • the first terminal device may inform the second terminal device of the identification information of the first terminal device to assist the second terminal device in determining whether to provide a relay service of an emergency service for the first terminal device.
  • the method before determining whether to provide the first terminal device with the relay service of the emergency service based on the first information, the method further includes: determining that the home network of the first terminal device is different from the first network. If the home network of the first terminal device and the first network are the same network, the first terminal device can perform emergency services in the first network, so the second terminal device does not need to determine whether to provide the first terminal device with the relay service of the emergency service based on the first information, for example, the second terminal device determines that it can provide the first terminal device with the relay service of the emergency service.
  • the first terminal device may succeed or fail in performing the emergency service in the first network, so the second terminal device may determine whether to provide the first terminal device with the relay service of the emergency service based on the first information.
  • the first information includes second information
  • the second information includes information on whether the first network requires IMS registration
  • determining whether to provide the first terminal device with the relay service of the emergency service based on the first information includes one or more of the following: when the second information indicates that the first network does not require IMS registration, determining to provide the first terminal device with the relay service of the emergency service; or, when the second information indicates that the first network requires IMS registration, determining to provide the first terminal device with the relay service of the emergency service; or, when the second information indicates that the first network requires IMS registration, determining not to provide the first terminal device with the relay service of the emergency service.
  • the second terminal device can determine whether to provide the first terminal device with the relay service of the emergency service in the above manner.
  • the method further includes: sending a third message to the first terminal device, the third message being used to refuse to provide the relay service of the emergency service. If the second terminal device does not provide the relay service of the emergency service for the first terminal device, the second terminal device may also send a third message to the first terminal device, and the first terminal device may determine that it is rejected by the second terminal device, for example, the first terminal device may take corresponding measures in a timely manner, such as re-searching for a relay terminal device, etc.
  • the third message includes a first cause value, and the first cause value is used to indicate that the first network requires IMS registration. For example, if the second terminal device rejects the first terminal device because the first network requires IMS registration, the third message may include the first cause value.
  • the third message includes a second cause value
  • the second cause value is used to indicate that the first network does not allow all terminal devices to establish an emergency bearer. For example, if the second terminal device does not obtain the identification information of the first terminal device, and the first network does not allow all terminal devices to establish an emergency bearer, the second terminal device can reject the first terminal device, and the third message can include the second cause value. By including the corresponding cause value in the third message, the first terminal device can clearly understand the reason for the rejection.
  • the method further includes: receiving third configuration information from a fourth network device, the first configuration information including information on whether the fourth network requires IMS registration and/or network behavior information for establishing an emergency bearer, the fourth network including a network authorized by the second terminal device to access, and the fourth network including the first network; or, receiving fourth configuration information from a fifth network device, the fourth configuration information including information on whether the fifth network requires IMS registration and/or network behavior information for establishing an emergency bearer, the fifth network including a network authorized by the second terminal device to serve as a relay terminal device, and the fifth network including the first network; or, receiving the first information from a third network device.
  • the second terminal device may obtain the first Information, without restriction.
  • the first message is a discovery request message or a connection establishment request message.
  • the second terminal device determines whether to provide a relay service for an emergency service for the first terminal device based on the first information, and this process may occur during a discovery process between the first terminal device and the second terminal device, or may occur during a connection establishment process between the first terminal device and the second terminal device.
  • the first message is the discovery request message, and the second message is a discovery response message or a discovery declaration message; or, the first message is the connection establishment request message, and the second message is a connection establishment response message; or, the first message is the connection establishment request message, and the third message is a connection establishment rejection message.
  • the second terminal device is a layer 3 type relay terminal device, or a layer 2 type relay terminal device.
  • a fourth communication method is provided, which can be executed by a terminal device, or by other devices including terminal device functions, or by a chip system (or, chip) or other functional module, which can realize the functions of the terminal device, and the chip system or functional module is, for example, arranged in the terminal device.
  • the terminal device is, for example, a second terminal device.
  • the method includes: sending a first message, wherein the first message is used to request a relay service for an emergency service; receiving a second message or a third message from a second terminal device, wherein the second message is used to indicate the provision of a relay service for an emergency service, and the third message is used to refuse the provision of a relay service for an emergency service.
  • the first message further includes information about a home network of the first terminal device.
  • the first message further includes identification information of the first terminal device.
  • the third message includes a first cause value, where the first cause value is used to indicate that the first network requires IMS registration.
  • the third message includes a second cause value, where the second cause value is used to indicate that the first network does not allow all terminal devices to establish an emergency bearer.
  • the method further includes: not selecting the second terminal device to perform a relay service for emergency services and/or not selecting a service network for the second terminal device.
  • the first message is a discovery request message, or a connection establishment request message.
  • the first message is the discovery request message, and the second message is a discovery response message or a discovery declaration message; or, the first message is the connection establishment request message, and the second message is a connection establishment response message; or, the first message is the connection establishment request message, and the third message is a connection establishment rejection message.
  • a fifth communication method which can be executed by a terminal device, or by other devices including terminal device functions, or by a chip system (or, chip) or other functional modules, which can realize the functions of the terminal device, and the chip system or functional module is, for example, arranged in the terminal device.
  • the method includes: determining that the home network of the terminal device cannot be searched; selecting a network according to first information, wherein the first information includes information on whether at least one network requires IMS registration, and/or includes network behavior information for establishing an emergency bearer by the at least one network.
  • the terminal device can select a suitable network, which improves the success rate of the terminal device in executing emergency services, thereby reducing security risks.
  • the terminal device can try to choose to access a suitable network in the network selection stage, thereby reducing the probability of failing to initiate an emergency service due to accessing an inappropriate network, or reducing the delay required to reselect a network due to accessing an inappropriate network.
  • the method further includes: receiving first configuration information from a first network device, the first configuration information including information on whether the at least one network requires IMS registration and/or network behavior information for establishing an emergency bearer, the at least one network being a network that the terminal device is authorized to access.
  • the terminal device can obtain the first information in a variety of ways, and an optional way is provided herein.
  • the first information includes second information
  • the second information includes information on whether the at least one network requires IMS registration
  • selecting a network according to the first information includes: when the second information indicates that the first network does not require IMS registration, selecting the first network; or, when the second information indicates that the first network requires IMS registration and the terminal device has an IMS certificate for the first network, selecting the first network; or, when the second information indicates that the first network requires IMS registration and the terminal device does not have an IMS certificate for the first network, not selecting the first network.
  • the first network belongs to the at least one network.
  • the terminal device can select a network in the above manner.
  • the terminal device has an IMS certificate of the first network, including: the first network and The home network of the terminal device is different, and the first network is a network that the terminal device is authorized to access; or, the first network is different from the home network of the terminal device, and the first network can verify the IMS certificate of the terminal device.
  • the first information includes third information
  • the third information includes network behavior information of the at least one network establishing an emergency bearer
  • selecting a network according to the first information includes: when it is determined according to the third information that an emergency bearer can be established in the first network, selecting the first network; or when it is determined according to the third information that an emergency bearer cannot be established in the first network, not selecting the first network.
  • the first network belongs to the at least one network.
  • the first information includes second information and third information
  • the second information includes information on whether the at least one network requires IMS registration
  • the third information includes network behavior information of the at least one network for establishing an emergency bearer
  • selecting a network according to the first information includes one or more of the following: when the second information indicates that the first network does not require IMS registration, and it is determined according to the third information that an emergency bearer can be established on the first network, selecting the first network; or, when the second information indicates that the first network does not require IMS registration, and it is determined according to the third information that an emergency bearer cannot be established on the first network, not selecting the first network; or, when the second information indicates that the first network requires IMS registration, and the terminal device has an IMS certificate of the first network, and according to the third information, When the third information determines that an emergency bearer can be established on the first network, the first network is selected; or, when the second information indicates that the first network requires IMS registration and the terminal device has an IMS certificate of the first network, and it is determined
  • the network behavior of the first network in the at least one network to establish an emergency bearer includes one or more of the following: only allowing terminal devices with a valid contract and successfully registered with the network to establish an emergency bearer, only allowing terminal devices with a valid contract to establish an emergency bearer, only allowing terminal devices with identification information to establish an emergency bearer, or allowing all terminal devices to establish an emergency bearer.
  • determining that an emergency bearer can be established in the first network based on the third information includes one or more of the following: when the third information indicates that the network behavior of the first network includes allowing all terminal devices to establish an emergency bearer, determining that an emergency bearer can be established in the first network; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with identification information to establish an emergency bearer, and the terminal device has identification information, determining that an emergency bearer can be established in the first network; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with a valid contract to establish an emergency bearer, and the terminal device has a valid contract with the first network, determining that an emergency bearer can be established in the first network; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with a valid contract and successfully registered with the network to establish an emergency bearer, and the terminal device has a valid contract with the first network, and the terminal device is not in a restricted service state
  • the terminal device has a valid subscription to the first network, including: the first network is different from the home network of the terminal device, and the first network is a network that the terminal device is authorized to access.
  • a sixth communication method may be executed by a terminal device, or by other devices including terminal device functions, or by a chip system (or, chip) or other functional modules, which can implement the functions of the terminal device, and which are, for example, arranged in the terminal device.
  • the method comprises: in the process of registering to a first network, receiving first information from the first network, the first information comprising information on whether the first network requires IMS registration, and/or comprising network behavior information on establishing an emergency bearer by the first network; determining whether to reselect a network based on the first information.
  • the terminal device can select a suitable network, thereby improving the success rate of the terminal device in executing emergency services, thereby reducing security risks.
  • the first information includes second information
  • the second information includes information on whether the first network requires IMS registration
  • determining whether to reselect the network based on the first information includes: when the second information indicates that the first network does not require IMS registration, not reselecting the network; or, when the second information indicates that the first network requires IMS registration and the terminal device has an IMS certificate of the first network, not reselecting the network; or, when the second information indicates that the first network requires IMS registration and the terminal device does not have an IMS certificate of the first network, reselecting the network.
  • the terminal device has an IMS certificate of the first network, including: the first network is The home network of the terminal device; or, the first network is different from the home network of the terminal device, and the first network is a network that the terminal device is authorized to access; or, the first network is different from the home network of the terminal device, and the first network can verify the IMS certificate of the terminal device.
  • the first information includes third information
  • the third information includes network behavior information of the first network establishing an emergency bearer
  • determining whether to reselect a network based on the first information includes: when it is determined according to the third information that an emergency bearer can be established in the first network, not reselecting the network; or, when it is determined according to the third information that an emergency bearer cannot be established in the first network, reselecting the network.
  • the first information includes second information and third information
  • the second information includes information on whether the first network requires IMS registration
  • the third information includes network behavior information of the first network establishing an emergency bearer
  • determining whether to reselect a network based on the first information includes: when the second information indicates that the first network does not require IMS registration, and it is determined that an emergency bearer can be established on the first network based on the third information, not reselecting the network; or, when the second information indicates that the first network does not require IMS registration, and it is determined that an emergency bearer cannot be established on the first network based on the third information, reselecting the network; or, when the second information indicates that the first network requires IMS registration, and the terminal device has an IMS certificate of the first network, and based on the
  • the third information determines that an emergency bearer can be established in the first network, do not reselect the network; or, when the second information indicates that the first network requires IMS registration and the terminal device has an IMS certificate
  • the network behavior of the first network to establish an emergency bearer includes one or more of the following: only allowing terminal devices with a valid contract and successfully registered with the network to establish an emergency bearer, only allowing terminal devices with a valid contract to establish an emergency bearer, only allowing terminal devices with identification information to establish an emergency bearer, or allowing all terminal devices to establish an emergency bearer.
  • determining that an emergency bearer can be established on the first network based on the third information includes one or more of the following: when the third information indicates that the network behavior of the first network includes allowing all terminal devices to establish an emergency bearer, determining that an emergency bearer can be established on the first network; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with identification information to establish an emergency bearer, and the terminal device has identification information, determining that an emergency bearer can be established on the first network; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with a valid contract to establish an emergency bearer, and the terminal device has a valid contract with the first network, determining that an emergency bearer can be established on the first network; or, when the third information indicates that the network behavior of the first network includes only allowing terminal devices with a valid contract and successfully registered with the network to establish an emergency bearer, and the terminal device has a valid contract with the first network, and the terminal device is not in a restricted service state
  • the terminal device has a valid subscription to the first network, including: the first network is the home network of the terminal device; or, the first network is different from the home network of the terminal device, and the first network is a network that the terminal device is authorized to access.
  • a communication device may be the first terminal device described in any one of the first to fourth aspects.
  • the communication device has the function of the first terminal device.
  • the communication device is, for example, a first terminal device, or a larger device including the first terminal device, or a functional module in the first terminal device, such as a baseband device or a chip system.
  • the communication device includes a baseband device and a radio frequency device.
  • the communication device includes a processing unit (sometimes also referred to as a processing module) and a transceiver unit (sometimes also referred to as a transceiver module).
  • the transceiver unit can implement a sending function and a receiving function.
  • the transceiver unit When the transceiver unit implements the sending function, it can be called a sending unit (sometimes also referred to as a sending module), and when the transceiver unit implements the receiving function, it can be called a receiving unit (sometimes also referred to as a receiving module).
  • the sending unit and the receiving unit can be the same functional module, which is called a transceiver unit, and the functional module can implement the sending function and the receiving function; or, the sending unit and the receiving unit can be different functional modules, and the transceiver unit is a general term for these functional modules.
  • the transceiver unit (or, the receiving unit) is used to receive a first message from the second terminal device, the first message is used to indicate the provision of a relay service for emergency services; the processing unit is used to determine whether to The second terminal device and/or the first network is selected to provide a relay service for the emergency service, wherein the first information includes information on whether the first network requires IMS registration and/or network behavior information of the first network establishing an emergency bearer.
  • the transceiver unit (or, the sending unit) is used to send a first message, wherein the first message is used to request relay service for emergency services; the transceiver unit (or, the receiving unit) is used to receive a second message or a third message from a second terminal device, wherein the second message is used to indicate the provision of relay service for emergency services, and the third message is used to refuse the provision of relay service for emergency services.
  • the communication device also includes a storage unit (sometimes also referred to as a storage module), and the processing unit is used to couple with the storage unit and execute the program or instructions in the storage unit, so that the communication device can perform the function of the first terminal device described in any one of the first to fourth aspects above.
  • a storage unit sometimes also referred to as a storage module
  • a communication device may be the second terminal device described in any one of the first to fourth aspects.
  • the communication device has the functions of the second terminal device.
  • the communication device is, for example, a second terminal device, or a larger device including a second terminal device, or a functional module in the second terminal device, such as a baseband device or a chip system.
  • the communication device includes a baseband device and a radio frequency device.
  • the communication device includes a processing unit (sometimes also referred to as a processing module) and a transceiver unit (sometimes also referred to as a transceiver module).
  • a processing unit sometimes also referred to as a processing module
  • a transceiver unit sometimes also referred to as a transceiver module
  • the processing unit is used to obtain first information, the first information including information on whether the first network requires IMS registration and/or network behavior information of the first network establishing an emergency bearer, and the first network is a service network of the second terminal device; the transceiver unit (or, the sending unit) is used to send a first message to the first terminal device, the first message including the first information, and the first message is also used to indicate the relay service for providing emergency services.
  • the transceiver unit (or, the receiving unit) is used to receive a first message from a first terminal device, wherein the first message is used to request a relay service for an emergency service;
  • the processing unit is used to determine whether to provide the relay service for the emergency service for the first terminal device based on the first information, wherein the first information includes information on whether the first network requires IMS registration, and/or includes network behavior information for the first network to establish an emergency bearer;
  • the transceiver unit (or, the sending unit) is used to send a second message to the first terminal device, wherein the second message is used to indicate the provision of the relay service for the emergency service.
  • the communication device also includes a storage unit (sometimes also referred to as a storage module), and the processing unit is used to couple with the storage unit and execute the program or instructions in the storage unit, so that the communication device can perform the function of the second terminal device described in any one of the first to fourth aspects above.
  • a storage unit sometimes also referred to as a storage module
  • a communication device may be the terminal device described in any one of the fifth to sixth aspects.
  • the communication device has the functions of the above-mentioned terminal device.
  • the communication device is, for example, a terminal device, or a larger device including a terminal device, or a functional module in a terminal device, such as a baseband device or a chip system.
  • the communication device includes a baseband device and a radio frequency device.
  • the communication device includes a processing unit (sometimes also referred to as a processing module) and a transceiver unit (sometimes also referred to as a transceiver module).
  • a processing unit sometimes also referred to as a processing module
  • a transceiver unit sometimes also referred to as a transceiver module
  • the processing unit is used to obtain the home network of the terminal device and determine that it cannot be searched; the processing unit is also used to select a network based on first information, wherein the first information includes information on whether at least one network requires IMS registration and/or includes network behavior information of at least one network establishing an emergency bearer.
  • the transceiver unit (or, the receiving unit) is used to receive first information from the first network during the process of registering to the first network, the first information including information whether the first network requires IMS registration and/or network behavior information of establishing an emergency bearer by the first network; the processing unit is used to determine whether to reselect the network based on the first information.
  • the communication device also includes a storage unit (sometimes also referred to as a storage module), and the processing unit is used to couple with the storage unit and execute the program or instructions in the storage unit, so that the communication device can perform the functions of the terminal device described in any one of the fifth to sixth aspects above.
  • a storage unit sometimes also referred to as a storage module
  • a communication device which may be a first terminal device, or a chip or chip system used in the first terminal device.
  • the communication device includes a communication interface and a processor, and optionally, a memory.
  • the memory is used to store a computer program, and the processor is coupled to the memory and the communication interface.
  • the processor reads the computer program or instruction, the communication device executes the method executed by the first terminal device in the above aspects.
  • a communication device which may be an access network device, or a chip or chip system used in an access network device.
  • the communication device includes a communication interface and a processor, and optionally, a memory.
  • the memory is used to store A computer program, a processor coupled to a memory and a communication interface, and when the processor reads the computer program or instruction, the communication device executes the method executed by the second terminal device in the above aspects.
  • a communication device which may be an access network device, or a chip or chip system used in an access network device.
  • the communication device includes a communication interface and a processor, and optionally, a memory.
  • the memory is used to store a computer program, and the processor is coupled to the memory and the communication interface.
  • the processor reads the computer program or instruction, the communication device executes the method executed by the terminal device in the above aspects.
  • a communication system comprising a first terminal device and a second terminal device, wherein the first terminal device is used to execute the method executed by the first terminal device as described in any one of the first to fourth aspects, and the second terminal device is used to execute the method executed by the second terminal device as described in any one of the first to fourth aspects.
  • the first terminal device may be implemented by the communication device described in the seventh or tenth aspect; and the second terminal device may be implemented by the communication device described in the eighth or eleventh aspect.
  • a computer-readable storage medium is provided, wherein the computer-readable storage medium is used to store a computer program or instruction, which, when executed, enables the method executed by the first terminal device or the second terminal device or the terminal device in the above aspects to be implemented.
  • a computer program product comprising instructions, which, when executed on a computer, enables the methods described in the above aspects to be implemented.
  • a chip system including a processor and an interface, wherein the processor is used to call and execute instructions from the interface so that the chip system implements the above-mentioned methods.
  • Figure 1 shows the process of UE making an emergency call in 4G/5G relying on the IMS network
  • FIG2 is a schematic diagram of a 5G network architecture
  • FIG3 is a schematic diagram of a layer 3 relay architecture
  • FIG4 is a schematic diagram of a layer 2 relay architecture
  • Figure 5A shows the discovery process of Model A
  • Figure 5B shows the discovery process of model B
  • FIG5C shows the process of establishing a connection between the remote UE and the relay UE
  • FIG10 is a schematic diagram of a device provided in an embodiment of the present application.
  • FIG. 11 is a schematic diagram of another device provided in an embodiment of the present application.
  • the number of nouns means “singular noun or plural noun", that is, “one or more”.
  • At least one means one or more
  • plural means two or more.
  • “And/or” describes the association relationship of associated objects, indicating that three relationships may exist.
  • a and/or B can mean: A exists alone, A and B exist at the same time, and B exists alone, where A and B can be singular or plural.
  • the character "/” generally indicates that the previous and next associated objects are in an “or” relationship.
  • A/B means: A or B.
  • “At least one of the following" or similar expressions refers to any combination of these items, including any combination of single or plural items.
  • At least one of a, b, or c means: a, b, c, a and b, a and c, b and c, or a and b and c, where a, b, c can be single or multiple.
  • the ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the size, content, order, timing, priority or importance of multiple objects.
  • the numbering of the steps in each embodiment introduced in the embodiments of the present application is only to distinguish different steps, and is not used to limit the order between the steps.
  • S601 may occur before S602, or may occur after S602, or may occur at the same time as S602.
  • the terminal device is a device with wireless transceiver functions, which can be a fixed device, a mobile device, a handheld device (such as a mobile phone), a wearable device, a vehicle-mounted device, or a wireless device built into the above device (such as a communication module, a modem, or a chip system, etc.).
  • the terminal device is used to connect people, objects, machines, etc., and can be widely used in various scenarios, such as but not limited to the following scenarios: cellular communication, device-to-device communication (device-to-device, D2D), V2X, machine-to-machine/machine-like Terminal devices for scenarios such as machine-to-machine/machine-type communications (M2M/MTC), Internet of Things (IoT), virtual reality (VR), augmented reality (AR), industrial control, self driving, remote medical, smart grid, smart furniture, smart office, smart wearables (such as smart watches, smart bracelets, smart helmets or smart glasses, etc.), smart transportation, smart city, drones, robots, etc.
  • M2M/MTC machine-to-machine/machine-type communications
  • IoT Internet of Things
  • VR virtual reality
  • AR augmented reality
  • industrial control self driving, remote medical, smart grid, smart furniture, smart office, smart wearables (such as smart watches, smart bracelets, smart helmets or smart glasses,
  • the terminal device may sometimes be referred to as UE, terminal, access station, UE station, customer premise equipment (CPE), remote station, wireless communication equipment, or user device, etc.
  • UE terminal
  • access station UE station
  • UE station UE station
  • CPE customer premise equipment
  • remote station wireless communication equipment
  • wireless communication equipment wireless communication equipment
  • user device etc.
  • the terminal device is described by taking UE as an example in the embodiments of the present application.
  • the network equipment in the embodiments of the present application includes access network equipment and/or core network equipment.
  • the access network equipment is a device with wireless transceiver function, which is used to communicate with the terminal equipment.
  • the access network equipment includes but is not limited to base stations (base transceiver station (BTS), Node B, eNodeB/eNB, or gNodeB/gNB), transmission reception points (TRP), base stations subsequently evolved from the third generation partnership project (3GPP), access nodes in wireless fidelity (Wi-Fi) systems, wireless relay nodes, wireless backhaul nodes, etc.
  • the base station can be: a macro base station, a micro base station, a pico base station, a small station, a relay station, etc.
  • the access network device can include one or more co-sited or non-co-sited transmission reception points.
  • the access network device may also be a wireless controller, a centralized unit (CU), and/or a distributed unit (DU) in a cloud radio access network (CRAN) scenario.
  • the access network device may also be a server, etc.
  • the network device in the vehicle to everything (V2X) technology may be a road side unit (RSU).
  • the base station can communicate with a terminal device, or it can communicate with the terminal device through a relay station.
  • the terminal device can communicate with multiple base stations in different access technologies.
  • the core network device is used to implement functions such as mobility management, data processing, session management, policy and billing.
  • functions such as mobility management, data processing, session management, policy and billing.
  • the names of the devices that implement core network functions in systems with different access technologies may be different, and the embodiments of the present application do not limit this.
  • the core network equipment includes: access and mobility management function (AMF), session management function (SMF), policy control function (PCF) or user plane function (UPF), etc.
  • AMF access and mobility management function
  • SMF session management function
  • PCF policy control function
  • UPF user plane function
  • the communication device for realizing the function of the network device may be a network device, or may be a device capable of supporting the network device to realize the function, such as a chip system, which may be installed in the network device.
  • the technical solution provided in the embodiment of the present application is described by taking the device for realizing the function of the network device as an example that the network device is used as the device.
  • Figure 1 shows the process of UE making an emergency call on the 4G/5G IMS network.
  • S102 UE capability and resource validation. It can be understood that both UE and IMS can support emergency sessions.
  • the UE can initiate an emergency registration process to the core network.
  • the IP-connectivity access network (CAN) in Figure 1 can be understood as the core network.
  • bearer resource request This can be understood as a bearer establishment process.
  • the UE establishes an emergency bearer with the core network.
  • the P-CSCF is a network element in the IMS network.
  • the core network can discover the P-CSCF and inform the UE of the address of the P-CSCF so that the UE can communicate with the P-CSCF.
  • the UE registers with the IMS network, for example, the UE can register with the P-CSCF.
  • the UE and the P-CSCF establish an emergency session for carrying emergency calls, so that the network elements in the IMS such as the P-CSCF can transmit the UE's emergency call to the called party, such as the emergency center or the public safety access point (PSAP).
  • PSAP public safety access point
  • S103 and S104 above can be regarded as one process, which is used to establish an emergency bearer in the core network;
  • S106 and S107 can be regarded as another process, which can be used to establish an emergency session in the IMS.
  • the network may reject the UE's request.
  • the core network can determine whether to accept the UE's request based on the corresponding network behavior, which is determined by the network according to the operator's policy, and the network behavior can be understood as the rule of whether to accept the UE to perform emergency registration and/or establish an emergency bearer.
  • the network behavior of a network may include any one or more of the following:
  • Behavior A Only valid UEs are allowed to establish emergency bearers, or described as, only UEs with valid subscription and successful network registration are allowed to establish emergency bearers.
  • Behavior A can be understood as the core network only allowing UEs with valid contracts and successful network registration to establish emergency bearers or perform emergency registration. Among them, if the identification information provided by the UE can be successfully verified by the core network, it means that the UE has a valid contract.
  • the identification information is, for example, the identification of a communication module such as a subscriber identity module (SIM) or an embedded-subscriber identity module (eSIM) used by the UE.
  • SIM subscriber identity module
  • eSIM embedded-subscriber identity module
  • the identification information includes, for example, an international mobile subscriber identity (IMSI) or a subscription permanent identifier (SUPI), etc. It can also include a globally unique temporary UE identity (GUTI) or a temporary identifier such as 5G-GUTI.
  • IMSI international mobile subscriber identity
  • SUPI subscription permanent identifier
  • GUI globally unique temporary UE identity
  • 5G-GUTI temporary identifier
  • Behavior A requires that the UE cannot be in a limited service state (limited service state), that is, a UE in a limited service state (limited service state) does not satisfy Behavior A.
  • the core network may reject the emergency registration request or the request to establish an emergency bearer of the UE in the limited service state.
  • the UE in the limited service state includes, for example, a UE in arrears, a UE without a SIM/USIM/eSIM card, a UE that cannot find a suitable cell to reside in, or a UE that receives a network response indicating that the UE is an illegal UE, and other reasons that prevent it from accessing the network normally.
  • the limited service state is relative to the normal service state.
  • a UE in a normal service state can initiate services normally, while a UE in a limited service state can only try to initiate emergency services.
  • Behavior B Only authenticated UEs are allowed to establish emergency bearers, or described as, only UEs with valid subscriptions are allowed to establish emergency bearers.
  • Behavior B can be understood as the core network only allowing UEs with valid subscriptions to establish emergency bearers. If the core network supports Behavior B, even if the UE is in a restricted service state, as long as the UE has a valid subscription, the core network can accept the UE's emergency registration request or request to establish an emergency bearer. If a network only supports Behavior B and does not support other behaviors, then if the UE does not have a valid subscription, the network will reject the UE's emergency registration request or request to establish an emergency bearer.
  • Action C Only UEs with identification information are allowed to establish emergency bearers.
  • Behavior C can be understood as follows: as long as the UE can provide identification information, the core network can accept the UE's emergency registration request or request to establish an emergency bearer regardless of whether the core network can successfully verify the identification information. However, for UEs without identification information, such as cardless UEs (e.g., without SIM cards or eSIM cards), the core network that supports behavior C (e.g., the network only supports behavior C and does not support other behaviors) will reject the UE's emergency registration request or request to establish an emergency bearer.
  • the core network that supports behavior C e.g., the network only supports behavior C and does not support other behaviors
  • Action D Allow all UEs to establish emergency bearers.
  • Behavior D can be understood as that all UEs can perform emergency registration.
  • the core network can accept the emergency registration request of the UE or the request to establish an emergency bearer.
  • the device identification of the UE includes, for example, the international mobile equipment identity (IMEI).
  • a core network may support one or more of the above four network behaviors.
  • the core network may determine whether to accept the UE's emergency registration request or request to establish an emergency bearer according to the supported network behaviors and the situation of the UE.
  • the IMS verifies the UE's IMS certificate. If the UE has an IMS certificate, the IMS can accept the UE's IMS registration request or the request to establish an emergency session. If the UE does not have an IMS certificate, the UE can choose not to perform the IMS registration process, that is, not to perform S106, but directly perform S107. In S107, the UE sends a request to the P-CSCF for establishing an emergency session, which may carry the information of an anonymous user and an emergency service indication.
  • the P-CSCF can accept the UE's request and establish an emergency session with the UE. If the P-CSCF does not support anonymous users, or if the P-CSCF does not allow establishment of emergency calls without performing IMS registration, or if the P-CSCF requires IMS registration, the P-CSCF may reject the UE's request and not establish an emergency session with the UE.
  • the emergency call may fail due to the policies of the core network and/or the IMS, which may bring about a greater security risk.
  • the first UE may determine whether to select Select the second UE and/or the first network to provide the relay service for the emergency service. For example, if the first UE does not have an IMS certificate, then if the first network does not require the execution of IMS registration, the first UE can select the second UE and/or the first network to provide the relay service for the emergency service, and if the first network requires the execution of IMS registration, the first UE may not select the second UE and/or the first network to provide the relay service for the emergency service; for another example, if it is determined that the first network can support the first UE to establish an emergency bearer according to the network behavior information of the first network to establish an emergency bearer, the first UE can select the second UE and/or the first network to provide the relay service for the emergency service, and if it is determined that the first network does not support the first UE to establish an emergency bearer according to the network behavior information of
  • the first UE can select a suitable UE and/or network to provide the relay service for the emergency service, which improves the success rate of the first UE in executing the emergency service, thereby reducing the security risk.
  • the technical solution provided in the embodiments of the present application can be applied to the fourth generation mobile communication technology (the 4th generation, 4G) system, such as the long term evolution (long term evolution, LTE) system, or can be applied to the 5G system, such as the NR system, or can also be applied to the next generation mobile communication system or other similar communication systems, such as the sixth generation mobile communication technology (the 6th generation, 6G) system, etc., without specific limitation.
  • the 4th generation, 4G such as the long term evolution (long term evolution, LTE) system
  • 5G system such as the NR system
  • next generation mobile communication system or other similar communication systems such as the sixth generation mobile communication technology (the 6th generation, 6G) system, etc., without specific limitation.
  • the technical solution provided in the embodiments of the present application can also be applied to the relay scenario where the remote UE is connected to the network through the relay UE, the remote UE is, for example, a wearable device such as a smart watch, a smart bracelet or smart glasses, and the relay UE is, for example, a smart phone or a CPE device.
  • the remote UE is, for example, a wearable device such as a smart watch, a smart bracelet or smart glasses
  • the relay UE is, for example, a smart phone or a CPE device.
  • the UE accesses the core network through the (radio) access network ((R)AN), and the core network includes user plane network elements and control plane network elements.
  • the user plane network elements of the core network include user plane functions (UPF);
  • the control plane network elements of the core network include authentication server functions (AUSF), AMF, SMF, network slice selection functions (NSSF), network exposure functions (NEF), network function repository functions (NF repository functions, NRF), unified data management (UDM), PCF, and at least one of the AF network elements.
  • User plane network elements are mainly responsible for packet forwarding, quality of service (QoS) control, billing information statistics, etc.
  • Control plane network elements are mainly responsible for business process interaction, sending packet forwarding strategies and QoS control strategies to the user plane.
  • the core network control plane can adopt a service-oriented architecture, that is, the interaction between control plane network elements adopts the service call method to replace the point-to-point communication method in the traditional architecture.
  • a control plane network element will open services to other control plane network elements for other control plane network elements to call; in point-to-point communication, there will be a set of specific messages on the communication interface between control plane network elements, which can only be used by the control plane network elements at both ends of the interface when communicating.
  • UPF performs user data packet forwarding according to the routing rules of SMF, such as sending uplink data to the data network (DN) or other UPFs, and forwarding downlink data to other UPFs or (R)ANs.
  • DN data network
  • R R
  • AUSF performs security authentication of UE.
  • AMF Access Management Function
  • UE access management and mobility management responsible for UE status maintenance, UE reachability management, non-mobility management (MM) non-access-stratum (NAS) message forwarding, session management (SM) N2 message forwarding.
  • MM non-mobility management
  • NAS non-access-stratum
  • SM session management
  • SMF Session Management Function
  • UE session management allocates resources for UE sessions and releases resources.
  • the resources include session quality of service (QoS), session path, forwarding rules, etc.
  • NSSF selects a network slice for the UE.
  • NEF opens network functions to third parties in the form of northbound application programming interface (API) interface.
  • API application programming interface
  • NRF provides storage and selection functions for network function entity information for other network elements.
  • PCF user policy management
  • session is used to generate and manage user, session, and QoS flow processing policies.
  • AF application management
  • NEF network element that provides various business services. It can interact with the core network through NEF and can interact with the policy management framework for policy management.
  • N1 Interface between UE and core network control plane.
  • N2 Communication interface between access network (AN) elements and core network control plane.
  • N3 Communication interface between access network elements and UPF, used to transmit user data.
  • N4 Communication interface between SMF and UPF, used for policy configuration of UPF, etc.
  • N6 Communication port between UPF and data network (DN).
  • FIG 3 is a schematic diagram of the layer 3 (L3) relay architecture.
  • This architecture mainly involves remote UE (remote terminal equipment in Figure 3), relay UE (relay terminal equipment in Figure 3), 5G access network (next generation (NG)-RAN), 5G core network (5G core, 5GC) and DN.
  • the remote UE establishes a connection with the network through the relay UE to obtain network services.
  • the remote UE only needs to establish a connection with the remote UE, and there is no connection between the remote UE and the network.
  • FIG. 4 is a schematic diagram of the layer 2 (L2) relay architecture.
  • This architecture mainly involves remote UE, relay UE, NG-RAN, 5GC and DN to which remote UE and relay UE are connected respectively.
  • the remote UE is connected to NG-RAN and to the core network serving the remote UE. Therefore, in the L2 relay architecture, the remote UE can select the network by itself. In addition, in the L2 relay architecture, the remote UE can also select the relay UE by itself.
  • the core network elements serving the remote UE include, for example, the remote UE AMF, remote UE SMF and remote UE UPF in Figure 4;
  • the core network elements serving the relay UE include, for example, the relay UE AMF, relay UE SMF and relay UE UPF in Figure 4.
  • L2 relay architecture or L3 relay architecture remote UE and relay UE have two optional discovery methods, which are model A and model B respectively.
  • FIG5A takes UE1 broadcasting a discovery announcement message as an example, so UE1 may be referred to as an announcing end; and takes UE2 to UE5 receiving the discovery announcement message as an example, so UE2 to UE5 may be referred to as a monitoring end.
  • the discovery announcement message includes a relay service code (RSC), which may be used to indicate the relay service that the relay UE may provide.
  • RSC relay service code
  • the remote UE selects a relay UE based on the discovery announcement message and the needs of the remote UE.
  • the remote UE may select the relay UE, for example, the remote UE may initiate a connection establishment process to the relay UE, and then perform relay services through the relay UE.
  • Model B the remote UE first broadcasts a discovery request message (solicitation message), which can be referred to as S51 in Figure 5B.
  • Figure 5B takes UE1 broadcasting a discovery request message as an example, so UE1 can be called a discoverer.
  • the discovery request message may include an RSC, which is used to indicate the identifier of the relay service that the remote UE expects to be provided.
  • Figure 5B takes UE2 ⁇ UE5 receiving the discovery request message as an example, so UE2 ⁇ UE5 can be called a discoveree.
  • the relay UE determines whether to respond to the remote UE based on the discovery request message from the remote UE and the relay capability of the relay UE, or determines whether it can provide the remote UE with the relay service it needs.
  • the relay UE can respond to the remote UE, for example, the relay UE can send a discovery response message (response message) to the remote UE, which can be referred to as S52 in Figure 5B.
  • the remote UE may receive a discovery response message from one or more relay UEs.
  • UE2 and UE3 both send discovery response messages to the remote UE.
  • the remote UE selects a relay UE from the one or more relay UEs, initiates a connection establishment process with the relay UE, and then performs relay services.
  • FIG. 5C is a flowchart of the connection establishment process between the remote UE and the relay UE.
  • the remote UE sends a link establish request message to the relay UE to request to establish a connection.
  • the connection establishment request message may include an RSC, which is used to indicate the remote UE to select an identifier of a relay service for establishing a connection.
  • the relay UE may send a link establish accept message to the remote UE to accept the establishment of the connection; or, after the relay UE receives the connection establishment request message, it may also send a link establish reject message to the remote UE to reject the establishment of the connection.
  • the remote UE and the relay UE may also exchange other messages, which will not be described in detail.
  • the emergency service is, for example, an emergency call service, or may be other types of emergency services.
  • the “network” may be a PLMN.
  • a communication method provided by an embodiment of the present application is described below. Please refer to FIG6 for a flow chart of the method.
  • the method provided by the embodiment of the present application can be applied to the network architecture shown in FIG3 or FIG4.
  • the first UE involved in the method provided by the embodiment of the present application can be the remote UE in FIG3 or FIG4;
  • the second UE involved in the method provided by the embodiment of the present application can be the relay UE in FIG3 or FIG4.
  • the second UE sends a first message.
  • the first UE receives the first message from the second UE.
  • the first message may indicate Providing a relay service for emergency services.
  • the first message includes a first service code, and the first service code is a service code corresponding to the emergency service, so that the first message can indicate the provision of a relay service for emergency services through the first service code.
  • the first service code is, for example, an RSC corresponding to the emergency service, and the RSC can be called an emergency RSC (EM RSC).
  • the first message may indicate a relay service that provides emergency services. It can be understood that the first message can be used by the first UE to discover that the second UE is a relay device that can provide emergency services, or to respond to a request sent by the first UE to establish a communication connection with the second UE for transmitting emergency service data.
  • the first message is, for example, a discovery message. If the embodiment of the present application adopts model A, the first message is, for example, a discovery announcement message broadcast by the second UE.
  • the first message is, for example, a discovery response message sent by the second UE.
  • the first UE may first broadcast a second message, and the second message may include, for example, a second service code, and the second service code may request a relay service for an emergency service.
  • the second service code may be, for example, an RSC, and because the second service code corresponds to an emergency service, the RSC may also be referred to as an emergency RSC.
  • the second message may be, for example, a discovery request message.
  • S601 may be executed.
  • the embodiments of the present application may also adopt a combination of model A and model B, for example, the first message is a discovery declaration message sent by the second UE.
  • the first UE may first broadcast a second message, and the second message may include, for example, a second service code, and the second service code may request a relay service for an emergency service.
  • the second service code may be, for example, RSC, and the second message may be, for example, a discovery request message.
  • the second UE receives the second message, if it is able to provide the first UE with a relay service for the emergency service, for example, the second service code is a service code authorized by the second UE as a relay, S601 may be executed.
  • the first message in S601 is not a discovery response message, but a discovery declaration message sent by the second UE, and the discovery declaration message may be sent by broadcast or unicast.
  • the first message is, for example, a response message to a connection establishment request message
  • the response message is, for example, a connection establishment acceptance message, or a connection establishment rejection message.
  • the first UE may first send a second message, and the second message is, for example, a connection establishment request message.
  • the second message includes, for example, a second service code.
  • the second service code is a relay service code broadcast by the second UE during the discovery process, S601 may be executed.
  • the first message is, for example, a connection establishment acceptance message; or, if the second UE cannot provide the first UE with the relay service of the emergency service, the first message is, for example, a connection establishment rejection message.
  • the second UE may send the first information when it is determined that the first message indicates a relay service that provides emergency services. If the first message indicates that the relay service provided is not an emergency service, the second UE may not send the first information.
  • the first information is sent when the first message includes an emergency RSC, and the first UE does not need to include the first information in the first message if the emergency RSC is not included.
  • the second message sent by the first UE includes an emergency RSC, which is the RSC broadcast by the second UE during the discovery process; or, another way is that the second message sent by the first UE includes an emergency RSC, the first message also includes an emergency RSC, and the two emergency RSCs match (for example, are the same).
  • the first UE determines whether to select the second UE and/or the first network to provide a relay service for emergency services based on the first information.
  • the first network is, for example, a service network for the second UE, such as a serving public land mobile network (PLMN) for the second UE, for example, the PLMN includes the network serving the relay UE in FIG. 3 or 4.
  • the first network includes, for example, a network that a service cell of the second UE can access, such as a service cell of the second UE that can access one or more PLMNs, that is, in a scenario where operators share wireless base stations, the service cells that the base stations can provide can access multiple core networks, and the first network can include the one or more PLMNs.
  • the first UE can determine in S602 whether to select the network to provide relay services for emergency services.
  • the first UE can determine in S602 whether to select some or all of the multiple networks to provide relay services for emergency services.
  • the first UE can separately determine whether each of the multiple networks can be selected to provide relay services for emergency services, or it can be described as the first UE determining which one or more of the multiple networks can be selected to provide relay services for emergency services.
  • the result of the first UE executing S602 may be that the first UE determines that it can select some or all of the multiple networks to provide relay services for emergency services, or determines that it cannot select all of the multiple networks to provide relay services for emergency services.
  • the first UE After the first UE receives the first message, if the first message indicates that a relay service for providing emergency services is provided, the first UE can determine the first network. Taking the first network as the service network of the second UE as an example, for example, the first message includes an NR cell global identifier (NCGI), and the NCGI includes the identifier of the service network of the second UE, then the first UE can determine the service network of the second UE according to the NCGI. Alternatively, taking the first network as an example, the network that the service cell of the second UE can access, the first message may include a wireless network.
  • NCGI NR cell global identifier
  • a radio resource control (RRC) container includes identification information of one or more PLMNs that a serving cell of the second UE can access, so that the first UE can determine the one or more PLMNs according to the first message.
  • RRC radio resource control
  • the first network and the home network of the first UE are the same network, it can be regarded that the first UE has a valid subscription in the first network. Then, if the first UE is not in a restricted service state, the first network will not reject the first UE in the stage of establishing an emergency bearer in the core network, and the emergency bearer can be established; in addition, since the first network is the home network of the UE, if the UE has subscribed to the IMS service and the first UE also has the IMS certificate of the IMS corresponding to the first network, when establishing an emergency session in the IMS, the first UE can also successfully perform IMS registration and establish an emergency session.
  • the first UE can perform emergency services in the first network through the relay of the second UE. Therefore, optionally, if the first network includes the home network of the first UE, the first UE can select the home network to provide a relay service for emergency services. In this case, the first UE does not need to perform S602, but can perform emergency services in the home network through the relay of the second UE, or the first UE can select the second UE and/or the home network to provide a relay service for emergency services without having to make a judgment based on the first information.
  • the first UE may execute S602, or the first UE may determine whether to select the second UE and/or the first network to provide the relay service of the emergency service according to the first information.
  • the first UE may execute S602, for example, the first UE may also determine whether to select the second UE and/or the home network to provide the relay service of the emergency service according to the first information.
  • the home network of the first UE is, for example, the home PLMN (home PLMN, HPLMN) of the first UE.
  • the number of networks included in the home network of the first UE may be one or more, and according to the foregoing, the number of networks included in the first network may also be one or more.
  • the intersection network may be considered to be the home network of the first UE, and at this time, the first network includes the home network of the first UE; and if there is no intersection between the home network of the first UE and the first network, it may be considered that the first network does not include the home network of the first UE.
  • the first information may include information on whether the first network requires IMS registration, and/or network behavior information of the first network establishing an emergency bearer.
  • the first information may include second information and/or third information, wherein the second information includes information on whether the first network requires IMS registration, and the third information includes network behavior information of the first network establishing an emergency bearer.
  • the first UE may determine whether to select the second UE to provide a relay service for emergency services based on the first information, without having to determine whether to select the first network to provide a relay service for emergency services based on the first information.
  • the first UE Because the first UE is not connected to the first network under the L3 relay architecture, the first UE does not have to perform an operation of selecting a network. Alternatively, even if the first UE is a remote UE of L3 type and/or the second UE is a relay UE of L3 type, in S602, the first UE may determine whether to select the second UE to provide a relay service for emergency services based on the first information, or may determine whether to select the first network to provide a relay service for emergency services based on the first information.
  • the first UE can determine whether to select the first network to provide a relay service for emergency services based on the first information (for example, the networks included in the first network are regarded as a candidate network set of the first UE, and the first UE can select a network from the candidate network set to provide emergency services based on the first information.
  • the first information for example, the networks included in the first network are regarded as a candidate network set of the first UE, and the first UE can select a network from the candidate network set to provide emergency services based on the first information.
  • the first UE selects one or more networks from the candidate set to provide emergency services, the first UE needs to connect to the one or more networks with the help of relay UE to perform the emergency services, or in other words, the first UE needs to obtain the emergency services provided by the one or more networks with the help of the relay service provided by the relay UE), without having to determine whether to select the second UE to provide a relay service for emergency services based on the first information. Because the first UE is connected to the first network under the L2 relay architecture, the first UE can perform the operation of selecting a network.
  • the first UE can continue to select a relay UE that can provide a relay service for emergency services under the network, wherein the first UE does not need to refer to the first information when selecting a relay UE under the network.
  • the first UE can select a UE that can provide a relay service for emergency services, or a UE that can provide a relay service for emergency services and has good signal quality through the discovery process.
  • the first UE determines that the first network can be selected to provide a relay service for emergency services based on the first information.
  • the first UE can select a relay UE that uses the first network as a service network and can provide a relay service for emergency services.
  • the first UE may eventually select the second UE or other UEs.
  • the first UE does not need to refer to the first information when selecting a relay UE. That is, in this way, the first information can be used to select a network, but not to select a relay UE.
  • the first UE may determine whether to select the first network and the second UE to provide a relay service for the emergency service according to the first information (for example, the networks included in the first network are regarded as a candidate network set of the first UE, and the first UE may select a network from the candidate network set according to the first information to provide the emergency service.
  • the first information for example, the networks included in the first network are regarded as a candidate network set of the first UE, and the first UE may select a network from the candidate network set according to the first information to provide the emergency service.
  • the first UE needs The first UE uses the second UE to connect to the one or more networks to perform the emergency service, or the first UE needs to use the relay service provided by the second UE to obtain the emergency service provided by the one or more networks. Because the first UE is connected to the first network under the L2 relay architecture, the first UE can perform the operation of selecting a network; in addition, the first UE is connected to the first network through a relay UE, so the first UE can perform the operation of selecting a relay UE. In this way, the first information is used for selecting both the network and the relay UE.
  • the first UE To determine whether to select the second UE and/or the first network to provide a relay service for emergency services based on the first information, the first UE must first obtain the first information. There are multiple ways for the first UE to obtain the first information, as described below.
  • the first network device sends the first configuration information to the first UE, and the first UE can obtain the first information according to the first configuration information.
  • the first configuration information may include information on whether the second network requires IMS registration, and/or network behavior information for the second network to establish an emergency bearer.
  • the second network may include a network that the first UE is authorized to access, for example, including a PLMN that the first UE is authorized to access.
  • the second network may include one or more PLMNs, and the first network may belong to the second network, for example, the first network is a PLMN included in the second network.
  • the first network device may be a device in the HPLMN of the first UE, for example, the first network device is a UDM, or it may also be other core network devices, and the UDM may directly send the first configuration information to the first UE without being transferred through other devices.
  • the UDM in the HPLMN may send the first configuration information to the first UE.
  • the first configuration information may be included in the steering of roaming information, or may also be sent through other information.
  • the first network device may also be other devices within the HPLMN of the first UE, or devices within other PLMNs other than the HPLMN, such as a third-party server, etc.
  • the first network device may directly send the first configuration information to the UE, or the first network device may also be a transfer device for the first configuration information.
  • the HPLMN of the first UE may have a roaming agreement with at least one other PLMN, and UEs within these PLMNs may roam with each other.
  • a UE within the HPLMN (e.g., the first UE), it may be authorized to access all or part of the PLMNs in the at least one PLMN, that is, the first UE can roam in all or part of the PLMNs, and the second network may include all or part of the PLMNs.
  • the second network device sends the second configuration information to the first UE, and the first UE can obtain the first information according to the second configuration information.
  • S604 in FIG. 6 .
  • the first UE may execute S603 or S604, that is, execute one of the steps. It can be understood that S603 and S604 represent two parallel technical solutions, so it is sufficient to execute one of the steps.
  • the first UE may not execute S603 and S604. For example, if the first UE obtains the first information by other methods described later (for example, the first message includes the first information as will be described later), the first UE may not execute S603 and S604.
  • the second configuration information is, for example, proximity-based services (ProSe) configuration.
  • ProSe proximity-based services
  • the first UE may obtain the first information in this way.
  • the first UE may obtain the first information in this way.
  • the second configuration information may include information on whether the third network requires IMS registration, and/or network behavior information on the third network establishing an emergency bearer.
  • the third network may include a network in which the first UE is authorized to act as a remote UE, or a network in which the first UE is authorized to use a relay service.
  • the third network may include a PLMN in which the first UE is authorized to act as a remote UE, or a PLMN in which the first UE is authorized to use a relay service.
  • the third network may include one or more PLMNs, and the first network may belong to the third network, for example, the first network is a PLMN included in the third network.
  • the second network device may be a device within the HPLMN of the first UE, for example, the second network device is a PCF, or may be other core network devices. Alternatively, the second network device may also be other devices within the HPLMN of the first UE, or may be a device within other PLMNs other than the HPLMN, such as a third-party server, etc.
  • the second network device may directly send the second configuration information to the first UE, or the second network device may also be a transfer device for the second configuration information.
  • the first message includes the first information
  • the first UE can obtain the first information included in the first message.
  • the second UE can send the first information to the first UE.
  • the second UE can acquire the first information and send the first information to the first UE through the first message.
  • the second UE can also acquire the first information in different ways, which are introduced below.
  • the fourth network device sends third configuration information to the second UE, and the second UE can obtain the first information based on the third configuration information.
  • This step is also involved in the embodiment shown in Figure 7 to be introduced later, and this step is S703 in Figure 7.
  • the third configuration information may include information on whether the fourth network requires IMS registration, and/or network behavior information for the fourth network to establish an emergency bearer.
  • the fourth network may include a network that the second UE is authorized to access, for example, a PLMN that the second UE is authorized to access.
  • the fourth network may include one or more PLMNs, and the first network may belong to the fourth network, For example, the first network is a PLMN included in the fourth network.
  • the fourth network device is a device in the HPLMN of the second UE, for example, the fourth network device is a UDM, or it can also be other core network devices, and the UDM can directly send the third configuration information to the second UE without being transferred through other devices.
  • the UDM in the HPLMN can send the third configuration information to the second UE.
  • the third configuration information may be included in the roaming guidance information, or it may also be sent through other information.
  • the fourth network device may also be other devices in the HPLMN of the first UE, or devices in other PLMNs other than the HPLMN, such as a third-party server, etc.
  • the fourth network device can directly send the third configuration information to the UE, or the fourth network device may also be a transfer device for the third configuration information.
  • the HPLMN may have a roaming agreement with at least one other PLMN, and UEs in these PLMNs can roam with each other.
  • a UE eg, a second UE in the HPLMN
  • it may be authorized to access all or part of the at least one PLMN, that is, the second UE can roam in all or part of the PLMNs
  • the fourth network may include all or part of the PLMNs.
  • the fifth network device sends the fourth configuration information to the second UE, and the second UE can obtain the first information according to the fourth configuration information.
  • this step is also involved in the embodiment shown in Figure 7 to be introduced later, and the step is S704 in Figure 7.
  • the fourth configuration information is, for example, ProSe configuration.
  • the fourth configuration information may include information on whether the fifth network requires IMS registration, and/or network behavior information for the fifth network to establish an emergency bearer.
  • the fifth network may include a network in which the second UE is authorized to act as a relay UE, or a network in which the first UE is authorized to provide relay services.
  • the fifth network includes a PLMN in which the second UE is authorized to act as a relay UE, or includes a PLMN in which the second UE is authorized to provide relay services.
  • the fifth network may include one or more PLMNs, and the first network may belong to the fifth network, for example, the first network is a PLMN included in the fifth network.
  • the fifth network device may be a device in the HPLMN of the second UE, for example, the fifth network device is a PCF, or it may also be other core network devices.
  • the fifth network device may also be other devices in the HPLMN of the second UE, or devices in other PLMNs other than the HPLMN, such as a third-party server.
  • the fifth network device may directly send the fourth configuration information to the second UE, or the fifth network device may also be a transfer device for the fourth configuration information.
  • the network in which the second UE is authorized to act as a relay UE, or the network in which the second UE is authorized to provide relay services may include a network in which the second UE is authorized to perform L2 relay and/or a network in which the second UE is authorized to perform L3 relay.
  • the fifth network device may determine in which PLMNs the second UE is authorized to perform L2 relay, and/or in which PLMNs the second UE is authorized to perform L3 relay, thereby determining the fifth network. If the second UE is able to perform L2 relay, it indicates that the second UE is an L2 type relay UE; if the second UE is able to perform L3 relay, it indicates that the second UE is an L3 type relay UE.
  • the second UE may only be able to act as an L2 type relay UE or only be able to act as an L3 type relay UE, or the second UE may also be able to act as both an L2 type relay UE and an L3 type relay UE.
  • the third network device sends the first information to the second UE, and the second UE can receive the first information from the third network device.
  • this step is also involved in the embodiment shown in Figure 7 to be introduced later, and the step is S705 in Figure 7.
  • the three steps for example, S703 to S705
  • the three steps represent three parallel technical solutions, so it is sufficient to execute one of these three steps.
  • the third network device can be a device in the HPLMN of the second UE, for example, the third network device is AMF, or it can also be other core network devices.
  • the AMF in the HPLMN can send the first information to the second UE.
  • the third network device can also be other devices in the HPLMN of the second UE, or devices in other PLMNs other than the HPLMN, such as third-party servers.
  • the third network device may directly send the first information to the second UE, or the third network device may also be a transfer device for the first information.
  • the first information may include information on whether the first network requires IMS registration, and does not include network behavior information of the first network establishing an emergency bearer, or in other words, the first information may include the second information but not the third information. If the second UE can only be used as an L3 type relay UE in the first network, it indicates that the first UE is connected to the second UE and the first network through an L3 relay architecture in the first network.
  • the first information may also include the second information and the third information, because although there is no connection between the first UE and the first network, if the connection between the second UE and the first network is to be used, it is also possible to first determine whether the network behavior of the first network supports the first UE.
  • the first information may include the second information and the third information. If the second UE can act as an L2 type relay UE in the first network, it indicates that the first UE can be connected to the second UE and the first network through the L2 relay architecture in the first network. Under this architecture, there is a connection between the first UE and the first network, and the first UE needs to establish an emergency bearer in the first network, so the first UE can determine the network behavior of the first network to establish an emergency bearer.
  • the first information may be included in the RSC, and the RSC corresponds to an emergency service and can therefore be called an emergency RSC.
  • the emergency RSC may include a service code and the first information.
  • the emergency RSC may be used as the first message, or the emergency RSC may be included in the first message.
  • the RSC may define certain bits (e.g., N bits) therein to indicate that the RSC is an emergency RSC.
  • one of the bits (e.g., 1 bit) therein is used to indicate whether the first network requires information on performing IMS registration (e.g., when the value is "0", it may indicate that the first network does not require information on performing IMS registration; when the value is "1", it may indicate that the first network requires information on performing IMS registration), and the other two bits (e.g., 2 bits) are used to indicate network behavior information for the first network to establish an emergency bearer (e.g., when the value is "00 “, it indicates that the network behavior is behavior A; when the value is "01”, it indicates that the network behavior is behavior B; when the value is "10", it indicates that the network behavior is behavior C; when the value is "11", it indicates that the network behavior is behavior D), or another bit (for example, 1 bit) is used to indicate the network behavior information of the first network establishing an emergency bearer (for example, when the value is "0", it indicates that the network behavior does not accept all UEs to establish emergency bearers, that is, the network behavior
  • the first information may also be an independent parameter interacted during the discovery process or the connection establishment process between the first UE and the second UE, for example, the first information and the emergency RSC may be included in the same message (for example, the first message), or the first information and the emergency RSC may also be included in different messages.
  • an independent parameter may be used to represent the information indicating whether the first network requires IMS registration and the network behavior information for the first network to establish an emergency bearer (for example, 3 bits are used, the first bit indicates whether the first network requires IMS registration, and the last 2 bits indicate the network behavior information for the first network to establish an emergency bearer; or 2 bits are used, the first bit indicates whether the first network requires IMS registration, and the last bit indicates the network behavior information for the first network to establish an emergency bearer); two parameters may also be used to respectively represent the information indicating whether the first network requires IMS registration and the network behavior information for the first network to establish an emergency bearer (that is, 1 bit is used to represent each).
  • the emergency RSC includes a service code and the first information, which will not be repeated here.
  • the first UE to obtain the first information and the second UE to obtain the first information are introduced.
  • the embodiments of the present application do not limit the first UE and/or the second UE to obtain the first information in other ways.
  • the first information includes the second information and/or the third information. Therefore, when the information included in the first information is different, the way in which the first UE executes S602 may also be different, which is described below with an example.
  • the first information includes the second information. Then in S602, the first UE may determine whether to select the second UE and/or the first network to provide a relay service for the emergency service according to the second information.
  • a network does not require IMS registration, which can also be described as the network does not require IMS registration to be performed when establishing an emergency session or before establishing an emergency session, or can be described as the network allows emergency sessions to be established without performing IMS registration, or can be described as the network allows anonymous users to establish emergency sessions;
  • a network requires IMS registration, which can also be described as the network requires IMS registration to be performed before establishing an emergency session, or can be described as the network does not allow IMS registration to be performed when an emergency session is established, or can be described as the network does not allow anonymous users to establish emergency sessions, which will not be described in detail below
  • the IMS will allow the first UE to establish an emergency session without performing IMS registration, so the first UE can select the second UE and/or the first network to provide relay services for emergency services.
  • the first UE can select the second UE and/or the first network to provide a relay service for emergency services. If the first UE has an IMS certificate of the IMS corresponding to the first network, the first UE can perform IMS registration in the IMS through the IMS certificate, so the first UE can select the second UE and/or the first network to provide a relay service for emergency services.
  • the first UE may not select the second UE and/or the first network to provide a relay service for emergency services. If the first UE does not have an IMS certificate of the first network, the first UE cannot perform IMS registration in the IMS. However, the IMS does not allow the establishment of an emergency session without performing IMS registration. That is, the first UE needs to perform IMS registration to establish an emergency session within the IMS. Therefore, if the first UE does not meet the conditions for establishing an emergency session within the IMS, the first UE may not select the second UE and/or the first network to provide relay services for emergency services.
  • the first UE does not select a certain UE and/or the first network to provide relay services for emergency services
  • the first UE does not select the relay UE within the network, or in other words, the first UE does not select the UE whose service network is the network as the relay UE.
  • the first UE can reselect the relay UE and/or the network to provide relay services for emergency services to improve the success rate of emergency service execution.
  • the first UE has an IMS certificate of the first network, which can be understood as the first UE has a valid IMS certificate of the first network; the first UE does not have an IMS certificate of the first network, which can be understood as the first UE does not have a valid IMS certificate of the first network. If the first UE has a valid IMS certificate in the IMS corresponding to a certain network, the first UE can register with the IMS, and if the first UE does not have a valid IMS certificate in the IMS corresponding to a certain network, the first UE cannot register with the IMS. For example, if the first UE has signed an IMS service in the HPLMN, it usually has an IMS certificate of the HPLMN.
  • the IMS certificate can be verified by the HPLMN, and the IMS certificate is considered to be a valid IMS certificate of the HPLMN possessed by the first UE; or, although the first UE is roaming, there is a communication interface between the roaming network and the IMS of the HPLMN, then the IMS certificate can also be verified by the roaming network (the roaming network can verify and obtain the verification result through the HPLMN), and the IMS certificate is also considered to be a valid IMS certificate of the roaming network possessed by the first UE or a valid IMS certificate on the roaming network.
  • the first UE may have a valid IMS certificate of the first network.
  • the first network is not the HPLMN of the first UE, the first network is a network on which the first UE can roam (or a network to which the first UE is authorized to access), or the first network is a network on which the first UE is authorized to use relay services, that is, the first UE can connect to the first network through a relay UE in the first network.
  • the IMS certificate possessed by the first UE may not be the IMS certificate of the first network (for example, the IMS certificate of the HPLMN of the first UE), the first network can interact with the HPLMN of the first UE to obtain the IMS certificate, and therefore the first UE may also be considered to have a valid IMS certificate of the first network.
  • the first network is not the HPLMN of the first UE, the first network can verify the IMS certificate of the first UE, and in this case, the first UE is also considered to have a valid IMS certificate of the first network.
  • the first network is not the HPLMN of the first UE, there is interoperability between the IMS of the first network and the IMS of the HPLMN of the first UE.
  • the so-called interoperability can be understood as that there is a communication interface between the IMS of the first network and the IMS of the HPLMN of the first UE, and contract information such as the IMS certificate can be transmitted. Therefore, the first network can verify the IMS certificate of the first UE through this interoperability between the IMS of the HPLMN of the first UE and the IMS of the HPLMN.
  • the first network is not the HPLMN of the first UE, and the first network is not a network that the first UE is authorized to access, nor is it a network that the first UE is authorized to use relay services, and the first network is unable to verify the IMS certificate of the first UE (for example, there is no intercommunication capability between the IMS of the first network and the IMS corresponding to the HPLMN of the first UE), it is considered that the first UE does not have a valid IMS certificate of the first network.
  • the first information includes the third information. Then in S602, the first UE may determine whether to select the second UE and/or the first network to provide a relay service for the emergency service according to the third information.
  • the third information includes network behavior information for the first network to establish an emergency bearer.
  • the network behavior for the first network to establish a bearer may be any one or more of the behaviors A to D described above. It can be understood that the third information includes information for indicating the network behavior. The first UE can determine whether an emergency bearer can be established on the first network based on the network behavior information.
  • the third information indicates that the network behavior of the first network includes allowing all UEs to establish an emergency bearer (i.e., indicating that the network behavior of the first network includes behavior D)
  • the first UE can establish an emergency bearer in the first network. Therefore, in this case, the first UE determines that the emergency bearer can be established in the first network.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with identification information to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior C). Then, if the first UE has identification information, the first UE can determine that an emergency bearer can be established in the first network; and if the first UE does not have identification information, the first UE can determine that an emergency bearer cannot be established in the first network.
  • the identification information for example, includes one or more of IMSI, SUPI, a globally unique temporary UE identity (GUTI), or 5G-GUTI.
  • the UE has a communication module such as a SIM, a universal subscriber identity module (USIM) or an eSIM, the first UE is considered to have identification information.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with valid subscriptions to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior B). Then, if the first UE has a valid subscription in the first network, the first UE can determine that the emergency bearer can be established in the first network regardless of whether the first UE is in a restricted service state; and if the first UE does not have a valid subscription in the first network, the first UE determines that the emergency bearer cannot be established in the first network.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with a valid subscription and successfully registered with the network to establish an emergency bearer, or the third information indicates that the network behavior of the first network includes only allowing UEs with a valid subscription and not in a restricted service state to establish an emergency bearer (i.e., indicating that the network behavior of the first network includes behavior A).
  • the first UE may determine that an emergency bearer can be established in the first network; or, if the first UE does not have a valid subscription in the first network and/or the first UE is in a restricted service state, the first UE determines that an emergency bearer cannot be established in the first network.
  • the first UE may have a valid contract with the first network.
  • the first network is not the HPLMN of the first UE, the first network is a network that the first UE is authorized to access, or the first network is a network that the first UE is authorized to use relay services, then although the contract information owned by the first UE may not be the contract information within the first network (for example, the contract information within the HPLMN of the first UE), the first network can interact with the HPLMN of the first UE to obtain the contract information, and therefore the first UE may also be considered to have a valid contract with the first network.
  • the first network is not the HPLMN of the first UE, and the first network is not a network that the first UE is authorized to access, and is not a network that the first UE is authorized to use relay services, then even if the first UE has the contract information within the HPLMN of the first UE (that is, the first UE has a contract, or has contract information), it is considered that the first UE does not have a valid contract with the first network.
  • the first information may include the second information or the third information, or may include the second information and the third information.
  • the first information may include the third information but not the second information, or the first information may include the second information and the third information.
  • the first information may include the second information and the third information. The following describes the case where the first information includes the second information and the third information.
  • the first information includes the second information and the third information.
  • the first UE can determine whether to select the second UE and/or the first network to provide the relay service for the emergency service based on the second information and the third information. In this case, when the second information and the third information are satisfied at the same time, the first UE can determine to select the second UE and/or the first network to provide the relay service for the emergency service; and if the second information and/or the third information are not satisfied, the first UE can determine not to select the second UE and/or the first network to provide the relay service for the emergency service.
  • the second information indicates that the first network does not require IMS registration
  • the first UE determines that an emergency bearer can be established in the first network based on the third information, then the first UE can select the second UE and/or the first network to provide a relay service for emergency services.
  • the first UE may not select the second UE and/or the first network to provide relay service for emergency services.
  • the second information indicates that the first network requires IMS registration, and the first UE has an IMS certificate of the first network, and the first UE determines based on the third information that an emergency bearer can be established in the first network, then the first UE can select the second UE and/or the first network to provide relay service for emergency services.
  • the second information indicates that the first network requires IMS registration, and the first UE has an IMS certificate of the first network, and the first UE determines based on the third information that an emergency bearer cannot be established in the first network, then the first UE may not select the second UE and/or the first network to provide relay service for emergency services.
  • the second information indicates that the first network requires IMS registration, and the first UE does not have an IMS certificate of the first network, and the first UE determines based on the third information that an emergency bearer can be established in the first network, then the first UE may not select the second UE and/or the first network to provide relay service for emergency services.
  • the second information indicates that the first network requires IMS registration, and the first UE does not have an IMS certificate of the first network, and the first UE determines based on the third information that an emergency bearer cannot be established in the first network, then the first UE may not select the second UE and/or the first network to provide relay service for emergency services.
  • the "network subscription” in Table 1 only indicates that the UE has a network subscription, but the network subscription may be valid or invalid.
  • the "IMS certificate” in Table 1 only indicates that the UE has an IMS certificate, but the IMS certificate may be valid or invalid.
  • the situation of the first UE may be situation 1 in Table 1 (at this time, the first UE has a valid subscription to the first network and a valid IMS certificate of the first network).
  • the first network is not the HPLMN of the first UE but the roaming PLMN of the first UE, there is a roaming agreement between the first network and the HPLMN of the first UE, but the IMS of the first network and the IMS of the HPLMN of the first UE cannot communicate with each other, then even if the first UE has the IMS certificate of the HPLMN, the IMS certificate is an invalid IMS certificate, and at this time, it is considered that the first UE does not have a valid IMS certificate in the first network, and the situation of the first UE may be situation 2 in Table 1.
  • the situation of the first UE may be situation 3 in Table 1.
  • the first UE has the subscription information of the first network and also has the IMS certificate of the first network. If the network behavior of the first network is behavior A, and the first network requires IMS registration, then if the subscription information of the first network possessed by the first UE is a valid subscription and the first UE is not in a restricted service state, and the IMS certificate is a valid IMS certificate, then the first UE may select the second UE and/or the first network to provide a relay service for emergency services, and case 1 of Table 1 is taken as an example; or, if one or more of the following is satisfied: the subscription information of the first network possessed by the first UE is not a valid subscription (or an invalid subscription), the first UE is in a restricted service state, or the IMS certificate is not a valid IMS certificate (or an invalid IMS certificate), then the first UE may not select the second UE and/or the first network to provide a relay service for emergency services.
  • the network behavior of the first network is behavior A, and the first network requires IMS registration
  • the first UE has the subscription information of the first network but does not have the IMS certificate of the first network. If the network behavior of the first network is behavior B, and the first network does not require IMS registration, then if the subscription information of the first network held by the first UE is a valid subscription, the first UE may select the second UE and/or the first network to provide the relay service for the emergency service, and case 1 of Table 1 is taken as an example; or, if the subscription information of the first network held by the first UE is not a valid subscription, the first UE may not select the second UE and/or the first network to provide the relay service for the emergency service, and case 2 of Table 1 is taken as an example.
  • the first UE has subscription information of the first network but does not have an IMS certificate of the first network. If the network behavior of the first network is behavior B and the first network requires IMS registration, the first UE may not select the second UE and/or the first network to provide a relay service for emergency services.
  • the first network allows all UEs to establish emergency bearers, but requires IMS registration, which is an unreasonable behavior. Therefore, this configuration is considered to be an unreasonable configuration, which is indicated by "-" in Table 1. No more examples are given for the situations included in Table 1.
  • the first UE is a remote UE of L2 type and/or the second UE is a relay UE of L2 type, it can be determined whether to select the second UE and/or the first network to provide the relay service of the emergency service in the manner described in Table 1 above.
  • the first UE can consider the second information but not the third information when determining whether to select the second UE and/or the first network to provide the relay service of the emergency service.
  • the selection method of the first UE can refer to Table 2.
  • the first UE has an IMS certificate of the first network. If the first network requires IMS registration, then if the IMS certificate is a valid IMS certificate, the first UE determines that it can select the second UE and/or the first network to provide a relay service for emergency services, and Table 1 takes this as an example; or if the IMS certificate is an invalid IMS certificate, the first UE determines that it cannot select the second UE and/or the first network to provide a relay service for emergency services.
  • the first UE determines that the second UE and/or the first network cannot be selected to provide a relay service for emergency services; or if the first network does not require IMS registration, the first UE determines that the second UE and/or the first network can be selected to provide a relay service for emergency services.
  • the first UE may execute S602 if it is determined that an emergency RSC exists. If an emergency RSC does not exist, the first UE may not need to determine whether to select the second UE and/or the first network to provide a relay service for emergency services based on the first information. For example, one way in which an emergency RSC exists is that the first message includes the emergency RSC; or, another way in which an emergency RSC exists is that the second message sent by the first UE includes the emergency RSC; or, yet another way in which an emergency RSC exists is that the second message sent by the first UE includes the emergency RSC, the first message also includes the emergency RSC, and the two emergency RSCs match (for example, are the same).
  • the first UE by making a judgment based on the first information, the first UE can select a suitable UE and/or network to provide relay services for emergency services, thereby improving the success rate of the first UE executing emergency services and reducing security risks.
  • the first UE can select UE and/or network to provide relay service for emergency services.
  • the second communication method provided in the embodiment of the present application is introduced.
  • the second UE can decide whether to provide relay service for emergency services for the first UE.
  • the method provided in the embodiment of the present application can be applied to the network architecture shown in Figure 3 or Figure 4.
  • the first UE involved in the method provided in the embodiment of the present application can be the remote UE in Figure 3 or Figure 4
  • the second UE involved in the method provided in the embodiment of the present application can be the relay UE in Figure 3 or Figure 4.
  • a first UE sends a first message to a second UE.
  • the second UE receives the first message from the first UE.
  • the first message may be used to request provision of a relay for an emergency service.
  • the first message may include information of the home network of the first UE (eg, the HPLMN of the first UE), for example, including identification information of the HPLMN.
  • the home network of the first UE may include one or more networks.
  • the first message may include identification information of the first UE.
  • the identification information of the first UE includes one or more of the following: IMSI, SUPI, GUTI, 5G-GUTI, or IMEI.
  • the first message can be used to request a relay that provides emergency services, which can be understood as the first message can be used to discover a relay device that can provide emergency services, or to request to establish a communication connection with a relay device that has been discovered and can provide emergency services, and the communication connection is used to transmit data related to the emergency service between the first UE and the second UE.
  • the first message can be a broadcast message or a unicast message.
  • S702 The second UE determines whether to provide a relay service of an emergency service for the first UE according to the first information.
  • the second UE may obtain the first information before S702, so that in S702, it can determine whether to accept the request of the first UE based on the first information, or, in S702, the second UE can determine whether to provide the first UE with a relay service for emergency services based on the first information.
  • the first information and the manner in which the second UE obtains the first information, etc. please refer to the embodiment shown in FIG6.
  • the method also includes optional S703 to S705, S703 is a process in which the fourth network device sends the third configuration information to the second UE, S704 is a process in which the fifth network device sends the fourth configuration information to the second UE, and S705 is a process in which the third network device sends the first information to the second UE.
  • S703 is a process in which the fourth network device sends the third configuration information to the second UE
  • S704 is a process in which the fifth network device sends the fourth configuration information to the second UE
  • S705 is a process in which the third network device sends the first information to the second UE.
  • the first information may include the second information and/or the third information. If the content included in the first information is different, the way in which the second UE executes S702 may also be different, which is described below with examples.
  • the second UE in S702 can determine whether to provide the first UE with a relay service for the emergency service based on the second information. For example, if the first UE is a remote UE of L3 type and/or the second UE is a relay UE of L3 type, the second UE can determine based on the second information without considering the third information.
  • the second UE can provide emergency services for the first UE.
  • the first network For an introduction to the first network, reference may be made to the embodiment shown in FIG6 .
  • the second UE may provide the first UE with a relay service for the emergency service, or may not provide the first UE with a relay service for the emergency service.
  • the second information indicates that the first network requires IMS registration, and the second UE does not know whether the first UE has a valid IMS certificate of the first network, then the second UE may provide the first UE with a relay service for the emergency service, or may not provide the first UE with a relay service for the emergency service.
  • the first UE having the IMS certificate of the first network can be understood as the first UE having a valid IMS certificate of the first network; the first UE not having the IMS certificate of the first network can be understood as the first UE not having a valid IMS certificate of the first network.
  • the embodiment shown in FIG6 please refer to the embodiment shown in FIG6.
  • the second UE in S702 may determine whether to provide the first UE with a relay service for the emergency service according to the third information.
  • the third information indicates that the network behavior of the first network includes allowing all UEs to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior D). Then, if the first message includes the identification information of the first UE, or the second UE has obtained the identification information of the first UE, the second UE can provide the first UE with a relay service for the emergency service.
  • the identification information of the first UE may include one or more of the following: IMSI, SUPI, GUTI, IMEI, or 5G-GUTI.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with identification information to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior C), and the first message includes the identification information of the first UE, or the second UE has obtained the identification information of the first UE, then the second UE can provide a relay service for the emergency service for the first UE.
  • the identification information of the first UE may include one or more of the following: IMSI, SUPI, GUTI, or 5G-GUTI.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with valid subscriptions to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior B), or includes only allowing UEs with valid subscriptions and successfully registered with the network to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior A), then regardless of whether the first message includes the identification information of the first UE, or regardless of whether the second UE obtains the identification information of the first UE, the second UE may not provide relay service for the first UE for the emergency service.
  • the second UE may not provide relay service for emergency services for the first UE.
  • the second UE may not provide relay service for emergency services for the first UE.
  • the device identifier of the first UE e.g., IMEI
  • the second UE has obtained the device identifier of the first UE but not other identifiers of the first UE
  • the third information indicates that the network behavior of the first network includes one or more of behavior A, behavior B, or behavior C (or, the third information indicates that the network behavior of the first network is not behavior B)
  • the second UE may not provide relay service for emergency services for the first UE.
  • the second UE in S702 can determine whether to provide the first UE with a relay service for the emergency service based on the second information and the third information. For example, if the first UE is a remote UE of L2 type and/or the second UE is a relay UE of L2 type, the second UE can make a judgment based on the second information and the third information. Alternatively, even if the first UE is a remote UE of L3 type and/or the second UE is a relay UE of L3 type, the second UE can also make a judgment based on the second information and the third information.
  • the second information indicates that the first network does not require IMS registration
  • the third information indicates that the network behavior of the first network includes allowing all UEs to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior D)
  • the second UE can provide the first UE with a relay service for the emergency service.
  • the identification information of the first UE may include one or more of the following: IMSI, SUPI, GUTI, IMEI, or 5G-GUTI.
  • the second information indicates that the first network requires IMS registration
  • the third information indicates that the network behavior of the first network includes allowing all UEs to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior D).
  • the first message includes the identification information of the first UE, or the second UE has obtained the identification information of the first UE
  • the second UE may provide the first UE with a relay service for emergency services, or may not provide the first UE with a relay service for emergency services.
  • the identification information of the first UE may include one or more of the following: IMSI, SUPI, GUTI, IMEI, or 5G-GUTI.
  • the second information indicates that the first network does not require IMS registration
  • the third information indicates that the network behavior of the first network includes only allowing UEs with identification information to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior C)
  • the first message includes the identification information of the first UE, or the second UE has obtained the identification information of the first UE, then the second UE can provide a relay service for the emergency service for the first UE.
  • the identification information of the first UE may include one or more of the following: IMSI, SUPI, GUTI, or 5G-GUTI.
  • the second information indicates that the first network requires IMS registration to be performed
  • the third information indicates that the network behavior of the first network includes only allowing If a UE with identification information establishes an emergency bearer (i.e., indicates that the network behavior of the first network includes behavior C), and the first message includes the identification information of the first UE, or the second UE has obtained the identification information of the first UE, then the second UE may provide a relay service for the emergency service for the first UE, or may not provide a relay service for the emergency service for the first UE.
  • the identification information of the first UE may include one or more of the following: IMSI, SUPI, GUTI, or 5G-GUTI.
  • the second information indicates that the first network requires IMS registration or does not require IMS registration
  • the third information indicates that the network behavior of the first network includes only allowing UEs with valid contracts to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior B), or includes only allowing UEs with valid contracts and successfully registered with the network to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior A).
  • the second UE may not provide relay service for the first UE for the emergency service.
  • the second information indicates that the first network requires or does not require IMS registration. If the first message does not include any identification information of the first UE, and the second UE does not obtain any identification information of the first UE, then regardless of what network behavior the third information indicates the first network is, the second UE may not provide relay service for emergency services for the first UE.
  • the second information indicates that the first network requires IMS registration or does not require IMS registration. If the first message includes the device identifier of the first UE (e.g., IMEI) but does not include other identifiers of the first UE, and/or the second UE has obtained the device identifier of the first UE but not other identifiers of the first UE, and the third information indicates that the network behavior of the first network includes one or more of behavior A, behavior B, or behavior C (or, the third information indicates that the network behavior of the first network is not behavior B), the second UE may not provide relay service for emergency services for the first UE.
  • the device identifier of the first UE e.g., IMEI
  • the second UE has obtained the device identifier of the first UE but not other identifiers of the first UE
  • the third information indicates that the network behavior of the first network includes one or more of behavior A, behavior B, or behavior C (or, the third information indicates that the network behavior of the first network is not behavior
  • the HPLMN of the first UE has an intersection with the first network, for example, the number of the intersection networks is one or more, the first UE has a valid subscription to the first network and also has a valid IMS certificate of the first network, so the first UE can perform emergency services through the second UE in the intersection network. Therefore, optionally, if the HPLMN of the first UE has an intersection with the first network, the second UE may not need to execute S702, but may execute S703.
  • the second UE can determine whether to accept the request of the first UE through a corresponding judgment process, that is, the second UE can execute S702.
  • the second UE may still execute S702. In this case, the second UE may not need to determine whether the HPLMN of the first UE has an intersection with the first network.
  • the method further includes S706, the second UE sends a second message to the first UE.
  • the second UE receives the second message from the first UE.
  • the second message may indicate providing a relay service for emergency services.
  • the second UE may execute S706 .
  • the second UE may not perform S706. If the first UE does not receive the second message from the second UE, it can be determined that the second UE cannot provide the emergency service relay service for the first UE.
  • the second UE may not execute S706, but execute S707, and the second UE sends a third message to the first UE, and accordingly, the second UE receives the third message from the first UE.
  • the third message may refuse to provide (or not provide) the relay service for the emergency service.
  • the third message may include a corresponding cause value (cause).
  • the third message may include a first cause value and/or a second cause value, the first cause value may indicate that the first network requires IMS registration, and the second cause value may indicate that the first network does not allow all UEs to establish emergency bearers.
  • the third message may include the first cause value; if the second UE determines that the relay service for the emergency service is not provided to the first UE based on the third information, the third message may include the second cause value.
  • the first UE obtains the cause value and knows the reason for being rejected by the second UE.
  • the embodiment of the present application adopts model A, and the second UE can broadcast a discovery declaration message, which can be used to indicate the relay service providing emergency services.
  • the first UE can send a connection establishment request message to the second UE, and the connection establishment request message can be used as a first message to request the establishment of a connection for relaying emergency services.
  • the second message may be a connection establishment acceptance message
  • the third message may be a connection establishment rejection message.
  • connection establishment request message if it is determined that a connection can be established with the first UE for relaying emergency services, a connection establishment acceptance message as a second message can be sent to the first UE, and if it is determined that a connection cannot be established with the first UE for relaying emergency services, a connection establishment rejection message as a third message can be sent to the first UE.
  • the embodiment of the present application adopts model B.
  • the first UE first broadcasts a discovery request message, and the discovery request message can be used to request the provision of a relay for an emergency service (for example, the discovery request message includes an RSC corresponding to the emergency service), and the discovery request message can be used as the first message.
  • the second message can be a discovery acceptance message
  • the third message can be a discovery rejection message.
  • the second UE after the second UE receives the discovery request message, if it is determined that the relay service of the emergency service can be provided to the first UE, it can send a discovery acceptance message as the second message to the first UE; or, if the second UE determines that the relay service of the emergency service cannot be provided to the first UE, it can send a discovery rejection message as the third message to the first UE.
  • the second UE determines that the RSC included in the discovery request message matches the RSC of the relay service that the second UE can provide, it indicates that the second UE can provide the relay service of the emergency service to the first UE, and if it is determined that the RSC included in the discovery request message does not match the RSC of the relay service that the second UE can provide, it indicates that the second UE cannot provide the relay service of the emergency service to the first UE.
  • the first message and the second message involve the discovery process between the first UE and the second UE.
  • the embodiment of the present application adopts model B, and the first UE may send a connection establishment request message to the second UE, and the connection establishment request message may be used as a first message to request the establishment of a connection for relaying emergency services.
  • the first UE and the second UE may undergo a discovery process.
  • the first UE first broadcasts a discovery request message, and the discovery request message may be used to indicate the discovery of a relay providing emergency services.
  • the second UE may send a discovery acceptance message to the first UE, and the discovery acceptance message may indicate the relay service providing emergency services.
  • the first UE may send a connection establishment request message as a first message to the second UE.
  • the second message may be a connection establishment acceptance message
  • the third message may be a connection establishment rejection message. That is, after the second UE receives the connection establishment request message, if it is determined that a connection for relaying emergency services can be established with the first UE, a connection establishment acceptance message as a second message may be sent to the first UE, and if it is determined that a connection for relaying emergency services cannot be established with the first UE, a connection establishment rejection message as a third message may be sent to the first UE.
  • the first message and the second message involve the connection establishment process between the first UE and the second UE.
  • an embodiment of the present application adopts a combination of model A and model B.
  • the first UE first broadcasts a discovery request message, and the discovery request message can be used to request the provision of a relay for an emergency service (for example, the discovery request message includes an RSC corresponding to the emergency service), then the discovery request message can be used as the first message.
  • the second message or the third message can be a discovery declaration message. That is, after receiving the discovery request message, the second UE can send a discovery declaration message, and the discovery declaration message can be sent by broadcast or unicast.
  • the discovery declaration message can be used as the second message; or, if the second UE determines that it cannot provide a relay service for the emergency service to the first UE, then the discovery declaration message can be used as the third message.
  • the emergency service can be executed in the first network through the second UE.
  • the first UE may not select the second UE and/or the first network to provide relay services for emergency services. For example, the first UE may give up executing the emergency service, or the first UE may reselect the relay UE and/or the network to provide relay services for emergency services, so as to reduce the delay in executing the emergency service and improve the success rate of executing the emergency service.
  • the second UE may download and execute S702 when determining that an emergency RSC exists. If an emergency RSC does not exist, the second UE may not need to determine whether to provide a relay service for an emergency service for the first UE based on the first information. For example, one way in which an emergency RSC exists is that the first message includes the emergency RSC; or another way in which an emergency RSC exists is that the first message includes the emergency RSC, and the emergency RSC matches the emergency RSC that the second UE can provide.
  • the first UE can select a suitable UE and/or network to provide relay services for emergency services, thereby improving the success rate of the first UE in executing emergency services and reducing security risks.
  • the relay scenario there is also a problem of low success rate of UE making emergency calls in the direct connection scenario.
  • the following introduces the third communication method provided in the embodiment of the present application, which can improve the success rate of UE performing emergency services in the direct connection scenario.
  • the method provided in the embodiment of the present application can be applied to the network architecture shown in Figure 2.
  • the UE involved in the method provided in the embodiment of the present application can be the UE in Figure 2.
  • Figure 8 is a flow chart of the method.
  • the UE determines that the HPLMN of the UE cannot be searched. For example, the UE cannot search the HPLMN of the UE during the process of searching the network.
  • S802 The UE selects a network according to the first information.
  • the first information may include information on whether at least one network requires IMS registration (for example, the first information includes information on whether each network in at least one network requires IMS registration), and/or the first information may include network behavior information for establishing an emergency bearer by the at least one network (for example, the first information includes network behavior information for establishing an emergency bearer by each network in the at least one network).
  • the first information may include second information and/or third information, for example, the second information includes information on whether at least one network requires IMS registration.
  • the second information includes information about the registration of the at least one network (for example, the second information includes information about whether each network in the at least one network requires IMS registration), and the third information may include network behavior information of the at least one network establishing an emergency bearer (for example, the third information includes network behavior information of each network in the at least one network establishing an emergency bearer).
  • the third information includes network behavior information of each network in the at least one network establishing an emergency bearer.
  • the UE may first obtain the first information.
  • the first network device may send first configuration information to the UE, wherein the step of the first network device sending the first configuration information to the UE (or the step of the UE obtaining the first information) may occur before S802, or before S801.
  • the first configuration information may include information on whether the at least one network requires IMS registration, and/or network behavior information for establishing an emergency bearer by the at least one network, wherein the at least one network is a network that the UE is authorized to access, for example, a PLMN that the UE is authorized to access.
  • the UE may obtain the first information based on the first configuration information. For more information about the contents of this section, such as the first network device and the first configuration information, please refer to the embodiment shown in Figure 6.
  • the first information includes the second information and/or the third information. If the information included in the first information is different, the way in which the UE executes S802 may also be different, which is described below with an example.
  • the first information includes the second information. Then in S802, the UE may select a network according to the second information.
  • the UE may select the first network.
  • the UE may select the first network if the second information indicates that the first network requires IMS registration, and the UE has an IMS certificate of the first network (or in other words, the UE has an IMS certificate of the IMS corresponding to the first network), the UE may select the first network.
  • the UE may not select the first network if the second information indicates that the first network requires IMS registration and the UE does not have an IMS certificate of the first network.
  • the UE has an IMS certificate of the first network, which can be understood as the UE has a valid IMS certificate of the first network; the UE does not have an IMS certificate of the first network, which can be understood as the UE does not have a valid IMS certificate of the first network.
  • the first network is the HPLMN of the UE
  • the UE may have a valid IMS certificate of the first network (but in the embodiment of the present application, the first network is not the HPLMN of the UE).
  • the first network is not the HPLMN of the UE, the first network is a network that the UE is authorized to access, then although the IMS certificate owned by the UE may not be the IMS certificate of the first network (for example, the IMS certificate of the HPLMN of the UE), the first network can interact with the HPLMN of the UE to obtain the IMS certificate, so it can also be considered that the UE has a valid IMS certificate of the first network.
  • the first network can verify the IMS certificate of the UE, for example, the IMS of the first network and the IMS of the HPLMN of the UE have interoperability, so it is also considered that the UE has a valid IMS certificate of the first network. If the first network is not the HPLMN of the UE, and the first network is not a network that the UE is authorized to access, and the first network is also unable to verify the IMS certificate of the UE (for example, the IMS of the first network and the IMS corresponding to the HPLMN of the UE do not have interoperability), then it is considered that the UE does not have a valid IMS certificate of the first network.
  • the embodiment shown in FIG6 please refer to the embodiment shown in FIG6.
  • the first information includes the third information. Then in S802, the UE may select a network according to the third information.
  • the UE may select the first network. Alternatively, if the UE determines that the emergency bearer cannot be established on the first network according to the third information, the UE may not select the first network.
  • the third information indicates that the network behavior of the first network includes allowing all UEs to establish an emergency bearer (i.e., indicating that the network behavior of the first network includes behavior D)
  • the UE can establish an emergency bearer in the first network and can select the first network.
  • the identification information is, for example, a device identifier of the UE, such as an IMEI.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with identification information to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior C). Then, if the UE has identification information, the UE can establish an emergency bearer in the first network and can select the first network.
  • the identification information for example, includes one or more of the IMSI, SUPI, GUTI, or 5G-GUTI of the UE.
  • the UE is considered to have identification information.
  • the third information indicates that the network behavior of the first network includes allowing only UEs with valid subscriptions to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior B). Then, if the UE has a valid subscription in the first network, the UE can establish an emergency bearer in the first network and the first network can be selected; and if the UE does not have a valid subscription in the first network, the UE cannot establish an emergency bearer in the first network and the first network may not be selected.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with a valid subscription and successfully registered with the network to establish an emergency bearer (i.e., indicating that the network behavior of the first network includes behavior A). Then, if the UE has a valid subscription in the first network and the UE is not in a restricted service state, the UE can establish an emergency bearer in the first network and can select the first network; or, if the UE does not have a valid subscription in the first network and/or the UE is in a restricted service state, the UE cannot establish an emergency bearer in the first network. The first network may not be selected.
  • the first information includes the second information and the third information. Then, in S802, the UE may select a network according to the second information and the third information. In this case, when the first network satisfies both the second information and the third information, the UE may select the first network; and if the first network does not satisfy the second information and/or does not satisfy the third information, the UE may not select the first network.
  • the UE may select the first network if the second information indicates that the first network does not require IMS registration, and the UE determines that an emergency bearer can be established in the first network according to the third information.
  • the second information indicates that the first network does not require IMS registration, and the UE determines that an emergency bearer cannot be established in the first network according to the third information, then the UE may not select the first network.
  • the second information indicates that the first network requires IMS registration, and the UE has an IMS certificate of the first network, and the UE determines that an emergency bearer can be established in the first network according to the third information, then the UE can select the first network.
  • the UE may not select the first network if the second information indicates that the first network requires IMS registration, and the UE has an IMS certificate of the first network, and the UE determines that an emergency bearer cannot be established in the first network according to the third information, the UE may not select the first network.
  • the UE may not select the first network;
  • the UE may not select the first network if the second information indicates that the first network requires IMS registration, and the UE does not have an IMS certificate of the first network, and the UE determines that an emergency bearer cannot be established in the first network according to the third information, the UE may not select the first network.
  • the first network belongs to at least one network, which can be understood as that the UE can select a network from at least one network according to the above rules.
  • the first network is one of the networks searched by the UE. If the UE does not select the first network, the UE can continue to determine whether to select other searched networks according to the above rules.
  • the UE may search for one or more networks (for example, the first network is one of the networks).
  • One way is that the UE determines one by one whether it can select the searched network. Once the UE determines that it can select one of the searched networks, the UE can choose to access the network and no longer determine whether it can select other networks. Alternatively, another way is that the UE can determine whether it can select each searched network.
  • the UE can randomly select a network from them, or the UE can also select a network from them in combination with other factors. For example, the UE can select the network with the strongest signal quality among these networks to improve the communication quality of the UE in the network.
  • the UE has identification information, which includes one or more of SUPI, IMSI, GUTI, or 5G-GUTI.
  • the network behavior of network 1 searched by the UE is behavior C, and the network behavior of network 2 is behavior D. Then network 1 and network 2 are both selectable networks for the UE. The UE can then select network 1 to leave the access opportunity of network 2 to the UE without a card as much as possible.
  • the UE can select a suitable network, which improves the success rate of the UE in executing emergency services, thereby reducing security risks. Moreover, the UE can try to select a suitable network to access during the network selection phase, thereby reducing the probability of being unable to initiate an emergency service due to accessing an inappropriate network, or reducing the delay in reselecting a network due to accessing an inappropriate network.
  • the fourth communication method provided by the embodiment of the present application is introduced, which can also improve the success rate of the UE executing emergency services in the direct connection scenario.
  • the method provided by the embodiment of the present application can be applied to the network architecture shown in Figure 2, for example, the UE involved in the method provided by the embodiment of the present application can be the UE in Figure 2.
  • Figure 9 is a flowchart of the method.
  • the first network sends first information to the UE.
  • the UE receives the first information from the first network.
  • the first information please refer to the embodiment shown in FIG6.
  • the first information may be sent to the UE by a sixth network device in the first network.
  • the sixth network device is, for example, an AMF, or may be other core network devices.
  • the AMF in the first network may send the first information to the UE.
  • the first information may be included in a registration accept message sent by the AMF to the UE; or, after the registration with the first network is completed, the AMF in the first network may send the first information to the UE.
  • the sixth network device may not belong to the first network, but may be a device in other networks, or a third-party server, etc.
  • the sixth network device may send the first information directly to the UE without being forwarded by other devices; or, the sixth network device may also be a forwarding device for the first information.
  • the sixth network device determines that the UE is a roaming UE (i.e., the first network is not the HPLMN of the UE), and/or determines that the UE is a UE with relay capability (or, authorized to provide relay service), the first information may be sent to the UE; otherwise, the sixth network device may not send the first information to the UE.
  • the UE is a roaming UE (i.e., the first network is not the HPLMN of the UE), and/or determines that the UE is a UE with relay capability (or, authorized to provide relay service)
  • the first information may be sent to the UE; otherwise, the sixth network device may not send the first information to the UE.
  • S902 The UE determines whether to reselect a network according to the first information.
  • the first information includes the second information and/or the third information. If the information included in the first information is different, the way in which the UE executes S902 may also be different, which is described below with an example.
  • the first information includes the second information. Then in S902, the UE may determine whether to reselect a network according to the second information.
  • the UE may reselect a network, that is, the UE may no longer continue to access the first network, but reselect a network access to perform emergency services.
  • the UE may not reselect the network. That is, the UE may continue to reside in the first network, and the UE can perform emergency services in the first network.
  • the UE may reselect a network.
  • the fact that the UE has an IMS certificate of the first network can be understood as the UE having a valid IMS certificate of the first network; the fact that the UE does not have an IMS certificate of the first network can be understood as the UE not having a valid IMS certificate of the first network.
  • the UE has a valid IMS certificate of the first network reference can be made to the description of the embodiment shown in FIG8 .
  • the first information includes the third information. Then in S902, the UE may determine whether to reselect a network according to the third information.
  • the UE may not reselect the network.
  • the UE may reselect the network.
  • the UE can establish an emergency bearer in the first network as long as it has the identification information, and does not need to reselect a network.
  • the identification information is, for example, a device identifier of the UE, such as an IMEI.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with identification information to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior C). Then, if the UE has identification information, the UE can establish an emergency bearer in the first network and does not need to reselect the network; and if the UE does not have identification information, the UE cannot establish an emergency bearer in the first network and can reselect the network.
  • the identification information for example, includes one or more of the UE's IMSI, SUPI, GUTI, or 5G-GUTI. Alternatively, as long as the UE has a communication module such as a SIM, USIM, or eSIM, the UE is considered to have identification information.
  • the third information indicates that the network behavior of the first network includes allowing only UEs with valid subscriptions to establish emergency bearers (i.e., indicating that the network behavior of the first network includes behavior B). Then, if the UE has a valid subscription in the first network, the UE can establish an emergency bearer in the first network and does not need to reselect a network; and if the UE does not have a valid subscription in the first network, the UE cannot establish an emergency bearer in the first network and may reselect a network.
  • the third information indicates that the network behavior of the first network includes only allowing UEs with a valid subscription and successfully registered with the network to establish an emergency bearer (i.e., indicating that the network behavior of the first network includes behavior A). Then, if the UE has a valid subscription in the first network and the UE is not in a restricted service state, the UE can establish an emergency bearer in the first network and does not need to reselect a network; or, if the UE does not have a valid subscription in the first network and/or the UE is in a restricted service state, the UE cannot establish an emergency bearer in the first network and may reselect a network.
  • the first information includes the second information and the third information. Then, in S902, the UE may determine whether to reselect a network according to the second information and the third information. In this case, when the first network satisfies both the second information and the third information, the UE may not reselect a network; and if the first network does not satisfy the second information and/or does not satisfy the third information, the UE may reselect a network.
  • the second information indicates that the first network does not require IMS registration, and the UE determines that an emergency bearer can be established in the first network according to the third information, then the UE may not reselect a network.
  • the second information indicates that the first network does not require IMS registration, and the UE determines that the emergency bearer cannot be established in the first network according to the third information, then the UE may reselect a network.
  • the UE may not reselect a network.
  • the second information indicates that the first network requires IMS registration, and the UE has an IMS certificate of the first network, and the UE determines that an emergency bearer cannot be established in the first network according to the third information, then the UE may reselect a network.
  • the second information indicates that the first network requires IMS registration, and the UE does not have an IMS certificate of the first network, and the UE determines that an emergency bearer can be established in the first network according to the third information, then the UE can reselect a network.
  • the second information indicates that the first network requires IMS registration, and the UE does not have an IMS certificate of the first network, and the UE determines that an emergency bearer cannot be established in the first network according to the third information, then the UE may reselect a network.
  • the UE can select a suitable network, which improves the success rate of the UE in executing emergency services, thereby reducing the security risk. risk.
  • FIG 10 shows a schematic diagram of the structure of a communication device provided in an embodiment of the present application.
  • the communication device 1000 may be the first UE or the circuit system of the first UE described in any one of the embodiments shown in Figures 6 to 7, and is used to implement the method corresponding to the first UE in the above method embodiment.
  • the communication device 1000 may be the second UE or the circuit system of the second UE described in any one of the embodiments shown in Figures 6 to 7, and is used to implement the method corresponding to the second UE in the above method embodiment.
  • the communication device 1000 may be the UE or the circuit system of the UE described in any one of the embodiments shown in Figures 8 to 9, and is used to implement the method corresponding to the UE in the above method embodiment.
  • a circuit system is a chip system.
  • the communication device 1000 includes at least one processor 1001.
  • the processor 1001 can be used for internal processing of the device to implement certain control processing functions.
  • the processor 1001 includes instructions.
  • the processor 1001 can store data.
  • different processors can be independent devices, can be located in different physical locations, and can be located on different integrated circuits.
  • different processors can be integrated into one or more processors, for example, integrated on one or more integrated circuits.
  • the communication device 1000 includes one or more memories 1003 for storing instructions.
  • data may also be stored in the memory 1003.
  • the processor and memory may be provided separately or integrated together.
  • the communication device 1000 includes a communication line 1002 and at least one communication interface 1004. Since the memory 1003, the communication line 1002 and the communication interface 1004 are all optional, they are all indicated by dotted lines in FIG. 10 .
  • the communication device 1000 may further include a transceiver and/or an antenna.
  • the transceiver may be used to send information to other devices or receive information from other devices.
  • the transceiver may be referred to as a transceiver, a transceiver circuit, an input/output interface, etc., and is used to implement the transceiver function of the communication device 1000 through an antenna.
  • the transceiver includes a transmitter and a receiver.
  • the transmitter may be used to generate a radio frequency signal from a baseband signal
  • the receiver may be used to convert the radio frequency signal into a baseband signal.
  • Processor 1001 may include a general-purpose central processing unit (CPU), a microprocessor, an application specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the present application.
  • CPU central processing unit
  • ASIC application specific integrated circuit
  • the communication link 1002 may include a pathway to transmit information between the above-mentioned components.
  • the communication interface 1004 uses any transceiver-like device for communicating with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), wired access networks, etc.
  • RAN radio access network
  • WLAN wireless local area networks
  • wired access networks etc.
  • the memory 1003 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, a random access memory (RAM) or other types of dynamic storage devices that can store information and instructions, or an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compressed optical disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store the desired program code in the form of instructions or data structures and can be accessed by a computer, but is not limited thereto.
  • the memory 1003 may exist independently and be connected to the processor 1001 through the communication line 1002. Alternatively, the memory 1003 may also be integrated with the processor 1001.
  • the memory 1003 is used to store computer-executable instructions for executing the solution of the present application, and the execution is controlled by the processor 1001.
  • the processor 1001 is used to execute the computer-executable instructions stored in the memory 1003, thereby realizing the communication method provided in the above embodiment of the present application.
  • the computer-executable instructions in the embodiments of the present application may also be referred to as application code, which is not specifically limited in the embodiments of the present application.
  • the processor 1001 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 10 .
  • the communication device 1000 may include multiple processors, such as the processor 1001 and the processor 1005 in FIG10. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • the processor here may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
  • the chip When the device shown in FIG10 is a chip, for example, a chip of the first UE, a chip of the second UE, or a chip of the UE, the chip includes a processor 1001 (and may also include a processor 1005), a communication line 1002, a memory 1003, and a communication interface 1004.
  • the communication interface 1004 may be an input interface, a pin, or a circuit.
  • the memory 1003 may be a register, a cache, etc.
  • the processor 1001 and The processor 1005 may be a general-purpose CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of a program of the communication method of any of the above embodiments.
  • the embodiment of the present application may divide the functional modules of the device according to the above method example.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above integrated module may be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the embodiment of the present application is schematic, which is only a logical function division, and there may be other division methods in actual implementation.
  • Figure 11 shows a schematic diagram of a device, and the device 1100 may be the first UE or the second UE or the UE involved in the above method embodiments, or a chip in the first UE or a chip in the second UE or a chip in the UE.
  • the device 1100 includes a sending unit 1101, a processing unit 1102 and a receiving unit 1103.
  • the device 1100 can be used to implement the steps performed by the first UE or the second UE or the UE in the method of the embodiment of the present application.
  • the relevant features can refer to the various embodiments above and will not be repeated here.
  • the functions/implementation processes of the sending unit 1101, the receiving unit 1103, and the processing unit 1102 in FIG11 may be implemented by the processor 1001 in FIG10 calling a computer-executable instruction stored in the memory 1003.
  • the functions/implementation processes of the processing unit 1102 in FIG11 may be implemented by the processor 1001 in FIG10 calling a computer-executable instruction stored in the memory 1003, and the functions/implementation processes of the sending unit 1101 and the receiving unit 1103 in FIG11 may be implemented by the communication interface 1004 in FIG10.
  • the functions/implementation processes of the sending unit 1101 and the receiving unit 1103 can also be implemented through pins or circuits.
  • the present application also provides a computer-readable storage medium, which stores a computer program or instruction.
  • a computer program or instruction When the computer program or instruction is executed, the method performed by the first UE or the second UE or the UE in the aforementioned method embodiment is implemented.
  • the functions described in the above embodiments can be implemented in the form of software functional units and sold or used as independent products.
  • the technical solution of the present application can be essentially or partly embodied in the form of a software product, which is stored in a storage medium and includes several instructions for a computer device (which can be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present application.
  • Storage media include: various media that can store program codes, such as USB flash drives, mobile hard drives, ROM, RAM, magnetic disks, or optical disks.
  • the present application also provides a computer program product, which includes: a computer program code, when the computer program code is run on a computer, the computer executes the method executed by the first UE or the second UE or the UE in any of the aforementioned method embodiments.
  • An embodiment of the present application also provides a processing device, including a processor and an interface; the processor is used to execute the method executed by the first UE or the second UE or the UE involved in any of the above method embodiments.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from one website site, computer, server or data center to another website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means.
  • the computer-readable storage medium may be any available medium that a computer can access or a data storage device such as a server or data center that includes one or more available media integrated.
  • the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.
  • the various illustrative logic units and circuits described in the embodiments of the present application can be implemented or operated by a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or other programmable logic devices, discrete gate or transistor logic, discrete hardware components, or any combination of the above.
  • the general-purpose processor can be a microprocessor, and optionally, the general-purpose processor can also be any conventional processor, controller, microcontroller or state machine.
  • the processor can also be implemented by a combination of computing devices, such as a digital signal processor and a microprocessor, multiple microprocessors, one or more microprocessors combined with a digital signal processor core, or any other similar configuration.
  • the steps of the methods or algorithms described in the embodiments of the present application may be directly embedded in hardware, software units executed by a processor, or both.
  • the software unit may be stored in RAM, flash memory, ROM, erasable programmable read-only memory (EPROM), EEPROM, register, hard disk, removable disk, CD-ROM or any other storage medium in the art.
  • the storage medium may be connected to the processor so that the processor can read information from the storage medium and write information to the storage medium.
  • the storage medium may also be integrated into the processor.
  • the processor and the storage medium may be arranged in an ASIC, and the ASIC may be arranged in a terminal device.
  • the processor and the storage medium may also be arranged in different components in the terminal device.
  • These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Emergency Management (AREA)
  • Environmental & Geological Engineering (AREA)
  • Public Health (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande concerne un procédé et un appareil de communication. Le procédé comprend les étapes suivantes : un premier dispositif terminal reçoit un premier message en provenance d'un second dispositif terminal, le premier message étant utilisé pour ordonner de fournir un service de relais d'un service d'urgence ; et en fonction des premières informations, le premier dispositif terminal détermine s'il faut sélectionner le second dispositif terminal et/ou un premier réseau afin de fournir le service de relais du service d'urgence, les premières informations comprenant des informations indiquant si le premier réseau nécessite d'effectuer un enregistrement IMS, et/ou comprenant des informations de comportement de réseau du premier réseau établissant un palier d'urgence. La solution des modes de réalisation de la présente demande permet à un premier dispositif terminal de sélectionner des dispositifs terminaux appropriés et/ou des réseaux appropriés pour fournir des services de relais de services d'urgence, de façon à améliorer le taux de réussite du premier dispositif terminal exécutant les services d'urgence, réduisant ainsi le risque en matière de sécurité.
PCT/CN2023/118582 2022-10-21 2023-09-13 Procédé et appareil de communication WO2024082880A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202211298169 2022-10-21
CN202211298169.0 2022-10-21
CN202211351677.0 2022-10-31
CN202211351677.0A CN117956438A (zh) 2022-10-21 2022-10-31 一种通信方法及装置

Publications (1)

Publication Number Publication Date
WO2024082880A1 true WO2024082880A1 (fr) 2024-04-25

Family

ID=90736812

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/118582 WO2024082880A1 (fr) 2022-10-21 2023-09-13 Procédé et appareil de communication

Country Status (1)

Country Link
WO (1) WO2024082880A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132624A (zh) * 2006-08-25 2008-02-27 华为技术有限公司 实现紧急业务的方法及其系统
US20220174464A1 (en) * 2019-04-02 2022-06-02 Telefonaktiebolaget Lm Ericsson (Publ) Handling of emergency services for non-public networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132624A (zh) * 2006-08-25 2008-02-27 华为技术有限公司 实现紧急业务的方法及其系统
US20220174464A1 (en) * 2019-04-02 2022-06-02 Telefonaktiebolaget Lm Ericsson (Publ) Handling of emergency services for non-public networks

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "UP policy handling in case of unauthenticated emergency calls", 3GPP DRAFT; S3-191612_(WAS_S3-191447)_UP POLICY UNAUTHENTICATED EMERGENCY CALL, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. Reno (US); 20190506 - 20190510, 7 May 2019 (2019-05-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051703874 *
SHABNAM SULTANA, ERICSSON, NOKIA, NOKIA SHANGHAI BELL, APPLE: "KI#7, Conclusion on Emergency Services for UE to Network Relaying.", 3GPP DRAFT; S2-2208362; TYPE PCR; FS_5G_PROSE_PH2, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. 3GPP SA 2, no. Online; 20221010 - 20221017, 30 September 2022 (2022-09-30), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052208127 *

Similar Documents

Publication Publication Date Title
EP3906647B1 (fr) Autorisation flexible dans un réseau central basé sur un service 5g
CN112584486B (zh) 一种通信方法及装置
US10034173B2 (en) MTC service management using NFV
EP3986007A1 (fr) Procédé, dispositif et système de sélection d'un élément de réseau de gestion de session
WO2022017285A1 (fr) Procédé, appareil et système d'acheminement de paquets
WO2021063164A1 (fr) Procédé de communication, appareil de communication et support de stockage
US20230379806A1 (en) Method and apparatus for supporting information acquisition, device, and readable storage medium
WO2023124457A1 (fr) Procédé et appareil de sélection de réseau
US20220263879A1 (en) Multicast session establishment method and network device
US20220311871A1 (en) UE Provisioning and Charging for Sidelink Group Communication
WO2021163894A1 (fr) Procédé et appareil de communication basés sur un relais
WO2022179367A1 (fr) Nouveau procédé de fourniture de paramètres externes pour une session af
WO2024082880A1 (fr) Procédé et appareil de communication
US20170201959A1 (en) Data transmission method and base station
CN111988759B (zh) 一种数据处理的方法、装置和系统
WO2021088061A1 (fr) Procédé et appareil de communication
WO2021042381A1 (fr) Procédé, appareil et système de communication
CN117956438A (zh) 一种通信方法及装置
WO2024104118A1 (fr) Procédé et appareil de communication
WO2024140620A1 (fr) Procédé, dispositif et système de communication
WO2023197737A1 (fr) Procédé d'envoi de message, procédé de gestion de pin, appareil de communication et système de communication
WO2023134354A1 (fr) Procédé de communication et dispositif
WO2022027529A1 (fr) Procédé et appareil d'authentification de tranche
WO2023020046A1 (fr) Procédé de communication et appareil de communication
WO2023142887A1 (fr) Procédé de communication et appareil de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23878874

Country of ref document: EP

Kind code of ref document: A1