[go: up one dir, main page]

WO2020156488A1 - Procédé, appareil et système de communication - Google Patents

Procédé, appareil et système de communication Download PDF

Info

Publication number
WO2020156488A1
WO2020156488A1 PCT/CN2020/074026 CN2020074026W WO2020156488A1 WO 2020156488 A1 WO2020156488 A1 WO 2020156488A1 CN 2020074026 W CN2020074026 W CN 2020074026W WO 2020156488 A1 WO2020156488 A1 WO 2020156488A1
Authority
WO
WIPO (PCT)
Prior art keywords
access network
network device
terminal device
message
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2020/074026
Other languages
English (en)
Chinese (zh)
Inventor
耿婷婷
严乐
曾清海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201910937699.7A external-priority patent/CN111510923A/zh
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CA3128415A priority Critical patent/CA3128415C/fr
Priority to AU2020214502A priority patent/AU2020214502B2/en
Priority to ES20748897T priority patent/ES3024994T3/es
Priority to EP20748897.4A priority patent/EP3917190B1/fr
Publication of WO2020156488A1 publication Critical patent/WO2020156488A1/fr
Priority to US17/390,267 priority patent/US12010576B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • This application relates to the field of communication technology, and in particular to a communication method, device and system.
  • Private network is a concept relative to public network, which can be understood as a private network, such as an internal network built by a company, school, or factory.
  • UE User equipment
  • Private network is also called non-public network, or NPN.
  • NPN identification NPN ID
  • NPN ID private network identification
  • Different UEs support different NPN IDs. The UE can only use the NPN that it supports. The NPN corresponding to the ID resides, and services can only be initiated on the NPN corresponding to the NPN ID it has contracted.
  • the private network can be configured with private network-specific base stations and cells under the core network. UEs supporting the private network can reside and initiate services at the base station and core network.
  • the standard generally refers to this type of private network as standalone (standalone, SA) NPN cell.
  • the private network can also be a slice of the public network, that is, a slice in the public network can be configured as a private network, and all UEs can reside on the network. After the UE enters the connected state and initiates a service request, According to whether the service is a private network service, the network assigns the service of the UE to the corresponding private network slice.
  • the private network can also be a cell deployed by a public network operator.
  • Standards generally call this kind of private network a closed access group (CAG) cell, or a non-standalone (NSA) NPN cell.
  • CAG closed access group
  • NSA non-standalone
  • Private network services can be transmitted not only in the above three types of deployed networks, but also through the public network with a non-3GPP interworking function (N3IWF) interface with the private network. That is, the resources of the public network itself do not support direct private network services, and private network services can be transparently transmitted in the public network.
  • N3IWF non-3GPP interworking function
  • This application provides a communication method, device, and communication system to provide a mobility mechanism for terminal equipment supporting the private network in the private network.
  • the present application provides a communication method.
  • the method includes: a first access network device determines a target cell under a target first network based on a first list, and the first list includes subscribed by the terminal device The identification of at least one first network.
  • the first access network device sends a first message to the second access network device to which the target cell belongs, where the first message is used to instruct the second access network device to prepare to switch the terminal device to the target
  • the first message carries a second list and/or verification parameters
  • the second list is used to enable the second access network device to determine the identity of at least one first network subscribed by the terminal device
  • the verification parameter comes from the terminal Device
  • the verification parameter is used to enable the second access network device to verify the terminal device.
  • the source access network device determines the target cell under the target private network based on the identity of at least one private network subscribed by the terminal device, and can select a reasonable handover target for the terminal device. Moreover, by carrying the second list and/or verification parameters in the first message, the target access network device can verify the terminal device based on the first list and/or verification parameters sent by the source access network device, thereby determining the terminal The legality and safety of the equipment.
  • the first network may be a private network.
  • the first access network device may receive the first list sent by the terminal device.
  • the first access network device can obtain the contract information of the terminal device through the terminal device.
  • the first access network device may also receive the first list sent by the core network device.
  • the first network corresponding to the first list obtained through the above design is verified by the core network device by the terminal device. Therefore, the first access network device believes that the subscription information is true and can directly select the appropriate terminal device based on the subscription information.
  • the target cell under the first network is targeted, and the first access network device directly carries the terminal device subscription information to the second access network device, and the second access network device believes that the subscription information is true.
  • the first access network device may receive first information sent by the second access network device, and the first information includes at least one of the following information: The identity of the first network covered by the network access device, the identity of the second network that supports communication with the second access network device, the identity of the first network that supports communication with the second access network device, the Cell information corresponding to the first network that supports communication with the second network under the coverage of the second access network device and cell information that corresponds to the second network that supports communication with the first network under the coverage of the second access network device.
  • the first access network device may determine the target cell in the target first network based on the first list and the first information.
  • the first access network device can obtain the public network information and private network information supported by the second access network device, so that the first access network device configures the neighboring cell measurement for the terminal device, or the first access network device When selecting the handover target for the terminal device, you can select a more suitable cell.
  • the first access network device may determine the target first network based on the first list and the first information.
  • the first message may also carry indication information, the indication information is used to indicate the first parameter used by the terminal device when generating the verification parameter, and the first parameter is The terminal device pre-stored parameters used to generate verification parameters.
  • the second access network device can accurately determine the first parameter used by the terminal device when generating the verification parameter, so that the verification parameter can be accurately verified.
  • the indication information may be specific content of the first parameter, may also be an index of the first parameter, or may also be time information when the terminal device receives the first parameter.
  • the first access network device can determine multiple target first networks based on the first list, so that the first access network device can respectively assign the second access network to the multiple target first networks.
  • the connected device sends the first message.
  • the first access network device receives a second message sent by the second access network device, and the second message is used to confirm that the second access network device allows the The terminal device switches to the target cell, and the second message carries the identity of the first network to which the target cell belongs.
  • the first access network device may send the identification of the first network described in the target cell to the terminal device.
  • the first access network device may send a third message to the terminal device, where the third message is used to instruct the terminal device to check the cell or cell corresponding to the at least one first network identifier. Frequency point for measurement.
  • the first access network device receives the measurement result sent by the terminal device.
  • the first access network device can combine the measurement result sent by the terminal device when determining the target first network based on the first list, so that a more suitable target first network can be selected for the terminal device.
  • the first access network device sends a fourth message to the terminal device, and the fourth message is used to instruct the terminal device to be based on wireless A notification area (RNA) of an access network ((radio access network, RAN), where the RNA may indicate a notification area based on the first network.
  • RNA wireless A notification area
  • the first access network device sends context information of the terminal device to the second access network device, where the context information carries the RNA configuration including the first network information.
  • the first access network device may send a fifth message to the second access network device, the fifth message is used to page the terminal device, and the fifth message may carry the first One network information.
  • the second access network device can page the terminal device in the cell corresponding to the first network information according to the first network information of the terminal device.
  • the present application provides a communication method.
  • the method includes: a second access network device receives a first message sent by a first access network device, and the first message is used to indicate the second access
  • the network equipment prepares to handover the terminal equipment to the target cell; wherein, the first message carries a second list and/or verification parameters, and the first list includes information of one or more first networks subscribed by the terminal equipment.
  • the second list is used to enable the second access network device to determine the identity of at least one first network subscribed by the terminal device
  • the verification parameter is used to enable the second access network device to verify the The terminal device; if the first message carries the second list, the second access network device determines the identity of at least one first network subscribed by the terminal device based on the second list; if the first message A message carries the verification parameter, and the second access network device verifies the terminal device based on the verification parameter.
  • the target access network device may verify the terminal device based on the second list and/or verification parameters sent by the source access network device, so as to determine the legitimacy, security, etc. of the terminal device.
  • the first network may be a private network.
  • the second access network device may also send a second message to the first access network device, where the second message is used to confirm that the second access network device allows all
  • the second message may carry the identity of the first network to which the target cell belongs.
  • the second access network device may send a third message to the core network device, where the third information is used to instruct the core network device to perform path switching, and the third message carries instruction information,
  • the indication information is used to indicate whether the core network device sends the identification of one or more first networks to which the terminal device subscribes.
  • the core network device can send the identification of one or more first networks subscribed by the terminal device under the instruction of the second access network device.
  • the second access network device may receive a fourth message sent by the core network device, the fourth message is used to confirm that the core network device path switch is completed, and the fourth message carries
  • the fourth list includes identities of one or more first networks to which the terminal device subscribes.
  • the second access network device may send one or more second parameters to the terminal device, and the one or more second parameters are used to generate the verification parameter.
  • the terminal device can generate a verification parameter based on the second parameter sent by the first access network device, so that the first access network device can verify the legitimacy and security of the terminal device based on the verification parameter.
  • the first message may also carry indication information, and the indication information is used to indicate the one or more first parameters used by the terminal device when generating the verification parameters.
  • the first parameter is a parameter pre-stored by the terminal device for generating a verification parameter.
  • the second access network device may receive the context information of the terminal device sent by the first access network device, where the context information carries the RNA configuration including the first network information.
  • the second access network device may receive a fifth message sent by the first access network device, the fifth message is used to page the terminal device, and the fifth message may carry the terminal device's The first network information.
  • the second access network device can page the terminal device in the cell corresponding to the first network information according to the first network information of the terminal device.
  • the present application provides a communication method, the method includes: a core network device determines the identity of one or more first networks subscribed by a terminal device; the core network device sends a first list to the access network device , The first list includes identities of one or more first networks subscribed by the terminal device.
  • the core network device sends the first list to the access network device so that the access network device can obtain the contract information verified by the terminal device, so that the access network device can directly trust the terminal device and the first list The corresponding contract information of the first network is legal.
  • the access network device may be the source access network device that the terminal device accesses before handover, or the access network device may be the target access network device that the terminal device accesses after the handover. equipment.
  • the core network device may send an initial context establishment request message or a path switch response message to the access network device, where the initial context establishment request message or the path switch response message carries all The first list is mentioned.
  • the core network device can send an initial context establishment request message to the access network device Send the first list. If the access network device may be a target access network device accessed by the terminal device after handover, the core network device may send the first list to the access network device through a path switch response message.
  • the core network device may determine that the terminal device supports the first network before the core network device determines the identity of one or more first networks to which the terminal device subscribes.
  • the core network device may receive instruction information sent by the access network device, where the instruction information is used to instruct the core network device to send the terminal device to the access network device The identity of the one or more first networks to which you are subscribed.
  • the core network device can send the first list under the instruction of the access network device, thereby increasing flexibility.
  • the indication information can be used to indicate whether the core network device is handed over to the terminal device.
  • the later access target access network device sends the identification of one or more first networks subscribed by the terminal device.
  • the core network device may receive the third list sent by the access network device, and the third list is based on the subscription received by the access network device from the terminal device The information is ok.
  • the core network device can obtain the subscription information of the terminal device through the access network device, so that the first network to which the terminal device is subscribed can be determined.
  • the present application provides a communication method, which includes: a terminal device acquiring one or more second parameters sent by a second access network device to which a target cell corresponding to a target first network belongs; the terminal device Generating a verification parameter based on the stored one or more first parameters and the acquired one or more second parameters, where the verification parameter is used to enable the second access network device to verify the terminal device; The terminal device sends the verification parameter to a first access network device, and the first access network device is an access network device accessed by the terminal device.
  • the terminal device uses part of the parameters to generate verification parameters from the original storage, and part from the second access network device, so even if other devices receive the parameters sent by the second access network device, they cannot generate Correct verification parameters.
  • the embodiment of the present application can prevent other devices from accessing the second access network device, thereby improving network security.
  • the terminal device sends instruction information to the first access network device, where the instruction information is used to indicate the first parameter used by the terminal device when generating the verification parameter.
  • the first access network device can determine the specific content of the first parameter according to the instruction information, so that the terminal device can be accurately verified.
  • the terminal device may also receive an identifier of the target first network from the first access network device.
  • the terminal device can determine the target first network to access in the target cell according to the received identifier of the target first network, and switch to the target cell under the coverage of the second access network device.
  • this application provides a device, which may be a first access network device, or a chip or chipset in the first access network device; or, it may also be a second access network device, It can also be a chip or chipset in the second access network device; or it can be a core network device or a chip or chipset in a core network device; it can also be a terminal device or a terminal device Chips or chipsets.
  • the device may include a processing unit and a transceiving unit.
  • the processing unit when the apparatus is the first access network device, or the second access network device, or the core network device, or the terminal device, the processing unit may be a processor, and the transceiver unit may be The device may also include a storage unit, which may be a memory; the storage unit is used to store instructions, and the processing unit executes the instructions stored in the storage unit, so that the first access network device executes the first Or, the processing unit executes the instructions stored in the storage unit, so that the second access network device executes the corresponding functions in the second aspect; or, the processing unit executes the instructions stored in the storage unit Instructions to enable the core network device to execute the corresponding function in the foregoing third aspect; or, the processing unit executes the instruction stored in the storage unit, so that the terminal device executes the corresponding function in the foregoing fourth aspect.
  • a storage unit which may be a memory
  • the storage unit is used to store instructions, and the processing unit executes the instructions stored in the storage unit, so that the first access network device executes the first
  • the processing unit may be a processor, and the transceiving unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit to enable the first A chip or chipset in an access network device executes the corresponding function in the first aspect; or, the processing unit executes the instructions stored in the storage unit, so that the chip or chipset in the second access network device executes The corresponding function in the foregoing second aspect; or, the processing unit executes the instructions stored in the storage unit, so that the chip or chipset in the core network device performs the corresponding function in the foregoing third aspect; or, the processing unit executes The instructions stored in the storage unit enable the chip or chipset in
  • the storage unit may be a storage unit (for example, register, cache, etc.) in the chip or chipset, or a storage unit (for example, read-only memory, random memory, etc.) located outside the chip or chipset in the terminal device. Fetch memory, etc.).
  • an apparatus including a processor, a communication interface, and a memory.
  • the communication interface is used to transmit information, and/or messages, and/or data between the device and other devices.
  • the memory is used to store computer-executable instructions.
  • the processor executes the computer-executable instructions stored in the memory, so that the device executes the communication method according to the first aspect or any one of the first aspects.
  • the communication method according to any one of the above second aspect or the second aspect, or the communication method according to any one of the above third aspect or the third aspect, or any one of the above fourth aspect or the fourth aspect The communication method mentioned.
  • the present application also provides a communication system, which includes the first access network device in any embodiment of the foregoing first aspect, and the second access network device in any embodiment of the foregoing second aspect.
  • the present application also provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a computer, cause the computer to execute the methods described in the foregoing aspects.
  • this application also provides a computer program product including instructions, which when run on a computer, cause the computer to execute the methods described in the above aspects.
  • Figure 1A is a schematic diagram of a private network deployment provided by this application.
  • Figure 1B is a schematic diagram of another private network deployment provided by this application.
  • Figure 1C is an architecture diagram of a public network supporting private network services through the N3IWF interface provided by this application;
  • FIG. 2 is a schematic diagram of a communication system architecture provided by this application.
  • FIG. 3 is a schematic flowchart of a communication method provided by this application.
  • FIG. 4 is a schematic diagram of a flow of interaction between first information and second information provided by this application;
  • FIG. 5 is a schematic diagram of a movement process of a terminal device between the first networks provided by this application;
  • FIG. 6 is a schematic diagram of the movement process of another terminal device between the first networks provided by this application.
  • FIG. 7 is a schematic flowchart of another communication method provided by this application.
  • FIG. 8 is a schematic structural diagram of a communication device provided by this application.
  • FIG. 9 is a schematic structural diagram of a communication device provided by this application.
  • Private network is a concept relative to public network, which can be understood as a private network, such as an internal network built by a company, school, or factory.
  • UE User equipment
  • Private network is also called non-public network, or NPN.
  • NPN identification NPN ID
  • NPN ID private network identification
  • Different UEs support different NPN IDs. The UE can only use the NPN that it supports. The NPN corresponding to the ID resides, and services can only be initiated on the NPN corresponding to the NPN ID it has contracted.
  • the private network can be configured with private network-specific base stations and cells under the core network. UEs supporting the private network can reside and initiate services at the base station and core network.
  • the standard generally refers to this type of private network as standalone (standalone, SA) NPN cell. A possible deployment method is shown in Figure 1A.
  • the private network can also be a slice of the public network, that is, a slice in the public network can be configured as a private network, and all UEs can reside on the network. After the UE enters the connected state and initiates a service request, According to whether the service is a private network service, the network assigns the service of the UE to the corresponding private network slice.
  • the private network can also be a cell deployed by a public network operator.
  • Standards generally call this kind of private network a closed access group (CAG) cell, or a non-standalone (NSA) NPN cell.
  • CAG closed access group
  • NSA non-standalone
  • Private network services can be transmitted not only in the above three types of deployed networks, but also through the public network with a non-3GPP interworking function (N3IWF) interface with the private network. That is, the resources of the public network itself do not support direct private network services. Private network services can be transparently transmitted in the public network and then sent to the private network through the N3IWF interface.
  • N3IWF non-3GPP interworking function
  • a possible deployment method is shown in Figure 1C. When the private network data arrives at the data network (DN) of the public network, it is sent to the private network through the N3IWF interface.
  • the network equipment corresponding to method 1 ⁇ 3 can directly support private network services at the air interface, so it can be called direct support.
  • Method 4 The hollow interface does not support private network services, but needs to support private network services in the public network through N3IWF, so this transmission method can also become indirect support.
  • method 4 is described by taking the public network supporting private network services through N3IWF as an example, and there are also cases where the private network supports public network services through N3IWF.
  • FIG. 1C shows an architecture diagram of a public network supporting private network services through the N3IWF interface
  • the public network may include the public land mobile network (Public Land Mobile Network, PLMN) third-generation partnership plan (the 3rd generation partnership project, 3GPP) access (PLMN 3GPP access) node, access network equipment, user plane function entity (UPF), access and mobility management entity (access and mobility management function, AMF) , Session management function entity (session management function, SMF), DN, etc.
  • the private network may include the access network equipment, UPF, AMF, SMF, DN, etc. corresponding to the private network.
  • the public network and the private network can communicate through N3IWF.
  • the PLMN PLMN access of the public network is connected to the UPF of the public network through the N3 interface
  • the UE is connected to the AMF of the public network through the N1 interface
  • the PLMN PLMN access of the public network is connected to the AMF of the public network through the N2 interface
  • the AMF of the public network is connected to the AMF of the public network through the N2 interface.
  • the SMF of the public network is connected through N11
  • the SMF of the public network is connected with the UPF of the public network through the N4 interface
  • the UPF of the public network is connected with the DN of the public network
  • the DN of the public network is connected with the N3IWF.
  • the N3IWF is connected to the private network's UPF through the N3 interface
  • the N3IWF is connected to the private network's AMF through the N2 interface
  • the private network's UPF is connected to the private network's AMF through the N4 interface
  • the private network's AMF is connected to the private network's SMF through the N11 interface.
  • UEs can be simply divided into three categories: private network UEs, that is, UEs that only subscribe to private networks, such as smart phones in factories, etc.; UEs that support both private and public networks, such as Private network access personnel’s mobile phones; public network UEs, UEs that only subscribe to the public network, this type of UE is completely unsuitable for private networks.
  • private network UEs that is, UEs that only subscribe to private networks, such as smart phones in factories, etc.
  • UEs that support both private and public networks such as Private network access personnel’s mobile phones
  • public network UEs UEs that only subscribe to the public network, this type of UE is completely unsuitable for private networks.
  • the foregoing two are applicable to private networks
  • the third is UEs that are not applicable to private networks.
  • the communication method provided in the embodiments of the present application can be applied to a communication system.
  • the architecture of the communication system may be as shown in FIG. 2, including a first access network device, a second access network device, a core network device, and terminal devices.
  • the communication system involved in the embodiments of this application may be various communication systems, for example, it may be a long-term evolution (long term evolution, LTE), a fifth-generation (5G) communication system, or a hybrid architecture of LTE and 5G. , It can also be the future communication system.
  • Data transmission between the access network device and the terminal device in the communication system involved in the embodiments of the present application can, but is not limited to, through radio waves, visible light, laser, infrared, optical quantum, power line, optical fiber, coaxial cable, copper stranded wire, etc. .
  • a private network can be deployed in the communication system involved in the embodiments of the present application, where the deployment method of the private network can be, but is not limited to, the deployment method described in any one of FIGS. 1A to 1C.
  • the first access network device and the second access network device may be ordinary base stations (such as Node B or eNB), may be a new radio controller (NR controller), or may be in the 5G system gNode B (gNB), can be a centralized unit (CU), can be a new wireless base station, can be a remote radio module, can be a micro base station, can be a relay, or a distributed network
  • a distributed unit (DU) may be a reception point (transmission reception point, TRP) or a transmission point (transmission point, TP) or any other wireless access device, but the embodiment of the present application is not limited thereto.
  • the core network equipment may be a mobility management function (access and mobility management function, AMF).
  • AMF access and mobility management function
  • Terminal equipment also referred to as user equipment (UE) is a device that provides voice and/or data connectivity to users, such as handheld devices and vehicle-mounted devices with wireless connection functions.
  • UE user equipment
  • Common terminals include, for example, mobile phones, tablet computers, notebook computers, handheld computers, mobile internet devices (MID), wearable devices, such as smart watches, smart bracelets, pedometers, and so on.
  • MID mobile internet devices
  • wearable devices such as smart watches, smart bracelets, pedometers, and so on.
  • the embodiments of the present application provide a communication method to provide a mobility mechanism for terminal devices between private networks.
  • the method and the device are based on the same inventive concept. Since the principles of the method and the device to solve the problem are similar, the implementation of the device and the method can be referred to each other, and the repetition will not be repeated.
  • Multiple refers to two or more.
  • FIG. 3 is a flowchart of a communication method provided by an embodiment of this application.
  • the communication method provided in this application can be used in the communication system shown in FIG. 2. It can be understood that the communication system architecture shown in FIG. 2 is only an example.
  • the communication method provided by the embodiment of the present invention may be applicable to scenarios where a source access network device is switched to a target private network in various private network deployment scenarios.
  • the "private network” is only an exemplary naming, and the network with the “private network” function can also be named other, such as XX. It should be understood that if the XX also has the function of the private network in the embodiment of this application, XX can also be understood as the private network in the embodiment of this application.
  • "public network” is only an exemplary naming, and networks with public network functions can also be named other, such as XXX. It should be understood that if the XXX also has the function of the public network in the embodiment of this application, XXX can also be understood as the public network in the embodiment of this application.
  • the terminal device and/or the network device can perform some or all of the steps in the embodiment of this application. These steps or operations are only examples, and the embodiment of this application can also perform other operations or various Deformation of operation. In addition, each step may be executed in a different order presented in the embodiments of the present application, and it may not be necessary to perform all the operations in the embodiments of the present application.
  • the embodiments of the present application collectively refer to the network with private network function as the first network, and the network with public network function as the second network. It should be understood that this is only an exemplary naming and does not refer to the network. The naming is specifically limited.
  • the first access network device determines a target cell under the target first network based on a first list, where the first list includes an identifier of at least one first network subscribed by the terminal device.
  • the first access network device may be the source access network device that the terminal device accesses before handover.
  • the first access network may be an access network device that supports only the second network, it may also be an access network device that supports both the first network and the second network, or it may be an access network device that only supports the first network. Access network equipment.
  • the terminal device in the embodiment of the present application may only support the first network, or may support the first network and the second network.
  • the first access network device sends a first message to the second access network device to which the target cell belongs, where the first message is used to instruct the second access network device to prepare to switch the terminal device to the target cell.
  • the first message carries the second list and/or verification parameters.
  • the second list is used to enable the second access network device to determine the identities of at least one first network subscribed by the terminal device; the second list includes the identities of one or more first networks subscribed by the terminal device.
  • the second list may be determined according to the first list, and includes part or all of the identifications in the first list.
  • the verification parameter comes from the terminal device, and the verification parameter can be used by the second access network device to verify the terminal device.
  • the second access network may be an access network device supporting the first network, and may support any first network deployment, such as any one of the four first network deployments mentioned above, or other first network deployments. deploy.
  • the first access network device and the first network under the second access network device support communication, for example, direct communication may be performed, or communication may be performed through an N3IWF interface.
  • the verification parameter can be generated in the following manner: the second access network device sends one or more second parameters to the terminal device; the terminal device is based on the stored one or more first parameters and the acquired one or more The second parameter generates verification parameters.
  • the terminal device may send the verification parameter to the first access network device, and the first access network device is the access network device accessed by the terminal device.
  • the first message may also carry first indication information, and the first indication information is used to indicate the first parameter used by the terminal device when generating the verification parameter.
  • the first indication information may be specific content of the first parameter, may also be an index of the first parameter, or may also be information about the time when the terminal device receives the first parameter.
  • the first message may also carry the network identifier of the cell accessed by the terminal device in the first access network device. Specifically, if the cell accessed by the terminal device in the first access network device is the first network cell, the first message carries the identity of the first network corresponding to the cell, so that the second access network device receives the first network cell. After a message, when the identity of the target first network is the same as the identity of the first network corresponding to the cell, the subscription information of the terminal device can be determined.
  • the second access network device determines the identity of at least one first network subscribed by the terminal device based on the second list. If the first message carries the verification parameter, the second access network device verifies the terminal device based on the verification parameter.
  • the second access network device may determine the identification of at least one first network of the terminal device based on the second list, that is, the subscription information of the terminal device, so that the second access network device may be based on the determination when the terminal device subsequently switches
  • the contract information selects the target cell for the terminal device.
  • the second access network device may also send a second message to the first access network device, where the second message is used to confirm that the second access network device allows the terminal device to switch to the target cell.
  • the first access network device may receive the second message sent by the second access network device.
  • the second message may carry the identity of the first network to which the target cell belongs.
  • the second access network device may send the second message when the terminal device is successfully verified based on the verification parameter.
  • the second access device may also send the second message when the terminal device is successfully verified based on the verification parameter and the terminal device is allowed to switch to the target cell based on the load condition of the second access network device.
  • the second access device may also combine other information to determine to allow the terminal device to switch to the target cell and send the second message, which will not be listed here.
  • the source access network device determines the target cell under the target private network based on the identity of at least one private network subscribed by the terminal device, and can select a reasonable handover target for the terminal device.
  • the target access network device can verify the terminal device based on the second list and/or verification parameters sent by the source access network device, thereby determining the terminal Reliability, legality, safety, etc. of equipment.
  • the first access network device may receive the first list sent by the terminal device. Specifically, the first access network device may receive the subscription information sent by the terminal device, and determine the first list according to the subscription information.
  • the first access network device may also receive the first list sent by the core network device.
  • the first access network device may receive the initial context establishment request message or the path switch confirmation message sent by the core network device, and the initial context establishment request message or the path switch confirmation message carries the first list.
  • the first access network device may further send second indication information to the core network device. The second indication information is used to indicate whether the core network device needs one or more identities of the first network subscribed by the terminal device.
  • the core network device may send one or more first network identities subscribed by the terminal device to the second access network device.
  • the identity of the network For example, the core network device may send an initial context establishment request message or a path switch confirmation message, and the first list is carried in the initial context establishment request message or path switch confirmation message.
  • the function of the second indication information can also be implemented implicitly, for example, by whether to carry a certain information element, which is used to indicate whether the core network device needs one or more first network subscribed by the terminal device. logo.
  • the core network device may receive a third list sent by the first access network device.
  • the third list is determined based on the subscription information from the terminal device received by the access network device.
  • the third list includes the subscription information of the terminal device.
  • the core network device may determine the fourth list based on the subscription information of the terminal device stored in the CN, and the fourth list includes the identities of one or more first networks to which the terminal device subscribes.
  • the core network device sends the fourth list to the access network device.
  • first list, second list, third list, and fourth list in the embodiments of the present application may be the same or different.
  • the first access network device may also receive first information sent by the second access network device, where the first information includes at least one of the following information: the identifier of the first network covered by the second access network device (eg, the first 2.
  • the second access network device supports the identification of the second network that communicates through N3IWF
  • the identification of the first network that supports communication with the second access network device for example, the second access network device belongs to the second network
  • the second access network device supports the identification of the first network that communicates through the N3IWF).
  • the first information may also include at least one of the following information: cell information under the coverage of the second access network device that supports communication with the second network corresponding to the first network, and support under the coverage of the second access network device Cell information corresponding to the second network in communication with the first network.
  • the first information may also include at least one of the following information: the identifier of the first network under the coverage of the adjacent access network device of the second access network device, and the second network that supports communication with the adjacent access network device.
  • the identification of the first network that supports communication with adjacent access network equipment, the cell information corresponding to the first network that supports communication with the second network under the coverage of adjacent access network equipment, and the coverage of adjacent access network equipment Supports cell information corresponding to the second network communicating with the first network under.
  • the first access network device determines the target cell in the target first network based on the first list, it may determine the target cell in the target first network based on the first list and the first information.
  • the first access network device may also send second information to the second access network device, where the second information includes at least one of the following information: the identity of the first network covered by the first access network device (e.g., The CAG ID information, NPN ID information, etc. of the first network cell under the first access network device, the identity of the second network that supports communication with the first access network device, and the second network that supports communication with the first access network device.
  • the second information may also include the following information: the identification of the first network covered by the adjacent access network device of the first access network device, the identification of the second network that supports communication with the adjacent access network device, and The identity of the first network communicating with the adjacent access network equipment, the cell information corresponding to the first network communicating with the second network under the coverage of the adjacent access network equipment, and the support and support under the coverage of the adjacent access network equipment Cell information corresponding to the second network communicated by the first network.
  • the first access network device and the second access network device can exchange the first information and the second information in any of the following ways:
  • Manner 1 The first access network device sends a first request to the second access network device, and the first request carries the second information. After that, the second access network device sends a first response to the first access network device, where the first response carries the first information. As shown in Figure 4.
  • Manner 2 The second access network device sends a first request to the first access network device, and the first request carries the first information. After that, the first access network device sends a first response to the second access network device, where the first response carries the second information.
  • the first request may be an Xn interface setup request (Xn setup request) message
  • the first response may be an Xn interface setup response (Xn setup response) message
  • the first request may be a configuration update message
  • the first response may be a configuration update confirmation message.
  • the first access network device may also send the second neighboring cell information to the terminal device.
  • the second neighboring cell information may be determined based on the second information.
  • the second access network device may also send the first neighboring cell information to the terminal device.
  • the first neighboring cell information may be determined according to the first information.
  • the first neighboring cell information or the second neighboring cell information may be sent to the terminal device through a system message, or the first neighboring cell information or the second neighboring cell information may be sent to the terminal device based on a request of the terminal device.
  • the core network device may first determine that the terminal device supports the first network. In a specific implementation, when a terminal device accesses the first access network device, the core network device may recognize that the terminal device supports the first network.
  • the first access network device supports only the second network and the second access network device supports the first network as an example.
  • the movement process between the two is described in detail.
  • the movement process of the terminal device between the first networks may be as shown in FIG. 5, including:
  • the core network device recognizes that the terminal device supports the first network.
  • the core network device may identify that the terminal device supports the first network based on the contract information of the terminal device stored in the CN.
  • the core network device may also determine that the terminal device supports the first network based on the capability of the terminal device.
  • the terminal device may actively send a list of the first network supported by the terminal device to the first access network device, and the first access network device forwards the list to the core network device to trigger the core network device to verify the terminal device.
  • the terminal device may actively send the information of the first network supported by the terminal device (for example, capability information or indication information for supporting the first network, etc.) to the first access network device, and the first access network device sends the information to the core
  • the network device sends instruction information to trigger the core network device to verify the terminal device or send the identity of the first network subscribed by the terminal device.
  • the first access network device receives the first list. Specifically, the first access network device receives the first list sent by the terminal device or the core network device.
  • the core network device may directly send the first list to the first access network device when the terminal device is accessing.
  • the core network device may also send the first list to the first access network device after the first network verification of the terminal device is passed.
  • the core network device may also send the first list to the first access network device after receiving the instruction information sent by the first access network device, where the instruction information is used to instruct the core network device whether to send the first access network device contracted by the terminal device. The identity of the network.
  • the core network device may send the first list with the first access network device through the initial context establishment request message. Further, the first access network device may send an initial context establishment response to the core network device after receiving the initial context establishment request message.
  • the first access network device sends measurement configuration information to the terminal device.
  • the measurement configuration information includes one or more cell or frequency point information.
  • the measurement configuration information is used to instruct the terminal device to perform the measurement on the cell or frequency point in the measurement configuration information. measuring.
  • the measurement configuration information may include at least one cell or frequency point information corresponding to the first network.
  • the measurement configuration information may include the identity of the first network and at least one cell or frequency point information corresponding to the identity of the first network.
  • S504 The terminal device sends the measurement result to the first access network device.
  • the measurement result may include the identification of the first network.
  • the first access network device sends a first message to the second access network device, where the first message is used to instruct the second access network device to prepare to switch the terminal device to the target cell, and the first message carries the second list.
  • the first access network device may be based on the identity of the first network subscribed by the terminal device, the identity of the first network in the measurement results reported by the terminal device, and the support of the second access network device (including direct support or through N3IWF The identification of the first network that supports two cases) determines the target cell under the second access network device.
  • the identifier of the first network supported by the second access network device may be determined by the first access network device according to the first information.
  • the second list is used to enable the second access network device to determine the identities of at least one first network subscribed by the terminal device; the second list includes the identities of one or more first networks subscribed by the terminal device.
  • the second list may be determined according to the first list, and includes part or all of the identifications in the first list.
  • the second list may be the first list, or the second list may also be the identity of the first network verified in the first list, or the second list may be the second list verified in the first list.
  • the identification of the first network supported by the access network device (including direct support or through N3IWF support), or the second list can also be the identification of the first network device in the first list that supports communication with the first access network device
  • the second list can also be the identification of the first network device that has been verified in the first list and supports communication with the first access network device
  • the second list can also be the terminal device in the first list
  • the identification of the first network that is included in the sent measurement result and that the second access network device supports will not be listed here.
  • the second access network device sends a second message to the first access network device, where the second message is used to confirm that the second access network device allows the terminal device to switch to the target cell.
  • the second message may carry the identification of the target first network.
  • the first access network device may send the identification of the target first network to the terminal device.
  • the first access network device may send the identification of the target first network to the terminal device through an RRC reconfiguration message.
  • the identifier of the target first network is used for the terminal device to determine the target first network to access in the target cell. For example, when the target cell sends multiple or one first network identities, the terminal device may determine the target first network to access in the target cell according to the received identity of the target first network.
  • S507 The terminal device switches to the target cell covered by the second access network device.
  • the terminal device can determine the target first network to access in the target cell according to the received identifier of the target first network, and switch to the target cell under the coverage of the second access network device.
  • the second access network device sends a third message to the core network device, where the third information is used to instruct the core network device to perform path switching.
  • the third message may carry second indication information, and the second indication information is used to indicate whether the core network device sends the identification of one or more first networks subscribed by the terminal device.
  • the function of the second indication information can also be implemented implicitly, for example, by whether to carry a certain information element, which is used to indicate whether the core network device needs one or more first network subscribed by the terminal device. logo.
  • the core network device sends a fourth message to the second access network device, where the fourth message is used to confirm the completion of the path switching of the core network device.
  • the fourth message carries a fourth list, and the fourth list includes one or more subscribed by the terminal device The identity of the first network.
  • the fourth message does not carry the fourth list.
  • the movement process of the terminal device between the first networks may be as shown in FIG. 6, including:
  • the first access network device sends measurement configuration information to the terminal device, where the measurement configuration information includes at least one identifier of the first network, and/or includes at least one cell or frequency information corresponding to the identifier of the first network.
  • S602 The terminal device performs measurement according to the measurement configuration information of the first access network device.
  • the terminal device may further read the system message of the target cell to obtain the identity of the first network corresponding to the target cell.
  • S603 The terminal device obtains one or more second parameters sent by the target cell.
  • the terminal device may obtain one or more second parameters in the system message sent by the target cell; or, the terminal device may initiate a request message to request the target cell to send one or more second parameters.
  • the terminal device generates a verification parameter according to the acquired one or more second parameters and one or more pre-stored first parameters.
  • the verification parameter can be at the cell level or at the NPN ID level.
  • the one or more first parameters may be pre-configured by the terminal device, or the one or more first parameters may also be received and stored when the terminal device accesses the first network before.
  • the terminal device sends a verification parameter to the first access network device.
  • the terminal device may send a measurement result to the first access network, and the measurement result carries the verification parameter.
  • the measurement result may also carry first indication information, which is used to indicate the first parameter used by the terminal device when generating the verification parameter.
  • the first indication information may be specific content of the first parameter, may also be an index of the first parameter, or may also be information about the time when the terminal device receives the first parameter.
  • the first access network device sends a first message to the second access network device, where the first message is used to instruct the second access network device to prepare to switch the terminal device to the target cell, and the first message carries the Verify the parameters.
  • the first message may also carry first indication information.
  • the second access network device verifies the terminal device based on the verification parameter.
  • step S608 is executed.
  • the second access network device sends a second message to the first access network device, where the second message is used to confirm that the second access network device allows the terminal device to switch to the target cell.
  • the second message may carry the identification of the target first network.
  • the first access network device may send the identification of the target first network to the terminal device.
  • the first access network device may send the identification of the target first network to the terminal device through an RRC reconfiguration message.
  • the identifier of the target first network is used for the terminal device to determine the target first network to access in the target cell. For example, when the target cell sends multiple or one first network identities, the terminal device may determine the target first network to access in the target cell according to the received identity of the target first network.
  • S609 The terminal device switches to a target cell covered by the second access network device.
  • the terminal device can determine the target first network to access in the target cell according to the received identifier of the target first network, and switch to the target cell covered by the second access network device.
  • the second access network device sends a third message to the core network device, where the third information is used to instruct the core network device to perform path switching.
  • the core network device sends a fourth message to the second access network device, where the fourth message is used to confirm the completion of the path switching of the core network device.
  • Figure 4, Figure 5, and Figure 6 can be implemented as a single solution, or they can be implemented in combination, as shown in Figure 4 ⁇ any two of Figure 6 can be combined as one project, or Figure 4 ⁇ Figure 6 can be combined as one Program implementation.
  • the terminal equipment includes a radio resource control (radio resource control, RRC) connected state (RRC_connected), an RRC idle state (RRC_idle), an inactive state or a deactivated state (inactive).
  • RRC radio resource control
  • RRC_connected radio resource control connected state
  • RRC_idle RRC idle state
  • inactive terminal device may include at least one of the following features:
  • the terminal device and the access network device that configures the terminal device to enter inactive retain the access layer context information of the UE.
  • the access network device that configures the terminal device to enter the inactive becomes the anchor access network device.
  • the Anchor access network equipment maintains the control plane and user plane connection between the terminal equipment and the core network equipment; the Anchor access network equipment allocates the radio access network ((radio access network, RAN)-based notification area (RNA) for the terminal equipment ), the terminal device only performs periodic RNA update (RNAU) in the RNA.
  • the terminal device removes the RNA, the terminal device sends the RNAU triggered by mobility.
  • Anchor access network equipment assigns inactive radio network temporary identifier (I-RNTI) to terminal equipment.
  • I-RNTI can be used to identify the anchor access network equipment and uniquely identify the anchor access network equipment Terminal Equipment.
  • the terminal equipment performs cell reselection.
  • DRX discontinuous reception
  • the anchor access network equipment of the inactive terminal equipment and the control plane and user plane connections of the core network equipment are maintained. Therefore, when the downlink data of the terminal equipment arrives, the core network equipment directly sends the data to the anchor access network equipment.
  • the anchor access network equipment needs to page the terminal equipment in the entire RNA, so RAN-based paging needs to be introduced to implement the paging function triggered by the access network equipment.
  • the access network device in the RNA sends a paging message on the air interface to page the terminal device. At this time, it only needs to carry the I-RNTI allocated by the anchor access network device for the UE.
  • the terminal device When a terminal device responds to a paging or initiates an access on another access network device, the terminal device sends an I-RNTI to the other access network device, and the other access network device can identify the anchor access network device based on the I-RNTI and obtain The terminal device accesses the context information of the network device in the anchor. Therefore, other access network devices can configure the terminal device to enter the connected state when sending msg4, which can greatly shorten the time delay for the terminal device to enter the connected state, and save air interface signaling overhead.
  • the inactive state can also be considered, which can further save UE energy consumption while supporting fast state transitions.
  • an embodiment of the present application provides a communication method to provide adaptive modification of inactive-related configuration information to support the first network scenario.
  • FIG. 7 is a flowchart of a communication method provided by an embodiment of this application.
  • the communication method provided in this application can be used in the communication system shown in FIG. 2.
  • the communication method provided by the embodiment of the present invention may be applicable to scenarios where a source access network device is switched to a target private network in various private network deployment scenarios.
  • the first access network device obtains the identity of the first network subscribed by the terminal device.
  • the method for the first access network device to obtain the identity of the first network subscribed by the terminal device may be obtained from the core network device, may also be obtained from the terminal device, or may be obtained from other access network devices.
  • the example does not limit this.
  • the first access network device sends an RNA configuration including at least one NPN ID to the terminal device.
  • the first access network device configures the terminal device to enter inactive
  • the first access network device sends an RNA configuration including at least one NPN ID to indicate the notification area of the first network of the terminal device.
  • the first access network device may also send RAN paging to the second access network device.
  • the RAN paging message carries at least one NPN ID to indicate that the second access network device only needs to be in the corresponding NPN ID. Paging terminal equipment in a small area.
  • the second access network device may be any access network device in the RNA configuration of the terminal device.
  • the first access network device may initiate RAN paging to other access network devices in the RNA, and the RAN paging carries at least one NPN ID.
  • the first access network device may also send terminal device context information to the third access network device, where the terminal context information includes the RNA configuration including at least one NPN ID configured by the first access network device for the terminal device.
  • the third access network device may be any access network device in the RNA configuration of the terminal device. It is understandable that the second access network device and the third access network device may be the same access network device, or may be different access network devices.
  • the new access network device may send a request message to the first access network device, and the request message is used to request the terminal Context information of the device; if the first access network device determines to forward the context information of the terminal device, the first access network device sends the context information of the terminal device to the new access network device, and the context information of the terminal device includes the first An RNA configuration including at least one NPN ID configured by an access network device for a terminal device.
  • the communication method shown in FIG. 3 and the communication method shown in FIG. 7 can be implemented separately as one solution, or can be combined as one solution.
  • the embodiment of the present application provides a communication device.
  • the structure of the device may be as shown in FIG. 8, including a transceiver unit 801, and may also include a processing unit 802.
  • the communication device may be specifically used to implement the method executed by the first access network device in the embodiment shown in FIG. 3.
  • the device may be the first access network device itself, or the first access network device itself.
  • the processing unit 802 is configured to determine a target cell in the target first network based on a first list, and the first list includes an identifier of at least one first network subscribed by the terminal device.
  • the transceiver unit 801 is configured to send a first message to the second access network device to which the target cell belongs, the first message is used to instruct the second access network device to prepare to switch the terminal device to the target cell, and the first message carries the second list and / Or verification parameters, the second list is used to enable the second access network device to determine the identity of at least one first network subscribed by the terminal device; the verification parameters come from the terminal device, and the verification parameters are used to enable the second access The network equipment verifies the terminal equipment.
  • the transceiver unit 801 may also be used to receive the first list sent by the terminal device.
  • the transceiver unit 801 may also be used to receive the first list sent by the core network device.
  • the transceiving unit 801 may also be configured to receive first information sent by a second access network device, where the first information includes at least one of the following information: the identity of the first network covered by the second access network device, the support and the first information Second, the identification of the second network that the access network device communicates with, the identification of the first network that supports communication with the second access network device, and the identification of the first network under the coverage of the second access network device that supports communication with the second network. Cell information and cell information corresponding to the second network under the coverage of the second access network device that supports communication with the first network.
  • the processing unit 802 when determining the target cell in the target first network based on the first list, may be specifically configured to determine the target cell in the target first network based on the first list and the first information.
  • the first message may also carry indication information.
  • the indication information is used to indicate the first parameter used by the terminal device when generating the verification parameter.
  • the first parameter is a parameter pre-stored by the terminal device for generating the verification parameter.
  • the transceiver unit 801 may also be used to receive a second message sent by the second access network device, the second message is used to confirm that the second access network device allows the terminal device to switch to the target cell, and the second message carries the information to which the target cell belongs The identity of the first network.
  • the transceiver unit 801 may also be configured to send the identification of the target first network to the terminal device.
  • the communication device may be specifically used to implement the method executed by the second access network device in the embodiment of FIG. 3.
  • the device may be the second access network device itself or the second access network device.
  • the chip or chipset or part of the chip used to perform related method functions in the networked device.
  • the transceiving unit 801 is configured to receive a first message sent by a first access network device, and the first message is used to instruct the second access network device to prepare to switch the terminal device to the target cell.
  • the first message carries a second list and/or verification parameters
  • the second list includes one or more identities of the first network subscribed by the terminal device
  • the second list is used to enable the second access network device to determine The identification of at least one first network subscribed by the terminal device
  • the verification parameter is used to enable the second access network device to verify the terminal device.
  • the processing unit 802 is configured to determine the identity of at least one first network subscribed by the terminal device based on the second list when the first message carries the second list. And/or, when the first message carries the verification parameter, the terminal device is verified based on the verification parameter.
  • the transceiving unit 801 may also be used to send a second message to the first access network device, where the second message is used to confirm that the second access network device allows the terminal device to switch to the target cell.
  • the second message carries the identity of the first network to which the target cell belongs.
  • the transceiver unit 801 may also be used to send a third message to the core network device, the third information is used to instruct the core network device to perform path switching, the third message carries indication information, and the indication information is used to indicate whether the core network device sends the terminal device The identity of the one or more first networks that are subscribed.
  • the transceiver unit 801 may also be used to receive a fourth message sent by the core network device.
  • the fourth message is used to confirm the completion of the core network device path switch.
  • the fourth message carries a fourth list.
  • the fourth list includes one or IDs of multiple first networks.
  • the transceiver unit 801 may also be used to send one or more second parameters to the terminal device, and the one or more second parameters are used to generate verification parameters.
  • the first message may also carry instruction information.
  • the instruction information is used to instruct the terminal device to use one or more first parameters when generating the verification parameters.
  • the first parameters are pre-stored by the terminal device for generating the verification parameters. parameter.
  • the communication device can be specifically used to implement the method executed by the core network device in the embodiment of FIG. 3.
  • the device can be the core network device itself, or the chip or chipset in the core network device. Or a part of the chip used to perform related method functions.
  • the processing unit 802 is configured to determine the identity of one or more first networks subscribed by the terminal device.
  • the transceiver unit 801 is configured to send a first list to the access network device, where the first list includes the identities of one or more first networks subscribed by the terminal device.
  • the transceiver unit 801 may be specifically configured to send an initial context establishment request message or a path switch response message to the access network device, and the initial context establishment request message or path switch response message carries the first list.
  • the processing unit 802 may also be configured to determine that the terminal device supports the first network before determining the identity of the one or more first networks subscribed by the terminal device.
  • the transceiving unit 801 may also be used to receive instruction information sent by the access network device, where the instruction information is used to instruct the core network device to send the identification of one or more first networks subscribed by the terminal device to the access network device.
  • the transceiver unit 801 may also be configured to receive a third list sent by the access network device, the third list being determined according to the subscription information from the terminal device received by the access network device.
  • the communication device may be specifically used to implement the method executed by the terminal device in the embodiment of FIG. 3.
  • the device may be the terminal device itself, or the chip or chipset or chip in the terminal device. Used to perform part of the related method function.
  • the transceiver unit 801 is configured to obtain one or more second parameters sent by the second access network device to which the target cell corresponding to the target first network belongs.
  • the processing unit 802 is configured to generate verification parameters based on the stored one or more first parameters and the acquired one or more second parameters, where the verification parameters are used to enable the second access network device to verify the terminal device.
  • the transceiver unit 801 is further configured to send verification parameters to the first access network device, which is the access network device accessed by the terminal device.
  • the transceiver unit 801 may also be used to send instruction information to the first access network device, where the instruction information is used to indicate the first parameter used by the terminal device when generating the verification parameter.
  • the transceiving unit 801 may also be configured to receive an identifier of the target first network from the first access network device. Thereby, the communication device can determine the target first network to be accessed in the target cell according to the received identifier of the target first network, and switch to the target cell covered by the second access network equipment.
  • the division of modules in the embodiments of this application is illustrative, and it is only a logical function division. In actual implementation, there may be other division methods.
  • the functional modules in each embodiment of this application can be integrated into one process. In the device, it can also exist alone physically, or two or more modules can be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It can be understood that the functions or implementations of the various modules in the embodiments of the present application may further refer to the related descriptions of the method embodiments.
  • the communication device may be as shown in FIG. 9.
  • the device may be a first access network device, or a chip in the first access network device; or, it may be a second access network device.
  • the device may also be a chip in the second access network device; or it may be a core network device or a chip in a core network device; it may also be a terminal device or a chip in a terminal device.
  • the communication device may include a processor 901, a communication interface 902, and a memory 903.
  • the processing unit 802 may be a processor 901.
  • the transceiver unit 801 may be a communication interface 902.
  • the processor 901 may be a central processing unit (central processing unit, CPU), or a digital processing module, and so on.
  • the communication interface 902 may be a transceiver, an interface circuit such as a transceiver circuit, etc., or a transceiver chip, etc.
  • the communication device further includes: a memory 903, configured to store a program executed by the processor 901.
  • the memory 903 may be a non-volatile memory, such as a hard disk drive (HDD) or a solid state drive
  • solid-state drive, SSD can also be volatile memory (volatile memory), such as random-access memory (RAM).
  • RAM random-access memory
  • the memory 903 is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited thereto.
  • the processor 901 is configured to execute the program code stored in the memory 903, and is specifically configured to execute the actions of the above-mentioned processing unit 802, which will not be repeated in this application.
  • the embodiment of the present application does not limit the specific connection medium between the communication interface 902, the processor 901, and the memory 903.
  • the memory 903, the processor 901, and the communication interface 902 are connected by a bus 904 in FIG. 9.
  • the bus is represented by a thick line in FIG. 9, and the connection modes between other components are merely illustrative. , Is not limited.
  • the bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one thick line is used in FIG. 9 to represent, but it does not mean that there is only one bus or one type of bus.
  • the embodiment of the present invention also provides a computer-readable storage medium for storing computer software instructions required to execute the above-mentioned processor, which contains a program required to execute the above-mentioned processor.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • These computer program instructions can also be stored in a computer-readable memory that can direct a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé, un appareil et un système de communication destinés à être utilisés dans un réseau privé pour fournir un mécanisme de mobilité d'un dispositif terminal prenant en charge le réseau privé. Le procédé comprend les étapes au cours desquelles : un premier dispositif de réseau d'accès détermine une cellule cible dans un premier réseau cible sur la base d'une première liste, la première liste contenant au moins un identifiant d'un premier réseau signé par un dispositif terminal ; et le premier dispositif de réseau d'accès envoie un premier message à un second dispositif de réseau d'accès de la cellule cible, le premier message étant utilisé pour indiquer que le second dispositif de réseau d'accès est préparé pour commuter le dispositif terminal vers la cellule cible. Le premier message transporte une seconde liste et/ou un paramètre de vérification. La seconde liste est utilisée pour permettre au second dispositif de réseau d'accès de déterminer ledit au moins un identifiant du premier réseau signé par le dispositif terminal. Le paramètre de vérification provient du dispositif terminal et il est utilisé pour permettre au second dispositif de réseau d'accès de vérifier le dispositif terminal.
PCT/CN2020/074026 2019-01-31 2020-01-23 Procédé, appareil et système de communication Ceased WO2020156488A1 (fr)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CA3128415A CA3128415C (fr) 2019-01-31 2020-01-23 Procede, appareil et systeme de communication
AU2020214502A AU2020214502B2 (en) 2019-01-31 2020-01-23 Communication method, apparatus, and system
ES20748897T ES3024994T3 (en) 2019-01-31 2020-01-23 Communication method, apparatus, and system
EP20748897.4A EP3917190B1 (fr) 2019-01-31 2020-01-23 Procédé, appareil et système de communication
US17/390,267 US12010576B2 (en) 2019-01-31 2021-07-30 Communication method, apparatus, and system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201910098742 2019-01-31
CN201910098742.5 2019-01-31
CN201910937699.7A CN111510923A (zh) 2019-01-31 2019-09-30 一种通信方法、装置及系统
CN201910937699.7 2019-09-30

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/390,267 Continuation US12010576B2 (en) 2019-01-31 2021-07-30 Communication method, apparatus, and system

Publications (1)

Publication Number Publication Date
WO2020156488A1 true WO2020156488A1 (fr) 2020-08-06

Family

ID=71840377

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/074026 Ceased WO2020156488A1 (fr) 2019-01-31 2020-01-23 Procédé, appareil et système de communication

Country Status (1)

Country Link
WO (1) WO2020156488A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115243401A (zh) * 2021-04-22 2022-10-25 展讯通信(上海)有限公司 业务处理方法、装置、系统、可读取存储介质和电子设备
CN116349325A (zh) * 2021-01-14 2023-06-27 Oppo广东移动通信有限公司 寻呼方法和网络节点

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107105501A (zh) * 2016-02-19 2017-08-29 电信科学技术研究院 一种基于网络分片的寻呼方法、装置和系统
CN107318113A (zh) * 2016-04-27 2017-11-03 华为技术有限公司 网络切片处理方法和装置
WO2018027995A1 (fr) * 2016-08-12 2018-02-15 华为技术有限公司 Procédé et dispositif de radiorecherche
CN108616950A (zh) * 2016-12-28 2018-10-02 电信科学技术研究院 无线接入网络间的移动性管理方法、核心网设备及基站

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107105501A (zh) * 2016-02-19 2017-08-29 电信科学技术研究院 一种基于网络分片的寻呼方法、装置和系统
CN107318113A (zh) * 2016-04-27 2017-11-03 华为技术有限公司 网络切片处理方法和装置
WO2018027995A1 (fr) * 2016-08-12 2018-02-15 华为技术有限公司 Procédé et dispositif de radiorecherche
CN108616950A (zh) * 2016-12-28 2018-10-02 电信科学技术研究院 无线接入网络间的移动性管理方法、核心网设备及基站

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3GPP: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on 5GS Enhanced support of Vertical and LAN Services(Release 16)", 3GPP TR 23.734 V1.0.0, 31 December 2018 (2018-12-31), pages 1 - 106, XP051591084 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116349325A (zh) * 2021-01-14 2023-06-27 Oppo广东移动通信有限公司 寻呼方法和网络节点
CN115243401A (zh) * 2021-04-22 2022-10-25 展讯通信(上海)有限公司 业务处理方法、装置、系统、可读取存储介质和电子设备

Similar Documents

Publication Publication Date Title
US12010576B2 (en) Communication method, apparatus, and system
US11528761B2 (en) Communication method and communications apparatus
CN112996087B (zh) 一种网络切片选择方法、终端设备及网络设备
KR102284317B1 (ko) 통신 방법, 코어 네트워크 디바이스 및 액세스 네트워크 디바이스
CN111867057B (zh) 通信方法、装置和系统
WO2019157961A1 (fr) Procédé et appareil de communication
WO2023024931A1 (fr) Procédé et appareil de communication entre dispositifs
WO2020164418A1 (fr) Procédé de mesure, dispositif terminal, et dispositif de réseau
EP4373164A1 (fr) Procédé de communication par relais, appareil de communication et système de communication
WO2023104070A1 (fr) Procédé et appareil de sélection d'un serveur applicatif de périphérie
CN109691166B (zh) 无线通信网络中的相邻网络节点的识别
CN111988772A (zh) 终端发现方法及设备
WO2022022082A1 (fr) Procédé de communication et appareil de communication
JP2019525642A (ja) 通信方法、端末デバイス、およびアクセスネットワークデバイス
EP4447577A1 (fr) Procédé et appareil de communication de diffusion
WO2020156488A1 (fr) Procédé, appareil et système de communication
JP2025510952A (ja) 通信方法、端末デバイス、およびコアネットワークデバイス
WO2021088007A1 (fr) Procédé de communication sans fil, dispositif terminal et dispositif réseau
TWI733828B (zh) 無線通訊的方法、裝置、終端和基地台
CA3128415C (fr) Procede, appareil et systeme de communication
CN115334564A (zh) 一种定位方法及装置
WO2018018612A1 (fr) Procédé d'accès à une cellule inter-rat, et dispositif associé
WO2021134377A1 (fr) Appareil et procédé d'accès à une tranche de réseau
JP7726286B2 (ja) 無線通信装置、無線通信システム及び無線通信方法
WO2018202052A1 (fr) Procédé d'indication de changement d'informations de système, dispositif côté réseau et terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20748897

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3128415

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020214502

Country of ref document: AU

Date of ref document: 20200123

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2020748897

Country of ref document: EP

Effective date: 20210827