[go: up one dir, main page]

WO2022116809A1 - Random access method, apparatus and system - Google Patents

Random access method, apparatus and system Download PDF

Info

Publication number
WO2022116809A1
WO2022116809A1 PCT/CN2021/130862 CN2021130862W WO2022116809A1 WO 2022116809 A1 WO2022116809 A1 WO 2022116809A1 CN 2021130862 W CN2021130862 W CN 2021130862W WO 2022116809 A1 WO2022116809 A1 WO 2022116809A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
access
random access
terminal device
temporary mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2021/130862
Other languages
French (fr)
Chinese (zh)
Inventor
银宇
戚彩霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2022116809A1 publication Critical patent/WO2022116809A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • the present application relates to the field of communications, and more particularly, to a method, apparatus and system for random access.
  • the terminal device sends an initial uplink transmission message to the access node, and if the terminal device is allowed to access, the access node sends a contention resolution message to the terminal device.
  • both the above-mentioned initial uplink transmission message and the contention resolution message may carry the wireless access user identity, and the wireless access user identity may be used to identify the terminal equipment in the random access process.
  • the terminal device learns whether it has successfully accessed by judging whether the wireless access user identity carried in the contention resolution message is consistent with the wireless access user identity carried in the initial uplink transmission message by itself.
  • the composition structure of the wireless access user identity includes a temporary mobile user identity, and the temporary mobile user identity is a part of the fields in the globally unique temporary mobile user identity.
  • the temporary mobile user identity is used to identify or find the context of the terminal device stored on the network device.
  • a randomization field is left in the temporary mobile user identity, so that the globally unique temporary user identity of the terminal device can change frequently.
  • the current global unique temporary user identity allocation management mechanism has been unable to meet the increasing demands of users.
  • the globally unique temporary user ID can be extended by extending the temporary mobile user ID.
  • the extension of the temporary mobile user identity leads to the change of the wireless access user identity, which may lead to the access failure of the terminal equipment in the random access process, and reduce the random access success rate.
  • the present application provides a method, device and system for random access, which can still achieve successful access of terminal equipment in the random access process and ensure the success rate of random access even when the length of the temporary mobile user identity is extended.
  • a random access method comprising: generating a random access identifier by a terminal device, where the random access identifier is used to identify the terminal device in a random access process;
  • the node sends a first request message, the first request message includes the random access identifier, and the first request message is used to request access to the wireless network in the random access process;
  • the terminal device receives the first request from the access node.
  • a response message, the first response message includes the random access identifier; wherein, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits .
  • the random access identifier sent and received by the terminal device is The extended temporary mobile user identity is not directly included in the composition structure, but the random access identity is generated by the terminal device itself.
  • the terminal device when the length of the temporary mobile user identity is greater than the length of the random access identity, the terminal device generates a random access identity that meets the length requirement, so that the terminal device can access the random access process normally. wireless network.
  • the terminal device sends a radio resource control RRC connection establishment complete message to the access node; wherein, the RRC connection establishment complete message includes the service temporary of the terminal device.
  • the RRC connection establishment complete message includes the service temporary of the terminal device.
  • a mobile user identity, the serving temporary mobile user identity includes the temporary mobile user identity and the identity of the first access management node.
  • RRC connection establishment complete message has no length limit, and the service temporary mobile user identity after the length extension can be directly sent.
  • the network device can allocate non-conflicting globally unique temporary user IDs to more users, and can ensure that the globally unique temporary user IDs Sufficient randomization field space, higher security.
  • the generating, by the terminal device, the random access identifier includes: the terminal device generating the random access identifier according to the temporary mobile user identifier; or, the terminal device generating the random access identifier according to the first
  • a globally unique temporary user identifier generates the random access identifier through a specific algorithm, and the composition structure of the first globally unique temporary user identifier includes the temporary mobile user identifier; or, the terminal device generates a random number as the random access identifier .
  • the terminal device generates the random access identifier according to the temporary mobile user identifier, including:
  • the random access identifier is generated according to the temporary mobile user identifier and a specific algorithm.
  • the random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the random access identifier is generated according to the identifier related to the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the random access identifier is generated according to the temporary mobile user identifier, other fields in the service temporary mobile user identifier, and a specific algorithm.
  • the random access identifier is generated according to some fields in the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the method further includes: the terminal device sends a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, the first A globally unique temporary user identity is allocated by the first access management node.
  • the method further includes: receiving a registration acceptance message from the access node, the registration acceptance The message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated by the first access management node or the second access management node; wherein the second globally unique temporary user identifier is associated with the first globally unique temporary user identifier.
  • the globally unique temporary user identifier is different, and the first access management node is different from the second access management node.
  • a random access method comprising: an access node receiving a first request message from a terminal device, where the first request message is used to request access to a wireless network in a random access process, The first request message includes a random access identifier, and the random access identifier is used to identify the terminal device during the random access process; the access node sends a first response message to the terminal device, and the first response message contains Including the random access identifier; wherein, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.
  • the random access identifier sent and received by the terminal device is The extended temporary mobile user identity is not directly included in the composition structure, but the random access identity is generated by the terminal device itself.
  • the method further includes: the access node receiving a radio resource control RRC connection establishment complete message from the terminal device, where the RRC connection establishment complete message includes a service temporary mobile user identity, the serving temporary mobile user identity includes the temporary mobile user identity and the identity of the first access management node, the serving temporary mobile user identity is allocated by the first access management node; the access node according to the service Temporarily move the user identity, and select the second access management node for the terminal device.
  • the network device can allocate non-conflicting globally unique temporary user IDs to more users, and can ensure that the globally unique temporary user IDs Sufficient randomization field space, higher security.
  • the access node after the access node receives the RRC connection establishment complete message from the terminal device, the access node selects a second access management node for the terminal device, It also includes: the access node generates a first identifier according to the service temporary mobile user identifier; when the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal device.
  • the access node generates the first identifier according to the serving temporary mobile user identifier, including:
  • the first identification is generated according to the temporary mobile user identification and a specific algorithm.
  • the first identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the manner in which the access node generates the first identifier is exactly the same as the manner in which the terminal device generates the random access identifier, so that the access node can verify the identity of the terminal device.
  • the terminal device When the terminal device generates a random access identifier according to a field other than the service temporary mobile user identifier, or uses a random number to generate the random access identifier, the access node cannot verify the identity of the terminal device in this solution.
  • the access node verifies the identity of the terminal device after the random access process, which further improves the accuracy and security of the random access process.
  • the method further includes: the access node receiving a registration request message from the terminal device; sending the registration request message to the second access management node, the The registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated to the terminal device by the first access management node.
  • the method further includes: the access node receiving a registration acceptance message from the second access management node; the access node sending the registration to the terminal device An acceptance message; wherein, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated by the second access management node for the terminal device; wherein, the second globally unique temporary user identifier The temporary user identification is different from the first globally unique temporary user identification.
  • a third aspect provides an apparatus for random access, the apparatus comprising: a processing module configured to generate a random access identifier, where the random access identifier is used to identify the terminal device in a random access process; a transceiver module, is used to send a first request message to the access node, where the first request message includes the random access identifier, and the first request message is used to request access to the wireless network during the random access process; the transceiver module is also used for After receiving the first response message from the access node, the first response message includes the random access identifier, wherein the length of the random access identifier is less than the length of the temporary mobile user identifier, and the length of the temporary mobile user identifier Greater than or equal to 64 bits.
  • the random access identifier sent and received by the terminal device is The extended temporary mobile user identity is not directly included in the composition structure, but the random access identity is generated by the terminal device itself.
  • the terminal device when the length of the temporary mobile user identity is greater than the length of the random access identity, the terminal device generates a random access identity that meets the length requirement, so that the terminal device can access the random access process normally. wireless network.
  • the transceiver module is further configured to send a radio resource control RRC connection establishment complete message to the access node; wherein the RRC connection establishment complete message includes the terminal
  • the service temporary mobile user identity of the device includes the temporary mobile user identity and the identity of the first access management node.
  • the network device can allocate non-conflicting globally unique temporary user IDs to more users, and can ensure that the globally unique temporary user IDs Sufficient randomization field space, higher security.
  • the processing module is specifically configured to: generate the random access identifier according to the temporary mobile user identifier; or, generate through a specific algorithm according to the first globally unique temporary user identifier
  • the composition structure of the first globally unique temporary user identifier includes the temporary mobile user identifier; or, a random number is generated as the random access identifier.
  • the processing module is further used for:
  • the random access identifier is generated according to the temporary mobile user identifier and a specific algorithm.
  • the random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the random access identifier is generated according to the identifier related to the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the random access identifier is generated according to the temporary mobile user identifier, other fields in the service temporary mobile user identifier, and a specific algorithm.
  • the random access identifier is generated according to some fields in the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the transceiver module is further configured to: send a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, the first The globally unique temporary user identity is allocated by the first access management node.
  • the transceiver module is further configured to: receive a registration acceptance message from the access node, where the registration acceptance message includes a second globally unique temporary user identifier, the Two globally unique temporary user identifiers are allocated by the first access management node or the second access management node; wherein, the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management The node is different from the second access management node.
  • a random access apparatus in a fourth aspect, includes: a transceiver module, configured to receive a first request message from a terminal device, where the first request message is used to request wireless access in a random access process network, the first request message includes a random access identifier, and the random access identifier is used to identify the terminal device during the random access process; the transceiver module is further configured to send a first response message to the terminal device, the The first response message includes the random access identifier, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.
  • the random access identifier sent and received by the terminal device is The extended temporary mobile user identity is not directly included in the composition structure, but the random access identity is generated by the terminal device itself.
  • the transceiver module is further configured to receive a radio resource control RRC connection establishment complete message from the terminal device, where the RRC connection establishment complete message includes serving the temporary mobile user identification, the service temporary mobile user identification includes the temporary mobile user identification and the identification of the first access management node, the service temporary mobile user identification is allocated by the first access management node; processing module, according to the service temporary mobile user identification, and select a second access management node for the terminal device.
  • RRC connection establishment complete message includes serving the temporary mobile user identification
  • the service temporary mobile user identification includes the temporary mobile user identification and the identification of the first access management node, the service temporary mobile user identification is allocated by the first access management node
  • processing module according to the service temporary mobile user identification, and select a second access management node for the terminal device.
  • the processing module is further configured to: generate a first identifier according to the service temporary mobile user identifier; when the first identifier is the same as the random access identifier, the The access node selects a second access management node for the terminal device.
  • the processing module is further used for:
  • the first identification is generated according to the temporary mobile user identification and a specific algorithm.
  • the first identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the transceiver module is further configured to receive a registration request message from the terminal device; the transceiver module is further configured to send the registration request to the second access management node message, the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated for the terminal device by the first access management node.
  • the transceiver module is further configured to: receive a registration acceptance message from the second access management node, and send the registration acceptance message to the terminal device; wherein the The registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated for the terminal device by the second access management node; wherein, the second globally unique temporary user identifier is associated with the first globally unique temporary user identifier.
  • a globally unique temporary user ID is different.
  • a communication device comprising: a processor and a memory; the memory for storing a computer program; the processor for executing the computer program stored in the memory, so that the communication device executes
  • the communication method in the first aspect and any one of the first to third possible implementations of the first aspect, or implementing the second aspect and any one of the first to third possible implementations of the second aspect method of communication.
  • a computer-readable storage medium is provided, and a computer program is stored on the computer-readable storage medium, and when the computer program runs on a computer, the computer is made to execute the first aspect and the first aspect of the first aspect.
  • a communication method in any one of the possible implementation manners from one to the third, or performing the communication method in any one of the first to third possible implementation manners of the second aspect and the second aspect.
  • a chip system in a seventh aspect, includes: a processor for calling and running a computer program from a memory, so that a communication device installed with the chip system executes the first aspect and the first aspect of the first aspect.
  • a communication method in any one of the possible implementation manners from one to the third, or performing the communication method in any one of the first to third possible implementation manners of the second aspect and the second aspect.
  • the terminal device when the length of the temporary mobile user identity is greater than the length of the random access identity, the terminal device generates a random access identity that meets the length requirement, so that the terminal device can successfully access the wireless network during the random access process. network.
  • the network device can allocate non-conflicting global unique temporary user identities to more users, and can ensure sufficient randomization field space in the global unique temporary user identity , higher security.
  • FIG. 1 is a schematic diagram of a logical architecture of a mobile communication network.
  • Figure 2 shows a schematic block diagram of a GUTI in a 4G network.
  • Figure 3 shows a schematic block diagram of a 5G-GUTI in a 5G network.
  • FIG. 4 shows a schematic interaction diagram of a contention-based random access procedure.
  • FIG. 5 is a schematic interaction diagram of an example of the random access method of the present application.
  • FIG. 6 is a schematic interaction diagram of another example of the random access method of the present application.
  • FIG. 7 is a schematic block diagram of an example of a terminal device of the present application.
  • FIG. 8 is a schematic block diagram of an example of an access node of the present application.
  • FIG. 9 is a schematic block diagram of an example of a communication device of the present application.
  • FIG. 10 is a schematic block diagram of still another example of the communication device of the present application.
  • a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computing device and the computing device may be components.
  • One or more components may reside within a process and/or thread of execution, and a component may be localized on one computer and/or distributed between 2 or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • a component may, for example, be based on a signal having one or more data packets (eg, data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet interacting with other systems via signals) Communicate through local and/or remote processes.
  • data packets eg, data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet interacting with other systems via signals
  • GSM global system of mobile communication
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • general packet radio service general packet radio service, GPRS
  • long term evolution long term evolution
  • LTE long term evolution
  • LTE frequency division duplex frequency division duplex
  • TDD time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX worldwide interoperability for microwave access
  • mobile communication systems will not only support traditional communication, but also support, for example, device to device (D2D) communication, machine to machine (M2M) communication, machine type communication ( machine type communication, MTC), vehicle to everything (V2X) communication, for example, vehicle to vehicle (V2V) communication, vehicle to infrastructure (V2I) communication, vehicle to pedestrian (vehicle to pedestrian) to pedestrian, V2P) communication, vehicle to network (vehicle to network, V2N) communication.
  • D2D device to device
  • M2M machine to machine
  • MTC machine type communication
  • V2X vehicle to everything
  • V2V vehicle to vehicle
  • V2V vehicle to infrastructure
  • V2I vehicle to pedestrian
  • V2P vehicle to pedestrian to pedestrian
  • V2N vehicle to network
  • FIG. 1 is a schematic diagram of a logical architecture of a mobile communication network. Each network element that may be involved in the logical architecture of the network will be described below.
  • Terminal equipment It can include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of terminals, mobile stations (mobile stations, MS ), terminal (terminal), user equipment (UE), soft terminal, etc. For example, water meters, electricity meters, sensors, etc.
  • Access node It is used to provide network access function for authorized terminal equipment in a specific area, and can use transmission tunnels of different qualities according to the level of terminal equipment and service requirements.
  • the access node can be a (radio access network, (R)AN) network element, which is used to manage wireless resources, provide access services for terminal equipment, and then complete control signals and terminal equipment data in terminal equipment and terminal equipment.
  • R radio access network
  • the (R)AN network element can also be understood as a base station in a traditional network.
  • network element may also be referred to as an entity, a device, an apparatus, or a module, etc., which is not particularly limited in this application.
  • the description of “network element” is omitted in some descriptions.
  • the (R)AN network element is abbreviated as (R)AN, in this case, the “(R)AN ”)AN network element” should be understood as (R)AN network element or (R)AN entity, and below, the description of the same or similar situations is omitted.
  • the access node may also include a centralized unit (CU) node, or a distributed unit (DU) node, or a RAN device including a CU node and a DU node, or a control plane CU node (CU-CP node) and user plane CU nodes (CU-UP nodes) and DU nodes.
  • CU centralized unit
  • DU distributed unit
  • RAN device including a CU node and a DU node, or a control plane CU node (CU-CP node) and user plane CU nodes (CU-UP nodes) and DU nodes.
  • CU-CP node control plane CU node
  • CU-UP nodes user plane CU nodes
  • Access management node mainly used for mobility management and access management. Specifically, it can be used to implement functions other than session management in the functions of a mobility management entity (mobility management entity, MME), for example, functions such as legal interception and access authorization/authentication.
  • MME mobility management entity
  • the access management network element may be an access and mobility management function (AMF) network element.
  • AMF access and mobility management function
  • the access management network element may still be an AMF network element, or may have other names, which are not limited in this application.
  • Data management function network element used to process terminal equipment identification, access authentication, registration and mobility management.
  • the data management network element may be a unified data management (unified data management, UDM) network element.
  • UDM unified data management
  • the unified data management may still be a UDM network element, or may have other names, which are not limited in this application.
  • identifier names related to the embodiments of the present application may be corresponding identifiers in the 4G or 5G system mentioned in the present application. It should be noted that in future communication systems, these identifiers may use existing identifier names, or may be other identifier names, which are not limited in this application.
  • the permanent identification of the terminal equipment can be used to uniquely identify the terminal equipment, such as the International Mobile Subscriber Identity (IMSI).
  • IMSI International Mobile Subscriber Identity
  • the network device will assign a globally unique temporary user identity to the terminal device.
  • the above-mentioned globally unique temporary user identifier is used to temporarily and uniquely identify the terminal device.
  • the network device will also frequently update the globally unique temporary user identifier of the terminal device.
  • the globally unique temporary user identity may be the globally unique temporary user identity (GUTI) in the fourth generation (4th generation, 4G) system, or the globally unique temporary user identity (GUTI) in the fifth generation (5th generation, 5G) system.
  • 5G Globally Unique Temporary UE Identity 5G-GUTI.
  • FIG. 2 is a schematic diagram of a global unique temporary user identity in a 4G system
  • FIG. 3 is a schematic diagram of a global unique temporary user identity in a 5G system.
  • the temporary mobile user identity of the terminal device will be used as the Some fields.
  • a randomization field is reserved in the temporary mobile user identity, so that the globally unique temporary user identity of the terminal device can change frequently.
  • the temporary mobile subscriber identity may be M-TMSI (MME-temporary mobile subscriber identity) in the 4G system, or 5G-TMSI (5G-temporary mobile subscriber identity) in the 5G system.
  • M-TMSI MME-temporary mobile subscriber identity
  • 5G-TMSI 5G-temporary mobile subscriber identity
  • the temporary mobile subscriber identity may be the M-TMSI in FIG. 2 or the 5G-TMSI in FIG. 3 .
  • the network device may be an AMF in a 5G system, an MME in a 4G system, or other network-side devices that store the context of the terminal device, which is not limited.
  • the serving temporary mobile user identity is composed of the above-mentioned temporary mobile user identity and the network device identity.
  • the serving temporary mobile subscriber identity may be S-TMSI (serving-temporary mobile subscriber identity) in the 4G system or 5G-S-TMSI (5G-S serving-temporary mobile subscriber identity) in the 5G system.
  • the serving temporary mobile subscriber identity may be the S-TMSI in FIG. 2 or the 5G-S-TMSI in FIG. 3 .
  • other devices in the wireless network can first address the above-mentioned network device serving the terminal device according to the network ID in the serving temporary mobile user ID, and then find out according to the temporary mobile user ID in the serving temporary mobile user ID The context of the terminal device in the network device.
  • the random access identifier is used to identify the terminal equipment in the random access process. Specifically, the terminal device sends the random access identifier to the network device, and after the network device determines that the terminal device is allowed to access the wireless network, it sends the random access identifier to the terminal device. It is consistent to know that the random access is successful.
  • the random access identifier can be the wireless access user identifier as shown in Figure 2, with a length of 40 bits, including M-TMSI and MME Code; in the 5G network, the random access identifier and Figure 3
  • the composition and structure of the wireless access user identity in the WLAN are the same, with a length of 39 bits, including 5G-TMSI and some fields related to the AMF identity.
  • the random access process is described below.
  • the random access process refers to the process from when the user sends the random access preamble sequence and attempts to access the network to the establishment of a basic signaling connection with the network.
  • the random access process is the most basic requirement for any cellular communication system. One of them is used to enable the terminal to establish data communication with the network side.
  • the random access process is divided into: a contention-based random access process and a non-contention-based random access process.
  • Figure 4 shows the four steps of the contention-based random access process, including:
  • the terminal device sends a random access preamble sequence (preamble) to the access node;
  • the access node broadcasts a random access response, and the terminal device obtains the information sent by the access node by reading the system broadcast message;
  • the terminal device sends an initial uplink transmission message to the access node.
  • the terminal After receiving the random access response, the terminal transmits a message on the allocated uplink resources.
  • the terminal device There may be multiple terminal devices that read the system broadcast message of the access node and select the same resource to access at the same time. Therefore, in the message of this step, the terminal device carries the identification of the terminal device, that is, the existing wireless access user identification. .
  • the identification of the terminal device that is, the existing wireless access user identification.
  • the composition structure of the wireless access user identity includes the temporary mobile user identity.
  • the access node sends a contention resolution message to the terminal device.
  • the access node if the terminal device wins the conflict resolution, the access node returns the wireless access user identity of the winning terminal device to the terminal device.
  • the terminal device learns that its access is successful according to the consistency between the received wireless access user ID and the one sent by itself. Subsequently, the terminal device may send a registration request message to the network side to perform network registration.
  • the above-mentioned wireless access user identifier has a limited length, for example, it cannot exceed 40 bits in a 4G system, and cannot exceed 39 bits in a 5G system.
  • the composition structure of the above wireless access user identity includes a temporary mobile user identity.
  • the length of the temporary mobile user identity is 32 bits, and in order to support millions or even tens of millions of users, and to ensure that the allocated temporary identity does not conflict, the length of the temporary mobile user identity can be extended to 64 bits or longer. After the temporary mobile user identity is extended, if the existing wireless access user identity composition structure is still used, the length of the wireless access user identity exceeds the above-mentioned length limit, resulting in failure of the terminal device to access.
  • step 3 of the random access process if the wireless access user identity still uses the existing structure, its length will exceed The length limit of the "Initial Uplink Transmission Message" sent by the terminal equipment causes random access failure.
  • FIG. 5 shows an example of a schematic interaction diagram of a random access method 500 of the present application, where the method 500 is performed by a terminal device and an access node, as described below.
  • the terminal device generates a random access identifier.
  • the random access identifier is used to identify the terminal equipment in the random access process.
  • the length of the random access identifier meets the length requirement, that is, it is less than or equal to the first preset length, so as to satisfy the normal transmission of the first request message between the terminal device and the access node.
  • the first preset length is the restricted length of the above-mentioned wireless access user identification, that is, the length of the random access identification may be less than or equal to the above-mentioned restricted length of the wireless access user identification, such as 40 bits in the 4G system, in the 39 bits in a 5G system.
  • the length requirement of the "random access identifier" here is 40 bits under the existing 4G communication system, and 39 bits under the existing 5G communication system. It is consistent in the system, and may also be inconsistent with the existing system, which is not limited in this application.
  • the length of the extended temporary mobile user identity is greater than or equal to 64 bits, and the length of the random access identity is less than the length of the extended temporary mobile user identity.
  • this step is between the second interaction information and the third interaction information in the random access process, that is, the terminal device receives the random access response message from the access node (corresponding to S402 in FIG. 4 ). ) and the terminal device sends an initial uplink transmission message to the access node (corresponding to S403 in FIG. 4 ).
  • the terminal device automatically generates a random access identifier that meets the message length requirement and can identify the terminal device.
  • "capable of identifying terminal equipment” does not necessarily require that the composition structure of the random access identifier includes the field of the temporary mobile user identifier.
  • the terminal device may generate a random access identifier that meets the length requirements based on the temporary mobile user identifier, or A random number that meets the length requirement is generated as the random access identifier, as described below.
  • Manner 1 The terminal device generates a random access identifier according to the temporary mobile user identifier.
  • the terminal device generates the random access identifier according to the temporary mobile user identifier and a specific algorithm.
  • the M-TMSI in FIG. 2 can be used to generate a random access identifier through a specific algorithm; in a 5G network, the random access identifier can be generated from the 5G-TMSI in FIG. 3 through a specific algorithm.
  • the random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the M-TMSI and MME Code in Fig. 2 that is, S-TMSI
  • S-TMSI can be used to generate a random access identifier through a specific algorithm
  • the M-TMSI, MME Code and MME Group ID can be used together through a specific algorithm.
  • 5G-TMSI and AMF Pointer can be used to generate random access identifiers through specific algorithms, or 5G-TMSI, AMF Pointer and AMF Set ID, namely 5G-S-TMSI, can be generated through specific algorithms to generate random access identifiers , or generate a random access identifier from 5G-S-TMSI and AMF Region ID through a specific algorithm.
  • the terminal device generates a random access identifier according to a partial field of the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
  • the wireless access user identity in FIG. 3 can be used to generate a random access identity through a specific algorithm, or one bit in the AMF Set ID can be used together with AMF Pointer and 5G-TMSI to generate a random access identity through a specific algorithm. .
  • the terminal device In a second manner, the terminal device generates a random access identifier according to the first globally unique temporary user identifier and a specific algorithm.
  • a 40-bit random access identifier is generated from the entire GUTI in the 4G network through a specific algorithm; or a 39-bit random access identifier is generated from the entire 5G-GUTI in the 5G network through a specific algorithm.
  • Manner 3 The terminal device generates a random number as the random access identifier.
  • the length of the random number only needs to meet the above-mentioned length requirements, that is, it is less than or equal to the first preset length.
  • the terminal device sends a first request message to the access node, where the first request message includes the above random access identifier.
  • the first request message may be used to request access to the wireless network in the random access process, and may specifically be a random access request message or an uplink initial transmission message, which is not limited.
  • the terminal device sends a radio resource control RRC connection establishment request message to the access node, where the message includes a first request message, and the first request message includes the random access identifier generated by the terminal device in step S501.
  • the access node sends a first response message to the terminal device, where the first response message includes a random access identifier.
  • the access node will send the random access identifier of the terminal device that wins the random access competition to the terminal device in the first response message. If the received random access identifier is its own random access identifier, Then the terminal device learns that its access is successful.
  • the access node sends an RRC connection establishment response message to the terminal device, where the RRC connection establishment response message includes the first response message.
  • the first response message is used to respond to the first request message, and may specifically be a contention resolution message in the random access process, which is not limited.
  • the terminal device can generate a random access identifier that meets the length requirement, and the random access identifier is used to identify the terminal device during the random access process, so that the terminal device can normally operate during the random access process. access to the wireless network.
  • the method can avoid access failure caused by using the existing wireless mobile subscriber identity to perform random access after the temporary mobile subscriber identity is extended to 64 bits or longer.
  • the above method further includes: the terminal device sends a radio resource control RRC connection establishment complete message to the access node, where the RRC connection establishment complete message includes the service
  • the temporary mobile user identity, the serving temporary mobile user identity includes the temporary mobile user identity and the identity of the first access management node.
  • the terminal device will send an RRC connection establishment complete message to the access node, where the message carries the serving temporary mobile user identity.
  • the serving temporary mobile user identity may be used to identify the context of the terminal device in the first access management node.
  • the above-mentioned serving temporary mobile user identity includes the extended temporary mobile user identity. Since the RRC connection establishment complete message has no message length limit, the message can directly carry the above-mentioned serving temporary mobile user identity.
  • the terminal device sends an S-TMSI to the access node, and the length of the included M-TMSI is greater than or equal to 64 bits; or in a 5G communication system, the terminal device sends a 5G-S to the access node.
  • the length of the included 5G-TMSI is greater than or equal to 64 bits.
  • the RRC connection establishment completion message further includes a non-access stratum (non-access stratum, NAS) message
  • the NAS message is a registration request message.
  • the registration request message includes a first globally unique temporary user identifier, and the identifier is allocated by the first access management node.
  • the terminal device sends the first GUTI to the access node; or in the 5G communication system, the terminal device sends the first 5G-GUTI to the access node.
  • the access node may also verify the identity of the terminal device. Specifically, the access node may generate a first identifier according to the service temporary mobile user identifier; if the first identifier is the same as the random access identifier, the identity verification of the terminal device is successful.
  • the access node generates the first identifier according to the temporary mobile user identifier and a specific algorithm. For example, if the terminal device generates the random access identity according to the temporary mobile user identity and the specific algorithm in step S501, the access node can use the temporary mobile user identity in the RRC connection establishment complete message according to the composition structure of the temporary mobile user identity. User identification, and the specific algorithm generates the first identification.
  • the access node generates the first identifier according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm. For example, if the terminal device generates the random access identifier according to the temporary mobile user identifier, the identifier of the first access management node and a specific algorithm in step S501, the access node can temporarily move according to the service in the RRC connection establishment complete message The temporary mobile user identity and the identity of the first access management node in the composition structure of the user identity, and the specific algorithm generates the first identity.
  • the specific algorithm may be a hash digest algorithm, which is not limited.
  • the terminal device uses the method of generating random numbers, or the identifier before the random access identifier is generated by a specific algorithm has a field that is not included in the serving temporary mobile user identifier, the access node and the The identity of the end device could not be verified.
  • the terminal device is allowed to trigger the registration process, that is, the second access management node is selected for the terminal device, and then the second access management node is sent to the second access management node.
  • the node sends the service temporary mobile user identity.
  • the access node verifies the identity of the terminal device after the random access process, which further improves the accuracy and security of the random access process.
  • the access node forwards a registration request message to the second access management node, where the registration request message includes the first global temporary user identity.
  • the first global temporary user identity is allocated by the first access management node, and the first access management node and the second access management node may be the same or different.
  • the second access management node will allocate a global temporary user identifier to the terminal device, which may be referred to as the second global temporary user identifier in this application.
  • the second access management node carries the second global temporary user identity in a registration acceptance message and sends it to the terminal device.
  • the second global temporary user identifier and the first global temporary user identifier are different.
  • the terminal device generates a random access identifier that meets the length requirement, so that the terminal device can normally access the wireless network during the random access process.
  • the network device can allocate non-conflicting global unique temporary user identities to more users, and can ensure sufficient randomization field space in the global unique temporary user identity , higher security.
  • FIG. 6 shows a schematic interaction diagram of a random access method 600 according to an embodiment of the present application.
  • a terminal device sends a random access preamble sequence to an access node.
  • the terminal device when the terminal device accesses the wireless network, it triggers a random access process, requests the access node to allocate uplink resources through the random access process, and establishes uplink synchronization with the access node.
  • the terminal equipment can randomly select a preamble sequence as the random access preamble sequence, and send it to the access node on the random access channel.
  • the access node broadcasts a random access response, and the terminal device receives the random access response.
  • the access node may send a random access response through a system broadcast message.
  • the random access response may include the random access preamble sequence received in S601 and the information of the uplink resources allocated for the terminal equipment, etc.
  • the terminal device generates a random access identifier according to the temporary mobile user identifier.
  • the terminal device for the terminal device to generate the random access identifier according to the temporary mobile user identifier, reference may be made to the first manner in the embodiment shown in FIG. 5 .
  • the temporary mobile user identity and a specific algorithm generate a random access identity with a matching length.
  • the terminal device in a 4G network, the terminal device generates a random access identifier with a length of 40 bits by using a specific algorithm for the M-TMSI of 64 bits or longer.
  • the terminal device in a 5G network, the terminal device generates a random access identifier with a length of 39 bits by using a specific algorithm for the 64-bit or longer 5G-TMSI.
  • the specific algorithm may be a hash digest algorithm, or other algorithms capable of implementing similar functions, which are not limited in this embodiment.
  • the terminal device sends a first request message to the access node on the allocated uplink resource.
  • the first request message includes the random access identifier in S603.
  • step S602 there may be multiple terminal devices that read the system broadcast message of the access node, and select the same resource to access at the same time. Therefore, in this step, the terminal device sends an RRC connection establishment request message on the allocated uplink resources, and the message includes the random access identifier, so that after the terminal device receives the contention resolution message including the same random access identifier in the next step, It can be determined that its random access is successful.
  • the access node sends a first response message to the terminal device, where the first response message includes a random access identifier.
  • the access node after determining that the terminal device is allowed to access the wireless network, the access node sends the first response message to the terminal device.
  • the terminal device sends an RRC connection establishment complete message to the access node, where the RRC connection establishment complete message includes the serving temporary mobile subscriber identity.
  • the terminal device determines that its own access is successful according to the random access identifier included in the received contention resolution message, and then triggers the registration process.
  • the terminal device sends an RRC connection establishment complete message to the access node, which includes a serving temporary mobile user identity, and the serving temporary mobile user identity includes a temporary mobile user identity whose length is greater than or equal to 64 bits.
  • the RRC connection establishment complete message may also include a registration request message sent through the NAS layer, the message includes a globally unique temporary user identifier, and the composition structure of the globally unique temporary user identifier includes the temporary user identifier whose length is greater than or equal to 64 bits.
  • Mobile user ID may also include a registration request message sent through the NAS layer, the message includes a globally unique temporary user identifier, and the composition structure of the globally unique temporary user identifier includes the temporary user identifier whose length is greater than or equal to 64 bits.
  • the access node generates a first identifier.
  • the access node generates a random access identifier through the temporary mobile user identifier and a specific algorithm according to the terminal device in step S603, then after the access node receives the RRC connection establishment complete message, it will include the service temporary mobile user identifier according to the received service. and the same specific algorithm in step S603 to generate the first identifier. If the first identifier is consistent with the random access identifier in the initial uplink transmission message received by the access node, it means that the identity of the terminal device has been verified, and the access node allows the terminal device to trigger the registration process.
  • the access node in a 4G network, the access node generates the first identifier according to the M-TMSI and a specific algorithm; or in a 5G network, the access node generates the first identifier according to the 5G-TMSI and a specific algorithm.
  • the access node selects a second access management node for the terminal device according to the serving temporary mobile user identifier.
  • the access node sends a registration request message to the second access management node, where the registration request message includes the first globally unique temporary user identifier.
  • the second access management node determines the first access management node that previously served the terminal device according to the received global unique temporary user identifier, wherein the first access management node and the second access management node may be the same or different.
  • the second access management node acquires the user context of the terminal device.
  • the second access management node obtains the locally stored user context of the terminal device according to the temporary mobile user identifier included in the globally unique temporary user identifier.
  • the second access management node sends the received globally unique temporary user identifier to the first access management node, and the first access management node according to the globally unique temporary user identifier.
  • the temporary mobile user identity included in the user identity acquires the locally stored user context of the terminal device, and sends the user context to the second access management node.
  • the second access management node registers with the data management function, sends an access management node registration request message to the data management function, and receives an access management node registration response message sent by the data management function; the second access management node
  • the contract data acquisition request is sent to the data management function, and the contract data acquisition response sent by the data management function is received, so as to acquire the contract data of the terminal device.
  • the second access management node sends a registration acceptance message to the terminal device, where the registration acceptance message includes the second globally unique temporary user identifier.
  • the second globally unique temporary user identifier is a globally unique temporary user identifier allocated by the second access management node to the terminal device.
  • the second access management node will assign the second globally unique temporary user identifier to the terminal device, that is, send a registration acceptance message to the terminal device, the message including the second globally unique temporary user identifier.
  • the access management node sends a registration acceptance message to the access node through the NAS layer, and the access node forwards the registration acceptance message to the terminal device.
  • the terminal device sends a registration completion message to the second access management node.
  • the terminal device after extending the length of the temporary mobile user identity, the terminal device generates a random access identity that meets the length requirement, so that the terminal device can normally access the wireless network during the random access process.
  • the network device can allocate non-conflicting global unique temporary user identities to more users, and can ensure sufficient randomization field space in the global unique temporary user identity , higher security.
  • the access node verifies the identity of the terminal device after the random access process, which further improves the accuracy and security of the random access process.
  • FIG. 7 is a schematic block diagram of a communication apparatus provided by an embodiment of the present application.
  • the communication device 10 may include a transceiver module 11 and a processing module 12 .
  • the communication apparatus 10 may correspond to the terminal device in the above method embodiment.
  • it may be user equipment, or a chip configured in the user equipment.
  • the communication apparatus 10 may correspond to the method 500 and the terminal device in the method 500 according to the embodiments of the present application, and the communication apparatus 10 may include a method for performing the method 500 in FIG. 5 or the method 600 in FIG. 6 .
  • each unit in the communication device 10 and the above-mentioned other operations and/or functions are respectively to implement the corresponding flow of the method 500 in FIG. 5 or the method 600 in FIG. 6 .
  • the transceiver module 11 can be used to execute steps S502 and S503 in the method 500, and the processing module 12 can be used to execute the step S501 of the method 500.
  • the transceiver module 11 can be used to execute steps S601 , S602 , S604 , S605 , S606 , S614 and S615 in the method 600
  • the processing module 12 can be used to execute the method 600 step S603.
  • the processing module 12 is configured to generate a random access identifier, and the random access identifier is used to identify the terminal device during the random access process; the transceiver module 11 is configured to send a first request message to the access node, the first The random access identifier is included in the request message, and the first request message is used to request access to the wireless network in the random access process; it is also used to receive a first response message from the access node, the first response message includes the random access identifier, wherein the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.
  • the transceiver module 11 is further configured to send a radio resource control RRC connection establishment complete message to the access node, where the RRC connection establishment complete message includes a serving temporary mobile user identity, and the serving temporary mobile user identity includes the temporary mobile user. identity and the identity of the first access management node.
  • the processing module 12 is specifically configured to generate the random access identifier according to the temporary mobile user identifier; or, generate the random access identifier through a specific algorithm according to the first globally unique temporary user identifier, the first globally unique temporary user identifier.
  • the composition structure of the identity includes the temporary mobile user identity; or, a random number is generated as the random access identity.
  • the processing module 12 is further configured to generate the random access identifier according to the temporary mobile user identifier and a specific algorithm; or, according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm, generate the random access identifier. Random access identifier.
  • the transceiver module 11 is further configured to send a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated by the first access management node.
  • the transceiver module 11 receives a registration acceptance message from the access node, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is managed by the first access management node or the second access management node. Node allocation; wherein, the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node.
  • FIG. 8 is a schematic block diagram of a communication apparatus provided by an embodiment of the present application.
  • the communication device 20 may include a transceiver module 21 and a processing module 22 .
  • the communication device 20 may correspond to the access node in the above method embodiment.
  • it may be the RAN, or a chip configured in the RAN.
  • the communication apparatus 20 may correspond to the network device in the method 500 and the method 600 according to the embodiments of the present application, and the communication apparatus 20 may include a method for performing the method 500 in FIG. 5 or the method 600 in FIG. 6 .
  • each unit in the communication device 20 and the above-mentioned other operations and/or functions are respectively to implement the corresponding flow of the method 500 in FIG. 5 or the method 600 in FIG. 6 .
  • the transceiver module 21 can be used to execute steps S502 and S503 in the method 500 .
  • the transceiver module 21 can be used to execute steps S601 , S602 , S604 , S605 , S606 , S609 , S614 , and S615 in the method 600 , and the processing module 22 can be used to Steps S607 and S608 in the method 600 are performed.
  • the transceiver module 21 is configured to receive a first request message from a terminal device, where the first request message is used to request access to a wireless network in a random access process, and the first request message includes a random access identifier,
  • the random access identifier is used to identify the terminal device in the random access process; it is also used to send a first response message to the terminal device, where the first response message includes the random access identifier, wherein the random access identifier
  • the length of the incoming identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.
  • the transceiver module 21 is further configured to receive a radio resource control RRC connection establishment complete message from the terminal device, where the RRC connection establishment complete message includes a serving temporary mobile user identity, and the serving temporary mobile user identity includes the temporary mobile user. identity and the identity of the first access management node.
  • the processing module 22 is configured to select a second access management node for the terminal device according to the temporary mobile user identity of the service.
  • the processing module 22 is further configured to generate a first identifier according to the service temporary mobile user identifier; when the first identifier is the same as the random access identifier, the access node selects a second identifier for the terminal device Access the management node.
  • the processing module 22 is specifically further configured to generate the first identification according to the temporary mobile user identification and a specific algorithm; or, according to the identification of the first access management node, the temporary mobile user identification and the specific algorithm, generate the first identification.
  • the transceiver module 21 is also used to receive a registration request message from the terminal device;
  • the transceiver module 21 is further configured to send the registration request message to the second access management node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is managed by the first access management Nodes are assigned to the terminal equipment.
  • the transceiver module 21 is further configured to receive a registration acceptance message from the second access management node, and send the registration acceptance message to the terminal device, where the registration acceptance message includes a second globally unique temporary user identifier, the second globally unique The temporary user identifier is allocated to the terminal device by the second access management node; wherein the second globally unique temporary user identifier is different from the first globally unique temporary user identifier.
  • FIG. 9 is a schematic diagram of a communication apparatus 30 provided by an embodiment of the present application.
  • the apparatus 30 may be a terminal device, including various handheld devices, vehicle-mounted devices, wearable devices, computing devices or Other processing devices connected to the wireless modem, as well as various forms of terminals, mobile stations, terminals, user equipment, soft terminals, etc., may also be chips or systems on chips, etc. located on the terminal equipment.
  • the apparatus 30 may include a processor 31 (ie, an example of a processing module) and a memory 32 .
  • the memory 32 is used for storing instructions
  • the processor 31 is used for executing the instructions stored in the memory 32, so that the apparatus 30 implements the steps performed by the terminal device in the method corresponding to FIG. 5 or FIG. 6 .
  • the device 30 may further include an input port 33 (ie, an example of a transceiver module) and an output port 34 (ie, another example of a transceiver module).
  • the processor 31, the memory 32, the input port 33 and the output port 34 can communicate with each other through an internal connection path to transmit control and/or data signals.
  • the memory 32 is used to store a computer program, and the processor 31 can be used to call and run the computer program from the memory 32 to control the input port 33 to receive signals, control the output port 34 to send signals, and complete the process of the terminal device in the above method. step.
  • the memory 32 may be integrated in the processor 31 or may be provided separately from the processor 31 .
  • the input port 33 is a receiver
  • the output port 34 is a transmitter.
  • the receiver and the transmitter may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.
  • the input port 33 is an input interface
  • the output port 34 is an output interface
  • the functions of the input port 33 and the output port 34 can be considered to be implemented by a transceiver circuit or a dedicated chip for transceiver.
  • the processor 31 can be considered to be implemented by a dedicated processing chip, a processing circuit, a processor or a general-purpose chip.
  • a general-purpose computer may be used to implement the communication device provided by the embodiments of the present application.
  • the program codes that will implement the functions of the processor 31 , the input port 33 and the output port 34 are stored in the memory 32 , and the general-purpose processor implements the functions of the processor 31 , the input port 33 and the output port 34 by executing the codes in the memory 32 .
  • each module or unit in the communication apparatus 30 may be used to perform each action or process performed by a device (eg, terminal device) performing random access in the above method, and detailed description thereof is omitted here to avoid redundant description.
  • a device eg, terminal device
  • FIG. 10 is a schematic diagram of a communication apparatus 40 provided by an embodiment of the present application.
  • the apparatus 40 may be an access node, including a network element having an access function for terminal equipment, such as a RAN.
  • the apparatus 40 may include a processor 41 (ie, an example of a processing module) and a memory 42 .
  • the memory 42 is used for storing instructions
  • the processor 41 is used for executing the instructions stored in the memory 42, so that the apparatus 40 implements the steps performed by the access node in the method corresponding to FIG. 5 or FIG. 6 .
  • the device 40 may further include an input port 43 (ie, an example of a transceiver module) and an output port 44 (ie, another example of a transceiver module).
  • the processor 41, the memory 42, the input port 43 and the output port 44 can communicate with each other through an internal connection path to transmit control and/or data signals.
  • the memory 42 is used to store a computer program, and the processor 41 can be used to call and run the computer program from the memory 42 to control the input port 43 to receive signals, control the output port 44 to send signals, and complete the process of the terminal device in the above method. step.
  • the memory 42 may be integrated in the processor 41 or may be provided separately from the processor 41 .
  • the input port 43 is a receiver
  • the output port 44 is a transmitter.
  • the receiver and the transmitter may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.
  • the input port 43 is an input interface
  • the output port 44 is an output interface
  • the functions of the input port 43 and the output port 44 can be considered to be realized by a transceiver circuit or a dedicated chip for transceiver.
  • the processor 41 can be considered to be implemented by a dedicated processing chip, a processing circuit, a processor or a general-purpose chip.
  • a general-purpose computer may be used to implement the communication device provided by the embodiments of the present application.
  • the program codes that will implement the functions of the processor 41 , the input port 43 and the output port 44 are stored in the memory 42 , and the general-purpose processor implements the functions of the processor 41 , the input port 43 and the output port 44 by executing the codes in the memory 42 .
  • the modules or units in the communication apparatus 40 may be used to perform actions or processing procedures performed by the random access device (ie, the access node) in the above method, and detailed descriptions thereof are omitted here to avoid repetition.
  • the random access device ie, the access node
  • the processor may be a central processing unit (CPU, central processing unit), and the processor may also be other general-purpose processors, digital signal processors (DSP, digital signal processors), dedicated integrated Circuit (application specific integrated circuit, ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processors
  • ASIC application specific integrated circuit
  • FPGA off-the-shelf programmable gate array
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable read-only memory (EPROM). Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be random access memory (RAM), which acts as an external cache.
  • RAM Static Random Access Memory
  • DRAM Dynamic Random Access Memory
  • SDRAM Synchronous DRAM
  • SDRAM Double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous link dynamic random access memory
  • direct rambus RAM direct rambus RAM
  • Embodiments of the present application further provide a computer-readable storage medium, on which computer instructions for implementing the method executed by the terminal device or the method executed by the network device in the foregoing method embodiments are stored.
  • the computer when the computer program is executed by a computer, the computer can implement the method executed by the terminal device or the method executed by the network device in the above method embodiments.
  • Embodiments of the present application further provide a computer program product including instructions, which, when executed by a computer, cause the computer to implement the method executed by the terminal device or the method executed by the network device in the above method embodiments.
  • An embodiment of the present application further provides a communication system, where the communication system includes the network device and the terminal device in the above embodiments, the network device is configured to receive a first request message and send a first response message, and the terminal device is configured to generate a A random access identifier, sending the first request message and receiving the first response message, wherein both the first request message and the first response message include the random access identifier, and the length of the random access identifier is greater than the length of the random access identifier
  • the above embodiments may be implemented in whole or in part by software, hardware, firmware or any other combination.
  • the above-described embodiments may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions or computer programs. When the computer instructions or computer programs are loaded or executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server or data center by wire (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that contains one or more sets of available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media.
  • the semiconductor medium may be a solid state drive.
  • the size of the sequence numbers of the above-mentioned processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not be dealt with in the embodiments of the present application. implementation constitutes any limitation.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • a computer device which may be a personal computer, a server, or a network device, etc.
  • the aforementioned storage medium includes: a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk and other mediums that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided are a random access method, apparatus and system. The method comprises: a terminal device generating a random access identifier, wherein the random access identifier is used for identifying the terminal device during a random access process; the terminal device sending a first request message to an access node, wherein the first request message comprises the random access identifier, and the first request message is used for requesting access to a wireless network; and the terminal device receiving a first response message from the access node, wherein the first response message comprises the random access identifier, the length of the random access identifier is less than the length of a temporary mobile user identifier, and the length of the temporary mobile user identifier is greater than or equal to 64 bits. After the length of a temporary mobile user identifier is extended, a terminal device generates a random access identifier that meets a length requirement, such that the terminal device can still normally access a wireless network during a random access process, thereby ensuring the success rate of random access.

Description

随机接入的方法、装置和系统Method, device and system for random access

本申请要求于2020年12月4日提交中国国家知识产权局、申请号为202011404557.3、发明名称为“随机接入的方法、装置和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202011404557.3 and the invention title "Method, Apparatus and System for Random Access" filed with the State Intellectual Property Office of China on December 4, 2020, the entire contents of which are incorporated by reference in this application.

技术领域technical field

本申请涉及通信领域,更具体地,涉及随机接入的方法、装置和系统。The present application relates to the field of communications, and more particularly, to a method, apparatus and system for random access.

背景技术Background technique

在随机接入过程中,终端设备向接入节点发送初始上行传输消息,如果该终端设备被允许接入,则接入节点会向该终端设备发送竞争解决消息。其中,在上述初始上行传输消息和竞争解决消息中都可以携带无线接入用户标识,该无线接入用户标识可以用来在随机接入过程中标识该终端设备。终端设备通过判断竞争解决消息中携带的无线接入用户标识与自身在初始上行传输消息中携带的无线接入用户标识是否一致,来获知自身是否成功接入。In the random access process, the terminal device sends an initial uplink transmission message to the access node, and if the terminal device is allowed to access, the access node sends a contention resolution message to the terminal device. Wherein, both the above-mentioned initial uplink transmission message and the contention resolution message may carry the wireless access user identity, and the wireless access user identity may be used to identify the terminal equipment in the random access process. The terminal device learns whether it has successfully accessed by judging whether the wireless access user identity carried in the contention resolution message is consistent with the wireless access user identity carried in the initial uplink transmission message by itself.

目前,无线接入用户标识的组成结构中包括临时移动用户标识,而该临时移动用户标识是全球唯一临时移动用户标识中的部分字段。该临时移动用户标识用于标识或查找在网络设备上存储的终端设备的上下文。此外,该临时移动用户标识中还留有随机化字段,以便终端设备的全球唯一临时用户标识能够经常变化。At present, the composition structure of the wireless access user identity includes a temporary mobile user identity, and the temporary mobile user identity is a part of the fields in the globally unique temporary mobile user identity. The temporary mobile user identity is used to identify or find the context of the terminal device stored on the network device. In addition, a randomization field is left in the temporary mobile user identity, so that the globally unique temporary user identity of the terminal device can change frequently.

随着移动通信技术的不断发展,目前的全球唯一临时用户标识分配管理机制已经无法满足日益增长的用户需求。而为了支持更多的用户,可以通过扩展临时移动用户标识来扩展全球唯一临时用户标识。但是,临时移动用户标识的扩展导致无线接入用户标识的变化,进而可能导致终端设备在随机接入过程中的接入失败,降低随机接入成功率。With the continuous development of mobile communication technology, the current global unique temporary user identity allocation management mechanism has been unable to meet the increasing demands of users. In order to support more users, the globally unique temporary user ID can be extended by extending the temporary mobile user ID. However, the extension of the temporary mobile user identity leads to the change of the wireless access user identity, which may lead to the access failure of the terminal equipment in the random access process, and reduce the random access success rate.

发明内容SUMMARY OF THE INVENTION

本申请提供一种随机接入的方法、装置和系统,在扩展临时移动用户标识的长度的情况下,仍能够实现终端设备在随机接入过程中的成功接入,保证随机接入成功率。The present application provides a method, device and system for random access, which can still achieve successful access of terminal equipment in the random access process and ensure the success rate of random access even when the length of the temporary mobile user identity is extended.

第一方面,提供了一种随机接入的方法,该方法包括:终端设备生成随机接入标识,该随机接入标识用于在随机接入过程中标识该终端设备;该终端设备向接入节点发送第一请求消息,该第一请求消息中包括该随机接入标识,该第一请求消息用于在随机接入过程中请求接入无线网络;该终端设备接收来自该接入节点的第一响应消息,该第一响应消息中包括该随机接入标识;其中,该随机接入标识的长度小于该终端设备的临时移动用户标识的长度,该临时移动用户标识的长度大于或等于64比特。In a first aspect, a random access method is provided, the method comprising: generating a random access identifier by a terminal device, where the random access identifier is used to identify the terminal device in a random access process; The node sends a first request message, the first request message includes the random access identifier, and the first request message is used to request access to the wireless network in the random access process; the terminal device receives the first request from the access node. A response message, the first response message includes the random access identifier; wherein, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits .

本实施例的技术方案中,在随机接入过程中时,考虑到临时移动用户标识超出了终端设备和接入节点之间交互的消息长度的限制,终端设备发送和接收的随机接入标识的组成 结构中并不会直接包括扩展后的临时移动用户标识,而是由终端设备自己生成随机接入标识。In the technical solution of this embodiment, during the random access process, considering that the temporary mobile user identity exceeds the limit of the length of the message exchanged between the terminal device and the access node, the random access identifier sent and received by the terminal device is The extended temporary mobile user identity is not directly included in the composition structure, but the random access identity is generated by the terminal device itself.

根据本申请实施例的方案,在临时移动用户标识的长度大于随机接入标识的长度时,终端设备生成符合长度要求的随机接入标识,使得终端设备在随机接入过程中能够正常地接入无线网络。According to the solution of this embodiment of the present application, when the length of the temporary mobile user identity is greater than the length of the random access identity, the terminal device generates a random access identity that meets the length requirement, so that the terminal device can access the random access process normally. wireless network.

结合第一方面,在第一方面的某些实现方式中,该终端设备向该接入节点发送无线资源控制RRC连接建立完成消息;其中,该RRC连接建立完成消息中包括该终端设备的服务临时移动用户标识,该服务临时移动用户标识包括该临时移动用户标识和第一接入管理节点的标识。With reference to the first aspect, in some implementations of the first aspect, the terminal device sends a radio resource control RRC connection establishment complete message to the access node; wherein, the RRC connection establishment complete message includes the service temporary of the terminal device. A mobile user identity, the serving temporary mobile user identity includes the temporary mobile user identity and the identity of the first access management node.

应理解,上述RRC连接建立完成消息没有长度限制,可以直接发送长度扩展后的服务临时移动用户标识。It should be understood that the above-mentioned RRC connection establishment complete message has no length limit, and the service temporary mobile user identity after the length extension can be directly sent.

本实施例的技术方案中,在临时移动用户标识扩展到64比特或者更长之后,网络设备可以给更多的用户分配不相冲突的全球唯一临时用户标识,且能保证全球唯一临时用户标识中足够的随机化字段空间,安全性更高。In the technical solution of this embodiment, after the temporary mobile user ID is extended to 64 bits or longer, the network device can allocate non-conflicting globally unique temporary user IDs to more users, and can ensure that the globally unique temporary user IDs Sufficient randomization field space, higher security.

结合第一方面,在第一方面的某些实现方式中,该终端设备生成该随机接入标识包括:该终端设备根据该临时移动用户标识生成该随机接入标识;或者,该终端设备根据第一全球唯一临时用户标识通过特定算法生成该随机接入标识,该第一全球唯一临时用户标识的组成结构中包括该临时移动用户标识;或者,该终端设备生成一个随机数作为该随机接入标识。With reference to the first aspect, in some implementation manners of the first aspect, the generating, by the terminal device, the random access identifier includes: the terminal device generating the random access identifier according to the temporary mobile user identifier; or, the terminal device generating the random access identifier according to the first A globally unique temporary user identifier generates the random access identifier through a specific algorithm, and the composition structure of the first globally unique temporary user identifier includes the temporary mobile user identifier; or, the terminal device generates a random number as the random access identifier .

结合第一方面,在第一方面的某些实现方式中可选地,该终端设备根据该临时移动用户标识生成该随机接入标识,包括:With reference to the first aspect, in some implementations of the first aspect, optionally, the terminal device generates the random access identifier according to the temporary mobile user identifier, including:

在一些可能的实现方式中,根据该临时移动用户标识和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to the temporary mobile user identifier and a specific algorithm.

在一些可能的实现方式中,根据该第一接入管理节点的标识,该临时移动用户标识和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.

在一些可能的实现方式中,根据与该第一接入管理节点相关的标识,该临时移动用户标识和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to the identifier related to the first access management node, the temporary mobile user identifier and a specific algorithm.

在一些可能的实现方式中,根据该临时移动用户标识,该服务临时移动用户标识中的其他字段和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to the temporary mobile user identifier, other fields in the service temporary mobile user identifier, and a specific algorithm.

在一些可能的实现方式中,根据该第一接入管理节点的标识中的部分字段,该临时移动用户标识和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to some fields in the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.

结合第一方面,在第一方面的某些实现方式中,该方法还包括:该终端设备向该接入节点发送注册请求消息,该注册请求消息中包括第一全球唯一临时用户标识,该第一全球唯一临时用户标识由该第一接入管理节点分配。With reference to the first aspect, in some implementations of the first aspect, the method further includes: the terminal device sends a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, the first A globally unique temporary user identity is allocated by the first access management node.

结合第一方面,在第一方面的某些实现方式中,在该终端设备向该接入节点发送注册请求消息之后,该方法还包括:接收来自该接入节点的注册接受消息,该注册接受消息中包括第二全球唯一临时用户标识,该第二全球唯一临时用户标识由该第一接入管理节点或第二接入管理节点分配;其中,该第二全球唯一临时用户标识与该第一全球唯一临时用户标识不同,该第一接入管理节点与该第二接入管理节点不同。With reference to the first aspect, in some implementations of the first aspect, after the terminal device sends a registration request message to the access node, the method further includes: receiving a registration acceptance message from the access node, the registration acceptance The message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated by the first access management node or the second access management node; wherein the second globally unique temporary user identifier is associated with the first globally unique temporary user identifier. The globally unique temporary user identifier is different, and the first access management node is different from the second access management node.

第二方面,提供了一种随机接入的方法,该方法包括:接入节点接收来自终端设备的第一请求消息,该第一请求消息用于在随机接入过程中请求接入无线网络,该第一请求消息中包括随机接入标识,该随机接入标识用于在随机接入过程中标识该终端设备;该接入节点向该终端设备发送第一响应消息,该第一响应消息中包括该随机接入标识;其中,该随机接入标识的长度小于该终端设备的临时移动用户标识的长度,该临时移动用户标识的长度大于或等于64比特。In a second aspect, a random access method is provided, the method comprising: an access node receiving a first request message from a terminal device, where the first request message is used to request access to a wireless network in a random access process, The first request message includes a random access identifier, and the random access identifier is used to identify the terminal device during the random access process; the access node sends a first response message to the terminal device, and the first response message contains Including the random access identifier; wherein, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.

本实施例的技术方案中,在随机接入过程中时,考虑到临时移动用户标识超出了终端设备和接入节点之间交互的消息长度的限制,终端设备发送和接收的随机接入标识的组成结构中并不会直接包括扩展后的临时移动用户标识,而是由终端设备自己生成随机接入标识。In the technical solution of this embodiment, during the random access process, considering that the temporary mobile user identity exceeds the limit of the length of the message exchanged between the terminal device and the access node, the random access identifier sent and received by the terminal device is The extended temporary mobile user identity is not directly included in the composition structure, but the random access identity is generated by the terminal device itself.

结合第二方面,在第二方面的某些实现方式中,该方法还包括:该接入节点接收来自该终端设备的无线资源控制RRC连接建立完成消息,该RRC连接建立完成消息中包括服务临时移动用户标识,该服务临时移动用户标识包括该临时移动用户标识和第一接入管理节点的标识,该服务临时移动用户标识由该第一接入管理节点分配;该接入节点根据所述服务临时移动用户标识,为该终端设备选择第二接入管理节点。With reference to the second aspect, in some implementations of the second aspect, the method further includes: the access node receiving a radio resource control RRC connection establishment complete message from the terminal device, where the RRC connection establishment complete message includes a service temporary mobile user identity, the serving temporary mobile user identity includes the temporary mobile user identity and the identity of the first access management node, the serving temporary mobile user identity is allocated by the first access management node; the access node according to the service Temporarily move the user identity, and select the second access management node for the terminal device.

本实施例的技术方案中,在临时移动用户标识扩展到64比特或者更长之后,网络设备可以给更多的用户分配不相冲突的全球唯一临时用户标识,且能保证全球唯一临时用户标识中足够的随机化字段空间,安全性更高。In the technical solution of this embodiment, after the temporary mobile user ID is extended to 64 bits or longer, the network device can allocate non-conflicting globally unique temporary user IDs to more users, and can ensure that the globally unique temporary user IDs Sufficient randomization field space, higher security.

结合第二方面,在第二方面的某些实现方式中,在该接入节点接收来自该终端设备的RRC连接建立完成消息之后,该接入节点为该终端设备选择第二接入管理节点,还包括:该接入节点根据该服务临时移动用户标识,生成第一标识;当该第一标识与该随机接入标识相同时,该接入节点为该终端设备选择第二接入管理节点。With reference to the second aspect, in some implementations of the second aspect, after the access node receives the RRC connection establishment complete message from the terminal device, the access node selects a second access management node for the terminal device, It also includes: the access node generates a first identifier according to the service temporary mobile user identifier; when the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal device.

结合第二方面,在第二方面的某些实现方式中,该接入节点根据该服务临时移动用户标识生成第一标识,包括:With reference to the second aspect, in some implementations of the second aspect, the access node generates the first identifier according to the serving temporary mobile user identifier, including:

在一些可能的实现方式中,根据该临时移动用户标识和特定算法,生成该第一标识。In some possible implementations, the first identification is generated according to the temporary mobile user identification and a specific algorithm.

在一些可能的实现方式中,根据该第一接入管理节点的标识,该临时移动用户标识和特定算法,生成该第一标识。In some possible implementations, the first identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.

应理解,接入节点生成第一标识的方式与终端设备生成随机接入标识的方式完全一致,这样接入节点可以验证终端设备的身份。而当终端设备是根据服务临时移动用户标识以外的字段生成随机接入标识时,或者利用随机数生成随机接入标识时,接入节点在该方案中则不能验证终端设备的身份。It should be understood that the manner in which the access node generates the first identifier is exactly the same as the manner in which the terminal device generates the random access identifier, so that the access node can verify the identity of the terminal device. When the terminal device generates a random access identifier according to a field other than the service temporary mobile user identifier, or uses a random number to generate the random access identifier, the access node cannot verify the identity of the terminal device in this solution.

根据本申请实施例的方案,接入节点在随机接入过程之后验证终端设备的身份,进一步提高随机接入过程的准确性和安全性。According to the solutions of the embodiments of the present application, the access node verifies the identity of the terminal device after the random access process, which further improves the accuracy and security of the random access process.

结合第二方面,在第二方面的某些实现方式中,该方法还包括:该接入节点接收来自该终端设备的注册请求消息;向该第二接入管理节点发送该注册请求消息,该注册请求消息中包括第一全球唯一临时用户标识,该第一全球唯一临时用户标识由该第一接入管理节点为该终端设备分配的。With reference to the second aspect, in some implementations of the second aspect, the method further includes: the access node receiving a registration request message from the terminal device; sending the registration request message to the second access management node, the The registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated to the terminal device by the first access management node.

结合第二方面,在第二方面的某些实现方式中,该方法还包括:该接入节点接收来自该第二接入管理节点的注册接受消息;该接入节点向该终端设备发送该注册接受消息;其 中,该注册接受消息中包括第二全球唯一临时用户标识,该第二全球唯一临时用户标识是由该第二接入管理节点为该终端设备分配的;其中,该第二全球唯一临时用户标识与该第一全球唯一临时用户标识不同。With reference to the second aspect, in some implementations of the second aspect, the method further includes: the access node receiving a registration acceptance message from the second access management node; the access node sending the registration to the terminal device An acceptance message; wherein, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated by the second access management node for the terminal device; wherein, the second globally unique temporary user identifier The temporary user identification is different from the first globally unique temporary user identification.

第三方面,提供了一种随机接入的装置,该装置包括:处理模块,用于生成随机接入标识,该随机接入标识用于在随机接入过程中标识该终端设备;收发模块,用于向接入节点发送第一请求消息,该第一请求消息中包括该随机接入标识,该第一请求消息用于在随机接入过程中请求接入无线网络;该收发模块,还用于接收来自该接入节点的第一响应消息,该第一响应消息中包括该随机接入标识,其中,该随机接入标识的长度小于临时移动用户标识的长度,该临时移动用户标识的长度大于或等于64比特。A third aspect provides an apparatus for random access, the apparatus comprising: a processing module configured to generate a random access identifier, where the random access identifier is used to identify the terminal device in a random access process; a transceiver module, is used to send a first request message to the access node, where the first request message includes the random access identifier, and the first request message is used to request access to the wireless network during the random access process; the transceiver module is also used for After receiving the first response message from the access node, the first response message includes the random access identifier, wherein the length of the random access identifier is less than the length of the temporary mobile user identifier, and the length of the temporary mobile user identifier Greater than or equal to 64 bits.

本实施例的技术方案中,在随机接入过程中时,考虑到临时移动用户标识超出了终端设备和接入节点之间交互的消息长度的限制,终端设备发送和接收的随机接入标识的组成结构中并不会直接包括扩展后的临时移动用户标识,而是由终端设备自己生成随机接入标识。In the technical solution of this embodiment, during the random access process, considering that the temporary mobile user identity exceeds the limit of the length of the message exchanged between the terminal device and the access node, the random access identifier sent and received by the terminal device is The extended temporary mobile user identity is not directly included in the composition structure, but the random access identity is generated by the terminal device itself.

根据本申请实施例的方案,在临时移动用户标识的长度大于随机接入标识的长度时,终端设备生成符合长度要求的随机接入标识,使得终端设备在随机接入过程中能够正常地接入无线网络。According to the solution of this embodiment of the present application, when the length of the temporary mobile user identity is greater than the length of the random access identity, the terminal device generates a random access identity that meets the length requirement, so that the terminal device can access the random access process normally. wireless network.

结合第三方面,在第三方面的某些实现方式中,该收发模块,还用于向该接入节点发送无线资源控制RRC连接建立完成消息;其中,该RRC连接建立完成消息中包括该终端设备的服务临时移动用户标识,该服务临时移动用户标识包括该临时移动用户标识和第一接入管理节点的标识。With reference to the third aspect, in some implementations of the third aspect, the transceiver module is further configured to send a radio resource control RRC connection establishment complete message to the access node; wherein the RRC connection establishment complete message includes the terminal The service temporary mobile user identity of the device includes the temporary mobile user identity and the identity of the first access management node.

本实施例的技术方案中,在临时移动用户标识扩展到64比特或者更长之后,网络设备可以给更多的用户分配不相冲突的全球唯一临时用户标识,且能保证全球唯一临时用户标识中足够的随机化字段空间,安全性更高。In the technical solution of this embodiment, after the temporary mobile user ID is extended to 64 bits or longer, the network device can allocate non-conflicting globally unique temporary user IDs to more users, and can ensure that the globally unique temporary user IDs Sufficient randomization field space, higher security.

结合第三方面,在第三方面的某些实现方式中,该处理模块具体用于:根据该临时移动用户标识生成该随机接入标识;或者,根据第一全球唯一临时用户标识通过特定算法生成该随机接入标识,该第一全球唯一临时用户标识的组成结构中包括该临时移动用户标识;或者,生成一个随机数作为该随机接入标识。With reference to the third aspect, in some implementations of the third aspect, the processing module is specifically configured to: generate the random access identifier according to the temporary mobile user identifier; or, generate through a specific algorithm according to the first globally unique temporary user identifier For the random access identifier, the composition structure of the first globally unique temporary user identifier includes the temporary mobile user identifier; or, a random number is generated as the random access identifier.

结合第三方面,在第三方面的某些实现方式中,该处理模块具体还用于:With reference to the third aspect, in some implementations of the third aspect, the processing module is further used for:

在一些可能的实现方式中,根据该临时移动用户标识和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to the temporary mobile user identifier and a specific algorithm.

在一些可能的实现方式中,根据该第一接入管理节点的标识,该临时移动用户标识和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.

在一些可能的实现方式中,根据与该第一接入管理节点相关的标识,该临时移动用户标识和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to the identifier related to the first access management node, the temporary mobile user identifier and a specific algorithm.

在一些可能的实现方式中,根据该临时移动用户标识,该服务临时移动用户标识中的其他字段和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to the temporary mobile user identifier, other fields in the service temporary mobile user identifier, and a specific algorithm.

在一些可能的实现方式中,根据该第一接入管理节点的标识中的部分字段,该临时移动用户标识和特定算法,生成该随机接入标识。In some possible implementations, the random access identifier is generated according to some fields in the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.

结合第三方面,在第三方面的某些实现方式中,该收发模块还用于:向该接入节点发 送注册请求消息,该注册请求消息中包括第一全球唯一临时用户标识,该第一全球唯一临时用户标识由该第一接入管理节点分配。With reference to the third aspect, in some implementations of the third aspect, the transceiver module is further configured to: send a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, the first The globally unique temporary user identity is allocated by the first access management node.

结合第三方面,在第三方面的某些实现方式中,该收发模块还用于:接收来自该接入节点的注册接受消息,该注册接受消息中包括第二全球唯一临时用户标识,该第二全球唯一临时用户标识由该第一接入管理节点或第二接入管理节点分配;其中,该第二全球唯一临时用户标识与该第一全球唯一临时用户标识不同,该第一接入管理节点与该第二接入管理节点不同。With reference to the third aspect, in some implementations of the third aspect, the transceiver module is further configured to: receive a registration acceptance message from the access node, where the registration acceptance message includes a second globally unique temporary user identifier, the Two globally unique temporary user identifiers are allocated by the first access management node or the second access management node; wherein, the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management The node is different from the second access management node.

第四方面,提供了一种随机接入的装置,该装置包括:收发模块,用于接收来自终端设备的第一请求消息,该第一请求消息用于在随机接入过程中请求接入无线网络,该第一请求消息中包括随机接入标识,该随机接入标识用于在随机接入过程中标识该终端设备;该收发模块,还用于向该终端设备发送第一响应消息,该第一响应消息中包括该随机接入标识,该随机接入标识的长度小于该终端设备的临时移动用户标识的长度,该临时移动用户标识的长度大于或等于64比特。In a fourth aspect, a random access apparatus is provided, the apparatus includes: a transceiver module, configured to receive a first request message from a terminal device, where the first request message is used to request wireless access in a random access process network, the first request message includes a random access identifier, and the random access identifier is used to identify the terminal device during the random access process; the transceiver module is further configured to send a first response message to the terminal device, the The first response message includes the random access identifier, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.

本实施例的技术方案中,在随机接入过程中时,考虑到临时移动用户标识超出了终端设备和接入节点之间交互的消息长度的限制,终端设备发送和接收的随机接入标识的组成结构中并不会直接包括扩展后的临时移动用户标识,而是由终端设备自己生成随机接入标识。In the technical solution of this embodiment, during the random access process, considering that the temporary mobile user identity exceeds the limit of the length of the message exchanged between the terminal device and the access node, the random access identifier sent and received by the terminal device is The extended temporary mobile user identity is not directly included in the composition structure, but the random access identity is generated by the terminal device itself.

结合第四方面,在第四方面的某些实现方式中,该收发模块,还用于接收来自该终端设备的无线资源控制RRC连接建立完成消息,该RRC连接建立完成消息中包括服务临时移动用户标识,该服务临时移动用户标识包括该临时移动用户标识和第一接入管理节点的标识,该服务临时移动用户标识由该第一接入管理节点分配;处理模块,根据所述服务临时移动用户标识,为该终端设备选择第二接入管理节点。With reference to the fourth aspect, in some implementations of the fourth aspect, the transceiver module is further configured to receive a radio resource control RRC connection establishment complete message from the terminal device, where the RRC connection establishment complete message includes serving the temporary mobile user identification, the service temporary mobile user identification includes the temporary mobile user identification and the identification of the first access management node, the service temporary mobile user identification is allocated by the first access management node; processing module, according to the service temporary mobile user identification, and select a second access management node for the terminal device.

结合第四方面,在第四方面的某些实现方式中,该处理模块还用于:根据该服务临时移动用户标识生成第一标识;当该第一标识与该随机接入标识相同时,该接入节点为该终端设备选择第二接入管理节点。With reference to the fourth aspect, in some implementations of the fourth aspect, the processing module is further configured to: generate a first identifier according to the service temporary mobile user identifier; when the first identifier is the same as the random access identifier, the The access node selects a second access management node for the terminal device.

结合第四方面,在第四方面的某些实现方式中,该处理模块具体还用于:With reference to the fourth aspect, in some implementations of the fourth aspect, the processing module is further used for:

在一些可能的实现方式中,根据该临时移动用户标识和特定算法,生成该第一标识。In some possible implementations, the first identification is generated according to the temporary mobile user identification and a specific algorithm.

在一些可能的实现方式中,根据该第一接入管理节点的标识,该临时移动用户标识和特定算法,生成该第一标识。In some possible implementations, the first identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.

结合第四方面,在第四方面的某些实现方式中,该收发模块还用于接收来自该终端设备的注册请求消息;该收发模块还用于向该第二接入管理节点发送该注册请求消息,该注册请求消息中包括第一全球唯一临时用户标识,该第一全球唯一临时用户标识由该第一接入管理节点为该终端设备分配的。With reference to the fourth aspect, in some implementations of the fourth aspect, the transceiver module is further configured to receive a registration request message from the terminal device; the transceiver module is further configured to send the registration request to the second access management node message, the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated for the terminal device by the first access management node.

结合第四方面,在第四方面的某些实现方式中,该收发模块还用于:接收来自该第二接入管理节点的注册接受消息,向该终端设备发送该注册接受消息;其中,该注册接受消息中包括第二全球唯一临时用户标识,该第二全球唯一临时用户标识是由该第二接入管理节点为该终端设备分配的;其中,该第二全球唯一临时用户标识与该第一全球唯一临时用户标识不同。With reference to the fourth aspect, in some implementations of the fourth aspect, the transceiver module is further configured to: receive a registration acceptance message from the second access management node, and send the registration acceptance message to the terminal device; wherein the The registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated for the terminal device by the second access management node; wherein, the second globally unique temporary user identifier is associated with the first globally unique temporary user identifier. A globally unique temporary user ID is different.

第五方面,提供了一种通信装置,该装置包括:处理器和存储器;该存储器,用于存 储计算机程序;该处理器,用于执行该存储器中存储的计算机程序,以使得该通信装置执行第一方面和第一方面的第一种至第三种任一种可能的实现方式中的通信方法,或执行第二方面和第二方面的第一种至第三种任一种可能的实现方式中的通信方法。In a fifth aspect, a communication device is provided, the device comprising: a processor and a memory; the memory for storing a computer program; the processor for executing the computer program stored in the memory, so that the communication device executes The communication method in the first aspect and any one of the first to third possible implementations of the first aspect, or implementing the second aspect and any one of the first to third possible implementations of the second aspect method of communication.

第六方面,提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,当该计算机程序在计算机上运行时,使得该计算机执行如第一方面和第一方面的第一种至第三种任一种可能的实现方式中的通信方法,或执行如第二方面和第二方面的第一种至第三种任一种可能的实现方式中的通信方法。In a sixth aspect, a computer-readable storage medium is provided, and a computer program is stored on the computer-readable storage medium, and when the computer program runs on a computer, the computer is made to execute the first aspect and the first aspect of the first aspect. A communication method in any one of the possible implementation manners from one to the third, or performing the communication method in any one of the first to third possible implementation manners of the second aspect and the second aspect.

第七方面,提供了一种芯片系统,该芯片系统包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片系统地通信设备执行如第一方面和第一方面的第一种至第三种任一种可能的实现方式中的通信方法,或执行如第二方面和第二方面的第一种至第三种任一种可能的实现方式中的通信方法。In a seventh aspect, a chip system is provided, the chip system includes: a processor for calling and running a computer program from a memory, so that a communication device installed with the chip system executes the first aspect and the first aspect of the first aspect. A communication method in any one of the possible implementation manners from one to the third, or performing the communication method in any one of the first to third possible implementation manners of the second aspect and the second aspect.

根据本申请实施例的方案,在临时移动用户标识的长度大于随机接入标识的长度时,终端设备生成符合长度要求的随机接入标识,使得终端设备在随机接入过程中能够成功接入无线网络。而且,在临时移动用户标识扩展到64比特或者更长之后,网络设备可以给更多的用户分配不相冲突的全球唯一临时用户标识,且能保证全球唯一临时用户标识中足够的随机化字段空间,安全性更高。According to the solution of the embodiment of the present application, when the length of the temporary mobile user identity is greater than the length of the random access identity, the terminal device generates a random access identity that meets the length requirement, so that the terminal device can successfully access the wireless network during the random access process. network. Moreover, after the temporary mobile user identity is extended to 64 bits or longer, the network device can allocate non-conflicting global unique temporary user identities to more users, and can ensure sufficient randomization field space in the global unique temporary user identity , higher security.

附图说明Description of drawings

图1是一种移动通信网络的逻辑架构示意图。FIG. 1 is a schematic diagram of a logical architecture of a mobile communication network.

图2示出了4G网络中GUTI的示意性框图。Figure 2 shows a schematic block diagram of a GUTI in a 4G network.

图3示出了5G网络中5G-GUTI的示意性框图。Figure 3 shows a schematic block diagram of a 5G-GUTI in a 5G network.

图4示出了基于竞争的随机接入过程的示意性交互图。FIG. 4 shows a schematic interaction diagram of a contention-based random access procedure.

图5是本申请的随机接入的方法的一例示意性交互图。FIG. 5 is a schematic interaction diagram of an example of the random access method of the present application.

图6是本申请的随机接入的方法的另一例示意性交互图。FIG. 6 is a schematic interaction diagram of another example of the random access method of the present application.

图7是本申请的终端设备的一例的示意性框图。FIG. 7 is a schematic block diagram of an example of a terminal device of the present application.

图8是本申请的接入节点的一例的示意性框图。FIG. 8 is a schematic block diagram of an example of an access node of the present application.

图9是本申请的通信装置的一例的示意性框图。FIG. 9 is a schematic block diagram of an example of a communication device of the present application.

图10是本申请的通信装置的再一例的示意性框图。FIG. 10 is a schematic block diagram of still another example of the communication device of the present application.

具体实施方式Detailed ways

下面将结合附图,对本申请中的技术方案进行描述。The technical solutions in the present application will be described below with reference to the accompanying drawings.

在本申请中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在2个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进 程来通信。As used in this application, the terms "component," "module," "system," etc. are used to refer to a computer-related entity, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device may be components. One or more components may reside within a process and/or thread of execution, and a component may be localized on one computer and/or distributed between 2 or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. A component may, for example, be based on a signal having one or more data packets (eg, data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet interacting with other systems via signals) Communicate through local and/or remote processes.

本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(global system of mobile communication,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、第五代系统或新无线(new radio,NR),以及未来通信系统等。The technical solutions of the embodiments of the present application can be applied to various communication systems, such as: global system of mobile communication (GSM) system, code division multiple access (CDMA) system, wideband code division multiple access (wideband code division multiple access, WCDMA) system, general packet radio service (general packet radio service, GPRS), long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE Time division duplex (TDD), universal mobile telecommunication system (UMTS), worldwide interoperability for microwave access (WiMAX) communication system, fifth generation system or new wireless (new radio, NR), and future communication systems.

随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(device to device,D2D)通信,机器到机器(machine to machine,M2M)通信,机器类型通信(machine type communication,MTC),车联网(vehicle to everything,V2X)通信,例如,车到车(vehicle to vehicle,V2V)通信、车到基础设施(vehicle to infrastructure,V2I)通信,车到行人(vehicle to pedestrian,V2P)通信,车到网络(vehicle to network,V2N)通信。With the development of communication technology, mobile communication systems will not only support traditional communication, but also support, for example, device to device (D2D) communication, machine to machine (M2M) communication, machine type communication ( machine type communication, MTC), vehicle to everything (V2X) communication, for example, vehicle to vehicle (V2V) communication, vehicle to infrastructure (V2I) communication, vehicle to pedestrian (vehicle to pedestrian) to pedestrian, V2P) communication, vehicle to network (vehicle to network, V2N) communication.

图1是一种移动通信网络的逻辑架构示意图,下面对该网络逻辑架构中可能涉及的各个网元分别进行说明。FIG. 1 is a schematic diagram of a logical architecture of a mobile communication network. Each network element that may be involved in the logical architecture of the network will be described below.

1、终端设备:可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备,以及各种形式的终端,移动台(mobile station,MS),终端(terminal),用户设备(user equipment,UE),软终端等等。例如,水表、电表、传感器等。1. Terminal equipment: It can include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of terminals, mobile stations (mobile stations, MS ), terminal (terminal), user equipment (UE), soft terminal, etc. For example, water meters, electricity meters, sensors, etc.

2、接入节点:用于为特定区域的授权终端设备提供入网功能,并能够根据终端设备的级别,业务的需求等使用不同质量的传输隧道。2. Access node: It is used to provide network access function for authorized terminal equipment in a specific area, and can use transmission tunnels of different qualities according to the level of terminal equipment and service requirements.

接入节点可以是(无线)接入网络(radio access network,(R)AN)网元,用于管理无线资源,为终端设备提供接入服务,进而完成控制信号和终端设备数据在终端设备和核心网之间的转发,(R)AN网元也可以理解为传统网络中的基站。The access node can be a (radio access network, (R)AN) network element, which is used to manage wireless resources, provide access services for terminal equipment, and then complete control signals and terminal equipment data in terminal equipment and terminal equipment. For forwarding between core networks, the (R)AN network element can also be understood as a base station in a traditional network.

需要说明的是,上述“网元”也可以称为实体、设备、装置或模块等,本申请并未特别限定。并且,在本申请中,为了便于理解和说明,在对部分描述中省略“网元”这一描述,例如,将(R)AN网元简称(R)AN,此情况下,该“(R)AN网元”应理解为(R)AN网元或(R)AN实体,以下,省略对相同或相似情况的说明。It should be noted that the above-mentioned "network element" may also be referred to as an entity, a device, an apparatus, or a module, etc., which is not particularly limited in this application. In addition, in this application, in order to facilitate understanding and description, the description of "network element" is omitted in some descriptions. For example, the (R)AN network element is abbreviated as (R)AN, in this case, the "(R)AN ")AN network element" should be understood as (R)AN network element or (R)AN entity, and below, the description of the same or similar situations is omitted.

接入节点也可以包括集中单元(centralized unit,CU)节点、或分布单元(distributed unit,DU)节点、或包括CU节点和DU节点的RAN设备、或者包括控制面CU节点(CU-CP节点)和用户面CU节点(CU-UP节点)以及DU节点。The access node may also include a centralized unit (CU) node, or a distributed unit (DU) node, or a RAN device including a CU node and a DU node, or a control plane CU node (CU-CP node) and user plane CU nodes (CU-UP nodes) and DU nodes.

3、接入管理节点:主要用于移动性管理和接入管理等。具体地,可以用于实现移动性管理实体(mobility management entity,MME)功能中除会话管理之外的其它功能,例如,合法监听以及接入授权/鉴权等功能。3. Access management node: mainly used for mobility management and access management. Specifically, it can be used to implement functions other than session management in the functions of a mobility management entity (mobility management entity, MME), for example, functions such as legal interception and access authorization/authentication.

在5G通信系统中,该接入管理网元可以是接入和移动性管理功能(access and mobility management function,AMF)网元。在未来通信系统中,接入管理网元仍可以是AMF网元,或者,还可以有其它的名称,本申请不做限定。In a 5G communication system, the access management network element may be an access and mobility management function (AMF) network element. In the future communication system, the access management network element may still be an AMF network element, or may have other names, which are not limited in this application.

4、数据管理功能网元:用于处理终端设备标识,接入鉴权,注册以及移动性管理等。4. Data management function network element: used to process terminal equipment identification, access authentication, registration and mobility management.

在5G通信系统中,该数据管理网元可以是统一数据管理(unified data management,UDM)网元。在未来通信系统中,统一数据管理仍可以是UDM网元,或者,还可以有其它的名称,本申请不做限定。In a 5G communication system, the data management network element may be a unified data management (unified data management, UDM) network element. In the future communication system, the unified data management may still be a UDM network element, or may have other names, which are not limited in this application.

在介绍本申请实施例之前,首先简单介绍几个与本申请实施例相关的标识名称,它们可以是本申请中提及的4G或5G系统中的对应标识。应注意,在以后的通信系统中,这些标识可能沿用现有的标识名称,也可能是其他的标识名称,本申请对此不做限定。Before introducing the embodiments of the present application, first briefly introduce several identifier names related to the embodiments of the present application, which may be corresponding identifiers in the 4G or 5G system mentioned in the present application. It should be noted that in future communication systems, these identifiers may use existing identifier names, or may be other identifier names, which are not limited in this application.

1、全球唯一临时用户标识1. Globally Unique Temporary User ID

在无线网络中,终端设备的永久标识可以用来唯一标识终端设备,如国际移动用户识别码(international mobile subscriber identity,IMSI)。但是,无线网络直接传递永久标识会存在安全风险,为此网络设备会为终端设备分配全球唯一临时用户标识。上述全球唯一临时用户标识用于临时且唯一标识终端设备。In a wireless network, the permanent identification of the terminal equipment can be used to uniquely identify the terminal equipment, such as the International Mobile Subscriber Identity (IMSI). However, there is a security risk when the wireless network directly transmits the permanent identity, and for this reason, the network device will assign a globally unique temporary user identity to the terminal device. The above-mentioned globally unique temporary user identifier is used to temporarily and uniquely identify the terminal device.

为了进一步提升安全性,网络设备还会经常更新终端设备的全球唯一临时用户标识。比如,该全球唯一临时用户标识可以是第四代(4th generation,4G)系统中的全球唯一临时用户标识(globally unique temporary UE identity,GUTI),或者第五代(5th generation,5G)系统中的5G全球唯一临时用户标识(globally unique temporary UE identity,5G-GUTI)。图2是全球唯一临时用户标识在4G系统中的示意图,图3是全球唯一临时用户标识在5G系统中的示意图。In order to further improve security, the network device will also frequently update the globally unique temporary user identifier of the terminal device. For example, the globally unique temporary user identity may be the globally unique temporary user identity (GUTI) in the fourth generation (4th generation, 4G) system, or the globally unique temporary user identity (GUTI) in the fifth generation (5th generation, 5G) system. 5G Globally Unique Temporary UE Identity (5G-GUTI). FIG. 2 is a schematic diagram of a global unique temporary user identity in a 4G system, and FIG. 3 is a schematic diagram of a global unique temporary user identity in a 5G system.

2、临时移动用户标识2. Temporary mobile user ID

为了使得网络设备根据全球唯一临时用户标识能够迅速找到本地存储的终端设备的上下文,在为终端设备分配全球唯一临时用户标识时,会将终端设备的临时移动用户标识作为全球唯一临时用户标识中的部分字段。In order to enable the network device to quickly find the locally stored context of the terminal device according to the globally unique temporary user identity, when allocating the globally unique temporary user identity to the terminal device, the temporary mobile user identity of the terminal device will be used as the Some fields.

此外,临时移动用户标识中预留有随机化字段,以便终端设备的全球唯一临时用户标识能够经常变化。In addition, a randomization field is reserved in the temporary mobile user identity, so that the globally unique temporary user identity of the terminal device can change frequently.

具体地,该临时移动用户标识可以是4G系统中的M-TMSI(MME-temporary mobile subscriber identity),或者5G系统中的5G-TMSI(5G-temporary mobile subscriber identity)。例如,该临时移动用户标识可以是图2中的M-TMSI或者是图3中的5G-TMSI。Specifically, the temporary mobile subscriber identity may be M-TMSI (MME-temporary mobile subscriber identity) in the 4G system, or 5G-TMSI (5G-temporary mobile subscriber identity) in the 5G system. For example, the temporary mobile subscriber identity may be the M-TMSI in FIG. 2 or the 5G-TMSI in FIG. 3 .

其中,网络设备可以是5G系统中的AMF,还可以是4G系统中的MME,也可以是其它存储有终端设备的上下文的网络侧设备,不予限制。The network device may be an AMF in a 5G system, an MME in a 4G system, or other network-side devices that store the context of the terminal device, which is not limited.

3、服务临时移动用户标识3. Service Temporary Mobile User ID

为了使得在无线网络内的其他设备能够寻址到服务终端设备的上述网络设备,网络设备在分配全球唯一临时用户标识时,会将用于标识该网络设备的网络设备标识作为全球唯一临时用户标识中的某些字段。服务临时移动用户标识由上述临时移动用户标识和网络设备标识组成。该服务临时移动用户标识可以是4G系统中的S-TMSI(serving-temporary mobile subscriber identity)或者5G系统中的5G-S-TMSI(5G-S serving-temporary mobile subscriber identity)。该服务临时移动用户标识可以是图2中的S-TMSI或者图3中的5G-S-TMSI。In order to enable other devices in the wireless network to address the above-mentioned network device serving the terminal device, when the network device allocates the globally unique temporary user identifier, the network device identifier used to identify the network device will be used as the globally unique temporary user identifier. some fields in . The serving temporary mobile user identity is composed of the above-mentioned temporary mobile user identity and the network device identity. The serving temporary mobile subscriber identity may be S-TMSI (serving-temporary mobile subscriber identity) in the 4G system or 5G-S-TMSI (5G-S serving-temporary mobile subscriber identity) in the 5G system. The serving temporary mobile subscriber identity may be the S-TMSI in FIG. 2 or the 5G-S-TMSI in FIG. 3 .

换句话说,在无线网络内的其他设备可以先根据服务临时移动用户标识中的网络标识,寻址到服务终端设备的上述网络设备,再根据服务临时移动用户标识中的临时移动用户标 识,找到该终端设备在该网络设备中的上下文。In other words, other devices in the wireless network can first address the above-mentioned network device serving the terminal device according to the network ID in the serving temporary mobile user ID, and then find out according to the temporary mobile user ID in the serving temporary mobile user ID The context of the terminal device in the network device.

4、随机接入标识4. Random access identification

该随机接入标识在随机接入过程中用来标识终端设备。具体地,终端设备给网络设备发送随机接入标识,网络设备确定允许终端设备接入无线网络之后,向终端设备发送该随机接入标识,终端设备根据接收到的随机接入标识与自身发送的一致来获知随机接入成功。随机接入标识在现有的4G网络中可以是如图2所示的无线接入用户标识,长度为40比特,包括M-TMSI和MME Code;在5G网络中,随机接入标识和图3中的无线接入用户标识的组成结构一致,长度为39比特,包括5G-TMSI和一些与AMF标识有关的字段。The random access identifier is used to identify the terminal equipment in the random access process. Specifically, the terminal device sends the random access identifier to the network device, and after the network device determines that the terminal device is allowed to access the wireless network, it sends the random access identifier to the terminal device. It is consistent to know that the random access is successful. In the existing 4G network, the random access identifier can be the wireless access user identifier as shown in Figure 2, with a length of 40 bits, including M-TMSI and MME Code; in the 5G network, the random access identifier and Figure 3 The composition and structure of the wireless access user identity in the WLAN are the same, with a length of 39 bits, including 5G-TMSI and some fields related to the AMF identity.

下面介绍一下随机接入过程。The random access process is described below.

随机接入过程是指从用户发送随机接入前导序列开始尝试接入网络到与网络间建立起基本的信令连接之间的过程,随机接入过程是对于任意一个蜂窝通信系统的最基本要求之一,用于使终端与网络侧建立数据通信。随机接入过程分为:基于竞争的随机接入过程和基于非竞争的随机接入过程,图4示出了基于竞争的随机接入过程的4个步骤,包括:The random access process refers to the process from when the user sends the random access preamble sequence and attempts to access the network to the establishment of a basic signaling connection with the network. The random access process is the most basic requirement for any cellular communication system. One of them is used to enable the terminal to establish data communication with the network side. The random access process is divided into: a contention-based random access process and a non-contention-based random access process. Figure 4 shows the four steps of the contention-based random access process, including:

S401,终端设备发送随机接入前导序列(preamble)给接入节点;S401, the terminal device sends a random access preamble sequence (preamble) to the access node;

S402,接入节点广播随机接入响应,终端设备通过读取系统广播消息,获得接入节点发送的信息;S402, the access node broadcasts a random access response, and the terminal device obtains the information sent by the access node by reading the system broadcast message;

S403,终端设备向接入节点发送初始上行传输消息。S403, the terminal device sends an initial uplink transmission message to the access node.

终端在接收到随机接入响应后,在分配的上行资源上传输消息。可能有多个终端设备读取了接入节点的系统广播消息,选择相同的资源同时接入,因此在此步骤的消息中,终端设备携带终端设备的标识,即现有的无线接入用户标识。例如,如图2所示的40比特长的S-TMSI;或者如图3所示的无线接入用户标识,长度为39比特。由图可见,无线接入用户标识的组成结构中包括临时移动用户标识。After receiving the random access response, the terminal transmits a message on the allocated uplink resources. There may be multiple terminal devices that read the system broadcast message of the access node and select the same resource to access at the same time. Therefore, in the message of this step, the terminal device carries the identification of the terminal device, that is, the existing wireless access user identification. . For example, the 40-bit S-TMSI shown in FIG. 2; or the wireless access user identity shown in FIG. 3, the length is 39 bits. As can be seen from the figure, the composition structure of the wireless access user identity includes the temporary mobile user identity.

S404,接入节点向终端设备发送竞争解决消息。S404, the access node sends a contention resolution message to the terminal device.

示例性地,如果终端设备在冲突解决中胜出,接入节点将胜出的终端设备的无线接入用户标识返回给终端设备。终端设备根据接收到的无线接入用户标识与自己发送的一致,获知自己接入成功。随后,终端设备可以向网络侧发送注册请求消息进行网络注册。Exemplarily, if the terminal device wins the conflict resolution, the access node returns the wireless access user identity of the winning terminal device to the terminal device. The terminal device learns that its access is successful according to the consistency between the received wireless access user ID and the one sent by itself. Subsequently, the terminal device may send a registration request message to the network side to perform network registration.

需要说明的是,上述无线接入用户标识是有限制长度的,比如在4G系统中不能超过40比特,在5G系统中不能超过39比特。上述无线接入用户标识的组成结构中包括临时移动用户标识。It should be noted that the above-mentioned wireless access user identifier has a limited length, for example, it cannot exceed 40 bits in a 4G system, and cannot exceed 39 bits in a 5G system. The composition structure of the above wireless access user identity includes a temporary mobile user identity.

目前,临时移动用户标识的长度为32比特,而网络设备为了支持百万级甚至千万级数量的用户,且保证分配的临时标识不冲突,可以将临时移动用户标识的长度扩展到64比特或者更长。在扩展临时移动用户标识之后,如果仍采用现有的无线接入用户标识的组成结构,那么无线接入用户标识的长度就超过了上述长度限制,导致终端设备接入失败。At present, the length of the temporary mobile user identity is 32 bits, and in order to support millions or even tens of millions of users, and to ensure that the allocated temporary identity does not conflict, the length of the temporary mobile user identity can be extended to 64 bits or longer. After the temporary mobile user identity is extended, if the existing wireless access user identity composition structure is still used, the length of the wireless access user identity exceeds the above-mentioned length limit, resulting in failure of the terminal device to access.

例如,扩展后的临时移动用户标识的长度大于或等于64比特时,在随机接入过程中的步骤3时,如果无线接入用户标识仍然延用现有的组成结构,那它的长度会超过终端设备发送的“初始上行传输消息”的长度限制,导致随机接入失败。For example, when the length of the extended temporary mobile user identity is greater than or equal to 64 bits, in step 3 of the random access process, if the wireless access user identity still uses the existing structure, its length will exceed The length limit of the "Initial Uplink Transmission Message" sent by the terminal equipment causes random access failure.

图5示出了本申请的随机接入的方法500的一例示意性交互图,该方法500由终端设备和接入节点执行,如下所述。FIG. 5 shows an example of a schematic interaction diagram of a random access method 500 of the present application, where the method 500 is performed by a terminal device and an access node, as described below.

S501,终端设备生成随机接入标识。S501, the terminal device generates a random access identifier.

其中,随机接入标识用于在随机接入过程中标识该终端设备。Wherein, the random access identifier is used to identify the terminal equipment in the random access process.

可选地,该随机接入标识的长度符合长度要求,即小于或等于第一预设长度,以满足终端设备与接入节点之间的第一请求消息的正常传输。例如,第一预设长度为上述无线接入用户标识的限制长度,即该随机接入标识的长度可以小于或等于上述无线接入用户标识的限制长度,比如在4G系统中的40比特,在5G系统中的39比特。即,这里的“随机接入标识”在现有的4G通信系统下长度要求为40比特,现有的5G通信系统下长度要求为39比特,在以后的通信系统中的长度要求可能与现有系统中一致,也可能与现有系统中不一致,本申请不做限定。Optionally, the length of the random access identifier meets the length requirement, that is, it is less than or equal to the first preset length, so as to satisfy the normal transmission of the first request message between the terminal device and the access node. For example, the first preset length is the restricted length of the above-mentioned wireless access user identification, that is, the length of the random access identification may be less than or equal to the above-mentioned restricted length of the wireless access user identification, such as 40 bits in the 4G system, in the 39 bits in a 5G system. That is, the length requirement of the "random access identifier" here is 40 bits under the existing 4G communication system, and 39 bits under the existing 5G communication system. It is consistent in the system, and may also be inconsistent with the existing system, which is not limited in this application.

可选地,在扩展临时移动用户标识场景中,假设扩展后的临时移动用户标识的长度大于或等于64比特,该随机接入标识的长度小于扩展后的临时移动用户标识的长度。Optionally, in the extended temporary mobile user identity scenario, it is assumed that the length of the extended temporary mobile user identity is greater than or equal to 64 bits, and the length of the random access identity is less than the length of the extended temporary mobile user identity.

作为一个示例,该步骤在随机接入过程中的第二个交互信息与第三个交互信息之间,即在终端设备接收来自接入节点的随机接入响应消息(对应于图4中的S402)和终端设备向接入节点发送初始上行传输消息(对应于图4中的S403)之间。As an example, this step is between the second interaction information and the third interaction information in the random access process, that is, the terminal device receives the random access response message from the access node (corresponding to S402 in FIG. 4 ). ) and the terminal device sends an initial uplink transmission message to the access node (corresponding to S403 in FIG. 4 ).

在本申请中,终端设备自行生成符合消息长度要求的、能标识终端设备的随机接入标识。其中,“能标识终端设备”并不一定要求随机接入标识的组成结构中包括临时移动用户标识的字段,例如,终端设备可以基于临时移动用户标识生成符合长度要求的随机接入标识,也可以将生成符合长度要求的随机数作为随机接入标识,具体如下所述。In the present application, the terminal device automatically generates a random access identifier that meets the message length requirement and can identify the terminal device. Wherein, "capable of identifying terminal equipment" does not necessarily require that the composition structure of the random access identifier includes the field of the temporary mobile user identifier. For example, the terminal device may generate a random access identifier that meets the length requirements based on the temporary mobile user identifier, or A random number that meets the length requirement is generated as the random access identifier, as described below.

方式一,终端设备根据临时移动用户标识生成随机接入标识。Manner 1: The terminal device generates a random access identifier according to the temporary mobile user identifier.

在一种可选的实现中,终端设备根据临时移动用户标识和特定算法,生成该随机接入标识。例如,在4G网络中,可以将图2中的M-TMSI通过特定算法生成随机接入标识;在5G网络中,可以将图3中的5G-TMSI通过特定算法生成随机接入标识。In an optional implementation, the terminal device generates the random access identifier according to the temporary mobile user identifier and a specific algorithm. For example, in a 4G network, the M-TMSI in FIG. 2 can be used to generate a random access identifier through a specific algorithm; in a 5G network, the random access identifier can be generated from the 5G-TMSI in FIG. 3 through a specific algorithm.

在另一种可选的实现中,根据第一接入管理节点的标识、临时移动用户标识和特定算法,生成随机接入标识。例如,在4G网络中,可以将图2中的M-TMSI和MME Code,即S-TMSI,通过特定算法生成随机接入标识,或者将M-TMSI、MME Code和MME Group ID一起通过特定算法生成随机接入标识。在5G网络中,可以将5G-TMSI和AMF Pointer通过特定算法生成随机接入标识,或者将5G-TMSI、AMF Pointer和AMF Set ID,即5G-S-TMSI,通过特定算法生成随机接入标识,或者将5G-S-TMSI和AMF Region ID通过特定算法生成随机接入标识。In another optional implementation, the random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm. For example, in a 4G network, the M-TMSI and MME Code in Fig. 2, that is, S-TMSI, can be used to generate a random access identifier through a specific algorithm, or the M-TMSI, MME Code and MME Group ID can be used together through a specific algorithm. Generate a random access identifier. In the 5G network, 5G-TMSI and AMF Pointer can be used to generate random access identifiers through specific algorithms, or 5G-TMSI, AMF Pointer and AMF Set ID, namely 5G-S-TMSI, can be generated through specific algorithms to generate random access identifiers , or generate a random access identifier from 5G-S-TMSI and AMF Region ID through a specific algorithm.

在另一种可选的实现中,终端设备根据第一接入管理节点的标识的部分字段、临时移动用户标识和特定算法,生成随机接入标识。例如,可以将图3中的无线接入用户标识通过特定算法生成随机接入标识,或者将AMF Set ID中的1个比特,与AMF Pointer、5G-TMSI一起,通过特定算法生成随机接入标识。In another optional implementation, the terminal device generates a random access identifier according to a partial field of the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm. For example, the wireless access user identity in FIG. 3 can be used to generate a random access identity through a specific algorithm, or one bit in the AMF Set ID can be used together with AMF Pointer and 5G-TMSI to generate a random access identity through a specific algorithm. .

方式二,终端设备根据第一全球唯一临时用户标识和特定算法生成随机接入标识。In a second manner, the terminal device generates a random access identifier according to the first globally unique temporary user identifier and a specific algorithm.

作为一个示例,将4G网络中的整个GUTI通过特定算法生成40比特的随机接入标识;或者将5G网络中的整个5G-GUTI通过特定算法生成39比特的随机接入标识。As an example, a 40-bit random access identifier is generated from the entire GUTI in the 4G network through a specific algorithm; or a 39-bit random access identifier is generated from the entire 5G-GUTI in the 5G network through a specific algorithm.

需要指出的是,上述提及的“特定算法”可以是哈希摘要算法,不予限制。It should be pointed out that the "specific algorithm" mentioned above may be a hash digest algorithm, which is not limited.

方式三,终端设备生成一个随机数作为该随机接入标识。Manner 3: The terminal device generates a random number as the random access identifier.

其中,该随机数的长度符合上述长度要求即可,即小于或等于第一预设长度。Wherein, the length of the random number only needs to meet the above-mentioned length requirements, that is, it is less than or equal to the first preset length.

S502,终端设备向接入节点发送第一请求消息,该第一请求消息中包括上述随机接入 标识。S502, the terminal device sends a first request message to the access node, where the first request message includes the above random access identifier.

其中,第一请求消息可以用于在随机接入过程中请求接入无线网络,具体可以为随机接入请求消息或上行初始传输消息,不予限制。The first request message may be used to request access to the wireless network in the random access process, and may specifically be a random access request message or an uplink initial transmission message, which is not limited.

示例性地,终端设备向接入节点发送无线资源控制RRC连接建立请求消息,该消息中包括第一请求消息,而该第一请求消息中包括终端设备在步骤S501中生成的随机接入标识。Exemplarily, the terminal device sends a radio resource control RRC connection establishment request message to the access node, where the message includes a first request message, and the first request message includes the random access identifier generated by the terminal device in step S501.

S503,接入节点向终端设备发送第一响应消息,第一响应消息中包括随机接入标识。S503, the access node sends a first response message to the terminal device, where the first response message includes a random access identifier.

应理解,接入节点会在第一响应消息中将随机接入的竞争中胜出的终端设备的随机接入标识发送给终端设备,若接收到的随机接入标识为自己的随机接入标识,则终端设备获知自己接入成功。It should be understood that the access node will send the random access identifier of the terminal device that wins the random access competition to the terminal device in the first response message. If the received random access identifier is its own random access identifier, Then the terminal device learns that its access is successful.

示例性地,接入节点会给终端设备发送RRC连接建立响应消息,该RRC连接建立响应消息中包括该第一响应消息。Exemplarily, the access node sends an RRC connection establishment response message to the terminal device, where the RRC connection establishment response message includes the first response message.

其中,该第一响应消息用于响应第一请求消息,具体可以为在随机接入过程中的竞争解决消息,不予限制。Wherein, the first response message is used to respond to the first request message, and may specifically be a contention resolution message in the random access process, which is not limited.

基于上述实施例提供的方法,终端设备能够生成符合长度要求的随机接入标识,该随机接入标识用于在随机接入过程中标识该终端设备,使得终端设备能够在随机接入过程中正常地接入无线网络。该方法能够避免在临时移动用户标识扩展到64比特或者更长之后,采用现有的无线移动用户标识进行随机接入而导致的接入失败。Based on the methods provided by the above embodiments, the terminal device can generate a random access identifier that meets the length requirement, and the random access identifier is used to identify the terminal device during the random access process, so that the terminal device can normally operate during the random access process. access to the wireless network. The method can avoid access failure caused by using the existing wireless mobile subscriber identity to perform random access after the temporary mobile subscriber identity is extended to 64 bits or longer.

可选地,在上述实施例的一种实现场景中,在步骤S503之后,上述方法还包括:终端设备向接入节点发送无线资源控制RRC连接建立完成消息,该RRC连接建立完成消息中包括服务临时移动用户标识,该服务临时移动用户标识包括临时移动用户标识和第一接入管理节点的标识。Optionally, in an implementation scenario of the above embodiment, after step S503, the above method further includes: the terminal device sends a radio resource control RRC connection establishment complete message to the access node, where the RRC connection establishment complete message includes the service The temporary mobile user identity, the serving temporary mobile user identity includes the temporary mobile user identity and the identity of the first access management node.

应理解,终端设备在随机接入成功后,也即RRC连接建立完成后,会向接入节点发送RRC连接建立完成消息,该消息携带服务临时移动用户标识。It should be understood that after the random access is successful, that is, after the RRC connection establishment is completed, the terminal device will send an RRC connection establishment complete message to the access node, where the message carries the serving temporary mobile user identity.

其中,该服务临时移动用户标识可以用于标识该终端设备在第一接入管理节点中的上下文。The serving temporary mobile user identity may be used to identify the context of the terminal device in the first access management node.

可选地,在扩展临时移动用户标识的场景中,上述服务临时移动用户标识包括扩展后的临时移动用户标识。由于RRC连接建立完成消息没有消息长度限制,因此该消息可以直接携带上述服务临时移动用户标识。例如,在4G通信系统中,终端设备向接入节点发送S-TMSI,其中包括的M-TMSI的长度大于或等于64比特;或者在5G通信系统中,终端设备向接入节点发送5G-S-TMSI,其中包括的5G-TMSI的长度大于或等于64比特。Optionally, in the scenario of extending the temporary mobile user identity, the above-mentioned serving temporary mobile user identity includes the extended temporary mobile user identity. Since the RRC connection establishment complete message has no message length limit, the message can directly carry the above-mentioned serving temporary mobile user identity. For example, in a 4G communication system, the terminal device sends an S-TMSI to the access node, and the length of the included M-TMSI is greater than or equal to 64 bits; or in a 5G communication system, the terminal device sends a 5G-S to the access node. - TMSI, the length of the included 5G-TMSI is greater than or equal to 64 bits.

另外,该RRC连接建立完成消息中还包括非接入层(non-access stratum,NAS)的消息,该NAS消息为注册请求消息。In addition, the RRC connection establishment completion message further includes a non-access stratum (non-access stratum, NAS) message, and the NAS message is a registration request message.

其中,该注册请求消息中包括第一全球唯一临时用户标识,该标识由该第一接入管理节点分配。例如,在4G通信系统中,终端设备向接入节点发送第一GUTI;或者在5G通信系统中,终端设备向接入节点发送第一5G-GUTI。Wherein, the registration request message includes a first globally unique temporary user identifier, and the identifier is allocated by the first access management node. For example, in the 4G communication system, the terminal device sends the first GUTI to the access node; or in the 5G communication system, the terminal device sends the first 5G-GUTI to the access node.

进一步地,在接收到RRC连接建立完成消息之后,接入节点还可以对该终端设备的身份进行验证。具体地,接入节点可以根据该服务临时移动用户标识生成第一标识;若该第一标识与该随机接入标识相同,则该终端设备的身份验证成功。Further, after receiving the RRC connection establishment complete message, the access node may also verify the identity of the terminal device. Specifically, the access node may generate a first identifier according to the service temporary mobile user identifier; if the first identifier is the same as the random access identifier, the identity verification of the terminal device is successful.

在一种可选的实现方式中,接入节点根据临时移动用户标识和特定算法,生成第一标识。例如,如果终端设备在步骤S501中是根据临时移动用户标识和特定算法生成随机接入标识的,那么接入节点可以根据RRC连接建立完成消息中的服务临时移动用户标识的组成结构中的临时移动用户标识,以及该特定算法生成该第一标识。In an optional implementation manner, the access node generates the first identifier according to the temporary mobile user identifier and a specific algorithm. For example, if the terminal device generates the random access identity according to the temporary mobile user identity and the specific algorithm in step S501, the access node can use the temporary mobile user identity in the RRC connection establishment complete message according to the composition structure of the temporary mobile user identity. User identification, and the specific algorithm generates the first identification.

在另一种可选的实现方式中,接入节点根据第一接入管理节点的标识、临时移动用户标识和特定算法,生成该第一标识。例如,如果终端设备在步骤S501中是根据临时移动用户标识,第一接入管理节点的标识和特定算法生成随机接入标识的,那么接入节点可以根据RRC连接建立完成消息中的服务临时移动用户标识的组成结构中的临时移动用户标识和第一接入管理节点的标识,以及该特定算法生成第一标识。In another optional implementation manner, the access node generates the first identifier according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm. For example, if the terminal device generates the random access identifier according to the temporary mobile user identifier, the identifier of the first access management node and a specific algorithm in step S501, the access node can temporarily move according to the service in the RRC connection establishment complete message The temporary mobile user identity and the identity of the first access management node in the composition structure of the user identity, and the specific algorithm generates the first identity.

其中,该特定算法可以是哈希摘要算法,不予限制。Wherein, the specific algorithm may be a hash digest algorithm, which is not limited.

特别地,如果在S501中,终端设备使用的是生成随机数的方式,或者通过特定算法生成随机接入标识之前的标识中有不包括在服务临时移动用户标识中的字段,则接入节点并不能验证终端设备的身份。In particular, if in S501, the terminal device uses the method of generating random numbers, or the identifier before the random access identifier is generated by a specific algorithm has a field that is not included in the serving temporary mobile user identifier, the access node and the The identity of the end device could not be verified.

如果该第一标识和接入节点在步骤S502中接收到的随机接入标识一致,则会允许终端设备触发注册流程,即为终端设备选择第二接入管理节点,然后向第二接入管理节点发送服务临时移动用户标识。If the first identifier is consistent with the random access identifier received by the access node in step S502, the terminal device is allowed to trigger the registration process, that is, the second access management node is selected for the terminal device, and then the second access management node is sent to the second access management node. The node sends the service temporary mobile user identity.

基于上述实施例的方案,接入节点在随机接入过程之后验证终端设备的身份,进一步提高随机接入过程的准确性和安全性。Based on the solutions of the above embodiments, the access node verifies the identity of the terminal device after the random access process, which further improves the accuracy and security of the random access process.

随后,接入节点向该第二接入管理节点转发注册请求消息,该注册请求消息中包括第一全球临时用户标识。该第一全球临时用户标识是由第一接入管理节点分配的,第一接入管理节点和第二接入管理节点可以相同,可以不同。进一步地,第二接入管理节点在接收终端设备的注册请求之后,会为该终端设备分配一个全球临时用户标识给终端设备,本申请中可以称之为第二全球临时用户标识。第二接入管理节点将该第二全球临时用户标识携带在注册接受消息中发送给该终端设备。Subsequently, the access node forwards a registration request message to the second access management node, where the registration request message includes the first global temporary user identity. The first global temporary user identity is allocated by the first access management node, and the first access management node and the second access management node may be the same or different. Further, after receiving the registration request from the terminal device, the second access management node will allocate a global temporary user identifier to the terminal device, which may be referred to as the second global temporary user identifier in this application. The second access management node carries the second global temporary user identity in a registration acceptance message and sends it to the terminal device.

需要说明的是,不管为终端设备分配第二全球临时用户标识的是第二接入管理节点还是第一接入管理节点,第二全球临时用户标识和第一全球临时用户标识都不相同。It should be noted that, regardless of whether the second access management node or the first access management node allocates the second global temporary user identifier to the terminal device, the second global temporary user identifier and the first global temporary user identifier are different.

根据本申请实施例的方案,终端设备生成符合长度要求的随机接入标识,使得终端设备在随机接入过程中能够正常地接入无线网络。而且,在临时移动用户标识扩展到64比特或者更长之后,网络设备可以给更多的用户分配不相冲突的全球唯一临时用户标识,且能保证全球唯一临时用户标识中足够的随机化字段空间,安全性更高。According to the solutions of the embodiments of the present application, the terminal device generates a random access identifier that meets the length requirement, so that the terminal device can normally access the wireless network during the random access process. Moreover, after the temporary mobile user identity is extended to 64 bits or longer, the network device can allocate non-conflicting global unique temporary user identities to more users, and can ensure sufficient randomization field space in the global unique temporary user identity , higher security.

图6示出了本申请一实施例的随机接入的方法600的示意性交互图。FIG. 6 shows a schematic interaction diagram of a random access method 600 according to an embodiment of the present application.

S601,终端设备向接入节点发送随机接入前导序列。S601, a terminal device sends a random access preamble sequence to an access node.

示例性地,终端设备在接入无线网络时,触发随机接入过程,通过随机接入过程请求接入节点分配上行链路资源,并和接入节点建立上行链路同步。终端设备可以随机选择一个前导序列作为随机接入前导序列,并在随机接入信道上发送给接入节点。Exemplarily, when the terminal device accesses the wireless network, it triggers a random access process, requests the access node to allocate uplink resources through the random access process, and establishes uplink synchronization with the access node. The terminal equipment can randomly select a preamble sequence as the random access preamble sequence, and send it to the access node on the random access channel.

S602,接入节点广播随机接入响应,终端设备接收随机接入响应。S602, the access node broadcasts a random access response, and the terminal device receives the random access response.

示例性地,接入节点检测到终端设备发送的随机前导序列后,可以通过系统广播消息发送随机接入响应。Exemplarily, after detecting the random preamble sequence sent by the terminal device, the access node may send a random access response through a system broadcast message.

其中,随机接入响应中可以包括在S601中收到的随机接入前导序列和为该终端设备 分配的上行资源的信息等。Wherein, the random access response may include the random access preamble sequence received in S601 and the information of the uplink resources allocated for the terminal equipment, etc.

S603,终端设备根据临时移动用户标识生成随机接入标识。S603, the terminal device generates a random access identifier according to the temporary mobile user identifier.

其中,终端设备根据临时移动用户标识生成随机接入标识具体可以参考图5所示实施例中的方式一。例如,根据临时移动用户标识和特定算法生成符合长度的随机接入标识。Specifically, for the terminal device to generate the random access identifier according to the temporary mobile user identifier, reference may be made to the first manner in the embodiment shown in FIG. 5 . For example, according to the temporary mobile user identity and a specific algorithm, generate a random access identity with a matching length.

可选地,在4G网络中,终端设备将64比特或者更长的M-TMSI,通过特定算法,生成40比特长度的随机接入标识。或者在5G网络中,终端设备将64比特或者更长的5G-TMSI,通过特定算法,生成39比特长度的随机接入标识。Optionally, in a 4G network, the terminal device generates a random access identifier with a length of 40 bits by using a specific algorithm for the M-TMSI of 64 bits or longer. Or in a 5G network, the terminal device generates a random access identifier with a length of 39 bits by using a specific algorithm for the 64-bit or longer 5G-TMSI.

其中,特定算法可以是哈希摘要算法,或者是其他能实现类似功能的算法,本实施例不做限定。The specific algorithm may be a hash digest algorithm, or other algorithms capable of implementing similar functions, which are not limited in this embodiment.

S604,终端设备在分配的上行资源上向接入节点发送第一请求消息。S604, the terminal device sends a first request message to the access node on the allocated uplink resource.

其中,第一请求消息包括S603中的随机接入标识。Wherein, the first request message includes the random access identifier in S603.

应理解,在步骤S602之后,可能有多个终端设备读取了接入节点的系统广播消息,选择相同的资源同时接入。因此本步骤中终端设备在分配的上行资源上发送RRC连接建立请求消息,该消息中包括随机接入标识,这样终端设备在下一个步骤中收到包括相同的随机接入标识的竞争解决消息之后,就可以确定自身随机接入成功。It should be understood that after step S602, there may be multiple terminal devices that read the system broadcast message of the access node, and select the same resource to access at the same time. Therefore, in this step, the terminal device sends an RRC connection establishment request message on the allocated uplink resources, and the message includes the random access identifier, so that after the terminal device receives the contention resolution message including the same random access identifier in the next step, It can be determined that its random access is successful.

S605,接入节点向终端设备发送第一响应消息,该第一响应消息包括随机接入标识。S605: The access node sends a first response message to the terminal device, where the first response message includes a random access identifier.

示例性地,接入节点在确定该终端设备允许接入无线网络之后,向该终端设备发送第一响应消息。Exemplarily, after determining that the terminal device is allowed to access the wireless network, the access node sends the first response message to the terminal device.

S606,终端设备向接入节点发送RRC连接建立完成消息,该RRC连接建立完成消息包括服务临时移动用户标识。S606, the terminal device sends an RRC connection establishment complete message to the access node, where the RRC connection establishment complete message includes the serving temporary mobile subscriber identity.

其中,服务临时移动用户标识可以参考图5所示实施例中的相关描述,不再赘述。For the serving temporary mobile user identity, reference may be made to the relevant description in the embodiment shown in FIG. 5 , and details are not repeated here.

示例性地,终端设备根据收到的竞争解决消息中包括的随机接入标识,确定自身接入成功,而后触发注册流程。Exemplarily, the terminal device determines that its own access is successful according to the random access identifier included in the received contention resolution message, and then triggers the registration process.

终端设备发送RRC连接建立完成消息给接入节点,其中包括服务临时移动用户标识,该服务临时移动用户标识中包含长度大于或等于64比特的临时移动用户标识。The terminal device sends an RRC connection establishment complete message to the access node, which includes a serving temporary mobile user identity, and the serving temporary mobile user identity includes a temporary mobile user identity whose length is greater than or equal to 64 bits.

同时,RRC连接建立完成消息中还可以包括通过NAS层发送的注册请求消息,该消息中包括全球唯一临时用户标识,该全球唯一临时用户标识的组成结构中包括该长度大于或等于64比特的临时移动用户标识。At the same time, the RRC connection establishment complete message may also include a registration request message sent through the NAS layer, the message includes a globally unique temporary user identifier, and the composition structure of the globally unique temporary user identifier includes the temporary user identifier whose length is greater than or equal to 64 bits. Mobile user ID.

S607,接入节点生成第一标识。S607, the access node generates a first identifier.

接入节点根据终端设备在步骤S603中通过临时移动用户标识和特定算法生成随机接入标识,那么接入节点收到RRC连接建立完成消息后,则会根据接收到的服务临时移动用户标识中包括的临时移动用户标识,以及在步骤S603中相同的特定算法,生成第一标识。如果该第一标识与接入节点接收的初始上行传输消息中的随机接入标识一致,则表示终端设备身份得到验证,接入节点允许终端设备触发注册流程。The access node generates a random access identifier through the temporary mobile user identifier and a specific algorithm according to the terminal device in step S603, then after the access node receives the RRC connection establishment complete message, it will include the service temporary mobile user identifier according to the received service. and the same specific algorithm in step S603 to generate the first identifier. If the first identifier is consistent with the random access identifier in the initial uplink transmission message received by the access node, it means that the identity of the terminal device has been verified, and the access node allows the terminal device to trigger the registration process.

例如,在4G网络中,接入节点根据M-TMSI和特定算法生成第一标识;或者在5G网络中,接入节点根据5G-TMSI和特定算法生成第一标识。For example, in a 4G network, the access node generates the first identifier according to the M-TMSI and a specific algorithm; or in a 5G network, the access node generates the first identifier according to the 5G-TMSI and a specific algorithm.

S608,接入节点根据所述服务临时移动用户标识,为终端设备选择第二接入管理节点。S608, the access node selects a second access management node for the terminal device according to the serving temporary mobile user identifier.

S609,接入节点向第二接入管理节点发送注册请求消息,该注册请求消息中包括第一全球唯一临时用户标识。S609, the access node sends a registration request message to the second access management node, where the registration request message includes the first globally unique temporary user identifier.

第二接入管理节点根据收到的全球唯一临时用户标识确定之前服务终端设备的第一接入管理节点,其中,第一接入管理节点和第二接入管理节点可以相同或者不同。第二接入管理节点获取终端设备的用户上下文。The second access management node determines the first access management node that previously served the terminal device according to the received global unique temporary user identifier, wherein the first access management node and the second access management node may be the same or different. The second access management node acquires the user context of the terminal device.

具体地,第一接入管理节点与第二接入管理节点相同时,第二接入管理节点根据全球唯一临时用户标识中包含的临时移动用户标识获取本地存储的终端设备的用户上下文。第一接入管理节点与第二接入管理节点不同时,第二接入管理节点将接收到的全球唯一临时用户标识发送给第一接入管理节点,第一接入管理节点根据全球唯一临时用户标识中包含的临时移动用户标识获取本地存储的终端设备的用户上下文,并将该用户上下文发送给第二接入管理节点。Specifically, when the first access management node is the same as the second access management node, the second access management node obtains the locally stored user context of the terminal device according to the temporary mobile user identifier included in the globally unique temporary user identifier. When the first access management node is different from the second access management node, the second access management node sends the received globally unique temporary user identifier to the first access management node, and the first access management node according to the globally unique temporary user identifier. The temporary mobile user identity included in the user identity acquires the locally stored user context of the terminal device, and sends the user context to the second access management node.

S610至S613,第二接入管理节点向数据管理功能进行注册,向数据管理功能发送接入管理节点注册请求消息,接收数据管理功能发送的接入管理节点注册响应消息;第二接入管理节点向数据管理功能发送签约数据获取请求,接收数据管理功能发送的签约数据获取响应,从而获取终端设备的签约数据。S610 to S613, the second access management node registers with the data management function, sends an access management node registration request message to the data management function, and receives an access management node registration response message sent by the data management function; the second access management node The contract data acquisition request is sent to the data management function, and the contract data acquisition response sent by the data management function is received, so as to acquire the contract data of the terminal device.

S614,第二接入管理节点向终端设备发送注册接受消息,其中该注册接受消息包括第二全球唯一临时用户标识。S614: The second access management node sends a registration acceptance message to the terminal device, where the registration acceptance message includes the second globally unique temporary user identifier.

其中,第二全球唯一临时用户标识是由该第二接入管理节点为该终端设备分配的全球唯一临时用户标识。Wherein, the second globally unique temporary user identifier is a globally unique temporary user identifier allocated by the second access management node to the terminal device.

具体的,注册完成后,第二接入管理节点会分配第二全球唯一临时用户标识给终端设备,即发送注册接受消息给终端设备,该消息中包含第二全球唯一临时用户标识。接入管理节点通过NAS层向接入节点发送注册接受消息,接入节点向终端设备转发该注册接受消息。Specifically, after the registration is completed, the second access management node will assign the second globally unique temporary user identifier to the terminal device, that is, send a registration acceptance message to the terminal device, the message including the second globally unique temporary user identifier. The access management node sends a registration acceptance message to the access node through the NAS layer, and the access node forwards the registration acceptance message to the terminal device.

S615,终端设备向第二接入管理节点发送注册完成消息。S615, the terminal device sends a registration completion message to the second access management node.

根据本申请实施例的方案,在扩展临时移动用户标识的长度之后,终端设备生成符合长度要求的随机接入标识,使得终端设备在随机接入过程中能够正常地接入无线网络。而且,在临时移动用户标识扩展到64比特或者更长之后,网络设备可以给更多的用户分配不相冲突的全球唯一临时用户标识,且能保证全球唯一临时用户标识中足够的随机化字段空间,安全性更高。进一步地,接入节点在随机接入过程之后验证终端设备的身份,进一步提高随机接入过程的准确性和安全性。According to the solution of the embodiment of the present application, after extending the length of the temporary mobile user identity, the terminal device generates a random access identity that meets the length requirement, so that the terminal device can normally access the wireless network during the random access process. Moreover, after the temporary mobile user identity is extended to 64 bits or longer, the network device can allocate non-conflicting global unique temporary user identities to more users, and can ensure sufficient randomization field space in the global unique temporary user identity , higher security. Further, the access node verifies the identity of the terminal device after the random access process, which further improves the accuracy and security of the random access process.

以上,结合图5至图6详细说明了本申请实施例提供的方法。以下,结合图7至图10详细说明本申请实施例提供的通信装置。In the above, the methods provided by the embodiments of the present application are described in detail with reference to FIG. 5 to FIG. 6 . Hereinafter, the communication apparatus provided by the embodiments of the present application will be described in detail with reference to FIG. 7 to FIG. 10 .

图7是本申请实施例提供的通信装置的示意性框图。如图所示,该通信装置10可以包括收发模块11和处理模块12。FIG. 7 is a schematic block diagram of a communication apparatus provided by an embodiment of the present application. As shown in the figure, the communication device 10 may include a transceiver module 11 and a processing module 12 .

在一种可能的设计中,该通信装置10可对应于上文方法实施例中的终端设备。例如,可以为用户设备,或者配置于用户设备中的芯片。In a possible design, the communication apparatus 10 may correspond to the terminal device in the above method embodiment. For example, it may be user equipment, or a chip configured in the user equipment.

具体地,该通信装置10可对应于根据本申请实施例的方法500和方法500中的终端设备,该通信装置10可以包括用于执行图5中的方法500或图6中的方法600中的终端设备执行的方法的模块。并且,该通信装置10中的各单元和上述其他操作和/或功能分别为了实现图5中的方法500或图6中的方法600的相应流程。Specifically, the communication apparatus 10 may correspond to the method 500 and the terminal device in the method 500 according to the embodiments of the present application, and the communication apparatus 10 may include a method for performing the method 500 in FIG. 5 or the method 600 in FIG. 6 . A module of a method executed by an end device. In addition, each unit in the communication device 10 and the above-mentioned other operations and/or functions are respectively to implement the corresponding flow of the method 500 in FIG. 5 or the method 600 in FIG. 6 .

其中,当该通信装置10用于执行图5中的方法500时,收发模块11可用于执行方法 500中的步骤S502、S503,处理模块12可用于执行方法500中的步骤S501。Wherein, when the communication device 10 is used to execute the method 500 in FIG. 5 , the transceiver module 11 can be used to execute steps S502 and S503 in the method 500, and the processing module 12 can be used to execute the step S501 of the method 500.

当该通信装置10用于执行图6中的方法600时,收发模块11可用于执行方法600中的步骤S601、S602、S604、S605、S606、S614、S615,处理模块12可用于执行方法600中的步骤S603。When the communication device 10 is used to execute the method 600 in FIG. 6 , the transceiver module 11 can be used to execute steps S601 , S602 , S604 , S605 , S606 , S614 and S615 in the method 600 , and the processing module 12 can be used to execute the method 600 step S603.

具体地,处理模块12用于生成随机接入标识,该随机接入标识用于在随机接入过程中标识该终端设备;收发模块11用于向接入节点发送第一请求消息,该第一请求消息中包括该随机接入标识,所述第一请求消息用于在随机接入过程中请求接入无线网络;还用于接收来自该接入节点的第一响应消息,该第一响应消息中包括该随机接入标识,其中,所述随机接入标识的长度小于所述终端设备的临时移动用户标识的长度,所述临时移动用户标识的长度大于或等于64比特。Specifically, the processing module 12 is configured to generate a random access identifier, and the random access identifier is used to identify the terminal device during the random access process; the transceiver module 11 is configured to send a first request message to the access node, the first The random access identifier is included in the request message, and the first request message is used to request access to the wireless network in the random access process; it is also used to receive a first response message from the access node, the first response message includes the random access identifier, wherein the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.

可选地,收发模块11还用于向该接入节点发送无线资源控制RRC连接建立完成消息,该RRC连接建立完成消息中包括服务临时移动用户标识,该服务临时移动用户标识包括该临时移动用户标识和第一接入管理节点的标识。Optionally, the transceiver module 11 is further configured to send a radio resource control RRC connection establishment complete message to the access node, where the RRC connection establishment complete message includes a serving temporary mobile user identity, and the serving temporary mobile user identity includes the temporary mobile user. identity and the identity of the first access management node.

可选地,处理模块12具体用于根据该临时移动用户标识生成该随机接入标识;或者,根据第一全球唯一临时用户标识通过特定算法生成该随机接入标识,该第一全球唯一临时用户标识的组成结构中包括该临时移动用户标识;或者,生成一个随机数作为该随机接入标识。Optionally, the processing module 12 is specifically configured to generate the random access identifier according to the temporary mobile user identifier; or, generate the random access identifier through a specific algorithm according to the first globally unique temporary user identifier, the first globally unique temporary user identifier. The composition structure of the identity includes the temporary mobile user identity; or, a random number is generated as the random access identity.

其中,处理模块12具体还用于根据该临时移动用户标识和特定算法,生成该随机接入标识;或者,根据该第一接入管理节点的标识,该临时移动用户标识和特定算法,生成该随机接入标识。The processing module 12 is further configured to generate the random access identifier according to the temporary mobile user identifier and a specific algorithm; or, according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm, generate the random access identifier. Random access identifier.

收发模块11还用于向该接入节点发送注册请求消息,该注册请求消息中包括第一全球唯一临时用户标识,该第一全球唯一临时用户标识由该第一接入管理节点分配。收发模块11接收来自该接入节点的注册接受消息,该注册接受消息中包括第二全球唯一临时用户标识,该第二全球唯一临时用户标识由该第一接入管理节点或第二接入管理节点分配;其中,该第二全球唯一临时用户标识与该第一全球唯一临时用户标识不同,该第一接入管理节点与该第二接入管理节点不同。The transceiver module 11 is further configured to send a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated by the first access management node. The transceiver module 11 receives a registration acceptance message from the access node, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is managed by the first access management node or the second access management node. Node allocation; wherein, the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node.

图8是本申请实施例提供的通信装置的示意性框图。如图所示,该通信装置20可以包括收发模块21和处理模块22。FIG. 8 is a schematic block diagram of a communication apparatus provided by an embodiment of the present application. As shown in the figure, the communication device 20 may include a transceiver module 21 and a processing module 22 .

在一种可能的设计中,该通信装置20可对应于上文方法实施例中的接入节点。例如,可以为RAN,或者配置于RAN中的芯片。In a possible design, the communication device 20 may correspond to the access node in the above method embodiment. For example, it may be the RAN, or a chip configured in the RAN.

具体地,该通信装置20可对应于根据本申请实施例的方法500和方法600中的网络设备,该通信装置20可以包括用于执行图5中的方法500或图6中的方法600中的网络设备执行的方法的模块。并且,该通信装置20中的各单元和上述其他操作和/或功能分别为了实现图5中的方法500或图6中的方法600的相应流程。Specifically, the communication apparatus 20 may correspond to the network device in the method 500 and the method 600 according to the embodiments of the present application, and the communication apparatus 20 may include a method for performing the method 500 in FIG. 5 or the method 600 in FIG. 6 . A module of a method performed by a network device. In addition, each unit in the communication device 20 and the above-mentioned other operations and/or functions are respectively to implement the corresponding flow of the method 500 in FIG. 5 or the method 600 in FIG. 6 .

当该通信装置20用于执行图5中的方法500时,收发模块21可用于执行方法500中的步骤S502、S503。When the communication device 20 is used to execute the method 500 in FIG. 5 , the transceiver module 21 can be used to execute steps S502 and S503 in the method 500 .

其中,当该通信装置20用于执行图6中的方法600时,收发模块21可用于执行方法600中的步骤S601、S602、S604、S605、S606、S609、S614、S615,处理模块22可用于执行方法600中的步骤S607和S608。Wherein, when the communication device 20 is used to execute the method 600 in FIG. 6 , the transceiver module 21 can be used to execute steps S601 , S602 , S604 , S605 , S606 , S609 , S614 , and S615 in the method 600 , and the processing module 22 can be used to Steps S607 and S608 in the method 600 are performed.

具体地,收发模块21用于接收来自终端设备的第一请求消息,所述第一请求消息用于在随机接入过程中请求接入无线网络,该第一请求消息中包括随机接入标识,该随机接入标识用于在随机接入过程中标识该终端设备;还用于向该终端设备发送第一响应消息,该第一响应消息中包括该随机接入标识,其中,所述随机接入标识的长度小于所述终端设备的临时移动用户标识的长度,所述临时移动用户标识的长度大于或等于64比特。Specifically, the transceiver module 21 is configured to receive a first request message from a terminal device, where the first request message is used to request access to a wireless network in a random access process, and the first request message includes a random access identifier, The random access identifier is used to identify the terminal device in the random access process; it is also used to send a first response message to the terminal device, where the first response message includes the random access identifier, wherein the random access identifier The length of the incoming identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.

可选地,收发模块21还用于接收来自该终端设备的无线资源控制RRC连接建立完成消息,该RRC连接建立完成消息中包括服务临时移动用户标识,该服务临时移动用户标识包括该临时移动用户标识和第一接入管理节点的标识。处理模块22,用于根据该服务临时移动用户标识,为该终端设备选择第二接入管理节点。Optionally, the transceiver module 21 is further configured to receive a radio resource control RRC connection establishment complete message from the terminal device, where the RRC connection establishment complete message includes a serving temporary mobile user identity, and the serving temporary mobile user identity includes the temporary mobile user. identity and the identity of the first access management node. The processing module 22 is configured to select a second access management node for the terminal device according to the temporary mobile user identity of the service.

具体地,处理模块22还用于根据该服务临时移动用户标识生成第一标识;当所述第一标识与所述随机接入标识相同时,所述接入节点为所述终端设备选择第二接入管理节点。可选地,处理模块22具体还用于根据该临时移动用户标识和特定算法,生成该第一标识;或者,根据该第一接入管理节点的标识,该临时移动用户标识和特定算法,生成该第一标识。Specifically, the processing module 22 is further configured to generate a first identifier according to the service temporary mobile user identifier; when the first identifier is the same as the random access identifier, the access node selects a second identifier for the terminal device Access the management node. Optionally, the processing module 22 is specifically further configured to generate the first identification according to the temporary mobile user identification and a specific algorithm; or, according to the identification of the first access management node, the temporary mobile user identification and the specific algorithm, generate the first identification.

另外,该收发模块21还用于接收来自该终端设备的注册请求消息;In addition, the transceiver module 21 is also used to receive a registration request message from the terminal device;

该收发模块21还用于向该第二接入管理节点发送该注册请求消息,该注册请求消息中包括第一全球唯一临时用户标识,该第一全球唯一临时用户标识由该第一接入管理节点为所述终端设备所分配。该收发模块21还用于接收来自该第二接入管理节点的注册接受消息,向该终端设备发送该注册接受消息,该注册接受消息中包括第二全球唯一临时用户标识,该第二全球唯一临时用户标识由该第二接入管理节点为该终端设备分配;其中,该第二全球唯一临时用户标识与该第一全球唯一临时用户标识不同。The transceiver module 21 is further configured to send the registration request message to the second access management node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is managed by the first access management Nodes are assigned to the terminal equipment. The transceiver module 21 is further configured to receive a registration acceptance message from the second access management node, and send the registration acceptance message to the terminal device, where the registration acceptance message includes a second globally unique temporary user identifier, the second globally unique The temporary user identifier is allocated to the terminal device by the second access management node; wherein the second globally unique temporary user identifier is different from the first globally unique temporary user identifier.

图9为本申请实施例提供的通信装置30的示意图,如图9所示,该装置30可以为终端设备,包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备,以及各种形式的终端,移动台,终端,用户设备,软终端等等,也可以为位于终端设备上的芯片或芯片系统等。FIG. 9 is a schematic diagram of a communication apparatus 30 provided by an embodiment of the present application. As shown in FIG. 9 , the apparatus 30 may be a terminal device, including various handheld devices, vehicle-mounted devices, wearable devices, computing devices or Other processing devices connected to the wireless modem, as well as various forms of terminals, mobile stations, terminals, user equipment, soft terminals, etc., may also be chips or systems on chips, etc. located on the terminal equipment.

该装置30可以包括处理器31(即,处理模块的一例)和存储器32。该存储器32用于存储指令,该处理器31用于执行该存储器32存储的指令,以使该装置30实现如图5或图6中对应的方法中终端设备执行的步骤。The apparatus 30 may include a processor 31 (ie, an example of a processing module) and a memory 32 . The memory 32 is used for storing instructions, and the processor 31 is used for executing the instructions stored in the memory 32, so that the apparatus 30 implements the steps performed by the terminal device in the method corresponding to FIG. 5 or FIG. 6 .

进一步地,该装置30还可以包括输入口33(即,收发模块的一例)和输出口34(即,收发模块的另一例)。进一步地,该处理器31、存储器32、输入口33和输出口34可以通过内部连接通路互相通信,传递控制和/或数据信号。该存储器32用于存储计算机程序,该处理器31可以用于从该存储器32中调用并运行该计算机程序,以控制输入口33接收信号,控制输出口34发送信号,完成上述方法中终端设备的步骤。该存储器32可以集成在处理器31中,也可以与处理器31分开设置。Further, the device 30 may further include an input port 33 (ie, an example of a transceiver module) and an output port 34 (ie, another example of a transceiver module). Further, the processor 31, the memory 32, the input port 33 and the output port 34 can communicate with each other through an internal connection path to transmit control and/or data signals. The memory 32 is used to store a computer program, and the processor 31 can be used to call and run the computer program from the memory 32 to control the input port 33 to receive signals, control the output port 34 to send signals, and complete the process of the terminal device in the above method. step. The memory 32 may be integrated in the processor 31 or may be provided separately from the processor 31 .

可选地,若该通信装置30为通信设备,该输入口33为接收器,该输出口34为发送器。其中,接收器和发送器可以为相同或者不同的物理实体。为相同的物理实体时,可以统称为收发器。Optionally, if the communication device 30 is a communication device, the input port 33 is a receiver, and the output port 34 is a transmitter. The receiver and the transmitter may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.

可选地,若该通信装置30为芯片或电路,该输入口33为输入接口,该输出口34为输出接口。Optionally, if the communication device 30 is a chip or a circuit, the input port 33 is an input interface, and the output port 34 is an output interface.

作为一种实现方式,输入口33和输出口34的功能可以考虑通过收发电路或者收发的专用芯片实现。处理器31可以考虑通过专用处理芯片、处理电路、处理器或者通用芯片实现。As an implementation manner, the functions of the input port 33 and the output port 34 can be considered to be implemented by a transceiver circuit or a dedicated chip for transceiver. The processor 31 can be considered to be implemented by a dedicated processing chip, a processing circuit, a processor or a general-purpose chip.

作为另一种实现方式,可以考虑使用通用计算机的方式来实现本申请实施例提供的通信设备。即将实现处理器31、输入口33和输出口34功能的程序代码存储在存储器32中,通用处理器通过执行存储器32中的代码来实现处理器31、输入口33和输出口34的功能。As another implementation manner, a general-purpose computer may be used to implement the communication device provided by the embodiments of the present application. The program codes that will implement the functions of the processor 31 , the input port 33 and the output port 34 are stored in the memory 32 , and the general-purpose processor implements the functions of the processor 31 , the input port 33 and the output port 34 by executing the codes in the memory 32 .

其中,通信装置30中各模块或单元可以用于执行上述方法中进行随机接入的设备(例如,终端设备)所执行的各动作或处理过程,这里,为了避免赘述,省略其详细说明。Wherein, each module or unit in the communication apparatus 30 may be used to perform each action or process performed by a device (eg, terminal device) performing random access in the above method, and detailed description thereof is omitted here to avoid redundant description.

该装置10所涉及的与本申请实施例提供的技术方案相关的概念,解释和详细说明及其他步骤请参见前述方法或其他实施例中关于这些内容的描述,此处不做赘述。For the concepts related to the technical solutions provided by the embodiments of the present application involved in the apparatus 10, for explanations and detailed descriptions, and other steps, please refer to the descriptions of the foregoing methods or other embodiments, which will not be repeated here.

图10为本申请实施例提供的通信装置40的示意图,如图10所示,该装置40可以为接入节点,包括具有为终端设备提供接入功能的网元,如RAN等。FIG. 10 is a schematic diagram of a communication apparatus 40 provided by an embodiment of the present application. As shown in FIG. 10 , the apparatus 40 may be an access node, including a network element having an access function for terminal equipment, such as a RAN.

该装置40可以包括处理器41(即,处理模块的一例)和存储器42。该存储器42用于存储指令,该处理器41用于执行该存储器42存储的指令,以使该装置40实现如图5或图6中对应的方法中接入节点执行的步骤。The apparatus 40 may include a processor 41 (ie, an example of a processing module) and a memory 42 . The memory 42 is used for storing instructions, and the processor 41 is used for executing the instructions stored in the memory 42, so that the apparatus 40 implements the steps performed by the access node in the method corresponding to FIG. 5 or FIG. 6 .

进一步地,该装置40还可以包括输入口43(即,收发模块的一例)和输出口44(即,收发模块的另一例)。进一步地,该处理器41、存储器42、输入口43和输出口44可以通过内部连接通路互相通信,传递控制和/或数据信号。该存储器42用于存储计算机程序,该处理器41可以用于从该存储器42中调用并运行该计算机程序,以控制输入口43接收信号,控制输出口44发送信号,完成上述方法中终端设备的步骤。该存储器42可以集成在处理器41中,也可以与处理器41分开设置。Further, the device 40 may further include an input port 43 (ie, an example of a transceiver module) and an output port 44 (ie, another example of a transceiver module). Further, the processor 41, the memory 42, the input port 43 and the output port 44 can communicate with each other through an internal connection path to transmit control and/or data signals. The memory 42 is used to store a computer program, and the processor 41 can be used to call and run the computer program from the memory 42 to control the input port 43 to receive signals, control the output port 44 to send signals, and complete the process of the terminal device in the above method. step. The memory 42 may be integrated in the processor 41 or may be provided separately from the processor 41 .

可选地,若该通信装置40为通信设备,该输入口43为接收器,该输出口44为发送器。其中,接收器和发送器可以为相同或者不同的物理实体。为相同的物理实体时,可以统称为收发器。Optionally, if the communication device 40 is a communication device, the input port 43 is a receiver, and the output port 44 is a transmitter. The receiver and the transmitter may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.

可选地,若该通信装置40为芯片或电路,该输入口43为输入接口,该输出口44为输出接口。Optionally, if the communication device 40 is a chip or a circuit, the input port 43 is an input interface, and the output port 44 is an output interface.

作为一种实现方式,输入口43和输出口44的功能可以考虑通过收发电路或者收发的专用芯片实现。处理器41可以考虑通过专用处理芯片、处理电路、处理器或者通用芯片实现。As an implementation manner, the functions of the input port 43 and the output port 44 can be considered to be realized by a transceiver circuit or a dedicated chip for transceiver. The processor 41 can be considered to be implemented by a dedicated processing chip, a processing circuit, a processor or a general-purpose chip.

作为另一种实现方式,可以考虑使用通用计算机的方式来实现本申请实施例提供的通信设备。即将实现处理器41、输入口43和输出口44功能的程序代码存储在存储器42中,通用处理器通过执行存储器42中的代码来实现处理器41、输入口43和输出口44的功能。As another implementation manner, a general-purpose computer may be used to implement the communication device provided by the embodiments of the present application. The program codes that will implement the functions of the processor 41 , the input port 43 and the output port 44 are stored in the memory 42 , and the general-purpose processor implements the functions of the processor 41 , the input port 43 and the output port 44 by executing the codes in the memory 42 .

其中,通信装置40中各模块或单元可以用于执行上述方法中接受随机接入的设备(即,接入节点)所执行的各动作或处理过程,这里,为了避免赘述,省略其详细说明。The modules or units in the communication apparatus 40 may be used to perform actions or processing procedures performed by the random access device (ie, the access node) in the above method, and detailed descriptions thereof are omitted here to avoid repetition.

该装置40所涉及的与本申请实施例提供的技术方案相关的概念,解释和详细说明及其他步骤请参见前述方法或其他实施例中关于这些内容的描述,此处不做赘述。For the concepts related to the technical solutions provided by the embodiments of the present application involved in the apparatus 40, for explanations and detailed descriptions and other steps, please refer to the descriptions of the foregoing methods or other embodiments, which will not be repeated here.

应理解,本申请实施例中,该处理器可以为中央处理单元(CPU,central processing unit),该处理器还可以是其他通用处理器、数字信号处理器(DSP,digital signal processor)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field  programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that, in this embodiment of the present application, the processor may be a central processing unit (CPU, central processing unit), and the processor may also be other general-purpose processors, digital signal processors (DSP, digital signal processors), dedicated integrated Circuit (application specific integrated circuit, ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.

还应理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。It should also be understood that the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory. The non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable read-only memory (EPROM). Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. Volatile memory may be random access memory (RAM), which acts as an external cache. By way of example and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous DRAM (SDRAM), Double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synchlink DRAM, SLDRAM) and direct Memory bus random access memory (direct rambus RAM, DR RAM).

本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述方法实施例中由终端设备执行的方法,或由网络设备执行的方法的计算机指令。Embodiments of the present application further provide a computer-readable storage medium, on which computer instructions for implementing the method executed by the terminal device or the method executed by the network device in the foregoing method embodiments are stored.

例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法实施例中由终端设备执行的方法,或由网络设备执行的方法。For example, when the computer program is executed by a computer, the computer can implement the method executed by the terminal device or the method executed by the network device in the above method embodiments.

本申请实施例还提供一种包含指令的计算机程序产品,该指令被计算机执行时使得该计算机实现上述方法实施例中由终端设备执行的方法,或由网络设备执行的方法。Embodiments of the present application further provide a computer program product including instructions, which, when executed by a computer, cause the computer to implement the method executed by the terminal device or the method executed by the network device in the above method embodiments.

本申请实施例还提供一种通信系统,该通信系统包括上文实施例中的网络设备与终端设备,该网络设备用于接收第一请求消息和发送第一响应消息,该终端设备用于生成随机接入标识,发送该第一请求消息和接收该第一响应消息,其中,该第一请求消息和该第一响应消息中都包括该随机接入标识,该随机接入标识的长度大于该终端设备的临时移动用户标识的长度,该临时移动用户标识的长度大于或等于64比特。An embodiment of the present application further provides a communication system, where the communication system includes the network device and the terminal device in the above embodiments, the network device is configured to receive a first request message and send a first response message, and the terminal device is configured to generate a A random access identifier, sending the first request message and receiving the first response message, wherein both the first request message and the first response message include the random access identifier, and the length of the random access identifier is greater than the length of the random access identifier The length of the temporary mobile subscriber identity of the terminal device, where the length of the temporary mobile subscriber identity is greater than or equal to 64 bits.

上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令或计算机程序。在计算机上加载或执行所述计算机指令或计算机程序时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质。半导体介质可以是固态硬盘。The above embodiments may be implemented in whole or in part by software, hardware, firmware or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions or computer programs. When the computer instructions or computer programs are loaded or executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server or data center by wire (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that contains one or more sets of available media. The usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media. The semiconductor medium may be a solid state drive.

应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the term "and/or" in this document is only an association relationship to describe associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, which can mean that A exists alone, and A and B exist at the same time , there are three cases of B alone. In addition, the character "/" in this document generally indicates that the related objects are an "or" relationship.

应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that, in various embodiments of the present application, the size of the sequence numbers of the above-mentioned processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not be dealt with in the embodiments of the present application. implementation constitutes any limitation.

本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。Those of ordinary skill in the art can realize that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application. Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working process of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which will not be repeated here. In the several embodiments provided in this application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。The units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment. In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk and other mediums that can store program codes.

以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The above are only specific embodiments of the present application, but the protection scope of the present application is not limited to this. should be covered within the scope of protection of this application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.

Claims (27)

一种随机接入的方法,其特征在于,包括:A method for random access, comprising: 终端设备生成随机接入标识,所述随机接入标识用于在随机接入过程中标识所述终端设备;The terminal device generates a random access identifier, and the random access identifier is used to identify the terminal device in the random access process; 所述终端设备向接入节点发送第一请求消息,所述第一请求消息中包括所述随机接入标识,所述第一请求消息用于在随机接入过程中请求接入无线网络;sending, by the terminal device, a first request message to the access node, where the first request message includes the random access identifier, and the first request message is used to request access to the wireless network in the random access process; 所述终端设备接收来自所述接入节点的第一响应消息,所述第一响应消息中包括所述随机接入标识;receiving, by the terminal device, a first response message from the access node, where the first response message includes the random access identifier; 其中,所述随机接入标识的长度小于所述终端设备的临时移动用户标识的长度,所述临时移动用户标识的长度大于或等于64比特。Wherein, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method according to claim 1, wherein the method further comprises: 所述终端设备向所述接入节点发送无线资源控制RRC连接建立完成消息;sending, by the terminal device, a radio resource control RRC connection establishment complete message to the access node; 其中,所述RRC连接建立完成消息中包括所述终端设备的服务临时移动用户标识,所述服务临时移动用户标识包括所述临时移动用户标识和第一接入管理节点的标识。Wherein, the RRC connection establishment complete message includes a serving temporary mobile user identity of the terminal device, and the serving temporary mobile user identity includes the temporary mobile user identity and the identity of the first access management node. 根据权利要求1所述的方法,其特征在于,所述终端设备生成所述随机接入标识,包括:The method according to claim 1, wherein generating the random access identifier by the terminal device comprises: 所述终端设备根据所述临时移动用户标识生成所述随机接入标识;或者,The terminal device generates the random access identifier according to the temporary mobile user identifier; or, 所述终端设备根据第一全球唯一临时用户标识通过特定算法生成所述随机接入标识,所述第一全球唯一临时用户标识的组成结构中包括所述临时移动用户标识;或者,The terminal device generates the random access identifier through a specific algorithm according to the first globally unique temporary user identifier, and the composition structure of the first globally unique temporary user identifier includes the temporary mobile user identifier; or, 所述终端设备生成一个随机数作为所述随机接入标识。The terminal device generates a random number as the random access identifier. 根据权利要求3所述的方法,其特征在于,所述终端设备根据所述临时移动用户标识生成所述随机接入标识,包括:The method according to claim 3, wherein the generating, by the terminal device, the random access identifier according to the temporary mobile user identifier comprises: 根据所述临时移动用户标识和特定算法,生成所述随机接入标识;或者,generating the random access identifier according to the temporary mobile user identifier and a specific algorithm; or, 根据所述第一接入管理节点的标识,所述临时移动用户标识和特定算法,生成所述随机接入标识。The random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 4, wherein the method further comprises: 所述终端设备向所述接入节点发送注册请求消息,所述注册请求消息中包括第一全球唯一临时用户标识,所述第一全球唯一临时用户标识由所述第一接入管理节点分配。The terminal device sends a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated by the first access management node. 根据权利要求1至5中任一项所述的方法,其特征在于,在所述终端设备向所述接入节点发送注册请求消息之后,所述方法还包括:The method according to any one of claims 1 to 5, wherein after the terminal device sends a registration request message to the access node, the method further comprises: 接收来自所述接入节点的注册接受消息,所述注册接受消息中包括第二全球唯一临时用户标识,所述第二全球唯一临时用户标识由所述第一接入管理节点或第二接入管理节点分配;Receive a registration acceptance message from the access node, where the registration acceptance message includes a second globally unique temporary user identity, and the second globally unique temporary user identity is accessed by the first access management node or the second access node management node allocation; 其中,所述第二全球唯一临时用户标识与所述第一全球唯一临时用户标识不同,所述第一接入管理节点与所述第二接入管理节点不同。Wherein, the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node. 一种随机接入的方法,其特征在于,包括:A method for random access, comprising: 接入节点接收来自终端设备的第一请求消息,所述第一请求消息用于在随机接入过程 中请求接入无线网络,所述第一请求消息中包括随机接入标识,所述随机接入标识用于在随机接入过程中标识所述终端设备;The access node receives a first request message from the terminal device, where the first request message is used to request access to the wireless network in the random access process, the first request message includes a random access identifier, and the random access The entry identifier is used to identify the terminal equipment in the random access process; 所述接入节点向所述终端设备发送第一响应消息,所述第一响应消息中包括所述随机接入标识;sending, by the access node, a first response message to the terminal device, where the first response message includes the random access identifier; 其中,所述随机接入标识的长度小于所述终端设备的临时移动用户标识的长度,所述临时移动用户标识的长度大于或等于64比特。Wherein, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits. 根据权利要求7所述的方法,其特征在于,所述方法还包括:The method according to claim 7, wherein the method further comprises: 所述接入节点接收来自所述终端设备的无线资源控制RRC连接建立完成消息,所述RRC连接建立完成消息中包括服务临时移动用户标识,所述服务临时移动用户标识包括所述临时移动用户标识和第一接入管理节点的标识,所述服务临时移动用户标识由所述第一接入管理节点分配;The access node receives a radio resource control RRC connection establishment complete message from the terminal device, the RRC connection establishment complete message includes a serving temporary mobile subscriber identity, and the serving temporary mobile subscriber identity includes the temporary mobile subscriber identity and the identity of the first access management node, the serving temporary mobile user identity is allocated by the first access management node; 所述接入节点根据所述服务临时移动用户标识,为所述终端设备选择第二接入管理节点。The access node selects a second access management node for the terminal device according to the serving temporary mobile subscriber identity. 根据权利要求8所述的方法,其特征在于,在所述接入节点接收来自所述终端设备的RRC连接建立完成消息之后,所述接入节点根据所述服务临时移动用户标识为所述终端设备选择第二接入管理节点,还包括:The method according to claim 8, wherein after the access node receives the RRC connection establishment complete message from the terminal device, the access node identifies the terminal as the terminal according to the serving temporary mobile user identifier The device selects the second access management node, and further includes: 所述接入节点根据所述服务临时移动用户标识生成第一标识;generating, by the access node, a first identity according to the serving temporary mobile subscriber identity; 当所述第一标识与所述随机接入标识相同时,所述接入节点为所述终端设备选择第二接入管理节点。When the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal device. 根据权利要求9所述的方法,其特征在于,所述接入节点根据所述服务临时移动用户标识生成第一标识,包括:The method according to claim 9, wherein the generating, by the access node, the first identity according to the serving temporary mobile subscriber identity, comprises: 根据所述临时移动用户标识和特定算法,生成所述第一标识;或者,generating the first identifier according to the temporary mobile user identifier and a specific algorithm; or, 根据所述第一接入管理节点的标识,所述临时移动用户标识和特定算法,生成所述第一标识。The first identification is generated according to the identification of the first access management node, the temporary mobile user identification and a specific algorithm. 根据权利要求8至10中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 8 to 10, wherein the method further comprises: 所述接入节点接收来自所述终端设备的注册请求消息;receiving, by the access node, a registration request message from the terminal device; 所述接入节点向所述服务接入管理节点发送所述注册请求消息,所述注册请求消息中包括第一全球唯一临时用户标识,所述第一全球唯一临时用户标识是由所述第一接入管理节点为所述终端设备分配的。The access node sends the registration request message to the service access management node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is created by the first globally unique temporary user identifier. The access management node is allocated for the terminal device. 根据权利要求11所述的方法,其特征在于,所述方法还包括:The method according to claim 11, wherein the method further comprises: 所述接入节点接收来自所述第二接入管理节点的注册接受消息;receiving, by the access node, a registration accept message from the second access management node; 所述接入节点向所述终端设备发送所述注册接受消息;sending, by the access node, the registration acceptance message to the terminal device; 其中,所述注册接受消息中包括第二全球唯一临时用户标识,所述第二全球唯一临时用户标识是由所述第二接入管理节点为所述终端设备分配的;Wherein, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated for the terminal device by the second access management node; 其中,所述第二全球唯一临时用户标识与所述第一全球唯一临时用户标识不同。Wherein, the second globally unique temporary user identifier is different from the first globally unique temporary user identifier. 一种随机接入的装置,其特征在于,包括:A device for random access, comprising: 处理模块,用于生成随机接入标识,所述随机接入标识用于在随机接入过程中标识所述终端设备;a processing module, configured to generate a random access identifier, where the random access identifier is used to identify the terminal device in the random access process; 收发模块,用于向接入节点发送第一请求消息,所述第一请求消息中包括所述随机接 入标识,所述第一请求消息用于在随机接入过程中请求接入无线网络;a transceiver module, configured to send a first request message to an access node, where the first request message includes the random access identifier, and the first request message is used to request access to a wireless network in a random access process; 所述收发模块,还用于接收来自所述接入节点的第一响应消息,所述第一响应消息中包括所述随机接入标识;The transceiver module is further configured to receive a first response message from the access node, where the first response message includes the random access identifier; 其中,所述随机接入标识的长度小于临时移动用户标识的长度,所述临时移动用户标识的长度大于或等于64比特。Wherein, the length of the random access identifier is less than the length of the temporary mobile user identifier, and the length of the temporary mobile user identifier is greater than or equal to 64 bits. 根据权利要求13所述的装置,其特征在于,所述收发模块还用于:The device according to claim 13, wherein the transceiver module is further configured to: 向所述接入节点发送无线资源控制RRC连接建立完成消息;sending a radio resource control RRC connection establishment complete message to the access node; 其中,所述RRC连接建立完成消息中包括所述终端设备的服务临时移动用户标识,所述服务临时移动用户标识包括所述临时移动用户标识和第一接入管理节点的标识。Wherein, the RRC connection establishment complete message includes a serving temporary mobile user identity of the terminal device, and the serving temporary mobile user identity includes the temporary mobile user identity and the identity of the first access management node. 根据权利要求13所述的装置,其特征在于,所述处理模块具体用于:The device according to claim 13, wherein the processing module is specifically configured to: 根据所述临时移动用户标识生成所述随机接入标识;或者,generating the random access identifier according to the temporary mobile user identifier; or, 根据第一全球唯一临时用户标识通过特定算法生成所述随机接入标识,所述第一全球唯一临时用户标识的组成结构中包括所述临时移动用户标识;或者,The random access identifier is generated by a specific algorithm according to the first globally unique temporary user identifier, and the composition structure of the first globally unique temporary user identifier includes the temporary mobile user identifier; or, 生成一个随机数作为所述随机接入标识。A random number is generated as the random access identifier. 根据权利要求15所述的装置,其特征在于,所述处理模块具体还用于:The device according to claim 15, wherein the processing module is further configured to: 根据所述临时移动用户标识和特定算法,生成所述随机接入标识;或者,generating the random access identifier according to the temporary mobile user identifier and a specific algorithm; or, 根据所述第一接入管理节点的标识,所述临时移动用户标识和特定算法,生成所述随机接入标识。The random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm. 根据权利要求13至16中任一项所述的装置,其特征在于,所述收发模块还用于:The device according to any one of claims 13 to 16, wherein the transceiver module is further configured to: 向所述接入节点发送注册请求消息,所述注册请求消息中包括第一全球唯一临时用户标识,所述第一全球唯一临时用户标识由所述第一接入管理节点分配。Send a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated by the first access management node. 根据权利要求13至17中任一项所述的装置,其特征在于,所述收发模块还用于:The device according to any one of claims 13 to 17, wherein the transceiver module is further configured to: 接收来自所述接入节点的注册接受消息,所述注册接受消息中包括第二全球唯一临时用户标识,所述第二全球唯一临时用户标识由所述第一接入管理节点或第二接入管理节点分配;Receive a registration acceptance message from the access node, where the registration acceptance message includes a second globally unique temporary user identity, and the second globally unique temporary user identity is accessed by the first access management node or the second access node. management node allocation; 其中,所述第二全球唯一临时用户标识与所述第一全球唯一临时用户标识不同,所述第一接入管理节点与所述第二接入管理节点不同。Wherein, the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node. 一种随机接入的装置,其特征在于,包括:A device for random access, comprising: 收发模块,用于接收来自终端设备的第一请求消息,所述第一请求消息用于在随机接入过程中请求接入无线网络,所述第一请求消息中包括随机接入标识,所述随机接入标识用于在随机接入过程中标识所述终端设备;a transceiver module, configured to receive a first request message from a terminal device, where the first request message is used to request access to a wireless network in a random access process, the first request message includes a random access identifier, the The random access identifier is used to identify the terminal equipment in the random access process; 所述收发模块,还用于向所述终端设备发送第一响应消息,所述第一响应消息中包括所述随机接入标识,The transceiver module is further configured to send a first response message to the terminal device, where the first response message includes the random access identifier, 其中,所述随机接入标识的长度小于所述终端设备的临时移动用户标识的长度,所述临时移动用户标识的长度大于或等于64比特。Wherein, the length of the random access identifier is less than the length of the temporary mobile user identifier of the terminal device, and the length of the temporary mobile user identifier is greater than or equal to 64 bits. 根据权利要求19所述的装置,其特征在于,The apparatus of claim 19, wherein: 所述收发模块,还用于接收来自所述终端设备的无线资源控制RRC连接建立完成消息,所述RRC连接建立完成消息中包括服务临时移动用户标识,所述服务临时移动用户标识包括所述临时移动用户标识和第一接入管理节点的标识,所述服务临时移动用户标识 由所述第一接入管理节点分配;The transceiver module is further configured to receive a radio resource control RRC connection establishment complete message from the terminal device, where the RRC connection establishment complete message includes a serving temporary mobile user identity, and the serving temporary mobile user identity includes the temporary mobile user identity. a mobile user identity and an identity of a first access management node, the serving temporary mobile user identity is allocated by the first access management node; 处理模块,用于根据所述服务临时移动用户标识,为所述终端设备选择第二接入管理节点。and a processing module, configured to select a second access management node for the terminal device according to the service temporary mobile user identity. 根据权利要求19所述的装置,其特征在于,所述处理模块具体还用于:The device according to claim 19, wherein the processing module is further configured to: 根据所述服务临时移动用户标识生成第一标识;generating a first identity according to the service temporary mobile user identity; 当所述第一标识与所述随机接入标识相同时,所述接入节点为所述终端设备选择第二接入管理节点。When the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal device. 根据权利要求21所述的装置,其特征在于,所述处理模块具体还用于:The device according to claim 21, wherein the processing module is further configured to: 根据所述临时移动用户标识和特定算法,生成所述第一标识;或者,generating the first identifier according to the temporary mobile user identifier and a specific algorithm; or, 根据所述第一接入管理节点的标识,所述临时移动用户标识和特定算法,生成所述第一标识。The first identification is generated according to the identification of the first access management node, the temporary mobile user identification and a specific algorithm. 根据权利要求19至22中任一项所述的装置,其特征在于,所述收发模块还用于:The device according to any one of claims 19 to 22, wherein the transceiver module is further configured to: 接收来自所述终端设备的注册请求消息;receiving a registration request message from the terminal device; 向所述第二接入管理节点发送所述注册请求消息,所述注册请求消息中包括第一全球唯一临时用户标识,所述第一全球唯一临时用户标识由所述第一接入管理节点为所述终端设备分配的。Send the registration request message to the second access management node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is set by the first access management node as assigned by the terminal device. 根据权利要求23所述的装置,其特征在于,所述收发模块还用于:The device according to claim 23, wherein the transceiver module is further configured to: 接收来自所述第二接入管理节点的注册接受消息;receiving a registration accept message from the second access management node; 向所述终端设备发送所述注册接受消息;sending the registration acceptance message to the terminal device; 其中,所述注册接受消息中包括第二全球唯一临时用户标识,所述第二全球唯一临时用户标识是由所述第二接入管理节点为所述终端设备分配的;Wherein, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated for the terminal device by the second access management node; 其中,所述第二全球唯一临时用户标识与所述第一全球唯一临时用户标识不同。Wherein, the second globally unique temporary user identifier is different from the first globally unique temporary user identifier. 一种通信装置,其特征在于,包括:A communication device, comprising: 处理器和存储器;processor and memory; 所述存储器,用于存储计算机程序;the memory for storing computer programs; 所述处理器,用于执行所述存储器中存储的计算机程序,以使得所述通信装置执行权利要求1至6中任一项所述的通信方法,或执行权利要求7至12中任一项所述的通信方法。the processor for executing the computer program stored in the memory, so that the communication device executes the communication method according to any one of claims 1 to 6, or executes any one of claims 7 to 12 the described communication method. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至6中任一项所述通信方法,或执行如权利要求7至12中任一项所述的通信方法。A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, and when the computer program runs on a computer, the computer is made to execute any one of claims 1 to 6. The communication method described in item 7, or the communication method according to any one of claims 7 to 12 is performed. 一种芯片系统,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片系统地通信设备执行如权利要求1至6中任一项所述的通信方法,或执行如权利要求7至12中任一项所述的通信方法。A chip system, characterized by comprising: a processor for calling and running a computer program from a memory, so that a communication device installed with the chip system executes the communication according to any one of claims 1 to 6 method, or perform a communication method as claimed in any one of claims 7 to 12.
PCT/CN2021/130862 2020-12-04 2021-11-16 Random access method, apparatus and system Ceased WO2022116809A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011404557.3A CN114599112B (en) 2020-12-04 2020-12-04 Random access method, device and system
CN202011404557.3 2020-12-04

Publications (1)

Publication Number Publication Date
WO2022116809A1 true WO2022116809A1 (en) 2022-06-09

Family

ID=81812216

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/130862 Ceased WO2022116809A1 (en) 2020-12-04 2021-11-16 Random access method, apparatus and system

Country Status (2)

Country Link
CN (1) CN114599112B (en)
WO (1) WO2022116809A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2025118160A1 (en) * 2023-12-05 2025-06-12 Oppo广东移动通信有限公司 Access method, first device and second device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117528526A (en) * 2022-07-29 2024-02-06 华为技术有限公司 A communication method and device
WO2025227287A1 (en) * 2024-04-28 2025-11-06 北京小米移动软件有限公司 Communication method, first device, second device, communication system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109156016A (en) * 2016-05-16 2019-01-04 华为技术有限公司 Random access procedure and burst transfer in radio frequency system
CN110140399A (en) * 2017-01-04 2019-08-16 华为技术有限公司 Systems and methods for user equipment identity provisioning
CN110235507A (en) * 2017-01-17 2019-09-13 华为技术有限公司 Reference signal scrambling for random access
US20190357272A1 (en) * 2017-01-06 2019-11-21 Intel Corporation Establishment of random access channel communications

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11395331B2 (en) * 2017-07-07 2022-07-19 Huawei Technolgoies Co., Ltd. Random access method, terminal device, and network device
US20220201638A1 (en) * 2019-02-14 2022-06-23 Apple Inc. Registration management in information centric networking for next generation cellular networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109156016A (en) * 2016-05-16 2019-01-04 华为技术有限公司 Random access procedure and burst transfer in radio frequency system
CN110140399A (en) * 2017-01-04 2019-08-16 华为技术有限公司 Systems and methods for user equipment identity provisioning
US20190357272A1 (en) * 2017-01-06 2019-11-21 Intel Corporation Establishment of random access channel communications
CN110235507A (en) * 2017-01-17 2019-09-13 华为技术有限公司 Reference signal scrambling for random access

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2025118160A1 (en) * 2023-12-05 2025-06-12 Oppo广东移动通信有限公司 Access method, first device and second device

Also Published As

Publication number Publication date
CN114599112B (en) 2025-05-27
CN114599112A (en) 2022-06-07

Similar Documents

Publication Publication Date Title
US20190335332A1 (en) Authorization and Verification Method and Apparatus
EP3813426B1 (en) Method, apparatus and system for security verification
CN111586667A (en) Communication method, terminal equipment and core network equipment
CN111385830A (en) Communication method and device
WO2018166306A1 (en) Core network control plane device selection method and apparatus
WO2019140629A1 (en) Access control method, device, and computer storage medium
WO2022116809A1 (en) Random access method, apparatus and system
EP3687259B1 (en) Communication method and device
US20240080340A1 (en) Security for Groupcast Message in D2D Communication
CN116723507B (en) Terminal security method and device for edge network
WO2019242756A1 (en) Communication method and apparatus
EP3849103A1 (en) Relay selection in cellular sliced networks
WO2021068830A1 (en) Multicast transport method and apparatus
US12200741B2 (en) Data processing method and apparatus, and system
WO2019062533A1 (en) Transmission method, access network device and terminal device
KR102439422B1 (en) Network access methods and devices
KR20240153386A (en) Communication method, terminal device, and core network device
WO2023072271A1 (en) Method and apparatus for managing security context
CN116569571A (en) Communication method and communication device
CN114503780A (en) Method and device for establishing terminal connection
JP2022501926A (en) Systems and methods for wireless resource control management in shared networks
CN113556703B (en) Wireless communication method and communication device
US12507290B2 (en) Authorization method, apparatus and system for authorizing relay service relationships between remote and relay terminals using policy control function devices
JP7782061B2 (en) Communication method and communication device
US20230029714A1 (en) Authorization method, policy control function device, and access and mobility management function device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21899843

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21899843

Country of ref document: EP

Kind code of ref document: A1