[go: up one dir, main page]

WO2025200906A1 - Communication method and communication apparatus - Google Patents

Communication method and communication apparatus

Info

Publication number
WO2025200906A1
WO2025200906A1 PCT/CN2025/079013 CN2025079013W WO2025200906A1 WO 2025200906 A1 WO2025200906 A1 WO 2025200906A1 CN 2025079013 W CN2025079013 W CN 2025079013W WO 2025200906 A1 WO2025200906 A1 WO 2025200906A1
Authority
WO
WIPO (PCT)
Prior art keywords
network device
terminal device
information
network
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2025/079013
Other languages
French (fr)
Chinese (zh)
Inventor
朱世超
胡星星
韩锋
许斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2025200906A1 publication Critical patent/WO2025200906A1/en
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Definitions

  • the present application relates to the field of communication technology, and more specifically, to a communication method and a communication device.
  • Satellite communications can provide communication services to areas that are difficult for terrestrial networks to cover, such as oceans and forests, and enhance the reliability of 5G communications. Due to the mobility of satellites, their coverage range varies over time. For example, due to satellite mobility, within a certain period of time, a terminal device may leave the coverage area of the satellite providing service to the terminal device. This means that the satellite cannot provide service to the terminal device during that period of time. At this time, the terminal device needs to connect to a new satellite to ensure normal communication between the terminal device and the network.
  • satellites provide discontinuous coverage of terminal devices, while providing continuous coverage of ground gateways. This means that satellites can connect to core network devices in real time through ground gateways to obtain relevant information about terminal devices, thereby ensuring key consistency between the satellite and terminal devices and ensuring normal communication between the satellite and terminal devices.
  • S&F store and forward
  • satellites provide discontinuous coverage relative to both ground gateways and terminal devices. Satellites cannot cover both ground gateways and terminal devices simultaneously. Each time a terminal device connects to a satellite, it re-derives the key, resulting in the inability to align the transmission key between the satellite and terminal device, making normal communication impossible. Therefore, in S&F scenarios, how to ensure normal communication between terminal devices and the network is a current research hotspot.
  • the present application provides a communication method and a communication device that can ensure normal communication between a terminal device and a network in an S&F scenario.
  • a communication method is provided, which can be executed by a terminal device, or can also be executed by a component of the terminal device (such as a chip or circuit), which is not limited in this application.
  • a component of the terminal device such as a chip or circuit
  • the following is an introduction using a terminal device as an example.
  • the method includes: when a terminal device leaves the coverage of a first network device that provides services for the terminal device, the terminal device changes from a connected state to a first state, wherein the first state includes any one of the following: a connected state suspended by the access layer AS of the terminal device, a suspended idle state, or an inactive state; the terminal device sends a first request message to a second network device, wherein the first request message is used to request access to the second network device, and the first request message includes identification information of the terminal device, wherein the first network device and the second network device are non-terrestrial network devices.
  • first network device and the second network device are the same or different network devices.
  • the terminal device when the terminal device leaves the coverage of the first network device, the terminal device needs to wait until it re-enters the coverage of the first network device according to the first indication information before accessing the first network device.
  • the terminal device cannot access other network devices except the first network device.
  • the identification information of the terminal device includes: a cell radio network temporary identifier (C-RNTI) of the terminal device in a first cell, where the first cell is a cell that provides services to the terminal device within the coverage of the first network device; the identification information of the terminal device also includes one or more of the following: a physical cell ID (PCI) of the first cell, location information of the terminal device, identification information of the first network device, or identification information of the first cell.
  • C-RNTI cell radio network temporary identifier
  • PCI physical cell ID
  • the identification information of the terminal device includes: the cell radio network temporary identification C-RNTI of the terminal device in the first cell, the first cell is a cell that provides services to the terminal device within the coverage of the first network device; the identification information of the terminal device also includes one or more of the following: the physical cell identification PCI of the first cell, the location information of the terminal device, the identification information of the first network device, or the identification information of the first cell.
  • the method includes: a core network device receives second information from a first network device, the second information includes first context information of a terminal device, and the first context information of the terminal device includes identification information of the terminal device; the core network device sends the second context information of the terminal device to at least one third network device, the second context information of the terminal device includes a key and an NCC, or the second context information of the terminal device includes an NCC and a next hop NH, wherein the first network device and the at least one third network device are non-terrestrial network devices.
  • the method also includes: the core network device receives third indication information from a second network device in at least one third network device, and the third indication information is used to indicate that the terminal device has successfully accessed the second network device; the core network device sends release indication information to other network devices in at least one third network device except the second network device based on the third indication information, and the release indication information is used to indicate the release of the second context information of the terminal device.
  • a communication method is provided, which can be executed by a second network device, or can also be executed by a component (such as a chip or circuit) of the second network device, which is not limited in this application.
  • the second network device is used as an example for description below.
  • the seventh aspect corresponds to some of the implementation methods of the above-mentioned first to sixth aspects.
  • the technical effects and related introductions can be found in the detailed introductions of the above-mentioned first to sixth aspects, and will not be repeated here.
  • the second network device sends first response information to the terminal device based on the second context information and the first request information of the terminal device, where the first response information includes the NCC.
  • the method before the second network device receives the second context information of the terminal device from the core network device, the method also includes: the second network device receives the first request information from the terminal device; the second network device sends the second request information to the core network device based on the first request information, and the second request information is used to request to obtain the second context information of the terminal device, and the second request information includes the identification information of the terminal device.
  • the NCC in the second context information of the terminal device comes from the first context information of the terminal device, or the NCC is determined by the core network device, wherein the first context information of the terminal device comes from the first network device, and the first network device is a network device that provides services to the terminal device before the second network device receives the first request information from the terminal device, and the first network device is a non-terrestrial network device.
  • the first context information of the terminal device when the first context information of the terminal device does not include NCC, the first context information of the terminal device includes second indication information, and the second indication information is used to instruct the core network device to configure NCC and next hop NH for the terminal device.
  • the method when the terminal device successfully accesses the second network device, the method also includes: the second network device sends a third indication information to the core network device, the third indication information is used to indicate that the terminal device has successfully accessed the second network device, and the third indication information includes identification information of the terminal device.
  • the method further includes: the second network device sends indication information for indicating the available area of the second network device.
  • the first request information when the first request information includes the RRC re-establishment reason, the first request information includes a first cause value, and the first cause value is otherfailure; when the first request information includes the RRC connection recovery reason, the first request information includes a second cause value, and the second cause value is delayTolerantAccess-v1020.
  • the first category of terminal devices includes store-and-forward terminal devices, or can be referred to as terminal devices supporting S&F functions, or can be referred to as terminal devices capable of accessing S&F network devices.
  • the first information element is used to indicate that a first-category terminal device is allowed to access the second network device.
  • the second network device indicates access to a terminal device supporting the S&F function through the first information element in the first message, thereby ensuring that the terminal device supporting the S&F function can access the S&F network device.
  • the second network device is in a non-S&F mode (or referred to as the second network device operating in the non-S&F mode, or referred to as the second network device being a non-S&F network device), and the first information element is used to indicate that the first type of terminal device is not allowed/rejected from accessing the second network device.
  • the second network device through the first information element in the first message, indicates that the terminal device supporting the S&F function is refusal to access the second network device, thereby preventing the terminal device supporting the S&F function from requesting access to the second network device, thereby saving resource overhead of the terminal device.
  • the second network device is in the S&F mode
  • the first information element is a first value
  • the first information element is used to indicate that the first type of terminal device is allowed to access the second network device.
  • the first value may be “not barred”.
  • the first information element sfBarred information element
  • the sfBarred information element is used to indicate that the first type of terminal device is allowed to access the second network device.
  • the second network device is in a non-S&F mode
  • the first information element is a non-first value
  • the first information element is used to indicate that the first type of terminal device is denied access to the second network device.
  • the non-first value may be “barred.”
  • the first information element sfBarred information element
  • the sfBarred information element is used to indicate that the first type of terminal device is denied access to the second network device.
  • the first message also includes a second information element and/or a third information element
  • the second information element is used to indicate whether the second type of terminal device is allowed to access the second network device
  • the third information element is used to indicate whether the third type of terminal device is allowed to access the second network device
  • the second type of terminal device includes a ground network terminal device
  • the third type of terminal device includes a non-ground network terminal device
  • terrestrial network terminal equipment is also called normal terminal equipment
  • non-terrestrial network terminal equipment is also called NTN terminal equipment, or terminal equipment that supports services provided by NTN, or terminal equipment capable of receiving NTN services.
  • the second information element may be a cellBarred information element in a system message
  • the third information element may be a cellBarredNTN information element in a system message, which is not limited in this application.
  • the second network device is in the S&F mode
  • the second information element is a second value
  • the second information element is used to indicate that the second type of terminal device is denied access to the second network device
  • the third information element is a third value
  • the third information element is used to indicate that the third type of terminal device is denied access to the second network device.
  • the specific expressions of the second value and the third value are similar to those of the first value, and are not limited in this application.
  • the second value may be “barred” and the third value may be “barred”.
  • the second information element and the third information element in the first message of the second network device are used to indicate that the second type of terminal devices and the third type of terminal devices are denied access to the second network device, thereby preventing non-S&F terminal devices from accessing the second network device and ensuring that the S&F network device only provides services for terminal devices that support the S&F function.
  • the second information element when the second network device is in non-S&F mode, the second information element is a second value, and the second information element is used to indicate that the second type of terminal device is denied access to the second network device; the third information element is a non-third value, and the third information element is used to indicate that the third type of terminal device is allowed to access the second network device.
  • a non-third value is different from a third value, and the specific form of the non-third value is not limited in this application.
  • a non-second value may be "not barred” and a non-third value may be "not barred”.
  • the second network device is a non-terrestrial network device, that is, the second information element of the second network device is the second value in the non-S&F mode or in the S&F mode.
  • the first information element in the first message of the second network device is used to indicate that the first type of terminal device is denied access to the second network device
  • the second information element is used to indicate that the second type of terminal device is denied access to the second network device
  • the third information element is used to indicate that the third type of terminal device is allowed access to the second network device.
  • a communication method comprising: a terminal device receives a first message, the first message comprising a first information element, the first information element being used to indicate whether a first type of terminal device is allowed to access a second network device, the first type of terminal device comprising a store-and-forward terminal device; when the first information element is used to indicate that the first type of terminal device is allowed to access a second network device, and the terminal device is the first type of terminal device, the terminal device sends a first request message to the second network device, the first request message being used to request access to the second network device, wherein the second network device is a non-terrestrial network device.
  • the second network device is in the S&F mode
  • the first information element is a first value
  • the first information element is used to indicate that the first type of terminal device is allowed to access the second network device.
  • the second network device is in a non-S&F mode
  • the first information element is a non-first value
  • the first information element is used to indicate that the first type of terminal device is denied access to the second network device.
  • the first message also includes a second information element and/or a third information element
  • the second information element is used to indicate whether the second type of terminal device is allowed to access the second network device
  • the third information element is used to indicate whether the third type of terminal device is allowed to access the second network device
  • the second type of terminal device includes a ground network terminal device
  • the third type of terminal device includes a non-ground network terminal device
  • the terminal device may ignore the values of the first information element and the second information element.
  • the terminal device determines to send the first request information to the second network device based on the value of the third information element.
  • the terminal device may ignore the values of the first information element and the third information element. It should be understood that if the second network device is a non-terrestrial network device and the second information element is the second value, the terminal device determines not to send the first request information to the second network device.
  • transceiver unit is also used to perform the receiving and sending processing in the first aspect.
  • the processing unit can perform other processing in addition to the receiving and sending in the first aspect.
  • a communication device comprising a transceiver unit.
  • the transceiver unit is configured to send first indication information to a terminal device, the first indication information being used to instruct the terminal device to access the first network device when the terminal device leaves and then re-enters the coverage range of the first network device; and the transceiver unit is further configured to receive first request information from the terminal device, the first request information being used to request access to the first network device, wherein the first network device is a non-terrestrial network device.
  • the communication device further includes a processing unit, which can perform other processing in addition to receiving and sending in the aforementioned fifth aspect.
  • a communication device comprising a transceiver unit.
  • the transceiver unit is configured to receive second information from a first network device, the second information comprising first context information of a terminal device, the first context information of the terminal device comprising identification information of the terminal device; and the transceiver unit is further configured to send the second context information of the terminal device to at least one third network device, the second context information of the terminal device comprising a key and the NCC, or the second context information of the terminal device comprising the NCC and a next hop (NH), wherein the key is determined based on the NH, and the first network device and the at least one third network device are non-terrestrial network devices.
  • transceiver unit is also used to perform the receiving and sending processing as in the sixth aspect above.
  • a communication device comprising a transceiver unit configured to receive second context information of a terminal device from a core network device; and a transceiver unit configured to receive first request information from the terminal device, the first request information being used to request access to the second network device, the first request information including identification information of the terminal device, wherein the second network device is a non-terrestrial network device.
  • transceiver unit is also used to perform the receiving and sending processing as in the seventh aspect above.
  • the communication device further includes a processing unit that can perform other processing in addition to receiving and sending in the aforementioned seventh aspect.
  • a communication device comprising a transceiver unit.
  • the transceiver unit is configured to send a first message, the first message comprising a first information element, the first information element being configured to indicate whether a first-category terminal device is allowed to access the second-network device, the first-category terminal device comprising a store-and-forward terminal device; and the transceiver unit is further configured to receive a first request message from a terminal device, the first request message being configured to request access to the second-network device, the terminal device being the first-category terminal device, and the second-network device being a non-terrestrial network device.
  • transceiver unit is also used to perform the receiving and sending processing as in the eighth aspect above.
  • the communication device further includes a processing unit that can perform other processing in addition to receiving and sending in the aforementioned eighth aspect.
  • a communication device comprising a transceiver unit.
  • the transceiver unit is configured to receive a first message, the first message comprising a first information element, the first information element being configured to indicate whether a first-category terminal device is allowed to access a second-network device, the first-category terminal device comprising a store-and-forward terminal device; and the transceiver unit is further configured to send a first request message to the second-network device, the first request message being configured to request access to the second-network device, the terminal device being the first-category terminal device, wherein the second-network device is a non-terrestrial network device.
  • transceiver unit is also used to perform the receiving and sending processing as in the ninth aspect above.
  • the communication device further includes a processing unit that can perform other processing in addition to receiving and sending in the aforementioned ninth aspect.
  • an embodiment of the present application provides a communication device.
  • the communication device may be a device or apparatus with a chip, or a device or apparatus integrated with a circuit, or a chip, a chip system, a module or a control unit in the aforementioned device or apparatus, and the specific application is not limited thereto.
  • a communication device when referring to a communication device, it may refer to the communication device itself, or to a chip, a functional module or an integrated circuit in the communication device that completes the method provided in the present application, and the specific application is not limited thereto.
  • the device is used to execute the methods provided in the first to ninth aspects above.
  • the device may include units and/or modules for executing the method provided in any one of the implementations in the first to ninth aspects, such as a transceiver unit (or transceiver module) and a processing unit (or processing module).
  • an embodiment of the present application provides a chip.
  • the chip includes a processor and a communication interface, wherein the processor reads instructions stored in a memory through the communication interface and executes the method provided in any one of the implementation modes of the first to ninth aspects above.
  • FIG1 is a schematic diagram of a communication system used in an embodiment of the present application.
  • FIG3 is a schematic diagram of a KeNB update method.
  • FIG4 is a schematic diagram of an S&F scenario.
  • FIG5 is a flow chart of a communication method provided in an embodiment of the present application.
  • FIG7 is a flow chart of another communication method provided in an embodiment of the present application.
  • FIG8 is a flow chart of another communication method provided in an embodiment of the present application.
  • FIG9 is a schematic diagram of a communication device provided in an embodiment of the present application.
  • FIG10 is another schematic diagram of a communication device provided in an embodiment of the present application.
  • FIG11 is a schematic diagram of a chip system provided in an embodiment of the present application.
  • FIG1 is used as an example to describe the communication system applicable to each embodiment of the present application.
  • the communications system includes a radio access network (RAN) 100 and a core network (CN) 200.
  • RAN 100 includes at least one RAN node (e.g., 110a and 110b in Figure 1 , collectively referred to as 110) and at least one terminal device (e.g., 120a-120j in Figure 1 , collectively referred to as 120).
  • the RAN may also include other RAN nodes, such as wireless relay devices and/or wireless backhaul devices (not shown in Figure 1 ).
  • Terminal device 120 is wirelessly connected to RAN node 110.
  • RAN node 110 is wirelessly or wiredly connected to core network 200.
  • the core network devices in core network 200 and RAN node 110 in RAN 100 can be separate physical devices, or they can be the same physical device that integrates core network logical functions and radio access network logical functions.
  • the RAN 100 can be a cellular system related to the Third Generation Partnership Project (3GPP), such as a 4G, 5G, or 6G mobile communication system, a non-terrestrial network (NTN) system, or a future-oriented evolutionary system.
  • 3GPP Third Generation Partnership Project
  • the RAN 100 can also be an open access network (O-RAN or ORAN), a cloud radio access network (CRAN), or a wireless fidelity (WiFi) system, or a communication system that integrates two or more of the above systems.
  • 3GPP Third Generation Partnership Project
  • 4G, 5G, or 6G mobile communication system such as a 4G, 5G, or 6G mobile communication system, a non-terrestrial network (NTN) system, or a future-oriented evolutionary system.
  • the RAN 100 can also be an open access network (O-RAN or ORAN), a cloud radio access network (CRAN), or a wireless fidelity (WiFi) system, or a communication system that integrates two or more of the above systems.
  • the terminal device may also be a satellite phone, a cellular phone, a smart phone, a wireless data card, a wireless modem, a machine type communication device, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a customer-premises equipment (CPE), a smart point of sale (POS) machine, a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a communication device carried on a high-altitude aircraft, a wearable device, a drone, a robot, a terminal in device-to-device (D2D) communication, a vehicle-to-everything (V2D) communication, or a vehicle-to-everything (V2P) communication.
  • D2D device-to-device
  • V2D vehicle-to-everything
  • V2P vehicle-to-everything
  • the terminal device may also be a device with communication functions in the 6G communication system, without limiting the form or type of the terminal device in the 6G and other future communication systems.
  • Data transmission between the UE and gNB requires encryption and integrity protection, and different keys are used for different messages.
  • the keys required for data transmission between the UE and gNB include Krrcint (for RRC signaling integrity protection), Krrcenc (for RRC signaling encryption), and Kupenc (for user plane encryption). These keys are all derived from KeNB, so the KeNB values must be aligned between the UE and gNB to ensure secure data transmission between the UE and gNB.
  • the following sections focus on 1) how KeNB is obtained during the UE's initial network access, 2) how KeNB is updated during handover scenarios, and 3) how KeNB is updated during RRC recovery or RRC re-establishment scenarios.
  • the PCI of the target cell serving the UE, the frequency of the target cell, and the KeNB or NH before the update are used to determine the updated KeNB.
  • the PCI and frequency of the target serving cell are different from the PCI and frequency of the source serving cell, that is, after the UE switches to the target serving cell, it is necessary to use the updated KeNB for secure communication with the target serving cell.
  • the ShortMAC-I determines the ShortMAC-I based on the C-RNTI of the source cell where the UE resides, the PCI of the source cell, and the cell ID of the target cell.
  • the ShortMAC-I is then compared with the ShortMAC-I in the RETRIEVE UE CONTEXT REQUEST message. If the ShortMAC-I determined by the eNB matches the ShortMAC-I in the RETRIEVE UE CONTEXT REQUEST message, the UE is confirmed to be legitimate and has been previously served by the source cell.
  • the source eNB sends the KeNB* and NCC determined by the source eNB to the target eNB in the RETRIEVE UE CONTEXT RESPONSE message.
  • the target eNB then sends the NCC to the UE via an RRC message.
  • the method by which the source eNB and UE determine KeNB* is the same as that used in the inter-site X2 handover scenario described above. For details, please refer to the detailed description of the inter-site X2 handover scenario and will not be repeated here.
  • NTN-related topics include New Radio (NR) NTN and Internet of Things (IoT) NTN. These two technologies share a fundamentally similar architecture, with some distinct features.
  • IoT NTN is an evolution of LTE, with the base station being the eNodeB (eNB).
  • eNB eNodeB
  • IoT NTN will research store and forward (S&F) technology based on a regenerative satellite architecture. The need for S&F arises from the limited number of satellites and ground gateways used by smaller satellite operators, making it difficult to maintain a constant connection between ground gateways and satellites.
  • Figure 4 is a schematic diagram of a S&F scenario.
  • the satellite When the satellite covers a UE, it cannot connect to the gateway and communicate with the core network.
  • the satellite When the satellite connects to the gateway and communicates with the core network, there are no UEs within the satellite's coverage area. In this scenario, normal real-time services cannot be completed. However, for some non-real-time IoT services (such as sensor data reporting), communication between the satellite and the UE can be carried out when the satellite covers the UE.
  • communication between the satellite and the core network can be carried out in a relay manner. This is the S&F scenario currently being studied.
  • the satellite needs to have a certain level of storage and processing capabilities to cache data from the UE or core network and forward it when it regains coverage of the core network or UE at some point in the future. Therefore, the satellite in this S&F scenario is a regenerative satellite, for example, it can serve as an eNB.
  • the discontinuous coverage scenario for IoT NTNs studied in Release 18 primarily involves a period of time after the previous satellite departs before the next satellite reaches the UE.
  • the coverage between the satellite and the ground gateway is continuous, meaning the satellite is always connected to the ground gateway.
  • These satellites are transparent transmission satellites, unlike the regenerative satellites used in the S&F scenario.
  • Release 18 does not account for discontinuous coverage between the satellite and the ground gateway.
  • the satellite has discontinuous coverage relative to the ground gateway and the UE.
  • the UE cannot align the KeNB value with the base station, resulting in the inability to establish a secure connection between the UE and the base station, and the inability to communicate normally between the UE and the network.
  • the present application provides a communication method, which can ensure normal communication between UE and network in S&F scenarios.
  • FIG5 is a flow chart of a communication method provided in an embodiment of the present application.
  • the network device 1 is a non-terrestrial network device, for example, the network device 1 is a satellite or a drone, which is not limited in this application.
  • the method may include the following steps.
  • the terminal device receives first indication information from network device 1 .
  • the network device 1 sends the first indication information to the terminal device.
  • network device 1 when the terminal device is within the coverage of network device 1 and network device 1 provides services to the terminal device, network device 1 sends the first indication information to the terminal device.
  • the first indication information is used to instruct the terminal device to access network device 1 when the terminal device leaves the coverage of network device 1 and then re-enters the coverage of network device 1, or the first indication information is used to instruct the terminal device to access network device 1 and prohibit access to network devices other than network device 1.
  • the terminal device changes from the connected state to the first state.
  • the terminal device changes from the connected state to the first state.
  • the terminal device leaves the coverage of network device 1 at a first moment, and the first moment may be indicated to the terminal device by network device 1.
  • the first moment may be determined by network device 1 based on its own movement trajectory and the location information of the terminal device.
  • the network device 1 stops providing services to the terminal device.
  • the first state includes one or more of the following: a suspended connection state, a suspended idle state, or an inactive state of the access layer AS of the terminal device.
  • the terminal device's access layer AS suspended connection state is a special connection state in which the terminal device retains its context information. This state can be understood as the terminal device remaining in the connected state and halting all AS layer processing operations. For example, the terminal device stops detecting RLF, stopping measurements, and stopping paging monitoring.
  • the idle state with suspended is a special idle state.
  • the terminal device retains the context information of the terminal device and does not release the context information of the terminal device.
  • the terminal device still keeps monitoring the network in the inactive state so that it can be reactivated and communicate with the network when needed.
  • the terminal device receives the first information from the network device 1 .
  • the network device 1 sends the first information to the terminal device.
  • FIG6 is a flow chart of another communication method provided in an embodiment of the present application.
  • the terminal device changes from the connected state to the first state.
  • the special idle state may be a suspended idle state (for example, IDLE with suspended).
  • IDLE suspended idle state
  • the terminal device changes from a connected state to a suspended idle state or an inactive state, the terminal device retains the context information of the terminal device to facilitate subsequent correct access to a new network device.
  • Network device 1 sends second information to the core network device.
  • the core network device receives the second information from the network device 1 .
  • the first context information of the terminal device includes key #1 and NCC.
  • the key #1 is determined by the network device 1 based on the unused NH.
  • the specific determination method is similar to the determination method of KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation). Please refer to the above detailed description for details.
  • the first context information of the terminal device does not include the key #1, the NCC and the second indication information.
  • the core network device when the first context information of the terminal device includes second indication information, the core network device generates NH and NCC according to the second indication information, and sends the second context information of the terminal device carrying NH and NCC to network device 2 and network device 3.
  • the core network device sends the second context information of the terminal device to network device 2 and network device 3, and the second context information of the terminal device is carried in the same message and sent to network device 2 and network device 3 at the same time, or the second context information of the terminal device is carried in different messages and sent to network device 2 and network device 3 successively.
  • This application does not limit this.
  • the core network device when the core network device sends the second context information of the terminal device to network device 2 and network device 3, the core network device is within the coverage area of network device 2 and network device 3, respectively, and the core network device can wirelessly communicate with network device 2 and network device 3. For example, when network device 2 moves to a covered ground gateway, the core network device sends the second context information of the terminal device to network device 2 via the ground gateway.
  • network device 2 and network device 3 send indication information for indicating the available area of network device 2 and indication information for indicating the available area of network device 3 to the terminal device.
  • network device 2 may broadcast indication information indicating the available area of network device 2 in a system message.
  • the terminal device may receive the indication information indicating the available area of network device 2.
  • the system message may be a master information block (MIB) or a system information block (SIB).
  • step 606 network device 2 and network device 3 sending indication information indicating the available area of network device 2 and the available area of network device 3 to the terminal device is an optional step. If the first information in step 602 includes indication information indicating the available area of network device 2 and the available area of network device 3, step 606 does not need to be performed.
  • the terminal device sends first request information to the network device 2 .
  • the network device 2 receives the first request information from the terminal device, wherein the first request information includes the identification information of the terminal device.
  • the terminal device selects network device 2 as the target network device for providing services to the terminal device based on a certain rule or a certain preset condition.
  • the certain rule or the certain preset condition may be predetermined by the system, pre-configured by the protocol, or determined by the terminal device itself, which is not limited in this application.
  • the terminal device selects network device 2 as the target network device based on the available areas of multiple network devices (eg, network device 2 and network device 3), and sends first request information for requesting access to network device 2 to network device 2.
  • network device 2 Assume that the terminal device selects network device 2 as the target network device based on the available areas of multiple network devices (eg, network device 2 and network device 3), and sends first request information for requesting access to network device 2 to network device 2.
  • the terminal device determines the transmission delays of network device 2 and network device 3 respectively based on the ephemeris information of the network device (e.g., network device 2, network device 3) indicated in the received first information, the location information connected to the gateway station, the time information and other parameters, selects the network device with the smallest delay (e.g., network device 2) as the target network device, and sends a first request information to network device 2 for requesting access to network device 2.
  • the network device e.g., network device 2, network device 3
  • the network device with the smallest delay e.g., network device 2
  • the first request information may be a request information for RRC re-establishment (e.g., RRC connection reestablishment request) or a request information for RRC connection resumption.
  • the first request information may further include a cause value for indicating re-establishment, and the cause value may be "other failure", or the cause value may be a cause value related to the terminal device accessing the network device 2, and the cause value is related to the S&F scenario.
  • the first request information may further include a cause value for indicating resumption, and the cause value may be "delayTolerantAccess-v1020", or the cause value may be a cause value related to the terminal device accessing the network device 2, and the cause value is related to the S&F scenario.
  • the first request message when the first state is a connection state suspended by the access layer, the first request message may be a request message for RRC re-establishment; when the first state is a special idle state or inactive state, the first request message may be a request message for RRC recovery establishment.
  • the identification information of the terminal device includes: the cell radio network temporary identifier C-RNTI of the terminal device in the first cell, wherein the first cell is a cell providing services to the terminal device within the coverage of the network device 1.
  • the first cell may also be referred to as a source service cell providing services to the terminal device.
  • the identification information of the terminal device may also include one or more of the following: the physical cell identifier PCI of the first cell, the location information of the terminal device, the identification information of the first network device, or the identification information of the first cell.
  • Network device 2 sends first response information to the terminal device.
  • the terminal device receives the first response information from the network device 2 .
  • network device 2 authenticates (or authorizes) the terminal device based on the terminal device identification information in the first request information and the terminal device identification information in the second context information of the terminal device received in step 605.
  • network device 2 successfully authenticates the terminal device and determines that the terminal device is a legitimate device, network device 2 sends a first response information to the terminal device, where the first response information is used to respond to the first request information.
  • the network device 2 determines that the terminal device is a legal device, the network device 2 accepts the access of the terminal device, and the network device 2 sends the first response information to the terminal device.
  • the first response information includes NCC, which is the NCC in the second context information of the terminal device received by network device 2 from the core network device.
  • the NCC can come from network device 1, or the NCC is determined by the core network device. This application does not limit this.
  • step 608 when the network device 2 determines that the terminal device is not a legitimate device, there is no need to perform step 608 and subsequent steps.
  • the terminal device communicates securely with the network device 2 .
  • the terminal device determines the key (for example, key #1) for secure communication with network device 2 based on the NCC in the first response information.
  • the key #1 determined by network device 2 can be the key #1 determined by network device 1, or the key #1 determined by network device 2 based on the NH determined by the core network and the NCC.
  • the specific method by which the terminal device determines key #1 based on the NCC, and the network device 2 determines key #1 based on the NCC is similar to the method for determining KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (e.g., vertical derivation).
  • the method for determining KeNB* in the update of KeNB in the above-mentioned 2) switching scenario e.g., vertical derivation.
  • key #1 is used for secure communication between the terminal device and the network device 2.
  • Network device 2 sends third indication information to the core network device.
  • the core network device receives the third indication information from the network device 2 .
  • network device 2 may send third indication information to the core network device, where the third indication information is used to indicate that the terminal device has successfully accessed the second network device.
  • the third indication information includes identification information of the terminal device, such as the NG interface application layer protocol identifier (UE NGAP ID) of the terminal device.
  • the third indication information may also include identification information of network device 3, such as the eNB ID of network device 3, the satellite identifier of network device 3, or the IP address of network device 3.
  • the identification information of the terminal device may use the identification information of the terminal device under network device 3, such as the C-RNTI. This method eliminates the need for the core network device to modify the identification of the terminal device.
  • the core network device only needs to obtain the identification information of network device 3 and can indicate the terminal device to network device 3 by carrying the identification information of the terminal device that is recognizable by network device 3.
  • the core network device sends release indication information to network device 3.
  • the network device 3 receives the release indication information from the core network device.
  • the core network device determines, based on the third indication information, that the terminal device has successfully accessed network device 2. The core network device then determines to send release indication information to network device 3, where the release indication information is used to instruct the release of the second context information of the terminal device.
  • the release indication information includes identification information of the terminal device, such as the UE NGAP ID of the terminal device or the C-RNTI of the terminal device under network device 3.
  • the core network device can determine at least one third network device based on the identification information of the at least one third network device included in the second information in step 604, and send the release indication information to other network devices (e.g., network device 3) among the at least one third network device except network device 2.
  • network device 3 receives the release indication information from the core network device, it releases the context information of the terminal device based on the identification information of the terminal device in the release indication information.
  • the terminal device when the terminal device leaves the coverage of the network device 1, that is, when the source network device that provides services to the terminal device (such as network device 1) no longer provides services to the terminal device, the terminal device changes from the connected state to the first state.
  • the terminal device can retain the context information of the terminal device in the first state, so as to facilitate correct access to the new target network device that provides services to the terminal device (such as network device 2).
  • the network device 1 covers the gateway, it forwards the first context information of the terminal device to the potential target network device in the first information through the core network device, so that when the subsequent terminal device initiates a request to the target network device, it can access accurately and quickly, thereby ensuring normal communication between the terminal device and the network.
  • the network device 2 when the terminal device accesses a new network device (such as network device 2), the network device 2 sends a third indication message to the core network device to indicate that the terminal device has successfully accessed network device 2, and the core network device sends a release indication message to other network devices in the first information to indicate the release of the terminal device context information, thereby saving resource overhead of other network devices.
  • a new network device such as network device 2
  • the network device 2 sends a third indication message to the core network device to indicate that the terminal device has successfully accessed network device 2
  • the core network device sends a release indication message to other network devices in the first information to indicate the release of the terminal device context information, thereby saving resource overhead of other network devices.
  • the terminal device when the terminal device leaves the coverage of network device 1, the terminal device changes from a connected state to a first state.
  • the first state may also include an idle state.
  • the terminal device when the terminal device leaves the coverage of network device 1, the terminal device may also release the context information of the terminal device and enter an idle state.
  • the terminal device selects network device 2 to initiate an initial access process. Accordingly, the terminal device and network device 2 use a key derived from the root key Kasme for encrypted communication according to the key acquisition method in the initial access scenario.
  • the key acquisition between the terminal device and network device 2 in the initial access scenario is similar to the acquisition of KeNB by the terminal device and the base station in the above 1) initial access scenario.
  • the terminal device derives KeNB based on the root key Kasme, and the base station receives KeNB derived from the root key Kasme from the MME.
  • the terminal device and the base station use KeNB for encrypted communication. Please refer to the above detailed introduction for details, which will not be repeated here.
  • FIG7 is a flow chart of another communication method provided in an embodiment of the present application.
  • the terminal device receives T_service information from the network device 1 .
  • Network device 1 sends first information to the terminal device.
  • the terminal device receives the first information from the network device 1 .
  • the terminal device changes from the connected state to the first state.
  • the terminal device receives T_service information from the network device 1. After the time indicated by the T_service information (eg, the first time) is reached, the terminal device changes from the connected state to the first state.
  • T_service information eg. the first time
  • steps 701 to 703 are similar to steps 601 to 603 in FIG. 6 .
  • steps 601 to 603 please refer to the detailed description of steps 601 to 603 .
  • the terminal device sends first request information to the network device 2 .
  • the network device 2 receives the first request information from the terminal device.
  • the certain rule or condition may be predetermined by the system, pre-configured by the protocol, or determined by the terminal device itself, and this application does not limit this.
  • network device 2 sends a second request message to the core network device.
  • the core network device receives the second request information from the network device 2 .
  • the network device 2 After network device 2 receives the first request information from the terminal device, the network device 2 does not have the context information of the terminal device.
  • the network device 2 sends a second request information to the core network device based on the first request information.
  • the second request information is used to request the context information of the terminal device.
  • the second request information includes the identification information of the terminal device.
  • the network device 2 when the network device 2 covers the ground gateway, the network device 2 sends the second request information to the core network device through the ground gateway.
  • the core network device sends a third request message to network device 1.
  • the network device 1 receives the third request information from the core network device.
  • the core network device After the core network device receives the second request information from network device 2, when network device 1 covers a ground gateway station, the core network device sends a third request information to network device 1 through the ground gateway station.
  • the third request information is used to request the context information of the terminal device, and the third request information includes the identification information of the terminal device.
  • network device 1 sends the first context information of the terminal device to the core network device.
  • the core network device receives the first context information of the terminal device from the network device 1 .
  • network device 1 After network device 1 receives the third request information from the core network device, network device 1 authenticates the terminal device based on the terminal device's identification information in the third request information. If the terminal device is successfully authenticated and network device 1 is covered by a ground gateway, network device 1 sends the first context information of the terminal device to the core network device via the ground gateway.
  • the first context information of the terminal device includes key #1 and NCC.
  • the key #1 is determined by the network device 1 based on the unused NH.
  • the specific determination method is similar to the determination method of KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation). Please refer to the above detailed description for details.
  • the first context information of the terminal device includes second indication information
  • the second indication information is used to instruct the core network device to determine the NH and the NCC.
  • the first context information of the terminal device does not include the key #1, the NCC and the second indication information.
  • network device 1 authenticates the terminal device based on the terminal device identification information in the third request information and determines that the terminal device is not a legitimate device, there is no need to execute step 707' and subsequent steps.
  • the core network device sends the second context information of the terminal device to network device 2.
  • the network device 2 receives the second context information of the terminal device from the core network device.
  • the core network device receives the first context information of the terminal device from the network device 1 , and sends the second context information of the terminal device to the network device 2 based on the first context information of the terminal device.
  • the core network device forwards the first context information of the terminal device to network device 2 through the second context information of the terminal device, and the second context information of the terminal device includes key #1 and NCC.
  • the core network device determines the NH and NCC based on the second indication information, and sends the second context information of the terminal device carrying NH and NCC to the network device 2 based on the first context information of the terminal device.
  • the core network device when the first context information of the terminal device does not include key #1, NCC and second indication information, the core network device generates NH and NCC, and sends the second context information of the terminal device carrying NH and NCC to the network device 2 based on the first context information of the terminal device.
  • the core network device when the core network device sends the second context information of the terminal device to network device 2, the core network device is within the coverage of network device 2 and can wirelessly communicate with network device 2. For example, when network device 2 moves to a covered ground gateway, the core network device sends the second context information of the terminal device to network device 2 through the ground gateway.
  • network device 2 sends indication information for indicating its own available area.
  • the terminal device receives indication information indicating its own available area from the network device 2 .
  • the terminal device when the terminal device is within the coverage of network device 2, the terminal device can receive a system message broadcast from network device 2, which may include indication information for indicating its own available area, or the network device 2 sends the indication information for indicating its own available area through a separate message.
  • step 709' is an optional step.
  • the first information in step 702 includes indication information for indicating the available area of network device 2, step 709' does not need to be executed.
  • the terminal device sends a first request message to the network device 2.
  • the terminal device when the terminal device enters the coverage area of the network device 2 , the terminal device sends first request information to the network device 2 , where the first request information is used to request access to the network device 2 .
  • step 710' is similar to step 607 in FIG. 6 and step 704 in FIG. 7 .
  • step 704 please refer to the detailed description of step 607 in FIG. 6 and step 704 in FIG. 7 .
  • the core network device requests the context information of the terminal device from network device 1, and network device 1 authenticates the terminal device. If the authentication is successful, network device 1 sends the first context information of the terminal device to the core network device, and the core network device further sends the second context information of the terminal device to network device 2.
  • the network device 2 and the terminal device communicate securely based on the key #1, thereby ensuring secure communication between the terminal device and the network.
  • FIG8 is a flow chart of another communication method provided in an embodiment of the present application.
  • the first network device is network device 1, and the at least one third network device is network device 2 and network device 3, respectively.
  • Network device 2 can be used as the second network device in the at least one third network device
  • network device 3 can be used as an example of the other network devices in the at least one third network device except the second network device.
  • Network device 1, network device 2, and network device 3 are all non-terrestrial network devices.
  • network device 1, network device 2, and network device 3 are respectively satellites or drones, which are not limited in this application.
  • the method may include the following steps.
  • Network device 1 sends T_service information to terminal device.
  • the terminal device receives T_service information from the network device 1 .
  • Network device 1 sends first information to the terminal device.
  • the terminal device receives T_service information from the network device 1. After the time indicated by the T_service information (eg, the first time) is reached, the terminal device changes from the connected state to the first state.
  • T_service information eg. the first time
  • Network device 1 sends first context information of the terminal device to the core network device.
  • the core network device receives the first context information of the terminal device from the network device 1 .
  • the network device 1 when the network device 1 covers the ground gateway, the network device 1 sends the first context information of the terminal device to the core network device through the ground gateway.
  • the first context information of the terminal device includes the identification information of the UE.
  • the first context information of the terminal device includes key #1 and NCC.
  • the key #1 is determined by the network device 1 based on the unused NH.
  • the specific determination method is similar to the determination method of KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation). Please refer to the above detailed description for details.
  • the first context information of the terminal device includes second indication information
  • the second indication information is used to instruct the core network device to configure NH and NCC for the terminal device.
  • the first context information of the terminal device does not include the key #1, the NCC and the second indication information.
  • step 805 is similar to step 606 in FIG. 6 , and both are optional steps.
  • step 805 is similar to step 606 in FIG. 6 , and both are optional steps.
  • the terminal device sends first request information to the network device 2 .
  • the network device 2 receives the first request information from the terminal device.
  • Network device 2 sends second request information to the core network device.
  • the core network device receives the second request information from the network device 2 .
  • the network device 2 when the network device 2 covers the gateway, the network device 2 sends the second request information to the core network device through the gateway.
  • the core network device sends the second context information of the terminal device to network device 2 .
  • the network device 2 receives the second context information of the terminal device from the core network device.
  • the terminal device sends first request information to the network device 2 .
  • the network device 2 receives the first request information from the terminal device.
  • the terminal device when the terminal device enters the coverage of network device 2, the terminal device receives the system message broadcast by network device 2. After the terminal device receives the system message of network device 2, the terminal device can send a first request message to network device 2, and the first request message is used to request access to network device 2.
  • Network device 2 sends first response information to the terminal device.
  • network device 2 After network device 2 receives the first request information from the terminal device, network device 2 sends a first response information to the terminal device according to the first request information, and the first response information is used to respond to the first request information.
  • the first response information includes the NCC in the second context information of the terminal device.
  • the terminal device determines the key (for example, key #1) for secure communication with network device 2 based on the NCC in the first response information.
  • the key #1 determined by network device 2 can be the key #1 determined by network device 1, or the key #1 determined by network device 2 based on the NH determined by the core network and the NCC. This application does not limit this.
  • the terminal device determines key #1 based on the NCC
  • the network device 2 determines the specific method of determining key #1 based on the NCC is similar to the method of determining KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation).
  • the terminal device determines key #1 based on the NCC
  • the network device 2 determines the specific method of determining key #1 based on the NCC is similar to the method of determining KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation).
  • the terminal device changes from the connected state to the first state and sends a first request message for access request to network device 2.
  • the network device 1 covers a ground gateway, the network device 1 can send the first context information of the terminal device to the core network device.
  • the core network device receives a request for the context information of the terminal device from another network device (such as network device 2), the core network device authenticates the terminal device.
  • the core network device determines to send the second context information of the terminal device determined based on the first context information of the terminal device to network device 2, so that network device 2 and the terminal device can communicate based on key #1, ensuring secure communication between the terminal device and the network.
  • NR two special types of terminal devices are introduced in NR: IAB-MT and NCR-MT. These two types of terminal devices may ignore the cellBarred information element in the system message broadcast by the network device.
  • the method provided in the present application introduces the iab-support information element and the ncr-support information element for IAB-MT and NCR-MT in the protocol included in the system message.
  • the iab-support information element and the ncr-support information element can be located in the SIB message to indicate whether the cell allows IAB-MT or NCR-MT to access.
  • network device 2 and network device 3 set the values corresponding to the iab-support information element and the ncr-support information element in the SIB message to not support.
  • the cellBarredNTN information element in the system messages (e.g., MIB messages/SIB messages) broadcast by network devices 2 and 3 is set to barred to indicate that the cell does not support access by standard NTN terminals.
  • the method provided in this application introduces an indication that the cell supports access by S&F terminal devices.
  • a new information element e.g., the sfBarred information element
  • This application does not limit the name of the information element.
  • the value of the sfBarred information element can be "barred (prohibited)/not barred (not prohibited)". If the value of the sfBarred information element is barred (prohibited), it means that the cell does not support access by S&F terminal devices. If the value of the sfBarred information element is not barred (not prohibited), it means that the cell supports access by S&F terminal devices.
  • the value of sfBarred in the system message is set to "not barred".
  • the value of the sfBarred element in the system message can vary. If a satellite is determined to operate in S&F mode at certain times, the value of the sfBarred element can be set to "not barred", indicating that the satellite provides S&F services or supports access by S&F terminal devices. The satellite can be determined not to operate in S&F mode (operating in normal communication mode) at other times. For example, if the satellite can simultaneously connect to the core network and cover certain terminal devices at certain times, the satellite will set the value of the sfBarred element to "barred", indicating that the satellite does not provide S&F services or does not support access by S&F terminal devices, or that the satellite provides ordinary access services.
  • the S&F terminal device can ignore the values of the cellBarred and cellBarredNTN information elements and directly read the value of the sfBarred information element in the system message to determine whether access to the cell is allowed.
  • the terminal device determines whether the cell allows the terminal device to access based solely on the value of the cellBarredNTN information element. If the value of the cellBarredNTN information element is not barred, the cell allows the terminal device to access. If the value of the cellBarredNTN information element is barred, the cell does not allow the terminal device to access.
  • the terminal device is a non-NTN terminal device (such as a terrestrial network terminal device, a terminal device that does not support NTN functions, or a terminal device that does not support receiving NTN network services)
  • the cellBarredNTN information element and the sfBarred information element are ignored.
  • the terminal device determines whether the cell allows the terminal device to access based only on the value of the cellBarred information element. When the value of the cellBarred information element is not barred, it is determined that the cell allows the terminal device to access. When the value of the cellBarred information element is barred, it is determined that the cell does not allow the terminal device to access.
  • system messages broadcast by network devices in the S&F scenario combine the existing cellBarred and cellBarredNTN mechanisms to indicate that access by non-NTN UEs and non-S&F NTN UEs is denied.
  • a new sfBarred information element is added to the system messages broadcast by network devices. Only S&F terminal devices are allowed to access the network devices in the S&F scenario, ensuring that the S&F network devices only provide services for specific types of terminal devices.
  • network device 1 receives the T_service information sent by the RIC of network device 1 via the E2 interface.
  • network device 1 receives the first information sent by the RIC of network device 1 via the E2 interface.
  • network device 2 receives indication information indicating the available area of network device 2 sent by the RIC of network device 2 via the E2 interface, and network device 3 receives indication information indicating the available area of network device 3 sent by the RIC of network device 3 via the E2 interface.
  • network device 1 receives the T_service information sent by the RIC of network device 1 via the E2 interface.
  • network device 1 receives the first information sent by the RIC of network device 1 via the E2 interface.
  • network device 2 receives indication information indicating the available area of network device 2 sent by the RIC of network device 2 via the E2 interface, and network device 3 receives indication information indicating the available area of network device 3 sent by the RIC of network device 3 via the E2 interface.
  • the RIC of network device 1 can inform network device 1 of the T_service information and the first information that it has stopped providing services to the terminal device.
  • the RIC of network device 2 and the RIC of network device 3 can inform network device 2 and network device 3 of their corresponding available areas, thereby enabling the network device to correctly send relevant information to the terminal device, ensuring the accuracy of the transmitted information.
  • the transceiver unit 2020 may include a sending unit and a receiving unit.
  • the sending unit is configured to perform the sending operation in the above method embodiment.
  • the receiving unit is configured to perform the receiving operation in the above method embodiment.
  • the communication device 2000 also includes a storage unit, which can be used to store instructions and/or data, and the processing unit 2020 can read the instructions and/or data in the storage unit so that the device implements the relevant actions performed by the terminal device or network device in the aforementioned various method embodiments.
  • a storage unit which can be used to store instructions and/or data
  • the processing unit 2020 can read the instructions and/or data in the storage unit so that the device implements the relevant actions performed by the terminal device or network device in the aforementioned various method embodiments.
  • the communication device 2000 is used to perform the actions performed by the terminal device in any of the embodiments shown in Figures 5 to 8 above.
  • the transceiver unit 2010 is used to send first information to the terminal device, the first information includes at least one third network device; the transceiver unit 2010 is also used to send second information to the core network device, the second information includes first context information of the terminal device, the first context information of the terminal device includes identification information of the terminal device, wherein the first network device and the at least one third network device are non-terrestrial network devices, and when the first network device has an unused next hop NH, the first context information of the terminal device also includes: a key and a next hop chain calculation NCC, and the key is determined by the first network device according to the NH, or, when the first network device does not have an unused NH, the first context information of the terminal device also includes: second indication information, and the second indication information is used to instruct the core network device to determine the NH and NCC.
  • the transceiver unit 2010 is further configured to execute the receiving and sending processing of the first network device in the embodiments shown in FIG. 6 to FIG. 8 .
  • the communication device 2000 may further include a processing unit 2020, which is configured to execute other processing except receiving and sending by the first network device in the embodiments shown in FIG. 6 to FIG. 8 .
  • a processing unit 2020 which is configured to execute other processing except receiving and sending by the first network device in the embodiments shown in FIG. 6 to FIG. 8 .
  • the communication device 2000 is used to perform the actions performed by the core network device in any of the embodiments shown in Figures 5 to 8 above.
  • the transceiver unit 2010 is also used to perform the receiving and sending processing of the core network device in the embodiments shown in Figures 6 to 8 above.
  • the communication device 2000 may further include a processing unit 2020, which is used to perform other processing of the core network device in the embodiments shown in Figures 6 to 8 except for receiving and sending.
  • a processing unit 2020 which is used to perform other processing of the core network device in the embodiments shown in Figures 6 to 8 except for receiving and sending.
  • the transceiver unit 2010 is used to receive second context information of a terminal device from a core network device; the transceiver unit 2010 is used to receive first request information from the terminal device, the first request information is used to request access to the second network device, the first request information includes identification information of the terminal device, wherein the second network device is a non-ground network device.
  • the transceiver unit 2010 is further configured to execute the receiving and sending processing of the second network device in the embodiments shown in FIG. 6 to FIG. 8 .
  • the communication device 2000 may further include a processing unit 2020, which is configured to execute other processing except receiving and sending by the second network device in the embodiments shown in FIG. 6 to FIG. 8 .
  • a processing unit 2020 which is configured to execute other processing except receiving and sending by the second network device in the embodiments shown in FIG. 6 to FIG. 8 .
  • the device 2000 herein is embodied in the form of a functional unit.
  • the term "unit” herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (e.g., a shared processor, a dedicated processor, or a group processor, etc.) and memory for executing one or more software or firmware programs, a combined logic circuit, and/or other suitable components that support the described functions.
  • ASIC application specific integrated circuit
  • the device 2000 may be specifically the communication device in the above-mentioned embodiment, and may be used to execute the various processes and/or steps corresponding to the communication device in the above-mentioned method embodiments. To avoid repetition, they will not be described here.
  • the apparatus 2000 of each of the above-mentioned solutions has the function of implementing the corresponding steps performed by the communication device (such as a terminal device or a network device) in the above-mentioned method.
  • the functions can be implemented by hardware, or the corresponding software can be implemented by hardware.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions; for example, the transceiver unit can be replaced by a transceiver (for example, the sending unit in the transceiver unit can be replaced by a transmitter, and the receiving unit in the transceiver unit can be replaced by a receiver), and other units, such as the processing unit, can be replaced by a processor to respectively perform the sending and receiving operations and related processing operations in each method embodiment.
  • transceiver unit 2020 can also be a transceiver circuit (for example, it can include a sending circuit, or can also include a receiving circuit), and the processing unit 2020 can be a processing circuit.
  • the device in FIG9 can be the communication device (such as a terminal device or network device) in the aforementioned embodiments, or it can be a chip or chip system, such as a system on a chip (SoC).
  • the transceiver unit can be an input/output circuit or a communication interface; the processing unit can be a processor, microprocessor, or integrated circuit integrated on the chip. This is not limited here.
  • FIG10 is a schematic diagram of another communication device 2100 provided in an embodiment of the present application.
  • the device 2100 includes a processor 2110, which is coupled to a memory 2120.
  • the memory 2120 is configured to store computer programs or instructions and/or data.
  • the processor 2110 is configured to execute the computer programs or instructions stored in the memory 2120, or read data stored in the memory 2120, to perform the methods described in the above method embodiments.
  • processors 2110 there are one or more processors 2110 .
  • the memory 2120 is one or more.
  • the memory 2120 is integrated with the processor 2110 or provided separately.
  • the apparatus 2100 further includes a transceiver 2130, which is configured to receive and/or transmit signals.
  • the processor 2110 is configured to control the transceiver 2130 to receive and/or transmit signals.
  • the device 2100 is used to implement the operations performed by a communication device (such as a terminal device or a network device) in the above various method embodiments.
  • a communication device such as a terminal device or a network device
  • the processor 2110 is configured to execute computer programs or instructions stored in the memory 2120 to implement relevant operations of the communication device in the above various method embodiments.
  • the transceiver 2130 may include a transmitter, a receiver, a radio frequency circuit, an antenna, and input and output devices.
  • the processor 2110 is mainly used to process communication protocols and communication data, as well as to control the terminal device, execute software programs, process software program data, etc.
  • the memory 2120 is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used to convert baseband signals into radio frequency signals and process radio frequency signals.
  • the antenna is mainly used to transmit and receive radio frequency signals in the form of electromagnetic waves.
  • the input and output devices (for example, a touch screen, a display screen, a keyboard, etc.) are mainly used to receive data input by the user and output data to the user. It should be noted that some types of terminal devices may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be transmitted and outputs the baseband signal to the RF circuit.
  • the RF circuit then performs RF processing on the baseband signal and transmits it via the antenna in the form of electromagnetic waves.
  • the RF circuit receives the RF signal via the antenna, converts it into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes it.
  • the processor 2110 when the apparatus 2100 is a network device, such as a base station, the processor 2110 is primarily used for baseband processing, controlling the base station, etc.; the processor 2110 is typically the control center of the base station, used to control the base station to perform the processing operations on the network device side in the above-mentioned method embodiment.
  • the memory 2120 is primarily used to store computer program code and data.
  • the transceiver 2130 is primarily used for transmitting and receiving radio frequency signals and converting radio frequency signals into baseband signals; the transceiver 2130 may include an antenna and a radio frequency circuit (not shown in the figure), wherein the radio frequency circuit is primarily used for radio frequency processing.
  • the antenna and radio frequency circuit with transceiver functions can be regarded as the transceiver module of the terminal device or network device
  • the processor with processing function can be regarded as the processing module of the terminal device or network device.
  • the processor 2110 may also be referred to as a processing unit, a processing board, a processing module, a processing device, etc.
  • the transceiver 2130 may also be referred to as a transceiver unit, a transceiver, a transceiver device, etc.
  • the chip When the device 2100 is a chip, the chip includes a processor, memory, and a transceiver.
  • the transceiver can be an input/output circuit or a communication interface;
  • the processor can be a processing module, microprocessor, or integrated circuit integrated on the chip.
  • the sending operation of the terminal device in the above method embodiment can be understood as the chip's output, and the receiving operation of the terminal device in the above method embodiment can be understood as the chip's input.
  • processors mentioned in the embodiments of the present application may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA), or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or any conventional processor, etc.
  • the memory mentioned in the embodiments of the present application can be a volatile memory and/or a non-volatile memory.
  • the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory can be a random access memory (RAM).
  • RAM can be used as an external cache.
  • RAM includes the following forms: static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronized DRAM (SLDRAM), and direct rambus RAM (DR RAM).
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM synchronized DRAM
  • DR RAM direct rambus RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) can be integrated into the processor.
  • memory described herein is intended to include, but is not limited to, these and any other suitable types of memory.
  • FIG11 is a schematic diagram of a chip system 2200 provided in accordance with an embodiment of the present application.
  • the chip system 2200 (or processing system) includes a logic circuit 2210 and an input/output interface 2220.
  • Logic circuit 2210 may be a processing circuit within chip system 2200.
  • Logic circuit 2210 may be coupled to a storage unit and invoke instructions within the storage unit, enabling chip system 2200 to implement the methods and functions of various embodiments of the present application.
  • Input/output interface 2220 may be an input/output circuit within chip system 2200, outputting information processed by chip system 2200 or inputting data or signaling information to be processed into chip system 2200 for processing.
  • the chip system 2200 is used to implement the operations performed by a communication device (such as a terminal device or a network device) in the above various method embodiments.
  • a communication device such as a terminal device or a network device
  • the logic circuit 2210 is used to implement the processing-related operations performed by the communication device (such as a terminal device or a network device) in the above method embodiments;
  • the input/output interface 2220 is used to implement the sending and/or receiving-related operations performed by the communication device (such as a terminal device or a network device) in the above method embodiments.
  • An embodiment of the present application further provides a computer-readable storage medium on which computer instructions are stored for implementing the methods executed by a communication device (such as a terminal device or a network device) in the above-mentioned method embodiments.
  • a communication device such as a terminal device or a network device
  • the computer program when executed by a computer, the computer can implement the methods performed by the communication device (such as terminal equipment) in each embodiment of the above method.
  • the communication device such as terminal equipment
  • An embodiment of the present application further provides a computer program product comprising instructions, which, when executed by a computer, implement the methods performed by a communication device (such as a terminal device or a network device) in the above-mentioned method embodiments.
  • a communication device such as a terminal device or a network device
  • any embodiment or design described in this application as “exemplary” or “for example” should not be interpreted as being more preferred or more advantageous than other embodiments or designs.
  • the use of words such as “exemplary” or “for example” is intended to present the relevant concepts in a concrete manner to facilitate understanding.
  • Storage or “storage” as used in this application may refer to storage in one or more memories.
  • the one or more memories may be provided separately or integrated into an encoder or decoder, a processor, or a communication device.
  • the one or more memories may also have some provided separately and some integrated into a decoder, processor, or communication device.
  • the type of memory may be any form of storage medium and is not limited thereto.
  • the “protocol” referred to in this application may refer to a standard protocol in the field of communications, for example, it may include the fourth generation (4G) network, the fifth generation (5G) network protocol, the new radio (NR) protocol, the 5.5G network protocol, the sixth generation (6G) network protocol and related protocols used in future communication systems, and this application does not limit this.
  • 4G fourth generation
  • 5G fifth generation
  • NR new radio
  • 6G sixth generation
  • A/B can mean A or B.
  • “And/or” in this application is only a description of the association relationship between the associated objects, indicating that there can be three relationships.
  • a and/or B can mean: A exists alone, A and B exist at the same time, and B exists alone.
  • a and B can be singular or plural.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are merely schematic.
  • the division of the units is merely a logical function division.
  • Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be an indirect coupling or communication connection through some interfaces, devices or units, which can be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separate, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed across multiple network units. Some or all of these units may be selected to achieve the purpose of this embodiment according to actual needs.
  • the functional units in the various embodiments of the present application may be integrated into a single processing unit, or each unit may exist physically separately, or two or more units may be integrated into a single unit.
  • the aforementioned integrated units may be implemented in the form of hardware or software functional units.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
  • the part that essentially contributes to the technical solution of the present application or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including a number of instructions for enabling a computer device (which can be a personal computer, server, or network device, etc.) to execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage medium includes: various media that can store program codes, such as a USB flash drive, a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A communication method and a communication apparatus, which can be applied to the technical field of satellite communications. The method comprises: when a terminal device leaves the coverage range of a first network device that provides a service for the terminal device, the terminal device changes from a connected state to a first state. When the terminal device is within the coverage range of a second network device, the terminal device sends to the second network device a first request message for requesting to access the second network device. The first state comprises any one of a suspended connected state of an access stratum of the terminal device, a suspended idle state, or an inactive state. Hence, when the terminal device leaves the coverage range of the first network device, the terminal device enters the first state, and the terminal device can still retain context information of the terminal device in the first state, so that the terminal device can correctly access the second network device and normal communication between the terminal device and a network is ensured.

Description

通信方法和通信装置Communication method and communication device

本申请要求在2024年03月27日提交中国国家知识产权局、申请号为202410365453.8、发明名称为“通信方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the State Intellectual Property Office of China on March 27, 2024, with application number 202410365453.8 and invention name “Communication Method and Communication Device”, the entire contents of which are incorporated by reference into this application.

技术领域Technical Field

本申请涉及通信技术领域,更具体地,涉及一种通信方法和通信装置。The present application relates to the field of communication technology, and more specifically, to a communication method and a communication device.

背景技术Background Art

随着通信技术的发展,第五代移动网络(5th-Generation,5G)引入了卫星通信,卫星通信可以为地面网络难以覆盖的区域,如海洋、森林等提供通信服务,增强5G通信的可靠性。由于卫星的移动性,卫星的覆盖范围会随时间的变化而变化。例如,由于卫星的移动性,在某一时间段内,终端设备离开为终端设备提供服务卫星的覆盖范围内,即该卫星在该时间段内无法为该终端设备提供服务,此时终端设备需要连接到新的卫星,保证终端设备与网络之间的正常通信。With the development of communication technology, the fifth-generation mobile network (5G) has introduced satellite communications. Satellite communications can provide communication services to areas that are difficult for terrestrial networks to cover, such as oceans and forests, and enhance the reliability of 5G communications. Due to the mobility of satellites, their coverage range varies over time. For example, due to satellite mobility, within a certain period of time, a terminal device may leave the coverage area of the satellite providing service to the terminal device. This means that the satellite cannot provide service to the terminal device during that period of time. At this time, the terminal device needs to connect to a new satellite to ensure normal communication between the terminal device and the network.

考虑到终端设备与卫星之间信息传输的安全性,往往卫星与终端设备之间传输的信息进行了加密处理。目前研究的场景中,卫星对终端设备是非连续性地覆盖,卫星对地面信关站是连续性覆盖,即卫星可以实时通过地面信关站连接至核心网设备获取终端设备的相关信息,从而保证卫星与终端设备之间密钥的一致性,确保卫星与终端设备之间的正常通信。但在存储和转发(store and forward,简称S&F)的场景中,卫星相对于地面信关站和终端设备均为非连续性的覆盖,卫星不能同时覆盖地面信关站和终端设备,而终端设备每次新接入卫星时,终端设备均会重新推演密钥,导致卫星与终端设备之间无法对齐传输密钥,无法进行正常通信。因此,在S&F场景中,如何保证终端设备与网络之间的正常通信是目前的研究热点。Considering the security of information transmission between terminal devices and satellites, the information transmitted between the two devices is often encrypted. In the scenarios currently under study, satellites provide discontinuous coverage of terminal devices, while providing continuous coverage of ground gateways. This means that satellites can connect to core network devices in real time through ground gateways to obtain relevant information about terminal devices, thereby ensuring key consistency between the satellite and terminal devices and ensuring normal communication between the satellite and terminal devices. However, in store and forward (S&F) scenarios, satellites provide discontinuous coverage relative to both ground gateways and terminal devices. Satellites cannot cover both ground gateways and terminal devices simultaneously. Each time a terminal device connects to a satellite, it re-derives the key, resulting in the inability to align the transmission key between the satellite and terminal device, making normal communication impossible. Therefore, in S&F scenarios, how to ensure normal communication between terminal devices and the network is a current research hotspot.

发明内容Summary of the Invention

本申请提供一种通信方法和通信装置,能够在S&F场景中保证终端设备与网络之间的正常通信。The present application provides a communication method and a communication device that can ensure normal communication between a terminal device and a network in an S&F scenario.

第一方面,提供了一种通信方法的方法,该方法可以由终端设备执行,或者,也可以由终端设备的组成部件(例如芯片或者电路)执行,本申请对此不作限定。下面以终端设备为例进行介绍。In a first aspect, a communication method is provided, which can be executed by a terminal device, or can also be executed by a component of the terminal device (such as a chip or circuit), which is not limited in this application. The following is an introduction using a terminal device as an example.

该方法包括:在终端设备离开为所述终端设备提供服务的第一网络设备的覆盖范围时,终端设备从连接态变更为第一状态,所述第一状态包括以下任一项:所述终端设备的接入层AS挂起的连接态,挂起的空闲态,或者非激活态;终端设备向第二网络设备发送第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述第一请求信息包括所述终端设备的标识信息,其中,所述第一网络设备和所述第二网络设备为非地面网络设备。The method includes: when a terminal device leaves the coverage of a first network device that provides services for the terminal device, the terminal device changes from a connected state to a first state, wherein the first state includes any one of the following: a connected state suspended by the access layer AS of the terminal device, a suspended idle state, or an inactive state; the terminal device sends a first request message to a second network device, wherein the first request message is used to request access to the second network device, and the first request message includes identification information of the terminal device, wherein the first network device and the second network device are non-terrestrial network devices.

应理解,该第一网络设备和第二网络设备为相同或不同的网络设备。It should be understood that the first network device and the second network device are the same or different network devices.

[根据细则91更正 12.03.2025]
应理解,终端设备的接入层AS挂起的连接态是一种特殊的连接态,在该终端设备的接入层(access stratum,AS)挂起的连接态下,终端设备仍然保留终端设备的上下文信息。该终端设备的接入层AS挂起的连接态可以理解为,终端设备仍然停留在连接态且终端设备停止AS层的处理操作。例如,终端设备停止检测无线链路故障(radio link failure,RLF),停止测量,停止监测Paging等等。
[Corrected 12.03.2025 in accordance with Article 91]
It should be understood that the access stratum (AS) suspended connection state of a terminal device is a special connection state in which the terminal device still retains its context information. The access stratum (AS) suspended connection state of the terminal device can be understood as the terminal device remaining in the connected state and ceasing AS-layer processing operations. For example, the terminal device stops detecting radio link failures (RLFs), stops measuring, stops monitoring paging, and so on.

应理解,挂起的空闲态(IDLE with suspended)是一种特殊的空闲态,在挂起的空闲态下终端设备保留终端设备的上下文信息,不会释放终端设备的上下文信息。It should be understood that the idle state (IDLE with suspended) is a special idle state. In the idle state, the terminal device retains the context information of the terminal device and does not release the context information of the terminal device.

应理解,第一网络设备和第二网络设备为非地面网络设备,该第一网络设备和第二网络设备可以是卫星,或者无人机等等,对此本申请不做限定。It should be understood that the first network device and the second network device are non-terrestrial network devices. The first network device and the second network device can be satellites, drones, etc., and this application does not limit this.

应理解,终端设备向第二网络设备发送第一请求信息的前提是该终端设备位于第二网络设备的覆盖范围内,或者说,第二网络设备移动到了能够覆盖所述终端设备的区域。It should be understood that the premise for the terminal device to send the first request information to the second network device is that the terminal device is located within the coverage of the second network device, or in other words, the second network device has moved to an area that can cover the terminal device.

根据本申请提供的方法,终端设备离开第一网络设备的覆盖范围时,即为终端设备提供服务的源网络设备(例如第一网络设备)不再为终端设备提供服务时,该终端设备从连接态变更为第一状态,终端设备在第一状态保留了终端设备的上下文信息,便于正确的接入新的为终端设备(例如第二网络设备)提供服务的目标网络设备,保证终端设备与网络之间的正常通信。According to the method provided in the present application, when the terminal device leaves the coverage of the first network device, that is, when the source network device that provides services to the terminal device (such as the first network device) no longer provides services to the terminal device, the terminal device changes from the connected state to the first state. The terminal device retains the context information of the terminal device in the first state, which facilitates correct access to the new target network device that provides services to the terminal device (such as the second network device), thereby ensuring normal communication between the terminal device and the network.

结合第一方面,在一些可能实现的方式中,终端设备接收来自第一网络设备的第一信息,第一信息包括至少一个第三网络设备,至少一个第三网络设备包括第二网络设备和/或第一网络设备,至少一个第三网络设备中的每个第三网络设备为非地面网络设备。In combination with the first aspect, in some possible implementations, the terminal device receives first information from a first network device, the first information includes at least one third network device, the at least one third network device includes a second network device and/or a first network device, and each of the at least one third network device is a non-terrestrial network device.

应理解,第一网络设备通过第一信息指示至少一个第三网络设备给终端设备。该至少一个第三网络设备可以理解为后续为终端设备提供服务的网络设备,或者,该至少一个第三网络设备还可以理解为后续终端设备可以接入的(或允许终端设备接入的)潜在网络设备。It should be understood that the first network device indicates at least one third network device to the terminal device through the first information. The at least one third network device can be understood as a network device that subsequently provides services to the terminal device, or the at least one third network device can also be understood as a potential network device that the terminal device can subsequently access (or that the terminal device is allowed to access).

还应理解,在第一信息包括的至少一个第三网络设备为第一网络设备的情况下,上述终端设备向第二网络设备发送第一请求信息,该第二网络设备与第一网络设备为同一网络设备。该终端设备根据第一信息,请求接入第一网络设备。It should also be understood that, when the at least one third network device included in the first information is the first network device, the terminal device sends the first request information to the second network device, which is the same network device as the first network device. The terminal device requests access to the first network device based on the first information.

还应理解,该第一信息包括的至少一个第三网络设备包括第一网络设备和第二网络设备的情况下,上述终端设备向第二网络设备发送第一请求信息,该第二网络设备与第一网络设备为不同的网络设备,该终端设备在第一网络设备和第二网络设备中选择第二网络设备请求接入。It should also be understood that when the at least one third network device included in the first information includes a first network device and a second network device, the above-mentioned terminal device sends a first request information to the second network device, the second network device and the first network device are different network devices, and the terminal device selects the second network device from the first network device and the second network device to request access.

结合第一方面,在一些可能实现的方式中,在终端设备向第二网络设备发送第一请求信息之前,该方法还包括:终端设备接收来自第一网络设备的第一指示信息,第一指示信息用于指示在终端设备离开第一网络设备的覆盖范围又重新进入第一网络设备的覆盖范围时,终端设备接入第一网络设备,其中,第一网络设备与第二网络设备为同一网络设备(或者称为第一网络设备与第二网络设备相同)。In combination with the first aspect, in some possible implementation methods, before the terminal device sends the first request information to the second network device, the method also includes: the terminal device receives first indication information from the first network device, the first indication information being used to indicate that when the terminal device leaves the coverage of the first network device and re-enters the coverage of the first network device, the terminal device accesses the first network device, wherein the first network device and the second network device are the same network device (or the first network device and the second network device are called the same).

在一种可能实现的方式中,该第一指示信息用于指示该终端设备接入第一网络设备,禁止接入除第一网络设备之外的网络设备。In one possible implementation, the first indication information is used to instruct the terminal device to access a first network device and prohibit access to network devices other than the first network device.

应理解,在终端设备离开第一网络设备的覆盖范围的情况下,终端设备根据第一指示信息,终端设备需要等到重新进入第一网络设备的覆盖范围之内,该终端设备接入第一网络设备。终端设备不能接入除第一网络设备之外的其他网络设备。It should be understood that when the terminal device leaves the coverage of the first network device, the terminal device needs to wait until it re-enters the coverage of the first network device according to the first indication information before accessing the first network device. The terminal device cannot access other network devices except the first network device.

结合第一方面,在一些可能实现的方式中,终端设备向第二网络设备发送第一请求信息,包括:终端设备接收来自至少一个第三网络设备的用于指示至少一个第三网络设备中每个第三网络设备的可用区域的指示信息;终端设备根据第一信息和用于指示至少一个第三网络设备中每个第三网络设备的可用区域的指示信息,确定向第二网络设备发送第一请求信息。In combination with the first aspect, in some possible implementations, the terminal device sends first request information to the second network device, including: the terminal device receives indication information from at least one third network device for indicating the available area of each third network device in the at least one third network device; the terminal device determines to send the first request information to the second network device based on the first information and the indication information for indicating the available area of each third network device in the at least one third network device.

结合第一方面,在一些可能实现的方式中,所述第一信息还包括用于指示所述至少一个第三网络设备中每个第三网络设备的可用区域的指示信息,终端设备向所述第二网络设备发送所述第一请求信息,包括:终端设备根据所述第一信息,确定向所述第二网络设备发送第一请求信息。In combination with the first aspect, in some possible implementation methods, the first information also includes indication information for indicating the available area of each third network device in the at least one third network device, and the terminal device sends the first request information to the second network device, including: the terminal device determines to send the first request information to the second network device based on the first information.

应理解,在至少一个第三网络设备包括第一网络设备的情况下,该第一信息包括用于指示该第一网络设备的可用区域的指示信息。It should be understood that, in a case where the at least one third network device includes a first network device, the first information includes indication information for indicating an available area of the first network device.

上述技术方案,终端设备通过该至少一个第三网络设备中每个第三网络设备的可用区域,选择至少一个第三网络设备中的第二网络设备接入,使得终端设备能够合理的选择新的网络设备准备接入,保证终端设备的通信质量。In the above technical solution, the terminal device selects the second network device among at least one third network device for access through the available area of each third network device among the at least one third network device, so that the terminal device can reasonably select a new network device to prepare for access, thereby ensuring the communication quality of the terminal device.

结合第一方面,在一些可能实现的方式中,至少一个第三网络设备包括第一网络设备,该第一信息还包括用于指示第一网络设备的可用区域的指示信息,根据第一信息,确定向第二网络设备发送第一请求信息,包括:在终端设备不位于第一网络设备的可用于区域内时,确定向第二网络设备发送第一请求信息。In combination with the first aspect, in some possible implementations, at least one third network device includes a first network device, and the first information also includes indication information for indicating an available area of the first network device. Based on the first information, determining to send first request information to the second network device includes: when the terminal device is not located within the available area of the first network device, determining to send the first request information to the second network device.

应理解,该第一信息包括的至少一个第三网络设备中包括第一网络设备,以及第一网络设备的可用区域的指示信息。其中,终端设备不位于该第一网络设备的可用区域时,该终端设备可以向其他网络设备(例如第二网络设备)发送第一请求信息。该终端设备位于该第二网络设备的覆盖区域内,该第二网络设备可以是至少一个第三网络设备中的网络设备,或者,第二网络设备不是该至少一个第三网络设备中的网络设备,对此本申请不做限定。It should be understood that the at least one third network device included in the first information includes the first network device and indication information of the available area of the first network device. When the terminal device is not located in the available area of the first network device, the terminal device can send the first request information to other network devices (such as the second network device). The terminal device is located within the coverage area of the second network device, and the second network device can be a network device in the at least one third network device, or the second network device is not a network device in the at least one third network device. This application does not limit this.

结合第一方面,在一些可能实现的方式中,终端设备向所述第二网络设备发送所述第一请求信息,包括:在满足第一条件的情况下,向所述第二网络设备发送所述第一请求信息,所述第一条件包括:所述第二网络设备是所述至少一个第三网络设备中时延最小的网络设备,和/或,所述第二网络设备具有所述终端设备的上下文信息。In combination with the first aspect, in some possible implementation methods, the terminal device sends the first request information to the second network device, including: sending the first request information to the second network device when a first condition is met, the first condition including: the second network device is the network device with the smallest delay among the at least one third network device, and/or the second network device has the context information of the terminal device.

上述技术方案,终端设备通过第一条件,从该至少一个第三网络设备中选择满足第一条件的网络设备(例如第二网络设备)接入,使终端设备能够合理的选择新的网络设备准备接入,保证终端设备的通信质量。In the above technical solution, the terminal device selects a network device (such as a second network device) that meets the first condition from at least one third network device through the first condition to access, so that the terminal device can reasonably select a new network device to prepare for access, thereby ensuring the communication quality of the terminal device.

结合第一方面,在一些可能实现的方式中,第一信息还包括以下一项或者多项:至少一个第三网络设备中每个第三网络设备的星历信息,至少一个第三网络设备中每个第三网络设备连接至信关站的位置信息,至少一个第三网络设备中每个第三网络设备连接至信关站的时间信息,或者,至少一个第三网络设备中每个第三网络设备是否具有终端设备的上下文信息。In combination with the first aspect, in some possible implementations, the first information also includes one or more of the following: ephemeris information of each third network device in at least one third network device, location information of each third network device in at least one third network device connected to the gateway, time information of each third network device in at least one third network device connected to the gateway, or whether each third network device in at least one third network device has context information of the terminal device.

结合第一方面,在一些可能实现的方式中,终端设备的标识信息包括:终端设备在第一小区内的小区无线网络临时标识(cell radio network temporary identifier,C-RNTI),第一小区为第一网络设备覆盖范围内为终端设备提供服务的小区;终端设备的标识信息还包括以下一项或者多项:第一小区的物理小区标识(physical cell ID,PCI),终端设备的位置信息,第一网络设备的标识信息,或者,第一小区的标识信息。In combination with the first aspect, in some possible implementation methods, the identification information of the terminal device includes: a cell radio network temporary identifier (C-RNTI) of the terminal device in a first cell, where the first cell is a cell that provides services to the terminal device within the coverage of the first network device; the identification information of the terminal device also includes one or more of the following: a physical cell ID (PCI) of the first cell, location information of the terminal device, identification information of the first network device, or identification information of the first cell.

结合第一方面,在一些可能实现的方式中,该方法还包括:终端设备接收来自第二网络设备的第一应答信息,第一应答信息用于响应第一请求信息,第一应答信息包括下一跳链计算(next hop chaining count,NCC);终端设备根据密钥与第二网络设备进行通信,密钥是根据NCC确定的。In combination with the first aspect, in some possible implementations, the method also includes: the terminal device receives a first response message from the second network device, the first response message is used to respond to the first request message, and the first response message includes a next hop chaining count (NCC); the terminal device communicates with the second network device according to a key, and the key is determined according to the NCC.

上述技术方案,终端设备根据第一应答信息中的NCC确定密钥,并通过该密钥与第二网络设备之间进行加密通信,从而保证终端设备与第二网络设备之间的安全通信。In the above technical solution, the terminal device determines the key according to the NCC in the first response information, and performs encrypted communication with the second network device through the key, thereby ensuring secure communication between the terminal device and the second network device.

结合第一方面,在一些可能实现的方式中,在终端设备向第二网络设备发送第一请求信息之前,方法还包括:终端设备向至少一个第三网络设备中除第二网络设备之外的其他网络设备发送第一请求信息;在终端设备接入至少一个第三网络设备中除第二网络设备之外的其他网络失败的情况下,终端设备向第二网络设备发送第一请求信息。In combination with the first aspect, in some possible implementation methods, before the terminal device sends the first request information to the second network device, the method also includes: the terminal device sends the first request information to other network devices in at least one third network device except the second network device; in the event that the terminal device fails to access other networks in at least one third network device except the second network device, the terminal device sends the first request information to the second network device.

上述技术方案,在终端设备接入的至少一个第三网络设备中的任一个网络设备失败的情况下,该终端设备仍然留在第一状态,保留终端设备的上下文。终端设备进一步地在第一信息中的至少一个第三网络设备中除该网络设备之外的其他网络设备发送用于请求接入的第一请求信息,从而保证终端设备能够选择到一个网络设备成功接入,保证终端设备与网络之间的正常通信。In the above technical solution, if any of the at least one third network devices that the terminal device attempts to access fails, the terminal device remains in the first state, preserving the terminal device's context. The terminal device further sends a first request message for access to the other network devices in the at least one third network device in the first message, excluding the third network device, thereby ensuring that the terminal device successfully selects a network device for access and maintaining normal communication between the terminal device and the network.

第二方面,提供了一种通信方法的方法,该方法可以由第一网络设备执行,或者,也可以由第一网络设备的组成部件(例如芯片或者电路)执行,本申请对此不作限定。下面以第一网络设备为例进行介绍。In a second aspect, a communication method is provided, which can be executed by a first network device, or can also be executed by a component (such as a chip or circuit) of the first network device, which is not limited in this application. The following is an introduction using the first network device as an example.

该方法包括:第一网络设备向终端设备发送第一指示信息,第一指示信息用于指示在终端设备离开第一网络设备的覆盖范围又重新进入第一网络设备的覆盖范围时,终端设备接入第一网络设备;第一网络设备接收来自终端设备的第一请求信息,第一请求信息用于请求接入第一网络设备,其中,第一网络设备为非地面网络设备。The method includes: a first network device sends first indication information to a terminal device, the first indication information is used to indicate that the terminal device accesses the first network device when the terminal device leaves the coverage of the first network device and re-enters the coverage of the first network device; the first network device receives first request information from the terminal device, the first request information is used to request access to the first network device, wherein the first network device is a non-terrestrial network device.

根据本申请提供的方法,第一网络设备通过第一指示信息指示终端设备:在终端设备离开第一网络设备的覆盖范围的情况下,终端设备需要等到重新进入第一网络设备的覆盖范围之内,该终端设备接入第一网络设备。According to the method provided in the present application, the first network device instructs the terminal device through the first indication information: when the terminal device leaves the coverage of the first network device, the terminal device needs to wait until it re-enters the coverage of the first network device, and the terminal device accesses the first network device.

第三方面,提供了一种通信方法,该方法可以由第一网络设备执行,或者,也可以由第一网络设备的组成部件(例如芯片或者电路)执行,本申请对此不作限定。下面以第一网络设备为例进行介绍。In a third aspect, a communication method is provided, which can be executed by a first network device, or by a component (such as a chip or circuit) of the first network device, which is not limited in this application. The following is an introduction using the first network device as an example.

该方法包括:第一网络设备向终端设备发送第一信息,第一信息包括至少一个第三网络设备,以及所述至少一个第三网络设备中每个第三网络设备的可用区域的指示信息,所述至少一个第三网络设备包括第二网络设备和/或所述第一网络设备,所述至少一个第三网络设备中的每个第三网络设备为非地面网络设备。The method includes: a first network device sends first information to a terminal device, the first information includes at least one third network device and indication information of an available area of each of the at least one third network device, the at least one third network device includes a second network device and/or the first network device, and each of the at least one third network device is a non-terrestrial network device.

第四方面,提供一种通信方法,该方法可以由第一网络设备执行,或者,也可以由第一网络设备的组成部件(例如芯片或者电路)执行,本申请对此不作限定。下面以第一网络设备为例进行介绍。In a fourth aspect, a communication method is provided, which can be executed by a first network device, or can also be executed by a component (such as a chip or circuit) of the first network device, which is not limited in this application. The following is an introduction using the first network device as an example.

该方法包括:第一网络设备向终端设备发送第一信息,第一信息包括至少一个第三网络设备,所述至少一个第三网络设备包括第一网络设备和第二网络设备,所述第一信息还包括用于指示所述第一网络设备的可用区域的指示信息,所述至少一个第三网络设备中的每个第三网络设备为非地面网络设备。The method includes: a first network device sends first information to a terminal device, the first information includes at least one third network device, the at least one third network device includes a first network device and a second network device, the first information also includes indication information for indicating an available area of the first network device, and each third network device in the at least one third network device is a non-terrestrial network device.

第五方面,提供了一种通信方法的方法,该方法可以由第一网络设备执行,或者,也可以由第一网络设备的组成部件(例如芯片或者电路)执行,本申请对此不作限定。下面以第一网络设备为例进行介绍。In a fifth aspect, a communication method is provided, which can be executed by a first network device, or can also be executed by a component (such as a chip or circuit) of the first network device, which is not limited in this application. The following is an introduction using the first network device as an example.

该方法包括:第一网络设备向终端设备发送第一信息,第一信息包括至少一个第三网络设备;第一网络设备向核心网设备发送第二信息,第二信息包括终端设备的第一上下文信息,终端设备的第一上下文信息包括终端设备的标识信息,其中,第一网络设备和至少一个第三网络设备为非地面网络设备,在第一网络设备具有未被使用过的下一跳(next hop,HH)的情况下,终端设备的第一上下文信息还包括:密钥和下一跳链计算NCC,密钥是第一网络设备根据NH确定的,或者,在第一网络设备不具有未被使用过的NH的情况下,终端设备的第一上下文信息还包括:第二指示信息,第二指示信息用于指示核心网设备确定NH和NCC。The method includes: a first network device sends first information to a terminal device, the first information includes at least one third network device; the first network device sends second information to a core network device, the second information includes first context information of the terminal device, the first context information of the terminal device includes identification information of the terminal device, wherein the first network device and the at least one third network device are non-terrestrial network devices, and when the first network device has an unused next hop (next hop, HH), the first context information of the terminal device also includes: a key and next hop chain calculation NCC, the key is determined by the first network device according to the NH, or, when the first network device does not have an unused NH, the first context information of the terminal device also includes: second indication information, the second indication information is used to instruct the core network device to determine the NH and the NCC.

其中,第一网络设备具有未被使用过的NH,可以理解为:该第一网络设备本地存储的信息中包括未被使用的NH;类似地,第一网络设备不具有未被使用过的NH,可以理解为:该第一网络设备本地存储的信息中不包括未被使用的NH。Among them, the first network device has an unused NH, which can be understood as: the information locally stored in the first network device includes the unused NH; similarly, the first network device does not have an unused NH, which can be understood as: the information locally stored in the first network device does not include the unused NH.

在一种可能的实现方式中,第二指示信息为一个显式的信元或消息,例如:第二指示信息指示第一网络设备不具有未被使用过的NH。In a possible implementation, the second indication information is an explicit information element or message, for example, the second indication information indicates that the first network device does not have an unused NH.

在另一种可能的实现方式中,第二指示信息为第一网络设备在第一上下文消息中不携带密钥和/或NCC,第二指示信息隐式的指示核心网设备确定NH和NCC。In another possible implementation, the second indication information indicates that the first network device does not carry the key and/or NCC in the first context message, and the second indication information implicitly instructs the core network device to determine the NH and NCC.

结合第五方面,在一些可能实现的方式中,在第一网络设备向核心网设备发送第二信息之前,该方法还包括:第一网络设备接收来自核心网设备的第二请求信息,第二请求信息请求获取终端设备的第一上下文信息,第二请求信息包括终端设备的标识信息。In combination with the fifth aspect, in some possible implementation methods, before the first network device sends the second information to the core network device, the method also includes: the first network device receives a second request information from the core network device, the second request information requests to obtain the first context information of the terminal device, and the second request information includes the identification information of the terminal device.

结合第五方面,在一些可能实现的方式中,终端设备的标识信息包括:终端设备在第一小区内的小区无线网络临时标识C-RNTI,第一小区为第一网络设备覆盖范围内为终端设备提供服务的小区;终端设备的标识信息还包括以下一项或者多项:第一小区的物理小区标识PCI,终端设备的位置信息,第一网络设备的标识信息,或者,第一小区的标识信息。In combination with the fifth aspect, in some possible implementation methods, the identification information of the terminal device includes: the cell radio network temporary identification C-RNTI of the terminal device in the first cell, the first cell is a cell that provides services to the terminal device within the coverage of the first network device; the identification information of the terminal device also includes one or more of the following: the physical cell identification PCI of the first cell, the location information of the terminal device, the identification information of the first network device, or the identification information of the first cell.

结合第五方面,在一些可能实现的方式中,第一信息还包括以下一项或者多项:至少一个第三网络设备中每个第三网络设备的星历信息,至少一个第三网络设备中每个第三网络设备连接至信关站的位置信息,至少一个第三网络设备中每个第三网络设备连接至信关站的时间信息,或者,至少一个第三网络设备中每个第三网络设备是否具有终端设备的上下文信息。In combination with the fifth aspect, in some possible implementations, the first information also includes one or more of the following: ephemeris information of each third network device in at least one third network device, location information of each third network device in at least one third network device connected to the gateway, time information of each third network device in at least one third network device connected to the gateway, or whether each third network device in at least one third network device has context information of the terminal device.

结合第五方面,在一些可能实现的方式中,第二信息还包括:至少一个第三网络设备中每个第三网络设备的标识信息。In combination with the fifth aspect, in some possible implementations, the second information further includes: identification information of each third network device in the at least one third network device.

第六方面,提供了一种通信方法的方法,该方法可以由核心网设备执行,或者,也可以由核心网设备的组成部件(例如芯片或者电路)执行,本申请对此不作限定。下面以核心网设备为例进行介绍。In a sixth aspect, a communication method is provided, which can be executed by a core network device, or can also be executed by a component of the core network device (such as a chip or circuit), which is not limited in this application. The following is an introduction using a core network device as an example.

该方法包括:核心网设备接收来自第一网络设备的第二信息,第二信息包括终端设备的第一上下文信息,终端设备的第一上下文信息包括终端设备的标识信息;核心网设备向至少一个第三网络设备发送终端设备的第二上下文信息,终端设备的第二上下文信息包括密钥和NCC,或者,终端设备的第二上下文信息包括NCC和下一跳NH,其中,第一网络设备和至少一个第三网络设备为非地面网络设备。The method includes: a core network device receives second information from a first network device, the second information includes first context information of a terminal device, and the first context information of the terminal device includes identification information of the terminal device; the core network device sends the second context information of the terminal device to at least one third network device, the second context information of the terminal device includes a key and an NCC, or the second context information of the terminal device includes an NCC and a next hop NH, wherein the first network device and the at least one third network device are non-terrestrial network devices.

应理解,该终端设备第二上下文信息包括的密钥是来自终端设备的第一上下文信息,该密钥是第一网络设备根据自身未使用的NH确定的。It should be understood that the key included in the second context information of the terminal device is from the first context information of the terminal device, and the key is determined by the first network device according to its own unused NH.

应理解,第六方面与上述第一方面至第五方面中部分实现方式相对应,技术效果以及相关介绍可以参见上述第一方面至第五方面中的详细介绍,此处不再赘述。It should be understood that the sixth aspect corresponds to some implementation methods of the above-mentioned first to fifth aspects. The technical effects and related introductions can be found in the detailed introductions of the above-mentioned first to fifth aspects, and will not be repeated here.

结合第六方面,在一些可能实现的方式中,在第一网络设备具有未被使用过的NH的情况下,终端设备的第一上下文信息还包括:密钥和NCC。In combination with the sixth aspect, in some possible implementations, when the first network device has an unused NH, the first context information of the terminal device further includes: a key and an NCC.

结合第六方面,在一些可能实现的方式中,在第一网络设备不具有未被使用过的NH的情况下,终端设备的第一上下文信息还包括:第二指示信息,第二指示信息用于指示核心网设备确定NH和NCC,或者,在终端设备的第一上下文信息不包括第二指示信息,密钥和NCC的情况下,核心网设备确定NH和NCC。In combination with the sixth aspect, in some possible implementation methods, when the first network device does not have an unused NH, the first context information of the terminal device also includes: second indication information, the second indication information is used to instruct the core network device to determine the NH and NCC, or, when the first context information of the terminal device does not include the second indication information, the key and the NCC, the core network device determines the NH and NCC.

结合第六方面,在一些可能实现的方式中,核心网设备向至少一个第三网络设备发送终端设备的第二上下文信息,包括:核心网设备接收来自至少一个第三网络设备中的第二网络设备的第三请求信息,第三请求信息请求获取终端设备的第二上下文信息,第三请求信息包括终端设备的标识信息;核心网设备向第二网络设备发送终端设备的第二上下文信息。In combination with the sixth aspect, in some possible implementation methods, the core network device sends the second context information of the terminal device to at least one third network device, including: the core network device receives a third request information from a second network device in at least one third network device, the third request information requests to obtain the second context information of the terminal device, and the third request information includes identification information of the terminal device; the core network device sends the second context information of the terminal device to the second network device.

结合第六方面,在一些可能实现的方式中,该方法还包括:核心网设备接收来自至少一个第三网络设备中的第二网络设备的第三指示信息,第三指示信息用于指示终端设备成功接入第二网络设备;核心网设备根据第三指示信息,向至少一个第三网络设备中除第二网络设备之外的其他网络设备发送释放指示信息,释放指示信息用于指示释放终端设备的第二上下文信息。In combination with the sixth aspect, in some possible implementation methods, the method also includes: the core network device receives third indication information from a second network device in at least one third network device, and the third indication information is used to indicate that the terminal device has successfully accessed the second network device; the core network device sends release indication information to other network devices in at least one third network device except the second network device based on the third indication information, and the release indication information is used to indicate the release of the second context information of the terminal device.

上述技术方案,在终端设备接入新的网络设备(例如第二网络设备)的情况下,该第二网络设备向核心网设备发送第三指示信息,用于指示终端设备成功接入第二网络设备,核心网设备向第一信息中的其他网络设备发送用于指示释放终端设备上下文信息的释放指示信息,从而节省其他网络设备的资源开销。In the above technical solution, when the terminal device accesses a new network device (for example, a second network device), the second network device sends a third indication message to the core network device to indicate that the terminal device has successfully accessed the second network device, and the core network device sends a release indication message to other network devices in the first information to indicate the release of the terminal device context information, thereby saving resource overhead of other network devices.

第七方面,提供了一种通信方法的方法,该方法可以由第二网络设备执行,或者,也可以由第二网络设备的组成部件(例如芯片或者电路)执行,本申请对此不作限定。下面以第二网络设备为例进行介绍。In a seventh aspect, a communication method is provided, which can be executed by a second network device, or can also be executed by a component (such as a chip or circuit) of the second network device, which is not limited in this application. The second network device is used as an example for description below.

该方法包括:第二网络设备接收来自核心网设备的终端设备的第二上下文信息;第二网络设备接收来自终端设备的第一请求信息,第一请求信息用于请求接入第二网络设备,第一请求信息包括终端设备的标识信息,其中,第二网络设备为非地面网络设备。The method includes: the second network device receives second context information of a terminal device from a core network device; the second network device receives first request information from the terminal device, the first request information is used to request access to the second network device, the first request information includes identification information of the terminal device, wherein the second network device is a non-terrestrial network device.

应理解,第七方面与上述第一方面至第六方面中部分实现方式相对应,技术效果以及相关介绍可以参见上述第一方面至第六方面中的详细介绍,此处不再赘述。It should be understood that the seventh aspect corresponds to some of the implementation methods of the above-mentioned first to sixth aspects. The technical effects and related introductions can be found in the detailed introductions of the above-mentioned first to sixth aspects, and will not be repeated here.

结合第七方面,在一些可能实现的方式中,第二网络设备根据终端设备的第二上下文信息和第一请求信息,向终端设备发送第一应答信息,第一应答信息包括NCC。In combination with the seventh aspect, in some possible implementations, the second network device sends first response information to the terminal device based on the second context information and the first request information of the terminal device, where the first response information includes the NCC.

结合第七方面,在一些可能实现的方式中,在第二网络设备接收来自核心网设备的终端设备的第二上下文信息之前,方法还包括:第二网络设备接收来自终端设备的第一请求信息;第二网络设备根据第一请求信息,向核心网设备发送第二请求信息,第二请求信息用于请求获取终端设备的第二上下文信息,第二请求信息包括终端设备的标识信息。In combination with the seventh aspect, in some possible implementation methods, before the second network device receives the second context information of the terminal device from the core network device, the method also includes: the second network device receives the first request information from the terminal device; the second network device sends the second request information to the core network device based on the first request information, and the second request information is used to request to obtain the second context information of the terminal device, and the second request information includes the identification information of the terminal device.

结合第七方面,在一些可能实现的方式中,终端设备的第二上下文信息中的NCC来自终端设备的第一上下文信息,或者,NCC是核心网设备确定的,其中,终端设备的第一上下文信息来自第一网络设备,第一网络设备是在第二网络设备接收来自终端设备的第一请求信息之前,为终端设备提供服务的网络设备,第一网络设备为非地面网络设备。In combination with the seventh aspect, in some possible implementation methods, the NCC in the second context information of the terminal device comes from the first context information of the terminal device, or the NCC is determined by the core network device, wherein the first context information of the terminal device comes from the first network device, and the first network device is a network device that provides services to the terminal device before the second network device receives the first request information from the terminal device, and the first network device is a non-terrestrial network device.

结合第七方面,在一些可能实现的方式中,在终端设备的第一上下文信息不包括NCC的情况下,终端设备的第一上下文信息包括第二指示信息,第二指示信息用于指示核心网设备为终端设备配置NCC和下一跳NH。In combination with the seventh aspect, in some possible implementation methods, when the first context information of the terminal device does not include NCC, the first context information of the terminal device includes second indication information, and the second indication information is used to instruct the core network device to configure NCC and next hop NH for the terminal device.

结合第七方面,在一些可能实现的方式中,在终端设备成功接入第二网络设备情况下,方法还包括:第二网络设备向核心网设备发送第三指示信息,第三指示信息用于指示终端设备成功接入第二网络设备,第三指示信息包括终端设备的标识信息。In combination with the seventh aspect, in some possible implementation methods, when the terminal device successfully accesses the second network device, the method also includes: the second network device sends a third indication information to the core network device, the third indication information is used to indicate that the terminal device has successfully accessed the second network device, and the third indication information includes identification information of the terminal device.

结合第七方面,在一些可能实现的方式中,方法还包括:第二网络设备发送用于指示第二网络设备的可用区域的指示信息。In combination with the seventh aspect, in some possible implementations, the method further includes: the second network device sends indication information for indicating the available area of the second network device.

结合第七方面,在一些可能实现的方式中,终端设备的标识信息包括:终端设备在第一小区内的小区无线网络临时标识C-RNTI,第一小区为第一网络设备覆盖范围内为终端设备提供服务的小区;终端设备的标识信息还包括以下一项或者多项:第一小区的物理小区标识PCI,终端设备的位置信息,第一网络设备的标识信息,或者,第一小区的标识信息。In combination with the seventh aspect, in some possible implementation methods, the identification information of the terminal device includes: the cell radio network temporary identification C-RNTI of the terminal device in the first cell, the first cell is a cell that provides services to the terminal device within the coverage of the first network device; the identification information of the terminal device also includes one or more of the following: the physical cell identification PCI of the first cell, the location information of the terminal device, the identification information of the first network device, or the identification information of the first cell.

结合第七方面,在一些可能实现的方式中,第一请求信息为无线资源控制(radio resource control,RRC)重建立请求信息或者RRC恢复连接请求信息;在第一请求信息为RRC重建立请求信息的情况下,第一请求信息包括RRC重建立原因;在第一请求信息为RRC恢复连接请求信息的情况下,第一请求信息包括RRC恢复连接原因。In combination with the seventh aspect, in some possible implementation methods, the first request information is radio resource control (RRC) re-establishment request information or RRC connection recovery request information; when the first request information is RRC re-establishment request information, the first request information includes the RRC re-establishment reason; when the first request information is RRC connection recovery request information, the first request information includes the RRC connection recovery reason.

结合第七方面,在一些可能实现的方式中,在第一请求信息包括RRC重建立原因的情况下,第一请求信息包括第一原因值,第一原因值为otherfailure;在第一请求信息包括RRC恢复连接原因的情况下,所述第一请求信息包括第二原因值,所述第二原因值为delayTolerantAccess-v1020。In combination with the seventh aspect, in some possible implementation methods, when the first request information includes the RRC re-establishment reason, the first request information includes a first cause value, and the first cause value is otherfailure; when the first request information includes the RRC connection recovery reason, the first request information includes a second cause value, and the second cause value is delayTolerantAccess-v1020.

第八方面,提供一种通信方法,该方法包括:第二网络设备发送第一消息,所述第一消息包括第一信元,所述第一信元用于指示是否允许第一类终端设备接入所述第二网络设备,所述第一类终端设备包括存储转发终端设备;所述第二网络设备接收来自终端设备的第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述终端设备为所述第一类终端设备,其中,该第二网络设备为非地面网络设备。In an eighth aspect, a communication method is provided, the method comprising: a second network device sends a first message, the first message comprising a first information element, the first information element being used to indicate whether a first type of terminal device is allowed to access the second network device, the first type of terminal device comprising a store-and-forward terminal device; the second network device receives a first request message from a terminal device, the first request message being used to request access to the second network device, the terminal device being the first type of terminal device, wherein the second network device is a non-terrestrial network device.

应理解,该方法以第二网络设备为执行主体进行示例性的介绍,当然,至少一个第三网络设备中的其他网络设备(例如第三网络设备)同样适用于本申请提供的方法。It should be understood that the method is exemplarily introduced with the second network device as the execution subject. Of course, other network devices in the at least one third network device (such as the third network device) are also applicable to the method provided in this application.

还应理解,该第一信元可以称为sfBarred信元。该第一消息可以是系统消息,例如,该第一消息可以为主系统信息块(master information block,MIB),或者系统信息块(system information block,SIB)等等,本申请不做限定。It should also be understood that the first information element may be referred to as an sfBarred information element. The first message may be a system message, for example, the first message may be a master information block (MIB) or a system information block (SIB), etc., which is not limited in this application.

还应理解,该第一类终端设备包括的存储转发终端设备,或者可以称为支持S&F功能的终端设备,或者可以称为具有接入S&F网络设备的能力的终端设备。It should also be understood that the first category of terminal devices includes store-and-forward terminal devices, or can be referred to as terminal devices supporting S&F functions, or can be referred to as terminal devices capable of accessing S&F network devices.

还应理解,第二网络设备是否工作在S&F模式是可以发生变化的。It should also be understood that whether the second network device operates in the S&F mode may vary.

在一种可能实现的方式中,第二网络设备在S&F模式下(或者称为第二网络设备工作在S&F模式时,或者称为第二网络设备为S&F网络设备),所述第一信元用于指示允许第一类终端设备接入所述第二网络设备。可见,第二网络设备通过第一消息中的第一信元指示支持S&F功能的终端设备接入,从而保证支持S&F功能的终端设备能够接入S&F网络设备。In one possible implementation, when the second network device is in S&F mode (or referred to as the second network device operating in S&F mode, or referred to as the second network device being an S&F network device), the first information element is used to indicate that a first-category terminal device is allowed to access the second network device. Thus, the second network device indicates access to a terminal device supporting the S&F function through the first information element in the first message, thereby ensuring that the terminal device supporting the S&F function can access the S&F network device.

在另一种可能实现的方式中,第二网络设备在非S&F模式下(或者称为第二网络设备工作在非S&F模式时,或者称为第二网络设备是非S&F网络设备),所述第一信元用于指示不允许/拒绝第一类终端设备接入所述第二网络设备。第二网络设备通过第一消息中的第一信元指示拒绝支持S&F功能的终端设备接入,从而避免支持S&F功能的终端设备请求接入该第二网络设备,节省终端设备的资源开销。In another possible implementation, the second network device is in a non-S&F mode (or referred to as the second network device operating in the non-S&F mode, or referred to as the second network device being a non-S&F network device), and the first information element is used to indicate that the first type of terminal device is not allowed/rejected from accessing the second network device. The second network device, through the first information element in the first message, indicates that the terminal device supporting the S&F function is refusal to access the second network device, thereby preventing the terminal device supporting the S&F function from requesting access to the second network device, thereby saving resource overhead of the terminal device.

结合第八方面,在一些可能实现的方式中,所述第二网络设备在S&F模式下,所述第一信元为第一值,所述第一信元用于指示允许所述第一类终端设备接入所述第二网络设备。In combination with the eighth aspect, in some possible implementations, the second network device is in the S&F mode, the first information element is a first value, and the first information element is used to indicate that the first type of terminal device is allowed to access the second network device.

作为一种示例,该第一值可以为“not barred(不禁止)”。当第一信元(sfBarred信元)为“not barred(不禁止)”时,该sfBarred信元用于指示允许第一类终端设备接入所述第二网络设备。As an example, the first value may be “not barred”. When the first information element (sfBarred information element) is “not barred”, the sfBarred information element is used to indicate that the first type of terminal device is allowed to access the second network device.

结合第八方面,在一些可能实现的方式中,所述第二网络设备在非S&F模式下,所述第一信元为非第一值,所述第一信元用于指示拒绝所述第一类终端设备接入第二网络设备。In combination with the eighth aspect, in some possible implementations, the second network device is in a non-S&F mode, the first information element is a non-first value, and the first information element is used to indicate that the first type of terminal device is denied access to the second network device.

作为一种示例,该非第一值可以为“barred(禁止)”。当第一信元(sfBarred信元)为“barred(禁止)”时,该sfBarred信元用于指示拒绝第一类终端设备接入所述第二网络设备。As an example, the non-first value may be “barred.” When the first information element (sfBarred information element) is “barred,” the sfBarred information element is used to indicate that the first type of terminal device is denied access to the second network device.

应理解,上述第一值、和非第一值的具体取值仅仅是一种示例,该第一值、非第一值还可以通过其他符号,数字或者字母中的一种或者多种组合的方式进行指示,本申请不做限定。例如可以通过比特取值或者二进制的方式指示第二网络设备是否允许第一类终端设备接入,本申请不再一一赘述。It should be understood that the specific values of the first value and the non-first value described above are merely examples, and the first value and the non-first value may also be indicated by other symbols, numbers, or letters, or by one or more combinations thereof, and this application is not limited thereto. For example, whether the second network device allows the first type of terminal device to access may be indicated by a bit value or binary format, and this application will not elaborate on these details.

结合第八方面,在一些可能实现的方式中,所述第一消息还包括第二信元和/或第三信元,所述第二信元用于指示是否允许第二类终端设备接入所述第二网络设备,所述第三信元用于指示是否允许第三类终端设备接入所述第二网络设备,其中,所述第二类终端设备包括地面网络终端设备,第三类终端设备包括非地面网络终端设备。In combination with the eighth aspect, in some possible implementations, the first message also includes a second information element and/or a third information element, the second information element is used to indicate whether the second type of terminal device is allowed to access the second network device, and the third information element is used to indicate whether the third type of terminal device is allowed to access the second network device, wherein the second type of terminal device includes a ground network terminal device, and the third type of terminal device includes a non-ground network terminal device.

应理解,地面网络终端设备或者称为normal终端设备。非地面网络终端设备或者称为NTN终端设备,或者称为支持NTN提供服务的终端设备,或者称为具有接受NTN服务的能力的终端设备。It should be understood that terrestrial network terminal equipment is also called normal terminal equipment, and non-terrestrial network terminal equipment is also called NTN terminal equipment, or terminal equipment that supports services provided by NTN, or terminal equipment capable of receiving NTN services.

还应理解,该第二信元可以是系统消息中的cellBarred信元,第三信元可以是系统消息中的cellBarredNTN信元,对此本申请不做限定。It should also be understood that the second information element may be a cellBarred information element in a system message, and the third information element may be a cellBarredNTN information element in a system message, which is not limited in this application.

结合第八方面,在一些可能实现的方式中,所述第二网络设备在S&F模式下,所述第二信元为第二值,所述第二信元用于指示拒绝所述第二类终端设备接入所述第二网络设备;所述第三信元为第三值,所述第三信元用于指示拒绝所述第三类终端设备接入所述第二网络设备。In combination with the eighth aspect, in some possible implementations, the second network device is in the S&F mode, the second information element is a second value, and the second information element is used to indicate that the second type of terminal device is denied access to the second network device; the third information element is a third value, and the third information element is used to indicate that the third type of terminal device is denied access to the second network device.

应理解,第二值和第三值的具体表现形式与上述第一值类似,本申请不做限定。例如,第二值可以为“barred(禁止)”,第三值可以为“barred(禁止)”。It should be understood that the specific expressions of the second value and the third value are similar to those of the first value, and are not limited in this application. For example, the second value may be "barred" and the third value may be "barred".

基于上述方案,第二网络设备在S&F模式下,第二网络设备的第一消息中的第二信元和第三信元用于指示拒绝第二类终端设备和第三类终端设备拒绝接入第二网络设备,避免了非S&F终端设备接入第二网络设备,保证S&F网络设备只为支持S&F功能的终端设备提供服务。Based on the above solution, when the second network device is in the S&F mode, the second information element and the third information element in the first message of the second network device are used to indicate that the second type of terminal devices and the third type of terminal devices are denied access to the second network device, thereby preventing non-S&F terminal devices from accessing the second network device and ensuring that the S&F network device only provides services for terminal devices that support the S&F function.

结合第八方面,在一些可能实现的方式中,所述第二网络设备在非S&F模式下,所述第二信元为第二值,所述第二信元用于指示拒绝所述第二类终端设备接入所述第二网络设备;所述第三信元为非第三值,所述第三信元用于指示允许所述第三类终端设备接入所述第二网络设备。In combination with the eighth aspect, in some possible implementations, when the second network device is in non-S&F mode, the second information element is a second value, and the second information element is used to indicate that the second type of terminal device is denied access to the second network device; the third information element is a non-third value, and the third information element is used to indicate that the third type of terminal device is allowed to access the second network device.

应理解,非第三值与第三值不同,非第三值的具体表现形式本申请不做限定。例如,非第二值可以为“not barred(不禁止)”,非第三值可以为“not barred(不禁止)”。It should be understood that a non-third value is different from a third value, and the specific form of the non-third value is not limited in this application. For example, a non-second value may be "not barred" and a non-third value may be "not barred".

[根据细则91更正 12.03.2025]
应理解,第二网络设备为非地面网络设备,即该第二网络设备的第二信元在非S&F模式下,或者在S&F模式下均为第二值。
[Corrected 12.03.2025 in accordance with Article 91]
It should be understood that the second network device is a non-terrestrial network device, that is, the second information element of the second network device is the second value in the non-S&F mode or in the S&F mode.

基于上述方案,第二网络设备在非S&F模式下,第二网络设备的第一消息中的第一信元用于指示拒绝第一类终端设备接入第二网络设备,第二信元用于指示拒绝第二类终端设备接入第二网络设备,第三信元用于指示允许第三类终端设备接入第二网络设备。第二网络设备不在S&F模式下,允许非地面网络终端设备接入第二网络设备,拒绝支持S&F功能的终端设备接入第二网络设备,保证支持S&F功能的终端设备只接入在S&F工作模式下的网络设备。Based on the above solution, when the second network device is in non-S&F mode, the first information element in the first message of the second network device is used to indicate that the first type of terminal device is denied access to the second network device, the second information element is used to indicate that the second type of terminal device is denied access to the second network device, and the third information element is used to indicate that the third type of terminal device is allowed access to the second network device. When the second network device is not in S&F mode, it allows non-terrestrial network terminal devices to access the second network device and denies access to terminal devices that support the S&F function, ensuring that terminal devices that support the S&F function can only access network devices in S&F operating mode.

第九方面,提供一种通信方法,该方法包括:终端设备接收第一消息,所述第一消息包括第一信元,所述第一信元用于指示是否允许第一类终端设备接入第二网络设备,所述第一类终端设备包括存储转发终端设备;在所述第一信元用于指示允许第一类终端设备接入第二网络设备,所述终端设备为所述第一类终端设备情况下,所述终端设备向所述第二网络设备发送第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,其中,该第二网络设备为非地面网络设备。In a ninth aspect, a communication method is provided, the method comprising: a terminal device receives a first message, the first message comprising a first information element, the first information element being used to indicate whether a first type of terminal device is allowed to access a second network device, the first type of terminal device comprising a store-and-forward terminal device; when the first information element is used to indicate that the first type of terminal device is allowed to access a second network device, and the terminal device is the first type of terminal device, the terminal device sends a first request message to the second network device, the first request message being used to request access to the second network device, wherein the second network device is a non-terrestrial network device.

应理解,第九方面的相关说明以及技术效果与上述第八方面类似,此处不再赘述。It should be understood that the relevant descriptions and technical effects of the ninth aspect are similar to those of the eighth aspect mentioned above and will not be repeated here.

结合第九方面,在一些可能实现的方式中,所述第二网络设备在S&F模式下,所述第一信元为第一值,所述第一信元用于指示允许所述第一类终端设备接入所述第二网络设备。In combination with the ninth aspect, in some possible implementations, the second network device is in the S&F mode, the first information element is a first value, and the first information element is used to indicate that the first type of terminal device is allowed to access the second network device.

结合第九方面,在一些可能实现的方式中,所述第二网络设备在非S&F模式下,所述第一信元为非第一值,所述第一信元用于指示拒绝所述第一类终端设备接入第二网络设备。In combination with the ninth aspect, in some possible implementations, the second network device is in a non-S&F mode, the first information element is a non-first value, and the first information element is used to indicate that the first type of terminal device is denied access to the second network device.

结合第九方面,在一些可能实现的方式中,所述第一消息还包括第二信元和/或第三信元,所述第二信元用于指示是否允许第二类终端设备接入所述第二网络设备,所述第三信元用于指示是否允许第三类终端设备接入所述第二网络设备,其中,所述第二类终端设备包括地面网络终端设备,第三类终端设备包括非地面网络终端设备。In combination with the ninth aspect, in some possible implementations, the first message also includes a second information element and/or a third information element, the second information element is used to indicate whether the second type of terminal device is allowed to access the second network device, and the third information element is used to indicate whether the third type of terminal device is allowed to access the second network device, wherein the second type of terminal device includes a ground network terminal device, and the third type of terminal device includes a non-ground network terminal device.

结合第九方面,在一些可能实现的方式中,所述第一消息还包括所述第二信元和所述第三信元,在所述终端设备不是所述第一类终端设备、所述终端设备是所述第三类终端设备的情况下,所述终端设备忽略所述第一信元和所述第二信元,所述终端设备根据所述第三信元,确定是否向所述第二网络设备发送所述第一请求信息。在所述终端不是所述第一类终端设备、所述终端设备是所述第二类终端设备的情况下,所述终端设备忽略所述第一信元和所述第三信元,所述终端设备根据所述第二信元,确定是否向所述第二网络设备发送所述第一请求信息。In conjunction with the ninth aspect, in some possible implementations, the first message further includes the second information element and the third information element. If the terminal device is not a terminal device of the first category but is a terminal device of the third category, the terminal device ignores the first information element and the second information element, and the terminal device determines whether to send the first request information to the second network device based on the third information element. If the terminal is not a terminal device of the first category but is a terminal device of the second category, the terminal device ignores the first information element and the third information element, and the terminal device determines whether to send the first request information to the second network device based on the second information element.

结合第九方面,在一些可能实现的方式中,所述第二网络设备在S&F模式下,所述第二信元为第二值,所述第二信元用于指示拒绝所述第二类终端设备接入所述第二网络设备;所述第三信息为第三值,所述第三信元用于指示拒绝所述第三类终端设备接入所述第二网络设备。In combination with the ninth aspect, in some possible implementations, the second network device is in the S&F mode, the second information element is a second value, and the second information element is used to indicate that the second type of terminal device is denied access to the second network device; the third information is a third value, and the third information element is used to indicate that the third type of terminal device is denied access to the second network device.

结合第九方面,在一些可能实现的方式中,所述第二网络设备在非S&F模式下,所述第二信元为第二值,所述第二信元用于指示拒绝所述第二类终端设备接入所述第二网络设备;所述第三信元为非第三值,所述第三信元用于指示允许所述第三类终端设备接入所述第二网络设备。In combination with the ninth aspect, in some possible implementations, when the second network device is in non-S&F mode, the second information element is a second value, and the second information element is used to indicate that the second type of terminal device is denied access to the second network device; the third information element is a non-third value, and the third information element is used to indicate that the third type of terminal device is allowed to access the second network device.

在一种可能实现的方式中,假设所述终端设备不是第一类终端设备,所述终端设备为所述第三类终端设备,所述终端设备可以忽略第一信元和第二信元的取值。在所述第三信息为非第三值时,所述终端设备根据所述第三信元的取值,确定向第二网络设备发送第一请求信息。假设所述终端设备不是第一类终端设备,所述终端设备为所述第二类终端设备,所述终端设备可以忽略第一信元和第三信元的取值。应理解,所述第二网络设备为非地面网络设备,所述第二信元为第二值,所述终端设备确定不向所述第二网络设备发送所述第一请求信息。In one possible implementation, assuming that the terminal device is not a first-category terminal device but a third-category terminal device, the terminal device may ignore the values of the first information element and the second information element. When the third information element is a non-third value, the terminal device determines to send the first request information to the second network device based on the value of the third information element. assuming that the terminal device is not a first-category terminal device but a second-category terminal device, the terminal device may ignore the values of the first information element and the third information element. It should be understood that if the second network device is a non-terrestrial network device and the second information element is the second value, the terminal device determines not to send the first request information to the second network device.

第十方面,提供一种通信装置,该通信装置包括收发单元和处理单元。在终端设备离开为所述终端设备提供服务的第一网络设备的覆盖范围时,处理单元,用于将通信装置的状态从连接态变更为第一状态,所述第一状态包括以下任一项:所述终端设备的接入层AS挂起的连接态,挂起的空闲态,或者非激活态;收发单元,用于向第二网络设备发送第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述第一请求信息包括所述终端设备的标识信息,其中,所述第一网络设备和所述第二网络设备为非地面网络设备。In a tenth aspect, a communication device is provided, comprising a transceiver unit and a processing unit. When a terminal device leaves the coverage of a first network device providing services for the terminal device, the processing unit is configured to change the state of the communication device from a connected state to a first state, where the first state includes any one of the following: a connected state suspended by an access layer (AS) of the terminal device, a suspended idle state, or an inactive state; and the transceiver unit is configured to send a first request message to a second network device, where the first request message is used to request access to the second network device, and the first request message includes identification information of the terminal device, wherein the first network device and the second network device are non-terrestrial network devices.

应理解,该收发单元还用于执行如上述第一方面中的接收和发送的处理。该处理单元可以执行前述第一方面中除接收和发送之外的其他处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing in the first aspect. The processing unit can perform other processing in addition to the receiving and sending in the first aspect.

第十一方面,提供一种通信装置,该通信装置包括收发单元。收发单元,用于向终端设备发送第一指示信息,第一指示信息用于指示在所述终端设备离开所述第一网络设备的覆盖范围又重新进入所述第一网络设备的覆盖范围时,所述终端设备接入所述第一网络设备;收发单元,还用于向接收来自所述终端设备的所述第一请求信息,所述第一请求信息用于请求接入所述第一网络设备,其中,所述第一网络设备为非地面网络设备。In an eleventh aspect, a communication device is provided, comprising a transceiver unit. The transceiver unit is configured to send first indication information to a terminal device, the first indication information being used to instruct the terminal device to access the first network device when the terminal device leaves and then re-enters the coverage range of the first network device; and the transceiver unit is further configured to receive first request information from the terminal device, the first request information being used to request access to the first network device, wherein the first network device is a non-terrestrial network device.

应理解,该收发单元还用于执行如上述第二方面中的接收和发送的处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing as in the second aspect above.

第十二方面,提供一种通信装置,该通信装置包括收发单元。收发单元,用于向终端设备发送第一信息,第一信息包括至少一个第三网络设备,以及至少一个第三网络设备中每个第三网络设备的可用区域的指示信息,至少一个第三网络设备包括第二网络设备和/或所述第一网络设备,至少一个第三网络设备中的每个第三网络设备为非地面网络设备。In a twelfth aspect, a communication device is provided, comprising a transceiver unit. The transceiver unit is configured to send first information to a terminal device, the first information including at least one third network device and indication information of an available area of each of the at least one third network device, the at least one third network device including a second network device and/or the first network device, and each of the at least one third network device being a non-terrestrial network device.

应理解,该收发单元还用于执行如上述第三方面中的接收和发送的处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing as in the third aspect above.

第十三方面,提供一种通信装置,该通信装置包括收发单元。收发单元,用于向终端设备发送第一信息,第一信息包括至少一个第三网络设备,所述至少一个第三网络设备包括第一网络设备和第二网络设备,所述第一信息还包括用于指示所述第一网络设备的可用区域的指示信息,所述至少一个第三网络设备中的每个第三网络设备为非地面网络设备。In a thirteenth aspect, a communication device is provided, comprising a transceiver unit. The transceiver unit is configured to send first information to a terminal device, the first information including at least one third network device, the at least one third network device including a first network device and a second network device, the first information further including indication information indicating an available area of the first network device, and each of the at least one third network device being a non-terrestrial network device.

应理解,该收发单元还用于执行如上述第四方面中的接收和发送的处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing as in the fourth aspect above.

第十四方面,提供一种通信装置,该通信装置包括收发单元。收发单元,用于向终端设备发送第一信息,所述第一信息包括至少一个第三网络设备;收发单元,还用于向核心网设备发送第二信息,所述第二信息包括终端设备的第一上下文信息,所述终端设备的第一上下文信息包括所述终端设备的标识信息,其中,所述第一网络设备和所述至少一个第三网络设备为非地面网络设备,在所述第一网络设备具有未被使用过的下一跳NH的情况下,所述终端设备的第一上下文信息还包括:密钥和下一跳链计算NCC,所述密钥是所述第一网络设备根据所述NH确定的,或者,在所述第一网络设备不具有未被使用过的所述NH的情况下,所述终端设备的第一上下文信息还包括:第二指示信息,所述第二指示信息用于指示所述核心网设备确定所述NH和所述NCC。In a fourteenth aspect, a communication device is provided, comprising a transceiver unit. The transceiver unit is configured to send first information to a terminal device, wherein the first information includes at least one third network device; and the transceiver unit is further configured to send second information to a core network device, wherein the second information includes first context information of the terminal device, and the first context information of the terminal device includes identification information of the terminal device, wherein the first network device and the at least one third network device are non-terrestrial network devices, and when the first network device has an unused next hop NH, the first context information of the terminal device further includes: a key and a next hop chain calculation NCC, wherein the key is determined by the first network device based on the NH, or, when the first network device does not have the unused NH, the first context information of the terminal device further includes: second indication information, wherein the second indication information is used to instruct the core network device to determine the NH and the NCC.

应理解,该收发单元还用于执行如上述第五方面中的接收和发送的处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing as in the fifth aspect above.

在一种可能实现的方式中,该通信装置还包括处理单元,该处理单元可以执行前述第五方面中除接收和发送之外的其他处理。In one possible implementation, the communication device further includes a processing unit, which can perform other processing in addition to receiving and sending in the aforementioned fifth aspect.

第十五方面,提供一种通信装置,该通信装置包括收发单元。收发单元,用于接收来自第一网络设备的第二信息,所述第二信息包括终端设备的第一上下文信息,所述终端设备的第一上下文信息包括所述终端设备的标识信息;收发单元,还用于向至少一个第三网络设备发送所述终端设备的第二上下文信息,所述终端设备的第二上下文信息包括密钥和所述NCC,或者,所述终端设备的第二上下文信息包括所述NCC和下一跳NH,其中,所述密钥是根据所述NH确定的,所述第一网络设备和所述至少一个第三网络设备为非地面网络设备。In a fifteenth aspect, a communication device is provided, comprising a transceiver unit. The transceiver unit is configured to receive second information from a first network device, the second information comprising first context information of a terminal device, the first context information of the terminal device comprising identification information of the terminal device; and the transceiver unit is further configured to send the second context information of the terminal device to at least one third network device, the second context information of the terminal device comprising a key and the NCC, or the second context information of the terminal device comprising the NCC and a next hop (NH), wherein the key is determined based on the NH, and the first network device and the at least one third network device are non-terrestrial network devices.

应理解,该收发单元还用于执行如上述第六方面中的接收和发送的处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing as in the sixth aspect above.

在一种可能实现的方式中,该通信装置还包括处理单元,该处理单元可以执行前述第六方面中除接收和发送之外的其他处理。In one possible implementation, the communication device further includes a processing unit, which can perform other processing in addition to receiving and sending in the aforementioned sixth aspect.

第十六方面,提供一种通信装置,该通信装置包括收发单元。收发单元,用于接收来自核心网设备的终端设备的第二上下文信息;收发单元,用于接收来自所述终端设备的第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述第一请求信息包括所述终端设备的标识信息,其中,所述第二网络设备为非地面网络设备。In a sixteenth aspect, a communication device is provided, comprising a transceiver unit configured to receive second context information of a terminal device from a core network device; and a transceiver unit configured to receive first request information from the terminal device, the first request information being used to request access to the second network device, the first request information including identification information of the terminal device, wherein the second network device is a non-terrestrial network device.

应理解,该收发单元还用于执行如上述第七方面中的接收和发送的处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing as in the seventh aspect above.

在一种可能实现的方式中,该通信装置还包括处理单元,该处理单元可以执行前述第七方面中除接收和发送之外的其他处理。In one possible implementation, the communication device further includes a processing unit that can perform other processing in addition to receiving and sending in the aforementioned seventh aspect.

第十七方面,提供一种通信装置,该通信装置包括收发单元。收发单元,用于发送第一消息,所述第一消息包括第一信元,所述第一信元用于指示是否允许第一类终端设备接入所述第二网络设备,所述第一类终端设备包括存储转发终端设备;收发单元,还用于接收来自终端设备的第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述终端设备为所述第一类终端设备,其中,该第二网络设备为非地面网络设备。In a seventeenth aspect, a communication device is provided, comprising a transceiver unit. The transceiver unit is configured to send a first message, the first message comprising a first information element, the first information element being configured to indicate whether a first-category terminal device is allowed to access the second-network device, the first-category terminal device comprising a store-and-forward terminal device; and the transceiver unit is further configured to receive a first request message from a terminal device, the first request message being configured to request access to the second-network device, the terminal device being the first-category terminal device, and the second-network device being a non-terrestrial network device.

应理解,该收发单元还用于执行如上述第八方面中的接收和发送的处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing as in the eighth aspect above.

在一种可能实现的方式中,该通信装置还包括处理单元,该处理单元可以执行前述第八方面中除接收和发送之外的其他处理。In one possible implementation, the communication device further includes a processing unit that can perform other processing in addition to receiving and sending in the aforementioned eighth aspect.

第十八方面,提供一种通信装置,该通信装置包括收发单元。收发单元,用于接收第一消息,所述第一消息包括第一信元,所述第一信元用于指示是否允许第一类终端设备接入第二网络设备,所述第一类终端设备包括存储转发终端设备;收发单元,还用于向所述第二网络设备发送第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述终端设备为所述第一类终端设备,其中,该第二网络设备为非地面网络设备。In an eighteenth aspect, a communication device is provided, comprising a transceiver unit. The transceiver unit is configured to receive a first message, the first message comprising a first information element, the first information element being configured to indicate whether a first-category terminal device is allowed to access a second-network device, the first-category terminal device comprising a store-and-forward terminal device; and the transceiver unit is further configured to send a first request message to the second-network device, the first request message being configured to request access to the second-network device, the terminal device being the first-category terminal device, wherein the second-network device is a non-terrestrial network device.

应理解,该收发单元还用于执行如上述第九方面中的接收和发送的处理。It should be understood that the transceiver unit is also used to perform the receiving and sending processing as in the ninth aspect above.

在一种可能实现的方式中,该通信装置还包括处理单元,该处理单元可以执行前述第九方面中除接收和发送之外的其他处理。In one possible implementation, the communication device further includes a processing unit that can perform other processing in addition to receiving and sending in the aforementioned ninth aspect.

第十九方面,本申请实施例提供了一种通信装置。该通信装置可以是带有芯片的设备或装置,或者是集成有电路的设备或装置,或者是前述示出的设备或装置中的芯片、芯片系统、模块或控制单元,具体本申请不做限定。需要说明的是,本申请中,提到通信装置时,既可以是指通信装置本身,也可以指通信装置中完成本申请提供的方法的芯片、功能模块或集成电路等,具体本申请不做限定。该装置用于执行上述第一方面至第九方面提供的方法。具体地,该装置可以包括用于执行第一方面至第九方面中任意一种实现方式提供的方法的单元和/或模块,如收发单元(或收发模块)和处理单元(或处理模块)。In the nineteenth aspect, an embodiment of the present application provides a communication device. The communication device may be a device or apparatus with a chip, or a device or apparatus integrated with a circuit, or a chip, a chip system, a module or a control unit in the aforementioned device or apparatus, and the specific application is not limited thereto. It should be noted that, in the present application, when referring to a communication device, it may refer to the communication device itself, or to a chip, a functional module or an integrated circuit in the communication device that completes the method provided in the present application, and the specific application is not limited thereto. The device is used to execute the methods provided in the first to ninth aspects above. Specifically, the device may include units and/or modules for executing the method provided in any one of the implementations in the first to ninth aspects, such as a transceiver unit (or transceiver module) and a processing unit (or processing module).

在一些实现方式中,处理单元可以是至少一个处理器。收发单元可以是收发器,或,输入/输出接口。可选地,收发器可以为收发电路。可选地,输入/输出接口可以为输入/输出电路。In some implementations, the processing unit may be at least one processor. The transceiver unit may be a transceiver or an input/output interface. Alternatively, the transceiver may be a transceiver circuit. Alternatively, the input/output interface may be an input/output circuit.

在一些实现方式中,该通信装置为终端设备或网络设备中的芯片、芯片系统或电路。收发模块可以是该芯片、芯片系统或电路上的输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等。处理单元可以是至少一个处理器、处理电路或逻辑电路等。In some implementations, the communication device is a chip, chip system, or circuit in a terminal device or network device. The transceiver module can be an input/output interface, interface circuit, output circuit, input circuit, pin, or related circuit on the chip, chip system, or circuit. The processing unit can be at least one processor, processing circuit, or logic circuit.

第二十方面,本申请实施例提供了一种处理器,用于执行上述各方面提供的方法。对于处理器所涉及的发送和接收等操作,如果没有特殊说明,或者,如果未与其在相关描述中的实际作用或者内在逻辑相抵触,则可以理解为处理器输出和接收、输入等操作,也可以理解为由射频电路和天线所进行的发送和接收操作,本申请对此不做限定。In a twentieth aspect, an embodiment of the present application provides a processor for executing the methods provided in the above aspects. For operations such as sending and receiving involved in the processor, unless otherwise specified, or unless they conflict with their actual functions or inherent logic in the relevant description, they can be understood as processor output, reception, input, and other operations, and can also be understood as sending and receiving operations performed by the radio frequency circuit and antenna, and this application does not limit this.

第二十一方面,本申请实施例提供了一种通信系统,该通信系统包括终端设备和网络设备,该终端设备可以执行上述第一方面、第九方面中任意一种实现方式提供的方法;该网络设备可以执行上述第二方面、第三方面、第四方面、第六方面、第七方面中任意一种实现方式提供的方法。In aspect 21, an embodiment of the present application provides a communication system, which includes a terminal device and a network device. The terminal device can execute the method provided by any one of the implementation methods of the above-mentioned first aspect and ninth aspect; the network device can execute the method provided by any one of the implementation methods of the above-mentioned second aspect, third aspect, fourth aspect, sixth aspect, and seventh aspect.

在一种可能实现的方式中,该通信系统还包括核心网设备,该核心网设备可以执行上述第五方面中任意一种实现方式提供的方法。In one possible implementation, the communication system further includes a core network device, which can execute the method provided in any one of the implementations of the fifth aspect above.

第二十二方面,本申请实施例提供了一种计算机可读存储介质。该计算机可读存储介质存储指令或程序代码,该指令或程序代码被处理器执行时可以实现上述第一方面至第九方面中任意一种实现方式提供的方法。In a twenty-second aspect, an embodiment of the present application provides a computer-readable storage medium. The computer-readable storage medium stores instructions or program codes, which, when executed by a processor, can implement the method provided in any one of the implementations of aspects 1 to 9 above.

第二十三方面,本申请实施例提供了提供一种包含指令的计算机程序产品。当该计算机程序产品在计算机上运行时,使得计算机执行上述第一方面至第九方面中任意一种实现方式提供的方法。In a twenty-third aspect, an embodiment of the present application provides a computer program product comprising instructions. When the computer program product is run on a computer, the computer is caused to execute the method provided in any one of the implementations of the first to ninth aspects above.

第二十四方面,本申请实施例提供了提供一种芯片。芯片包括处理器与通信接口,处理器通过通信接口读取存储器上存储的指令,执行上述第一方面至第九方面中任意一种实现方式提供的方法。In a twenty-fourth aspect, an embodiment of the present application provides a chip. The chip includes a processor and a communication interface, wherein the processor reads instructions stored in a memory through the communication interface and executes the method provided in any one of the implementation modes of the first to ninth aspects above.

可选地,作为一种实现方式,芯片还包括存储器,存储器中存储有计算机程序或指令,处理器用于执行存储器上存储的计算机程序或指令,当计算机程序或指令被执行时,处理器用于执行上述第一方面至第九方面中任意一种实现方式提供的方法。Optionally, as an implementation method, the chip also includes a memory, in which a computer program or instruction is stored, and the processor is used to execute the computer program or instruction stored in the memory. When the computer program or instruction is executed, the processor is used to execute the method provided in any one of the implementation methods of the first to ninth aspects above.

上述第三方面至第十六方面带来的有益效果具体可以参考第一方面或第二方面中有益效果的描述,在此不再赘述。The beneficial effects brought about by the third to sixteenth aspects mentioned above can be specifically referred to the description of the beneficial effects in the first or second aspect, and will not be repeated here.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1是本申请实施例应用的通信系统的示意图。FIG1 is a schematic diagram of a communication system used in an embodiment of the present application.

图2是本申请实施例提供的网络架构示意图。FIG2 is a schematic diagram of the network architecture provided in an embodiment of the present application.

图3是KeNB更新方式的示意图。FIG3 is a schematic diagram of a KeNB update method.

图4是一种S&F的场景示意图。FIG4 is a schematic diagram of an S&F scenario.

图5是本申请实施例提供的一种通信方法的流程性示意图。FIG5 is a flow chart of a communication method provided in an embodiment of the present application.

图6是本申请实施例提供的另一种通信方法的流程性示意图。FIG6 is a flow chart of another communication method provided in an embodiment of the present application.

图7是本申请实施例提供的另一种通信方法的流程性示意图。FIG7 is a flow chart of another communication method provided in an embodiment of the present application.

图8是本申请实施例提供的另一种通信方法的流程性示意图。FIG8 is a flow chart of another communication method provided in an embodiment of the present application.

图9是本申请实施例提供的通信装置的示意图。FIG9 is a schematic diagram of a communication device provided in an embodiment of the present application.

图10是本申请实施例提供的通信装置的又一示意图。FIG10 is another schematic diagram of a communication device provided in an embodiment of the present application.

图11是本申请实施例提供一种芯片系统的示意图。FIG11 is a schematic diagram of a chip system provided in an embodiment of the present application.

具体实施方式DETAILED DESCRIPTION

下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below with reference to the accompanying drawings.

为了便于理解,以下以图1所示的通信系统作为示例来描述本申请中各实施例可应用的通信系统。For ease of understanding, the communication system shown in FIG1 is used as an example to describe the communication system applicable to each embodiment of the present application.

如图1所示,通信系统包括无线接入网(radio access network,RAN)100和核心网(core network,CN)200。RAN 100包括至少一个RAN节点(如图1中的110a和110b,统称为110)和至少一个终端设备(如图1中的120a-120j,统称为120)。RAN中还可以包括其它RAN节点,例如,无线中继设备和/或无线回传设备(图1中未示出)等。终端设备120通过无线的方式与RAN节点110相连。RAN节点110通过无线或有线方式与核心网200连接。核心网200中的核心网设备与RAN 100中的RAN节点110可以分别是不同的物理设备,也可以是集成了核心网逻辑功能和无线接入网逻辑功能的同一个物理设备。As shown in Figure 1 , the communications system includes a radio access network (RAN) 100 and a core network (CN) 200. RAN 100 includes at least one RAN node (e.g., 110a and 110b in Figure 1 , collectively referred to as 110) and at least one terminal device (e.g., 120a-120j in Figure 1 , collectively referred to as 120). The RAN may also include other RAN nodes, such as wireless relay devices and/or wireless backhaul devices (not shown in Figure 1 ). Terminal device 120 is wirelessly connected to RAN node 110. RAN node 110 is wirelessly or wiredly connected to core network 200. The core network devices in core network 200 and RAN node 110 in RAN 100 can be separate physical devices, or they can be the same physical device that integrates core network logical functions and radio access network logical functions.

RAN 100可以为第三代合作伙伴计划(3rd generation partnership project,3GPP)相关的蜂窝系统,例如,4G、5G、6G移动通信系统、非陆地通信网络(non-terrestrial network,NTN)系统、或面向未来的演进系统。RAN 100还可以是开放式接入网(open RAN,O-RAN或ORAN)、云无线接入网络(cloud radio access network,CRAN)、或者无线保真(wireless fidelity,WiFi)系统,还可以是以上两种或两种以上系统融合的通信系统。The RAN 100 can be a cellular system related to the Third Generation Partnership Project (3GPP), such as a 4G, 5G, or 6G mobile communication system, a non-terrestrial network (NTN) system, or a future-oriented evolutionary system. The RAN 100 can also be an open access network (O-RAN or ORAN), a cloud radio access network (CRAN), or a wireless fidelity (WiFi) system, or a communication system that integrates two or more of the above systems.

在通信系统中的一个设备可以向另一个设备发送信号或从另一个设备接收信号。其中,信号可以包括信息、信令或者数据等。其中,设备也可以被替换为实体、网络实体、通信设备、通信模块、节点、通信节点等,本申请实施例以设备为例进行描述。In a communication system, a device can send signals to or receive signals from another device. Signals can include information, signaling, or data. Devices can also be replaced by entities, network entities, communication devices, communication modules, nodes, communication nodes, etc. The embodiments of this application are described using devices as an example.

本申请实施例中,终端设备是一种具有无线收发功能的设备,可以指用户设备(user equipment,UE)、接入终端、用户单元(subscriber unit)、用户站、移动台(mobile station)、远方站、远程终端、移动设备、用户终端、无线通信设备、用户代理或用户装置。In the embodiments of the present application, the terminal device is a device with wireless transceiver functions, which may refer to user equipment (UE), access terminal, subscriber unit, user station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless communication equipment, user agent or user device.

本申请实施例中,终端设备还可以是卫星电话、蜂窝电话、智能手机、无线数据卡、无线调制解调器、机器类型通信设备、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、客户终端设备(customer-premises equipment,CPE)、智能销售点(point of sale,POS)机、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、高空飞机上搭载的通信设备、可穿戴设备、无人机、机器人、设备到设备通信(device-to-device,D2D)中的终端、车辆外联(vehicle-to-everything,V2X)中的终端、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端或者5G之后演进的通信网络中的终端设备等,对此不作限制本申请实施例中,用于实现终端设备的功能的装置可以是终端设备,也可以是能够支持终端设备实现该功能的装置,例如芯片系统或芯片,该装置可以被安装在终端设备中。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。In the embodiment of the present application, the terminal device may also be a satellite phone, a cellular phone, a smart phone, a wireless data card, a wireless modem, a machine type communication device, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a customer-premises equipment (CPE), a smart point of sale (POS) machine, a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a communication device carried on a high-altitude aircraft, a wearable device, a drone, a robot, a terminal in device-to-device (D2D) communication, a vehicle-to-everything (V2D) communication, or a vehicle-to-everything (V2P) communication. In the embodiment of the present application, the device for realizing the function of the terminal device may be a terminal device, or a device that can support the terminal device to realize the function, such as a chip system or a chip, which can be installed in the terminal device. In the embodiment of the present application, the chip system can be composed of a chip, or it can include a chip and other discrete devices.

本申请实施例中,终端设备还可以是6G通信系统中具有通信功能的设备,不限定终端设备在6G以及未来其他通信系统中的形态或者类型等。In the embodiment of the present application, the terminal device may also be a device with communication functions in the 6G communication system, without limiting the form or type of the terminal device in the 6G and other future communication systems.

本申请实施例中,RAN节点110又可称为接入网设备、接入节点或RAN实体,用于帮助终端设备实现无线接入。多个RAN节点110可以为同一类型的节点,也可以为不同类型的节点。在一些场景下,RAN节点110和终端设备120的角色是相对的,例如,图1中网元120i可以是直升机或无人机,其可以被配置成移动基站,对于那些通过网元120i接入到RAN 100的终端120j来说,网元120i是基站;但对于基站110a来说,网元120i是终端设备。RAN节点110和终端设备120有时都称为通信装置,例如图1中网元110a和110b可以理解为具有基站功能的通信装置,网元120a-120j可以理解为具有终端功能的通信装置。In the embodiments of the present application, the RAN node 110 may also be referred to as an access network device, an access node, or a RAN entity, and is used to help terminal devices achieve wireless access. Multiple RAN nodes 110 may be nodes of the same type or different types. In some scenarios, the roles of the RAN node 110 and the terminal device 120 are relative. For example, the network element 120i in Figure 1 may be a helicopter or a drone, which can be configured as a mobile base station. For the terminal 120j that accesses the RAN 100 through the network element 120i, the network element 120i is a base station; but for the base station 110a, the network element 120i is a terminal device. The RAN node 110 and the terminal device 120 are sometimes referred to as communication devices. For example, the network elements 110a and 110b in Figure 1 can be understood as communication devices with base station functions, and the network elements 120a-120j can be understood as communication devices with terminal functions.

在一种可能的场景中,RAN节点110又可以成为网络设备,其可以是基站(base station)、演进型基站(evolved NodeB,eNodeB)、接入点(access point,AP)、发送接收点(transmission reception point,TRP)、下一代基站(next generation NodeB,gNB)、6G移动通信系统中的下一代基站、未来移动通信系统中的基站、或WiFi系统中的接入节点等。RAN节点可以是宏基站(如图1中的110a)、微基站或室内站(如图1中的110b)、中继节点或施主节点、或者是CRAN场景下的无线控制器。可选的,RAN节点还可以是服务器,可穿戴设备,车辆或车载设备等。例如,车辆外联(vehicle to everything,V2X)技术中的网络设备可以为路侧单元(road side unit,RSU)。In one possible scenario, the RAN node 110 can also be a network device, such as a base station, an evolved NodeB (eNodeB), an access point (AP), a transmission reception point (TRP), a next-generation NodeB (gNB), a next-generation base station in a 6G mobile communication system, a base station in a future mobile communication system, or an access node in a WiFi system. A RAN node can be a macro base station (such as 110a in Figure 1 ), a micro base station or an indoor station (such as 110b in Figure 1 ), a relay node or a donor node, or a wireless controller in a CRAN scenario. Alternatively, a RAN node can be a server, a wearable device, a vehicle, or an onboard device. For example, a network device in vehicle-to-everything (V2X) technology can be a roadside unit (RSU).

在另一种可能的场景中,由多个RAN节点协作协助终端实现无线接入,不同RAN节点分别实现基站的部分功能。例如,RAN节点可以是集中式单元(central unit,CU),分布式单元(distributed unit,DU),CU-控制面(control plane,CP),CU-用户面(user plane,UP),或者无线单元(radio unit,RU)等。CU和DU可以是单独设置,或者也可以包括在同一个网元中,例如基带单元(baseband unit,BBU)中。CU节点和DU节点将gNB的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。作为一种实现方式,CU部署有协议栈中的无线资源控制(radio Resource Control,RRC)层,分组数据汇聚层协议(packet data convergence protocol,PDCP)层,以及业务数据适应协议(service data adaptation protocol,SDAP)层;DU部署有协议栈中的无线链路控制(radio link control,RLC)层,媒体介入控制(media access control,MAC)层,以及物理层(physical layer,PHY)。从而,CU具有RRC、PDCP和SDAP的处理能力。DU具有RLC、MAC和PHY的处理能力。可以理解的是,上述功能的切分仅为一个示例,不构成对CU和DU的限定。RU可以包括在射频设备或者射频单元中,例如包括在射频拉远单元(remote radio unit,RRU)、有源天线处理单元(active antenna unit,AAU)或远程射频头(remote radio head,RRH)中。In another possible scenario, multiple RAN nodes collaborate to assist terminals in achieving wireless access, with different RAN nodes implementing portions of the base station's functionality. For example, a RAN node can be a centralized unit (CU), a distributed unit (DU), a CU-control plane (CP), a CU-user plane (UP), or a radio unit (RU). The CU and DU can be separate or included in the same network element, such as the baseband unit (BBU). The CU and DU nodes split the gNB's protocol layers, centrally controlling some protocol layer functions within the CU and distributing some or all of the remaining protocol layer functions within the DU, which is then centrally controlled by the CU. As an implementation, the CU is deployed with the radio resource control (RRC), packet data convergence protocol (PDCP), and service data adaptation protocol (SDAP) layers of the protocol stack; the DU is deployed with the radio link control (RLC), media access control (MAC), and physical layer (PHY) layers of the protocol stack. Thus, the CU has the processing capabilities of RRC, PDCP, and SDAP, while the DU has the processing capabilities of RLC, MAC, and PHY. It should be understood that the above functional division is merely an example and does not constitute a limitation on the CU and DU. The RU may be included in a radio frequency device or radio unit, such as a remote radio unit (RRU), an active antenna unit (AAU), or a remote radio head (RRH).

在不同系统中,CU(或CU-CP和CU-UP)、DU或RU也可以有不同的名称,但是本领域的技术人员可以理解其含义。例如,在ORAN系统中,CU也可以称为O-CU(开放式CU),DU也可以称为O-DU,CU-CP也可以称为O-CU-CP,CU-UP也可以称为O-CU-UP,RU也可以称为O-RU。为描述方便,本申请中以CU,CU-CP,CU-UP、DU和RU为例进行描述。本申请中的CU(或CU-CP、CU-UP)、DU和RU中的任一单元,可以是通过软件模块、硬件模块、或者软件模块与硬件模块结合来实现。In different systems, CU (or CU-CP and CU-UP), DU or RU may also have different names, but those skilled in the art can understand their meanings. For example, in the ORAN system, CU may also be called O-CU (Open CU), DU may also be called O-DU, CU-CP may also be called O-CU-CP, CU-UP may also be called O-CU-UP, and RU may also be called O-RU. For the convenience of description, this application uses CU, CU-CP, CU-UP, DU and RU as examples for description. Any unit of CU (or CU-CP, CU-UP), DU and RU in this application can be implemented by a software module, a hardware module, or a combination of a software module and a hardware module.

可选的,对于ORAN系统中的网元,各个网元可以实现如下述表1所示的协议层功能。Optionally, for network elements in the ORAN system, each network element may implement the protocol layer functions shown in Table 1 below.

表1 Table 1

需要说明的是,在ORAN系统中,本申请中的网络设备可以是上述表1中的一种网元或多种网元。It should be noted that, in the ORAN system, the network device in this application may be one or more network elements in Table 1 above.

本申请实施例中,核心网设备200是指为终端设备120提供业务支持的核心网(core network,CN)中的设备。目前,一些核心网设备的举例为:接入和移动性管理功能(access and mobility management function,AMF)实体、会话管理功能(session management function,SMF)实体、用户面功能(user plane function,UPF)实体等等,此处不一一列举。其中,AMF实体可以负责终端设备的接入管理和移动性管理;SMF实体可以负责会话管理,如用户的会话建立等;UPF实体可以是用户面的功能实体,主要负责连接外部网络。需要说明的是,本申请中实体也可以称为网元或功能实体,例如,AMF实体也可以称为AMF网元或AMF功能实体,又例如,SMF实体也可以称为SMF网元或SMF功能实体等。In the embodiment of the present application, the core network device 200 refers to a device in the core network (CN) that provides service support for the terminal device 120. At present, some examples of core network devices are: access and mobility management function (AMF) entity, session management function (SMF) entity, user plane function (UPF) entity, etc., which are not listed here one by one. Among them, the AMF entity can be responsible for access management and mobility management of terminal devices; the SMF entity can be responsible for session management, such as user session establishment, etc.; the UPF entity can be a functional entity of the user plane, mainly responsible for connecting to the external network. It should be noted that in this application, the entity can also be referred to as a network element or a functional entity. For example, the AMF entity can also be referred to as an AMF network element or an AMF functional entity. For another example, the SMF entity can also be referred to as an SMF network element or an SMF functional entity, etc.

本申请实施例中,用于实现网络设备的功能的装置可以是网络设备;也可以是能够支持网络设备实现该功能的装置,例如芯片系统、硬件电路、软件模块、或硬件电路加软件模块。该装置可以被安装在网络设备中或者和网络设备匹配使用。在本申请实施例中仅以用于实现网络设备的功能的装置为网络设备为例进行说明,不对本申请实施例的方案构成限定。In the embodiments of the present application, the device for implementing the functions of the network device can be a network device; it can also be a device that can support the network device to implement the functions, such as a chip system, a hardware circuit, a software module, or a hardware circuit and a software module. The device can be installed in the network device or used in conjunction with the network device. In the embodiments of the present application, only the device for implementing the functions of the network device is used as an example to illustrate, and does not constitute a limitation on the solutions of the embodiments of the present application.

需要说明的是,本申请实施例对网络设备/终端设备所处的场景不做限定。此外,网络设备/终端设备可以是硬件设备,也可以是在专用硬件上运行的软件功能,通用硬件上运行的软件功能,比如,是包括专用或通用硬件设备和软件功能的实体,本申请对网络设备/终端设备的具体形态不作限定。It should be noted that the embodiments of the present application do not limit the scenarios in which the network device/terminal device is located. In addition, the network device/terminal device can be a hardware device, or a software function running on dedicated hardware, or a software function running on general-purpose hardware. For example, it can be an entity including dedicated or general-purpose hardware devices and software functions. The present application does not limit the specific form of the network device/terminal device.

下面将对本申请中的方法涉及到的场景架构,技术术语以及通信方法进行示例性地介绍。The following is an illustrative introduction to the scenario architecture, technical terms, and communication methods involved in the method of this application.

首先,将结合图2所示的架构示意图,对本申请实施例提供的方法适用的架构进行示例性的介绍。当然,图2所示的架构仅仅只是一种示例,本领域技术人员可以基于本申请提供的架构互相结合或者改进,同样适用于本申请提供的方法。First, the architecture applicable to the method provided in the embodiment of the present application will be exemplarily introduced in conjunction with the architecture diagram shown in Figure 2. Of course, the architecture shown in Figure 2 is only an example, and those skilled in the art can combine or improve the architecture provided in the present application, which is also applicable to the method provided in the present application.

图2是本申请实施例提供的网络架构示意图。FIG2 is a schematic diagram of the network architecture provided in an embodiment of the present application.

架构1:如图2中的(1)示出了在透明卫星场景中,该卫星的作用是:无线频率过滤,频率转换和放大。其中,透明卫星作为L1 relay,将物理层信号重新生成,并不具有其他更高协议层。卫星通过无线信号与地面的NTN信关站(gateway)通信,信关站与gNB通过有线连接。在这种架构下,可以将卫星理解为地面基站(gNB)的射频拉远单元(remote radio unit),卫星只是提供简单的物理信号的覆盖,其中射频拉远的功能需要通过信关站、以及卫星与信关站之间的微波链路,才能够到达卫星。在传输过程中,不经过任何协议层的处理,也不建立任何逻辑接口。Architecture 1: As shown in (1) in Figure 2, in the transparent satellite scenario, the satellite's functions are: wireless frequency filtering, frequency conversion, and amplification. The transparent satellite acts as an L1 relay, regenerating the physical layer signal and does not have other higher protocol layers. The satellite communicates with the ground NTN gateway via wireless signals, and the gateway is connected to the gNB via a wired connection. In this architecture, the satellite can be understood as the remote radio unit of the ground base station (gNB). The satellite only provides simple physical signal coverage, and the remote radio function needs to pass through the gateway and the microwave link between the satellite and the gateway to reach the satellite. During the transmission process, no protocol layer processing is performed, and no logical interface is established.

架构2:如图2中的(2)示出了在再生卫星场景中,该再生卫星具有基站的处理功能,能够对转发数据进行存储和转发等相关的处理操作。Architecture 2: As shown in (2) of FIG2 , in a regenerative satellite scenario, the regenerative satellite has the processing function of a base station and can perform related processing operations such as storage and forwarding on forwarded data.

架构3:如图2中的(3)示出了在具有星间链路的再生卫星场景中,卫星通过星间链路与其他卫星进行连接。在本地卫星与地面信关站不可见的场景中,本地卫星可以通过星间链路(inter-satellite link,ISL)将本地卫星的数据传输给其他卫星,再转发至地面信关站。Architecture 3: As shown in (3) of Figure 2, in a regenerative satellite scenario with inter-satellite links, the satellite is connected to other satellites via inter-satellite links. In a scenario where the local satellite is not visible to the ground gateway, the local satellite can transmit its data to other satellites via inter-satellite links (ISLs), which are then forwarded to the ground gateway.

在这种架构中,卫星作为基站,具有基站的全部协议层处理功能。卫星通过微波回传至地面信关站,信关站通过有线连接至5G核心网。在再生星场景下,一般可以将基站与信关站之间的链路称为卫星无线接口(satellite radio interface,SRI)。In this architecture, the satellite acts as a base station, performing all of its protocol layer processing functions. Satellites transmit data back to ground gateways via microwaves, which are then connected to the 5G core network via wired connections. In the regenerative satellite scenario, the link between the base station and gateway is generally referred to as the satellite radio interface (SRI).

架构4:如图2中的(4)示出了在具有基站的DU处理功能的再生卫星的场景中,卫星作为gNB-DU,通过地面信关站连接地面的gNB-CU。Architecture 4: As shown in (4) in Figure 2, in the scenario of a regenerative satellite with DU processing capabilities of a base station, the satellite acts as a gNB-DU and connects to the gNB-CU on the ground through a ground gateway.

架构5:在具有接入回传一体化的(integrated access and backhaul,IAB)功能的卫星场景,卫星是作为IAB节点,与架构4类似,但区别在于架构5中,卫星上除了部署DU,还部署了移动终端(Mobile Terminal,MT)模块,利用MT与地面基站的空口进行回传,无需单独建立卫星与信关站之间的微波回传链路。Architecture 5: In a satellite scenario with integrated access and backhaul (IAB) functionality, the satellite acts as an IAB node, similar to Architecture 4. However, in Architecture 5, in addition to the DU, a mobile terminal (MT) module is also deployed on the satellite. Backhaul is performed using the air interface between the MT and the ground base station, eliminating the need to establish a separate microwave backhaul link between the satellite and the gateway.

其次,对终端设备的接入层(access layer,AS)的安全机制进行简单介绍。Secondly, the security mechanism of the access layer (AS) of the terminal device is briefly introduced.

UE与gNB之间的数据传输是需要加密和完整性保护的,不同的消息对应的密钥有所不同。例如,U与gNB之间的数据传输所需的密钥包括Krrcint(用于RRC信令完整性保护密钥)、Krrcenc(用于RRC信令加密密钥)、Kupenc(用于用户面加密密钥)等等。上述密钥都是通过KeNB派生出来的,因此UE与gNB之间需要对齐KeNB的值,从而能够实现UE与gNB之间数据的安全传输。下面将重点介绍1)KeNB在UE初始接入网络时是如何获取,2)KeNB在切换的场景中该KeNB如何更新,以及3)KeNB在RRC恢复或RRC重建立场景中该KeNB如何更新。Data transmission between the UE and gNB requires encryption and integrity protection, and different keys are used for different messages. For example, the keys required for data transmission between the UE and gNB include Krrcint (for RRC signaling integrity protection), Krrcenc (for RRC signaling encryption), and Kupenc (for user plane encryption). These keys are all derived from KeNB, so the KeNB values must be aligned between the UE and gNB to ensure secure data transmission between the UE and gNB. The following sections focus on 1) how KeNB is obtained during the UE's initial network access, 2) how KeNB is updated during handover scenarios, and 3) how KeNB is updated during RRC recovery or RRC re-establishment scenarios.

1)初始接入场景中KeNB的获取1) Acquisition of KeNB in the initial access scenario

UE在初始接入时,UE和核心网设备会各自根据根密钥Kasme派生出KeNB,本申请实施例中核心网设备以移动性管理实体(mobility management entity,MME)为例进行介绍。其中,Kasme是通过上一级根密钥派生出的,UE与MME派生出KeNB的根密钥Kasme一定相同,具体可以参见现有技术中的介绍,此处不展开说明。UE获取KeNB是UE自己根据Kasme计算得到的。基站侧获取KeNB是在UE与基站建立RRC连接之后,基站向MME发送INITIAL UE MESSAGE,核心网进行用户认证(或者称为鉴权),如果核心网对UE鉴权通过,MME会派生出KeNB,并通过INITIAL CONTEXT SETUP REQUEST消息告知基站。至此,UE与基站均获得了KeNB的值。接下来,基站通过SMC流程(Security Mode Command消息等),告知UE加密算法,与UE建立安全连接。When the UE initially accesses, the UE and the core network device will each derive KeNB based on the root key Kasme. In the embodiment of the present application, the core network device is introduced by taking the mobility management entity (MME) as an example. Among them, Kasme is derived from the upper-level root key. The root key Kasme used by the UE and the MME to derive KeNB must be the same. For details, please refer to the introduction in the prior art and will not be explained in detail here. The UE obtains KeNB by calculating it based on Kasme. The base station side obtains KeNB after the UE establishes an RRC connection with the base station. The base station sends an INITIAL UE MESSAGE to the MME, and the core network performs user authentication (or authentication). If the core network successfully authenticates the UE, the MME will derive KeNB and inform the base station through the INITIAL CONTEXT SETUP REQUEST message. At this point, both the UE and the base station have obtained the value of KeNB. Next, the base station informs the UE of the encryption algorithm through the SMC process (Security Mode Command message, etc.) and establishes a secure connection with the UE.

应理解,在UE的初始接入流程中,基于上述介绍,在SMC流程之前,UE与基站之间的通信是不经过加密处理的,在SMC之后,UE与基站的通信是加密通信。It should be understood that in the initial access process of the UE, based on the above introduction, before the SMC process, the communication between the UE and the base station is not encrypted, and after the SMC, the communication between the UE and the base station is encrypted.

2)切换场景中KeNB的更新2) Update of KeNB in switching scenarios

切换场景包括:UE站内切换(UE的服务小区进行更新,基站不发生变更)、UE站间X2切换、UE站间S1切换。其中,UE站内切换是指UE的服务小区发生了变换,例如为UE提供服务的小区从源服务小区变更为目标服务小区,且源服务小区和目标服务小区对应的基站是同一个基站;UE站间X2切换是指为UE提供服务的基站发生了变更,即X2切换是指两个基站之间的接口发生了切换;UE站间S1切换是指为UE提供服务的基站与MME之间的接口发生了变更。Handover scenarios include: intra-UE handover (the UE's serving cell is updated, but the base station does not change), inter-UE X2 handover, and inter-UE S1 handover. Intra-UE handover refers to a change in the UE's serving cell, for example, the cell serving the UE changes from a source serving cell to a target serving cell, and the source and target serving cells correspond to the same base station. Inter-UE X2 handover refers to a change in the base station serving the UE, meaning that an X2 handover refers to a switch in the interface between the two base stations. Inter-UE S1 handover refers to a change in the interface between the base station serving the UE and the MME.

其中,在UE站内切换的场景中,为UE提供服务的目标小区的PCI,目标小区的频点,以及更新前的KeNB或NH用于确定更新后的KeNB。针对上述UE站内切换,由于UE的服务小区发生了变更,即目标服务小区的PCI以及目标服务小区的频点与源服务小区的PCI和源服务小区的频点不同,即UE切换至目标服务小区之后,需要与目标服务小区采用更新后的KeNB进行安全通信。Among them, in the scenario of UE intra-site handover, the PCI of the target cell serving the UE, the frequency of the target cell, and the KeNB or NH before the update are used to determine the updated KeNB. For the above-mentioned UE intra-site handover, since the UE's serving cell has changed, that is, the PCI and frequency of the target serving cell are different from the PCI and frequency of the source serving cell, that is, after the UE switches to the target serving cell, it is necessary to use the updated KeNB for secure communication with the target serving cell.

其中,在UE站间X2切换和UE站间S1切换的场景中,UE同样均需要更新KeNB。In the scenarios of inter-UE X2 handover and inter-UE S1 handover, the UE also needs to update the KeNB.

应理解,KeNB的更新方式分为水平派生和垂直派生,如图3所示。以下以UE站间X2切换和UE站间S1切换为例,介绍密钥KeNB更新的流程。It should be understood that the update mode of KeNB is divided into horizontal derivation and vertical derivation, as shown in Figure 3. The following takes UE inter-station X2 handover and UE inter-station S1 handover as examples to introduce the key KeNB update process.

图3是KeNB更新方式的示意图,其中,KeNB*表示更新后的KeNB。该KeNB*的计算需要3个输入参数:目标服务小区的PCI、目标服务小区的频点、以及更新前的KeNB或NH。Figure 3 is a schematic diagram of the KeNB update method, where KeNB* represents the updated KeNB. The calculation of KeNB* requires three input parameters: the PCI of the target serving cell, the frequency of the target serving cell, and the KeNB or NH before the update.

其中,对于UE站间X2切换的场景,源基站根据为UE选择的潜在目标小区,确定该目标小区的PCI和频点,然后基于如下原则确定第3个参数(更新前的KeNB或NH),得到KeNB*。具体地,源基站确定第3个参数的原则包括:源基站根据源基站本地是否有未使用的(unused){NH,NCC},如果有,用于确定KeNB*的第3个参数采用NH,此时生成KeNB*的过程称为垂直派生,如果没有,用于确定KeNB*的第3个参数采用更新前的KeNB,此时生成KeNB*的过程称为水平派生。In the scenario of inter-UE X2 handover, the source base station determines the PCI and frequency of the target cell based on the potential target cell selected for the UE, and then determines the third parameter (KeNB or NH before the update) based on the following principles to obtain KeNB*. Specifically, the principle for the source base station to determine the third parameter includes: the source base station determines whether the source base station has unused {NH, NCC} locally. If so, the third parameter used to determine KeNB* uses NH. The process of generating KeNB* at this time is called vertical derivation. If not, the third parameter used to determine KeNB* uses KeNB before the update. The process of generating KeNB* at this time is called horizontal derivation.

应理解,基于上述KeNB*的确定方式,因为垂直派生的安全性相较于水平派生较高,一般使用垂直派生。其中,当源基站本地没有unused{NH,NCC}时,即源基站使用水平派生确定KeNB*。It should be understood that based on the above-mentioned method for determining KeNB*, vertical derivation is generally used because it is more secure than horizontal derivation. When the source base station has no unused {NH, NCC} locally, the source base station uses horizontal derivation to determine KeNB*.

还应理解,下一跳(next hop,NH)可以理解为KeNB*推演的起点值,下一跳链计算(next hop chaining count,NCC)可以理解为NH、以及基于NH进行后续水平派生的KeNB的编号,如图3所示。源基站通过垂直派生或水平派生确定KeNB*之后,会将KeNB*和第3个参数对应的NCC一起携带在切换请求消息中,发送给目标基站,相应地,目标基站从源基站处获取KeNB*,KeNB*就是目标基站后续与该UE使用的新密钥。同时,目标基站可以将接收到来自源基站的NCC转发给UE,UE进一步地根据接收到的NCC确定KeNB*。It should also be understood that the next hop (NH) can be understood as the starting point value for KeNB* derivation, and the next hop chaining count (NCC) can be understood as the NH and the number of KeNBs subsequently derived horizontally based on the NH, as shown in Figure 3. After the source base station determines KeNB* through vertical or horizontal derivation, it will carry KeNB* and the NCC corresponding to the third parameter in a handover request message and send it to the target base station. In response, the target base station obtains KeNB* from the source base station. KeNB* is the new key that the target base station will subsequently use with the UE. At the same time, the target base station can forward the NCC received from the source base station to the UE, and the UE further determines KeNB* based on the received NCC.

其中,UE可以通过目标基站向UE发送的切换命令中携带的NCC、目标小区的PCI和目标小区的频点推演得到的KeNB*。例如,UE可以判断切换命令中的NCC与UE当前使用的NCC是否相同,如果相同,则意味着本次推演是水平派生,UE会在旧的KeNB基础上,以及切换命令中携带的目标小区的PCI和目标小区的频点,进行一次水平派生(或者称为水平推演),获得KeNB*;如果不同,则意味着本次是垂直派生,NH是新指定的,UE会先逐跳垂直派生至当前NCC对应的NH(其中,该NH对应的NCC不一定是UE当前的NCC+1就能得到,因为源基站中存在未使用的(unused){NH,NCC},可能不一定是该UE对应的NCC+1,因此可能需要多次逐跳推演才能得到该NH),然后UE基于该NH,以及切换命令中携带的目标小区的PCI和目标小区的频点,获得KeNB*。The UE can derive KeNB* from the NCC, the PCI of the target cell, and the frequency of the target cell carried in the handover command sent by the target base station to the UE. For example, the UE can determine whether the NCC in the handover command is the same as the NCC currently used by the UE. If they are the same, this means that the derivation is horizontal, and the UE will perform a horizontal derivation (or horizontal derivation) based on the old KeNB, the PCI of the target cell, and the frequency of the target cell carried in the handover command to obtain KeNB*. If they are different, this means that the derivation is vertical, and the NH is newly designated. The UE will first derive vertically hop by hop to the NH corresponding to the current NCC (wherein the NCC corresponding to the NH is not necessarily the UE's current NCC+1, because there are unused {NH, NCC} in the source base station, which may not necessarily be the NCC+1 corresponding to the UE. Therefore, multiple hop-by-hop derivations may be required to obtain the NH). The UE then obtains KeNB* based on the NH and the PCI of the target cell and the frequency of the target cell carried in the handover command.

应理解,基于上述介绍,目标基站与UE均得到了KeNB*。在UE切换之后,目标基站会向核心网MME发送PATH SWITCH REQUEST消息,告知核心网UE已经切换至目标基站下,MME会维护这个目标基站对应的NCC编号,然后在PATH SWITCH REQUEST ACK消息中,将这个NCC+1,计算得到新的NH,将计算后的{NH,NCC}发给目标基站作为后续确定KeNB*的补充。目标基站接收到这个{NH,NCC}之后,将其存储在本地,作为unused{NH,NCC},用于下次切换,并删除其他unused{NH,NCC}。换言之,目标基站每接纳一个切换而来的UE,核心网都会向它分配一个新的{NH,NCC}作为unused{NH,NCC},用于目标基站下次与切换来的UE进行使用,其中,该UE不一定是上述刚切换而来的UE,任意UE均可以,本申请不做限定。It should be understood that based on the above introduction, both the target base station and the UE have obtained KeNB*. After the UE switches, the target base station will send a PATH SWITCH REQUEST message to the core network MME to inform the core network that the UE has switched to the target base station. The MME will maintain the NCC number corresponding to the target base station, and then in the PATH SWITCH REQUEST ACK message, add 1 to this NCC to calculate a new NH, and send the calculated {NH, NCC} to the target base station as a supplement for the subsequent determination of KeNB*. After receiving this {NH, NCC}, the target base station stores it locally as unused {NH, NCC} for the next switch, and deletes other unused {NH, NCC}. In other words, each time the target base station accepts a switched UE, the core network will allocate a new {NH, NCC} to it as unused {NH, NCC} for the target base station to use with the switched UE next time. The UE is not necessarily the UE that has just switched as mentioned above, and any UE can be used. This application does not limit it.

以上介绍了UE站间切换X2切换中的密钥更新,可以看出,X2切换是由源基站负责生成新的KeNB*,而S1切换中,由于要借助MME,新密钥推演无需要由源基站负责,而是由MME和目标站负责。例如,源基站向MME发送HANDOVER REQUIRED消息,其中不携带任何KeNB*和NCC的相关信息,MME会将MME处维护的目标基站的NCC+1,获得一个新的NH,MME将这个{NH,NCC},以及目标小区的PCI和目标小区的频点通过HANDOVER REQUEST消息发送给目标基站。目标基站基于来自MME发送的消息中的这3个参数,确定KeNB*。站间S1切换与站间X2切换类似,目标基站将NCC,目标小区的PCI和目标小区的频点通过切换命令,借助MME和源基站发给UE,UE根据NCC确定采用水平派生还是垂直派生确定KeNB*与上述站间X2切换中的类似,具体请参见上述站间X2切换的详细介绍。The above describes key updates during X2 handovers for UE inter-station handovers. It can be seen that in X2 handovers, the source base station is responsible for generating the new KeNB*. However, in S1 handovers, due to the MME's involvement, new key derivation is not performed by the source base station but rather by the MME and the target base station. For example, the source base station sends a HANDOVER REQUIRED message to the MME, which does not carry any KeNB* or NCC information. The MME then adds 1 to the NCC of the target base station maintained at the MME to obtain a new NH. The MME then sends this {NH, NCC}, along with the PCI and frequency of the target cell, to the target base station via a HANDOVER REQUEST message. The target base station determines KeNB* based on these three parameters in the message from the MME. Inter-site S1 handover is similar to inter-site X2 handover. The target base station sends the NCC, PCI of the target cell, and frequency of the target cell to the UE via a handover command through the MME and the source base station. The UE determines whether to use horizontal or vertical derivation based on the NCC to determine KeNB*. This is similar to the above-mentioned inter-site X2 handover. For details, see the detailed description of inter-site X2 handover.

应理解,站间S1切换之后,核心网不向目标站发送{NH,NCC}作为补充,也就是说,核心网在HANDOVER REQUEST中告知目标基站的{NH,NCC}是用于本次UE切换的,而在站间X2切换场景中,核心网在PATH SWITCH REQUEST ACK中告知目标基站的{NH,NCC}是用于后续切换的。It should be understood that after the inter-site S1 handover, the core network does not send {NH, NCC} to the target station as a supplement. That is, the core network informs the target base station in the HANDOVER REQUEST that {NH, NCC} is used for this UE handover. In the inter-site X2 handover scenario, the core network informs the target base station in the PATH SWITCH REQUEST ACK that {NH, NCC} is used for subsequent handovers.

综上所述,在站间X2切换中,KeNB*可能采用垂直派生确定或水平派生确定;而在站间S1切换中,,KeNB*采用垂直派生确定。In summary, in inter-station X2 handover, KeNB* may be determined by vertical derivation or horizontal derivation; while in inter-station S1 handover, KeNB* is determined by vertical derivation.

3)RRC重建立(RRC connection reestablishment)或者RRC恢复连接(RRC connection resume)中KeNB的更新3) KeNB update during RRC connection reestablishment or RRC connection resume

当连接态的UE检测到与当前基站发生无线链路连接失败之后,UE会选择新基站发起RRC Connection Reestablishment流程。对于RRC挂起空闲态(IDLE with suspended)、RRC连接态(connection)或者RRC非连接态(RRC_INACTIVE)的UE,在RRC重建立和RRC恢复连接的场景中,也需要KeNB*的推演更新。下面介绍RRC重建立/RRC恢复连接场景中确定KeNB*的更新。When a connected UE detects a failure in the radio link connection with the current base station, it selects a new base station to initiate the RRC Connection Reestablishment process. For UEs in the RRC idle state (IDLE with suspended), RRC connected state (connection), or RRC inactive state (RRC_INACTIVE), KeNB* derivation and update are also required in RRC reestablishment and RRC recovery scenarios. The following describes how to determine KeNB* updates in RRC reestablishment and RRC recovery scenarios.

在这两种场景中,UE接入新基站传输的第一条RRC消息(例如RRC connection reestablishment request/RRC connection resume request)是不经过加密的,在这个RRC消息中,携带shortMAC-I的值。该ShortMAC-I是用于验证UE合法性的,ShortMAC-I是基于Krrcint密钥,通过UE在源小区的标识C-RNTI、源小区的PCI、目标小区的cell ID三个输入参数计算得到MAC-I,然后对其进行截短得到的(注意这三个参数与计算KeNB*的三个参数是不同的)。In both scenarios, the first RRC message transmitted by the UE when accessing a new base station (e.g., RRC connection reestablishment request/RRC connection resume request) is unencrypted and carries the value of shortMAC-I. This ShortMAC-I is used to verify the legitimacy of the UE. It is calculated based on the Krrcint key using three input parameters: the UE's source cell identifier (C-RNTI), the source cell's PCI, and the target cell's cell ID. The MAC-I is then truncated (note that these three parameters are different from the three parameters used to calculate KeNB*).

对于重建立场景,UE在RRC connection reestablishment request消息中会上报自己在源基站下使用的shortMAC-I,以及在源基站下的C-RNTI和源小区PCI,目标基站基于源小区PCI确定源基站标识,将这些信息以及目标小区的cell ID一起,放在RETRIEVE UE CONTEXT REQUEST消息中,发送给源基站,由源基站验证这个RETRIEVE UE CONTEXT REQUEST中携带的ShortMAC-I与自己基于UE在源小区的C-RNTI、源小区的PCI、目标小区cell ID三个参数计算得到的ShortMAC-I是否一致,如果一致,则确认这个UE是合法的,该UE是源小区曾经服务过的UE,源基站会在RETRIEVE UE CONTEXT RESPONSE中,将源基站确定的KeNB*和NCC发送至目标基站,然后目标基站再通过RRC消息将NCC发给UE。源基站与UE确定KeNB*的方法与上述站间X2切换场景中源基站和UE确定KeNB*的方法一样,具体请参见上述的站间X2切换场景中的详细介绍,此处不再赘述。For the re-establishment scenario, the UE reports its shortMAC-I used by the source base station, as well as the C-RNTI and source cell PCI of the source base station in the RRC connection reestablishment request message. The target base station determines the source base station identifier based on the source cell PCI, and puts this information together with the cell ID of the target cell in a RETRIEVE UE CONTEXT REQUEST message, which is then sent to the source base station. The source base station verifies whether the ShortMAC-I carried in the RETRIEVE UE CONTEXT REQUEST is consistent with the ShortMAC-I calculated based on the UE's C-RNTI in the source cell, the source cell PCI, and the target cell ID. If they are consistent, the UE is confirmed to be legitimate and has been served by the source cell. The source base station sends the KeNB* and NCC determined by the source base station to the target base station in the RETRIEVE UE CONTEXT RESPONSE message, and the target base station then sends the NCC to the UE via an RRC message. The method for the source base station and the UE to determine KeNB* is the same as the method for the source base station and the UE to determine KeNB* in the above inter-site X2 handover scenario. For details, please refer to the detailed introduction in the above inter-site X2 handover scenario, which is not repeated here.

对于恢复建立场景,UE在RRC connection resume request消息中携带自己在源基站下使用的shortMAC-I和一个resumeIdentity,该resumeIdentity中包括代表源基站标识的字段(例如,resumeIdentity=PLMN ID+gNB ID+UE ID),目标基站根据resumeIdentity确定源基站标识,并将shortMAC-I,resumeIdentity,以及目标小区的cell ID,放在RETRIEVE UE CONTEXT REQUEST消息中,发送给源基站。源基站根据resumeIdentity确定是具体UE,然后根据该UE所在源小区的C-RNTI、源小区的PCI和目标小区的cell ID得确定ShortMAC-I,并与RETRIEVE UE CONTEXT REQUEST消息中的ShortMAC-I进行对比,如果基站自身确定的ShortMAC-I与RETRIEVE UE CONTEXT REQUEST消息中的ShortMAC-I一致,则确认该UE是合法的,该UE是源小区曾经服务过的UE,源基站会在RETRIEVE UE CONTEXT RESPONSE中,将源基站确定的KeNB*和NCC发送至目标基站,目标基站再通过RRC消息将NCC发给UE。源基站与UE确定KeNB*的方法与上述站间X2切换场景中源基站和UE确定KeNB*的方法一样,具体请参见上述的站间X2切换场景中的详细介绍,此处不再赘述。For the recovery and establishment scenario, the UE carries the shortMAC-I and a resumeIdentity used by itself under the source base station in the RRC connection resume request message. The resumeIdentity includes a field representing the source base station identifier (for example, resumeIdentity = PLMN ID + gNB ID + UE ID). The target base station determines the source base station identifier based on the resumeIdentity, and puts the shortMAC-I, resumeIdentity, and the cell ID of the target cell in a RETRIEVE UE CONTEXT REQUEST message and sends it to the source base station. The source eNB determines the specific UE based on resumeIdentity. It then determines the ShortMAC-I based on the C-RNTI of the source cell where the UE resides, the PCI of the source cell, and the cell ID of the target cell. The ShortMAC-I is then compared with the ShortMAC-I in the RETRIEVE UE CONTEXT REQUEST message. If the ShortMAC-I determined by the eNB matches the ShortMAC-I in the RETRIEVE UE CONTEXT REQUEST message, the UE is confirmed to be legitimate and has been previously served by the source cell. The source eNB sends the KeNB* and NCC determined by the source eNB to the target eNB in the RETRIEVE UE CONTEXT RESPONSE message. The target eNB then sends the NCC to the UE via an RRC message. The method by which the source eNB and UE determine KeNB* is the same as that used in the inter-site X2 handover scenario described above. For details, please refer to the detailed description of the inter-site X2 handover scenario and will not be repeated here.

接下来,对存储和转发(store and forward,简称S&F)场景进行示例性地介绍。Next, the store and forward (S&F) scenario is introduced as an example.

在3GPP中,NTN相关课题包括新无线(new radio,NR)NTN和物联网(internet of things,IoT)NTN,它们使用的架构是基本相同的,一些特性有所区别。其中,IoT NTN是基于LTE的演进,基站是eNodeB,简称eNB。在R19中,IoT NTN将研究基于再生星架构的store and forward技术(后续简称为S&F)。S&F的需求是考虑到对一些小的卫星公司,卫星数量与地面信关站数量都较少,无法做到无时无刻有地面信关站与卫星连接。In 3GPP, NTN-related topics include New Radio (NR) NTN and Internet of Things (IoT) NTN. These two technologies share a fundamentally similar architecture, with some distinct features. IoT NTN is an evolution of LTE, with the base station being the eNodeB (eNB). In Release 19, IoT NTN will research store and forward (S&F) technology based on a regenerative satellite architecture. The need for S&F arises from the limited number of satellites and ground gateways used by smaller satellite operators, making it difficult to maintain a constant connection between ground gateways and satellites.

图4是一种S&F的场景示意图。当卫星覆盖UE时,卫星与信关站无法连接,与核心网无法进行通信;当卫星与信关站连接,与核心网进行通信时,该卫星覆盖范围内又没有UE。在这种场景下,正常的实时性业务是无法完成的,而对于一些非实时性的IoT业务(如:传感器数据上报等),可以在卫星覆盖UE时,先进行卫星与UE间的通信,等到卫星覆盖信关站时,再进行卫星与核心网间的通信,以一种接力的方式进行,这就是目前研究的S&F场景。该S&F场景中,卫星需要具有一定的存储和处理能力,将UE或核心网到来的数据先进行缓存,在未来某一时刻重新覆盖到核心网或者UE时再进行转发,因此该S&F场景中的卫星是再生卫星,例如该卫星可以作为eNB。Figure 4 is a schematic diagram of a S&F scenario. When the satellite covers a UE, it cannot connect to the gateway and communicate with the core network. When the satellite connects to the gateway and communicates with the core network, there are no UEs within the satellite's coverage area. In this scenario, normal real-time services cannot be completed. However, for some non-real-time IoT services (such as sensor data reporting), communication between the satellite and the UE can be carried out when the satellite covers the UE. When the satellite covers the gateway, communication between the satellite and the core network can be carried out in a relay manner. This is the S&F scenario currently being studied. In this S&F scenario, the satellite needs to have a certain level of storage and processing capabilities to cache data from the UE or core network and forward it when it regains coverage of the core network or UE at some point in the future. Therefore, the satellite in this S&F scenario is a regenerative satellite, for example, it can serve as an eNB.

R18中研究的IoT NTN下的非连续覆盖场景,主要是:前一颗卫星飞走之后,过一段时间下一颗卫星才会覆盖该UE。其中,R18中卫星与地面信关站之间是连续性覆盖,该卫星可以时刻连接至地面信关站,R18中的卫星是透传卫星,与S&F场景中的再生卫星不同。可见,R18中并未考虑到卫星与地面信关站之间的非连续覆盖的情况。The discontinuous coverage scenario for IoT NTNs studied in Release 18 primarily involves a period of time after the previous satellite departs before the next satellite reaches the UE. In Release 18, the coverage between the satellite and the ground gateway is continuous, meaning the satellite is always connected to the ground gateway. These satellites are transparent transmission satellites, unlike the regenerative satellites used in the S&F scenario. Clearly, Release 18 does not account for discontinuous coverage between the satellite and the ground gateway.

考虑在S&F场景中,卫星相对于地面信关站和UE均为非连续覆盖的,UE无法与基站对齐KeNB的数值,导致UE与基站之间的安全连接无法建立,UE与网络之间无法进行正常通信。Considering the S&F scenario, the satellite has discontinuous coverage relative to the ground gateway and the UE. The UE cannot align the KeNB value with the base station, resulting in the inability to establish a secure connection between the UE and the base station, and the inability to communicate normally between the UE and the network.

基于上述技术问题,本申请提供了一种通信方法,该方法能够在S&F场景中保证UE与网络之间的正常通信。Based on the above technical problems, the present application provides a communication method, which can ensure normal communication between UE and network in S&F scenarios.

图5是本申请实施例提供的一种通信方法的流程性示意图。FIG5 is a flow chart of a communication method provided in an embodiment of the present application.

应理解,在图5所示的方法中,以网络设备1作为第一网络设备为例,该网络设备1为非地面网络设备,例如,该网络设备1为卫星或者无人机,本申请均不限定。It should be understood that in the method shown in Figure 5, taking network device 1 as the first network device as an example, the network device 1 is a non-terrestrial network device, for example, the network device 1 is a satellite or a drone, which is not limited in this application.

如图5中的(a)所示,该方法可以包括如下步骤。As shown in (a) of FIG. 5 , the method may include the following steps.

501-a,终端设备接收来自网络设备1的第一指示信息。501 - a , the terminal device receives first indication information from network device 1 .

相应地,网络设备1向终端设备发送第一指示信息。Correspondingly, the network device 1 sends the first indication information to the terminal device.

例如,终端设备位于网络设备1的覆盖范围时,该网络设备1向终端设备提供服务的情况下,该网络设备1向终端设备发送该第一指示信息。其中,该第一指示信息用于指示在终端设备离开网络设备1的覆盖范围又重新进入网络设备1的覆盖范围时,终端设备接入该网络设备1,或者,该第一指示信息用于指示该终端设备接入网络设备1,禁止接入除网络设备1之外的网络设备。For example, when the terminal device is within the coverage of network device 1 and network device 1 provides services to the terminal device, network device 1 sends the first indication information to the terminal device. The first indication information is used to instruct the terminal device to access network device 1 when the terminal device leaves the coverage of network device 1 and then re-enters the coverage of network device 1, or the first indication information is used to instruct the terminal device to access network device 1 and prohibit access to network devices other than network device 1.

502-a,终端设备从连接态变更为第一状态。502-a, the terminal device changes from the connected state to the first state.

应理解,在终端设备离开网络设备1的覆盖范围时,该终端设备从连接态变更为第一状态。It should be understood that when the terminal device leaves the coverage of the network device 1, the terminal device changes from the connected state to the first state.

作为一种示例,终端设备在第一时刻离开网络设备1的覆盖范围,该第一时刻可以是网络设备1指示给终端设备的。该第一时刻可以是网络设备1基于自身的移动轨迹以及终端设备的位置信息确定的,在该第一时刻,该网络设备1截止为终端设备提供服务。As an example, the terminal device leaves the coverage of network device 1 at a first moment, and the first moment may be indicated to the terminal device by network device 1. The first moment may be determined by network device 1 based on its own movement trajectory and the location information of the terminal device. At the first moment, the network device 1 stops providing services to the terminal device.

还应理解,该第一状态包括以下一项或者多项:终端设备的接入层AS挂起的连接态,挂起的空闲态,或者非激活态。It should also be understood that the first state includes one or more of the following: a suspended connection state, a suspended idle state, or an inactive state of the access layer AS of the terminal device.

[根据细则91更正 12.03.2025]
其中,终端设备的接入层AS挂起的连接态是一种特殊的连接态,在该终端设备的接入层AS挂起的连接态下,终端设备仍然保留终端设备的上下文信息。该终端设备的接入层AS挂起的连接态可以理解为,终端设备仍然停留在连接态且终端设备停止AS层所有的处理操作。例如,终端设备停止检测RLF,停止测量,停止监测Paging等等。
[Corrected 12.03.2025 in accordance with Article 91]
The terminal device's access layer AS suspended connection state is a special connection state in which the terminal device retains its context information. This state can be understood as the terminal device remaining in the connected state and halting all AS layer processing operations. For example, the terminal device stops detecting RLF, stopping measurements, and stopping paging monitoring.

其中,挂起的空闲态(IDLE with suspended)是一种特殊的空闲态,在挂起的空闲态下终端设备保留终端设备的上下文信息,不会释放终端设备的上下文信息。Among them, the idle state with suspended is a special idle state. In the idle state with suspended, the terminal device retains the context information of the terminal device and does not release the context information of the terminal device.

其中,终端设备在非激活态下,仍然保持对网络的监控,以便在需要时能够重新激活并与网络进行通信。Among them, the terminal device still keeps monitoring the network in the inactive state so that it can be reactivated and communicate with the network when needed.

还应理解,步骤502-a为可选步骤,图5中的(a)的其余步骤可以不依赖于步骤502-a存在。It should also be understood that step 502 - a is an optional step, and the remaining steps of (a) in FIG. 5 may not depend on the existence of step 502 - a.

503-a,终端设备向网络设备1发送第一请求信息。503 - a , the terminal device sends a first request message to the network device 1 .

相应地,网络设备1接收来自终端设备的第一请求信息。Correspondingly, the network device 1 receives the first request information from the terminal device.

例如,终端设备接收到来自网络设备1的第一请求信息,终端设备离开该网络设备1的覆盖范围,从连接态变更为第一状态之后,该终端设备重新进入该网络设备1的覆盖范围时,该终端设备向网络设备1发送用于请求接入网络设备1的第一请求信息。For example, the terminal device receives a first request message from network device 1, and the terminal device leaves the coverage of the network device 1 and changes from the connected state to the first state. When the terminal device re-enters the coverage of the network device 1, the terminal device sends a first request message to the network device 1 for requesting access to the network device 1.

如图5中的(b)所示,该方法可以包括如下步骤。As shown in (b) of FIG5 , the method may include the following steps.

501-b,终端设备接收来自网络设备1的第一信息。501 - b , the terminal device receives the first information from the network device 1 .

相应地,网络设备1向终端设备发送第一信息。Accordingly, the network device 1 sends the first information to the terminal device.

例如,终端设备位于网络设备1的覆盖范围时,该网络设备1向终端设备提供服务的情况下,该网络设备1向终端设备发送该第一信息。其中,该第一信息用于指示网络设备1。For example, when the terminal device is within the coverage of the network device 1 and the network device 1 provides services to the terminal device, the network device 1 sends the first information to the terminal device.

可选的,该第一信息包括用于指示网络设备1的可用区域的指示信息。可选的,该可用区域的范围可以小于网络设备1覆盖范围下的小区,或者说,该可用区域为网络设备1提供的小区中的一部分区域(例如:小区中心区域)。Optionally, the first information includes indication information for indicating an available area of the network device 1. Optionally, the range of the available area may be smaller than the cell under the coverage of the network device 1, or in other words, the available area is a part of the cell provided by the network device 1 (for example, the cell center area).

502-b,终端设备从连接态变更为第一状态。502-b, the terminal device changes from the connected state to the first state.

应理解,在终端设备离开网络设备1的覆盖范围时,该终端设备从连接态变更为第一状态。It should be understood that when the terminal device leaves the coverage of the network device 1, the terminal device changes from the connected state to the first state.

还应理解,步骤502-b为可选步骤,图5中的(b)的其余步骤可以不依赖于步骤502-b存在。It should also be understood that step 502 - b is an optional step, and the remaining steps of (b) in FIG. 5 may not depend on the existence of step 502 - b.

503-b,终端设备向网络设备1发送第一请求信息。503 - b , the terminal device sends a first request message to the network device 1 .

相应地,网络设备1接收来自终端设备的第一请求信息。Correspondingly, the network device 1 receives the first request information from the terminal device.

例如,终端设备位于网络设备1的可用区域时,该终端设备根据第一信息,向网络设备1发送第一请求信息,该第一请求信息用于请求接入网络设备1。For example, when the terminal device is located in the available area of the network device 1 , the terminal device sends first request information to the network device 1 according to the first information, where the first request information is used to request access to the network device 1 .

应理解,终端设备位于网络设备1指示的可用区域,该终端设备执行步骤503-b向网络设备1发送第一请求信息为例进行介绍。当然,假设终端设备不位于网络设备1指示的可用区域,终端设备位于其他网络设备(例如网络设备2)的覆盖范围时,该终端设备可以向网络设备2发送第一请求信息,如步骤503-b’所示:It should be understood that the terminal device is located in the available area indicated by network device 1, and the terminal device executes step 503-b to send the first request information to network device 1. Of course, assuming that the terminal device is not located in the available area indicated by network device 1, and the terminal device is within the coverage of another network device (for example, network device 2), the terminal device can send the first request information to network device 2, as shown in step 503-b':

503-b’,终端设备向网络设备2发送第一请求信息。503-b’, the terminal device sends a first request message to the network device 2.

相应地,网络设备2接收来自终端设备的第一请求信息。Correspondingly, the network device 2 receives the first request information from the terminal device.

其中,终端设备位于网络设备2的覆盖区域。The terminal device is located in the coverage area of the network device 2.

应理解,假设终端设备不位于网络设备1指示的可用区域,终端设备位于其他网络设备(例如网络设备2)的覆盖区域时,该终端设备可以向网络设备2发送第一请求信息。其中,终端设备根据第一信息,确定终端设备不在网络设备1指示的可用区域时,终端设备可以选择其他覆盖终端设备的网络设备请求接入,具体地,终端设备如何从覆盖终端设备的网络设备中选择一个网络设备请求接入的具体过程,本申请不做限定。例如,终端设备可以选择任意一个覆盖终端设备的网络设备请求接入。It should be understood that, assuming that the terminal device is not located in the available area indicated by network device 1, and the terminal device is located in the coverage area of another network device (e.g., network device 2), the terminal device can send a first request message to network device 2. When the terminal device determines, based on the first information, that the terminal device is not in the available area indicated by network device 1, the terminal device can select another network device that covers the terminal device to request access. Specifically, this application does not limit the specific process of how the terminal device selects a network device from the network devices that cover the terminal device to request access. For example, the terminal device can select any network device that covers the terminal device to request access.

应理解,在上述图5中的(a)所示的方法和图5中的(b)所示的方法中,网络设备1通过第一指示信息指示终端设备接入网络设备1,或者网络设备1通过只包括第一网络设备的第一信息指示终端设备接入网络设备1,该网络设备1具有该终端设备的上下文信息,从而避免由于网络设备1的移动导致终端设备的服务网络设备发生变化,节省了网络设备1转发终端设备的上下文信息的资源开销。同时,终端设备离开网络设备1的覆盖范围时,该终端设备从连接态进入第一状态,在第一状态时,该终端设备保留该终端设备的上下文信息,从而后续使终端设备能够正确的接入网络设备,保证了终端设备与网络之间的安全通信。It should be understood that in the method shown in (a) of FIG. 5 and the method shown in (b) of FIG. 5 , network device 1 instructs the terminal device to access network device 1 through the first indication information, or network device 1 instructs the terminal device to access network device 1 through the first information including only the first network device. The network device 1 has the context information of the terminal device, thereby avoiding the change of the service network device of the terminal device due to the movement of network device 1, saving the resource overhead of network device 1 forwarding the context information of the terminal device. At the same time, when the terminal device leaves the coverage of network device 1, the terminal device enters the first state from the connected state. In the first state, the terminal device retains the context information of the terminal device, so that the terminal device can correctly access the network device later, ensuring secure communication between the terminal device and the network.

图6是本申请实施例提供的另一种通信方法的流程性示意图。FIG6 is a flow chart of another communication method provided in an embodiment of the present application.

应理解,图6所示的方法中,第一网络设备以网络设备1为例,至少一个第三网络设备分别以网络设备2和网络设备3为例,其中,网络设备2可以作为至少一个第三网络设备中的第二网络设备,网络设备3可以作为至少一个第三网络设备中除第二网络设备的其他网络设备为例,该网络设备1,网络设备2和网络设备3均为非地面网络设备,例如,该网络设备1,网络设备2,网络设备3分别为卫星或者无人机,本申请均不限定。如图6所示,该方法可以包括如下步骤。It should be understood that in the method shown in FIG6, the first network device is network device 1 as an example, and the at least one third network device is network device 2 and network device 3 as examples, wherein network device 2 can be used as the second network device in the at least one third network device, and network device 3 can be used as an example of other network devices other than the second network device in the at least one third network device. The network devices 1, 2, and 3 are all non-terrestrial network devices. For example, the network devices 1, 2, and 3 are respectively satellites or drones, which are not limited in this application. As shown in FIG6, the method may include the following steps.

601,网络设备1向终端设备发送T_service信息。601. Network device 1 sends T_service information to terminal device.

相应地,终端设备接收来自网络设备1的T_service信息。Correspondingly, the terminal device receives T_service information from the network device 1 .

应理解,网络设备1是为终端设备提供服务的源服务网络设备。由于网络设备1的移动性,导致在某一时刻终端设备不属于网络设备1的覆盖范围,即网络设备1在该时刻无法为终端设备提供服务。其中,T_service信息指示的时间(例如第一时刻)是终端设备1离开网络设备1的覆盖范围内的时间,或者可以理解为,T_service信息指示的第一时刻是网络设备1不再为终端设备提供服务的时间,或者还可以理解为,T_service信息指示的第一时刻是网络设备1为终端设备提供服务的截止时间。It should be understood that network device 1 is a source service network device that provides services to terminal devices. Due to the mobility of network device 1, the terminal device is not within the coverage of network device 1 at a certain moment, that is, network device 1 cannot provide services to the terminal device at that moment. The time indicated by the T_service information (for example, the first moment) is the time when the terminal device 1 leaves the coverage of network device 1, or it can be understood that the first moment indicated by the T_service information is the time when the network device 1 no longer provides services to the terminal device, or it can also be understood that the first moment indicated by the T_service information is the deadline for the network device 1 to provide services to the terminal device.

还应理解,该步骤601为可选步骤。网络设备1可以不向终端设备单独指示该t_service信息,该终端设备在确定不属于该网络设备1的覆盖范围,或者该终端设备无法连接到该网络设备1时,该终端设备更新自身的状态即可。It should also be understood that step 601 is optional. The network device 1 may not separately indicate the t_service information to the terminal device. When the terminal device determines that it is not within the coverage of the network device 1 or that it cannot connect to the network device 1, the terminal device can simply update its own status.

602,网络设备1向终端设备发送第一信息。602. Network device 1 sends first information to the terminal device.

相应地,终端设备接收来自网络设备1的第一信息。Accordingly, the terminal device receives the first information from the network device 1 .

应理解,该第一信息包括1个或者多个网络设备(例如至少一个第三网络设备),该至少一个第三网络设备是为终端设备提供服务的潜在目标网络设备。例如,该至少一个第三网络设备包括网络设备2和网络设备3。It should be understood that the first information includes one or more network devices (e.g., at least one third network device), and the at least one third network device is a potential target network device that provides services to the terminal device. For example, the at least one third network device includes network device 2 and network device 3.

在一种可能实现的方式中,第一信息包括以下一项或者多项:网络设备2的星历信息,网络设备3的星历信息,网络设备2连接至地面信关站的时间信息,网络设备3连接至地面信关站的时间信息,网络设备2连接至地面信关站的位置信息,或者,网络设备3连接至地面信关站的位置信息。In one possible implementation, the first information includes one or more of the following: ephemeris information of network device 2, ephemeris information of network device 3, time information when network device 2 is connected to a ground gateway, time information when network device 3 is connected to a ground gateway, location information when network device 2 is connected to a ground gateway, or location information when network device 3 is connected to a ground gateway.

在另一种可能实现的方式中,该第一信息还包括:用于指示网络设备2的可用区域的指示信息,和/或,用于指示网络设备3的可用区域的指示信息。In another possible implementation manner, the first information further includes: indication information for indicating the available area of the network device 2, and/or indication information for indicating the available area of the network device 3.

应理解,本申请对步骤602和步骤601的执行顺序不做限定,例如,步骤601在步骤602之前执行,或者步骤602在步骤601之后执行,或者步骤601与步骤602可以同时执行。其中,在步骤601与步骤602可以同时执行时,该网络设备1发送的T_service信息和第一信息可以在承载在同一条消息中传输,或者承载在不同的消息中传输,对此本申请不做限定。It should be understood that the present application does not limit the order in which step 602 and step 601 are executed. For example, step 601 may be executed before step 602, or step 602 may be executed after step 601, or step 601 and step 602 may be executed simultaneously. When step 601 and step 602 can be executed simultaneously, the T_service information and the first information sent by the network device 1 may be carried in the same message or in different messages, and this application does not limit this.

603,终端设备从连接态变更为第一状态。603. The terminal device changes from the connected state to the first state.

例如,终端设备接收到来自网络设备1的T_service信息,在该T_service信息指示的时刻(例如第一时刻)达到之后,该终端设备从连接态变更为第一状态;或者,终端设备确定离开网络设备1的覆盖范围时,该终端设备从连接态变更为第一状态。For example, the terminal device receives T_service information from network device 1. After the moment indicated by the T_service information (for example, the first moment) is reached, the terminal device changes from the connected state to the first state; or, when the terminal device determines that it has left the coverage of network device 1, the terminal device changes from the connected state to the first state.

其中,该第一状态包括以下任意一项:终端设备的接入层挂起的连接态,特殊的空闲态(例如挂起的空闲态),非激活态,或者空闲态。The first state includes any one of the following: an access layer suspended connection state of the terminal device, a special idle state (such as a suspended idle state), an inactive state, or an idle state.

[根据细则91更正 12.03.2025]
应理解,在第一状态为终端设备的接入层挂起的连接态的情况下,该终端设备离开网络设备1的覆盖范围时,终端设备从连接态变更为接入层挂起的连接态。终端设备停止接入层的动作,例如,终端设备停止检测RLF、停止测量、停止监测paging等等。可选的,终端设备可以停止接入层所有的动作。终端设备保留终端设备的上下文信息,便于后续正确接入新的网络设备。
[Corrected 12.03.2025 in accordance with Article 91]
It should be understood that if the first state is the access layer suspended connection state of the terminal device, when the terminal device leaves the coverage area of network device 1, the terminal device changes from the connected state to the access layer suspended connection state. The terminal device stops access layer operations, for example, the terminal device stops detecting RLF, stops measuring, stops monitoring paging, etc. Optionally, the terminal device can stop all access layer operations. The terminal device retains the terminal device's context information to facilitate subsequent correct access to a new network device.

应理解,在第一状态为特殊的空闲态,或者非激活态情况下,该特殊的空闲态可以是挂起的空闲态(例如,IDLE with suspended),终端设备从连接态变更为挂起的空闲态,或者非激活态时,该终端设备保留终端设备的上下文信息,便于后续正确接入新的网络设备。It should be understood that when the first state is a special idle state or an inactive state, the special idle state may be a suspended idle state (for example, IDLE with suspended). When the terminal device changes from a connected state to a suspended idle state or an inactive state, the terminal device retains the context information of the terminal device to facilitate subsequent correct access to a new network device.

应理解,步骤603中是在终端设备离开网络设备1的覆盖范围的情况下,终端设备状态上的变更,可以看作是终端设备的内部实现操作。在具体实现过程,该步骤603可以不体现在实际操作中。It should be understood that the change in the terminal device state in step 603 when the terminal device leaves the coverage of the network device 1 can be regarded as an internal implementation operation of the terminal device. In the specific implementation process, step 603 may not be reflected in the actual operation.

604,网络设备1向核心网设备发送第二信息。604. Network device 1 sends second information to the core network device.

相应地,核心网设备接收来自网络设备1的第二信息。Correspondingly, the core network device receives the second information from the network device 1 .

例如,在网络设备1覆盖到地面信关站时,该网络设备1通过地面信关站向核心网设备发送第二信息。其中,该第二信息中包括终端设备的第一上下文信息,该终端设备的第一上下文信息包括该UE的标识信息。For example, when network device 1 covers a terrestrial gateway, network device 1 sends second information to the core network device through the terrestrial gateway, wherein the second information includes first context information of the terminal device, and the first context information of the terminal device includes identification information of the UE.

可选的,该第二信息中还可以包括网络设备2的标识信息和网络设备3的标识信息。Optionally, the second information may further include identification information of network device 2 and identification information of network device 3.

在一种可能实现的方式中,在该网络设备1具有未被使用过的NH的情况下,该终端设备的第一上下文信息包括密钥#1和NCC,该密钥#1是该网络设备1根据该未被使用过的NH确定的,具体确定方法与上述2)切换场景中KeNB的更新中的KeNB*的确定方法(例如垂直派生)类似,具体请参见上述详细介绍。In one possible implementation, when the network device 1 has an unused NH, the first context information of the terminal device includes key #1 and NCC. The key #1 is determined by the network device 1 based on the unused NH. The specific determination method is similar to the determination method of KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation). Please refer to the above detailed description for details.

在另一种可能实现的方式中,在该网络设备1不具有未被使用过的NH的情况下,该终端设备的第一上下文信息包括第二指示信息,该第二指示信息用于指示核心网设备确定NH和NCC。In another possible implementation, when the network device 1 does not have an unused NH, the first context information of the terminal device includes second indication information, and the second indication information is used to instruct the core network device to determine the NH and the NCC.

在又一种可能实现的方式中,在该网络设备1不具有未被使用过的NH的情况下,该终端设备的第一上下文信息中不包括密钥#1,NCC和第二指示信息。In another possible implementation, when the network device 1 does not have an unused NH, the first context information of the terminal device does not include the key #1, the NCC and the second indication information.

605,核心网设备向网络设备2和网络设备3发送终端设备的第二上下文信息。605 , the core network device sends the second context information of the terminal device to network device 2 and network device 3 .

相应地,网络设备2,网络设备3接收来自核心网设备的终端设备的第二上下文信息。Correspondingly, network device 2 and network device 3 receive the second context information of the terminal device from the core network device.

例如,核心网设备接收到来自网络设备1的终端设备的第一上下文信息,核心网设备根据终端设备的第一上下文信息,向网络设备2,网络设备3发送终端设备的第二上下文信息。该终端设备的第二上下文信息包括终端设备的标识信息和NCC,以及密钥#1或者NH。For example, the core network device receives the first context information of the terminal device from network device 1. Based on the first context information of the terminal device, the core network device sends the second context information of the terminal device to network devices 2 and 3. The second context information of the terminal device includes the identification information and NCC of the terminal device, as well as key #1 or NH.

在一种可能实现的方式中,当终端设备的第一上下文信息包括密钥#1和NCC时,核心网设备将终端设备的第一上下文信息通过终端设备的第二上下文信息转发给网络设备2和网络设备3。其中,终端设备的第二上下文信息包括密钥#1和NCC。In one possible implementation, when the first context information of the terminal device includes key #1 and NCC, the core network device forwards the first context information of the terminal device to network device 2 and network device 3 via the second context information of the terminal device. The second context information of the terminal device includes key #1 and NCC.

在另一种可能实现的方式中,当终端设备的第一上下文信息包括第二指示信息时,核心网设备根据第二指示信息生成NH和NCC,并向网络设备2和网络设备3发送携带NH和NCC的终端设备的第二上下文信息。In another possible implementation, when the first context information of the terminal device includes second indication information, the core network device generates NH and NCC according to the second indication information, and sends the second context information of the terminal device carrying NH and NCC to network device 2 and network device 3.

在又一种可能实现的方式中,当终端设备的第一上下文信息不包括密钥#1,NCC和第二指示信息时,该核心网设备生成NH和NCC,并向网络设备2和网络设备3发送携带NH和NCC的终端设备的第二上下文信息。In another possible implementation, when the first context information of the terminal device does not include key #1, NCC and second indication information, the core network device generates NH and NCC, and sends the second context information of the terminal device carrying NH and NCC to network device 2 and network device 3.

应理解,核心网设备向网络设备2和网络设备3发送终端设备的第二上下文信息,该终端设备的第二上下文信息承载在同一条消息中同时发送给网络设备2和网络设备3,或者,该终端设备的第二上下文信息分别承载在不同的消息中,先后发送给网络设备2和网络设备3,对此本申请不做限定。It should be understood that the core network device sends the second context information of the terminal device to network device 2 and network device 3, and the second context information of the terminal device is carried in the same message and sent to network device 2 and network device 3 at the same time, or the second context information of the terminal device is carried in different messages and sent to network device 2 and network device 3 successively. This application does not limit this.

还应理解,核心网设备向网络设备2,网络设备3发送终端设备的第二上下文信息时,该核心网设备分别在网络设备2,网络设备3的覆盖区域内,核心网设备与网络设备2,网络设备3能够进行无线通信。例如,网络设备2移动到覆盖地面信关站时,该核心网设备通过地面信关站向网络设备2发送终端设备的第二上下文信息。It should also be understood that when the core network device sends the second context information of the terminal device to network device 2 and network device 3, the core network device is within the coverage area of network device 2 and network device 3, respectively, and the core network device can wirelessly communicate with network device 2 and network device 3. For example, when network device 2 moves to a covered ground gateway, the core network device sends the second context information of the terminal device to network device 2 via the ground gateway.

606,网络设备2,网络设备3向终端设备发送用于指示网络设备2的可用区域的指示信息,用于指示网络设备3的可用区域的指示信息。606 , network device 2 and network device 3 send indication information for indicating the available area of network device 2 and indication information for indicating the available area of network device 3 to the terminal device.

相应地,终端设备分别接受来自网络设备2,网络设备3的用于指示各自网络设备的可用区域的指示信息。Correspondingly, the terminal device receives indication information from network device 2 and network device 3 respectively, which is used to indicate the available areas of the respective network devices.

应理解,以网络设备2为例,网络设备2可以在系统消息中广播用于指示网络设备2的可用区域的指示信息,在终端设备进入网络设备2的覆盖区域时,该终端设备可以接收到用于指示网络设备2的可用区域的指示信息。例如,该系统消息可以是主系统信息块(master information block,MIB),或者系统信息块(system information block,SIB)。It should be understood that, taking network device 2 as an example, network device 2 may broadcast indication information indicating the available area of network device 2 in a system message. When a terminal device enters the coverage area of network device 2, the terminal device may receive the indication information indicating the available area of network device 2. For example, the system message may be a master information block (MIB) or a system information block (SIB).

还应理解,网络设备2,网络设备3向终端设备发送用于指示网络设备2的可用区域的指示信息,用于指示网络设备3的可用区域的指示信息,为可选步骤。在步骤602中的第一信息中包括用于指示网络设备2的可用区域的指示信息,用于指示网络设备3的可用区域的指示信息时,无需再执行步骤606。It should also be understood that network device 2 and network device 3 sending indication information indicating the available area of network device 2 and the available area of network device 3 to the terminal device is an optional step. If the first information in step 602 includes indication information indicating the available area of network device 2 and the available area of network device 3, step 606 does not need to be performed.

607,终端设备向网络设备2发送第一请求信息。607 , the terminal device sends first request information to the network device 2 .

相应地,网络设备2接收来自终端设备的第一请求信息。其中,该第一请求信息包括终端设备的标识信息。Correspondingly, the network device 2 receives the first request information from the terminal device, wherein the first request information includes the identification information of the terminal device.

例如,终端设备基于某一规则,或者某一预设条件选择网络设备2作为为终端设备提供服务的目标网络设备。其中,该某一规则,某一预设条件可以是系统预定的,或者协议预配置的,或者终端设备自身确定的本申请不做限定。For example, the terminal device selects network device 2 as the target network device for providing services to the terminal device based on a certain rule or a certain preset condition. The certain rule or the certain preset condition may be predetermined by the system, pre-configured by the protocol, or determined by the terminal device itself, which is not limited in this application.

假设,终端设备基于多个网络设备(例如网络设备2,网络设备3)的可用区域,选择网络设备2作为目标网络设备,并向网络设备2发送用于请求接入网络设备2的第一请求信息。Assume that the terminal device selects network device 2 as the target network device based on the available areas of multiple network devices (eg, network device 2 and network device 3), and sends first request information for requesting access to network device 2 to network device 2.

又假设,终端设备根据接收到的第一信息中指示的网络设备(例如网络设备2,网络设备3)的星历信息、连接至信关站的位置信息,时间信息等参数,分别确定网络设备2,网络设备3的传输时延,选择时延最小的网络设备(例如网络设备2)作为目标网络设备,并向网络设备2发送用于请求接入网络设备2的第一请求信息。It is also assumed that the terminal device determines the transmission delays of network device 2 and network device 3 respectively based on the ephemeris information of the network device (e.g., network device 2, network device 3) indicated in the received first information, the location information connected to the gateway station, the time information and other parameters, selects the network device with the smallest delay (e.g., network device 2) as the target network device, and sends a first request information to network device 2 for requesting access to network device 2.

在一种可能实现的方式中,该第一请求信息可以是RRC重建立的请求信息(例如RRC connection reestablishment request),或者RRC恢复连接的请求信息。其中,当第一请求信息为RRC重建立的请求信息时,该第一请求信息还可以包括用于指示重建立的原因值,该原因值可以为“otherfailure”,或者,该原因值可以是终端设备接入网络设备2的相关原因值,该原因值与S&F场景相关。当第一请求信息为RRC恢复建立的请求信息(例如RRC connection resume request)时,该第一请求信息还可以包括用于指示恢复建立的原因值,该原因值可以为“delayTolerantAccess-v1020”,或者,该原因值可以是终端设备接入网络设备2的相关原因值,该原因值与S&F场景相关。在一种实现的方式中,当第一状态为接入层挂起的连接态时,该第一请求消息可以是RRC重建立的请求信息,当第一状态为特殊的空闲态或非激活态时,该第一请求消息可以是RRC恢复建立的请求信息。In one possible implementation, the first request information may be a request information for RRC re-establishment (e.g., RRC connection reestablishment request) or a request information for RRC connection resumption. When the first request information is a request information for RRC re-establishment, the first request information may further include a cause value for indicating re-establishment, and the cause value may be "other failure", or the cause value may be a cause value related to the terminal device accessing the network device 2, and the cause value is related to the S&F scenario. When the first request information is a request information for RRC resumption (e.g., RRC connection resume request), the first request information may further include a cause value for indicating resumption, and the cause value may be "delayTolerantAccess-v1020", or the cause value may be a cause value related to the terminal device accessing the network device 2, and the cause value is related to the S&F scenario. In one implementation, when the first state is a connection state suspended by the access layer, the first request message may be a request message for RRC re-establishment; when the first state is a special idle state or inactive state, the first request message may be a request message for RRC recovery establishment.

应理解,终端设备的标识信息包括:终端设备在第一小区内的小区无线网络临时标识C-RNTI,其中,该第一小区为网络设备1覆盖范围内为终端设备提供服务的小区。该第一小区或者还可以称为为终端设备提供服务的源服务小区。可选的,终端设备的标识信息还可以包括以下一项或者多项:第一小区的物理小区标识PCI,终端设备的位置信息,第一网络设备的标识信息,或者,第一小区的标识信息。It should be understood that the identification information of the terminal device includes: the cell radio network temporary identifier C-RNTI of the terminal device in the first cell, wherein the first cell is a cell providing services to the terminal device within the coverage of the network device 1. The first cell may also be referred to as a source service cell providing services to the terminal device. Optionally, the identification information of the terminal device may also include one or more of the following: the physical cell identifier PCI of the first cell, the location information of the terminal device, the identification information of the first network device, or the identification information of the first cell.

608,网络设备2向终端设备发送第一应答信息。608. Network device 2 sends first response information to the terminal device.

相应地,终端设备接收来自网络设备2的第一应答信息。Correspondingly, the terminal device receives the first response information from the network device 2 .

例如,网络设备2接收到来自终端设备的第一请求信息之后,网络设备2根据第一请求信息中的终端设备的标识信息,与在步骤605中接收到的终端设备的第二上下文信息中的终端设备的标识信息,对该终端设备进行认证(或者称为鉴权)。其中,网络设备2对终端设备认证成功,确定该终端设备为合法设备时,该网络设备2向终端设备发送第一应答信息,该第一应答信息用于响应第一请求信息。For example, after network device 2 receives the first request information from the terminal device, network device 2 authenticates (or authorizes) the terminal device based on the terminal device identification information in the first request information and the terminal device identification information in the second context information of the terminal device received in step 605. When network device 2 successfully authenticates the terminal device and determines that the terminal device is a legitimate device, network device 2 sends a first response information to the terminal device, where the first response information is used to respond to the first request information.

应理解,网络设备2确定该终端设备为合法设备时,该网络设备2接受该终端设备的接入,该网络设备2向终端设备发送该第一应答信息,该第一应答信息包括NCC,该NCC是网络设备2接收来自核心网设备的终端设备的第二上下文信息中的NCC,该NCC可以来自网络设备1,或者该NCC是核心网设备确定的,对此本申请不做限定。It should be understood that when network device 2 determines that the terminal device is a legal device, the network device 2 accepts the access of the terminal device, and the network device 2 sends the first response information to the terminal device. The first response information includes NCC, which is the NCC in the second context information of the terminal device received by network device 2 from the core network device. The NCC can come from network device 1, or the NCC is determined by the core network device. This application does not limit this.

还应理解,网络设备2确定该终端设备不是合法设备时,无需执行步骤608以及后续步骤。It should also be understood that when the network device 2 determines that the terminal device is not a legitimate device, there is no need to perform step 608 and subsequent steps.

609,终端设备与网络设备2进行安全通信。609 , the terminal device communicates securely with the network device 2 .

应理解,终端设备接收来自网络设备2的第一应答信息之后,该终端设备根据该第一应答信息中的NCC确定与网络设备2进行安全通信的密钥(例如密钥#1),网络设备2确定的密钥#1可以是来自网络设备1确定的,或者网络设备2根据核心网确定的NH和NCC确定的密钥#1。It should be understood that after the terminal device receives the first response information from network device 2, the terminal device determines the key (for example, key #1) for secure communication with network device 2 based on the NCC in the first response information. The key #1 determined by network device 2 can be the key #1 determined by network device 1, or the key #1 determined by network device 2 based on the NH determined by the core network and the NCC.

还应理解,终端设备基于NCC确定密钥#1,以及网络设备2根据NCC确定密钥#1的具体方法与上述2)切换场景中KeNB的更新中的KeNB*的确定方法(例如垂直派生)类似,具体请参见上述详细介绍,此处不再赘述。It should also be understood that the specific method by which the terminal device determines key #1 based on the NCC, and the network device 2 determines key #1 based on the NCC, is similar to the method for determining KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (e.g., vertical derivation). For details, please refer to the above detailed introduction and will not be repeated here.

还应理解,终端设备与网络设备2之间采用密钥#1进行安全通信。It should also be understood that key #1 is used for secure communication between the terminal device and the network device 2.

610,网络设备2向核心网设备发送第三指示信息。610. Network device 2 sends third indication information to the core network device.

相应地,核心网设备接收来自网络设备2的第三指示信息。Correspondingly, the core network device receives the third indication information from the network device 2 .

例如,网络设备2在确定终端设备已经成功接入网络设备2的情况下,该网络设备2可以向核心网设备发送第三指示信息,该第三指示信息用于指示终端设备成功接入第二网络设备。该第三指示信息包括终端设备的标识信息,例如:终端设备的NG接口应用层协议标识信息(UE NGapplication protocol identifier,UE NGAP ID)。该第三指示信息还可以包括网络设备3的标识信息,例如:网络设备3的eNB ID、或网络设备3的卫星标识、或网络设备3的IP地址。可选的,若该第三指示信息包括网络设备3的标识信息,则终端设备的标识信息可以使用该终端设备在网络设备3下的标识信息,例如:C-RNTI。该方法使核心网设备无需对终端设备的标识进行修改,该核心网设备只需获取该网络设备3的标识信息,即可通过携带网络设备3可识别的该终端设备的标识信息,向网络设备3指示该终端设备。For example, if network device 2 determines that the terminal device has successfully accessed network device 2, network device 2 may send third indication information to the core network device, where the third indication information is used to indicate that the terminal device has successfully accessed the second network device. The third indication information includes identification information of the terminal device, such as the NG interface application layer protocol identifier (UE NGAP ID) of the terminal device. The third indication information may also include identification information of network device 3, such as the eNB ID of network device 3, the satellite identifier of network device 3, or the IP address of network device 3. Optionally, if the third indication information includes identification information of network device 3, the identification information of the terminal device may use the identification information of the terminal device under network device 3, such as the C-RNTI. This method eliminates the need for the core network device to modify the identification of the terminal device. The core network device only needs to obtain the identification information of network device 3 and can indicate the terminal device to network device 3 by carrying the identification information of the terminal device that is recognizable by network device 3.

611,核心网设备向网络设备3发送释放指示信息。611. The core network device sends release indication information to network device 3.

相应地,网络设备3接收来自核心网设备的释放指示信息。Correspondingly, the network device 3 receives the release indication information from the core network device.

例如,核心网设备接收到来自网络设备2的第三指示信息之后,该核心网设备根据第三指示信息确定终端设备成功接入网络设备2,核心网设备确定向网络设备3发送释放指示信息,该释放指示信息用于指示释放终端设备的第二上下文信息。其中,释放指示信息包括终端设备的标识信息,例如:终端设备的UE NGAP ID,或终端设备在网络设备3下的C-RNTI。For example, after the core network device receives the third indication information from network device 2, the core network device determines, based on the third indication information, that the terminal device has successfully accessed network device 2. The core network device then determines to send release indication information to network device 3, where the release indication information is used to instruct the release of the second context information of the terminal device. The release indication information includes identification information of the terminal device, such as the UE NGAP ID of the terminal device or the C-RNTI of the terminal device under network device 3.

还应理解,核心网设备接收来自网络设备2的第三指示信息之后,该核心网设备可以根据步骤604中的第二信息中包括的至少一个第三网络设备的标识信息确定至少一个第三网络设备,并向该至少一个第三网络设备中除网络设备2之外的其他网络设备(例如网络设备3)发送该释放指示信息。相应地,网络设备3接收到来自核心网设备的释放指示信息之后,根据释放指示信息中的终端设备的标识信息,释放该终端设备的上下文信息。It should also be understood that after the core network device receives the third indication information from network device 2, the core network device can determine at least one third network device based on the identification information of the at least one third network device included in the second information in step 604, and send the release indication information to other network devices (e.g., network device 3) among the at least one third network device except network device 2. Correspondingly, after network device 3 receives the release indication information from the core network device, it releases the context information of the terminal device based on the identification information of the terminal device in the release indication information.

根据上述图6所示的方法,终端设备离开网络设备1的覆盖范围时,即为终端设备提供服务的源网络设备(例如网络设备1)不再为终端设备提供服务时,该终端设备从连接态变更为第一状态,终端设备在第一状态能够保留终端设备的上下文信息,便于正确的接入新的为终端设备(例如网络设备2)提供服务的目标网络设备。同时,网络设备1在覆盖信关站的情况下,将终端设备的第一上下文信息通过核心网设备转发给第一信息中的潜在目标网络设备,便于后续终端设备向目标网络设备发起请求时,能够准确且快速的接入,保证终端设备与网络之间的正常通信。另外,在终端设备接入新的网络设备(例如网络设备2)的情况下,该网络设备2向核心网设备发送第三指示信息,用于指示终端设备成功接入网络设备2,核心网设备向第一信息中的其他网络设备发送用于指示释放终端设备上下文信息的释放指示信息,节省其他网络设备的资源开销。According to the method shown in Figure 6 above, when the terminal device leaves the coverage of the network device 1, that is, when the source network device that provides services to the terminal device (such as network device 1) no longer provides services to the terminal device, the terminal device changes from the connected state to the first state. The terminal device can retain the context information of the terminal device in the first state, so as to facilitate correct access to the new target network device that provides services to the terminal device (such as network device 2). At the same time, when the network device 1 covers the gateway, it forwards the first context information of the terminal device to the potential target network device in the first information through the core network device, so that when the subsequent terminal device initiates a request to the target network device, it can access accurately and quickly, thereby ensuring normal communication between the terminal device and the network. In addition, when the terminal device accesses a new network device (such as network device 2), the network device 2 sends a third indication message to the core network device to indicate that the terminal device has successfully accessed network device 2, and the core network device sends a release indication message to other network devices in the first information to indicate the release of the terminal device context information, thereby saving resource overhead of other network devices.

基于上述图6所示的方法,终端设备离开网络设备1的覆盖范围时,该终端设备从连接态变更为第一状态。其中,该第一状态还可以包括空闲态。在第一状态为空闲态的情况下,该终端设备离开网络设备1的覆盖范围时,终端设备还可以释放终端设备的上下文信息,进入空闲态。待后续终端设备进入网络设备(例如网络设备2)的覆盖范围内时,该终端设备选择网络设备2发起初始接入流程,相应地,终端设备与网络设备2根据初始接入场景中的密钥获取的方式,采用根据根密钥Kasme派生出的密钥进行加密通信。其中,在初始接入场景中终端设备与网络设备2的密钥获取,与上述1)初始接入场景中的终端设备与基站获取KeNB的获取类似,终端设备根据根密钥Kasme派生得到KeNB,基站接收来自MME根据根密钥Kasme派生得到KeNB,终端设备与基站采用KeNB进行加密通信,具体请参见上述详细介绍,此处不再赘述。Based on the method shown in Figure 6 above, when the terminal device leaves the coverage of network device 1, the terminal device changes from a connected state to a first state. Wherein, the first state may also include an idle state. When the first state is an idle state, when the terminal device leaves the coverage of network device 1, the terminal device may also release the context information of the terminal device and enter an idle state. When the subsequent terminal device enters the coverage of a network device (such as network device 2), the terminal device selects network device 2 to initiate an initial access process. Accordingly, the terminal device and network device 2 use a key derived from the root key Kasme for encrypted communication according to the key acquisition method in the initial access scenario. Wherein, the key acquisition between the terminal device and network device 2 in the initial access scenario is similar to the acquisition of KeNB by the terminal device and the base station in the above 1) initial access scenario. The terminal device derives KeNB based on the root key Kasme, and the base station receives KeNB derived from the root key Kasme from the MME. The terminal device and the base station use KeNB for encrypted communication. Please refer to the above detailed introduction for details, which will not be repeated here.

图7是本申请实施例提供的另一种通信方法得流程性示意图。FIG7 is a flow chart of another communication method provided in an embodiment of the present application.

应理解,图7所示的方法中,第一网络设备以网络设备1为例,至少一个第三网络设备分别以网络设备2和网络设备3为例,其中,网络设备2可以作为至少一个第三网络设备中的第二网络设备,网络设备3可以作为至少一个第三网络设备中除第二网络设备的其他网络设备为例,该网络设备1,网络设备2和网络设备3均为非地面网络设备,例如,该网络设备1,网络设备2,网络设备3分别为卫星或者无人机,本申请均不限定。如图7所示,该方法可以包括如下步骤。It should be understood that in the method shown in FIG7 , the first network device is network device 1, and the at least one third network device is network device 2 and network device 3, respectively. Network device 2 can be used as the second network device in the at least one third network device, and network device 3 can be used as an example of the other network devices in the at least one third network device except the second network device. Network device 1, network device 2, and network device 3 are all non-terrestrial network devices. For example, network device 1, network device 2, and network device 3 are respectively satellites or drones, which are not limited in this application. As shown in FIG7 , the method may include the following steps.

701,网络设备1向终端设备发送T_service信息。701. Network device 1 sends T_service information to terminal device.

相应地,终端设备接收来自网络设备1的T_service信息。Correspondingly, the terminal device receives T_service information from the network device 1 .

702,网络设备1向终端设备发送第一信息。702. Network device 1 sends first information to the terminal device.

相应地,终端设备接收来自网络设备1的第一信息。Accordingly, the terminal device receives the first information from the network device 1 .

703,终端设备从连接态变更为第一状态。703. The terminal device changes from the connected state to the first state.

例如,终端设备接收到来自网络设备1的T_service信息,在该T_service信息指示的时刻(例如第一时刻)达到之后,该终端设备从连接态变更为第一状态。For example, the terminal device receives T_service information from the network device 1. After the time indicated by the T_service information (eg, the first time) is reached, the terminal device changes from the connected state to the first state.

应理解,上述步骤701至步骤703与上述图6中的步骤601至步骤603类似,具体请参见上述步骤601至步骤603中的详细介绍。It should be understood that the above steps 701 to 703 are similar to steps 601 to 603 in FIG. 6 . For details, please refer to the detailed description of steps 601 to 603 .

704,终端设备向网络设备2发送第一请求信息。704 , the terminal device sends first request information to the network device 2 .

相应地,网络设备2接收来自终端设备的第一请求信息。Correspondingly, the network device 2 receives the first request information from the terminal device.

例如,在网络设备2覆盖终端设备的情况下,该终端设备向网络设备2发送第一请求信息,该第一请求信息用于请求接入网络设备2。For example, when the network device 2 covers the terminal device, the terminal device sends first request information to the network device 2 , where the first request information is used to request access to the network device 2 .

在一种可能实现的方式中,终端设备可以根据某一规则,或者某一预设条件从多个网络设备中选择网络设备2,并向网络设备2发送第一请求信息。In a possible implementation, the terminal device may select network device 2 from multiple network devices according to a certain rule or a certain preset condition, and send the first request information to network device 2.

应理解,该某一规则,某一条件可以是系统预定的,或者协议预配置的,或者终端设备自身确定的本申请不做限定。It should be understood that the certain rule or condition may be predetermined by the system, pre-configured by the protocol, or determined by the terminal device itself, and this application does not limit this.

例如,终端设备根据多个网络设备的可用区域,选择某一网络设备,并向该网络设备发送第一请求信息。该用于指示网络设备的可用区域的指示信息可以在第一信息中携带,或者,在该网络设备广播的系统信息中携带等等。For example, the terminal device selects a network device based on the available areas of multiple network devices and sends a first request message to the network device. The indication information for indicating the available area of the network device can be carried in the first message, or carried in the system information broadcast by the network device, etc.

又例如,终端设备根据多个网络设备的时延大小,选择时延最小的网络设备,并向该网络设备发送第一请求信息。该多个网络设备的时延大小可以是终端设备基于第一信息中包括的星历信息、时间信息、位置信息等信息确定的。For another example, the terminal device selects a network device with the smallest delay based on the delays of multiple network devices and sends the first request information to the network device. The delays of the multiple network devices can be determined by the terminal device based on information such as ephemeris information, time information, and location information included in the first information.

又例如,终端设备根据多个网络设备中每个网络设备是否具有终端设备的上下文信息,选择具有终端设备的上下文信息的网络设备,并向该网络设备发送第一请求信息。其中,终端设备够可以根据第一信息中的用于指示该多个网络设备中每个网络设备是否具有终端设备的上下文信息的信息,确定选择具有终端设备上下文信息的网络设备。For another example, the terminal device selects a network device having the context information of the terminal device based on whether each of the multiple network devices has the context information of the terminal device, and sends the first request information to the network device. The terminal device can determine to select the network device having the context information of the terminal device based on information in the first information indicating whether each of the multiple network devices has the context information of the terminal device.

应理解,终端设备可以基于上述任意一种示例选择到网络设备2,并向网络设备2发送第一请求信息,或者基于上述任两种或者三种选择网络到网络设备2,并向网络设备2发送第一请求信息,对此本申请不做限定。It should be understood that the terminal device can select network device 2 based on any of the above examples and send a first request message to network device 2, or select network device 2 based on any two or three of the above examples and send a first request message to network device 2. This application does not limit this.

还应理解,网络设备2接收到该终端设备的第一请求信息之后,假设网络设备2具有该终端设备的上下文信息,该网络设备2进一步地根据第一请求信息确定是否接受该终端设备的接入请求,如下述的情况一所示。又假设网络设备2不具有该终端设备的上下文信息,该网络设备2接收到该第一请求信息之后,该网络设备2可以向核心网设备请求获取该终端设备的上下文信息,如下述情况二所示。It should also be understood that after network device 2 receives the first request information from the terminal device, assuming that network device 2 has the context information of the terminal device, network device 2 further determines whether to accept the access request of the terminal device based on the first request information, as shown in the following scenario 1. Furthermore, assuming that network device 2 does not have the context information of the terminal device, after receiving the first request information, network device 2 may request the core network device to obtain the context information of the terminal device, as shown in the following scenario 2.

情况一Case 1

705,网络设备2向终端设备发送第一应答信息。705. Network device 2 sends first response information to the terminal device.

相应地,终端设备接收来自网络设备2的第一应答信息。Correspondingly, the terminal device receives the first response information from the network device 2 .

例如,该网络设备2接收到来自终端设备的第一请求信息之后,根据第一请求信息以及本地存储的该终端设备的上下文信息,对该终端设备进行认证。在网络设备2对该终端设备认证成功的情况下,该网络设备2向终端设备发送第一应答信息。该第一应答信息用于响应第一请求信息,第一应答信息包括NCC。For example, after receiving the first request information from the terminal device, the network device 2 authenticates the terminal device based on the first request information and the locally stored context information of the terminal device. If the network device 2 successfully authenticates the terminal device, the network device 2 sends a first response information to the terminal device. The first response information is used to respond to the first request information and includes the NCC.

应理解,网络设备2存储的终端设备的上下文信息,可以是来自网络设备1通过核心网设备发送的,例如上述图6所示的方法中的步骤605,网络设备2接收来自核心网设备发送的该终端设备的第二上下文信息,并将该终端设备的第二上下文信息存储在网络设备2本地。网络设备2还可以通过其他方式获取到该终端设备的上下文信息,对此本申请不再一一赘述。It should be understood that the context information of the terminal device stored in the network device 2 may be sent from the network device 1 via the core network device. For example, in step 605 of the method shown in FIG6 , the network device 2 receives the second context information of the terminal device sent from the core network device and stores the second context information of the terminal device locally in the network device 2. The network device 2 may also obtain the context information of the terminal device through other means, which will not be described in detail in this application.

706,网络设备2与终端设备进行安全通信。706. Network device 2 communicates securely with the terminal device.

应理解,终端设备接收来自网络设备2的第一应答信息之后,该终端设备根据该第一应答信息中的NCC确定与网络设备2进行安全通信的密钥(例如密钥#1),网络设备2的密钥#1可以是来自为终端设备提供服务的源网络设备(例如网络设备1),或者网络设备2根据NH和NCC自身确定的,对此本申请不做限定。It should be understood that after the terminal device receives the first response information from network device 2, the terminal device determines the key (for example, key #1) for secure communication with network device 2 based on the NCC in the first response information. The key #1 of network device 2 may be from the source network device (for example, network device 1) that provides services to the terminal device, or it may be determined by network device 2 itself based on NH and NCC. This application does not limit this.

还应理解,终端设备基于NCC确定密钥#1,以及网络设备2确定密钥#1的具体方法与上述介绍的终端设备确定KeNB*的方法类似,具体请参见上述介绍,此处不再赘述。It should also be understood that the specific method by which the terminal device determines key #1 based on NCC and the network device 2 determines key #1 is similar to the method by which the terminal device determines KeNB* described above. Please refer to the above description for details and will not be repeated here.

还应理解,终端设备与网络设备2之间采用密钥#1进行安全通信。It should also be understood that key #1 is used for secure communication between the terminal device and the network device 2.

707,网络设备2向核心网设备发送第三指示信息。707. Network device 2 sends third indication information to the core network device.

相应地,核心网设备接收来自网络设备2的第三指示信息。Correspondingly, the core network device receives the third indication information from the network device 2 .

例如,网络设备2确定终端设备已经成功接入网络设备2的情况下,该网络设备2向核心网设备发送第三指示信息,该第三指示信息用于指示终端设备成功接入第二网络设备。该第三指示信息包括终端设备的标识信息。For example, when network device 2 determines that the terminal device has successfully accessed network device 2, network device 2 sends third indication information to the core network device, where the third indication information is used to indicate that the terminal device has successfully accessed the second network device. The third indication information includes identification information of the terminal device.

708,核心网设备向网络设备3发送释放指示信息。708. The core network device sends release indication information to network device 3.

相应地,网络设备3接收来自核心网设备的释放指示信息。Correspondingly, the network device 3 receives the release indication information from the core network device.

例如,核心网设备接收到来自网络设备2的第三指示信息之后,该核心网设备根据第三指示信息确定终端设备成功接入网络设备2,核心网设备确定向网络设备3发送释放指示信息,该释放指示信息用于指示释放终端设备的第二上下文信息。其中,释放指示信息包括终端设备的标识信息。For example, after the core network device receives the third indication information from network device 2, the core network device determines, based on the third indication information, that the terminal device has successfully accessed network device 2. The core network device then determines to send release indication information to network device 3, where the release indication information is used to instruct the release of the second context information of the terminal device. The release indication information includes identification information of the terminal device.

应理解,核心网设备可以根据第三指示信息,向具有该终端设备上下文信息的网络设备(例如网络设备3)发送该释放指示信息。该步骤707和步骤708均为可选步骤,当其他网络设备未接收到该终端设备的上下文信息,和/或,未将该终端设备的上下文信息保存在网络设备侧本地时,即该步骤707和步骤708无需执行。It should be understood that the core network device can send the release indication information to the network device (e.g., network device 3) having the context information of the terminal device according to the third indication information. Steps 707 and 708 are both optional steps. When other network devices do not receive the context information of the terminal device and/or do not store the context information of the terminal device locally on the network device side, steps 707 and 708 do not need to be performed.

情况二Case 2

705’,网络设备2向核心网设备发送第二请求信息。705’, network device 2 sends a second request message to the core network device.

相应地,核心网设备接收来自网络设备2的第二请求信息。Correspondingly, the core network device receives the second request information from the network device 2 .

例如,网络设备2接收到来自终端设备的第一请求信息之后,该网络设备2不具有该终端设备的上下文信息,该网络设备2根据第一请求信息向核心网设备发送第二请求信息,该第二请求信息用于请求获取该终端设备的上下文信息,该第二请求信息包括该终端设备的标识信息。For example, after network device 2 receives the first request information from the terminal device, the network device 2 does not have the context information of the terminal device. The network device 2 sends a second request information to the core network device based on the first request information. The second request information is used to request the context information of the terminal device. The second request information includes the identification information of the terminal device.

应理解,在网络设备2覆盖到地面信关站的情况下,该网络设备2通过地面信关站向核心网设备发送该第二请求信息。It should be understood that when the network device 2 covers the ground gateway, the network device 2 sends the second request information to the core network device through the ground gateway.

706’,核心网设备向网络设备1发送第三请求信息。706’, the core network device sends a third request message to network device 1.

相应地,网络设备1接收来自核心网设备的第三请求信息。Correspondingly, the network device 1 receives the third request information from the core network device.

例如,核心网设备接收到网络设备2的第二请求信息之后,在网络设备1覆盖地面信关站的情况下,该核心网设备通过地面信关站向网络设备1发送第三请求信息,该第三请求信息用于请求获取该终端设备的上下文信息,该第三请求信息包括终端设备的标识信息。For example, after the core network device receives the second request information from network device 2, when network device 1 covers a ground gateway station, the core network device sends a third request information to network device 1 through the ground gateway station. The third request information is used to request the context information of the terminal device, and the third request information includes the identification information of the terminal device.

707’,网络设备1向核心网设备发送终端设备的第一上下文信息。707’, network device 1 sends the first context information of the terminal device to the core network device.

相应地,核心网设备接收来自网络设备1的终端设备的第一上下文信息。Correspondingly, the core network device receives the first context information of the terminal device from the network device 1 .

应理解,网络设备1接收到来自核心网设备的第三请求信息之后,网络设备1根据第三请求信息中的终端设备的标识信息对该终端设备进行认证。在终端设备认证成功,网络设备1覆盖到地面信关站时,该网络设备1通过地面信关站向核心网设备发送终端设备的第一上下文信息。It should be understood that after network device 1 receives the third request information from the core network device, network device 1 authenticates the terminal device based on the terminal device's identification information in the third request information. If the terminal device is successfully authenticated and network device 1 is covered by a ground gateway, network device 1 sends the first context information of the terminal device to the core network device via the ground gateway.

在一种可能实现的方式中,在该网络设备1具有未被使用过的NH的情况下,该终端设备的第一上下文信息包括密钥#1和NCC,该密钥#1是该网络设备1根据该未被使用过的NH确定的,具体确定方法与上述2)切换场景中KeNB的更新中的KeNB*的确定方法(例如垂直派生)类似,具体请参见上述详细介绍。In one possible implementation, when the network device 1 has an unused NH, the first context information of the terminal device includes key #1 and NCC. The key #1 is determined by the network device 1 based on the unused NH. The specific determination method is similar to the determination method of KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation). Please refer to the above detailed description for details.

在另一种可能实现的方式中,在该网络设备1不具有未被使用过的NH的情况下,该终端设备的第一上下文信息包括第二指示信息,该第二指示信息用于指示核心网设备确定NH和NCC。In another possible implementation, when the network device 1 does not have an unused NH, the first context information of the terminal device includes second indication information, and the second indication information is used to instruct the core network device to determine the NH and the NCC.

在又一种可能实现的方式中,在该网络设备1不具有未被使用过的NH的情况下,该终端设备的第一上下文信息不包括密钥#1,NCC和第二指示信息。In another possible implementation, when the network device 1 does not have an unused NH, the first context information of the terminal device does not include the key #1, the NCC and the second indication information.

还应理解,网络设备1根据第三请求信息中的终端设备标识信息对终端设备进行认证,确定该终端设备不是合法设备时,无需执行步骤707’以及后续步骤。It should also be understood that when network device 1 authenticates the terminal device based on the terminal device identification information in the third request information and determines that the terminal device is not a legitimate device, there is no need to execute step 707' and subsequent steps.

708’,核心网设备向网络设备2发送终端设备的第二上下文信息。708’, the core network device sends the second context information of the terminal device to network device 2.

相应地,网络设备2接收来自核心网设备的终端设备的第二上下文信息。Correspondingly, the network device 2 receives the second context information of the terminal device from the core network device.

例如,核心网设备接收到来自网络设备1的终端设备的第一上下文信息,根据终端设备的第一上下文信息,向网络设备2发送终端设备的第二上下文信息。For example, the core network device receives the first context information of the terminal device from the network device 1 , and sends the second context information of the terminal device to the network device 2 based on the first context information of the terminal device.

在一种可能实现的方式中,终端设备的第一上下文信息包括密钥#1和NCC时,核心网设备将终端设备的第一上下文信息通过终端设备的第二上下文信息转发给网络设备2,终端设备的第二上下文信息包括密钥#1和NCC。In one possible implementation, when the first context information of the terminal device includes key #1 and NCC, the core network device forwards the first context information of the terminal device to network device 2 through the second context information of the terminal device, and the second context information of the terminal device includes key #1 and NCC.

在另一种可能实现的方式中,终端设备的第一上下文信息包括第二指示信息时,核心网设备根据第二指示信息确定NH和NCC,并根据终端设备的第一上下文信息向网络设备2发送携带NH和NCC的终端设备的第二上下文信息。In another possible implementation method, when the first context information of the terminal device includes second indication information, the core network device determines the NH and NCC based on the second indication information, and sends the second context information of the terminal device carrying NH and NCC to the network device 2 based on the first context information of the terminal device.

在又一种可能实现的方式中,终端设备的第一上下文信息不包括密钥#1,NCC和第二指示信息时,该核心网设备生成NH和NCC,并根据终端设备的第一上下文信息向网络设备2发送携带NH和NCC的终端设备的第二上下文信息。In another possible implementation, when the first context information of the terminal device does not include key #1, NCC and second indication information, the core network device generates NH and NCC, and sends the second context information of the terminal device carrying NH and NCC to the network device 2 based on the first context information of the terminal device.

应理解,核心网设备向网络设备2发送终端设备的第二上下文信息时,该核心网设备在网络设备2的覆盖范围内,核心网设备能够与网络设备2进行无线通信。例如,网络设备2移动到覆盖地面信关站时,该核心网设备通过地面信关站向网络设备2发送终端设备的第二上下文信息。It should be understood that when the core network device sends the second context information of the terminal device to network device 2, the core network device is within the coverage of network device 2 and can wirelessly communicate with network device 2. For example, when network device 2 moves to a covered ground gateway, the core network device sends the second context information of the terminal device to network device 2 through the ground gateway.

709’,网络设备2发送用于指示自身可用区域的指示信息。709’, network device 2 sends indication information for indicating its own available area.

相应地,终端设备接收来自网络设备2的用于指示自身可用区域的指示信息。Correspondingly, the terminal device receives indication information indicating its own available area from the network device 2 .

应理解,终端设备在网络设备2覆盖范围内时,该终端设备可以接收到来自网络设备2广播的系统消息,该系统消息可以包括用于指示自身可用区域的指示信息,或者,该网络设备2通过单独消息发送该用于指示自身可用区域的指示信息。It should be understood that when the terminal device is within the coverage of network device 2, the terminal device can receive a system message broadcast from network device 2, which may include indication information for indicating its own available area, or the network device 2 sends the indication information for indicating its own available area through a separate message.

还应理解,步骤709’为可选步骤,在步骤702中的第一信息中包括用于指示网络设备2的可用区域的指示信息时,无需再执行步骤709’。It should also be understood that step 709' is an optional step. When the first information in step 702 includes indication information for indicating the available area of network device 2, step 709' does not need to be executed.

710’,终端设备向网络设备2发送第一请求信息。710’, the terminal device sends a first request message to the network device 2.

相应地,网络设备2接收来自终端设备的第一请求信息。Correspondingly, the network device 2 receives the first request information from the terminal device.

例如,在终端设备进入网络设备2的覆盖范围时,终端设备向网络设备2发送第一请求信息,该第一请求信息用于请求接入网络设备2。For example, when the terminal device enters the coverage area of the network device 2 , the terminal device sends first request information to the network device 2 , where the first request information is used to request access to the network device 2 .

应理解,步骤710’与上述图6中的步骤607,图7中的步骤704类似,具体请参见上述图6中的步骤607,图7中的步骤704中的详细介绍。It should be understood that step 710' is similar to step 607 in FIG. 6 and step 704 in FIG. 7 . For details, please refer to the detailed description of step 607 in FIG. 6 and step 704 in FIG. 7 .

711’,网络设备2向终端设备发送第一应答信息。711’, network device 2 sends a first response message to the terminal device.

相应地,终端设备接收来自网络设备2的第一应答信息。Correspondingly, the terminal device receives the first response information from the network device 2 .

例如,网络设备2接收到来自终端设备的第一请求信息之后,网络设备2根据第一请求信息向终端设备发送第一应答信息,该第一应答信息用于响应第一请求信息。该第一应答信息包括终端设备的第二上下文信息中的NCC。For example, after network device 2 receives the first request information from the terminal device, network device 2 sends a first response information to the terminal device according to the first request information, where the first response information is used to respond to the first request information and includes the NCC in the second context information of the terminal device.

应理解,当网络设备2接受该终端设备接入时,该网络设备2向终端设备发送该第一应答信息,该第一应答信息包括NCC,该NCC是网络设备2接收来自核心网设备的终端设备的第二上下文信息中的NCC,该NCC可以来自网络设备1,或者该NCC是核心网设备确定的,对此本申请不做限定。It should be understood that when network device 2 accepts access from the terminal device, the network device 2 sends the first response information to the terminal device. The first response information includes NCC. The NCC is the NCC in the second context information of the terminal device received by network device 2 from the core network device. The NCC can come from network device 1, or the NCC is determined by the core network device. This application does not limit this.

712’,终端设备与网络设备2进行安全通信。712’, the terminal device communicates securely with the network device 2.

应理解,终端设备接收来自网络设备2的第一应答信息之后,该终端设备根据该第一应答信息中的NCC确定与网络设备2进行安全通信的密钥(例如密钥#1),网络设备2确定的密钥#1可以是来自网络设备1确定的,或者网络设备2根据核心网确定的NH和NCC确定的密钥#1。It should be understood that after the terminal device receives the first response information from network device 2, the terminal device determines the key (for example, key #1) for secure communication with network device 2 based on the NCC in the first response information. The key #1 determined by network device 2 can be the key #1 determined by network device 1, or the key #1 determined by network device 2 based on the NH determined by the core network and the NCC.

还应理解,终端设备基于NCC确定密钥#1,以及网络设备2根据NCC确定密钥#1的具体方法与上述2)切换场景中KeNB的更新中的KeNB*的确定方法(例如垂直派生)类似,具体请参见上述详细介绍,此处不再赘述。It should also be understood that the specific method by which the terminal device determines key #1 based on the NCC, and the network device 2 determines key #1 based on the NCC, is similar to the method for determining KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (e.g., vertical derivation). For details, please refer to the above detailed introduction and will not be repeated here.

还应理解,终端设备与网络设备2之间采用密钥#1进行安全通信。It should also be understood that key #1 is used for secure communication between the terminal device and the network device 2.

根据上述图7所示的方法,由于网络设备1的移动性,终端设备离开网络设备1的覆盖范围时,该终端设备从连接态变更为第一状态,并向网络设备2发送用于请求接入的第一请求信息。考虑到网络设备2具有该终端设备的上下文信息的情况下,该网络设备2接收到第一请求信息之后,该网络设备2根据第一请求信息中的终端设备标识信息对终端设备进行认证,在认证成功的情况下,该网络设备2向终端设备发送第一应答信息,终端设备与网络设备2之间基于密钥#1进行安全通信,从而保证终端设备与网络之间的安全通信。又考虑到网络设备2不具有终端设备的上下文信息的情况下,该网络设备2向核心网设备请求获取该终端设备的上下文,该核心网设备向网络设备1请求终端设备的上下文信息,由网络设备1对终端设备进行认证,在认证成功的情况下,该网络设备1将终端设备的第一上下文信息发送给核心网设备,进一步地核心网设备将终端设备的第二上下文信息发送给网络设备2。网络设备2与终端设备之间基于密钥#1进行安全通信,从而保证终端设备与网络之间的安全通信。According to the method shown in FIG7 , due to the mobility of network device 1, when a terminal device leaves the coverage area of network device 1, the terminal device changes from a connected state to a first state and sends a first request message to network device 2 requesting access. Considering that network device 2 has the context information of the terminal device, after receiving the first request message, network device 2 authenticates the terminal device based on the terminal device identification information in the first request message. If the authentication is successful, network device 2 sends a first response message to the terminal device. The terminal device and network device 2 communicate securely based on key #1, thereby ensuring secure communication between the terminal device and the network. Furthermore, considering that network device 2 does not have the context information of the terminal device, network device 2 requests the core network device to obtain the context of the terminal device. The core network device requests the context information of the terminal device from network device 1, and network device 1 authenticates the terminal device. If the authentication is successful, network device 1 sends the first context information of the terminal device to the core network device, and the core network device further sends the second context information of the terminal device to network device 2. The network device 2 and the terminal device communicate securely based on the key #1, thereby ensuring secure communication between the terminal device and the network.

图8是本申请实施例提供的另一种通信方法的流程性示意图。FIG8 is a flow chart of another communication method provided in an embodiment of the present application.

应理解,图8所示的方法中,第一网络设备以网络设备1为例,至少一个第三网络设备分别以网络设备2和网络设备3为例,其中,网络设备2可以作为至少一个第三网络设备中的第二网络设备,网络设备3可以作为至少一个第三网络设备中除第二网络设备的其他网络设备为例,该网络设备1,网络设备2和网络设备3均为非地面网络设备,例如,该网络设备1,网络设备2,网络设备3分别为卫星或者无人机,本申请均不限定。如图8所示,该方法可以包括如下步骤。It should be understood that in the method shown in FIG8 , the first network device is network device 1, and the at least one third network device is network device 2 and network device 3, respectively. Network device 2 can be used as the second network device in the at least one third network device, and network device 3 can be used as an example of the other network devices in the at least one third network device except the second network device. Network device 1, network device 2, and network device 3 are all non-terrestrial network devices. For example, network device 1, network device 2, and network device 3 are respectively satellites or drones, which are not limited in this application. As shown in FIG8 , the method may include the following steps.

801,网络设备1向终端设备发送T_service信息。801. Network device 1 sends T_service information to terminal device.

相应地,终端设备接收来自网络设备1的T_service信息。Correspondingly, the terminal device receives T_service information from the network device 1 .

802,网络设备1向终端设备发送第一信息。802. Network device 1 sends first information to the terminal device.

相应地,终端设备接收来自网络设备1的第一信息。Accordingly, the terminal device receives the first information from the network device 1 .

803,终端设备从连接态变更为第一状态。803. The terminal device changes from the connected state to the first state.

例如,终端设备接收到来自网络设备1的T_service信息,在该T_service信息指示的时刻(例如第一时刻)达到之后,该终端设备从连接态变更为第一状态。For example, the terminal device receives T_service information from the network device 1. After the time indicated by the T_service information (eg, the first time) is reached, the terminal device changes from the connected state to the first state.

应理解,上述步骤801至步骤803与上述图6中的步骤601至步骤603类似,具体请参见上述步骤601至步骤603中的详细介绍。It should be understood that the above steps 801 to 803 are similar to steps 601 to 603 in FIG. 6 . For details, please refer to the detailed description of steps 601 to 603 .

804,网络设备1向核心网设备发送终端设备的第一上下文信息。804. Network device 1 sends first context information of the terminal device to the core network device.

相应地,核心网设备接收来自网络设备1的终端设备的第一上下文信息。Correspondingly, the core network device receives the first context information of the terminal device from the network device 1 .

例如,在网络设备1覆盖到地面信关站时,该网络设备1通过地面信关站向核心网设备发送终端设备的第一上下文信息。该终端设备的第一上下文信息包括该UE的标识信息。For example, when the network device 1 covers the ground gateway, the network device 1 sends the first context information of the terminal device to the core network device through the ground gateway. The first context information of the terminal device includes the identification information of the UE.

在一种可能实现的方式中,在该网络设备1具有未被使用过的NH的情况下,该终端设备的第一上下文信息包括密钥#1和NCC,该密钥#1是该网络设备1根据该未被使用过的NH确定的,具体确定方法与上述2)切换场景中KeNB的更新中的KeNB*的确定方法(例如垂直派生)类似,具体请参见上述详细介绍。In one possible implementation, when the network device 1 has an unused NH, the first context information of the terminal device includes key #1 and NCC. The key #1 is determined by the network device 1 based on the unused NH. The specific determination method is similar to the determination method of KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation). Please refer to the above detailed description for details.

在另一种可能实现的方式中,在该网络设备1不具有未被使用过的NH的情况下,该终端设备的第一上下文信息包括第二指示信息,该第二指示信息用于指示核心网设备为该终端设备配置NH和NCC。In another possible implementation, when the network device 1 does not have an unused NH, the first context information of the terminal device includes second indication information, and the second indication information is used to instruct the core network device to configure NH and NCC for the terminal device.

在又一种可能实现的方式中,在该网络设备1不具有未被使用过的NH的情况下,该终端设备的第一上下文信息不包括密钥#1,NCC和第二指示信息。In another possible implementation, when the network device 1 does not have an unused NH, the first context information of the terminal device does not include the key #1, the NCC and the second indication information.

805,网络设备2,网络设备3向终端设备发送用于指示网络设备2的可用区域的指示信息,用于指示网络设备3的可用区域的指示信息。805 , network device 2 and network device 3 send indication information for indicating the available area of network device 2 and indication information for indicating the available area of network device 3 to the terminal device.

应理解,该步骤805与上述图6中的步骤606类似,均为可选步骤,具体可以参见上述图6中的介绍。It should be understood that step 805 is similar to step 606 in FIG. 6 , and both are optional steps. For details, please refer to the introduction in FIG. 6 .

806,终端设备向网络设备2发送第一请求信息。806 , the terminal device sends first request information to the network device 2 .

相应地,网络设备2接收来自终端设备的第一请求信息。Correspondingly, the network device 2 receives the first request information from the terminal device.

应理解,步骤806与上述图6中的步骤607类似,具体可以参见上述图6中的介绍。It should be understood that step 806 is similar to step 607 in FIG. 6 , and for details, please refer to the introduction in FIG. 6 .

807,网络设备2向核心网设备发送第二请求信息。807. Network device 2 sends second request information to the core network device.

相应地,核心网设备接收来自网络设备2的第二请求信息。Correspondingly, the core network device receives the second request information from the network device 2 .

例如,网络设备2接收到来自终端设备的第一请求信息之后,该网络设备2不具有该终端设备的上下文信息,该网络设备2根据第一请求信息向核心网设备发送第二请求信息,该第二请求信息用于请求获取该终端设备的上下文信息,该第二请求信息包括该终端设备的标识信息。For example, after network device 2 receives the first request information from the terminal device, the network device 2 does not have the context information of the terminal device. The network device 2 sends a second request information to the core network device based on the first request information. The second request information is used to request the context information of the terminal device. The second request information includes the identification information of the terminal device.

应理解,网络设备2覆盖到信关站的情况下,该网络设备2通过信关站向核心网设备发送第二请求信息。It should be understood that when the network device 2 covers the gateway, the network device 2 sends the second request information to the core network device through the gateway.

808,核心网设备向网络设备2发送终端设备的第二上下文信息。808 , the core network device sends the second context information of the terminal device to network device 2 .

相应地,网络设备2接收来自核心网设备的终端设备的第二上下文信息。Correspondingly, the network device 2 receives the second context information of the terminal device from the core network device.

例如,核心网设备接收到来自网络设备2的第二请求信息之后,核心网设备根据第二请求信息中的终端设备的标识信息对该终端设备进行认证。在认证成功的情况下,在网络设备2覆盖到地面信关站时,该核心网设备通过地面信关站向网络设备2发送终端设备的第二上下文信息。For example, after receiving the second request information from network device 2, the core network device authenticates the terminal device based on the terminal device's identification information in the second request information. If the authentication is successful, when network device 2 reaches a ground gateway, the core network device sends the second context information of the terminal device to network device 2 via the ground gateway.

应理解,核心网设备根据步骤804中接收到的终端设备的第一上下文信息,确定该终端设备的第二上下文信息,其中,核心网设备根据终端设备的第一上下文信息确定终端设备的第二上下文信息的详细介绍,可以参见上述图7中的步骤708’中的详细介绍,此处不再赘述。It should be understood that the core network device determines the second context information of the terminal device based on the first context information of the terminal device received in step 804. For a detailed introduction on how the core network device determines the second context information of the terminal device based on the first context information of the terminal device, please refer to the detailed introduction in step 708' in Figure 7 above, which will not be repeated here.

809,终端设备向网络设备2发送第一请求信息。809 , the terminal device sends first request information to the network device 2 .

相应地,网络设备2接收来自终端设备的第一请求信息。Correspondingly, the network device 2 receives the first request information from the terminal device.

例如,终端在终端设备进入网络设备2的覆盖范围时,该终端设备接收到网络设备2广播的系统消息,终端设备接收到网络设备2的系统消息之后,终端设备可以向网络设备2发送第一请求信息,该第一请求信息用于请求接入网络设备2。For example, when the terminal device enters the coverage of network device 2, the terminal device receives the system message broadcast by network device 2. After the terminal device receives the system message of network device 2, the terminal device can send a first request message to network device 2, and the first request message is used to request access to network device 2.

应理解,该步骤809与上述图6中的步骤607,图8中的步骤806类似,具体可以参见上述图6中的步骤607,图8中的步骤806中的详细介绍。It should be understood that step 809 is similar to step 607 in FIG. 6 and step 806 in FIG. 8 . For details, please refer to the detailed description of step 607 in FIG. 6 and step 806 in FIG. 8 .

810,网络设备2向终端设备发送第一应答信息。810. Network device 2 sends first response information to the terminal device.

相应地,终端设备接收来自网络设备2的第一应答信息。Correspondingly, the terminal device receives the first response information from the network device 2 .

例如,网络设备2接收到来自终端设备的第一请求信息之后,网络设备2根据第一请求信息向终端设备发送第一应答信息,该第一应答信息用于响应第一请求信息。该第一应答信息包括终端设备第二上下文信息中的NCC。For example, after network device 2 receives the first request information from the terminal device, network device 2 sends a first response information to the terminal device according to the first request information, and the first response information is used to respond to the first request information. The first response information includes the NCC in the second context information of the terminal device.

应理解,当网络设备2接受该终端设备接入时,该网络设备2向终端设备发送该第一应答信息,该第一应答信息包括NCC,该NCC是网络设备2接收来自核心网设备的终端设备的第二上下文信息中的NCC,该NCC可以来自网络设备1,或者该NCC是核心网设备确定的,对此本申请不做限定。It should be understood that when network device 2 accepts access from the terminal device, the network device 2 sends the first response information to the terminal device. The first response information includes NCC. The NCC is the NCC in the second context information of the terminal device received by network device 2 from the core network device. The NCC can come from network device 1, or the NCC is determined by the core network device. This application does not limit this.

811,终端设备与网络设备2进行安全通信。811. The terminal device communicates securely with the network device 2.

应理解,终端设备接收来自网络设备2的第一应答信息之后,该终端设备根据该第一应答信息中的NCC确定与网络设备2进行安全通信的密钥(例如密钥#1),网络设备2确定的密钥#1可以是来自网络设备1确定的,或者网络设备2根据核心网确定的NH和NCC确定的密钥#1,对此本申请不做限定。It should be understood that after the terminal device receives the first response information from network device 2, the terminal device determines the key (for example, key #1) for secure communication with network device 2 based on the NCC in the first response information. The key #1 determined by network device 2 can be the key #1 determined by network device 1, or the key #1 determined by network device 2 based on the NH determined by the core network and the NCC. This application does not limit this.

还应理解,终端设备基于NCC确定密钥#1,以及网络设备2确定根据NCC确定密钥#1的具体方法与上述2)切换场景中KeNB的更新中的KeNB*的确定方法(例如垂直派生)类似,具体请参见上述详细介绍,此处不再赘述。It should also be understood that the terminal device determines key #1 based on the NCC, and the network device 2 determines the specific method of determining key #1 based on the NCC is similar to the method of determining KeNB* in the update of KeNB in the above-mentioned 2) switching scenario (for example, vertical derivation). For details, please refer to the above detailed introduction and will not be repeated here.

还应理解,终端设备与网络设备2之间采用密钥#1进行安全通信。It should also be understood that key #1 is used for secure communication between the terminal device and the network device 2.

根据上述图8所示的方法,由于网络设备1的移动性,终端设备离开网络设备1的覆盖范围时,该终端设备从连接态变更为第一状态,并向网络设备2发送用于请求接入的第一请求信息。当网络设备1覆盖地面信关站时,该网络设备1可以将终端设备的第一上下文信息发送给核心网设备,在核心网设备接收到来自其他网络设备(例如网络设备2)的用于请求获取终端设备的上下文信息的情况下,该核心网设备对终端设备进行认证。当认证成功时,该核心网设备确定将根据终端设备的第一上下文信息确定的终端设备的第二上下文信息发送给网络设备2,使网络设备2与终端设备能够基于密钥#1进行通信,保证终端设备与网络之间的安全通信。According to the method shown in FIG8 , due to the mobility of network device 1, when the terminal device leaves the coverage of network device 1, the terminal device changes from the connected state to the first state and sends a first request message for access request to network device 2. When network device 1 covers a ground gateway, the network device 1 can send the first context information of the terminal device to the core network device. When the core network device receives a request for the context information of the terminal device from another network device (such as network device 2), the core network device authenticates the terminal device. When the authentication is successful, the core network device determines to send the second context information of the terminal device determined based on the first context information of the terminal device to network device 2, so that network device 2 and the terminal device can communicate based on key #1, ensuring secure communication between the terminal device and the network.

结合上述图4所示的S&F场景,为了保证S&F场景中的网络设备只为特定类型的终端设备提供服务,只有S&F的终端设备才能够请求接入S&F场景中的网络设备,不允许/禁止其他终端设备(例如legacy UE,或者R19之前版本的终端设备)接入S&F场景中的网络设备。结合上述图6至图8所示的方法,网络设备2和网络设备3为图4所示的S&F场景中的网络设备,终端设备为S&F的终端设备。In conjunction with the S&F scenario shown in Figure 4 above, to ensure that the network devices in the S&F scenario only provide services to specific types of terminal devices, only S&F terminal devices can request access to the network devices in the S&F scenario, and other terminal devices (such as legacy UEs or terminal devices with versions prior to R19) are not allowed/prohibited from accessing the network devices in the S&F scenario. In conjunction with the methods shown in Figures 6 to 8 above, Network Device 2 and Network Device 3 are the network devices in the S&F scenario shown in Figure 4, and the terminal devices are S&F terminal devices.

例如在图6中的步骤606,图7中的步骤709’,图8中的步骤805中,网络设备2,网络设备3广播的系统消息(例如MIB消息/SIB消息)中的cellBarred信元设为禁止(barred)。该cellBarred用于指示所有的normal UE(非NTN UE)拒绝接入。For example, in step 606 of Figure 6, step 709' of Figure 7, and step 805 of Figure 8, the cellBarred information element in the system message (e.g., MIB message/SIB message) broadcast by network device 2 and network device 3 is set to barred. The cellBarred information element is used to indicate that all normal UEs (non-NTN UEs) are denied access.

应理解,NR中引入了两种特殊类型的终端设备:IAB-MT和NCR-MT。这两种类型的终端设备可能会忽略网络设备广播的系统消息中的cellBarred信元。本申请提供的方法,在系统消息包括的协议中为IAB-MT和NCR-MT引入iab-support信元和ncr-support信元。其中,iab-support信元和ncr-support信元可以位于SIB消息中,用于指示该小区是否允许IAB-MT或NCR-MT接入。例如,网络设备2和网络设备3,将SIB消息中的iab-support信元和ncr-support信元对应的值设为not support(不支持)。It should be understood that two special types of terminal devices are introduced in NR: IAB-MT and NCR-MT. These two types of terminal devices may ignore the cellBarred information element in the system message broadcast by the network device. The method provided in the present application introduces the iab-support information element and the ncr-support information element for IAB-MT and NCR-MT in the protocol included in the system message. Among them, the iab-support information element and the ncr-support information element can be located in the SIB message to indicate whether the cell allows IAB-MT or NCR-MT to access. For example, network device 2 and network device 3 set the values corresponding to the iab-support information element and the ncr-support information element in the SIB message to not support.

应理解,对于R17/R18版本的NTN,系统消息中引入了cellBarredNTN信元,该cellBarredNTN信元用于限制NTN UE的接入。如果cellBarredNTN的值为notBarred,表示小区支持NTN UE接入;如果cellBarredNTN的值为Barred,表示小区不支持NTN UE接入。可选的,对于R19 S&F的卫星,例如在图6中的步骤606,图7中的步骤709’,图8中的步骤805中,网络设备2,网络设备3广播的系统消息(例如MIB消息/SIB消息)中的cellBarredNTN信元设为禁止(barred),用于指示小区不支持普通的NTN终端接入。It should be understood that for R17/R18 versions of NTN, the cellBarredNTN information element was introduced in system messages. This cellBarredNTN information element is used to restrict access by NTN UEs. If the value of cellBarredNTN is notBarred, it indicates that the cell supports NTN UE access; if the value of cellBarredNTN is Barred, it indicates that the cell does not support NTN UE access. Optionally, for R19 S&F satellites, for example, in step 606 in Figure 6, step 709' in Figure 7, and step 805 in Figure 8, the cellBarredNTN information element in the system messages (e.g., MIB messages/SIB messages) broadcast by network devices 2 and 3 is set to barred to indicate that the cell does not support access by standard NTN terminals.

本申请提供的方法引入一个表示该小区支持S&F终端设备接入的指示信息,例如:在系统消息中新引入一个新的信元(例如,sfBarred信元),本申请对信元名称不限定,sfBarred信元的取值可以是“barred(禁止)/not barred(不禁止)”。sfBarred信元的取值为barred(禁止)表示小区不支持S&F终端设备接入,sfBarred信元的取值为not barred(不禁止)表示小区支持S&F终端设备接入。一般对于S&F网络设备覆盖范围内的小区,将系统消息中的sfBarred的值设为“not barred”。The method provided in this application introduces an indication that the cell supports access by S&F terminal devices. For example, a new information element (e.g., the sfBarred information element) is introduced in the system message. This application does not limit the name of the information element. The value of the sfBarred information element can be "barred (prohibited)/not barred (not prohibited)". If the value of the sfBarred information element is barred (prohibited), it means that the cell does not support access by S&F terminal devices. If the value of the sfBarred information element is not barred (not prohibited), it means that the cell supports access by S&F terminal devices. Generally, for cells within the coverage area of S&F network equipment, the value of sfBarred in the system message is set to "not barred".

可选的,系统消息中的sfBarred信元的值可以变化,如果某一颗卫星在某些时间确定工作在S&F模式,则可以将sfBarred信元的值设置为“不禁止(not barred)”,表示卫星提供S&F服务或支持S&F终端设备接入,而该卫星可以在其他时间确定不工作在S&F模式(工作在正常通信模式),例如:该卫星在某些时间可以同时连接核心网和覆盖某些终端设备,则该卫星将sfBarred信元的值设置为“禁止(barred)”,表示卫星不提供S&F服务或不支持S&F终端设备接入,或表示该卫星提供普通的接入服务。可选的,系统消息中的cellBarredNTN信元也可以发生变化,当卫星工作在S&F模式时,则可以将cellBarredNTN信元和cellBarred信元的值设置为“禁止(barred)”,当卫星不工作在S&F模式时,则可以将cellBarredNTN信元的值设置为“不禁止(not barred)”,cellBarred信元的值设置为“禁止(barred)”。Optionally, the value of the sfBarred element in the system message can vary. If a satellite is determined to operate in S&F mode at certain times, the value of the sfBarred element can be set to "not barred", indicating that the satellite provides S&F services or supports access by S&F terminal devices. The satellite can be determined not to operate in S&F mode (operating in normal communication mode) at other times. For example, if the satellite can simultaneously connect to the core network and cover certain terminal devices at certain times, the satellite will set the value of the sfBarred element to "barred", indicating that the satellite does not provide S&F services or does not support access by S&F terminal devices, or that the satellite provides ordinary access services. Optionally, the cellBarredNTN element in the system message may also change. When the satellite operates in S&F mode, the values of the cellBarredNTN element and the cellBarred element may be set to "barred". When the satellite does not operate in S&F mode, the value of the cellBarredNTN element may be set to "not barred" and the value of the cellBarred element may be set to "barred".

相应地,对于R19之前版本的终端设备,接收系统消息,并根据系统消息中的cellBarred=barred确定该小区不允许被接入。相应地,该终端设备不会接入该小区对应的网络设备,即不会向该S&F网络设备发起接入请求。对于IAB-MT和NCR-MT,接收系统消息,并根据系统消息中的iab-support和ncr-support确定该小区不允许被接入。相应地,IAB-MT和NCR-MT不会接入该小区对应的网络设备。Accordingly, for terminal devices with versions prior to R19, they receive system messages and determine that the cell is not allowed to be accessed based on the cellBarred=barred field in the system message. Accordingly, the terminal device will not access the network device corresponding to the cell, that is, it will not initiate an access request to the S&F network device. For IAB-MT and NCR-MT, they receive system messages and determine that the cell is not allowed to be accessed based on the iab-support and ncr-support fields in the system message. Accordingly, IAB-MT and NCR-MT will not access the network device corresponding to the cell.

对于R19及后续版本的终端设备,如果该终端设备是一个支持S&F功能的终端设备,则在判断该小区是否允许自己接入时,根据系统消息中的sfBarred信令的取值确定是否向对应的网络设备发送第一请求信息。其中,如果该终端设备接收到的系统消息中的sfBarred=not barred,即表示该小区支持S&F终端设备接入,或S&F功能开启,意味着该小区允许接入,相应地,终端设备可以接入该小区,即该终端设备可以向对应的网络设备发送第一请求信息。而S&F终端设备是否一定需要读取系统消息中的cellBarred和/或cellBarredNTN信元,本申请不限定。For terminal devices of R19 and subsequent versions, if the terminal device is a terminal device that supports the S&F function, when determining whether the cell allows itself to access, it determines whether to send a first request message to the corresponding network device based on the value of the sfBarred signaling in the system message. Among them, if sfBarred=not barred in the system message received by the terminal device, it means that the cell supports S&F terminal device access, or the S&F function is turned on, which means that the cell allows access. Accordingly, the terminal device can access the cell, that is, the terminal device can send a first request message to the corresponding network device. Whether the S&F terminal device must read the cellBarred and/or cellBarredNTN information elements in the system message is not limited in this application.

其中,S&F终端设备根据系统消息,确定是否能够请求接入该网络设备,包括以下两种实现可能:The S&F terminal device determines whether it can request access to the network device based on the system message. There are two possible implementations:

1)S&F终端设备根据系统消息可以先读取cellBarred或cellBarredNTN信元,如果cellBarred=not barred或cellBarredNTN=not barred,则该终端设备直接向对应的网络设备发送第一请求信息,如果cellBarred=barred或cellBarredNTN=barred后,该终端设备再读取系统消息中的sfBarred信元确定该小区是否允许接入。1) The S&F terminal device can first read the cellBarred or cellBarredNTN information element according to the system message. If cellBarred = not barred or cellBarredNTN = not barred, the terminal device directly sends a first request message to the corresponding network device. If cellBarred = barred or cellBarredNTN = barred, the terminal device then reads the sfBarred information element in the system message to determine whether access to the cell is allowed.

2)S&F终端设备可以忽略cellBarred和cellBarredNTN信元的取值,直接读系统消息中的sfBarred信元的取值,确定该小区是否允许接入。2) The S&F terminal device can ignore the values of the cellBarred and cellBarredNTN information elements and directly read the value of the sfBarred information element in the system message to determine whether access to the cell is allowed.

对于R19及后续版本的终端设备,如果该终端设备是一个不支持S&F功能的NTN终端设备,则忽略cellBarred信元和sfBarred信元,该终端设备只基于cellBarredNTN信元的值,确定该小区是否允许该终端设备接入。在cellBarredNTN信元的值为not barred时,确定该小区允许该终端设备接入。在cellBarredNTN信元的值为barred时,确定该小区不允许该终端设备接入。For terminal devices running R19 or later versions, if the terminal device is an NTN terminal device that does not support the S&F function, the cellBarred and sfBarred information elements are ignored. The terminal device determines whether the cell allows the terminal device to access based solely on the value of the cellBarredNTN information element. If the value of the cellBarredNTN information element is not barred, the cell allows the terminal device to access. If the value of the cellBarredNTN information element is barred, the cell does not allow the terminal device to access.

对于R19及后续版本的终端设备,如果该终端设备是一个非NTN终端设备(如:地面网络终端设备,或不支持NTN功能的终端设备,或不支持接受NTN网络服务的终端设备),则忽略cellBarredNTN信元和sfBarred信元,该终端设备只基于cellBarred信元的值,确定该小区是否允许该终端设备接入。在cellBarred信元的值为not barred时,确定该小区允许该终端设备接入。在cellBarred信元的值为barred时,确定该小区不允许该终端设备接入。For terminal devices in R19 and later versions, if the terminal device is a non-NTN terminal device (such as a terrestrial network terminal device, a terminal device that does not support NTN functions, or a terminal device that does not support receiving NTN network services), the cellBarredNTN information element and the sfBarred information element are ignored. The terminal device determines whether the cell allows the terminal device to access based only on the value of the cellBarred information element. When the value of the cellBarred information element is not barred, it is determined that the cell allows the terminal device to access. When the value of the cellBarred information element is barred, it is determined that the cell does not allow the terminal device to access.

应理解,S&F场景中的网络设备广播的系统消息中结合现有的cellBarred和cellBarredNTN机制,指示拒绝非NTN UE和非S&F的NTN UE的接入,同时,对网络设备广播的系统消息中新增了sfBarred信元,只有S&F终端设备,才允许接入S&F场景中的网络设备,保证S&F网络设备只为特定类型的终端设备提供服务。It should be understood that the system messages broadcast by network devices in the S&F scenario combine the existing cellBarred and cellBarredNTN mechanisms to indicate that access by non-NTN UEs and non-S&F NTN UEs is denied. At the same time, a new sfBarred information element is added to the system messages broadcast by network devices. Only S&F terminal devices are allowed to access the network devices in the S&F scenario, ensuring that the S&F network devices only provide services for specific types of terminal devices.

下面将上述图6至图8所示的方法,结合图1中所示的ORAN的架构中,本申请实施例所示的方法还可以有以下表现方式。The methods shown in Figures 6 to 8 above are combined with the ORAN architecture shown in Figure 1. The methods shown in the embodiments of the present application can also be expressed in the following ways.

应理解,在ORAN架构中,无线电智能控制器(RAN intelligent controller,RIC)用于负责网络设备管理、运维等等,该RIC与现有ORAN架构中的操作、管理和维护(operations,administration and maintenance,OAM)类似。因此,一些OAM配置或者预配置给网络设备的信息,可以由RIC通过E2接口发给网络设备。It should be understood that in the ORAN architecture, the RAN intelligent controller (RIC) is responsible for network device management, operations, and maintenance. This RIC is similar to the operations, administration, and maintenance (OAM) function in the existing ORAN architecture. Therefore, some OAM configurations or information pre-configured for network devices can be sent by the RIC to the network devices via the E2 interface.

例如,结合上述图6所示的方法,在步骤601之前,即在该网络设备1向终端设备发送T_service信息之前,该网络设备1接收来自网络设备1的RIC通过E2接口发送的该T_service信息。在步骤602之前,即在网络设备1向终端设备发送第一信息之前,该网络设备1接收来自网络设备1的RIC通过E2接收发送的该第一信息。在步骤606之前,即在网络设备2,网络设备3发送用于指示可用区域的指示信息之前,网络设备2接收来自网络设备2的RIC通过E2接口发送的用于指示网络设备2可用区域的指示信息,网络设备3接收来自网络设备3的RIC通过E2接口发送的用于指示网络设备3可用区域的指示信息。For example, in conjunction with the method shown in FIG6 , before step 601, that is, before network device 1 sends T_service information to the terminal device, network device 1 receives the T_service information sent by the RIC of network device 1 via the E2 interface. Before step 602, that is, before network device 1 sends the first information to the terminal device, network device 1 receives the first information sent by the RIC of network device 1 via the E2 interface. Before step 606, that is, before network devices 2 and 3 send indication information indicating an available area, network device 2 receives indication information indicating the available area of network device 2 sent by the RIC of network device 2 via the E2 interface, and network device 3 receives indication information indicating the available area of network device 3 sent by the RIC of network device 3 via the E2 interface.

又例如,结合上述图7所示的方法,在步骤701之前,即在该网络设备1向终端设备发送T_service信息之前,该网络设备1接收来自网络设备1的RIC通过E2接口发送的该T_service信息。在步骤702之前,即在网络设备1向终端设备发送第一信息之前,该网络设备1接收来自网络设备1的RIC通过E2接收发送的该第一信息。在步骤709’之前,即在网络设备2发送用于指示网络设备2可用区域的指示信息之前,网络设备2接收来自网络设备2的RIC通过E2接口发送的用于指示网络设备2可用区域的指示信息。For another example, in conjunction with the method shown in FIG. 7 , before step 701, that is, before network device 1 sends T_service information to the terminal device, network device 1 receives the T_service information sent by the RIC of network device 1 via the E2 interface. Before step 702, that is, before network device 1 sends the first information to the terminal device, network device 1 receives the first information sent by the RIC of network device 1 via the E2 interface. Before step 709', that is, before network device 2 sends the indication information indicating the available area of network device 2, network device 2 receives the indication information indicating the available area of network device 2 sent by the RIC of network device 2 via the E2 interface.

又例如,结合上述图8所示的方法,在步骤801之前,即在该网络设备1向终端设备发送T_service信息之前,该网络设备1接收来自网络设备1的RIC通过E2接口发送的该T_service信息。在步骤802之前,即在网络设备1向终端设备发送第一信息之前,该网络设备1接收来自网络设备1的RIC通过E2接收发送的该第一信息。在步骤805之前,即在网络设备2,网络设备3发送用于指示可用区域的指示信息之前,网络设备2接收来自网络设备2的RIC通过E2接口发送的用于指示网络设备2可用区域的指示信息,网络设备3接收来自网络设备3的RIC通过E2接口发送的用于指示网络设备3可用区域的指示信息。For another example, in conjunction with the method shown in FIG8 , before step 801, that is, before network device 1 sends T_service information to the terminal device, network device 1 receives the T_service information sent by the RIC of network device 1 via the E2 interface. Before step 802, that is, before network device 1 sends the first information to the terminal device, network device 1 receives the first information sent by the RIC of network device 1 via the E2 interface. Before step 805, that is, before network devices 2 and 3 send indication information indicating the available area, network device 2 receives indication information indicating the available area of network device 2 sent by the RIC of network device 2 via the E2 interface, and network device 3 receives indication information indicating the available area of network device 3 sent by the RIC of network device 3 via the E2 interface.

应理解,上述将图6至图8所示的方法与ORAN架构相结合,考虑在ORAN架构下,网络设备能够通过E2接口获取相关信息的方法。例如,网络设备1的RIC能够告知网络设备1停止为终端设备提供服务的T_service信息和第一信息。网络设备2的RIC,网络设备3的RIC能够告知网络设备2,网络设备3对应的可用区域,从而使网络设备能够向终端设备正确的发送相关信息,保证传输信息的准确性。It should be understood that the above-mentioned methods shown in Figures 6 to 8 are combined with the ORAN architecture, considering the method in which the network device can obtain relevant information through the E2 interface under the ORAN architecture. For example, the RIC of network device 1 can inform network device 1 of the T_service information and the first information that it has stopped providing services to the terminal device. The RIC of network device 2 and the RIC of network device 3 can inform network device 2 and network device 3 of their corresponding available areas, thereby enabling the network device to correctly send relevant information to the terminal device, ensuring the accuracy of the transmitted information.

以上结合图1至图8说明了本申请实施例提供的通信方法,在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,各个实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。例如,图5,图6,图7和图8中的任两个或全部可以结合。The communication method provided by the embodiments of the present application is described above in conjunction with Figures 1 to 8. In the various embodiments of the present application, unless otherwise specified or logically conflicting, the terms and/or descriptions between the various embodiments are consistent and can be referenced from each other. The technical features of different embodiments can be combined to form new embodiments based on their inherent logical relationships. For example, any two or all of Figures 5, 6, 7, and 8 can be combined.

下面结合图9至图11详细说明本申请实施例提供的通信装置。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,这里不再赘述。The communication device provided in the embodiment of the present application is described in detail below with reference to Figures 9 to 11. It should be understood that the description of the device embodiment corresponds to the description of the method embodiment. Therefore, for matters not described in detail, reference can be made to the method embodiment above. For the sake of brevity, they will not be repeated here.

图9为本申请实施例提供的一种通信装置2000的示意性框图。该装置2000包括收发单元2010(或称收发模块)和处理单元2020(或称处理模块),收发单元2010可以用于实现相应的收发功能,处理单元2020可以用于实现相应的处理功能。通信装置可以用于执行图5至图8所示的实施例中任一实施例中终端设备或网络设备执行的方法。Figure 9 is a schematic block diagram of a communication device 2000 provided in an embodiment of the present application. The device 2000 includes a transceiver unit 2010 (or transceiver module) and a processing unit 2020 (or processing module). The transceiver unit 2010 can be used to implement corresponding transceiver functions, and the processing unit 2020 can be used to implement corresponding processing functions. The communication device can be used to execute the method performed by the terminal device or network device in any of the embodiments shown in Figures 5 to 8.

可选地,收发单元2020可以包括发送单元和接收单元。发送单元用于执行上述方法实施例中的发送操作。接收单元用于执行上述方法实施例中的接收操作。Optionally, the transceiver unit 2020 may include a sending unit and a receiving unit. The sending unit is configured to perform the sending operation in the above method embodiment. The receiving unit is configured to perform the receiving operation in the above method embodiment.

可选地,该通信装置2000还包括存储单元,该存储单元可以用于存储指令和/或数据,处理单元2020可以读取存储单元中的指令和/或数据,以使得装置实现前述各个方法实施例中的由终端设备或网络设备执行的相关动作。Optionally, the communication device 2000 also includes a storage unit, which can be used to store instructions and/or data, and the processing unit 2020 can read the instructions and/or data in the storage unit so that the device implements the relevant actions performed by the terminal device or network device in the aforementioned various method embodiments.

在一些实现方式中,该通信装置2000用于执行上述图5至图8所示的实施例中任一实施例中终端设备所执行的动作。In some implementations, the communication device 2000 is used to perform the actions performed by the terminal device in any of the embodiments shown in Figures 5 to 8 above.

例如,在终端设备离开为所述终端设备提供服务的第一网络设备的覆盖范围时,处理单元2020:用于将通信装置的状态从连接态变更为第一状态,所述第一状态包括以下任一项:所述终端设备的接入层AS挂起的连接态,挂起的空闲态,或者非激活态;收发单元2010:用于向第二网络设备发送第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述第一请求信息包括所述终端设备的标识信息,其中,所述第一网络设备和所述第二网络设备为非地面网络设备。For example, when the terminal device leaves the coverage of the first network device that provides services for the terminal device, the processing unit 2020 is used to change the state of the communication device from a connected state to a first state, and the first state includes any one of the following: a suspended connected state, a suspended idle state, or an inactive state of the access layer AS of the terminal device; the transceiver unit 2010 is used to send a first request message to the second network device, and the first request message is used to request access to the second network device, and the first request message includes the identification information of the terminal device, wherein the first network device and the second network device are non-terrestrial network devices.

该收发单元2010还用于执行如上述图5至图8所示的实施例中终端设备的接收和发送的处理;该处理单元2020还用于执行上述图5至图8所示的实施例中终端设备除接收和发送之外的其他处理。The transceiver unit 2010 is also used to perform the reception and transmission processing of the terminal device in the embodiments shown in Figures 5 to 8 above; the processing unit 2020 is also used to perform other processing of the terminal device in addition to reception and transmission in the embodiments shown in Figures 5 to 8 above.

在一些实现方式中,该通信装置2000用于执行上述图5至图8所示的实施例中任一实施例中网络设备1所执行的动作。In some implementations, the communication device 2000 is used to perform the actions performed by the network device 1 in any of the embodiments shown in Figures 5 to 8 above.

例如,收发单元2010:用于向终端设备发送第一指示信息,第一指示信息用于指示在所述终端设备离开所述第一网络设备的覆盖范围又重新进入所述第一网络设备的覆盖范围时,所述终端设备接入所述第一网络设备;收发单元,还用于向接收来自所述终端设备的所述第一请求信息,所述第一请求信息用于请求接入所述第一网络设备,其中,所述第一网络设备为非地面网络设备。For example, the transceiver unit 2010 is used to send a first indication message to the terminal device, where the first indication message is used to indicate that the terminal device accesses the first network device when the terminal device leaves the coverage of the first network device and re-enters the coverage of the first network device; the transceiver unit is also used to receive the first request message from the terminal device, where the first request message is used to request access to the first network device, wherein the first network device is a non-ground network device.

应理解,该收发单元2010还用于执行如上述图5中第一网络设备的接收和发送的处理。It should be understood that the transceiver unit 2010 is also used to perform the receiving and sending processing of the first network device in Figure 5 above.

例如,收发单元2010:用于向终端设备发送第一信息,第一信息包括至少一个第三网络设备;收发单元2010:还用于向核心网设备发送第二信息,第二信息包括终端设备的第一上下文信息,终端设备的第一上下文信息包括终端设备的标识信息,其中,第一网络设备和至少一个第三网络设备为非地面网络设备,在第一网络设备具有未被使用过的下一跳NH的情况下,终端设备的第一上下文信息还包括:密钥和下一跳链计算NCC,密钥是第一网络设备根据NH确定的,或者,在第一网络设备不具有未被使用过的NH的情况下,终端设备的第一上下文信息还包括:第二指示信息,第二指示信息用于指示核心网设备确定NH和NCC。For example, the transceiver unit 2010 is used to send first information to the terminal device, the first information includes at least one third network device; the transceiver unit 2010 is also used to send second information to the core network device, the second information includes first context information of the terminal device, the first context information of the terminal device includes identification information of the terminal device, wherein the first network device and the at least one third network device are non-terrestrial network devices, and when the first network device has an unused next hop NH, the first context information of the terminal device also includes: a key and a next hop chain calculation NCC, and the key is determined by the first network device according to the NH, or, when the first network device does not have an unused NH, the first context information of the terminal device also includes: second indication information, and the second indication information is used to instruct the core network device to determine the NH and NCC.

该收发单元2010还用于执行如上述图6至图8所示的实施例中第一网络设备的接收和发送的处理。The transceiver unit 2010 is further configured to execute the receiving and sending processing of the first network device in the embodiments shown in FIG. 6 to FIG. 8 .

可选的,该通信装置2000还可以包括处理单元2020,该处理单元2020用于执行上述图6至图8所示的实施例中第一网络设备除接收和发送之外的其他处理。Optionally, the communication device 2000 may further include a processing unit 2020, which is configured to execute other processing except receiving and sending by the first network device in the embodiments shown in FIG. 6 to FIG. 8 .

在一些实现方式中,该通信装置2000用于执行上述图5至图8所示的实施例中任一实施例中核心网设备所执行的动作。In some implementations, the communication device 2000 is used to perform the actions performed by the core network device in any of the embodiments shown in Figures 5 to 8 above.

例如,收发单元2010:用于接收来自第一网络设备的第二信息,第二信息包括终端设备的第一上下文信息,终端设备的第一上下文信息包括终端设备的标识信息;收发单元2010,还用于向至少一个第三网络设备发送终端设备的第二上下文信息,终端设备的第二上下文信息包括密钥和NCC,或者,终端设备的第二上下文信息包括NCC和下一跳NH,其中,密钥是根据NH确定的,第一网络设备和至少一个第三网络设备为非地面网络设备。For example, the transceiver unit 2010 is used to receive second information from the first network device, the second information includes first context information of the terminal device, and the first context information of the terminal device includes identification information of the terminal device; the transceiver unit 2010 is also used to send the second context information of the terminal device to at least one third network device, the second context information of the terminal device includes a key and an NCC, or the second context information of the terminal device includes an NCC and a next hop NH, wherein the key is determined based on the NH, and the first network device and the at least one third network device are non-terrestrial network devices.

该收发单元2010还用于执行如上述图6至图8所示的实施例中核心网设备的接收和发送的处理。The transceiver unit 2010 is also used to perform the receiving and sending processing of the core network device in the embodiments shown in Figures 6 to 8 above.

可选的,该通信装置2000还可以包括处理单元2020,该处理单元2020用于执行上述图6至图8所示的实施例中核心网设备除接收和发送之外的其他处理。Optionally, the communication device 2000 may further include a processing unit 2020, which is used to perform other processing of the core network device in the embodiments shown in Figures 6 to 8 except for receiving and sending.

在一些实现方式中,该通信装置2000用于执行上述图5至图8所示的实施例中任一实施例中网络设备2所执行的动作。In some implementations, the communication device 2000 is used to perform the actions performed by the network device 2 in any of the embodiments shown in Figures 5 to 8 above.

例如,收发单元2010:用于接收来自核心网设备的终端设备的第二上下文信息;收发单元2010:用于接收来自所述终端设备的第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述第一请求信息包括所述终端设备的标识信息,其中,所述第二网络设备为非地面网络设备。For example, the transceiver unit 2010 is used to receive second context information of a terminal device from a core network device; the transceiver unit 2010 is used to receive first request information from the terminal device, the first request information is used to request access to the second network device, the first request information includes identification information of the terminal device, wherein the second network device is a non-ground network device.

该收发单元2010还用于执行如上述图6至图8所示的实施例中第二网络设备的接收和发送的处理。The transceiver unit 2010 is further configured to execute the receiving and sending processing of the second network device in the embodiments shown in FIG. 6 to FIG. 8 .

可选的,该通信装置2000还可以包括处理单元2020,该处理单元2020用于执行上述图6至图8所示的实施例中第二网络设备除接收和发送之外的其他处理。Optionally, the communication device 2000 may further include a processing unit 2020, which is configured to execute other processing except receiving and sending by the second network device in the embodiments shown in FIG. 6 to FIG. 8 .

应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the specific process of each unit executing the above corresponding steps has been described in detail in the above method embodiment, and for the sake of brevity, it will not be repeated here.

还应理解,这里的装置2000以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,装置2000可以具体为上述实施例中的通信装置,可以用于执行上述各方法实施例中与通信装置对应的各个流程和/或步骤,为避免重复,在此不再赘述。It should also be understood that the device 2000 herein is embodied in the form of a functional unit. The term "unit" herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (e.g., a shared processor, a dedicated processor, or a group processor, etc.) and memory for executing one or more software or firmware programs, a combined logic circuit, and/or other suitable components that support the described functions. In an optional example, those skilled in the art will understand that the device 2000 may be specifically the communication device in the above-mentioned embodiment, and may be used to execute the various processes and/or steps corresponding to the communication device in the above-mentioned method embodiments. To avoid repetition, they will not be described here.

上述各个方案的装置2000具有实现上述方法中通信装置(如终端设备或网络设备)所执行的相应步骤的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块;例如收发单元可以由收发机替代(例如,收发单元中的发送单元可以由发送机替代,收发单元中的接收单元可以由接收机替代),其它单元,如处理单元等可以由处理器替代,分别执行各个方法实施例中的收发操作以及相关的处理操作。The apparatus 2000 of each of the above-mentioned solutions has the function of implementing the corresponding steps performed by the communication device (such as a terminal device or a network device) in the above-mentioned method. The functions can be implemented by hardware, or the corresponding software can be implemented by hardware. The hardware or software includes one or more modules corresponding to the above-mentioned functions; for example, the transceiver unit can be replaced by a transceiver (for example, the sending unit in the transceiver unit can be replaced by a transmitter, and the receiving unit in the transceiver unit can be replaced by a receiver), and other units, such as the processing unit, can be replaced by a processor to respectively perform the sending and receiving operations and related processing operations in each method embodiment.

此外,上述收发单元2020还可以是收发电路(例如可以包括发送电路,或者还可以包括接收电路),处理单元2020可以是处理电路。In addition, the above-mentioned transceiver unit 2020 can also be a transceiver circuit (for example, it can include a sending circuit, or can also include a receiving circuit), and the processing unit 2020 can be a processing circuit.

需要指出的是,图9中的装置可以是前述实施例中的通信设备(如终端设备或网络设备),也可以是芯片或者芯片系统,例如:片上系统(system on chip,SoC)。其中,收发单元可以是输入输出电路、通信接口;处理单元为该芯片上集成的处理器或者微处理器或者集成电路。在此不做限定。It should be noted that the device in FIG9 can be the communication device (such as a terminal device or network device) in the aforementioned embodiments, or it can be a chip or chip system, such as a system on a chip (SoC). The transceiver unit can be an input/output circuit or a communication interface; the processing unit can be a processor, microprocessor, or integrated circuit integrated on the chip. This is not limited here.

图10示出了本申请实施例提供另一种通信装置2100的示意图。该装置2100包括处理器2110,处理器2110与存储器2120耦合,存储器2120用于存储计算机程序或指令和/或数据,处理器2110用于执行存储器2120存储的计算机程序或指令,或读取存储器2120存储的数据,以执行上文各方法实施例中的方法。FIG10 is a schematic diagram of another communication device 2100 provided in an embodiment of the present application. The device 2100 includes a processor 2110, which is coupled to a memory 2120. The memory 2120 is configured to store computer programs or instructions and/or data. The processor 2110 is configured to execute the computer programs or instructions stored in the memory 2120, or read data stored in the memory 2120, to perform the methods described in the above method embodiments.

可选地,处理器2110为一个或多个。Optionally, there are one or more processors 2110 .

可选地,存储器2120为一个或多个。Optionally, the memory 2120 is one or more.

可选地,该存储器2120与该处理器2110集成在一起,或者分离设置。Optionally, the memory 2120 is integrated with the processor 2110 or provided separately.

可选地,如图10所示,该装置2100还包括收发器2130,收发器2130用于信号的接收和/或发送。例如,处理器2110用于控制收发器2130进行信号的接收和/或发送。Optionally, as shown in Figure 10, the apparatus 2100 further includes a transceiver 2130, which is configured to receive and/or transmit signals. For example, the processor 2110 is configured to control the transceiver 2130 to receive and/or transmit signals.

作为示例,处理器2110可以具有图7中所示的处理单元2020的功能,存储器2120可以具有存储单元的功能,收发器2130可以具有图7中所示的收发单元2020的功能。As an example, the processor 2110 may have the function of the processing unit 2020 shown in FIG. 7 , the memory 2120 may have the function of a storage unit, and the transceiver 2130 may have the function of the transceiver unit 2020 shown in FIG. 7 .

作为一种方案,该装置2100用于实现上文各个方法实施例中由通信装置(如终端设备或网络设备)执行的操作。As a solution, the device 2100 is used to implement the operations performed by a communication device (such as a terminal device or a network device) in the above various method embodiments.

例如,处理器2110用于执行存储器2120存储的计算机程序或指令,以实现上文各个方法实施例中通信装置的相关操作。For example, the processor 2110 is configured to execute computer programs or instructions stored in the memory 2120 to implement relevant operations of the communication device in the above various method embodiments.

在一些实现方式中,当装置2100为终端设备时,收发器2130可以包括发射机、接收机、射频电路、天线以及输入输出装置。处理器2110主要用于对通信协议以及通信数据进行处理,以及对终端设备进行控制,执行软件程序,处理软件程序的数据等。存储器2120主要用于存储软件程序和数据。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置(例如,触摸屏、显示屏,键盘等)主要用于接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的终端设备可以不具有输入输出装置。In some implementations, when the device 2100 is a terminal device, the transceiver 2130 may include a transmitter, a receiver, a radio frequency circuit, an antenna, and input and output devices. The processor 2110 is mainly used to process communication protocols and communication data, as well as to control the terminal device, execute software programs, process software program data, etc. The memory 2120 is mainly used to store software programs and data. The radio frequency circuit is mainly used to convert baseband signals into radio frequency signals and process radio frequency signals. The antenna is mainly used to transmit and receive radio frequency signals in the form of electromagnetic waves. The input and output devices (for example, a touch screen, a display screen, a keyboard, etc.) are mainly used to receive data input by the user and output data to the user. It should be noted that some types of terminal devices may not have input and output devices.

当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。When data needs to be sent, the processor performs baseband processing on the data to be transmitted and outputs the baseband signal to the RF circuit. The RF circuit then performs RF processing on the baseband signal and transmits it via the antenna in the form of electromagnetic waves. When data is sent to a terminal device, the RF circuit receives the RF signal via the antenna, converts it into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes it.

在另一些实现方式中,当装置2100为网络设备,例如为基站时,处理器2110主要用于基带处理,对基站进行控制等;处理器2110通常是基站的控制中心,用于控制基站执行上述方法实施例中网络设备侧的处理操作。存储器2120主要用于存储计算机程序代码和数据。收发器2130主要用于射频信号的收发以及射频信号与基带信号的转换;收发器2130可以包括天线和射频电路(图中未示出),其中射频电路主要用于进行射频处理。In other implementations, when the apparatus 2100 is a network device, such as a base station, the processor 2110 is primarily used for baseband processing, controlling the base station, etc.; the processor 2110 is typically the control center of the base station, used to control the base station to perform the processing operations on the network device side in the above-mentioned method embodiment. The memory 2120 is primarily used to store computer program code and data. The transceiver 2130 is primarily used for transmitting and receiving radio frequency signals and converting radio frequency signals into baseband signals; the transceiver 2130 may include an antenna and a radio frequency circuit (not shown in the figure), wherein the radio frequency circuit is primarily used for radio frequency processing.

在本申请实施例中,可以将具有收发功能的天线和射频电路视为终端设备或网络设备的收发模块,将具有处理功能的处理器视为终端设备或网络设备的处理模块。In the embodiment of the present application, the antenna and radio frequency circuit with transceiver functions can be regarded as the transceiver module of the terminal device or network device, and the processor with processing function can be regarded as the processing module of the terminal device or network device.

在一些实现方式中,处理器2110也可以称为处理单元,处理单板,处理模块、处理装置等。收发器2130也可以称为收发单元、收发机、收发装置等。In some implementations, the processor 2110 may also be referred to as a processing unit, a processing board, a processing module, a processing device, etc. The transceiver 2130 may also be referred to as a transceiver unit, a transceiver, a transceiver device, etc.

当该装置2100为芯片时,该芯片包括处理器、存储器和收发器。其中,收发器可以是输入输出电路或通信接口;处理器可以为该芯片上集成的处理模块或者微处理器或者集成电路。上述方法实施例中终端设备的发送操作可以理解为芯片的输出,上述方法实施例中终端设备的接收操作可以理解为芯片的输入。When the device 2100 is a chip, the chip includes a processor, memory, and a transceiver. The transceiver can be an input/output circuit or a communication interface; the processor can be a processing module, microprocessor, or integrated circuit integrated on the chip. The sending operation of the terminal device in the above method embodiment can be understood as the chip's output, and the receiving operation of the terminal device in the above method embodiment can be understood as the chip's input.

应理解,本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that the processor mentioned in the embodiments of the present application may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA), or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or any conventional processor, etc.

还应理解,本申请实施例中提及的存储器可以是易失性存储器和/或非易失性存储器。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。例如,RAM可以用作外部高速缓存。作为示例而非限定,RAM包括如下多种形式:静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。It should also be understood that the memory mentioned in the embodiments of the present application can be a volatile memory and/or a non-volatile memory. Among them, the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory can be a random access memory (RAM). For example, RAM can be used as an external cache. By way of example and not limitation, RAM includes the following forms: static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronized DRAM (SLDRAM), and direct rambus RAM (DR RAM).

需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。It should be noted that when the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) can be integrated into the processor.

还需要说明的是,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should also be noted that the memory described herein is intended to include, but is not limited to, these and any other suitable types of memory.

图11示出了本申请实施例提供一种芯片系统2200的示意图。该芯片系统2200(或者也可以称为处理系统)包括逻辑电路2210以及输入/输出接口(input/output interface)2220。FIG11 is a schematic diagram of a chip system 2200 provided in accordance with an embodiment of the present application. The chip system 2200 (or processing system) includes a logic circuit 2210 and an input/output interface 2220.

其中,逻辑电路2210可以为芯片系统2200中的处理电路。逻辑电路2210可以耦合连接存储单元,调用存储单元中的指令,使得芯片系统2200可以实现本申请各实施例的方法和功能。输入/输出接口2220,可以为芯片系统2200中的输入输出电路,将芯片系统2200处理好的信息输出,或将待处理的数据或信令信息输入芯片系统2200进行处理。Logic circuit 2210 may be a processing circuit within chip system 2200. Logic circuit 2210 may be coupled to a storage unit and invoke instructions within the storage unit, enabling chip system 2200 to implement the methods and functions of various embodiments of the present application. Input/output interface 2220 may be an input/output circuit within chip system 2200, outputting information processed by chip system 2200 or inputting data or signaling information to be processed into chip system 2200 for processing.

作为一种方案,该芯片系统2200用于实现上文各个方法实施例中由通信装置(如终端设备或网络设备)执行的操作。As a solution, the chip system 2200 is used to implement the operations performed by a communication device (such as a terminal device or a network device) in the above various method embodiments.

例如,逻辑电路2210用于实现上文方法实施例中由通信装置(如终端设备或网络设备)执行的处理相关的操作;输入/输出接口2220用于实现上文方法实施例中由通信装置(如终端设备或网络设备)执行的发送和/或接收相关的操作。For example, the logic circuit 2210 is used to implement the processing-related operations performed by the communication device (such as a terminal device or a network device) in the above method embodiments; the input/output interface 2220 is used to implement the sending and/or receiving-related operations performed by the communication device (such as a terminal device or a network device) in the above method embodiments.

本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述各方法实施例中由通信装置(如终端设备或网络设备)执行的方法的计算机指令。An embodiment of the present application further provides a computer-readable storage medium on which computer instructions are stored for implementing the methods executed by a communication device (such as a terminal device or a network device) in the above-mentioned method embodiments.

例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法各实施例中由通信装置(如终端设备)执行的方法。For example, when the computer program is executed by a computer, the computer can implement the methods performed by the communication device (such as terminal equipment) in each embodiment of the above method.

本申请实施例还提供一种计算机程序产品,包含指令,该指令被计算机执行时以实现上述各方法实施例中由通信装置(如终端设备或网络设备)执行的方法。An embodiment of the present application further provides a computer program product comprising instructions, which, when executed by a computer, implement the methods performed by a communication device (such as a terminal device or a network device) in the above-mentioned method embodiments.

所属领域的技术人员可以清楚地了解到,为描述方便和简洁,上述提供的任一种通信装置中相关内容的解释及有益效果均可参考上文提供的对应的方法实施例,此处不再赘述。Those skilled in the art can clearly understand that, for the sake of convenience and brevity of description, the explanation and beneficial effects of the relevant contents in any of the communication devices provided above can refer to the corresponding method embodiments provided above, and will not be repeated here.

为了便于理解本申请实施例,首先做出以下几点说明。In order to facilitate understanding of the embodiments of the present application, the following points are first explained.

一、除非另有说明,“至少一个”的含义是一个或者多个,“多个”的含义是两个或两个以上。1. Unless otherwise specified, “at least one” means one or more, and “more than one” means two or more.

二、如果没有特殊说明以及逻辑冲突,本申请不同实施例之间的术语和/或描述具有一致性、且可以相互引用,不同实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。2. Unless otherwise specified or there is no logical conflict, the terms and/or descriptions between different embodiments of this application are consistent and can be referenced by each other. The technical features in different embodiments can be combined to form new embodiments based on their internal logical relationships.

三、本申请涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的保护范围。本申请涉及的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。例如,本申请的说明书和权利要求书及附图中的术语“第一”、“第二”、“第三”、“第四”以及其他各种术语标号等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。其中,这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。3. The various numerical numbers involved in this application are only used for the convenience of description and are not used to limit the scope of protection of this application. The size of the serial numbers involved in this application does not mean the order of execution. The order of execution of each process should be determined by its function and internal logic. For example, the terms "first", "second", "third", "fourth" and other various terminology labels (if any) in the specification and claims and drawings of this application are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. Among them, the data used in this way can be interchangeable where appropriate, so that the embodiments described here can be implemented in an order other than what is illustrated or described here.

同时,本申请被描述为“示例性地”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念,便于理解。At the same time, any embodiment or design described in this application as "exemplary" or "for example" should not be interpreted as being more preferred or more advantageous than other embodiments or designs. Specifically, the use of words such as "exemplary" or "for example" is intended to present the relevant concepts in a concrete manner to facilitate understanding.

四、术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。4. The terms "comprise" and "have" and any variations thereof are intended to cover non-exclusive inclusions. For example, a process, method, system, product or apparatus that includes a series of steps or units is not necessarily limited to those steps or units explicitly listed, but may include other steps or units not explicitly listed or inherent to such process, method, product or apparatus.

五、本申请中,“用于指示”可以理解为“使能”,“使能”可以包括直接使能和间接使能。当描述某一信息用于使能A时,可以包括该信息直接使能A或间接使能A,而并不代表该信息中一定携带有A。5. In this application, "used to indicate" can be understood as "enabling," and "enabling" can include direct enabling and indirect enabling. When describing that certain information is used to enable A, it can include that the information directly enables A or indirectly enables A, and does not necessarily mean that the information contains A.

将信息所使能的信息称为待使能信息,则具体实现过程中,对待使能信息进行使能的方式有很多种,例如但不限于,可以直接使能待使能信息,如待使能信息本身或者该待使能信息的索引等。也可以通过使能其他信息来间接使能待使能信息,其中该其他信息与待使能信息之间存在关联关系。还可以仅仅使能待使能信息的一部分,而待使能信息的其他部分则是已知的或者提前约定的。例如,还可以借助预先约定(例如协议规定)的各个信息的排列顺序来实现对特定信息的使能,从而在一定程度上降低使能开销。同时,还可以识别各个信息的通用部分并统一使能,以降低单独使能同样的信息而带来的使能开销。The information enabled by the information is called information to be enabled. In the specific implementation process, there are many ways to enable the enabled information, such as but not limited to, directly enabling the information to be enabled, such as the information to be enabled itself or the index of the information to be enabled. The information to be enabled can also be indirectly enabled by enabling other information, wherein there is an association between the other information and the information to be enabled. It is also possible to enable only a part of the information to be enabled, while the other parts of the information to be enabled are known or agreed in advance. For example, it is also possible to enable specific information with the help of the arrangement order of each piece of information agreed in advance (such as specified in the protocol), thereby reducing the enabling overhead to a certain extent. At the same time, it is also possible to identify the common parts of each piece of information and enable them uniformly to reduce the enabling overhead caused by enabling the same information separately.

六、本申请中,“预配置”可包括预先定义,例如,协议定义。其中,“预先定义”可以通过在设备(例如,包括各个网元)中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其具体的实现方式不做限定。6. In this application, "pre-configuration" may include pre-definition, such as protocol definition. "Pre-definition" may be implemented by pre-storing corresponding codes, tables, or other methods that can be used to indicate relevant information in a device (e.g., including each network element). This application does not limit the specific implementation method.

七、本申请涉及的“存储”或“保存”,可以是指保存在一个或者多个存储器中。一个或者多个存储器,可以是单独设置,也可以是集成在编码器或者译码器,处理器、或通信装置中。一个或者多个存储器,也可以是一部分单独设置,一部分集成在译码器、处理器、或通信装置中。存储器的类型可以是任意形式的存储介质,对此不予限定。7. "Storage" or "storage" as used in this application may refer to storage in one or more memories. The one or more memories may be provided separately or integrated into an encoder or decoder, a processor, or a communication device. The one or more memories may also have some provided separately and some integrated into a decoder, processor, or communication device. The type of memory may be any form of storage medium and is not limited thereto.

八、本申请涉及的“协议”可以是指通信领域的标准协议,例如可以包括第四代(4th generation,4G)网络、第五代(5th generation,5G)网络协议、新无线(new radio,NR)协议、5.5G网络协议、第六代(6th generation,6G)网络协议以及应用于未来的通信系统中的相关协议,本申请对此不做限定。8. The “protocol” referred to in this application may refer to a standard protocol in the field of communications, for example, it may include the fourth generation (4G) network, the fifth generation (5G) network protocol, the new radio (NR) protocol, the 5.5G network protocol, the sixth generation (6G) network protocol and related protocols used in future communication systems, and this application does not limit this.

九、本申请说明书附图部分的示意图中的虚线所示的箭头或方框表示可选的步骤或可选的模块。9. The arrows or boxes indicated by dotted lines in the schematic diagrams in the accompanying drawings of this application specification represent optional steps or optional modules.

十、除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。10. Unless otherwise specified, “/” indicates that the objects associated with each other are in an “or” relationship. For example, A/B can mean A or B. “And/or” in this application is only a description of the association relationship between the associated objects, indicating that there can be three relationships. For example, A and/or B can mean: A exists alone, A and B exist at the same time, and B exists alone. A and B can be singular or plural.

在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods can be implemented in other ways. For example, the device embodiments described above are merely schematic. For example, the division of the units is merely a logical function division. In actual implementation, there may be other division methods, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be an indirect coupling or communication connection through some interfaces, devices or units, which can be electrical, mechanical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed across multiple network units. Some or all of these units may be selected to achieve the purpose of this embodiment according to actual needs.

另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, the functional units in the various embodiments of the present application may be integrated into a single processing unit, or each unit may exist physically separately, or two or more units may be integrated into a single unit. The aforementioned integrated units may be implemented in the form of hardware or software functional units.

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the part that essentially contributes to the technical solution of the present application or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including a number of instructions for enabling a computer device (which can be a personal computer, server, or network device, etc.) to execute all or part of the steps of the method described in each embodiment of the present application. The aforementioned storage medium includes: various media that can store program codes, such as a USB flash drive, a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.

以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。As described above, the above embodiments are only used to illustrate the technical solutions of the present application, rather than to limit them. Although the present application has been described in detail with reference to the above embodiments, those skilled in the art should understand that they can still modify the technical solutions described in the above embodiments, or make equivalent replacements for some of the technical features therein. However, these modifications or replacements do not cause the essence of the corresponding technical solutions to deviate from the scope of the technical solutions of the embodiments of the present application.

Claims (17)

一种通信方法,其特征在于,包括:A communication method, comprising: 第二网络设备发送第一消息,所述第一消息包括第一信元,所述第一信元用于指示是否允许第一类终端设备接入所述第二网络设备,所述第一类终端设备包括存储转发终端设备;The second network device sends a first message, where the first message includes a first information element, where the first information element is used to indicate whether a first-type terminal device is allowed to access the second network device, where the first-type terminal device includes a store-and-forward terminal device; 所述第二网络设备接收来自终端设备的第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,所述终端设备为所述第一类终端设备,其中,该第二网络设备为非地面网络设备。The second network device receives first request information from a terminal device, where the first request information is used to request access to the second network device, the terminal device is the first type of terminal device, and the second network device is a non-terrestrial network device. 根据权利要求1所述的方法,其特征在于,所述第一消息为系统信息块SIB。The method according to claim 1 is characterized in that the first message is a system information block SIB. 根据权利要求1或2所述的方法,其特征在于,所述第一信元用于指示允许所述第一类终端设备接入所述第二网络设备,所述第二网络设备工作在存储转发模式。The method according to claim 1 or 2 is characterized in that the first information element is used to indicate that the first type of terminal device is allowed to access the second network device, and the second network device operates in a store-and-forward mode. 根据权利要求1至3中任一项所述的方法,其特征在于,所述第一消息还包括第二信元和/或第三信元,所述第二信元用于指示是否允许第二类终端设备接入所述第二网络设备,所述第三信元用于指示是否允许第三类终端设备接入所述第二网络设备,The method according to any one of claims 1 to 3, characterized in that the first message further includes a second information element and/or a third information element, the second information element is used to indicate whether the second type of terminal device is allowed to access the second network device, and the third information element is used to indicate whether the third type of terminal device is allowed to access the second network device. 其中,所述第二类终端设备包括地面网络终端设备,第三类终端设备包括非地面网络终端设备。Among them, the second type of terminal equipment includes ground network terminal equipment, and the third type of terminal equipment includes non-ground network terminal equipment. 根据权利要求4所述的方法,其特征在于,所述第二网络设备在存储转发模式下,所述第三信元为第三值,所述第三信元用于指示拒绝所述第三类终端设备接入所述第二网络设备。The method according to claim 4 is characterized in that, when the second network device is in store-and-forward mode, the third information element is a third value, and the third information element is used to indicate that the third type of terminal device is denied access to the second network device. 一种通信方法,其特征在于,包括:A communication method, comprising: 终端设备接收第一消息,所述第一消息包括第一信元,所述第一信元用于指示是否允许第一类终端设备接入第二网络设备,所述第一类终端设备包括存储转发终端设备;The terminal device receives a first message, where the first message includes a first information element, where the first information element is used to indicate whether a first type of terminal device is allowed to access the second network device, where the first type of terminal device includes a store-and-forward terminal device; 在所述第一信元用于指示允许第一类终端设备接入第二网络设备,所述终端设备为所述第一类终端设备情况下,所述终端设备向所述第二网络设备发送第一请求信息,所述第一请求信息用于请求接入所述第二网络设备,其中,该第二网络设备为非地面网络设备。When the first information element is used to indicate that a first type of terminal device is allowed to access a second network device, and the terminal device is the first type of terminal device, the terminal device sends a first request information to the second network device, and the first request information is used to request access to the second network device, wherein the second network device is a non-terrestrial network device. 根据权利要求6所述的方法,其特征在于,第一消息还包括第二信元和/或第三信元,所述第二信元用于指示是否允许第二类终端设备接入所述第二网络设备,所述第三信元用于指示是否允许第三类终端设备接入所述第二网络设备,其中,所述第二类终端设备包括地面网络终端设备,第三类终端设备包括非地面网络终端设备。The method according to claim 6 is characterized in that the first message further includes a second information element and/or a third information element, the second information element is used to indicate whether a second type of terminal device is allowed to access the second network device, and the third information element is used to indicate whether a third type of terminal device is allowed to access the second network device, wherein the second type of terminal device includes a terrestrial network terminal device, and the third type of terminal device includes a non-terrestrial network terminal device. 根据权利要求7所述的方法,其特征在于,所述第一消息包括所述第二信元和所述第三信元,The method according to claim 7, wherein the first message includes the second information element and the third information element, 当所述终端设备为所述第一类终端设备时,所述终端设备忽略所述第一消息中所述第二信元和所述第三信元的取值,所述终端设备根据所述第一信元,确定是否向所述第二网络设备发送所述第一请求信息。When the terminal device is the first type of terminal device, the terminal device ignores the values of the second information element and the third information element in the first message, and the terminal device determines whether to send the first request information to the second network device based on the first information element. 根据权利要求7所述的方法,其特征在于,所述第一消息包括所述第二信元和所述第三信元,The method according to claim 7, wherein the first message includes the second information element and the third information element, 在所述终端设备不是所述第一类终端设备,且所述终端设备是所述第三类终端设备的情况下,所述终端设备忽略所述第一信元和所述第二信元,所述终端设备根据所述第三信元,确定是否向所述第二网络设备发送所述第一请求信息。When the terminal device is not the first type of terminal device and is the third type of terminal device, the terminal device ignores the first information element and the second information element, and the terminal device determines whether to send the first request information to the second network device based on the third information element. 根据权利要求7所述的方法,其特征在于,所述第一消息包括所述第二信元和所述第三信元,The method according to claim 7, wherein the first message includes the second information element and the third information element, 在所述终端不是所述第一类终端设备,且所述终端设备是所述第二类终端设备的情况下,所述终端设备忽略所述第一信元和所述第三信元,所述终端设备根据所述第二信元,确定是否向所述第二网络设备发送所述第一请求信息。When the terminal is not the first type of terminal device and the terminal device is the second type of terminal device, the terminal device ignores the first information element and the third information element, and the terminal device determines whether to send the first request information to the second network device based on the second information element. 一种通信装置,其特征在于,包括用于执行如权利要求1至5中任一项所述的方法,或者用于执行如权利要求6至10中任一项所述的方法的模块。A communication device, characterized by comprising a module for executing the method according to any one of claims 1 to 5, or for executing the method according to any one of claims 6 to 10. 一种通信装置,其特征在于,包括收发单元和处理单元,所述收发单元和所述处理单元用于执行如权利要求1至5中任一项所述的方法,或者用于执行如权利要求6至10中任一项所述的方法。A communication device, characterized in that it includes a transceiver unit and a processing unit, wherein the transceiver unit and the processing unit are used to execute the method according to any one of claims 1 to 5, or to execute the method according to any one of claims 6 to 10. 一种通信装置,其特征在于,包括至少一个处理器,所述至少一个处理器与至少一个存储器耦合,所述至少一个处理器用于执行所述至少一个存储器中存储的计算机程序或指令,以使所述通信装置执行如权利要求1至5中任一项所述方法,或者执行如权利要求6至10中任一项所述的方法。A communication device, characterized in that it includes at least one processor, the at least one processor is coupled to at least one memory, and the at least one processor is used to execute a computer program or instruction stored in the at least one memory so that the communication device performs the method according to any one of claims 1 to 5, or performs the method according to any one of claims 6 to 10. 一种通信系统,其特征在于,包括终端设备和网络设备;A communication system, characterized by comprising a terminal device and a network device; 所述网络设备用于执行如权利要求1至5中任一项所述的通信方法;The network device is used to perform the communication method according to any one of claims 1 to 5; 所述终端设备用于执行如权利要求6至10中任一项所述的通信方法。The terminal device is configured to execute the communication method according to any one of claims 6 to 10. 一种计算机可读存储介质,其特征在于,其上存储有指令或程序代码,所述指令或程序代码被处理器执行时,以使得处理器实现如权利要求1至5中任一项所述的方法,或者如权利要求6至10中任一项所述的方法。A computer-readable storage medium, characterized in that instructions or program codes are stored thereon, and when the instructions or program codes are executed by a processor, the processor implements the method according to any one of claims 1 to 5, or the method according to any one of claims 6 to 10. 一种芯片,其特征在于,所述芯片包括处理器和通信接口,所述通信接口用于向包括所述芯片的通信装置之外的其他通信装置发送信息和/或接收来自所述其他通信装置的信息,所述处理器用于执行如权利要求1至5中任一项所述方法,或者用于执行如权利要求6至10中任一项所述的方法。A chip, characterized in that the chip includes a processor and a communication interface, the communication interface is used to send information to other communication devices other than the communication device including the chip and/or receive information from the other communication devices, and the processor is used to execute the method as described in any one of claims 1 to 5, or to execute the method as described in any one of claims 6 to 10. 一种计算机程序产品,其特征在于,所述计算机程序产品包括用于执行如权利要求1至10中任一项所述的方法的计算机程序或指令。A computer program product, characterized in that the computer program product comprises a computer program or instructions for executing the method according to any one of claims 1 to 10.
PCT/CN2025/079013 2024-03-27 2025-02-25 Communication method and communication apparatus Pending WO2025200906A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202410365453.8 2024-03-27
CN202410365453.8A CN120730380A (en) 2024-03-27 2024-03-27 Communication method and communication device

Publications (1)

Publication Number Publication Date
WO2025200906A1 true WO2025200906A1 (en) 2025-10-02

Family

ID=97165102

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2025/079013 Pending WO2025200906A1 (en) 2024-03-27 2025-02-25 Communication method and communication apparatus

Country Status (2)

Country Link
CN (1) CN120730380A (en)
WO (1) WO2025200906A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022217613A1 (en) * 2021-04-16 2022-10-20 Oppo广东移动通信有限公司 Data transmission method, device, and storage medium
WO2023004532A1 (en) * 2021-07-26 2023-02-02 Oppo广东移动通信有限公司 Access control method, terminal and network device
CN116097763A (en) * 2020-10-19 2023-05-09 Oppo广东移动通信有限公司 Method for accessing network, terminal equipment and network equipment
CN117693959A (en) * 2023-10-20 2024-03-12 北京小米移动软件有限公司 Communication method, network equipment, communication system and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116097763A (en) * 2020-10-19 2023-05-09 Oppo广东移动通信有限公司 Method for accessing network, terminal equipment and network equipment
WO2022217613A1 (en) * 2021-04-16 2022-10-20 Oppo广东移动通信有限公司 Data transmission method, device, and storage medium
WO2023004532A1 (en) * 2021-07-26 2023-02-02 Oppo广东移动通信有限公司 Access control method, terminal and network device
CN117693959A (en) * 2023-10-20 2024-03-12 北京小米移动软件有限公司 Communication method, network equipment, communication system and storage medium

Also Published As

Publication number Publication date
CN120730380A (en) 2025-09-30

Similar Documents

Publication Publication Date Title
US12294896B2 (en) Radio access network node, radio terminal, core network node, and method therefor
US11197216B2 (en) Handling of collision between SR procedure and PDU session establishment procedure for PDU session handover
US12063564B2 (en) Telecommunications system, terminal device, infrastructure equipment and methods
US11765635B2 (en) Radio access network node, radio terminal, core network node, and method therefor
US9232452B2 (en) Method of handling an inter rat handover in wireless communication system and related communication device
WO2015161575A1 (en) Method, base station, mobile management entity, and system for reporting location of user terminal
CN114557120A (en) side link transmission continuity
US20250016633A1 (en) 5G New Radio Mobility Enhancements
WO2022170798A1 (en) Strategy determining method and communication apparatus
US12382526B2 (en) Handling of collision between PDU session establishment and modification procedure
WO2025200906A1 (en) Communication method and communication apparatus
CN113439426B (en) Method and apparatus for implementing NAS signaling via other access
EP4615052A1 (en) Data transmission method, and apparatus
WO2024031341A1 (en) Mobility between gateway devices in non-3gpp access
WO2024146459A1 (en) Communication method and apparatus, terminal device, primary node, and secondary node
WO2025218563A1 (en) Communication method and apparatus
WO2022237898A1 (en) Onboarding method, communication apparatus, medium and chip
CN119155756A (en) Switching method and communication device
JP2024057864A (en) Communication Control Method
WO2023069568A1 (en) Small data transmission techniques
CN117692990A (en) Multi-access point association
WO2021101432A1 (en) Passing information in between ran nodes not fully understanding its entire content

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 25777117

Country of ref document: EP

Kind code of ref document: A1