Embodiments of this application relate to the field of wireless communication technologies, and more specifically, to a network access method and a communication apparatus.
In some communication scenarios, to support providing network services for both a public network subscriber and a dedicated network subscriber, an operator may deploy a shared base station for a public network and a dedicated network, so that the public network subscriber can access the public network through the shared base station, and the dedicated network subscriber can access the dedicated network through the shared base station. In another scenario, the operator may alternatively deploy independent base stations separately for the public network and the dedicated network. A public network base station supports the public network subscriber in accessing the public network through the public network base station, and a dedicated network base station supports the dedicated network subscriber in accessing the dedicated network through the dedicated network base station.
It is known that, in a process in which a terminal device accesses a core network through an access network (AN), the AN first needs to select an access and mobility management function (AMF), and then registers the terminal device with the core network via the AMF, to complete the access. According to a current communication protocol, the AN selects an initial AMF mainly based on a public land mobile network identifier (PLMN ID), the location of a user equipment (UE), a network slice list requested by the UE, and a local operator policy. However, in the foregoing information, the PLMN ID, the location of the UE, and the local operator policy temporarily cannot support the AN to distinguish between a public network subscriber and a dedicated network subscriber. In addition, the network slice support capabilities of UEs on a live network vary, and some UEs do not have the capability of carrying network slice information. As a result, the AN cannot select the correct core network for dedicated network subscriber and public network subscriber. For example, the AN may select a public network AMF to provide a network service for a campus subscriber (i.e., a dedicated network subscriber), or may select a dedicated network AMF to provide a network service for a public network subscriber.
In addition, in the scenario in which independent base stations are used for the public network and the dedicated network, because existing cell broadcast information cannot support a UE to select a correct access network, the UE cannot access a correct network to initiate a service.
In the foregoing described communication scenario in which the public network and the dedicated network share a base station or independent base stations are deployed separately for the public network and the dedicated network, there is currently no solution of how to select a suitable (or correct) core network for a terminal device.
This application provides a network access method and a communication apparatus, to support access of a terminal device to a suitable core network in a communication scenario in which a shared base station is deployed for a public core network and a dedicated core network, or in a communication scenario in which independent base stations are deployed for a public core network and a dedicated core network.
According to a first aspect, a network access method is provided. The method includes:
A first AMF receives a first message from an access network device, where the first message includes a registration request of a terminal device, and the first AMF belongs to a first core network.
The first AMF sends a rerouting request message to the access network device based on the first message, where the rerouting request message includes first indication information, and the first indication information indicates to the access network device to reroute the registration request to a second core network.
The first core network and the second core network share the access network device.
In this technical solution, the first core network and the second core network share the access network device, indicating that the access network device can enable a UE of the first core network and a UE of the second core network to access their respective core networks. In other words, the UE of the first core network and the UE of the second core network access the core networks through the same access network device.
Based on the foregoing technical solution, when the first AMF in the first core network receives a registration request of a UE, if the first AMF determines that the UE is suitable for accessing the second core network, the first AMF indicates to the access network device to perform rerouting. The first AMF includes the first indication information in the rerouting request message, so that the access network device determines to reroute the registration request of the UE to the second core network, to enable the UE to access a suitable core network.
For example, one of the first core network and the second core network is a public network, and the other is a dedicated network. This is not limited. It can be learned that, if the access network device selects a dedicated network AMF for a dedicated network subscriber suitable for accessing a public network or selects a public network AMF for a dedicated network subscriber suitable for accessing a dedicated network, or in another similar communication scenario, rerouting to a correct core network can be implemented by using this technical solution.
With reference to the first aspect, in some implementations of the first aspect, the first indication information includes one or more of the following:
With reference to the first aspect, in some implementations of the first aspect, the first message includes an identifier of the terminal device and one or more of the following:
In this implementation, in addition to the identifier of the UE, the first message sent by the access network device to the first AMF may further include the location information of the UE and/or the identifier of the network slice requested by the UE. The information may be used as a reference when the first AMF determines whether the UE is suitable for accessing the first core network, to improve the accuracy of decision-making, so that the UE accesses a more suitable core network.
With reference to the first aspect, in some implementations of the first aspect, that the first AMF sends the rerouting request message to the access network device based on the first message includes:
The first AMF sends the rerouting request message to the access network device when the first AMF determines, based on the identifier of the terminal device, that the first core network does not store subscription data of the terminal device.
In this implementation, if the first AMF determines, based on the identifier of the UE, that the first core network does not store the subscription data of the UE, it indicates that the UE is not registered in the first core network, and the UE can access only another core network (namely, the second core network), to indicate to the RAN to perform rerouting.
For example, if a campus subscriber is not registered with a public network, and the first AMF finds, by using the identifier of the UE, that the public network does not store subscription data of the campus UE, the first AMF determines that the UE may be a campus UE, and indicates to the RAN to reroute a registration request of the UE to an AMF in a campus network.
With reference to the first aspect, in some implementations of the first aspect, that the first AMF sends the rerouting request message to the access network device based on the first message includes:
The first AMF determines, based on the identifier of the terminal device, that the first core network stores subscription data of the terminal device, where the subscription data includes category information of the terminal device, and the category information indicates that the terminal device is of a public network subscriber category or a dedicated network subscriber category.
The first AMF sends the rerouting request message to the access network device when determining, based on the category information of the terminal device included in the subscription data, that the terminal device is not of a subscriber category of the first core network.
In this implementation, the first AMF determines, based on the identifier of the UE, that the first core network stores the subscription data of the UE, the subscription data carries the category information of the UE, and the category information may indicate that the UE is a public network subscriber or a dedicated network subscriber. For example, the first core network is a public network. If a category of the UE indicates that the UE is a dedicated network subscriber, it is directly determined that the UE is suitable for accessing a dedicated network, and the rerouting request message is sent to the access network device. This implementation can support the first AMF in deciding whether to accept access of the UE to the first core network.
With reference to the first aspect, in some implementations of the first aspect, the first message includes the identifier of the terminal device and the location information of the terminal device.
That the first AMF sends the rerouting request message to the access network device based on the first message includes:
The first AMF determines, based on the identifier of the terminal device, that the first core network stores subscription data of the terminal device.
The first AMF sends the rerouting request message to the access network device when the first AMF determines, based on the location information of the terminal device, that the TA in the location information of the terminal device is within a TA range of the second core network or the cell in the location information is within a cell range of the second core network.
In this implementation, the first AMF determines, based on the identifier of the UE, that the first core network stores the subscription data of the UE, indicating that the UE is registered with the first core network. If the location information of the UE indicates that the UE currently performs access in the area range corresponding to the second core network, the first AMF determines that the UE is suitable for accessing the second core network. For example, in a scenario in which a campus subscriber registers with a public network and initiates a registration procedure within a campus range, this implementation can improve the accuracy of access decision-making.
With reference to the first aspect, in some implementations of the first aspect, the first message includes the identifier of the terminal device and the identifier of the network slice requested by the terminal device.
That the first AMF sends the rerouting request message to the access network device based on the first message includes:
The first AMF determines, based on the identifier of the terminal device, that the first core network stores subscription data of the terminal device.
The first AMF sends the rerouting request message to the access network device when the first AMF determines, based on the identifier of the network slice requested by the terminal device, that the network slice is provided by the second core network.
In this implementation, the first AMF determines, based on the identifier of the UE, that the first core network stores the subscription data of the UE, indicating that the UE is registered with the first core network. In this case, the first AMF performs UE access decision-making with reference to the network slice requested by the UE. For example, if a campus subscriber registers with a public network, and a network slice identified by an identifier of the network slice is provided by a campus network, a public network AMF determines that the campus subscriber is suitable for accessing the campus network. However, if the campus subscriber is registered with the public network, but the network slice identified by the identifier of the network slice is provided by a public network, the public network AMF determines that the campus subscriber is suitable for accessing the public network. It can be learned that, this implementation can improve the accuracy of access decision-making.
With reference to the first aspect, in some implementations of the first aspect, the first AMF is further configured with one or more of a subscriber list of the second core network, a tracking area identifier (TAI) list of the second core network, or a new radio cell global identifier NCGI list of the second core network.
In this implementation, the first AMF is locally configured with related information of the second core network, for example, one or more of the subscriber list (for example, a subscriber identifier trustlist), the TAI list, or the NCGI list of the second core network. Based on this, the first AMF can directly determine whether the UE is a subscriber of the second core network, or whether the UE is located in the area range of the second core network. This improves the efficiency of the decision-making of the first AMF.
With reference to the first aspect, in some implementations of the first aspect, the first AMF is configured with the subscriber list of the second core network.
That the first AMF sends the rerouting request message to the access network device based on the first message includes:
The first AMF sends the rerouting request message to the access network device when determining, based on the identifier of the terminal device and the subscriber list of the second core network, that the terminal device is a subscriber of the second core network.
In this implementation, because the first AMF is locally configured with the subscriber list of the second core network, the first AMF can directly determine, based on the identifier of the UE, whether the UE is a subscriber of the second core network, and if yes, directly indicate to the RAN to perform rerouting, so that the efficiency of the decision-making of the first AMF can be improved.
With reference to the first aspect, in some implementations of the first aspect, the first message includes the identifier of the terminal device and the location information of the terminal device, and the first AMF is configured with the subscriber list of the second core network and the TAI list of the second core network.
That the first AMF sends the rerouting request message to the access network device based on the first message includes:
The first AMF determines, based on the identifier of the terminal device, that the first core network stores subscription data of the terminal device, and determines, based on the identifier of the terminal device and the subscriber list of the second core network, that the terminal device is a subscriber of the second core network.
When the TA in the location information of the terminal device is included in the TAI list of the second core network, the first AMF sends the rerouting request message to the access network device.
In this implementation, the first AMF determines, based on the identifier of the UE, that the first core network stores the subscription data of the UE, that is, the UE is registered with the first core network. Therefore, the UE can access the first core network. In addition, because the first AMF is locally configured with the subscriber list of the second core network, the first AMF directly determines, based on the identifier of the UE, that the UE is a subscriber of the second core network. Based on this, to improve the accuracy of decision-making, the first AMF may make a decision with reference to a current location of the UE. If the UE is currently located in the area range corresponding to the second core network, the first AMF determines that the UE is suitable for accessing the second core network.
With reference to the first aspect, in some implementations of the first aspect, the first message includes the identifier of the terminal device and the location information of the terminal device, and the first AMF is configured with the TAI list of the second core network and/or the NCGI list of the second core network.
That the first AMF sends the rerouting request message to the access network device based on the first message includes:
The first AMF determines, based on the identifier of the terminal device, that the first core network does not store subscription data of the terminal device; and the first AMF sends the rerouting request message to the access network device when the TA in the location information of the terminal device is included in the TAI list of the second core network, or the cell in the location information of the terminal device is included in the NCGI list of the second core network.
In this implementation, the first AMF determines, based on the identifier of the UE, that the first core network does not store the subscription data of the UE, that is, the UE is not registered with the first core network. In addition, because the first AMF is locally configured with a location list related to the second core network, the first AMF can determine, based on the location information of the UE, that the UE is currently located in a related area range of the second core network. In this case, the first AMF determines that the UE is suitable for accessing the second core network.
With reference to the first aspect, in some implementations of the first aspect, that the first AMF sends the rerouting request message to the access network device based on the first message includes:
The first AMF sends an access policy request message to an AM PCF based on the first message, where the access policy request message is used to obtain a decision of accessing a network by the terminal device.
The first AMF receives an access policy response message from the AM PCF, where the access policy response message indicates to enable the terminal device to access the second core network.
The first AMF sends the rerouting request message to the access network device based on the access policy response message.
In this implementation, the first AMF requests, based on the first message, the AM PCF to perform the decision of accessing the network by the UE. When the AM PCF determines that the second core network needs to provide a service for the UE, the first AMF sends the rerouting request message to the access network device, to reroute the registration request of the UE to the second core network.
With reference to the first aspect, in some implementations of the first aspect, the access policy response message carries one or more of the following information:
With reference to the first aspect, in some implementations of the first aspect, the identifier of the terminal device includes a subscription concealed identifier SUCI, the SUCI includes a routing identifier RI and a home network public key identifier HNPK ID, the RI and/or the HNPK ID indicate/indicates a category of the terminal device, and the category of the terminal device indicates that the terminal device is of the public network subscriber category or the dedicated network subscriber category.
In this implementation, if the UE includes the SUCI in the registration request, and distinguishes between a public network subscriber and a campus subscriber by using the RI and/or the HNPK ID in the SUCI, the first AMF can determine the category of the UE based on the SUCI in the registration request. Not only does this improve determining accuracy, but also the efficiency of the decision-making of the AMF.
With reference to the first aspect, in some implementations of the first aspect, the subscriber list of the second core network includes a number segment of a subscriber of the second core network, and the number segment of the subscriber includes one or more of the following: a globally unique subscription permanent identifier (SUPI) number segment, an international mobile subscriber identifier (IMSI) number segment, a routing identifier (RI) number segment in a global subscription concealed identifier (SUCI), or a home network public key identifier (HNPK ID) number segment in the SUCI.
With reference to the first aspect, in some implementations of the first aspect, one of the first core network and the second core network is a public core network, and the other is a dedicated core network. For example, the first core network is a public core network, and the second core network is a dedicated core network; or the second core network is a dedicated core network, and the first core network is a public core network.
It should be noted that, in various specific implementations in which the first AMF sends the rerouting request message to the access network device based on the first message in the first aspect, if the access network device is replaced with a “terminal device” and the rerouting request message is replaced with a “second message”, the method is fully applicable to a method in a third aspect. In other words, in the first aspect, the first AMF performs access decision-making based on the first message, and sends the rerouting request message to the access network device when determining to reject access of the UE to the first core network. However, in the third aspect, the first AMF performs access decision-making based on the first message, and sends the second message to the terminal device when determining to reject access of the UE to the first core network. A specific implementation in which the first AMF performs access decision-making and determines to reject access of the UE to the first core network in the first aspect is also fully applicable to the third aspect. To avoid repetition, a specific implementation in which the first AMF determines to reject access of the UE to the first core network is not described in detail in the third aspect.
According to a second aspect, a network access method is provided. The method includes:
An access network device receives a rerouting request message from a first AMF, where the rerouting request message includes first indication information, the first indication information indicates to the access network device to reroute a registration request to a second core network, and the first AMF belongs to a first core network.
The access network device sends a second message to a second AMF based on the first indication information, where the second message includes the registration request, and the second AMF belongs to the second core network.
In this technical solution, the first core network and the second core network share the access network device, or the first core network and the second core network each have an independent access network device. This is not limited.
With reference to the second aspect, in some implementations of the second aspect, the access network device is configured with one or more of the following information:
With reference to the second aspect, in some implementations of the second aspect, the method further includes:
The access network device determines the second core network based on the mapping relationship and the first indication information.
The access network device selects the second AMF from the second core network.
For technical effects of the method in the second aspect or an implementation of the method, refer to the descriptions in the first aspect. Details are not described herein again.
According to the third aspect, a network access method is provided. The method includes:
A first AMF receives a first message from an access network device, where the first message includes a registration request of a terminal device, and the first AMF belongs to a first core network.
The first AMF sends a second message to the terminal device based on the first message, where the second message is used by the terminal device to perform reselection to a second core network, or the second message indicates to the terminal device to update the registration request and initiate a registration procedure based on an updated registration request.
Optionally, the first core network and the second core network may share the access network device, or may not share the access network device (in other words, the first core network and the second core network each have an independent access network device). This is not limited in this application.
Based on a technical solution of the third aspect, when the first AMF (an example of an initial AMF) in the first core network receives the registration request of the UE, if the first AMF determines that the UE is suitable for accessing the second core network, the first AMF sends the second message to the terminal device, where the second message is used by the terminal device to perform reselection to a suitable second core network. The terminal device performs cell reselection based on the second message, to perform reselection to a suitable second core network.
Based on another technical solution of the third aspect, when the first AMF (an example of an initial AMF) in the first core network receives the registration request of the UE, if the first AMF determines that the UE is suitable for accessing the second core network, the first AMF sends the second message to the terminal device, where the second message is used by the UE to update the registration request. The UE updates the registration request based on the second message, and re-initiates a registration procedure by using an updated registration request, to access a suitable (or correct) second core network.
With reference to the third aspect, in some implementations of the third aspect, that the first AMF sends the second message to the terminal device based on the first message includes:
The first AMF sends a registration reject response message to the terminal device based on the first message, where the registration reject response message carries a reject cause value, and the reject cause value indicates to the terminal device to search for a cell in a TA other than a current TA to attempt to access a network.
With reference to the third aspect, in some implementations of the third aspect, that the first AMF sends the second message to the access network device based on the first message includes:
The first AMF sends a registration reject response message to the terminal device based on the first message, where the registration reject response message carries information about a network slice of the second core network.
In the technical solutions of the third aspect, there may be a plurality of specific implementations in which the first AMF sends the second message to the terminal device based on the first message. Specifically, the first AMF performs access decision-making based on the first message, and sends the second message to the terminal device when determining to reject access of the UE to the first core network. For a specific implementation in which the first AMF determines to reject access of the UE to the first core network, refer to various implementations of the first aspect.
According to a fourth aspect, a network access method is provided. The method includes:
A terminal device receives a registration reject response message from an access network device, where the registration reject response message carries a reject cause value.
The terminal device searches, based on the reject cause value, for a cell in a TA other than a current TA to attempt to access a network.
For technical effects of the fourth aspect, refer to the descriptions of the third aspect. Details are not described herein again.
With reference to the fourth aspect, in some implementations of the fourth aspect, the method further includes:
The terminal device stores the current TA in a permanently forbidden TA list based on the reject cause value, where the permanently forbidden TA list is cleared after the terminal device is restarted or a subscriber identity module SIM is replaced.
According to a fifth aspect, a network access method is provided. The method includes:
A terminal device receives a registration reject response message from an access network device, where the registration reject response message carries information about a network slice of a second core network.
The terminal device re-initiates a registration procedure by using an updated registration request, where the updated registration request includes updated network slice information, and the updated network slice information includes the information about the network slice of the second core network. The registration request is initiated by the UE through a target access network device. For example, the UE may perform cell reselection based on the updated network slice information and with reference to cell broadcast information, to determine the target access network device. The target access network device may be an original access network device, or may be another access network device. This is not limited in this application.
For technical effects of the fifth aspect, refer to the descriptions of the third aspect. Details are not described herein again.
With reference to the fifth aspect, in some implementations of the fifth aspect, the method further includes:
The terminal device stores the information about the network slice of the second core network in a locally configured network slice list.
According to a sixth aspect, a network access method is provided, including:
An AM PCF receives an access policy request message from a first AMF in a first core network, where the access policy request message is used to obtain a policy of accessing a network by a UE.
The AM PCF performs, based on the access policy request message, a decision of accessing the network by the UE, and determines that a second core network provides a service for the UE.
The AM PCF sends an access policy response message to the first AMF, where the access policy response message indicates to enable the UE to access the second core network.
Optionally, the first core network and the second core network share an access network device, or access network devices are deployed separately for the first core network and the second core network.
In some implementations of the sixth aspect, the access policy response message carries one or more of the following information:
Optionally, in some implementations of the sixth aspect, before the AM PCF performs, based on the access policy request message, the decision of accessing the network by the UE, the method further includes:
The AM PCF obtains an SUPI of the UE.
In addition, that the AM PCF performs, based on the access policy request message, the decision of accessing the network by the UE includes:
The AM PCF performs, based on the SUPI of the UE, the decision of accessing the network by the UE.
Optionally, that the AM PCF obtains the SUPI of the UE includes:
The AM PCF obtains the SUPI of the UE from the access policy request message; or
Optionally, in an implementation, that the AM PCF obtains, from the UDM in the first core network, the SUPI to which the SUCI is mapped includes:
The AMF PCF sends an SUCI decryption request to the UDM in the first core network, where the SUCI decryption request carries the SUCI of the UE.
The AM PCF receives an SUCI decryption response from the UDM in the first core network, where the SUCI decryption response carries the SUPI to which the SUCI is mapped.
For technical effects of the sixth aspect, refer to the descriptions of the technical effects of the corresponding implementations of the first aspect. Details are not described herein again.
According to a seventh aspect, a network access method is provided, including:
A first AMF receives a first message from an access network device, where the first message includes a registration request of a terminal device, and the first AMF belongs to a first core network.
The first AMF sends first indication information to the access network device based on the first message, where the first indication information indicates to the access network device to reroute the registration request to a second core network.
Optionally, the first message further includes information other than the registration request of the terminal device. For details, refer to the detailed description of the first aspect. Details are not described herein again.
In this technical solution, when the first AMF in the first core network receives the registration request of the UE, if the first AMF determines, based on the first message, that the UE is suitable for accessing the second core network, the first AMF sends the first indication information to the access network device, so that the access network device determines, based on the first indication information, to reroute the registration request of the UE to the second core network, to enable the UE to access a suitable network.
Optionally, in an implementation, that the first AMF sends the first indication information to the access network device based on the first message includes:
The first AMF sends a downlink NAS transport message to the access network device based on the first message, where the downlink NAS transport message carries the first indication information.
According to an eighth aspect, a network access method is provided, including:
An access network device sends a first message to a first AMF, where the first message includes a registration request of a terminal device, and the first AMF belongs to a first core network.
The access network device receives first indication information from the first AMF, where the first indication information indicates to the access network device to reroute the registration request to a second core network.
For technical effects of the eighth aspect, refer to the descriptions of the seventh aspect. Details are not described again.
In an implementation of the eighth aspect, that the access network device receives the first indication information from the first AMF includes:
The access network device receives a downlink NAS transport message from the first AMF, where the downlink NAS transport message carries the first indication information.
In an implementation of the eighth aspect, after the access network device receives the downlink NAS transport message from the first AMF, the method further includes:
The access network device sends an RRC release message to the terminal device, where the RRC release message includes redirected carrier information (redirectedCarrierInfo) and/or cell reselection priority (cellReselectionPriorities) information.
In an implementation of the eighth aspect, before the access network device sends the RRC release message to the terminal device, the method further includes:
The access network device sends a downlink information transfer message to the terminal device, where the downlink information transfer message includes a registration reject response message.
In some implementations of the seventh aspect or the eighth aspect, optionally, the first indication information includes RFSP index information.
In some implementations of the seventh aspect or the eighth aspect, optionally, the first indication information is a specific implementation of the first indication information in the first aspect or any implementation of the first aspect.
In some implementations of the seventh aspect or the eighth aspect, optionally, the downlink NAS transport message further includes RFSP index information. In other words, the downlink NAS transport message includes the first indication information and the RFSP index information. For example, if the downlink NAS transport message includes the first indication information and the RFSP index information, the first indication information may be a specific implementation of the first indication information in first aspect or any implementation of the first aspect.
In some of the foregoing implementations, if the first AMF in the first core network determines to reject access of the UE to the first core network, the first AMF may include the RFSP index information in the downlink NAS transport message sent to the RAN. The RAN maps the RFSP index information to a corresponding frequency selection parameter (for example, redirectedCarrierInfo and/or cellReselectionPriorities) and provides the frequency selection parameter to the UE for cell reselection of the UE. The UE may select another suitable access network device based on the frequency selection parameter, to access a suitable network.
According to a ninth aspect, a communication apparatus is provided. The communication apparatus has a function of implementing the method according to any one of the first aspect, the third aspect, the seventh aspect, or the possible implementations of these aspects. The function may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or the software includes one or more units corresponding to the function.
According to a tenth aspect, a communication apparatus is provided. The communication apparatus has a function of implementing the method according to any one of the second aspect, the eighth aspect, or the possible implementations of the second aspect or the eighth aspect. The function may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or the software includes one or more units corresponding to the function.
According to an eleventh aspect, a communication apparatus is provided. The communication apparatus has a function of implementing the method according to any one of the fourth aspect, the fifth aspect, or the possible implementations of these aspects. The function may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or the software includes one or more units corresponding to the function.
According to a twelfth aspect, a communication apparatus is provided. The communication apparatus has a function of implementing the method according to any one of the sixth aspect or the possible implementations of the sixth aspect. The function may be implemented by hardware or may be implemented by hardware executing corresponding software. The hardware or the software includes one or more units corresponding to the function.
According to a thirteenth aspect, a communication apparatus is provided, including a processor and a memory. Optionally, the apparatus may further include a transceiver. The memory is configured to store a computer program, and the processor is configured to: invoke and run the computer program stored in the memory, and control the transceiver to receive/send a signal, to enable the communication apparatus to perform the method according to any one of the first aspect, the third aspect, the seventh aspect, or the possible implementations of these aspects.
According to a fourteenth aspect, a communication apparatus is provided, including a processor and a memory. Optionally, the apparatus may further include a transceiver. The memory is configured to store a computer program, and the processor is configured to: invoke and run the computer program stored in the memory, and control the transceiver to receive/send a signal, to enable the communication apparatus to perform the method according to any one of the second aspect, the eighth aspect, or the possible implementations of the second aspect or the eighth aspect.
According to a fifteenth aspect, a communication apparatus is provided, including a processor and a memory. Optionally, the apparatus may further include a transceiver. The memory is configured to store a computer program, and the processor is configured to: invoke and run the computer program stored in the memory, and control the transceiver to receive/send a signal, to enable the communication apparatus to perform the method according to any one of the fourth aspect, the fifth aspect, or the possible implementations of these aspects.
According to a sixteenth aspect, a communication apparatus is provided, including a processor and a memory. Optionally, the apparatus may further include a transceiver. The memory is configured to store a computer program, and the processor is configured to: invoke and run the computer program stored in the memory, and control the transceiver to receive/send a signal, to enable the communication apparatus to perform the method according to any one of the sixth aspect or the possible implementations of the sixth aspect.
According to a seventeenth aspect, a communication apparatus is provided, including a processor and a communication interface. The communication interface is configured to: receive data and/or information, and transmit the received data and/or information to the processor. The processor processes the data and/or the information. In addition, the communication interface is further configured to output data and/or information obtained through processing by the processor, so that the method according to any one of the first aspect, the third aspect, the seventh aspect, or the possible implementations of these aspects is performed.
According to an eighteenth aspect, a communication apparatus is provided, including a processor and a communication interface. The communication interface is configured to: receive data and/or information, and transmit the received data and/or information to the processor. The processor processes the data and/or the information. In addition, the communication interface is further configured to output data and/or information obtained through processing by the processor, so that the method according to any one of the second aspect, the eighth aspect, or the possible implementations of the second aspect or the eighth aspect is performed.
According to a nineteenth aspect, a communication apparatus is provided, including a processor and a communication interface. The communication interface is configured to: receive data and/or information, and transmit the received data and/or information to the processor. The processor processes the data and/or the information. In addition, the communication interface is further configured to output data and/or information obtained through processing by the processor, so that the method according to any one of the fourth aspect, the fifth aspect, or the possible implementations of these aspects is performed.
According to a twentieth aspect, a communication apparatus is provided, including a processor and a communication interface. The communication interface is configured to: receive data and/or information, and transmit the received data and/or information to the processor. The processor processes the data and/or the information. In addition, the communication interface is further configured to output data and/or information obtained through processing by the processor, so that the method according to any one of the sixth aspect or the possible implementations of the sixth aspect is performed.
According to a twenty-first aspect, a communication apparatus is provided, including at least one processor. The at least one processor is coupled to at least one memory, and the at least one processor is configured to execute a computer program or instructions stored in the at least one memory, so that the communication apparatus performs the method according to any one of the first aspect, the third aspect, the seventh aspect, or the possible implementations of these aspects.
According to a twenty-second aspect, a communication apparatus is provided, including at least one processor. The at least one processor is coupled to at least one memory, and the at least one processor is configured to execute a computer program or instructions stored in the at least one memory, so that the communication apparatus performs the method according to any one of the second aspect, the eighth aspect, or the possible implementations of the second aspect or the eighth aspect.
According to a twenty-third aspect, a communication apparatus is provided, including at least one processor. The at least one processor is coupled to at least one memory, and the at least one processor is configured to execute a computer program or instructions stored in the at least one memory, so that the communication apparatus performs the method according to any one of the fourth aspect, the fifth aspect, or the possible implementations of these aspects.
According to a twenty-fourth aspect, a communication apparatus is provided, including at least one processor. The at least one processor is coupled to at least one memory, and the at least one processor is configured to execute a computer program or instructions stored in the at least one memory, so that the communication apparatus performs the method according to any one of the sixth aspect or the possible implementations of the sixth aspect.
According to a twenty-fifth aspect, a computer-readable storage medium is provided. The computer-readable storage medium stores computer instructions, and when the computer instructions are run on a computer, the method according to any one of the first aspect to the eighth aspect, or the possible implementations of these aspects is performed.
According to a twenty-sixth aspect, a computer program product is provided. The computer program product includes computer program code, and when the computer program code is run on a computer, the method according to any one of the first aspect to the eighth aspect, or the possible implementations of these aspects is performed.
According to a twenty-seventh aspect, a wireless communication system is provided, including a communication apparatus configured to perform the method according to the first aspect and a communication apparatus configured to perform the method according to the second aspect, or including a communication apparatus configured to perform the method according to the first aspect, a communication apparatus configured to perform the method according to the second aspect, and a communication apparatus configured to perform the method according to the sixth aspect, or including a communication apparatus configured to perform the method according to the third aspect and a communication apparatus configured to perform the method according to the fourth aspect, or including a communication apparatus configured to perform the method according to the third aspect and a communication apparatus configured to perform the method according to the fifth aspect, or including a communication apparatus configured to perform the method according to the seventh aspect and a communication apparatus configured to perform the method according to the eighth aspect.
The following describes technical solutions in embodiments of this application with reference to the accompanying drawings.
For ease of understanding, related concepts or technologies in this application are first briefly described.
The technical solutions provided in this application may be applied to various communication systems, including but not limited to a 5th generation (5G) system, a new radio (NR) system, a long term evolution (LTE) system, an LTE frequency division duplex (FDD) system, an LTE time division duplex (TDD) system, and the like. The technical solutions provided in this application may be further applied to a future communication system, for example, a 6th generation mobile communication system, and may be further applied to device-to-device (D2D) communication, vehicle-to-everything (V2X) communication, machine-to-machine (M2M) communication, machine type communications (MTC), an internet of things (IoT) communication system or another communication system, and the like.
A terminal device in embodiments of this application may be a user equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent, or a user apparatus. The terminal device may alternatively be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having a wireless communication function, a computing device or another processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a 5G network, a terminal device in a future evolved public land mobile communication network (PLMN), or the like. This is not limited in the embodiments of this application.
An access network device in embodiments of this application may be a device that has a wireless transceiver function and is located on a network side, and includes but is not limited to a next-generation NodeB (gNB) in the 5th generation (5G) communication system, a base station in the 6th generation (6G) mobile communication system, a base station in the future mobile communication system, an access node or the like in a wireless fidelity (Wi-Fi) system, an evolved NodeB (eNB) in the long term evolution (LTE) system, a radio network controller (RNC), a NodeB (NB), a base station controller (BSC), a home base station (for example, a home evolved NodeB, or a home NodeB, HNB), a base band unit (BBU), a transmission reception point (TRP), a transmitting point (TP), a base transceiver station (BTS), or the like. In addition, the access network device may alternatively be a wireless controller, a relay station, a vehicle-mounted device, a wearable device, or the like in a cloud radio access network (CRAN) scenario. In addition, the base station may be a macro base station, a micro base station, a relay node, a donor node, or a combination thereof. This is not limited in embodiments of this application.
Main functions of network elements are described as follows:
Application function (AF): mainly transmits requirements of an application side on a network side, for example, quality of service (QoS) requirements or user status event subscription. The AF may be a third-party functional entity or an application service deployed by an operator, for example, an internet protocol multimedia subsystem (IMS) voice call service. When interacting with a core network, an application function entity of a third-party application may further perform authorization processing via a network exposure function (NEF). For example, the third-party application function directly sends a request message to the NEF, and the NEF determines whether the AF is allowed to send the request message. If the verification succeeds, the request message is forwarded to a corresponding policy control function (PCF) or unified data management (UDM).
UDM: is mainly responsible for functions such as managing a subscriber identifier, subscription data, authentication data, and subscriber access authorization.
Unified data repository (UDR): is mainly responsible for a function of storing types of data such as subscription data, policy data, and application data.
PCF: is mainly responsible for policy control functions such as charging on a session and a service flow level, QoS bandwidth guarantee, mobility management, and UE policy decision-making. In this architecture, PCFs connected to an access and mobility management function (AMF) and a session management function (SMF) respectively correspond to an AM PCF (PCF for access and mobility control) and an SM PCF (PCF for session management), and may not be a same PCF entity in an actual deployment scenario.
SMF: mainly performs functions such as session management, execution of a control policy delivered by the PCF, UPF selection, and UE IP address allocation.
Network slice selection function (NSSF): is to select a slice instance set for a UE and determine an AMF set and allowed NSSAI for the UE.
AMF: mainly performs functions such as mobility management, and access authentication/authorization. In addition, the AMF network element is further responsible for transferring a user policy between the UE and the PCF.
User plane function (UPF): serves as an interface UPF for a data network and implements functions such as user plane data forwarding, session/flow-level based charging statistics, and bandwidth limiting.
Radio access network ((R)AN): corresponds to different access networks in 5G, for example, a plurality of manners such as wired access and wireless base station access.
Authentication server function (AUSF): is used to perform security authentication on the UE when the UE accesses a network.
Functions of interfaces between the network elements in
The network elements or the functions may be network elements in a hardware device, may be software functions running on dedicated hardware, or may be virtualized functions instantiated on a platform (for example, a cloud platform). Optionally, the foregoing network elements or functions may be implemented by one device, may be jointly implemented by a plurality of devices, or may be implemented by one functional module in one device. This is not specifically limited in this embodiment of this application.
In addition, the foregoing “network element” may also be referred to as an entity, a device, an apparatus, a module, or the like. This is not particularly limited in this application. In addition, for ease of understanding and description, a description of the “network element” is omitted in some descriptions below. For example, an AMF network element is briefly referred to as an AMF. In this case, the “AMF” should be understood as an AMF network element or an AMF entity. Descriptions of same or similar cases are omitted below.
It should be understood that
Based on the network architecture described in
According to an existing communication protocol, a 5G access network (AN) performs initial AMF selection mainly based on the following information:
In the foregoing information, the 5G AN cannot distinguish between a public network subscriber and a dedicated network subscriber based on the information such as the PLMN ID, the location of the UE, and the local operator policy. However, some UEs on a live network do not have a capability of carrying network slice information. Therefore, currently, the AN cannot distinguish between a public network subscriber and a dedicated network subscriber. Therefore, when a public network and a dedicated network share an access network device, the AN cannot ensure that a correct core network is selected for the dedicated network subscriber or the public network subscriber. For example, the dedicated network is a campus network. If a public core network and the campus network share a base station, the public network subscriber or a subscriber of the campus network initiates a registration procedure. After receiving a registration request of the UE, the shared base station selects an initial AMF based on the foregoing information, and forwards the registration request to an AMF (namely, the selected initial AMF) of a corresponding core network, that is, forwards the registration request to the corresponding core network. However, as described above, because the AN cannot distinguish between a public network subscriber and a dedicated network subscriber, the shared base station may forward the registration request of the UE to an AMF in an unsuitable core network. In other words, the shared base station may select, for the UE, the AMF in the unsuitable core network to provide a network service. For example, the access network device selects an AMF in a campus network for a public network subscriber, selects an AMF in a public network for a campus subscriber suitable for accessing a campus network, or selects an AMF in a campus network for a campus subscriber suitable for accessing a public core network.
If the foregoing case occurs, after the AMF in the campus network or the AMF in the public network receives a registration request of a subscriber, access of the subscriber may be rejected, leading to some problems. For example, the efficiency of accessing the core network by the UE decreases, or the terminal device cannot access the network for a long time.
In this case, this application provides a network access method that is not only applicable to a communication scenario in which a shared access network device is deployed for a public core network and a dedicated core network, but also applicable to a communication scenario in which independent access network devices are deployed separately for a public core network and a dedicated core network. In addition, a terminal device (for example, a public network subscriber or a dedicated network subscriber) can access a suitable core network.
It should be understood that, enabling the UE to access a correct core network in this specification may be enabling the UE to access a suitable core network, and is not limited to enabling a public network subscriber to access a public core network and enabling a dedicated network subscriber to access a dedicated core network. For example, if a dedicated network subscriber is not registered with a public network, the dedicated network subscriber can access only a dedicated core network. In this case, the dedicated core network is a correct core network. If a public network subscriber is not registered with a dedicated network, the public network subscriber can access only a public core network. In this case, the public core network is a correct core network. If a dedicated network subscriber is also registered with a public network, the dedicated network subscriber can access both a public core network and a dedicated core network. In this case, which core network the dedicated network subscriber is suitable for accessing needs to be comprehensively considered with reference to some other factors. For example, when the dedicated network subscriber requests to access a network outside a dedicated network area range, a suitable network is the public core network instead of the dedicated core network. The following provides some detailed examples of access decision-making.
The following uses network elements in a 5G system as an example to describe details of a solution. It may be understood that, when this solution is applied to an LTE system or a future communication system, each network element in the solution may be replaced with another network element having a corresponding function. This is not limited in this application.
In addition, in embodiments of this application, a registration procedure of a UE in a core network is usually also referred to as a subscriber registration procedure. For example, a general subscriber registration procedure may be briefly described as follows: The UE sends a registration request to an AMF through an AN. The AMF obtains subscription data from a specific UDM based on a subscriber identifier. After receiving the request, the UDM may obtain actual subscription data from a UDR.
As described above, embodiments of this application further relate to a public network or a dedicated network.
The public network is a communication network constructed by a network service provider (or referred to as an operator) for a public subscriber to use.
The dedicated network is a dedicated network that provides network signal coverage in a specific area and provides communication services for specific subscribers in terms of organization, command, management, production, and dispatching. For example, an enterprise campus is a dedicated network, and may also be referred to as a campus network.
A core network is responsible for providing functions such as access and mobility management, session management, policy control, and subscription management in a public network or a dedicated network deployed by an operator, and corresponds to network elements other than the UE, the AF, and the access network in the 5G system. In addition, the core network may include only some network elements in
In addition, embodiments of this application relate to a registration procedure with AMF redirection.
A 5G AN is used as an example. The 5G AN receives a registration request and an AMF selection parameter that are from a UE, performs AMF selection based on the received AMF selection parameter and a local operator policy to determine an initial AMF, and forwards the registration request to the initial AMF. After receiving the registration request forwarded by the 5G AN, if the initial AMF determines that the initial AMF cannot provide a service for the UE, for example, does not support a network slice requested by the UE, the initial AMF forwards, through redirection, the registration request of the UE to another AMF that can provide a service for the UE. The other AMF is referred to as a target AMF. Optionally, before performing the redirection, the initial AMF may interact with a network element like a UDM/an NSSF/an NRF, to determine information about the target AMF that supports serving the UE. In an implementation, the initial AMF directly forwards a complete registration request message to the target AMF. In another implementation, the initial AMF forwards the registration request message to the target AMF via a gNB. A redirection request sent by the initial AMF to the gNB carries the information about the target AMF. The target AMF continues to perform a registration procedure for the UE.
It can be learned that, in the foregoing registration procedure with AMF redirection, the initial AMF may perform redirection of the registration request through a direct interface or an indirect interface between the initial AMF and the target AMF. In other words, the initial AMF needs to support a direct connection or an indirect connection to the target AMF.
However, in a UE access control communication scenario in which a public core network and a dedicated core network share an access network device that is to be resolved in this application, there is usually no direct or indirect connection between a dedicated network AMF (for example, an AMF in a campus network) and a public network AMF, and it is also difficult for the dedicated network AMF to register own information through a public network NRF. When a RAN receives a registration request of a campus subscriber and selects a public network AMF to provide a network service for the campus UE, the public network AMF cannot directly redirect the registration request of the campus subscriber to an AMF in a campus network through a redirection registration procedure. Conversely, the AMF in the campus network cannot redirect a registration request of a public network subscriber to a public core network.
It can be learned that, in the UE access control communication scenario to be resolved in this application, the UE cannot be redirected to a correct (or suitable) core network by simply reusing an existing redirection registration procedure.
The foregoing problem is resolved in the network access method provided in this application. In addition, the method is applicable to various possible scenarios in which a public network subscriber or a dedicated network subscriber accesses a network.
For clarity and brevity of description, a first core network and a second core network are introduced in embodiments of this application. Optionally, one of the first core network and the second core network is a public core network, and the other is a dedicated core network.
The following describes the technical solutions provided in this application in detail.
Solution 1
310: A first AMF receives a first message from an access network device, where the first message includes a registration request of a terminal device, and the first AMF belongs to a first core network.
320: The first AMF sends a rerouting request message to the access network device based on the first message, where the rerouting request message includes first indication information, and the first indication information indicates to the access network device to reroute the registration request to a second core network.
The first core network and the second core network share the access network device.
Optionally, the first indication information may include one or more of the following:
It should be understood that the identifier of the second core network can uniquely identify a second core network, and the access network device can uniquely determine a second core network based on the identifier that is of the second core network and that is indicated by the first indication information. In other words, there is a one-to-one mapping relationship between the identifier of the second core network and the second core network.
The identifier of the network slice of the second core network may identify a second core network that provides a network slice. There may be one or more second core networks. To be specific, there may be a one-to-one mapping relationship between an identifier of a network slice and a second core network. For example, an identifier of one network slice corresponds to one second core network. Alternatively, there may be a one-to-many mapping relationship. For example, an identifier of one network slice corresponds to a plurality of second core networks. Alternatively, there may be a many-to-many mapping relationship. For example, an identifier of a plurality of network slice corresponds to a plurality of second core networks, and different second core networks may provide a same network slice or different network slices.
For example, the first core network is a public network. If the network slice that is of the second core network and that is indicated by the first indication information may be provided by a plurality of dedicated networks, it may be considered that the identifier of the network slice indicates that a target network to which the rerouting is performed is a dedicated network. The access network device may determine a dedicated network from dedicated networks that support access of the access network device and that can support the network slice indicated by the first indication information, and the determined dedicated network is the second core network. Optionally, if the identifier of the network slice indicated by the first indication information is provided only by a dedicated network that supports access of the access network device, the dedicated network that can provide the network slice is the second core network.
In addition, the AMF set identifier in this application needs to be different from an existing AMF set ID in a registration procedure with AMF redirection. It should be understood that the existing AMF set ID indicates an AMF set to the access network device, to assist the access network device in determining a target AMF from the AMF set. However, in this application, the AMF set identifier is used by the access network device to determine the second core network. In some examples, a specific AMF set identifier, for example, all 1s or a specific value, may be used, so that the AMF set identifier indicated by the first indication information is used by the access network device to determine the second core network. For example, a mapping relationship between the AMF set identifier configured on the access network device and the second core network may be a one-to-one mapping relationship.
Optionally, the first message includes an identifier of the terminal device and one or more of the following:
Optionally, the location information of the terminal device may be information about a TA and/or information about a cell on which the terminal device camps.
It should be understood that, for the UE that supports carrying the identifier of the network slice by the registration request, the first message may carry the identifier of the network slice requested by the terminal device.
Optionally, there may be a plurality of implementations in which the first AMF sends the rerouting request message to the access network device based on the first message. The following provides some possible examples.
For example, the first AMF initiates an authentication procedure to an AUSF/a UDM in the first core network based on the identifier that is of the terminal device and that is carried in the first message. The first core network does not store subscription data of the terminal device, and the first AMF sends the rerouting request message to the access network device.
For another example, the first AMF initiates an authentication procedure to an AUSF/a UDM in the first core network based on the identifier that is of the terminal device and that is carried in the first message, to obtain subscription data that is of the terminal device and that is stored in the first core network. In a possible implementation, the subscription data may include category information of the terminal device, and the category information indicates that the terminal device is of a public network subscriber category or a dedicated network subscriber category. The first AMF can learn of a category of the terminal device based on the subscription data. The first AMF sends the rerouting request message to the access network device when determining, based on the category information of the terminal device, that the terminal device is not of a subscriber category of the first core network.
It should be understood that, if the first core network is a public core network, in this example, the “subscriber category of the first core network” is the public network subscriber category, and that the terminal device is of the subscriber category of the first core network indicates that the terminal device is a public network subscriber. If the first core network is a dedicated core network, in this example, the “subscriber category of the first core network” is the dedicated network subscriber category, and that the terminal device is of the subscriber category of the first core network indicates that the terminal device is a dedicated network subscriber.
For example, the first core network is a public core network, and the first AMF in the first core network determines, based on the identifier of the terminal device, that the first core network stores the subscription data of the terminal device. If the category information included in the subscription data indicates that the terminal device is of the dedicated network subscriber category, the first AMF sends the rerouting request message to the access network device.
For another example, the first message includes the identifier of the terminal device and the location information of the terminal device. The first AMF determines, based on the identifier of the terminal device, that the first core network stores the subscription data of the terminal device. The first AMF sends the rerouting request message to the access network device when the first AMF determines, based on the location information of the terminal device, that the TA in the location information is within a TA range of the second core network or the cell in the location information is within a cell range of the second core network. It should be understood that the location information of the terminal device may be a TA granularity or a cell granularity. This is not limited.
For another example, the first message includes the identifier of the terminal device and the identifier of the network slice requested by the terminal device. The first AMF determines, based on the identifier of the terminal device, that the first core network stores subscription data of the terminal device. The first AMF sends the rerouting request message to the access network device when the first AMF determines, based on the identifier of the network slice requested by the terminal device, that the network slice requested by the terminal device is provided by the second core network. This implementation is applicable to decision-making performed when a terminal device that supports carrying a network slice by a registration request accesses a network.
Optionally, the subscriber list of the second core network may be a number segment of a subscriber of the second core network. For example, the number segment of the subscriber may be one or more of the following:
Optionally, in an implementation, the RI in the SUCI may be used to distinguish between a public network subscriber and a dedicated network subscriber, or the RI+HNPK ID in the SUCI may be used to distinguish between a dedicated network subscriber and a public network subscriber. In addition, there are the mobile country code (MCC) and the mobile network code (MNC). If the RI+HNPK ID, and the MNC are combined to distinguish between a public network subscriber and a dedicated network subscriber, value space of a number segment of the UE is a quantity of MNCs*the value range of the RI*the value range of the HNPK ID.
Optionally, in an implementation, if the first AMF can obtain SUPI information, the first AMF can distinguish between a dedicated network subscriber and a public network subscriber based on an SUPI number segment.
If it is considered that a dedicated network subscriber accesses a network only in a range (for example, a campus range) corresponding to a dedicated network, the foregoing implementation does not affect a public network subscriber. In a possible case, the dedicated network UE carries the SUCI to initiate a registration procedure. After obtaining the registration request, the first AMF (namely, the initial AMF) may directly trigger, based on the RI and/or the HNPK ID and the TAI+NCGI, the access network device to perform rerouting. In another possible case, the dedicated network UE carries a 5G-GUTI to initiate a registration procedure. In this case, the 5G-GUTI is allocated by a dedicated network AMF. In this case, the access network device may reroute the registration request to the dedicated network AMF based on an S-TMSI.
In addition, if it is considered that the dedicated network subscriber accesses the public network beyond a range corresponding to the dedicated network, the following scenarios may occur:
If the UE carries the 5G-GUTI to initiate the registration procedure and the 5G-GUTI is allocated by the public network AMF, the following may be implemented:
The first AMF (an example of the initial AMF) obtains a subscriber context from an old AMF based on the 5G-GUTI, and determines, based on the received SUPI+TAI (an example of current location information of the UE)+NCGI (for example, the campus range), to trigger the access network device to perform rerouting.
It may be understood that the initial AMF and the old AMF are different AMFs. The old AMF is an AMF accessed by the UE during last registration, and the initial AMF is an AMF currently accessed by the UE. An interface may be deployed between the old AMF and the initial AMF for the initial AMF to query the old AMF for subscriber context information.
If the first AMF (an example of the initial AMF) determines that the received registration request is from the range (for example, the campus range) corresponding to the dedicated network, the first AMF requires the UE to perform registration by using the SUCI instead of the 5G-GUTI. For example, the first AMF indicates, by using an identity request or an error code #9, the UE to report the SUCI. The error code #9 indicates that an error cause is that the UE identity cannot be derived by the network (UE identity cannot be derived by the network).
For example, the first AMF is configured with the subscriber list of the second core network, and the first AMF can learn, based on the identifier that is of the terminal device and that is in the first message and the subscriber list of the second core network, whether the terminal device is a subscriber of the second core network. If the identifier of the terminal device is in the subscriber list of the second core network, the first AMF sends the rerouting request message to the access network device.
Optionally, for example, the first message includes the identifier of the terminal device and the location information of the terminal device, and the first AMF is configured with the subscriber list of the second core network and the TAI list of the second core network.
In this case, for example, the first AMF determines, based on the identifier of the terminal device, that the first core network stores subscription data of the terminal device. In addition, the first AMF determines, based on the identifier of the terminal device and the subscriber list of the second core network, that the terminal device is a subscriber of the second core network. In this case, the first AMF determines, with reference to the location information of the terminal device, whether to reroute the registration request of the terminal device to the second core network. For example, if the TA in the location information of the terminal device is included in the TAI list of the second core network, the first AMF sends the rerouting request message to the access network device. Alternatively, the TAI list of the second core network in this example may be a cell list of the second core network. If the cell in the location information of the terminal device is included in the cell list of the second core network, the first AMF sends the rerouting request message to the access network device.
For another example, the first message includes the identifier of the terminal device and the location information of the terminal device, and the first AMF is configured with the TAI list of the second core network and/or the NCGI list of the second core network. The first AMF determines, based on the identifier of the terminal device, that the first core network does not store subscription data of the terminal device, and the TA in the location information of the terminal device is included in the TAI list of the second core network, or the cell in the location information of the terminal device is included in the NCGI list of the second core network. In this case, the first AMF sends the rerouting request message to the access network device.
330: The access network device sends a second message to a second AMF based on the first indication information.
The second message includes the registration request of the terminal device, and the second AMF belongs to the second core network.
For example, the access network device is configured with one or more of the following information:
It should be understood that the mapping relationship may be a one-to-one mapping relationship, a many-to-one mapping relationship, or a many-to-many mapping relationship. For example, a network identifier and a second core network are usually in the one-to-one mapping relationship. An identifier of a network slice and a second core network may be in the one-to-one mapping relationship, where for example, an identifier of one network slice uniquely corresponds to one second core network, or may be in the one-to-many mapping relationship, where for example, an identifier of one network slice corresponds to a plurality of second core networks, indicating that the plurality of second core networks can all provide the network slice, or may be in the many-to-many mapping relationship, where for example, an identifier of a plurality of network slice corresponds to a plurality of second core networks, and different second core networks may provide a same network slice. For example, an AMF set identifier and a second core network may be in the one-to-one mapping relationship. For example, one AMF set identifier uniquely corresponds to one second core network.
When the access network device obtains the first indication information from the first AMF, as described above, the first indication information indicates one or more of the identifier of the second core network, the identifier of the network slice of the second core network, or the AMF set identifier, the access network device determines the second core network based on the information indicated in the first indication information and with reference to the locally configured mapping relationship, and selects the target AMF, namely, the second AMF, from the second core network.
For example, the first indication information indicates a network identifier (for example, an identifier a), and the access network device determines, based on the locally configured mapping relationship between a network identifier and a second core network, a second core network corresponding to the network identifier a indicated by the first indication information.
For example, the first indication information indicates an identifier (for example, an identifier a) of a network slice, and the access network device determines, based on the locally configured mapping relationship between an identifier of a network slice and a second core network, a second core network that provides the network slice corresponding to the identifier a.
For example, the first indication information indicates an AMF set identifier (AMF set ID), and the access network device determines a second core network based on the AMF set ID and the locally configured mapping relationship between an AMF set identifier and a second core network.
The foregoing describes the solution 1.
It can be learned from the foregoing example that the solution 1 provided in this application can provide solutions in the following scenarios:
In the solution 1, the procedure with AMF redirection is enhanced, to trigger the AMF to redirect the registration request of the terminal device to a correct AMF for access. The solution 1 is applicable to a scenario in which the RAN selects a dedicated network AMF for a public network subscriber or the RAN selects a public network AMF for a dedicated network subscriber suitable for accessing a dedicated network.
It can be learned that, in the solution 1, after determining that the UE is suitable for accessing another core network, the initial AMF (for example, the first AMF) may indicate to the RAN to perform rerouting, and include the first indication information in the rerouting request message, to assist the RAN in determining a target core network and determining a target AMF from the target core network, so that the UE accesses a suitable core network.
Solution 2
510: A first AMF receives a first message from an access network device, where the first message includes a registration request of a terminal device. The first AMF belongs to a first core network.
520: The first AMF sends a second message to the terminal device based on the first message, where the second message is used by the terminal device to perform reselection to a second core network.
The first core network and the second core network may share the access network device, or may not share the access network device. This is not limited in this application.
Optionally, for example, in step 520, the first AMF sends a registration reject response message to the terminal device based on the first message, where the registration reject response message carries a reject cause value, and the reject cause value indicates to the terminal device to search for a cell in a TA other than a current TA to attempt to access a network.
530: The terminal device searches, based on the reject cause value, for the cell in the TA other than the current TA to attempt to access the network.
Optionally, the terminal device performs cell selection in another TA based on the reject cause value. A selected new cell may be located in another access network device, or may continue to be located in the original access network device, that is, the access network device in step 510.
In addition, the terminal device no longer attempts, based on the reject cause value, to access the network in the current TA.
In the solution 2, the registration reject procedure is enhanced, to trigger the terminal device to initiate a registration procedure by using a correct TA. The solution 2 is applicable to a scenario in which the RAN selects an AMF in a public core network to provide a network service for a dedicated network subscriber suitable for accessing a dedicated network or the RAN selects an AMF in a dedicated core network to provide a network service for a public network subscriber.
It can be learned that, in the solution 2, if the first AMF determines to reject access of the UE to the first core network, the first AMF may include a new reject cause value in the registration reject response message. Based on the new reject cause value, the UE may search for a cell in another surrounding TA again to attempt to access the network. In this case, the reselected cell may be located in a same base station, or may be located in a different base station. This is not limited in this application.
Solution 3
610: A first AMF receives a first message from an access network device, where the first message includes a registration request of a terminal device. The first AMF belongs to a first core network.
620: The first AMF sends a second message to the terminal device based on the first message, where the second message indicates to the terminal device to update the registration request and initiate a registration procedure based on an updated registration request.
Optionally, the first core network and a second core network may share the access network device, or may not share the access network device. This is not limited in this application.
Optionally, for example, in step 620, the first AMF sends a registration reject response message to the terminal device based on the first message, where the registration reject response message carries information about a network slice of the second core network.
630: The terminal device re-initiates the registration procedure by using the updated registration request, where the updated registration request includes updated network slice information, and the updated network slice information includes the information about the network slice of the second core network.
It should be understood that the updated registration request is initiated by the terminal device through a target access network device. Specifically, the terminal device may perform cell reselection based on the updated network slice information and cell broadcast information, to determine the target access network device. The target access network device may be the original access network device, that is, the access network device in step 610, or may be another access network device. This is not limited in this application. Optionally, the cell broadcast information may include TA information, information about an optional network slice, and the like. For example, the terminal device determines, based on the updated network slice information and the cell broadcast information, that the terminal device needs to access the network through another cell. The other cell may be located in the original access network device, or may be located in another access network device.
Optionally, the method further includes step 640.
640: The terminal device stores the information about the network slice of the second core network in a locally configured network slice list.
In the solution 3, the registration reject procedure is enhanced. The AMF includes the information about the network slice of the second core network in the registration reject response message, so that the UE updates the registration request, includes the information about the network slice in the updated registration request, and re-initiates the registration procedure. The information about the network slice that is carried in the updated registration request enables the access network device to select a suitable core network for the terminal device for access. Solution 3 is mainly applicable to a scenario in which a terminal device that supports carrying network slice information by a registration request attempts to access a network (e.g. a core network).
It can be learned that, in the solution 3, when the first AMF determines to reject access of the UE to the first core network, the first AMF may include the information of the network slice of the second core network in the registration reject response message, to trigger the UE to carry the updated requested NSSAI to re-initiate the registration procedure, to correctly access the second core network.
The foregoing describes in detail the network access method provided in this application. The following provides several examples to describe the foregoing several solutions.
In the following examples, an example in which the first core network is a public core network and the first AMF belongs to the public core network is used for description.
701: A UE sends an AN message to a RAN.
The AN message carries an AN parameter and a registration request. The registration request is a non-access stratum (NAS) message. For example, the AN parameter may include information such as an identifier of the UE, for example, a 5G-S-TMSI, a globally unique AMF identifier (GUAMI), and a selected PLMN ID. The registration request includes the identifier of the UE, for example, an SUCI or a 5G globally unique temporary identifier (5G-GUTI). In addition, the registration request may further include information such as a tracking area identifier (TAI) accessed by the UE last time and a registration type. Optionally, the registration type may include initial registration, mobility registration, periodic registration, or emergency registration.
The 5G-S-TMSI is a shortened form of the 5G-GUTI.
The RAN receives the AN message from the UE.
702: The RAN sends an N2 parameter and the registration request of the UE to an AMF 1.
For example, the RAN performs AMF selection based on the information in the AN message, a cell on which the UE currently camps, and a local operator policy. It is assumed that after performing the AMF selection, the RAN selects an AMF in a public core network, for example, the AMF 1 in
703: The AMF 1 performs access decision-making and determines to reject access of the UE to the first core network.
That the AMF 1 performs access decision-making may indicate that the AMF 1 determines whether to enable the UE to access the first core network. In this example, the first core network is a public core network.
In step 703, the AMF 1 may determine, based on different scenarios, to accept access of the UE to the public core network, or the AMF 1 determines to reject access of the UE to the public core network. When the access of the UE to the public core network is rejected, the AMF 1 sends a rerouting request message to the RAN, to reroute the registration request of the UE to a dedicated core network. It should be understood that the technical solutions of this application are mainly applicable to a case in which the RAN selects the public core network to provide a network service for a dedicated UE, and the AMF 1 in the public core network reroutes the registration request of the dedicated UE to an AMF in the dedicated core network. For details, refer to various possible example descriptions in step 320. Details are not described herein again.
When the AMF 1 determines to reroute the UE to the dedicated core network, the AMF 1 sends the rerouting request message to the RAN, as shown in step 704.
704: The AMF 1 sends the rerouting request message to the RAN.
In addition to the registration request sent by the UE, the rerouting request message further includes first indication information. For descriptions of the first indication information, refer to the detailed descriptions in the foregoing solution 1. Details are not described herein again.
In addition, the AMF 1 may further send, to the RAN, other information provided by the AMF 1 (namely, the initial AMF) for the target AMF, for example, a list of network slices that the first core network/current TA rejects access of the UE (rejected NSSAI), and a list of configured network slices (configured NSSAI) that needs to be provided for the UE.
Subsequently, the RAN reroutes the registration request of the UE to the dedicated core network based on the rerouting request message from the AMF 1, as shown in steps 705 and 706.
705: The RAN sends an initial registration request of the UE to the target AMF.
Specifically, the RAN re-performs AMF selection based on the rerouting request message to determine the target AMF, and sends the initial registration request of the UE to the determined AMF.
In addition, information sent by the RAN to the target AMF may further include information provided by the source AMF (namely, the AMF 1) for the target AMF, as described in step 704.
It should be understood that, in this example, the target AMF is an AMF in the dedicated core network, for example, an AMF 2 in
706: The UE completes a registration procedure via the target AMF (for example, the AMF 2) and accesses the second core network.
The target AMF continues to perform the registration procedure for the UE based on the information received in step 705, to complete access of the UE to the dedicated core network.
801: A UE sends an AN message to a RAN.
802: The RAN sends an N2 parameter and a registration request of the UE to an AMF 1.
803: The AMF 1 performs access decision-making, and determines to reject access of the UE to a first core network.
For steps 801 to 803, refer to steps 701 to 703 in
Similar to the embodiment in
804: The first AMF sends a registration reject response message to the UE through the RAN.
In a possible implementation, the registration reject response message carries a reject cause value, and the reject cause value indicates to the UE to add a current TA to a “permanent forbidden TA” list, and search for a cell in another TA to attempt to access a network. The “permanent forbidden TA” list may be cleared after the UE is restarted or a SIM card is replaced.
In another possible implementation, the registration reject response message carries a reject cause value, and the reject cause value is #15. In other words, the reject cause value reuses a reject cause value #15 of an existing registration reject response message. It should be understood that, if the reject cause value in the registration reject response message is #15, the UE stores the current TA in a “forbidden TA for roaming” list, and searches for another TA to attempt to access the network.
805: The UE performs cell reselection based on the received registration reject response message.
Specifically, the UE adds the current TA to a corresponding forbidden TA list, and selects a cell in another TA at a current location to attempt to access the network. In this case, the reselected cell may be located in a same base station (for example, the RAN in steps 801 to 804), or may be located in a different base station. This is not limited in this application.
806: The UE completes a registration procedure by using the newly selected cell, and accesses a corresponding dedicated core network.
901: A UE sends an AN message to a RAN.
902: The RAN sends an N2 parameter and a registration request of the UE to an AMF 1.
903: The AMF 1 performs access decision-making and determines to reject access of the UE to a first core network.
For steps 901 to 903, refer to steps 701 to 703 in
904: The first AMF sends a registration reject response message to the UE through the RAN, where the registration reject response message carries a network slice ID of a dedicated core network. In addition, the registration reject response message further carries a reject cause value. The reject cause value indicates to the UE to update the registration request and re-initiate a registration procedure by using an updated registration request. For example, the reject cause value may be different from any reject cause value carried in an existing registration reject response message, or a new reject cause value. Alternatively, an existing reject cause value may be reused, and the UE updates the registration request based on the cause value by using some other technical means or technologies, and re-initiates the registration procedure by using the updated registration request. This is not limited.
905: The UE updates a locally configured network slice list based on the received registration reject response message.
Based on the reject cause value, the UE updates the locally configured network slice list (configured NSSAI), and adds the network slice ID of the dedicated core network that is carried in the registration reject response message to the locally configured network slice list.
906: The UE re-initiates the registration procedure based on the updated registration request, to complete the registration procedure and access a second core network. The updated registration request carries the network slice ID of the dedicated core network.
In other words, the updated registration request carries the requested NSSAI, and the requested NSSAI carries the network slice ID that is of the dedicated core network and that is indicated by the first AMF. The RAN that receives the updated registration request may select a correct dedicated core network for the UE based on the requested NSSAI, to complete the registration procedure.
The updated registration request is initiated by the UE through a target base station. The UE may perform cell reselection based on the updated network slice information and cell broadcast information, to determine the target base station. The target base station may be an original base station, or may be another base station. This is not limited in this application.
The following further provides an example of a network access method.
401: A UE sends an AN message to a RAN.
402: The RAN sends an N2 parameter and a registration request of the UE to an AMF 1.
For steps 401 and 402, refer to steps 701 and 702 in
403: The AMF 1 sends an access policy request to an AM PCF based on the registration request of the UE.
The AM PCF is an access and mobility management policy control network element, and the access and mobility management policy control network element is one type of access policy control network element. The AM PCF may alternatively be replaced with another type of access policy control network element. It should be understood that the AM PCF may alternatively be replaced with any network element in a core network. This is not limited in this application. The following uses the AM PCF as an access policy control network element for description. The foregoing descriptions are also applicable to descriptions in other parts, and details are not described again.
The access policy request carries an identifier of the UE. Optionally, the identifier of the UE may be an SUPI or an SUCI.
Optionally, the access policy request may be triggered by the AMF 1 through determining based on a current access location of the UE. For example, the UE currently performs access from a campus range.
In addition, the identifier that is of the UE and that is carried in the access policy request may come from the UE (for example, the UE carries the SUCI and/or the SUPI in the initial registration request), or may come from an old AMF previously accessed by the UE (for example, the AMF 1 determines the old AMF based on a 5G-GUTI carried by the UE, and obtains a UE context from the old AMF, where the UE context may include the SUPI of the UE).
Optionally, the access policy request may further include location information that is of the UE and that is received by the AMF 1, for example, information about a cell on which the UE currently camps, such as an NCGI and a TAI.
404: The AM PCF performs access decision-making based on the received access policy request, and determines that the second core network provides a service for the UE.
Before performing access decision-making, the AM PCF needs to first obtain the SUPI identifier of the UE mainly in the following three manners:
Manner 1
The AM PCF obtains the SUPI of the UE from the access policy request. In other words, the access policy request sent by the AMF 1 carries the SUPI of the UE.
Manner 2
The AM PCF interacts with a UDM 1 based on the SUCI. The UDM 1 maps the SUCI to the SUPI and returns the SUPI obtained through mapping. For example, the AM PCF sends an SUCI decryption request to the UDM 1, where the SUCI decryption request carries the SUCI that requests to be decrypted. The AMF 1 receives an SUCI decryption response from the UDM 1, where the SUCI decryption response carries the SUPI to which the SUCI is mapped. In this manner, the access policy request sent by the AMF 1 carries the SUCI of the UE.
Manner 3
The AM PCF maps the SUCI to the SUPI based on local configuration information to obtain the SUPI. In this manner, the access policy request carries the SUCI.
Manner 1 to Manner 3 are respectively shown in a/b/c in dashed-line boxes in
In step 404, the AM PCF may perform access decision-making based on the SUPI, the location information of the UE, locally stored subscriber data, an area range of the second core network, and other information, and determine that the second core network provides a service for the UE.
For example, the AM PCF may determine, based on one or more of the following causes, that the second core network provides the service for the UE.
The AM PCF determines, based on the SUPI of the UE, that the UE is a subscriber of the second core network.
The AM PCF determines, based on a subscriber category, that the UE is a dedicated network subscriber or a public network subscriber.
Alternatively, the AM PCF determines, based on the subscriber category and a location of the UE, that the current location of the UE is in an area range of a dedicated network or an area range of a public network, and the dedicated network or the public network needs to provide a service for the UE.
405: The AM PCF feeds back an access policy response to the AMF 1.
The access policy response may carry one or more of the following information:
For a function and a specific implementation of the registration reject cause value, refer to the description of the registration reject cause value in the solution 2. For details, refer to the descriptions in step 520 and step 530. For a function and a specific implementation of the updated configured NSSAI, refer to the description of the “updated network slice” in the solution 3. For details, refer to the descriptions in step 620 and step 630. Details are not described herein again.
406: The AMF 1 performs, based on the access policy response, the rerouting procedure in the solution 1, or the registration reject procedure in the solution 2 or the solution 3, so that the UE accesses the second core network.
It should be understood that, in this example, the decision regarding network access by the UE is performed by the AM PCF. After the AM PCF determines that the UE needs to access the second core network, and feeds back the decision result to the first AMF by using the access policy response message, a procedure subsequently performed by the first AMF may reuse any procedure, for example, the rerouting procedure or the registration reject procedure, performed after the first AMF determines to reject access of the UE to the first core network in the foregoing solution 1, solution 2, or solution 3. This is not limited. In other words, after receiving the access policy response message, the first AMF may indicate to the RAN/UE to enable the UE to access the network through the second core network.
In addition, the method procedure shown in
201: A UE sends a radio resource control (RRC) message to a RAN.
The RRC message includes an AN parameter and a registration request of the UE. For the AN parameter and the registration request of the UE, refer to the description in step 701. Details are not described herein again.
For example, the UE may send an RRC setup complete message to the RAN after an RRC setup procedure is successfully triggered. 5G is used as an example. The RRC setup complete message may be an RRCSetupComplete message, also referred to as a message 5.
202: The RAN sends an N2 parameter and the registration request of the UE to an AMF 1.
Alternatively, step 202 may be expressed as: The RAN sends a first message to the AMF 1, where the first message includes the N2 parameter and the registration request of the UE.
For step 202, refer to step 702. Details are not described again.
203: The AMF 1 determines that a second core network provides a service for the UE.
In the foregoing embodiments, the AMF 1 represents an AMF in a first core network.
Optionally, for example, the AMF 1 determines, based on a local configuration, that the second core network provides the service for the UE. For specific implementation, refer to various possible examples in step 320. Optionally, for another example, the AMF 1 sends an access policy request to an AM PCF, receives an access policy response from the AM PCF, and further determines, based on the access policy response, that the second core network provides the service for the UE, as shown in steps 403 to 405 in the procedure shown in
204: The AMF 1 sends first indication information to the RAN, where the first indication information indicates to the RAN to reroute the registration request to the second core network.
Optionally, for example, for the first indication information, refer to the descriptions in the foregoing embodiments, for example, the descriptions of the first indication information in step 320. Details are not described again.
Optionally, for another example, the first indication information may be radio access technology/frequency selection policy (radio access technology (RAT)/frequency selection policy, RFSP) index information.
For example, the AMF 1 sends a downlink NAS transport message to the RAN, where the downlink NAS transport message carries a registration reject response message and first indication information.
Optionally, for another example, the AMF 1 sends a downlink NAS transport message to the RAN, where the downlink NAS transport message carries a registration reject response message, first indication information, and RFSP index information. In this example, for the first indication information, refer to the descriptions in the foregoing embodiment, for example, the descriptions of the first indication information in step 320.
For example, the RFSP index information may be represented as an RFSP Index (index to RAT/frequency selection priority), and defines selection priorities of the UE for different access types/frequencies.
For example, the downlink NAS transport message may be represented as downlink NAS Transport, namely, DL NAS Transport.
In the foregoing example, if the downlink NAS transport message carries RFSP index information, the RAN maps the RFSP index information to a specific frequency selection parameter, and subsequently sends the frequency selection parameter to the UE for cell reselection of the UE.
205: The RAN sends a downlink information transfer message to the UE, where the downlink information transfer message carries the registration reject response message.
Specifically, the RAN sends the downlink information transfer message to the UE based on the first indication information. For example, the downlink information transfer message may be downlink InfoTransfer, namely, DL InfoTransfer.
206: The RAN sends an RRC release message to the UE.
Optionally, if the downlink NAS transport message in step 204 carries the RFSP index information, the RRC release message may carry the frequency selection parameter. For example, the frequency selection parameter may be indicated by redirected carrier information (redirectedCarrierInfo) information and/or cell reselection priority (cellReselectionPriorities) information in the RRC release message.
The redirected carrier information indicates to the UE to attempt to camp on a specified system/frequency after exiting an RRC connected mode. The cell reselection priority information indicates a frequency priority for cell reselection.
207: The UE performs cell reselection based on the redirected carrier information and/or the cell reselection priority information, and accesses a suitable network through another access network device.
It should be understood that the reselected cell is a cell in the other access network device, and the UE accesses the suitable network based on the other access network device.
In this example, when the AMF determines, based on the decision of the AMF or the access policy response received from the AM PCF, to redirect the UE to the second core network, the downlink NAS transport message sent by the AMF to the RAN may carry the first indication information, or the first indication information and the RFSP index information, to trigger the RAN to provide the frequency selection parameter corresponding to the RFSP index information for the UE, so that the UE performs cell reselection based on the RFSP index information, to access a suitable network.
In this example, if the first AMF in the first core network determines to reject access of the UE to the first core network, the downlink NAS transport message sent to the RAN may carry the RFSP index information. The RAN maps the RFSP index information to a corresponding frequency selection parameter (for example, redirectedCarrierInfo and/or cellReselectionPriorities) and provides the frequency selection parameter to the UE for cell reselection of the UE. The UE may select another suitable access network device based on the frequency selection parameter, to access a suitable network.
The foregoing describes in detail the network access method. The following describes a communication apparatus provided in this application.
Optionally, the communication apparatus 1000 may correspond to the first AMF in embodiments of this application.
In an implementation, the communication apparatus 1000 may correspond to the first AMF in the solution 1 in the method embodiments of this application. In this implementation, the units of the communication apparatus 1000 are configured to implement the following functions:
The receiving unit 1200 is configured to receive a first message from an access network device, where the first message includes a registration request of a terminal device, and the communication apparatus belongs to a first core network.
The sending unit 1300 is configured to send a rerouting request message to the access network device based on the first message, where the rerouting request message includes first indication information, and the first indication information indicates to the access network device to reroute the registration request to a second core network.
The first core network and the second core network share the access network device.
Optionally, in an embodiment, the first indication information includes one or more of the following:
Optionally, in an embodiment, the first message includes an identifier of the terminal device and one or more of the following:
Optionally, in an embodiment, the processing unit 1100 is configured to determine, based on the identifier of the terminal device, that the first core network does not store subscription data of the terminal device.
In addition, the sending unit 1300 is configured to send the rerouting request message to the access network device.
Optionally, in an embodiment, the processing unit 1100 is configured to:
In addition, the sending unit 1300 is configured to send the rerouting request message to the access network device.
Optionally, in an embodiment, the first message includes the identifier of the terminal device and the location information of the terminal device, and the processing unit 1100 is configured to:
In addition, the sending unit 1300 is configured to send the rerouting request message to the access network device.
Optionally, in an embodiment, the first message includes the identifier of the terminal device and the identifier of the network slice requested by the terminal device, and the processing unit 1100 is configured to:
In addition, the sending unit 1300 is configured to send the rerouting request message to the access network device.
Optionally, in an embodiment, the communication apparatus is further configured with one or more of a subscriber list of the second core network, a tracking area identifier (TAI) list of the second core network, or a new radio cell global identifier (NCGI) list of the second core network.
Optionally, in an embodiment, the first AMF is configured with the subscriber list of the second core network.
The processing unit 1100 is configured to determine, based on the identifier of the terminal device and the subscriber list of the second core network, that the terminal device is a subscriber of the second core network.
The sending unit 1300 is configured to send the rerouting request message to the access network device.
Optionally, in an embodiment, the first message includes the identifier of the terminal device and the location information of the terminal device, the communication apparatus is configured with the subscriber list of the second core network and the TAI list of the second core network, and the processing unit 1100 is configured to:
The sending unit 1300 is configured to send the rerouting request message to the access network device.
Optionally, in an embodiment, the first message includes the identifier of the terminal device and the location information of the terminal device, and the communication apparatus is configured with the TAI list of the second core network and/or the NCGI list of the second core network, and the processing unit 1100 is configured to:
The sending unit 1300 is configured to send the rerouting request message to the access network device.
Optionally, in an embodiment, the identifier of the terminal device includes a subscription concealed identifier SUCI, the SUCI includes an RI and an HNPK ID, the RI and/or the HNPK ID indicate/indicates a category of the terminal device, and the category of the terminal device indicates that the terminal device is of the public network subscriber category or the dedicated network subscriber category.
Optionally, in an embodiment, the subscriber list of the second core network includes a number segment of a subscriber of the second core network, and the number segment of the subscriber includes one or more of the following:
Optionally, in an embodiment, the first core network is a public core network, and the second core network is a dedicated core network; or the second core network is a public core network, and the first core network is a dedicated core network.
Optionally, in another implementation, the communication apparatus 1000 may alternatively correspond to the first AMF in the solution 2 or the solution 3 in the method embodiments of this application.
In this implementation, the units of the communication apparatus 1000 are configured to implement the following functions:
The receiving unit 1200 is configured to receive a first message from an access network device, where the first message includes a registration request of a terminal device, and the communication apparatus belongs to a first core network.
The sending unit 1300 is configured to send a second message to the terminal device based on the first message, where the second message is used by the terminal device to perform reselection to a second core network, or the second message indicates to the terminal device to update the registration request and initiate a registration procedure based on an updated registration request.
Optionally, in an embodiment, the sending unit 1300 is configured to:
Optionally, in an embodiment, the sending unit 1300 is configured to:
Optionally, in an embodiment, the first message includes an identifier of the terminal device and one or more of the following:
Optionally, in an embodiment, the processing unit 1100 is configured to determine, based on the identifier of the terminal device, that the first core network does not store subscription data of the terminal device.
The sending unit 1300 is configured to send the second message to the terminal device.
Optionally, in an embodiment, the processing unit 1100 is configured to:
In addition, the sending unit 1300 is configured to send the second message to the terminal device.
Optionally, in an embodiment, the first message includes the identifier of the terminal device and the location information of the terminal device, and the processing unit 1100 is configured to:
In addition, the sending unit 1300 is configured to send the second message to the terminal device.
Optionally, in an embodiment, the first message includes the identifier of the terminal device and the identifier of the network slice requested by the terminal device, and the processing unit 1100 is configured to:
In addition, the sending unit 1300 is configured to send the second message to the terminal device.
Optionally, in an embodiment, the communication apparatus is further configured with one or more of a subscriber list of the second core network, a tracking area identifier (TAI) list of the second core network, or a new radio cell global identifier (NCGI) list of the second core network.
Optionally, in an embodiment, the first AMF is configured with the subscriber list of the second core network.
The processing unit 1100 is configured to determine, based on the identifier of the terminal device and the subscriber list of the second core network, that the terminal device is a subscriber of the second core network.
The sending unit 1300 is configured to send the second message to the terminal device.
Optionally, in an embodiment, the first message includes the identifier of the terminal device and the location information of the terminal device, the communication apparatus is configured with the subscriber list of the second core network and the TAI list of the second core network, and the processing unit 1100 is configured to:
The sending unit 1300 is configured to send the second message to the terminal device.
Optionally, in an embodiment, the first message includes the identifier of the terminal device and the location information of the terminal device, and the communication apparatus is configured with the TAI list of the second core network and/or the NCGI list of the second core network, and the processing unit 1100 is configured to:
The sending unit 1300 is configured to send the second message to the terminal device.
Optionally, in an embodiment, the sending unit 1300 is configured to send an access policy request message to an AM PCF based on the first message, where the access policy request message is used to request a decision regarding network access by the terminal device.
The receiving unit 1200 is configured to receive an access policy response message from the AM PCF, where the access policy response message indicates to enable the terminal device to access the second core network.
In addition, the sending unit 1300 is further configured to send a rerouting request message to the access network device based on the access policy response message.
Optionally, in an embodiment, the access policy response message carries one or more of the following information:
Optionally, in an embodiment, the identifier of the terminal device includes a subscription concealed identifier (SUCI), the SUCI includes an RI and an HNPK ID, the RI and/or the HNPK ID indicate a category of the terminal device, and the category of the terminal device indicates that the terminal device is of the public network subscriber category or the dedicated network subscriber category.
Optionally, in an embodiment, the subscriber list of the second core network includes a number segment of a subscriber of the second core network, and the number segment of the subscriber includes one or more of the following:
Optionally, in an embodiment, the receiving unit 1200 is further configured to receive a first message from an access network device, where the first message includes a registration request of a terminal device, and the communication apparatus belongs to a first core network.
The sending unit 1300 is configured to send first indication information to the access network device based on the first message, where the first indication information indicates to the access network device to reroute the registration request to a second core network.
Optionally, the first indication information is RFSP index information.
Optionally, in an embodiment, the first core network is a public core network, and the second core network is a dedicated core network; or the second core network is a public core network, and the first core network is a dedicated core network.
Optionally, the communication apparatus 1000 may correspond to the access network device in embodiments of this application, for example, the access network device in the solution 1 in the method embodiments. In this implementation, the units of the communication apparatus 1000 are configured to implement the following functions:
The receiving unit 1200 is configured to receive a rerouting request message from a first AMF, where the rerouting request message includes first indication information, the first indication information indicates to the access network device to reroute a registration request to a second core network, and the first AMF belongs to a first core network.
The sending unit 1300 is configured to send a second message to a second AMF based on the first indication information, where the second message includes the registration request, and the second AMF belongs to the second core network.
Optionally, in an embodiment, the first indication information includes one or more of the following:
Optionally, in an embodiment, the access network device is configured with one or more of the following information:
Optionally, in an embodiment, the processing unit 1100 is further configured to:
Optionally, in an embodiment, the sending unit 1300 is configured to send a first message to a first AMF, where the first message includes a registration request of a terminal device, and the first AMF belongs to a first core network.
The receiving unit 1200 is configured to receive first indication information from the first AMF, where the first indication information indicates to the communication apparatus to reroute the registration request to a second core network.
Optionally, the first indication information is RFSP index information.
Optionally, in an embodiment, the first core network is a public core network, and the second core network is a dedicated core network; or the second core network is a public core network, and the first core network is a dedicated core network.
Optionally, the communication apparatus 1000 may correspond to the terminal device in embodiments of this application.
In an implementation, the communication apparatus 1000 may correspond to the terminal device in the solution 2 in the method embodiments. In this implementation, the units of the communication apparatus 1000 are configured to implement the following functions:
The receiving unit 1200 is configured to receive a registration reject response message from an access network device, where the registration reject response message carries a reject cause value.
The sending unit 1300 is configured to search, based on the reject cause value, for a cell in a TA other than a current TA to attempt to access a network.
Optionally, in an embodiment, the processing unit 1100 is further configured to:
In another implementation, the communication apparatus 1000 may correspond to the terminal device in the solution 3 in the method embodiments. In this implementation, the units of the communication apparatus 1000 are configured to implement the following functions:
The receiving unit 1200 is configured to receive a registration reject response message from an access network device, where the registration reject response message carries information about a network slice of a second core network.
The processing unit 1100 is configured to re-initiate a registration procedure by using an updated registration request, where the updated registration request includes updated network slice information, and the updated network slice information includes the information about the network slice of the second core network.
Optionally, in an embodiment, the processing unit 1100 is further configured to:
Optionally, the communication apparatus 1000 may correspond to the AM PCF in embodiments of this application.
In this implementation, the units of the communication apparatus 1000 are configured to implement the following functions:
The receiving unit 1200 is configured to receive an access policy request message from a first AMF in a first core network, where the access policy request message is used to request to obtain a policy of accessing a network by a UE.
The processing unit 1100 is configured to perform, based on the access policy request message, a decision of accessing the network by the UE, and to determine that a second core network provides a service for the UE.
The sending unit 1300 is configured to send an access policy response message to the first AMF, where the access policy response message indicates to enable the UE to access the second core network.
Optionally, in an embodiment, the first core network and the second core network share an access network device, or access network devices are deployed separately for the first core network and the second core network.
Optionally, in an embodiment, the access policy response message carries one or more of the following information:
Optionally, in an embodiment, the processing unit 1100 is further configured to obtain an SUPI of the UE, and
Optionally, the processing unit 1100 is configured to:
Optionally, in an implementation, the sending unit 1300 is configured to send an SUCI decryption request to the UDM in the first core network, where the SUCI decryption request carries the SUCI of the UE.
The receiving unit 1200 is configured to receive an SUCI decryption response from the UDM in the first core network, where the SUCI decryption response carries the SUPI to which the SUCI is mapped.
In the foregoing implementations, the receiving unit 1200 and the sending unit 1300 may alternatively be integrated into one transceiver unit that has both a receiving function and a sending function. This is not limited herein.
In embodiments in which the communication apparatus 1000 corresponds to the first AMF, the processing unit 1100 is configured to perform processing and/or an operation, other than sending and receiving actions, implemented inside the first AMF. The receiving unit 1200 is configured to perform a receiving action performed by the first AMF, and the sending unit 1300 is configured to perform a sending action performed by the first AMF.
For example, in
For another example, in
For another example, in
For another example, in
In embodiments in which the communication apparatus 1000 corresponds to the access network device, the processing unit 1100 is configured to perform processing and/or an operation, other than sending and receiving actions, implemented inside the access network device. The receiving unit 1200 is configured to perform a receiving action performed by the access network device, and the sending unit 1300 is configured to perform a sending action performed by the access network device.
For example, in
For another example, in
For another example, in
For another example, in
In embodiments in which the communication apparatus 1000 corresponds to the terminal device, the processing unit 1100 is configured to perform processing and/or an operation, other than sending and receiving actions, implemented inside the terminal device. The receiving unit 1200 is configured to perform a receiving action performed by the terminal device, and the sending unit 1300 is configured to perform a sending action performed by the terminal device.
For example, in
For example, in
In embodiments in which the communication apparatus 1000 corresponds to the AM PCF, the processing unit 1100 is configured to perform processing and/or an operation, other than sending and receiving actions, implemented inside the AM PCF. The receiving unit 1200 is configured to perform a receiving action performed by the AM PCF, and the sending unit 1300 is configured to perform a sending action performed by the AM PCF.
For example, in
For example, the processor 11 may have a function of the processing unit 1100 shown in
Optionally, in an implementation, the communication apparatus 10 may be the network device in the method embodiments, for example, the first AMF, the access network device, or the AM PCF. In this implementation, the communication interface 13 may be a transceiver of the network device. The transceiver may include a receiver and/or a transmitter. Optionally, the processor 11 may be a baseband apparatus of the network device, and the communication interface 13 may be a radio frequency apparatus.
In another implementation, the communication apparatus 10 may be a chip (or a chip system) installed in the network device. In this implementation, the communication interface 13 may be an interface circuit or an input/output interface.
Optionally, in an implementation, the communication apparatus 10 may be the terminal device in the method embodiments. In this implementation, the communication interface 13 may be a transceiver of the terminal device. The transceiver may include a receiver and/or a transmitter. Optionally, the processor 11 may be a baseband apparatus of the terminal device, and the communication interface 13 may be a radio frequency apparatus.
In another implementation, the communication apparatus 10 may be a chip (or a chip system) installed in the terminal device. In this implementation, the communication interface 13 may be an interface circuit or an input/output interface.
In
In addition, this application further provides a computer-readable storage medium. The computer-readable storage medium stores computer instructions. When the computer instructions are run on a computer, an operation and/or processing performed by the first AMF in the method embodiments of this application is performed.
This application further provides a computer-readable storage medium. The computer-readable storage medium stores computer instructions. When the computer instructions are run on a computer, an operation and/or processing performed by the access network device in the method embodiments of this application is performed.
This application further provides a computer-readable storage medium. The computer-readable storage medium stores computer instructions. When the computer instructions are run on a computer, an operation and/or processing performed by the AM PCF in the method embodiments of this application is performed.
This application further provides a computer-readable storage medium. The computer-readable storage medium stores computer instructions. When the computer instructions are run on a computer, an operation and/or processing performed by the terminal device in the method embodiments of this application is performed.
This application further provides a computer program product. The computer program product includes computer program code or instructions. When the computer program code or the instructions are run on a computer, an operation and/or processing performed by the first AMF in the method embodiments of this application is performed.
This application further provides a computer program product. The computer program product includes computer program code or instructions. When the computer program code or the instructions are run on a computer, an operation and/or processing performed by the access network device in the method embodiments of this application is performed.
This application further provides a computer program product. The computer program product includes computer program code or instructions. When the computer program code or the instructions are run on a computer, an operation and/or processing performed by the AM PCF in the method embodiments of this application is performed.
This application further provides a computer program product. The computer program product includes computer program code or instructions. When the computer program code or the instructions are run on a computer, an operation and/or processing performed by the terminal device in the method embodiments of this application is performed.
This application further provides a chip. The chip includes a processor. A memory configured to store a computer program is disposed independent of the chip. The processor is configured to execute the computer program stored in the memory, to enable a communication apparatus in which the chip is installed to perform an operation and/or processing performed by the first AMF in any method embodiment.
This application further provides a chip. The chip includes a processor. A memory configured to store a computer program is disposed independent of the chip. The processor is configured to execute the computer program stored in the memory, to enable a communication apparatus in which the chip is installed to perform an operation and/or processing performed by the access network device in any method embodiment.
This application further provides a chip. The chip includes a processor. A memory configured to store a computer program is disposed independent of the chip. The processor is configured to execute the computer program stored in the memory, to enable a communication apparatus in which the chip is installed to perform an operation and/or processing performed by the AM PCF in any method embodiment.
This application further provides a chip. The chip includes a processor. A memory configured to store a computer program is disposed independent of the chip. The processor is configured to execute the computer program stored in the memory, to enable a communication apparatus in which the chip is installed to perform an operation and/or processing performed by the terminal device in any method embodiment.
Further, the chip may further include a communication interface. The communication interface may be an input/output interface, an interface circuit, or the like. Further, the chip may further include the memory.
Optionally, there may be one or more processors, there may be one or more memories, and there may be one or more memories.
This application further provides a communication apparatus (for example, may be a chip or a chip system), including a processor and a communication interface. The communication interface is configured to receive (in other words, input) data and/or information, and transmit the received data and/or information to the processor. The processor processes the data and/or the information. In addition, the communication interface is further configured to send (in other words, output) data and/or information obtained through processing by the processor, so that an operation and/or processing performed by the first AMF in any method embodiment is performed.
This application further provides a communication apparatus (for example, may be a chip or a chip system), including a processor and a communication interface. The communication interface is configured to receive (in other words, input) data and/or information, and transmit the received data and/or information to the processor. The processor processes the data and/or the information. In addition, the communication interface is further configured to send (in other words, output) data and/or information obtained through processing by the processor, so that an operation and/or processing performed by the access network device in any method embodiment is performed.
This application further provides a communication apparatus (for example, may be a chip or a chip system), including a processor and a communication interface. The communication interface is configured to receive (in other words, input) data and/or information, and transmit the received data and/or information to the processor. The processor processes the data and/or the information. In addition, the communication interface is further configured to send (in other words, output) data and/or information obtained through processing by the processor, so that an operation and/or processing performed by the AM PCF in any method embodiment is performed.
This application further provides a communication apparatus (for example, may be a chip or a chip system), including a processor and a communication interface. The communication interface is configured to receive (in other words, input) data and/or information, and transmit the received data and/or information to the processor. The processor processes the data and/or the information. In addition, the communication interface is further configured to send (in other words, output) data and/or information obtained through processing by the processor, so that an operation and/or processing performed by the terminal device in any method embodiment is performed.
This application further provides a communication apparatus, including at least one processor. The at least one processor is coupled to at least one memory. The at least one processor is configured to execute a computer program or instructions stored in the at least one memory, to enable the communication apparatus to perform an operation and/or processing performed by the first AMF in any method embodiment.
This application further provides a communication apparatus, including at least one processor. The at least one processor is coupled to at least one memory. The at least one processor is configured to execute a computer program or instructions stored in the at least one memory, to enable the communication apparatus to perform an operation and/or processing performed by the access network device in any method embodiment.
This application further provides a communication apparatus, including at least one processor. The at least one processor is coupled to at least one memory. The at least one processor is configured to execute a computer program or instructions stored in the at least one memory, to enable the communication apparatus to perform an operation and/or processing performed by the AM PCF in any method embodiment.
This application further provides a communication apparatus, including at least one processor. The at least one processor is coupled to at least one memory. The at least one processor is configured to execute a computer program or instructions stored in the at least one memory, to enable the communication apparatus to perform an operation and/or processing performed by the terminal device in any method embodiment.
This application further provides a wireless communication system, including the first AMF and the access network device in the solution 1 in the method embodiments of this application, or including the first AMF, the access network device, and the AM PCF shown in
The processor in embodiments of this application may be an integrated circuit chip, and has a signal processing capability. In an implementation process, the steps in the foregoing method embodiments may be completed by using a hardware integrated logic circuit in the processor or instructions in a form of software. The processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or another programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component. The general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like. The steps of the methods disclosed in embodiments of this application may be directly performed by a hardware encoding processor, or may be performed by a combination of hardware and a software module in an encoding processor. The software module may be located in a mature storage medium in the art, for example, a random access memory, a flash memory, a read-only memory, a programmable read-only memory, an electrically erasable programmable memory, or a register. The storage medium is located in the memory, and a processor reads information in the memory and completes the steps in the foregoing methods in combination with hardware of the processor.
The memory in embodiments of this application may be a volatile memory or a non-volatile memory, or may include both the volatile memory and the non-volatile memory. The non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory may be a random access memory (RAM), and is used as an external cache. By way of example but not limitative description, many forms of RAMs may be used, for example, a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDR SDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchlink dynamic random access memory (SLDRAM), and a direct rambus dynamic random access memory (DR RAM). It should be noted that the memory of the systems and methods described in this specification includes but is not limited to these and any memory of another proper type.
All or some of the methods provided in the foregoing embodiments may be implemented by using software, hardware, firmware, or any combination thereof. When software is used to implement the methods, all or some of the methods may be implemented in a form of a computer program product. The computer program product may include one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedure or functions according to embodiments of this application are all or partially generated. The computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable apparatuses. The computer instructions may be stored in a computer-readable storage medium or may be transmitted from a computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center to another website, computer, server, or data center in a wired (for example, a coaxial cable, an optical fiber, or a digital subscriber line (DSL)) or wireless (for example, infrared, radio, or microwave) manner. The computer-readable storage medium may be any usable medium accessible by the computer, or a data storage device, for example, a server or a data center, integrating one or more usable media.
The term “and/or” in this application is merely an association relationship for describing associated objects, and indicates that three relationships may exist. For example, A and/or B may represent: Only A exists, both A and B exist, and only B exists. A, B, and C may all be singular or plural, and are not limited.
A person of ordinary skill in the art may be aware that, in combination with the examples described in embodiments disclosed in this specification, units and algorithm steps may be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether the functions are performed by hardware or software depends on particular applications and design constraint conditions of the technical solutions. A person skilled in the art may use different methods to implement the described functions for each particular application, but it should not be considered that the implementation goes beyond the scope of this application.
It may be clearly understood by a person skilled in the art that, for the purpose of convenient and brief description, for a detailed working process of the foregoing system, apparatus, and unit, refer to a corresponding process in the foregoing method embodiments. Details are not described herein again.
In several embodiments provided in this application, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the described apparatus embodiment is merely an example. For example, division into the units is merely logical function division and may be other division during actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented by using some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. Some or all of the units may be selected based on actual requirements to achieve the objectives of the solutions of embodiments.
In addition, functional units in embodiments of this application may be integrated into one processing unit, each of the units may exist alone physically, or two or more units are integrated into one unit.
When the functions are implemented in the form of a software functional unit and sold or used as an independent product, the functions may be stored in a computer-readable storage medium. Based on such an understanding, the technical solutions of this application essentially, or the part contributing to the prior art, or some of the technical solutions may be implemented in a form of a software product. The computer software product is stored in a storage medium, and includes several instructions for instructing a computer device (which may be a personal computer, a server, or a network device) to perform all or some of the steps of the methods described in embodiments of this application. The foregoing storage medium includes any medium that can store program code, such as a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disc.
The foregoing descriptions are merely specific implementations of this application, and are not intended to limit the protection scope of this application. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed in this application shall fall within the protection scope of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.
| Number | Date | Country | Kind |
|---|---|---|---|
| 202210756958.8 | Jun 2022 | CN | national |
| 202211252846.5 | Oct 2022 | CN | national |
This application is a continuation of International Application No. PCT/CN2023/096730, filed on May 29, 2023, which claims priority to Chinese Patent Application No. 202210756958.8, filed on Jun. 30, 2022, and Chinese Patent Application No. 202211252846.5, filed on Oct. 13, 2022. All of the aforementioned patent applications are hereby incorporated by reference in their entireties.
| Number | Date | Country | |
|---|---|---|---|
| Parent | PCT/CN2023/096730 | May 2023 | WO |
| Child | 19002306 | US |