专利摘要:
a slice-based communications method and device is disclosed. the method includes: sending (201), through an amf node, a first request message to an nssf node; and receiving (202), through the amf node, a response message from the nssf node, and obtaining (203), based on the response message, nssai network slice selection assistance information allowed from a terminal device and service area information corresponding to permitted nos. the amf node obtains the nssai allowed network slice selection assistance information from the terminal device and the service area information corresponding to the nssai allowed from the nssf node, to avoid repeated interaction between the amf node and the node of nssf after a change of registration area caused by the fact that the terminal device moves. therefore, this improves signal exchange and processing efficiency and reduces system overhead.
公开号:BR112019022063A2
申请号:R112019022063
申请日:2017-05-09
公开日:2020-05-05
发明作者:Yu Fang;Ni Hui;Li Yan
申请人:Huawei Tech Co Ltd;
IPC主号:
专利说明:

"FATIA-BASED COMMUNICATION METHOD AND DEVICE" TECHNICAL FIELD [001] The modalities of the present invention belong to the field of communication technologies and, in particular, to a slice-based communications method and device.
FUNDAMENTALS [002] A network slice is a network architecture provided in a fifth generation mobile communication system (the fifth generation, 5G) to meet different user requirements, and a network and management can be customized to best suit a personalized requirement of each service of a consumer and a company. Support for a network slice is an important part of a next generation architecture.
[003] A 5G network supports a deployment scenario as follows: a multiple slice scenario for single user equipment (User Equipment, UE) in which a UE can simultaneously access a plurality of slice instances of a main network. The plurality of slice instances share some network functions, including an access and mobility management function (AMF). In this scenario, an access network node needs to select an appropriate AMF based on the Network Slice Selection Assistance Information (NSSAI) information supported by an AMF and NSSAI requested by the UE.
[004] NSSAIs include configured NSSAIs and permitted NSSAIs. The configured NSSAIs and permitted NSSAIs are stored in the UE. The configured NSSAIs are the standard NSSAIs configured in the UE. Permitted NSSAIs are NSSAIs that are returned by a PLMN to the UE after the PLMN accepts a connection request from the UE and is left by the network. Ο EU ported the NSSAI allowed in a subsequent network access process. A radio access network node (Radio Access Network, RAN) selects an AMF based on the NSSAI configured in the permitted NSSAI ported by the UE.
[005] An NSSF is an independent function from the AMF, and can select a group of slice instances for the UE when the UE initially accesses a network. Currently, when an AMF node
Petition 870190106365, of 10/21/2019, p. 71/174
2/77 selects a slice for the UE by querying slice information through the use of an NSSF node, the NSSF node provides slice information sustained in a UE registration area. Therefore, an MFA determines, for the UE, information to assist slice selection also sustained in the UE registration area. The slice selection assist information is used by an RAN to select an AMF appropriate for the UE in a subsequent NAS process. After the UE moves and performs a tracking area update (TAU) process, the UE registration area changes. The slice information supported by a network can change in a new registration area. In other words, a slice that can provide a service to the UE also changes. In this case, the previously determined slice selection assistance information cannot be used, the RAN cannot select an appropriate AMF for the UE based on the slice selection assistance information, and the AMF needs to query from the node of NSSF again, slice information supported by a network in the new registration area, and to determine, for the UE, information to assist slice selection sustained in the new registration area. As a result, the AMF node performs repeated queries or blind selection, and the AMF and NSSF interact repeatedly with each other, causing additional signaling and overhead in a system.
SUMMARY [006] The modalities of the present invention provide a slice-based communications method and device, to avoid querying again for slice information supported by a network in a new registration area, and to reduce overall system costs when a slice that provides a service to the UE changes.
[007] According to a first aspect, a slice-based communications method is provided. The method includes:
send, through an AMF node, a first request message to an NSSF node; and receiving, through the AMF node, a response message from the NSSF node, and obtaining, based on the response message, the permitted NSSAI from a terminal device and service area information corresponding to the permitted NSSAI.
[008] The AMF node obtains the selection assistance information
Petition 870190106365, of 10/21/2019, p. 72/174
3/77 allowed NSSAI network slice of the terminal device and the service area information corresponding to the NSSAI allowed from the NSSF node, to avoid repeated interaction between the AMF node and the NSSF node after changing an area of registration caused by the fact that the terminal device moves. Therefore, this improves signal exchange and processing efficiency and reduces system overhead.
[009] With reference to the first aspect, in a first possible implementation of the first aspect, the obtaining, by the AMF node based on the response message, of permitted NSSAI from a terminal device and service area information corresponding to the permitted NSSAI includes : when the response message carried the permitted NSSAI and the service area information corresponding to the permitted NSSAI, obtaining, through the AMF node, the permitted NSSAI and the service area information corresponding to the permitted NSSAI from the response message; or when the reply message carried the permitted NSSAIs, obtaining, through the AMF node, the NSSAIs permitted from the reply message, and obtaining, based on a correspondence between the NSSAIs and a service area, the information from the services corresponding to the permitted NSSAI; or when the response message ported first to NSSAI and service area information corresponding to the first NSSAI, determining, by the AMF node based on the first NSSAI and the service area information corresponding to the first NSSAI, the permitted NSSAI and information service area corresponding to permitted NSSAI.
[010] The AMF node can obtain the permitted NSSAI from the terminal device and the NSSAI service area information allowed in different ways based on different content carried by the response message, thereby reducing the number of times permitted NSSAIs are requested repeatedly and system overheads.
[011] With reference to the first aspect or the first possible implementation of the first aspect, in a second possible implementation of the first aspect, when the response message carried the permitted NSSAI, obtained, through the AMF node based on a
Petition 870190106365, of 10/21/2019, p. 73/174
4/77 correspondence between the NSSAI and an NSSAI service area, the permitted NSSAI and the service area information corresponding to the permitted NSSAI include additionally: obtaining, through the AMF node, the correspondence between the NSSAI and a service area a from the NSSF node.
[012] After obtaining the correspondence between the NSSAIs and a service area, it can be prevented that the correspondence between the NSSAIs and a service area is obtained whenever a registration request from the terminal device is received, thereby reducing system overheads.
[013] With reference to the first aspect or both the first possible implementation and the second possible implementation of the first aspect, in a third possible implementation of the first aspect, the method additionally includes: consult, through the AMF node, signature information of the terminal device , where the signature information includes signed NSSAI from the terminal device, the first request message carried the first NSSAI and the first NSSAI are associated with the signed NSSAI.
[014] The AMF node queries the signature information of the terminal device. The first NSSAIs are associated with the signed NSSAIs, to ensure that a service provided to the terminal device by a network meets a subscription request.
[015] With reference to the first aspect or any of the first possible implementation to the third possible implementation of the first aspect, in a fourth possible implementation of the first aspect, the method additionally includes: receiving, through the AMF node, a registration request message from the terminal device, where the registration request message carried the configured NSSAI, the first request message carried the first NSSAI and the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[016] The AMF node receives the registration request message from the terminal device. The configured NSSAI carried by the registration request message is associated with the first NSSAI, to ensure that the network provides a service to the terminal device based on a requirement
Petition 870190106365, of 10/21/2019, p. 74/174
5/77 of the terminal device.
[017] With reference to the first aspect or any of the first possible implementation to the fourth possible implementation of the first aspect, in a fifth possible implementation of the first aspect, the first request message carried the identification information of the terminal device.
[018] The first request message carried the identification information of the terminal device, so that the NSSF node can autonomously query the signature information of the terminal device, to support a scenario in which the AMF node cannot obtain the information signature of the terminal device when there is a slice isolation requirement.
[019] With reference to the first aspect or any of the first possible implementation to the fifth possible implementation of the first aspect, in a sixth possible implementation of the first aspect, the response message additionally includes slice instance identification information corresponding to each S- NSSAI in the NSSAI allowed.
[020] The AMF node can additionally obtain the slice instance identification information corresponding to each S-NSSAI in the permitted NSSAI, so that when the network deploys a plurality of slice instances based on the same S-NSSAI, the AMF node can obtain a correct slice instance and a network function in the slice instance based on the SNSSAI requested by the terminal device, to provide a service to the terminal device.
[021] With reference to the first aspect or any of the first possible implementation to the sixth possible implementation of the first aspect, in a seventh possible implementation of the first aspect, the method additionally includes: obtaining, through the AMF node, the registration area information the terminal device; and determine, by the AMF node based on the permitted NSSAIs of the terminal device and the service area information corresponding to the permitted NSSAIs that are obtained and the information in the registration area of the terminal device, to assign information from a corresponding slice instance to each S-NSSAI in the permitted NSSAI, where attribute information is used to indicate whether a service area of the
Petition 870190106365, of 10/21/2019, p. 75/174
6/77 slice instance corresponding to the S-NSSAI includes a terminal device registration area.
[022] Based on information from the registration area of the terminal device, the AMF node can know whether the service area of the slice instance corresponding to each S-NSSAI in the permitted NSSAIs includes the registration area of the terminal device, to ensure that an appropriate target AMF node can be selected for the terminal device.
[023] With reference to the first aspect or the seventh possible implementation of the first aspect, in an eighth possible implementation of the first aspect, the first S-NSSAI is the S-NSSAI which is of the permitted NSSAI and which corresponds to a service area that includes the registration area of the terminal device, and the method additionally includes: sending, through the AMF node, a second request message to an NRF device, where the second request message includes the first S-NSSAI or identification information of slice instance corresponding to the first S-NSSAI; receiving, through the AMF, address information for a target AMF node from the NRF device; and send, through the AMF, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs for the target AMF node based on the address information of the target AMF node.
[024] The AMF node determines, through the use of the NRF device, the target AMF node that serves the terminal device, and sends the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained from the node of target AMF, so that the target AMF node selects an appropriate slice instance after receiving a session configuration request from the terminal device.
[025] With reference to the first aspect or the eighth possible implementation of the first aspect, in a ninth possible implementation of the first aspect, the method additionally includes: sending, through the AMF, the slice instance identification information corresponding to each SNSSAI in the NSSAI allowed for the target AMF node.
[026] The AMF node determines, using the NRF device, the target AMF node that serves the terminal device, and sends the corresponding slice instance identification information to each S
Petition 870190106365, of 10/21/2019, p. 76/174
7/77
NSSAI in the NSSAI allowed for the target AMF node, so the target AMF node selects an appropriate slice instance after receiving a session configuration request from the terminal device.
[027] With reference to the first aspect or the eighth possible implementation of the first aspect, in a tenth possible implementation of the first aspect, the method additionally includes: sending, through the AMF node, the attribute information to the target AMF node.
[028] The AMF node determines, using the NRF device, the target AMF node that serves the terminal device, and sends the slice instance attribute information corresponding to each S-NSSAI in the NSSAI allowed to the target AMF node, so the target AMF node selects an appropriate slice instance after receiving a session configuration request from the terminal device.
[029] With reference to the first aspect or any of the first possible implementation to the tenth possible implementation of the first aspect, in an eleventh possible implementation of the first aspect, the permitted NSSAIs are the NSSAIs of a visited public land mobile network mobile network, VPLMN), and the response message additionally includes the NSSAIs of a home public land mobile network (HPLMN) that correspond to the NSPLI of the VPLMN, or the response message additionally includes the NSSAIs of an HPLMN that correspond to the VPLMN NSSAI, and the slice instance identification information corresponding to each S-NSSAI in the HPLMN NSSAI.
[030] According to a second aspect, a slice-based communications method is provided. The method includes:
receiving, through an NSSF node, a first request message from an access and from the AMF node; and send, through the NSSF node, a reply message to the AMF node, where the reply message carried the NSSAI, or the NSSAI and the service area information corresponding to the NSSAI.
[031] The NSSF node sends the NSSAI, or NSSAI and service area information corresponding to the NSSAI to the AMF node using the reply message. This can avoid repeated interaction between the
Petition 870190106365, of 10/21/2019, p. 77/174
8/77
AMF and the NSSF node, improve signal exchange and processing efficiency, and reduce system overhead.
[032] With reference to the second aspect, in a first possible implementation of the second aspect, NSSAIs are the permitted NSSAIs.
[033] The NSSF node can directly send the permitted NSSAI, so that the AMF node can directly obtain the permitted NSSAI from a terminal device, thereby reducing the overhead of signaling the AMF node.
[034] With reference to the second aspect or the first possible implementation of the second aspect, in a second possible implementation of the second aspect, the first request message carried first the NSSAI and the permitted NSSAI are associated with the first NSSAI; and the first NSSAI are associated with the signed NSSAI or the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[035] The first NSSAIs carried by the first request message are obtained by the AMF node by querying signature information from the terminal device and using the association between the first NSSAI and the signed NSSAI. This can increase the amount of NSSAI that can be sustained by the terminal device.
[036] With reference to the second aspect or the first possible implementation of the second aspect, in a third possible implementation of the second aspect, the first request message carried the identification information of the terminal device, and the method additionally includes: consult, by the node of the NSSF, the signature information of the terminal device based on the identifying information, where the signature information includes the signed NSSAI of the terminal device and the permitted NSSAI are associated with the signed NSSAI.
[037] When the first request message ported the identification information of the terminal device, the NSSF node queries the signature information of the terminal device. The first NSSAIs are associated with the signed NSSAIs, so that an amount of NSSAIs that can be supported by the terminal device can be increased.
Petition 870190106365, of 10/21/2019, p. 78/174
9/77 [038] With reference to the second aspect, in a fourth possible implementation of the second aspect, the first request message carried the first NSSAI, and the NSSAI are the first NSSAI; and the first NSSAI are associated with the signed NSSAI or the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[039] The first NSSAI carried by the first request message are obtained by the AMF node by querying signature information from the terminal device and using the association between the first NSSAI and the signed NSSAI. This can increase the amount of NSSAI that can be sustained by the terminal device.
[040] With reference to the second aspect or the fourth possible implementation of the second aspect, in a fifth possible implementation of the second aspect, the first request message carried the identification information of the terminal device, and the method additionally includes: consult, by the node of the NSSF, the signature information of the terminal device based on the identifying information, where the signature information includes the signed NSSAI of the terminal device and the first NSSAI are associated with the signed NSSAI.
[041] When the first request message ported the identification information of the terminal device, the NSSF node queries the signature information of the terminal device. The first NSSAIs are associated with the signed NSSAIs, so that an amount of NSSAIs that can be supported by the terminal device can be increased.
[042] With reference to the second aspect or any of the second possible implementation to the fifth possible implementation of the first aspect and the first possible implementation to the fifth possible implementation of the second aspect, in a sixth possible implementation of the second aspect, the device signature information terminal additionally include a terminal device type, and the first request message additionally includes the terminal device type.
[043] The first request message carried the identification information of the terminal device, so that the NSSF node can autonomously consult the terminal's subscription information. This reduces
Petition 870190106365, of 10/21/2019, p. 79/174
10/77 a number of times the AMF node queries the subscription information and system overhead.
[044] With reference to the second aspect or any of the first possible implementation to the sixth possible implementation of the second aspect, in a seventh possible implementation of the second aspect, the response message carried in addition to the slice instance identification information corresponding to each S -NSSAI in NSSAI.
[045] The reply message carried the slice instance identification information corresponding to each S-NSSAI in the permitted NSSAI, thereby avoiding the repeated interaction between the AMF node and the NSSF node and reducing overhead costs signaling.
[046] With reference to the second aspect or any of the first possible implementation to the seventh possible implementation of the second aspect, in an eighth possible implementation of the second aspect, the NSSAI are the NSSAI of a VPLMN, and the response message additionally includes the NSSAI of an HPLMN that match the NSPLI of the VPLMN, or the response message additionally includes the NSSAI of an HPLMN that match the NSSAI of the VPLMN, and the slice instance identification information corresponding to each S-NSSAI in the NSLSA of the HPLMN.
[047] With reference to the second aspect, in a ninth possible implementation of the second aspect, the method additionally includes: sending, through the NSSF, a correspondence between the NSSAI and an NSSAI service area to the AMF.
[048] The correspondence between the NSSAIs and a service area is sent to the AMF node, to prevent the correspondence between the NSSAIs and a service area from being obtained whenever the AMF node receives a device registration request message. terminal, thereby reducing system overheads.
[049] According to a third aspect, a slice-based communications device is provided. The apparatus includes: a transceiver unit and a processing unit, where the processing unit is configured to control the transceiver unit to send a first request message to
Petition 870190106365, of 10/21/2019, p. 80/174
11/77 an NSSF node; and the processing unit is further configured to: control the transceiver unit to receive a response message from the NSSF node, and obtain, based on the response message, the permitted NSSAI from a terminal device and service area information corresponding to the permitted NSSAIs.
[050] With reference to the third aspect, in a first possible implementation of the third aspect, by obtaining, based on the response message, the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI, the processing unit is specifically configured to:
when the response message carried the permitted NSSAI and the service area information corresponding to the permitted NSSAI, it obtains the permitted NSSAI and the service area information corresponding to the permitted NSSAI from the response message; or when the response message carried the permitted NSSAIs, obtains the permitted NSSAIs from the response message, and obtains, based on a correspondence between the NSSAIs and a service area, the service area information corresponding to the permitted NSSAIs; or when the response message carried the first NSSAI and the service area information corresponding to the first NSSAI, determine, based on the first NSSAI and the service area information corresponding to the first NSSAI, the permitted NSSAI and the area information. corresponding to the permitted NSSAI.
[051] With reference to the third aspect or the first possible implementation of the third aspect, in a second possible implementation of the third aspect, when the response message carried the NSSAI allowed, when obtaining, based on the correspondence between the NSSAI and an area of NSSAI service, permitted NSSAIs and service area information corresponding to permitted NSSAIs, the processing unit is additionally configured to:
obtain the correspondence between the NSSAI and a service area from the NSSF node.
[052] With reference to the third aspect or rather to the first
Petition 870190106365, of 10/21/2019, p. 81/174
12/77 possible implementation for the second possible implementation of the third aspect, in a third possible implementation of the third aspect, the processing unit is additionally configured for:
consult the signature information of the terminal device, where the signature information includes the signed NSSAI of the terminal device, the first request message carried the first NSSAI and the first NSSAI are associated with the signed NSSAI.
[053] With reference to the third aspect or any of the first possible implementation to the third possible implementation of the third aspect, in a possible fourth implementation of the third aspect, the processing unit is additionally configured for:
control the transceiver unit to receive a registration request message from the terminal device, where the registration request message carried the configured NSSAI, the first request message carried the first NSSAI and the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[054] With reference to the third aspect or any of the first possible implementation to the fourth possible implementation of the third aspect, in a fifth possible implementation of the third aspect, the first request message carried the identification information of the terminal device.
[055] With reference to the third aspect or any of the first possible implementation to the fifth possible implementation of the third aspect, in a possible sixth implementation of the third aspect, the response message additionally includes slice instance identification information corresponding to each S- NSSAI in the NSSAI allowed.
[056] With reference to the third aspect or any of the first possible implementation to the sixth possible implementation of the third aspect, in a seventh possible implementation of the third aspect, the processing unit is additionally configured for:
obtain information from the registration area of the terminal device; and determine, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI
Petition 870190106365, of 10/21/2019, p. 82/174
13/77 that are obtained and the information from the registration area of the terminal device, attribute information from a slice instance corresponding to each SNSSAI in the permitted NSSAI, where the attribute information is used to indicate whether a service area of the instance of slice corresponding to the SNSSAI includes a terminal device registration area.
[057] With reference to the third aspect or the seventh possible implementation of the third aspect, in an eighth possible implementation of the third aspect, when the first S-NSSAI is the S-NSSAI which is of the permitted NSSAI and which corresponds to a service area which includes the registration area of the terminal device, the processing unit is additionally configured to:
controlling the transceiver unit to send a second request message to an NRF device, where the second request message includes the first S-NSSAI or slice instance identification information corresponding to the first S-NSSAI;
controlling the transceiver unit to receive address information from a target AMF node from the NRF device; and controlling the transceiver unit to send the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs to the target AMF node based on the address information of the target AMF node.
[058] With reference to the third aspect or the eighth possible implementation of the third aspect, in a ninth possible implementation of the third aspect, the processing unit is additionally configured for:
controlling the transceiver unit to send slice instance identification information corresponding to each S-NSSAI in the permitted NSSAI to the target AMF node.
[059] With reference to the third aspect or the eighth possible implementation of the third aspect, in a tenth possible implementation of the third aspect, the processing unit is additionally configured for:
controlling the transceiver unit to send the attribute information to the target AMF node.
[060] With reference to the third aspect or any of the first possible implementation to the tenth possible implementation of the third
Petition 870190106365, of 10/21/2019, p. 83/174
14/77 aspect, in an eleventh possible implementation of the third aspect, the permitted NSSAIs are the NSSAIs of a VPLMN, and the response message additionally includes the NSSAIs of an HPLMN that correspond to the NSSAI of the VPLMN, or the response message includes additionally the NSSAI of an HPLMN that correspond to the NSSAI of the VPLMN, and slice instance identification information corresponding to each SNSSAI in the NSSAI of the HPLMN.
[061] According to a fourth aspect, a slice-based communications device is provided. The apparatus includes: a transceiver unit and a processing unit, where the processing unit is configured to control the transceiver unit to receive a first request message from an AMF node; and the processing unit is further configured to control the transceiver unit to send a response message to the AMF node, where the response message carried to NSSAI, or NSSAI and service area information corresponding to NSSAI.
[062] With reference to the fourth aspect, in a first possible implementation of the fourth aspect, NSSAIs are the permitted NSSAIs.
[063] With reference to the fourth aspect or the first possible implementation of the fourth aspect, in a second possible implementation of the fourth aspect, the first request message carried the first NSSAI and the permitted NSSAI are associated with the first NSSAI; and the first NSSAI are associated with the signed NSSAI or the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[064] With reference to the fourth aspect or the first possible implementation of the fourth aspect, in a third possible implementation of the fourth aspect, the first request message carried the identification information of a terminal device; and the processing unit is additionally configured to: consult the subscription information of the terminal device with
Petition 870190106365, of 10/21/2019, p. 84/174
15/77 based on the identification information, where the signature information includes the signed NSSAIs of the terminal device and the permitted NSSAIs are associated with the signed NSSAIs.
[065] With reference to the fourth aspect, in a fourth possible implementation of the fourth aspect, the first request message carried the first NSSAI, and the NSSAI are the first NSSAI; and the first NSSAI are associated with the signed NSSAI or the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[066] With reference to the fourth aspect or the fourth possible implementation of the fourth aspect, in a fifth possible implementation of the fourth aspect, the first request message carried the identification information of a terminal device; and the processing unit is additionally configured for:
query the signature information of the terminal device based on the identification information, where the signature information includes the signed NSSAI of the terminal device and the first NSSAI are associated with the signed NSSAI.
[067] With reference to the fourth aspect or any of the second possible implementation to the fifth possible implementation of the third aspect and the first possible implementation to the fifth possible implementation of the fourth aspect, in a sixth possible implementation of the fourth aspect, the device signature information terminal additionally include a terminal device type, and the first request message additionally includes the terminal device type.
[068] With reference to the fourth aspect or any of the first possible implementation to the sixth possible implementation of the fourth aspect, in a seventh possible implementation of the fourth aspect, the response message carried in addition to the slice instance identification information corresponding to each S -NSSAI in NSSAI.
[069] With reference to the fourth aspect or any of the first possible implementation to the seventh possible implementation of the fourth aspect, in an eighth possible implementation of the fourth aspect, NSSAIs are the NSSAIs of a VPLMN, and the response message additionally includes the
Petition 870190106365, of 10/21/2019, p. 85/174
16/77
NSSAI of an HPLMN that match the NSSAI of the VPLMN, or the reply message additionally includes the NSSAI of an HPLMN that match the NSSAI of the VPLMN, and slice instance identification information corresponding to each S-NSSAI in the NSSAI of the HPLMN.
[070] With reference to the fourth aspect, in a ninth possible implementation of the fourth aspect, the processing unit is additionally configured for:
control the transceiver unit to send a correspondence between the NSSAI and an NSSAI service area to the AMF.
[071] According to a fifth aspect, a slice-based communications device is provided. The device includes: a transceiver and a processor, where the processor is configured to control the transceiver to send a first request message to an NSSF node; and the processor is additionally configured to: control the transceiver to receive a response message from the NSSF node, and obtain, based on the response message, the permitted NSSAI from a terminal device and service area information corresponding to the NSSAI allowed.
[072] With reference to the fifth aspect, in a first possible implementation of the fifth aspect, by obtaining, based on the response message, the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI, the processor is specifically configured for:
when the response message carried the permitted NSSAI and the service area information corresponding to the permitted NSSAI, it obtains the permitted NSSAI and the service area information corresponding to the permitted NSSAI from the response message; or when the response message carried the permitted NSSAIs, obtains the permitted NSSAIs from the response message, and obtains, based on a correspondence between the NSSAIs and a service area, the service area information corresponding to the permitted NSSAIs; or when the response message carried the first NSSAI and service area information corresponding to the first NSSAI,
Petition 870190106365, of 10/21/2019, p. 86/174
17/77 determine, based on the first NSSAI and the service area information corresponding to the first NSSAI, the permitted NSSAI and the service area information corresponding to the permitted NSSAI.
[073] With reference to the fifth aspect or the first possible implementation of the fifth aspect, in a second possible implementation of the fifth aspect, when the response message carried the NSSAI allowed, when obtaining, based on the correspondence between the NSSAI and an area of NSSAI service, permitted NSSAI and service area information corresponding to permitted NSSAI, the processor is additionally configured to:
obtain the correspondence between the NSSAI and a service area from the NSSF node.
[074] With reference to the fifth aspect or both the first possible implementation and the second possible implementation of the fifth aspect, in a third possible implementation of the fifth aspect, the processor is additionally configured to:
consult the signature information of the terminal device, where the signature information includes the signed NSSAI of the terminal device, the first request message carried the first NSSAI and the first NSSAI are associated with the signed NSSAI.
[075] With reference to the fifth aspect or any of the first possible implementation to the third possible implementation of the fifth aspect, in a possible fourth implementation of the fifth aspect, the processor is additionally configured to:
control the transceiver to receive a registration request message from the terminal device, where the registration request message carried the configured NSSAI, the first request message carried the first NSSAI and the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[076] With reference to the fifth aspect or any of the first possible implementation to the fourth possible implementation of the fifth aspect, in a fifth possible implementation of the fifth aspect, the first request message carried the identification information of the
Petition 870190106365, of 10/21/2019, p. 87/174
18/77 terminal device.
[077] With reference to the fifth aspect or any of the first possible implementation to the fifth possible implementation of the fifth aspect, in a possible sixth implementation of the fifth aspect, the response message additionally includes slice instance identification information corresponding to each S- NSSAI in the NSSAI allowed.
[078] With reference to the fifth aspect or any of the first possible implementation to the sixth possible implementation of the fifth aspect, in a seventh possible implementation of the fifth aspect, the processor is additionally configured to:
obtain information from the registration area of the terminal device; and determine, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information for a slice instance corresponding to each S- NSSAI in the permitted NSSAI, where attribute information is used to indicate whether a service area of the slice instance corresponding to the SNSSAI includes a terminal device registration area.
[079] With reference to the fifth aspect or the seventh possible implementation of the fifth aspect, in an eighth possible implementation of the fifth aspect, when the first S-NSSAI is the S-NSSAI which is of the permitted NSSAI and which corresponds to a service area which includes the registration area of the terminal device, the processor is additionally configured to:
controlling the transceiver to send a second request message to an NRF device, where the second request message includes the first S-NSSAI or slice instance identification information corresponding to the first S-NSSAI;
controlling the transceiver to receive address information from a target AMF node from the NRF device; and controlling the transceiver to send the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs to the target AMF node based on the address information of the target AMF node.
[080] With reference to the fifth aspect or the eighth possible implementation of the fifth aspect, in a ninth possible implementation of the fifth
Petition 870190106365, of 10/21/2019, p. 88/174
19/77 aspect, the processor is additionally configured to:
controlling the transceiver to send slice instance identification information corresponding to each S-NSSAI in the NSSAIs allowed to the target AMF node.
[081] With reference to the fifth aspect or the eighth possible implementation of the fifth aspect, in a tenth possible implementation of the fifth aspect, the processor is additionally configured to:
control the transceiver to send the attribute information to the target AMF node.
[082] With reference to the fifth aspect or any of the first possible implementation to the tenth possible implementation of the fifth aspect, in an eleventh possible implementation of the fifth aspect, the permitted NSSAIs are the NSSAIs of a VPLMN, and the response message further includes the NSSAI of an HPLMN that corresponds to the NSSAI of the VPLMN, or the response message further includes the NSSAI of an HPLMN that correspond to the NSSAI of the VPLMN, and slice instance identification information corresponding to each S-NSSAI in the NSSAI of the HPLMN.
[083] According to a sixth aspect, a slice-based communications device is provided. The device includes: a transceiver and a processor, where the processor is configured to control the transceiver to receive a first request message from an AMF node; and the processor is additionally configured to control the transceiver to send a response message to the AMF node, where the response message carried the NSSAI, or the NSSAI and the service area information corresponding to the NSSAI.
[084] With reference to the sixth aspect, in a first possible implementation of the sixth aspect, NSSAIs are permitted NSSAIs.
[085] With reference to the sixth aspect or the first possible implementation of the sixth aspect, in a second possible implementation of the sixth aspect, the first request message carried the first NSSAI and the permitted NSSAI are associated with the first NSSAI; and the first NSSAIs are associated with the signed NSSAIs or the
Petition 870190106365, of 10/21/2019, p. 89/174
20/77 the first NSSAIs are associated with the configured NSSAIs or the first NSSAIs are associated with the signed NSSAIs and the configured NSSAIs.
[086] With reference to the sixth aspect or the first possible implementation of the sixth aspect, in a third possible implementation of the sixth aspect, the first request message carried the identification information of a terminal device; and the processor is additionally configured to:
query the signature information of the terminal device based on the identifying information, where the signature information includes the signed NSSAI of the terminal device and the permitted NSSAI are associated with the signed NSSAI.
[087] With reference to the sixth aspect, in a possible fourth implementation of the sixth aspect, the first request message carried the first NSSAI, and the NSSAI are the first NSSAI; and the first NSSAI are associated with the signed NSSAI or the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[088] With reference to the sixth aspect or the fourth possible implementation of the sixth aspect, in a fifth possible implementation of the sixth aspect, the first request message carried the identification information of a terminal device; and the processor is additionally configured to:
query the signature information of the terminal device based on the identification information, where the signature information includes the signed NSSAI of the terminal device and the first NSSAI are associated with the signed NSSAI.
[089] With reference to the sixth aspect or any of the second possible implementation to the fifth possible implementation of the fifth aspect and the first possible implementation to the fifth possible implementation of the sixth aspect, in a possible sixth implementation of the sixth aspect, the device signature information terminal additionally include a terminal device type, and the first request message additionally includes the terminal device type.
[090] With reference to the sixth aspect or any of the first
Petition 870190106365, of 10/21/2019, p. 90/174
21/77 possible implementation to the sixth possible implementation of the sixth aspect, in a seventh possible implementation of the sixth aspect, the response message carried in addition to the slice instance identification information corresponding to each S-NSSAI in the NSSAI.
[091] With reference to the sixth aspect or any of the first possible implementation to the seventh possible implementation of the sixth aspect, in an eighth possible implementation of the sixth aspect, the NSSAIs are the NSSAI of a VPLMN, and the response message additionally includes the NSSAI of an HPLMN that correspond to the NSPLI of the VPLMN, or the response message additionally includes the NSSAI of an HPLMN that correspond to the NSSAI of the VPLMN, and slice instance identification information corresponding to each S-NSSAI in the NSSAI of the HPLMN.
[092] With reference to the sixth aspect, in a ninth possible implementation of the sixth aspect, the processor is additionally configured to:
control the transceiver to send a correspondence between the NSSAI and an NSSAI service area to the AMF.
[093] According to a seventh aspect, a computer storage media is provided. The computer's storage media is configured to store a computer software instruction executed by the processor provided in the fifth aspect, to carry out the method provided in the first aspect and in the possible implementations of the first aspect.
[094] According to an eighth aspect, a computer storage medium is provided. The computer's storage media is configured to store a computer software instruction executed by the processor provided in the sixth aspect, to carry out the method provided in the second aspect and possible implementations of the second aspect.
BRIEF DESCRIPTION OF THE DRAWINGS [095] Figure 1 is a schematic diagram of a system architecture, according to an embodiment of the present invention;
[096] Figure 2 is a schematic flowchart of a slice-based communications method, according to one embodiment of the present
Petition 870190106365, of 10/21/2019, p. 91/174
22/77 invention;
[097] Figure 3 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[098] Figure 4 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[099] Figure 5 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[0100] Figure 6 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[0101] Figure 7 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[0102] Figure 8 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[0103] Figure 9 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[0104] Figure 10 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[0105] Figure 11 is a schematic flow chart of a slice-based communications method, according to an embodiment of the present invention;
[0106] Figure 12 is a schematic structural diagram of a slice-based communications apparatus, according to an embodiment of the present invention;
[0107] Figure 13 is a schematic structural diagram of a slice-based communications apparatus, according to an embodiment of the present invention;
Petition 870190106365, of 10/21/2019, p. 92/174
23/77 [0108] Figure 14 is a schematic structural diagram of a slice-based communications device, according to an embodiment of the present invention; and [0109] Figure 15 is a schematic structural diagram of a slice-based communications device, according to an embodiment of the present invention.
DESCRIPTION OF THE MODALITIES [0110] The following text clearly and completely describes the technical solutions in the modalities of the present invention with reference to the accompanying drawings in the modalities of the present invention.
[0111] Figure 1 shows an example of a system architecture applied to a modality of the present invention. Slice-based communication control can be implemented based on the system architecture.
[0112] A network slice divides a physical network into a plurality of virtual networks, so that a plurality of services is implemented relatively independently while sharing the same network infrastructure. Each “network slice” performs the customization and adaptation of a network function and the orchestration and management of a corresponding network function based on a service scenario requirement. The network functions include a coverage area, duration, capacity, speed, latency, reliability, security, availability and the like.
[0113] A network slice can be considered as an instantiated main network architecture. Currently, the Third Generation Partnership Project (the 3GPP) divides network slice instances into an enhanced mobile broadband service (enhanced mobile broadband, eMBB), a massive communication service by machine type (massive machine type communication, mMTC), and an ultra-reliable and low-latency communication service (ultra-reliable and low latency communications, URLLC). EMBB is mainly aimed at terminals with relatively high rate and mobility requirements, for example, cell phones and multimedia devices. MMTC is used primarily for an Internet of Things device, or other large-scale services having a relatively low rate and mobility requirement. The URLLC is targeted
Petition 870190106365, of 10/21/2019, p. 93/174
24/77 mainly for Vehicle Internet, or other types of services and devices having an extremely high latency and reliability requirement. For example, a mobile phone user can access an eMBB-type network slice to download or watch 4K high-definition video at high speed. A sensor device can access a mMTC network slice to transmit a small data packet and update a system configuration. A user can simultaneously access one or more or all of the network slices to meet a service requirement and achieve a relatively desirable user experience.
[0114] The system architecture of the slice-based communications method provided in this embodiment of the present invention includes a radio access network node 101 (Radio Access Network, RAN), an access and mobility management function node 102 (Access and Management Function, AMF), a network slice selection function node 103 (Network Slice Selection Function, NSSF), and a plurality of slices 104. Functions specific to each slice 104 include at least one management function sessions (session management function, SMF) and a user plane function (UPF). In other words, each slice 103 includes an SMF node and an UPF node. A terminal device accesses the plurality of slices through the use of the RAN node 101, and the AMF node 102 can provide information about a slice instance that supports the terminal device to the terminal device.
[0115] The RAN node can be an access point (access point, AP) in a wireless local area network (English: wireless local area networks, WLAN), or a transceiver base station (Base transceiver station, BTS) in Global Mobile Communication System (Global System for Mobile Communications, GSM) or codedivision multiple access, CDMA, or it can be a B node (NodeB, NB) in multiple access by broadband code division (Wideband Code Division Multiple Access, WCDMA), or it can be an evolved B node (Evolutional Node B, eNB or eNodeB) in long term evolution (Long Term Evolution, LTE), a regeneration station, an access point, a in-vehicle device, a wearable device, a network device on a future 5G network, or a network device on a future public land mobile network
Petition 870190106365, of 10/21/2019, p. 94/174
25/77 network, PLMN), for example, a base station that can connect to a main 5G network device, a transmission and reception point (Transmission and Reception Point, TRP), a centralized processing unit (Centralized Unit , CU), a distributed processing unit (DU), or the like.
[0116] The AMF 102 node has a network function for managing access and mobility of the terminal device, communicates with a RAN, and provides a specific slice to the terminal device.
[0117] NSSF node 103 communicates with AMF node 102, and is configured to: select a slice that supports the terminal device to the terminal device, and transmit information about the slice that supports the terminal device to the node AMF 102.
[0118] In this embodiment of the present invention, the terminal device can be a device having a wireless fidelity module (wireless fidelity, WiFi), for example, a mobile phone, a hand ring, a tablet computer, a notebook computer, an ultra-mobile personal computer (Ultra-Mobile Personal Computer, UMPC), a personal digital assistant device (Personal Digital Assistant, PDA), a device in the vehicle, a wearable device, a sensor having a network access function, or the like, and it is not limited to just one communication terminal.
[0119] Based on the previous description, figure 2 shows an example of a procedure of a slice-based communications method, according to an embodiment of the present invention. Slice-based communication can be implemented in the procedure. The method for slice-based communication is described below with reference to figure 1 and figure 2.
[0120] As shown in figure 2, the procedure specifically includes:
[0121] Step 201: An AMF node sends a first request message to an NSSF node.
[0122] In this embodiment of the present invention, after accessing a RAN node in a registration process, a terminal device needs to access a main network slice supported by the terminal device. In this case, if the AMF node selected by the RAN node cannot provide a
Petition 870190106365, of 10/21/2019, p. 95/174
26/77 main network slice service required by the UE, the AMF node will send the first request message to the NSSF node. The first request message is used to request or query the slice information associated with the terminal device. The first request message can contain the first NSSAI or identification information of the terminal device. Optionally, the first request message can alternatively contain both the first NSSAI and identification information for the terminal device. The first NSSAIs carried by the first request message are used to request that the NSSF node return the service area information corresponding to the first NSSAI or the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI. The terminal device identification information is used by the NSSF node to query the signature information of the terminal device. The terminal device identification information can be carried by a registration request message that is sent by the terminal device, forwarded by the RAN node, and received by the AMF node, or can be obtained by the AMF from a device context terminal. The terminal device identification information can be a permanent identifier of the SUPI terminal device. Optionally, the registration request message can be an initial registration request message or a tracking area location update request message.
[0123] It should be noted that in this embodiment of the present invention, NSSAI is a set of a plurality of parts of S-NSSAI, and a slice instance can support a part of S-NSSAI, or can support a plurality of parts of S -NSSAI, or a part of S-NSSAI can correspond to one or more slice instances. When a part of SNSSAI corresponds to a plurality of slice instances, in this embodiment of the present invention, a slice instance can be determined using a network slice instance identifier NSI ID (Network Slice instance identifier).
[0124] In an implementation, the AMF node queries the signature information from the terminal device, and adds the signature information from the terminal device or a portion of the signature information.
Petition 870190106365, of 10/21/2019, p. 96/174
27/77 signature to the first request message. For example, the AMF node can send a request for querying subscription information to a home UDM device on the terminal device. The request for querying subscription information carried an identifier of the terminal device, and is used to query the subscription information of the terminal device. The UDM device returns the signature information from the terminal device to the AMF node, and the signature information from the terminal device includes NSSAI signed from the terminal device. In this case, the AMF node determines the first NSSAIs based on the signed NSSAIs. Therefore, the first NSSAI carried by the first request message is associated with the signed NSSAI. In other words, the first NSSAIs are related to the signed NSSAIs of the terminal device. For example, the first NSSAIs can be a universal set or a subset of the signed NSSAIs.
[0125] Optionally, the registration request message received by the AMF node from the terminal device carried in addition to the configured NSSAI. The AMF node determines the first NSSAIs based on the configured NSSAIs. In this case, the first NSSAI carried by the first request message are associated with the configured NSSAI. In other words, the first NSSAIs are related to the configured NSSAIs. For example, the first NSSAI can be a universal set or a subset of the configured NSSAI.
[0126] Optionally, the registration request message received from the terminal device also carries the configured NSSAI while the AMF node obtains the signed NSSAI from the terminal device by query. The AMF node determines the first NSSAI based on the signed NSSAI and the configured NSSAI. In this case, the first NSSAI carried by the first request message are associated with both the signed NSSAI and the configured NSSAI. For example, the first NSSAI can be a universal set or a subset of the signed NSSAI, it can be a universal set or a subset of the configured NSSAI, or it can be an intersection set of the signed NSSAI and the configured NSSAI.
[0127] Optionally, device signature information
Petition 870190106365, of 10/21/2019, p. 97/174
28/77 terminal that are obtained by the AMF node per query may additionally include a type of terminal device. In this case, the first request message can also additionally include the type of the terminal device. The terminal device type is used by the NSSF node to further determine the slice instance identification information corresponding to each S-NSSAI in the permitted NSSAI of the terminal device.
[0128] In another implementation, when the first request message sent by the AMF node to the NSSF node carried the identification information of the terminal device, the NSSF node can autonomously query the signature information of the terminal device from the Home UDM of the terminal device based on the identification information of the terminal device.
[0129] Step 202: The NSSF node receives the first request message from the AMF node, and sends a response message to the AMF node.
[0130] After receiving the first request message, the NSSF node sends the reply message to the AMF node. The response message can carry NSSAI, or the response message can carry NSSAI and the service area information corresponding to NSSAI.
[0131] For example, step 202 can be performed in any of the following ways:
[0132] (1) When the first request message ported the first NSSAI, the first NSSAI are associated with the signed NSSAI or the first NSSAI are associated with the configured NSSAI ported by the terminal device registration request message or the first NSSAI are associated the signed NSSAI and the configured NSSAI. The NSSF node can determine the permitted NSSAIs of the terminal device based on the first NSSAIs, where the permitted NSSAIs are associated with the first NSSAIs. For example, allowed NSSAIs can be a universal set or a subset of the first NSSAIs. In this case, the response message sent by the NSSF node to the AMF node carried the NSSAI, where the NSSAI are the permitted NSSAI. Optionally, the reply message can additionally carry the corresponding service area information
Petition 870190106365, of 10/21/2019, p. 98/174
29/77 to the NSSAI allowed.
[0133] (2) When the first request message carried the terminal device identification information, the NSSF node additionally queries the terminal device signature information from the terminal device's home UDM device based on the identification information of the terminal device. The signature information can include the signed NSSAI of the terminal device. The NSSF node obtains the permitted NSSAI based on the signed NSSAI. For example, allowed NSSAIs can be a universal set or a subset of signed NSSAIs. In this case, the response message sent by the NSSF node to the AMF node carried the NSSAI, where the NSSAI are the permitted NSSAI. Optionally, the response message can additionally carry the service area information corresponding to the permitted NSSAI.
[0134] (3) When the first request message carried the terminal device identification information and the first NSSAI, the NSSF node can query the terminal device signature information from the terminal device's home UDM device based in the identification information of the terminal device. The signature information can include the signed NSSAI of the terminal device. The NSSF node obtains the permitted NSSAI based on the signed NSSAI and the first NSSAI. The permitted NSSAIs are associated with the first NSSAIs and the NSSAIs signed. For example, allowed NSSAIs can be a universal set or a subset of the signed NSSAI, can be a universal set or a subset of the first NSSAI, or can be an intersection set of the signed NSSAI and the first NSSAI. The first NSSAIs can be configured NSSAIs carried by the terminal device registration request message. In this case, the response message sent by the NSSF node to the AMF node carried the NSSAI, where the NSSAI are the permitted NSSAI. Optionally, the response message can additionally carry the service area information corresponding to the permitted NSSAI.
[0135] (4) When the first request message carried the first NSSAIs, the NSSAIs carried by the response message can be
Petition 870190106365, of 10/21/2019, p. 99/174
30/77 the first NSSAI, and the response message can carry a service area corresponding to the first NSSAI.
[0136] (5) When the first request message carried the identification information of the terminal device, the NSSF node can additionally query the signature information of the terminal device from the terminal device's home UDM device based on the information of terminal device identification. The signature information can include the signed NSSAI of the terminal device. The NSSF node obtains the first NSSAIs based on the signed NSSAIs. The first NSSAIs are associated with the NSSAIs signed. For example, the first NSSAIs can be a universal set or a subset of the signed NSSAIs. The response message sent by the NSSF node to the AMF node carried the first NSSAI and the service area information corresponding to the first NSSAI.
[0137] For example, the permitted NSSAI (or the first NSSAI) carried by the response message includes S-NSSAI 1, S-NSSAI 2 and S-NSSAI 3, and the response message carried the content shown in Table 1.
Table 1
1 S-NSSAI 1 Service area 1 2 S-NSSAI 2 Service area 2 3 S-NSSAI 3 Service area 3
[0138] Optionally, in the various previous implementations, the response message may additionally carry slice instance identification information corresponding to each S-NSSAI in the NSSAI. For example, when the NSSAI carried by the response message is the permitted NSSAI, the response message may additionally carry slice instance identification information corresponding to each SNSSAI in the permitted NSSAI. When the NSSAI carried by the response message is the first NSSAI, the response message can additionally carry slice instance identification information corresponding to each S-NSSAI in the first NSSAI. For example, the response message carried in addition to the slice instance identification information corresponding to the S-NSSAI, as shown in Table 2.
Petition 870190106365, of 10/21/2019, p. 100/174
31/77
Table 2
1 S-NSSAI 1 NSI ID 1 Service area 1 2 S-NSSAI 2 NSI ID 2 Service area 2 3 S-NSSAI 3 NSI ID 3 Service area 3
[0139] Optionally, when the NSSAIs carried by the reply message are the NSSAIs of a VPLMN, this indicates that the terminal device is currently in a roaming state. In this case, the response message may additionally include the NSSAIs of an HPLMN that correspond to the NSSAIs of the VPLMN. Optionally, the response message may alternatively include the HPLMN NSSAIs that correspond to the VPLMN NSSAIs, and the slice instance identification information corresponding to each S-NSSAI in the HPLMN NSSAIs. For example, in this case, the NSSF node is a VPLMN NSSF node. The VPLMN NSSF node can obtain, based on a match between the VPLMN NSSAI and the HPLMN NSSAI, the HPLMN NSSAI that match the VPLMN NSSAI, to select an appropriate HPLMN slice instance when configuring a session routed in home routed is sustained in a roaming scenario.
[0140] Optionally, the first request message can additionally carry information from the registration area of the terminal device, and the information from the registration area of the terminal device is obtained by the AMF node based on the location information of the RAN node. In this case, the NSSF node may determine, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that is obtained and the information from the terminal device's registration area, attribute information from an instance of slice corresponding to each S-NSSAI in the permitted NSSAI, where attribute information is used to indicate whether a service area of the slice instance corresponding to the S-NSSAI includes a terminal device registration area. The response message carried the attribute information of the slice instance corresponding to each S-NSSAI in the permitted NSSAI.
[0141] Step 203: The AMF node receives the response message from the NSSF node, and obtains, based on the response message, the
Petition 870190106365, of 10/21/2019, p. 101/174
32/77
NSSAI allowed from a terminal device and service area information corresponding to the permitted NSSAI.
[0142] After receiving the reply message from the NSSF node, the AMF node can obtain, in different ways based on different contents carried by the reply message, the permitted NSSAI of the terminal device and the information of the corresponding to the permitted NSSAI.
[0143] For example, the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI can be obtained in any of the following ways:
[0144] (1) When the reply message ported the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs, the AMF node can directly obtain the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs.
[0145] (2) When the response message carried the permitted NSSAIs, the AMF node obtains the permitted NSSAIs, and obtains, based on a correspondence between the NSSAIs and a service area, the service area information corresponding to the NSSAI allowed. In this way, the AMF node can first obtain a correspondence between the NSSAI and a service area from the NSSF node, and based on the correspondence between the NSSAI and a service area and the permitted NSSAI, obtains the information from the area of service corresponding to the permitted NSSAI. Optionally, after obtaining the correspondence between the NSSAI and a service area, the AMF node can store the correspondence locally, so that the correspondence is conveniently invoked at any time in use, and no longer needs to be obtained from the node of NSSF.
[0146] (3) When the response message carried the first NSSAI and the service area information corresponding to the first NSSAI, based on the first NSSAI and the service area information corresponding to the first NSSAI, the AMF node determines the Permitted NSSAIs and the service area information corresponding to the permitted NSSAIs.
[0147] Optionally, in the several previous ways, the reply message received by the AMF node can carry additionally the
Petition 870190106365, of 10/21/2019, p. 102/174
33/77 slice instance identification information corresponding to each SNSSAI in the permitted NSSAI.
[0148] Optionally, the AMF node can additionally determine, based on the permitted NSSAIs of the terminal device and the service area information corresponding to the permitted NSSAIs that are obtained and the information from the registration area of the terminal device, the attribute information of the slice instance corresponding to each S-NSSAI in the allowed NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the registration area of the terminal device. For example, in Table 1, a service area of a slice instance corresponding to S-NSSAI 1 includes the registration area of the terminal device, and a service area of a slice instance corresponding to S-NSSAI 3 does not include the registration area of the terminal device.
[0149] Optionally, after obtaining the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs, upon discovering that the AMF node is not an AMF node supported by the terminal device, the AMF node can relocate the terminal device to a target AMF node, and can additionally send a second request message to an NRF device. The second request message includes the first S-NSSAI or an identifier of a slice instance corresponding to the first S-NSSAI. The first S-NSSAI is the S-NSSAI which is one of the permitted NSSAI's and which corresponds to a service area that includes the terminal device registration area. A service area of the slice instance corresponding to the first S-NSSAI includes the registration area of the terminal device. The second request message is used to request the NRF device to return address information from the target AMF node of the terminal device. After receiving the address information of the target AMF node from the NRF device, the AMF node sends the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained for the target AMF node based on the address information of the target AMF node. The target AMF node stores the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs, to determine a slice instance in response to a
Petition 870190106365, of 10/21/2019, p. 103/174
34/77 session setup request when receiving the session setup request from the terminal device.
[0150] Optionally, the AMF node may additionally send the slice instance identification information corresponding to each S-NSSAI single network slice selection assist information in the NSSAI allowed to the target AMF node. Optionally, the AMF node can additionally send the slice instance attribute information corresponding to each S-NSSAI in the permitted NSSAI to the target AMF node. This can avoid repeated interaction between the target AMF and the NSSF node, and improve signal exchange and processing efficiency. Optionally, the target AMF node can indicate, for the terminal device, whether each S-NSSAI in the permitted NSSAIs is sustained or left in the corresponding registration area for the terminal device, as shown in Table 5. This can avoid overhead costs. additional signaling that is caused by the fact that a requested S-NSSAI service area does not include the registration area, that is, the S-NSSAI is not supported in the registration area when the terminal device subsequently initiates a session request.
[0151] In the previous modality, the AMF node sends the first request message to the NSSF node; and the AMF node receives the response message from the NSSF node, and obtains, based on the response message, the NSSAI network slice selection assistance information allowed from the end device and the corresponding service area information NSSAI allowed. The AMF node obtains the permitted NSSAI network slice selection assistance information from the terminal device and the service area information corresponding to the permitted NSSAI from the NSSF node, to avoid repeated interaction between the AMF node and the NSSF node after a change in the registration area caused by the fact that the terminal device moves. Therefore, this improves signal exchange and processing efficiency and reduces system overhead.
[0152] Based on the previous description, in order to better describe the modalities of the present invention, a slice-based communication procedure provided in the modalities of the present invention is described below in specific implementation scenarios.
Petition 870190106365, of 10/21/2019, p. 104/174
35/77 [0153] As shown in figure 3, when a terminal device is in a roaming-free scenario, a slice-based communication procedure includes the following specific steps.
[0154] Step 301: An AMF node sends a request for querying subscription information to a UDM device.
[0155] After receiving a registration request message that is sent through a terminal device and forwarded by a RAN, the AMF node can query the subscription information of the terminal device from a UDM device. The subscription information query request message carried a SUPI of the terminal device. The subscription information of the terminal device is consulted using the SUPI of the terminal device. Optionally, the registration request message can additionally include the configured NSSAI.
[0156] Step 302. The UDM device returns a signature information response message to the AMF node.
[0157] The UDM device obtains the signature information from the terminal device based on the SUPI of the terminal device that is sent by the AMF node, and returns the signature information response message to the AMF node. The signature information reply message carried the signature information of the terminal device. The signature information includes the signed NSSAI of the terminal device, and can optionally include additional type information of the terminal device.
[0158] Step 303: The AMF node sends a first request message to an NSSF node.
[0159] The first request message carried the first NSSAI. The first NSSAIs can be obtained by the AMF node based on the configured NSSAIs carried by the terminal device's signature information and / or a terminal device registration request message. The first NSSAIs are associated with the subscription information and / or the configured NSSAIs.
[0160] Step 304: The NSSF node obtains the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs.
Petition 870190106365, of 10/21/2019, p. 105/174
36/77 [0161] The NSSF node can obtain, based on a correspondence between the NSSAI and a service area that is obtained from an OAM system by the NSSF node, the first NSSAI, and other information, the NSSAI terminal device and the service area information corresponding to the permitted NSSAI. The permitted NSSAIs are associated with the first NSSAIs and can be a universal set or a subset of the first NSSAIs.
[0162] Step 305: The NSSF node sends a reply message to the AMF node.
[0163] The reply message carried the permitted NSSAI and the service area information corresponding to the permitted NSSAI. Optionally, the response message can additionally include slice instance identification information corresponding to each SNSSAI in the permitted NSSAI, for example, as shown in Table 1 or Table 2.
[0164] Step 306: The AMF node sends a network element discovery request to an NRF device.
[0165] Based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that is obtained, and information from the registration area of the terminal device, the AMF node determines corresponding slice instance attribute information for each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether a service area of the slice instance corresponding to the S-NSSAI includes a terminal device registration area.
[0166] Attribute information for a slice instance carried by the network element discovery request or a slice instance corresponding to the S-NSSAI indicates whether a slice instance service area corresponding to the S-NSSAI or the instance of slice includes the registration area of the terminal device.
[0167] The content included in the network element discovery request can be further determined based on the content of the response message sent by the NSSF node. When the response message ported the content shown in Table 1, the content that can be carried by the network element discovery request is shown in
Petition 870190106365, of 10/21/2019, p. 106/174
37/77
Table 3. Assuming that a slice instance service area having a slice instance identifier 3 does not include the terminal device registration area, the network element discovery request ported only slice instance information having identity identifiers instance of slice 1 and 2. When the response message carried the content shown in Table 2, the content that can be carried by the network element discovery request is shown in Table 4. Assuming a service area of an instance of slice corresponding to the S-NSSAI 3 slice does not include the registration area of the terminal device, the network element discovery request ported only information from the S-NSSAI slice 1 and 2.
Table 3
1 NSI ID 1 Service area 1 2 NSI ID 2 Service area 2
Table 4
1 S-NSSAI 1 Service area 1 2 S-NSSAI 2 Service area 2
[0168] Step 307: The NRF device sends a network element discovery request response message to the AMF node.
[0169] The network element discovery request response message includes address information for a target AMF node. The NRF device determines, based on the content carried by the network element discovery request message, the target AMF node that serves the terminal device. In other words, the terminal device can be relocated to the target AMF node.
[0170] Step 308. The AMF node sends a non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 305 to a target AMF node.
[0171] The non-access layer message is the registration request message in step 301.
[0172] Optionally, the permitted NSSAIs include the slice instance attribute information corresponding to each S-NSSAI in the NSSAIs permitted in step 306. Alternatively, the AMF node sends the information
Petition 870190106365, of 10/21/2019, p. 107/174
38/77 attribute for the target AMF node.
[0173] Optionally, the AMF node can send the non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 305 to the target AMF node through of using an RAN node. For example, the AMF node instructs the RAN node to reallocate the registration request message and the address information or identification information from the target AMF node. The RAN node forwards the non-access layer message, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 305, and the registration request message to the AMF node target.
[0174] Optionally, information that can be sent by the AMF node to the target AMF node using the RAN node can additionally include attribute information in step 306.
[0175] Step 309: The target AMF node stores the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are sent by the AMF node, to determine a slice instance for a session configuration request upon receiving the terminal device session configuration request.
[0176] Optionally, the target AMF node additionally determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information of the slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the registration area of the terminal device, and indicates, to the terminal device based on the attribute information, whether each S-NSSAI in the permitted NSSAIs is sustained or left in the registration area. For example, this can be indicated in Table 5.
[0177] For example, the indication can be carried by a registration response message sent by the AMF to the terminal device through the use of the RAN node.
Table 5
Petition 870190106365, of 10/21/2019, p. 108/174
39/77
1 S-NSSAI 1 Allowed or sustained 2 S-NSSAI 2 Allowed or sustained 3 S-NSSAI 3 Not allowed or not supported
[0178] In this modality, after obtaining the permitted NSSAI and the service area information corresponding to the permitted NSSAI, the NSSF node sends the permitted NSSAI and the service area information corresponding to the NSSAI allowed to the AMF node, so that the AMF node selects an appropriate slice instance for the terminal device.
[0179] As shown in figure 4, an interface is provided between an NSSF node and a UDM device, and the NSSF node and the UDM device can communicate with each other when a terminal device is in a non-roaming scenario . In the scenario, the NSSF node can autonomously query the subscription information of the terminal device. In the scenario, a slice-based communication procedure includes the following specific steps.
[0180] Step 401. An AMF node receives a registration request message that is sent through a terminal device and is forwarded by an RAN.
[0181] Step 402: The AMF node sends a first request message to an NSSF node.
[0182] When the AMF node discovers that the AMF node cannot provide a service to the terminal device, or the AMF cannot determine whether the AMF node can provide a service to the terminal device, the AMF sends the first request message . The first request message carried a SUPI from the terminal device. If the registration request message sent by the terminal device carries the configured NSSAI, the first request message can additionally carry the configured NSSAI. If the registration request message sent by the terminal device does not carry the configured NSSAI, the first request message will not carry the configured NSSAI.
[0183] Step 403: The NSSF node sends a query for subscription information to a UDM device.
[0184] The request for consultation of subscription information includes
Petition 870190106365, of 10/21/2019, p. 109/174
40/77 the SUPI of the terminal device that is carried by the first request message that is sent by the AMF node and received by the NSSF node. The NSSF node queries the terminal device's signature information from the UDM based on the SUPI of the terminal device.
[0185] Step 404. The UDM device returns a signature information reply message to the NSSF node.
[0186] The UDM device obtains the signature information from the terminal device based on the SUPI of the terminal device that is sent by the NSSF node, and returns the signature information response message to the NSSF node. The signature information reply message carried the signature information of the terminal device. The signature information includes the signed NSSAI of the terminal device, and can optionally include additional type information of the terminal device.
[0187] Step 405: The NSSF node obtains the permitted NSSAI from a terminal device and service area information corresponding to the permitted NSSAI.
[0188] The NSSF node can obtain the permitted NSSAI from the terminal device and the service area information corresponding to the permitted NSSAI based on information such as a correspondence between the NSSAI and a service area that is obtained from a system OAM by the NSSF node, the signed NSSAI carried by the signature information of the terminal device that is obtained from the UDM, and the configured NSSAI carried by the first request message sent by the AMF node. The permitted NSSAIs are associated with the signed NSSAI and / or the configured NSSAI and can be a universal set or a subset of the signed NSSAI, a universal set or a subset of the configured NSSAI or an intersection set of the signed NSSAI and the configured NSSAI.
[0189] Step 406: The NSSF node sends a reply message to the AMF node.
[0190] The reply message carried the permitted NSSAI and the service area information corresponding to the permitted NSSAI. Optionally, the reply message can additionally include
Petition 870190106365, of 10/21/2019, p. 110/174
41/77 slice instance identification information corresponding to each SNSSAI in the permitted NSSAI, for example, as shown in Table 1 or Table 2.
[0191] Step 407: The AMF node sends a network element discovery request to an NRF device.
[0192] Based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that is obtained, and the information from the registration area of the terminal device, the AMF node determines attribute information for a slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether a service area of the slice instance corresponding to the S-NSSAI includes a terminal device registration area.
[0193] Attribute information for a slice instance carried by the network element discovery request or a slice instance corresponding to the S-NSSAI indicates that a service area of the slice instance corresponding to the S-NSSAI or the instance of slice includes the registration area of the terminal device.
[0194] The content included in the network element discovery request can be further determined based on the content of the response message sent by the NSSF node. When the response message carried the content shown in Table 1, the content that can be carried by the network element discovery request is shown in Table 3. Assuming a slice instance service area having an instance identifier of slice 3 does not include the registration area of the terminal device, the network element discovery request ported only slice instance information having slice identifiers 1 and 2. When the response message ported the content shown in Table 2, the content that can be carried by the network element discovery request is shown in Table 4. Assuming that a service area of a slice instance corresponding to the S-NSSAI 3 slice does not include the registration area of the terminal device, the request of network element discovery carried only S-NSSAI slice information 1 and 2.
[0195] Step 408: The NRF device sends a message from
Petition 870190106365, of 10/21/2019, p. 111/174
42/77 network element discovery request response to the AMF node.
[0196] The network element discovery request response message includes address information for a target AMF node. The NRF device determines, based on the content carried by the network element discovery request message, the target AMF node that serves the terminal device. In other words, the terminal device can be relocated to the target AMF node.
[0197] Step 409. The AMF node sends a non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 406 to a target AMF node.
[0198] The non-access layer message is the registration request message in step 401.
[0199] Optionally, the permitted NSSAIs include the slice instance attribute information corresponding to each S-NSSAI in the NSSAIs permitted in step 407. Alternatively, the AMF node sends the attribute information to the target AMF node.
[0200] Optionally, the AMF node can send the non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 406 to the target AMF node via of using an RAN node. For example, the AMF node instructs the RAN node to reallocate the registration request message and the address information or identification information from the target AMF node. The RAN node forwards the non-access layer message, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 406, and the registration request message to the AMF node target.
[0201] Optionally, the information that is sent by the AMF node to the target AMF node through the use of the RAN node can additionally include attribute information in step 407.
[0202] Step 410: The target AMF node stores the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are sent by the AMF node, to determine a slice instance for a session configuration request upon receiving the configuration request
Petition 870190106365, of 10/21/2019, p. 112/174
43/77 session of the terminal device.
[0203] Optionally, the target AMF node additionally determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information of the slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the registration area of the terminal device, and indicates, to the terminal device based on the attribute information, whether each S-NSSAI in the permitted NSSAIs is sustained or left in the registration area. For example, this can be indicated in Table 5.
[0204] For example, the indication can be carried by a registration response message sent by the AMF to the terminal device using the RAN node. Compared with the modality shown in figure 3, in the modality shown in figure 4, the interface is provided between the NSSF node and the UDM device, the NSSF node can directly obtain the subscription information from the terminal device, and the first message request sent by the AMF node to the NSSF node can carry the SUPI of the terminal device.
[0205] As shown in figure 5, when a terminal device is in a non-roaming scenario, a slice-based communication procedure includes the following specific steps.
[0206] Step 501: An AMF node sends a request for querying subscription information to a UDM device.
[0207] After receiving a registration request message that is sent through a terminal device and forwarded by a RAN, the AMF node can consult the subscription information of the terminal device from the UDM device. The subscription information query request message carried a SUPI of the terminal device. The signature information of the terminal device consulted using the SUPI of the terminal device. Optionally, the registration request message can additionally include the configured NSSAI.
Petition 870190106365, of 10/21/2019, p. 113/174
44/77 [0208] Step 502. The UDM device returns a signature information response message to the AMF node.
[0209] The UDM device obtains the signature information from the terminal device based on the SUPI of the terminal device that is sent by the AMF node, and returns the signature information response message to the AMF node. The signature information reply message carried the signature information of the terminal device. The signature information includes the signed NSSAI of the terminal device, and can optionally include additional type information of the terminal device.
[0210] Step 503: The AMF node sends a first request message to an NSSF node.
[0211] The first request message carried the first NSSAI. The first NSSAIs can be obtained by the AMF node based on the configured NSSAIs carried by the terminal device's signature information and / or by the terminal device's registration request message. The first NSSAIs are associated with the subscription information and / or the configured NSSAIs.
[0212] Step 504: The NSSF node sends a reply message to the AMF node.
[0213] The reply message carried the service area information corresponding to the first NSSAI. After receiving the first request message sent by the AMF node, the NSSF node can obtain, based on a correspondence between the NSSAI and a service area that is obtained from an OAM system and the first NSSAI, the information service area corresponding to the first NSSAI. Optionally, the response message can additionally include slice instance identification information corresponding to each S-NSSAI in the first NSSAI, for example, as shown in Table 1 or Table 2.
[0214] Step 505: The AMF node obtains the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs.
[0215] Based on the service area information that corresponds to the first NSSAI and which are carried by the reply message sent by an NSSAI node, the first NSSAI, and the NSSAI
Petition 870190106365, of 10/21/2019, p. 114/174
45/77 signed, the AMF node obtains the permitted NSSAI from the terminal device and the service area information corresponding to the permitted NSSAI. The permitted NSSAIs are associated with the first NSSAIs, or the permitted NSSAIs are associated with the signed NSSAIs.
[0216] Step 506: The AMF node sends a network element discovery request to an NRF device.
[0217] Based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that is obtained, and the information from the registration area of the terminal device, the AMF node determines attribute information for a slice instance corresponding to each S-NSSAI in the allowed NSSAI, where the attribute information is used to indicate whether a service area of the slice instance corresponding to the S-NSSAI includes a terminal device registration area.
[0218] Attribute information for a slice instance carried by the network element discovery request or a slice instance corresponding to the S-NSSAI indicates that a service area of the slice instance corresponding to the S-NSSAI or the instance of slice includes the registration area of the terminal device.
[0219] The content included in the network element discovery request can be further determined based on the content of the response message sent by the NSSF node. When the response message carried the content shown in Table 1, the content that can be carried by the network element discovery request is shown in Table 3. Assuming that a slice instance service area having an instance identifier of slice 3 does not include the terminal device registration area, the network element discovery request ported only slice instance information having slice identifiers 1 and 2. When the response message ported the content shown in Table 2, the content that can be carried by the network element discovery request is shown in Table 4. Assuming that a service area of a slice instance corresponding to the S-NSSAI 3 slice does not include the registration area of the terminal device, the request of network element discovery carried only S-NSSAI slice information 1 and 2.
Petition 870190106365, of 10/21/2019, p. 115/174
46/77 [0220] Step 507: The NRF device sends a network element discovery request response message to the AMF node.
[0221] The network element discovery request response message includes address information for a target AMF node. The NRF device determines, based on the content carried by the network element discovery request message, the target AMF node that serves the terminal device. In other words, the terminal device can be relocated to the target AMF node.
[0222] Step 508. The AMF node sends a non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 505 to a target AMF node.
[0223] The non-access layer message is the registration request message in step 501.
[0224] Optionally, the allowed NSSAIs include the attribute information of the slice instance corresponding to each S-NSSAI in the NSSAIs allowed in step 506. Alternatively, the AMF node sends the attribute information to the target AMF node.
[0225] Optionally, the AMF node can send the non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 505 to the target AMF node by using a RAN node. For example, the AMF node instructs the RAN node to reallocate the registration request message and the address information or identification information from the target AMF node. The RAN node forwards the non-access layer message, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 505, and the registration request message to the AMF node target.
[0226] Optionally, the information that is sent by the AMF node to the target AMF node through the use of the RAN node can additionally include attribute information in step 506.
[0227] Step 509: The target AMF node stores the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are sent by the AMF node, to determine a slice instance for a
Petition 870190106365, of 10/21/2019, p. 116/174
47/77 session setup request when receiving the session setup request from the terminal device.
[0228] Compared to the modalities shown in figure 4 and in figure 3, in the mode shown in figure 5, the NSSF node does not directly obtain the permitted NSSAI, and instead, the AMF node obtains the permitted NSSAI and the information service area corresponding to permitted NSSAI.
[0229] Optionally, the target AMF node additionally determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information of the slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the registration area of the terminal device, and indicates, to the terminal device based on the attribute information, whether each S-NSSAI in the permitted NSSAIs is sustained or left in the registration area. For example, this can be indicated in Table 5.
[0230] For example, the indication can be carried by a registration response message sent by the AMF to the terminal device using the RAN node.
[0231] As shown in figure 6, an interface is provided between an NSSF node and a UDM device, and the NSSF node and the UDM device can communicate with each other when a terminal device is in a non-roaming scenario . In the scenario, the NSSF node can autonomously query the subscription information of the terminal device. In the scenario, a slice-based communication procedure includes the following specific steps.
[0232] Step 601. An AMF node receives a registration request message that is sent through a terminal device and that is forwarded by an RAN.
[0233] Step 602: The AMF node sends a first request message to an NSSF node.
[0234] When the AMF node discovers that the AMF node cannot
Petition 870190106365, of 10/21/2019, p. 117/174
48/77 provide a service to the terminal device, or AMF cannot determine whether the AMF node can provide a service to the terminal device, AMF sends the first request message. The first request message carried a SUPI from the terminal device. If the registration request message sent by the terminal device carries the configured NSSAI, the first request message can additionally carry the configured NSSAI. If the registration request message sent by the terminal device does not carry the configured NSSAI, the first request message does not carry the configured NSSAI.
[0235] Step 603: The NSSF node sends a query for subscription information to a UDM device.
[0236] The request for consultation of signature information includes the SUPI of the terminal device that is carried by the first request message that is sent by the AMF node and received by the NSSF node. The NSSF node queries the terminal device's signature information from the UDM based on the SUPI of the terminal device.
[0237] Step 604. The UDM device returns a signature information response message to the NSSF node.
[0238] The UDM device obtains the signature information from the terminal device based on the SUPI of the terminal device that is sent by the NSSF node, and returns the signature information response message to the NSSF node. The signature information reply message carried the signature information of the terminal device. The signature information includes the signed NSSAI of the terminal device, and can optionally include additional type information of the terminal device.
[0239] Step 605: The NSSF node sends a reply message to the AMF node.
[0240] The reply message carried the service area information corresponding to the first NSSAI. After receiving the first request message sent by the AMF node, the NSSF node can obtain, based on a correspondence between the NSSAI and a service area that is obtained from an OAM system and the first NSSAI, the information service area corresponding to the first NSSAI. Optionally, the
Petition 870190106365, of 10/21/2019, p. 118/174
The response message may additionally include slice instance identification information corresponding to each S-NSSAI in the first NSSAI, for example, as shown in Table 1 or Table 2.
[0241] Step 606: The AMF node obtains the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs.
[0242] Based on the service area information that corresponds to the first NSSAI and which are carried by the reply message sent by an NSSAI node, the first NSSAI, and the signed NSSAI, the AMF node obtains the permitted NSSAI from the terminal device and the service area information corresponding to the permitted NSSAI. The permitted NSSAIs are associated with the first NSSAIs, or the permitted NSSAIs are associated with the signed NSSAIs.
[0243] Step 607: The AMF node sends a network element discovery request to an NRF device.
[0244] Based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that is obtained, and the information in the registration area of the terminal device, the AMF node determines attribute information for a slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether a service area of the slice instance corresponding to the S-NSSAI includes a terminal device registration area.
[0245] Attribute information for a slice instance carried by the network element discovery request or a slice instance corresponding to the S-NSSAI indicates that a service area of the slice instance corresponding to the S-NSSAI or the instance of slice includes the registration area of the terminal device.
[0246] The content included in the network element discovery request can be further determined based on the content of the response message sent by the NSSF node. When the response message carried the content shown in Table 1, the content that can be carried by the network element discovery request is shown in Table 3. Assuming a slice instance service area having an instance identifier of slice 3 does not include the registration area of the
Petition 870190106365, of 10/21/2019, p. 119/174
50/77 terminal device, the network element discovery request ported only slice instance information having slice instance identifiers 1 and 2. When the response message ported the content shown in Table 2, the content that can be ported for the network element discovery request is shown in Table 4. Assuming that a service area of a slice instance corresponding to the S-NSSAI 3 slice does not include the terminal device registration area, the network element discovery request only information from slice S-NSSAI 1 and 2.
[0247] Step 608: The NRF device sends a network element discovery request response message to the AMF node.
[0248] The network element discovery request response message includes address information for a target AMF node. The NRF device determines, based on the content carried by the network element discovery request message, the target AMF node that serves the terminal device. In other words, the terminal device can be relocated to the target AMF node.
[0249] Step 609. The AMF node sends a non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 606 to a target AMF node.
[0250] The non-access layer message is the registration request message in step 601.
[0251] Optionally, the permitted NSSAIs include the slice instance attribute information corresponding to each S-NSSAI in the NSSAIs permitted in step 607. Alternatively, the AMF node sends the attribute information to the target AMF node.
[0252] Optionally, the AMF node can send the non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 606 to the target AMF node via of using an RAN node. For example, the AMF node instructs the RAN node to reallocate the registration request message and the address information or identification information from the target AMF node. The RAN node forwards the non-access layer message, the permitted NSSAIs and the information from the
Petition 870190106365, of 10/21/2019, p. 120/174
51/77 services corresponding to the permitted NSSAIs that are obtained by the AMF node in step 606, and the registration request message to the target AMF node.
[0253] Optionally, the information that is sent by the AMF node to the target AMF node through the use of the RAN node can additionally include the attribute information in step 607.
[0254] Step 610: The target AMF node stores the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are sent by the AMF node, to determine a slice instance for a session configuration request upon receiving the terminal device session configuration request.
[0255] Optionally, the target AMF node additionally determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information the slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the registration area of the terminal device, and indicates, to the terminal device based on the attribute information, whether each S-NSSAI in the permitted NSSAIs is sustained or left in the registration area. For example, this can be indicated in Table 5.
[0256] For example, the indication can be carried by a registration response message sent by the AMF to the terminal device through the use of the RAN node.
[0257] Compared with the mode shown in figure 5, in the mode shown in figure 6, the interface is provided between the NSSF node and the UDM device, the NSSF node can directly obtain the subscription information from the terminal device, and the first request message sent by the AMF node to the NSSF node can carry the SUPI of the terminal device.
[0258] As shown in figure 7, when a terminal device is in a roaming scenario, a slice-based communication procedure includes the following specific steps.
[0259] Step 701: An AMF node sends a message from
Petition 870190106365, of 10/21/2019, p. 121/174
52/77 request to query subscription information for a UPLM device of a HPLMN.
[0260] After receiving a registration request message that is sent through a terminal device and forwarded by a RAN, the AMF node can consult the subscription information of the terminal device from the UDM device. The subscription information query request message carried a SUPI of the terminal device. The subscription information of the terminal device is consulted using the SUPI of the terminal device. Optionally, the registration request message can additionally include the configured NSSAI from HPLMN and the configured NSSAI from a VPLMN.
[0261] Step 702. The HPLMN UDM device returns a signature information response message to the AMF node.
[0262] The HPLMN UDM device obtains the signature information from the terminal device based on the SUPI of the terminal device that is sent by the AMF node, and returns the signature information response message to the AMF node. The signature information reply message carried the signature information of the terminal device. The signing information includes the signed HPLMN NSSAI of the terminal device, and can optionally include additional type information of the terminal device.
[0263] Step 703: The AMF node sends a first request message to an NSSF node.
[0264] The first request message carried the first NSSAI. The first NSSAIs can be obtained by the AMF node based on the configured NSSAIs from HPLMN or the configured NSSAI from VPLMN that are carried by the terminal device's signature information and / or the terminal device's registration request message. The first NSSAIs are associated with HPLMN's signed NSSAIs and / or HPLMN's configured NSSAIs. Alternatively, the first NSSAIs can be associated with HPLMN's signed NSSAIs and / or the VPLMN's configured NSSAIs. For example, the first NSSAIs can be an intersection set of HPLMN's signed NSSAIs and HPLMN's configured NSSAIs that are carried by the
Petition 870190106365, of 10/21/2019, p. 122/174
53/77 terminal device, can be the signed NSSAI from HPLMN and the configured NSSAI from HPLMN that are carried by the registration request message from the terminal device, or can be the signed NSSAI from HPLMN and the configured NSSAI from VPLMN that are carried by terminal device registration request message. Optionally, the first request message carried in addition to the type information of the terminal device.
[0265] Step 704: The NSSF node sends a reply message to the AMF node.
[0266] The reply message carried the service area information corresponding to the second NSSAI. After receiving the first request message sent by the AMF node, based on a correspondence between the VPLMN NSSAIs and a service area that is obtained from an OAM system and the first NSSAIs, the NSSF node can determine the second NSSAI, and obtain the service area information corresponding to the second NSSAI.
[0267] For example, if the first NSSAIs include the HPLMN NSSAIs, the NSSF node can first map the HPLMN NSSAIs to the corresponding VPLMN NSSAIs based on a roaming protocol and then obtain the second NSSAI. The second NSSAI are associated with one or more pieces of NSSAI carried by the first NSSAI.
[0268] Optionally, the reply message may additionally include the HPLMN NSSAIs that correspond to the VPLMN NSSAIs. For example, this can be shown in Table 6.
Table 6
1 S-NSSAI 1 ofVPLMN S-NSSAI ΓHPLMN in Service areaVPLMN 1 2 S-NSSAI 2 ofVPLMN S-NSSAI 2 *HPLMN in Service areaVPLMN 2 3 S-NSSAI 3 ofVPLMN S-NSSAI 3 *HPLMN in Service areaVPLMN 3
[0269] Step 705: The AMF node obtains the permitted NSSAIs from a
VPLMN and the NSSAI service area information
Petition 870190106365, of 10/21/2019, p. 123/174
54/77 permitted by the VPLMN.
[0270] Based on the service area information that corresponds to the second NSSAI and which is carried by the reply message sent by an NSSAI node, and by the second NSSAI, the AMF node obtains the permitted NSSAI from the VPLMN of the terminal device and the service area information corresponding to VPLMN's permitted NSSAIs. The permitted NSSAIs of the VPLMN are associated with the second NSSAIs.
[0271] Step 706: The AMF node sends a network element discovery request to an NRF device.
[0272] Based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that is obtained, and the information in the registration area of the terminal device, the AMF node determines attribute information for a slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether a service area of the slice instance corresponding to the S-NSSAI includes a terminal device registration area.
[0273] Attribute information for a slice instance carried by the network element discovery request or a slice instance corresponding to the S-NSSAI indicates that a service area of the slice instance corresponding to the S-NSSAI or the instance of slice includes the registration area of the terminal device.
[0274] The content included in the network element discovery request can be further determined based on the content of the response message sent by the NSSF node. When the response message carried the content shown in Table 6, the content that can be carried by the network element discovery request is shown in Table 7. Assuming that a slice instance service area corresponding to S-NSSAI 3 of the VPLMN does not include the terminal device registration area, the network element discovery request carried only VPLMN S-NSSAI 1 and VPLMN S-NSSAI 2 information.
Table 7
Petition 870190106365, of 10/21/2019, p. 124/174
55/77
1 S-NSSAI 1 ofVPLMN Service areaVPLMN 1 2 S-NSSAI 2 ofVPLMN Service areaVPLMN 2
[0275] Step 707: The NRF device sends a network element discovery request response message to the AMF node.
[0276] The network element discovery request response message includes address information for a target AMF node. The NRF device determines, based on the content carried by the network element discovery request message, the target AMF node that serves the terminal device. In other words, the terminal device can be relocated to the target AMF node.
[0277] Step 708. The AMF node sends a non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 705 to a target AMF node.
[0278] The non-access layer message is the registration request message in step 701.
[0279] Optionally, the allowed NSSAIs include the attribute information of the slice instance corresponding to each S-NSSAI in the NSSAIs allowed in step 706. Alternatively, the AMF node sends the attribute information to the target AMF node.
[0280] Optionally, the AMF node can send the non-access layer message and the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 705 to the target AMF node via of using an RAN node. For example, the AMF node instructs the RAN node to reallocate the registration request message and the address information or identification information from the target AMF node. The RAN node forwards the non-access layer message, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 705, and the registration request message to the AMF node target.
[0281] Optionally, information that is sent by the AMF node to the target AMF node through the use of the RAN node can include
Petition 870190106365, of 10/21/2019, p. 125/174
56/77 additionally the attribute information in step 706.
[0282] Step 709: The target AMF node stores the allowed VPLMN NSSAIs and the service area information corresponding to the allowed VPLMN NSSAIs sent by the AMF node, to determine a slice instance for a configuration request. receiving the session configuration request from the terminal device.
[0283] Optionally, the target AMF node additionally determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information of the slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the registration area of the terminal device, and indicates, to the terminal device based on the attribute information, whether each S-NSSAI in the permitted NSSAIs is sustained or left in the registration area. For example, this can be indicated in Table 5.
[0284] For example, the indication can be carried by a registration response message sent by the AMF to the terminal device through the use of the RAN node.
[0285] In the modality shown in figure 7, in step 705, the AMF node determines the permitted NSSAI of the VPLMN for the terminal device. In another implementation provided additionally in this embodiment of the present invention, the NSSF node can further determine the permitted NSSAI of the VPLMN to the terminal device in step 704, and send the permitted NSSAI of the VPLMN which is determined to the AMF node using the reply message. For a specific implementation of this procedure, refer to the steps listed in the modality shown in figure 4 or figure 6. The details are not described in this report again.
[0286] As shown in figure 8, when a terminal device is in a roaming scenario, a slice-based communication procedure includes the following specific steps.
[0287] Step 801. An AMF node receives a registration request message that is sent through a terminal device and that
Petition 870190106365, of 10/21/2019, p. 126/174
57/77 is forwarded by a RAN.
[0288] Step 802: The AMF node sends a first request message to an NSSF node.
[0289] When the AMF node discovers that the AMF node cannot provide a service to the terminal device, or the AMF cannot determine whether the AMF node can provide a service to the terminal device, the AMF sends the first request message . The first request message carried a SUPI from the terminal device. If the registration request message sent by the terminal device carries the configured NSSAI from an HPLMN or the configured NSSAI from a VPLMN, the first request message can additionally carry the configured NSSAI. If the registration request message sent by the terminal device does not carry the configured NSSAI, the first request message does not carry the configured NSSAI.
[0290] Step 803: The NSSF node sends an inquiry request for subscription information to a UDM device of an HPLMN.
[0291] The request for consultation of signature information includes the SUPI of the terminal device that is carried by the first request message that is sent by the AMF node and received by the NSSF node. The NSSF node queries the signature information of the terminal device from the HPLMN UDM based on the SUPI of the terminal device.
[0292] Step 804. The HPLMN UDM device returns a signature information response message to the NSSF node.
[0293] The UDM device obtains the signature information from the terminal device based on the SUPI of the terminal device that is sent by the NSSF node, and returns the signature information response message to the NSSF node. The signature information reply message carried the signature information of the terminal device. Signature information includes HPLMN's signed NSSAI, and optionally may additionally include terminal device type information.
[0294] Step 805: The NSSF node obtains the permitted NSSAI from a VPLMN and the service area information corresponding to the permitted NSSAI from the VPLMN.
Petition 870190106365, of 10/21/2019, p. 127/174
58/77 [0295] The NSSF node can obtain the permitted NSSAI from the VPLMN of the terminal device and the service area information corresponding to the permitted NSSAI from the VPLMN based on information such as a match between the NSPLI of the VPLMN and an area of service that is obtained from an OAM system by the NSSF node, the HPLMN signed NSSAIs that are carried by the terminal device signature information that is obtained from the HPLMN UDM, and the HPLMN configured NSSAI or the configured NSSAI of the VPLMN that are carried by the first request message sent by the AMF node. VPLMN's permitted NSSAIs are associated with HPLMN's signed NSSAIs and / or HPLMN's configured NSSAIs. Alternatively, the allowed NSSAIs of the VPLMN can be associated with the signed NSSAIs of the HPLMN and / or the configured NSSAIs of the VPLMN. For example, before obtaining the permitted NSSAI from the VPLMN, the NSSF node can map the HPLMN's signed NSSAI to the corresponding VPLMN NSSAI based on a roaming protocol. If the first request message carries the configured NSSAI from HPLMN, the NSSF node can additionally map the configured NSSAI from HPLMN to the NSSAI from VPLMN.
[0296] Step 806: The NSSF node sends a reply message to the AMF node.
[0297] The reply message carried the VPLMN's permitted NSSAIs and the service area information corresponding to the VPLMN's permitted NSSAIs. Optionally, the reply message can additionally include the HPLMN NSSAIs that correspond to the VPLMN NSSAIs. For example, this can be shown in Table 6.
[0298] Step 807: The AMF node sends a network element discovery request to an NRF device.
[0299] Based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained, and the information in the registration area of the terminal device, the AMF node determines the attribute information of an instance of slices corresponding to each S-NSSAI in the permitted NSSAI, where attribute information is used to indicate whether a slice instance service area corresponding to the S-NSSAI includes a device registration area
Petition 870190106365, of 10/21/2019, p. 128/174
59/77 terminal.
[0300] Attribute information for a slice instance carried by the network element discovery request or a slice instance corresponding to the S-NSSAI indicates that a service area of the slice instance corresponding to the S-NSSAI or the instance of slice includes the registration area of the terminal device.
[0301] The content included in the network element discovery request can be further determined based on the content of the response message sent by the NSSF node. When the response message carried the content shown in Table 6, the content that can be carried by the network element discovery request is shown in Table 7. Assuming that a slice instance service area corresponding to S-NSSAI 3 of the VPLMN does not include the terminal device registration area, the network element discovery request ported only the VPLMN S-NSSAI 1 and VPLMN S-NSSAI 2 information.
[0302] Step 808: The NRF device sends a network element discovery request response message to the AMF node.
[0303] The network element discovery request response message includes address information for a target AMF node. The NRF device determines, based on the content carried by the network element discovery request message, the target AMF node that serves the terminal device. In other words, the terminal device can be relocated to the target AMF node.
[0304] Step 809. The AMF node sends a non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 806 to a target AMF node.
[0305] The non-access layer message is the registration request message in step 801.
[0306] Optionally, the permitted NSSAIs include the slice instance attribute information corresponding to each S-NSSAI in the NSSAIs permitted in step 807. Alternatively, the AMF node sends the attribute information to the target AMF node.
[0307] Optionally, the MFA node can send the message of
Petition 870190106365, of 10/21/2019, p. 129/174
60/77 non-access layer and the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 806 to the target AMF node through the use of an RAN node. For example, the AMF node instructs the RAN node to reallocate the registration request message and the address information or identification information from the target AMF node. The RAN node forwards the non-access layer message, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 806, and the registration request message to the AMF node target.
[0308] Optionally, the information that is sent by the AMF node to the target AMF node through the use of the RAN node can additionally include the attribute information in step 807.
[0309] Step 810: The target AMF node stores the allowed VPLMN NSSAIs and the service area information corresponding to the allowed VPLMN NSSAIs sent by the AMF node, to determine a slice instance for a configuration request. receiving the session configuration request from the terminal device.
[0310] Optionally, the target AMF node additionally determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information of the slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the registration area of the terminal device, and indicates, to the terminal device based on the attribute information, whether each S-NSSAI in the permitted NSSAIs is sustained or left in the registration area. For example, this can be indicated in Table 5.
[0311] For example, the indication can be carried by a registration response message sent by the AMF to the terminal device through the use of the RAN node.
[0312] In the mode shown in figure 8, the NSSF node determines the permitted NSSAI of the VPLMN for the terminal device. In another modality, the AMF node can additionally determine the NSSAI
Petition 870190106365, of 10/21/2019, p. 130/174
61/77 allowed by VPLMN after step 807 and before step 808. For specific implementation steps, refer to the steps described in the modality shown in figure 3 or figure 5. The details are not described in this report again.
[0313] As shown in figure 9, when a terminal device is in a roaming scenario, a slice-based communication procedure includes the following specific steps.
[0314] Step 901: An AMF node sends a subscription information inquiry request message to an UPLM device of an HPLMN.
[0315] After receiving a registration request message that is sent through a terminal device and forwarded by a RAN, the AMF node can consult the subscription information of the terminal device from the UDM device. The subscription information query request message carried a SUPI of the terminal device. The subscription information of the terminal device is consulted using the SUPI of the terminal device. Optionally, the registration request message can additionally include the configured NSSAI from HPLMN and the configured NSSAI from a VPLMN.
[0316] Step 902. The HPLMN UDM device returns a signature information response message to the AMF node.
[0317] The HPLMN UDM device obtains the signature information from the terminal device based on the SUPI of the terminal device that is sent by the AMF node, and returns the signature information response message to the AMF node. The signature information reply message carried the signature information of the terminal device. The signing information includes the HPLMN's signed NSSAI of the terminal device, and can optionally include additional type information of the terminal device.
[0318] Step 903: The AMF node sends a first request message to an NSSF node of a VPLMN.
[0319] The first request message carried the first NSSAI. The first NSSAIs can be obtained by the AMF node based on the configured NSSAI from HPLMN or the configured NSSAI from VPLMN that
Petition 870190106365, of 10/21/2019, p. 131/174
62/77 are carried by the terminal device's signature information and / or in the terminal device's registration request message. The first NSSAIs are associated with HPLMN's signed NSSAIs and / or HPLMN's configured NSSAIs. Alternatively, the first NSSAIs can be associated with HPLMN's signed NSSAIs and / or the VPLMN's configured NSSAIs.
[0320] Step 904. The VPLMN NSSF node obtains the second NSSAI.
[0321] After receiving the first request message sent by the AMF node, the VPLMN NSSF node can obtain the second NSSAI based on a correspondence between the VPLMN NSSAI and a service area that is obtained from a OAM system and the first NSSAI. For example, the VPLMN NSSF node can determine, based on the correspondence between the VPLMN NSSAIs and a service area, whether the VPLMN SNSSAI corresponding to the S-NSSAI indicated by the signed HPLMN NSSAI of the end device is supported by the device terminal, to obtain the second NSSAI.
[0322] Step 905: The VPLMN NSSF node sends a query request message to an HPLMN NSSF node.
[0323] The query request message carried the second NSSAI. Optionally, the query request message can additionally include the type information of the terminal device.
[0324] Step 906: The HPLMN NSSF node returns a response query request message to the VPLMN NSSF node.
[0325] The request for a response request includes the information corresponding to the second NSSAI. For example, information corresponding to the second NSSAI may include HPLMN slice instance identification information that corresponds to each SNSSAI in the second NSSAI, and additionally include the corresponding VPLMN S-NSSAI, as shown in Table 7.
Table 7
1 S-NSSAI 1 of S-NSSAI 1 * of HPLMN NSI ID Γ
Petition 870190106365, of 10/21/2019, p. 132/174
63/77
VPLMN HPLMN2 S-NSSAI 2 ofVPLMN S-NSSAI 2 * ofHPLMN HPLMN NSI ID 2 * 3 S-NSSAI 3 ofVPLMN S-NSSAI 3 * deHPLMN HPLMN NSI ID 3 *
[0326] Step 907: The VPLMN NSSF node obtains the permitted NSSAI from the VPLMN and the service area information corresponding to the permitted NSSAI from the VPLMN.
[0327] The VPLMN NSSF node obtains, based on the second NSSAI and information corresponding to the second NSSAI that are returned from the HPLMN NSSF node, the permitted NSPLI of the terminal device VPLMN and the service area information corresponding to the permitted NSPLA of the VPLMN.
[0328] Step 908: The VPLMN NSSF node sends a reply message to the AMF node.
[0329] The reply message carried the VPLMN allowed NSSAI and the service area information corresponding to the VPLMN allowed NSSAI. The response message may additionally include the HPLMN NSSAIs that correspond to the VPLMN NSSAIs, and the slice instance identification information corresponding to each S-NSSAI in the HPLMN NSSAIs. For example, this can be shown in Table 8.
Table 8
1 VPLMN S-NSSAI 1 HPLMN S-NSSAI Γ VPLMNNSI ID 1 HPLMNNSI ID Γ VPLMN service area 1 2 VPLMN S-NSSAI 2 S-NSSAI 2 *from HPLMN VPLMNNSI ID 2 HPLMNNSI ID 2 * Service area VPLMN 2 3 VPLMN S-NSSAI 3 S-NSSAI 3 *from HPLMN VPLMNNSI ID 3 HPLMNNSI ID 3 * VPLMN 3 service area
0330] Step 909: The AMF node sends a network element discovery request to an NRF device.
Petition 870190106365, of 10/21/2019, p. 133/174
64/77 [0331] Based on the permitted NSSAIs of the terminal device and the service area information corresponding to the permitted NSSAIs that are obtained, and the information in the registration area of the terminal device, the AMF node determines the attribute information of a slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether a service area of the slice instance corresponding to the S-NSSAI includes a terminal device registration area.
[0332] Attribute information for a slice instance carried by the network element discovery request or a slice instance corresponding to the S-NSSAI indicates that a service area of the slice instance corresponding to the S-NSSAI or the instance of slice includes the registration area of the terminal device.
[0333] The content included in the network element discovery request can be further determined based on the content of the response message sent by the NSSF node. When the response message carried the content shown in Table 8, the content that can be carried by the network element discovery request is shown in Table 9. Assuming that a service area of a VPLMN slice instance having an instance identifier of slice 3 does not include the registration area of the terminal device, the network element discovery request ported only the information of a slice instance VPLMN having slice identifiers of slice 1 and 2.
Table 9
1 VPLMN NSI ID 1 Service areaVPLMN1 2 VPLMN NSI ID 2 Service areaVPLMN 2
[0334] Step 910: The NRF device sends a network element discovery request response message to the AMF node.
[0335] The network element discovery request response message includes the address information of a target AMF node. The NRF device determines, based on the content carried by the network element discovery request message, the target AMF node that
Petition 870190106365, of 10/21/2019, p. 134/174
65/77 answers the terminal device. In other words, the terminal device can be relocated to the target AMF node.
[0336] Step 911. The AMF node sends a non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 908 to a target AMF node.
[0337] The non-access layer message is the registration request message in step 901.
[0338] Optionally, the allowed NSSAIs include the slice instance attribute information corresponding to each S-NSSAI in the NSSAIs allowed in step 909. Alternatively, the AMF node sends the attribute information to the target AMF node.
[0339] Optionally, the AMF node can send the non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 908 to the target AMF node by using a RAN node. For example, the AMF node instructs the RAN node to reallocate the registration request message and the address information or identification information from the target AMF node. The RAN node forwards the non-access layer message, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 908, and the registration request message to the AMF node target.
[0340] Optionally, the information that is sent by the AMF node to the target AMF node through the use of the RAN node can additionally include the attribute information in step 909.
[0341] Step 912: The target AMF node stores the allowed VPLMN NSSAIs and the service area information corresponding to the allowed VPLMN NSSAIs sent by the AMF node, to determine a slice instance for a configuration request. receiving the session configuration request from the terminal device.
[0342] Optionally, the target AMF node additionally determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the information of
Petition 870190106365, of 10/21/2019, p. 135/174
66/77 slice instance attribute corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the terminal device registration area, and indicates, to the terminal device based on the attribute information, whether each S-NSSAI in the permitted NSSAI is sustained or left in the registration area. For example, this can be indicated in Table 5.
[0343] For example, the indication can be carried by a registration response message sent by the AMF to the terminal device through the use of the RAN node.
[0344] In the modality shown in figure 9, the NSSF node determines the permitted NSSAI of the VPLMN for the terminal device. In another modality, the AMF node can additionally determine the permitted NSPLA of the VPLMN after step 908 and before step 909. For specific implementation steps, refer to the steps described in the modality shown in figure 3 or figure 5. Details are not are described in this report again.
[0345] This embodiment of the present invention additionally provides another possible implementation in this scenario. An interface can be provided between the NSSF node and the HPLMN UDM device, and the NSSF node can directly obtain the subscription information for the roaming terminal device from the HPLMN UDM instead of the AMF node. For specific implementation steps, refer to the related step descriptions in the modalities shown in figure 3 and figure 4. Details are not described in this report again.
[0346] In the modalities shown in figure 3 to figure 9, the NSSF node can additionally send the preconfigured correspondence between the NSSAI and a service area to the AMF node. In this case, the response message sent by the NSSF node to the AMF node does not need to include the service area information supported by the NSSAI, as shown in a procedure in figure 10.
[0347] Step 1001. An NSSF node sends a correspondence between the NSSAI and a service area to an AMF node.
[0348] The NSSF sets up the service area information for a
Petition 870190106365, of 10/21/2019, p. 136/174
67/77 instance of slice corresponding to each S-NSSAI in the NSSAI to the AMF node in advance, and the AMF node does not need to obtain the correspondence between the NSSAI and a service area from the NSSF node again after each device terminal to send a registration request.
[0349] For example, the AMF can be notified of the correspondence between the NSSAI and a service area when the NSSF node and the AMF node establish a device connection. The correspondence between the NSSAI and a service area can indicate the service area information of slice instances corresponding to all S-NSSAI supported in a PLMN, or it can indicate the service area information of a slice instance corresponding to the S-NSSAI supported by the AMF or an AMF group of the AMF.
[0350] For example, NSSAIs can be a set of S-NSSAI supported by an NSSF PLMN, or they can be a set of S-NSSAI that is determined based on a network implementation or a policy and network that can be provided for the AMF node.
[0351] As shown in figure 11, when a terminal device is in a non-roaming scenario, a slice-based communication procedure includes the following specific steps.
[0352] Step 1101: An AMF node sends a request for querying subscription information to a UDM device.
[0353] After receiving a registration request message that is sent through a terminal device and forwarded by a RAN, the AMF node needs to consult the subscription information of the terminal device from the UDM device. The subscription information query request message carried a SUPI of the terminal device. The subscription information of the terminal device is consulted using the SUPI of the terminal device. Optionally, the registration request message can additionally include the configured NSSAI.
[0354] Step 1102. The UDM device returns a signature information response message to the AMF node.
[0355] The UDM device obtains the signature information from the terminal device based on the SUPI of the terminal device that is sent
Petition 870190106365, of 10/21/2019, p. 137/174
68/77 by the AMF node, and returns the subscription information reply message to the AMF node. The signature information reply message carried the signature information of the terminal device. The signature information includes the signed NSSAI of the terminal device, and optionally can additionally include the type information of the terminal device.
[0356] Step 1103: The AMF node sends a first request message to an NSSF node.
[0357] The first request message carried the first NSSAI. The first NSSAIs can be obtained by the AMF node based on the configured NSSAIs carried by the terminal device's signature information and / or by the terminal device's registration request message. The first NSSAIs are associated with the subscription information and / or the configured NSSAIs. The first request message can additionally carry the information from the registration area of the terminal device.
[0358] Step 1104: The NSSF node obtains the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs.
[0359] The NSSF node can obtain, based on a correspondence between the NSSAI and a service area that is obtained from an OAM system by the NSSF node, the first NSSAI, and other information, the permitted NSSAI of the device terminal and the service area information corresponding to the permitted NSSAI. The permitted NSSAIs are associated with the first NSSAIs and can be a universal set or a subset of the first NSSAIs.
[0360] The NSSF node determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information of an instance of slice corresponding to each S-NSSAI in the allowed NSSAI, where attribute information is used to indicate whether a slice-area service area corresponding to the S-NSSAI includes a terminal device registration area.
[0361] Step 1105: The NSSF node sends a network element discovery request message to an NRF device.
Petition 870190106365, of 10/21/2019, p. 138/174
69/77 [0362] Attribute information for a slice instance carried by the network element discovery request or a slice instance corresponding to the S-NSSAI indicates that a slice instance service area corresponding to the S-NSSAI or the slice instance includes the registration area of the terminal device.
[0363] The content included in the network element discovery request can be further determined based on the content of the response message sent by the NSSF node. When the response message carried the content shown in Table 1, the content that can be carried by the network element discovery request is shown in Table 3. Assuming a slice instance service area having an instance identifier of slice 3 does not include the terminal device registration area, the network element discovery request ported only the slice instance information having slice identifiers 1 and 2. When the reply message ported the content shown in Table 2 , the content that can be carried by the network element discovery request is shown in Table 4. Assuming that a service area of a slice instance corresponding to the S-NSSAI 3 slice does not include the registration area of the terminal device, the network element discovery request carried only S-NSSAI slice information 1 and 2.
[0364] Step 1106: The NRF device sends a network element discovery request response message to the NSSF node.
[0365] The network element discovery request response message includes the address information of a target AMF node. The NRF device determines, based on the content carried by the network element discovery request message, the target AMF node that serves the terminal device. In other words, the terminal device can be relocated to the target AMF node.
[0366] Step 1107: The NSSF node sends a reply message to the AMF node.
[0367] The reply message carried the permitted NSSAI and the service area information corresponding to the permitted NSSAI. The response message carried in addition to the address information of the target AMF node. Optionally, the reply message can include
Petition 870190106365, of 10/21/2019, p. 139/174
70/77 additionally slice instance identification information corresponding to each S-NSSAI in the permitted NSSAIs, for example, as shown in Table 1 or Table 2. Optionally, the response message may additionally include slice instance attribute information corresponding to each S-NSSAI in the NSSAI allowed in step 1105. Alternatively, the NSSF node sends the attribute information to the AMF node.
[0368] Step 1108. The AMF node sends a non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 1107 to a target AMF node.
[0369] The non-access layer message is the registration request message in step 1101.
[0370] Optionally, permitted NSSAIs include the slice instance attribute information corresponding to each S-NSSAI in the NSSAIs permitted in step 1105. Alternatively, the AMF node sends the attribute information to the target AMF node.
[0371] Optionally, the AMF node can send the non-access layer message and the permitted NSSAIs and service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 1107 to the target AMF node via of using an RAN node. Specifically, the AMF node instructs the RAN node to reallocate the registration request message and the address information or identification information from the target AMF node. The RAN node forwards the non-access layer message, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are obtained by the AMF node in step 1107, and the registration request message to the AMF node target.
[0372] Optionally, the information that is sent by the AMF node to the target AMF node through the use of the RAN node can additionally include the attribute information in step 1105.
[0373] Step 1109: The target AMF node stores the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs that are sent by the AMF node, to determine an instance
Petition 870190106365, of 10/21/2019, p. 140/174
71/77 slice for a session setup request when receiving the session setup request from a terminal device.
[0374] Optionally, the target AMF node additionally determines, based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that are obtained and the information in the registration area of the terminal device, the attribute information the slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether the service area of the slice instance corresponding to the S-NSSAI includes the registration area of the terminal device, and indicates, to the terminal device based on the attribute information, whether each S-NSSAI in the permitted NSSAIs is sustained or left in the registration area. For example, this can be indicated in Table 5.
[0375] For example, the indication can be carried by a registration response message sent by the AMF to the terminal device through the use of the RAN node.
[0376] This embodiment of the present invention additionally provides another possible implementation in this scenario. An interface can be provided between the NSSF node and the UDM device, and the NSSF node can directly obtain the roaming terminal device's signature information from the HPLMN UDM instead of the AMF node. For specific implementation steps, refer to the related step descriptions in the modalities shown in figure 3 and figure 4. Details are not described in this report again.
[0377] Based on the same technical idea, figure 12 shows a slice-based communications device, according to one embodiment of the present invention. The device can perform a slice-based communication procedure.
[0378] As shown in figure 12, the apparatus specifically includes: a processing unit 1201 and a transceiver unit 1202, where processing unit 1201 is configured to control transceiver unit 1202 to send a first request message to a node. NSSF; and
Petition 870190106365, of 10/21/2019, p. 141/174
72/77 the processing unit 1201 is additionally configured to: control the transceiver unit 1202 to receive a response message from the NSSF node, and obtain, based on the response message, network slice selection assistance information NSSAI allowed from a terminal device and service area information corresponding to the permitted NSSAI.
[0379] In addition, processing unit 1201 and transceiver unit 1202 can additionally perform various other operations of the AMF node in the above embodiments. The details are not described again.
[0380] Based on the same technical idea, figure 13 shows a slice-based communications device, according to one embodiment of the present invention. The device can perform a slice-based communication procedure.
[0381] As shown in figure 13, the apparatus specifically includes: a processing unit 1301 and a transceiver unit 1302, where processing unit 1301 is configured to control transceiver unit 1302 to receive a first request message from a AMF node; and processing unit 1301 is further configured to control transceiver unit 1302 to send a response message to the AMF node, where the response message carried NSSAI network slice selection assistance information, or NSSAI and network information service area corresponding to the NSSAI.
[0382] In addition, processing unit 1301 and transceiver unit 1302 can additionally perform various other operations of the NSSF node in the above embodiments. The details are not described again.
[0383] Based on the same technical idea, figure 14 shows a communications device based on slice 1400, according to an embodiment of the present invention. The 1400 slice-based communications device can perform the steps or functions performed by the AMF node in the previous modalities. The slice-based communications device
Petition 870190106365, of 10/21/2019, p. 142/174
73/77
1400 can include: a transceiver 1401, a processor 1402 and a memory 1403. Processor 1402 is configured to control the operations of the communications device based on 1400 slice. Memory 1403 can include a read-only memory and an access memory random, and store an instruction that can be executed by processor 1402 and data. Components such as transceiver 1401, processor 1402, and memory 1403 are connected using a bus 1409. Bus 1409 can additionally include a power supply bus, a control bus, and a signal bus of state in addition to a data bus. However, for the purposes of clear descriptions, several buses are all marked as bus 1409 in the figure. Transceiver 1401 may be a transceiver, and may include a transmitter and a receiver.
[0384] A slice-based communications method disclosed in the embodiments of the present invention can be applied to processor 1402 or performed by processor 1402.
[0385] Processor 1402 is configured to read code in memory 1403 to perform a slice-based communication procedure.
[0386] For example, optionally, when obtaining, based on the response message, the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI, processor 1402 is specifically configured to:
when the response message carried the permitted NSSAI and the service area information corresponding to the permitted NSSAI, obtain the permitted NSSAI and the service area information corresponding to the permitted NSSAI from the response message; or when the response message carried the permitted NSSAIs, obtain the permitted NSSAIs from the response message, and obtain, based on a correspondence between the NSSAIs and a service area, the service area information corresponding to the permitted NSSAIs; or when the response message carried the first NSSAI and the service area information corresponding to the first NSSAI, determine, based on the first NSSAI and the information from the
Petition 870190106365, of 10/21/2019, p. 143/174
74/77 service corresponding to the first NSSAIs, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs.
[0387] Optionally, processor 1402 is additionally configured for:
consult the signature information of the terminal device, where the signature information includes the signed NSSAI of the terminal device, the first request message carried the first NSSAI and the first NSSAI are associated with the signed NSSAI.
[0388] Optionally, processor 1402 is additionally configured for:
control transceiver 1401 to receive a registration request message from the terminal device, where the registration request message carried the configured NSSAI, the first request message carried the first NSSAI and the first NSSAI are associated with the configured NSSAI or first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[0389] Based on the same technical idea, figure 15 shows a communications device based on slice 1500, according to an embodiment of the present invention. The slice-based communications device 1500 can perform the steps or functions performed by the NSSF node in the previous modalities. The slice-based communications device 1500 may include: a transceiver 1501, a processor 1502 and a memory 1503. Processor 1502 is configured to control the operations of the slice-based communications device 1500. Memory 1503 may include memory read-only and a random access memory, and store an instruction and data that can be executed by processor 1502. Components, such as transceiver 1501, processor 1502, and memory 1503, are connected using a bus 1509. Bus 1509 can additionally include a power source bus, a control bus and a state signal bus, in addition to a data bus. However, for the purposes of clear descriptions, several buses are marked as bus 1509 in the figure. Transceiver 1501 can be a transceiver and can include a transmitter and a receiver.
Petition 870190106365, of 10/21/2019, p. 144/174
75/77 [0390] A slice-based communications method disclosed in the embodiments of the present invention can be applied to processor 1502 or performed by processor 1502.
[0391] Processor 1502 is configured to read code in memory 1503 to perform a slice-based communication procedure.
[0392] For example, NSSAIs are optionally permitted NSSAIs.
[0393] Optionally, the first request message carried the first NSSAI and the permitted NSSAI are associated with the first NSSAI; and the first NSSAI are associated with the signed NSSAI or the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI; or the first request message carried the identification information of a terminal device; and processor 1502 is further configured to: query the signature information of the terminal device based on the identifying information, where the signature information includes the signed NSSAI of the terminal device and the permitted NSSAI are associated with the signed NSSAI.
[0394] Optionally, the first request message carried the first NSSAI, and the NSSAI are the first NSSAI;
the first NSSAI are associated with the signed NSSAI or the first NSSAI are associated with the configured NSSAI or the first NSSAI are associated with the signed NSSAI and the configured NSSAI;
the first request message carried the identification information of a terminal device; and processor 1502 is additionally configured to:
query the signature information of the terminal device based on the identification information, where the signature information includes the signed NSSAI of the terminal device and the first NSSAI are associated with the signed NSSAI.
[0395] A person skilled in the art should understand that the modalities of the present invention can be provided as a method, a system, or a computer program product. Therefore, the modalities
Petition 870190106365, of 10/21/2019, p. 145/174
76/77 of the present invention can use a form of hardware-only modalities, software-only modalities, or modalities with a combination of software and hardware. In addition, the embodiments of the present invention may use a form of a computer program product that is implemented on one or more storage media usable by a computer (including but not limited to a disk memory, a CDROM, an optical memory and similar) that include the program code usable by computer.
[0396] The modalities of the present invention are described with reference to the flowcharts and / or block diagrams of the method, the device (system), and the computer program product, according to the modalities of the present invention. It should be understood that computer program instructions can be used to implement each process and / or each block in flowcharts and / or block diagrams and a combination of a process and / or a block in flowcharts and / or in diagrams of blocks. These computer program instructions can be provided by a general purpose computer, a dedicated computer, an embedded processor, or a processor from any other programmable data processing device to generate a machine, so that instructions executed by a computer or a processor from any other programmable data processing device generates an apparatus to implement a specific function in one or more processes in the flowcharts and / or in one or more blocks in the block diagrams.
[0397] These computer program instructions can be stored in a computer readable memory that can instruct the computer or any other programmable data processing device to work in a specific way, so that the instructions stored in computer readable memory generate an artifact that includes an instructional apparatus. The instruction apparatus implements a specific function in one or more processes in the flowcharts and / or in one or more blocks in the block diagrams.
[0398] These computer program instructions can be loaded onto a computer or other programmable data processing device, so that a series of operations and steps are performed.
Petition 870190106365, of 10/21/2019, p. 146/174
77/77 performed on the computer or the other programmable device, thus generating a computer-implemented processing. Therefore, instructions executed on the computer or other programmable device provide the steps to implement a specific function in one or more processes in flowcharts and / or in one or more blocks in block diagrams.
[0399] Obviously, a person skilled in the art can make several modifications and variations in the modalities of the present invention without departing from the spirit and scope of the present invention. The present invention is intended to cover these modifications and variations provided that they are within the scope of protection defined by the following claims and their equivalent technologies.
权利要求:
Claims (23)
[1]
1. Slice-based communications method, CHARACTERIZED by the fact that it comprises:
send (201), via an AMF mobility and access management function node, a first request message to an NSSF network slice selection function node; and receiving (202), through the AMF node, a response message from the NSSF node, and obtaining (203), based on the response message, NSSAI network slice selection assistance information allowed from a terminal device and service area information corresponding to the permitted NSSAI; where obtaining, by the AMF node based on the response message, permitted NSSAI from a terminal device and service area information corresponding to the permitted NSSAI comprises:
when the reply message carries the permitted NSSAIs, obtain, through the AMF node, the NSSAIs permitted from the reply message, and obtain, based on a correspondence between NSSAI and a service area, the corresponding service area information the permitted NSSAI;
wherein the permitted NSSAIs are NSSAI of a visited public terrestrial mobile network, VPLMN, and the response message further comprises NSSAI of a domestic public terrestrial mobile network, HPLMN, which correspond to the VPLMN NSSAI.
[2]
2. Method, according to claim 1, CHARACTERIZED by the fact that when the reply message carries the permitted NSSAI, obtain, through the AMF node based on a correspondence between NSSAI and an NSSAI service area, the permitted NSSAI and of the service area information corresponding to the permitted NSSAI additionally comprises:
obtain, through the AMF node, the correspondence between NSSAI and a service area from the NSSF node.
[3]
3. Method, according to claim 1, CHARACTERIZED by the fact that it additionally comprises:
query, through the AMF node, signature information of the terminal device, in which the signature information comprises the signed NSSAI of the terminal device, the first request message
Petition 870190106365, of 10/21/2019, p. 168/174
2/6 first NSSAI, and the first NSSAI are associated with the signed NSSAI.
[4]
4. Method according to any one of claims 1 to 3, CHARACTERIZED by the fact that it additionally comprises:
receive, through the AMF node, a registration request message from the terminal device, in which the NSSAI port registration request message, the first NSSAI port request message, and the first NSSAI are associated with the configured NSSAI , or the first NSSAIs are associated with the signed NSSAIs and configured NSSAIs.
[5]
5. Method according to any one of claims 1 to 3, CHARACTERIZED by the fact that the first request message carries identification information from the terminal device.
[6]
6. Method according to any one of claims 1 to 3, CHARACTERIZED by the fact that the response message additionally comprises slice instance identification information corresponding to each S-NSSAI network slice selection assistance information in the NSSAI allowed.
[7]
7. Method according to any one of claims 1 to 3, CHARACTERIZED by the fact that it additionally comprises:
obtain, through the AMF node, registration area information from the terminal device; and determine, by the AMF node based on the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI that is obtained and the registration area information of the terminal device, attribute information for a slice instance corresponding to each S-NSSAI in the permitted NSSAI, where the attribute information is used to indicate whether a service area of the slice instance corresponding to the S-NSSAI comprises a terminal device registration area.
[8]
8. Method, according to claim 7, CHARACTERIZED by the fact that the first S-NSSAIs are S-NSSAIs that are of the permitted NSSAIs and that correspond to a service area comprising the registration area of the terminal device, and the method additionally comprises:
send, through the AMF node, a second request message
Petition 870190106365, of 10/21/2019, p. 169/174
3/6 for an NRF network repository function device, wherein the second request message comprises the first S-NSSAI or slice instance identification information corresponding to the first S-NSSAI;
receiving, by the AMF node, address information of a target AMF node from the NRF device; and sending, through the AMF node, the permitted NSSAIs and the service area information corresponding to the permitted NSSAIs for the target AMF node based on the address information of the target AMF node.
[9]
9. Method, according to claim 8, CHARACTERIZED by the fact that it additionally comprises:
send, through the AMF node, slice instance identification information corresponding to each S-NSSAI in the NSSAI allowed to the target AMF node.
[10]
10. Method, according to claim 8, CHARACTERIZED by the fact that it additionally comprises:
send, through the AMF node, the attribute information to the target AMF node.
[11]
11. Slice-based communications method, CHARACTERIZED by the fact that it comprises:
receiving (201), by an NSSF network slice selection function node, a first request message from an AMF mobility and access management function node; and sending (202), through the NSSF node, a response message to the AMF node, wherein the response message carries NSSAI network slice selection assistance information;
where NSSAIs are permitted NSSAIs and are NSSAIs of a visited public land mobile network, VPLMN, the port response message additionally slice instance identification information corresponding to each S-NSSAI network slice assistance assistance information in NSSAI, and the response message further comprises NSSAI of a domestic public terrestrial mobile network, HPLMN, which correspond to VPLMN's NSSAI.
[12]
12. Method, according to claim 11, CHARACTERIZED by the fact that the first NSSAI first request message carries, and
Petition 870190106365, of 10/21/2019, p. 170/174
4/6 the permitted NSSAIs are associated with the first NSSAIs; and the first NSSAI are associated with the signed NSSAI, or the first NSSAI are associated with the configured NSSAI, or the first NSSAI are associated with the signed NSSAI and the configured NSSAI.
[13]
13. Method, according to claim 11, CHARACTERIZED by the fact that the first request message carries identification information from a terminal device; and the method further comprises:
query, through the NSSF node, signature information of the terminal device based on the identification information, where the signature information comprises the signed NSSAI of the terminal device, and the permitted NSSAI are associated with the signed NSSAI.
[14]
14. Method according to claim 11, CHARACTERIZED by the fact that the signature information of the terminal device additionally comprises a type of the terminal device, and the first request message additionally comprises the type of the terminal device.
[15]
15. Method according to any one of claims 11 to 14, CHARACTERIZED by the fact that the response message additionally carries slice instance identification information corresponding to each S-NSSAI network slice selection assist information in the NSSAI.
[16]
16. Method, according to claim 11, CHARACTERIZED by the fact that it additionally comprises:
send, through the NSSF node, a correspondence between NSSAI and an NSSAI service area to the AMF.
[17]
17. Slice-based communications device, FEATURED by the fact that it comprises: a transceiver (1401) and a processor (1402), in which the processor is configured to control the transceiver to send a first request message to a node NSSF network slice selection function; and the processor is additionally configured to: control the transceiver to receive a response message from the NSSF node,
Petition 870190106365, of 10/21/2019, p. 171/174
5/6 and obtain, based on the reply message, NSSAI network slice selection assistance information allowed from a terminal device and service area information corresponding to the permitted NSSAI;
where when obtaining, based on the response message, the permitted NSSAI of the terminal device and the service area information corresponding to the permitted NSSAI, the processor is specifically configured to:
when the reply message carries the permitted NSSAIs, obtain the permitted NSSAIs from the reply message, and obtain, based on a correspondence between NSSAI and a service area, the service area information corresponding to the permitted NSSAIs;
wherein the permitted NSSAIs are NSSAI of a visited public terrestrial mobile network, VPLMN, and the response message further comprises NSSAI of a domestic public terrestrial mobile network, HPLMN, which correspond to the VPLMN NSSAI.
[18]
18. Device according to claim 17, CHARACTERIZED by the fact that the processor is additionally configured for:
query signature information from the terminal device, where the signature information comprises signed NSSAI from the terminal device, the first request message carries the first NSSAI, and the first NSSAI is associated with the signed NSSAI.
[19]
19. Device, according to claim 17 or 18, CHARACTERIZED by the fact that the processor is additionally configured for:
control the transceiver to receive a registration request message from the terminal device, in which the NSSAI port registration request message, the first NSSAI port request message, and the first NSSAI port are associated with the configured NSSAI, or the first NSSAIs are associated with the signed NSSAIs and the configured NSSAIs.
[20]
20. Slice-based communications device, FEATURED by the fact that it comprises: a transceiver (1501) and a processor (1502), in which the processor is configured to control the transceiver for
Petition 870190106365, of 10/21/2019, p. 172/174
6/6 receive a first request message from an AMF mobility and access management function node; and the processor is further configured to control the transceiver to send a response message to the AMF node, wherein the response message carries the NSSAI network slice selection assistance information;
where NSSAIs are permitted NSSAIs and are NSSAIs of a visited public terrestrial mobile network, VPLMN, the door response message additionally slice instance identification information corresponding to each S-NSSAI network slice assistance assistance information in NSSAI, and the response message further comprises NSSAI of a domestic public terrestrial mobile network, HPLMN, which correspond to VPLMN's NSSAI.
[21]
21. Device, according to claim 20, CHARACTERIZED by the fact that the first request message carries the first NSSAI, and the permitted NSSAI are associated with the first NSSAI; and the first NSSAI are associated with the signed NSSAI, or the first NSSAI are associated with the configured NSSAI, or the first NSSAI are associated with the signed NSSAI and the configured NSSAI; or the first request message for identifying information from a terminal device; and the processor is additionally configured to: query the signature information of the terminal device based on the identifying information, where the signature information comprises the signed NSSAI of the terminal device, and the permitted NSSAI are associated with the signed NSSAI.
[22]
22. Computer-readable media, CHARACTERIZED by the fact that it comprises instructions that, when executed by a computer, cause the computer to perform the method as defined in any of claims 1 to 10.
[23]
23. Computer-readable media, CHARACTERIZED by the fact that it comprises instructions that, when executed by a computer, cause the computer to perform the method as defined in any of claims 11 to 16.
类似技术:
公开号 | 公开日 | 专利标题
BR112019022063A2|2020-05-05|slice-based communications method and device
CN110291837B|2021-06-29|Network registration and network slice selection system and method
JP2020532243A|2020-11-05|Data transmission methods, devices, and systems
US10602438B2|2020-03-24|Network slice selection method and apparatus
JP2020515153A|2020-05-21|Core network control plane device selection method and apparatus
EP3476100B1|2019-12-11|Selection of ip version
US20210377357A1|2021-12-02|Method and device for proxy between different architectures
WO2018176391A1|2018-10-04|Method and apparatus for session management function selection
US20210195409A1|2021-06-24|Identity Information Processing Method, Device, and System
WO2021030946A1|2021-02-25|A method of registration with access and mobility management function re-allocation
WO2021031065A1|2021-02-25|A method of registration with access and mobility management function re-allocation
BR112019019710A2|2020-04-14|wireless communication method, terminal device and access network device
US10863555B2|2020-12-08|Access method, apparatus, device, and system
CN110324246B|2021-12-24|Communication method and device
WO2019242992A1|2019-12-26|Network address policy information received in a pre-associated state
WO2017045197A1|2017-03-23|Method for accessing local network, and related device
JP7004738B2|2022-01-21|Methods and equipment for session management function selection
JP7035078B2|2022-03-14|Slice-based communication methods and devices
WO2021098073A1|2021-05-27|Registration with accessibility and mobility management function re-allocation
JP2022043169A|2022-03-15|Data transmission methods, devices, and systems
WO2020253948A1|2020-12-24|Session management function selection policy with limited assistance information provided by a user equipment
CN113439459A|2021-09-24|Method and apparatus for agent deployment
CN113329392A|2021-08-31|Method for accessing home gateway to network and communication device
CN111867057A|2020-10-30|Communication method, device and system
同族专利:
公开号 | 公开日
CN112512096A|2021-03-16|
EP3846516A1|2021-07-07|
JP2020519061A|2020-06-25|
US20180368061A1|2018-12-20|
EP3425963B1|2020-12-23|
CN110603851B|2020-12-01|
EP3425963A1|2019-01-09|
KR102284316B1|2021-07-30|
WO2018205147A1|2018-11-15|
KR20190118652A|2019-10-18|
MX2019012873A|2019-12-11|
CN110603851A|2019-12-20|
EP3425963A4|2019-01-16|
PL3425963T3|2021-06-28|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

JPH02171027A|1988-12-23|1990-07-02|Matsushita Electric Ind Co Ltd|R-2r type d/a converter|
US8625532B2|2010-07-08|2014-01-07|Microsoft Corporation|Soft handoffs in networks|
CN104484228B|2014-12-30|2017-12-29|成都因纳伟盛科技股份有限公司|Distributed parallel task processing system based on Intelli DSC|
CN106341832B|2015-07-07|2020-11-06|中国移动通信集团公司|Network slice management and selection method, system, base station and route switching equipment|
CN106375987B|2015-07-22|2021-08-20|中兴通讯股份有限公司|Network slice selection method and system|
CN106550410B|2015-09-17|2020-07-07|华为技术有限公司|Communication control method, controller, user equipment and related device|
CN112996087A|2016-09-28|2021-06-18|华为技术有限公司|Network slice selection method, terminal equipment and network equipment|
EP3544337B1|2016-11-18|2022-01-05|LG Electronics Inc.|Selecting an amf supporting a slice based on updated priority of the nssai|
CN106412905A|2016-12-12|2017-02-15|中国联合网络通信集团有限公司|Network slice selection method, UE, MME and system|
US10595268B2|2017-04-27|2020-03-17|Samsung Electronics Co., Ltd.|Network slice-available area information acquisition method|
US10673618B2|2018-06-08|2020-06-02|Cisco Technology, Inc.|Provisioning network resources in a wireless network using a native blockchain platform|US10764785B2|2017-03-07|2020-09-01|Htc Corporation|Device and method of handling network slice information|
US10820185B2|2017-05-08|2020-10-27|Qualcomm Incorporated|Mobility between areas with heterogeneous network slices|
US10264506B2|2017-05-13|2019-04-16|Qualcomm Incorporated|Enable a network-trigger change of network slices|
CN109548098A|2017-08-15|2019-03-29|华为技术有限公司|Conversation processing method and relevant device|
CA3026841A1|2017-12-08|2019-06-08|Comcast Cable Communications, Llc|User plane function selection for isolated network slice|
US10506506B2|2018-04-30|2019-12-10|Ofinno, Llc|5G policy control for restricted local operator services|
TWI733116B|2018-05-21|2021-07-11|芬蘭商諾基亞科技公司|Managing vplmn configuration updates in the ue due to home plmn configuration changes|
CN111328110A|2018-12-13|2020-06-23|华为技术有限公司|Method, equipment and system for selecting network slices|
US10993177B2|2018-12-13|2021-04-27|Verizon Patent And Licensing Inc.|Network slice instance creation|
EP3780734A1|2019-08-14|2021-02-17|MediaTek Singapore Pte. Ltd.|Reregistration to slices with mapped s-nssais alone in 5g system|
US20210136675A1|2019-11-06|2021-05-06|Samsung Electronics Co., Ltd.|Method and apparatus for selecting network slices in wireless communication system|
KR20210059467A|2019-11-15|2021-05-25|삼성전자주식회사|Method and apparatus for improving network slice control accuracy in wireless communication system|
CN113950040A|2020-07-15|2022-01-18|大唐移动通信设备有限公司|Slice registration method, device, terminal and network node|
法律状态:
2021-10-19| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
申请号 | 申请日 | 专利标题
PCT/CN2017/083619|WO2018205147A1|2017-05-09|2017-05-09|Slice-based communication method and device|
[返回顶部]