Authorization method of node, communication equipment and communication system
Technical Field
The disclosure relates to the technical field of communication, and in particular relates to a node authorization method, communication equipment and a communication system.
Background
The Integrated Access and Backhaul (IAB) supports wireless access and backhaul for millimeter wave base stations, and can effectively reduce newly-added fiber deployment requirements when dense networks are deployed.
Disclosure of Invention
The method of the present disclosure may be used to solve the technical problem of how to authorize a node comprising an access network part and a terminal part.
The embodiment of the disclosure provides a node authorization method, communication equipment and a communication system.
According to a first aspect of an embodiment of the present disclosure, there is provided a method for authorizing a node, performed by a first node, the method comprising:
receiving a first message sent by a second node, wherein the first message comprises first information of the second node;
And sending a second message to a third node, wherein the second message comprises the first information, the second message is used for acquiring authorization information of the second node, and the authorization information is used for determining whether the second node is authorized to provide service for a terminal.
According to a second aspect of the embodiments of the present disclosure, there is provided a method of authorizing a node, performed by a third node, the method comprising:
receiving a second message sent by the first node, wherein the second message comprises first information of the second node;
And acquiring authorization information of the second node according to the second message, wherein the authorization information is used for determining whether the second node is authorized to provide services for the terminal.
According to a third aspect of embodiments of the present disclosure, there is provided a method of authorizing a node, performed by a second node, the method comprising:
A first message is sent to a first node, the first message comprising first information of the second node, the first message being used to obtain authorization information of the second node, the authorization information being used to determine whether the second node is authorized to provide services to a terminal.
According to a fourth aspect of an embodiment of the present disclosure, there is provided a method for authorizing a node, including:
The second node sends a first message to the first node, the first message including first information of the second node;
the first node sends the second message to a third node, wherein the second message comprises the first information;
And the third node acquires the authorization information of the second node according to the second message, wherein the authorization information is used for determining whether the second node is authorized to provide services for the terminal.
According to a fifth aspect of embodiments of the present disclosure, there is provided a communication device, for use as a first node, comprising:
The system comprises a receiving and transmitting module, a receiving and transmitting module and a third node, wherein the receiving and transmitting module is used for receiving a first message sent by the second node, the first message comprises first information of the second node, the second message comprises the first information, the second message is used for acquiring authorization information of the second node, and the authorization information is used for determining whether the second node is authorized to provide service for the terminal.
According to a sixth aspect of the embodiments of the present disclosure, there is provided a communication device, for use as a third node, comprising:
The receiving and transmitting module is used for receiving a second message sent by the first node, wherein the second message comprises first information of the second node;
and the processing module is used for acquiring the authorization information of the second node according to the second message, wherein the authorization information is used for determining whether the second node is authorized to provide services for the terminal.
According to a seventh aspect of the embodiments of the present disclosure, there is provided a communication device, for use as a second node, comprising:
And the receiving and transmitting module is used for sending a first message to a first node, wherein the first message comprises first information of the second node, the first message is used for acquiring authorization information of the second node, and the authorization information is used for determining whether the second node is authorized to provide service for a terminal.
According to a ninth aspect of the embodiments of the present disclosure, there is provided a communication device, for use as a first node, comprising:
one or more processors;
one or more memories, the memories storing executable instructions,
Wherein the one or more processors, when executing the executable instructions in the memory, cause the first node to perform the method of authorizing a node according to an embodiment of the first aspect.
According to a tenth aspect of embodiments of the present disclosure, there is provided a communication device, for use as a third node, comprising:
one or more processors;
one or more memories, the memories storing executable instructions,
Wherein the one or more processors, when executing the executable instructions in the memory, cause the third node to perform the method of authorizing a node according to an embodiment of the second aspect.
According to an eleventh aspect of the embodiments of the present disclosure, there is provided a communication device, serving as a second node, comprising:
one or more processors;
one or more memories, the memories storing executable instructions,
Wherein the one or more processors, when executing the executable instructions in the memory, cause the second node to perform the method of authorizing a node according to an embodiment of the third aspect.
According to a twelfth aspect of the embodiments of the present disclosure, a communication system is provided, including a first node, a third node, and a second node, where the first node is configured to implement the method for authorizing the node according to the first aspect, the third node is configured to implement the method for authorizing the node according to the second aspect, and the second node is configured to implement the method for authorizing the node according to the third aspect.
According to a thirteenth aspect of an embodiment of the present disclosure, a storage medium is presented, the storage medium storing instructions that, when executed on a communication device, cause the communication device to perform the method of authorizing a node according to any one of the first, second and third aspects.
In the embodiment of the disclosure, the first node may receive a first message sent by the second node, where the first message includes first information of the second node, and send a second message including the first information to the third node, where the second message may be used to obtain authorization information of the second node, so as to implement authorization on whether the second node may provide services to the terminal, and further may effectively manage the second node according to the authorization information of the second node.
Drawings
The foregoing and/or additional aspects and advantages of the present disclosure will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
1A-1C are schematic diagrams of an architecture of a communication system shown in accordance with an embodiment of the present disclosure;
2A-2C are interactive schematic diagrams of an authorization method of a node, shown in accordance with an embodiment of the present disclosure;
3A-3D are flow diagrams of an authorization method for a node, shown in accordance with an embodiment of the present disclosure;
FIGS. 4A-4F are flow diagrams illustrating an authorization method for a node, according to embodiments of the present disclosure;
FIG. 5 is an interactive schematic diagram of an authorization method of a node, shown in accordance with an embodiment of the present disclosure;
FIG. 6 is an interactive schematic diagram of an authorization method for a VMR shown in accordance with an embodiment of the present disclosure;
Fig. 7A is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
fig. 7B is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
Fig. 7C is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
Fig. 8A is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
Fig. 8B is a schematic structural diagram of a chip according to an embodiment of the disclosure.
Detailed Description
The embodiment of the disclosure provides a node authorization method, communication equipment and a communication system.
In a first aspect, an embodiment of the present disclosure proposes a method for authorizing a node, performed by a first node, the method comprising:
receiving a first message sent by a second node, wherein the first message comprises first information of the second node;
And sending a second message to a third node, wherein the second message comprises the first information, the second message is used for acquiring authorization information of the second node, and the authorization information is used for determining whether the second node is authorized to provide service for a terminal.
In the above embodiment, the first node may receive the first message sent by the second node, where the first message includes the first information of the second node, and send the second message including the first information to the third node, where the second message may be used to obtain authorization information of the second node, so as to implement authorization on whether the second node may provide services to the terminal, and further may effectively manage the second node according to the authorization information of the second node.
With reference to some embodiments of the first aspect, in some embodiments, the method further includes:
And receiving the authorization information of the second node sent by the third node or the second node.
In the above embodiment, the first node may determine whether the second node is authorized to provide the service to the terminal according to the authorization information of the second node, so that the second node may be effectively managed.
With reference to some embodiments of the first aspect, in some embodiments, the sending the second message to the third node includes:
selecting the third node according to the first information;
and sending the second message to a third node.
In the above embodiment, by selecting the third node according to the first information and transmitting the second message to the selected third node, the success rate of node authorization can be improved.
With reference to some embodiments of the first aspect, in some embodiments, the selecting the third node according to the first information includes:
and selecting a third node with a support node authorization function from a plurality of third nodes according to the first information.
In the embodiment, the selection accuracy of the third node can be improved, and the success rate of node authorization is further improved.
With reference to some embodiments of the first aspect, in some embodiments, the first information includes one or more of:
The type indication information of the second node;
The function supported by the second node;
services supported by the second node;
And the relay mode supported by the second node.
In the above embodiment, the first information may include one or more items, so that different demands can be satisfied.
With reference to some embodiments of the first aspect, in some embodiments, the second message is a next generation application protocol (next generation application protocol, NGAP) message.
In the above embodiment, by multiplexing the NGAP message to send the first information to the third node, resources are saved.
With reference to some embodiments of the first aspect, in some embodiments, the authorization information includes one or more of:
Authorizing the second node to provide services for the terminal;
the second node is not authorized to provide services for the terminal;
authorizing the second node to provide the function for the terminal;
the second node is not authorized to provide functions for the terminal;
authorizing the second node to provide services for the terminal;
The second node is not authorized to provide service for the terminal;
Authorizing the second node to provide a relay mode for the terminal;
and not authorizing the relay mode provided by the second node for the terminal.
In the above embodiment, the third node may send the above authorization information to the first node and the second node, so that the first node may determine, according to the authorization information, whether the second node is authorized to provide services to the terminal, or determine which functions or services or which relay modes are authorized, thereby implementing authorization to the functions of the second node, and may ensure that the second node may accurately provide services to the terminal, and the first node may effectively manage the functions of the second node according to the authorization information.
In a second aspect, an embodiment of the present disclosure proposes a method for authorizing a node, performed by a third node, the method comprising:
receiving a second message sent by the first node, wherein the second message comprises first information of the second node;
And acquiring authorization information of the second node according to the second message, wherein the authorization information is used for determining whether the second node is authorized to provide services for the terminal.
In the above embodiment, the third node may obtain the authorization information of the second node according to the second message, so as to implement authorization on whether the second node can provide the service to the terminal.
With reference to some embodiments of the first aspect, in some embodiments, the method further includes:
and sending the authorization information to the second node and/or the first node.
In the above embodiment, the third node may send the authorization information to the second node and/or the first node, the sending manner is flexible, the first node may manage the second node according to the authorization information, and the second node may determine whether to be authorized to provide services to the terminal according to the authorization information.
With reference to some embodiments of the first aspect, in some embodiments, the sending the authorization information to the second node and/or the first node includes:
And sending a non-access stratum (NAS) message to the second node, where the NAS message includes the authorization information, and/or sending an NGAP message to the first node, where the NGAP message includes the authorization information.
In the above embodiment, the authorization information may be sent to the second node by multiplexing the NAS message, and the authorization information may be sent to the first node by multiplexing the NGAP message, thereby saving resources.
、
With reference to some embodiments of the first aspect, in some embodiments, the acquiring authorization information of the second node according to the second message includes at least one of:
Acquiring the authorization information from a fourth node according to the type indication information of the second node contained in the first information;
And acquiring the authorization information from a fourth node according to one or more of the functions, the services and the relay modes supported by the second node contained in the first information.
In the above embodiment, by sending the type indication information of the second node to the fourth node, the authorization information of the second node returned by the fourth node is obtained, so that the authorization of the second node according to the type indication information of the second node is realized, and by sending one or more of the functions, services and relay modes supported by the second node to the fourth node, the fourth node can determine the authorization of the second node according to one or more of the functions, services and relay modes supported by the second node, and return the authorization to the third node, thereby realizing whether the second node provides service authorization for the terminal.
With reference to some embodiments of the first aspect, in some embodiments, the authorization information includes one or more of:
Authorizing the second node to provide services for the terminal;
the second node is not authorized to provide services for the terminal;
authorizing the second node to provide the function for the terminal;
the second node is not authorized to provide functions for the terminal;
authorizing the second node to provide services for the terminal;
The second node is not authorized to provide service for the terminal;
Authorizing the second node to provide a relay mode for the terminal;
and not authorizing the relay mode provided by the second node for the terminal.
In the above embodiment, the third node may send the above authorization information to the first node and the second node, so that the first node may determine, according to the authorization information, whether the second node is authorized to provide services to the terminal, or determine which functions or services or which relay modes are authorized, thereby effectively managing the second node.
In a third aspect, an embodiment of the present disclosure proposes a method for authorizing a node, performed by a second node, the method comprising:
A first message is sent to a first node, the first message comprising first information of the second node, the first message being used to obtain authorization information of the second node, the authorization information being used to determine whether the second node is authorized to provide services to a terminal.
In the above embodiment, by sending the first message to the first node, the first node sends the second message to the third node, where the second message includes the first information of the second node, so that the third node may obtain the authorization information of the second node according to the second message, thereby implementing authorization about whether the second node provides services to the terminal.
With reference to some embodiments of the first aspect, in some embodiments, the method further includes:
and receiving the authorization information sent by the third node or the first node.
In the above embodiment, the second node may determine whether to be authorized to provide the service to the terminal according to the authorization information, and if the second node is authorized to provide the service to the terminal, the second node may operate as an access network device, and the terminal may access the network through the second node.
With reference to some embodiments of the first aspect, in some embodiments, the method further includes:
the second node is switched from accessing the first node to accessing the target first node, and the authorization information is sent to the target first node, or
The terminal part of the second node is different from the first node connected with the access network part of the second node, and the first node connected with the terminal part of the second node sends the authorization information to the first node connected with the access network part of the second node.
In the above embodiment, the second node may notify the target first node of the authorization information of the second node when the accessed first node changes, so that the target first node may effectively manage the second node. Or the second node may also send the authorization information to the first node connected to the access network part of the second node when the first node connected to the access network part of the second node is different from the first node connected to the terminal part of the second node, so that the first node connected to the access network part of the second node can timely obtain the authorization information of the second node.
With reference to some embodiments of the first aspect, in some embodiments, the authorization information includes one or more of:
Authorizing the second node to provide services for the terminal;
the second node is not authorized to provide services for the terminal;
authorizing the second node to provide the function for the terminal;
the second node is not authorized to provide functions for the terminal;
authorizing the second node to provide services for the terminal;
The second node is not authorized to provide service for the terminal;
Authorizing the second node to provide a relay mode for the terminal;
and not authorizing the relay mode provided by the second node for the terminal.
In the above embodiment, the second node may determine, according to the authorization information, whether the second node is authorized to provide services to the terminal, or determine which functions or services or relay modes are authorized, so as to ensure that the second node may accurately provide services to the terminal.
In a fourth aspect, an embodiment of the present disclosure provides a method for authorizing a node, including:
The second node sends a first message to the first node, the first message including first information of the second node;
the first node sends the second message to a third node, wherein the second message comprises the first information;
And the third node acquires the authorization information of the second node according to the second message, wherein the authorization information is used for determining whether the second node is authorized to provide services for the terminal. In the above embodiment, the second node sends the first message to the first node, the first node sends the second message to the third node, and the third node obtains the authorization information of the second node according to the second message, thereby realizing the authorization of whether the second node provides the service to the terminal.
In a fifth aspect, embodiments of the present disclosure propose a communication device for use as a first node, the communication device comprising at least one of a transceiver module and a processing module, wherein the communication device is configured to perform the optional implementation manner of the first aspect and the first aspect.
In a sixth aspect, the embodiment of the disclosure proposes a communication device, for use as a third node, the communication device comprising at least one of a transceiver module and a processing module, wherein the communication device is configured to perform the second aspect.
In a seventh aspect, embodiments of the present disclosure propose a communication device for use as a second node, the communication device comprising at least one of a transceiver module, a processing module, wherein the communication device is configured to perform the optional implementation manner of the third aspect and the third aspect.
In an eighth aspect, embodiments of the present disclosure provide a communication device for use as a first node comprising one or more processors, wherein the first node is configured to perform the first aspect and the optional implementation manner of the first aspect.
In a ninth aspect, embodiments of the present disclosure provide a communication device for use as a third node comprising one or more processors, wherein the third node is configured to perform the second aspect and optional implementations of the second aspect.
In a tenth aspect, embodiments of the present disclosure provide a communication device for use as a second node comprising one or more processors, wherein the second node is configured to perform the optional implementation manner of the third aspect and the third aspect.
In an eleventh aspect, an embodiment of the present disclosure proposes a communication system, including a first node configured to implement the methods described in the first aspect and the alternative implementations of the first aspect, a third node configured to implement the methods described in the second aspect and the alternative implementations of the second aspect, and a second node configured to implement the methods described in the third aspect and the alternative implementations of the third aspect.
In a twelfth aspect, embodiments of the present disclosure provide a storage medium storing instructions that, when executed on a communication device, cause the communication device to perform a method as described in the first aspect, the alternative implementation of the first aspect, the second aspect, the alternative implementation of the second aspect, the third aspect, and the alternative implementation of the third aspect.
In a thirteenth aspect, embodiments of the present disclosure propose a program product, which when executed by a communication device, causes the communication device to perform a method as described in the first aspect, the alternative implementation manner of the first aspect, the second aspect, the alternative implementation manner of the second aspect, the third aspect, and the alternative implementation manner of the third aspect.
In a fourteenth aspect, embodiments of the present disclosure propose a computer program which, when run on a computer, causes the computer to carry out the method as described in the first aspect, the alternative implementation manner of the first aspect, the second aspect, the alternative implementation manner of the second aspect, the third aspect, the alternative implementation manner of the third aspect.
In a fifteenth aspect, embodiments of the present disclosure provide a chip or chip system. The chip or chip system comprises processing circuitry configured to perform the methods described in accordance with the above-described first aspect, alternative implementations of the first aspect, second aspect, alternative implementations of the second aspect, third aspect, alternative implementations of the third aspect.
It will be appreciated that the communication device, communication system, storage medium, program product, computer program, chip or chip system described above is adapted to perform the methods set forth in the embodiments of the present disclosure. Therefore, the advantages achieved by the method can be referred to as the advantages of the corresponding method, and will not be described herein.
The embodiment of the disclosure provides a node authorization method, communication equipment and a communication system. In some embodiments, terms such as an authorization method of a node and terms such as an information processing method, a communication method, and the like may be replaced with each other, terms such as an information transmission device and an information processing device, a communication device, and the like may be replaced with each other, and terms such as an information processing system, a communication system, and the like may be replaced with each other.
The embodiments of the present disclosure are not intended to be exhaustive, but rather are exemplary of some embodiments and are not intended to limit the scope of the disclosure. In the case of no contradiction, each step in an embodiment may be implemented as an independent embodiment, and the steps may be arbitrarily combined, for example, a scheme in which part of the steps are removed in an embodiment may also be implemented as an independent embodiment, the order of the steps may be arbitrarily exchanged in an embodiment, further, alternative implementations in an embodiment may be arbitrarily combined, further, the embodiments may be arbitrarily combined, for example, part or all of the steps of different embodiments may be arbitrarily combined, and an embodiment may be arbitrarily combined with alternative implementations of other embodiments.
In the various embodiments of the disclosure, terms and/or descriptions of the various embodiments are consistent throughout the various embodiments and may be referenced to each other in the absence of any particular explanation or logic conflict, and features from different embodiments may be combined to form new embodiments in accordance with their inherent logic relationships.
The terminology used in the embodiments of the disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure.
In the presently disclosed embodiments, elements that are referred to in the singular, such as "a," "an," "the," "said," etc., may mean "one and only one," or "one or more," "at least one," etc., unless otherwise indicated. For example, where an article (article) is used in translation, such as "a," "an," "the," etc., in english, a noun following the article may be understood as a singular expression or as a plural expression.
In the presently disclosed embodiments, "plurality" refers to two or more.
In some embodiments, terms such as "at least one of," one or more of, "one ormore," multiple of, "and the like may be substituted for each other.
In some embodiments, the recitations of "A, B at least one of", "A and/or B", "in one case A, in another case B", "in one case A", "in another case B", etc., may include the following, in some embodiments A (A being performed independently of B), in some embodiments B (B being performed independently of A), in some embodiments A and B being selected for execution (A and B being selectively executed), in some embodiments A and B (both A and B being executed). Similar to the above when there are more branches such as A, B, C.
In some embodiments, the description modes such as A or B can comprise the following technical scheme, namely A (A is executed independently of B) in some embodiments, B (B is executed independently of A) in some embodiments, and A and B are selected to be executed (A and B are selectively executed) in some embodiments according to the situation. Similar to the above when there are more branches such as A, B, C.
The prefix words "first", "second", etc. in the embodiments of the present disclosure are only for distinguishing different description objects, and do not limit the location, order, priority, number, content, etc. of the description objects, and the statement of the description object refers to the claims or the description of the embodiment context, and should not constitute unnecessary limitations due to the use of the prefix words. For example, if the description object is a "field", the ordinal words before the "field" in the "first field" and the "second field" do not limit the position or the order between the "fields", and the "first" and the "second" do not limit whether the "fields" modified by the "first" and the "second" are in the same message or not. For another example, describing an object as "level", ordinal words preceding "level" in "first level" and "second level" do not limit priority between "levels". As another example, the number of descriptive objects is not limited by ordinal words, and may be one or more, taking "first device" as an example, where the number of "devices" may be one or more. Further, the objects modified by different prefix words may be the same or different, for example, the description object is a "device", the "first device" and the "second device" may be the same device or different devices, the types of which may be the same or different, and, further, the description object is an "information", the "first information" and the "second information" may be the same information or different information, and the contents thereof may be the same or different.
In some embodiments, "comprising a", "containing a", "for indicating a", "carrying a", may be interpreted as carrying a directly, or as indicating a indirectly.
In some embodiments, the terms "responsive to" and "responsive to determining" and "in the case of" in the first place "," when "," when "and" if "and the like may be substituted for each other.
In some embodiments, an apparatus or the like may be interpreted as an entity, or may be interpreted as a virtual, and the names thereof are not limited to the names described in the embodiments, "apparatus," "device," "circuit," "network element," "node," "function," "unit," "section," "system," "network," "chip system," "entity," "body," and the like may be replaced with each other.
In some embodiments, "access network device (access network device, AN device)", "radio access network device (radio access network device, RAN DEVICE)", "Base Station (BS)", "radio base station (radio base station)", "fixed station (fixed station)", "node", "access point", "transmission point (transmission point, TP)", "Reception Point (RP)", "transmission reception point/reception point (TRP)", "panel", "antenna panel (ANTENNA PANEL)", "antenna array (ANTENNA ARRAY)", "cell", "macrocell (macro cell)", "microcell (SMALL CELL)", "microcell (pico cell)", "sector (sector)", "cell group (femto cell)", "carrier", "component (carrier)", "component (62", "bandwidth, and the like.
In some embodiments, terms such as "terminal" (terminal) "," terminal device (TERMINAL DEVICE) "," User Equipment (UE) "," user terminal "(MS)", "Mobile Station (MS)", mobile Terminal (MT) ", subscriber station (subscriber station), mobile unit (mobile unit), subscriber unit (subscriber unit), wireless unit (wireless unit), remote unit (remote unit), mobile device (mobile device), wireless device (WIRELESS DEVICE), wireless communication device (wireless communication device), remote device (remote device), mobile subscriber station (mobile subscriber station), access terminal (ACCESS TERMINAL), mobile terminal (mobile terminal), wireless terminal (WIRELESS TERMINAL), remote terminal (remote terminal), handheld device (handset), user agent (user agent), mobile client (mobile client), and the like may be used interchangeably.
In some embodiments, the access network device, core network device, or network device may be replaced with a terminal. For example, the embodiments of the present disclosure may also be applied to a configuration in which communication between an access network device, a core network device, or a network device and a terminal is replaced with communication between a plurality of terminals (for example, may also be referred to as device-to-device (D2D), vehicle-to-everything (V2X), or the like). In this case, the terminal may have all or part of the functions of the access network device. Further, the language such as "uplink" and "downlink" may be replaced with a language (for example, "side") corresponding to the communication between terminals. For example, uplink channels, downlink channels, etc. may be replaced with side-uplink channels, uplink, downlink, etc. may be replaced with side-downlink channels.
In some embodiments, the terminal may be replaced with an access network device, a core network device, or a network device. In this case, the access network device, the core network device, or the network device may have all or part of the functions of the terminal.
In some embodiments, the acquisition of data, information, etc. may comply with laws and regulations of the country of locale.
In some embodiments, data, information, etc. may be obtained after user consent is obtained.
As shown in fig. 1, the communication system 100 includes a terminal (terminal) 101, an access network device 102, and a core network device (core network device) 103.
In some embodiments, the terminal 101 includes, for example, a second node or includes at least one of a terminal function portion in the second node, a mobile phone, a wearable device, an internet of things device, a communication-enabled car, a smart car, a tablet (Pad), a computer with wireless transceiving functions, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in unmanned-drive (self-driving), a wireless terminal device in teleoperation (remote medical surgery), a wireless terminal device in smart grid (SMART GRID), a wireless terminal device in transportation security (transportation safety), a wireless terminal device in smart city (SMART CITY), a wireless terminal device in smart home (smart home), but is not limited thereto.
In some embodiments, the second node may include a terminal function portion (or referred to as a terminal portion), an access network function portion (or referred to as an access network portion), and so on. Alternatively, the second node is only used as terminal 101 if it is not authorized to provide services to the terminal.
In some embodiments, the second node includes, for example, any of "VMR", "mobile IAB", "mobile base station relay (mobilebasedstationrelay, MBSR)", but is not limited thereto.
By way of example, the VMR may include a VMR access network portion, a VMR-MT, a core network function portion (e.g., portion UPF), a local data network (localdatanetwork), and the like.
In some embodiments, the terms "VMR-MT", "vehicle-mounted relay node terminal (VMR-MT)", and "VMR terminal portion" may be interchanged.
In some embodiments, the terms "VMR access network part", "VMR-gNB", "on-board relay node base station (VMR-gNB)", "VMR-RAN", and the like may be interchanged.
By way of example, mobile IAB may include mobile IAB-gNB, mobile IAB-MT, and the like.
In some embodiments, the terms "mobile IAB-MT", "mobile IAB terminal part", and the like may be interchanged.
In some embodiments, the terms "mobile IAB-gNB", "mobile IAB access network part", "mobile IAB-RAN" and the like may be interchanged.
Illustratively, MBSR may include MBSR-gNB, MBSR-MT, and the like.
In some embodiments, the terms "MBSR-MT", "MBSR UE", "MBSR terminal portion" and the like may be used interchangeably.
In some embodiments, the terms "MBSR-gNB", "MBSR-RAN", "MBSR access network portion" and the like may be interchanged.
In some embodiments, the access network device 102 is, for example, a node or device that accesses a terminal to a wireless network, and the access network device may include at least one of a first node, an evolved NodeB (eNB) in a 5G communication system, a next generation NodeB (next generation eNB, ng-eNB), a next generation NodeB (next generation NodeB, gNB), a NodeB (NB), a Home NodeB (HNB), a home NodeB (home evolved nodeB, heNB), a wireless backhaul device, a wireless network controller (radio network controller, RNC), a base station controller (base station controller, BSC), a base transceiver station (base transceiver station, BTS), a baseband unit (BBU), a mobile switching center, a base station in a 6G communication system, an Open base station (Open RAN), a Cloud base station (Cloud RAN), a base station in other communication systems, an access node in a Wi-Fi system, but is not limited thereto. In some embodiments, the first node may manage the accessed second node. Illustratively, the first node is, for example, a VMR-donor, mobile IAB-donor, MBSR-donor, or the like.
In some embodiments, the second node may act as the access network device 102 if the second node is authorized to provide services to the terminal, but is not limited thereto. Alternatively, the access network device 102 may comprise a second node, or an access network functionality in the second node.
In some embodiments, the technical solutions of the present disclosure may be applied to an Open RAN architecture, where an access network device or an interface in an access network device according to the embodiments of the present disclosure may become an internal interface of the Open RAN, and flow and information interaction between these internal interfaces may be implemented by using software or a program.
In some embodiments, the access network device may be composed of a Central Unit (CU) and a Distributed Unit (DU), where the CU may also be referred to as a control unit (control unit), and the structure of the CU-DU may be used to split the protocol layers of the access network device, where functions of part of the protocol layers are centrally controlled by the CU, and functions of the rest of all the protocol layers are distributed in the DU, and the DU is centrally controlled by the CU, but is not limited thereto.
In some embodiments, the core network device 103 may be one device including a third node, a fourth node, etc., or may be a plurality of devices or device groups including all or part of the third node, the fourth node, etc., respectively. The network element may be virtual or physical. The core network comprises, for example, at least one of an evolved packet core (Evolved Packet Core, EPC), a 5G core network (5G Core Network,5GCN), a next generation core (Next Generation Core, NGC).
In some embodiments, the first node may act as a core network device 103, but is not limited thereto.
In some embodiments, the first node may be independent from the core network device 103.
In some embodiments, the first node may be part of the core network device 103.
In some embodiments, the third node has an authentication management function, and illustratively, the third node has a node authorization function, which may initiate the authorization procedure of the node.
In some embodiments, the third node comprises, for example, an authentication management function (authentication management function, AMF) network element, other nodes with node authorization functions, and so on.
In some embodiments, the third node may be independent from the core network device 103.
In some embodiments, the third node may be part of the core network device 103.
In some embodiments, the fourth node may store authorization information for the terminal. The fourth node comprises, for example, a unified data management function (unified DATA MANAGEMENT, UDM), other nodes storing authorization information for the terminal.
In some embodiments, the fourth node may be independent from the core network device 103.
In some embodiments, the fourth node may be part of the core network device 103.
In some embodiments, the third node may obtain authorization information for the first node from the fourth node.
It may be understood that, the communication system described in the embodiments of the present disclosure is for more clearly describing the technical solutions of the embodiments of the present disclosure, and is not limited to the technical solutions provided in the embodiments of the present disclosure, and those skilled in the art can know that, with the evolution of the system architecture and the appearance of new service scenarios, the technical solutions provided in the embodiments of the present disclosure are applicable to similar technical problems.
The embodiments of the present disclosure described below may be applied to the communication system 100 shown in fig. 1A, or a part of the main body, but are not limited thereto. The respective bodies shown in fig. 1A are examples, and the communication system may include all or part of the bodies in fig. 1A, or may include other bodies than fig. 1A, and the number and form of the respective bodies are arbitrary, and the connection relationship between the respective bodies is examples, and the respective bodies may not be connected or may be connected, and the connection may be arbitrary, direct connection or indirect connection, or wired connection or wireless connection.
Embodiments of the present disclosure may be applied to long term evolution (Long Term Evolution, LTE), LTE-Advanced (LTE-a), LTE-Beyond (LTE-B), SUPER 3G, IMT-Advanced, fourth generation mobile communication system (4th generation mobile communication system,4G)), fifth generation mobile communication system (5th generation mobile communication system,5G), 5G New air interface (New Radio, NR), future Radio access (Future Radio Access, FRA), new Radio access technology (New-Radio Access Technology, RAT), new Radio (New Radio, NR), new Radio access (New Radio access, NX), future generation Radio access (Future generation Radio access, FX), global System for Mobile communications (GSM (registered trademark)), CDMA2000, ultra mobile broadband (Ultra Mobile Broadband, UMB), IEEE 802.11 (Wi-Fi (registered trademark)), IEEE 802.16 (WiMAX (registered trademark)), IEEE 802.20, ultra-WideBand (UWB), bluetooth (registered trademark)), land public mobile network (Public Land Mobile Network, PLMN) network, device-to-Device (D2D) system, machine-to-machine (Machine to Machine, M2M) system, internet of things (Internet of Things, ioT) system, vehicle-to-eventing (V2X), system utilizing other communication methods, next generation system extended based on them, and the like. In addition, a plurality of system combinations (e.g., LTE or a combination of LTE-a and 5G, etc.) may be applied.
In some embodiments, the IAB may support wireless access and backhaul by the millimeter wave base station, which may effectively reduce the newly added fiber deployment requirements when deploying a dense network, making wireless relay in the NG-RAN possible. Wherein, the relay node is called IAB-node, which supports wireless access and backhaul through NR. Alternatively, the terminating node returned by the network side NR may be called an IAB-donor, which is a gNB with an IAB function added.
In some embodiments, the backhaul may be through single-hop or multi-hop.
In some embodiments, as shown in fig. 1B, the NG-RAN may support the IAB by being wirelessly connected to a gNB capable of serving the IAB-node (referred to as an IAB-node). The IAB-dosor may include, among other things, an IAB-dosor-CU and one or more IAB-dosor-DUs. When gNB-CU-CP and gNB-CU-UP are separated, IAB-donor may include one IAB-donor-CU-CP, multiple IAB-donor-CU-UP, and multiple IAB-donor-DU. Wherein an IAB-node may connect an upstream IAB-node or an IAB-donor-DU through a terminal function subset of the NR Uu interface (referred to as an IAB-MT function in the IAB-node), and the IAB-node may provide wireless backhaul to a downstream IAB-node and the terminal through a network function of the NR Uu interface (referred to as an IAB-DU function of the IAB-node).
In some embodiments, F1-C traffic between IAB-node and IAB-donor-CU may be passed back through IAB-donor-DU and optional intermediate hop IAB-node.
In some embodiments, F1-U traffic between IAB-node and IAB-donor-CU is backhauled through IAB-donor-DU and optional intermediate hop IAB-node.
In some embodiments, the Mobile IAB may also be referred to as a VMR, as the VMR may be deployed on a moving vehicle, such as an automobile, bus, airplane, etc., to support more deployment scenarios, such as local service access, local communications, etc.
In some embodiments, an IAB-node (VMR) may comprise an IAB-DU (i.e., DU part) and an IAB-MT (i.e., terminal part). Illustratively, the DU portion of the IAB may be referred to as an access network portion.
In some embodiments, as shown in FIG. 1C, the VMR may include an access network portion (VMR-gNB), a terminal portion (VMR-MT), a local user port function (local UPF), and local network data. Wherein the VMR may be connected to a VMR host node (VMR-donor), the VMR-donor being connected to the core network.
In some embodiments, when the mobile IAB-MT initially registers with a serving public land mobile network (Public Land Mobile Network, PLMN), it indicates itself as a mobile IAB in the request, the AMF may authorize the mobile IAB based on subscription information and provide a mobile IAB authorization indication to the NG-RAN.
In some embodiments, as part of the registration process, the AMF of the mobile IAB connection may indicate to the IAB-MT that the IAB-node is not allowed to be a mobile IAB node, in which case the AMF does not send an authorization indication of the mobile IAB to the donor-gNB. Alternatively, the AMF may provide an indication in either a registration accept (if the PLMN allows the IAB-MT to register in PLMM) or a registration reject (if the PLMN does not allow the IAB-MT to register in the PLMN).
The mobile IAB authorization mechanism does not support authorization of the VMR because the function and offered services of the VMR are different from the mobile IAB.
Based on the above, the disclosure proposes a method for authorizing a node.
Fig. 2A is an interactive schematic diagram illustrating an authorization method of a node according to an embodiment of the disclosure. As shown in fig. 2A, an embodiment of the present disclosure relates to a method for authorizing a node for use in a communication system 100, the method comprising:
In step S2101, the second node transmits a first message to the first node.
In some embodiments, the first message may be a radio resource control (radio resource control, RRC) message. The RRC message may be, for example, an RRC setup complete message.
In some embodiments, the terminal portion of the second node sends the first message to the first node.
In some embodiments, the first node receives a first message sent by the second node.
In some embodiments, the first node may be a first node to which the second node has access.
In some embodiments, the first node may be a first node to which a terminal portion of the second node has access.
In some embodiments, the first message may include first information of the second node.
In some embodiments, the first information may be used to assist the first node in selecting a third node, such that the first node selects an appropriate AMF to register with the second node (e.g., may include an authorization procedure).
In some embodiments, the first information may include one or more of type indication information of the second node, functionality supported by the second node, services supported by the second node, and relay mode supported by the second node.
For example, the type indication information of the second node may be used to indicate what type of device the second node is, such as the type indication information of the second node is used to indicate that the second node is a VMR device, so that the first node selects an appropriate core network node (e.g., AMF) for the second node to perform further operations (e.g., perform registration, authentication, and/or authorization procedures).
In some embodiments, terms such as "send," "transmit," "report," "send," "transmit," "bi-directional," "send and/or receive," and the like may be used interchangeably.
In some embodiments, "acquire," "obtain," "receive," "transmit," "bi-directional transmit," "send and/or receive" may be used interchangeably and may be interpreted as receiving from other principals, acquiring from protocols, acquiring from higher or upper layers, processing itself, autonomous implementation, etc.
In some embodiments, the terms "access", "connected", and the like may be used interchangeably.
In step S2102, the first node sends a second message to the third node.
In some embodiments, the second message may be an NGAP message. The NGAP message may be, for example, an initial UE message (initial UE message) message.
In some embodiments, the second message may include the first information of the second node.
In some embodiments, the first node may select a third node based on the first information and send a second message to the third node.
Alternatively, the first node may select a third node having a support node authorization function from a plurality of third nodes according to the first information. For example, if there are a plurality of third nodes supporting the node authorization function, one third node may be selected at random or one third node may be selected according to a policy (e.g., network load).
For example, if the type indication information of the second node is included in the first information, the first node may consider the second node to be authorized information, and a third node having a support node authorization function may be selected from a plurality of third nodes.
For example, if the first information includes type indication information of the second node, the first node selects a third node supporting the type authorization according to the type indication information, and performs a further authorization process.
Illustratively, if the second node type indication information is included in the first information as VMR, the first node selects a third node (e.g., AMF) supporting VMR authorization as a core network node connected to the second node, and authorizes the second node.
In some embodiments, the second node may access the core network through a third node.
In some embodiments, the terminal part in the second node accesses the core network through the third node.
In some embodiments, the third node may receive the second message sent by the first node.
In some embodiments, the second message may be used to obtain authorization information for the second node.
In some embodiments, the third node may obtain authorization information of the second node according to the second message, where the authorization information may be used to determine whether the second node is authorized to provide the service to the terminal.
In some embodiments, the third node may send the type indication information of the second node included in the first information to the fourth node, and the fourth node may find the authorization information of the second node according to the type indication information of the second node, and send the authorization information of the second node to the third node, so that the third node may receive the authorization information sent by the fourth node.
In some embodiments, the third node may obtain the authorization information of the second node from the fourth node according to one or more of the functions, services, and relay modes supported by the second node included in the first information.
For example, the third node may send one or more of a function, a service, and a relay manner supported by the second node to the fourth node, and the fourth node may send authorization information of the second node to the third node according to one or more of the function, the service, and the relay manner supported by the second node, so that the third node may receive the authorization information sent by the fourth node.
In some embodiments, the authorization information may include one or more of the following:
authorizing the second node to provide service for the terminal;
unauthorized second node offer service for terminal station;
authorizing the second node to provide the function for the terminal;
the second node is not authorized to provide the function for the terminal;
Authorizing a second node to provide services for the terminal;
the second node is not authorized to provide the service for the terminal;
authorizing a second node to provide a relay mode for the terminal;
The relay mode provided by the second node for the terminal is not authorized.
The authorization information may be, for example, an indication information indicating whether the second node is authorized to provide the service to the terminal. The authorization information may be, for example, specifically including functions that the second node is authorized or not authorized. The authorization information may be, for example, traffic comprising in particular whether the second node is authorized or not authorized. The authorization information may be, for example, a relay means including specifically whether the second node is authorized or not authorized.
In some embodiments, the authorization information may be authorized by a function, and the functions that the second node may or may not be authorized may include one or more of:
the second node has the function of access network equipment DU;
the second node has a CU-UP function of access network equipment;
The second node has the function of access network equipment;
the second node has a UPF function;
The second node has a local data network function;
The second node has an N3IWF.
In some embodiments, the authorization information may be per-service authorization, and the services that the second node may be authorized or unauthorized may include one or more of the following:
a local service;
A local switching service;
UP service;
a CP service;
non-3 GPP access services;
protocol data unit (protocol data unit, PDU) session backhaul service.
In some embodiments, the local service means that the second node can support the terminal to access the local service through the second node, so as to reduce the time delay of the service;
In some embodiments, the local switching service means that at least two terminals served by the second node can directly communicate through the second node, without going through the core network, so as to reduce the time delay of communication;
in some embodiments, the UP service refers to a service in which the second node provides a user plane;
In some embodiments, CP services refer to services in which the second node provides a control plane;
in some embodiments, the non-3 GPP access service means that the second node may support the terminal to access the second node through the non-3 GPP access technology and connect to the core network through the second node. Wherein the non-3 GPP access technologies include, but are not limited to, wifi, bluetooth.
In some embodiments, the PDU session backhaul service refers to a backhaul network through which the second node may interact information with the core network through a logical channel of the PDU session, where the terminal is a terminal that accesses the core network through the second node.
In some embodiments, the authorization information may be authorized in a relay manner, and the relay manner in which the second node may be authorized or unauthorized may include one or more of the following:
Layer2 relay;
layer3 relay;
Multi-hop (multi-hop);
Single hop (single hop).
In step S2103, the third node transmits the authorization information of the second node to the first node.
In some embodiments, the third node may send an NGAP message to the first node, which may include authorization information for the second node. For example, the NGAP message may be a UE context setup request message, a UE context modification request message, or the like.
In some embodiments, the first node receives authorization information of the second node sent by the third node.
In some embodiments, the first node may determine, according to the authorization information of the second node, a service that the second node may provide to the terminal, so as to manage the second node.
In some embodiments, the first node may determine, according to the authorization information, whether the second node is authorized to provide services to the terminal, and if the second node is authorized to provide services to the terminal, it may be considered that the second node may operate as an access network device, and the terminal may access the network through the second node, and the first node may determine, according to the authorization information, services that may be specifically provided to the terminal, so as to manage the second node.
In step S2104, the third node transmits the authorization information of the second node to the second node.
In some embodiments, the third node may send a NAS message to the second node, and the NAS message may include authorization information of the second node.
In some embodiments, the second node receives the authorization information of the second node sent by the third node.
Optionally, the terminal portion of the second node receives the authorization information of the second node sent by the third node.
In some embodiments, the first node may determine whether the second node may provide services to the terminal according to the authorization information, and if the authorization information indicates that the second node may provide services to the terminal, may determine which services the second node may provide to the terminal, whereby the second node may provide corresponding services to the terminal.
In some embodiments, the "second node may provide services to other terminals" includes at least one of:
The terminal part of the second node may send the first information to the first node when RRC setup;
The second node can establish at least one cell to provide service for the terminal;
the terminal part of the second node cannot access the cells provided by other VMR devices in case the network does not support multi-hop.
In some embodiments, the second node may determine whether to be authorized to provide the service to the terminal according to the authorization information, and if the second node is authorized to provide the service to the terminal, it may be considered that the second node may operate as an access network device, the terminal may access the network through the second node, and the second node may determine, according to the authorization information, a service that may be specifically provided to the terminal. Illustratively, the second node being authorized to provide services to the terminal may be understood as the terminal part of the other second node or the UE may access the network through the second node.
In some embodiments, the second node is not authorized to provide services to the terminal, indicating that the second node is not capable of operating as an access network device, but is only capable of functioning as a terminal.
Illustratively, the second node is a VMR, which may perform at least one of the following operations if the VMR is not authorized to provide services to the terminal, i.e., the VRM is not capable of operating as an access network device:
Moving the serving terminal to other available base stations or VMRs;
when the RRC connection is established, no VMR indication is provided to the VMR-donor;
logical connection establishment associated with non-VMR-MT between VMR-donors is not initiated.
In some embodiments, the first node is handed over from the access first node to the access target first node, and authorization information for the second node may be sent to the target first node. That is, when a first node to which a second node accesses is handed over from a source first node to a target first node, the second node may transmit authorization information of the second node to the target first node.
Illustratively, the second node accessing the first node may be that a terminal portion of the second node accesses the first node, the terminal portion of the second node is switched from accessing the first node to the target first node, and the terminal portion of the second node may transmit authorization information of the second node to the target first node, optionally, the authorization information may be transmitted by XnAP messages.
In some embodiments, when the terminal portion of the second node and the first node to which the access network portion of the second node is connected are different, the first node to which the terminal portion of the second node is connected may send second node authorization information to the first node to which the access network portion of the second node is connected, optionally the authorization information may be transmitted by XnAP messages.
In some embodiments, steps S2103, S2104 may be performed in exchange for one another or simultaneously.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S2101 to step S2104. For example, step S2101 may be implemented as an independent embodiment, step S2102 may be implemented as an independent embodiment, step S2103 may be implemented as an independent embodiment, step S2104 may be implemented as an independent embodiment, step S2101 and step S2102 may be implemented as independent embodiments, step S2101, step S2102 and step S2103 may be implemented as independent embodiments, and step S2101, step S2102 and step S2104 may be implemented as independent embodiments, but are not limited thereto.
In some embodiments, one or more of these steps may be omitted or replaced in different embodiments.
In this embodiment mode or example, the steps may be independently, arbitrarily combined, or exchanged in order, and the alternative modes or examples may be arbitrarily combined, and may be arbitrarily combined with any steps of other embodiment modes or other examples without contradiction.
Fig. 2B is an interactive schematic diagram illustrating an authorization method of a node according to an embodiment of the disclosure. As shown in fig. 2B, an embodiment of the present disclosure relates to a method for authorizing a node for use in a communication system 100, the method comprising:
In step S2201, the second node transmits a first message to the first node.
Alternative implementations of step S2201 may refer to alternative implementations of step S2101 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In step S2202, the first node transmits a second message to the third node.
Alternative implementations of step S2202 may refer to alternative implementations of step S2102 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In step S2203, the third node transmits the authorization information of the second node to the first node.
Alternative implementations of step S2203 may refer to alternative implementations of step S2103 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In step S2204, the first node transmits authorization information of the second node to the second node.
In some embodiments, the second node may receive the authorization information of the second node sent by the first node.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S2201 to step S2204. For example, step S2201 may be implemented as an independent embodiment, step S2202 may be implemented as an independent embodiment, step S2203 may be implemented as an independent embodiment, step S2204 may be implemented as an independent embodiment, step S2201 and step S2202 may be implemented as independent embodiments, and step S2201, step S2202 and step S2203 may be implemented as independent embodiments, but are not limited thereto.
In some embodiments, one or more of these steps may be omitted or replaced in different embodiments.
In this embodiment mode or example, the steps may be independently, arbitrarily combined, or exchanged in order, and the alternative modes or examples may be arbitrarily combined, and may be arbitrarily combined with any steps of other embodiment modes or other examples without contradiction.
Fig. 2C is an interactive schematic diagram illustrating an authorization method of a node according to an embodiment of the disclosure. As shown in fig. 2C, an embodiment of the present disclosure relates to a method for authorizing a node for use in a communication system 100, the method comprising:
In step S2301, the second node transmits a first message to the first node.
Alternative implementations of step S2201 may refer to alternative implementations of step S2101 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In step S2302, the first node sends a second message to the third node.
Alternative implementations of step S2202 may refer to alternative implementations of step S2102 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In step S2303, the third node transmits the authorization information of the second node to the second node.
Alternative implementations of step S2203 may refer to alternative implementations of step S2104 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In step S2304, the second node transmits authorization information of the second node to the first node.
In some embodiments, the first node may receive authorization information of the second node sent by the second node.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S2301 to step S2304. For example, step S2301 may be implemented as a separate embodiment, step S2302 may be implemented as a separate embodiment, step S2303 may be implemented as a separate embodiment, step S2304 may be implemented as a separate embodiment, step S2301 and step S2302 may be implemented as separate embodiments, and step S2301, step S2302 and step S2303 may be implemented as separate embodiments, but are not limited thereto.
In some embodiments, one or more of these steps may be omitted or replaced in different embodiments.
In this embodiment mode or example, the steps may be independently, arbitrarily combined, or exchanged in order, and the alternative modes or examples may be arbitrarily combined, and may be arbitrarily combined with any steps of other embodiment modes or other examples without contradiction.
Fig. 3A is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the present disclosure. As shown in fig. 3A, an embodiment of the present disclosure relates to a method for authorizing a node, which may be performed by a second node, the method including:
in step S3101, a first message is sent.
Alternative implementations of step S3101 may refer to alternative implementations of step S2101 of fig. 2, and other relevant parts of the embodiment related to fig. 2, which are not described herein.
In some embodiments, the second node transmits the first message to the first node, but is not limited thereto, and may also transmit the first message to other bodies.
Alternatively, the first information included in the first message may be used for the first node to select the third node. Alternative implementations of this may be referred to as an alternative implementation of step S2102 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In step S3102, authorization information of the second node is acquired.
Alternative implementations of step S3102 may refer to alternative implementations of step S2104 of fig. 2, and other relevant parts of the embodiment related to fig. 2, which are not described herein.
In some embodiments, the second node may receive the authorization information transmitted by the third node or the first node, but is not limited thereto, and may also receive the authorization information transmitted by other principals.
In some embodiments, the second node obtains authorization information specified by the protocol.
In some embodiments, the second node obtains authorization information from a higher layer or upper layer(s).
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S3101 to step S3102. For example, step S3101 may be implemented as a separate embodiment, step S3102 may be implemented as a separate embodiment, and steps S3101 and S3102 may be implemented as separate embodiments, but are not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 3B is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the present disclosure. As shown in fig. 3B, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a second node, the method including:
Step S3201, a first message is sent to a first node.
Alternative implementations of step S3201 may refer to step S2101 of fig. 2, alternative implementations of step S3101 of fig. 3A, and other relevant parts in the embodiments related to fig. 2 and 3A, which are not described herein.
Step S3202, receiving the authorization information of the second node sent by the third node.
Alternative implementations of step S3202 may refer to step S2104 of fig. 2, alternative implementations of step S3102 of fig. 3A, and other relevant parts in the embodiments related to fig. 2 and 3A, which are not described herein.
In step S3203, in response to the authorization information indicating that the second node is authorized to provide services to the terminal, the service provided by the second node to the terminal is determined.
Alternative implementations of step S3203 may refer to step S2104 of fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
The detailed description of steps S3201-S3203 may refer to the embodiment of fig. 2 described above.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S3201 to step S3204. For example, step S3201 may be implemented as a separate embodiment, step S3202 may be implemented as a separate embodiment, step S3203 may be implemented as a separate embodiment, and steps S3201 and S3202 may be implemented as separate embodiments, but are not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 3C is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the present disclosure. As shown in fig. 3C, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a second node, the method including:
Step S3301, a first message is sent to the first node.
Alternative implementations of step S3301 may refer to step S2101 of fig. 2, alternative implementations of step S3101 of fig. 3A, and other relevant parts in the embodiments related to fig. 2, 3A, and 3B, which are not described herein.
In step S3302, the authorization information of the second node sent by the third node is received.
Alternative implementations of step S3302 may refer to step S2104 of fig. 2, alternative implementations of step S3102 of fig. 3A, and other relevant parts in the embodiments related to fig. 2, 3A, and 3B, which are not described herein.
Alternatively, the second node may also receive the authorization information sent by the other entity, and, for example, the second node may receive the authorization information sent by the first node.
Illustratively, the second node being authorized to provide services to the terminal may be understood as the terminal part of the other second node or the UE may access the network through the second node.
In step S3303, the second node is switched from the access first node to the access target first node, and transmits authorization information to the target first node.
Alternative implementations of step S3303 may refer to step S2104 of fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
The detailed description of steps S3301-S3303 may refer to the fig. 2 embodiment described above.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S3301 to step S3303. For example, step S3301 may be implemented as a separate embodiment, step S3302 may be implemented as a separate embodiment, step S3303 may be implemented as a separate embodiment, step S3301 and step S3302 may be implemented as separate embodiments, and step S3301, step S3302 and step S3303 may be implemented as separate embodiments, but are not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 3D is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the present disclosure. As shown in fig. 3D, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a second node, the method including:
Step S3401, first information is transmitted to the first node.
Alternative implementations of step S3401 may refer to step S2101 of fig. 2, step S3101 of fig. 3A, step S3201 of fig. 3B, alternative implementations of step S3301 of fig. 3C, and other relevant parts in the embodiments related to fig. 2, 3A, 3B, and 3C, which are not described herein.
In some embodiments, the first message may be an RRC message. The RRC message may be, for example, an RRC setup complete message.
In some embodiments, the terminal portion of the second node sends the first message to the first node.
In some embodiments, the first node receives a first message sent by the second node.
In some embodiments, the first node may be a first node to which the second node has access.
In some embodiments, the first node may be a first node to which a terminal portion of the second node has access.
In some embodiments, the first message may include first information of the second node.
In some embodiments, the first information may be used to assist the first node in selecting a third node, such that the first node selects an appropriate AMF to register with the second node (e.g., may include an authorization procedure).
In some embodiments, the first information may include one or more of type indication information of the second node, functionality supported by the second node, services supported by the second node, and relay mode supported by the second node.
For example, the type indication information of the second node may be used to indicate which type of device the second node is, such as the type indication information of the second node is used to indicate that the second node is a VMR device.
In some embodiments, terms such as "send," "transmit," "report," "send," "transmit," "bi-directional," "send and/or receive," and the like may be used interchangeably.
In some embodiments, "acquire," "obtain," "receive," "transmit," "bi-directional transmit," "send and/or receive" may be used interchangeably and may be interpreted as receiving from other principals, acquiring from protocols, acquiring from higher or upper layers, processing itself, autonomous implementation, etc.
In some embodiments, the terms "access", "connected", and the like may be used interchangeably.
Fig. 4A is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the disclosure. As shown in fig. 4A, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a first node, the method including:
In step S4101, a first message is acquired.
Alternative implementations of step S4101 may refer to alternative implementations of step S2101 of fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In some embodiments, the first node receives the first information transmitted by the second node, but is not limited thereto and may also receive the first information transmitted by other bodies.
In some embodiments, the first node obtains first information specified by a protocol.
In some embodiments, the first node obtains the first information from a higher layer or upper layer(s).
Step S4102, a first message is sent.
Alternative implementations of step S4102 may refer to alternative implementations of step S2102 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In some embodiments, the first node transmits the first information to the third node, but is not limited thereto, and the first information may also be transmitted to other subjects.
Optionally, the first information is used for the third node to acquire the authorization information of the second node. Alternative implementations of this may be referred to as an alternative implementation of step S2102 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In step S4103, authorization information of the second node is acquired.
An optional implementation of step S4103 may be referred to the optional implementation of step S2103, which is not described here.
In some embodiments, the first node receives the authorization information of the second node sent by the third node, but is not limited thereto, and may also receive the authorization information of the second node sent by other principals, such as receiving the authorization information sent by the second node.
In some embodiments, the first node obtains authorization information specified by the protocol.
In some embodiments, the first node obtains authorization information from a higher layer or upper layer(s).
In this implementation manner or embodiment, the optional manner or embodiment may be arbitrarily combined.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S4101 to step S4102. For example, step S4101 may be implemented as a separate embodiment, step S4102 may be implemented as a separate embodiment, and steps S4101 and S4102 may be implemented as separate embodiments, but are not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 4B is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the disclosure. As shown in fig. 4B, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a first node, the method including:
step S4201, receiving a first message sent by a second node.
Alternative implementations of step S4201 may refer to step S2101 of fig. 2, alternative implementations of step S4101 of fig. 4A, and other relevant parts in the embodiments related to fig. 2 and 4A, which are not described herein.
Step S4202, selecting a third node according to the first information of the second node included in the first message.
Alternative implementations of step S4202 may refer to alternative implementations of step S2102 of fig. 2, and other relevant parts of the embodiment related to fig. 2, which are not described herein.
Step S4203, a second message is sent to the third node.
An alternative implementation of step S4203 may be referred to the alternative implementation of step S2102, which is not described here.
Optionally, the first information is used for the third node to acquire the authorization information of the second node. Alternative implementations of this may be referred to as an alternative implementation of step S2102 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
Step S4204 receives the authorization information of the second node sent by the third node.
An alternative implementation of step S4204 may be referred to the alternative implementation of step S2103, which is not described herein.
In some embodiments, the first node may receive the authorization information of the second node transmitted by the third node, but is not limited thereto, and may also receive the authorization information of the second node transmitted by other principals, and for example, the first node may receive the authorization information of the second node transmitted by the second node. In this implementation manner or embodiment, the optional manner or embodiment may be arbitrarily combined.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S4201 to step S4204. For example, step S4201 may be implemented as a separate embodiment, step S4202 may be implemented as a separate embodiment, step S4203 may be implemented as a separate embodiment, step S4204 may be implemented as a separate embodiment, step S4201 and step S4202 may be implemented as separate embodiments, and step S4201, step S4202 and step S4203 may be implemented as separate embodiments, but are not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 4C is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the disclosure. As shown in fig. 4C, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a first node, the method including:
Step S4301, a first message sent by a second node is received.
Alternative implementations of step S4301 may refer to step S2101 of fig. 2, alternative implementations of step S4101 of fig. 4A, and other relevant parts in the embodiments related to fig. 2 and 4A, which are not described herein.
In some embodiments, the terminal portion of the second node sends the first message to the first node.
In some embodiments, the first node receives a first message sent by the second node.
In some embodiments, the first node may be a first node to which the second node has access.
In some embodiments, the first node may be a first node to which a terminal portion of the second node has access.
In some embodiments, the first information may be used to assist the first node in selecting a third node, such that the first node selects an appropriate AMF to register with the second node (e.g., may include an authorization procedure).
In some embodiments, the first information may include one or more of type indication information of the second node, functionality supported by the second node, services supported by the second node, and relay mode supported by the second node.
For example, the type indication information of the second node may be used to indicate which type of device the second node is, such as the type indication information of the second node is used to indicate that the second node is a VMR device.
In some embodiments, "acquire," "obtain," "receive," "transmit," "bi-directional transmit," "send and/or receive" may be used interchangeably and may be interpreted as receiving from other principals, acquiring from protocols, acquiring from higher or upper layers, processing itself, autonomous implementation, etc.
In some embodiments, the terms "access", "connected", and the like may be used interchangeably.
Step S4302, a second message is sent to the third node.
Alternative implementations of step S4302 may be referred to above in step S2102, step S4102 of fig. 4A, alternative implementations of step S4203 of fig. 4B, and other relevant parts of the embodiments related to fig. 2, 4A, and 4B, which are not described herein.
In some embodiments, the second message may include the first information of the second node.
In some embodiments, the first node may select a third node based on the first information and send a second message to the third node.
Alternatively, the first node may select a third node having a support node authorization function from a plurality of third nodes according to the first information. For example, if there are a plurality of third nodes supporting the node authorization function, one third node may be randomly selected.
For example, if the type indication information of the second node is included in the first information, the first node may consider the second node to be authorized information, and a third node having a support node authorization function may be selected from a plurality of third nodes.
In some embodiments, the second node may access the core network through a third node.
In some embodiments, the third node may receive the second message sent by the first node.
In some embodiments, the second message may be used to obtain authorization information for the second node.
In some embodiments, the authorization information may include one or more of the following:
authorizing the second node to provide service for the terminal;
unauthorized second node offer service for terminal station;
authorizing the second node to provide the function for the terminal;
the second node is not authorized to provide the function for the terminal;
Authorizing a second node to provide services for the terminal;
the second node is not authorized to provide the service for the terminal;
authorizing a second node to provide a relay mode for the terminal;
The relay mode provided by the second node for the terminal is not authorized.
The authorization information may be, for example, an indication information indicating whether the second node is authorized to provide the service to the terminal. The authorization information may be, for example, specifically including functions that the second node is authorized or not authorized. The authorization information may be, for example, traffic comprising in particular whether the second node is authorized or not authorized. The authorization information may be, for example, a relay means including specifically whether the second node is authorized or not authorized.
In some embodiments, the authorization information may be authorized by a function, and the functions that the second node may or may not be authorized may include one or more of:
the second node has the function of access network equipment DU;
the second node has a CU-UP function of access network equipment;
The second node has the function of access network equipment;
the second node has a UPF function;
a local data network function;
N3IWF。
In some embodiments, the authorization information may be per-service authorization, and the services that the second node may be authorized or unauthorized may include one or more of the following:
a local service;
A local switching service;
UP service;
a CP service;
non-3 GPP access services;
the PDU session goes back to the service.
In some embodiments, the authorization information may be authorized in a relay manner, and the relay manner in which the second node may be authorized or unauthorized may include one or more of the following:
Layer2 relay;
layer3 relay;
Multi-hop (multi-hop);
Single hop (single hop).
Optionally, the first information is used for the third node to acquire the authorization information of the second node. Alternative implementations of this may be referred to as an alternative implementation of step S2102 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In this implementation manner or embodiment, the optional manner or embodiment may be arbitrarily combined.
The method for authorizing a node according to embodiments of the present disclosure may include at least one of step S4301 to step S4302. For example, step S4301 may be implemented as a separate embodiment, and step S4302 may be implemented as a separate embodiment, but is not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 4D is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the present disclosure. As shown in fig. 4D, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a third node, the method including:
in step S4401, a second message is acquired.
Alternative implementations of step S4401 may refer to alternative implementations of step S2102 in fig. 2, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In some embodiments, the third node receives the first information transmitted by the first node, but is not limited thereto and may also receive the first information transmitted by other bodies.
In some embodiments, the third node obtains first information specified by the protocol.
In some embodiments, the third node obtains the first information from a higher layer or upper layer(s).
Step S4402, transmitting authorization information of the second node.
Alternative implementations of step S4402 may refer to step S2103 of fig. 2, alternative implementations of step S2104, and other relevant parts of the embodiment related to fig. 2, which are not described herein.
In some embodiments, the third node transmits the authorization information of the second node to the first node, but is not limited thereto, and the first information may also be transmitted to other subjects.
In some embodiments, the third node transmits the authorization information of the second node to the second node, but is not limited thereto, and the first information may also be transmitted to other subjects.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S4401 to step S4402. For example, step S4401 may be implemented as an independent embodiment, and step S4402 may be implemented as an independent embodiment, but is not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 4E is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the present disclosure. As shown in fig. 4E, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a third node, the method including:
step S4501, a second message sent by the first node is received.
Alternative implementations of step S4501 may refer to step S2101 of fig. 2, alternative implementations of step S4401 of fig. 4D, and other relevant parts in the embodiments related to fig. 2 and 4D, which are not described herein.
Step S4502, obtaining the authorization information of the second node according to the second message.
Alternative implementations of step S4502 may refer to alternative implementations of step S2102 and other relevant parts in the embodiment related to fig. 2, which are not described herein.
Step S4503, transmitting authorization information to the second node and the first node.
Alternative implementations of step S4502 may refer to the alternative implementations of step S2103 and step S2104, and other relevant parts in the embodiment related to fig. 2, which are not described herein.
In some embodiments, the third node may send authorization information for the second node to the second node or the first node.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S4501 to step S4503. For example, step S4501 may be implemented as a separate embodiment, step S4502 may be implemented as a separate embodiment, step S4503 may be implemented as a separate embodiment, and steps S4501 and S4502 may be implemented as separate embodiments, but are not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 4F is a flow chart diagram illustrating a method of authorizing a node according to an embodiment of the disclosure. As shown in fig. 4F, an embodiment of the present disclosure relates to a method for authorizing a node, performed by a third node, the method including:
Step S4601, a second message sent by the first node is received.
Alternative implementations of step S4601 may refer to step S2101 of fig. 2, alternative implementations of step S4401 of fig. 4D, and other relevant parts in the embodiments related to fig. 2 and 4D, which are not described herein.
In some embodiments, the third node may receive the first message sent by the first node.
In some embodiments, the second message may include the first information of the second node.
Step S4602, obtaining authorization information of the second node according to the second message.
Alternative implementations of step S4602 may refer to alternative implementations of step S2102 and other relevant parts of the embodiment related to fig. 2, which are not described herein.
In some embodiments, the third node may obtain authorization information of the second node according to the second message, where the authorization information may be used to indicate whether the second node is authorized to provide the service to the terminal.
In some embodiments, the third node may send the type indication information of the second node included in the first information to the fourth node, and the fourth node may find the authorization information of the second node according to the type indication information of the second node, and send the authorization information of the second node to the third node, so that the third node may receive the authorization information sent by the fourth node.
For example, the type indication information of the second node may be used to indicate which type of device the second node is, such as the type indication information of the second node is used to indicate that the second node is a VMR device.
In some embodiments, the third node may obtain the authorization information of the second node from the fourth node according to one or more of the functions, services, and relay modes supported by the second node included in the first information.
For example, the third node may send one or more of a function, a service, and a relay manner supported by the second node to the fourth node, and the fourth node may send authorization information of the second node to the third node according to one or more of the function, the service, and the relay manner supported by the second node, so that the third node may receive the authorization information sent by the fourth node.
In some embodiments, the authorization information may include one or more of the following:
authorizing the second node to provide service for the terminal;
unauthorized second node offer service for terminal station;
authorizing the second node to provide the function for the terminal;
the second node is not authorized to provide the function for the terminal;
Authorizing a second node to provide services for the terminal;
the second node is not authorized to provide the service for the terminal;
authorizing a second node to provide a relay mode for the terminal;
The relay mode provided by the second node for the terminal is not authorized.
The authorization information may be, for example, an indication information indicating whether the second node is authorized to provide the service to the terminal. The authorization information may be, for example, specifically including functions that the second node is authorized or not authorized. The authorization information may be, for example, traffic comprising in particular whether the second node is authorized or not authorized. The authorization information may be, for example, a relay means including specifically whether the second node is authorized or not authorized.
In some embodiments, the authorization information may be authorized by a function, and the functions that the second node may or may not be authorized may include one or more of:
the second node has the function of access network equipment DU;
the second node has a CU-UP function of access network equipment;
The second node has the function of access network equipment;
the second node has a UPF function;
a local data network function;
N3IWF。
In some embodiments, the authorization information may be per-service authorization, and the services that the second node may be authorized or unauthorized may include one or more of the following:
a local service;
A local switching service;
UP service;
a CP service;
non-3 GPP access services;
the PDU session goes back to the service.
In some embodiments, the authorization information may be authorized in a relay manner, and the relay manner in which the second node may be authorized or unauthorized may include one or more of the following:
Layer2 relay;
layer3 relay;
Multi-hop (multi-hop);
Single hop (single hop).
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S4601 to step S4602. For example, step S4601 may be implemented as an independent embodiment, and step S4602 may be implemented as an independent embodiment, but is not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Fig. 5 is an interactive schematic diagram of an authorization method of a node according to an embodiment of the disclosure. As shown in fig. 5, an embodiment of the present disclosure relates to a method for authorizing a node, for use in a communication system including a second node, a first node, and a third node, the method including:
In step S5101, the second node transmits a first message to the first node.
The optional implementation manner of step S5101 may be referred to the optional implementation manner of step S2101, and will not be described herein.
In step S5102, the first node sends a second message to the third node.
An optional implementation of step S5102 may be referred to the optional implementation of step S2102, which is not described here.
Step S5103, obtaining authorization information of the second node according to the second message.
An optional implementation manner of step S5103 may be referred to the optional implementation manner of step S2102, and will not be described herein.
The method for authorizing a node according to an embodiment of the present disclosure may include at least one of step S5101 to step S5103. For example, step S5101 may be implemented as a separate embodiment, step S5102 may be implemented as a separate embodiment, step S5103 may be implemented as a separate embodiment, and step S5101 and step S5102 may be implemented as separate embodiments, but are not limited thereto.
In this embodiment mode or example, the steps may be independently combined, arbitrarily combined or exchanged, and the alternative modes or the alternative examples may be arbitrarily combined without contradiction.
Taking the second node as VMR, the first node as VMR-donor, and the third node as AMF as examples, the following is an exemplary description of the above method.
1. VMR AMF selection-VMR provides VMR indication and/or assistance information to the network so that VMR-donor selects the appropriate AMF to register the UE (including the authorization procedure). Wherein the auxiliary information includes information indicating whether the VMR supports a particular function, service, and/or relay mode.
2. The core network may authorize the VMR by:
Mode 1, authorization by function, e.g., gNB-DU function, gNB-CU-UP function, gNB function, UPF function, local Data network function, N3IWF, etc.;
Mode 2, per service authorization, e.g., local service, local SWITCH SERVICE, UP service, CP SERVICE, multi-Access, etc
Mode 3, authorization in a relay manner, e.g., L2 relay, L3 relay, multi-hop, single hop, etc.
3. The node associated with the VMR may obtain authorization information for the VMR from the core network by:
AMF sends VMR authorization information to the donor of VMR through NGAP message;
AMF sends VMR authorization information to VMR through NAS message;
During the handoff or migration process, the source VMR-donor sends VMR grant information to the target VMR-donor via XnAP message.
During a handover or migration, the VMR may send VMR grant information to the target VMR-donor via an RRC message or XnAP message or F1AP message.
Referring now to fig. 6, fig. 6 is an interactive schematic diagram illustrating a method for authorization of VMR according to an embodiment of the disclosure. As shown in fig. 6:
in step S601, the VMR-MT sends an RRC message to the VMR-donor. Wherein the RRC message may include VMR indication and/or assistance information. The VMR indication and/or auxiliary information may be used for AMF selection.
In some embodiments, the RRC message is an RRC setup complete message.
Wherein the auxiliary information may include at least one of the following information:
supported function indications, e.g., gNBonBoard, UPF onboard, CU-UP onboard, DN onboard, N3IWFonboard;
Supported service indications, e.g., localservice, localswitch;
Supported relay methods, for example, L2 relay, L3 relay, multi-hop, signle-hop.
In step S602, the VMR-donor sends an NGAP message to the selected AMF. The NGAP message may include VMR indication and/or auxiliary information received from step 601, where the VMR indication and/or auxiliary information is used by the AMF to initiate a corresponding authorization procedure, so as to obtain VMR authorization information.
In some embodiments, the NGAP message is initialUEmessage messages.
In step S603, the AMF sends an NGAP message to the VMR-donor, where the NGAP message includes VMR grant information, and the VMR-donor determines, according to the VMR grant information, whether the VMR can provide corresponding services and/or transmission mechanisms for other UEs.
In some embodiments, the VMR authorization information is an indication, namely { authorized, not-authorized }.
In other embodiments, the VMR authorization information is authorized by function, i.e., the VMR authorization information includes the authorization of the following functions:
gNB-DU function{authorized,not-authorized}
gNB-CU-UP function{authorized,not-authorized}
gNB function{authorized,not-authorized}
UPF function{authorized,not-authorized}
local Data network function{authorized,not-authorized}
N3IWF{authorized,not-authorized}
In other embodiments, the VMR authorization information is authorized by service, i.e., the VMR authorization information includes the authorization of the following services:
local service{authorized,not-authorized}
local switch service{authorized,not-authorized}
UP service{authorized,not-authorized}
CP service{authorized,not-authorized}
in other embodiments, the VMR grant information is granted in a relay manner, i.e., the VMR grant information includes the following relay manner grants:
L2 relay{authorized,not-authorized}
L3 relay{authorized,not-authorized}
multi-hop{authorized,not-authorized}
single hop{authorized,not-authorized}
In step S604, the AMF sends a NAS message to the VMR. The NGAP message includes VMR authorization information, and the VMR-donor determines whether the VMR can provide corresponding service and/or transmission mechanism for other UEs according to the VMR authorization information. The content of the VMR authorization information is identical to that described in step 603, and will not be described here again.
For example, if the VMR is authorized to provide services to the terminal, X in VMR-X may represent gNB, i.e., VMR-X is VMR-gNB.
In the embodiments of the present disclosure, some or all of the steps and alternative implementations thereof may be arbitrarily combined with some or all of the steps in other embodiments, and may also be arbitrarily combined with alternative implementations of other embodiments.
The embodiments of the present disclosure also provide an apparatus for implementing any of the above methods, for example, an apparatus is provided, where the apparatus includes a unit or a module for implementing each step performed by the terminal in any of the above methods. For another example, another apparatus is also proposed, which includes a unit or module configured to implement steps performed by a network device (e.g., an access network device, a core network function node, a core network device, etc.) in any of the above methods.
It should be understood that the division of each unit or module in the above apparatus is merely a division of a logic function, and may be fully or partially integrated into one physical entity or may be physically separated when actually implemented. Furthermore, the units or modules in the device may be implemented in the form of processor-invoked software, e.g. the device comprises a processor, which is connected to a memory, in which instructions are stored, the processor invoking the instructions stored in the memory for implementing any of the above methods or for implementing the functions of the units or modules of the device, wherein the processor is e.g. a general purpose processor, such as a central processing unit (Central Processing Unit, CPU) or a microprocessor, and the memory is a memory within the device or a memory outside the device. Or the units or modules in the apparatus may be implemented in the form of hardware circuits, where the functions of some or all of the units or modules may be implemented by a design of a hardware circuit, where the hardware circuit may be understood as one or more processors, for example, in one implementation, the hardware circuit is an application-specific integrated circuit (ASIC), the functions of some or all of the units or modules may be implemented by a design of logic relationships between elements within the circuit, and in another implementation, the hardware circuit may be implemented by a programmable logic device (programmable logic device, PLD), where a field programmable gate array (Field Programmable GATE ARRAY, FPGA) may include a number of logic gates, where the connection relationships between the logic gates are configured by a configuration file, so as to implement the functions of some or all of the units or modules. All units or modules of the above device may be realized in the form of invoking software by a processor, or in the form of hardware circuits, or in part in the form of invoking software by a processor, and in the rest in the form of hardware circuits.
In the embodiments of the present disclosure, the processor is a circuit having a signal processing capability, and in one implementation, the processor may be a circuit having an instruction reading and running capability, such as a central processing unit (Central Processing Unit, CPU), a microprocessor, a graphics processor (graphics processing unit, GPU) (which may be understood as a microprocessor), or a digital signal processor (DIGITAL SIGNAL processor, DSP), etc., and in another implementation, the processor may implement a function through a logic relationship of a hardware circuit, where the logic relationship of the hardware circuit is fixed or reconfigurable, for example, the processor is a hardware circuit implemented by an application-specific integrated circuit (ASIC) or a programmable logic device (programmable logic device, PLD), for example, FPGA. In the reconfigurable hardware circuit, the processor loads the configuration document, and the process of implementing the configuration of the hardware circuit may be understood as a process of loading instructions by the processor to implement the functions of some or all of the above units or modules. Furthermore, a hardware circuit designed for artificial intelligence may be also be considered as an ASIC, such as a neural network Processing Unit (Neural Network Processing Unit, NPU), tensor Processing Unit (Tensor Processing Unit, TPU), deep learning Processing Unit (DEEP LEARNING Processing Unit, DPU), and the like.
Fig. 7A is a schematic structural diagram of a communication device according to an embodiment of the present disclosure. The communication device may be used as a first node. As shown in fig. 7A, the communication device 7100 may include at least one of a transceiver module 7101, a processing module 7102, and the like. In some embodiments, the transceiver module is configured to receive a first message sent by a second node, where the first message includes first information of the second node, and send a second message to a third node, where the second message includes the first information, and the second message is used to obtain authorization information of the second node, where the authorization information is used to determine whether the second node is authorized to provide services to a terminal. Optionally, the processing module is configured to select the third node according to the first information. Optionally, the transceiver module is configured to perform at least one of the communication steps (e.g., step S2102, but not limited to the step S), such as transmission and/or reception, performed by the first node in any of the above methods, which is not described herein. Optionally, the processing module is configured to perform at least one of the other steps performed by the first node in any of the above methods, which is not described herein.
Fig. 7B is a schematic structural diagram of a communication device according to an embodiment of the present disclosure. The communication device may be used as a third node. As shown in fig. 7B, the communication device 7200 may include at least one of a transceiver module 7201, a processing module 7202, and the like. In some embodiments, the transceiver module is configured to receive a second message sent by a first node, where the second message includes first information of the second node, and the processing module is configured to obtain authorization information of the second node according to the second message, where the authorization information is used to determine whether the second node is authorized to provide a service to a terminal. Optionally, the processing module is configured to perform at least one of the communication steps (e.g., steps S2103, S2104, but not limited to the steps S2103, S2104) performed by the third node in any one of the above methods, which is not described herein.
Fig. 7C is a schematic structural diagram of a communication device according to an embodiment of the present disclosure. The communication device may be used as a second node. As shown in fig. 7C, the communication device 7300 may include at least one of a transceiver module 7301, a processing module 7302, and the like. In some embodiments, the transceiver module is configured to send a first message to a first node, where the first message includes first information of the second node, and the first message is configured to obtain authorization information of the second node, where the authorization information is used to determine whether the second node is authorized to provide service information to a terminal. Optionally, the processing module is configured to determine a service provided to the terminal according to the authorization information, and provide the service to the terminal. Optionally, the transceiver module is configured to perform at least one of the communication steps (e.g., step S2101, but not limited to the step S2101) of the sending and/or receiving performed by the second node in any of the above methods, which is not described herein. Optionally, the processing module is configured to perform at least one of the other steps (e.g. step S3203, but not limited thereto) performed by the second node in any of the above methods, which is not described herein.
In some embodiments, the transceiver module may include a transmitting module and/or a receiving module, which may be separate or integrated. Alternatively, the transceiver module may be interchangeable with a transceiver.
In some embodiments, the processing module may be a single module or may include multiple sub-modules. Optionally, the plurality of sub-modules perform all or part of the steps required to be performed by the processing module, respectively. Alternatively, the processing module may be interchanged with the processor.
Fig. 8A is a schematic structural diagram of a communication device 8100 according to an embodiment of the present disclosure. The communication device 8100 may be a network device (e.g., an access network device, a core network device, etc.), a terminal (e.g., a user device, etc.), a chip system, a processor, etc. that supports the network device to implement any of the above methods, or a chip, a chip system, a processor, etc. that supports the terminal to implement any of the above methods. The communication device 8100 may be used to implement the method described in the above method embodiments, and reference may be made in particular to the description of the above method embodiments.
As shown in fig. 8A, communication device 8100 includes one or more processors 8101. The processor 8101 may be a general-purpose processor or a special-purpose processor, etc., and may be, for example, a baseband processor or a central processing unit. The baseband processor may be used to process communication protocols and communication data, and the central processor may be used to control communication devices (e.g., base stations, baseband chips, terminal devices, terminal device chips, DUs or CUs, etc.), execute programs, and process data for the programs. The communication device 8100 is configured to perform any of the above methods.
In some embodiments, communication device 8100 also includes one or more memory 8102 for storing instructions. Alternatively, all or part of memory 8102 may be external to communication device 8100.
In some embodiments, communication device 8100 also includes one or more transceivers 8103. When the communication device 8100 includes one or more transceivers 8103, the transceiver 8103 performs at least one of the communication steps (e.g., steps S2103, S2104, but not limited thereto) of the above-described method, and the processor 8101 performs at least one of the other steps (e.g., step S3023, but not limited thereto).
In some embodiments, the transceiver may include a receiver and/or a transmitter, which may be separate or integrated. Alternatively, terms such as transceiver, transceiver unit, transceiver circuit, etc. may be replaced with each other, terms such as transmitter, transmitter circuit, etc. may be replaced with each other, and terms such as receiver, receiving unit, receiver, receiving circuit, etc. may be replaced with each other.
In some embodiments, communication device 8100 may include one or more interface circuits 8104. Optionally, an interface circuit 8104 is coupled to the memory 8102, the interface circuit 8104 being operable to receive signals from the memory 8102 or other device, and being operable to transmit signals to the memory 8102 or other device. For example, the interface circuit 8104 may read instructions stored in the memory 8102 and send the instructions to the processor 8101.
The communication device 8100 in the above embodiment description may be a network device or a terminal, but the scope of the communication device 8100 described in the present disclosure is not limited thereto, and the structure of the communication device 8100 may not be limited by fig. 8A. The communication device may be a stand-alone device or may be part of a larger device. The communication device may be, for example, 1) a stand-alone integrated circuit IC, or chip, or a system or subsystem of chips, (2) a set of one or more ICs, which may optionally also include storage means for storing data, programs, (3) an ASIC, such as a Modem, (4) a module that may be embedded in other devices, (5) a receiver, terminal device, smart terminal device, cellular telephone, wireless device, handset, mobile unit, vehicle-mounted device, network device, cloud device, artificial smart device, etc., (6) and so forth.
Fig. 8B is a schematic structural diagram of a chip 8200 according to an embodiment of the disclosure. For the case where the communication device 8200 may be a chip or a chip system, reference may be made to a schematic structural diagram of the chip 8200 shown in fig. 8B, but is not limited thereto.
The chip 8200 includes one or more processors 8201, the chip 8200 being configured to perform any of the above methods.
In some embodiments, the chip 8200 further comprises one or more interface circuits 8202. Optionally, an interface circuit 8202 is coupled to the memory 8203, the interface circuit 8202 may be configured to receive signals from the memory 8203 or other device, and the interface circuit 8202 may be configured to transmit signals to the memory 8203 or other device. For example, the interface circuit 8202 may read instructions stored in the memory 8203 and send the instructions to the processor 7201.
In some embodiments, the interface circuit 8202 performs at least one of the communication steps (e.g., steps S2103, S2104, but not limited thereto) of the above-described method, and the processor 8201 performs at least one of the other steps (e.g., step S3203, but not limited thereto).
In some embodiments, the terms interface circuit, interface, transceiver pin, transceiver, etc. may be interchanged.
In some embodiments, chip 8200 further includes one or more memories 8203 for storing instructions. Alternatively, all or part of the memory 8203 may be external to the chip 8200.
The present disclosure also proposes a storage medium having stored thereon instructions that, when executed on a communication device 8100, cause the communication device 8100 to perform any of the above methods. Optionally, the storage medium is an electronic storage medium. Alternatively, the storage medium described above is a computer-readable storage medium, but is not limited thereto, and it may be a storage medium readable by other devices. Alternatively, the above-described storage medium may be a non-transitory (non-transitory) storage medium, but is not limited thereto, and it may also be a transitory storage medium.
The present disclosure also proposes a program product which, when executed by a communication device 8100, causes the communication device 8100 to perform any of the above methods. Optionally, the above-described program product is a computer program product.
The present disclosure also proposes a computer program which, when run on a computer, causes the computer to perform any of the above methods.