CN114501487A - Communication transfer method, terminal and network side equipment - Google Patents

Communication transfer method, terminal and network side equipment Download PDF

Info

Publication number
CN114501487A
CN114501487A CN202011271000.7A CN202011271000A CN114501487A CN 114501487 A CN114501487 A CN 114501487A CN 202011271000 A CN202011271000 A CN 202011271000A CN 114501487 A CN114501487 A CN 114501487A
Authority
CN
China
Prior art keywords
transfer
information
allowed
terminal
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011271000.7A
Other languages
Chinese (zh)
Other versions
CN114501487B (en
Inventor
谢振华
柯小婉
杨晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202011271000.7A priority Critical patent/CN114501487B/en
Priority claimed from CN202011271000.7A external-priority patent/CN114501487B/en
Priority to PCT/CN2021/129938 priority patent/WO2022100640A1/en
Publication of CN114501487A publication Critical patent/CN114501487A/en
Application granted granted Critical
Publication of CN114501487B publication Critical patent/CN114501487B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0268Traffic management, e.g. flow control or congestion control using specific QoS parameters for wireless networks, e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a communication transfer method, a terminal and network side equipment, and belongs to the technical field of wireless communication. The method comprises the following steps: the first terminal sends a first communication transfer instruction to the core network function; and/or sending the target transfer information to the second terminal.

Description

Communication transfer method, terminal and network side equipment
Technical Field
The application belongs to the technical field of wireless communication, and particularly relates to a communication transfer method, a terminal and network side equipment.
Background
In the related technology, when a user uses a user terminal such as a smart phone, for example, playing video, playing music, performing online office work, and the like, if a new service such as audio/video call enters, the currently used application (such as video playing, music playing, and the like) of the user is interrupted, and the user experience is affected.
Disclosure of Invention
The embodiment of the application provides a communication transfer method, a terminal and network side equipment, which can solve the problem of terminal application interruption caused by new audio and video entering and improve user experience.
In a first aspect, a method for communication transfer is provided, which is performed by a first terminal, and includes: sending a first communication transfer indication to a core network function; and/or sending the target transfer information to the second terminal.
In a second aspect, a method for communication transfer is provided, which is performed by a second terminal, and includes: sending the second user identification and the first transfer information to the core network function; the first transfer information includes at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of a transfer allowed session; QoS flow identification allowed to be transferred; the business data of the business is allowed to be transferred is matched with the rule; token information for transfer checking.
In a third aspect, a communication transfer method performed by a first core network function is provided, where the method includes: receiving a second user identification and first transfer information sent by a second terminal; sending the second user identification and the second transfer information to a second core network function; wherein the first transfer information comprises at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of allowed transfer sessions; identification of allowed transfer QoS flows; business data matching rules allowing the transfer of business; token information for transfer checking; the second transfer information includes at least one of: the first user identification; an identification of the transfer allowed session; an identification of the transfer allowed QoS flow; the business data of the allowed transfer business is matched with rules.
In a fourth aspect, a communication transfer method performed by a second core network function is provided, the method including: receiving a second user identification and second transfer information; instructing a third core network function to forward target communication data to a second terminal based on the second transfer information, wherein the target communication data is determined according to the second transfer information; the second transfer information includes at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of a transfer allowed session; identification of allowed transfer QoS flows; the traffic data that allows traffic to be diverted matches the rules.
In a fifth aspect, an apparatus for communication transfer is provided, the apparatus comprising: a first sending module, configured to send a first communication transfer instruction to a core network function; and/or sending the target transfer information to the second terminal.
In a sixth aspect, an apparatus for communication transfer is provided, the apparatus comprising: the second sending module is used for sending the second user identification and the first transfer information to the core network function; the first transfer information includes at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of a transfer allowed session; QoS flow identification allowed to be transferred; business data matching rules allowing the transfer of business; token information for transfer checking.
In a seventh aspect, a communication transfer apparatus is provided, where the apparatus includes: the first receiving module is used for receiving a second user identifier and first transfer information sent by a second terminal; a third sending module, configured to send the second user identifier and the second transfer information to a second core network function; wherein the first transfer information comprises at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of a transfer allowed session; identification of allowed transfer QoS flows; business data matching rules allowing the transfer of business; token information for transfer checking; the second transfer information includes at least one of: the first user identification;
an identification of the transfer allowed session; an identification of the transfer allowed QoS flow; the business data of the allowed transfer business is matched with rules.
In an eighth aspect, there is provided a communication transfer apparatus, the apparatus comprising: the second receiving module is used for receiving a second user identification and second transfer information; an indicating module, configured to instruct, based on the second transfer information, a third core network function to forward target communication data to a second terminal, where the target communication data is determined according to the second transfer information; the second transfer information includes at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of a transfer allowed session; identification of allowed transfer QoS flows; the traffic data that allows traffic to be diverted matches the rules.
In a ninth aspect, there is provided a terminal comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the method according to the first or second aspect.
In a tenth aspect, a network-side device is provided, which comprises a processor, a memory, and a program or instructions stored on the memory and executable on the processor, wherein the program or instructions, when executed by the processor, implement the steps of the method according to the third or fourth aspect.
In an eleventh aspect, there is provided a readable storage medium on which a program or instructions are stored, which program or instructions, when executed by a processor, perform the steps of the method according to the first aspect, or the steps of the method according to the second aspect, or the steps of the method according to the third aspect, or the steps of the method according to the fourth aspect.
In a twelfth aspect, a chip is provided, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a network-side device program or instructions to implement the steps of the method according to the first aspect, or implement the steps of the method according to the second aspect, or implement the steps of the method according to the third aspect, or implement the steps of the method according to the fourth aspect.
In a thirteenth aspect, there is provided a computer program product comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions, when executed by the processor, implementing the steps of the method according to the first aspect, or implementing the steps of the method according to the second aspect, or implementing the steps of the method according to the third aspect, or implementing the steps of the method according to the fourth aspect.
In the embodiment of the application, a first terminal sends a first communication transfer instruction to a core network function; and/or sending the target transfer information to the second terminal, so that the core network function forwards the communication data corresponding to the first communication transfer instruction or the target transfer information to the second terminal, thereby avoiding the problem of terminal application interruption caused by new audio and video access, and effectively improving user experience.
Drawings
Fig. 1 is a block diagram of a wireless communication system provided by an exemplary embodiment of the present application.
Fig. 2 is a flowchart illustrating a method for communication transfer according to an exemplary embodiment of the present application.
Fig. 3 is a flowchart illustrating a method for communication transfer according to another exemplary embodiment of the present application.
Fig. 4 is a flowchart illustrating a method for communication transfer according to another exemplary embodiment of the present application.
Fig. 5 is a flowchart illustrating a method for communication transfer according to another exemplary embodiment of the present application.
Fig. 6 is a flowchart illustrating a method for communication transfer according to another exemplary embodiment of the present application.
Fig. 7 is a flowchart illustrating a method for communication transfer according to another exemplary embodiment of the present application.
Fig. 8a is an interaction flow diagram of a communication transfer provided by an exemplary embodiment of the present application.
Fig. 8b is an interaction flow diagram of a communication transfer provided by another exemplary embodiment of the present application.
Fig. 8c is a schematic diagram of a user plane data flow model provided in an exemplary embodiment of the present application.
Fig. 9 is a block diagram of an apparatus for communication transfer provided by an exemplary embodiment of the present application.
Fig. 10 is a block diagram of an apparatus for communication diversion provided in another exemplary embodiment of the present application.
Fig. 11 is a block diagram of an apparatus for communication diversion provided in another exemplary embodiment of the present application.
Fig. 12 is a block diagram of an apparatus for communication diversion provided in another exemplary embodiment of the present application.
Fig. 13 is a block diagram of a terminal provided in an exemplary embodiment of the present application.
Fig. 14 is a block diagram of a network-side device according to an exemplary embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived from the embodiments given herein by a person of ordinary skill in the art are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used are interchangeable under appropriate circumstances such that embodiments of the application can be practiced in sequences other than those illustrated or described herein, and the terms "first" and "second" used herein generally do not denote any order, nor do they denote any order, for example, the first object may be one or more. In addition, "and/or" in the specification and claims means at least one of connected objects, and a character "/" generally means that the former and latter related objects are in an "or" relationship.
It is noted that the techniques described in the embodiments of the present application are not limited to Long Term Evolution (LTE)/LTE-Advanced (LTE-a) systems, but may also be used in other wireless communication systems, such as Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Single-carrier Frequency Division Multiple Access (SC-FDMA), and other systems. The terms "system" and "network" in the embodiments of the present application are often used interchangeably, and the described techniques can be used for both the above-mentioned systems and radio technologies, as well as for other systems and radio technologies. The following description, however, describes a New Radio (NR) system for exemplary purposes, and the NR terminology is used in much of the description below,although these techniques may also be applied to applications other than NR systems applications, such as generation 6 (6)thGeneration, 6G) communication system.
Fig. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network-side device 12. Wherein, the terminal 11 may also be called as a terminal Device or a User Equipment (UE), the terminal 11 may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer) or a notebook Computer, a Personal Digital Assistant (PDA), a palmtop Computer, a netbook, a super-Mobile Personal Computer (UMPC), a Mobile Internet Device (MID), a Wearable Device (Wearable Device) or a vehicle-mounted Device (VUE), a pedestrian terminal (PUE), and other terminal side devices, the Wearable Device includes: bracelets, earphones, glasses and the like. It should be noted that the embodiment of the present application does not limit the specific type of the terminal 11. The network-side device 12 may be a Base Station or a core network, where the Base Station may be referred to as a node B, an evolved node B, an access Point, a Base Transceiver Station (BTS), a radio Base Station, a radio Transceiver, a Basic Service Set (BSS), an Extended Service Set (ESS), a node B, an evolved node B (eNB), a home node B, a WLAN access Point, a WiFi node, a Transmit Receiving Point (TRP), or some other suitable terminology in the field, as long as the same technical effect is achieved, the Base Station is not limited to a specific technical vocabulary, and it should be noted that, in the embodiment of the present application, only the Base Station in the NR system is taken as an example, but a specific type of the Base Station is not limited.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
As shown in fig. 2, a flowchart of a method 200 for communication transfer provided in an exemplary embodiment of the present application is shown, where the method 200 may be executed by, but not limited to, a first terminal, and in particular may be executed by software and/or hardware installed in the first terminal, and the method may include at least the following steps.
S210, sending a first communication transfer instruction to a core network function; and/or sending the target transfer information to the second terminal.
The core network Function may be, but is not limited to, an Access and Mobility Management Function (AMF), a Session Management Function (SMF), a User Plane Management Function (UPF), and the like. The first communication transfer indication is used to indicate service-related information that a core network function needs to be transferred, and correspondingly, the first transfer indication may carry the service-related information that needs to be transferred, such as terminal identification information indicating which Protocol Data Unit (PDU) sessions can be transferred, indicating that transfer is allowed, indicating which terminals can transfer the PDU sessions, and the like.
Illustratively, as a possible implementation manner, the first communication transfer indication may carry at least one of the following (1) - (5).
(1) And a transfer permission instruction (IuT instruction) for instructing the core network function to perform a transfer operation, such as transferring communication data addressed to the first terminal to the second terminal, and avoiding interruption of a service being started by the first terminal, such as video playing, music playing, and the like.
(2) And identification of allowed transfer session, such as IuT session, and the like, which is used for carrying the service needing to be transferred.
(3) The identification of Quality of Service (QoS) flows is allowed to be transferred.
(4) And the business data matching rules allow the business to be transferred, wherein the business data matching rules are used for determining/filtering the communication data needing to be transferred, such as the communication data corresponding to the unimportant incoming calls.
(5) And transferring the authorization information. The transfer authorization information may include one or more user identities, where the one or more user identities include at least a first user identity corresponding to the first terminal allowed to be transferred and/or a second user identity corresponding to a second terminal allowed to accept transfer.
In one implementation, the first communication transfer indication may be sent when the first terminal requests the core network function to establish a PDU Session, or may be carried in a PDU Session Establishment (PDU Session Establishment) message and sent to the core network function. It is to be understood that the PDU session is used for transmitting data between the first terminal and the core network.
The target transfer information is used for indicating the service related information that the second terminal needs to transfer, and enabling the second terminal to initiate a communication transfer process to a core network function based on the target transfer information. The target transfer information may be sent by the first terminal to the second terminal, or may be fed back to the second terminal after the first terminal receives a service information request sent by the second terminal, which is not limited in this embodiment.
Illustratively, the target transition information may include at least one of the following (1) - (7).
(1) A first user identification.
(2) And the Application (Application) information allowing the service to be transferred is used for the second terminal to start an Application program corresponding to the Application information and used for receiving the transfer information.
(3) Allowing cookie information corresponding to the transfer service;
(4) allowing the identification of the session to be transferred.
(5) Identification of QoS flows allowed to be transferred.
(6) The traffic data of the allowed transfer traffic matches the rules, for example, the flow information that needs the transfer operation generally includes information such as source address, source port, destination address, destination port, protocol type, and so on.
(7) Token information for transfer checking. The token information may be generated based on a secret key shared between the first terminal and the core network function, or may be generated based on a private key of the first terminal, which is not limited in this embodiment.
In one implementation, the first terminal and the second terminal may implement data (e.g., target service information) transmission based on near field communication, for example, a Sidelink technology, a Wifi technology, a bluetooth technology, or the like.
Based on the foregoing description, the communication transfer flow is briefly explained below.
When a user watches a video through a first terminal such as a mobile phone, the user does not want to interrupt the video playing by an unimportant incoming call, then the mobile phone receives an IMS call request, does not ring the unimportant incoming call according to an incoming call filtering rule, but requests a second terminal (such as a watch and the like) to divide a user plane of a telephone service onto the watch, and answers the call through the watch ringing, and has application synchronization requirements.
In the foregoing embodiment, the first terminal transmits the first communication transfer indication to the core network function; and/or the first terminal sends the target transfer information to the second terminal, so that the core network function forwards the communication data corresponding to the first communication transfer indication or the target transfer information to the second terminal, thereby avoiding the problem of interruption of the current terminal application on the first terminal caused by new audio and video entering, and effectively improving the user experience.
As shown in fig. 3, a flowchart of a method 300 for communication transfer provided in an exemplary embodiment of the present application is shown, where the method 300 may be, but is not limited to being, executed by a second terminal, and in particular may be executed by software and/or hardware installed in the second terminal, and the method 300 may include at least the following steps.
S310, the second user identification and the first transfer information are sent to the core network function.
Wherein the core network function may be, but is not limited to, AMF, SMF, UPF, etc. The second subscriber identity may be an identity of a second terminal that receives a communication transfer, where the first transfer information is used to instruct a core network function to transfer a service that needs to be transferred on the first terminal to the second terminal, and in this embodiment, the first transfer information includes at least one of the following (1) to (5).
(1) And the first user identification is a user identification corresponding to the first terminal.
(2) Allowing the identification of the session to be transferred.
(3) QoS flow identification for transfer is allowed.
(4) The traffic data that allows traffic to be diverted matches the rules.
(5) Token information for transfer checking.
The detailed descriptions of (1) - (5) may refer to the related description in S210, and are not repeated herein to avoid repetition.
It should be noted that the first terminal and the second terminal may belong to the same AMF, or may belong to different AMFs, such as AMF1 and AMF2, then, if the first terminal and the second terminal belong to different AMFs, that is, the first terminal belongs to AMF1, and the second terminal belongs to AMF2, then the implementation process of S310 may include: and the second terminal sends the second subscriber identity and the first transfer information to the AMF2, and then the AMF2 forwards the second subscriber identity and the first transfer information to other functions in the core network function, so as to transfer the service to be transferred on the first terminal to the first terminal.
In addition, when the second terminal sends the first transfer information to the core network function, the second terminal may also send a PDU Session Establishment message or a PDU Session activation message to the core network function, for example, send a Service Request message or a PDU Session Establishment message to establish a PDU Session, so as to implement data transmission between the second terminal and the core network, for example, communication data to be transferred.
In this embodiment, the second terminal forwards the second user identifier and the first transfer information to the core network function, so that the core network function forwards the communication data corresponding to the first transfer information and the second user identifier to the second terminal, thereby avoiding the problem of terminal application interruption caused by new audio and video access, and effectively improving user experience.
As shown in fig. 4, a flowchart of a method 400 for communication transfer provided in an exemplary embodiment of the present application is shown, where the method 400 may be executed by, but not limited to, a second terminal, and in particular may be executed by software and/or hardware installed in the second terminal, and the method may include at least the following steps.
S410, receiving the target transfer information sent by the first terminal.
Wherein the target transfer information includes at least one of the following (1) to (7).
(1) A first user identification;
(2) application information allowing transfer of a service;
(3) allowing cookie information corresponding to the transfer service;
(4) an identification of a transfer allowed session;
(5) identification of allowed transfer QoS flows;
(6) business data matching rules allowing the transfer of business;
(7) token information for transfer checking.
The detailed description of the target migration information may refer to the related description in S210, and is not repeated herein to avoid repetition.
S420, sending the second subscriber identity and the first transfer information to the core network function.
For the specific implementation process in S420, reference may be made to the foregoing detailed description of S310, and details are not repeated herein in order to avoid repetition. In addition, it may be understood that the first transfer information may be determined based on the target transfer information, or may be determined based on preconfigured transfer information, which is not limited herein.
In this embodiment, the second terminal sends the second subscriber identity and the first forwarding information to the core network function based on the target forwarding information sent by the first terminal, which can further ensure that the communication forwarding process is performed reliably.
As shown in fig. 5, a flowchart of a method 500 for communication transfer provided in an exemplary embodiment of the present application is shown, where the method 500 may be, but is not limited to being, performed by a first core network function, which may be, but is not limited to, AMF, or the like, and the method 500 may include at least the following steps.
And S510, receiving a second user identification and first transfer information sent by a second terminal.
Wherein the first transfer information includes at least one of the following (1) - (5).
(1) The first user identification is a user identification corresponding to the first terminal;
(2) allowing the identification of the session to be transferred.
(3) The identification of QoS flows is allowed to be transferred.
(4) The traffic data that allows traffic to be diverted matches the rules.
(5) Token information for transfer checking.
For the first transfer information, reference may be made to the related description in S310, and details are not repeated here.
S520, the second user identification and the second transfer information are sent to a second core network function.
In this embodiment, the second transfer information is used to instruct the second core network function (such as SMF, etc.) to forward communication data corresponding to the second transfer to the second terminal, where the second transfer information includes at least one of the following (1) - (4).
(1) The first user identification.
(2) An identification of the allowed transfer session.
(3) The identification of the allowed transfer QoS flows.
(4) The business data of the allowed transfer business is matched with rules.
In this embodiment, when receiving the second subscriber identity and the first transfer information, the first core network function sends the second transfer information and the second subscriber identity to the second core network function to instruct the second core network function to forward the communication data corresponding to the second transfer to the second terminal, so that the problem of terminal application interruption caused by new audio and video access can be avoided, and user experience is effectively improved.
As shown in fig. 6, a flowchart of a method 600 for communication transfer provided in an exemplary embodiment of the present application is shown, where the method 600 may be, but is not limited to being, performed by a first core network function, which may be, but is not limited to, AMF, or the like, and the method 600 may include at least the following steps.
S610, receiving a second user identification and first transfer information sent by a second terminal.
For the specific implementation process of S610, reference may be made to the related description in S510, and for avoiding repetition, details are not described herein,
s620, sending the second transfer information to a second core network function under the condition that the transfer is allowed.
In order to ensure reliability of the transfer process, after receiving the first transfer information, the first core network function may check whether the transfer needs to be allowed based on the context corresponding to the first transfer information and the first subscriber identity, and in a possible implementation manner, the transfer may be allowed in a case that at least one of the following (1) to (7) is satisfied.
(1) And the subscription information of the first user identification meets the preset subscription information. The predetermined subscription information may be configured in a predetermined manner and stored in the first core network function, and the type of the predetermined subscription information and the like are not limited herein.
(2) And the session type corresponding to the session identification in the first transfer information meets a preset session type.
(3) Verifying that the token information is successful based on the context of the first user identifier;
(4) the context corresponding to the first user identification contains an indication of permission to transfer.
(5) The identifier of the session allowed to be transferred, which is contained in the context corresponding to the first user identifier, contains the session identifier in the second transfer information.
(6) The identifier of the allowed transfer QoS flow included in the context corresponding to the first user identifier includes the QoS flow identifier in the second transfer information.
(7) And the matching rule of the business data allowed to be transferred contained in the context corresponding to the first user identification covers the business data matching rule in the second transfer information.
It is understood that, in the actual verification process, the verification process may be configured based on any one of the foregoing (1) to (7), but is not limited thereto. In addition, in case at least one of the above is not satisfied, it may be determined that the transfer is not allowed, and a check result is fed back to the second terminal.
In one implementation, assuming that the first core network function is AMF and the second core network function is SMF, then, in the case that the first terminal and the second terminal belong to different first core network functions, that is, the first terminal corresponds to the core network functions AMF1 and SMF1, and the second terminal corresponds to the core network functions AMF2 and SMF2, then, when receiving the second subscriber identity and the first handover information sent by the second terminal, the AMF2, may send transfer verification information to AMF1, AMF1 performs verification based on the foregoing (1) - (7), if the check is passed (the transfer is allowed), the AMF1 feeds back the context corresponding to the first subscriber identity to the AMF2 (or, the AMF1 directly feeds back the context corresponding to the first subscriber identity to the AMF2 without performing the check), the AMF2 sends second transfer information to the SMF2, to enable communication data transfer between the first terminal and the second terminal through interaction between SMF2 and SMF 1.
In this embodiment, the first core network function can further improve the reliability of the communication transfer process by checking the transfer process.
As shown in fig. 7, a flowchart of a method 700 for communication transfer provided in an exemplary embodiment of the present application is shown, where the method 700 may be, but is not limited to being, performed by a second core network function, which may be, but is not limited to being, SMF, or the like, and the method 700 may include at least the following steps.
S710, receiving a second user identification and second transfer information.
Wherein the second transfer information includes at least one of the following (1) to (4).
(1) The first user identification is a user identification corresponding to the first terminal;
(2) allowing the identification of the session to be transferred.
(3) The identification of QoS flows is allowed to be transferred.
(4) The traffic data that allows traffic to be diverted matches the rules.
For a detailed description of the second transition information, reference may be made to the related description in the foregoing S520, and details are not repeated herein for avoiding redundancy.
In one implementation manner, assuming that the first core network function is AMF and the second core network function is SMF, and in a case that the first terminal and the second terminal belong to different first core network functions, that is, the first terminal corresponds to AMF1 and SMF1, and the second terminal corresponds to AMF2 and SMF2, the implementation process of S710 may include that SMF2 receives the second subscriber identity and the second relocation information sent by AMF2 or SMF 1.
S720, the third core network function is instructed to forward the target communication data to the second terminal based on the second transfer information.
The third core network function may be UPF, and the target communication data is determined according to the second transfer information.
As a possible implementation, the second core network function indicates at least one of the following through S720:
(1) and indicating the third core network function to mark the data stream corresponding to the first subscriber identity, wherein the mark is used for indicating that the target communication data is sent to the second terminal.
(2) And indicating the third core network function to mark the data stream corresponding to the identifier of the allowed transfer session, wherein the mark is used for indicating that the target communication data is sent to the second terminal.
(3) And indicating the third core network function to mark the data flow corresponding to the QoS flow transfer permission identification, wherein the mark is used for indicating that the target communication data is sent to the second terminal.
(4) And indicating the third core network function mark to meet the data flow of the service data matching rule, wherein the mark is used for indicating that the target communication data is sent to the second terminal.
In this embodiment, the second core network function instructs the third core network function to forward the target communication data corresponding to the second transfer information to the second terminal according to the received second user identifier and the second transfer information, so that the problem of terminal application interruption caused by new audio and video access can be avoided, and user experience is effectively improved.
Based on the foregoing description of the communication transfer method, the interaction flow involved in the communication transfer process is described below with reference to fig. 8a, 8b, and 8 c.
As shown in fig. 8a, assuming that the core network functions include a first core network function (e.g., AMF), a second core network function (e.g., SMF), and a third core network function (e.g., UPF, etc.), and the first terminal (UE1) and the second terminal (UE2) belong to the same AMF, the interaction flow involved in the communication transfer process includes the following steps.
(1) The UE1 sends a PDU session setup message to the AMF, and the AMF forwards a PDU session setup request to the SMF to establish a PDU session between the UE1 and the core network, and the procedure for establishing the PDU session is not described herein;
(2) the UE1 sending a first communication transfer indication (i.e., the IuT indication) to the AMF and target transfer information to the UE 2;
(3) the UE2 sends a second user identification and first transfer information to the AMF, wherein the first transfer information is determined according to the target transfer information;
in addition, the UE2 may also send a PDU session setup message or a PDU session activation message to the AMF;
(4) the AMF checks whether the transfer is allowed;
(5) and in the case of allowing the transfer, the AMF sends a second user identification and second transfer information to the SMF.
(6) The SMF instructs the UPF to forward the target communication data to the UE2 based on the second transfer information.
(7) The UPF forwards the target communication data to the UE 2.
It should be noted that the flow of the communication transfer may include, but is not limited to, all or part of the steps in (1) to (7) above, and in addition, for detailed descriptions of (1) to (7), reference may be made to the detailed descriptions in the foregoing embodiments of the methods, and in order to avoid repetition, details are not described here again.
As shown in fig. 8b, assuming that the core network functions include a first core network function (e.g., AMF), a second core network function (e.g., SMF) and a third core network function (e.g., UPF), and the first terminal (UE1) and the second terminal (UE2) belong to different AMFs, that is, the first terminal corresponds to AMF1, SMF2 and UPF1, and the second terminal corresponds to AMF2, SMF2 and UPF2, the interaction flow involved in the communication transfer process may include the following steps.
(1) UE1 sends a PDU session setup message to AMF1 and a first communication transfer indication (i.e., IuT indication) to AMF1, AMF1 forwards the PDU session setup message to SMF1, a PDU session is created with UE1 by SMF 1;
(2) the UE1 sends target transfer information to the UE 2;
(3) the UE2 sends a PDU session establishment request or a PDU session activation request to the AMF2, and the SMF2 creates a PDU session or activates the PDU session;
(4) the UE2 sends the first transfer information and the second subscriber identity to the AMF2 according to the target transfer information.
(5) The AMF2 sends a transfer check request to the AMF1 upon receiving the second subscriber identity and the first transfer information.
(6) The AMF1 feeds back context to the AMF 2; alternatively, the first and second electrodes may be,
the AMF1 checks the transfer check request, and feeds back context to the AMF2 in case of passing the check (i.e. allowing transfer);
(7) the AMF2 sends the second subscriber identity and the second transfer information to the SMF 2;
(8) when receiving the second user identifier and the second transfer information sent by the AMF2, the SMF2 establishes an uplink transmission channel between the SMF2 and the UPF 2;
(9) SMF2 sends communication transfer information to SMF 1;
(10) when receiving an uplink receiving address and communication transfer information corresponding to the UPF2, the SMF1 establishes a data uplink channel between the SMF1 and the UPF1 and sends a resource transfer instruction to the UPF 1;
(11) the SMF1 sends an uplink receiving address corresponding to the UPF1 to the SMF2 to establish an uplink channel of the UE 2;
(12) the AMF2 performs data interaction with the UE2 through the base station system to acquire a downlink receiving address of the base station system to which the UE2 belongs, and sends the downlink receiving address of the base station system to the SMF 2;
(13) the SMF2 interacts with the UPF2 to establish a downlink channel based on a downlink receiving address of the base station system;
(14) the SMF2 sends a downlink receiving address corresponding to the UPF2 to the SMF 1;
(15) the SMF1, upon identifying communication data to be transferred according to the transfer information, sends the transfer data to the UPF 1;
(16) UPF1 forwards UPF2 downstream recipient address based on UPF2
(17) The UPF2 forwards the transfer data to the UE2 based on the downlink receiving address of the base station system to which the UE2 belongs;
(18) after the transfer is completed, SMF1 sends a transfer complete message to SMF 2;
(19) SMF2 sends a transfer complete message to AMF 2;
(20) the AMF2, upon receiving the transfer completion acknowledgement message from the SMF2, the AMF2 notifies the AMF1 of the completion of the transfer;
(21) the AMF1 may release resources for transferring the transferred data, such as releasing IuT session resources or modifying IuT session resources.
It should be noted that the flow of the communication transfer may include, but is not limited to, all or part of the steps in (1) - (21) above, and in addition, for detailed description of (1) - (21), reference may be made to the detailed description in the foregoing embodiments of the methods, and details are not described here again.
Further, with reference to fig. 8c, in the communication transfer interaction flow (including the transfer process and after the transfer is completed) given by the foregoing method embodiments, the Application Service (AS) always considers that UE1 interacts with the terminal UE of subscriber 1 (USIM card owner on UE1) (IP addresses are both IP addresses of UE1), but actually interacts with AS11 … … AS1n, namely, UE2 (the network distinguishes between one UPF of PDU session of UE1 or UE2 and one tunnel of gb 1, or between PDU session of UE1), and AS21 … … AS2m interacts with UE2 (the network distinguishes between one UPF of PDU session of UE1 or UE2 and gb 2, or between PDU session of UE2), while UE 5 may have its own subscribed card, and the USIM card owner on UE2 may perform the service expression of UE2 (USIM 2) independently from the UE 2). In the user plane, for two UEs (or multiple UEs), two PDU sessions may be used, or one PDU session has two tunnels to different gnbs. There may be one more UPF between the UPF and the gNB, i.e. the tunnel may be segmented. In a special case, the gNB1 and the gNB2 are the same gNB.
Note that a1 in fig. 8c represents Data Radio Bearers (DRBs) corresponding to the UE1, a2 represents DR Bs, B1 and B2 corresponding to the UE2 represent PDU session tunnels (tunnels).
It should be noted that, in the method 200-700 for transferring a communication device provided in the embodiment of the present application, the execution main body may be a device for transferring a communication device, or a control module for executing the method for transferring a communication device in the device for transferring a communication device. In the following section, the embodiments of the present application take a method for a device for transferring a communication device to perform a transfer of a communication device as an example, and describe the device for transferring a communication device provided in the embodiments of the present application.
As shown in fig. 9, a block diagram of an apparatus 900 for communication transfer according to an exemplary embodiment of the present application is provided, where the apparatus for communication transfer includes a first sending module 910, configured to send a first communication transfer indication to a core network function; and/or sending the target transfer information to the second terminal.
As a possible implementation manner in the present application, the first communication transfer indication carries at least one of the following: an allow transfer indication; an identification of a transfer allowed session; identification of allowed transfer QoS flows; business data matching rules allowing the transfer of business; and transferring the authorization information.
As a possible implementation manner in this application, the transfer authorization information includes one or more user identifiers, where the one or more user identifiers at least include a first user identifier corresponding to the first terminal allowed to be transferred and/or a second user identifier corresponding to a second terminal allowed to accept transfer.
As a possible implementation manner in the present application, the target transfer information includes at least one of the following: a first user identification; application information allowing transfer of a service; allowing cookie information corresponding to the transfer service; an identification of a transfer allowed session; identification of QoS flows allowed to be transferred; business data matching rules allowing the transfer of business; token information for transfer checking.
In the foregoing embodiment, the first terminal transmits the first communication transfer indication to the core network function; and/or sending the target transfer information to the second terminal, so that the core network function forwards the communication data corresponding to the first communication transfer instruction or the target transfer information to the second terminal, thereby avoiding the problem of terminal application interruption caused by new audio and video access, and effectively improving user experience.
As shown in fig. 10, a block diagram of an apparatus 1000 for communication forwarding according to an exemplary embodiment of the present application is provided, where the apparatus for communication forwarding includes a second sending module 1010, configured to send a second subscriber identity and first forwarding information to a core network function; the first transfer information includes at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of a transfer allowed session; QoS flow identification allowed to be transferred; business data matching rules allowing the transfer of business; token information for transfer checking.
As a possible implementation manner in this application, the apparatus further includes: a first receiving module 1020, configured to receive the target transfer information sent by the first terminal; the target transfer information includes at least one of: a first user identification; application information allowing transfer of a service; allowing cookie information corresponding to the transfer service; an identification of a transfer allowed session; identification of allowed transfer QoS flows; business data matching rules allowing the transfer of business; token information for transfer checking.
In this embodiment, the second terminal forwards the second user identifier and the first transfer information to the core network function, so that the core network function forwards the communication data corresponding to the first transfer information and the second user identifier to the second terminal, thereby avoiding the problem of terminal application interruption caused by new audio and video access, and effectively improving user experience.
As shown in fig. 11, a block diagram of an apparatus for communication transfer provided in an exemplary embodiment of the present application is shown, where the apparatus for communication transfer includes a second receiving module 1110, configured to receive a second subscriber identity and first transfer information sent by a second terminal; a third sending module 1120, configured to send the second subscriber identity and the second transfer information to a second core network function; wherein the first transfer information comprises at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of a transfer allowed session; identification of allowed transfer QoS flows; business data matching rules allowing the transfer of business; token information for transfer checking;
the second transition information includes at least one of: the first user identification; an identification of the transfer allowed session; an identification of the transfer allowed QoS flow; the business data of the allowed transfer business is matched with rules.
As a possible implementation manner in this application, the apparatus further includes: the third sending module is configured to execute the step of sending the second transfer information to the second core network function when the transfer is allowed.
As a possible implementation manner in the present application, the transfer is determined to be allowed in a case where at least one of the following is satisfied: the subscription information of the first user identification meets the preset subscription information; the session type corresponding to the session identification in the first transfer information meets a preset session type; verifying that the token information is successful based on the context of the first user identifier; the context corresponding to the first user identification contains a transfer permission indication; the context corresponding to the first user identifier contains the identifier of the session allowed to be transferred, wherein the identifier of the session in the second transfer information is contained in the context corresponding to the first user identifier; the context corresponding to the first user identification contains the identification of the QoS flow allowed to be transferred, wherein the identification of the QoS flow allowed to be transferred contains the QoS flow identification in the second transfer information; and the matching rule of the business data allowed to be transferred contained in the context corresponding to the first user identification covers the business data matching rule in the second transfer information.
In this embodiment, when receiving the second subscriber identity and the first transfer information, the first core network function sends the second transfer information and the second subscriber identity to the second core network function to instruct the second core network function to forward the communication data corresponding to the second transfer to the second terminal, so that the problem of terminal application interruption caused by new audio and video access can be avoided, and user experience is effectively improved.
As shown in fig. 12, which is a block diagram of an apparatus 1200 for communication transfer provided in an exemplary embodiment of the present application, the apparatus 1200 for communication transfer includes a third receiving module 1210 for receiving a second subscriber identity and second transfer information; an indicating module 1220, configured to instruct, based on the second transfer information, a third core network function to forward target communication data to a second terminal, where the target communication data is determined according to the second transfer information; the second transfer information includes at least one of: the first user identification is a user identification corresponding to the first terminal; an identification of a transfer allowed session; identification of allowed transfer QoS flows; the traffic data that allows traffic to be diverted matches the rules.
As a possible implementation manner in this application, the indication module is configured to at least one of: instructing the third core network function to mark the data stream corresponding to the first subscriber identity, where the mark is used to instruct to send the target communication data to the second terminal; indicating the third core network function to mark the data stream corresponding to the identifier of the allowed transfer session, where the mark is used to indicate that the target communication data is sent to the second terminal; indicating the third core network function to mark the data stream corresponding to the identifier of the QoS flow allowed to be transferred, wherein the mark is used for indicating that the target communication data is sent to the second terminal; and indicating the third core network function mark to meet the data flow of the service data matching rule, wherein the mark is used for indicating that the target communication data is sent to the second terminal.
In this embodiment, the second core network function instructs, according to the received second user identifier and the second transfer information, the third core network function to forward the target communication data corresponding to the second transfer information to the second terminal, so that the problem of terminal application interruption caused by new audio/video access can be avoided, and user experience is effectively improved.
The apparatus for communication transfer in the foregoing embodiments may be an apparatus, and may also be a component, an integrated circuit, or a chip in a terminal. The device can be a mobile terminal or a non-mobile terminal. By way of example, the mobile terminal may include, but is not limited to, the above-listed type of terminal 11, and the non-mobile terminal may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a kiosk, or the like, and the embodiments of the present application are not limited in particular.
The device for communication transfer in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The device for communication transfer provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 2 to 7, 8a, 8b, and 8c, and achieve the same technical effect, and is not described herein again to avoid repetition.
Fig. 13 is a schematic diagram of a hardware structure of a terminal for implementing the embodiment of the present application.
The terminal 1300 includes but is not limited to: a radio frequency unit 1301, a network module 1302, an audio output unit 1303, an input unit 1304, a sensor 1305, a display unit 1306, a user input unit 1307, an interface unit 1308, a memory 1309, a processor 1310, and the like.
Those skilled in the art will appreciate that terminal 1300 may further include a power supply (e.g., a battery) for supplying power to various components, which may be logically connected to processor 1310 via a power management system, thereby performing functions such as managing charging, discharging, and power consumption via the power management system. The terminal structure shown in fig. 13 does not constitute a limitation of the terminal, and the terminal may include more or less components than those shown, or combine some components, or have a different arrangement of components, and thus will not be described again.
It should be understood that in the embodiment of the present application, the input Unit 1304 may include a Graphics Processing Unit (GPU) 1041 and a microphone 13042, and the Graphics processor 13041 processes image data of still pictures or videos obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The display unit 1306 may include a display panel 13061, and the display panel 13061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1307 includes a touch panel 13071 and other input devices 13072. A touch panel 13071, also referred to as a touch screen. The touch panel 13071 may include two parts, a touch detection device and a touch controller. Other input devices 13072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
In this embodiment of the application, the radio frequency unit 1301 receives downlink data from a network side device and then processes the downlink data to the processor 1310; in addition, the uplink data is sent to the network side equipment. In general, radio unit 1301 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
Memory 1309 may be used to store software programs or instructions as well as various data. The memory 1309 may mainly include a stored program or instruction area and a stored data area, wherein the stored program or instruction area may store an operating system, an application program or instruction (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the Memory 1309 can include a high-speed random access Memory, and can also include a nonvolatile Memory, where the nonvolatile Memory can be a Read-Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), or a flash Memory. Such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
Processor 1310 may include one or more processing units; alternatively, the processor 1310 may integrate an application processor, which mainly handles operating systems, user interfaces, and applications or instructions, etc., and a modem processor, which mainly handles wireless communications, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into processor 1310.
The processor 1310 is configured to call an instruction or a program in the memory 1309 to execute the method executed by each module shown in fig. 9 or fig. 10, and achieve the same technical effect, and is not described herein for avoiding repetition.
As shown in fig. 14, an embodiment of the present application further provides a network-side device 140, where the network device 140 includes: antenna 141, radio frequency device 142, baseband device 143. The antenna 141 is connected to the radio frequency device 142. In the uplink direction, the rf device 142 receives information through the antenna 141 and transmits the received information to the baseband device 143 for processing. In the downlink direction, the baseband device 143 processes information to be transmitted and transmits the processed information to the rf device 142, and the rf device 142 processes the received information and transmits the processed information through the antenna 141.
The above-mentioned band processing means may be located in the baseband device 143, and the method performed by the network side device in the above embodiment may be implemented in the baseband device 143, where the baseband device 143 includes the processor 144 and the memory 145.
The baseband device 143 may include, for example, at least one baseband board, on which a plurality of chips are disposed, as shown in fig. 14, wherein one of the chips, for example, the processor 144, is connected to the memory 145 to call the program in the memory 145 to perform the network device operation shown in the above method embodiment.
The baseband device 143 may further include a network interface 146 for exchanging information with the radio frequency device 142, for example, a Common Public Radio Interface (CPRI).
Specifically, the network side device in the embodiment of the present application further includes: the instructions or programs stored in the memory 145 and capable of being executed on the processor 144, and the processor 144 invokes the instructions or programs in the memory 145 to execute the methods executed by the modules shown in fig. 11 or fig. 12, and achieve the same technical effects, which are not described herein in detail to avoid repetition.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the method for communication transfer, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
Wherein, the processor is the processor in the terminal described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a network-side device program or an instruction, to implement each process of the method embodiment of the communication transfer, and achieve the same technical effect, and in order to avoid repetition, the details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip or a system-on-chip, etc.
The embodiment of the present application further provides a computer program product, where the computer program product includes a processor, a memory, and a program or an instruction stored in the memory and executable on the processor, and when the program or the instruction is executed by the processor, the process of the method embodiment of communication transfer is implemented, and the same technical effect can be achieved, and details are not repeated here to avoid repetition.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (25)

1. A method of communication transfer, performed by a first terminal, the method comprising:
sending a first communication transfer indication to a core network function; and/or the presence of a gas in the gas,
and sending the target transfer information to the second terminal.
2. The method of claim 1, wherein the first communication transfer indication carries at least one of:
an allow transfer indication;
an identification of a transfer allowed session;
identification of allowed transfer quality of service, QoS, flows;
the business data of the business is allowed to be transferred is matched with the rule;
and transferring the authorization information.
3. The method according to claim 2, wherein the transfer authorization information includes one or more subscriber identities, and the one or more subscriber identities include at least a first subscriber identity corresponding to the first terminal allowed to be transferred and/or a second subscriber identity corresponding to a second terminal allowed to accept the transfer.
4. The method of claim 1, wherein the target transfer information comprises at least one of:
a first user identification;
application information allowing transfer of a service;
allowing cookie information corresponding to the transfer service;
an identification of allowed transfer sessions;
identification of quality of service, QoS, flows allowed to be transferred;
business data matching rules allowing the transfer of business;
token information for transfer checking.
5. A method of communication transfer, performed by a second terminal, the method comprising:
sending the second user identification and the first transfer information to the core network function;
the first transfer information includes at least one of:
the first user identification is a user identification corresponding to the first terminal;
an identification of a transfer allowed session;
a quality of service, QoS, flow identification to allow transfer;
the business data of the business is allowed to be transferred is matched with the rule;
token information for transfer checking.
6. The method of claim 5, wherein prior to sending the second subscriber identity and the first forwarding information to the core network function, the method further comprises:
receiving target transfer information sent by the first terminal; the target transfer information includes at least one of:
a first user identification;
application information allowing transfer of a service;
allowing cookie information corresponding to the transfer service;
an identification of a transfer allowed session;
identification of allowed transfer QoS flows;
business data matching rules allowing the transfer of business;
token information for transfer checking.
7. A method of communication transfer performed by a first core network function, the method comprising:
receiving a second user identification and first transfer information sent by a second terminal;
sending the second user identification and the second transfer information to a second core network function;
wherein the first transfer information comprises at least one of:
the first user identification is a user identification corresponding to the first terminal;
an identification of a transfer allowed session;
identification of allowed transfer quality of service, QoS, flows;
business data matching rules allowing the transfer of business;
token information for transfer checking;
the second transition information includes at least one of:
the first user identification;
an identification of the transfer allowed session;
an identification of the transfer allowed QoS flow;
the business data of the allowed transfer business is matched with rules.
8. The method of claim 7, wherein said sending the second transfer information to a second core network function comprises:
and sending the second transfer information to a second core network function under the condition that the transfer is allowed.
9. The method of claim 8, wherein the determination to allow the transfer is made if at least one of:
the subscription information of the first user identification meets the preset subscription information;
the session type corresponding to the session identification in the first transfer information meets a preset session type;
verifying that the token information is successful based on the context of the first user identifier; the context corresponding to the first user identification contains a transfer permission indication;
the context corresponding to the first user identifier contains the identifier of the session allowed to be transferred, wherein the identifier of the session in the second transfer information is contained in the context corresponding to the first user identifier;
the context corresponding to the first user identifier contains the identifier of the QoS flow allowed to be transferred, wherein the identifier of the QoS flow in the second transfer information is contained in the context corresponding to the first user identifier;
and the matching rule of the business data allowed to be transferred contained in the context corresponding to the first user identification covers the business data matching rule in the second transfer information.
10. A method of communication transfer performed by a second core network function, the method comprising:
receiving a second user identification and second transfer information;
instructing a third core network function to forward target communication data to a second terminal based on the second transfer information, wherein the target communication data is determined according to the second transfer information;
the second transfer information includes at least one of:
the first user identification is a user identification corresponding to the first terminal;
an identification of a transfer allowed session;
identification of allowed transfer quality of service, QoS, flows;
the traffic data that allows traffic to be diverted matches the rules.
11. The method of claim 10, wherein the instructing the third core network function to forward the target communication data to the second terminal based on the second forwarding information comprises at least one of:
instructing the third core network function to mark the data stream corresponding to the first subscriber identity, where the mark is used to instruct to send the target communication data to the second terminal;
indicating the third core network function to mark the data stream corresponding to the identifier of the allowed transfer session, where the mark is used to indicate that the target communication data is sent to the second terminal;
indicating the third core network function to mark the data stream corresponding to the identifier of the QoS flow allowed to be transferred, wherein the mark is used for indicating that the target communication data is sent to the second terminal;
and indicating the third core network function mark to meet the data flow of the service data matching rule, wherein the mark is used for indicating that the target communication data is sent to the second terminal.
12. An apparatus for communication diversion, the apparatus comprising:
a first sending module, configured to send a first communication transfer instruction to a core network function; and/or the presence of a gas in the gas,
and sending the target transfer information to the second terminal.
13. The apparatus of claim 12, wherein the first communication transfer indication carries at least one of:
an allow transfer indication;
an identification of a transfer allowed session;
identification of allowed transfer QoS flows;
business data matching rules allowing the transfer of business;
and transferring the authorization information.
14. The apparatus of claim 13, wherein the transfer authorization information comprises one or more subscriber identities, at least a first subscriber identity corresponding to a first terminal allowed to be transferred and/or a second subscriber identity corresponding to a second terminal allowed to accept the transfer.
15. The apparatus of claim 12, wherein the target transfer information comprises at least one of:
a first user identification;
application information allowing transfer of a service;
allowing cookie information corresponding to the transfer service;
an identification of allowed transfer sessions;
identification of QoS flows allowed to be transferred;
business data matching rules allowing the transfer of business;
token information for transfer checking.
16. An apparatus for communication diversion, the apparatus comprising:
the second sending module is used for sending the second user identification and the first transfer information to the core network function;
the first transfer information includes at least one of:
the first user identification is a user identification corresponding to the first terminal;
an identification of a transfer allowed session;
QoS flow identification allowed to be transferred;
business data matching rules allowing the transfer of business;
token information for transfer checking.
17. The apparatus of claim 16, wherein the apparatus further comprises:
the first receiving module is used for receiving the target transfer information sent by the first terminal; the target transfer information includes at least one of:
a first user identification;
application information allowing transfer of a service;
allowing cookie information corresponding to the transfer service;
an identification of a transfer allowed session;
identification of allowed transfer QoS flows;
business data matching rules allowing the transfer of business;
token information for transfer checking.
18. A communication diversion apparatus, said apparatus comprising:
the second receiving module is used for receiving a second user identifier and first transfer information sent by a second terminal;
a third sending module, configured to send the second user identifier and the second transfer information to a second core network function;
wherein the first transfer information comprises at least one of:
the first user identification is a user identification corresponding to the first terminal;
an identification of a transfer allowed session;
identification of allowed transfer QoS flows;
business data matching rules allowing the transfer of business;
token information for transfer checking;
the second transition information includes at least one of:
the first user identification;
an identification of the transfer allowed session;
an identification of the transfer allowed QoS flow;
the business data of the allowed transfer business is matched with rules.
19. The apparatus of claim 18, wherein the apparatus further comprises:
the third sending module is configured to execute the step of sending the second transfer information to the second core network function when the transfer is allowed.
20. The apparatus of claim 19, wherein the transfer is determined to be allowed if at least one of:
the subscription information of the first user identification meets the preset subscription information;
the session type corresponding to the session identification in the first transfer information meets a preset session type;
verifying that the token information is successful based on the context of the first user identifier; the context corresponding to the first user identification contains a transfer permission indication;
the context corresponding to the first user identifier contains the identifier of the session allowed to be transferred, wherein the identifier of the session in the second transfer information is contained in the context corresponding to the first user identifier;
the context corresponding to the first user identifier contains the identifier of the QoS flow allowed to be transferred, wherein the identifier of the QoS flow in the second transfer information is contained in the context corresponding to the first user identifier;
and the matching rule of the business data allowed to be transferred contained in the context corresponding to the first user identification covers the business data matching rule in the second transfer information.
21. A communication diversion apparatus, said apparatus comprising:
the third receiving module is used for receiving a second user identification and second transfer information;
an indicating module, configured to instruct, based on the second transfer information, a third core network function to forward target communication data to a second terminal, where the target communication data is determined according to the second transfer information;
the second transfer information includes at least one of:
the first user identification is a user identification corresponding to the first terminal;
an identification of a transfer allowed session;
identification of allowed transfer quality of service, QoS, flows;
the traffic data that allows traffic to be diverted matches the rules.
22. The apparatus of claim 21, wherein the indication module is to at least one of:
instructing the third core network function to mark the data stream corresponding to the first subscriber identity, where the mark is used to instruct to send the target communication data to the second terminal;
indicating the third core network function to mark the data stream corresponding to the identifier of the allowed transfer session, where the mark is used to indicate that the target communication data is sent to the second terminal;
indicating the third core network function to mark the data stream corresponding to the identifier of the QoS flow allowed to be transferred, wherein the mark is used for indicating that the target communication data is sent to the second terminal;
and indicating the third core network function mark to meet the data flow of the service data matching rule, wherein the mark is used for indicating that the target communication data is sent to the second terminal.
23. A terminal comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the method of communication transfer according to any one of claims 1 to 4 or implementing the steps of the method of communication transfer according to any one of claims 5 to 6.
24. A network-side device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, wherein the program or instructions, when executed by the processor, implement the steps of the method for communication transfer according to any one of claims 7 to 9, or implement the steps of the method for communication transfer according to any one of claims 10 to 11.
25. A readable storage medium, characterized in that a program or instructions are stored thereon, which program or instructions, when executed by a processor, implement the method of communication transfer according to any one of claims 1-4, or the steps of the method of communication transfer according to any one of claims 5 to 6, or the steps of the method of communication transfer according to any one of claims 7 to 9; or implementing the steps of a method of communication transfer as claimed in any of claims 10 to 11.
CN202011271000.7A 2020-11-13 2020-11-13 Communication transfer method, terminal and network equipment Active CN114501487B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011271000.7A CN114501487B (en) 2020-11-13 Communication transfer method, terminal and network equipment
PCT/CN2021/129938 WO2022100640A1 (en) 2020-11-13 2021-11-11 Communication transfer method, terminal, and network side device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011271000.7A CN114501487B (en) 2020-11-13 Communication transfer method, terminal and network equipment

Publications (2)

Publication Number Publication Date
CN114501487A true CN114501487A (en) 2022-05-13
CN114501487B CN114501487B (en) 2024-06-04

Family

ID=

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119519A (en) * 2007-06-18 2008-02-06 王金波 Technical scheme for mobile terminal to implement multimedia ringing tone
CN102056347A (en) * 2009-11-09 2011-05-11 华为终端有限公司 Method, equipment and system for transferring IP service of core network
US20140293837A1 (en) * 2011-10-31 2014-10-02 Lg Electronics Inc. Method and apparatus for iut in a wireless communication system
CN107409161A (en) * 2015-12-04 2017-11-28 华为技术有限公司 Shift communication event and handle the method, apparatus and terminal of communication event
CN107920377A (en) * 2016-10-09 2018-04-17 ***通信有限公司研究院 Mobile and connection status metastasis processing method and processing device
CN108605259A (en) * 2017-01-06 2018-09-28 华为技术有限公司 A kind of method for switching network and relevant device
CN108632927A (en) * 2017-03-24 2018-10-09 华为技术有限公司 Mobile network's switching method and communication device
WO2019071877A1 (en) * 2017-10-13 2019-04-18 华为技术有限公司 Voice switching method and related device
CN110140385A (en) * 2017-08-17 2019-08-16 华为技术有限公司 A kind of moving between communication systems method and device
CN110771111A (en) * 2017-07-19 2020-02-07 华为技术有限公司 Wireless communication method and device
WO2020163999A1 (en) * 2019-02-12 2020-08-20 Oppo广东移动通信有限公司 Wireless communication method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119519A (en) * 2007-06-18 2008-02-06 王金波 Technical scheme for mobile terminal to implement multimedia ringing tone
CN102056347A (en) * 2009-11-09 2011-05-11 华为终端有限公司 Method, equipment and system for transferring IP service of core network
US20140293837A1 (en) * 2011-10-31 2014-10-02 Lg Electronics Inc. Method and apparatus for iut in a wireless communication system
CN107409161A (en) * 2015-12-04 2017-11-28 华为技术有限公司 Shift communication event and handle the method, apparatus and terminal of communication event
CN107920377A (en) * 2016-10-09 2018-04-17 ***通信有限公司研究院 Mobile and connection status metastasis processing method and processing device
CN108605259A (en) * 2017-01-06 2018-09-28 华为技术有限公司 A kind of method for switching network and relevant device
CN108632927A (en) * 2017-03-24 2018-10-09 华为技术有限公司 Mobile network's switching method and communication device
CN110771111A (en) * 2017-07-19 2020-02-07 华为技术有限公司 Wireless communication method and device
CN110140385A (en) * 2017-08-17 2019-08-16 华为技术有限公司 A kind of moving between communication systems method and device
WO2019071877A1 (en) * 2017-10-13 2019-04-18 华为技术有限公司 Voice switching method and related device
WO2020163999A1 (en) * 2019-02-12 2020-08-20 Oppo广东移动通信有限公司 Wireless communication method and device
CN111903154A (en) * 2019-02-12 2020-11-06 Oppo广东移动通信有限公司 Method and apparatus for wireless communication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KDDI, DEUTSCHE TELEKOM, TELECOM ITALIA, SPRINT, AT AMP;AMP;T, VERIZON, TELSTRA, TENCENT: "S2-1907127 "Support of Service Context Transfer via Context Transfer Storage Function"", 3GPP TSG_SA\\WG2_ARCH, no. 2, 18 June 2019 (2019-06-18) *
NOKIA, NOKIA SHANGHAI BELL: "S2-1903668 "Correcting AMF behaviour for Service Request that is not integrity protected"", 3GPP TSG_SA\\WG2_ARCH, no. 2, 2 April 2019 (2019-04-02) *

Also Published As

Publication number Publication date
WO2022100640A1 (en) 2022-05-19

Similar Documents

Publication Publication Date Title
EP4192054A1 (en) Method for splitting end-to-end qos requirement information, terminal, and network side device
EP2809109A1 (en) Wireless communication system, radio base station, radio terminal, and wireless communication method
CN109246821B (en) Session management method and device
US20230262654A1 (en) Paging message receiving method, paging configuration method, terminal, and network side device
CN114079869A (en) Method for reporting capability, terminal equipment and network equipment
WO2022100544A1 (en) Service transfer method, terminal, and network side device
CN114501487B (en) Communication transfer method, terminal and network equipment
WO2022068813A1 (en) Congestion control method and apparatus, and terminal and network-side device
CN114501487A (en) Communication transfer method, terminal and network side equipment
CN113939042A (en) Processing method, sending method and related equipment
CN113784384B (en) Mode switching method, terminal and network side equipment
WO2023280022A1 (en) Multi-path communication method, and device
CN113938968B (en) Data transmission method, device and equipment
WO2023005898A1 (en) Multi-terminal joint session management method, network side device and terminal
CN114071445B (en) Configuration method of information transmission mode, terminal and network side equipment
WO2023061430A1 (en) Bearer configuration method, network side device, and terminal
US20240022953A1 (en) Pdu session establishment method, related device, and readable storage medium
WO2022127808A1 (en) Trusted relay communication method and apparatus, terminal, and network side device
CN113950007B (en) Service transmission method, device and communication equipment
US11706614B2 (en) Direct SMF control plane with gNB
WO2022218267A1 (en) Transmission switching method, terminal, and network side device
WO2022206898A1 (en) Paging method and apparatus, terminal, and network side device
CN113972966B (en) Service processing method and device and related equipment
WO2022262843A1 (en) Method for sending/receiving a request message and device
WO2022228437A1 (en) Handover method and apparatus, and device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant