CN114679720A - Network slice requesting method and device, electronic equipment and storage medium - Google Patents

Network slice requesting method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114679720A
CN114679720A CN202210312620.3A CN202210312620A CN114679720A CN 114679720 A CN114679720 A CN 114679720A CN 202210312620 A CN202210312620 A CN 202210312620A CN 114679720 A CN114679720 A CN 114679720A
Authority
CN
China
Prior art keywords
network
slice
electronic device
network slice
signed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210312620.3A
Other languages
Chinese (zh)
Inventor
黄少武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202210312620.3A priority Critical patent/CN114679720A/en
Publication of CN114679720A publication Critical patent/CN114679720A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Abstract

The embodiment of the application relates to the technical field of communication, and discloses a network slice requesting method and device, electronic equipment and a storage medium, wherein the method is applied to the electronic equipment and comprises the steps of receiving first feedback information sent by first network equipment, wherein the first feedback information is used for indicating that the first network slice is in an un-signed state; and storing a first slice identifier corresponding to the first network slice to an un-signed list according to the first feedback information, wherein the un-signed list is used for storing a slice identifier corresponding to a network slice of which the electronic device does not have access authority. By implementing the embodiment of the application, the electronic equipment can be prevented from requesting the network equipment to access the network slice which is not signed, so that the air interface resources of the network are saved.

Description

Network slice requesting method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for requesting a network slice, an electronic device, and a storage medium.
Background
With the rapid development of communication technology, in order to meet network requirements in different scenarios, network resources of a common network from an access network to a core network are nowadays cut into multiple independent network slices for providing different network services according to different network requirements.
In practice, it is found that when an electronic device initiates a network slice access request to a public network, it may request the network device to access a non-subscribed network slice, so that the request is rejected by the network device, thereby resulting in waste of air interface resources of the network.
Disclosure of Invention
The embodiment of the application discloses a network slice requesting method and device, electronic equipment and a storage medium, which can avoid the situation that the electronic equipment requests the network equipment to access a network slice which is not signed, so that network air interface resources are saved.
A first aspect of an embodiment of the present application discloses a method for requesting a network slice, which is applied to an electronic device, and the method includes:
receiving first feedback information sent by first network equipment, wherein the first feedback information is used for indicating that a first network slice is in an un-signed state;
and storing a first slice identifier corresponding to the first network slice to an un-signed list according to the first feedback information, wherein the un-signed list is used for storing a slice identifier corresponding to a network slice of which the electronic device does not have access authority.
A second aspect of the embodiment of the present application discloses a method for requesting a network slice, which is applied to a first network device, and the method includes:
receiving a second network request sent by the electronic equipment, wherein the second network request at least comprises a request for accessing the first network slice;
and under the condition that the first network slice is determined to be in the non-signed state, sending first feedback information to the electronic equipment, so that the electronic equipment stores a first slice identifier corresponding to the first network slice to a non-signed list according to the first feedback information, wherein the non-signed list is used for storing a slice identifier corresponding to a network slice which does not have access right.
A third aspect of the present embodiment discloses a device for requesting a network slice, which is applied to an electronic device, and the device includes:
a first receiving unit, configured to receive first feedback information sent by a first network device, where the first feedback information is used to indicate that a first network slice is in an un-signed state;
and the storage unit is used for storing the first slice identifier corresponding to the first network slice into an un-signed list according to the first feedback information, wherein the un-signed list is used for storing the slice identifier corresponding to the network slice of which the electronic equipment does not have the access right.
A fourth aspect of the present application discloses a device for requesting network slicing, which is applied to a first network device, and includes:
the second receiving unit is used for receiving a first network request sent by the electronic equipment, wherein the first network request at least comprises a request for accessing a first network slice;
a first sending unit, configured to send first feedback information to the electronic device when it is determined that the first network slice is in an unsubscribed state, so that the electronic device stores, according to the first feedback information, a first slice identifier corresponding to the first network slice to an unsubscribed list, where the unsubscribed list is used to store a slice identifier corresponding to a network slice for which the electronic device does not have an access right.
A fifth aspect of an embodiment of the present application discloses an electronic device, including:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the network slice request method disclosed in the first aspect or the second aspect of the embodiment of the present application.
A sixth aspect of the present embodiment discloses a computer-readable storage medium storing a computer program, where the computer program causes a computer to execute the method for requesting a network slice disclosed in the first or second aspect of the present embodiment.
Compared with the related art, the embodiment of the application has the following beneficial effects:
in this embodiment of the application, the first network device may send, to the electronic device, first feedback information indicating that the first network slice is in an unsigned state, and when receiving the first feedback information, the electronic device may determine that the electronic device does not have an authority to access the first network slice, and then the electronic device may store, to an unsigned list, a first slice identifier corresponding to the first network slice, and further the subsequent electronic device may not request the network device to access the unsigned network slice according to the unsigned list, so that the electronic device may be prevented from requesting the network device to access the unsigned network slice, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting the network equipment to access the network slice which is not signed, and the network equipment refuses the interactive process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating a network slicing request flow in the related art disclosed in an embodiment of the present application;
fig. 2 is a flowchart illustrating a method for requesting a network slice according to an embodiment of the present application;
fig. 3 is a flowchart illustrating another method for requesting a network slice according to an embodiment of the present disclosure;
FIG. 4 is a timing diagram of an embodiment of the present disclosure;
fig. 5 is a flowchart illustrating a method for requesting a network slice according to an embodiment of the present application;
FIG. 6 is another timing diagram disclosed in an embodiment of the present application;
fig. 7 is a flowchart illustrating a method for requesting a network slice according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a requesting device for network slicing according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of another requesting device for network slicing according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device disclosed in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first", "second", "third" and "fourth", etc. in the description and claims of the present application are used for distinguishing different objects, and are not used for describing a specific order. The terms "comprises," "comprising," and "having," and any variations thereof, of the embodiments of the present application, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The embodiment of the application discloses a network slice requesting method and device, electronic equipment and a storage medium, which can avoid the situation that the electronic equipment requests the network equipment to access a network slice which is not signed, so that network air interface resources are saved.
The technical solution of the present application will be described in detail with reference to specific examples.
To more clearly illustrate the method for requesting a network slice disclosed in the embodiments of the present application, first, a network slice and an access request procedure of the network slice in the related art are described.
In the related art, in order to meet network requirements in different scenarios, network resources of a common network from an access network to a core network are cut into a plurality of mutually independent network slices for providing different network services according to different network requirements, for example: the intelligent driving network slice is used for independently providing network service for automatic driving; the smart phone network slice is used for providing network service for a mobile phone by a unit and the like. And the electronic equipment can further initiate an access request to the corresponding network slice according to the network requirement of the electronic equipment.
It should be further noted that different Network operators generally correspond to different Network devices, and different Network devices generally support different Public Land Mobile Networks (PLMNs), wherein each PLMN can be respectively cut into multiple Network slices. For example, PLMN1 may be partitioned into network slice 1, network slice 2; the PLMN2 may be divided into network slice 1 and network slice 2, which is not limited herein.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating a network slice request flow in the related art according to an embodiment of the present application. Wherein, the step 1: electronic device 110 sends a third network request to first network device 120, the third network request including a request to access network slice 1 and network slice 2.
Step 2: first network device 120, upon determining that network slice 2 is not signed up (i.e., electronic device 110 does not have the right to access network slice 2), may send first denial information to electronic device 110 to deny electronic device 110 access to network slice 2.
And 3, step 3: when electronic device 110 roams from a first network (i.e., PLMN1) corresponding to first network device 120 to a second network (i.e., PLMN2) corresponding to second network device 130, electronic device 110 sends a fourth network request to second network device 130, the fourth network request including a request to access network slice 1 and network slice 2.
And 4, step 4: the second network device 130, in case it is determined that the network slice 2 is not signed on according to the fourth network request, will again send second rejection information to the electronic device 110 to reject the electronic device 110 to access the network slice 2.
The first reject information and the second reject information generally include a cause value of "0000", which only indicates that the first network device 120 or the second network device 130 rejects the electronic device 110 to access the network slice 2, but does not indicate the reason for the rejection (the reason for the rejection may be that the first network device 120 or the second network device 130 does not support the network slice 2, or the electronic device 110 does not have the right to access the network slice 2). In this regard, when electronic device 110 roams to second network device 130, the request to access network slice 2 is still included in the fourth network request because electronic device 110 does not know the specific reason for being rejected by first network device 120. Therefore, the subsequent second network device 130 feeds back the second rejection information to the electronic device 110, which wastes network air interface resources and increases the time duration for establishing connection between the electronic device and the network device.
Based on this, a method for requesting a network slice disclosed in the embodiment of the present application is described below.
Referring to fig. 2, fig. 2 is a flowchart illustrating a method for requesting a network slice according to an embodiment of the present application. The method can be applied to electronic devices including but not limited to mobile phones, tablet computers, smart watches, and the like. The method may comprise the steps of:
202. and receiving first feedback information sent by the first network equipment, wherein the first feedback information is used for indicating that the first network slice is in an un-signed state.
In this embodiment, the first network device may be a server, a server cluster, or the like supporting a network. Optionally, the first feedback information may include a cause value of "0011", where the cause value is used to indicate that the corresponding network slice is in an un-signed state (i.e., the electronic device does not have the right to access the corresponding network slice). For example, "network slice 2with 0011" indicates that network slice 2 is in an uncongested state. The reason value of "0011" is compared with the reason value of "0000", which can clearly indicate that the reason why the network slice access request is rejected is that the network slice is in an un-signed state, so that the reason that the first network device does not support the first network slice is eliminated, and when the electronic device subsequently sends a network request to other network devices, the electronic device may not request to access the un-signed first network slice, thereby avoiding wasting air interface resources. In addition, the method only needs to add a new cause value at the network equipment end, and does not need to upgrade the interaction protocol or the network element between the electronic equipment and the network equipment, thereby being simple and convenient to implement and saving the improved cost.
Alternatively, the first feedback information may include, but is not limited to, "Registration Accept (Registration Accept) information," Registration Reject (Registration Reject) information, "or" Configuration Update Command (Configuration Update Command) information.
It should be further noted that, if the electronic device wants to have an access right of a certain network slice, the electronic device needs to sign with a corresponding network operator for the network slice. After signing, the electronic device has access to the network slice in the signed state, but does not have access to the network slice in the non-signed state. In this regard, the first network slice being in the non-signed state represents a state in which the electronic device does not have the right to access the first network slice.
In one embodiment, the first network device may send the first feedback information to the electronic device when detecting that the first network slice is in an un-subscribed state. In another embodiment, in the case that the electronic device has a need to access the first network slice, a second network request may be sent to the first network device, the second network request including at least a request to access the first network slice; furthermore, when the first network device receives the second network request sent by the electronic device, if it is determined that the first network slice is in the non-signed state, the first network device may send the first feedback information to the electronic device.
By implementing the method, the first network device may feed back the first feedback information to the electronic device only when the electronic device has a need to access the first network slice, so that the first network device is prevented from sending the first feedback information to the electronic device without the need to access the first network slice to notify the electronic device, and further, air interface resources are prevented from being wasted.
204. And storing the first slice identifier corresponding to the first network slice to an un-signed list according to the first feedback information, wherein the un-signed list is used for storing the slice identifier corresponding to the network slice of which the electronic device does not have the access right.
In the embodiment of the application, when the electronic device receives the first feedback information, the electronic device may analyze the first feedback information to obtain an analysis result. For example, the electronic device analyzes the first feedback information, and the obtained analysis result includes a cause value of "0011", where the cause value indicates that the corresponding network slice is in an unsigned state, and for this, the electronic device may determine that the first network slice is in an unsigned state.
Further, if the analysis result indicates that the first network slice is in the no-contract state, the electronic device may store the first slice identifier corresponding to the first network slice to the no-contract list according to the first feedback information. Optionally, each network slice may correspond to a slice label, for example: network slice 1 may correspond to "S-NSSAI 1" and network slice 2 may correspond to "S-NSSAI 2", without limitation. And further, the electronic equipment or the network equipment can conveniently identify and manage different network slices.
Optionally, the electronic device may include a storage medium, including but not limited to a Non-Volatile Random Access Memory (NVRAM), a Random Access Memory (RAM), and the like, and is not limited herein. Further, the electronic device may create an unsigned list in the storage medium, where the unsigned list is used to store slice identifiers corresponding to network slices for which the electronic device does not have access rights. For example, if the electronic device does not have the right to access the network slice 2 (i.e., the network slice 2 is in the non-signed state), the electronic device may store the first slice identifier "S-NSSAI 2" corresponding to the network slice 2 in the non-signed list, so that the subsequent electronic device can determine which network slice is in the non-signed state according to the slice identifier stored in the non-signed list.
By implementing the method disclosed in each of the embodiments, the first network device may send, to the electronic device, first feedback information indicating that the first network slice is in an unsigned state, and when receiving the first feedback information, the electronic device may determine that the electronic device does not have an authority to access the first network slice, and then the electronic device may store the first slice identifier corresponding to the first network slice to an unsigned list, and then the subsequent electronic device may not initiate an access request to the network slice without the access authority according to the unsigned list, so that the electronic device may be prevented from requesting the network device to access the unsigned network slice, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting the network equipment to access the network slice which is not signed, and the network equipment refuses the interactive process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
Referring to fig. 3, fig. 3 is a flowchart illustrating another method for requesting a network slice according to an embodiment of the present application. The method can be applied to electronic devices including but not limited to mobile phones, tablet computers, smart watches, and the like. The method may comprise the steps of:
302. and receiving first feedback information sent by the first network equipment, wherein the first feedback information is used for indicating that the first network slice is in an unconsignated state.
304. And storing a first slice identifier corresponding to the first network slice to an un-signed list according to the first feedback information, wherein the un-signed list is used for storing a slice identifier corresponding to a network slice which does not have access right of the electronic device.
In an embodiment, after storing the first slice identifier corresponding to the first network slice to the no-subscription list according to the first feedback information, the electronic device may delete the first slice identifier from the no-subscription list after waiting for the first time period. Alternatively, the first time period may be set by the electronic device, the first network device, or a developer, and is not limited herein.
By implementing the method, the electronic device can delete the first slice identifier stored in the un-signed list after waiting for a period of time, so that the first network slice corresponding to the first slice identifier can be prevented from being normally accessed all the time, and the normal access of the subsequent electronic device to the first network slice is ensured.
306. And acquiring a second network slice to be accessed in a second network under the condition that the electronic equipment roams from a first network corresponding to the first network equipment to a second network corresponding to the second network equipment.
It should be noted that the second network slice to be visited under the second network is a network slice to be visited when the electronic device roams to the second network.
It is understood that when the electronic device is in different locations or has different network requirements, the electronic device may roam from one network to another to obtain better network services. When an electronic device roams from one network to another, it needs to re-access the network slice under the new network.
Alternatively, when the electronic device roams from the first network corresponding to the first network device to the second network corresponding to the second network device, the electronic device may determine, according to a current network requirement of the electronic device, a second network slice to be accessed in the first network. Optionally, the current network requirement of the electronic device may be determined according to a scene (including but not limited to an automatic driving scene, a virtual reality scene, a network game scene, and the like) in which the electronic device is currently located.
308. And according to the non-signed list, removing the network slices in the non-signed state in the second network slices to obtain a third network slice in the signed state, and generating a first network request according to the third network slice.
Optionally, before sending the network request to the second network device, the electronic device may obtain an un-signed list from the storage medium, and determine, according to the un-signed list, a fourth network slice in an un-signed state, and then the electronic device may remove the fourth network slice included in the second network slice, so as to obtain a third network slice in a signed state.
For example, the second network slice to be accessed in the second network includes a network slice 1 and a network slice 2, and the first slice identifier stored in the non-signed list corresponds to the network slice 2, the electronic device may remove the network slice 2 to obtain the network slice 1 in the signed state.
Further, the electronic device may generate a first network request from the third network slice, the first network request including at least a request to access the third network slice.
310. A first network request is sent to a second network device.
Optionally, a data transmission link may be established between the electronic device and the second network device, and the electronic device may send the first network request to the second network device through the data transmission link.
When the electronic device roams from a first network corresponding to the first network device to a second network corresponding to the second network device, the electronic device may not initiate an access request to a network slice without access right according to the un-signed list, so that the electronic device may be prevented from requesting the network device to access the un-signed network slice, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting the network equipment to access the network slice which is not signed, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened; and after waiting for a period of time, the electronic device may delete the first slice identifier stored in the un-signed list, so that it may be avoided that the first network slice corresponding to the first slice identifier cannot be normally accessed all the time, and normal access to the first network slice by the subsequent electronic device is ensured.
To more clearly illustrate the method for requesting a network slice disclosed in the embodiment of the present application, the following description is made with reference to fig. 4, where fig. 4 is a timing diagram disclosed in the embodiment of the present application, where:
step 1: the electronic device 110 sends a second network request to the first network device 120, the second network request including at least a request to access the first network slice; and 2, step: when determining that the first network slice is in the non-signed state, the first network device 120 may send first feedback information to the electronic device 110, where the first feedback information is used to indicate that the first network slice is in the non-signed state; and step 3: the electronic device 110 stores the first slice identifier corresponding to the first network slice to the non-signed list according to the first feedback information; and 4, step 4: when the electronic device 110 roams from the first network corresponding to the first network device 120 to the second network corresponding to the second network device 130, the electronic device may obtain a second network slice to be accessed in the second network, remove a network slice in an un-signed state from the second network slice according to the un-signed list to obtain a third network slice in a signed state, and generate a first network request according to the third network slice; and 5: the first network request is sent to the second network device 130.
Referring to fig. 5, fig. 5 is a flowchart illustrating a method for requesting a network slice according to an embodiment of the present application. The method can be applied to electronic devices including but not limited to mobile phones, tablet computers, smart watches, and the like. The method may comprise the steps of:
502. and receiving first feedback information sent by the first network equipment, wherein the first feedback information is used for indicating that the first network slice is in an unconsignated state.
504. And storing the first slice identifier corresponding to the first network slice to an un-signed list according to the first feedback information, wherein the un-signed list is used for storing the slice identifier corresponding to the network slice of which the electronic device does not have the access right.
506. And receiving an identifier set sent by the first network equipment, wherein the network slice corresponding to each second slice identifier included in the identifier set is a network slice in a signed state, and the identifier set is generated by the first network equipment according to the fact that the first network slice is recovered from an un-signed state to a signed state.
In this embodiment, when detecting that subscription information of a network slice changes (for example, switches from an un-subscribed state to a subscribed state, or switches from a subscribed state to an un-subscribed state, or the like), the first network device may send subscription state change information of the network slice to the electronic device through a feedback mechanism, so that the electronic device may adjust a slice identifier in an un-subscribed list according to the subscription state change information (including, but not limited to, deleting the slice identifier or adding the slice identifier). Optionally, the feedback mechanism may include "registration procedure" or "Generic UE configuration update procedure", which is not limited herein.
In one embodiment, the first network device may generate an identifier set according to one or more second slice identifiers, where the identifier set includes a network slice corresponding to each second identifier, and the network slice corresponding to each second identifier is a network slice corresponding to the electronic device and currently in a signed state; in turn, the first network device may send the set of identifications to the electronic device for the electronic device to determine which network slices are in a signed-up state.
Optionally, the set of identities may include "Allowed NSSAI" or "Configured NSSAI"; wherein "Allowed NSSAI" represents an intersection of a network slice that the electronic device requests access and a network slice that the first network device allows access to by the electronic device; the "Configured NSSAI" indicates a network slice allocated to the electronic device by the first network device, which allows the electronic device to access.
In another embodiment, the first network device includes a first management module and a second management module, the first management module is configured to perform data interaction with the electronic device, and the second management module is at least configured to store a subscription condition between a network slice corresponding to the first network device and the electronic device. Optionally, the first Management module may include an Access and Mobility Management module (AMF); the second Management module may include a Unified Data Management (UDM) module.
In one embodiment, the second management module may generate corresponding state change information, in a case where it is determined that the first network slice is switched from the non-signed state to the signed state, where the state change information is used to indicate that the first network slice is switched from the non-signed state to the signed state; and the second management module may transmit the state change information to the first management device.
Further, the first management device may generate an identification set according to the received state change information, and transmit the identification set to the electronic device. Optionally, the identifier set at least includes a slice identifier corresponding to a first network slice switched from an un-subscribed state to a subscribed state.
Further, in the case that the electronic device receives the identifier set sent by the first management module, if it is determined that the second slice identifier included in the identifier set includes the first slice identifier, the first slice identifier may be deleted from the un-signed list.
In another embodiment, the first network device may send, to the electronic device, second feedback information when determining that the subscription condition of the network slice and the electronic device corresponding to the first network device changes, where the second feedback information is used to indicate that the subscription condition of the network slice and the electronic device corresponding to the first network device changes; and after the electronic device receives the second feedback information sent by the first network device, the electronic device may delete the first slice identifier included in the non-subscription list according to the second feedback information.
Optionally, the second feedback information may include "Registration Accept (Registration Accept) information" or "Configuration Update Command (Configuration Update Command) information", and the "Registration Accept (Registration Accept) information" or "Configuration Update Command (Configuration Update Command) information" carries information of subscription information change of the network slice.
By implementing the method, the electronic device can delete all slice identifiers in the non-signed list when detecting that the network slice corresponding to the first network device and the signing situation of the electronic device change, so that the subsequent electronic device can not access the network slice corresponding to the slice identifier in the non-signed list all the time, and the electronic device can normally access the network slice subsequently.
508. And if the identification set comprises the first slice identification, deleting the first slice identification from the un-signed list.
Further, after receiving the identifier set sent by the first network device, if it is determined that the second slice identifier included in the identifier set includes the first slice identifier, the electronic device may delete the first slice identifier from the un-signed list.
It can be understood that the network slices corresponding to the second slice identifiers included in the identifier set are all network slices in a signed state, so that when the second slice identifiers include the first slice identifiers, it is indicated that the first network slices corresponding to the first slice identifiers have been restored to the signed state, and the electronic device may delete the first slice identifiers from the un-signed list, so as to prevent the first network slices corresponding to the first slice identifiers from being normally accessed all the time, and ensure that the subsequent electronic device normally accesses the first network slices.
By implementing the method, the first network device may feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device may delete the slice identifier of the network slice restored to the signed state from the un-signed list, thereby preventing the first network slice corresponding to the first slice identifier from being normally accessed all the time, and ensuring the normal access of the subsequent electronic device to the first network slice.
By implementing the method disclosed by each embodiment, the electronic equipment can be prevented from requesting the network equipment to access the network slice which is not signed, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting the network equipment to access the network slice which is not signed, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened; the electronic device may delete all slice identifiers in the non-signed list when detecting that the network slice corresponding to the first network device and the subscription condition of the electronic device change, so as to prevent the subsequent electronic device from being unable to access the network slice corresponding to the slice identifier in the non-signed list all the time, and ensure that the electronic device can normally access the network slice subsequently; and the first network device may feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device may delete the slice identifier of the network slice restored to the signed state from the un-signed list, thereby preventing the first network slice corresponding to the first slice identifier from being normally accessed all the time, and ensuring the normal access of the subsequent electronic device to the first network slice.
To more clearly illustrate the method for requesting a network slice disclosed in the embodiment of the present application, the following description is made with reference to fig. 6, where fig. 6 is another timing diagram disclosed in the embodiment of the present application, where: the first network device 120 may include a first management device 140 and a second management device 150;
step 1: the electronic device 110 sends a second network request to the first management device 140, the second network request including at least a request to access the first network slice; and 2, step: when determining that the first network slice is in the non-signed state, the first network device 120 may send, to the electronic device 110, first feedback information through the first management device 140, where the first feedback information is used to indicate that the first network slice is in the non-signed state; and step 3: the electronic device 110 stores the first slice identifier corresponding to the first network slice to the non-signed list according to the first feedback information; and 4, step 4: the second management device 150 may generate corresponding state change information and transmit the state change information to the first management device 140, in a case where it is determined that the first network slice is switched from the non-signed state to the signed state; and 5: the first management device 140 generates an identifier set according to the state change information, and sends the identifier set to the electronic device 110; step 6: the electronic device 110, upon determining that the set of identities includes a first slice identity, deletes the first slice identity from the un-signed list.
Referring to fig. 7, fig. 7 is a flowchart illustrating a method for requesting a network slice according to an embodiment of the present application. The method may be applied to a first network device including, but not limited to, a network-capable server, a cluster of servers, and the like. The method may comprise the steps of:
702. and receiving a second network request sent by the electronic equipment, wherein the second network request at least comprises a request for accessing the first network slice.
704. And under the condition that the first network slice is determined to be in the non-signed state, sending first feedback information to the electronic equipment, so that the electronic equipment stores a first slice identifier corresponding to the first network slice to a non-signed list according to the first feedback information, wherein the non-signed list is used for storing a slice identifier corresponding to a network slice which does not have access right.
In an embodiment, after sending the first feedback information to the electronic device, the first network device may generate an identifier set according to one or more second slice identifiers, where a network slice corresponding to each second identifier included in the identifier set is a network slice corresponding to the electronic device and currently in a signed state; the first network device may further send, to the electronic device, an identification set, where the identification set is used to enable the electronic device to delete the first slice identity from the un-signed list when it is determined that the identification set includes the first slice identity.
By implementing the method, the first network device may feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device may delete the slice identifier of the network slice restored to the signed state from the un-signed list, thereby preventing the first network slice corresponding to the first slice identifier from being normally accessed all the time, and ensuring the normal access of the subsequent electronic device to the first network slice.
In another embodiment, the first network device may include a first management module and a second management module, where the first management module is configured to perform data interaction with the electronic device, and the second management module is at least configured to store a subscription condition between a network slice corresponding to the first network device and the electronic device; the first network device may generate corresponding state change information and send the state change information to the first management device when determining that the first network slice is switched from the un-signed state to the signed state through the second management device; and the first network equipment can generate an identification set according to the state change information through the first management equipment and send the identification set to the electronic equipment through the first management equipment.
By implementing the method, the first network device may feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device may delete the slice identifier of the network slice restored to the signed state from the un-signed list, thereby preventing the first network slice corresponding to the first slice identifier from being normally accessed all the time, and ensuring the normal access of the subsequent electronic device to the first network slice.
In an embodiment, when determining that the subscription condition of the network slice corresponding to the first network device and the electronic device changes, the first network device may send second feedback information to the electronic device, so that the electronic device deletes the identifier included in the non-subscription list according to the second feedback information.
By implementing the method, the electronic device can delete all slice identifiers in the non-signed list when detecting that the network slice corresponding to the first network device and the signing situation of the electronic device change, so that the subsequent electronic device can not access the network slice corresponding to the slice identifier in the non-signed list all the time, and the electronic device can normally access the network slice subsequently.
When the method disclosed in each embodiment is implemented, the first network device may send, to the electronic device, first feedback information indicating that the first network slice is in an unsigned state when receiving a first network request sent by the electronic device, and when the electronic device receives the first feedback information, it may be determined that the electronic device does not have an authority to access the first network slice, and then the electronic device may store a first slice identifier corresponding to the first network slice to an unsigned list, and then the subsequent electronic device may not initiate an access request to a network slice without an access authority according to the unsigned list, so that the electronic device may be prevented from requesting the network device to access the unsigned network slice, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting the network equipment to access the network slice which is not signed, and the network equipment refuses the interactive process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a network slice requesting device according to an embodiment of the present disclosure, which can be applied to electronic devices, including but not limited to a mobile phone, a tablet computer, a smart watch, and the like. The apparatus may comprise a first receiving unit 802 and a storing unit 804, wherein:
a first receiving unit 802, configured to receive first feedback information sent by a first network device, where the first feedback information is used to indicate that a first network slice is in an un-signed state;
the storage unit 804 is configured to store a first identifier corresponding to the first network slice to an un-signed list according to the first feedback information, where the un-signed list is used to store a slice identifier corresponding to a network slice that the electronic device does not have access right.
By implementing the device, the first network device may send first feedback information indicating that the first network slice is in an unsigned state to the electronic device, and when the electronic device receives the first feedback information, it may be determined that the electronic device does not have an authority to access the first network slice, and then the electronic device may store the first slice identifier corresponding to the first network slice to an unsigned list, and then the subsequent electronic device may not initiate an access request to the network slice without the access authority according to the unsigned list, so that the electronic device may be prevented from requesting the network device to access the unsigned network slice, and network air interface resources are saved; in addition, the interactive process that the electronic equipment requests the network equipment to access the network slice which is not signed can be avoided, and the network equipment refuses the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
As an alternative implementation, the apparatus shown in fig. 8 may further include an obtaining unit, a first generating unit, and a second transmitting unit, which are not shown in the drawing, wherein:
the acquisition unit is used for acquiring a second network slice to be accessed in a second network under the condition that the electronic equipment roams from a first network corresponding to the first network equipment to a second network corresponding to the second network equipment after storing a first slice identifier corresponding to the first network slice to an unsigned list according to the first feedback information;
the first generation unit is used for eliminating the network slices in the non-signed state in the second network slices according to the non-signed list to obtain a third network slice in the signed state, and generating a first network request according to the third network slice;
a second sending unit, configured to send the first network request to the second network device.
By implementing the device, the first network device may send, to the electronic device, first feedback information indicating that the first network slice is in an unsigned state, and when receiving the first feedback information, the electronic device may determine that the electronic device does not have an authority to access the first network slice, and then the electronic device may store the first slice identifier corresponding to the first network slice to an unsigned list, and then the subsequent electronic device may not initiate an access request to the network slice without the access authority according to the unsigned list, so that the electronic device may be prevented from requesting the network device to access the unsigned network slice, and network air interface resources are saved.
As an alternative implementation, the apparatus shown in fig. 8 may further include a third receiving unit and a first deleting unit, which are not shown in the figure, wherein:
a third receiving unit, configured to receive an identifier set sent by the first network device after storing, according to the first feedback information, the first slice identifier corresponding to the first network slice to the no-subscription list, where the network slice corresponding to each second slice identifier included in the identifier set is a network slice in a signed state, and the identifier set is generated by the first network device according to the first network slice, and the network slice is recovered from the no-subscription state to the signed state;
and the first deleting unit is used for deleting the first slice identifier from the un-signed list if the identifier set is determined to comprise the first slice identifier.
By implementing the device, the first network device may feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device may delete the slice identifier of the network slice restored to the signed state from the un-signed list, thereby preventing the first network slice corresponding to the first slice identifier from being normally accessed all the time, and ensuring the normal access of the subsequent electronic device to the first network slice.
As an optional implementation manner, the first network device includes a first management module and a second management module, the first management module is configured to perform data interaction with the electronic device, and the second management module is at least configured to store a contract situation between a network slice corresponding to the first network device and the electronic device; and the third receiving unit is further configured to receive an identifier set sent by the first management module, where the identifier set is generated by the first management module according to the state change information sent by the second management module, and the state change information at least includes a state in which the first network slice is switched from an un-signed state to a signed state.
By implementing the device, the first network device may feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device may delete the slice identifier of the network slice restored to the signed state from the un-signed list, thereby preventing the first network slice corresponding to the first slice identifier from being normally accessed all the time, and ensuring the normal access of the subsequent electronic device to the first network slice.
As an alternative implementation, the apparatus shown in fig. 8 may further include a second deletion unit, not shown, where:
and the second deleting unit is used for deleting the first slice identifier from the un-signed list after waiting for the first time after storing the first slice identifier corresponding to the first network slice into the un-signed list according to the first feedback information.
By implementing the device, the electronic device can delete the first slice identifier stored in the non-signed list after waiting for a period of time, so that the first network slice corresponding to the first slice identifier can be prevented from being normally accessed all the time, and the normal access of the subsequent electronic device to the first network slice is ensured.
As an alternative implementation, the apparatus shown in fig. 8 may further include a fourth receiving unit and a third deleting unit, which are not shown in the drawing, wherein:
a fourth receiving unit, configured to receive second feedback information sent by the first network device, where the second feedback information is used to indicate that a subscription condition of a network slice corresponding to the first network device and the electronic device changes;
and the third deleting unit is used for deleting the first slice identifier included in the non-signed list according to the second feedback information.
By implementing the device, the electronic device can delete all slice identifiers in the non-signed list when detecting that the network slice corresponding to the first network device and the signing condition of the electronic device change, so that the subsequent electronic device can not access the network slice corresponding to the slice identifier in the non-signed list all the time, and the electronic device can normally access the network slice subsequently.
As an alternative implementation, the apparatus shown in fig. 8 may further include a third sending unit, not shown, where:
a third sending unit, configured to send, before receiving first feedback information sent by the first network device, a second network request to the first network device, where the second network request at least includes a request for accessing the first network slice, so that the first network device sends the first feedback information to the electronic device when determining that the first network slice is in an un-signed state.
By implementing the device, the first network device may feed back the first feedback information to the electronic device only when the electronic device has a need to access the first network slice, so as to avoid that the first network device sends the first feedback information to the electronic device without the need to access the first network slice to notify the electronic device, thereby avoiding wasting air interface resources.
Referring to fig. 9, fig. 9 is a schematic structural diagram of another network slice requesting apparatus disclosed in the embodiment of the present application, which may be applied to a first network device, including but not limited to a server supporting a network, a server cluster, and the like. The apparatus may comprise a first receiving unit 902 and a storing unit 904, wherein:
a second receiving unit 902, configured to receive a second network request sent by the electronic device, where the second network request at least includes a request for accessing the first network slice;
a first sending unit 904, configured to send first feedback information to the electronic device when it is determined that the first network slice is in an un-signed state, so that the electronic device stores, according to the first feedback information, a first slice identifier corresponding to the first network slice to an un-signed list, where the un-signed list is used to store a slice identifier corresponding to a network slice for which the electronic device does not have access right.
By implementing the device, when receiving a first network request sent by the electronic device, the first network device may send first feedback information indicating that the first network slice is in an unsigned state to the electronic device, and when receiving the first feedback information, the electronic device may determine that the electronic device does not have an authority to access the first network slice, and then the electronic device may store a first slice identifier corresponding to the first network slice to an unsigned list, and then the subsequent electronic device may not initiate an access request to the network slice without the access authority according to the unsigned list, so that the electronic device may be prevented from requesting the network device to access the unsigned network slice, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting the network equipment to access the network slice which is not signed, and the network equipment refuses the interactive process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
As an optional implementation manner, the apparatus shown in fig. 9 may further include a second generating unit and a fourth transmitting unit, which are not shown in the drawing, wherein:
the second generating unit is configured to generate an identifier set after the first feedback information is sent to the electronic device, where a network slice corresponding to each second identifier included in the identifier set is a network slice corresponding to the electronic device and currently in a signed state;
and a fourth sending unit, configured to send the identifier set to the electronic device, where the identifier set is used to enable the electronic device to delete the first slice identifier from the un-signed list when it is determined that the identifier set includes the first slice identifier.
By implementing the device, the first network device may feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device may delete the slice identifier of the network slice restored to the signed state from the un-signed list, thereby preventing the first network slice corresponding to the first slice identifier from being normally accessed all the time, and ensuring the normal access of the subsequent electronic device to the first network slice.
As an optional implementation manner, the first network device includes a first management module and a second management module, the first management module is configured to perform data interaction with the electronic device, and the second management module is at least configured to store a contract situation between a network slice corresponding to the first network device and the electronic device; the fourth sending unit is further configured to generate, by the second management device, corresponding state change information and send the state change information to the first management device when it is determined that the first network slice is switched from the non-signed state to the signed state; and generating an identification set according to the state change information through the first management device, and sending the identification set to the electronic device through the first management device.
By implementing the device, the first network device may feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device may delete the slice identifier of the network slice restored to the signed state from the un-signed list, thereby preventing the first network slice corresponding to the first slice identifier from being normally accessed all the time, and ensuring the normal access of the subsequent electronic device to the first network slice.
As an alternative implementation, the apparatus shown in fig. 9 may further include a fifth transmitting unit, not shown, where:
and a fifth sending unit, configured to send second feedback information to the electronic device when it is determined that the subscription condition of the network slice corresponding to the first network device and the electronic device changes, so that the electronic device deletes the identifier included in the non-subscription list according to the second feedback information.
By implementing the device, the electronic device can delete all slice identifiers in the non-signed list when detecting that the network slice corresponding to the first network device and the signing condition of the electronic device change, so that the subsequent electronic device can not access the network slice corresponding to the slice identifier in the non-signed list all the time, and the electronic device can normally access the network slice subsequently.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an electronic device disclosed in the embodiment of the present application.
As shown in fig. 10, the electronic device may include:
a memory 1001 in which executable program code is stored;
a processor 1002 coupled to a memory 1001;
the processor 1002 calls the executable program code stored in the memory 1001 to execute the request method applied to the network slice of the electronic device disclosed in each of the above embodiments, or execute the request method applied to the network slice of the first network device disclosed in each of the above embodiments.
An embodiment of the present application discloses a computer-readable storage medium storing a computer program, wherein the computer program enables a computer to execute the request method applied to the network slice of the electronic device disclosed in the above embodiments, or execute the request method applied to the network slice of the first network device disclosed in the above embodiments.
The embodiment of the present application also discloses an application publishing platform, wherein the application publishing platform is used for publishing a computer program product, and when the computer program product runs on a computer, the computer is caused to execute part or all of the steps of the method in the above method embodiments.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. Those skilled in the art should also appreciate that the embodiments described in this specification are all alternative embodiments and that the acts and modules involved are not necessarily required for this application.
In various embodiments of the present application, it should be understood that the size of the serial number of each process described above does not mean that the execution sequence is necessarily sequential, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated units, if implemented as software functional units and sold or used as a stand-alone product, may be stored in a computer accessible memory. Based on such understanding, the technical solution of the present application, which is a part of or contributes to the prior art in essence, or all or part of the technical solution, may be embodied in the form of a software product, stored in a memory, including several requests for causing a computer device (which may be a personal computer, a server, a network device, or the like, and may specifically be a processor in the computer device) to execute part or all of the steps of the above-described method of the embodiments of the present application.
It will be understood by those skilled in the art that all or part of the steps in the methods of the embodiments described above may be implemented by hardware instructions of a program, and the program may be stored in a computer-readable storage medium, where the storage medium includes Read-Only Memory (ROM), Random Access Memory (RAM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), One-time Programmable Read-Only Memory (OTPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read-Only Memory (CD-ROM), or other Memory, such as a magnetic disk, or a combination thereof, A tape memory, or any other medium readable by a computer that can be used to carry or store data.
The method and apparatus for requesting a network slice, the electronic device, and the storage medium disclosed in the embodiments of the present application are described in detail above, and a specific example is applied in the present application to explain the principles and embodiments of the present application, and the description of the above embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (15)

1. A method for requesting a network slice, applied to an electronic device, the method comprising:
receiving first feedback information sent by first network equipment, wherein the first feedback information is used for indicating that a first network slice is in an un-signed state;
and storing a first slice identifier corresponding to the first network slice to an un-signed list according to the first feedback information, wherein the un-signed list is used for storing a slice identifier corresponding to a network slice of which the electronic device does not have access authority.
2. The method of claim 1, wherein after storing the first slice identifier corresponding to the first network slice to an un-subscribed list according to the first feedback information, the method further comprises:
acquiring a second network slice to be accessed in a second network under the condition that the electronic equipment roams from a first network corresponding to the first network equipment to the second network corresponding to the second network equipment;
removing the network slices in the non-signed state in the second network slices according to the non-signed list to obtain a third network slice in the signed state, and generating a first network request according to the third network slice;
sending the first network request to the second network device.
3. The method of claim 1, wherein after storing the first slice identifier corresponding to the first network slice to an un-subscribed list according to the first feedback information, the method further comprises:
receiving an identifier set sent by the first network device, where a network slice corresponding to each second slice identifier included in the identifier set is a network slice in a signed state, and the identifier set is generated by the first network device according to the fact that the first network slice is restored from the non-signed state to the signed state;
and if the identification set comprises the first cut identification, deleting the first cut identification from the non-signed list.
4. The method according to claim 3, wherein the first network device includes a first management module and a second management module, the first management module is configured to perform data interaction with the electronic device, and the second management module is configured to at least store a subscription condition of a network slice corresponding to the first network device and the electronic device; the receiving the identification set sent by the first network device includes:
receiving an identifier set sent by the first management module, where the identifier set is generated by the first management module according to state change information sent by the second management module, and the state change information at least includes switching the first network slice from an un-signed state to a signed state.
5. The method of claim 1, wherein after the storing the first slice identifier corresponding to the first network slice to a non-subscribed list according to the first feedback information, the method further comprises:
deleting the first slice identity from the no-sign-on list after waiting a first period of time.
6. The method of claim 1, further comprising:
receiving second feedback information sent by the first network device, where the second feedback information is used to indicate that a subscription condition of a network slice corresponding to the first network device and the electronic device changes;
and deleting the first slice identifier included in the non-signed list according to the second feedback information.
7. The method according to any of claims 1 to 6, wherein before the receiving the first feedback information sent by the first network device, the method further comprises:
and sending a second network request to the first network equipment, wherein the second network request at least comprises a request for accessing a first network slice, so that the first network equipment sends first feedback information to the electronic equipment under the condition that the first network slice is determined to be in an uncongested state.
8. A method for requesting network slices, applied to a first network device, the method comprising:
receiving a second network request sent by the electronic equipment, wherein the second network request at least comprises a request for accessing the first network slice;
and under the condition that the first network slice is determined to be in the non-signed state, sending first feedback information to the electronic equipment, so that the electronic equipment stores a first slice identifier corresponding to the first network slice to a non-signed list according to the first feedback information, wherein the non-signed list is used for storing a slice identifier corresponding to a network slice which does not have access right.
9. The method of claim 8, wherein after the sending the first feedback information to the electronic device, the method further comprises:
generating an identification set and sending the identification set to the electronic device, wherein the identification set includes one or more second slice identifications, a network slice corresponding to each second slice identification is a network slice corresponding to the electronic device and currently in a signed state, and the identification set is used for enabling the electronic device to delete the first slice identification from the non-signed list when determining that the identification set includes the first slice identification.
10. The method according to claim 9, wherein the first network device includes a first management module and a second management module, the first management module is configured to perform data interaction with the electronic device, and the second management module is configured to store at least a subscription condition of a network slice corresponding to the first network device and the electronic device; the generating and sending the identity set to the electronic device includes:
generating, by the second management device, corresponding state change information and sending the state change information to the first management device when it is determined that the first network slice is switched from an un-signed state to a signed state;
and generating an identification set according to the state change information through the first management device, and sending the identification set to the electronic device through the first management device.
11. The method of claim 8, further comprising:
and sending second feedback information to the electronic equipment under the condition that the subscription condition of the network slice corresponding to the first network equipment and the electronic equipment is determined to be changed, so that the electronic equipment deletes the identifier included in the non-subscription list according to the second feedback information.
12. An apparatus for requesting network slicing, applied to an electronic device, the apparatus comprising:
a first receiving unit, configured to receive first feedback information sent by a first network device, where the first feedback information is used to indicate that a first network slice is in an un-signed state;
and the storage unit is used for storing the first slice identifier corresponding to the first network slice into an un-signed list according to the first feedback information, wherein the un-signed list is used for storing the slice identifier corresponding to the network slice of which the electronic equipment does not have the access right.
13. An apparatus for requesting network slices, the apparatus being applied to a first network device, the apparatus comprising:
a second receiving unit, configured to receive a second network request sent by an electronic device, where the second network request at least includes a request for accessing a first network slice;
a first sending unit, configured to send first feedback information to the electronic device when it is determined that the first network slice is in an unsigned state, so that the electronic device stores a first slice identifier corresponding to the first network slice to an unsigned list according to the first feedback information, where the unsigned list is used to store a slice identifier corresponding to a network slice that the electronic device does not have access right.
14. An electronic device comprising a memory storing executable program code, and a processor coupled to the memory; wherein the processor calls the executable program code stored in the memory to execute the method according to any one of claims 1 to 7 or 8 to 11.
15. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7 or 8 to 11.
CN202210312620.3A 2022-03-28 2022-03-28 Network slice requesting method and device, electronic equipment and storage medium Pending CN114679720A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210312620.3A CN114679720A (en) 2022-03-28 2022-03-28 Network slice requesting method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210312620.3A CN114679720A (en) 2022-03-28 2022-03-28 Network slice requesting method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114679720A true CN114679720A (en) 2022-06-28

Family

ID=82076335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210312620.3A Pending CN114679720A (en) 2022-03-28 2022-03-28 Network slice requesting method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114679720A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017185909A1 (en) * 2016-04-27 2017-11-02 华为技术有限公司 Network slice processing method and apparatus
CN107580360A (en) * 2016-07-04 2018-01-12 ***通信有限公司研究院 A kind of network is cut into slices method, equipment and the network architecture of selection
US20200236594A1 (en) * 2017-09-25 2020-07-23 Huawei Technologies Co., Ltd. Network slice deployment method and related device
CN111885698A (en) * 2020-07-22 2020-11-03 Oppo广东移动通信有限公司 Network slice registration method, device, terminal and storage medium
CN112118120A (en) * 2019-06-20 2020-12-22 中国电信股份有限公司 Slicing signing method, system and computer readable storage medium
CN113098726A (en) * 2021-06-10 2021-07-09 深圳艾灵网络有限公司 Network slicing method, device and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017185909A1 (en) * 2016-04-27 2017-11-02 华为技术有限公司 Network slice processing method and apparatus
CN107580360A (en) * 2016-07-04 2018-01-12 ***通信有限公司研究院 A kind of network is cut into slices method, equipment and the network architecture of selection
US20200236594A1 (en) * 2017-09-25 2020-07-23 Huawei Technologies Co., Ltd. Network slice deployment method and related device
CN112118120A (en) * 2019-06-20 2020-12-22 中国电信股份有限公司 Slicing signing method, system and computer readable storage medium
CN111885698A (en) * 2020-07-22 2020-11-03 Oppo广东移动通信有限公司 Network slice registration method, device, terminal and storage medium
CN113098726A (en) * 2021-06-10 2021-07-09 深圳艾灵网络有限公司 Network slicing method, device and storage medium

Similar Documents

Publication Publication Date Title
US8644857B2 (en) Method, device and system for implementing location-based service
CN112600693B (en) Service request processing method, system, electronic equipment and computer storage medium
CN113422804A (en) Application instance migration method and multi-access edge computing host
CN112822756A (en) Communication method, system, base station and terminal
CN107889175A (en) Method for switching network, apparatus and system, method for network access and device
EP3826359A1 (en) Radio access network information processing method and device, network element, and storage medium
CN113841429B (en) Communication network component and method for initiating slice specific authentication and authorization
CN115361713A (en) Network slice switching method and device and communication system
EP4236409A1 (en) Data information acquisition methods and apparatus, related device, and medium
JP2023530608A (en) Network slice switching method, terminal, storage medium, and electronic device
CN112752352B (en) Method and equipment for determining I-SMF (intermediate session management function)
CN110460989B (en) Method, device and system for setting telephone number
CN110582090A (en) CDN scheduling method, scheduling system and MEC network element
CN114900833B (en) Authentication method and device, storage medium and electronic equipment
CN114679720A (en) Network slice requesting method and device, electronic equipment and storage medium
CN114189893A (en) O-RAN capability opening method, communication system, device and storage medium
CN113796156B (en) Communication network component and method for processing service requests
CN114095615A (en) Session establishment method, device, equipment and storage medium
CN111436028B (en) Service access method, system and communication open platform
CN114979284B (en) 5G message scheduling method, device and system
CN116032573B (en) Method, terminal, platform, equipment and medium for multi-user sharing slice service
CN113422772B (en) Private network terminal access processing method and device and electronic equipment
CN114095986B (en) Communication method, device, equipment and storage medium
CN117156523A (en) Private network access method, network element, equipment and medium based on near field communication network
RU2292668C1 (en) Method for controlling additional services in mobile communication networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination