CN117156523A - Private network access method, network element, equipment and medium based on near field communication network - Google Patents

Private network access method, network element, equipment and medium based on near field communication network Download PDF

Info

Publication number
CN117156523A
CN117156523A CN202210562161.4A CN202210562161A CN117156523A CN 117156523 A CN117156523 A CN 117156523A CN 202210562161 A CN202210562161 A CN 202210562161A CN 117156523 A CN117156523 A CN 117156523A
Authority
CN
China
Prior art keywords
private network
terminal equipment
network access
access information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210562161.4A
Other languages
Chinese (zh)
Inventor
谢沛荣
陈洁
吕振华
欧建南
毕奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210562161.4A priority Critical patent/CN117156523A/en
Publication of CN117156523A publication Critical patent/CN117156523A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Abstract

The application provides a private network access method, network elements, equipment and media based on a near field communication network, and relates to the technical field of communication. The method comprises the following steps: acquiring private network access information of a contracted private network of a remote terminal device; and accessing the private network base station of the private network by utilizing the private network access information so as to enable the remote terminal equipment to access the private network based on the relay terminal equipment. According to the embodiment of the application, the communication flexibility between the remote terminal equipment and the private network can be improved.

Description

Private network access method, network element, equipment and medium based on near field communication network
Technical Field
The present application relates to the field of communications technologies, and in particular, to a private network access method, a network element, a device, and a medium based on a near field communications network.
Background
A Non-Public Network (NPN), which may also be referred to as a private or private Network, is a Network deployment that is distinguished from a Public land mobile Network (Public Land Mobile Network, PLMN) in that it provides services to a particular user.
However, the non-public network of the present stage can provide only limited communication services to the terminal device, so that communication flexibility between the terminal device and the private network is lacking.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the application and thus may include information that does not form the prior art that is already known to those of ordinary skill in the art.
Disclosure of Invention
The application provides a private network access method, network element, equipment and medium based on a near field communication network, which at least solve the problem of insufficient communication flexibility between terminal equipment and the private network to a certain extent.
Other features and advantages of the application will be apparent from the following detailed description, or may be learned by the practice of the application.
According to an aspect of the present application, there is provided a private network access method based on a near field communication network, the near field communication network including a far end terminal device and a relay terminal device, the method being applied to the relay terminal device, the method comprising:
acquiring private network access information of a contracted private network of a remote terminal device;
and accessing the private network base station of the private network by utilizing the private network access information so as to enable the remote terminal equipment to access the private network based on the relay terminal equipment.
In one embodiment, acquiring the private network access identifier of the remote terminal device includes:
Sending a private network information inquiry request to a near domain communication control function network element so that the near domain communication control function network element inquires private network access information of remote terminal equipment based on terminal identification of the remote terminal equipment in the private network information inquiry request;
receiving response information of a private network information inquiry request returned by a near field communication control function network element;
and extracting private network access information from the response information.
In one embodiment, the reply message also carries a usage parameter threshold for private network access information,
after acquiring private network access information of the subscription private network of the remote terminal equipment, the method further comprises the following steps:
acquiring a use parameter for reflecting the real-time use condition of private network access information;
and deleting the private network access information under the condition that the usage parameter reaches the usage parameter threshold value.
In one embodiment, the usage parameter threshold includes at least one of:
a timer value, wherein the usage parameter comprises a used time length of private network access information;
a usage number threshold, wherein the usage parameter includes a number of used times of private network access information; and
and a disconnection time length threshold value, wherein the use parameter comprises the disconnection time length of the communication connection between the relay terminal equipment and the remote terminal equipment.
In one embodiment, the private network access information is obtained by the near domain communication control function network element in itself, or,
the private network access information is obtained by inquiring the private network access information from the user subscription database under the condition that the private network access information is not inquired by the near domain communication control function network element.
In one embodiment, the private network information query request further carries identification information of the relay terminal device, so that the near domain communication control function network element queries private network access information under the condition that the relay terminal device is determined to be a trusted terminal device.
In one embodiment, the subscription private network includes:
the private network access information comprises NID and PLMN ID; or,
the PNI-NPN private network access information comprises CAG ID.
According to another aspect of the present application, there is provided a private network access method based on a near field communication network, applied to a near field communication control function network element, including:
receiving a private network information inquiry request of the relay terminal equipment, wherein the private network information inquiry request carries a terminal identifier of the remote terminal equipment;
inquiring private network access information of the remote terminal equipment based on the terminal identification of the remote terminal equipment;
and sending response information carrying private network access information to the relay terminal equipment, so that after the relay terminal equipment accesses the private network base station of the private network by utilizing the private network access information, the remote terminal equipment accesses the private network based on the relay terminal equipment.
In one embodiment, querying private network access information of a remote terminal device based on a terminal identification of the remote terminal device includes:
inquiring private network access information locally;
and under the condition that the private network access information is not queried, querying and acquiring the private network access information from the subscriber subscription database.
According to still another aspect of the present application, there is provided a relay terminal device including:
the information acquisition module is used for acquiring private network access information of the contracted private network of the remote terminal equipment;
and the private network access module is used for accessing the private network base station of the contracted private network by utilizing the private network access information so as to enable the remote terminal equipment to access the contracted private network based on the relay terminal equipment.
According to still another aspect of the present application, there is provided a near field communication control function network element, including:
the request receiving module is used for receiving a private network information inquiry request of the relay terminal equipment, wherein the private network information inquiry request carries a terminal identifier of the remote terminal equipment;
the information inquiry module is used for inquiring private network access information of the remote terminal equipment based on the terminal identification of the remote terminal equipment;
and the information sending module is used for sending response information carrying private network access information to the relay terminal equipment so as to enable the remote terminal equipment to access the private network based on the relay terminal equipment after the relay terminal equipment accesses the private network base station of the private network by utilizing the private network access information.
According to still another aspect of the present application, there is provided an electronic apparatus including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the private network access method based on the near-field communication network described above via execution of the executable instructions.
According to yet another aspect of the present application, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the private network access method based on a near-field communication network described above.
According to the private network access method, the network element, the device and the medium based on the near-field communication network, the relay terminal device can be connected with the private network base station of the contracted private network based on the private network access information of the far-end terminal device, and further the far-end terminal device can access the contracted private network based on the relay terminal device. According to the embodiment of the application, whether the remote terminal equipment is in the communication coverage area of the private network base station or not can be based on the relay terminal equipment in the near-field communication network to access the private network, so that the communication between the remote terminal equipment and the private network is not limited by the communication coverage area of the private network base station, and the communication flexibility between the remote terminal equipment and the private network is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. It is evident that the drawings in the following description are only some embodiments of the present application and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
Fig. 1 shows a schematic view of a private network access method based on a near field communication network according to an embodiment of the present application;
fig. 2 shows a schematic architecture diagram of a private network access system based on a near field communication network according to an embodiment of the present application;
fig. 3 shows a flowchart of a private network access method based on a near field communication network in an embodiment of the present application;
fig. 4 is a schematic flow chart of another private network access method based on a near field communication network according to an embodiment of the disclosure;
fig. 5 is a schematic flow chart of another private network access method based on a near field communication network according to an embodiment of the disclosure;
Fig. 6 is a flowchart of still another private network access method based on a near field communication network in an embodiment of the present application;
fig. 7 is a schematic flow chart of a private network access method based on a near field communication network according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a relay terminal device in an embodiment of the present application;
fig. 9 is a schematic structural diagram of a near field communication control function network element according to an embodiment of the present application; and
fig. 10 shows a block diagram of an electronic device in an embodiment of the application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present application and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
It should be understood that the various steps recited in the method embodiments of the present application may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the application is not limited in this respect.
It should be noted that the terms "first," "second," and the like herein are merely used for distinguishing between different devices, modules, or units and not for limiting the order or interdependence of the functions performed by such devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those skilled in the art will appreciate that "one or more" is intended to be construed as "one or more" unless the context clearly indicates otherwise.
NPN, which may also be referred to as private or private networks, is a network deployment that is distinguished from public land mobile networks (PLMN, public Land Mobile Network) to provide services to specific subscribers.
When the terminal equipment is in the network coverage range of the private network base station, the terminal equipment can access the private network. However, when the terminal device is out of the network coverage of the private network base station, the terminal device cannot access the private network, so that the private network can only provide limited communication service for the terminal device, and the private network communication experience of the user is affected.
Based on the above, the embodiment of the application provides a technical scheme that a Remote terminal device (Remote UE) can be accessed to a private network through a relay terminal device in a near-field communication network.
However, the inventors have found that in The third generation partnership project (The 3rd Generation Partnership Project,3GPP) standard, it is also defined that terminal devices must sign up and be configured with specific private network access information to access private network base stations.
For example, for a public network integrated non-public private network (Public Network Integrated Non Public Network, PNI-NPN), a terminal device needs to sign up and configure a closed access group identifier (Closed Access Group Identity, CAG ID) corresponding to the private network, so as to access a private network base station of the PNI-NPN.
For another example, for a Stand-alone non-public private Network (Stand-alone Non Public Network, SNPN), a terminal device needs to sign up and configure a public land mobile Network identifier (Public Land Mobile Network Identity, PLMN ID) and a Network Identifier (NID) corresponding to the private Network to access a private Network base station of the SNPN.
However, the inventor finds that the relay terminal device often cannot access the private network required to be accessed by the remote terminal device due to the private network access information that the remote terminal device is not signed or configured with, so that the usage field Jing Shouxian of the near-field communication network cannot be applied to the access of the private network.
Based on the above problems, the embodiment of the application provides a private network access scheme based on a near-field network communication network, a relay terminal device can acquire private network access information of a far-end terminal device, and then uses the private network access information of the far-end terminal device to connect with a private network base station of a private network signed by the far-end terminal device, so that the far-end terminal device can access the private network signed by the relay terminal device. It should be noted that, the private network access scheme based on the near field communication network provided in the embodiment of the present application may be applied to mobile communication technologies such as 5G (5 th Generation Mobile Communication Technology, fifth generation mobile communication technology), 6G (6 th Generation Mobile Communication Technology, sixth generation mobile communication technology), and the like, which is not limited in particular.
And the scheme can also expand the application scene of near field communication, promote the service experience of private network users and reduce the deployment cost of the private network.
The following description will explain the technical solution provided by the embodiment of the present application.
Before beginning to introduce a private network access method, network elements, devices and media based on a near field communication network provided by the embodiment of the application, technical terms related to the embodiment of the application are described.
(1) The near field communication network, i.e. a novel communication mode, the terminal device may be connected to other terminal devices through wireless technologies including but not limited to WiFi, bluetooth, long-short wave, etc. (the terminal device may be an internet of things device, or may be a mobile phone, a computer, a gateway, etc.). Illustratively, the mobile phone of the user a may serve as a wireless communication signal providing source, and the devices of other users may acquire the wireless communication signal by connecting to the mobile phone of the user a.
Through the near field communication network, the problem of insufficient coverage of mobile communication in certain scenes, such as the situation that people are dense but base station channels are insufficient or the situation that regions are wide but the number of base stations is insufficient, can be solved, and multiplexing of network resources is realized.
(2) SNPN, which is independent of PLMN network and isolated from public network, is a special network independently built from base station to core network to cloud platform.
(3) The PNI-NPN network is operated by a traditional operator depending on a PLMN network, is a special network for non-public use deployed based on the prior art such as slicing, and controls the NPN special network to serve only authorized industry users based on enhanced functions such as user Closed Access Group (CAG) division and access restriction.
After technical terms related to the present application are introduced, an application scenario of a private network access scheme based on a near field communication network provided by the embodiment of the present application is described next.
Fig. 1 shows a schematic view of a private network access method based on a near field communication network according to an embodiment of the present application.
As shown in fig. 1, when the remote terminal device 11 is outside the communication coverage D1 of the private network base station 20, the remote terminal base station 11 may access the private network base station 20 through the relay terminal device 12 located within the communication coverage D1, thereby achieving communication with the private network 30. So that the communication between the remote terminal device 11 and the private network 30 is not limited to the communication coverage D1 of the private network base station 20, and the flexibility of the communication between the remote terminal device 11 and the private network 30 is improved.
After an application scenario of the embodiment of the present application is introduced, a network architecture related to the embodiment of the present application is described next.
Fig. 2 shows a schematic architecture diagram of a private network access system based on a near field communication network according to an embodiment of the present application.
As shown in fig. 2, the private network access system based on the near domain communication network may include a near domain communication network 10, a private network base station 20, and a private network 30.
For near field communication network 10, it may include a far end terminal device 11 and a relay terminal device 12.
The remote terminal device 11 may refer to a device that needs to access and access the private network using other terminal devices. Illustratively, the remote terminal device 11 may include, but is not limited to, a smart phone, a tablet computer, a laptop portable computer, a desktop computer, a wearable device, an augmented reality device, a virtual reality device, etc., which is not particularly limited. In one example, the remote terminal device 11 may be a dedicated device subscribing to the SNPN private network.
Relay terminal device 12 may refer to a device capable of providing wireless network signals to other terminal devices. The specific device type of the relay terminal device 12 is similar to that of the remote terminal device 11, and will not be described again. Illustratively, the relay terminal device 12 may acquire private network access information of the private network 30 subscribed to the remote terminal device 11, and access the private network base station 20 of the subscribed private network 30 using the private network access information, so that the remote terminal device 11 may access the subscribed private network based on the relay terminal device 12.
In some embodiments, the private network access system based on the near domain communication network may further comprise a near domain communication control function network element 40. Alternatively, the near domain communication control function network element 40 may be located in the core network, which may be responsible for assisting near domain communication discovery, near domain communication authorization, etc. In one example, near domain communication control function network element 40 may be implemented as a 5G direct discovery name management function (5G Direct Discovery Name Management Function,5G DDNMF).
Illustratively, the near-field communication control function network element 40 may receive the terminal identifier of the remote terminal device 11 sent by the relay terminal device 12, and query private network access information of the private network 30 subscribed by the remote terminal device 11 according to the terminal identifier of the remote terminal device 11, and return the private network access information to the relay terminal device 12.
In one embodiment, if the near field communication control function network element 40 does not query locally for private network access information, a query may be made to the subscriber subscription database. For example, a user subscription database on a unified data management function (Unified Data Management, UDM) network element may be queried.
The private network access system based on the near field communication network according to the embodiment of the application is introduced, and a private network access method based on the near field communication network is described next.
The present exemplary embodiment will be described in detail below with reference to the accompanying drawings and examples.
The embodiment of the application provides a private network access method based on a near field communication network, which can be executed by the relay terminal equipment.
Fig. 3 shows a flowchart of a private network access method based on a near field communication network in an embodiment of the present application, and as shown in fig. 3, the private network access method based on the near field communication network provided in the embodiment of the present application includes the following steps S310 and S320.
S310, private network access information of the signing private network of the remote terminal equipment is obtained.
For a subscription private network, it may be a private network that the remote terminal device may access. For example, if a user is a user of the SPNP private network, the subscription private network of the remote terminal device used by the user is the SPNP private network.
The private network access information may refer to information that is required to be used by the terminal device when accessing the private network.
In one embodiment, where the subscribed private network is a SNPN, the private network access information includes a NID and a PLMN ID.
In another embodiment, the private network access information includes a CAG ID in case the subscribed private network is a PNI-NPN.
The private network access information may be other information required for accessing the private network, in addition to the private network access identifier such as the CAG ID, NID, PLMN ID, etc., which is not particularly limited.
And it should be noted that, in the embodiment of the present application, the subscription private network may also be other NPN private networks, and correspondingly, the private network access information may also be private network access information of other NPN private networks.
S320, accessing private network base stations of the private network by using the private network access information, so that the remote terminal equipment accesses the private network based on the relay terminal equipment.
By private network base station, it may be meant a base station that is able to access a subscribed private network.
According to the private network access method based on the near field communication network, the relay terminal equipment can be connected with the private network base station of the contracted private network based on the private network access information of the far end terminal equipment, so that the far end terminal equipment can access the contracted private network based on the relay terminal equipment. According to the embodiment of the application, whether the remote terminal equipment is in the communication coverage area of the private network base station or not can be based on the relay terminal equipment in the near-field communication network to access the private network, so that the communication between the remote terminal equipment and the private network is not limited by the communication coverage area of the private network base station, and the communication flexibility between the remote terminal equipment and the private network is improved.
After the relay terminal equipment accesses the private network base station, the physical channel between the relay terminal equipment and the private network base station is established, and the relay terminal equipment does not have access authority of the private network before receiving the private network authentication, so that the access of the relay terminal equipment without the access authority of the private network to the private network is avoided, and the security of the private network is ensured.
In some embodiments, after the relay terminal device accesses the private network base station subscribed to the private network, the relay terminal device may relay signaling for establishing a session between the remote terminal device and the private network, so that the remote terminal device successfully accesses the private network and establishes a session connection. And after the session connection is successfully established, the service data packet between the remote terminal equipment and the private network can be transferred.
Fig. 4 is a schematic flow chart of another private network access method based on a near field communication network according to an embodiment of the disclosure, where the method may be performed by the above-mentioned relay terminal device. Embodiments of the present disclosure may be optimized based on the embodiments described above, and may be combined with various alternatives of one or more of the embodiments described above.
As shown in fig. 4, the private network access method based on the near field communication network provided in the embodiment of the present application includes the following steps S410 to S440.
S410, sending a private network information query request to the near domain communication control function network element, so that the near domain communication control function network element queries private network access information of the far end terminal equipment based on the terminal identification of the far end terminal equipment in the private network information query request.
In S410, the private network information query request carries a terminal identifier of the remote terminal device.
For the terminal identification of the far-end terminal device, it may uniquely identify the far-end terminal device in the near-domain communication network. The terminal identifier of the remote terminal device may be an identifier allocated to the remote terminal device by the near domain communication network, or may be a mobile phone number, etc., which is not particularly limited. In some embodiments, the terminal identifier of the remote terminal device may be obtained from the remote terminal device in the process of discovering the relay terminal device by the remote terminal device. The remote terminal device discovers the relay terminal device according to a standard flow. It should be noted that the relay terminal device may also obtain the terminal identifier of the remote terminal device by other manners, which is not limited in particular.
And for the private network information query request, the private network information query request is used for requesting private network access information of the terminal equipment. In some embodiments, the private network information query request may also carry other information, such as a terminal identifier of the relay terminal device, which is not limited in particular.
S420, receiving response information of the private network information query request returned by the near field communication control function network element.
As for the response information, it may refer to a response of the near domain communication control function network element to the received private network information query request. In some embodiments, the response information may carry private network access information.
And S430, extracting private network access information from the response information.
S440, using private network access information to access the private network base station of the private network, so that the remote terminal equipment accesses the private network based on the relay terminal equipment.
In some embodiments, the relay terminal device may store and apply the private network access information after acquiring it to access the private network base station.
Wherein, S440 is similar to S320, and reference may be made to the specific content of S320, which is not described herein.
According to the private network access method based on the near field communication network, the relay terminal equipment can be connected with the private network base station of the contracted private network based on the private network access information of the far end terminal equipment, so that the far end terminal equipment can access the contracted private network based on the relay terminal equipment. According to the embodiment of the application, whether the remote terminal equipment is in the communication coverage area of the private network base station or not can be based on the relay terminal equipment in the near-field communication network to access the private network, so that the communication between the remote terminal equipment and the private network is not limited by the communication coverage area of the private network base station, and the communication flexibility between the remote terminal equipment and the private network is improved.
And, it should be further noted that, in the manner of requesting private network access information from the near field communication control function network element, since the near field communication control function network element 40 may store private network access information of the private network having access rights for each terminal device, if the near field communication control function network element 40 may query and obtain private network access information of the remote terminal device, it characterizes that the remote terminal device has access capability of signing private network, so that access of the remote terminal device having access capability to the private network may be ensured through the near field communication control function network element 40, thereby improving security of the private network.
Fig. 5 is a schematic flow chart of another private network access method based on a near field communication network according to an embodiment of the disclosure, where the method may be performed by the above-mentioned relay terminal device. Embodiments of the present disclosure may be optimized based on the embodiments described above, and may be combined with various alternatives of one or more of the embodiments described above.
As shown in fig. 5, the private network access method based on the near field communication network provided in the embodiment of the present application includes the following steps S510 to S560.
S510, sending private network information inquiry request to the near domain communication control function network element, so that the near domain communication control function network element inquires private network access information of the far end terminal equipment based on the terminal identification of the far end terminal equipment in the private network information inquiry request.
Wherein, S510 is similar to S410, and reference may be made to the specific content of S410, which is not described herein.
S520, receiving response information of the private network information query request returned by the near field communication control function network element. The response information carries private network access information and a use parameter threshold value of the private network access information.
In some embodiments, the usage parameter threshold is a parameter value that may limit the usage of private network access information. For example, the usage parameter threshold may be at least one of a timer value, a usage number threshold, and a disconnection period threshold.
In some embodiments, the private network access information is obtained by the near domain communication control function network element in a query of itself.
In other embodiments, the private network access information is obtained by querying a subscriber subscription database by the near domain communication control function network element without querying the private network access information itself.
In some embodiments, the private network information query request further carries identification information of the relay terminal device, so that the near domain communication control function network element queries private network access information under the condition that the relay terminal device is determined to be a trusted terminal device.
It should be noted that, other contents of S520 are similar to S420, and reference may be made to specific contents of S420, which are not described herein.
S530, extracting private network access information from the response information.
Wherein, S530 is similar to S430, and the specific content of S430 may be referred to, and will not be described herein.
S540, the private network base station of the private network is accessed by utilizing the private network access information, so that the remote terminal equipment accesses the private network based on the relay terminal equipment.
Wherein S540 is similar to S440, reference may be made to the specific content of S440, and the description thereof will not be repeated here.
S550, obtaining the use parameters for reflecting the real-time use condition of the private network access information.
In some embodiments, the usage parameters may include at least one of a used duration of private network access information, a number of times the private network access information has been used, and a disconnection duration of the communication connection between the relay terminal device and the remote terminal device. The usage parameter may be any other parameter capable of reflecting the real-time usage of the private network access information, which is not particularly limited.
And S560, deleting the private network access information when the usage parameter reaches the usage parameter threshold.
In one example, in the case where the usage parameter is a used duration of the private network access information and the usage parameter threshold is a timer value, the timer of the relay terminal device may start from receiving the private network access information or start to count from the private network access information until the count value of the timer reaches the timer value, and the private network access information is deleted.
By the method, the time length of the private network use information of the relay terminal equipment can be limited through the timer value, the possibility that the relay terminal equipment provides the private network use information for the relay terminal equipment or other equipment is avoided, and the security of the private network access is improved.
In another example, the relay terminal device may count the number of times of use of the private network access information in the case where the use parameter is the number of times of use of the private network access information and the use parameter threshold is the use number threshold, and delete the private network access information in the case where the number of times of use reaches the use number threshold.
By the adoption of the special network access method and the special network access device, the use times of the special network use information of the relay terminal equipment can be limited through the use times threshold, the possibility that the special network use information is abused by the relay terminal equipment is avoided, and the safety of the special network access is improved.
In yet another example, in the case where the usage parameter is a disconnection time period of the communication connection between the relay terminal device and the remote terminal device, and the usage parameter threshold is a disconnection time period threshold, the private network access information may be deleted after the communication between the relay terminal device and the remote terminal device is disconnected for a period of time (i.e., the disconnection time period threshold).
By the method, after the relay terminal equipment and the remote terminal equipment are connected, private network access information is deleted in time, and the security of private network access is improved.
In some embodiments, in the case of deleting private network access information, the connection between the relay terminal device and the private network base station may also be disconnected.
According to the private network access method based on the near field communication network, the relay terminal equipment can be connected with the private network base station of the contracted private network based on the private network access information of the far end terminal equipment, so that the far end terminal equipment can access the contracted private network based on the relay terminal equipment. According to the embodiment of the application, whether the remote terminal equipment is in the communication coverage area of the private network base station or not can be based on the relay terminal equipment in the near-field communication network to access the private network, so that the communication between the remote terminal equipment and the private network is not limited by the communication coverage area of the private network base station, and the communication flexibility between the remote terminal equipment and the private network is improved.
And by using the parameter threshold, abuse and propagation of private network access information can be prevented, so that the security of the private network is ensured.
The embodiment of the application provides a private network access method based on a near field communication network, which can be executed by the near field communication control function network element.
Fig. 6 shows a flowchart of still another private network access method based on a near field communication network according to an embodiment of the present application, and as shown in fig. 6, the private network access method based on a near field communication network provided in the embodiment of the present application includes the following steps S610 to S630.
S610, receiving a private network information inquiry request of the relay terminal equipment, wherein the private network information inquiry request carries a terminal identifier of the remote terminal equipment.
S620, inquiring private network access information of the remote terminal equipment based on the terminal identification of the remote terminal equipment.
In some embodiments, S620 includes: step A1 and step A2.
And step A1, inquiring private network access information locally.
And step A2, under the condition that the private network access information is not queried, querying and acquiring the private network access information from the user subscription database.
Through step A1 and step A2, the problem that the remote terminal equipment cannot successfully access the private network due to the information asynchronization of the private network access information can be avoided, and the private network connection experience of a user is improved.
S630, sending response information carrying private network access information to the relay terminal equipment, so that the remote terminal equipment accesses the private network based on the relay terminal equipment after the relay terminal equipment accesses the private network base station of the private network by using the private network access information.
In some embodiments, in the case that the private network information query request further carries the identification information of the relay terminal device, the private network access method based on the near domain communication network may further include step A3 after S610.
And step A3, judging whether the relay terminal equipment is a trusted terminal equipment or not based on the identification information of the relay terminal equipment.
In one example, it may be queried whether the identification information of the relay terminal device is present in the device blacklist, and if not, it is determined that the relay terminal device is a trusted terminal device.
It should be noted that, whether the relay terminal device is a trusted terminal device may also be determined by other manners, which are not particularly limited.
Accordingly, S620 may include:
and inquiring private network access information of the remote terminal equipment based on the terminal identification of the remote terminal equipment under the condition that the relay terminal equipment is a trusted terminal equipment.
The private network access method based on the near field communication network provided by the embodiment of the application can provide the private network access information of the far-end terminal equipment for the relay terminal equipment, and the relay terminal equipment can be connected with the private network base station of the contracted private network based on the private network access information of the far-end terminal equipment, so that the far-end terminal equipment can access the contracted private network based on the relay terminal equipment. According to the embodiment of the application, whether the remote terminal equipment is in the communication coverage area of the private network base station or not can be based on the relay terminal equipment in the near-field communication network to access the private network, so that the communication between the remote terminal equipment and the private network is not limited by the communication coverage area of the private network base station, and the communication flexibility between the remote terminal equipment and the private network is improved.
It should be noted that, the private network access method based on the near field communication network shown in fig. 6 may refer to the steps in the method embodiments described above in conjunction with fig. 3 to 5, and implement the processes and effects in the method embodiments shown in fig. 3 to 5, which are not described herein.
In order to facilitate overall understanding of the private network access method based on the near field communication network provided by the embodiment of the present application, a description will be given next by way of an example.
Fig. 7 is a schematic flow chart of a private network access method based on a near field communication network according to an embodiment of the present application. Fig. 7 shows a flow of a remote terminal device (remote UE) accessing a PNI-NPN network through a relay terminal device (relay UE). The PNI-NPN network may include, among other things, a gNB (5G base station), an access and mobility management function (Access and Mobility Management Function, AMF), a session management function (Session Management Function, SMF), a user plane function (User Plane Function, UPF) network element.
As shown in fig. 7, the private network access method based on the near field communication network may include the following steps S701 to S706.
S701, the remote UE discovers the relay UE according to the standard procedure.
S702, the relay UE sends a private network information inquiry request to the 5G DDNMF, wherein the message contains the identification of the remote UE.
S703, the 5G DDNFM returns a response message to the relay UE, where the response message carries the CAG and the timer value. In this step, as there is no access network information of the remote UE in the 5G DDNFM, it may initiate a query to the UDM.
S704, the relay UE applies the private network access information. Illustratively, the relay UE attempts to access the private network base station using CAG.
S705, the relay UE successfully accesses the private network base station.
S706, the remote UE accesses the private network and develops the service through the relay UE.
Based on the same inventive concept, the embodiment of the application also provides a relay terminal device, as follows.
Fig. 8 shows a schematic structural diagram of a relay terminal device in an embodiment of the present application, and as shown in fig. 8, the relay terminal device 800 includes: an information acquisition module 810 and a private network access module 820.
An information obtaining module 810, configured to obtain private network access information of a private network subscribed by the remote terminal device;
the private network access module 820 is configured to access a private network base station of the private network by using the private network access information, so that the remote terminal device accesses the private network based on the relay terminal device.
In one embodiment, the information acquisition module 810 includes: a request transmitting unit, an information receiving unit, and an information extracting unit.
A request sending unit, configured to send a private network information query request to a near domain communication control function network element, so that the near domain communication control function network element queries private network access information of a remote terminal device based on a terminal identifier of the remote terminal device in the private network information query request;
the information receiving unit is used for receiving response information of the private network information query request returned by the near domain communication control function network element;
and the information extraction unit is used for extracting private network access information from the response information.
In one embodiment, the reply message also carries a usage parameter threshold for private network access information,
the relay terminal device 800 further includes a parameter acquisition module and an information deletion module.
The parameter acquisition module is used for acquiring the use parameters for reflecting the real-time use condition of the private network access information;
and the information deleting module is used for deleting the private network access information under the condition that the use parameter reaches the use parameter threshold value.
In one embodiment, the usage parameter threshold includes at least one of:
a timer value, wherein the usage parameter comprises a used time length of private network access information;
a usage number threshold, wherein the usage parameter includes a number of used times of private network access information; and
And a disconnection time length threshold value, wherein the use parameter comprises the disconnection time length of the communication connection between the relay terminal equipment and the remote terminal equipment.
In one embodiment, the private network access information is obtained by the near domain communication control function network element in itself, or,
the private network access information is obtained by inquiring the private network access information from the user subscription database under the condition that the private network access information is not inquired by the near domain communication control function network element.
In one embodiment, the private network information query request further carries identification information of the relay terminal device, so that the near domain communication control function network element queries private network access information under the condition that the relay terminal device is determined to be a trusted terminal device.
In one embodiment, the subscription private network includes:
the private network access information comprises NID and PLMN ID; or,
the PNI-NPN private network access information comprises CAG ID.
The relay terminal equipment provided by the embodiment of the application can be connected with the private network base station of the contracted private network based on the private network access information of the remote terminal equipment, so that the remote terminal equipment can access the contracted private network based on the relay terminal equipment. According to the embodiment of the application, whether the remote terminal equipment is in the communication coverage area of the private network base station or not can be based on the relay terminal equipment in the near-field communication network to access the private network, so that the communication between the remote terminal equipment and the private network is not limited by the communication coverage area of the private network base station, and the communication flexibility between the remote terminal equipment and the private network is improved.
It should be noted that, the relay terminal device 800 shown in fig. 8 may perform the steps in the method embodiments shown in fig. 3 to 5, and implement the procedures and effects in the method embodiments shown in fig. 3 to 5, which are not described herein.
Based on the same inventive concept, the embodiment of the application also provides a near field communication control function network element, as follows.
Fig. 9 shows a schematic structural diagram of a near domain communication control function network element in an embodiment of the present application, and as shown in fig. 9, the near domain communication control function network element 900 includes a request receiving module 910, an information query module 920, and an information sending module 930.
A request receiving module 910, configured to receive a private network information query request of a relay terminal device, where the private network information query request carries a terminal identifier of a remote terminal device;
the information query module 920 is configured to query private network access information of the remote terminal device based on the terminal identifier of the remote terminal device;
the information sending module 930 is configured to send response information carrying private network access information to the relay terminal device, so that after the relay terminal device accesses the private network base station of the private network by using the private network access information, the remote terminal device accesses the private network based on the relay terminal device.
In some embodiments, the information query module 920 is specifically configured to:
inquiring private network access information locally;
and under the condition that the private network access information is not queried, querying and acquiring the private network access information from the subscriber subscription database.
The near field communication control function network element provided by the embodiment of the application can provide private network access information of the far end terminal equipment for the relay terminal equipment, and the relay terminal equipment can be connected with a private network base station of the contracted private network based on the private network access information of the far end terminal equipment, so that the far end terminal equipment can access the contracted private network based on the relay terminal equipment. According to the embodiment of the application, whether the remote terminal equipment is in the communication coverage area of the private network base station or not can be based on the relay terminal equipment in the near-field communication network to access the private network, so that the communication between the remote terminal equipment and the private network is not limited by the communication coverage area of the private network base station, and the communication flexibility between the remote terminal equipment and the private network is improved.
It should be noted that, the relay terminal device 900 shown in fig. 9 may perform the steps in the method embodiment shown in fig. 6, and implement the procedures and effects in the method embodiment shown in fig. 6, which are not described herein.
Those skilled in the art will appreciate that the various aspects of the application may be implemented as a system, method, or program product. Accordingly, aspects of the application may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
An electronic device 1000 according to this embodiment of the present application is described below with reference to fig. 10. The electronic device 1000 shown in fig. 10 is merely an example and should not be construed as limiting the functionality and scope of use of embodiments of the present application.
As shown in fig. 10, the electronic device 1000 is embodied in the form of a general purpose computing device. Components of electronic device 1000 may include, but are not limited to: the at least one processing unit 1010, the at least one memory unit 1020, and a bus 1030 that connects the various system components, including the memory unit 1020 and the processing unit 1010.
Wherein the storage unit stores program code that is executable by the processing unit 1010 such that the processing unit 1010 performs steps according to various exemplary embodiments of the present application described in the above section of the "exemplary method" of the present specification.
The memory unit 1020 may include readable media in the form of volatile memory units such as Random Access Memory (RAM) 10201 and/or cache memory unit 10202, and may further include Read Only Memory (ROM) 10203.
The storage unit 1020 may also include a program/utility 10204 having a set (at least one) of program modules 10205, such program modules 10205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 1030 may be representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 1000 can also communicate with one or more external devices 1040 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 1000, and/or with any device (e.g., router, modem, etc.) that enables the electronic device 1000 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 1050.
Also, electronic device 1000 can communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 1060.
As shown in fig. 10, the network adapter 1060 communicates with other modules of the electronic device 1000 over the bus 1030.
It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with the electronic device 1000, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present application.
In an exemplary embodiment of the present application, a computer-readable storage medium, which may be a readable signal medium or a readable storage medium, is also provided. On which a program product is stored which enables the above-mentioned method of the application to be carried out.
In some possible embodiments, the aspects of the application may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the application as described in the "exemplary method" section of this specification, when the program product is run on the terminal device.
More specific examples of the computer readable storage medium in the present application may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In the present application, a computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein.
Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing.
A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
In some examples, program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In particular implementations, the program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages.
The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory.
Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
Furthermore, although the steps of the methods of the present application are depicted in the accompanying drawings in a particular order, this is not required to either imply that the steps must be performed in that particular order, or that all of the illustrated steps be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform, etc.
From the description of the above embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware.
Thus, the technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a mobile terminal, or a network device, etc.) to perform the method according to the embodiments of the present application.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein.
This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.

Claims (13)

1. A private network access method based on a near field communication network, wherein the near field communication network includes a far end terminal device and a relay terminal device, the method being applied to the relay terminal device, the method comprising:
acquiring private network access information of the contracted private network of the remote terminal equipment;
and accessing a private network base station of the private network by utilizing the private network access information so that the remote terminal equipment accesses the private network based on the relay terminal equipment.
2. The method according to claim 1, wherein the obtaining private network access information of the subscription private network of the remote terminal device includes:
sending a private network information inquiry request to a near domain communication control function network element, so that the near domain communication control function network element inquires private network access information of the remote terminal equipment based on the terminal identification of the remote terminal equipment in the private network information inquiry request;
receiving response information of the private network information query request returned by the near field communication control function network element;
and extracting the private network access information from the response information.
3. The method of claim 2, wherein the response message further carries a usage parameter threshold for the private network access message,
After the private network access information of the private network subscribed by the remote terminal device is acquired, the method further includes:
acquiring a use parameter for reflecting the real-time use condition of the private network access information;
and deleting the private network access information under the condition that the use parameter reaches the use parameter threshold value.
4. The method of claim 3, wherein the step of,
the usage parameter threshold includes at least one of:
a timer value, wherein the usage parameter includes a used time length of the private network access information;
a usage number threshold, wherein the usage parameter includes a number of times the private network access information has been used; and
and a disconnection time length threshold, wherein the use parameter comprises the disconnection time length of the communication connection between the relay terminal equipment and the remote terminal equipment.
5. The method of claim 2, wherein the step of determining the position of the substrate comprises,
the private network access information is obtained by the network element of the near field communication control function in self query, or,
the private network access information is obtained by inquiring a user subscription database under the condition that the private network access information is not inquired by a near field communication control function network element.
6. The method of claim 2, wherein the step of determining the position of the substrate comprises,
the private network information inquiry request also carries the identification information of the relay terminal equipment, so that the near domain communication control function network element inquires the private network access information under the condition that the relay terminal equipment is determined to be a trusted terminal equipment.
7. The method of claim 1, wherein the subscription private network comprises:
an independent non-public private network SNPN, wherein the private network access information comprises a network identifier NID and a public land mobile network identifier PLMN ID; or,
and the public network integrates a PNI-NPN of a non-public private network, and the private network access information comprises a closed access group identifier CAG ID.
8. The private network access method based on the near field communication network is characterized by being applied to a near field communication control function network element and comprising the following steps:
receiving a private network information inquiry request of relay terminal equipment, wherein the private network information inquiry request carries a terminal identifier of remote terminal equipment;
inquiring private network access information of the remote terminal equipment based on the terminal identification of the remote terminal equipment;
and sending response information carrying the private network access information to the relay terminal equipment, so that the remote terminal equipment accesses the private network based on the relay terminal equipment after the relay terminal equipment accesses the private network base station of the private network by utilizing the private network access information.
9. The method of claim 8, wherein the step of determining the position of the first electrode is performed,
the querying private network access information of the remote terminal device based on the terminal identifier of the remote terminal device includes:
inquiring the private network access information locally;
and under the condition that the private network access information is not queried, querying and acquiring the private network access information from a user subscription database.
10. A relay terminal device, comprising:
the information acquisition module is used for acquiring private network access information of the signing private network of the remote terminal equipment;
and the private network access module is used for accessing the private network base station of the private network by utilizing the private network access information so as to enable the remote terminal equipment to access the private network based on the relay terminal equipment.
11. A near field communication control function network element, comprising:
the request receiving module is used for receiving a private network information inquiry request of the relay terminal equipment, wherein the private network information inquiry request carries a terminal identifier of the remote terminal equipment;
the information inquiry module is used for inquiring private network access information of the remote terminal equipment based on the terminal identification of the remote terminal equipment;
And the information sending module is used for sending response information carrying the private network access information to the relay terminal equipment so that the remote terminal equipment can access the private network based on the relay terminal equipment after the relay terminal equipment accesses the private network base station of the private network by utilizing the private network access information.
12. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the private network access method based on a near-field communication network of any one of claims 1-9 via execution of the executable instructions.
13. A computer readable storage medium having stored thereon a computer program, which when executed by a processor implements the private network access method based on a near field communication network according to any of claims 1-9.
CN202210562161.4A 2022-05-23 2022-05-23 Private network access method, network element, equipment and medium based on near field communication network Pending CN117156523A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210562161.4A CN117156523A (en) 2022-05-23 2022-05-23 Private network access method, network element, equipment and medium based on near field communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210562161.4A CN117156523A (en) 2022-05-23 2022-05-23 Private network access method, network element, equipment and medium based on near field communication network

Publications (1)

Publication Number Publication Date
CN117156523A true CN117156523A (en) 2023-12-01

Family

ID=88904731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210562161.4A Pending CN117156523A (en) 2022-05-23 2022-05-23 Private network access method, network element, equipment and medium based on near field communication network

Country Status (1)

Country Link
CN (1) CN117156523A (en)

Similar Documents

Publication Publication Date Title
CN101674580B (en) Method for accessing mobile core network by utilizing fixed network
CN111132305B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
US8312151B2 (en) Communication systems and methods for dynamic and secure simplification of equipment networking
CN103812900A (en) Data synchronization method, device and system
CN110913394B (en) Method, device and equipment for service access and readable storage medium
WO2019161939A1 (en) Methods, devices, and computer programs for provisioning or controlling operator profiles in terminals
EP3079329B1 (en) Terminal application registration method, device and system
CN113411286B (en) Access processing method and device based on 5G technology, electronic equipment and storage medium
CN111093196B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN113055342B (en) Information processing method and communication device
CN113038467B (en) Event information reporting method and communication device
WO2023236497A1 (en) Authentication method and apparatus, storage medium, and electronic device
CN114691734B (en) Cache management and control method and device, computer readable medium and electronic equipment
CN113727325B (en) Session processing method and related equipment
CN117156523A (en) Private network access method, network element, equipment and medium based on near field communication network
CN112968868B (en) Service opening method and device
JP2004140563A (en) Communication system and communication terminal device
CN113382410B (en) Communication method and related device and computer readable storage medium
CN116527733A (en) Differentiated control method, device, equipment and storage of user terminal
CN110839219A (en) Method for accessing terminal into cellular network and cellular network system
CN116545777B (en) User category switching method and device, storage medium and electronic equipment
WO2023082668A1 (en) Emergency communication method and apparatus for snpn, and device and storage medium
CN115065995B (en) Associated information management method, device, electronic equipment and storage medium
CN115175118B (en) Communication service complementary system and method based on cooperative WiFi
EP4322480A1 (en) Secure identification of applications in communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination