WO2024032405A1 - 一种通信方法及通信装置 - Google Patents
一种通信方法及通信装置 Download PDFInfo
- Publication number
- WO2024032405A1 WO2024032405A1 PCT/CN2023/110144 CN2023110144W WO2024032405A1 WO 2024032405 A1 WO2024032405 A1 WO 2024032405A1 CN 2023110144 W CN2023110144 W CN 2023110144W WO 2024032405 A1 WO2024032405 A1 WO 2024032405A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- information
- message
- network device
- indication information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is leader and terminal is follower
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is leader and terminal is follower using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/27—Transitions between radio resource control [RRC] states
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
- H04W52/0229—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
- H04W52/0229—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
- H04W52/0235—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal where the received signal is a power saving command
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
- H04W52/0274—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
- H04W68/005—Transmission of information for alerting of incoming communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
- H04W68/12—Inter-network notification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
- H04W68/08—User notification, e.g. alerting and paging, for incoming communication, change of service or the like using multi-step notification by increasing the notification area
Definitions
- the present application relates to the field of communication, and in particular, to a communication method and communication device.
- the network device may divide multiple terminal devices in the same PO into multiple groups, and instruct the terminal devices of certain specified groups in the multiple groups to monitor paging messages in the PO based on the PEI mechanism.
- PEI paging early indication
- the terminal device needs to receive the broadcast message of the resident cell and determine whether it is allowed to use the PEI mechanism in the resident cell based on its last used cell. Reduce unnecessary power consumption.
- the present application provides a communication method and communication device, which are used to avoid paging errors caused by incorrect updates of terminal equipment, so as to enhance the PEI function implemented by the terminal equipment based on the first information and reduce the power consumption of the terminal equipment.
- the first aspect of the present application provides a communication method.
- the method is executed by a terminal device, or the method is executed by some components in the terminal device (such as a processor, a chip or a chip system, etc.), or the method can also be executed by a capable Logic modules or software implementations that implement all or part of the terminal equipment functions.
- the communication method is described by taking the example that the communication method is executed by a terminal device.
- the terminal device when the terminal device receives the first message and the access stratum (AS) security between the terminal device and the network device is not activated, the terminal device determines not to update the first information, The first information is used to indicate the cell last used by the terminal device, and the first message is used to indicate releasing the radio resource control (RRC) connection between the terminal device and the network device; the terminal device releases the RRC connect.
- AS access stratum
- RRC radio resource control
- the terminal device can maintain first information indicating the cell last used by the terminal device.
- the terminal device receives the first message indicating to release the RRC connection between the terminal device and the network device and releases the RRC connection
- the access layer security between the terminal device and the network device is not activated.
- the terminal device determines not to update the first information.
- the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism.
- the terminal device determines not to update the first information in a manner such that the terminal device does not update the first information based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device), which can avoid Paging errors occur due to incorrect updates of the terminal equipment, so as to enhance the PEI function implemented by the terminal equipment based on the first information and reduce the power consumption of the terminal equipment.
- the access layer security between the terminal device and the network device when the access layer security between the terminal device and the network device is not activated, it may be due to the failure of the connection between different network devices (access network device and core network device) to be successfully established. At that time, the network device cannot update the recently used cell information of the terminal device maintained by the network device. For this reason, in the above technical solution, the terminal device determines not to update the first information, which can make the maintenance of the terminal device's recently used cell information by the terminal device and the network device consistent (or aligned), thereby allowing the terminal device to The device and the network device can communicate normally using the PEI mechanism.
- the access layer security between the terminal device and the network device when the access layer security between the terminal device and the network device is not activated, it may be caused by the network device being an abnormal network device (such as a pseudo base station). For this reason, in the above technical solution, the terminal device determines not to update the first information, which can prevent the terminal device from accidentally updating to the wrong cell, thereby enabling the terminal device and the network device to communicate normally using the PEI mechanism.
- the network device being an abnormal network device (such as a pseudo base station).
- the terminal device when the terminal device releases the RRC connection, it can be understood that the terminal device exits the RRC connection state.
- the terminal device can enter other states besides the RRC connection state, such as idle state (idle state), inactive state (inactive state). )wait.
- the message name of the first message used to instruct the release of the RRC connection between the terminal device and the network device may be the RRC release (RRCReleace) message.
- This name is the name in the current communication system.
- the name of the message used to indicate releasing the RRC connection between the terminal device and the network device may change with the evolution of the communication system.
- the last used cell of the terminal device can be referred to as the cell to which the terminal device has recently accessed, the cell to which the terminal device has recently visited, the cell to which the terminal device has been released from connection, and the cell to which the terminal device has been released is sent to the terminal device.
- the terminal device determines not to update the first information, which can be expressed as the terminal device does not update the first information, or it can also be expressed as the terminal device does not need to identify whether the first message carries an indication to update (or not update) the first information.
- Instructing information to determine not to update the first information can also be expressed as the terminal device does not update the first information, it can also be expressed as the terminal device maintains the first information unchanged, or it can be expressed as the first information maintained by the terminal device remains unchanged. wait.
- the first message includes first indication information, and the first indication information is used to indicate not to update the first information; the method further includes: connecting the terminal device and the network When the access layer security between devices is not activated, the terminal device ignores the first indication information.
- the terminal device when the access layer security between the terminal device and the network device is not activated, the terminal device can determine that it cannot communicate with the network device based on the access layer security mechanism. To this end, The terminal device may ignore the first indication information carried in the first message and determine not to update the first information. In other words, the terminal device may determine not to update the first information without identifying whether the first message carries indication information indicating updating (or not updating) the first information, so as to avoid paging errors caused by mis-updates by the terminal device. Appear.
- the name of the first indication information may be noLastCellUpdate cell/field/domain/parameter. This name is the name in the current communication system. In the future communication system, the first The name of the indication information may change as the communication system evolves.
- the first message includes second indication information
- the second indication information is used to indicate a waiting time (wait time) for accessing the network
- the method further includes: the terminal device Ignore at least one piece of information in the first message except the second indication information, where the at least one piece of information includes first indication information, and the first indication information is used to indicate not to update the first information.
- the first message received by the terminal device may include second indication information indicating the waiting time for accessing the network, so that the terminal device can subsequently re-establish the connection with the network device based on the second indication information. connect.
- the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism. To this end, the terminal device At least one piece of information in the first message except the second indication information may be ignored.
- the terminal device ignoring at least one piece of information in the first message except the second indication information may include the terminal device ignoring other information in the first message except the second indication information.
- the second indication information can also be expressed in other ways, including: the second indication information is used to indicate the timing duration of timer T302 (where T302 indicates the waiting time for the terminal device to re-establish or restore the RRC connection); The indication information is used to indicate the waiting time for the terminal device's access attempt (access attempt), and the second indication information is used to indicate the waiting time for controlling the terminal device to establish an RRC connection, etc.
- the name of the second indication information may be a waiting time (waitTime) cell/field/domain/parameter. This name is the name in the current communication system. In the future communication system, the name of the second indication information May change as communication systems evolve.
- the first information includes cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be a cell global identifier (CGI), a physical cell identifier (PCI), etc.
- the terminal device determines that the access layer security between the terminal device and the network device is not activated, including: the terminal device determines that no reception is received to the security mode command message; after the terminal device receives the security mode command message, the terminal device determines that the process of deriving the key based on the security mode command message has failed; or, after the terminal device receives the security mode command message, the terminal device It is determined that the integrity protection check corresponding to the security mode command message has failed.
- the terminal device can determine the access layer security between the terminal device and the network device through the above multiple methods. All are not activated to improve the flexibility of solution implementation.
- the method further includes: the terminal device sending first capability information, the first capability information indicating that the terminal device supports PEI.
- the terminal device can send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism. .
- the method further includes: the terminal device receiving third indication information, the third indication information indicating that the network device supports PEI.
- the network device can send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism. .
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- the second aspect of the present application provides a communication method.
- the method is executed by a network device, or the method is executed by some components in the network device (such as a processor, a chip or a chip system, etc.), or the method can also be executed by a capable Logic modules or software implementations that implement all or part of the network device functions.
- the communication method is described by taking the example that the communication method is executed by a network device.
- the network device when the network device has sent the first message and the access layer security between the terminal device and the network device is not activated, the network device determines not to update the second information, and the second information is used to indicate For one or more cells that the terminal device has visited, the first message is used to instruct to release the radio resource control RRC connection between the terminal device and the network device; the network device releases the RRC connection.
- the network device may maintain second information indicating one or more cells that the terminal device has visited.
- the network device sends the first message instructing to release the RRC connection between the terminal device and the network device and releases the RRC connection
- the access layer security between the terminal device and the network device is not activated.
- the network device determines not to update the second information.
- the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism.
- the network device determines not to update the second information in a manner such that the network device does not update the second information based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device), which can avoid Paging errors occur due to incorrect updates of network equipment, so as to enhance the PEI function implemented by the network equipment based on the second information and reduce the power consumption of the network equipment.
- the access layer security between the terminal device and the network device when the access layer security between the terminal device and the network device is not activated, it may be due to the failure of the connection between different network devices (access network device and core network device) to be successfully established. At that time, the network device cannot update the recently used cell information of the terminal device maintained by the network device. To this end, in the above technical solution, the network device determines not to update the second information, which can make the maintenance of the terminal device's recently used cell information by the terminal device and the network device consistent (or aligned), thereby allowing the terminal device to The device and the network device can communicate normally using the PEI mechanism.
- the access layer security between the terminal device and the network device when the access layer security between the terminal device and the network device is not activated, it may be caused by the network device being an abnormal network device (such as a pseudo base station). For this reason, in the above technical solution, the network device determines not to update the second information, which can prevent the network device from mistakenly updating to the wrong cell, thereby enabling the terminal device and the network device to communicate normally using the PEI mechanism.
- the network device determines not to update the second information, which can prevent the network device from mistakenly updating to the wrong cell, thereby enabling the terminal device and the network device to communicate normally using the PEI mechanism.
- the network device determines not to update the second information, which can be expressed as the network device does not update the second information, or it can also be expressed as the network device does not need to identify whether the first message carries an indication to update (or not update) the first information.
- Instructing information to determine not to update the second information can also be expressed as the network device does not update the second information, it can also be expressed as the network device maintains the second information unchanged, or it can be expressed as the network device maintains the second information unchanged. wait.
- the second information is used to indicate one or more cells that the terminal device has visited, and the second information can also be used to indicate other information, such as one or more cells that the terminal device has not visited. , or other information, which is not limited here.
- the first message includes first indication information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the last used by the terminal device. cell; the method also includes: in the case where the access layer security between the terminal device and the network device is not activated, the network device determines that the terminal device ignores the first indication information.
- the network device when the access layer security between the terminal device and the network device is not activated, the network device can determine that it cannot communicate with the terminal device based on the access layer security mechanism. To this end, The network device determines that the terminal device ignores the first indication information, so that the network device and the terminal device can align their understanding of the first information, in order to reduce the possibility of communication errors.
- the first message includes second indication information
- the second indication information is used to indicate the waiting time for accessing the network
- the method further includes: between the terminal device and the network When the access layer security between devices is not activated, the network device determines that the terminal device ignores at least one piece of information in the first message except the second indication information, and the at least one piece of information includes the first indication information,
- the first indication information is used to indicate not to update the first information, and the first information is used to indicate the cell last used by the terminal device.
- the first message sent by the network device may include second indication information indicating the waiting time for accessing the network, so that the terminal device can subsequently re-establish the connection with the network device based on the second indication information. connect.
- the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism. To this end, the network device It may be determined that the terminal device ignores at least one piece of information in the first message except the second indication information, so that the network device and the terminal device can align their understanding of the first message, in order to reduce the possibility of communication errors.
- the second indication information can also be expressed in other ways, including: the second indication information is used to indicate the timing duration of timer T302 (where T302 indicates the waiting time for the terminal device to re-establish or restore the RRC connection); The indication information is used to indicate the waiting time for the terminal device's access attempt (access attempt), and the second indication information is used to indicate the waiting time for controlling the terminal device to establish an RRC connection, etc.
- the method further includes: when the access layer security between the terminal device and the network device is not activated, the network device determines that the terminal device does not update the first Information, the first information is used to indicate the cell last used by the terminal device.
- the network device when the access layer security between the terminal device and the network device is not activated, the network device can determine that it cannot communicate with the terminal device based on the access layer security mechanism. To this end, The network device determines that the terminal device does not update the first information, so that the network device and the terminal device can align their understanding of the first information, in order to reduce the possibility of communication errors.
- the first information includes cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be CGI, PCI, etc.
- the second information includes identifiers of one or more cells visited by the terminal device.
- the identifiers of one or more cells visited by the terminal device may be CGI, PCI, etc.
- the network device sends the second information to the core network device.
- the network device may also send second information indicating one or more cells that the terminal device has visited to the core network device, so that the core network device and the network device can align the two to the third cell. 2. Understanding of information in order to reduce the possibility of communication errors.
- the method further includes: the network device receiving first capability information, the first capability information indicating that the terminal device supports PEI.
- the terminal device can send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism. .
- the method further includes: the network device sending third indication information, the third indication information indicating that the network device supports PEI.
- the network device can send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism. .
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- the third aspect of the present application provides a communication method.
- the method is executed by a terminal device, or the method is executed by some components in the terminal device (such as a processor, a chip or a chip system, etc.), or the method can also be implemented by Logic module or software implementation of all or part of the terminal equipment functions.
- the communication method is described by taking the example that the communication method is executed by a terminal device. In this method, when the terminal device receives the first message and the access layer security between the terminal device and the network device is not activated, the terminal device determines not to ignore the first indication information in the first message.
- the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information; wherein the first message is used to indicate the release of wireless resources between the terminal device and the network device.
- the first indication information is used to indicate not to update the first information
- the first information is used to indicate the cell last used by the terminal equipment
- the second indication information is used to indicate the waiting time for accessing the network; the terminal The device releases the RRC connection.
- the terminal device can maintain first information indicating the cell last used by the terminal device.
- the access layer security between the terminal device and the network device is not activated.
- the terminal device determines not to ignore the first indication information in the first message, or the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information.
- the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism.
- the terminal device determines a way not to ignore the first indication information in the first message (or, the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information), So that the terminal device will not update the first information based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device), which can avoid the occurrence of paging errors due to incorrect updates by the terminal device.
- the terminal device determines a way not to ignore the first indication information in the first message (or, the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information), So that the terminal device will not update the first information based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device), which can avoid the occurrence of paging errors due to incorrect updates by the terminal device.
- the terminal device determines a way not to ignore the first indication information in the first message (or, the terminal device ignores at least one piece of information in the first message except
- the terminal device determines a way not to ignore the first indication information in the first message (or the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information), and further The understanding of the first indication information between the terminal device and the network device can be aligned, so as to reduce the possibility of communication errors.
- the terminal device ignoring at least one piece of information in the first message other than the first indication information and the second indication information may include: the terminal device ignoring the first message except the first indication information and the second indication.
- Information other than information may include: the terminal device ignoring the first message except the first indication information and the second indication.
- the method further includes: the terminal device determining not to update the first information according to the first indication information.
- the process of the terminal device determining not to ignore the first indication information may include the terminal device determining not to update the first information based on the first indication information, so that the terminal device is based on the first indication information sent by the network device. Determining not to update the first information enables the terminal device and the network device to align their understanding of the first indication information, in order to reduce the possibility of communication errors.
- the first information includes cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be CGI, PCI, etc.
- the terminal device determines that the access layer security between the terminal device and the network device is not activated, including: the terminal device determines that no reception to the security mode command message; after the terminal device receives the security mode command message, the terminal device determines that the process of deriving the key based on the security mode command message has failed; or, after the terminal device receives the security mode command message, the terminal device It is determined that the integrity protection check corresponding to the security mode command message has failed.
- the terminal device can determine that the access layer security between the terminal device and the network device is not activated through the above multiple methods, so as to improve the flexibility of solution implementation.
- the method further includes: the terminal device sending first capability information, the first capability information indicating that the terminal device supports paging advance indication PEI.
- the terminal device can send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism. .
- the method further includes: the terminal device receiving third indication information, the third indication information indicating that the network device supports PEI.
- the network device can send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism. .
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- the fourth aspect of the present application provides a communication method.
- the method is executed by a network device, or the method is executed by some components in the network device (such as a processor, a chip or a chip system, etc.), or the method can also be executed by a capable Logic modules or software implementations that implement all or part of the network device functions.
- the communication method is described by taking the example that the communication method is executed by a network device.
- the network device determines not to ignore the first indication information in the first message, Alternatively, the network device ignores at least one piece of information in the first message except the first indication information and the second indication information; wherein the first message is used to indicate releasing the radio resource control between the terminal device and the network device.
- RRC connection the first indication information is used to indicate not to update the first information, the first information is used to indicate the cell last used by the terminal device, and the second indication information is used to indicate the waiting time for accessing the network; the network device Release the RRC connection.
- the access layer security between the terminal device and the network device is not secure.
- the network device determines not to ignore the first indication information in the first message, or the network device ignores at least one piece of information in the first message except the first indication information and the second indication information.
- the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism.
- the network device determines a way not to ignore the first indication information in the first message (or, the network device ignores at least one piece of information in the first message except the first indication information and the second indication information), Making it clear to the network device that the terminal device will not update the first information based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device) can avoid paging errors caused by mis-updates by the terminal device. situation occurs, so as to enhance the PEI function implemented by the terminal device based on the first information and reduce the power consumption of the terminal device.
- the network device determines a way not to ignore the first indication information in the first message (or the network device ignores at least one piece of information in the first message except the first indication information and the second indication information), and further The understanding of the first indication information between the terminal device and the network device can be aligned, so as to reduce the possibility of communication errors.
- the network device ignoring at least one piece of information in the first message except the first indication information and the second indication information may include: the network device ignoring the first message except the first indication information and the second indication.
- Information other than information may include: the network device ignoring the first message except the first indication information and the second indication.
- the method further includes: the network device determines not to update second information based on the first indication information, where the second information is used for one or more sites that the terminal device has accessed. community.
- the network device may determine not to update the second information for one or more cells visited by the terminal device according to the first indication information, so as to facilitate the alignment between the terminal device and the network device.
- the first directs the understanding of the message in order to reduce the possibility of communication errors.
- the second information includes identification of one or more cells visited by the terminal device.
- the identifiers of one or more cells visited by the terminal device may be CGI, PCI, etc.
- the first information includes cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be CGI, PCI, etc.
- the method further includes: when the access layer security between the terminal device and the network device is not activated, the network device determines that the terminal device does not ignore the first The first indication information in a message, or the network device determines that the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information.
- the network device when the access layer security between the terminal device and the network device is not activated, the network device can determine that it cannot communicate with the terminal device based on the access layer security mechanism. To this end, The network device determines that the terminal device does not ignore the first indication information in the first message (or, the network device determines that the terminal device ignores at least one of the first indication information except the first indication information and the second indication information in the first message). information), so that the network device and the terminal device can align their understanding of the first information, in order to reduce the possibility of communication errors.
- the method further includes: the network device sending second information to the core network device.
- the network device may also send second information indicating one or more cells that the terminal device has visited to the core network device, so that the core network device and the network device can align the two to the third cell. 2. Understanding of information in order to reduce the possibility of communication errors.
- the method further includes: the network device receiving first capability information, the first capability information indicating that the terminal device supports PEI.
- the terminal device can send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism. .
- the method further includes: the network device sending third indication information, the third indication information indicating that the network device supports PEI.
- the network device can send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism. .
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- the fifth aspect of the present application provides a communication method.
- the method is executed by a terminal device, or the method is executed by some components in the terminal device (such as a processor, a chip or a chip system, etc.), or the method can also be executed by a capable device.
- Logic modules or software implementations that implement all or part of the terminal equipment functions.
- the communication method is described by taking the example that the communication method is executed by a terminal device.
- the terminal device when the terminal device receives the first message and the access layer security between the terminal device and the network device is not activated, the terminal device processes the first information according to the first message, and the first The information is used to indicate the cell information last used by the terminal device, and the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device; the terminal device releases the RRC connection.
- the terminal device can maintain first information indicating the cell last used by the terminal device.
- the terminal device receives a first message indicating to release the RRC connection between the terminal device and the network device and releases the RRC connection
- the terminal device processes the first information according to the first message.
- the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism. Therefore, the terminal device processes the first information according to the first message, so that the terminal device and the network device align their understanding of the first message, in order to reduce the possibility of communication errors.
- the terminal device processing the first information according to the first message includes: when the first message includes the first indication information, the terminal device determines not to update the first information. information, the first indication information is used to indicate not to update the first information.
- the terminal device determines not to update the first information, so that the terminal device performs the corresponding operation based on the instruction of the network device. operations to reduce the possibility of communication errors.
- the terminal device processing the first information based on the first message includes: when the first message does not include the first indication information, the terminal device processes the first information based on the first message.
- the corresponding cell updates the first information, and the first indication information is used to indicate not to update the first information.
- the terminal device updates the first information based on the cell corresponding to the first message, so that the terminal device performs the corresponding operation based on the instructions of the network device. , in order to reduce the possibility of communication errors.
- the process of the terminal device updating the first information based on the cell corresponding to the first message includes: the terminal device updating the first information based on the cell identity of the cell that sent the first message, or the terminal device updating the first information based on the cell identity of the cell that sent the first message.
- the cell identity carried in the first message updates the first information, which is not limited here.
- the first information includes cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be CGI, PCI, etc.
- the terminal device determines that the access layer security between the terminal device and the network device is not activated, including: the terminal device determines that no reception is received to the security mode command message; after the terminal device receives the security mode command message, the terminal device determines that the process of deriving the key based on the security mode command message has failed; or, after the terminal device receives the security mode command message, the terminal device It is determined that the integrity protection check corresponding to the security mode command message has failed.
- the terminal device can determine that the access layer security between the terminal device and the network device is not activated through the above multiple methods, so as to improve the flexibility of solution implementation.
- the method further includes: the terminal device sending first capability information, and the first capability The information indicates that the terminal device supports PEI.
- the terminal device can send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism. .
- the method further includes: the terminal device receiving third indication information, the third indication information indicating that the network device supports PEI.
- the network device can send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism. .
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- the sixth aspect of the present application provides a communication method.
- the method is executed by a network device, or the method is executed by some components in the network device (such as a processor, a chip or a chip system, etc.), or the method can also be executed by a capable Logic modules or software implementations that implement all or part of the network device functions.
- the communication method is described by taking the example that the communication method is executed by a network device.
- the network device when the network device has sent the first message and the access layer security between the terminal device and the network device is not activated, the network device processes the second information according to the first message, and the second information
- the first message is used to indicate one or more cells that the terminal device has visited.
- the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device; the network device releases the RRC connection.
- the network device may maintain second information indicating one or more cells that the terminal device has visited.
- the network device sends a first message instructing to release the RRC connection between the terminal device and the network device and releases the RRC connection
- the network device processes the second information according to the first message.
- the network device may determine that it cannot communicate with the network device based on the access layer security mechanism. Therefore, the network device processes the first information according to the first message, so that the terminal device and the network device align their understanding of the first message, in order to reduce the possibility of communication errors.
- the network device processing the second information according to the first message includes: when the first message includes the first indication information, the network device determines not to update the second information. information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the cell information last used by the terminal device.
- the network device determines not to update the second information, so that the subsequent terminal device performs the corresponding operation based on the instruction of the network device. operations to reduce the possibility of communication errors.
- the terminal device processing the first information based on the first message includes: when the first message does not include the first indication information, the terminal device processes the first information based on the first message.
- the corresponding cell updates the second information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the cell information last used by the terminal device.
- the network device updates the second information based on the cell corresponding to the first message, so that subsequent terminal devices perform corresponding operations based on the instructions of the network device. , in order to reduce the possibility of communication errors.
- the process of the terminal device updating the first information based on the cell corresponding to the first message includes: the terminal device updating the first information based on the cell identity of the cell that sent the first message, or the terminal device updating the first information based on the cell identity of the cell that sent the first message.
- the cell identity carried in the first message updates the first information, which is not limited here.
- the terminal device updates the first information based on the cell identity of the cell that sends the first message.
- the terminal device updates the last used cell information indicated by the first information to send the first message.
- the cell ID of the cell is not limited here.
- the first information includes cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be CGI, PCI, etc.
- the second information includes identification of one or more cells visited by the terminal device.
- the identifiers of one or more cells visited by the terminal device may be CGI, PCI, etc.
- the method further includes: the network device sending second information to the core network device.
- the network device may also send second information indicating one or more cells that the terminal device has visited to the core network device, so that the core network device and the network device can align the two to the third cell. 2. Understanding of information in order to reduce the possibility of communication errors.
- the method further includes: the network device determining whether the terminal device updates the first information based on the first message.
- the network device can also determine whether the terminal device updates the first information according to the first message, so that the network device can clarify the behavior of the terminal device in order to avoid communication errors.
- the method further includes: the network device receiving first capability information, the first capability information indicating that the terminal device supports PEI.
- the terminal device can send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism. .
- the method further includes: the network device sending third indication information, the third indication information indicating that the network device supports PEI.
- the network device can send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism. .
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- a seventh aspect of the present application provides a communication device that can implement the method in the above-mentioned first aspect or any possible implementation manner of the first aspect.
- the device includes corresponding units or modules for performing the above method.
- the units or modules included in the device can be implemented by software and/or hardware.
- the device can be a terminal device, or the device can be a component in the terminal device (such as a processor, a chip or a chip system, etc.), or the device can also be a logic module that can realize all or part of the functions of the terminal device or software.
- the communication device is described as an example of a terminal device.
- the device includes a processing unit and a transceiver unit; when the transceiver unit receives the first message and the access layer security between the terminal device and the network device is not activated, the processing unit determines not to update the first information , the first information is used to indicate the cell last used by the terminal device, and the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device; the processing unit releases the RRC connection.
- the first message includes first indication information, the first indication information is used to indicate not to update the first information; the interface between the terminal device and the network device When entry security is not activated, the processing unit is also configured to ignore the first indication information.
- the first message includes second indication information, the second indication information is used to indicate the waiting time for accessing the network; the processing unit is also configured to ignore the first message. At least one piece of information other than the second indication information, the at least one piece of information includes first indication information, and the first indication information is used to indicate not to update the first information.
- the first information includes cell information last used by the terminal device.
- the processing unit determines that the access layer security between the terminal device and the network device is not activated, including: the processing unit determines that no reception is received to the security mode command message; after the transceiver unit receives the security mode command message, the processing unit determines that the process of deriving the key based on the security mode command message fails; or, after the transceiver unit receives the security mode command message, the processing unit The processing unit determines that the integrity protection check corresponding to the security mode command message fails.
- the transceiver unit is further configured to send first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit is further configured to receive third indication information, where the third indication information indicates that the network device supports PEI.
- the component modules of the communication device can also be used to perform the steps performed in each possible implementation manner of the first aspect, and achieve corresponding technical effects.
- the first aspect here No longer.
- An eighth aspect of the present application provides a communication device that can implement the method in the above second aspect or any possible implementation manner of the second aspect.
- the device includes corresponding units or modules for performing the above method.
- the units or modules included in the device can be implemented by software and/or hardware.
- the device can be a network device, or the device can be a component in the network device (such as a processor, a chip or a chip system, etc.), or the device can also be a logic module that can realize all or part of the functions of the network device or software.
- the communication device is a network device as an example for description.
- the device includes a processing unit and a transceiver unit; when the transceiver unit has sent the first message and the access layer security between the terminal device and the network device is not activated, the processing unit determines not to update the second information, The second information is used to indicate one or more cells that the terminal device has visited, and the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device; the processing unit releases the RRC connection.
- the first message includes first indication information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the last used by the terminal device.
- the processing unit determines that the terminal device ignores the first indication information.
- the first message includes second indication information, the second indication information is used to indicate the waiting time for accessing the network; the interface between the terminal device and the network device When inbound security is not activated, the processing unit determines that the terminal device ignores at least one piece of information in the first message except the second indication information, and the at least one piece of information includes the first indication information, and the first indication information It is used to indicate not to update the first information, and the first information is used to indicate the cell last used by the terminal device.
- the processing unit determines that the terminal device does not update the first information, and the first The information is used to indicate the cell last used by the terminal device.
- the first information includes cell information last used by the terminal device.
- the second information includes identifiers of one or more cells visited by the terminal device.
- the transceiver unit is also configured to send the second information to the core network device.
- the transceiver unit is further configured to send third indication information, where the third indication information indicates that the network device supports PEI.
- the component modules of the communication device can also be used to perform the steps performed in each possible implementation manner of the second aspect, and achieve corresponding technical effects.
- the second aspect here No longer.
- a ninth aspect of the present application provides a communication device that can implement the method in the above third aspect or any possible implementation manner of the third aspect.
- the device includes corresponding units or modules for performing the above method.
- the units or modules included in the device can be implemented by software and/or hardware.
- the device can be a terminal device, or the device can be a component in the terminal device (such as a processor, a chip or a chip system, etc.), or the device can also be a logic module that can realize all or part of the functions of the terminal device or software.
- the communication device is described as an example of a terminal device.
- the device includes a processing unit and a transceiver unit; when the transceiver unit receives the first message and the access layer security between the terminal device and the network device is not activated, the processing unit determines not to ignore the first message.
- the first indication information in the message, or the processing unit ignores at least one piece of information in the first message except the first indication information and the second indication information; wherein the first message is used to indicate releasing the terminal device and Radio Resource Control RRC connection between network devices, the first indication information is used to indicate not to update the first information, the first information is used to indicate the cell last used by the terminal device, and the second indication information is used to indicate access The waiting time of the network; the processing unit releases the RRC connection.
- the processing unit is further configured to determine not to update the first information according to the first indication information.
- the first information includes cell information last used by the terminal device.
- the processing unit determines that the access layer security between the terminal device and the network device is not activated, including: the processing unit determines that no reception to the security mode command message; after the transceiver unit receives the security mode command message, the processing unit determines that the process of deriving the key based on the security mode command message has failed; or, after the receiving unit receives the security mode command message, After the sending unit receives the security mode command message, the processing unit determines that the integrity protection check corresponding to the security mode command message fails.
- the transceiver unit is further configured to send first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit is further configured to receive third indication information, where the third indication information indicates that the network device supports PEI.
- the component modules of the communication device can also be used to perform the steps performed in each possible implementation manner of the third aspect, and achieve corresponding technical effects.
- the third aspect here No longer.
- a tenth aspect of the present application provides a communication device that can implement the method in the above-mentioned fourth aspect or any possible implementation manner of the fourth aspect.
- the device includes corresponding units or modules for performing the above method.
- the units or modules included in the device can be implemented by software and/or hardware.
- the device can be a network device, or the device can be a component in the network device (such as a processor, a chip or a chip system, etc.), or the device can also be a logic module that can realize all or part of the functions of the network device or software.
- the communication device is a network device as an example for description.
- the device includes a processing unit and a transceiver unit; when the transceiver unit has sent the first message and the access layer security between the terminal device and the network device is not activated, the processing unit determines not to ignore the first message the first indication information in the first message, or the processing unit ignores at least one piece of information in the first message except the first indication information and the second indication information; wherein the first message is used to indicate releasing the terminal device and the network Radio Resource Control RRC connection between devices, the first indication information is used to indicate not to update the first information, the first information is used to indicate the cell last used by the terminal device, and the second indication information is used to indicate access to the network waiting time; the processing unit releases the RRC connection.
- the processing unit releases the RRC connection.
- the processing unit is further configured to determine not to update second information according to the first indication information, where the second information is used for one or more cells visited by the terminal device.
- the second information includes identification of one or more cells visited by the terminal device.
- the first information includes cell information last used by the terminal device.
- the processing unit determines that the terminal device does not ignore the first message in the first message.
- An indication information or the processing unit determines that the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information.
- the transceiver unit is also used to send the second information to the core network device.
- the transceiver unit is further configured to receive first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit is further configured to send third indication information, where the third indication information indicates that the network device supports PEI.
- the component modules of the communication device can also be used to perform the steps performed in each possible implementation manner of the third aspect, and achieve corresponding technical effects.
- the third aspect here No longer.
- An eleventh aspect of the present application provides a communication device that can implement the method in the above-mentioned fifth aspect or any possible implementation manner of the fifth aspect.
- the device includes corresponding units or modules for performing the above method.
- the units or modules included in the device can be implemented by software and/or hardware.
- the device can be a terminal device, or the device can be a component in the terminal device (such as a processor, a chip or a chip system, etc.), or the device can also be a logic module that can realize all or part of the functions of the terminal device or software.
- the communication device is described as an example of a terminal device.
- the device includes a processing unit and a transceiver unit; when the transceiver unit receives the first message and the access layer security between the terminal device and the network device is not activated, the processing unit processes the first message according to the first message.
- First information the first information is used to indicate the cell information last used by the terminal equipment, the first message is used to indicate releasing the radio resource control RRC connection between the terminal equipment and the network equipment; the processing unit releases the RRC connection .
- the processing unit processing the first information according to the first message includes: in the first If the message includes first indication information, the processing unit determines not to update the first information, and the first indication information is used to indicate not to update the first information.
- the processing unit processing the first information according to the first message includes: when the first message does not include the first indication information, the processing unit processes the first information based on the first indication information.
- the cell corresponding to the message updates the first information, and the first indication information is used to indicate not to update the first information.
- the first information includes cell information last used by the terminal device.
- the processing unit determines that the access layer security between the terminal device and the network device is not activated, including: the processing unit determines that the access layer security is not activated.
- the security mode command message is received; after the transceiver unit receives the security mode command message, the processing unit determines that the process of deriving the key based on the security mode command message fails; or, after the transceiver unit receives the security mode command message, The processing unit determines that the integrity protection check corresponding to the security mode command message fails.
- the transceiver unit is further configured to send first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit is further configured to receive third indication information, where the third indication information indicates that the network device supports PEI.
- the component modules of the communication device can also be used to perform the steps performed in each possible implementation manner of the fourth aspect, and achieve corresponding technical effects.
- the fourth aspect please refer to the fourth aspect. No further details will be given.
- a twelfth aspect of the present application provides a communication device that can implement the method in the above-mentioned sixth aspect or any possible implementation manner of the sixth aspect.
- the device includes corresponding units or modules for performing the above method.
- the units or modules included in the device can be implemented by software and/or hardware.
- the device can be a network device, or the device can be a component in the network device (such as a processor, a chip or a chip system, etc.), or the device can also be a logic module that can realize all or part of the functions of the network device or software.
- the communication device is described as an example of a network device.
- the device includes a processing unit and a transceiver unit; when the transceiver unit has sent the first message and the access layer security between the terminal device and the network device is not activated, the processing unit processes the first message according to the first message. Two information, the second information is used to indicate one or more cells that the terminal device has visited, and the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device; the processing unit releases the RRC connection.
- the processing unit processing the second information according to the first message includes: when the first message includes the first indication information, the processing unit determines not to update the second information. Second information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the cell information last used by the terminal equipment.
- the processing unit processing the first information according to the first message includes: when the first message does not include the first indication information, the processing unit processes the first information based on the first indication information.
- the cell corresponding to the message updates the second information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the cell information last used by the terminal device.
- the first information includes cell information last used by the terminal device.
- the second information includes identifiers of one or more cells visited by the terminal device.
- the processing unit determines whether the terminal device updates the first information according to the first message.
- the transceiver unit is further configured to receive first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit is further configured to send third indication information, where the third indication information indicates that the network device supports PEI.
- the component modules of the communication device can also be used to perform the steps performed in each possible implementation manner of the sixth aspect, and achieve corresponding technical effects.
- the sixth aspect please refer to the sixth aspect. No further details will be given.
- a thirteenth aspect of the embodiment of the present application provides a communication device, including at least one processor, the at least one processor and a storage device coupled to a processor; the memory is used to store programs or instructions; the at least one processor is used to execute the program or instructions, so that the device implements any possible implementation manner of any one of the foregoing first to sixth aspects. the method described.
- the fourteenth aspect of the embodiment of the present application provides a communication device, including at least one logic circuit and an input-output interface; the logic circuit and the input-output interface are used to perform any one of the foregoing first to sixth aspects. Any possible implementation method.
- the fifteenth aspect of the embodiment of the present application provides a computer-readable storage medium that stores one or more computer-executable instructions.
- the processor executes the above-described first to sixth aspects. The method described in any possible implementation manner in any aspect.
- a sixteenth aspect of the embodiment of the present application provides a computer program product (or computer program).
- the processor executes any one of the above-mentioned first to sixth aspects. Any possible implementation method.
- the seventeenth aspect of the embodiment of the present application provides a chip system, which includes at least one processor and is used to support a communication device to implement any possible implementation of any one of the above-mentioned first to sixth aspects.
- the chip system may also include a memory for storing necessary program instructions and data of the communication device.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- the chip system further includes an interface circuit that provides program instructions and/or data to the at least one processor.
- the eighteenth aspect of the embodiment of the present application provides a communication system.
- the communication system includes the terminal device in the first aspect and the network device in the second aspect, or the communication system includes the terminal device in the third aspect. and the network device in the fourth aspect, or the communication system includes the terminal device in the fifth aspect and the network device in the sixth aspect.
- the communication system includes the communication device of the seventh aspect and the communication device of the eighth aspect, or the communication system includes the communication device of the ninth aspect and the communication device of the tenth aspect, or the communication system includes the communication device of the ninth aspect.
- Figure 1a is a schematic diagram of the communication scenario provided by this application.
- Figure 1b is another schematic diagram of the communication scenario provided by this application.
- Figure 1c is another schematic diagram of the communication scenario provided by this application.
- Figure 2a is a schematic diagram of the paging process involved in this application.
- Figure 2b is another schematic diagram of the paging process involved in this application.
- Figure 3a is another schematic diagram of the communication scenario provided by this application.
- Figure 3b is another schematic diagram of the communication scenario provided by this application.
- FIG. 4 is a schematic diagram of the communication method involved in this application.
- FIG. 5 is another schematic diagram of the communication method involved in this application.
- FIG. 6 is another schematic diagram of the communication method involved in this application.
- FIG. 7 is another schematic diagram of the communication method involved in this application.
- FIG. 8 is another schematic diagram of the communication method involved in this application.
- FIG. 9 is a schematic diagram of the communication device provided by this application.
- FIG. 10 is another schematic diagram of the communication device provided by this application.
- FIG 11 is another schematic diagram of the communication device provided by this application.
- Figure 12 is another schematic diagram of the communication device provided by this application.
- Terminal device It can be a wireless terminal device that can receive network device scheduling and instruction information.
- the wireless terminal device can be a device that provides voice and/or data connectivity to the user, or a handheld device with a wireless connection function, or Other processing equipment connected to the wireless modem.
- the terminal device can communicate with one or more core networks or the Internet via a radio access network (RAN).
- RAN radio access network
- the terminal device can be a mobile terminal device, such as a mobile phone (also known as a "cellular" phone, mobile phone). phone), computer and data card, which may be, for example, a portable, pocket-sized, handheld, computer-built-in or vehicle-mounted mobile device that exchanges voice and/or data with the wireless access network.
- PCS personal communication service
- SIP Session Initiation Protocol
- WLL wireless local loop
- PDA personal digital assistants
- Tablets tablets Computers
- computers with wireless transceiver functions and other equipment.
- Wireless terminal equipment can also be called a system, subscriber unit, subscriber station, mobile station, mobile station (MS), remote station, access point ( access point, AP), remote terminal equipment (remote terminal), access terminal equipment (access terminal), user terminal equipment (user terminal), user agent (user agent), subscriber station (subscriber station, SS), client equipment (customer premises equipment, CPE), terminal (terminal), user equipment (user equipment, UE), mobile terminal (mobile terminal, MT), etc.
- the terminal device can also be a wearable device and a next-generation communication system, such as a terminal device in a 5G communication system or a terminal device in a future evolved public land mobile network (PLMN).
- PLMN public land mobile network
- Network equipment It can be equipment in a wireless network.
- network equipment can be a radio access network (RAN) node (or equipment) that connects terminal equipment to the wireless network, and can also be called a base station.
- RAN equipment are: new generation base station (generation Node B, gNodeB), transmission reception point (TRP), evolved Node B (evolved Node B, eNB), wireless network in 5G communication system Controller (radio network controller, RNC), node B (Node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (e.g., home evolved Node B , or home Node B, HNB), base band unit (base band unit, BBU), or wireless fidelity (wireless fidelity, Wi-Fi) access point (access point, AP), etc.
- the network device may include a centralized unit (CU) node, a distributed unit (CU) node, a distributed unit (CU) node,
- the network device can send configuration information (for example, carried in a scheduling message and/or an instruction message) to the terminal device, and the terminal device further performs network configuration based on the configuration information, so that the network configuration between the network device and the terminal device is aligned; or , through the network configuration preset on the network device and the network configuration preset on the terminal device, the network configuration between the network device and the terminal device is aligned.
- alignment refers to the determination of the carrier frequency for sending and receiving interactive messages, the type of interactive messages, the meaning of the field information carried in the interactive messages, or whether there are interactive messages between the network device and the terminal device. The understanding of other configurations of interactive messages is consistent.
- the network device may be other devices that provide wireless communication functions for terminal devices.
- the embodiments of this application do not limit the specific technology and specific equipment form used by the network equipment. For convenience of description, the embodiments of this application are not limited.
- Network equipment may also include core network equipment.
- Core network equipment may include, for example, access and mobility management function (AMF), user plane function (UPF) or session management function (SMF). wait.
- AMF access and mobility management function
- UPF user plane function
- SMF session management function
- the device used to implement the function of the network device may be a network device, or may be a device that can support the network device to implement the function, such as a chip system, and the device may be installed in the network device.
- the technical solution provided by the embodiment of the present application the technical solution provided by the embodiment of the present application is described by taking the device for realizing the functions of the network device being a network device as an example.
- the terminal device has at least three RRC states: RRC connected state (connected state), RRC idle state (idle state) and inactive state (inactive state).
- RRC connected state connected state
- RRC idle state idle state
- inactive state inactive state
- connection state (or, it can also be referred to as connection state for short.
- connection state and “RRC connection state” are the same concept, and the two names are interchangeable):
- the terminal device has established an RRC connection with the network, and can Perform data transfer.
- RRC idle state (or, it can also be referred to as idle state for short.
- idle state and “RRC idle state” are the same concept, and the two names are interchangeable): the terminal device does not establish an RRC connection with the network, and the base station No context is stored for this end device. If the terminal device needs to enter the RRC connected state from the RRC idle state, it needs to initiate the RRC connection establishment process.
- RRC inactive state (or, can also be referred to as inactive state for short.
- deactivated state “deactivated state”, “deactivated state”, “inactive state”, “RRC inactive state” and “RRC deactivated state”
- the terminal device previously entered the RRC connection state, and then the base station released the RRC connection, but the base station saved the context of the terminal device. If the terminal device needs to enter the RRC connected state from the RRC inactive state again, it needs to initiate an RRC recovery process (or called an RRC connection recovery process). Compared with the RRC establishment process, the RRC recovery process has shorter delay and less signaling overhead. However, the base station needs to save the context of the terminal device, which will occupy the storage overhead of the base station.
- system information is a message sent by the base station, which contains information required for UE initialization and some other function/feature related information. Among them, system information is divided into minimum system information (minimum SI) and other system information (other SI, OSI). Minimum system information consists of master information block (MIB) and system information block 1 (SIB1). SIB1 is also called remaining minimum system information (remaining minimum SI, RMSI).
- MIB master information block
- SIB1 system information block 1
- RMSI remaining minimum system information
- the MIB will be broadcast periodically on the broadcast channel (BCH).
- SIB1 is periodically broadcast on the downlink shared channel (DL-SCH), or sent to terminal equipment in the RRC connected state (RRC_CONNECTED) through dedicated signaling.
- DL-SCH downlink shared channel
- RRC_CONNECTED terminal equipment in the RRC connected state
- SIB2 ⁇ SIB9 Other system information consists of other SIBs, for example, SIB2 ⁇ SIB9, etc.
- Other SIBs are broadcast on the DL-SCH periodically or on-demand (that is, when the RRC idle state (RRC_IDLE) or RRC inactive state (RRC_INACTIVE) the terminal device requests a certain SIB, the network device broadcasts the SIB, otherwise it does not send the SIB), or sends it to the RRC connected state UE through dedicated signaling.
- the basic process for terminal equipment in RRC idle state and RRC inactive state to obtain system information is that the terminal equipment first obtains the MIB, obtains SIB1 based on the scheduling information in the MIB, and then obtains other SIBs based on the scheduling information in SIB1.
- SIB1 is configured with parameters such as the default paging cycle T, the number of PFs in the paging cycle (N) and the offset of the PF (PF_offset), and the number of POs corresponding to one PF (Ns).
- Configuration and preconfiguration In this application, configuration and preconfiguration will be used at the same time.
- Configuration means that the network device/server sends the configuration information or parameter values of some parameters to the terminal through messages or signaling, so that the terminal can determine communication parameters or transmission resources based on these values or information.
- Preconfiguration is similar to configuration. It can be parameter information or parameter values that the network device/server has negotiated with the terminal device in advance, or it can be parameter information or parameter values adopted by the base station/network device or terminal device specified in the standard protocol, or it can be Parameter information or parameter values stored in the base station/server or terminal equipment in advance. This application does not limit this.
- system and “network” in the embodiments of this application can be used interchangeably.
- “At least one” means one or more, and “plurality” means two or more.
- “And/or” describes the relationship between associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist simultaneously, and B alone exists, where A, B can be singular or plural.
- the character “/” generally indicates that the related objects are in an “or” relationship.
- At least one of the following” or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
- At least one of A, B, and C includes A, B, C, AB, AC, BC, or ABC.
- the ordinal numbers such as “first” and “second” mentioned in the embodiments of this application are used to distinguish multiple objects and are not used to limit the order, timing, priority or importance of multiple objects. degree.
- FIG. 1a is a schematic diagram of the communication system in this application.
- a network device 101 and six terminal devices are shown as an example.
- the six terminal devices are terminal device 1, terminal device 2, terminal device 3, terminal device 4, terminal device 5, terminal device 6, etc. .
- terminal device 1 is a smart teacup
- terminal device 2 is a smart air conditioner
- terminal device 3 is a smart gas pump
- terminal device 4 is a vehicle
- terminal device 5 is a mobile phone
- terminal device 6 is The printer is used as an example.
- the signal sending device (or called the transmitting end, the transmitting end device) can be a network device, and the signal receiving device (or called the receiving end, the receiving end device) can be the terminal device; or , the signal sending device may be a terminal device, and the signal receiving device may be a network device; or both the signal sending device and the signal receiving device may be network devices; or both the signal sending device and the signal receiving device may be terminal devices.
- the communication system includes at least one network device and/or at least one terminal device.
- Figure 1b is a 5G NR system architecture diagram.
- the 5G core network can include network elements such as access and mobility management function (Aaccess and mobility management function, AMF) and user plane function (UPF).
- the 5G radio access network can include network elements such as the 5G access network (denoted as gNB) and the 4G access network (denoted as ng-eNB) connected to the 5GC.
- the serving base station gNB of the terminal device is responsible for providing the user plane and control plane protocol functions of 5G NR for the terminal device; the serving base station ng-eNB of the terminal device is responsible for providing 4G E- UTRA's user plane and control plane protocol functions.
- Figure 1c is an LTE system architecture diagram.
- the 4G core network can be an evolved packet core (EPC), including network elements such as mobility management entity (MME) and serving gateway (S-GW).
- EPC evolved packet core
- MME mobility management entity
- S-GW serving gateway
- the 4G wireless access network can be E-UTRAN, which can include network elements such as 4G base stations (denoted as eNB) and 5G base stations connected to the EPC (denoted as en-gNB).
- the serving base station eNB of the terminal device is responsible for providing the user plane and control plane protocol functions of LTE for the UE; the serving base station en-gNB of the terminal device is responsible for providing the user plane of 5G NR for the terminal device. with control plane protocol functionality.
- the network device can initiate paging to the terminal device.
- paging means that the network device will send a paging message to a certain terminal device at the paging occasion (PO) calculated by the network device, and the terminal device receives the paging message at the same PO, thereby realizing search under the network.
- PO paging occasion
- paging supports discontinuous reception (DRX), which allows the terminal device to wake up only within a fixed time to receive paging messages, and sleep during the rest of the time to reduce power consumption and increase battery life.
- DRX discontinuous reception
- the cycle of each wake-up is a DRX cycle.
- One PF corresponds to one or more POs, and a terminal device needs to be on a certain PO.
- Receive paging messages Receive paging messages.
- the PF and PO used for paging are determined in the following manner.
- the system frame number of PF (recorded as (SFN+PF_offset)mod T) is determined by the following method:
- the index of PO (recorded as i_s) is determined in the following way:
- i_s floor(terminal equipment_ID/N)mod Ns;
- T DRX cycle of the terminal device.
- N The number of PFs in a paging cycle.
- PF_offset offset of PF.
- UE_ID 5G-S-TMSI mod 1024.
- Figure 2a is a basic flow diagram of paging. The entire process of paging initiated from the core network.
- the core network element (such as AMF) sends the NGAP paging message to the access network element (such as gNB), which carries the terminal device paging record list, which contains the 5G-s-temporary mobile subscriber identification code (5G S -Temporary mobile subscription identifier, 5G-s-TMSI) is brought to network equipment.
- the access network element such as gNB
- the access network element After the access network element receives the NGAP paging message, it can calculate the specific PF and PO locations based on the paging parameters and 5G-S-TMSI.
- the terminal device calculates the specific PF and PO locations of the paging based on the terminal device identification 5G-S-TMSI, and uses the paging message-wireless network temporary identifier (P-RNTI) to descramble at that moment.
- P-RNTI paging message-wireless network temporary identifier
- one of the main reasons for generating false paging alarms is that there are multiple terminal devices monitoring the same PO, because according to the calculation formula specified in the protocol, although the 5G-S allocated under one core network - The TMSI can be different, but the UE_ID (i.e. 5G-S-TMSI mod 1024) may be the same. According to the above PF and PO determination methods, the PO positions calculated by different terminal devices may be the same. In addition, under the paging mechanism, the terminal device obtains the scheduling information of the paging message when receiving the paging downlink control information (DCI), and cannot know whether this paging message is a paging message for itself.
- DCI downlink control information
- the terminal device can only determine whether this paging is for this terminal device based on the terminal device identification information in the paging message after subsequently receiving and decoding the paging message on the PDSCH. Therefore, when multiple terminal devices listen to the same PO, if a certain paging is only targeted at some of the terminal devices, then for the terminal devices that are not actually paged, there will be unnecessary paging reception, resulting in unnecessary Terminal device power consumption.
- the mechanism of grouping terminal devices is one of the technologies to reduce false paging alarms.
- the basic idea of this technology is to group terminal devices that monitor the same PO (that is, assign terminal devices on the same PO to different groups).
- the PEI indicates the individual of the PO targeted by this paging.
- the number and terminal equipment on each PO are divided into different terminal equipment subgroups. This enables the terminal equipment to know whether it needs to receive paging this time before receiving the paging PDCCH and paging PDSCH (paging message), reducing the probability of the terminal equipment receiving decoded paging unnecessarily, thereby reducing the terminal equipment's problem of not understanding the purpose of the paging. Power consumption generated by paging PDCCH and paging PDSCH (paging message) of the terminal equipment.
- the PEI indicates the terminal equipment through the format (DCI2-7) PDCCH. It can indicate whether the following POs and the subgroup of terminal equipment in each PO need to monitor the paging PDCCH and paging PDSCH (paging message).
- An implementation example is shown in Figure 2b.
- Terminal equipment 1 (denoted as UE1 in the figure) and terminal equipment 4 (denoted as UE4 in the figure) are the terminal equipment subgroup 1 of the first PO.
- the first subgroup in M subgroups since the indication is "1", indicates that terminal equipment 1 and terminal equipment 4 need to monitor the PDCCH at the position of the first PO.
- terminal equipment 2 (denoted as UE2 in the figure) and terminal equipment 3 (denoted as UE3 in the figure) are the terminal equipment subgroup 2 of the first PO.
- terminal equipment subgroup 2 of the first PO Through the first subgroup of the M subgroups to which the first PO belongs in the PEI, Group, since the indication is "0", it indicates that terminal equipment 2 and terminal equipment 3 do not need to monitor the PDCCH at the position of the first PO.
- new indication information is added to SIB1 sent by the network device (for example, the indication information can be the lastUsedCellOnly-r17 information element in the pei-Config-r17 information element).
- the terminal equipment needs to determine whether the current cell is Determine whether to monitor PEI for your last used cell.
- how to determine the cell last used by the terminal device is an urgent technical problem that needs to be solved.
- the terminal device can determine its last used cell based on the RRC release message. Specifically, the cell in which the terminal device recently received the RRCRelease message that does not contain the noLastCellUpdate-r17 information element is the last used cell of the terminal device. In other words, the noLastCellUpdate-r17 cell is added to the RRCRelease message. If the noLastCellUpdate-r17 cell exists, the last used cell for PEI is not updated. Otherwise, it is updated to the current cell. However, for the terminal device, in the process of determining the last used cell based on this implementation method, there may be an error update process.
- Figure 3a hereinafter referred to as scenario one
- Figure 3b hereinafter referred to as scenario two).
- the terminal device that supports the PEI capability first resides on cell A and then establishes a connection. After the terminal device receives the RRCRelease message from cell A, the SIB1 broadcast by cell A and the PEI configuration include lastUsedCellOnly- r17 cell, and the noLastCellUpdate-r17 cell does not exist in the RRCRelease message from cell A, the terminal device will save the last used cell as cell A.
- NAS non-access stratum
- AS access stratum
- the terminal device that supports PEI capability first camps on the NR network device cell A, and then establishes the link.
- the terminal device receives the air interface RRCRelease message of gNB.
- Cell A The broadcast SIB1 and PEI configuration contain the lastUsedCellOnly-r17 cell, and the noLastCellUpdate-r17 cell does not exist in the air interface RRCRelease message.
- the terminal device will save the last used cell as cell A.
- the terminal device may camp through reselection/redirection. to cell B, and then initiate link establishment in cell B. Because the access network element is temporarily overloaded or the access network element temporarily discovers that the core network element is overloaded, the connection between the access network element and the core network element The connection cannot be established and AS security cannot be activated. Cell B will send an air interface RRCRelease message to release the terminal device, and instruct the terminal device not to update the last used cell through noLastCellUpdate.
- the terminal device since the terminal device receives the air interface RRCRelease message in cell B of the pseudo base station, if AS security is not activated, the terminal device will ignore the waiting time (waitTime) carried in the RRCRelease message in accordance with the provisions of the protocol/standard. Something other than parameters. Regardless of whether the air interface RRCRelease message carries the noLastCellUpdate-r17 information element, the last used cell will be mistakenly updated to cell B. For this reason, subsequent reselection from cell B to cell A will result in the PEI function not being able to be used normally because the last used cell is cell B, not cell A.
- the terminal device Since the terminal device receives the air interface RRCRelease message in Cell B, if AS security is not activated, the terminal device will ignore other content except the waiting time (waitTime) parameter carried in the RRCRelease message in accordance with the provisions of the protocol/standard. .
- the air interface RRCRelease message carries the noLastCellUpdate-r17 information element, this information element is ignored according to the protocol, and the last used cell is mistakenly updated to cell B. For this reason, subsequent reselection from cell B to cell A will result in the PEI function not being able to be used normally because the last used cell is cell B, not cell A.
- the present application provides a communication method and a communication device to avoid paging errors due to incorrect updates of the terminal equipment, so as to enhance the PEI function implemented by the terminal equipment based on the first information and reduce the The power consumption of the terminal device. This will be further explained below with reference to the accompanying drawings.
- Figure 4 is a schematic diagram of an implementation of the communication method provided by this application.
- the network device sends the first message.
- the network device sends the first message in step S401, and accordingly, the terminal device receives the first message in step S401.
- the first message is used to instruct to release the radio resource control (radio resource control, RRC) connection between the terminal device and the network device.
- RRC radio resource control
- the message name of the first message used to instruct the release of the RRC connection between the terminal device and the network device may be the RRC release (RRCReleace) message.
- This name is the name in the current communication system.
- the name of the message used to indicate releasing the RRC connection between the terminal device and the network device may change with the evolution of the communication system.
- the terminal device determines not to update the first information.
- the terminal device determines not to update the first information in step S402.
- the first information is used to indicate the cell last used by the terminal device.
- the last used cell (last used cell) of the terminal device indicated by the first information can be called the cell to which the terminal device has recently accessed, the cell to which the terminal device has recently visited, the cell to which the terminal device has been released from connection, and the cell to which the terminal device has been released.
- the terminal device determines not to update the first information, which can be expressed as the terminal device does not update the first information, or it can also be expressed as the terminal device does not need to identify whether the first message carries an instruction to update (or not Updated) First Information Instruction Letter information and determines not to update the first information, it can also be expressed as the terminal device does not update the first information, it can also be expressed as the terminal device maintains the first information unchanged, it can also be expressed as the first information maintained by the terminal device remains unchanged, etc. .
- the first information that the terminal device determines not to update in step S402 includes the cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be a cell global identifier (CGI), a physical cell identifier (PCI), etc.
- the last used cell indicated by the first information maintained by the terminal device before step S401 is cell 1.
- the terminal device receives the first message from cell 2 in step S401 (cell 2 is located in one or more cells corresponding to the network device that sent the first message in step S401).
- the terminal device determines not to Update the first information, that is, the terminal device determines in step S402 that there is no need to update the maintained first information, and the last used cell indicated by the maintained first information is still cell 1.
- the terminal device receives the first message from cell 2 in step S401 (cell 2 is located in one or more cells corresponding to the network device that sent the first message in step S401).
- the terminal device determines not to Update the first information, that is, the terminal device determines in step S402 that there is no need to update the maintained first information, and still maintains that the last used cell indicated by the first information is empty (that is, cell 2 is not maintained as the first information). The last used cell indicated).
- the network device determines that the terminal device ( The first information, which is used to indicate the cell last used by the terminal device, will not be updated after step S401 (for example, in step S402). Specifically, when the access layer security between the terminal device and the network device is not activated, the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism. To this end, the network The device determines that the terminal device does not update the first information, so that the network device and the terminal device align their understanding of the first information, in order to reduce the possibility of communication errors.
- the first information which is used to indicate the cell last used by the terminal device
- the first message received by the terminal device in step S401 contains first indication information, and the first indication information is used to indicate not to update the first information; accordingly, in step S402, in When the access layer security between the terminal device and the network device is not activated, the terminal device ignores the first indication information. Specifically, when the access layer security between the terminal device and the network device is not activated, the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism. To this end, the terminal The device may ignore the first indication information carried in the first message and determine not to update the first information. In other words, the terminal device may determine not to update the first information without identifying whether the first message carries indication information indicating updating (or not updating) the first information, so as to avoid paging errors caused by mis-updates by the terminal device. Appear.
- the name of the first indication information may be noLastCellUpdate cell/field/domain/parameter. This name is the name in the current communication system. In the future communication system, The name of the first indication information may change with the evolution of the communication system.
- the first message received by the terminal device in step S401 includes second indication information
- the second indication information is used to indicate the waiting time (wait time) for accessing the network; accordingly, in step S401 In S402, the terminal device ignores at least one piece of information in the first message except the second indication information.
- the at least one piece of information includes first indication information, and the first indication information is used to indicate not to update the first information.
- the first message received by the terminal device may include second indication information indicating the waiting time for accessing the network, so that the terminal device can subsequently re-establish the connection with the network device based on the second indication information.
- the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism. To this end, the terminal device At least one piece of information in the first message except the second indication information may be ignored.
- the terminal device ignoring at least one piece of information in the first message except the second indication information may include the terminal device ignoring other information in the first message except the second indication information.
- the second indication information can also be expressed in other ways, including: the second indication information is used to indicate the timing duration of timer T302 (where T302 indicates the waiting time for the terminal device to re-establish or restore the RRC connection); The indication information is used to indicate the waiting time for an access attempt of the terminal device, and the second indication information is used to indicate the waiting time for controlling the terminal device to establish an RRC connection, etc.
- the name of the second indication information may be a waitTime cell/field/domain/parameter. This name is the name in the current communication system. In the future communication system, the name of the second indication information may be the waitTime cell/field/domain/parameter. The name of the message may change as communication systems evolve.
- the network device determines that the terminal device ignores the first message except the second indication information.
- the at least one piece of information includes first indication information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the cell last used by the terminal equipment.
- the first message sent by the network device in step S401 may include second indication information indicating the waiting time for accessing the network, so that the terminal device can subsequently re-establish communication with the network device based on the second indication information. connections between.
- the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism. To this end, the network device It may be determined that the terminal device ignores at least one piece of information in the first message except the second indication information, so that the network device and the terminal device can align their understanding of the first message, in order to reduce the possibility of communication errors.
- the terminal device determines in step S402 that the access layer security between the terminal device and the network device is not activated, including: the terminal device determines that no reception to the security mode command message; after the terminal device receives the security mode command message, the terminal device determines that the process of deriving the key based on the security mode command message has failed; or, after the terminal device receives the security mode command message, the terminal device It is determined that the integrity protection check corresponding to the security mode command message has failed. Specifically, the terminal device can determine that the access layer security between the terminal device and the network device is not activated through the above multiple methods to improve the flexibility of solution implementation.
- the method further includes: the terminal device sending first capability information, the first capability information indicating that the terminal device supports PEI.
- the terminal device may send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism.
- the method further includes: the terminal device receiving third indication information, the third indication information indicating that the network device supports PEI .
- the network device may send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism.
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- step S402 when the access layer security between the terminal device and the network device is not activated.
- the following will describe the implementation process that the network device may perform in this case.
- the implementation process is described as an example.
- the network device determines that the first message has been sent in step S401 and the access layer security between the terminal device and the network device is not activated, in step S403, the network device It is determined not to update the second information, where the second information is used to indicate one or more cells visited by the terminal device.
- the network device may maintain second information indicating one or more cells visited by the terminal device.
- the network device sends the first message instructing to release the RRC connection between the terminal device and the network device and releases the RRC connection
- the access layer security between the terminal device and the network device is not activated.
- the network device determines not to update the second information.
- the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism.
- the network device determines not to update the second information in a manner such that the network device does not update the second information based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device), which can avoid Paging errors occur due to incorrect updates of network equipment, so as to enhance the PEI function implemented by the network equipment based on the second information and reduce the power consumption of the network equipment.
- the network device determines not to update the second information, which can be expressed as the network device does not update the second information, or it can also be expressed as the network device does not need to identify whether the first message carries an indication to update (or not update) the first information.
- Instructing information to determine not to update the second information can also be expressed as the network device does not update the second information, it can also be expressed as the network device maintains the second information unchanged, or it can be expressed as the network device maintains the second information unchanged. wait.
- step S403 the network device determines that the terminal device ignores the first indication information. Specifically, when the access layer security between the terminal device and the network device is not activated, the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism. To this end, the network The device determines that the terminal device ignores the first indication information, so that the network device and the terminal device align their understanding of the first information, in order to reduce the possibility of communication errors.
- the network device sends the second information to the core network device.
- the network device may also send second information indicating one or more cells that the terminal device has visited to the core network device, so that the core network device and the network device can align the two to the second information. understanding in order to reduce the possibility of communication errors.
- the network device after the network device sends the first message in step S401, the network device releases the RRC connection with the terminal device in step S404. After the terminal device receives the first message in step S401, the terminal device releases the RRC connection with the network device in step S404.
- step S402 and step S404 are both performed after step S401, but the execution order of step S402 and step S404 is not limited in this embodiment.
- step S402 may be performed after step S404, or step S404 may be performed after step S402.
- step S403 the execution processes of steps S403 and S404 are both performed after step S401.
- the execution order of steps S403 and S404 is not limited in this embodiment.
- step S403 may be performed after step S404, or step S404 may be performed after step S403.
- step S404 when the terminal device releases the RRC connection, it can be understood that the terminal device exits the RRC connection state.
- the terminal device can enter other states besides the RRC connection state, such as the idle state (idle state). Activated state (inactive state), etc.
- the terminal device may enter the idle state.
- the terminal device can maintain first information indicating the cell last used by the terminal device.
- the terminal device receives the first message instructing to release the RRC connection between the terminal device and the network device in step S401 and releases the RRC connection in step S404
- the connection between the terminal device and the network device is
- the terminal device determines not to update the first information in step S402.
- the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism.
- the terminal device determines not to update the first information in a manner such that the terminal device does not update the first information based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device), which can avoid Paging errors occur due to incorrect updates of the terminal equipment, so as to enhance the PEI function implemented by the terminal equipment based on the first information and reduce the power consumption of the terminal equipment.
- the terminal device determines not to update the first information in step S402 (or the network device determines not to update the first information in step S403 Determine that the terminal device does not update the first information), in this way, the terminal device (or network device) can ignore the relevant indication information in the first message used to indicate updating (or not updating) the first information (for example, as mentioned above first indication information); in other words, in the embodiment shown in Figure 4, the terminal device (or network device) does not need to read the relevant indication information in the first message used to indicate updating (or not updating) the first information, By default, it is determined that the terminal device does not update the first information, which can avoid paging errors due to mistaken updates by the terminal device, thereby enhancing the PEI function implemented by the terminal device based on the first information and reducing the power consumption of the terminal device. In order to solve the aforementioned technical problem of "how to determine the cell last used by the terminal equipment".
- the terminal device does not need to read the relevant indication information in the first message for instructing to update (or not update) the first information, and determines that the terminal is determined by default.
- the device does not update the first information; in the embodiment shown in Figure 5 and Figure 6 below, the terminal device (or network device) needs to read the relevant information in the first message to indicate updating (or not updating) the first information. Instruction information, and perform corresponding operations based on the relevant instruction information.
- Figure 5 is a schematic diagram of an implementation of the communication method provided by this application.
- step S501 and step S504 can refer to the implementation process of step S401 and step S404 in Figure 4, and achieve corresponding technical effects, which will not be described in detail below.
- the network device sends the first message.
- the network device sends the first message in step S501, and accordingly, the terminal device receives the first message in step S501.
- the first message is used to instruct to release the radio resource control (radio resource control, RRC) connection between the terminal device and the network device.
- RRC radio resource control
- the terminal device determines not to ignore the first indication information in the first message, or the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information.
- the terminal device determines not to ignore the first indication information in the first message in step S502, Alternatively, the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information.
- the first indication information is used to indicate not to update the first information
- the first information is used to indicate the cell last used by the terminal device
- the second indication information is used to indicate the waiting time for accessing the network.
- the network device after sending the first message in step S501, when the access layer security between the terminal device and the network device is not activated, the network device determines The terminal device (which will be after step S501, such as step S502) does not ignore the first indication information in the first message, or the network device determines that the terminal device (which will be after step S501, such as step S502) ) ignore at least one piece of information in the first message except the first indication information and the second indication information.
- the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism.
- the network The device determines that the terminal device does not ignore the first indication information in the first message (or, the network device determines that the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information) , so as to facilitate the network device and the terminal device to align their understanding of the first information, in order to reduce the possibility of communication errors.
- the terminal device ignoring at least one piece of information in the first message other than the first indication information and the second indication information may include: the terminal device ignoring the first message except the first indication information and the second indication.
- Information other than information may include: the terminal device ignoring the first message except the first indication information and the second indication.
- the method further includes: the terminal device determining not to update the first information according to the first indication information.
- the process of the terminal device determining not to ignore the first indication information may include the terminal device determining not to update the first information based on the first indication information, so that the terminal device determines not to update the first information based on the first indication information sent by the network device.
- the first information is updated so that the terminal device and the network device align their understanding of the first indication information, in order to reduce the possibility of communication errors.
- the first information includes cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be CGI, PCI, etc.
- the terminal device determines in step S502 that the access layer security between the terminal device and the network device is not activated, including: the terminal device determines that no reception to the security mode command message; after the terminal device receives the security mode command message, the terminal device determines that the process of deriving the key based on the security mode command message has failed; or, after the terminal device receives the security mode command message, the terminal device It is determined that the integrity protection check corresponding to the security mode command message has failed. Specifically, the terminal device can determine that the access layer security between the terminal device and the network device is not activated through the above multiple methods to improve the flexibility of solution implementation.
- step S502 when the access layer security between the terminal device and the network device is not activated.
- the following will describe the implementation process that the network device may perform in this case.
- the implementation process is described as an example.
- the network device determines not to ignore the first indication information in the first message, Alternatively, the network device ignores at least one piece of information in the first message except the first indication information and the second indication information.
- the network device may determine that it cannot communicate with the terminal device based on the access layer security mechanism. Therefore, the network device determines a way not to ignore the first indication information in the first message (or, the network device ignores at least one piece of information in the first message except the first indication information and the second indication information), Making it clear to the network device that the terminal device will not update the first information based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device) can avoid paging errors caused by mis-updates by the terminal device. situation occurs, so as to enhance the PEI function implemented by the terminal device based on the first information and reduce the power consumption of the terminal device.
- the network device determines a way not to ignore the first indication information in the first message (or the network device ignores at least one piece of information in the first message except the first indication information and the second indication information), and further The understanding of the first indication information between the terminal device and the network device can be aligned, so as to reduce the possibility of communication errors.
- the network device ignoring at least one piece of information in the first message except the first indication information and the second indication information may include: the network device ignoring the first message except the first indication information and the second indication.
- Information other than information may include: the network device ignoring the first message except the first indication information and the second indication.
- the method further includes: the network device determines not to update the second information according to the first indication information, and the second information is used for a website that the terminal device has accessed. or multiple neighborhoods. Specifically, the network device may determine not to update the second information for one or more cells visited by the terminal device according to the first indication information, so as to facilitate alignment between the terminal device and the network device for the first Directs the understanding of information with the goal of reducing the likelihood of communication errors.
- the second information includes identification of one or more cells visited by the terminal device.
- the identifiers of one or more cells visited by the terminal device may be CGI, PCI, etc.
- the method further includes: the network device sending the second information to the core network device.
- the network device may also send second information indicating one or more cells that the terminal device has visited to the core network device, so that the core network device and the network device can align the two to the second information. understanding in order to reduce the possibility of communication errors.
- the method further includes: the terminal device sending first capability information, the first capability information indicating that the terminal device supports paging advance indication PEI.
- the terminal device may send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism.
- the method further includes: the terminal device receiving third indication information, the third indication information indicating that the network device supports PEI .
- the network device may send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism.
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- the network device after the network device sends the first message in step S501, the network device releases the RRC connection with the terminal device in step S504. After the terminal device receives the first message in step S501, the terminal device releases the RRC connection with the network device in step S504.
- step S502 and step S504 are both performed after step S501, but the execution order of step S502 and step S504 is not limited in this embodiment.
- step S502 may be performed after step S504, or step S504 may be performed after step S502.
- step S503 the execution processes of steps S503 and S504 are both performed after step S501.
- the execution order of steps S503 and S504 is not limited in this embodiment.
- step S503 may be performed after step S504, or step S504 may be performed after step S503.
- the terminal device can maintain first information indicating the cell last used by the terminal device.
- the connection between the terminal device and the network device is
- the terminal device determines in step S502 not to ignore the first indication information in the first message, or the terminal device ignores all the first indication information and the second indication in the first message. At least one piece of information other than information.
- the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism.
- the terminal device determines a way not to ignore the first indication information in the first message (or, the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information), So that the terminal device will not be based on the cell that sent the first message (the cell is located in one or more cells corresponding to the network device). area), updating the first information can avoid paging errors due to incorrect updates by the terminal equipment, thereby enhancing the PEI function implemented by the terminal equipment based on the first information and reducing the power consumption of the terminal equipment.
- the terminal device determines in step S502 not to ignore the first indication information in the first message (or, the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information)
- This method can also align the understanding of the first indication information between the terminal device and the network device, in order to reduce the possibility of communication errors.
- Figure 6 is a schematic diagram of an implementation of the communication method provided by this application.
- step S601 and step S604 can refer to the implementation process of step S401 and step S404 in Figure 4, and achieve corresponding technical effects, which will not be described in detail below.
- the network device sends the first message.
- the network device sends the first message in step S601, and accordingly, the terminal device receives the first message in step S601.
- the first message is used to instruct to release the radio resource control (radio resource control, RRC) connection between the terminal device and the network device.
- RRC radio resource control
- the terminal device processes the first information according to the first message.
- the terminal device processes the first information according to the first message in step S602.
- the first information is used to indicate the cell last used by the terminal device.
- the terminal device processing the first information according to the first message includes: if the first message includes the first indication information, the terminal device determines not to update the first information.
- a piece of information, the first indication information is used to indicate not to update the first information.
- the terminal device determines not to update the first information, so that the terminal device performs the corresponding operation based on the instruction of the network device, In order to reduce the possibility of communication errors.
- the terminal device processing the first information according to the first message includes: when the first message does not include the first indication information, the terminal device processes the first information based on the first indication information.
- the cell corresponding to the message updates the first information, and the first indication information is used to indicate not to update the first information.
- the terminal device updates the first information based on the cell corresponding to the first message, so that the terminal device performs the corresponding operation based on the instructions of the network device, in order to Reduce the possibility of communication errors.
- the process of the terminal device updating the first information based on the cell corresponding to the first message includes: the terminal device updating the first information based on the cell identity of the cell that sent the first message, or the terminal device updating the first information based on the cell identity of the cell that sent the first message.
- the cell identity carried in the first message updates the first information, which is not limited here.
- the terminal device updates the first information based on the cell identity of the cell that sends the first message.
- the terminal device updates the last used cell information indicated by the first information to send the first message.
- the cell ID of the cell is not limited here.
- the first information includes cell information last used by the terminal device.
- the first information may include the identity of the cell last used by the terminal device.
- the identity may be CGI, PCI, etc.
- the terminal device determines in step S602 that the access layer security between the terminal device and the network device is not activated, including: the terminal device determines that no reception to the security mode command message; after the terminal device receives the security mode command message, the terminal device determines that the process of deriving the key based on the security mode command message has failed; or, after the terminal device receives the security mode command message, the terminal device It is determined that the integrity protection check corresponding to the security mode command message has failed. Specifically, the terminal device can determine that the access layer security between the terminal device and the network device is not activated through the above multiple methods to improve the flexibility of solution implementation.
- step S602 when the access layer security between the terminal device and the network device is not activated.
- the following will describe the implementation process that the network device may perform in this case.
- the implementation process is described as an example.
- the network device determines whether the terminal device updates the first information according to the first message. Specifically, the network device may also determine whether the terminal device updates the first information according to the first message, so that the network device can clarify the behavior of the terminal device in order to avoid communication errors.
- step S603 when the network device has sent the first message in step S601 and the access layer security between the terminal device and the network device is not activated, in step S603, the network device performs the The first message processes second information, and the second information is used to indicate one or more cells visited by the terminal device.
- the network device may maintain second information indicating one or more cells visited by the terminal device.
- the network device sends a first message instructing to release the RRC connection between the terminal device and the network device and releases the RRC connection
- the network device processes the second information according to the first message.
- the network device may determine that it cannot communicate with the network device based on the access layer security mechanism. Therefore, the network device processes the first information according to the first message, so that the terminal device and the network device align their understanding of the first message, in order to reduce the possibility of communication errors.
- the network device processing the second information according to the first message includes: in the case where the first message includes the first indication information, the network device determines not to update The second information and the first indication information are used to indicate not to update the first information, and the first information is used to indicate the cell information last used by the terminal device. Specifically, in the case where the first message includes first indication information indicating not to update the first information, the network device determines not to update the second information, so that subsequent terminal devices perform corresponding operations based on the instructions of the network device, In order to reduce the possibility of communication errors.
- the terminal device processing the first information according to the first message includes: when the first message does not include the first indication information, the terminal device processes the first information based on the first indication information.
- the cell corresponding to the first message updates the second information
- the first indication information is used to indicate not to update the first information
- the first information is used to indicate the cell information last used by the terminal device.
- the network device updates the second information based on the cell corresponding to the first message, so that subsequent terminal devices perform corresponding operations based on the instructions of the network device, in order to Reduce the possibility of communication errors.
- the process for the network device to update the second information based on the cell corresponding to the first message includes: the network device updates the second information based on the cell identity of the cell that sent the first message, or the network device updates the second information based on the cell identity of the cell that sent the first message.
- the cell identity carried in the first message updates the second information, which is not limited here.
- the method further includes: the network device sending second information to the core network device.
- the network device may also send second information indicating one or more cells that the terminal device has visited to the core network device, so that the core network device and the network device can align the two to the second information. understanding in order to reduce the possibility of communication errors.
- the method further includes: the terminal device sending first capability information, the first capability information indicating that the terminal device supports PEI.
- the terminal device may send first capability information indicating that the terminal device supports PEI to the network device, so that the network device determines that the terminal device supports PEI based on the first capability information and communicates with the terminal device based on the PEI mechanism.
- the method further includes: the terminal device receiving third indication information, the third indication information indicating that the network device supports PEI .
- the network device may send third indication information indicating that the network device supports PEI to the terminal device, so that the terminal device determines that the network device supports PEI based on the third indication information and communicates with the network device based on the PEI mechanism.
- the terminal device and the network device can also learn the capability information of the opposite end through other implementations.
- the other devices may be core network devices, sidelink devices, servers, etc.
- Another example is the implementation of protocol/standard preconfiguration.
- the network device after the network device sends the first message in step S601, the network device releases the RRC connection with the terminal device in step S604. After the terminal device receives the first message in step S601, the terminal device releases the RRC connection with the network device in step S604.
- step S602 and step S604 are executed after step S601, but the execution order of step S602 and step S604 is not limited in this embodiment.
- step S602 may be performed after step S604, or step S604 may be performed after step S602.
- step S603 the execution processes of steps S603 and S604 are both performed after step S601.
- the execution order of steps S603 and S604 is not limited in this embodiment.
- step S603 may be performed after step S604, or step S604 may be performed after step S603.
- the terminal device can maintain first information indicating the cell last used by the terminal device.
- the terminal device receives the first message indicating to release the RRC connection between the terminal device and the network device in step S601 and releases the RRC connection in step S604, the terminal device responds according to the first message in step S602. Message processing first information.
- the terminal device may determine that it cannot communicate with the network device based on the access layer security mechanism. Therefore, the terminal device processes the first information according to the first message, so that the terminal device and the network device align their understanding of the first message, in order to reduce the possibility of communication errors.
- FIG. 4 will be described below in conjunction with the implementation process shown in FIG. 7
- FIG. 5 and FIG. 6 will be described below in conjunction with the implementation process shown in FIG. 8 .
- the first message is the RRCRelease message
- the first indication information in the first message is noLastCellUpdate cell/field/domain/parameter
- the first information is last used cell Cells/fields/domains/parameters are taken as examples for explanation.
- the implementation example includes the following process.
- the terminal device that supports PEI capability updates the last used cell according to the noLastCellUpdate in the air interface RRCRelease message:
- the terminal device updates the last used cell to the current cell.
- the terminal device does not update the last used cell.
- the terminal device directly ignores the noLastCellUpdate cell and does not update the last used cell.
- the implementation example includes the following process.
- the terminal device that supports PEI capability updates the last used cell according to the noLastCellUpdate in the air interface RRCRelease message:
- the terminal device updates the last used cell to the current cell.
- the terminal device does not update the last used cell.
- the noLastCellUpdate cell in the air interface RRCRelease message will not be ignored and the last used cell will still be updated based on it:
- the terminal device updates the last used cell to the current cell.
- the terminal device does not update the last used cell.
- the present application is introduced from the perspective of the method above, and the communication device provided by the present application is described below.
- an embodiment of the present application provides a communication device 900.
- the communication device 900 can realize the functions of the terminal device or network device in the above method embodiment, and therefore can also realize the beneficial effects of the above method embodiment.
- the communication device 900 may be a terminal device or a network device, or may be an integrated circuit or component within the terminal device or the network device, such as a chip.
- the following embodiments will be described by taking the communication device 900 as a terminal device or a network device as an example.
- the device when the device 900 is used to perform the method performed by the terminal device in the previous embodiment, the device includes a processing unit 901 and a transceiver unit 902; when the transceiver unit 902 receives the first message and When the access layer security between the terminal device and the network device is not activated, the processing unit 901 determines not to update the first information.
- the first information is used to indicate the cell last used by the terminal device.
- the first message It is used to instruct to release the radio resource control RRC connection between the terminal device and the network device; the processing unit 901 releases the RRC connection.
- the first message includes first indication information, and the first indication information is used to indicate not to update the first information; the access layer security between the terminal device and the network device has not been updated. If activated, the processing unit 901 is also configured to ignore the first indication information.
- the first message includes second indication information, the second indication information is used to indicate the waiting time for accessing the network; the processing unit 901 is also configured to ignore the first message except for the third At least one piece of information other than the two indication information, the at least one piece of information includes first indication information, and the first indication information is used to indicate not to update the first information.
- the first information includes cell information last used by the terminal device.
- the processing unit 901 determines that the access layer security between the terminal device and the network device is not activated, including: the processing unit 901 determines that no security mode command message; after the transceiver unit 902 receives the security mode command message, the processing unit 901 determines that the process of deriving the key based on the security mode command message fails; or, after the transceiver unit 902 receives the security mode command message, The processing unit 901 determines that the integrity protection check corresponding to the security mode command message fails.
- the transceiver unit 902 is also configured to send first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit 902 is also configured to receive third indication information, where the third indication information indicates that the network device supports PEI.
- the device when the device 900 is used to perform the method performed by the network device in the previous embodiment, the device includes a processing unit 901 and a transceiver unit 902; after the transceiver unit 902 has sent the first message and When the access layer security between the terminal device and the network device is not activated, the processing unit 901 determines not to update the second information.
- the second information is used to indicate one or more cells that the terminal device has visited.
- the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device; the processing unit 901 releases the RRC connection.
- the first message includes first indication information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the cell last used by the terminal device; in the When the access layer security between the terminal device and the network device is not activated, the processing unit 901 determines that the terminal device ignores the first indication information.
- the first message includes second indication information
- the second indication information is used to indicate the waiting time for accessing the network; the access layer security between the terminal device and the network device has not been established. If activated, the processing unit 901 determines that the terminal device ignores at least one piece of information in the first message except the second indication information, where the at least one piece of information includes first indication information, and the first indication information is used to indicate The first information is not updated, and the first information is used to indicate the cell last used by the terminal device.
- the processing unit 901 determines that the terminal device does not update the first information, and the first information is used to Indicates the cell last used by the terminal device.
- the first information includes cell information last used by the terminal device.
- the second information includes identification of one or more cells visited by the terminal device.
- the transceiver unit 902 is also configured to send the second information to the core network device.
- the transceiver unit 902 is also configured to send third indication information, where the third indication information indicates that the network device supports PEI.
- the device when the device 900 is used to perform the method performed by the terminal device in the previous embodiment, the device includes a processing unit 901 and a transceiver unit 902; when the transceiver unit 902 receives the first message and When the access layer security between the terminal device and the network device is not activated, the processing unit 901 determines not to ignore the first indication information in the first message, or the processing unit 901 ignores the first indication information in the first message.
- At least one piece of information in addition to the first indication information and the second indication information; wherein the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device, and the first indication information is used to indicate The first information is not updated, the first information is used to indicate the cell last used by the terminal device, and the second indication information is used to indicate the waiting time for accessing the network; the processing unit 901 releases the RRC connection.
- the processing unit 901 is further configured to determine not to update the first information according to the first indication information.
- the first information includes cell information last used by the terminal device.
- the processing unit 901 determines that the access layer security between the terminal device and the network device is not activated, including: the processing unit 901 determines that no security mode command message; after the transceiver unit 902 receives the security mode command message, the processing unit 901 determines that the process of deriving the key based on the security mode command message fails; or, after the transceiver unit 902 receives the security mode command message, The processing unit 901 determines that the integrity protection check corresponding to the security mode command message fails.
- the transceiver unit 902 is also configured to send first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit 902 is also configured to receive third indication information, where the third indication information indicates that the network device supports PEI.
- the device when the device 900 is used to perform the method performed by the network device in the previous embodiment, the device includes a processing unit 901 and a transceiver unit 902; after the transceiver unit 902 has sent the first message and When the access layer security between the terminal device and the network device is not activated, the processing unit 901 determines not to ignore the first indication information in the first message, or the processing unit 901 ignores all other information in the first message.
- At least one piece of information other than the first indication information and the second indication information wherein the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device, and the first indication information is used to indicate not to Update the first information, the first information is used to indicate the cell last used by the terminal device, and the second indication information is used to indicate the waiting time for accessing the network; the processing unit 901 releases the RRC connection.
- the processing unit 901 is further configured to determine not to update second information according to the first indication information, where the second information is used for one or more cells visited by the terminal device.
- the second information includes identification of one or more cells visited by the terminal device.
- the first information includes cell information last used by the terminal device.
- the processing unit 901 determines that the terminal device does not ignore the first indication information in the first message. , or the processing unit 901 determines that the terminal device ignores at least one piece of information in the first message except the first indication information and the second indication information.
- the transceiver unit 902 is also used to send the second information to the core network device.
- the transceiver unit 902 is also configured to receive first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit 902 is also configured to send third indication information, where the third indication information indicates that the network device supports PEI.
- the device when the device 900 is used to perform the method performed by the terminal device in the previous embodiment, the device includes a processing unit 901 and a transceiver unit 902; when the transceiver unit 902 receives the first message and When the access layer security between the terminal device and the network device is not activated, the processing unit 901 processes the first information according to the first message, and the first information is used to indicate that the terminal device The first message is used to indicate the release of the radio resource control RRC connection between the terminal device and the network device; the processing unit 901 releases the RRC connection.
- the processing unit 901 processing the first information according to the first message includes: if the first message includes the first indication information, the processing unit 901 determines not to update the first information, The first indication information is used to indicate not to update the first information.
- the processing unit 901 processing the first information according to the first message includes: when the first message does not include the first indication information, the processing unit 901 processes the first information based on the first message corresponding to the first message.
- the cell updates the first information, and the first indication information is used to indicate not to update the first information.
- the first information includes cell information last used by the terminal device.
- the processing unit 901 determines that the access layer security between the terminal device and the network device is not activated, including: the processing unit 901 determines that no security mode command message; after the transceiver unit 902 receives the security mode command message, the processing unit 901 determines that the process of deriving the key based on the security mode command message fails; or, after the transceiver unit 902 receives the security mode command message, The processing unit 901 determines that the integrity protection check corresponding to the security mode command message fails.
- the transceiver unit 902 is also configured to send first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit 902 is also configured to receive third indication information, where the third indication information indicates that the network device supports PEI.
- the device when the device 900 is used to perform the method performed by the network device in the previous embodiment, the device includes a processing unit 901 and a transceiver unit 902; after the transceiver unit 902 has sent the first message and When the access layer security between the terminal device and the network device is not activated, the processing unit 901 processes the second information according to the first message, and the second information is used to indicate one or more information accessed by the terminal device. cell, the first message is used to instruct to release the radio resource control RRC connection between the terminal device and the network device; the processing unit 901 releases the RRC connection.
- the processing unit 901 processing the second information according to the first message includes: if the first message includes the first indication information, the processing unit 901 determines not to update the second information, The first indication information is used to indicate not to update the first information, and the first information is used to indicate cell information last used by the terminal device.
- the processing unit 901 processing the first information according to the first message includes: when the first message does not include the first indication information, the processing unit 901 processes the first information based on the first message corresponding to the first message.
- the cell updates the second information, the first indication information is used to indicate not to update the first information, and the first information is used to indicate the cell information last used by the terminal equipment.
- the first information includes cell information last used by the terminal device.
- the second information includes identification of one or more cells visited by the terminal device.
- the processing unit 901 determines whether the terminal device updates the first information according to the first message.
- the transceiver unit 902 is also configured to receive first capability information, where the first capability information indicates that the terminal device supports paging advance indication PEI.
- the transceiver unit 902 is also configured to send third indication information, where the third indication information indicates that the network device supports PEI.
- FIG. 10 is another schematic structural diagram of a communication device 1000 provided in this application.
- the communication device 1000 at least includes an input and output interface 1002 .
- the communication device 1000 may be a chip or an integrated circuit.
- the communication device also includes a logic circuit 1001.
- the transceiver unit 902 shown in FIG. 9 may be a communication interface, and the communication interface may be the input-output interface 1002 in FIG. 10 .
- the input-output interface 1002 may include an input interface and an output interface.
- the communication interface may also be a transceiver circuit, and the transceiver circuit may include an input interface circuit and an output interface circuit.
- the logic circuit 1001 determines not to update the first information.
- the first information is used to indicate the cell last used by the terminal device.
- the first message is used to indicate releasing the connection between the terminal device and the network device.
- the radio resource controls the RRC connection; the logic circuit 1001 releases the RRC connection.
- the logic circuit 1001 determines not to update the second information.
- the second information is used to indicate one or more cells that the terminal device has visited.
- the first message is used to indicate releasing the terminal device from the network.
- the logic circuit 1001 determines not to ignore the first indication information in the first message, or the logic circuit 1001 ignores the first indication information except the first indication information and the second indication information.
- the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device, the first indication information is used to indicate not to update the first information, and the first information is used to Indicates the cell last used by the terminal device, and the second indication information is used to indicate the waiting time for accessing the network; the logic circuit 1001 releases the RRC connection.
- the logic circuit 1001 determines not to ignore the first indication information in the first message, or the logic circuit 1001 ignores the first indication information except the first indication information and the second indication information.
- the first message is used to indicate releasing the radio resource control RRC connection between the terminal device and the network device, the first indication information is used to indicate not to update the first information, and the first information is used to indicate The cell last used by the terminal device, the second indication information is used to indicate the waiting time for accessing the network; the logic circuit 1001 releases the RRC connection.
- the logic circuit 1001 processes the first information according to the first message.
- the first information is used to indicate the cell information last used by the terminal equipment.
- the first message is used to indicate the release of the terminal equipment and The radio resource control RRC connection between network devices; the logic circuit 1001 releases the RRC connection.
- the logic circuit 1001 processes the second information according to the first message.
- the second information is used to indicate one or more cells that the terminal device has visited.
- the first message is used to indicate releasing the terminal.
- the logic circuit 1001 and the input-output interface 1002 can also perform other steps performed by the network device in any embodiment and achieve corresponding beneficial effects, which will not be described again here.
- the processing unit 901 shown in Figure 9 may be the logic circuit 1001 in Figure 10.
- the logic circuit 1001 may be a processing device, and the functions of the processing device may be partially or fully implemented through software. Among them, the functions of the processing device can be partially or fully implemented through software.
- the processing device may include a memory and a processor, wherein the memory is used to store a computer program, and the processor reads and executes the computer program stored in the memory to perform corresponding processing and/or steps in any method embodiment. .
- the processing means may comprise only a processor.
- the memory for storing computer programs is located outside the processing device, and the processor is connected to the memory through circuits/wires to read and execute the computer programs stored in the memory.
- the memory and processor can be integrated together, or they can also be physically independent of each other.
- the processing device may be one or more chips, or one or more integrated circuits.
- the processing device may be one or more field-programmable gate arrays (FPGA), application specific integrated circuit (ASIC), system on chip (SoC), central processing unit (central processor unit, CPU), network processor (network processor, NP), digital signal processing circuit (digital signal processor, DSP), microcontroller unit (MCU), programmable logic device (PLD) or other integrated chips, or any combination of the above chips or processors, etc.
- FPGA field-programmable gate arrays
- ASIC application specific integrated circuit
- SoC system on chip
- CPU central processor unit
- CPU central processor unit
- NP network processor
- DSP digital signal processing circuit
- MCU microcontroller unit
- PLD programmable logic device
- FIG 11 is a communication device 1100 involved in the above embodiment provided by an embodiment of the present application.
- the communication device 1100 can specifically be a communication device serving as a terminal device in the above embodiment.
- the example shown in Figure 11 is a terminal
- the device is implemented through a terminal device (or a component in the terminal device).
- the communication device 1100 may include but is not limited to at least one processor 1101 and a communication port 1102.
- the device may also include at least one of a memory 1103 and a bus 1104.
- the at least one processor 1101 is used to control the actions of the communication device 1100.
- the processor 1101 may be a central processing unit, a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. It may implement or execute the various illustrative logical blocks, modules, and circuits described in connection with this disclosure.
- the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a digital signal processor and a microprocessor, and so on.
- the communication device 1100 shown in Figure 11 can be specifically used to implement the steps implemented by the terminal device in the foregoing method embodiment, and to achieve the corresponding technical effects of the terminal device.
- the specific implementation methods of the communication device shown in Figure 11 are all Reference may be made to the descriptions in the foregoing method embodiments, which will not be described again here.
- FIG. 12 is a schematic structural diagram of the communication device 1200 involved in the above embodiment provided by the embodiment of the present application.
- the communication device 1200 can specifically be the communication device as a network device in the above embodiment, as shown in Figure 12
- An example is that the network device is implemented by a network device (or a component in the network device), wherein the structure of the communication device may refer to the structure shown in FIG. 12 .
- the communication device 1200 includes at least one processor 1211 and at least one network interface 1214. Further optionally, the communication device further includes at least one memory 1212, at least one transceiver 1213 and one or more antennas 1215.
- the processor 1211, the memory 1212, the transceiver 1213 and the network interface 1214 are connected, for example, through a bus. In the embodiment of the present application, the connection may include various interfaces, transmission lines or buses, etc., which is not limited in this embodiment.
- Antenna 1215 is connected to transceiver 1213.
- the network interface 1214 is used to enable the communication device to communicate with other communication devices through communication links.
- the network interface 1214 may include a network interface between a communication device and a core network device, such as an S1 interface, and the network interface may include a network interface between a communication device and other communication devices (such as other network devices or core network devices), such as an X2 Or Xn interface.
- a network interface between a communication device and a core network device such as an S1 interface
- the network interface may include a network interface between a communication device and other communication devices (such as other network devices or core network devices), such as an X2 Or Xn interface.
- the processor 1211 is mainly used to process communication protocols and communication data, control the entire communication device, execute software programs, and process data of the software programs, for example, to support the communication device to perform actions described in the embodiments.
- the communication device may include a baseband processor and a central processing unit.
- the baseband processor is mainly used to process communication protocols and communication data.
- the central processing unit is mainly used to control the entire terminal device, execute software programs, and process data of the software programs.
- the processor 1211 in Figure 12 can integrate the functions of the baseband processor and the central processor. Those skilled in the art can understand that the baseband processor and the central processor can also be independent processors, interconnected through technologies such as buses.
- the terminal device may include multiple baseband processors to adapt to different network standards, the terminal device may include multiple central processors to enhance its processing capabilities, and various components of the terminal device may be connected through various buses.
- the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
- the central processing unit can also be expressed as a central processing circuit or a central processing chip.
- the function of processing communication protocols and communication data can be built into the processor, or can be stored in the memory in the form of a software program, and the processor executes the software program to implement the baseband processing function.
- Memory is mainly used to store software programs and data.
- the memory 1212 may exist independently and be connected to the processor 1211.
- the memory 1212 can be integrated with the processor 1211, for example, integrated into a chip.
- the memory 1212 can store the program code for executing the technical solution of the embodiment of the present application, and the execution is controlled by the processor 1211.
- the various computer program codes executed can also be regarded as the driver of the processor 1211.
- Figure 12 shows only one memory and one processor. In an actual terminal device, there may be multiple processors and multiple memories. Memory can also be called storage media or storage devices.
- the memory may be a storage element on the same chip as the processor, that is, an on-chip storage element, or an independent storage element, which is not limited in the embodiments of the present application.
- the transceiver 1213 may be used to support the reception or transmission of radio frequency signals between the communication device and the terminal, and the transceiver 1213 may be connected to the antenna 1215.
- Transceiver 1213 includes a transmitter Tx and a receiver Rx.
- one or more antennas 1215 can receive radio frequency signals
- the receiver Rx of the transceiver 1213 is used to receive the radio frequency signals from the antennas and convert the radio frequency signals into digital baseband signals or digital intermediate frequency signals, and convert the digital baseband signals into digital baseband signals.
- the signal or digital intermediate frequency signal is provided to the processor 1211, so that the processor 1211 performs further processing on the digital baseband signal or digital intermediate frequency signal, such as demodulation processing and decoding processing.
- the transmitter Tx in the transceiver 1213 is also used to receive a modulated digital baseband signal or a digital intermediate frequency signal from the processor 1211, and convert the modulated digital baseband signal or digital intermediate frequency signal into a radio frequency signal, and pass it through a Or multiple antennas 1215 transmit the radio frequency signal.
- the receiver Rx can selectively perform one or more levels of down-mixing processing and analog-to-digital conversion processing on the radio frequency signal to obtain a digital baseband signal or a digital intermediate frequency signal.
- the sequence of the down-mixing processing and the analog-to-digital conversion processing is The order is adjustable.
- the transmitter Tx can selectively perform one or more levels of upmixing processing and digital-to-analog conversion processing on the modulated digital baseband signal or digital intermediate frequency signal to obtain a radio frequency signal.
- the upmixing processing and digital-to-analog conversion processing are The order is adjustable.
- Digital baseband signals and digital intermediate frequency signals can be collectively referred to as digital signals.
- the transceiver 1213 may also be called a transceiver unit, a transceiver, a transceiver device, etc.
- the devices used to implement the receiving function in the transceiver unit can be regarded as the receiving unit
- the devices used in the transceiver unit used to implement the transmitting function can be regarded as the transmitting unit, that is, the transceiver unit includes a receiving unit and a transmitting unit, and the receiving unit also It can be called a receiver, input port, receiving circuit, etc.
- the sending unit can be called a transmitter, transmitter, or transmitting circuit, etc.
- the communication device 1200 shown in Figure 12 can be used to implement the steps implemented by the network equipment in the foregoing method embodiments, and to achieve the corresponding technical effects of the network equipment.
- the specific implementation of the communication device 1200 shown in Figure 12 is: Reference may be made to the descriptions in the foregoing method embodiments, and details will not be repeated here.
- Embodiments of the present application also provide a computer-readable storage medium that stores one or more computer-executable instructions.
- the processor executes the possible implementations of the terminal device in the foregoing embodiments. Methods.
- Embodiments of the present application also provide a computer-readable storage medium that stores one or more computer-executable instructions.
- the processor executes the possible implementations of the network device in the foregoing embodiments. Methods.
- Embodiments of the present application also provide a computer program product (or computer program) that stores one or more computers.
- the processor executes the method of possible implementation of the above terminal device.
- Embodiments of the present application also provide a computer program product that stores one or more computers.
- the processor executes the method of the possible implementation of the network device.
- Embodiments of the present application also provide a chip system, which includes at least one processor and is used to support the communication device in implementing the functions involved in the possible implementation manners of the communication device.
- the chip system further includes an interface circuit that provides program instructions and/or data to the at least one processor.
- the chip system may also include a memory for storing necessary program instructions and data of the communication device.
- the chip system may be composed of chips, or may include chips and other discrete devices, where the communication device may specifically be the terminal equipment in the foregoing method embodiment.
- Embodiments of the present application also provide a chip system, which includes at least one processor and is used to support the communication device in implementing the functions involved in the possible implementation manners of the communication device.
- the chip system further includes an interface circuit that provides program instructions and/or data to the at least one processor.
- the chip system may also include a memory, which is used to store necessary program instructions and data for the communication device.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- the communication device may specifically be the network device in the aforementioned method embodiment.
- An embodiment of the present application also provides a communication system, which includes the terminal device and network device in any of the above embodiments.
- the disclosed systems, devices and methods can be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
- the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
- the above integrated units can be implemented in the form of hardware or software functional units. If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
- the technical solution of the present application is essentially or contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program code. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (24)
- 一种通信方法,其特征在于,包括:在终端设备接收到第一消息且所述终端设备与所述网络设备之间的接入层安全未激活的情况下,确定不更新第一信息,所述第一信息用于指示所述终端设备最后使用的小区,所述第一消息用于指示释放所述终端设备与网络设备之间的无线资源控制RRC连接;释放所述RRC连接。
- 根据权利要求1所述的方法,其特征在于,所述第一消息包含第一指示信息,所述第一指示信息用于指示不更新所述第一信息;所述方法还包括:在所述终端设备与所述网络设备之间的接入层安全未激活的情况下,忽略所述第一指示信息。
- 根据权利要求1或2所述的方法,其特征在于,所述第一消息包括第二指示信息,所述第二指示信息用于指示接入网络的等待时间;所述方法还包括:忽略所述第一消息中除所述第二指示信息之外的至少一个信息,所述至少一个信息包括第一指示信息,所述第一指示信息用于指示不更新所述第一信息。
- 根据权利要求1至3任一项所述的方法,其特征在于,所述第一信息包括所述终端设备最后使用的小区信息。
- 一种通信方法,其特征在于,包括:在网络设备已发送第一消息且终端设备与所述网络设备之间的接入层安全未激活的情况下,确定不更新第二信息,所述第二信息用于指示所述终端设备访问过的一个或多个小区,所述第一消息用于指示释放所述终端设备与网络设备之间的无线资源控制RRC连接;释放所述RRC连接。
- 根据权利要求5所述的方法,其特征在于,所述第一消息包含第一指示信息,所述第一指示信息用于指示不更新第一信息,所述第一信息用于指示所述终端设备最后使用的小区;所述方法还包括:在所述终端设备与所述网络设备之间的接入层安全未激活的情况下,确定所述终端设备忽略所述第一指示信息。
- 根据权利要求5或6所述的方法,其特征在于,所述第一消息包括第二指示信息,所述第二指示信息用于指示接入网络的等待时间;所述方法还包括:在所述终端设备与所述网络设备之间的接入层安全未激活的情况下,确定所述终端设备忽略所述第一消息中除所述第二指示信息之外的至少一个信息,所述至少一个信息包括第一指示信息,所述第一指示信息用于指示不更新第一信息,所述第一信息用于指示所述终端设备最后使用的小区。
- 根据权利要求5至7任一项所述的方法,其特征在于,所述方法还包括:在所述终端设备与所述网络设备之间的接入层安全未激活的情况下,确定所述终端设备不更新第一信息,所述第一信息用于指示所述终端设备最后使用的小区。
- 根据权利要求5至8任一项所述的方法,其特征在于,所述第一信息包括所述终端设备最后使用的小区信息。
- 根据权利要求5至9任一项所述的方法,其特征在于,所述第二信息包括所述终端设备访问过的一个或多个小区的标识。
- 一种通信方法,其特征在于,包括:在终端设备接收到第一消息且所述终端设备与所述网络设备之间的接入层安全未激活的情况下,确定不忽略所述第一消息中的第一指示信息,或者,忽略所述第一消息中除第一指示信息和第二指示信息之外的至少一个信息;其中,所述第一消息用于指示释放所述终端设备与网络设备之间的无线资源控制RRC连接,所述第一指示信息用于指示不更新第一信息,所述第一信息用于指示所述终端设备最后使用的小区,所述第二指示信息用于指示接入网络的等待时间;释放所述RRC连接。
- 根据权利要求11所述的方法,其特征在于,所述方法还包括:所述终端设备根据第一指示信息确定不更新所述第一信息。
- 根据权利要求11或12所述的方法,其特征在于,所述第一信息包括所述终端设备最后使用的小区信息。
- 一种通信方法,其特征在于,包括:在网络设备已发送第一消息且终端设备与所述网络设备之间的接入层安全未激活的情况下,确定不忽略所述第一消息中的第一指示信息,或者,忽略所述第一消息中除第一指示信息和第二指示信息之外的至少一个信息;其中,所述第一消息用于指示释放所述终端设备与网络设备之间的无线资源控制RRC连接,所述第一指示信息用于指示不更新第一信息,所述第一信息用于指示所述终端设备最后使用的小区,所述第二指示信息用于指示接入网络的等待时间;释放所述RRC连接。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:根据所述第一指示信息确定不更新第二信息,所述第二信息用于所述终端设备访问过的一个或多个小区。
- 根据权利要求15所述的方法,其特征在于,所述第二信息包括所述终端设备访问过的一个或多个小区的标识。
- 根据权利要求14至16任一项所述的方法,其特征在于,所述第一信息包括所述终端设备最后使用的小区信息。
- 根据权利要求14至17任一项所述的方法,其特征在于,所述方法还包括:在所述终端设备与所述网络设备之间的接入层安全未激活的情况下,确定所述终端设备不忽略所述第一消息中的第一指示信息,或者,所述网络设备确定所述终端设备忽略所述第一消息中除第一指示信息和第二指示信息之外的至少一个信息。
- 一种通信装置,其特征在于,包括处理单元和收发单元;其中,所述处理单元和所述收发单元用于执行如权利要求1至18任一项所述的方法。
- 一种通信装置,其特征在于,包括逻辑电路和输入输出接口;其中,所述逻辑电路和所述输入输出接口用于执行如权利要求1至18中任一项所述的方法。
- 一种通信装置,其特征在于,包括至少一个处理器,所述至少一个处理器与存储器耦合;所述存储器用于存储程序和/或指令;所述至少一个处理器用于基于所述程序和/或指令,以使所述通信装置执行如前述权利要求1至18任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,所述介质存储有指令,当所述指令被计算机执行时,实现权利要求1至18中任一项所述的方法。
- 一种计算机程序产品,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求1至18中任一项所述的方法。
- 一种通信系统,其特征在于,所述通信系统包括终端设备和网络设备;其中,所述终端设备用于执行如权利要求1至4任一项所述的方法,且所述网络设备用于执行如权利要求5至10任一项所述的方法;或者,所述终端设备用于执行如权利要求11至13任一项所述的方法,且所述网络设备用于执行如权利要求14至18任一项所述的方法。
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP23851626.4A EP4561190A4 (en) | 2022-08-10 | 2023-07-31 | COMMUNICATION METHOD AND COMMUNICATION APPARATUS |
| JP2025507663A JP2025526793A (ja) | 2022-08-10 | 2023-07-31 | 通信方法および通信装置 |
| US19/049,226 US20250203702A1 (en) | 2022-08-10 | 2025-02-10 | Communication method and communication apparatus |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210957685.3A CN117641523A (zh) | 2022-08-10 | 2022-08-10 | 一种通信方法及通信装置 |
| CN202210957685.3 | 2022-08-10 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US19/049,226 Continuation US20250203702A1 (en) | 2022-08-10 | 2025-02-10 | Communication method and communication apparatus |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024032405A1 true WO2024032405A1 (zh) | 2024-02-15 |
Family
ID=89850796
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2023/110144 Ceased WO2024032405A1 (zh) | 2022-08-10 | 2023-07-31 | 一种通信方法及通信装置 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20250203702A1 (zh) |
| EP (1) | EP4561190A4 (zh) |
| JP (1) | JP2025526793A (zh) |
| CN (1) | CN117641523A (zh) |
| WO (1) | WO2024032405A1 (zh) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112788797A (zh) * | 2019-11-01 | 2021-05-11 | 华硕电脑股份有限公司 | 无线通信系统中释放预配置的上行链路资源(pur)的方法和设备 |
| WO2022141009A1 (zh) * | 2020-12-29 | 2022-07-07 | 华为技术有限公司 | 寻呼消息发送的方法和装置 |
| WO2022160315A1 (zh) * | 2021-01-30 | 2022-08-04 | 华为技术有限公司 | 通信方法及装置 |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8515436B2 (en) * | 2008-03-27 | 2013-08-20 | Qualcomm Incorporated | Management of wireless connections |
| WO2013144606A1 (en) * | 2012-03-27 | 2013-10-03 | Research In Motion Limited | User equipment preference indicator for suspension of radio communications |
| WO2022027381A1 (zh) * | 2020-08-05 | 2022-02-10 | 华为技术有限公司 | 通信方法及相关设备 |
| CN116965104A (zh) * | 2020-10-21 | 2023-10-27 | 欧芬诺有限责任公司 | 针对小数据传输的寻呼 |
-
2022
- 2022-08-10 CN CN202210957685.3A patent/CN117641523A/zh active Pending
-
2023
- 2023-07-31 EP EP23851626.4A patent/EP4561190A4/en active Pending
- 2023-07-31 JP JP2025507663A patent/JP2025526793A/ja active Pending
- 2023-07-31 WO PCT/CN2023/110144 patent/WO2024032405A1/zh not_active Ceased
-
2025
- 2025-02-10 US US19/049,226 patent/US20250203702A1/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112788797A (zh) * | 2019-11-01 | 2021-05-11 | 华硕电脑股份有限公司 | 无线通信系统中释放预配置的上行链路资源(pur)的方法和设备 |
| WO2022141009A1 (zh) * | 2020-12-29 | 2022-07-07 | 华为技术有限公司 | 寻呼消息发送的方法和装置 |
| WO2022160315A1 (zh) * | 2021-01-30 | 2022-08-04 | 华为技术有限公司 | 通信方法及装置 |
Non-Patent Citations (4)
| Title |
|---|
| HUAWEI (OFFLINE EMAIL DISCUSSION RAPPORTEUR): "Offline [AT111-e][302][NBIOT/eMTC R15] WUS last used cell (Huawei)", 3GPP TSG-RAN WG2 MEETING #111-E R2-2008302, 7 September 2020 (2020-09-07), XP051931031 * |
| JAGDEEP SINGH, HUAWEI, HISILICON: "Discussion on the update of last used cell", 3GPP TSG-RAN WG2 MEETING #120 R2-2211604, 4 November 2022 (2022-11-04), XP052215709 * |
| MEDIATEK INC.: "Report of [AT117-e][004][ePowSav] PEI and paging subgrouping", 3GPP TSG-RAN WG2 MEETING #117 ELECTRONIC, R2-2203901, 1 March 2022 (2022-03-01), XP052118937 * |
| See also references of EP4561190A4 |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2025526793A (ja) | 2025-08-15 |
| CN117641523A (zh) | 2024-03-01 |
| EP4561190A4 (en) | 2025-11-05 |
| US20250203702A1 (en) | 2025-06-19 |
| EP4561190A1 (en) | 2025-05-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN115023981B (zh) | 用于rrc非活动状态的寻呼的wus | |
| US20260101407A1 (en) | Methods, nodes and computer readable medium for relay connection establishment | |
| US11553456B2 (en) | RAN area ID configuration | |
| US12035278B2 (en) | Wireless communication method and apparatus | |
| WO2018202114A1 (zh) | 寻呼方法和装置 | |
| EP4576895A1 (en) | Communication method and related apparatus | |
| EP3636017A1 (en) | Area update procedure(s) for radio system | |
| CN113557773A (zh) | 用以针对无线网络调节ue的寻呼定时的第二ue标识的指配 | |
| WO2024208345A1 (zh) | 寻呼方法及通信设备 | |
| EP3659386B1 (en) | Method and device for device-to-device (d2d) communication | |
| WO2022022340A1 (zh) | 一种通信方法及装置 | |
| WO2022099539A1 (zh) | 一种通信方法及装置 | |
| JP2026510748A (ja) | 通信方法及び装置 | |
| WO2024032405A1 (zh) | 一种通信方法及通信装置 | |
| WO2021127981A1 (zh) | 无线通信的方法和无线通信装置 | |
| US20240276319A1 (en) | Communication method and device | |
| GB2574016A (en) | Apparatus, method and computer program | |
| WO2025227903A1 (zh) | 信号传输方法和装置 | |
| KR20250095526A (ko) | 통신 네트워크에서 페이징을 위한 방법 및 장치 | |
| WO2026029791A1 (en) | Transmission of cell dtx-drx parameters for rrc inactive state | |
| KR20260046539A (ko) | 무선 통신 방법 및 장치 | |
| CN117750355A (zh) | 通信方法和通信装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23851626 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 11202500913R Country of ref document: SG Ref document number: 2025507663 Country of ref document: JP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2023851626 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2023851626 Country of ref document: EP Effective date: 20250219 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 11202500913R Country of ref document: SG |
|
| WWP | Wipo information: published in national office |
Ref document number: 11202500913R Country of ref document: SG |
|
| WWP | Wipo information: published in national office |
Ref document number: 2023851626 Country of ref document: EP |