A network slice access method, nssf, amf and system
A network slicing and access method technology, applied in access restriction, transmission system, connection management, etc., can solve problems such as poor service continuity of users, achieve the effect of ensuring continuity and improving experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] This embodiment provides a network slicing access method, such as figure 1 As shown, the method includes:
[0054] Step S102: Obtain a second AMF that meets the service requirements of the second network slice for which the terminal applies for access, wherein the terminal has established a PDU session in the first network slice based on the first user identifier.
[0055] In this embodiment, the terminal has connected to the first network slice and established a PDU session of the first network slice. At this time, if it needs to connect to the second network slice, the terminal sends an application for accessing the second network slice to the current AMF through the base station The access request specifically includes the second network slice identifier, that is, NSSAI (Network Slice Selection Assistance Information, network slice selection support information). The current AMF judges whether it meets the service requirements of the second network slice. If the cur...
Embodiment 2
[0084] Such as image 3 As shown, this embodiment provides a network slicing access method, which is applied to the current AMF, and the method includes:
[0085] Step S202: Receive the second AMF identifier sent by the NSSF and the second user identifier assigned to the terminal, where the terminal has established a PDU session in the first network slice based on the first user identifier, and the second AMF identifier corresponds to the second AMF Satisfying the business requirements of the second network slice for which the terminal applies for connection;
[0086] Step S204: Receive the request message sent by the second AMF for obtaining the terminal user security context, and send the terminal user security context and the second user identity to the second AMF based on the request message, and maintain the PDU session, so that the second AMF When judging that the registration of the terminal fails according to the received second user identification, send an identity v...
Embodiment 3
[0094] Such as Figure 4 As shown, this embodiment provides a network slice access method, which is applied to the second AMF, and the method includes:
[0095] Step S302: Receive a registration request carrying a second network slice identifier sent by the terminal, wherein the terminal has established a PDU session in the first network slice based on the first user identifier;
[0096] Step S304: Send a request message to the current AMF to obtain the terminal user security context, so that the current AMF sends the terminal user security context and the second user identity assigned to the terminal by the NSSF to the second AMF based on the request message, and maintains the PDU session ;
[0097] Step S306: Receive the user security context and the second user identifier of the terminal sent by the current AMF;
[0098] Step S308: judge whether the terminal is successfully registered according to the second user ID, if not, send an identity verification request to the te...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


