NETWORK SLICE ALLOCATION METHOD, DEVICE, AND SYSTEM
First Claim
1. A network slice allocation system, comprising:
- an access network device; and
a second core network device,wherein;
the access network device is further configured to receive a slice access request message from a terminal device, wherein the slice access request message comprises a second pseudo identity;
determine the second core network device corresponding to the second pseudo identity, and send the slice access request message to the second core network device; and
the second core network device is configured to send a security mode command to the terminal device, receive a security mode complete command sent by the terminal device, receive a second network slice selection assistance information (NSSAI) sent by the terminal device based on the security mode command, and allocate a network slice to the terminal device based on the slice access request message and the second NSSAI.
1 Assignment
0 Petitions
Accused Products
Abstract
This application provides a network slice allocation method, device, and system, including a terminal device, a first core network device, a second core network device, and a third core network device. The terminal device encrypts NSSAI and an ID of the terminal device to obtain encrypted information, and sends a slice access request message to the first core network device. The first core network device sends the encrypted information to the second core network device. The second core network device decrypts the encrypted information to obtain the NSSAI and the ID of the terminal device, generates an authentication vector, and sends the NSSAI and the authentication vector to the first core network device.
9 Citations
11 Claims
-
1. A network slice allocation system, comprising:
-
an access network device; and a second core network device, wherein; the access network device is further configured to receive a slice access request message from a terminal device, wherein the slice access request message comprises a second pseudo identity;
determine the second core network device corresponding to the second pseudo identity, and send the slice access request message to the second core network device; andthe second core network device is configured to send a security mode command to the terminal device, receive a security mode complete command sent by the terminal device, receive a second network slice selection assistance information (NSSAI) sent by the terminal device based on the security mode command, and allocate a network slice to the terminal device based on the slice access request message and the second NSSAI. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A network slice allocation method, comprising:
-
receiving, by an access network device, a slice access request message sent by a terminal device, wherein the slice access request message comprises a second pseudo identity determined by the terminal device based on second network slice selection assistance information (NSSAI) and the at least one first mapping relationship; determining, by the access network device, a second core network device corresponding to the second pseudo identity; and sending, by the access network device, the slice access request message to the second core network device. - View Dependent Claims (8, 9)
-
-
10. A network slice allocation method, comprising:
-
receiving, by a terminal device, at least one first mapping relationship, wherein each first mapping relationship is a mapping relationship between a first pseudo identity of a first core network device and at least one piece of first network slice selection assistance information (NSSAI); determining, by the terminal device, a second pseudo identity of a second core network device based on second NSSAI and the at least one first mapping relationship; sending, by the terminal device, a slice access request message to an access network device, wherein the slice access request message comprises the second pseudo identity; receiving, by the terminal device, a security mode command sent by the second core network device; sending, by the terminal device, a security mode complete command to the second core network device; and sending, by the terminal device, the second NSSAI to the second core network device based on the security mode command. - View Dependent Claims (11)
-
Specification