Method and apparatus for acquiring vehicle to everything communication policy

ABSTRACT

An embodiment of the present disclosure provides a method for obtaining a Vehicle to Everything Policy (V2XP). The method includes: transmitting, by a terminal device, at least one of first information and second information to a Policy Control Function (PCF), the first information being used for requesting a configuration of a policy for V2X communication over a PC5 interface, and the second information being used for requesting a configuration of a policy for V2X communication over a Uu interface; and receiving, by the terminal device from the PCF, at least one of the policy corresponding to the first information and the policy corresponding to the second information.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation of U.S. application Ser. No.17/333,652, filed on May 28, 2021, which is a continuation ofInternational Application No. PCT/CN2019/107588, filed on Sep. 24, 2019.The entirety of the above-mentioned patent applications is herebyincorporated by reference herein and made a part of this specification.

TECHNICAL FIELD

The present disclosure relates to the field of communication, and moreparticularly, to a method and apparatus for obtaining a vehicle toeverything communication policy.

BACKGROUND

The 5th-generation (5G) mobile communication system supports Vehicle toEverything (V2X) communication. The V2X communication is a sidelinktransmission technology. One terminal device can directly communicatewith another terminal device without forwarding through a networkdevice. Thus, the V2X communication has a higher spectrum efficiency anda lower transmission delay.

A terminal device can perform communication based on a V2X Policy (V2XP)configured by a core network. In some cases, for example, when the V2XPexpires, the terminal device may request the core network to reconfigurethe V2XP. For different communication interfaces, configurationparameters contained in the V2XP may be different. However, since thecore network cannot determine which communication interface needs tohave its corresponding V2XP reconfigured, the core network willreconfigure all V2XPs, thereby causing unnecessary resource overhead.

SUMMARY

The present disclosure provides a method and apparatus for obtaining aVehicle to Everything Policy (V2XP), a terminal device, a chip, acomputer-readable storage medium, and a computer program product,capable of reducing unnecessary resource overhead.

In a first aspect, a method for obtaining a V2XP is provided. The methodincludes: transmitting, by a terminal device, at least one of firstinformation and second information to a Policy Control Function (PCF),the first information being used for requesting a configuration of apolicy for V2X communication over a PC5 interface, and the secondinformation being used for requesting a configuration of a policy forV2X communication over a Uu interface; and receiving, by the terminaldevice from the PCF, at least one of the policy corresponding to thefirst information and the policy corresponding to the secondinformation.

In a second aspect, a method for obtaining a V2XP is provided. Themethod includes: receiving, by a Policy Control Function (PCF), at leastone of first information and second information from a terminal device,the first information being used for requesting a configuration of apolicy for V2X communication over a PC5 interface, and the secondinformation being used for requesting a configuration of a policy forV2X communication over a Uu interface; and transmitting, by the PCF tothe terminal device, at least one of the policy corresponding to thefirst information and the policy corresponding to the secondinformation.

In a third aspect, an apparatus for obtaining a V2XP is provided. Theapparatus may implement a function corresponding to the method accordingto the first aspect. The function may be implemented by hardware, or ina manner of executing corresponding software by hardware. The hardwareor software includes one or more units or modules corresponding to theabove function.

In a possible design, the apparatus is a terminal device or a chip. Theapparatus may include a processing unit and a transceiving unit. Whenthe apparatus is a terminal device, the processing unit may be aprocessor, and the transceiving unit may be a transceiver. The terminaldevice may further include a storage unit. The storage unit may be amemory. The storage unit is configured to store instructions. Theprocessing unit executes the instructions stored in the storage unit,such that the terminal device performs the method according to the firstaspect. When the apparatus is a chip in a terminal device, theprocessing unit may be a processor, and the transceiver unit may be aninput/output interface, a pin, a circuit, and the like. The processingunit executes instructions stored in a storage unit, such that theterminal device including the chip performs the method according to thefirst aspect. The storage unit may be a storage unit (for example, aregister, a cache, etc.) in the chip, or a storage unit (for example, aread-only memory, a random access memory, etc.) located outside the chipand in the terminal device.

In a fourth aspect, an apparatus for obtaining a V2XP is provided. Theapparatus may implement a function corresponding to the method accordingto the second aspect. The function may be implemented by hardware, or ina manner of executing corresponding software by hardware. The hardwareor software includes one or more units or modules corresponding to theabove function.

In a possible design, the apparatus is a network device or a chip. Theapparatus may include a processing unit and a transceiving unit. Whenthe apparatus is a network device, the processing unit may be aprocessor, and the transceiving unit may be a transceiver. The networkdevice may further include a storage unit. The storage unit may be amemory. The storage unit is configured to store instructions. Theprocessing unit executes the instructions stored in the storage unit,such that the network device performs the method according to the secondaspect. When the apparatus is a chip in a network device, the processingunit may be a processor, and the transceiver unit may be an input/outputinterface, a pin, a circuit, and the like. The processing unit executesthe instructions stored in a storage unit, such that the network deviceincluding the chip executes the method according to the second aspect.The storage unit may be a storage unit (for example, a register, acache, etc.) in the chip, or a storage unit (for example, a read-onlymemory, a random access memory, etc.) located outside the chip and inthe network device.

In a fifth aspect, a computer-readable storage medium is provided. Acomputer program is stored in the computer-readable storage medium. Whenthe computer program is executed by a processor, the processor performsthe method according to the first aspect.

In a sixth aspect, a computer-readable storage medium is provided. Acomputer program is stored in the computer-readable storage medium. Whenthe computer program is executed by a processor, the processor performsthe method according to the second aspect.

In a seventh aspect, a computer program product including a computerprogram codes is provided. When the computer program code is executed bya processor, the processor performs the method according to the firstaspect.

In an eighth aspect, a computer program product including a computerprogram code is provided. When the computer program code is executed bya processor, the processor performs the method according to the secondaspect.

In a ninth aspect, a computer program is provided. When the computerprogram is executed on a computer, the computer is caused to perform themethod according to the first aspect.

In a tenth aspect, a computer program is provided. When the computerprogram is executed on a computer, the computer is caused to perform themethod according to the second aspect.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic diagram illustrating a communication systemapplied in the present disclosure;

FIG. 2 is a schematic diagram illustrating a method for obtaining aVehicle to Everything Policy (V2XP) according to an embodiment of thepresent disclosure;

FIG. 3 is a schematic diagram illustrating a structure of an apparatusfor obtaining a V2XP according to an embodiment of the presentdisclosure;

FIG. 4 is a schematic diagram illustrating a structure of anotherapparatus for obtaining a V2XP according to an embodiment of the presentdisclosure; and

FIG. 5 is a schematic diagram illustrating a device for obtaining a V2XPaccording to an embodiment of the present disclosure.

DESCRIPTION OF EMBODIMENTS

The technical solutions according to embodiments of the presentdisclosure will be described below in combination with the accompanyingdrawings of the embodiments of the present disclosure. Obviously, theembodiments described here are only part of the embodiments of thepresent disclosure, rather than all embodiments of the presentdisclosure. Based on the embodiments of the present disclosure, allother embodiments obtained by those skilled in the art without creativelabor fall within the scope of the present disclosure.

FIG. 1 is a schematic diagram illustrating a communication systemapplied in the present disclosure. Network elements in FIG. 1 will bebriefly introduced below.

User Equipment (UE) A and UE B are vehicles or vehicle-mountedcommunication devices. UE C is a terminal device used by a pedestrian,such as a mobile phone, a wearable device, and the like. UE D is astationary terminal device, for example, a street light.

The above UEs are several examples of terminal devices applicable to thepresent disclosure, and terminal devices applicable to the presentdisclosure are not limited to these examples. The UEs may communicateover a PC5 interface. The UEs may communicate with an access networkover a Uu interface, and then communicate with a core network throughthe access network.

The PC5 interface is an interface defined on the basis of a sidelink.Using such an interface, UEs may directly perform communicationtransmission, that is, Device to Device (D2D) communication. The PC5interface may be used in out of coverage scenarios or in coveragescenarios, but generally only authorized UEs can use the PC5 interfacefor communication.

The Uu interface can implement communications between a UE and a networkdevice. That is, the UE may perform an interaction of user plane dataand an interaction of control plane data with the network device overthe Uu interface. The user plane data may be user service data, such asvoice data and video data. The control plane data may be Radio ResourceControl (RRC) messages, thereby implementing functions such as access,handover, broadcast, and paging for the UE.

A Radio Access Network (RAN) may be a 3rd Generation Partnership Project(3GPP) access network such as a base station, or a non-3GPP accessnetwork. Main functions of the RAN may include radio resourcemanagement, uplink and downlink data classification and Quality ofService (QoS) applications, cooperation with control plane networkelements for signaling processing, and cooperation with user planenetwork elements for data forwarding

Main functions of an Access and Mobility Management Function (AMF) mayinclude an endpoint of a wireless access network control plane, anendpoint of non-access signaling, mobility management, lawfulinterception, access authorization/authentication, and the like.

Main functions of a Session Management Function (SMF) may includesession management, Internet Protocol (IP) address allocation andmanagement of UE, selection of functions of a manageable user plane, anendpoint of a policy control and charging function interface, downlinkdata notification, and the like.

Main functions of a User Plane Function (UPF) may include packet routingand forwarding, QoS processing of user plane data, and the like.

Main functions of Unified Data Management (UDM) may include generationof a 3GPP authentication certificate/authentication parameter, storageand management of a permanent user identity of a 5G system, andsubscription information management.

Main functions of a Policy Control Function (PCF) may include providinga UE, an AMF and a SMF with a parameter related to a UE policy, aparameter related to an access and mobility management policy, and aparameter related to a session management policy, respectively. InVehicle to Everything (V2X), the PCF provides information such asV2X-related authentication and policy parameters to the UE and RAN.

Main functions of a Network Exposure Function (NEF) may include anexposure of data in a network to a third-party application server, or areception of data provided by the third-party application server for thenetwork.

An Application Function (AF) is equivalent to a third-party applicationserver. Main functions of the AF may include initiation of transmissionof multicast data.

Main functions of a Data Network (DN) may include transmitting data toand receiving data from a network such as the Internet.

N2, N3, N4, and N6 are communication interfaces between networkelements. N2 is a communication interface between the RAN and the AMF,N3 is a communication interface between the RAN and the UPF, N4 is acommunication interface between the SMF and the UPF, and N6 is acommunication interface between the UPF and the DN.

A method for obtaining a Vehicle to Everything Policy (V2XP) accordingto the embodiments of the present disclosure will be described below. Asillustrated in FIG. 2, the method includes the following steps.

At S210, the UE transmits first information and/or second information tothe AMF. The first information is used for requesting a configuration ofa policy for V2X communication over a PC5 interface, and the secondinformation is used for requesting a configuration of a policy for V2Xcommunication over a Uu interface. When all V2XPs are requested, thefirst information and the second information may also be replaced by oneparameter. The parameter indicates requesting all V2XPs.

The first information and/or the second information may be placed in acontainer that is transparent to the AMF. The transparent container maybe, for example, a UE policy provisioning request. The first informationand the second information may be carried in one request message, or maybe carried in two request messages. The two cases will be respectivelyintroduced below.

Case 1

The first information and the second information are carried in tworequest messages. Content of the two request messages is as shown inTable 1 and Table 2.

TABLE 1 Configuration for PC5 request message content InformationElement Identifier Information (IEI) Element Type/Reference PresenceFormat Length PTI Procedure M V 1 transaction identity Configuration forUE policy delivery M V 1 PC5 request message type (mandatory) messageidentity PC5 V2XP O request indication (optional)

TABLE 2 Configuration for Uu request message content IEI InformationElement Type/Reference Presence Format Length PTI Procedure M V 1transaction identity Configuration for UE policy delivery M V 1 Uurequest message type message identity Uu V2XP request O indication

A type of a message that carries the first information or the secondinformation is as shown in Table 3. The type of the message may be, forexample, a UE policy delivery service message type.

TABLE 3 Bits 8 7 6 5 4 3 2 1 0 0 0 0 0 0 0 0 Reserved 0 0 0 0 0 0 0 1MANAGE UE POLICY COMMAND message 0 0 0 0 0 0 1 0 MANAGE UE POLICYCOMPLETE message 0 0 0 0 0 0 1 1 MANAGE UE POLICY COMPLETE REJECTmessage 0 0 0 0 0 1 0 0 UE STATE INDICATION message 0 0 0 0 0 1 0 1Configuration for PC5 request message 0 0 0 0 0 1 1 0 Configuration forUu request message All other values are reserved

Case 2

The first information and the second information are carried in onerequest message.

1) When the first information and the second information are twoparameters in the request message, content of the request message is asshown in Table 4.

TABLE 4 V2X configuration request message content IEI InformationElement Type/Reference Presence Format Length PTI Procedure transactionM V 1 identity Configuration for UE policy delivery M V 1 Uu requestmessage type message identity PC5 Interface indication Optional UuInterface indication Optional

A type of a message that carries the first information and the secondinformation is as shown in Table 5. The type of the message may be, forexample, a UE policy delivery service message type.

TABLE 5 Bits 8 7 6 5 4 3 2 1 0 0 0 0 0 0 0 0 Reserved 0 0 0 0 0 0 0 1MANAGE UE POLICY COMMAND message 0 0 0 0 0 0 1 0 MANAGE UE POLICYCOMPLETE message 0 0 0 0 0 0 1 1 MANAGE UE POLICY COMPLETE REJECTmessage 0 0 0 0 0 1 0 0 UE STATE INDICATION message 0 0 0 0 0 1 0 1 V2Xconfiguration request message All other values are reserved

The Information Element of the PC5 Interface indication in Table 4 is asshown in Table 6 and Table 7.

TABLE 6 8 7 6 5 4 3 2 1 PC5 Interface indication IEI) PC5 Interfaceindication octet 1

TABLE 7 PC5 Interface indication (octet 1, bit 1 to 4) Bit 0 0 0 1Request

In Table 6, the PC5 Interface indication occupies four bits of oneoctet, that is, bit 1 to bit 4. A value of the four bits is as shown inTable 7. When the value of the bits is 0001, it indicates that the UErequests a configuration of a V2XP of the PC5 interface. When the valueof the bits is another value, it indicates that the UE does not requestthe configuration of the V2XP of the PC5 interface.

The Information Element of the PC5 Interface indication in Table 4 is asshown in Table 8 and Table 9.

TABLE 8 8 7 6 5 4 3 2 1 Uu Interface indication IEI Uu Interfaceindication octet 1

TABLE 9 Uu Interface indication (octet 1, bit 1 to 4) Bit 0 0 0 1Request

In Table 8, the Uu Interface indication occupies four bits of one octet,that is, bit 1 to bit 4. A value of the four bits is as shown in Table9. When the value of the bits is 0001, it indicates that the UE requestsa configuration of a V2XP of the Uu interface. When the value of thebits is another value, it indicates that the UE does not request theconfiguration of the V2XP of the Uu interface.

2) When the first information and the second information are two bits inone request message, content of the request message is as shown in Table10.

TABLE 10 V2X configuration request message content IEI InformationElement Type/Reference Presence Format Length PTI Procedure transactionM V 1 Identity Configuration for UE policy delivery M V 1 Uu requestmessage type message identity Interface indication

A type of a message that carries the first information and the secondinformation is as shown in Table 11. The type of the message may be, forexample, a UE policy delivery service message type.

TABLE 11 Bits 8 7 6 5 4 3 2 1 0 0 0 0 0 0 0 0 Reserved 0 0 0 0 0 0 0 1MANAGE UE POLICY COMMAND message 0 0 0 0 0 0 1 0 MANAGE UE POLICYCOMPLETE message 0 0 0 0 0 0 1 1 MANAGE UE POLICY COMPLETE REJECTmessage 0 0 0 0 0 1 0 0 UE STATE INDICATION message 0 0 0 0 0 1 0 1 V2Xconfiguration request message All other values are reserved

The Information Element of the Interface indication in Table 10 is asshown in Table 12 and Table 13.

TABLE 12 8 7 6 5 4 3 2 1 Interface indication IEI Interface indicationoctet 1

TABLE 13 Uu Interface indication (octet 1, bit 1 to 4) Bit 0 0 0 1 PC5 00 1 0 Uu 0 0 1 1 Both

In Table 12, the Interface indication occupies four bits of one octet,that is, bit 1 to bit 4. A value of the four bits is as shown in Table13. When the value of the bits is 0001, it indicates that the UErequests the configuration of the V2XP of the PC5 interface. When thevalue of the bits is 0010, it indicates that the UE requests theconfiguration of the V2XP of the Uu interface. When the value of thebits is 0011, it indicates that the UE requests a configuration of aV2XP of the PC5 interface and the Uu interface.

The Information Element of the Interface indication in Table 10 may alsoadopt forms shown in Table 14 and Table 15.

TABLE 14 8 7 6 5 4 3 2 1 Interface indication IEI Uu PC5 octet 1

TABLE 15 Uu Interface indication (octet 1, bit 1 to 4) Bit 1 to 2 0 1request Bit 3 to 4 0 1 request

In Table 14, the Interface indication occupies four bits of one octet,that is, bit 1 to bit 4. A value of the four bits is as shown in Table15. When the value of bit 1 and bit 2 is 01, it indicates that the UErequests the configuration of the V2XP of the PC5 interface. When thevalue of bit 3 and bit 4 is 01, it indicates that the UE requests theconfiguration of the V2XP of the Uu interface.

At S220, the AMF forwards the received first information and/or secondinformation to the PCF.

At S230, the PCF determines a policy corresponding to the firstinformation and/or a policy corresponding to the second informationbased on the received first information and/or second information, andtransmits the policy corresponding to the first information and/or thepolicy corresponding to the second information to the terminal device.

When the PCF receives the first information, the PCF transmits thepolicy corresponding to the first information to the UE. When the PCFreceives the second information, the PCF transmits the policycorresponding to the second information to the UE. When the PCF receivesthe first information and the second information, the PCF transmits thepolicy corresponding to the first information and the policycorresponding to the second information to the UE.

For example, when the PCF receives information for requesting theconfiguration of the V2XP of the PC5 interface, the PCF transmits theV2XP of the PC5 interface to the UE. When the PCF receives informationfor requesting the configuration of the V2XP of the Uu interface, thePCF transmits the V2XP of the Uu interface to the UE. When the PCFreceives the information for requesting the configuration of the PC5interface and the information for requesting the configuration of the Uuinterface, the PCF transmits the V2XP of the PC5 interface and the V2XPof the Uu interface to the UE.

In the above examples, the UE may request updating V2XPs in a targetedmanner. When a part of the V2XPs expires, the UE may transmit a requestmessage for requesting a configuration of the part of the V2XPs. Whenall of the V2XPs expire, the UE may transmit a request message forrequesting a configuration of all of the V2XPs. The PCF may configurethe V2XPs required by the UE in accordance with the request message fromthe UE, thereby avoiding unnecessary resource overhead caused byreconfiguring all of the V2XPs.

In at least one embodiment, a V2XP transmitted by the PCF includesexpiration time of the policy.

For example, when the PCF receives the information for requesting theconfiguration of the V2XP of the PC5 interface, the PCF transmitsexpiration time of the V2XP of the PC5 interface to the UE. When the PCFreceives the information for requesting the configuration of the V2XP ofthe Uu interface, the PCF transmits expiration time of the V2XP of theUu interface to the UE. When the PCF receives the information forrequesting the configuration of the PC5 interface and the informationfor requesting the configuration of the Uu interface, the PCF transmitsthe expiration time of the V2XP of the PC5 interface and the expirationtime of the V2XP of the Uu interface to the UE, or the PCF transmits tothe UE expiration time applicable to the all V2XPs. When expiration timecorresponding to a policy of an interface expires, the UE re-requeststhe PCF to configure the policy of the interface.

Table 16 to Table 18 show three possible encoding forms of a policycontaining expiration time. Table 16 is applicable to the PC5 interfaceand the Uu interface. Table 17 is applicable to the PC5 interface. Table18 is applicable to the Uu interface.

TABLE 16 UE policy part when the UE policy part type is V2XP 8 7 6 5 4 32 1 UE policy part contents length octet 1 octet 2 0 0 0 0 UE policypart type = {V2XP} octet 3 spare Expiration time octet 4 octet 9 UEpolicy part contents = {V2XP contents} octet 10 octet x

TABLE 17 V2XP info = {UE policies for V2X communication over PC5} 8 7 65 4 3 2 1 0 0 0 0 V2XP info type = octet k spare {UE policies for V2Xcommunication over PC5} Expiration time octet k + 1 octet k + 5 Lengthof V2XP info contents octet k + 6 octet k + 7 V2XP info contents = {UEpolicies for octet k + 8 V2X communication over PC5 contents} octet 1

TABLE 18 V2XP info = {UE policies for V2X communication over Uu)} 8 7 65 4 3 2 1 0 0 0 0 V2XP info type = octet k spare {UE policies for V2Xcommunication over Uu} Expiration time octet k + 1 octet k + 5 Length ofV2XP info contents octet k + 6 octet k + 7 V2XP info contents = {UEpolicies for octet k + 8 V2X communication over Uu contents} octet 1

Expiration time (octet k+1 to k+5) shall be set as a 40 bits unsignedinteger value indicating a UTC time, in seconds since midnight UTC ofJan. 1, 1970.

At S240, after receiving the V2XP, the UE may transmit a reply messageto the PCF. The reply message includes a result of execution of thepolicy corresponding to the first information and/or the policycorresponding to the second information. If a certain policy cannot beexecuted due to grammatical errors and the like causes, the UE needs tocarry an identity of the policy, a service corresponding to the policy,etc. in the reply message, such that the core network can takecorresponding measures.

It is to be noted that the method illustrated in FIG. 2 is only aschematic flowchart, and the method for obtaining the V2XP may furtherinclude more detailed steps. Those skilled in the art can perform themethod for obtaining the V2XP according to the embodiments of thepresent disclosure in combination with FIG. 2 and the related art.

The above description has explained an example of the method forobtaining the V2XP provided by the present disclosure in detail. It canbe understood that, in order to perform the above functions, anapparatus for obtaining V2XP includes a hardware structure and/or asoftware module for performing respective functions. It is conceivablefor those skilled in the art that, in combination with units andalgorithm steps of examples described in the embodiments disclosedherein, the embodiments of the present disclosure can be implemented ina form of hardware or a combination of hardware and computer software.Whether a certain function is implemented by hardware or by computersoftware driving the hardware depends on specific applications anddesign constraints of technical solutions. Professionals and technicianscan use different methods for different specific applications toimplement the described functions, but such implementation should not beconsidered to go beyond the scope of the present disclosure.

An embodiment of the present disclosure can divide the apparatus forobtaining the V2XP into functional units based on the above methodexamples. For example, each function can be divided into a functionalunit, or two or more functions can be integrated into one processingunit. The above integrated unit can be implemented either in the form ofhardware or in a form of a software functional unit. It is to be notedthat the division of units in the embodiments of the present disclosureis illustrative, and is merely a logical function division. Otherdivision methods may be adopted in actual implementations.

FIG. 3 is a schematic diagram illustrating a structure of an apparatusfor obtaining a V2XP according to an embodiment of the presentdisclosure. The apparatus 300 includes a transmitting unit 310 and areceiving unit 320. The transmitting unit 310 may perform a transmittingstep under control of a processing unit, and the receiving unit 320 mayperform a receiving step under the control of the processing unit.

The transmitting unit 310 is configured to transmit at least one offirst information and second information to a PCF. The first informationis used for requesting a configuration of a policy for V2X communicationover a PC5 interface. The second information is used for requesting aconfiguration of a policy for V2X communication over a Uu interface.

The receiving unit 320 is configured to receive at least one of thepolicy corresponding to the first information and the policycorresponding to the second information from the PCF.

In at least one embodiment, the first information is carried in a firstrequest message, and the second information is carried in a secondrequest message.

In at least one embodiment, the first information and the secondinformation are carried in one request message.

In at least one embodiment, the first information is a first bit in theone request message, and the second information is a second bit in theone request message.

In at least one embodiment, the at least one of the policy correspondingto the first information and the policy corresponding to the secondinformation includes at least one of the following parameters:expiration time of the policy for the V2X communication over the PC5interface; and expiration time of the policy for the V2X communicationover the Uu interface.

In at least one embodiment, the transmitting unit 310 is furtherconfigured to transmit a reply message to the PCF. The reply messageincludes a result of execution of the at least one of the policycorresponding to the first information and the policy corresponding tothe second information.

In at least one embodiment, when an error occurs in the execution of anyof the at least one of the policy corresponding to the first informationand the policy corresponding to the second information, the result ofthe execution includes an identity of the policy having the erroroccurring in the execution thereof and a service corresponding to thepolicy having the error occurring in the execution thereof.

In at least one embodiment, the at least one of the first informationand the second information is carried in a container that is transparentto an AMF.

FIG. 4 is a schematic diagram illustrating a structure of anotherapparatus for obtaining a V2XP according to an embodiment of the presentdisclosure. The apparatus 400 includes a transmitting unit 410 and areceiving unit 420. The transmitting unit 410 may perform a transmittingstep under control of a processing unit, and the receiving unit 420 mayperform a receiving step under the control of the processing unit.

The receiving unit 420 is configured to receive at least one of firstinformation and second information from a terminal device. The firstinformation is used for requesting a configuration of a policy for V2Xcommunication over a PC5 interface. The second information is used forrequesting a configuration of a policy for V2X communication over a Uuinterface.

The transmitting unit 420 is configured to transmit at least one of thepolicy corresponding to the first information and the policycorresponding to the second information to the terminal device.

In at least one embodiment, the first information is carried in a firstrequest message, and the second information is carried in a secondrequest message.

In at least one embodiment, the first information and the secondinformation are carried in one request message.

In at least one embodiment, the first information is a first bit in theone request message, and the second information is a second bit in theone request message.

In at least one embodiment, at least one of the policy corresponding tothe first information and the policy corresponding to the secondinformation includes at least one of the following parameters:expiration time of the policy for the V2X communication over the PC5interface; and expiration time of the policy for the V2X communicationover the Uu interface.

In at least one embodiment, the receiving unit 410 is further configuredto receive a reply message from the terminal device. The reply messageincludes a result of execution of the at least one of the policycorresponding to the first information and the policy corresponding tothe second information.

In at least one embodiment, when an error occurs in the execution of anyof the at least one of the policy corresponding to the first informationand the policy corresponding to the second information, the result ofthe execution includes an identity of the policy having the erroroccurring in the execution thereof and a service corresponding to thepolicy having the error occurring in the execution thereof.

In at least one embodiment, the at least one of the first informationand the second information is carried in a container that is transparentto an AMF.

FIG. 5 is a schematic diagram illustrating a structure of a device forobtaining a V2XP according to an embodiment of the present disclosure.In FIG. 5, a unit or a module represented by a dotted line indicatesthat the unit or the module is optional. The device 500 may beconfigured to perform the method described in the above methodembodiments. The device 500 may be a terminal device, a network device,or a chip.

The device 500 includes one or more processors 501. The one or moreprocessors 501 may support the device 500 to perform the methodaccording to the method embodiment corresponding to FIG. 2. Theprocessor 501 may be a general-purpose processor or a dedicatedprocessor. For example, the processor 501 may be a Central ProcessingUnit (CPU). The CPU may be configured to control the device 500, executea software program, and process data of the software program. The device500 may further include a communication unit 505 for implementing signalinput (receiving) and output (transmitting).

For example, the device 500 may be a chip. The communication unit 505may be an input and/or output circuit of the chip, or the communicationunit 505 may be a communication interface of the chip. The chip may beembodied as a component of the terminal device or the network device orother wireless communication devices.

For another example, the device 500 may be a terminal device. Thecommunication unit 505 may be a transceiver of the terminal device, orthe communication unit 505 may be a transceiver circuit of the terminaldevice.

For another example, the device 500 may be a network device. Thecommunication unit 505 may be a transceiver of the network device, orthe communication unit 505 may be a transceiver circuit of the networkdevice.

The device 500 may include one or more memories 502 having a program 504stored thereon. The program 504 may be executed by the processor 501 togenerate instructions 503, such that the processor 501 performs themethod described in the above method embodiments in accordance with theinstructions 503. In at least one embodiment, data may also be stored inthe memory 502. In at least one embodiment, the processor 501 may alsoread data stored in the memory 502. The data may be stored either at thesame storage address as the program 504, or at a storage addressdifferent from that of the program 504.

The processor 501 and the memory 502 may be arranged separately orintegrated together. For example, the processor 501 and the memory 502may be integrated on a System On Chip (SOC) of the terminal device.

The device 500 may further include an antenna 506. The communicationunit 505 may implement a transceiving function of the device 500 throughthe antenna 506.

For a specific manner and beneficial effects of performing the methodfor obtaining the V2XP by the processor 501, reference may be made torelated description in the method embodiments.

It should be understood that each step of the above method embodimentscan be implemented by hardware logic circuits or instructions in a formof software in the processor 501. The processor 501 can be a CPU, aDigital Signal Processor (DSP), an Application Specific IntegratedCircuit (ASIC), a Field Programmable Gate Array (FPGA) or anotherprogrammable logic device, such as a discrete gate, a transistor logicdevice, or a discrete hardware component.

An embodiment of the present disclosure further provides a computerprogram product. The computer program product, when being executed bythe processor 501, performs the method according to any methodembodiment of the present disclosure.

The computer program product such as the program 504 may be stored inthe memory 502. The program 504 is finally converted into an executableobject file that can be executed by the processor 501 through processingprocesses such as preprocessing, compilation, assembly, and linking.

An embodiment of the present disclosure further provides acomputer-readable storage medium having a computer program storedthereon. The computer program, when being executed by a computer,performs the method according to any method embodiment of the presentdisclosure. The computer program can be a high-level language program oran executable target program.

The computer-readable storage medium may be, for example, the memory502. The memory 502 may be a volatile memory or a non-volatile memory,or the memory 502 may include both a volatile memory and a non-volatilememory. The non-volatile memory can be a Read-Only Memory (ROM), aProgrammable ROM (PROM), an Erasable PROM (EPROM), an Electrically EPROM(EEPROM) or a flash memory. The volatile memory may be a Random AccessMemory (RAM), which is used as an external cache. By way of exemplaryrather than limiting description, many forms of RAM are available, suchas a Static RAM (SRAM), a Dynamic RAM (DRAM), a Synchronous DRAM(SDRAM), a Double Data Rate SDRAM (DDR SDRAM), an Enhanced SDRAM(ESDRAM), a Synchlink DRAM (SLDRAM), and a Direct Rambus RAM (DR RAM).

Those skilled in the art can clearly understand that, for convenienceand conciseness of the description, for the specific operation processesof the apparatus and devices described above and the resulting technicaleffects, reference can be made to the corresponding processes andtechnical effects in the foregoing method embodiments, and detailsthereof will be omitted here.

In several embodiments provided by the present disclosure, the system,apparatus and method disclosed can be implemented in any other ways. Forexample, some features of the method embodiments described above can beomitted or not executed. The apparatus embodiments described above canbe merely exemplary, for example, the divisions of the units are onlydivisions based on logical functions, and there may be other divisionsin actual implementations. For example, more than one unit or componentmay be combined or integrated into another system. In addition, couplingbetween the units or coupling between the components may be directcoupling or indirect coupling. The above coupling includes electrical,mechanical, or other forms of connection.

It should be understood that, in various embodiments of the presentdisclosure, the values of the sequence numbers of the above processes donot imply the order in which they are performed. The order in which eachprocess is performed should be determined by its function and internallogic. The implementation processes of the embodiments of the presentdisclosure are not limited to any specific order described above.

In addition, the terms “system” and “network” are often usedinterchangeably in the embodiments of the present disclosure. The term“and/or” as used herein only represents a relationship betweencorrelated objects, including three relationships. For example, “Aand/or B” may mean A only, B only, or both A and B. In addition, thesymbol “/” as used herein represents an “or” relationship between thecorrelated objects preceding and succeeding the symbol.

In summary, the above description merely illustrates the embodiments ofthe technical solutions of the present disclosure, and is not intendedto limit the scope of the present disclosure. Any modification,equivalent replacement, improvement, and the like made within the spiritand principle of the present disclosure shall be included in the scopeof the present disclosure.

What is claimed is:
 1. A method for obtaining a Vehicle to Everything(V2X) communication policy, comprising: transmitting, by a terminaldevice, at least one of first information and second information to aPolicy Control Function (PCF), wherein the first information is used forindicating whether a configuration of a policy for V2X over a PC5interface is requested, and the second information is used forindicating whether a configuration of a policy for V2X over a Uuinterface is requested; and receiving, by the terminal device from thePCF, at least one of the policy corresponding to the first informationand the policy corresponding to the second information.
 2. The methodaccording to claim 1, wherein the first information and the secondinformation are carried in one request message.
 3. The method accordingto claim 2, wherein the first information is a first bit in the onerequest message, and the second information is a second bit in the onerequest message.
 4. The method according to claim 1, wherein the policycorresponding to the first information comprises expiration time of thepolicy for the V2X over the PC5 interface, and the policy correspondingto the second information comprises expiration time of the policy forthe V2X over the Uu interface.
 5. The method according to claim 1,wherein at least one of the first information and the second informationis carried in a container that is transparent to an Access and MobilityManagement Function (AMF).
 6. A method for obtaining a Vehicle toEverything (V2X) communication policy, comprising: receiving, by aPolicy Control Function (PCF), at least one of first information andsecond information from a terminal device, wherein the first informationis used for indicating whether a configuration of a policy for V2X overa PC5 interface is requested, and the second information is used forindicating whether a configuration of a policy for V2X over a Uuinterface is requested; and transmitting, by the PCF to the terminaldevice, at least one of the policy corresponding to the firstinformation and the policy corresponding to the second information. 7.The method according to claim 6, wherein the first information and thesecond information are carried in one request message.
 8. The methodaccording to claim 7, wherein the first information is a first bit inthe one request message, and the second information is a second bit inthe one request message.
 9. The method according to claim 6, wherein thepolicy corresponding to the first information comprises expiration timeof the policy for the V2X over the PC5 interface, and the policycorresponding to the second information comprises expiration time of thepolicy for the V2X over the Uu interface.
 10. The method according toclaim 6, wherein the at least one of the first information and thesecond information is carried in a container that is transparent to anAccess and Mobility Management Function (AMF).
 11. A terminal device,comprising: a memory having a computer program stored thereon; and aprocessor configured to invoke and execute the computer program storedin the memory to: transmit at least one of first information and secondinformation to a Policy Control Function (PCF), wherein the firstinformation is used for indicating whether a configuration of a policyfor Vehicle to Everything (V2X) over a PC5 interface is requested, andthe second information is used for indicating whether a configuration ofa policy for V2X over a Uu interface is requested; and receive at leastone of the policy corresponding to the first information and the policycorresponding to the second information from the PCF.
 12. The terminaldevice according to claim 11, wherein the first information and thesecond information are carried in one request message.
 13. The terminaldevice according to claim 12, wherein the first information is a firstbit in the one request message, and the second information is a secondbit in the one request message.
 14. The terminal device according toclaim 11, wherein the policy corresponding to the first informationcomprises expiration time of the policy for the V2X over the PC5interface, and the policy corresponding to the second informationcomprises expiration time of the policy for the V2X over the Uuinterface.
 15. The terminal device according to claim 11, wherein the atleast one of the first information and the second information is carriedin a container that is transparent to an Access and Mobility ManagementFunction (AMF).
 16. A network device, comprising: a memory having acomputer program stored thereon; and a processor configured to invokeand execute the computer program stored in the memory to perform themethod according to claim 6, wherein the network device is a PolicyControl Function (PCF).
 17. The network device according to claim 16,wherein the first information and the second information are carried inone request message.
 18. The network device according to claim 17,wherein the first information is a first bit in the one request message,and the second information is a second bit in the one request message.19. The network device according to claim 16, wherein the policycorresponding to the first information comprises expiration time of thepolicy for the V2X over the PC5 interface, and the policy correspondingto the second information comprises expiration time of the policy forthe V2X over the Uu interface.
 20. The network device according to claim16, wherein the at least one of the first information and the secondinformation is carried in a container that is transparent to an Accessand Mobility Management Function (AMF).