Method for information transmission, terminal device and chip

ABSTRACT

A method for information transmission, a terminal device and a chip are provided. The method includes: a terminal device sends a first message to a network device, here, the first message includes a parameter for blind detection of a downlink control channel in a target resource region by the terminal device, and the parameter is configured to determine a maximum number of blind detections of the downlink control channel in the target resource region by the terminal device in a specified time.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of U.S. patent application Ser. No. 17/109,289,which is now U.S. Pat. No. 11,324,000, filed on Dec. 2, 2020, which is acontinuation of PCT Application No. PCT/CN2018/091333 filed on Jun. 14,2018. The disclosures of both applications are incorporated by referenceherein in their entity.

BACKGROUND

For meeting the pursuits of people for rate, latency, high-speedmobility and energy efficiency of services as well as diversity andcomplexity of services in the future, the 3rd Generation PartnershipProject (3GPP) as the international standards organization has begun toresearch and develop the 5th Generation (5G) mobile networks.

An Ultra-Reliable Low Latency Communication (URLLC) service isintroduced into a 5G New Radio (NR) system, and the service has thecharacteristic that ultra-reliable (for example, 99.999%) transmissionis implemented within an extremely low latency (for example, 1 ms). Forachieving this purpose, a relatively short Transmission Time Interval(TTI) is required to be used for data transmission, which means thatdownlink control signaling is required to be transmitted morefrequently.

In NR Release-15 (Rel-15), one Control Resource Set (CORESET) supportsthe maximum number 44 of blind detections. The CORESET supports threelengths in time, i.e., one Orthogonal Frequency Division Multiplexing(OFDM) symbol, two OFDM symbols and three OFDM symbols respectively. Thetime in which a terminal device performs blind detection for the CORESETis usually longer than the length of the CORESET but not exceed a lengthof one slot (14 OFDM symbols). When multiple CORESETs are configured fora terminal device in one slot, for avoiding increase of implementationcomplexity of the terminal device, at present, the terminal device islimited to still only support the maximum number 44 of blind detections.That is, the maximum number of blind detections for each of the multipleCORESETs is limited, which will apparently affect flexibility of thescheduling.

SUMMARY

The embodiments of the disclosure relate to the field of wirelesscommunication technologies and provide a method for informationtransmission, a terminal device and a chip.

In a first aspect, the embodiments of the disclosure provide a methodfor information transmission, which may include the following operation.

A terminal device sends a first message to a network device, here, thefirst message includes a parameter for blind detection of a downlinkcontrol channel in a target resource region by the terminal device, andthe parameter is configured to determine a maximum number of blinddetections of the downlink control channel in the target resource regionby the terminal device in a specified time.

In a second aspect, the embodiments of the disclosure provide a methodfor information transmission, which may include the following operation.

A network device receives a first message sent by a terminal device,here, the first message includes a parameter for blind detection of adownlink control channel in a target resource region by the terminaldevice, and the parameter is configured to determine a maximum number ofblind detections of the downlink control channel in the target resourceregion by the terminal device in a specified time.

In a third aspect, the embodiments of the disclosure provide a terminaldevice, which may include a processor, a transceiver and a memory.

The memory is configured to store computer program instructions that,when executed by the processor, cause the processor to send a firstmessage to a network device through the transceiver, here, the firstmessage includes a parameter for blind detection of a downlink controlchannel in a target resource region by the terminal device, and theparameter is configured to determine a maximum number of blinddetections of the downlink control channel in the target resource regionby the terminal device in a specified time.

In a fourth aspect, the embodiments of the disclosure provide a chip,which may include a processor, configured to call and run a computerprogram in a memory to enable a device installed with the chip toperform a method for information transmission, the method comprising:sending a first message to a network device, here, the first messageincludes a parameter for blind detection of a downlink control channelin a target resource region by the device, and the parameter isconfigured to determine a maximum number of blind detections of thedownlink control channel in the target resource region by the device ina specified time.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings described herein are adopted to provide a furtherunderstanding to the disclosure and form a part of the disclosure. Theschematic embodiments of the disclosure and descriptions thereof areadopted to explain the disclosure and not intended to form improperlimits to the disclosure. In the drawings:

FIG. 1 is an architecture diagram of a communication system according toan embodiment of the disclosure.

FIG. 2 is a first flowchart of a method for information transmissionaccording to an embodiment of the disclosure.

FIG. 3 is a second flowchart of a method for information transmissionaccording to an embodiment of the disclosure.

FIG. 4 is a first diagram of blind detection according to an embodimentof the disclosure.

FIG. 5 is a second diagram of blind detection according to an embodimentof the disclosure.

FIG. 6 is a first structure composition diagram of a device forinformation transmission according to an embodiment of the disclosure.

FIG. 7 is a second structure composition diagram of a device forinformation transmission according to an embodiment of the disclosure.

FIG. 8 is a structure diagram of a communication device according to anembodiment of the disclosure.

FIG. 9 is a structure diagram of a chip according to an embodiment ofthe disclosure.

FIG. 10 is a block diagram of a communication system according to anembodiment of the disclosure.

DETAILED DESCRIPTION

In NR Rel-16, a key point for enhancement of URLLC is to improve amonitoring capability for a Physical Downlink Control Channel (PDCCH),namely increasing the number of blind detections performed by a terminaldevice in one slot. How to configure the proper number of blinddetections for a terminal device to improve the scheduling flexibilityon the premise of ensuring that the terminal device can completedemodulation is a problem that can be solved in the embodiments of thedisclosure.

The technical solutions in the embodiments of the disclosure will bedescribed below in combination with the drawings in the embodiments ofthe disclosure. It is apparent that the described embodiments are notall embodiments but part of embodiments of the disclosure. All otherembodiments obtained by those of ordinary skill in the art based on theembodiments in the disclosure without creative work shall fall withinthe scope of protection of the disclosure.

The technical solutions of the embodiments of the disclosure may beapplied to various communication systems, for example, a Global Systemof Mobile communication (GSM) system, a Code Division Multiple Access(CDMA) system, a Wideband Code Division Multiple Access (WCDMA) system,a General Packet Radio Service (GPRS), a Long Term Evolution (LTE)system, an LTE Frequency Division Duplex (FDD) system, LTE Time DivisionDuplex (TDD) system, a Universal Mobile Telecommunication System (UMTS),a Worldwide Interoperability for Microwave Access (WiMAX) communicationsystem or a future 5G system.

Exemplarily, a communication system 100 to which the embodiments of thedisclosure are applied is illustrated in FIG. 1 . The communicationsystem 100 may include a network device 110, and the network device 110may be a device communicating with a terminal device 120 (or called acommunication terminal device or a terminal device). The network device110 may provide communication coverage for a specific geographicalregion and may communicate with a terminal device located in thecoverage. Optionally, the network device 110 may be a Base TransceiverStation (BTS) in the GSM system or the CDMA system, or may be a NodeB(NB) in the WCDMA system, or may be an Evolutional Node B (eNB oreNodeB) in the LTE system or a wireless controller in a Cloud RadioAccess Network (CRAN). Or the network device may be a mobile switchingcenter, a relay station, an access point, a vehicle device, a wearabledevice, a hub, a switch, a network bridge, a router, a network-sidedevice in a 5G network, a network device in a future evolved Public LandMobile Network (PLMN) or the like.

The communication system 100 further includes at least one terminaldevice 120 within the coverage of the network device 110. A “terminaldevice” used herein includes, but not limited to, a device arranged toreceive/send a communication signal through a wired line connection (forexample, Public Switched Telephone Network (PSTN), Digital SubscriberLine (DSL), digital cable or direct cable connections), and/or throughanother data connection/network, and/or through a wireless interface(for example, a cellular network, a Wireless Local Area Network (WLAN),a digital television network such as a Digital VideoBroadcasting-Handheld (DVB-H) network, a satellite network or anAmplitude Modulated (AM)-Frequency Modulated (FM) broadcasttransmitter), and/or through another communication terminal; and/or anInternet of Things (IoT) device. The terminal device arranged tocommunicate through a wireless interface may be called a “wirelesscommunication terminal device”, a “wireless terminal device” or a“mobile terminal device”. Examples of a mobile terminal device include,but not limited to, a satellite or cellular telephone, a PersonalCommunication System (PCS) terminal device capable of combining acellular radio telephone and data processing, faxing and datacommunication capabilities, a Personal Digital Assistant (PDA) capableof including a radio telephone, a pager, Internet/intranet access, a Webbrowser, a notepad, a calendar and/or a Global Positioning System (GPS)receiver, and a conventional laptop and/or palmtop receiver or anotherelectronic device including a radio telephone transceiver. The terminaldevice may be an access terminal device, User Equipment (UE), a userunit, a user station, a mobile station, a mobile radio station, a remotestation, a remote terminal device, a mobile device, a user terminaldevice, a terminal device, a wireless communication device, a user agentor a user device. The access terminal device may be a cell phone, acordless phone, a Session Initiation Protocol (SIP) phone, a WirelessLocal Loop (WLL) station, a PDA, a handheld device with a wirelesscommunication function, a computing device, another processing deviceconnected to a wireless modem, a vehicle device, a wearable device, aterminal device in the 5G network, a terminal device in the futureevolved PLMN or the like.

Optionally, Device to Device (D2D) communication may be performedbetween the terminal devices 120.

Optionally, the 5G system or the 5G network may also be called a NRsystem or a NR network.

One network device and two terminal devices are exemplarily illustratedin FIG. 1 . Optionally, the communication system 100 may includemultiple network devices and another number of terminal devices may beincluded in coverage of each network device. There are no limits madethereto in the embodiments of the disclosure.

Optionally, the communication system 100 may further include anothernetwork entity such as a network controller and a mobility managemententity. There are no limits made thereto in the embodiments of thedisclosure.

It is to be understood that a device with a communication function inthe network/system in the embodiments of the disclosure may be called acommunication device. For example, for the communication system 100illustrated in FIG. 1 , communication devices may include the networkdevice 110 and terminal device 120 with the communication function, andthe network device 110 and the terminal device 120 may be the specificdevices mentioned above and will not be elaborated herein. Thecommunication devices may further include other devices in thecommunication system 100, for example, other network entities such as anetwork controller and a mobility management entity. There are no limitsmade thereto in the embodiments of the disclosure.

It is to be understood that terms “system” and “network” in thedisclosure may usually be exchanged in the disclosure. In thedisclosure, term “and/or” is only an association relationship describingassociated objects and represents that three relationships may exist.For example, A and/or B may represent three conditions: i.e.,independent existence of A, existence of both A and B and independentexistence of B. In addition, character “I” in the disclosure usuallyrepresents that previous and next associated objects form an “or”relationship.

FIG. 2 is a first flowchart of a method for information transmissionaccording to an embodiment of the disclosure. As illustrated in FIG. 2 ,the method for information transmission includes the followingoperation.

In 201, a terminal device sends a first message to a network device,here, the first message includes a parameter for blind detection of adownlink control channel in a target resource region by the terminaldevice.

In the embodiment of the disclosure, the terminal device may be anydevice capable of communicating with the network device, such as amobile phone, a notebook computer, a desktop computer or a tabletcomputer. Furthermore, the terminal device supports a URLLC service.That is, the terminal device supporting the URLLC service reports theparameter to the network device.

In the embodiment of the disclosure, the network device may be a basestation, for example, a gNB in 5G.

In the embodiment of the disclosure, the target resource region is aCORESET; or, the target resource region includes at least oneconsecutive time-domain symbol in a time domain.

In the embodiment of the disclosure, the parameter for blind detectionof the downlink control channel in the target resource region by theterminal device may be implemented in the following manners.

A first manner: the parameter is configured to determine a first timelength, and the first time length is configured to determine a timerequired by the terminal device to perform blind detection of thedownlink control channel in the target resource region for N times, N≥1.

Herein, a value of N is predefined by a protocol, or is reported to thenetwork device by the terminal device, or is configured to the terminaldevice by the network device. For example, N=44.

In the embodiment of the disclosure, the parameter is configured todetermine the first time length, which may be implemented in thefollowing manners: 1) the parameter indicates a specific time length,for example, the parameter may be the first time length; 2) theparameter indicates a time level, different time levels correspond todifferent first time lengths, and a corresponding first time length maybe determined through a certain time level.

Herein, the first time length is an absolute time length; or, the firsttime length is an integral multiple of a time-domain symbol (forexample, OFDM symbol) length.

For example, if the parameter is X=4, here, X represents the first timelength, the first time length is four time-domain symbols. For anotherexample, if the parameter is L=1, here, L represents the time level, thefirst time length is a time length corresponding to the time level 1,and is hypothesized to be three symbols.

In an implementation mode, the first time length is configured todetermine the time required by the terminal device to perform blinddetection of the downlink control channel in the target resource regionfor N times, which means that: the first time length is configured todetermine a shortest time or a lower time limit required by the terminaldevice to perform blind detection of the downlink control channel in thetarget resource region for N times.

In the embodiment of the disclosure, a starting position of the timerequired by the terminal device to perform blind detection of thedownlink control channel in the target resource region for N times is apredefined time position in the target resource region. In animplementation mode, the predefined time position is a time-domainstarting position of the target resource region, or a starting positionof a second time-domain symbol in the target resource region, or anending position of a time-domain symbol where a DMRS is located in thetarget resource region. For example, the predefined time position is thetime-domain starting position of the target resource region, that is,the terminal device performs blind detection of the downlink controlchannel starting from the time-domain starting position of the targetresource region. For another example, the predefined time position isthe starting position of the second time-domain symbol in the targetresource region, that is, the terminal device performs blind detectionof the downlink control channel starting from the starting position ofthe second time-domain symbol in the target resource region. For anotherexample, the predefined time position is the ending position of thetime-domain symbol where the DMRS is located in the target resourceregion, that is, the terminal device performs blind detection of thedownlink control channel starting from the ending position of thetime-domain symbol where the DMRS is located in the target resourceregion.

In the embodiment of the disclosure, a length of the time required bythe terminal device to perform blind detection of the downlink controlchannel in the target resource region for N times may be determined inthe following two manners.

1) The length of the time required by the terminal device to performblind detection of the downlink control channel in the target resourceregion for N times is the first time length.

Herein, the first time length is a total time length for blinddetection.

2) The length of the time required by the terminal device to performblind detection of the downlink control channel in the target resourceregion for N times is a sum of a predefined time length of the targetresource region and the first time length, here, the predefined timelength is a length from the predefined time position to an endingposition of a last time-domain symbol in the target resource region. Forexample, the predefined time length is a length from the startingposition of the first time-domain symbol to the ending position of thelast time-domain symbol in the target resource region. For anotherexample, the predefined time length is a length from the startingposition of the second time-domain symbol to the ending position of thelast time-domain symbol in the target resource region. For anotherexample, the predefined time length is a length from the ending positionof the time-domain symbol where the DMRS is located to the endingposition of the last time-domain symbol in the target resource region.

Herein, the predefined time length of the target resource region isadded to the first time length to obtain a total time length for blinddetection.

In the embodiment of the disclosure, the target resource region supportsP transmission resource configurations, P≥2, and different transmissionresource configurations have different time-domain lengths and/ordifferent frequency-domain lengths. Here, when different transmissionresource configurations are adopted for the target resource region,different values of N are correspondingly adopted.

For example, the target resource region is a CORESET, a time length ofthe CORESET (i.e., a length of the CORESET in time) may be one OFDMsymbol, or may be two OFDM symbols or may be three OFDM symbols. Thesethree conditions correspond to three transmission resourceconfigurations respectively, and the three transmission resourceconfigurations correspond to different values of N respectively.

In the embodiment of the disclosure, the target resource region supportsP transmission resource configurations, P≥2, and different transmissionresource configurations have different time-domain lengths and/ordifferent frequency-domain lengths. Here, the parameter includes Q firsttime lengths, 1≤Q≤P, and each of the Q first time lengths corresponds toa different transmission resource configuration.

For example, the target resource region is a CORESET, a time length ofthe CORESET may be one OFDM symbol, or may be two OFDM symbols or may bethree OFDM symbols. These three conditions correspond to threetransmission resource configurations respectively, and the parameterincludes three first time lengths corresponding to the threetransmission resource configurations respectively.

A second manner: the parameter is configured to determine a maximumnumber of blind detections of the downlink control channel in the targetresource region by the terminal device in a specified time.

In the embodiment of the disclosure, the parameter is configured todetermine the maximum number of blind detections, which may beimplemented in the following manners: 1) the parameter indicates thespecific number of blind detections; 2) the parameter indicates a blinddetection level, different blind detection levels correspond todifferent numbers of blind detections, and a corresponding number ofblind detections may be determined through a certain blind detectionlevel.

In the embodiment of the disclosure, a starting position of thespecified time is a predefined time position in the target resourceregion. In an implementation mode, the predefined time position is atime-domain starting position of the target resource region, or astarting position of a second time-domain symbol in the target resourceregion, or an ending position of a time-domain symbol where a DMRS islocated in the target resource region. For example, the predefined timeposition is the time-domain starting position of the target resourceregion, that is, the terminal device performs blind detection of thedownlink control channel starting from the time-domain starting positionof the target resource region. For another example, the predefined timeposition is the starting position of the second time-domain symbol inthe target resource region, that is, the terminal device performs blinddetection of the downlink control channel starting from the startingposition of the second time-domain symbol in the target resource region.For another example, the predefined time position is the ending positionof the time-domain symbol where the DMRS is located in the targetresource region, that is, the terminal device performs blind detectionof the downlink control channel starting from the ending position of thetime-domain symbol where the DMRS is located in the target resourceregion.

In the embodiment of the disclosure, a time for blind detection of thedownlink control channel in the target resource region by the terminaldevice, i.e., the specified time, may be determined in the following twomanners.

1) A length of the specified time is a second time length.

Herein, the second time length is a total time length for blinddetection (i.e., the length of the specified time).

2) A length of the specified time is a sum of a predefined time lengthof the target resource region and a second time length, here, thepredefined time length is a length from the predefined time position toan ending position of a last time-domain symbol in the target resourceregion. For example, the predefined time length is the length from thestarting position of the first time-domain symbol to the ending positionof the last time-domain symbol in the target resource region. Foranother example, the predefined time length is the length from thestarting position of the second time-domain symbol to the endingposition of the last time-domain symbol in the target resource region.For another example, the predefined time length is the length from theending position of the time-domain symbol where the DMRS is located tothe ending position of the last time-domain symbol in the targetresource region.

Herein, the predefined time length of the target resource region isadded to the second time length to obtain a total time length for blinddetection.

Herein, the second time length is predefined by the protocol, or isreported to the network device by the terminal device, or is configuredto the terminal device by the network device.

Herein, the second time length is an absolute time length; or, thesecond time length is an integral multiple of a time-domain symbol (forexample, OFDM symbol) length.

In the embodiment of the disclosure, the target resource region supportsP transmission resource configurations, P≥2, and different transmissionresource configurations have different time-domain lengths and/ordifferent frequency-domain lengths. Here, when different transmissionresource configurations are adopted for the target resource region,different maximum numbers of blind detections are correspondinglyadopted.

For example, the target resource region is a CORESET, a time length ofthe CORESET may be one OFDM symbol, or may be two OFDM symbols or may bethree OFDM symbols, these three conditions correspond to threetransmission resource configurations respectively, and the threetransmission resource configurations correspond to different maximumnumbers of blind detections respectively.

In the embodiment of the disclosure, the target resource region supportsP transmission resource configurations, P≥2, and different transmissionresource configurations have different time-domain lengths and/ordifferent frequency-domain lengths. The parameter includes T values,1≤T≤P, and each of the T values corresponds to a different transmissionresource configuration.

For example, the target resource region is a CORESET, a time length ofthe CORESET may be one OFDM symbol, or may be two OFDM symbols or may bethree OFDM symbols, these three conditions correspond to threetransmission resource configurations respectively, the parameterincludes three values, configured to determine three maximum numbers ofblind detections respectively, and these three maximum numbers of blinddetections correspond to the three transmission resource configurationsrespectively.

In the embodiment of the disclosure, the terminal device reports, to thebase station, a specific demodulation capability for blind detection ofa PDCCH, and the base station can reasonably configure the CORESET,thereby improving the flexibility of data scheduling of the terminalsupporting URLLC.

FIG. 3 is a second flowchart of a method for information transmissionaccording to an embodiment of the disclosure. As illustrated in FIG. 3 ,the method for information transmission includes the followingoperation.

In 301, a network device receives a first message sent by a terminaldevice, here, the first message includes a parameter for blind detectionof a downlink control channel in a target resource region by theterminal device.

In the embodiment of the disclosure, the terminal device may be anydevice capable of communicating with the network device, such as amobile phone, a notebook computer, a desktop computer or a tabletcomputer. Furthermore, the terminal device supports a URLLC service.That is, the terminal device supporting the URLLC service reports theparameter to the network device.

In the embodiment of the disclosure, the network device may be a basestation, for example, a gNB in 5G.

In the embodiment of the disclosure, the target resource region is aCORESET; or, the target resource region includes at least oneconsecutive time-domain symbol in a time domain.

In the embodiment of the disclosure, the parameter for blind detectionof the downlink control channel in the target resource region by theterminal device may be implemented in the following manners.

A first manner: the parameter is configured to determine a first timelength, and the first time length is configured to determine a timerequired by the terminal device to perform blind detection of thedownlink control channel in the target resource region for N times, N≥1.

Herein, a value of N is predefined by a protocol, or is reported to thenetwork device by the terminal device, or is configured to the terminaldevice by the network device. For example, N=44.

In the embodiment of the disclosure, the parameter is configured todetermine the first time length, which may be implemented in thefollowing manners: 1) the parameter indicates a specific time length,for example, the parameter may be the first time length; 2) theparameter indicates a time level, different time levels correspond todifferent first time lengths, and a corresponding first time length maybe determined through a certain time level.

Herein, the first time length is an absolute time length; or, the firsttime length is an integral multiple of a time-domain symbol (forexample, OFDM symbol) length.

For example, if the parameter is X=4, here, X represents the first timelength, the first time length is four time-domain symbols. For anotherexample, if the parameter is L=1, here, L represents the time level, thefirst time length is a time length corresponding to the time level 1,and is hypothesized to be three symbols.

In an implementation mode, the first time length is configured todetermine the time required by the terminal device to perform blinddetection of the downlink control channel in the target resource regionfor N times, which means that: the first time length is configured todetermine a shortest time or a lower time limit required by the terminaldevice to perform blind detection of the downlink control channel in thetarget resource region for N times.

In the embodiment of the disclosure, a starting position of the timerequired by the terminal device to perform blind detection of thedownlink control channel in the target resource region for N times is apredefined time position in the target resource region. In animplementation mode, the predefined time position is a time-domainstarting position of the target resource region, or a starting positionof a second time-domain symbol in the target resource region, or anending position of a time-domain symbol where a DMRS is located in thetarget resource region. For example, the predefined time position is thetime-domain starting position of the target resource region, that is,the terminal device performs blind detection of the downlink controlchannel starting from the time-domain starting position of the targetresource region. For another example, the predefined time position isthe starting position of the second time-domain symbol in the targetresource region, that is, the terminal device performs blind detectionof the downlink control channel starting from the starting position ofthe second time-domain symbol in the target resource region. For anotherexample, the predefined time position is the ending position of thetime-domain symbol where the DMRS is located in the target resourceregion, that is, the terminal device performs blind detection of thedownlink control channel starting from the ending position of thetime-domain symbol where the DMRS is located in the target resourceregion.

In the embodiment of the disclosure, a length of the time required bythe terminal device to perform blind detection of the downlink controlchannel in the target resource region for N times may be determined inthe following two manners.

1) The length of the time required by the terminal device to performblind detection of the downlink control channel in the target resourceregion for N times is the first time length.

Herein, the first time length is a total time length for blinddetection, the first time length is greater than a time length of thetarget resource region.

2) The length of the time required by the terminal device to performblind detection of the downlink control channel in the target resourceregion for N times is a sum of a predefined time length of the targetresource region and the first time length, here, the predefined timelength is a length from the predefined time position to an endingposition of a last time-domain symbol in the target resource region. Forexample, the predefined time length is a length from the startingposition of the first time-domain symbol to the ending position of thelast time-domain symbol in the target resource region. For anotherexample, the predefined time length is a length from the startingposition of the second time-domain symbol to the ending position of thelast time-domain symbol in the target resource region. For anotherexample, the predefined time length is a length from the ending positionof the time-domain symbol where the DMRS is located to the endingposition of the last time-domain symbol in the target resource region.

Herein, the predefined time length of the target resource region isadded to the first time length to obtain a total time length for blinddetection.

In the embodiment of the disclosure, the target resource region supportsP transmission resource configurations, P≥2, and different transmissionresource configurations have different time-domain lengths and/ordifferent frequency-domain lengths. Here, when different transmissionresource configurations are adopted for the target resource region,different values of N are correspondingly adopted.

For example, the target resource region is a CORESET, a time length ofthe CORESET (i.e., a length of the CORESET in time) may be one OFDMsymbol, or may be two OFDM symbols or may be three OFDM symbols. Thesethree conditions correspond to three transmission resourceconfigurations respectively, and the three transmission resourceconfigurations correspond to different values of N respectively.

In the embodiment of the disclosure, the target resource region supportsP transmission resource configurations, P≥2, and different transmissionresource configurations have different time-domain lengths and/ordifferent frequency-domain lengths. Here, the parameter includes Q firsttime lengths, 1≤Q≤P, and each of the Q first time lengths corresponds toa different transmission resource configuration.

For example, the target resource region is a CORESET, a time length ofthe CORESET may be one OFDM symbol, or may be two OFDM symbols or may bethree OFDM symbols. These three conditions correspond to threetransmission resource configurations respectively, and the parameterincludes three first time lengths corresponding to the threetransmission resource configurations respectively.

A second manner: the parameter is configured to determine a maximumnumber of blind detections of the downlink control channel in the targetresource region by the terminal device in a specified time.

In the embodiment of the disclosure, the parameter is configured todetermine the maximum number of blind detections, which may beimplemented in the following manners: 1) the parameter indicates thespecific number of blind detections; 2) the parameter indicates a blinddetection level, different blind detection levels correspond todifferent numbers of blind detections, and a corresponding number ofblind detections may be determined through a certain blind detectionlevel.

In the embodiment of the disclosure, a starting position of thespecified time is a predefined time position in the target resourceregion. In an implementation mode, the predefined time position is atime-domain starting position of the target resource region, or astarting position of a second time-domain symbol in the target resourceregion, or an ending position of a time-domain symbol where a DMRS islocated in the target resource region. For example, the predefined timeposition is the time-domain starting position of the target resourceregion, that is, the terminal device performs blind detection of thedownlink control channel starting from the time-domain starting positionof the target resource region. For another example, the predefined timeposition is the starting position of the second time-domain symbol inthe target resource region, that is, the terminal device performs blinddetection of the downlink control channel starting from the startingposition of the second time-domain symbol in the target resource region.For another example, the predefined time position is the ending positionof the time-domain symbol where the DMRS is located in the targetresource region, that is, the terminal device performs blind detectionof the downlink control channel starting from the ending position of thetime-domain symbol where the DMRS is located in the target resourceregion.

In the embodiment of the disclosure, a time for blind detection of thedownlink control channel in the target resource region by the terminaldevice, i.e., the specified time, may be determined in the following twomanners.

1) A length of the specified time is a second time length.

Herein, the second time length is a total time length for blinddetection (i.e., the length of the specified time).

2) A length of the specified time is a sum of a predefined time lengthof the target resource region and a second time length, here, thepredefined time length is a length from the predefined time position toan ending position of a last time-domain symbol in the target resourceregion. For example, the predefined time length is the length from thestarting position of the first time-domain symbol to the ending positionof the last time-domain symbol in the target resource region. Foranother example, the predefined time length is the length from thestarting position of the second time-domain symbol to the endingposition of the last time-domain symbol in the target resource region.For another example, the predefined time length is the length from theending position of the time-domain symbol where the DMRS is located tothe ending position of the last time-domain symbol in the targetresource region.

Herein, the predefined time length of the target resource region isadded to the second time length to obtain a total time length for blinddetection.

Herein, the second time length is predefined by the protocol, or isreported to the network device by the terminal device, or is configuredto the terminal device by the network device.

Herein, the second time length is an absolute time length; or, thesecond time length is an integral multiple of a time-domain symbol (forexample, OFDM symbol) length.

In the embodiment of the disclosure, the target resource region supportsP transmission resource configurations, P≥2, and different transmissionresource configurations have different time-domain lengths and/ordifferent frequency-domain lengths. Here, when different transmissionresource configurations are adopted for the target resource region,different maximum numbers of blind detections are correspondinglyadopted.

For example, the target resource region is a CORESET, a time length ofthe CORESET may be one OFDM symbol, or may be two OFDM symbols or may bethree OFDM symbols, these three conditions correspond to threetransmission resource configurations respectively, and the threetransmission resource configurations correspond to different maximumnumbers of blind detections respectively.

In the embodiment of the disclosure, the target resource region supportsP transmission resource configurations, P≥2, and different transmissionresource configurations have different time-domain lengths and/ordifferent frequency-domain lengths. Here, the parameter includes Tvalues, 1≤T≤P, and each of the T values corresponds to a differenttransmission resource configuration.

For example, the target resource region is a CORESET, a time length ofthe CORESET may be one OFDM symbol, or may be two OFDM symbols or may bethree OFDM symbols, these three conditions correspond to threetransmission resource configurations respectively, the parameterincludes three values, configured to determine three maximum numbers ofblind detections respectively, and these three maximum numbers of blinddetections correspond to the three transmission resource configurationsrespectively.

In the technical solutions of the embodiments of the disclosure, theterminal device sends the first message to the network device, the firstmessage includes the parameter for blind detection of the downlinkcontrol channel in the target resource region by the terminal device andthe parameter represents a monitoring capability of the terminal devicefor the downlink control channel, so that the network device canconfigure, for the terminal device, a reasonable target resource regionand the proper number of blind detections according to the parameter, soas to improve the flexibility of data scheduling on the premise ofensuring that the terminal device can complete demodulation of thedownlink control channel.

The technical solutions of the embodiments of the disclosure willfurther be explained and described below in combination with specificapplication examples.

First Example

The target resource region is a CORESET, and a value of a length of theCORESET in the time domain is three OFDM symbols. The parameter in thefirst message sent to the network device by the terminal device is X,and X represents the first time length. The first time length isconfigured to determine a time required by the terminal device toperform blind detection of a PDCCH in the CORESET for N times, i.e., atotal blind detection time, and a length of the total blind detectiontime is greater than the length of the CORESET. Herein, the length ofthe total blind detection time is equal to the first time length, andthe terminal device performs blind detection of the PDCCH starting froma time-domain starting position of the CORESET.

Referring to FIG. 4 , if N=44 and X=4 (OFDM symbol data), then at leastfour OFDM symbols are required by the terminal device to perform blinddetection of the PDCCH for 44 times for one CORESET.

Second Example

The target resource region is a CORESET, and a value of a length of theCORESET in the time domain is three OFDM symbols. The parameter in thefirst message sent to the network device by the terminal device is Y,and Y represents the first time length. The first time length isconfigured to determine a time required by the terminal device toperform blind detection of a PDCCH in the CORESET for N times, i.e., atotal blind detection time, and a length of the total blind detectiontime is greater than the length of the CORESET. Herein, the length ofthe total blind detection time is equal to a sum of the length of theCORESET and the first time length, and the terminal device performsblind detection of the PDCCH starting from a time-domain startingposition of the CORESET.

Referring to FIG. 5 , if N=44, Y=1 (OFDM symbol data) and the value ofthe length of the CORESET in the time domain is three OFDM symbols, thenat least four OFDM symbols are required by the terminal device toperform blind detection of the PDCCH for 44 times for one CORESET.

Third Example

The target resource region is a CORESET, and a value of a length of theCORESET in the time domain may be 1 or 2 or 3 OFDM symbols. Theparameter in the first message sent to the network device by theterminal device includes X1, X2 and X3 representing three first timelengths respectively, and the three first time lengths correspond tothree transmission resource configurations of the CORESET respectively(i.e., configurations where the value of the length of the CORESET inthe time domain is 1 or 2 or 3 OFDM symbols respectively). X1 isconfigured to determine a total blind detection time corresponding tothe CORESET of which the time-domain length is one OFDM symbol. X2 isconfigured to determine a total blind detection time corresponding tothe CORESET of which the time-domain length is two OFDM symbols. X3 isconfigured to determine a total blind detection time corresponding tothe CORESET of which the time-domain length is three OFDM symbols.

Herein, a length of the total blind detection time is greater than thelength of the CORESET, the length of the total blind detection time isequal to the first time length, and the terminal device performs blinddetection of a PDCCH starting from a time-domain starting position ofthe CORESET.

If N=44, X1=3, X2=4 and X3=4, there are the following conditions. If thetime-domain length of the CORESET is one OFDM symbol, then at leastthree OFDM symbols are required by the terminal device to perform blinddetection of the PDCCH for 44 times for one CORESET.

If the time-domain length of the CORESET is two OFDM symbols, then atleast four OFDM symbols are required by the terminal device to performblind detection of the PDCCH for 44 times for one CORESET.

If the time-domain length of the CORESET is three OFDM symbols, then atleast four OFDM symbols are required by the terminal device to performblind detection of the PDCCH for 44 times for one CORESET.

Fourth Example

The target resource region is a CORESET, and a value of a length of theCORESET in the time domain may be 1 or 2 or 3 OFDM symbols. Theparameter in the first message sent to the network device by theterminal device includes Y1, Y2 and Y3 representing three first timelengths respectively, and the three first time lengths correspond tothree transmission resource configurations of the CORESET respectively(i.e., configurations where the value of the length of the CORESET inthe time domain is 1 or 2 or 3 OFDM symbols respectively). Y1 isconfigured to determine a total blind detection time corresponding tothe CORESET of which the time-domain length is one OFDM symbol. Y2 isconfigured to determine a total blind detection time corresponding tothe CORESET of which the time-domain length is two OFDM symbols. Y3 isconfigured to determine a total blind detection time corresponding tothe CORESET of which the time-domain length is three OFDM symbols.

Herein, a length of the total blind detection time is greater than thelength of the CORESET, the length of the total blind detection time isequal to a sum of the length of the CORESET and the first time length,and the terminal device performs blind detection of a PDCCH startingfrom a time-domain starting position of the CORESET.

If N=44, Y1=2, Y2=2 and Y3=1, there are the following conditions.

If the time-domain length of the CORESET is one OFDM symbol, then atleast three OFDM symbols are required by the terminal device to performblind detection of the PDCCH for 44 times for one CORESET.

If the time-domain length of the CORESET is two OFDM symbols, then atleast four OFDM symbols are required by the terminal device to performblind detection of the PDCCH for 44 times for one CORESET.

If the time-domain length of the CORESET is three OFDM symbols, then atleast four OFDM symbols are required by the terminal device to performblind detection of the PDCCH for 44 times for one CORESET.

Fifth Example

The target resource region is a CORESET, and a value of a length of theCORESET in the time domain is three OFDM symbols. The parameter in thefirst message sent to the network device by the terminal device is S,and S represents the maximum number of blind detections of a PDCCH inthe CORESET by the terminal device in a predetermined time. Herein, alength of the predetermined time is the second time length, and terminaldevice performs blind detection of the PDCCH starting from a time-domainstarting position of the CORESET.

If the second time length is four OFDM symbols and S=44, then theterminal device performs, within four OFDM symbols, blind detection ofthe PDCCH for at most 44 times for one CORESET.

Sixth Example

The target resource region is a CORESET, and a value of a length of theCORESET in the time domain may be 1 or 2 or 3 OFDM symbols. Theparameter in the first message sent to the network device by theterminal device includes S1, S2 and S3 representing three maximumnumbers of blind detections respectively, and the three maximum numbersof blind detections correspond to three transmission resourceconfigurations of the CORESET respectively (i.e., configurations wherethe value of the length of the CORESET in the time domain is 1 or 2 or 3OFDM symbols respectively). S1 corresponds to the CORESET of which thetime-domain length is one OFDM symbol, S2 corresponds to the CORESET ofwhich the time-domain length is two OFDM symbols, and S3 corresponds tothe CORESET of which the time-domain length is three OFDM symbols.Herein, a length of a total blind detection time is the second timelength, and terminal device performs blind detection of a PDCCH startingfrom a time-domain starting position of the CORESET.

If the second time length is four OFDM symbols, S1=44, S2=44 and S3=32,there are the following conditions.

If the time-domain length of the CORESET is one OFDM symbol, then theterminal device performs, within four OFDM symbols, blind detection ofthe PDCCH for at most 44 times for one CORESET.

If the time-domain length of the CORESET is two OFDM symbols, then theterminal device performs, within four OFDM symbols, blind detection ofthe PDCCH for at most 44 times for one CORESET.

If the time-domain length of the CORESET is three OFDM symbols, then theterminal device performs, within four OFDM symbols, blind detection ofthe PDCCH for at most 32 times for one CORESET.

Seventh Example

The target resource region is a CORESET, and a value of a length of theCORESET in the time domain may be 1 or 2 or 3 OFDM symbols. Theparameter in the first message sent to the network device by theterminal device includes level 1, level 1 and level 2, and the threepieces of level information in the first message correspond to threetransmission resource configurations of the CORESET respectively (i.e.,configurations where the value of the length of the CORESET in the timedomain is 1 or 2 or 3 OFDM symbols respectively). Level 1 corresponds tothe CORESET of which the time-domain length is one OFDM symbol, level 1corresponds to the CORESET of which the time-domain length is two OFDMsymbols, and level 3 corresponds to the CORESET of which the time-domainlength is three OFDM symbols. Herein, a length of a total blinddetection time is the second time length, and terminal device performsblind detection of a PDCCH starting from a time-domain starting positionof the CORESET.

If the second time length is four OFDM symbols, the number of blinddetections corresponding to level 1 is 44 and the number of blinddetections corresponding to level 2 is 32, there are the followingconditions.

If the time-domain length of the CORESET is one OFDM symbol, then theterminal device performs, within four OFDM symbols, blind detection ofthe PDCCH for at most 44 times for one CORESET.

If the time-domain length of the CORESET is two OFDM symbols, then theterminal device performs, within four OFDM symbols, blind detection ofthe PDCCH for at most 44 times for one CORESET.

If the time-domain length of the CORESET is three OFDM symbols, then theterminal device performs, within four OFDM symbols, blind detection ofthe PDCCH for at most 32 times for one CORESET in four OFDM symbols.

Eighth Example

The target resource region is a CORESET, and a value of a length of theCORESET in the time domain may be 1 or 2 or 3 OFDM symbols. Theparameter in the first message sent to the network device by theterminal device includes level 1, level 2 and level 3, and the threepieces of level information in the first message correspond to threetransmission resource configurations of the CORESET respectively (i.e.,configurations where the value of the length of the CORESET in the timedomain is 1 or 2 or 3 OFDM symbols respectively). Level 1 corresponds tothe CORESET of which the time-domain length is one OFDM symbol, level 2corresponds to the CORESET of which the time-domain length is two OFDMsymbols, and level 3 corresponds to the CORESET of which the time-domainlength is three OFDM symbols. Herein, a length of a total blinddetection time is a sum of the length of the CORESET and the second timelength, and terminal device performs blind detection of a PDCCH startingfrom a time-domain starting position of the CORESET.

If the second time length is one OFDM symbol, the number of blinddetections corresponding to level 1 is 16, the number of blinddetections corresponding to level 2 is 32 and the number of blinddetections corresponding to level 3 is 44, there are the followingconditions.

If the time-domain length of the CORESET is one OFDM symbol, then theterminal device performs, within two OFDM symbols, blind detection ofthe PDCCH for at most 16 times for one CORESET.

If the time-domain length of the CORESET is two OFDM symbols, then theterminal device performs, within three OFDM symbols, blind detection ofthe PDCCH for at most 32 times for one CORESET.

If the time-domain length of the CORESET is three OFDM symbols, then theterminal device performs, within four OFDM symbols, blind detection ofthe PDCCH for at most 44 times for one CORESET.

FIG. 6 is a first structure composition diagram of a device forinformation transmission according to an embodiment of the disclosure.As illustrated in FIG. 6 , the device includes a sending unit 601.

The sending unit 601 is configured to send a first message to a networkdevice, here, the first message includes a parameter for blind detectionof a downlink control channel in a target resource region by a terminaldevice.

In an implementation mode, the parameter is configured to determine afirst time length, and the first time length is configured to determinea time required by the terminal device to perform blind detection of thedownlink control channel in the target resource region for N times, N≥1.

In an implementation mode, a starting position of the time required bythe terminal device to perform blind detection of the downlink controlchannel in the target resource region for N times is a predefined timeposition in the target resource region.

In an implementation mode, the predefined time position is a time-domainstarting position of the target resource region, or a starting positionof a second time-domain symbol in the target resource region, or anending position of a time-domain symbol where a DMRS is located in thetarget resource region.

In an implementation mode, a length of the time required by the terminaldevice to perform blind detection of the downlink control channel in thetarget resource region for N times is the first time length; or, alength of the time required by the terminal device to perform blinddetection of the downlink control channel in the target resource regionfor N times is a sum of a predefined time length of the target resourceregion and the first time length, the predefined time length is a lengthfrom the predefined time position to an ending position of a lasttime-domain symbol in the target resource region.

In an implementation mode, the target resource region supports Ptransmission resource configurations, P≥2, and different transmissionresource configurations have at least one of different time-domainlengths or different frequency-domain lengths. Here, when differenttransmission resource configurations are adopted for the target resourceregion, different values of N are correspondingly adopted.

In an implementation mode, the target resource region supports Ptransmission resource configurations, P≥2, and different transmissionresource configurations have at least one of different time-domainlengths or different frequency-domain lengths.

The parameter includes Q first time lengths, 1≤Q≤P, and the Q first timelengths correspond to different transmission resource configurationsrespectively.

In an implementation mode, a value of N is predefined by a protocol, orreported to the network device by the terminal device, or configured tothe terminal device by the network device.

In an implementation mode, the first time length is an absolute timelength; or, the first time length is an integral multiple of atime-domain symbol length.

In an implementation mode, the parameter is configured to determine amaximum number of blind detections of the downlink control channel inthe target resource region by the terminal device in a specified time.

In an implementation mode, a starting position of the specified time isa predefined time position in the target resource region.

In an implementation mode, the predefined time position is a time-domainstarting position of the target resource region, or a starting positionof a second time-domain symbol in the target resource region, or anending position of a time-domain symbol where a DMRS is located in thetarget resource region.

In an implementation mode, a length of the specified time is a secondtime length; or, a length of the specified time is a sum of a predefinedtime length of the target resource region and a second time length, thepredefined time length is a length from the predefined time position toan ending position of a last time-domain symbol in the target resourceregion.

In an implementation mode, the second time length is predefined by aprotocol, or reported to the network device by the terminal device, orconfigured to the terminal device by the network device.

In an implementation mode, the second time length is an absolute timelength; or, the second time length is an integral multiple of atime-domain symbol length.

In an implementation mode, the target resource region supports Ptransmission resource configurations, P≥2, and different transmissionresource configurations have at least one of different time-domainlengths or different frequency-domain lengths. Here, when differenttransmission resource configurations are adopted for the target resourceregion, different maximum numbers of blind detections arecorrespondingly adopted.

In an implementation mode, the target resource region supports Ptransmission resource configurations, P≥2, and different transmissionresource configurations have at least one of different time-domainlengths or different frequency-domain lengths. Here, the parameterincludes T values, 1≤T≤P, and the T values correspond to differenttransmission resource configurations respectively.

In an implementation mode, the target resource region is a CORESET; or,the target resource region includes at least one consecutive time-domainsymbol in a time domain.

In an implementation mode, the terminal device supports a URLLC service.

Those skilled in the art should know that functions realized by eachunit in the device for information transmission illustrated in FIG. 6may be understood with reference to related descriptions about theaforementioned method for information transmission. The functions ofeach unit in the device for information transmission illustrated in FIG.6 may be realized through a program being run on a processor, or may berealized through a specific logical circuit.

FIG. 7 is a second structure composition diagram of a device forinformation transmission according to an embodiment of the disclosure.As illustrated in FIG. 7 , the device includes a receiving unit 701.

The receiving unit 701 is configured to receive a first message sent bya terminal device, here, the first message includes a parameter forblind detection of a downlink control channel in a target resourceregion by the terminal device.

In an implementation mode, the parameter is configured to determine afirst time length, and the first time length is configured to determinea time required by the terminal device to perform blind detection of thedownlink control channel in the target resource region for N times, N≥1.

In an implementation mode, a starting position of the time required bythe terminal device to perform blind detection of the downlink controlchannel in the target resource region for N times is a predefined timeposition in the target resource region.

In an implementation mode, the predefined time position is a time-domainstarting position of the target resource region, or a starting positionof a second time-domain symbol in the target resource region, or anending position of a time-domain symbol where a DMRS is located in thetarget resource region.

In an implementation mode, a length of the time required by the terminaldevice to perform blind detection of the downlink control channel in thetarget resource region for N times is the first time length; or, alength of the time required by the terminal device to perform blinddetection of the downlink control channel in the target resource regionfor N times is a sum of a predefined time length of the target resourceregion and the first time length, the predefined time length is a lengthfrom the predefined time position to an ending position of a lasttime-domain symbol in the target resource region.

In an implementation mode, the target resource region supports Ptransmission resource configurations, P≥2, and different transmissionresource configurations have at least one of different time-domainlengths or different frequency-domain lengths. Here, when differenttransmission resource configurations are adopted for the target resourceregion, different values of N are correspondingly adopted.

In an implementation mode, the target resource region supports Ptransmission resource configurations, P≥2, and different transmissionresource configurations have at least one of different time-domainlengths or different frequency-domain lengths. Here, the parameterincludes Q first time lengths, 1≤Q≤P, and the Q first time lengthscorrespond to different transmission resource configurationsrespectively.

In an implementation mode, a value of N is predefined by a protocol, orreported to a network device by the terminal device, or configured tothe terminal device by a network device.

In an implementation mode, the first time length is an absolute timelength; or, the first time length is an integral multiple of atime-domain symbol length.

In an implementation mode, the parameter is configured to determine amaximum number of blind detections of the downlink control channel inthe target resource region by the terminal device in a specified time.

In an implementation mode, a starting position of the specified time isa predefined time position in the target resource region.

In an implementation mode, the predefined time position is a time-domainstarting position of the target resource region, or a starting positionof a second time-domain symbol in the target resource region, or anending position of a time-domain symbol where a DMRS is located in thetarget resource region.

In an implementation mode, a length of the specified time is a secondtime length; or, a length of the specified time is a sum of a predefinedtime length of the target resource region and a second time length, thepredefined time length is a length from the predefined time position toan ending position of a last time-domain symbol in the target resourceregion.

In an implementation mode, the second time length is predefined by aprotocol, or reported to a network device by the terminal device, orconfigured to the terminal device by a network device.

In an implementation mode, the second time length is an absolute timelength; or, the second time length is an integral multiple of atime-domain symbol length.

In an implementation mode, the target resource region supports Ptransmission resource configurations, P≥2, and different transmissionresource configurations have at least one of different time-domainlengths or different frequency-domain lengths. Here, when differenttransmission resource configurations are adopted for the target resourceregion, different maximum numbers of blind detections arecorrespondingly adopted.

In an implementation mode, the target resource region supports Ptransmission resource configurations, P≥2, and different transmissionresource configurations have at least one of different time-domainlengths or different frequency-domain lengths. Here, the parameterincludes T values, 1≤T≤P, and the T values correspond to differenttransmission resource configurations respectively.

In an implementation mode, the target resource region is a CORESET; or,the target resource region includes at least one consecutive time-domainsymbol in a time domain.

In an implementation mode, the terminal device supports a URLLC service.

Those skilled in the art should know that functions realized by eachunit in the device for information transmission illustrated in FIG. 7may be understood with reference to related descriptions about theaforementioned method for information transmission. The functions ofeach unit in the device for information transmission illustrated in FIG.7 may be realized through a program being run on a processor, or may berealized through a specific logical circuit.

FIG. 8 is a structure diagram of a communication device 600 according toan embodiment of the disclosure. The communication device may be aterminal device or may be a network device. The communication device 600illustrated in FIG. 8 includes a processor 610, and the processor 610may call and run a computer program in a memory to implement the methodsin the embodiments of the disclosure.

Optionally, as illustrated in FIG. 8 , the communication device 600 mayfurther include the memory 620. The processor 610 may call and run thecomputer program in the memory 620 to implement the methods in theembodiments of the disclosure.

The memory 620 may be a separate device independent of the processor 610or may be integrated into the processor 610.

Optionally, as illustrated in FIG. 8 , the communication device 600 mayfurther include a transceiver 630, and the processor 610 may control thetransceiver 630 to communicate with another device, specifically sendinginformation or data to the another device or receiving information ordata sent by the another device.

The transceiver 630 may include a transmitter and a receiver. Thetransceiver 630 may further include antennae, and the number of theantennae may be one or more.

Optionally, the communication device 600 may specifically be the networkdevice in the embodiments of the disclosure, and the communicationdevice 600 may implement corresponding flows implemented by the networkdevice in each method of the embodiments of the disclosure. Forsimplicity, elaborations are omitted herein.

Optionally, the communication device 600 may specifically be the mobileterminal/terminal device in the embodiments of the disclosure, and thecommunication device 600 may implement corresponding flows implementedby the mobile terminal/terminal device in each method of the embodimentsof the disclosure. For simplicity, elaborations are omitted herein.

FIG. 9 is a structure diagram of a chip according to an embodiment ofthe disclosure. The chip 700 illustrated in FIG. 9 includes a processor710, and the processor 710 may call and run a computer program in amemory to implement the methods in the embodiments of the disclosure.

Optionally, as illustrated in FIG. 9 , the chip 700 may further includethe memory 720. The processor 710 may call and run the computer programin the memory 720 to implement the methods in the embodiments of thedisclosure.

The memory 720 may be a separate device independent of the processor 710or may be integrated into the processor 710.

Optionally, the chip 700 may further include an input interface 730. Theprocessor 710 may control the input interface 730 to communicate withanother device or chip, specifically acquiring information or data sentby the another device or chip.

Optionally, the chip 700 may further include an output interface 740.The processor 710 may control the output interface 740 to communicatewith another device or chip, specifically outputting information or datato the another device or chip.

Optionally, the chip may be applied to the network device of theembodiments of the disclosure, and the chip may implement correspondingflows implemented by the network device in each method of theembodiments of the disclosure. For simplicity, elaborations are omittedherein.

Optionally, the chip may be applied to the mobile terminal/terminaldevice of the embodiments of the disclosure, and the chip may implementcorresponding flows implemented by the mobile terminal/terminal devicein each method of the embodiments of the disclosure. For simplicity,elaborations are omitted herein.

It is to be understood that the chip mentioned in the embodiment of thedisclosure may also be called a system-level chip, a system chip, a chipsystem or a system on chip, etc.

FIG. 10 is a second block diagram of a communication system 900according to an embodiment of the disclosure. As illustrated in FIG. 10, the communication system 900 includes a terminal device 910 and anetwork device 920.

The terminal device 910 may be configured to realize correspondingfunctions realized by the terminal device in the methods, and thenetwork device 920 may be configured to realize corresponding functionsrealized by the network device in the methods. For simplicity,elaborations are omitted herein.

It is to be understood that the processor in the embodiments of thedisclosure may be an integrated circuit chip and has a signal processingcapacity. In an implementation process, each operation of the methodembodiments may be completed by an integrated logical circuit ofhardware in the processor or an instruction in a software form. Theprocessor may be a universal processor, a Digital Signal Processor(DSP), an Application Specific Integrated Circuit (ASIC), a FieldProgrammable Gate Array (FPGA) or another programmable logical device,discrete gate or transistor logical device and discrete hardwarecomponent. Each method, operation and logical block diagram disclosed inthe embodiments of the disclosure may be implemented or executed. Theuniversal processor may be a microprocessor or the processor may be anyconventional processor or the like. The operations of the methodsdisclosed in combination with the embodiments of the disclosure may bedirectly embodied to be executed and completed by a hardware decodingprocessor or executed and completed by a combination of hardware andsoftware modules in the decoding processor. The software module may belocated in a mature storage medium in this field such as a Random AccessMemory (RAM), a flash memory, a Read-Only Memory (ROM), a ProgrammableROM (PROM) or Electrically Erasable PROM (EEPROM) and a register. Thestorage medium is located in a memory, and the processor readsinformation in the memory, and completes the operations of the methodsin combination with hardware.

It can be understood that the memory in the embodiments of thedisclosure may be a volatile memory or a nonvolatile memory, or mayinclude both the volatile and nonvolatile memories. The nonvolatilememory may be a ROM, a PROM, an Erasable PROM (EPROM), an EEPROM or aflash memory. The volatile memory may be a RAM, and is used as anexternal high-speed cache. It is exemplarily but unlimitedly describedthat RAMs in various forms may be adopted, such as a Static RAM (SRAM),a Dynamic RAM (DRAM), a Synchronous DRAM (SDRAM), a Double Data RateSDRAM (DDR SDRAM), an Enhanced SDRAM (ESDRAM), a Synchlink DRAM (SLDRAM)and a Direct Rambus RAM (DR RAM). It is to be noted that the memory of asystem and method described in the disclosure is intended to include,but not limited to, memories of these and any other proper types.

It is to be understood that the memory is exemplarily but unlimitedlydescribed. For example, the memory in the embodiments of the disclosuremay also be an SRAM, a DRAM, an SDRAM, a DDR SDRAM, an ESDRAM, anSLDRAM, a DR RAM or the like. That is, the memory in the embodiments ofthe disclosure is intended to include, but not limited to, memories ofthese and any other proper types.

The embodiments of the disclosure also provide a computer-readablestorage medium, which is configured to store a computer program.

Optionally, the computer-readable storage medium may be applied to thenetwork device in the embodiments of the disclosure, and the computerprogram enables a computer to execute corresponding flows implemented bythe network device in each method of the embodiments of the disclosure.For simplicity, elaborations are omitted herein.

Optionally, the computer-readable storage medium may be applied to themobile terminal/terminal device in the embodiments of the disclosure,and the computer program enables a computer to execute correspondingflows implemented by the mobile terminal/terminal device in each methodof the embodiments of the disclosure. For simplicity, elaborations areomitted herein.

The embodiments of the disclosure also provide a computer programproduct, which includes a computer program instruction.

Optionally, the computer program product may be applied to the networkdevice in the embodiments of the disclosure, and the computer programinstruction enables a computer to execute corresponding flowsimplemented by the network device in each method of the embodiments ofthe disclosure. For simplicity, elaborations are omitted herein.

Optionally, the computer program product may be applied to the mobileterminal/terminal device in the embodiments of the disclosure, and thecomputer program instruction enables the computer to executecorresponding flows implemented by the mobile terminal/terminal devicein each method of the embodiments of the disclosure. For simplicity,elaborations are omitted herein.

The embodiments of the disclosure also provide a computer program.

Optionally, the computer program may be applied to the network device inthe embodiments of the disclosure, and the computer program is run on acomputer to enable the computer to execute corresponding flowsimplemented by the network device in each method of the embodiments ofthe disclosure. For simplicity, elaborations are omitted herein.

Optionally, the computer program may be applied to the mobileterminal/terminal device in the embodiments of the disclosure, and thecomputer program is run on the computer to enable the computer toexecute corresponding flows implemented by the mobile terminal/terminaldevice in each method of the embodiments of the disclosure. Forsimplicity, elaborations are omitted herein.

Those of ordinary skill in the art may realize that the units andalgorithm operations of each example described in combination with theembodiments disclosed in the disclosure may be implemented by electronichardware or a combination of computer software and the electronichardware. Whether these functions are executed in a hardware or softwaremanner depends on specific applications and design constraints of thetechnical solutions. Professionals may realize the described functionsfor each specific application by use of different methods, but suchrealization shall fall within the scope of the disclosure.

Those skilled in the art may clearly learn about that the specificworking processes of the system, device and unit described above mayrefer to the corresponding processes in the method embodiments and willnot be elaborated herein for convenient and brief description.

In some embodiments provided by the disclosure, it is to be understoodthat the disclosed system, device and method may be implemented inanother manner. For example, the device embodiments described above areonly schematic, and for example, division of the units is only logicfunction division, and other division manners may be adopted duringpractical implementation. For example, multiple units or components maybe combined or integrated into another system, or some characteristicsmay be neglected or not executed. In addition, coupling or directcoupling or communication connection between each displayed or discussedcomponent may be indirect coupling or communication connection,implemented through some interfaces, of the device or the units, and maybe electrical or mechanical or adopt other forms.

The units described as separate parts may or may not be physicallyseparated, and parts displayed as units may or may not be physicalunits, namely may be located in the same place, or may be distributed tomultiple network units. Part or all of the units may be selected toachieve the purpose of the solutions of the embodiments according to apractical requirement.

In addition, each functional unit in each embodiment of the disclosuremay be integrated into a processing unit, or each unit may physicallyexist independently, or two or more than two units may be integratedinto a unit.

When being realized in form of software functional unit and sold or usedas an independent product, the function may also be stored in acomputer-readable storage medium. Based on such an understanding, thetechnical solutions of the disclosure substantially or parts makingcontributions to the conventional art or part of the technical solutionsmay be embodied in form of software product, and the computer softwareproduct is stored in a storage medium, including a plurality ofinstructions configured to enable a computer device (which may be apersonal computer, a server, a network device or the like) to executeall or part of the operations of the method in each embodiment of thedisclosure. The abovementioned storage medium includes: various mediacapable of storing program codes, such as a U disk, a mobile hard disk,a ROM, a RAM, a magnetic disk or an optical disk.

The above is only the specific implementation mode of the disclosure andnot intended to limit the scope of protection of the disclosure. Anyvariations or replacements apparent to those skilled in the art withinthe technical scope disclosed by the disclosure shall fall within thescope of protection of the disclosure. Therefore, the scope ofprotection of the disclosure shall be subject to the scope of protectionof the claims.

The invention claimed is:
 1. A method for information transmission,comprising: sending, by a terminal device, a first message, wherein thefirst message indicates a terminal device capability of PhysicalDownlink Control Channel (PDCCH) monitoring in a target resource regionwithin a first time length; wherein the terminal device capability ofthe PDCCH monitoring is a capability to perform PDCCH blind detectionfor N times in the at least two time-domain symbols within the firsttime length, N being a positive integer; and the target resource regionsupports P transmission resource configurations, P≥2, and differenttransmission resource configurations have different time-domain lengths,different transmission resource configurations corresponding todifferent values of N respectively.
 2. The method of claim 1, whereindifferent terminal device capabilities of the PDCCH monitoringcorrespond to different values of the N.
 3. The method of claim 1,wherein a value of the N is predefined by a protocol, or reported by theterminal device.
 4. The method of claim 1, wherein the target resourceregion comprises at least two consecutive time-domain symbols.
 5. Themethod of claim 1, wherein the first time length is equal to a length ofM time-domain symbols, M being equal to or greater than
 2. 6. The methodof claim 1, wherein the first time length is a time length starting froma starting position of the target resource region.
 7. The method ofclaim 1, wherein the target resource region comprises at least twotime-domain symbols comprises three time-domain symbols and the firsttime length is equal to a length of four time-domain symbols.
 8. Amethod for information transmission, comprising: receiving, by a networkdevice, a first message, wherein the first message indicates a terminaldevice capability of Physical Downlink Control Channel (PDCCH)monitoring in a target resource region within a first time length;wherein the terminal device capability of the PDCCH monitoring is acapability to perform PDCCH blind detection for N times in the at leasttwo time-domain symbols within the first time length, N being a positiveinteger; and the target resource region supports P transmission resourceconfigurations, P≥2, and different transmission resource configurationshave different time-domain lengths, different transmission resourceconfigurations corresponding to different values of N respectively. 9.The method of claim 8, wherein different terminal device capabilities ofthe PDCCH monitoring correspond to different values of the N.
 10. Themethod of claim 8, wherein the first time length is equal to a length ofM time-domain symbols, M being equal to or greater than
 2. 11. Themethod of claim 8, wherein the first time length is a time lengthstarting from a starting position of the at least two time-domainsymbols.
 12. The method of claim 8, wherein the target resource regioncomprises three time-domain symbols and the first time length is equalto a length of four time-domain symbols.
 13. A network device,comprising: a processor; a transceiver; and a memory configured to storecomputer program instructions that, when executed by the processor,cause the processor to receive a first message through the transceiver,wherein the first message indicates a terminal device capability ofPhysical Downlink Control Channel (PDCCH) monitoring in a target regionwithin a first time length; wherein the terminal device capability ofthe PDCCH monitoring is a capability to perform PDCCH blind detectionfor N times in the at least two time-domain symbols within the firsttime length, N being a positive integer; and the target resource regionsupports P transmission resource configurations, P≥2, and differenttransmission resource configurations have different time-domain lengths,different transmission resource configurations corresponding todifferent values of N respectively.
 14. The network device of claim 13,wherein different terminal device capabilities of the PDCCH monitoringcorrespond to different values of the N.
 15. The network device of claim13, wherein the first time length is equal to a length of M time-domainsymbols, M being equal to or greater than
 2. 16. The network device ofclaim 13, wherein the first time length is a time length starting from astarting position of the at least two time-domain symbols.
 17. Thenetwork device of claim 13, wherein the target region comprises threetime-domain symbols and the first time length is equal to a length offour time-domain symbols.