CN110035474A - Connection control method, user equipment, base station and the device with store function - Google Patents

Connection control method, user equipment, base station and the device with store function Download PDF

Info

Publication number
CN110035474A
CN110035474A CN201810033953.6A CN201810033953A CN110035474A CN 110035474 A CN110035474 A CN 110035474A CN 201810033953 A CN201810033953 A CN 201810033953A CN 110035474 A CN110035474 A CN 110035474A
Authority
CN
China
Prior art keywords
access
user equipment
trigger event
category
stratum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810033953.6A
Other languages
Chinese (zh)
Inventor
夏欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201810033953.6A priority Critical patent/CN110035474A/en
Priority to PCT/CN2018/084469 priority patent/WO2019136880A1/en
Publication of CN110035474A publication Critical patent/CN110035474A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of connection control method, user equipment, base stations and with the device of store function, this method comprises: user equipment is in connected state or inactive state, detect whether that trigger event, the trigger event are access layer trigger event or Non-Access Stratum trigger event;If so, the trigger event, which is then mapped as access category, the access layer or the Non-Access Stratum, carries out access control judgement to the access category;If the access control judgement passes through, the user equipment sends access request corresponding with the trigger event.By the above-mentioned means, method provided herein can provide the connection control method for being suitable for connected state or inactive state for 5G-NR system.

Description

Connection control method, user equipment, base station and the device with store function
Technical field
This application involves wireless communication technology field, more particularly to a kind of connection control method, user equipment, base station and Device with store function.
Background technique
In order to meet user for mobile data services increasing need, the 5th third-generation mobile communication technology is newly wireless 5G-NR system is come into being.In order to reduce signaling and reduce power consumption, in addition to Idle state (IDLE) and connected state in 5G-NR system (CONNECTED) outside, inactive state (INACTIVE) is also introduced.
Present inventor has found that user equipment (UE, alternatively referred to as terminal) is in access net in chronic study procedure Access control is needed to be implemented when network, for judge can initiating business request, avoid causing network side (including access net and core Net) overload.Access control in January, 2017 RAN2#NR meeting and in May, 2017 RAN2#98 meeting, to 5G-NR system System proposes some targets, e.g., defines the unified connection control method for being suitable for connected state or inactive state, but at present Detailed solution is not provided.
Summary of the invention
The application is mainly solving the technical problems that provide a kind of connection control method, user equipment, base station and having are deposited The device for storing up function can provide the connection control method for being suitable for connected state or inactive state for 5G-NR system.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of connection control method, use In the new wireless 5G-NR system of the 5th third-generation mobile communication technology, which comprises user equipment is in connected state or inactive State has detected whether that trigger event, the trigger event are access layer trigger event or Non-Access Stratum trigger event;If so, then The trigger event is mapped as access category, the access layer or the Non-Access Stratum carry out access control to the access category System judgement;If the access control judgement passes through, the user equipment sends access request corresponding with the trigger event.
In order to solve the above technical problems, another technical solution that the application uses is: a kind of connection control method is provided, The control method includes: that the access layer for issuing user equipment or Non-Access Stratum carry out access control judgement to access category and sentence Certainly parameter;It detects whether to receive the access request that the user equipment is sent, the access request is based on the decision parameter It is obtained with trigger event, the trigger event is that user equipment is in access layer detected when connected state or inactive state Trigger event or Non-Access Stratum trigger event;If receiving, the access request is handled.
In order to solve the above technical problems, another technical solution that the application uses is: a kind of user equipment is provided, it is described User equipment includes: processor, memory, telecommunication circuit, and the processor is respectively coupled to the memory, communication electricity Road, the user equipment are preset with the access control mode of connected state, inactive state, the processor, the memory, described Telecommunication circuit can be realized the step in above-mentioned connection control method.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of base station, the base station Including processor, memory, telecommunication circuit, the processor is respectively coupled to the memory, the telecommunication circuit, the processing Device, the memory, the telecommunication circuit can be realized the step in above-mentioned connection control method.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of with store function Device, be stored thereon with program data, described program data realize any of the above-described connection control method when being executed by processor In step.
The beneficial effect of the application is: being in contrast to the prior art, connection control method provided herein is suitable For the user equipment in connected state or inactive state, and it is based on existing access layer and Non-Access Stratum event, is flexibly easy to It realizes;
In addition, method provided herein applies also for the user equipment in Idle state, and then mentioned for 5G-NR system The unified access control program for being suitable for all status of user equipment is supplied;
In addition, mapping ruler between trigger event and access category provided herein can by trigger event type and User device parameters (for example, the service quality QoS traffic identifier QFI of data flow, five-tuple 5QI of data flow etc.) codetermine, So that operator can control specific application or the access of type of service.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.Wherein:
Fig. 1 is the flow diagram of one embodiment of the application connection control method;
Fig. 2 is the flow diagram of mono- embodiment of step S102 in Fig. 1;
Fig. 3 is the flow diagram of another embodiment of step S102 in Fig. 1;
Fig. 4 is the flow diagram of another embodiment of step S102 in Fig. 1;
Fig. 5 is the flow diagram of another embodiment of step S102 in Fig. 1;
Fig. 6 is the flow diagram of another embodiment of step S102 in Fig. 1
Fig. 7 is the flow diagram of another embodiment of step S102 in Fig. 1
Fig. 8 is the flow diagram of another embodiment of the application connection control method;
Fig. 9 is the flow diagram of one embodiment of the application connection control method;
Figure 10 is the structural schematic diagram of one embodiment of the application user equipment;
Figure 11 is the structural schematic diagram of one embodiment of the application base station;
Figure 12 is the structural schematic diagram for one embodiment of device that the application has store function.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, rather than whole embodiments.Based on this Embodiment in application, those of ordinary skill in the art are obtained every other under the premise of not making creative labor Embodiment shall fall in the protection scope of this application.
In 5G-NR network include user equipment and access net and core net positioned at network side, user equipment and access net Between interface be air interface, the protocol stack of air interface is divided into Non-Access Stratum NAS and access layer AS two parts.User equipment Access control is needed to be implemented when establishing communication traffic between network side, for judge can initiating business request, avoid causing The overload of network side (including access net and core net).
Referring to Fig. 1, Fig. 1 is the flow diagram of one embodiment of the application connection control method, this method is for the Newly wireless 5G-NR system, this method are the processes based on user equipment side to five third-generation mobile communication technologies, comprising the following steps:
S101: user equipment is in connected state or inactive state, has detected whether that trigger event, trigger event are access layer Trigger event or Non-Access Stratum trigger event;
Specifically, when user equipment is in connected state or inactive state, above-mentioned access layer trigger event includes but unlimited In: new wireless data or signaling bear are established in user equipment trial, user equipment is attempted to modify existing radio bearer attribute, are used Family equipment is attempted service quality QoS stream from a radio bearer is remapped to another radio bearer, user equipment is attempted Remap QoS flow carry from default radio bearer to specific wireless, user equipment attempt the existing wireless data of deletion or Signaling bear, user equipment are attempted to establish new wireless data carrying to transmit data, user equipment trial progress wireless data Bearer types conversion, user equipment attempt activation/deactivation packet replication and transmit (Packet Duplication) function;Work as user When equipment is in inactive state, above-mentioned access layer trigger event further include: user equipment is in unactivated state trial and is counted Unactivated state is according to transmission, user equipment to attempt to initiate notification area renewal process (Notification Area Update).When user equipment is in connected state or inactive state, above-mentioned Non-Access Stratum trigger event includes but is not limited to: asking It asks and starts voice, video or session initiation protocol SIP calling, send mobile caller short message service SMS, establish new agreement number According to unit PDU session, the existing protocol Data Unit PDU session of modification, release protocol Data Unit PDU session, be existing association View data cell PDU session re-establishes user plane, establishes new urgency protocol data cell PDU session.
S102: if so, trigger event is then mapped as access category, access layer or Non-Access Stratum connect access category Enter control judgement;
It specifically, in one embodiment, further include preparatory reception mapping ruler before step S102;Step S102 packet It includes: calling the mapping ruler, and then obtain the corresponding access category of trigger event.Mapping ruler by base station system broadcast message Or radio resource control RRC transmitting signaling downwards are to user equipment.
Access category is determined by trigger event type and/or user device parameters in mapping ruler, above-mentioned user equipment ginseng Number includes but is not limited to: the service quality QoS traffic identifier QFI of data flow, the five-tuple 5QI of data flow, user equipment access grade Other Access Class, user's set roaming state, the operating system ID (OS ID) of trigger data access, trigger data access Operating system application ID (OS AP ID).
In one embodiment, the trigger event of user equipment can be divided into multiple access categories (for example, 12,14, 16 etc.), an access category can correspond to one or more trigger event, and this is not limited by the present invention.If user Equipment needs initiating business request, and user equipment is firstly the need of checking whether accessed cell forbids access class belonging to oneself Not, if prohibited, user equipment is unable to initiating business request, can be with initiating business request if do not forbidden.
In an application scenarios, access category is determined by trigger event type in mapping ruler, as shown in table 1 below, no Same trigger event type corresponds to different access categories;Certainly, in other embodiments, certain two or more different touching Hair event type can also correspond to an identical access category, and the application is not construed as limiting this.
1 mapping ruler schematic table of table
Trigger event type Access category
New radio bearer is established in user equipment trial 1
User equipment is attempted to modify existing radio bearer attribute 2
User equipment is attempted to modify existing radio bearer attribute 3
…… ……
In another application scenarios, as shown in table 2 below, access category is by trigger event type and user in mapping ruler Device parameter codetermines, so that operator can control specific application or the access of type of service.Such as the following table 2 institute Show, although trigger event type is identical, the data service for establishing request is different, and access category can be identical, can also be different.
2 mapping ruler schematic table of table
Specifically, in another embodiment, when detecting trigger event, and trigger event is that access layer triggers thing Part then can carry out access control judgement to trigger event in access layer or Non-Access Stratum, specifically see following three kinds of modes.
In an application scenarios, incorporated by reference to Fig. 2, above-mentioned steps S102 is specifically included: A, access layer reflects trigger event It penetrates as the first access category;Specific mapping ruler can be found in above-described embodiment, and details are not described herein;B, access layer connects first Enter classification and is transmitted to Non-Access Stratum;C, Non-Access Stratum carries out access control judgement to the first access category, specifically, in a reality Apply in example, Non-Access Stratum using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC mechanism carries out access control judgement to the first access category, in other embodiments, the progress of other mechanism can also be used Access control judgement, the application are not construed as limiting this;When access control judgement, the system broadcast message or RRC signaling of base station are mentioned For decision parameter (for example, access scale factor ac-BarringFactor), access layer obtains the decision parameter, and passes through access Interlayer communication between layer and Non-Access Stratum passes to Non-Access Stratum;D, court verdict is fed back to access layer by Non-Access Stratum.
In another application scenarios, referring to Fig. 3, above-mentioned steps S102 is specifically included: A, access layer is by trigger event It is transmitted to Non-Access Stratum;B, trigger event is mapped as the first access category by Non-Access Stratum, and specific mapping ruler can be found in Embodiment is stated, details are not described herein;C, Non-Access Stratum carries out access control judgement to the first access category, specifically, at one In embodiment, Non-Access Stratum using include but is not limited to access class forbid ACB, for data communication using specific congestion Control ACDC mechanism carries out access control judgement to access category, in other embodiments, the progress of other mechanism can also be used Access control judgement, the application are not construed as limiting this;When access control judgement, the system broadcast message or RRC signaling of base station are mentioned For decision parameter (for example, access scale factor ac-BarringFactor), access layer obtains the decision parameter, and passes through access Interlayer communication between layer and Non-Access Stratum passes to Non-Access Stratum;D, court verdict is back to access layer by Non-Access Stratum.
In another application scenarios, referring to Fig. 4, above-mentioned steps S102 is specifically included: A, access layer is by trigger event It is mapped as the first access category, specific mapping ruler can be found in above-described embodiment, and details are not described herein;B, access layer is to first Access category carries out access control judgement, and then obtains court verdict.Specifically, in one embodiment, Non-Access Stratum can Using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC mechanism to access class Access control judgement is not carried out, in other embodiments, other mechanism can also be used and carry out access control judgement, the application couple This is not construed as limiting.When access control judgement, the system broadcast message or RRC signaling of base station provide decision parameter (for example, access ratio Example factor ac-BarringFactor), access layer obtains the decision parameter.
In another embodiment, when detecting trigger event, and trigger event is Non-Access Stratum trigger event, then Access control judgement can be carried out to trigger event in access layer or Non-Access Stratum, specifically see following three kinds of modes.
In an application scenarios, referring to Fig. 5, above-mentioned steps S102 includes: that A, Non-Access Stratum map trigger event For the second access category, specific mapping ruler can be found in above-described embodiment, and details are not described herein;B, Non-Access Stratum connects second Enter classification and is transmitted to access layer;C, access layer carries out access control judgement to the second access category;Specifically, in an embodiment party In formula, access layer using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC Mechanism carries out access control judgement to access category, in other embodiments, other mechanism can also be used and carry out access control Judgement, the application are not construed as limiting this;When access control judgement, the system broadcast message or RRC signaling of base station provide judgement ginseng Number (for example, access scale factor ac-BarringFactor), access layer obtains the decision parameter.D, access layer is by court verdict Feed back to Non-Access Stratum.
In another application scenarios, referring to Fig. 6, above-mentioned steps S102 includes: that A, Non-Access Stratum pass trigger event Transport to access layer;B, trigger event is mapped as the second access category by access layer, and specific mapping ruler can be found in above-mentioned implementation Example, details are not described herein;C, access layer carries out access control judgement to the second access category, specifically, in an embodiment In, Non-Access Stratum using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC Mechanism carries out access control judgement to access category, in other embodiments, other mechanism can also be used and carry out access control Judgement, the application are not construed as limiting this;When access control judgement, the system broadcast message or RRC signaling of base station provide judgement ginseng Number (for example, access scale factor ac-BarringFactor), access layer obtains the decision parameter.D, access layer returns to result To Non-Access Stratum.
In another application scenarios, referring to Fig. 7, above-mentioned steps S102 includes: that A, Non-Access Stratum reflect trigger event It penetrates as the second access category, specific mapping method can be found in above-described embodiment, and details are not described herein;B, Non-Access Stratum is to second Access category carries out access control judgement, and then obtains court verdict, specifically, in one embodiment, Non-Access Stratum can Using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC mechanism to access class Access control judgement is not carried out, in other embodiments, other mechanism can also be used and carry out access control judgement, the application couple This is not construed as limiting.When access control judgement, the system broadcast message or RRC signaling of base station provide that the second access category is corresponding to be sentenced Certainly parameter (for example, access scale factor ac-BarringFactor), access layer obtain the decision parameter, and by access layer and Interlayer communication between Non-Access Stratum passes to Non-Access Stratum.
S103: if access control judgement passes through, user equipment sends access request corresponding with trigger event;It is answered at one With in scene, does not pass through if being currently accessed control judgement, forbid timer to start, in the disable time, user equipment cannot Carry out the access attempts of same type.
User equipment is in connected state or inactive state in above-described embodiment, above-mentioned when user equipment is in Idle state Method in embodiment is still applicable in, connection control method process are as follows: A, has detected whether that trigger event, trigger event are access The first trigger event of layer, in an application scenarios, which includes that user equipment is attempted to be transferred to company from Idle state Connect state;B, the third is connect if so, above-mentioned first trigger event is then mapped as third access category, access layer or Non-Access Stratum Enter classification and carry out access control judgement, specific mapping ruler and control decision method can be found in above-described embodiment, herein no longer It repeats;If C, access control judgement passes through, user equipment sends access request corresponding with the trigger event.It can from foregoing description To find out, method provided herein apply also for it is stateful under user equipment, and then provide one for 5G-NR system A unified access control program suitable for all status of user equipment;
Referring to Fig. 8, Fig. 8 is the flow diagram of another embodiment of the application connection control method, this method is base In the process of user equipment side, this method comprises:
S201: user equipment is in connection or inactive state, has detected whether that trigger event, trigger event are access layer touching Hair event or Non-Access Stratum trigger event;Specifically, the step is identical as step S101 in above-described embodiment, no longer superfluous herein It states.
S202: if there is trigger event, judge whether access control function activates;Specifically, if network side access control Function is not activated, then user equipment can directly transmit access request corresponding with trigger event.
S203: if activation, trigger event is mapped as access category, access layer or Non-Access Stratum, access category is carried out Access control judgement;Specifically, the step is identical as step S102 in above-described embodiment, and details are not described herein.
S204: if access control judgement passes through, user equipment sends access request corresponding with trigger event;Specifically, The step is identical as step S103 in above-described embodiment, and details are not described herein.
Referring to Fig. 9, Fig. 9 is the flow diagram of another embodiment of the application connection control method, this method is based on Network side (for example, base station), comprising the following steps:
S301: the judgement that the access layer or Non-Access Stratum for issuing user equipment carry out access control judgement to access category is joined Number;
Specifically, network side, such as base station access access category in the access layer or Non-Access Stratum of user equipment When control judgement, decision parameter can be issued by system broadcast message or RRC signaling;In an application scenarios, access Layer or Non-Access Stratum utilize include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC Mechanism carries out access control judgement to access category, and decision parameter includes access scale factor ac-BarringFactor.
S302: it detects whether to receive the access request of user equipment transmission, access request is based on decision parameter and triggering Event and obtain, trigger event be user equipment be in access layer trigger event detected when connected state or inactive state or Non-Access Stratum trigger event;
Specifically, access layer trigger event, the type of Non-Access Stratum trigger event can be found in above-described embodiment, herein not It repeats again.
S303: if receiving, access request is handled.
In other embodiments, it may further comprise the step of: before above-mentioned steps S301 and mapping ruler be provided previously, and will reflect Rule is penetrated to issue by broadcast or RRC information;Specifically, mapping ruler can be found in above-described embodiment, and details are not described herein.
In the following, with a specific application scenarios, in conjunction with network side and user equipment, to access control provided herein Method processed is further elaborated.The connection control method process is as follows: A, mapping rule are provided previously in network side (for example, base station) Then, and by the mapping ruler by system broadcast message or RRC signaling it is issued to user equipment, user equipment receives the mapping Rule;B, when user equipment has detected access layer trigger event or Non-Access Stratum trigger event, user equipment calls mapping Rule, and then obtain access category corresponding with current trigger event;C, the access layer of user equipment or Non-Access Stratum utilize Access class forbids ACB or carries out access control to classification is currently accessed using specific congestion control ACDC mechanism for data communication System judgement, the decision parameter corresponding with classification is currently accessed when access control is adjudicated is (for example, access scale factor ac- BarringFactor connecing for user equipment) is issued to by system broadcast message or RRC signaling by network side (for example, base station) Enter layer;If D, user equipment judgement access control judgement passes through, user equipment sends access corresponding with current trigger event Request;Specifically, in one embodiment, equally distributed several RAND between one 0 to 1 are randomly generated in user equipment, if RAND passes through lower than access scale factor, then user equipment judgement access control judgement, otherwise user equipment judgement access control Judgement does not pass through;E, after network side receives the access request of user equipment, the access request is handled.
Referring to Fig. 10, Figure 10 is the structural schematic diagram of one embodiment of the application user equipment, which includes: Processor 1, memory 2, telecommunication circuit 3, processor 1 are respectively coupled to memory 2, telecommunication circuit 3, and user equipment is preset with connection State, the access control mode of inactive state, processor 1, memory 2, telecommunication circuit 3 can be realized above-mentioned access control at work Step in method processed.The detailed description of related content refers to above method part, and details are not described herein.
Wherein, telecommunication circuit 3 for realizing the connection communication and user equipment and network side between these components it Between communication.The access control mode that user equipment is under Idle state, inactive state and connected state is preset in memory 2 Program or instruction.
In presently filed embodiment, by the program or instruction for calling memory 2 to store, processor 1 and communication electricity Road 3 is specifically used for: telecommunication circuit 3 receives the mapping ruler of network side in advance and is transferred to memory 2;Processor 1 detects whether There is trigger event, trigger event is access layer trigger event or Non-Access Stratum trigger event;If so, processor 1 calls memory 2 In mapping ruler, trigger event is mapped as access category, and access control judgement is carried out to access category;If processor 1 The result of access control judgement is judged to pass through, and the telecommunication circuit 3 of user equipment sends access corresponding with the trigger event and asks It asks.
Please refer to Figure 11, Figure 11 is the structural schematic diagram of one embodiment of the application base station, the base station include: processor 4, Memory 5, telecommunication circuit 6, processor 4 are respectively coupled to memory 5, telecommunication circuit 6, processor 4, memory 5, telecommunication circuit 6 It can be realized the step in above-mentioned connection control method at work.The detailed description of related content refers to above method portion Point, details are not described herein.
Wherein, telecommunication circuit 6 for realizing between these components connection communication and base station and user equipment between Communication.In the application embodiment, by the program or instruction for calling memory 5 to store, processor 4 and telecommunication circuit 6 Be specifically used for: access category mapping ruler is provided previously in processor 4, and passes it to telecommunication circuit 6, and telecommunication circuit 6 will reflect Rule is penetrated to issue;When user equipment carries out access control judgement, telecommunication circuit 6 issues decision parameter;When telecommunication circuit 6 receives To user equipment send access request when, processor 4 handle the access request.
Figure 12 is please referred to, Figure 12 is the structural schematic diagram for one embodiment of device that the application has store function, the dress It sets 10 and is stored thereon with program data 100, the step in as above any one method is realized when which is executed by processor Suddenly.The detailed description of related content refers to above method part, and details are not described herein.
To sum up, being in contrast to the prior art, connection control method provided herein is suitable in company The user equipment of state or inactive state is connect, and is based on existing access layer and Non-Access Stratum event, is flexibly easily achieved;In addition, Method provided herein applies also for the user equipment in Idle state, and then provides one for 5G-NR system and be applicable in In the unified access control program of all status of user equipment;In addition, trigger event and access category provided herein Between mapping ruler can by trigger event type and user device parameters (for example, the service quality QoS traffic identifier of data flow, Five-tuple 5QI of data flow etc.) it codetermines, so that operator can control connecing for specific application or type of service Enter.
The above is only presently filed embodiments, are not intended to limit the scope of the patents of the application, all to utilize the application Equivalent structure or equivalent flow shift made by specification and accompanying drawing content is applied directly or indirectly in other relevant technologies Field similarly includes in the scope of patent protection of the application.

Claims (18)

1. a kind of connection control method is used for the 5th third-generation mobile communication technology newly wireless 5G-NR system, which is characterized in that described Method includes:
User equipment is in connected state or inactive state, has detected whether that trigger event, the trigger event are access layer triggering Event or Non-Access Stratum trigger event;
If so, the trigger event is then mapped as access category, the access layer or the Non-Access Stratum to the access class Access control judgement is not carried out;
If the access control judgement passes through, the user equipment sends access request corresponding with the trigger event.
2. connection control method according to claim 1, which is characterized in that
The access layer trigger event includes but is not limited to: new wireless data or signaling bear, use are established in user equipment trial Family equipment attempts the existing radio bearer attribute of modification, QoS flow is remapped to separately by user equipment trial from a radio bearer One radio bearer, user equipment attempt the remap QoS flow carried from default radio bearer to specific wireless, user equipment Attempt to delete existing wireless data or signaling bear, user equipment attempt to establish new wireless data carrying with transmit data, User equipment is attempted to carry out the conversion of wireless data bearer types, user equipment trial activation/deactivation packet replication transfer function, be used Family equipment be in unactivated state trial carry out data transmission, user equipment be in unactivated state attempt initiation notification area more New process.
3. connection control method according to claim 1, which is characterized in that
The Non-Access Stratum trigger event includes but is not limited to: request beginning voice, video or session initiation protocol SIP calling, It sends mobile caller short message service SMS, establish new protocol Data Unit PDU session, the existing protocol Data Unit of modification PDU session, release protocol Data Unit PDU session re-establish user plane, build for the PDU session of existing protocol data cell Stand new urgency protocol data cell PDU session.
4. connection control method according to claim 1, which is characterized in that if there is trigger event, the trigger event is The access layer trigger event, carrying out access control judgement to the trigger event in the access layer or Non-Access Stratum includes:
The trigger event is mapped as the first access category by the access layer, and the access layer passes first access category Transport to the Non-Access Stratum, the Non-Access Stratum carries out access control judgement to first access category, and by court verdict Feed back to the access layer;
Or, the trigger event is transmitted to the Non-Access Stratum by the access layer, the Non-Access Stratum is by the trigger event It is mapped as the first access category, the Non-Access Stratum carries out access control judgement to first access category, and judgement is tied Fruit feeds back to the access layer;
Or, the trigger event is mapped as the first access category by the access layer, the access layer is to the first access class Access control judgement is not carried out, and then obtains court verdict.
5. connection control method according to claim 1, which is characterized in that if there is trigger event, the trigger event is The Non-Access Stratum trigger event carries out access control judgement packet to the trigger event in the access layer or Non-Access Stratum It includes:
The trigger event is mapped as the second access category by the Non-Access Stratum, and the Non-Access Stratum accesses class for described second Supplementary biography transports to the access layer, and the access layer carries out access control judgement to second access category, and by court verdict Feed back to the Non-Access Stratum;
Or, the trigger event is transmitted to the access layer by the Non-Access Stratum, the access layer reflects the trigger event It penetrates as the second access category, the access layer carries out access control judgement to second access category, and result is fed back to The Non-Access Stratum;
Or, the trigger event is mapped as the second access category by the Non-Access Stratum, the Non-Access Stratum connects to described second Enter classification and carry out access control judgement, and then obtains court verdict.
6. connection control method according to claim 1, which is characterized in that the access layer or the Non-Access Stratum are to institute Stating access category and carrying out access control judgement includes: that the access layer or the Non-Access Stratum utilize including but not limited to access class Forbid ACB, access control judgement is carried out to the access category using specific congestion control ACDC mechanism for data communication.
7. connection control method according to claim 1, which is characterized in that
The connection control method further include: receive mapping ruler in advance, the mapping ruler by base station system broadcast message Or radio resource control RRC transmitting signaling downwards;
It is described that the trigger event is mapped as access category includes: to call the mapping ruler, and then obtain the triggering thing The corresponding access category of part.
8. connection control method according to claim 7, which is characterized in that access category described in the mapping ruler by The trigger event type and/or user device parameters determine that the user device parameters include but is not limited to: the clothes of data flow Being engaged in, quality Q oS traffic identifier QFI, the five-tuple 5QI of data flow, user equipment access rank Access Class, user equipment is overflow The operating system application ID that free state, the operating system ID of trigger data access, trigger data access.
9. connection control method according to claim 1, which is characterized in that described if so, then reflecting the trigger event It penetrates that the access category access control and adjudicate for access category, the access layer or Non-Access Stratum and includes:
Judge whether access control function activates, the trigger event is mapped as access category, the access layer if activation Or Non-Access Stratum carries out access control judgement to the access category.
10. a kind of connection control method is used for the 5th third-generation mobile communication technology newly wireless 5G-NR system, which is characterized in that described Method includes:
The access layer or Non-Access Stratum that issue user equipment carry out the decision parameter of access control judgement to access category;
It detects whether to receive the access request that the user equipment is sent, the access request is based on the decision parameter and touching Hair event and obtain, the trigger event is that user equipment is in detected access layer triggering when connected state or inactive state Event or Non-Access Stratum trigger event;
If receiving, the access request is handled.
11. connection control method according to claim 10, which is characterized in that
The access layer trigger event includes but is not limited to: new wireless data or signaling bear, use are established in user equipment trial Family equipment is attempted to modify existing radio bearer attribute, user equipment is attempted service quality QoS stream from a radio bearer again Be mapped to another radio bearer, user equipment attempt remap from default radio bearer carried to specific wireless QoS flow, User equipment attempts to delete existing wireless data or signaling bear, user equipment attempt to establish new wireless data carrying to pass Transmission of data, user equipment are attempted to carry out the conversion of wireless data bearer types, user equipment trial activation/deactivation packet replication transmission Function, user equipment be in unactivated state trial carry out data transmission, user equipment be in unactivated state attempt initiate lead to Know area update procedures.
12. connection control method according to claim 10, which is characterized in that
The Non-Access Stratum trigger event includes but is not limited to: request beginning voice, video or session initiation protocol SIP calling, It sends mobile caller short message service SMS, establish new protocol Data Unit PDU session, the existing protocol Data Unit of modification PDU session, release protocol Data Unit PDU session re-establish user plane, build for the PDU session of existing protocol data cell Stand new urgency protocol data cell PDU session.
13. connection control method according to claim 10, which is characterized in that the method also includes: it is provided previously and reflects Rule is penetrated, and the mapping ruler is passed through into system broadcast message or radio resource control RRC transmitting signaling downwards;
Access category described in the mapping ruler determines by the trigger event type and/or user device parameters, the use Family device parameter includes but is not limited to: five-tuple 5QI, Yong Hushe of the service quality QoS traffic identifier QFI of data flow, data flow Standby access rank Access Class, user's set roaming state, the operating system ID of trigger data access, trigger data access Operating system application ID.
14. connection control method according to claim 10, which is characterized in that
The access layer or Non-Access Stratum of the user equipment to access category carry out access control judgement include: the access layer or The Non-Access Stratum utilize include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC Mechanism carries out access control judgement to the access category;
The decision parameter includes but is not limited to access scale factor.
15. a kind of user equipment, which is characterized in that the user equipment includes: processor, memory, telecommunication circuit, the place Reason device is respectively coupled to the memory, the telecommunication circuit, and the user equipment is preset with the access control of connected state, inactive state Mode processed, the processor, the memory, the telecommunication circuit can be realized any one of claim 1-9 access control Step in method processed.
16. user equipment according to claim 15, which is characterized in that the user equipment is preset with Idle state and described The access control mode of connected state, inactive state;
The access control mode of the preset Idle state includes: that the user equipment is in Idle state, the processor detection Whether access layer first trigger event is had, and first trigger event includes that user equipment is attempted to be transferred to connected state from Idle state; If so, first trigger event is then mapped as third access category, and access control is carried out to the third access category Judgement;If the access control judgement passes through, the telecommunication circuit of the user equipment is sent and the access control trigger event Corresponding access request.
17. a kind of base station, which is characterized in that the base station includes: processor, memory, telecommunication circuit, the processor difference The memory, the telecommunication circuit are coupled, the processor, the memory, the telecommunication circuit can be realized right and want Seek the step in any one of 10-14 connection control method.
18. a kind of device with store function, is stored thereon with program data, which is characterized in that described program data are located Manage the step realized in any one of the claim 1-9 or 10-14 connection control method when device executes.
CN201810033953.6A 2018-01-11 2018-01-11 Connection control method, user equipment, base station and the device with store function Pending CN110035474A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810033953.6A CN110035474A (en) 2018-01-11 2018-01-11 Connection control method, user equipment, base station and the device with store function
PCT/CN2018/084469 WO2019136880A1 (en) 2018-01-11 2018-04-25 Access control method, user equipment, base station and storage apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810033953.6A CN110035474A (en) 2018-01-11 2018-01-11 Connection control method, user equipment, base station and the device with store function

Publications (1)

Publication Number Publication Date
CN110035474A true CN110035474A (en) 2019-07-19

Family

ID=67218171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810033953.6A Pending CN110035474A (en) 2018-01-11 2018-01-11 Connection control method, user equipment, base station and the device with store function

Country Status (2)

Country Link
CN (1) CN110035474A (en)
WO (1) WO2019136880A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021155859A1 (en) * 2020-02-07 2021-08-12 维沃移动通信有限公司 Access control method and device
WO2022000203A1 (en) * 2020-06-29 2022-01-06 北京小米移动软件有限公司 Access control method and apparatus, and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11595879B2 (en) 2021-02-19 2023-02-28 At&T Intellectual Property I, L.P. Fine grained access barring of aggressive cellular devices

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104244450A (en) * 2013-06-21 2014-12-24 中兴通讯股份有限公司 Rebuilding method used for concurrence of long term evolution service and cluster service, base station and user equipment
US20170367116A1 (en) * 2016-06-15 2017-12-21 Convida Wireless, Llc Grant-less Operations

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104427574B (en) * 2013-09-11 2018-08-21 华为技术有限公司 A kind of method and device of access control

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104244450A (en) * 2013-06-21 2014-12-24 中兴通讯股份有限公司 Rebuilding method used for concurrence of long term evolution service and cluster service, base station and user equipment
US20170367116A1 (en) * 2016-06-15 2017-12-21 Convida Wireless, Llc Grant-less Operations

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LG ELECTRONICS INC.: "Access category based access barring for RRC_IDLE and RRC_INACTIVE", 《3GPP TSG-RAN WG2 #99 R2-1708455》 *
QUALCOMM INCORPORATED: "Unified Access Control in different RRC Modes", 《3GPP TSG-RAN2 MEETING #98 R2-1705739》 *
SAMSUNG: "Way-forward for NR access control", 《3GPP TSG-RAN WG2 MEETING #99BIS R2-1711624》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021155859A1 (en) * 2020-02-07 2021-08-12 维沃移动通信有限公司 Access control method and device
WO2022000203A1 (en) * 2020-06-29 2022-01-06 北京小米移动软件有限公司 Access control method and apparatus, and storage medium

Also Published As

Publication number Publication date
WO2019136880A1 (en) 2019-07-18

Similar Documents

Publication Publication Date Title
KR101322501B1 (en) Prioritization of group communications at a wireless communication device
EP1745616B1 (en) Method and system for service integration in a multi-service communication system
JP7399318B2 (en) Condition indicating methods, equipment and systems
CN103607783B (en) CSFB (Circuit Switched Domain Fall Back) call establishment method and user equipment
EP1561293A1 (en) Apparatus and method for establishing feedback in a broadcast or multicast service
CN110035474A (en) Connection control method, user equipment, base station and the device with store function
WO2022017527A1 (en) Data transmission method, apparatus and system
CN114731535A (en) Method and apparatus for maximum number of protocol data unit sessions per network slice enforcement in a communication system
US20230164878A1 (en) Radio barrier processing method and network device
CN105684511B (en) It is transmitted from the data of mobile radio communication apparatus
EP2942990A1 (en) Method, system and equipment for realizing cluster group call session in long term evolution
EP3567927B1 (en) Access method, and terminal
WO2007027395A2 (en) Rapid push-to-talk call setup method and apparatus
US8055290B1 (en) Method to reduce push-to-talk call setup time
CN113133063A (en) Session release method, electronic device and storage medium
WO2013178091A1 (en) Short message shielding method and mobile terminal
WO2018133604A1 (en) Access control method, network element, user equipment, and computer storage medium
CN106454693A (en) D2D UE control method, D2D UE control device, base station, and D2D UE
CN112770107B (en) Modification method of load bearing and related device
US20200383161A1 (en) Access control method and device, and computer storage medium
CN107493160A (en) A kind of method, the method for work of base station and base station for transmitting information
CN104284368A (en) Multi-mode double-standby mobile terminal and network registration method thereof
KR20090099004A (en) Method for refusal of 1x page delivery in an hrpd system
RU2358386C2 (en) Asynchronous transmission of signals and data delivery in wireless communication system
CN109362105A (en) Method, communication system and the relevant apparatus of cluster communication terminal triggering TAU

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190719