CN102469547A - Method, terminal and system for controlling terminal access - Google Patents
Method, terminal and system for controlling terminal access Download PDFInfo
- Publication number
- CN102469547A CN102469547A CN2010105328832A CN201010532883A CN102469547A CN 102469547 A CN102469547 A CN 102469547A CN 2010105328832 A CN2010105328832 A CN 2010105328832A CN 201010532883 A CN201010532883 A CN 201010532883A CN 102469547 A CN102469547 A CN 102469547A
- Authority
- CN
- China
- Prior art keywords
- access control
- terminal
- information
- insert
- object type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method, a terminal and a system for controlling terminal access. The method comprises the following steps that: the network side transmits the type of an access control target and access control information corresponding to the type of the control target to the terminal; and when the terminal is required to access, the access control information corresponding to the terminal is acquired according to the access control information corresponding to the type of the access control target transmitted by the network side. The access control information is used for indicating whether the terminal is allowed to access or indicating the terminal is accessed according to a ratio; and the terminal executes the access control according to the acquired access control information. By adopting the method, the terminal and the system, the problem that the communication quality is influenced because of the network congestion caused by that the present access control mechanism cannot effectively deal with or avoid the access of a great amount of machine-to-machine (M2M) terminals can be solved, the network can be effectively protected, and the communication quality can be guaranteed.
Description
Technical field
The present invention relates to wireless communication field, the control method, terminal and the system that insert in particular to a kind of terminal.
Background technology
In prior protocols, control for access behavior subscriber equipment, introduced access control mechanism in the agreement.This mechanism has been stipulated 16 access grades (AC, Access Class) altogether, and wherein, AC 0~9 is corresponding to ordinary call, and AC 10 is corresponding to urgent call, and AC 11~15 is corresponding to other special calling.For AC 0~9, network side is the corresponding access control factor (Barring Factor) for each AC has set, and for AC 10~15, and network side has been set the sign of a 1bit for each AC, and is broadcast to the terminal through system message.When inserting corresponding to the terminal of a certain AC, if the AC at this terminal belongs to 0~9, then the terminal can produce the random number between 0~1; If this random number is less than the pairing controlling elements of AC; Then this terminal can be inserted, otherwise this terminal is postponing to reattempt access after a period of time; If the AC at this terminal belongs to 11~15, then if the corresponding bit of AC is 0, then this terminal can be inserted, otherwise this terminal is postponing to reattempt access after a period of time; If the AC at this terminal is 10, then if the corresponding bit of AC is 0, then this terminal can be inserted, otherwise this terminal attempts inserting at once once more.This mechanism can effectively be tackled possibly occur in the existing network congested, prevents that the situation of overload from appearring in network.
But, along with the development of technology, the Internet of Things notion has appearred; The Internet of Things notion of narrow sense is meant communicating by letter between machine and the machine, and (Machine to Machine is called for short M2M, at 3GPP (3rd Generation Partnership Project; Third generation partner program) in the meeting; M2M again by project verification for " Machine Type Communication ", be called for short MTC), the Internet of Things notion of broad sense is except comprising communicating by letter between machine and the machine; Also comprise traditional interpersonal communication (Human to Human is called for short H2H).
After introducing the Internet of Things notion, communication service is expanded the every aspect of all trades and professions.For example Smart Home (Long-distance Control that comprises household appliances, remote monitoring of family's security protection or the like), intelligent transportation (monitoring of the magnitude of traffic flow, accident monitoring, vehicle monitoring etc.), intelligent metering (monitoring of industrial instrument and Long-distance Control, remote meter reading etc.) etc.Therefore, the quantity at M2M terminal will be considerably beyond the H2H terminal.Simultaneously, less different usually with the call arrival density at H2H terminal, the call arrival density at M2M terminal is very big usually.So after having introduced the Internet of Things notion, the main cause that causes network congestion no longer is the access at H2H terminal, but the access at a large amount of M2M terminals.
In addition, after introducing the Internet of Things notion, the type at terminal no longer has only the H2H terminal, but also comprises the M2M terminal, and existing access control mechanism can not effectively be distinguished these two kinds of terminals.
And; Different M2M uses possibly have the different service model; Data transfer model when business model is meant subscriber equipment and network side interaction data, the key element of expression business model comprises: data interaction periodicity, data interaction frequency, size of data, data interaction direction (refer to the upstream data be main or with the downlink data be lead or the up-downgoing flow close).With the intelligent electric meter is example; The Utilities Electric Co. that has requires every intelligent electric meter to report one time meter reading data in per 5 minutes; The Utilities Electric Co. that has requires every intelligent electric meter to report one time meter reading data in per 1 hour; The Utilities Electric Co. that has even only require that intelligent electric meter reports one time meter reading data every day; The flow of each meter reading data is less, and this has just constituted 3 kinds of different service models, and periodically small data reports, low-frequency degree periodicity small data reports, extremely low frequency degree periodicity small data reports can be called frequent respectively.Clearly these different service models are different for the pressure of network, and present mechanism can't be distinguished these business models.
In addition; Different service also possibly have different service quality (QoS; Quality ofService) requirement, the qos requirement relevant with access control comprises: the tolerance of access delay, the service interfacing that for example has goes into to postpone very responsive (business such as for example fire alarm, security protection, medical monitoring); The service interfacing that has is gone into delay-sensitive degree lower (for example checking meter), and present mechanism can't distinguish that these are different.
Different service or subscriber equipment also have different priority, and for example the priority with finance, security protection, business that medical treatment is relevant should be higher than common business, and present mechanism also can't be distinguished.
So after M2M communication extensive use,, can not effectively tackle or avoid network congestion, thereby can seriously influence network communication quality because existing access control mechanism can not carry out the access control operation neatly according to inserting object type.
Summary of the invention
Main purpose of the present invention is to provide control method, terminal and the system of a kind of terminal access, causes network congestion to solve above-mentioned because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert in a large number, thereby influences the problem of communication quality.
According to an aspect of the present invention; The control method that provides a kind of terminal to insert comprises: network side sends the access control object type to the terminal, and access control object type corresponding access control information; When the terminal need be inserted; According to the access control object type under self, and, obtain this terminal corresponding access control information according to the access control object type corresponding access control information that network side sends; Wherein, this access control information is used to indicate whether to allow terminal access or indicating terminal to insert in proportion; Access control is carried out according to the access control information of obtaining in this terminal.
According to a further aspect in the invention, a kind of terminal is provided, has comprised: receiver module, be used to receive the access control object type that network side sends, and access control object type corresponding access control information; The information acquisition module; When being used for to insert; According to the access control object type under self, and, obtain this terminal corresponding access control information according to the access control object type corresponding access control information that network side sends; Wherein, access control information is used to indicate whether to allow the terminal to insert or indicating terminal inserts in proportion; The access control module, the access control information that is used for obtaining according to the information acquisition module is carried out access control.
According to another aspect of the invention; The control system that provides a kind of terminal to insert; Comprise network equipment and terminal, this terminal is above-mentioned terminal, and network equipment comprises: sending module; Be used for sending the access control object type to this terminal, and access control object type corresponding access control information.
Through the present invention, adopt the terminal according to the access control object type under self, confirm access control information; And then definite access control measure; And more flexibly and accurately carry out access control, solved the network congestion that existing access control mechanism can not successfully manage or avoid a large amount of accesses in M2M terminal to cause, thereby influence the problem of communication quality; Protecting network has guaranteed the quality of communicating by letter effectively.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart according to the control method of the terminal access of the embodiment of the invention 1;
Fig. 2 is the corresponding relation sketch map according to the access control object type and the access control information of the embodiment of the invention 1;
Fig. 3 is the flow chart according to the control method of the terminal access of the embodiment of the invention 2;
Fig. 4 is the structured flowchart according to the terminal of the embodiment of the invention 3;
Fig. 5 is the structured flowchart according to the control system of the terminal access of the embodiment of the invention 3.
Embodiment
Hereinafter will and combine embodiment to specify the present invention with reference to accompanying drawing.Need to prove that under the situation of not conflicting, embodiment and the characteristic among the embodiment among the application can make up each other.
The embodiment of the invention to the object of access control (for example adopts; The terminal) effectively classifies; Make the terminal take corresponding access control measure, thereby carry out access control accurately more flexibly according to the classification under the access control object; Prevent that overload from appearring in network, effectively protecting network.Based on this, the control method, terminal and the system that provide a kind of terminal to insert.
Embodiment 1
Fig. 1 shows the flow chart of the control method that inserts according to the terminal of the embodiment of the invention, and this method may further comprise the steps:
Step S100, network side sends the access control object type to the terminal, and access control object type corresponding access control information.
Wherein, network side can send above-mentioned information through system message or beep-page message, that is, access control object type, and access control object type corresponding access control information, this moment, the terminal obtained above-mentioned information through monitoring system message or beep-page message.
Step S102; When the terminal need be inserted; According to the access control object type under self, and, obtain this terminal corresponding access control information according to the access control object type corresponding access control information that network side sends; Wherein, access control information is used to indicate whether to allow the terminal to insert or indicating terminal inserts in proportion.
Wherein, It is one of following that the access control object type comprises at least: the public land mobile network at terminal type information, terminal PRI information, end packet information, terminal (PLMN, Public Land Mobile Network) information, service priority information, QoS information or business model information.The particular content of these information of present embodiment is following:
1) terminal type information comprises: H2H terminal, M2M terminal or other type terminals;
2) terminal PRI information is and the priority at network convention or signatory terminal, and this terminal PRI information can be represented with the priority sequence number at terminal or the priority tag at terminal;
3) end packet information refers to the sign of end packet (group), and this end packet information can be represented with the grouping serial number at terminal or the group character at terminal;
4) the PLMN information at terminal refers to the information of the residing PLMN in terminal; The PLMN information at terminal can comprise: be in HPLMN (Home Public Land MobileNetwork, home public land mobile network network) the terminal, be not in the terminal of HPLMN, be not in HPLMN or PLMN of equal value the terminal, be not in the perhaps terminal of the PLMN in the PLMN tabulation among (U) SIM of HPLMN;
5) service priority information is meant in advance and appoints with network side, and the priority of the business of perhaps contracting comprises: priority sequence number, perhaps priority tag;
6) QoS of survice information comprises one or more combination of following requirement: the tolerance of access delay, the flow of assurance, the error rate of allowing etc.; This QoS of survice information can be classification other;
7) business model information is meant professional data communication model, comprises one or more combination of following characteristics: data interaction periodically (whether being that periodic data is mutual), data interaction frequency, data volume size, data interaction direction (refer to the upstream data be main be main with the downlink data or the up-downgoing flow close).
Terminal in this step is according to the access control object type under self; And access control object type corresponding access control information according to the network side transmission; Obtain this terminal corresponding access control information and can comprise following manner: 1) terminal monitoring is from the system message or the beep-page message of network side; Wherein, carry the access control object type in this system message or the beep-page message, and access control object type corresponding access control information; 2) the access control object type that self is affiliated is confirmed at the terminal; 3) terminal obtains above-mentioned access control object type corresponding access control information according to the information that receives from network side.
Wherein, the access control object type that network side sends, and access control object type corresponding access control information can for example, be put in these information in access control object type and the access control information mapping table with the form transmission of table.The access control object type as shown in Figure 2 and the corresponding relation sketch map of access control information; Wherein, Can be to concern one to one between each access control object type and the access control information; Promptly shown in Figure 2, as required, also can be with a plurality of access control object types corresponding to same access control information.
Step S104, access control is carried out according to the access control information of obtaining in the terminal.
Access control information in the embodiment of the invention can be to indicate flag bit or the designator that whether allows the terminal to insert, and also can be the access control factor that inserts in proportion of indication terminal and the combination of access control time delay.Particular content according to access control information is different, and the concrete realization of access control also can be different, and concrete mode is following:
Mode one: be used to indicate whether that the access control information that allows the terminal to insert is flag bit or designator; The terminal is carried out access control according to the access control information of obtaining and comprised: when this terminal confirmed to allow this terminal to insert according to access control information, this terminal initiated to insert at random; When this terminal confirmed not allow this terminal to insert according to access control information, this terminal can not initiate to insert at random.For example, when the terminal confirmed that flag bit or designator are first designated value (for example being 0), the terminal initiated to insert at random; When the terminal confirmed that flag bit or designator are second designated value (for example being 1), the terminal can not initiate to insert at random.
Under the situation of mode one; After the terminal can not initiate to insert at random; Said method comprises: terminal monitoring obtains next access control information from the system message or the beep-page message of network side from system message or beep-page message, carries out access control according to the next access control information of obtaining.
The terminal of present embodiment also can continue to monitor system message or the beep-page message from network side, perhaps monitors at set intervals.Mode two: the access control information that is used to indicate this terminal to insert in proportion is the access control factor and access control time delay; The terminal is carried out access control according to the access control information of obtaining and comprised: the terminal produces a random number, and the random number and the access control factor are compared; If this random number is less than the access control factor, the terminal initiates to insert at random; If this random number is more than or equal to the access control factor, the terminal can not initiate to insert at random.
For the second way, after the terminal can not initiate to insert at random, said method comprised: the terminal produces delay time according to the access control time delay, and after this delay time reached, access control was carried out at this terminal once more.The length of concrete delay time can be adjusted as required, also can realize with reference to existing formula in the correlation technique.The terminal of present embodiment is according to the access control object type under self; Take corresponding access control measure; More flexibly and accurately carry out access control, solved because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert the network congestion that causes in a large number, thereby influenced the problem of communication quality; Protecting network guarantees communication quality effectively.
Embodiment 2
The control method that present embodiment provides a kind of terminal to insert describes in LTE (Long-Term Evolution, Long Term Evolution) system, to be embodied as example.The access control operation need be carried out in the terminal before initiating to insert at random, as shown in Figure 3, and the main step of this method is following:
Step S300, network side sends the access control object type to the terminal, and access control object type corresponding access control information.
Wherein, network side can send above-mentioned information through system message or beep-page message, that is, access control object type, and access control object type corresponding access control information, this moment, the terminal obtained above-mentioned information through monitoring system message or beep-page message.Step S302; The terminal receives the access control object type from network side, and access control object type corresponding access control information, according to the access control object type under self; And access control object type corresponding access control information according to the network side transmission; Obtain this terminal corresponding access control information, wherein, access control information comprises the access control factor (ac-BarringFactor) and access control time delay (ac-BarringTime); Perhaps flag bit, designator, for example bit.
Step S304, the access control operation is carried out according to access control information in the terminal, concrete control as follows:
Access control information is flag bit or designator, for example bit: if this bit is " 0 ", represent that then the terminal can initiate to insert at random; If this bit is " 1 ", represent that then the terminal can not initiate to insert at random.
Access control information is the access control factor (ac-BarringFactor) and access control time delay (ac-BarringTime): the terminal produces a random number; And with this random number and the comparison of the access control factor; If random number is less than the access control factor; Represent that then the terminal can initiate to insert at random, otherwise, represent that then the terminal can not initiate to insert at random.
If the terminal can not initiate to insert at random, the terminal produces delay time according to the access control time delay, after this delay time reaches; Access control is carried out at this terminal once more; For example, the terminal produces a random number (rand), and according to formula: (0.7+0.6*rand) * ac-BarringTime produces time of delay; After this time of delay, carry out the access control operation again.
" type of access control object " in the present embodiment is meant a kind of or multiple combination in the following information: terminal type information, terminal PRI information, end packet (group) information, terminal PLMN information, service priority information, QoS of survice information or business model information.
Terminal type information comprises following one or more: H2H terminal, M2M terminal, other types terminal.
Terminal PRI information is meant in advance and appoints with network side that perhaps the priority at signatory terminal comprises: priority sequence number, perhaps priority tag.Existing H2H terminal can be used as a priority; Except that this priority, can also set up one or more priority, these priority of setting up can be higher or lower than existing H2H terminal PRI; With existing H2H terminal is basic priority, can classify as follows:
1) set up a priority, comprise following two kinds of forms:
The H2H terminal, low priority terminal (with respect to the H2H terminal);
Perhaps, high priority terminal (with respect to the H2H terminal), H2H terminal.
2) set up a plurality of priority, comprise following three kinds of forms:
The A:H2H terminal, 1 grade of terminal of low priority, 2 grades of terminals of low priority ..., low priority N level terminal (N is a positive integer);
B: the highest priority of 1 level terminal, 2 grades of terminals of high priority ..., high priority M level terminal (M is a positive integer), H2H terminal;
C: the highest priority of 1 level terminal, 2 grades of terminals of high priority ..., high priority M level terminal, the H2H terminal, 1 grade of terminal of low priority, 2 grades of terminals of low priority ..., low priority N level terminal (M, N are positive integer);
For example, network side and M2M terminal agreement, the priority at M2M terminal is lower than the H2H terminal, then one has two kinds of priority endpoint in the network: H2H terminal, M2M terminal.
The grouping information at terminal is meant the sign of end packet (Group), comprising: the sequence number of end packet (Group) or sign.For example; The grouping information at terminal can directly be used Group-RNTI (Radio Network Temporary Identifier; Radio Network Temporary Identifier), also can use a sequence number of making an appointment with network side, network side is set up the one-to-one relationship of this sequence number and grouping in advance.
Terminal PLMN information is meant the information of the residing PLMN in terminal; Comprise: be in the terminal of HPLMN, be not in the terminal of HPLMN, be not in HPLMN or PLMN of equal value the terminal, be not in the perhaps terminal of the PLMN in the PLMN tabulation among (U) SIM of HPLMN.
Service priority information is meant in advance and network side is appointed, perhaps the priority of signatory business comprises: priority sequence number, perhaps priority tag.In existing protocol, the type of service that access control comprises has Emergency (terminal initiate be urgent call), MO-Signalling (terminal is initiatively initiated the signaling class and called out) and MO-Data (the data class calling is initiatively initiated at the terminal).In addition, present embodiment can also be introduced new service priority (following " H2H is professional " refers to already contained type of service in the existing protocol), for example:
1) set up a priority, comprise following two kinds of forms:
H2H is professional, low priority traffice (professional with respect to H2H);
Perhaps, high-priority service (with respect to the H2H terminal), H2H is professional.
2) set up a plurality of priority, comprise following three kinds of forms:
A:H2H is professional, 1 grade of business of low priority, and 2 grades of business of low priority ..., low priority N level professional (N is a positive integer);
B: the highest priority of 1 level is professional, 2 grades of business of high priority ..., high priority M level professional (M is a positive integer), H2H is professional;
C: the highest priority of 1 level is professional, 2 grades of business of high priority ..., high priority M level is professional, and H2H is professional, 1 grade of business of low priority, 2 grades of business of low priority ..., low priority N level professional (M, N are positive integer);
For example, for ammeter class MTC (Machine Type Communication, Machine Type communication) business, it mainly acts on is to report the ammeter parameter, and service priority is lower; Type MTC is professional for the finance data transmission, and it mainly acts on is to transmit finance data constantly, and service priority wants high than the ammeter class is professional; Type MTC is professional for alarm, and its effect is to alarm, and service priority is higher.So the priority of these three types of business is arranged as follows from high to low: alarm type MTC professional (high-priority service), finance data transmission type MTC professional (H2H is professional), ammeter class MTC professional (low priority traffice).
QoS of survice information comprises one or more combination of following requirement: the tolerance of access delay, the flow of assurance, the error rate of allowing.For example: with the access delay is example, can be set to:
Two-stage: to inserting delay-sensitive, insensitive to access delay;
Multistage: the access delay susceptibility is high, in the access delay susceptibility, the access delay susceptibility is low;
Also can be the combination of multiple qos requirement, for example: access delay susceptibility height+low guaranteed flow+low error rate requirement; Perhaps, in the access delay susceptibility+high dependable flow+low error rate requirement; This QoS also can be divided into thinner progression.
The business model information of present embodiment is meant professional data communication model, comprises one or more following combination of features: data interaction periodically (whether being that periodic data is mutual), data interaction frequency, data volume size, data interaction direction (refer to the upstream data be main be main with the downlink data or the up-downgoing flow close).For example:
Include only a kind of information of characteristic: small data business model or frequent business model or periodic traffic model;
Comprise manifold information: periodically small data business model, low-frequency degree periodically small data report, the extremely low frequency degree periodically small data report, high frequency periodically small data interaction models, the big data down transmission model of middle frequency aperiodicity etc.
Concrete type of service and the corresponding relation between the business model are made an appointment by network side and subscriber equipment or are signatory.
Above-mentioned access control object type can have various ways, and promptly the type of access control object can be one or more of above type, or multiple merging.For example:, as shown in table 1 with the PLMN information combination of terminal PRI information (is example with two priority) with the terminal:
Table 1
The terminal of present embodiment is according to the access control object type under self; Take corresponding access control measure; More flexibly and accurately carry out access control, solved because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert the network congestion that causes in a large number, thereby influenced the problem of communication quality; Protecting network has guaranteed communication quality effectively.
Embodiment 3
Fig. 4 shows the structured flowchart according to the terminal of the embodiment of the invention, and this terminal comprises: receive mould 40, information acquisition module 42 and access control module 44, its function is following:
Wherein, It is one of following that the access control object type comprises at least: the public land mobile network (PLMN at terminal type information, terminal PRI information, end packet information, terminal; Public Land Mobile Network) information, service priority information, QoS (QoS, Quality of Service) information or business model information.The particular content of these information of present embodiment is following:
1) terminal type information comprises: H2H terminal, M2M terminal or other type terminals;
2) terminal PRI information is and the priority at network convention or signatory terminal, and this terminal PRI information can be represented with the priority sequence number at terminal or the priority tag at terminal;
3) end packet information refers to the sign of end packet (group), and this end packet information can be represented with the grouping serial number at terminal or the group character at terminal;
4) the PLMN information at terminal refers to the information of the residing PLMN in terminal; The PLMN information at terminal can comprise: be in HPLMN (Home Public Land MobileNetwork, home public land mobile network network) the terminal, be not in the terminal of HPLMN, be not in HPLMN or PLMN of equal value the terminal, be not in the perhaps terminal of the PLMN in the PLMN tabulation among (U) SIM of HPLMN;
5) service priority information is meant in advance and appoints with network side, and the priority of the business of perhaps contracting comprises: priority sequence number, perhaps priority tag;
6) QoS of survice information comprises one or more combination of following requirement: the tolerance of access delay, the flow of assurance, the error rate of allowing; This QoS of survice information can be classification other;
7) business model information is meant professional data communication model, comprises one or more combination of following characteristics: data interaction periodically (whether being that periodic data is mutual), data interaction frequency, data volume size, data interaction direction (refer to the upstream data be main be main with the downlink data or the up-downgoing flow close).
Access control information in the embodiment of the invention can be the indication terminal information that whether can initiate to insert, or the information that inserts in proportion of indicating terminal.According to the difference of access control information, the concrete realization of access control also can be different, and concrete mode is following:
Mode one, access control module 44 comprises: the first information is confirmed the unit, is used for confirming that access control information adopts flag bit or designator to indicate whether to allow the terminal to insert; The first access control unit, when being used for confirm allowing this terminal to insert according to access control information, this terminal initiates to insert at random; The second access control unit, when being used for confirming not allow this terminal to insert according to access control information, this terminal can not initiate to insert at random.
In the aforesaid way one; If the terminal can not initiate to insert at random; System message or beep-page message from network side will be monitored through above-mentioned monitoring unit in the terminal; Obtain next access control information from system message or beep-page message, carry out access control once more according to next access control information.
Mode two, access control module 44 comprises: second information is confirmed the unit, is used for confirming that access control information adopts the access control factor and access control time delay indicating terminal to insert in proportion; Comparing unit is used to produce a random number, and the random number and the access control factor are compared; The 3rd access control unit, if be used for the comparative result of comparing unit be random number less than the access control factor, this terminal initiates to insert at random; The 4th access control unit, if be used for the comparative result of comparing unit be random number more than or equal to the access control factor, this terminal can not initiate to insert at random.
Based on aforesaid way two, this terminal also comprises: the time-delay trigger module, when being used for this terminal and can not initiating to insert at random, produce delay time according to the access control time delay, and after delay time reaches, trigger access control module 44 and carry out access control.
Referring to Fig. 5, the control system that present embodiment also provides a kind of terminal to insert comprises network equipment 52 and terminal 54, and terminal 54 can realize that repeat no more, network equipment 52 comprises here according to above-mentioned terminal shown in Figure 4:
Sending module is used for sending the access control object type to terminal 54, and access control object type corresponding access control information.
The terminal of present embodiment is according to the access control object type under self; Take corresponding access control measure; More flexibly and accurately carry out access control, solved because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert the network congestion that causes in a large number, thereby influenced the problem of communication quality; Protecting network guarantees communication quality effectively.The terminal of above embodiment is through confirming the access control object type earlier; Confirm corresponding access control measure again; More flexibly and accurately carry out access control, solved because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert the network congestion that causes in a large number, thereby influenced the problem of communication quality; Protecting network guarantees communication quality effectively.
Obviously, it is apparent to those skilled in the art that above-mentioned each module of the present invention or each step can realize with the general calculation device; They can concentrate on the single calculation element; Perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element; Thereby; Can they be stored in the storage device and carry out, and in some cases, can carry out step shown or that describe with the order that is different from here by calculation element; Perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (13)
1. the control method that the terminal is inserted is characterized in that, comprising:
Network side sends the access control object type to the terminal, and said access control object type corresponding access control information;
When said terminal need be inserted; According to the access control object type under self; And access control object type corresponding access control information according to said network side transmission; Obtain said terminal corresponding access control information, wherein, said access control information is used to indicate whether to allow said terminal to insert or indicate said terminal to insert in proportion;
Access control is carried out according to the said access control information of obtaining in said terminal.
2. method according to claim 1 is characterized in that, it is one of following that said access control object type comprises at least:
Public land mobile network PLMN information, service priority information, quality QoS information or the business model information at terminal type information, terminal PRI information, end packet information, terminal;
Wherein, said terminal PRI information refers to the priority at said terminal and network side agreement terminal;
Said end packet information refers to the sign of end packet;
Said service priority information refers to the priority of the business of said terminal and network side agreement;
Said business model information refers to professional data communication model, comprises one of following at least: data interaction periodicity, data interaction frequency, big or small, the data interaction direction of data volume.
3. method according to claim 1 is characterized in that,
Said network side sends the access control object type to the terminal; And said access control object type corresponding access control information comprises: network side is to terminal transmitting system message or beep-page message; Wherein, Carry the access control object type in said system message or the beep-page message, and said access control object type corresponding access control information;
Said terminal is according to the access control object type under self; And access control object type corresponding access control information according to said network side transmission; Obtain before the corresponding access control information of said terminal; Said method comprises: said terminal monitoring obtains said access control object type from the said system message or the beep-page message of said network side from said system message or beep-page message, and said access control object type corresponding access control information.
4. method according to claim 1 is characterized in that, saidly is used to indicate whether that the access control information that allows the terminal to insert is flag bit or designator; Said terminal is carried out access control according to the said access control information of obtaining and is comprised:
When said terminal confirmed to allow said terminal to insert according to said access control information, said terminal initiated to insert at random;
When said terminal confirmed not allow said terminal to insert according to said access control information, said terminal can not initiate to insert at random.
5. method according to claim 4 is characterized in that, after said terminal can not initiate to insert at random, said method comprised:
Said terminal monitoring obtains next access control information from the system message or the beep-page message of network side from said system message or beep-page message, carries out access control according to the said next access control information of obtaining.
6. method according to claim 1 is characterized in that, the said access control information that is used to indicate said terminal to insert in proportion is the access control factor and access control time delay; Said terminal is carried out access control according to the said access control information of obtaining and is comprised:
Said terminal produces a random number, and the said random number and the said access control factor are compared;
If said random number is less than the said access control factor, said terminal initiates to insert at random;
If said random number is more than or equal to the said access control factor, said terminal can not initiate to insert at random.
7. method according to claim 6 is characterized in that, after said terminal can not initiate to insert at random, said method comprised:
Said terminal produces delay time according to said access control time delay, and after said delay time reached, said access control was carried out at said terminal once more.
8. a terminal is characterized in that, comprising:
Receiver module is used to receive the access control object type that network side sends, and said access control object type corresponding access control information;
The information acquisition module; When being used for to insert; According to the access control object type under self, and, obtain said terminal corresponding access control information according to the access control object type corresponding access control information that said network side sends; Wherein, said access control information is used to indicate whether to allow said terminal to insert or indicate said terminal to insert in proportion;
The access control module is used for carrying out access control according to the said access control information that said information acquisition module obtains.
9. terminal according to claim 8 is characterized in that,
Said receiver module comprises: monitoring unit; Be used to monitor system message or beep-page message from network side; Wherein, carry the access control object type that said network side sends in said system message or the beep-page message, and said access control object type corresponding access control information.
10. terminal according to claim 8 is characterized in that, said access control module comprises:
The first information is confirmed the unit, is used for confirming that said access control information adopts flag bit or designator to indicate whether to allow said terminal to insert;
The first access control unit, when being used for according to the access of the said terminal of the definite permission of said access control information, said terminal initiates to insert at random;
The second access control unit, when being used for confirming not allow said terminal to insert according to said access control information, said terminal can not initiate to insert at random.
11. terminal according to claim 8 is characterized in that, said access control module comprises:
Second information is confirmed the unit, is used for confirming that said access control information adopts the access control factor and access control time delay to indicate said terminal to insert in proportion;
Comparing unit is used to produce a random number, and the said random number and the said access control factor are compared;
The 3rd access control unit, if be used for the comparative result of said comparing unit be said random number less than the said access control factor, said terminal initiates to insert at random;
The 4th access control unit, if be used for the comparative result of said comparing unit be said random number more than or equal to the said access control factor, said terminal can not initiate to insert at random.
12. terminal according to claim 11 is characterized in that, said terminal also comprises:
The time-delay trigger module when being used for said terminal and can not initiating to insert at random, produces delay time according to said access control time delay, after said delay time reaches, triggers said access control module and carries out said access control.
13. the control system that the terminal is inserted comprises network equipment and terminal, it is characterized in that said terminal is each described terminal of claim 8-12, said network equipment comprises:
Sending module is used for sending the access control object type to said terminal, and said access control object type corresponding access control information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010532883.2A CN102469547B (en) | 2010-11-04 | 2010-11-04 | Method, terminal and system for controlling terminal access |
PCT/CN2011/078720 WO2012058970A1 (en) | 2010-11-04 | 2011-08-22 | Method, terminal, and system for controlling terminal access |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010532883.2A CN102469547B (en) | 2010-11-04 | 2010-11-04 | Method, terminal and system for controlling terminal access |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102469547A true CN102469547A (en) | 2012-05-23 |
CN102469547B CN102469547B (en) | 2014-07-02 |
Family
ID=46023989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010532883.2A Active CN102469547B (en) | 2010-11-04 | 2010-11-04 | Method, terminal and system for controlling terminal access |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102469547B (en) |
WO (1) | WO2012058970A1 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013167093A2 (en) * | 2013-01-14 | 2013-11-14 | 中兴通讯股份有限公司 | Congestion control method and device for mtc device access network |
WO2014043900A1 (en) * | 2012-09-21 | 2014-03-27 | 华为技术有限公司 | Method and device for transmitting public message |
WO2014183493A1 (en) * | 2013-11-12 | 2014-11-20 | 中兴通讯股份有限公司 | Method and apparatus for enabling m2m service and h2h service to coexist |
CN104737591A (en) * | 2013-08-21 | 2015-06-24 | 华为技术有限公司 | Random access method and related device |
CN104980951A (en) * | 2014-04-11 | 2015-10-14 | 中兴通讯股份有限公司 | Transmission method and device, and monitoring method and device of monitored information |
CN105959978A (en) * | 2016-07-12 | 2016-09-21 | 北京理工大学 | Massive M2M (Machine-to-Machine) communication packet access method based on LTE (Long Term Evolution) |
CN106034328A (en) * | 2016-05-11 | 2016-10-19 | 西安交通大学 | Access control method oriented to differentiated service coexistence scene in wireless medical treatment network |
CN106657364A (en) * | 2016-12-30 | 2017-05-10 | 南京八月智能科技有限公司 | Internet of things device and gateway device |
WO2017117959A1 (en) * | 2016-01-05 | 2017-07-13 | 中兴通讯股份有限公司 | Service processing method and apparatus |
WO2017198228A1 (en) * | 2016-05-19 | 2017-11-23 | 中兴通讯股份有限公司 | Method and apparatus for device access |
CN107566325A (en) * | 2016-07-01 | 2018-01-09 | 中兴通讯股份有限公司 | Access the method and device of network |
CN107820309A (en) * | 2017-12-14 | 2018-03-20 | 石家庄科林电气股份有限公司 | The wake-up strategy and time slot optimizing algorithm of low power loss communication equipment |
WO2018059397A1 (en) * | 2016-09-30 | 2018-04-05 | 华为技术有限公司 | Access control method, terminal apparatus and wireless access network apparatus |
WO2018127233A1 (en) * | 2017-01-06 | 2018-07-12 | 电信科学技术研究院 | Access control method and device |
WO2018232912A1 (en) * | 2017-06-23 | 2018-12-27 | 深圳市盛路物联通讯技术有限公司 | Management method and management system for data traffic of internet of things |
CN110572801A (en) * | 2019-08-29 | 2019-12-13 | 西安电子科技大学 | method for establishing mMTC (machine type communication) service flow model |
CN111740886A (en) * | 2020-06-12 | 2020-10-02 | 青岛恒星科技学院 | 5G Internet of things power acquisition terminal access control method |
CN113630840A (en) * | 2020-05-06 | 2021-11-09 | 大唐移动通信设备有限公司 | SNPN cell access method, device and storage medium |
WO2022016474A1 (en) * | 2020-07-23 | 2022-01-27 | 北京小米移动软件有限公司 | Access control method and apparatus, and storage medium |
CN115462165A (en) * | 2020-04-29 | 2022-12-09 | 华为技术有限公司 | Access method and device and communication system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101345988A (en) * | 2007-07-13 | 2009-01-14 | 大唐移动通信设备有限公司 | Resource allocation method and device of multi-carrier system |
EP1814270B1 (en) * | 2006-01-26 | 2009-03-04 | Samsung Electronics Co., Ltd. | Apparatus and method for connecting call in mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102045810B (en) * | 2009-10-09 | 2014-01-08 | 华为技术有限公司 | Method, device and system for accessing machine type communication terminal equipment to network |
-
2010
- 2010-11-04 CN CN201010532883.2A patent/CN102469547B/en active Active
-
2011
- 2011-08-22 WO PCT/CN2011/078720 patent/WO2012058970A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1814270B1 (en) * | 2006-01-26 | 2009-03-04 | Samsung Electronics Co., Ltd. | Apparatus and method for connecting call in mobile terminal |
CN101345988A (en) * | 2007-07-13 | 2009-01-14 | 大唐移动通信设备有限公司 | Resource allocation method and device of multi-carrier system |
Non-Patent Citations (2)
Title |
---|
《3GPP》 20100613 ZTE RAN Control with Access Priority , * |
CATT: "《3GPP》", 13 June 2010 * |
Cited By (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11349681B2 (en) | 2012-09-21 | 2022-05-31 | Huawei Technologies Co., Ltd. | Transmission method for common message and device |
US10116459B2 (en) | 2012-09-21 | 2018-10-30 | Huawei Technologies Co., Ltd. | Transmission method for common message and device |
WO2014043900A1 (en) * | 2012-09-21 | 2014-03-27 | 华为技术有限公司 | Method and device for transmitting public message |
US9729339B2 (en) | 2012-09-21 | 2017-08-08 | Huawei Technologies Co., Ltd. | Transmission method for common message and device |
US10581628B2 (en) | 2012-09-21 | 2020-03-03 | Huawei Technologies Co., Ltd. | Transmission method for common message and device |
WO2013167093A2 (en) * | 2013-01-14 | 2013-11-14 | 中兴通讯股份有限公司 | Congestion control method and device for mtc device access network |
CN103929776B (en) * | 2013-01-14 | 2018-03-23 | 中兴通讯股份有限公司 | A kind of jamming control method and device of MTC device access network |
CN103929776A (en) * | 2013-01-14 | 2014-07-16 | 中兴通讯股份有限公司 | Congestion control method and device for MTC equipment in network access |
WO2013167093A3 (en) * | 2013-01-14 | 2014-01-03 | 中兴通讯股份有限公司 | Congestion control method and device for mtc device access network |
CN104737591A (en) * | 2013-08-21 | 2015-06-24 | 华为技术有限公司 | Random access method and related device |
WO2014183493A1 (en) * | 2013-11-12 | 2014-11-20 | 中兴通讯股份有限公司 | Method and apparatus for enabling m2m service and h2h service to coexist |
US9705742B2 (en) | 2013-11-12 | 2017-07-11 | Zte Corporation | Method and apparatus for enabling M2M service and H2H service to coexist |
CN104980951A (en) * | 2014-04-11 | 2015-10-14 | 中兴通讯股份有限公司 | Transmission method and device, and monitoring method and device of monitored information |
WO2015154406A1 (en) * | 2014-04-11 | 2015-10-15 | 中兴通讯股份有限公司 | Monitoring information sending method and apparatus, and monitoring method and apparatus |
WO2017117959A1 (en) * | 2016-01-05 | 2017-07-13 | 中兴通讯股份有限公司 | Service processing method and apparatus |
CN106034328A (en) * | 2016-05-11 | 2016-10-19 | 西安交通大学 | Access control method oriented to differentiated service coexistence scene in wireless medical treatment network |
CN106034328B (en) * | 2016-05-11 | 2019-08-23 | 西安交通大学 | Connection control method towards differentiated service coexistence scenario in wireless medical networks |
WO2017198228A1 (en) * | 2016-05-19 | 2017-11-23 | 中兴通讯股份有限公司 | Method and apparatus for device access |
CN107566325A (en) * | 2016-07-01 | 2018-01-09 | 中兴通讯股份有限公司 | Access the method and device of network |
CN105959978A (en) * | 2016-07-12 | 2016-09-21 | 北京理工大学 | Massive M2M (Machine-to-Machine) communication packet access method based on LTE (Long Term Evolution) |
CN105959978B (en) * | 2016-07-12 | 2019-04-16 | 北京理工大学 | A kind of flood tide M2M communication grouping accessing method based on LTE |
WO2018059397A1 (en) * | 2016-09-30 | 2018-04-05 | 华为技术有限公司 | Access control method, terminal apparatus and wireless access network apparatus |
CN107889186A (en) * | 2016-09-30 | 2018-04-06 | 华为技术有限公司 | Connection control method, terminal device and wireless access network equipment |
US10952130B2 (en) | 2016-09-30 | 2021-03-16 | Huawei Technologies Co., Ltd. | Access control method, terminal device, and radio access network device |
CN107889186B (en) * | 2016-09-30 | 2021-01-12 | 华为技术有限公司 | Access control method, terminal equipment and wireless access network equipment |
CN106657364A (en) * | 2016-12-30 | 2017-05-10 | 南京八月智能科技有限公司 | Internet of things device and gateway device |
CN108282751A (en) * | 2017-01-06 | 2018-07-13 | 电信科学技术研究院 | A kind of connection control method and device |
US11057824B2 (en) | 2017-01-06 | 2021-07-06 | China Academy Of Telecommunications Technology | Access control method and device |
WO2018127233A1 (en) * | 2017-01-06 | 2018-07-12 | 电信科学技术研究院 | Access control method and device |
WO2018232912A1 (en) * | 2017-06-23 | 2018-12-27 | 深圳市盛路物联通讯技术有限公司 | Management method and management system for data traffic of internet of things |
CN107820309B (en) * | 2017-12-14 | 2020-09-15 | 石家庄科林电气股份有限公司 | Wake-up strategy and time slot optimization algorithm for low-power-consumption communication equipment |
CN107820309A (en) * | 2017-12-14 | 2018-03-20 | 石家庄科林电气股份有限公司 | The wake-up strategy and time slot optimizing algorithm of low power loss communication equipment |
CN110572801A (en) * | 2019-08-29 | 2019-12-13 | 西安电子科技大学 | method for establishing mMTC (machine type communication) service flow model |
CN110572801B (en) * | 2019-08-29 | 2021-06-25 | 西安电子科技大学 | Method for establishing mMTC (machine type communication) service flow model |
CN115462165A (en) * | 2020-04-29 | 2022-12-09 | 华为技术有限公司 | Access method and device and communication system |
CN113630840A (en) * | 2020-05-06 | 2021-11-09 | 大唐移动通信设备有限公司 | SNPN cell access method, device and storage medium |
CN113630840B (en) * | 2020-05-06 | 2023-04-18 | 大唐移动通信设备有限公司 | SNPN cell access method, device and storage medium |
CN111740886A (en) * | 2020-06-12 | 2020-10-02 | 青岛恒星科技学院 | 5G Internet of things power acquisition terminal access control method |
WO2022016474A1 (en) * | 2020-07-23 | 2022-01-27 | 北京小米移动软件有限公司 | Access control method and apparatus, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2012058970A1 (en) | 2012-05-10 |
CN102469547B (en) | 2014-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102469547B (en) | Method, terminal and system for controlling terminal access | |
CN102438292B (en) | Radio resource control method and system | |
CN102045810B (en) | Method, device and system for accessing machine type communication terminal equipment to network | |
CN102812755B (en) | Access control for machine-type communication devices | |
CN103053204B (en) | Enhancement mode access control method | |
CN102612112B (en) | A kind of terminal access method and device | |
CN102378389B (en) | A kind of cut-in method of Physical Random Access Channel and device | |
CN102469514A (en) | Terminal and method for accessing terminal to network | |
CN102238601A (en) | Method for monitoring and reporting MTC events | |
CN102404825B (en) | A kind of method and system by NAS signaling triggering terminal | |
CN102378306B (en) | A kind of method and system of broadcasting access control parameter | |
CN103155665A (en) | Implicit reject response | |
CN105580476A (en) | Communications system, infrastructure equipment, communication terminal and method | |
US20120178464A1 (en) | Methods and apparatus to support efficient and reliable machine to machine communications | |
CN103546871A (en) | M2M (machine to machine) terminal group management method | |
Kloiber et al. | Update delay: A new information-centric metric for a combined communication and application level reliability evaluation of cam based safety applications | |
CN102469551A (en) | Radio resource control (RRC) method and apparatus thereof | |
CN102438280B (en) | Method and system for controlling access time of terminal | |
KR20190108117A (en) | Connection method and terminal | |
EP3432645B1 (en) | A communication device for controlling transmissions over a communication network | |
CN113810907B (en) | Signaling control method, apparatus, terminal device and computer readable storage medium | |
WO2012097587A1 (en) | Terminal access method and device | |
US11102632B2 (en) | Access mechanism for single purpose operation | |
CN110224803A (en) | A kind of LoRa communication means realizing beacon and independently finding | |
CN114679768B (en) | Dynamic adjustment method and system for low-power consumption Bluetooth communication bandwidth and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20120523 Assignee: SHENZHEN ZTE MICROELECTRONICS TECHNOLOGY CO., LTD. Assignor: ZTE Corporation Contract record no.: 2015440020319 Denomination of invention: Method, terminal and system for controlling terminal access Granted publication date: 20140702 License type: Common License Record date: 20151123 |
|
LICC | Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model |