CN102469547A - Method, terminal and system for controlling terminal access - Google Patents

Method, terminal and system for controlling terminal access Download PDF

Info

Publication number
CN102469547A
CN102469547A CN2010105328832A CN201010532883A CN102469547A CN 102469547 A CN102469547 A CN 102469547A CN 2010105328832 A CN2010105328832 A CN 2010105328832A CN 201010532883 A CN201010532883 A CN 201010532883A CN 102469547 A CN102469547 A CN 102469547A
Authority
CN
China
Prior art keywords
access control
terminal
information
insert
object type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105328832A
Other languages
Chinese (zh)
Other versions
CN102469547B (en
Inventor
戴谦
许英奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010532883.2A priority Critical patent/CN102469547B/en
Priority to PCT/CN2011/078720 priority patent/WO2012058970A1/en
Publication of CN102469547A publication Critical patent/CN102469547A/en
Application granted granted Critical
Publication of CN102469547B publication Critical patent/CN102469547B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method, a terminal and a system for controlling terminal access. The method comprises the following steps that: the network side transmits the type of an access control target and access control information corresponding to the type of the control target to the terminal; and when the terminal is required to access, the access control information corresponding to the terminal is acquired according to the access control information corresponding to the type of the access control target transmitted by the network side. The access control information is used for indicating whether the terminal is allowed to access or indicating the terminal is accessed according to a ratio; and the terminal executes the access control according to the acquired access control information. By adopting the method, the terminal and the system, the problem that the communication quality is influenced because of the network congestion caused by that the present access control mechanism cannot effectively deal with or avoid the access of a great amount of machine-to-machine (M2M) terminals can be solved, the network can be effectively protected, and the communication quality can be guaranteed.

Description

Control method, terminal and system that the terminal is inserted
Technical field
The present invention relates to wireless communication field, the control method, terminal and the system that insert in particular to a kind of terminal.
Background technology
In prior protocols, control for access behavior subscriber equipment, introduced access control mechanism in the agreement.This mechanism has been stipulated 16 access grades (AC, Access Class) altogether, and wherein, AC 0~9 is corresponding to ordinary call, and AC 10 is corresponding to urgent call, and AC 11~15 is corresponding to other special calling.For AC 0~9, network side is the corresponding access control factor (Barring Factor) for each AC has set, and for AC 10~15, and network side has been set the sign of a 1bit for each AC, and is broadcast to the terminal through system message.When inserting corresponding to the terminal of a certain AC, if the AC at this terminal belongs to 0~9, then the terminal can produce the random number between 0~1; If this random number is less than the pairing controlling elements of AC; Then this terminal can be inserted, otherwise this terminal is postponing to reattempt access after a period of time; If the AC at this terminal belongs to 11~15, then if the corresponding bit of AC is 0, then this terminal can be inserted, otherwise this terminal is postponing to reattempt access after a period of time; If the AC at this terminal is 10, then if the corresponding bit of AC is 0, then this terminal can be inserted, otherwise this terminal attempts inserting at once once more.This mechanism can effectively be tackled possibly occur in the existing network congested, prevents that the situation of overload from appearring in network.
But, along with the development of technology, the Internet of Things notion has appearred; The Internet of Things notion of narrow sense is meant communicating by letter between machine and the machine, and (Machine to Machine is called for short M2M, at 3GPP (3rd Generation Partnership Project; Third generation partner program) in the meeting; M2M again by project verification for " Machine Type Communication ", be called for short MTC), the Internet of Things notion of broad sense is except comprising communicating by letter between machine and the machine; Also comprise traditional interpersonal communication (Human to Human is called for short H2H).
After introducing the Internet of Things notion, communication service is expanded the every aspect of all trades and professions.For example Smart Home (Long-distance Control that comprises household appliances, remote monitoring of family's security protection or the like), intelligent transportation (monitoring of the magnitude of traffic flow, accident monitoring, vehicle monitoring etc.), intelligent metering (monitoring of industrial instrument and Long-distance Control, remote meter reading etc.) etc.Therefore, the quantity at M2M terminal will be considerably beyond the H2H terminal.Simultaneously, less different usually with the call arrival density at H2H terminal, the call arrival density at M2M terminal is very big usually.So after having introduced the Internet of Things notion, the main cause that causes network congestion no longer is the access at H2H terminal, but the access at a large amount of M2M terminals.
In addition, after introducing the Internet of Things notion, the type at terminal no longer has only the H2H terminal, but also comprises the M2M terminal, and existing access control mechanism can not effectively be distinguished these two kinds of terminals.
And; Different M2M uses possibly have the different service model; Data transfer model when business model is meant subscriber equipment and network side interaction data, the key element of expression business model comprises: data interaction periodicity, data interaction frequency, size of data, data interaction direction (refer to the upstream data be main or with the downlink data be lead or the up-downgoing flow close).With the intelligent electric meter is example; The Utilities Electric Co. that has requires every intelligent electric meter to report one time meter reading data in per 5 minutes; The Utilities Electric Co. that has requires every intelligent electric meter to report one time meter reading data in per 1 hour; The Utilities Electric Co. that has even only require that intelligent electric meter reports one time meter reading data every day; The flow of each meter reading data is less, and this has just constituted 3 kinds of different service models, and periodically small data reports, low-frequency degree periodicity small data reports, extremely low frequency degree periodicity small data reports can be called frequent respectively.Clearly these different service models are different for the pressure of network, and present mechanism can't be distinguished these business models.
In addition; Different service also possibly have different service quality (QoS; Quality ofService) requirement, the qos requirement relevant with access control comprises: the tolerance of access delay, the service interfacing that for example has goes into to postpone very responsive (business such as for example fire alarm, security protection, medical monitoring); The service interfacing that has is gone into delay-sensitive degree lower (for example checking meter), and present mechanism can't distinguish that these are different.
Different service or subscriber equipment also have different priority, and for example the priority with finance, security protection, business that medical treatment is relevant should be higher than common business, and present mechanism also can't be distinguished.
So after M2M communication extensive use,, can not effectively tackle or avoid network congestion, thereby can seriously influence network communication quality because existing access control mechanism can not carry out the access control operation neatly according to inserting object type.
Summary of the invention
Main purpose of the present invention is to provide control method, terminal and the system of a kind of terminal access, causes network congestion to solve above-mentioned because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert in a large number, thereby influences the problem of communication quality.
According to an aspect of the present invention; The control method that provides a kind of terminal to insert comprises: network side sends the access control object type to the terminal, and access control object type corresponding access control information; When the terminal need be inserted; According to the access control object type under self, and, obtain this terminal corresponding access control information according to the access control object type corresponding access control information that network side sends; Wherein, this access control information is used to indicate whether to allow terminal access or indicating terminal to insert in proportion; Access control is carried out according to the access control information of obtaining in this terminal.
According to a further aspect in the invention, a kind of terminal is provided, has comprised: receiver module, be used to receive the access control object type that network side sends, and access control object type corresponding access control information; The information acquisition module; When being used for to insert; According to the access control object type under self, and, obtain this terminal corresponding access control information according to the access control object type corresponding access control information that network side sends; Wherein, access control information is used to indicate whether to allow the terminal to insert or indicating terminal inserts in proportion; The access control module, the access control information that is used for obtaining according to the information acquisition module is carried out access control.
According to another aspect of the invention; The control system that provides a kind of terminal to insert; Comprise network equipment and terminal, this terminal is above-mentioned terminal, and network equipment comprises: sending module; Be used for sending the access control object type to this terminal, and access control object type corresponding access control information.
Through the present invention, adopt the terminal according to the access control object type under self, confirm access control information; And then definite access control measure; And more flexibly and accurately carry out access control, solved the network congestion that existing access control mechanism can not successfully manage or avoid a large amount of accesses in M2M terminal to cause, thereby influence the problem of communication quality; Protecting network has guaranteed the quality of communicating by letter effectively.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart according to the control method of the terminal access of the embodiment of the invention 1;
Fig. 2 is the corresponding relation sketch map according to the access control object type and the access control information of the embodiment of the invention 1;
Fig. 3 is the flow chart according to the control method of the terminal access of the embodiment of the invention 2;
Fig. 4 is the structured flowchart according to the terminal of the embodiment of the invention 3;
Fig. 5 is the structured flowchart according to the control system of the terminal access of the embodiment of the invention 3.
Embodiment
Hereinafter will and combine embodiment to specify the present invention with reference to accompanying drawing.Need to prove that under the situation of not conflicting, embodiment and the characteristic among the embodiment among the application can make up each other.
The embodiment of the invention to the object of access control (for example adopts; The terminal) effectively classifies; Make the terminal take corresponding access control measure, thereby carry out access control accurately more flexibly according to the classification under the access control object; Prevent that overload from appearring in network, effectively protecting network.Based on this, the control method, terminal and the system that provide a kind of terminal to insert.
Embodiment 1
Fig. 1 shows the flow chart of the control method that inserts according to the terminal of the embodiment of the invention, and this method may further comprise the steps:
Step S100, network side sends the access control object type to the terminal, and access control object type corresponding access control information.
Wherein, network side can send above-mentioned information through system message or beep-page message, that is, access control object type, and access control object type corresponding access control information, this moment, the terminal obtained above-mentioned information through monitoring system message or beep-page message.
Step S102; When the terminal need be inserted; According to the access control object type under self, and, obtain this terminal corresponding access control information according to the access control object type corresponding access control information that network side sends; Wherein, access control information is used to indicate whether to allow the terminal to insert or indicating terminal inserts in proportion.
Wherein, It is one of following that the access control object type comprises at least: the public land mobile network at terminal type information, terminal PRI information, end packet information, terminal (PLMN, Public Land Mobile Network) information, service priority information, QoS information or business model information.The particular content of these information of present embodiment is following:
1) terminal type information comprises: H2H terminal, M2M terminal or other type terminals;
2) terminal PRI information is and the priority at network convention or signatory terminal, and this terminal PRI information can be represented with the priority sequence number at terminal or the priority tag at terminal;
3) end packet information refers to the sign of end packet (group), and this end packet information can be represented with the grouping serial number at terminal or the group character at terminal;
4) the PLMN information at terminal refers to the information of the residing PLMN in terminal; The PLMN information at terminal can comprise: be in HPLMN (Home Public Land MobileNetwork, home public land mobile network network) the terminal, be not in the terminal of HPLMN, be not in HPLMN or PLMN of equal value the terminal, be not in the perhaps terminal of the PLMN in the PLMN tabulation among (U) SIM of HPLMN;
5) service priority information is meant in advance and appoints with network side, and the priority of the business of perhaps contracting comprises: priority sequence number, perhaps priority tag;
6) QoS of survice information comprises one or more combination of following requirement: the tolerance of access delay, the flow of assurance, the error rate of allowing etc.; This QoS of survice information can be classification other;
7) business model information is meant professional data communication model, comprises one or more combination of following characteristics: data interaction periodically (whether being that periodic data is mutual), data interaction frequency, data volume size, data interaction direction (refer to the upstream data be main be main with the downlink data or the up-downgoing flow close).
Terminal in this step is according to the access control object type under self; And access control object type corresponding access control information according to the network side transmission; Obtain this terminal corresponding access control information and can comprise following manner: 1) terminal monitoring is from the system message or the beep-page message of network side; Wherein, carry the access control object type in this system message or the beep-page message, and access control object type corresponding access control information; 2) the access control object type that self is affiliated is confirmed at the terminal; 3) terminal obtains above-mentioned access control object type corresponding access control information according to the information that receives from network side.
Wherein, the access control object type that network side sends, and access control object type corresponding access control information can for example, be put in these information in access control object type and the access control information mapping table with the form transmission of table.The access control object type as shown in Figure 2 and the corresponding relation sketch map of access control information; Wherein, Can be to concern one to one between each access control object type and the access control information; Promptly shown in Figure 2, as required, also can be with a plurality of access control object types corresponding to same access control information.
Step S104, access control is carried out according to the access control information of obtaining in the terminal.
Access control information in the embodiment of the invention can be to indicate flag bit or the designator that whether allows the terminal to insert, and also can be the access control factor that inserts in proportion of indication terminal and the combination of access control time delay.Particular content according to access control information is different, and the concrete realization of access control also can be different, and concrete mode is following:
Mode one: be used to indicate whether that the access control information that allows the terminal to insert is flag bit or designator; The terminal is carried out access control according to the access control information of obtaining and comprised: when this terminal confirmed to allow this terminal to insert according to access control information, this terminal initiated to insert at random; When this terminal confirmed not allow this terminal to insert according to access control information, this terminal can not initiate to insert at random.For example, when the terminal confirmed that flag bit or designator are first designated value (for example being 0), the terminal initiated to insert at random; When the terminal confirmed that flag bit or designator are second designated value (for example being 1), the terminal can not initiate to insert at random.
Under the situation of mode one; After the terminal can not initiate to insert at random; Said method comprises: terminal monitoring obtains next access control information from the system message or the beep-page message of network side from system message or beep-page message, carries out access control according to the next access control information of obtaining.
The terminal of present embodiment also can continue to monitor system message or the beep-page message from network side, perhaps monitors at set intervals.Mode two: the access control information that is used to indicate this terminal to insert in proportion is the access control factor and access control time delay; The terminal is carried out access control according to the access control information of obtaining and comprised: the terminal produces a random number, and the random number and the access control factor are compared; If this random number is less than the access control factor, the terminal initiates to insert at random; If this random number is more than or equal to the access control factor, the terminal can not initiate to insert at random.
For the second way, after the terminal can not initiate to insert at random, said method comprised: the terminal produces delay time according to the access control time delay, and after this delay time reached, access control was carried out at this terminal once more.The length of concrete delay time can be adjusted as required, also can realize with reference to existing formula in the correlation technique.The terminal of present embodiment is according to the access control object type under self; Take corresponding access control measure; More flexibly and accurately carry out access control, solved because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert the network congestion that causes in a large number, thereby influenced the problem of communication quality; Protecting network guarantees communication quality effectively.
Embodiment 2
The control method that present embodiment provides a kind of terminal to insert describes in LTE (Long-Term Evolution, Long Term Evolution) system, to be embodied as example.The access control operation need be carried out in the terminal before initiating to insert at random, as shown in Figure 3, and the main step of this method is following:
Step S300, network side sends the access control object type to the terminal, and access control object type corresponding access control information.
Wherein, network side can send above-mentioned information through system message or beep-page message, that is, access control object type, and access control object type corresponding access control information, this moment, the terminal obtained above-mentioned information through monitoring system message or beep-page message.Step S302; The terminal receives the access control object type from network side, and access control object type corresponding access control information, according to the access control object type under self; And access control object type corresponding access control information according to the network side transmission; Obtain this terminal corresponding access control information, wherein, access control information comprises the access control factor (ac-BarringFactor) and access control time delay (ac-BarringTime); Perhaps flag bit, designator, for example bit.
Step S304, the access control operation is carried out according to access control information in the terminal, concrete control as follows:
Access control information is flag bit or designator, for example bit: if this bit is " 0 ", represent that then the terminal can initiate to insert at random; If this bit is " 1 ", represent that then the terminal can not initiate to insert at random.
Access control information is the access control factor (ac-BarringFactor) and access control time delay (ac-BarringTime): the terminal produces a random number; And with this random number and the comparison of the access control factor; If random number is less than the access control factor; Represent that then the terminal can initiate to insert at random, otherwise, represent that then the terminal can not initiate to insert at random.
If the terminal can not initiate to insert at random, the terminal produces delay time according to the access control time delay, after this delay time reaches; Access control is carried out at this terminal once more; For example, the terminal produces a random number (rand), and according to formula: (0.7+0.6*rand) * ac-BarringTime produces time of delay; After this time of delay, carry out the access control operation again.
" type of access control object " in the present embodiment is meant a kind of or multiple combination in the following information: terminal type information, terminal PRI information, end packet (group) information, terminal PLMN information, service priority information, QoS of survice information or business model information.
Terminal type information comprises following one or more: H2H terminal, M2M terminal, other types terminal.
Terminal PRI information is meant in advance and appoints with network side that perhaps the priority at signatory terminal comprises: priority sequence number, perhaps priority tag.Existing H2H terminal can be used as a priority; Except that this priority, can also set up one or more priority, these priority of setting up can be higher or lower than existing H2H terminal PRI; With existing H2H terminal is basic priority, can classify as follows:
1) set up a priority, comprise following two kinds of forms:
The H2H terminal, low priority terminal (with respect to the H2H terminal);
Perhaps, high priority terminal (with respect to the H2H terminal), H2H terminal.
2) set up a plurality of priority, comprise following three kinds of forms:
The A:H2H terminal, 1 grade of terminal of low priority, 2 grades of terminals of low priority ..., low priority N level terminal (N is a positive integer);
B: the highest priority of 1 level terminal, 2 grades of terminals of high priority ..., high priority M level terminal (M is a positive integer), H2H terminal;
C: the highest priority of 1 level terminal, 2 grades of terminals of high priority ..., high priority M level terminal, the H2H terminal, 1 grade of terminal of low priority, 2 grades of terminals of low priority ..., low priority N level terminal (M, N are positive integer);
For example, network side and M2M terminal agreement, the priority at M2M terminal is lower than the H2H terminal, then one has two kinds of priority endpoint in the network: H2H terminal, M2M terminal.
The grouping information at terminal is meant the sign of end packet (Group), comprising: the sequence number of end packet (Group) or sign.For example; The grouping information at terminal can directly be used Group-RNTI (Radio Network Temporary Identifier; Radio Network Temporary Identifier), also can use a sequence number of making an appointment with network side, network side is set up the one-to-one relationship of this sequence number and grouping in advance.
Terminal PLMN information is meant the information of the residing PLMN in terminal; Comprise: be in the terminal of HPLMN, be not in the terminal of HPLMN, be not in HPLMN or PLMN of equal value the terminal, be not in the perhaps terminal of the PLMN in the PLMN tabulation among (U) SIM of HPLMN.
Service priority information is meant in advance and network side is appointed, perhaps the priority of signatory business comprises: priority sequence number, perhaps priority tag.In existing protocol, the type of service that access control comprises has Emergency (terminal initiate be urgent call), MO-Signalling (terminal is initiatively initiated the signaling class and called out) and MO-Data (the data class calling is initiatively initiated at the terminal).In addition, present embodiment can also be introduced new service priority (following " H2H is professional " refers to already contained type of service in the existing protocol), for example:
1) set up a priority, comprise following two kinds of forms:
H2H is professional, low priority traffice (professional with respect to H2H);
Perhaps, high-priority service (with respect to the H2H terminal), H2H is professional.
2) set up a plurality of priority, comprise following three kinds of forms:
A:H2H is professional, 1 grade of business of low priority, and 2 grades of business of low priority ..., low priority N level professional (N is a positive integer);
B: the highest priority of 1 level is professional, 2 grades of business of high priority ..., high priority M level professional (M is a positive integer), H2H is professional;
C: the highest priority of 1 level is professional, 2 grades of business of high priority ..., high priority M level is professional, and H2H is professional, 1 grade of business of low priority, 2 grades of business of low priority ..., low priority N level professional (M, N are positive integer);
For example, for ammeter class MTC (Machine Type Communication, Machine Type communication) business, it mainly acts on is to report the ammeter parameter, and service priority is lower; Type MTC is professional for the finance data transmission, and it mainly acts on is to transmit finance data constantly, and service priority wants high than the ammeter class is professional; Type MTC is professional for alarm, and its effect is to alarm, and service priority is higher.So the priority of these three types of business is arranged as follows from high to low: alarm type MTC professional (high-priority service), finance data transmission type MTC professional (H2H is professional), ammeter class MTC professional (low priority traffice).
QoS of survice information comprises one or more combination of following requirement: the tolerance of access delay, the flow of assurance, the error rate of allowing.For example: with the access delay is example, can be set to:
Two-stage: to inserting delay-sensitive, insensitive to access delay;
Multistage: the access delay susceptibility is high, in the access delay susceptibility, the access delay susceptibility is low;
Also can be the combination of multiple qos requirement, for example: access delay susceptibility height+low guaranteed flow+low error rate requirement; Perhaps, in the access delay susceptibility+high dependable flow+low error rate requirement; This QoS also can be divided into thinner progression.
The business model information of present embodiment is meant professional data communication model, comprises one or more following combination of features: data interaction periodically (whether being that periodic data is mutual), data interaction frequency, data volume size, data interaction direction (refer to the upstream data be main be main with the downlink data or the up-downgoing flow close).For example:
Include only a kind of information of characteristic: small data business model or frequent business model or periodic traffic model;
Comprise manifold information: periodically small data business model, low-frequency degree periodically small data report, the extremely low frequency degree periodically small data report, high frequency periodically small data interaction models, the big data down transmission model of middle frequency aperiodicity etc.
Concrete type of service and the corresponding relation between the business model are made an appointment by network side and subscriber equipment or are signatory.
Above-mentioned access control object type can have various ways, and promptly the type of access control object can be one or more of above type, or multiple merging.For example:, as shown in table 1 with the PLMN information combination of terminal PRI information (is example with two priority) with the terminal:
Table 1
Figure BDA0000030838740000131
Figure BDA0000030838740000141
The terminal of present embodiment is according to the access control object type under self; Take corresponding access control measure; More flexibly and accurately carry out access control, solved because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert the network congestion that causes in a large number, thereby influenced the problem of communication quality; Protecting network has guaranteed communication quality effectively.
Embodiment 3
Fig. 4 shows the structured flowchart according to the terminal of the embodiment of the invention, and this terminal comprises: receive mould 40, information acquisition module 42 and access control module 44, its function is following:
Receiver module 40 is used to receive the access control object type of sending from network side, and access control object type corresponding access control information;
Information acquisition module 42; When being used for to insert; According to the access control object type under self, and, obtain this terminal corresponding access control information according to the access control object type corresponding access control information that network side sends; Wherein, access control information is used to indicate whether to allow the terminal to insert or indicating terminal inserts in proportion;
Wherein, It is one of following that the access control object type comprises at least: the public land mobile network (PLMN at terminal type information, terminal PRI information, end packet information, terminal; Public Land Mobile Network) information, service priority information, QoS (QoS, Quality of Service) information or business model information.The particular content of these information of present embodiment is following:
1) terminal type information comprises: H2H terminal, M2M terminal or other type terminals;
2) terminal PRI information is and the priority at network convention or signatory terminal, and this terminal PRI information can be represented with the priority sequence number at terminal or the priority tag at terminal;
3) end packet information refers to the sign of end packet (group), and this end packet information can be represented with the grouping serial number at terminal or the group character at terminal;
4) the PLMN information at terminal refers to the information of the residing PLMN in terminal; The PLMN information at terminal can comprise: be in HPLMN (Home Public Land MobileNetwork, home public land mobile network network) the terminal, be not in the terminal of HPLMN, be not in HPLMN or PLMN of equal value the terminal, be not in the perhaps terminal of the PLMN in the PLMN tabulation among (U) SIM of HPLMN;
5) service priority information is meant in advance and appoints with network side, and the priority of the business of perhaps contracting comprises: priority sequence number, perhaps priority tag;
6) QoS of survice information comprises one or more combination of following requirement: the tolerance of access delay, the flow of assurance, the error rate of allowing; This QoS of survice information can be classification other;
7) business model information is meant professional data communication model, comprises one or more combination of following characteristics: data interaction periodically (whether being that periodic data is mutual), data interaction frequency, data volume size, data interaction direction (refer to the upstream data be main be main with the downlink data or the up-downgoing flow close).
Access control module 44 links to each other with information acquisition module 42, and the access control information that is used for obtaining according to information acquisition module 42 is carried out access control.
Receiver module 40 comprises: monitoring unit; Be used to monitor system message or beep-page message from network side; Wherein, carry the access control object type that network side sends in system message or the beep-page message, and access control object type corresponding access control information.
Access control information in the embodiment of the invention can be the indication terminal information that whether can initiate to insert, or the information that inserts in proportion of indicating terminal.According to the difference of access control information, the concrete realization of access control also can be different, and concrete mode is following:
Mode one, access control module 44 comprises: the first information is confirmed the unit, is used for confirming that access control information adopts flag bit or designator to indicate whether to allow the terminal to insert; The first access control unit, when being used for confirm allowing this terminal to insert according to access control information, this terminal initiates to insert at random; The second access control unit, when being used for confirming not allow this terminal to insert according to access control information, this terminal can not initiate to insert at random.
In the aforesaid way one; If the terminal can not initiate to insert at random; System message or beep-page message from network side will be monitored through above-mentioned monitoring unit in the terminal; Obtain next access control information from system message or beep-page message, carry out access control once more according to next access control information.
Mode two, access control module 44 comprises: second information is confirmed the unit, is used for confirming that access control information adopts the access control factor and access control time delay indicating terminal to insert in proportion; Comparing unit is used to produce a random number, and the random number and the access control factor are compared; The 3rd access control unit, if be used for the comparative result of comparing unit be random number less than the access control factor, this terminal initiates to insert at random; The 4th access control unit, if be used for the comparative result of comparing unit be random number more than or equal to the access control factor, this terminal can not initiate to insert at random.
Based on aforesaid way two, this terminal also comprises: the time-delay trigger module, when being used for this terminal and can not initiating to insert at random, produce delay time according to the access control time delay, and after delay time reaches, trigger access control module 44 and carry out access control.
Referring to Fig. 5, the control system that present embodiment also provides a kind of terminal to insert comprises network equipment 52 and terminal 54, and terminal 54 can realize that repeat no more, network equipment 52 comprises here according to above-mentioned terminal shown in Figure 4:
Sending module is used for sending the access control object type to terminal 54, and access control object type corresponding access control information.
The terminal of present embodiment is according to the access control object type under self; Take corresponding access control measure; More flexibly and accurately carry out access control, solved because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert the network congestion that causes in a large number, thereby influenced the problem of communication quality; Protecting network guarantees communication quality effectively.The terminal of above embodiment is through confirming the access control object type earlier; Confirm corresponding access control measure again; More flexibly and accurately carry out access control, solved because existing access control mechanism can not successfully manage or avoid the M2M terminal to insert the network congestion that causes in a large number, thereby influenced the problem of communication quality; Protecting network guarantees communication quality effectively.
Obviously, it is apparent to those skilled in the art that above-mentioned each module of the present invention or each step can realize with the general calculation device; They can concentrate on the single calculation element; Perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element; Thereby; Can they be stored in the storage device and carry out, and in some cases, can carry out step shown or that describe with the order that is different from here by calculation element; Perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (13)

1. the control method that the terminal is inserted is characterized in that, comprising:
Network side sends the access control object type to the terminal, and said access control object type corresponding access control information;
When said terminal need be inserted; According to the access control object type under self; And access control object type corresponding access control information according to said network side transmission; Obtain said terminal corresponding access control information, wherein, said access control information is used to indicate whether to allow said terminal to insert or indicate said terminal to insert in proportion;
Access control is carried out according to the said access control information of obtaining in said terminal.
2. method according to claim 1 is characterized in that, it is one of following that said access control object type comprises at least:
Public land mobile network PLMN information, service priority information, quality QoS information or the business model information at terminal type information, terminal PRI information, end packet information, terminal;
Wherein, said terminal PRI information refers to the priority at said terminal and network side agreement terminal;
Said end packet information refers to the sign of end packet;
Said service priority information refers to the priority of the business of said terminal and network side agreement;
Said business model information refers to professional data communication model, comprises one of following at least: data interaction periodicity, data interaction frequency, big or small, the data interaction direction of data volume.
3. method according to claim 1 is characterized in that,
Said network side sends the access control object type to the terminal; And said access control object type corresponding access control information comprises: network side is to terminal transmitting system message or beep-page message; Wherein, Carry the access control object type in said system message or the beep-page message, and said access control object type corresponding access control information;
Said terminal is according to the access control object type under self; And access control object type corresponding access control information according to said network side transmission; Obtain before the corresponding access control information of said terminal; Said method comprises: said terminal monitoring obtains said access control object type from the said system message or the beep-page message of said network side from said system message or beep-page message, and said access control object type corresponding access control information.
4. method according to claim 1 is characterized in that, saidly is used to indicate whether that the access control information that allows the terminal to insert is flag bit or designator; Said terminal is carried out access control according to the said access control information of obtaining and is comprised:
When said terminal confirmed to allow said terminal to insert according to said access control information, said terminal initiated to insert at random;
When said terminal confirmed not allow said terminal to insert according to said access control information, said terminal can not initiate to insert at random.
5. method according to claim 4 is characterized in that, after said terminal can not initiate to insert at random, said method comprised:
Said terminal monitoring obtains next access control information from the system message or the beep-page message of network side from said system message or beep-page message, carries out access control according to the said next access control information of obtaining.
6. method according to claim 1 is characterized in that, the said access control information that is used to indicate said terminal to insert in proportion is the access control factor and access control time delay; Said terminal is carried out access control according to the said access control information of obtaining and is comprised:
Said terminal produces a random number, and the said random number and the said access control factor are compared;
If said random number is less than the said access control factor, said terminal initiates to insert at random;
If said random number is more than or equal to the said access control factor, said terminal can not initiate to insert at random.
7. method according to claim 6 is characterized in that, after said terminal can not initiate to insert at random, said method comprised:
Said terminal produces delay time according to said access control time delay, and after said delay time reached, said access control was carried out at said terminal once more.
8. a terminal is characterized in that, comprising:
Receiver module is used to receive the access control object type that network side sends, and said access control object type corresponding access control information;
The information acquisition module; When being used for to insert; According to the access control object type under self, and, obtain said terminal corresponding access control information according to the access control object type corresponding access control information that said network side sends; Wherein, said access control information is used to indicate whether to allow said terminal to insert or indicate said terminal to insert in proportion;
The access control module is used for carrying out access control according to the said access control information that said information acquisition module obtains.
9. terminal according to claim 8 is characterized in that,
Said receiver module comprises: monitoring unit; Be used to monitor system message or beep-page message from network side; Wherein, carry the access control object type that said network side sends in said system message or the beep-page message, and said access control object type corresponding access control information.
10. terminal according to claim 8 is characterized in that, said access control module comprises:
The first information is confirmed the unit, is used for confirming that said access control information adopts flag bit or designator to indicate whether to allow said terminal to insert;
The first access control unit, when being used for according to the access of the said terminal of the definite permission of said access control information, said terminal initiates to insert at random;
The second access control unit, when being used for confirming not allow said terminal to insert according to said access control information, said terminal can not initiate to insert at random.
11. terminal according to claim 8 is characterized in that, said access control module comprises:
Second information is confirmed the unit, is used for confirming that said access control information adopts the access control factor and access control time delay to indicate said terminal to insert in proportion;
Comparing unit is used to produce a random number, and the said random number and the said access control factor are compared;
The 3rd access control unit, if be used for the comparative result of said comparing unit be said random number less than the said access control factor, said terminal initiates to insert at random;
The 4th access control unit, if be used for the comparative result of said comparing unit be said random number more than or equal to the said access control factor, said terminal can not initiate to insert at random.
12. terminal according to claim 11 is characterized in that, said terminal also comprises:
The time-delay trigger module when being used for said terminal and can not initiating to insert at random, produces delay time according to said access control time delay, after said delay time reaches, triggers said access control module and carries out said access control.
13. the control system that the terminal is inserted comprises network equipment and terminal, it is characterized in that said terminal is each described terminal of claim 8-12, said network equipment comprises:
Sending module is used for sending the access control object type to said terminal, and said access control object type corresponding access control information.
CN201010532883.2A 2010-11-04 2010-11-04 Method, terminal and system for controlling terminal access Active CN102469547B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010532883.2A CN102469547B (en) 2010-11-04 2010-11-04 Method, terminal and system for controlling terminal access
PCT/CN2011/078720 WO2012058970A1 (en) 2010-11-04 2011-08-22 Method, terminal, and system for controlling terminal access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010532883.2A CN102469547B (en) 2010-11-04 2010-11-04 Method, terminal and system for controlling terminal access

Publications (2)

Publication Number Publication Date
CN102469547A true CN102469547A (en) 2012-05-23
CN102469547B CN102469547B (en) 2014-07-02

Family

ID=46023989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010532883.2A Active CN102469547B (en) 2010-11-04 2010-11-04 Method, terminal and system for controlling terminal access

Country Status (2)

Country Link
CN (1) CN102469547B (en)
WO (1) WO2012058970A1 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013167093A2 (en) * 2013-01-14 2013-11-14 中兴通讯股份有限公司 Congestion control method and device for mtc device access network
WO2014043900A1 (en) * 2012-09-21 2014-03-27 华为技术有限公司 Method and device for transmitting public message
WO2014183493A1 (en) * 2013-11-12 2014-11-20 中兴通讯股份有限公司 Method and apparatus for enabling m2m service and h2h service to coexist
CN104737591A (en) * 2013-08-21 2015-06-24 华为技术有限公司 Random access method and related device
CN104980951A (en) * 2014-04-11 2015-10-14 中兴通讯股份有限公司 Transmission method and device, and monitoring method and device of monitored information
CN105959978A (en) * 2016-07-12 2016-09-21 北京理工大学 Massive M2M (Machine-to-Machine) communication packet access method based on LTE (Long Term Evolution)
CN106034328A (en) * 2016-05-11 2016-10-19 西安交通大学 Access control method oriented to differentiated service coexistence scene in wireless medical treatment network
CN106657364A (en) * 2016-12-30 2017-05-10 南京八月智能科技有限公司 Internet of things device and gateway device
WO2017117959A1 (en) * 2016-01-05 2017-07-13 中兴通讯股份有限公司 Service processing method and apparatus
WO2017198228A1 (en) * 2016-05-19 2017-11-23 中兴通讯股份有限公司 Method and apparatus for device access
CN107566325A (en) * 2016-07-01 2018-01-09 中兴通讯股份有限公司 Access the method and device of network
CN107820309A (en) * 2017-12-14 2018-03-20 石家庄科林电气股份有限公司 The wake-up strategy and time slot optimizing algorithm of low power loss communication equipment
WO2018059397A1 (en) * 2016-09-30 2018-04-05 华为技术有限公司 Access control method, terminal apparatus and wireless access network apparatus
WO2018127233A1 (en) * 2017-01-06 2018-07-12 电信科学技术研究院 Access control method and device
WO2018232912A1 (en) * 2017-06-23 2018-12-27 深圳市盛路物联通讯技术有限公司 Management method and management system for data traffic of internet of things
CN110572801A (en) * 2019-08-29 2019-12-13 西安电子科技大学 method for establishing mMTC (machine type communication) service flow model
CN111740886A (en) * 2020-06-12 2020-10-02 青岛恒星科技学院 5G Internet of things power acquisition terminal access control method
CN113630840A (en) * 2020-05-06 2021-11-09 大唐移动通信设备有限公司 SNPN cell access method, device and storage medium
WO2022016474A1 (en) * 2020-07-23 2022-01-27 北京小米移动软件有限公司 Access control method and apparatus, and storage medium
CN115462165A (en) * 2020-04-29 2022-12-09 华为技术有限公司 Access method and device and communication system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345988A (en) * 2007-07-13 2009-01-14 大唐移动通信设备有限公司 Resource allocation method and device of multi-carrier system
EP1814270B1 (en) * 2006-01-26 2009-03-04 Samsung Electronics Co., Ltd. Apparatus and method for connecting call in mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045810B (en) * 2009-10-09 2014-01-08 华为技术有限公司 Method, device and system for accessing machine type communication terminal equipment to network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1814270B1 (en) * 2006-01-26 2009-03-04 Samsung Electronics Co., Ltd. Apparatus and method for connecting call in mobile terminal
CN101345988A (en) * 2007-07-13 2009-01-14 大唐移动通信设备有限公司 Resource allocation method and device of multi-carrier system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《3GPP》 20100613 ZTE RAN Control with Access Priority , *
CATT: "《3GPP》", 13 June 2010 *

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11349681B2 (en) 2012-09-21 2022-05-31 Huawei Technologies Co., Ltd. Transmission method for common message and device
US10116459B2 (en) 2012-09-21 2018-10-30 Huawei Technologies Co., Ltd. Transmission method for common message and device
WO2014043900A1 (en) * 2012-09-21 2014-03-27 华为技术有限公司 Method and device for transmitting public message
US9729339B2 (en) 2012-09-21 2017-08-08 Huawei Technologies Co., Ltd. Transmission method for common message and device
US10581628B2 (en) 2012-09-21 2020-03-03 Huawei Technologies Co., Ltd. Transmission method for common message and device
WO2013167093A2 (en) * 2013-01-14 2013-11-14 中兴通讯股份有限公司 Congestion control method and device for mtc device access network
CN103929776B (en) * 2013-01-14 2018-03-23 中兴通讯股份有限公司 A kind of jamming control method and device of MTC device access network
CN103929776A (en) * 2013-01-14 2014-07-16 中兴通讯股份有限公司 Congestion control method and device for MTC equipment in network access
WO2013167093A3 (en) * 2013-01-14 2014-01-03 中兴通讯股份有限公司 Congestion control method and device for mtc device access network
CN104737591A (en) * 2013-08-21 2015-06-24 华为技术有限公司 Random access method and related device
WO2014183493A1 (en) * 2013-11-12 2014-11-20 中兴通讯股份有限公司 Method and apparatus for enabling m2m service and h2h service to coexist
US9705742B2 (en) 2013-11-12 2017-07-11 Zte Corporation Method and apparatus for enabling M2M service and H2H service to coexist
CN104980951A (en) * 2014-04-11 2015-10-14 中兴通讯股份有限公司 Transmission method and device, and monitoring method and device of monitored information
WO2015154406A1 (en) * 2014-04-11 2015-10-15 中兴通讯股份有限公司 Monitoring information sending method and apparatus, and monitoring method and apparatus
WO2017117959A1 (en) * 2016-01-05 2017-07-13 中兴通讯股份有限公司 Service processing method and apparatus
CN106034328A (en) * 2016-05-11 2016-10-19 西安交通大学 Access control method oriented to differentiated service coexistence scene in wireless medical treatment network
CN106034328B (en) * 2016-05-11 2019-08-23 西安交通大学 Connection control method towards differentiated service coexistence scenario in wireless medical networks
WO2017198228A1 (en) * 2016-05-19 2017-11-23 中兴通讯股份有限公司 Method and apparatus for device access
CN107566325A (en) * 2016-07-01 2018-01-09 中兴通讯股份有限公司 Access the method and device of network
CN105959978A (en) * 2016-07-12 2016-09-21 北京理工大学 Massive M2M (Machine-to-Machine) communication packet access method based on LTE (Long Term Evolution)
CN105959978B (en) * 2016-07-12 2019-04-16 北京理工大学 A kind of flood tide M2M communication grouping accessing method based on LTE
WO2018059397A1 (en) * 2016-09-30 2018-04-05 华为技术有限公司 Access control method, terminal apparatus and wireless access network apparatus
CN107889186A (en) * 2016-09-30 2018-04-06 华为技术有限公司 Connection control method, terminal device and wireless access network equipment
US10952130B2 (en) 2016-09-30 2021-03-16 Huawei Technologies Co., Ltd. Access control method, terminal device, and radio access network device
CN107889186B (en) * 2016-09-30 2021-01-12 华为技术有限公司 Access control method, terminal equipment and wireless access network equipment
CN106657364A (en) * 2016-12-30 2017-05-10 南京八月智能科技有限公司 Internet of things device and gateway device
CN108282751A (en) * 2017-01-06 2018-07-13 电信科学技术研究院 A kind of connection control method and device
US11057824B2 (en) 2017-01-06 2021-07-06 China Academy Of Telecommunications Technology Access control method and device
WO2018127233A1 (en) * 2017-01-06 2018-07-12 电信科学技术研究院 Access control method and device
WO2018232912A1 (en) * 2017-06-23 2018-12-27 深圳市盛路物联通讯技术有限公司 Management method and management system for data traffic of internet of things
CN107820309B (en) * 2017-12-14 2020-09-15 石家庄科林电气股份有限公司 Wake-up strategy and time slot optimization algorithm for low-power-consumption communication equipment
CN107820309A (en) * 2017-12-14 2018-03-20 石家庄科林电气股份有限公司 The wake-up strategy and time slot optimizing algorithm of low power loss communication equipment
CN110572801A (en) * 2019-08-29 2019-12-13 西安电子科技大学 method for establishing mMTC (machine type communication) service flow model
CN110572801B (en) * 2019-08-29 2021-06-25 西安电子科技大学 Method for establishing mMTC (machine type communication) service flow model
CN115462165A (en) * 2020-04-29 2022-12-09 华为技术有限公司 Access method and device and communication system
CN113630840A (en) * 2020-05-06 2021-11-09 大唐移动通信设备有限公司 SNPN cell access method, device and storage medium
CN113630840B (en) * 2020-05-06 2023-04-18 大唐移动通信设备有限公司 SNPN cell access method, device and storage medium
CN111740886A (en) * 2020-06-12 2020-10-02 青岛恒星科技学院 5G Internet of things power acquisition terminal access control method
WO2022016474A1 (en) * 2020-07-23 2022-01-27 北京小米移动软件有限公司 Access control method and apparatus, and storage medium

Also Published As

Publication number Publication date
WO2012058970A1 (en) 2012-05-10
CN102469547B (en) 2014-07-02

Similar Documents

Publication Publication Date Title
CN102469547B (en) Method, terminal and system for controlling terminal access
CN102438292B (en) Radio resource control method and system
CN102045810B (en) Method, device and system for accessing machine type communication terminal equipment to network
CN102812755B (en) Access control for machine-type communication devices
CN103053204B (en) Enhancement mode access control method
CN102612112B (en) A kind of terminal access method and device
CN102378389B (en) A kind of cut-in method of Physical Random Access Channel and device
CN102469514A (en) Terminal and method for accessing terminal to network
CN102238601A (en) Method for monitoring and reporting MTC events
CN102404825B (en) A kind of method and system by NAS signaling triggering terminal
CN102378306B (en) A kind of method and system of broadcasting access control parameter
CN103155665A (en) Implicit reject response
CN105580476A (en) Communications system, infrastructure equipment, communication terminal and method
US20120178464A1 (en) Methods and apparatus to support efficient and reliable machine to machine communications
CN103546871A (en) M2M (machine to machine) terminal group management method
Kloiber et al. Update delay: A new information-centric metric for a combined communication and application level reliability evaluation of cam based safety applications
CN102469551A (en) Radio resource control (RRC) method and apparatus thereof
CN102438280B (en) Method and system for controlling access time of terminal
KR20190108117A (en) Connection method and terminal
EP3432645B1 (en) A communication device for controlling transmissions over a communication network
CN113810907B (en) Signaling control method, apparatus, terminal device and computer readable storage medium
WO2012097587A1 (en) Terminal access method and device
US11102632B2 (en) Access mechanism for single purpose operation
CN110224803A (en) A kind of LoRa communication means realizing beacon and independently finding
CN114679768B (en) Dynamic adjustment method and system for low-power consumption Bluetooth communication bandwidth and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20120523

Assignee: SHENZHEN ZTE MICROELECTRONICS TECHNOLOGY CO., LTD.

Assignor: ZTE Corporation

Contract record no.: 2015440020319

Denomination of invention: Method, terminal and system for controlling terminal access

Granted publication date: 20140702

License type: Common License

Record date: 20151123

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model