CN106465433B - Wireless access method and user equipment - Google Patents

Wireless access method and user equipment Download PDF

Info

Publication number
CN106465433B
CN106465433B CN201580024280.2A CN201580024280A CN106465433B CN 106465433 B CN106465433 B CN 106465433B CN 201580024280 A CN201580024280 A CN 201580024280A CN 106465433 B CN106465433 B CN 106465433B
Authority
CN
China
Prior art keywords
network
identifier
access technology
identification
forbidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201580024280.2A
Other languages
Chinese (zh)
Other versions
CN106465433A (en
Inventor
刘海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN106465433A publication Critical patent/CN106465433A/en
Application granted granted Critical
Publication of CN106465433B publication Critical patent/CN106465433B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management

Abstract

The embodiment of the invention provides a wireless access method and user equipment. The wireless access method comprises the steps of sending a wireless access request message to network equipment, wherein the wireless access request message comprises a network identifier and an access technology of UE; the network identification is the home network identification of the UE or the equivalent home network identification of the UE; receiving a rejection message sent by the network equipment; the network identification and access technology are placed in a forbidden network list. The embodiment of the invention ensures the continuity of the service.

Description

Wireless access method and user equipment
Technical Field
The present invention relates to communications technologies, and in particular, to a wireless access method and a user equipment.
Background
With the development of communication technology, users have more and more demands for data services. User Equipment (UE) typically performs data services by acquiring packet data services. Before the UE acquires the packet data service, an access request needs to be sent to the network device, and the network device is requested to access the UE to a cell of a first access technology in a network corresponding to the network identifier.
If the network device determines that the network corresponding to the network identifier does not support the first access technology according to the network identifier of the UE in the access request message and the first access technology, and thus cannot provide the packet data service, the network device returns a reject message to the UE. If the network identifier is the home network identifier or the equivalent home network identifier of the UE, after the UE receives the reject message, that is, after the UE fails to access the cell of the first access technology in the home network of the UE or the equivalent home network of the UE, the UE further sends an access request to the network device to request the network device to determine that the network corresponding to the network identifier supports the second access technology, and accesses the UE to the cell of the second access technology in the network corresponding to the network identifier. In order to ensure the rate of executing data service by the UE, the network device also configures a neighboring cell of a high priority access technology for a cell of a low priority access technology.
If the UE accesses the cell of the second access technology and detects the signal of the first access technology, the UE will initiate a request to the network device again to request to access the cell of the first access technology. Because the network corresponding to the network identifier does not support the first access technology, the network device also returns a reject message to the UE, so that the UE is disconnected. The UE will again perform the above procedure of requesting access to the cell of the second access technology, which will result in a periodic network outage for the UE.
Disclosure of Invention
The embodiment of the invention provides a wireless access method and user equipment, aiming at solving the problem of periodic network disconnection of UE.
In a first aspect, an embodiment of the present invention provides a wireless access method, including:
user Equipment (UE) sends a wireless access request message to network equipment, wherein the wireless access request message comprises: the network identifier of the UE and the identifier of the access technology; the network identification is the home network identification of the UE or the equivalent home network identification of the UE;
the UE receives a rejection message sent by the network equipment;
and the UE puts the network identification and the identification of the access technology into a forbidden network list.
According to the first aspect, in a first possible implementation manner of the first aspect, the method further includes:
when the UE puts the network identifier and the identifier of the access technology into the forbidden network list, starting a timer;
and if the timer is overtime, the UE deletes the network identifier and the identifier of the access technology from the forbidden network list.
In a second possible implementation form, according to the first aspect or the first possible implementation form of the first aspect, the access technology is a long term evolution, LTE, access technology.
In a third possible implementation manner, according to the second possible implementation manner of the first aspect, the placing, by the UE, the network identifier and the identifier of the access technology into a forbidden network list includes:
the UE puts the tracking area identification TAI of the UE and the identification of the access technology into the forbidden network list; the TAI comprises a tracking area code TAC of the UE in a network corresponding to the network identification.
In a second aspect, an embodiment of the present invention provides a user equipment UE, including:
a sending module, configured to send a wireless access request message to a network device, where the wireless access request message includes: the network identifier of the UE and the identifier of the access technology; the network identification is the home network identification of the UE or the equivalent home network identification of the UE;
a receiving module, configured to receive a rejection message sent by the network device;
and the adding module is used for putting the network identifier and the identifier of the access technology into a forbidden network column by the UE.
According to a second aspect, in a first possible implementation manner of the second aspect, the UE further includes:
a starting module, configured to start a timer when the adding module puts the network identifier and the identifier of the access technology into the prohibited network list;
and the deleting module deletes the network identifier and the identifier of the access technology from the forbidden network list if the timer is overtime.
In a second possible implementation form, according to the second aspect or the first possible implementation form of the second aspect, the access technology is a long term evolution, LTE, access technology.
In a third possible implementation manner, the adding module is further configured to put a Tracking Area Identity (TAI) of the UE and an identity of the access technology into the forbidden network list; the TAI comprises a tracking area code TAC of the UE in a network corresponding to the network identification.
In a third aspect, an embodiment of the present invention provides a user equipment UE, including: a receiver, a processor, and a transmitter;
wherein the transmitter is configured to send a wireless access request message to a network device, where the wireless access request message includes: the network identifier of the UE and the identifier of the access technology; the network identification is the home network identification of the UE or the equivalent home network identification of the UE;
the receiver is used for receiving a rejection message sent by the network equipment;
the processor is configured to put the network identifier and the identifier of the access technology into a forbidden network list.
According to the third aspect, in a first possible implementation manner of the third aspect, the processor is further configured to start a timer when the network identifier and the identifier of the access technology are placed in the forbidden network list; and if the timer is overtime, deleting the network identifier and the identifier of the access technology from the forbidden network list.
According to the third aspect or the first possible implementation manner of the third aspect, in a second possible implementation manner, the access technology is a long term evolution LTE access technology.
In a third possible implementation manner, the processor is further configured to put a Tracking Area Identity (TAI) of the UE and an identity of the access technology into the forbidden network list; the TAI comprises a tracking area code TAC of the UE in a network corresponding to the network identification.
The wireless access method and the user equipment of the embodiment of the invention send a wireless access request message to the network equipment through the UE, wherein the wireless access request message comprises a network identifier of the UE and an identifier of an access technology, the network identifier is a home network identifier of the UE or an equivalent home network identifier of the UE, the UE receives a rejection message sent by the network equipment, the UE puts the network identifier and the identifier of the access technology into a forbidden network list, and the forbidden network list forbids the UE to repeatedly request to access a cell of the access technology in a network corresponding to the network identifier, thereby avoiding periodic network disconnection caused by repeated requests and ensuring continuous service.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a wireless access method according to an embodiment of the present invention;
fig. 2 is a flowchart of a wireless access method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a wireless access method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a UE according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a UE according to a fifth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
The embodiment of the invention provides a wireless access method. The method may be performed by a UE. The UE may be a mobile phone, a tablet computer, or other wireless accessible device. Fig. 1 is a flowchart of a wireless access method according to an embodiment of the present invention. As shown in fig. 1, the method may include:
s101, UE sends a wireless access request message to network equipment, wherein the wireless access request message comprises: the network identifier and the access technology identifier of the UE; the network identity is a home network identity of the UE or an equivalent home network identity of the UE.
Specifically, the UE performing S101 may be during UE registration through network attachment for the first time, or during network update after registration. The UE updates the network after registration, which may be performed in a process of updating a Location Area (LA), a Router (RA), a Tracking Area (TA), or the like of the UE. The network device may be an access network device. The Access technology may be Radio Access Technologies (RAT). The access technology may be a subscription access technology of a Subscriber Identity Module (SIM) card of the UE. For example, if the subscription access technology of the SIM card of the UE is a Long Term Evolution (LTE) access technology, that is, the SIM card of the UE is an LTE SIM card, the identifier of the access technology may be LTE. If the subscription access technology of the SIM card of the UE is a third Generation (3G) access technology, that is, the SIM card of the UE is a 3G SIM card, the identifier of the access technology may be 3G.
The Radio access request message may be a Radio Resource Control (RRC) connection request message. The Network identifier is a Public Land Mobile Network (PLMN) identifier. The PLMN identity comprises a country code and an operator code, different countries having different country codes and different operators having different operator codes. The Home Network identifier of the UE may be a Home Public Land Mobile Network (HPLMN) identifier of the UE. The Equivalent Home Network identifier of the UE may be an Equivalent Home Public Land Mobile Network (ELPLMN) identifier. Wherein the HPLMN identity of the UE may include: the country code and operator code of the UE's SIM card, and the EHPLMN identification of the UE may include the country code and equivalent operator code of the UE's SIM card. If the operator of the SIM card of the UE is china mobile, the HPLMN identifier of the UE may be 46000, and the EHPLMN identifier of the UE may be 46002, 46007, or 46008. If the operator of the SIM card of the UE is china unicom, the HPLMN identifier of the UE may be 46001, and the EHPLMN identifier of the UE may be 46003 or 46006.
S102, the UE receives the rejection message sent by the network equipment.
Specifically, the reject message may be a reject message that occurs when the network corresponding to the network identifier determined by the network device according to the network identifier and the identifier of the access technology does not support the access technology.
Therefore, the reject message may include a reject reason value corresponding to the reject reason of the reject message, where the reject reason may be that the network corresponding to the network identifier does not support the access technology.
The reject cause value may be the reject cause value 14 in the current communication protocol. If the access technology is an LTE access technology, the reject cause value may be an Evolved Packet System (EPS) service not allowed in a network corresponding to the network identifier. If the access technology is a 3G access technology, a General Packet Radio Service (GPRS) Service is not allowed in the network corresponding to the network identifier.
The reject cause value may also be a reject cause value 113 that is increased in 24.301 of current communication protocols, such as the third Generation Partnership Project (3 GPP) and 24.008 of 3 GPP. The reject reason may be that Packet Switch (PS) service is not allowed in the network corresponding to the home network identifier or the equivalent home network identifier. It should be noted that the increased rejection cause value may also be another cause value corresponding to the rejection cause, and is not limited to the rejection cause value 113.
S103, the UE puts the network identification and the identification of the access technology into a forbidden network list.
The UE puts the network identifier and the identifier of the access technology into the forbidden network list, and the forbidden network list forbids the UE to repeatedly request to access the cell of the access technology in the network corresponding to the network identifier, thereby avoiding the periodic network disconnection caused by repeated requests and ensuring the continuity of data service.
It should be noted that, in S102, the UE receives the reject message sent by the network device, and further sends a wireless access request message including the network identifier and a low-priority access technology of the access technology to the network device, so as to request the network device to determine that the network corresponding to the network identifier supports the low-priority access technology, and to access the UE to the cell of the low-priority access technology in the network corresponding to the network identifier.
Since the UE puts the network identifier and the identifier of the access technology into the forbidden network list in S103, no matter the UE is in a scenario of network search, network reselection, network redirection, network handover, or the like, even if the UE detects a signal of the access technology after accessing the cell of the low priority access technology, the UE does not send a wireless access request message including the network identifier and the identifier of the access technology to the network device, that is, does not request the network device to access the UE to the cell of the access technology in the network corresponding to the network identifier again, thereby avoiding a failure of accessing the cell of the access technology by the UE in the home network of the UE or the equivalent home network of the UE, resulting in a periodic network outage, improving the continuity of the network of the UE, ensuring the continuity of the data service of the UE, and improving the user experience. The network reselection may be a scenario in which the UE is switched from a low-priority network to a high-priority network in an idle state according to a parameter issued by the network device; the network redirection may be a scenario in which the UE selects a corresponding network according to an indication of the network device in a service state; the network switching may be a scenario in which the UE directly switches to a corresponding network according to an instruction of the network device in a service state.
The wireless access method provided by the embodiment of the invention can send a wireless access request message to network equipment through UE, wherein the wireless access request message comprises a network identifier where the UE is located and an identifier of an access technology, the network identifier is a home network identifier of the UE or an equivalent home network identifier of the UE, the UE receives a rejection message sent by the network equipment, the UE puts the network identifier and the identifier of the access technology into a forbidden network list, and the forbidden network list forbids the UE to repeatedly request to access a cell of the access technology in a network corresponding to the network identifier, so that the periodic network disconnection caused by repeated requests is avoided, and the continuity of data services is ensured.
Example two
The second embodiment of the invention also provides a wireless access method. Fig. 2 is a flowchart of a wireless access method according to a second embodiment of the present invention. As shown in fig. 2, on the basis of the method in the first embodiment, the method may further include:
s201, when the UE puts the network identifier and the identifier of the access technology into the forbidden network list, starting a timer.
S202, if the timer is over, the UE deletes the network identifier and the identifier of the access technology from the forbidden network list.
Optionally, the access technology is an LTE access technology.
Specifically, if the access technology is an LTE access technology, the low priority access technology of the access technology may be a 2nd-Generation (2G) or 3G access technology. The 2G Access technology may be, for example, a Code Division Multiple Access (CDMA) Access technology or a Global System for Mobile communications (GSM) Access technology. The 3G Access technology may be, for example, a CDMA2000 Access technology, a Wideband Code Division Multiple Access (WCDMA) technology, a Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) technology, or a Worldwide Interoperability for Microwave Access (WiMAX) technology.
Optionally, the step S103 of the method in the first embodiment of the present invention that the UE puts the network identifier and the identifier of the access technology into the forbidden network list may include:
the UE puts a Tracking Area Identity (TAI) of the UE and an identity of the access technology into the forbidden network list; the TAI includes a Tracking Area Code (TAC) of the UE in a network corresponding to the network identifier.
Specifically, the network identifier corresponding network includes a plurality of TAs, and each TA has one TAC. If the network identifier and the identifier of the access technology are put into the forbidden network list, all TACs and identifiers of the access technology in the network corresponding to the network identifier are actually put into the forbidden network list, that is, the UE is forbidden to repeatedly request to access the cell of the access technology in all TAs in the network corresponding to the network identifier through the forbidden network list. However, the UE may only exist in one TA at a time, and if the network identifier and the identifier of the access technology are put into the forbidden network list, the UE may be affected to use in other TAs.
In the second embodiment of the present invention, because the TAI includes the TAC of the UE in the network corresponding to the network identifier, the UE places the TAI of the UE and the identifier of the access technology into the prohibited network list, and actually places the TAC of the network corresponding to the network identifier and the identifier of the access technology into the prohibited network list, so that the UE is prohibited by the prohibited network list from repeatedly requesting to access the access technology in a TA cell of the network corresponding to the network identifier, which can avoid a periodic network disconnection caused by repeated requests, ensure the continuity of data services, and also ensure the normal use of the UE in other TAs of the network corresponding to the network identifier.
EXAMPLE III
The third embodiment of the invention provides a wireless access method. Fig. 3 is a flowchart of a wireless access method according to a third embodiment of the present invention. As shown in fig. 3, the method may include:
s301, UE sends a wireless access request message to network equipment, wherein the wireless access request message comprises: the network identifier of the UE and the identifier of the LTE access technology; the network identity is the HPLMN identity of the UE or the EHPLMN identity of the UE.
S302, the UE receives a reject message sent by the network device, where the reject message includes a reject cause value 14.
S303, the UE modifies the reject cause value 14 to the reject cause value 113.
It should be noted that, in the third embodiment of the present invention, a situation that the reject reason value 113 is newly added is described, if the reject reason value 14 in the existing communication protocol is adopted, there is no operation in S303 that the UE modifies the reject reason value 14 into the reject reason value 113, and after S302, the following S304 is executed.
S304, the UE starts a timer and puts both the TAI of the UE and the identification of the LTE access technology into a forbidden network list; wherein, the TAI of the UE includes the TAC of the UE in the network corresponding to the network identifier.
S305, if the timer is over, the UE deletes the TAI of the UE and the identifier of the LTE access technology from the forbidden network list.
In the wireless access method provided by the third embodiment of the present invention, the method of the first embodiment or the second embodiment is described by specific examples, and the beneficial effects are similar to those of the above embodiments, and are not described again here.
Example four
The fourth embodiment of the invention provides UE. The UE of the fourth embodiment of the present invention may execute the wireless access method of any one of the first to third embodiments. Fig. 4 is a schematic structural diagram of a UE according to a fourth embodiment of the present invention. As shown in fig. 4, the UE 400 may include: a sending module 401, a receiving module 402 and an adding module 403.
The sending module 401 is configured to send a wireless access request message to a network device, where the wireless access request message includes: the network identifier and the access technology identifier of the UE; the network identity is a home network identity of the UE or an equivalent home network identity of the UE.
A receiving module 402, configured to receive a rejection message sent by the network device.
An adding module 403, placing the network identifier and the identifier of the access technology into a forbidden network column by the UE.
Optionally, the UE 400 further includes:
a starting module, which starts a timer when the adding module 403 puts the network identifier and the identifier of the access technology into the forbidden network list.
And the deleting module deletes the network identifier and the identifier of the access technology from the forbidden network list if the timer is overtime.
Optionally, the access technology is an LTE access technology.
Optionally, the adding module 403 is further configured to put the TAI of the UE and the identifier of the access technology into the forbidden network list; the TAI includes the TAC of the UE in the network corresponding to the network identifier.
The UE of the fourth embodiment of the present invention may execute the wireless access method of any one of the first to third embodiments, and the beneficial effects thereof are similar to those of the above embodiments, and are not repeated here.
EXAMPLE five
The fifth embodiment of the invention also provides the UE. The UE of the fifth embodiment of the present invention may execute the wireless access method of any one of the first to third embodiments. Fig. 5 is a schematic structural diagram of a UE according to a fifth embodiment of the present invention. As shown in fig. 5, UE 500 may include: a receiver 501, a processor 502, and a transmitter 503.
The transmitter 503 is configured to send a wireless access request message to a network device, where the wireless access request message includes: the network identifier and the access technology identifier of the UE; the network identity is a home network identity of the UE or an equivalent home network identity of the UE.
A receiver 501, configured to receive a rejection message sent by the network device.
A processor 502 for placing the network identification and the identification of the access technology in a forbidden network list.
Optionally, the processor 502 is further configured to start a timer when the network identifier and the identifier of the access technology are placed in the prohibited network list; if the timer is overtime, the network identification and the identification of the access technology are deleted from the forbidden network list.
Optionally, the access technology is an LTE access technology.
Optionally, the processor 502 is further configured to put the TAI of the UE and the identifier of the access technology into the forbidden network list; the TAI includes the TAC of the UE in the network corresponding to the network identifier.
The UE in the fifth embodiment of the present invention can execute the wireless access method in any one of the first to third embodiments, which has similar beneficial effects to the foregoing embodiments and will not be described again here.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (6)

1. A wireless access method, comprising:
user Equipment (UE) sends a wireless access request message to network equipment, wherein the wireless access request message comprises: the network identifier of the UE and the identifier of the access technology; the network identification is the home network identification of the UE or the equivalent home network identification of the UE;
the UE receives a rejection message sent by the network equipment, wherein the rejection message is generated when the network corresponding to the network identifier determined by the network equipment according to the network identifier and the identifier of the access technology does not support the access technology;
the UE puts the network identification and the identification of the access technology into a forbidden network list;
wherein the UE placing the network identifier and the identifier of the access technology into a forbidden network list comprises:
the UE puts the tracking area identification TAI of the UE and the identification of the access technology into the forbidden network list; the TAI comprises a Tracking Area Code (TAC) of the UE in a network corresponding to the network identification;
the method further comprises the following steps:
when the UE puts the network identifier and the identifier of the access technology into the forbidden network list, starting a timer;
and if the timer is overtime, the UE deletes the network identifier and the identifier of the access technology from the forbidden network list.
2. The method of claim 1, wherein the access technology is a Long Term Evolution (LTE) access technology.
3. A User Equipment (UE), comprising:
a sending module, configured to send a wireless access request message to a network device, where the wireless access request message includes: the network identifier of the UE and the identifier of the access technology; the network identification is the home network identification of the UE or the equivalent home network identification of the UE;
a receiving module, configured to receive a rejection message sent by the network device, where the rejection message is a rejection message that occurs when a network corresponding to the network identifier, which is determined by the network device according to the network identifier and the identifier of the access technology, does not support the access technology;
an adding module, which puts the network identifier and the identifier of the access technology into a forbidden network column by the UE;
the adding module is further configured to put a Tracking Area Identity (TAI) of the UE and an identity of the access technology into the forbidden network list; the TAI comprises a Tracking Area Code (TAC) of the UE in a network corresponding to the network identification;
the UE further comprises:
a starting module, configured to start a timer when the adding module puts the network identifier and the identifier of the access technology into the prohibited network list;
and the deleting module deletes the network identifier and the identifier of the access technology from the forbidden network list if the timer is overtime.
4. The UE of claim 3, wherein the access technology is a Long Term Evolution (LTE) access technology.
5. A User Equipment (UE), comprising: a receiver, a processor, and a transmitter;
wherein the transmitter is configured to send a wireless access request message to a network device, where the wireless access request message includes: the network identifier of the UE and the identifier of the access technology; the network identification is the home network identification of the UE or the equivalent home network identification of the UE;
the receiver is configured to receive a rejection message sent by the network device, where the rejection message is a rejection message that occurs when a network corresponding to the network identifier, which is determined by the network device according to the network identifier and the identifier of the access technology, does not support the access technology;
the processor is configured to put the network identifier and the identifier of the access technology into a forbidden network list;
the processor is further configured to place a Tracking Area Identity (TAI) of the UE and an identity of the access technology into the forbidden network list; the TAI comprises a Tracking Area Code (TAC) of the UE in a network corresponding to the network identification;
the processor is further configured to start a timer when the network identifier and the identifier of the access technology are placed in the forbidden network list; and if the timer is overtime, deleting the network identifier and the identifier of the access technology from the forbidden network list.
6. The UE of claim 5, wherein the access technology is a Long Term Evolution (LTE) access technology.
CN201580024280.2A 2015-02-12 2015-02-12 Wireless access method and user equipment Active CN106465433B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/072918 WO2016127366A1 (en) 2015-02-12 2015-02-12 Wireless access method and user equipment

Publications (2)

Publication Number Publication Date
CN106465433A CN106465433A (en) 2017-02-22
CN106465433B true CN106465433B (en) 2020-12-25

Family

ID=56614027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580024280.2A Active CN106465433B (en) 2015-02-12 2015-02-12 Wireless access method and user equipment

Country Status (2)

Country Link
CN (1) CN106465433B (en)
WO (1) WO2016127366A1 (en)

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101594663B (en) * 2008-05-31 2012-05-23 华为技术有限公司 Method, system and device of network selection
CN101877904A (en) * 2009-04-30 2010-11-03 联芯科技有限公司 Multimode terminal and communication method thereof
CN102083057A (en) * 2009-11-30 2011-06-01 中国移动通信集团公司 Method and device for controlling mode state of dual-mode terminal
CN103155633B (en) * 2010-10-06 2016-04-13 富士通株式会社 Air station, communication system and communication means
JP2012129956A (en) * 2010-12-17 2012-07-05 Ntt Docomo Inc Mobile communication method and mobile management node
US20120202492A1 (en) * 2011-02-03 2012-08-09 Renesas Mobile Corporation Method and apparatus for enabling identification of a rejecting network in connection with registration area updating
CN102421099B (en) * 2011-07-25 2017-07-14 中兴通讯股份有限公司 A kind of access system and method for merging different access technologies
CN102595556B (en) * 2012-02-29 2015-01-14 电信科学技术研究院 Method and device for transmission control on session management request message
CN103369605B (en) * 2012-04-09 2019-01-22 中兴通讯股份有限公司 A kind of method and user equipment of cell reselection
CN102724735A (en) * 2012-05-28 2012-10-10 中兴通讯股份有限公司 Method, device and terminal for selecting public land mobile network (PLMN)
CN104081822B (en) * 2012-10-26 2018-06-26 华为技术有限公司 It eats dishes without rice or wine to connect the method, apparatus and system redirected between system

Also Published As

Publication number Publication date
CN106465433A (en) 2017-02-22
WO2016127366A1 (en) 2016-08-18

Similar Documents

Publication Publication Date Title
US11109217B2 (en) Method for determining target, network element, and system for determining target
US11089528B2 (en) Method, apparatus, and system for selecting public land mobile network
AU2013232943B2 (en) Method and system for selective access control with ensured service continuity guarantees
US20210235346A1 (en) Cell selection/reselection by a user equipment trying to camp on a radio cell of a public land mobile network
US9313726B2 (en) Method and apparatus for searching for network
US20140235241A1 (en) Eplmn transition mechanism for manual network registration
CN104796962B (en) Network selection method and device
US20150050924A1 (en) Mobile station, method for controlling mobile station, mobile communication system, mobility management apparatus, and computer-readable medium
RU2745326C1 (en) Cell selection method and terminal device
CN111556589B (en) Communication method, terminal and access network equipment
KR101982425B1 (en) Method, apparatus and system
GB2496611A (en) Mobile device storing information about a first PLMN before undergoing circuit switched fall back to a second PLMN to enable later reconnection to first PLMN
EP3110206B1 (en) Data processing method and device for user equipment
CN109451577B (en) Network communication method and equipment
CN106465433B (en) Wireless access method and user equipment
CN106465253B (en) Cell selection method and device
CN110891297A (en) Network indication method, search method and device, storage medium, network equipment and terminal
EP3001726B1 (en) Single radio voice call continuity operating method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant