CN109005568B - Forbidden list processing method and device, storage medium, terminal and base station - Google Patents

Forbidden list processing method and device, storage medium, terminal and base station Download PDF

Info

Publication number
CN109005568B
CN109005568B CN201710422349.8A CN201710422349A CN109005568B CN 109005568 B CN109005568 B CN 109005568B CN 201710422349 A CN201710422349 A CN 201710422349A CN 109005568 B CN109005568 B CN 109005568B
Authority
CN
China
Prior art keywords
list
forbidden list
forbidden
user equipment
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710422349.8A
Other languages
Chinese (zh)
Other versions
CN109005568A (en
Inventor
萨穆利·海基宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CN201710422349.8A priority Critical patent/CN109005568B/en
Publication of CN109005568A publication Critical patent/CN109005568A/en
Application granted granted Critical
Publication of CN109005568B publication Critical patent/CN109005568B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0216Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A forbidden list processing method and device, a storage medium, a terminal and a base station are provided, and the method comprises the following steps: receiving indication information sent by a network; deleting at least a portion of the content recorded in the forbidden list based on the indication information. The scheme provided by the invention can better optimize signaling overhead and effectively reduce the power consumption of the user equipment.

Description

Forbidden list processing method and device, storage medium, terminal and base station
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for processing a forbidden list, a storage medium, a terminal, and a base station.
Background
Based on the existing communication technology, after a User Equipment (User Equipment, abbreviated UE) attempts to access a Public Land Mobile Network (PLMN) and is rejected, the PLMN is added into a list, and the User Equipment does not attempt to access PLMNs (i.e. s PLMNs, where s is greater than or equal to 1) recorded in the list in a subsequent registration attempt, and the list may be referred to as a Forbidden PLMN list (FPLMN list). Similar lists are also arranged in registration areas (including location areas, routing areas, tracking areas, etc.). These lists are collectively referred to as forbidden lists according to the latest protocol of the third Generation Partnership Project (3rd Generation Partnership Project, 3GPP), which is advantageous for improving the registration efficiency of the user equipment. However, in practical applications, these forbidden lists have many disadvantages, such as increased power consumption and signaling overhead of the ue.
Taking the FPLMN list as an example, based on the existing scheme, the user equipment can delete the FPLMN list only at a specific time, and after deleting the FPLMN list, the user equipment performs an action of searching for a PLMN, which is very power consuming. The specific time may be when a timer (a timer configured specifically for the FPLMN list, such as a T3245 timer) expires or when a specific event occurs (for example, some user equipments may not configure the T3245 timer, and may only use the specific event specified by the existing protocol as a trigger condition for triggering a deletion action of deleting the FPLMN list).
However, these specific times are predetermined based on the protocol, and in practical applications, in most cases, the signal quality of the PLMN where the user equipment is located may be very good when the specific time comes, and it is not necessary to delete the FPLMN list to search for a PLMN again. If the existing scheme is still used, the search action is forcibly triggered when the ue does not actually need to search the PLMN, which may greatly waste the power consumption of the ue and is not favorable for saving the power consumption of the ue (also referred to as power consumption).
Disclosure of Invention
The technical problem solved by the invention is how to optimize the processing logic of the forbidden list so as to more effectively reduce the signaling overhead and the power consumption of the user equipment.
To solve the foregoing technical problem, an embodiment of the present invention provides a method for processing a forbidden list, including: receiving indication information sent by a network; deleting at least a portion of the content recorded in the forbidden list based on the indication information.
Optionally, before receiving the indication information sent by the network, the method for processing the forbidden list further includes: and reporting the registration information of the currently registered sub-network to the network.
Optionally, the indication information is sent by a message or data.
Optionally, the message includes an access stratum message, a non-access stratum message, or a message specifically used for indicating deletion of the forbidden list.
Optionally, the data includes data transmitted based on an application layer.
Optionally, the forbidden list includes at least one sub-list, and the indication information is used to indicate one or more sub-lists in the at least one sub-list.
Optionally, the deleting at least a part of the content recorded in the forbidden list based on the indication information includes: deleting one or more sub-lists indicated in the indication information in the forbidden list.
Optionally, the forbidden list includes at least one sub-list, each sub-list includes one or more elements, and the indication information is used to indicate an element to be deleted.
Optionally, the deleting at least a part of the content recorded in the forbidden list based on the indication information includes: determining a to-be-processed sub-list according to the indication information, wherein the to-be-processed sub-list comprises the to-be-deleted elements; and deleting the elements to be deleted indicated in the indication information from the to-be-processed sub-list.
An embodiment of the present invention further provides a device for processing a forbidden list, including: the receiving module is used for receiving the indication information sent by the network; and the deleting module is used for deleting at least one part of content recorded in the forbidden list based on the indication information.
Optionally, the apparatus for processing a forbidden list further includes: and the reporting module is used for reporting the registration information of the currently registered sub-network to the network before receiving the indication information sent by the network.
Optionally, the indication information is sent by a message or data.
Optionally, the message includes an access stratum message, a non-access stratum message, or a message specifically used for indicating deletion of the forbidden list.
Optionally, the data includes data transmitted based on an application layer.
Optionally, the forbidden list includes at least one sub-list, and the indication information is used to indicate one or more sub-lists in the at least one sub-list.
Optionally, the deleting module includes: a first deletion submodule, configured to delete, in the forbidden list, one or more sub-lists indicated in the indication information.
Optionally, the forbidden list includes at least one sub-list, each sub-list includes one or more elements, and the indication information is used to indicate an element to be deleted.
Optionally, the deleting module includes: the determining submodule is used for determining a to-be-processed sub-list according to the indication information, and the to-be-processed sub-list contains the to-be-deleted elements; and the second deletion sub-module deletes the element to be deleted indicated in the indication information from the to-be-processed sub-list.
The embodiment of the invention also provides a forbidden list processing method, which comprises the following steps: determining whether the user equipment needs to be instructed to process the forbidden list; and when the judgment result shows that the user equipment needs to be instructed to process the forbidden list, sending instruction information to the user equipment, wherein the instruction information is used for instructing the user equipment to delete at least part of content recorded in the forbidden list.
Optionally, before determining whether the user equipment needs to be instructed to process the forbidden list, the forbidden list processing method further includes: receiving registration information of a currently registered sub-network reported by user equipment; the determining whether the user equipment needs to be instructed to process the forbidden list comprises: and judging whether the user equipment needs to be instructed to process the forbidden list or not according to the registration information.
An embodiment of the present invention further provides a device for processing a forbidden list, including: the judging module is used for judging whether the user equipment needs to be instructed to process the forbidden list or not; and the sending module is used for sending indication information to the user equipment when the judgment result shows that the user equipment needs to be indicated to process the forbidden list, wherein the indication information is used for indicating the user equipment to delete at least part of content recorded in the forbidden list.
Optionally, the apparatus for processing a forbidden list further includes: a registration information receiving module, configured to receive, before determining whether the user equipment needs to be instructed to process the forbidden list, registration information of a currently registered subnet reported by the user equipment; the judging module comprises: and the judging submodule is used for judging whether the user equipment needs to be instructed to process the forbidden list or not according to the registration information.
The embodiment of the present invention further provides a storage medium, on which computer instructions are stored, and when the computer instructions are executed, the steps of the first forbidden list processing method are executed.
The embodiment of the present invention further provides a storage medium, on which computer instructions are stored, and when the computer instructions are executed, the steps of the second forbidden list processing method are executed.
The embodiment of the present invention further provides a terminal, which includes a memory and a processor, where the memory stores a computer instruction capable of running on the processor, and the processor executes the steps of the first forbidden list processing method when running the computer instruction.
The embodiment of the present invention further provides a base station, which includes a memory and a processor, where the memory stores a computer instruction capable of running on the processor, and the processor executes the steps of the second forbidden list processing method when running the computer instruction.
Compared with the prior art, the technical scheme of the embodiment of the invention has the following beneficial effects:
receiving indication information sent by a network; deleting at least a portion of the content recorded in the forbidden list based on the indication information. Compared with the prior art, which can only process (e.g. delete) the forbidden list when a specific time (predetermined according to a protocol) arrives, the technical solution of the embodiment of the present invention allows the user equipment to process the forbidden list more flexibly, for example, whether to trigger the deletion operation of the forbidden list can be determined according to the indication of the network, so as to optimize signaling overhead. Further, different from the prior art, the technical solution of the embodiment of the present invention also allows the user equipment to process only a part of the contents in the forbidden list, thereby effectively reducing the power consumption (or power consumption) of the user equipment.
Further, the indication information may be sent through a message or data, so as to better save signaling overhead. For example, the message may include Access Stratum (AS) signaling, non-Access Stratum (NAS) signaling, a message dedicated to indicating deletion of the forbidden list; as another example, the data may include data transmitted based on an application layer.
Drawings
FIG. 1 is a diagram of an application scenario for processing a forbidden list in the prior art;
FIG. 2 is a schematic diagram of another prior art application scenario for handling a forbidden list;
FIG. 3 is a flowchart of a forbidden list processing method according to a first embodiment of the present invention;
FIG. 4 is a diagram of an application scenario for processing a forbidden list according to a first embodiment of the present invention;
FIG. 5 is a schematic diagram of an application scenario for processing a forbidden list using the first embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a forbidden list processing device according to a second embodiment of the present invention;
FIG. 7 is a flowchart of a forbidden list processing method according to a third embodiment of the present invention;
fig. 8 is a schematic structural diagram of a forbidden list processing device according to a fourth embodiment of the present invention.
Detailed Description
As will be appreciated by those skilled in the art, as mentioned in the background, the existing processing logic for the forbidden list is still limited to a specific time preset by the protocol as a trigger condition, and the forbidden list can be processed by the user equipment only when the specific time comes.
Taking Forbidden PLMN Lists (FPLMN Lists for short) as an example, based on the existing scheme, for a ue configured with a T3245 timer (a timer configured specifically for FPLMN Lists), the FPLMN list can be deleted only when the T3245 timer expires.
For example, referring to fig. 1, the user equipment 1 configures the T3245 timer, and when the registration attempt for a PLMN in the network 2 fails (e.g. receives any reason related to forbidden PLMN sent by the network 2 (e.g. attach reject, tracking area update reject, service reject, etc.)), the user equipment 1 performs action s1 to add the PLMN attempting access this time to the appropriate FPLMN list; and the user equipment 1 further performs action s2 to activate the T3245 timer. When the T3245 timer expires (which may also be referred to as expired), the user equipment 1 performs action s3 to delete all PLMNs recorded in the FPLMN list; and the user equipment 1 also performs action s4 to start the cell selection procedure.
However, in practical applications, the time set by the T3245 timer may be long (for example, the time set by the T3245 timer may be as long as 24 hours), and if the network wishes to delete the FPLMN list during this period, so that the ue may search all PLMNs (for example, the network considers that the signal quality of the PLMN where the ue is currently located is poor, and needs to perform PLMN search again), the existing scheme cannot meet this requirement of the network. Even if the signal quality of the PLMN where the ue is located is very good when the T3245 timer expires, and the ue does not need to delete the FPLMN list to search for the PLMN again, based on the prior art, the ue must delete the FPLMN list and search for the PLMN again when the T3245 timer expires, which certainly causes a great waste in power consumption and power consumption of the ue.
Alternatively, in some cases, some user equipments may not configure the T3245 timer, for example, referring to fig. 2, the user equipment 1 does not configure the T3245 timer, and when the registration attempt for a PLMN in the network 2 fails (e.g. when any reason related to the forbidden PLMN sent by the network 2 is received (e.g. attach reject, tracking area update reject, service reject, etc.), the user equipment 1 performs action s1 to add the PLMN attempting access to the appropriate FPLMN list. However, unlike the scenario described in fig. 1, since the user equipment 1 is not configured with the T3245 timer in this scenario, the FPLMN list is not erased after a period of time. Further, in this scenario, the ue 1 can only perform the action of deleting the FPLMN list based on some specific events (determined based on the existing protocol, for example, when a Universal Subscriber Identity Module (USIM) changes), and if the specific events do not occur, the network 2 also wants to delete the FPLMN list, the prior art also fails to meet the requirement of the network.
On the other hand, in practical applications, after the FPLMN list is deleted, the ue needs to perform an action of searching for a PLMN again, which is very power consuming, and based on the prior art, if the T3245 timer expires or a specific event occurs, the ue does not need to search for a PLMN but searches for the PLMN actually, which wastes power of the ue greatly and is not favorable for saving power consumption.
In summary, the existing solution may cause the problem that the FPLMN list of the ue is forcibly deleted when it is not needed to be deleted, but cannot be deleted when it is needed to be deleted, so that for the ue, if the solution in the prior art is still used to process the forbidden list, it will inevitably cause a great signaling overhead and power consumption.
The inventor has analyzed and found that the problem of the prior art is that the processing logic for the forbidden list is not flexible enough to effectively reduce the signaling overhead and the power consumption of the user equipment.
In order to solve the technical problem, the technical scheme of the embodiment of the invention receives indication information sent by a network; deleting at least a portion of the content recorded in the forbidden list based on the indication information. Those skilled in the art understand that the technical solution of the embodiment of the present invention allows the user equipment to process the forbidden list more flexibly, for example, whether to trigger a deletion operation of the forbidden list may be determined according to an indication of the network, so as to optimize signaling overhead. Further, different from the prior art, the technical solution of the embodiment of the present invention also allows the user equipment to process only a part of the contents in the forbidden list, thereby effectively reducing the power consumption (or power consumption) of the user equipment.
Further, the indication information may be sent through a message or data, so as to better save signaling overhead. For example, the message may include Access Stratum (AS) signaling, non-Access Stratum (NAS) signaling, a message dedicated to indicating deletion of the forbidden list; as another example, the data may include data transmitted based on an application layer.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Fig. 3 is a flowchart of a forbidden list processing method according to a first embodiment of the present invention. The forbidden list may be a list (also referred to as a set) of networks to which access is prohibited in a process of interaction between User Equipment (User Equipment, abbreviated as UE) and the networks; the network may include at least one sub-network, each sub-network may serve user equipment in its signal coverage area, the signal coverage areas of a plurality of sub-networks (e.g., adjacent sub-networks) may have an overlapping area, and the user equipment in the overlapping area may select one sub-network from the plurality of sub-networks for information interaction; for the user equipment side, when the user equipment attempts to access a sub-network but is rejected (i.e. registration in the sub-network fails), the user equipment may add the sub-network to a forbidden list stored locally in the user equipment, and in the following registration attempt, the user equipment will not attempt to register to the sub-network recorded in the forbidden list.
Therefore, the forbidden list may be a list of prohibited access subnets. Taking a Public Land Mobile Network (PLMN) as an example, the Network may include s PLMNs (s ≧ 1), and the forbidden list may include a list of PLMNs to which access is forbidden (forbidden PLMNs).
Further, the list of PLMNs to which access is prohibited may include a forbidden PLMN list (forbidden PLMN list), a list of forbidden PLMNs to be attached in the S101 mode, a list of forbidden PLMNs to be used in a General Packet Radio Service (GPRS), and the like.
It should be noted that, although the embodiment specifically explains the forbidden PLMN list (hereinafter, abbreviated as FPLMN list) in the forbidden PLMN list as an example, this does not mean that the technical solution of the embodiment of the present invention is only applicable to the forbidden PLMN list, and the technical solution of the embodiment of the present invention can also be applied to other forbidden PLMNs besides the forbidden PLMN list, for example, a forbidden PLMN list based on a registration area, a location area, a routing area, a tracking area, and the like.
Specifically, in this embodiment, the method for processing the forbidden list may be implemented as follows:
step S101, receiving indication information sent by a network.
Step S102, based on the indication information, deleting at least a part of the content recorded in the forbidden list.
Further, the indication information is used to instruct the user equipment to delete at least a part of the content (e.g., at least a part of the PLMN) recorded in the forbidden list (e.g., FPLMN list) associated therewith.
Further, the indication information may be transmitted through a message.
In a preferred example, the message (also referred to AS signaling) may include an Access Stratum (AS) message, a non-Access Stratum (NAS) message, and other existing messages. For example, the network may place the indication information in a reserved bit of an access stratum message sent to the ue, and the ue may obtain the indication information from the reserved bit according to a pre-agreement with the network after receiving the access stratum message (e.g., the network may pre-agree with the ue about a placement position and a placement manner of the indication information). Preferably, the access stratum message or the non-access stratum message may include a paging indication (paging indication), a direct indication (direct indication), a Tracking Area Update (Tracking Area Update, TAU for short), an Attach (Attach), and the like, and those skilled in the art may also change further embodiments according to actual needs, which is not described herein.
As a variant, the message may also comprise a new message dedicated to indicating deletion of the forbidden list, wherein the new message may be sent by the network to the user equipment separately.
Further, the indication information may also be transmitted through data. In a preferred example, the data may include data transmitted based on an application level (application level). For example, the network may add the indication information in data sent to an application layer, which is routed to a modem of the user equipment, which obtains the indication information based on its modem resolution.
As a variation, the data may also be transmitted to the user equipment via Over-the-Air Technology (OTA) or OPEN MOBILE ALLIANCE (OMA).
Further, the forbidden list may include at least one sub-list, and the indication information is used to indicate one or more sub-lists in the at least one sub-list. Taking the list of the PLMN which is prohibited from accessing as an example, the list of the PLMN which is prohibited from accessing may include a forbidden PLMN list, a list of forbidden PLMNs for attaching in the S101 mode, and a list of forbidden PLMNs for general packet radio service technology, and so on, and the indication information may be used to indicate the forbidden PLMN list therein; alternatively, the indication information may be used to indicate a list of forbidden PLMNs and a list of forbidden PLMNs for general packet radio service technology.
In a preferred application scenario, the step S102 may include: deleting one or more sub-lists indicated in the indication information in the forbidden list. For example, the indication information is used to indicate a forbidden PLMN list in at least one sub-list included in the list of PLMNs to which access is prohibited, and the user equipment deletes the forbidden PLMN list after receiving the indication information, and retains other sub-lists included in the list of PLMNs to which access is prohibited except for the forbidden PLMN list.
In a variation of this embodiment, the forbidden list may include at least one sub-list, each sub-list includes one or more elements, and the indication information is used to indicate an element to be deleted. Taking the list of the PLMN to be barred from access as an example, the list of the PLMN to be barred from access may include a forbidden PLMN list, a list for a forbidden PLMN attached in the S101 mode, and a list for a forbidden PLMN of a general packet radio service technology, and multiple sublists, where each sublist includes one or more PLMNs, and the indication information is used to indicate a specific PLMN to be deleted.
In a preferred application scenario of this variation, the step S102 may include: determining a to-be-processed sub-list according to the indication information, wherein the to-be-processed sub-list comprises the to-be-deleted elements; and deleting the elements to be deleted indicated in the indication information from the to-be-processed sub-list. For example, the network may not be able to determine a specific storage location of a PLMN to be deleted, which is desired to be deleted by the user equipment (i.e., the network does not know in which sub-list the PLMN to be deleted is stored by the user equipment), the network informs the user equipment of the PLMN to be deleted, which needs to be processed this time, through the indication information, the user equipment determines the storage location of the PLMN to be deleted, determines the sub-list in which the PLMN to be deleted is recorded as the sub-list to be processed, and then deletes the PLMN to be deleted from the sub-list to be processed.
Further, there may be more than one element to be deleted, and multiple elements to be deleted may be recorded in the same or different sub-lists, so for each element to be deleted, the user equipment determines the sub-list where the element to be deleted is located as the sub-list to be processed, and deletes the element to be deleted from the sub-list to be processed.
In another preferred application scenario of this variation, the indication information may also indicate the to-be-deleted sub-list, but the indication information does not explicitly indicate the to-be-deleted element that needs to be deleted in the to-be-processed sub-list, but indicates the user equipment by way of an indication condition, and the user equipment determines, according to the indication condition, one or more elements that meet the indication condition from the to-be-processed sub-list as the to-be-deleted element, and then deletes the to-be-deleted element indicated by the indication information from the to-be-processed sub-list.
For example, the network wants the user equipment to delete a part of elements in a sub-list, and the network does not know which PLMNs are specifically stored in the list of the forbidden PLMNs attached in the S101 mode of the user equipment, but the network also wants the user equipment to delete one or more PLMNs in a specific signal coverage range in the sub-list, the network informs, through the indication information, that the to-be-deleted PLMN that the user equipment needs to process this time is a PLMN whose signal coverage range is in the specific signal coverage range (i.e., the indication condition), the user equipment determines, as the to-be-deleted PLMN, a PLMN that satisfies the indication condition in the list of the forbidden PLMNs attached in the S101 mode that is stored in the user equipment, and then deletes the to-be-deleted PLMN from the list of the forbidden PLMNs attached in the S101 mode.
In another variation of this embodiment, before executing step S101, the following steps may be further executed: and reporting the registration information of the currently registered sub-network to the network. Wherein the network may be a main network of the sub-network (e.g., the sub-network may correspond to a cell, and a set of signal coverage of each of a plurality of cells may correspond to the signal coverage of the main network), which is used for upper-level control of data interaction of the sub-network with a user equipment. For example, the user equipment may report information of the currently registered sub-network to the network after completing registration or during data interaction with the sub-network after completing registration, and if the network considers that the sub-network where the user equipment is currently camped is not a necessary and best network (e.g., determined based on an updated roaming agreement), the network may instruct the user equipment to delete the forbidden list to (also referred to as re-) select a sub-network from the beginning (i.e., re-perform cell selection).
Further, referring to fig. 4, in a typical application scenario adopting this embodiment, the user equipment 1 configures a T3245 timer, and when a registration attempt for a PLMN in the network 2 fails (e.g., when any reason (e.g., attach reject, tracking area update reject, service reject, etc.) related to a forbidden PLMN sent by the network 2 is received), the user equipment 1 performs an action s1 to add the PLMN attempting access this time to an appropriate FPLMN list; and the user equipment 1 further performs action s2 to activate the T3245 timer. Unlike the prior art, before the T3245 timer expires, the network 2 may send an indication message to the user equipment 1 through the access stratum message or the non-access stratum message to instruct the user equipment 1 to delete at least a part of the contents in the forbidden list stored by the user equipment 1.
Further, the user equipment 1 may perform an action s5 to stop the T3245 timer after receiving the indication information sent by the network 2; and an action s6 is performed to delete at least a part of the content in the forbidden list according to the indication information. Further, the user equipment 1 may also perform action s7 to start a cell selection procedure.
In a variation of the present application scenario, the execution order of the actions s5 and s6 may be interchanged, or the actions s5 and s6 may be executed synchronously.
Further, referring to fig. 5, in another exemplary application scenario adopting this embodiment, the user equipment 1 does not configure the T3245 timer, or the user equipment 1 does not support the T3245 timer, when the registration attempt for one PLMN in the network 2 fails (for example, when any reason related to the forbidden PLMN (for example, attach reject, tracking area update reject, service reject, and the like) sent by the network 2 is received), similar to the prior art, the user equipment 1 performs an action s1 to add the PLMN attempting access this time to the appropriate FPLMN list. However, unlike the prior art, according to the technical solution of the present embodiment, the ue 1 does not have to wait for a specific event to occur, but can process the stored forbidden list based on the indication information of the network 2.
For example, when the network 2 considers that the signal quality of the sub-network where the user equipment 1 currently resides (may also be referred to as camping) is not good, an indication message may be sent to the user equipment 1 through the access stratum message or the non-access stratum message to instruct the user equipment 1 to delete at least a part of the contents in the forbidden list stored by the user equipment 1, so that the user equipment 1 can register to the sub-network with better signal quality when cell selection is restarted.
Further, the user equipment 1 may perform an action s6, after receiving the indication information sent by the network 2, to delete at least a part of the content in the forbidden list according to the indication information. Further, the user equipment 1 may also perform action s7 to start a cell selection procedure.
With continuing reference to fig. 4 and 5, the indication may preferably be sent based on the access stratum message or a non-access stratum message, and may also be sent based on a new message dedicated to indicating deletion of the forbidden list.
Preferably, the indication information may be used to indicate specific list information (e.g. one or more sub-lists in the forbidden list, or elements included in one or more sub-lists) to further optimize the behavior of the user equipment 1.
In one common variant of the application scenarios shown in fig. 4 and 5, the indication information may also be sent by data, which may be based on application layer, OTA or OMA transmission, for example.
In yet another common variation of the application scenarios shown in fig. 4 and fig. 5, before sending the indication information, the network 2 may first receive registration information reported by the user equipment 1 in a sub-network, so as to determine whether to send the indication information according to the registration information.
Thus, with the solution of the first embodiment, the ue does not necessarily support a T3245 timer, or must wait until a specific event occurs to process its stored forbidden list, but can process the forbidden list whenever necessary according to the indication of the network. Further, whether the T3245 timer is configured by the user equipment or whether the configured T3245 timer expires, when the network determines that the forbidden list needs to be processed, the indication information may be sent by a message or data to indicate the user equipment to process the forbidden list in time. Those skilled in the art understand that, according to the technical solution of the present embodiment, while optimizing the processing logic of the forbidden list, signaling overhead is effectively reduced, and power consumption of the user equipment is better saved.
Fig. 6 is a schematic structural diagram of a forbidden list processing device according to a second embodiment of the present invention. Those skilled in the art understand that the forbidden list processing device 6 of the present embodiment is used for implementing the method technical solutions described in the embodiments shown in fig. 3 to fig. 5. Specifically, in this embodiment, the forbidden list processing device 6 includes a receiving module 62, configured to receive indication information sent by a network; a deleting module 63, configured to delete at least a part of the content recorded in the forbidden list based on the indication information.
Further, the forbidden list processing device 6 further includes a reporting module 61, configured to report the registration information of the currently registered subnet to the network before receiving the indication information sent by the network.
Further, the indication information is sent by a message or data.
Preferably, the message comprises an access stratum message, a non-access stratum message or a message dedicated to indicating deletion of the forbidden list.
Preferably, the data comprises data transmitted based on an application layer.
Further, the forbidden list comprises at least one sub-list, and the indication information is used for indicating one or more sub-lists in the at least one sub-list.
In a preferred embodiment, the deleting module 63 includes a first deleting submodule 631 configured to delete one or more sub-lists indicated in the indication information in the forbidden list.
Further, the forbidden list comprises at least one sub-list, each sub-list comprises one or more elements, and the indication information is used for indicating the elements to be deleted.
In another preferred embodiment, the deleting module 63 includes a determining sub-module 632, configured to determine a to-be-processed sub-list according to the indication information, where the to-be-processed sub-list includes the to-be-deleted element; the second deleting submodule 633 deletes the to-be-deleted element indicated in the indication information from the to-be-processed sub-list.
For more details of the operation principle and the operation mode of the forbidden list processing device 6, reference may be made to the relevant descriptions in fig. 3 to fig. 5, which are not described herein again.
Fig. 7 is a flowchart of a forbidden list processing method according to a third embodiment of the present invention. The difference between the method and the technical solution described in the embodiment shown in fig. 3 is that the embodiment is described from the network side; the network may be the primary network as described in the embodiment of fig. 3 above.
Specifically, in this embodiment, the method for processing the forbidden list may be implemented as follows:
step S201, determining whether the user equipment needs to be instructed to process the forbidden list.
Step S202, when the judgment result shows that the user equipment needs to be instructed to process the forbidden list, indicating information is sent to the user equipment, and the indicating information is used for instructing the user equipment to delete at least a part of contents recorded in the forbidden list.
Further, the network may determine whether the user equipment needs to be instructed to process the forbidden list according to the quality of the sub-network (or the cell corresponding to the sub-network) where the user equipment is currently located (also referred to as camping, or registering). Wherein the quality of the sub-network may be determined based on the updated roaming agreement. Those skilled in the art understand that the network adopting the technical solution of this embodiment may determine whether to force the ue to perform cell selection again according to the quality of the sub-network, so that the ue can enjoy better communication experience.
In a preferred example, when the determination result of step S201 indicates that the sub-network where the user equipment currently resides is not a necessary and best network, the determination result of step S201 is affirmative; otherwise, the determination result of the step S201 is negative. Further, when the determination result of the step S201 is affirmative, the step S202 is performed to instruct the user equipment to process the forbidden list; otherwise, that is, the cell where the user equipment currently resides is necessary and the signal quality of the cell is good, and the determination result of step S201 indicates that it is not necessary to instruct the user equipment to process the forbidden list, the step S201 may be executed again until the determination result of step S201 is affirmative.
In a variation, when the determination result of the step S201 is negative, the step S201 may be repeatedly executed based on a preset interval, so as to further reduce signaling overhead and reduce power consumption of the network. The preset interval may be preset by the network, may also be preset by the ue and notified to the network, or may also be agreed in advance by the network and the ue.
As a variation of this embodiment, before executing step S201, the following steps may be further executed: and receiving the registration information of the currently registered sub-network reported by the user equipment. Wherein the registration information may be used for information indicating a quality of the sub-network. Further, the step S202 may include: and judging whether the user equipment needs to be instructed to process the forbidden list or not according to the registration information. For example, if the registration information includes the updated roaming agreement, the network determines whether the sub-network satisfies a predetermined condition according to the updated roaming agreement (e.g., whether the sub-network is a network in which the user equipment must currently reside, and whether the signal quality of the sub-network is good enough, etc.), and if the network analysis determines that the sub-network does not satisfy the predetermined condition, it determines that the user equipment needs to be instructed to process the forbidden list to create an opportunity for the user equipment to register on the sub-network satisfying the predetermined condition.
Further, when the determination result indicates that the user equipment needs to be instructed to process the forbidden list, the network may send instruction information to the user equipment to instruct the user equipment to delete at least a part of the contents in the forbidden list. Specifically, those skilled in the art may refer to the technical solutions of the methods in the embodiments shown in fig. 3 to fig. 5, which are not described herein again.
Fig. 8 is a schematic structural diagram of a forbidden list processing device according to a fourth embodiment of the present invention. The difference between the above-described device solution in the embodiment shown in fig. 6 is that the embodiment is described from the network side. For example, the forbidden list processing device described in this embodiment may be a device installed in advance on the network side. Those skilled in the art understand that the forbidden list processing device 8 of the present embodiment is used for implementing the technical solution of the method described in the embodiment shown in fig. 7. Specifically, in this embodiment, the forbidden list processing apparatus 8 includes a determining module 82, configured to determine whether it is necessary to instruct the user equipment to process the forbidden list; and a sending module 83, configured to send, to the user equipment, indication information when the determination result indicates that the user equipment needs to be instructed to process the forbidden list, where the indication information is used to instruct the user equipment to delete at least a part of the content recorded in the forbidden list.
Further, the forbidden list processing apparatus 8 further includes a registration information receiving module 81, configured to receive, before determining whether the user equipment needs to be instructed to process the forbidden list, registration information of a currently registered subnet reported by the user equipment; the determining module 82 includes a determining submodule 821 configured to determine whether the user equipment needs to be instructed to process the forbidden list according to the registration information.
For more details of the operation principle and the operation mode of the forbidden list processing device 8, reference may be made to the related description in fig. 7, which is not described herein again.
Further, the embodiment of the present invention also discloses a storage medium, on which computer instructions are stored, and when the computer instructions are executed, the technical solutions of the methods described in the embodiments shown in fig. 3 to fig. 5 are executed. The storage medium may be a computer-readable storage medium. The storage medium may include: ROM, RAM, magnetic or optical disks, and the like.
Further, the embodiment of the present invention also discloses a storage medium, on which computer instructions are stored, and when the computer instructions are executed, the technical solution of the method described in the embodiment shown in fig. 7 is executed. The storage medium may be a computer-readable storage medium. The storage medium may include: ROM, RAM, magnetic or optical disks, and the like.
Further, the embodiment of the present invention also discloses a terminal, where the terminal includes a memory and a processor, where the memory stores a computer instruction capable of running on the processor, and the processor executes the method technical solution in the embodiment shown in fig. 3 to 5 when running the computer instruction. Preferably, the terminal may be the user equipment.
Further, the embodiment of the present invention further discloses a base station, where the base station includes a memory and a processor, where the memory stores a computer instruction capable of running on the processor, and the processor executes the computer instruction to execute the technical solution of the method in the embodiment shown in fig. 7. Preferably, the base station may be in the network, and the network interacts with the user equipment through the base station.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (26)

1. A forbidden list processing method, comprising:
receiving indication information sent by a network, wherein the indication information is used for indicating the user equipment to delete at least a part of contents recorded in the forbidden list by means of indication conditions, and the indication conditions comprise specific signal coverage;
deleting at least a part of the content recorded in the forbidden list based on the indication information;
performing a cell selection procedure based on the updated forbidden list.
2. The forbidden list processing method of claim 1, further comprising, before receiving the indication information sent by the network:
and reporting the registration information of the currently registered sub-network to the network.
3. The forbidden list processing method of claim 1, wherein said indication information is sent via a message or data.
4. The forbidden list processing method of claim 3, wherein said message comprises an access stratum message, a non-access stratum message, or a message dedicated to indicating deletion of a forbidden list.
5. The forbidden list processing method of claim 3, wherein said data comprises application layer transport-based data.
6. The forbidden list processing method of claim 1, wherein said forbidden list comprises at least one sub-list, and said indication information is used for indicating one or more sub-lists in said at least one sub-list.
7. The forbidden list processing method of claim 6, wherein said deleting at least a portion of the content recorded in the forbidden list based on said indication information comprises:
deleting one or more sub-lists indicated in the indication information in the forbidden list.
8. The forbidden list processing method of claim 1, wherein said forbidden list comprises at least one sub-list, each sub-list comprising one or more elements, and said indication information is used to indicate elements to be deleted.
9. The forbidden list processing method of claim 8, wherein said deleting at least a portion of the content recorded in the forbidden list based on said indication information comprises:
determining a to-be-processed sub-list according to the indication information, wherein the to-be-processed sub-list comprises the to-be-deleted elements;
and deleting the elements to be deleted indicated in the indication information from the to-be-processed sub-list.
10. A forbidden list processing apparatus, comprising:
a receiving module, configured to receive indication information sent by a network, where the indication information is used to instruct a user equipment to delete at least a part of content recorded in the forbidden list by means of an indication condition, and the indication condition includes a specific signal coverage;
a deleting module, configured to delete at least a portion of the content recorded in the forbidden list based on the indication information;
the forbidden list processing means further performs a cell selection procedure based on the updated forbidden list.
11. The forbidden list processing apparatus of claim 10, further comprising:
and the reporting module is used for reporting the registration information of the currently registered sub-network to the network before receiving the indication information sent by the network.
12. The apparatus according to claim 10, wherein the indication information is transmitted by a message or data.
13. The apparatus of claim 12, wherein the message comprises an access stratum message, a non-access stratum message, or a message dedicated to indicating deletion of a forbidden list.
14. The apparatus of claim 12, wherein the data comprises application layer transport-based data.
15. The apparatus according to claim 10, wherein the forbidden list comprises at least one sub-list, and the indication information indicates one or more sub-lists in the at least one sub-list.
16. The apparatus of claim 15, wherein the deletion module comprises:
a first deletion submodule, configured to delete, in the forbidden list, one or more sub-lists indicated in the indication information.
17. The apparatus according to claim 10, wherein the forbidden list comprises at least one sub-list, each sub-list comprising one or more elements, and the indication information indicates the elements to be deleted.
18. The apparatus of claim 17, wherein the deletion module comprises:
the determining submodule is used for determining a to-be-processed sub-list according to the indication information, and the to-be-processed sub-list contains the to-be-deleted elements;
and the second deletion sub-module deletes the element to be deleted indicated in the indication information from the to-be-processed sub-list.
19. A forbidden list processing method, performed by a network, comprising:
determining whether the user equipment needs to be instructed to process the forbidden list;
and when the judgment result shows that the user equipment needs to be instructed to process the forbidden list, sending instruction information to the user equipment, wherein the instruction information is used for instructing the user equipment to delete at least part of content recorded in the forbidden list in an instruction condition mode, and the instruction condition comprises a specific signal coverage range.
20. The forbidden list processing method of claim 19, further comprising, before determining whether said user equipment needs to be instructed to process said forbidden list:
receiving registration information of a currently registered sub-network reported by user equipment;
the determining whether the user equipment needs to be instructed to process the forbidden list comprises:
and judging whether the user equipment needs to be instructed to process the forbidden list or not according to the registration information.
21. A forbidden list processing apparatus, said apparatus being installed on a network side, said apparatus comprising:
the judging module is used for judging whether the user equipment needs to be instructed to process the forbidden list or not;
and a sending module, configured to send, to the user equipment, indication information when the determination result indicates that the user equipment needs to be instructed to process the forbidden list, where the indication information is used to instruct the user equipment to delete at least a part of content recorded in the forbidden list in a manner of indicating conditions, where the indicating conditions include a specific signal coverage.
22. The apparatus according to claim 21, further comprising:
a registration information receiving module, configured to receive, before determining whether the user equipment needs to be instructed to process the forbidden list, registration information of a currently registered subnet reported by the user equipment;
the judging module comprises:
and the judging submodule is used for judging whether the user equipment needs to be instructed to process the forbidden list or not according to the registration information.
23. A storage medium having stored thereon computer instructions, wherein said computer instructions when executed perform the steps of the method of any of claims 1 to 9.
24. A storage medium having stored thereon computer instructions which, when executed, perform the steps of the method of claim 19 or 20.
25. A terminal comprising a memory and a processor, the memory having stored thereon computer instructions executable on the processor, wherein the processor, when executing the computer instructions, performs the steps of the method of any one of claims 1 to 9.
26. A base station comprising a memory and a processor, the memory having stored thereon computer instructions executable on the processor, wherein the processor when executing the computer instructions performs the steps of the method of claim 19 or 20.
CN201710422349.8A 2017-06-07 2017-06-07 Forbidden list processing method and device, storage medium, terminal and base station Active CN109005568B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710422349.8A CN109005568B (en) 2017-06-07 2017-06-07 Forbidden list processing method and device, storage medium, terminal and base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710422349.8A CN109005568B (en) 2017-06-07 2017-06-07 Forbidden list processing method and device, storage medium, terminal and base station

Publications (2)

Publication Number Publication Date
CN109005568A CN109005568A (en) 2018-12-14
CN109005568B true CN109005568B (en) 2021-07-09

Family

ID=64573827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710422349.8A Active CN109005568B (en) 2017-06-07 2017-06-07 Forbidden list processing method and device, storage medium, terminal and base station

Country Status (1)

Country Link
CN (1) CN109005568B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020159481A1 (en) 2019-01-29 2020-08-06 Google Llc Adaptive connection management for marginal network conditions
US11109299B2 (en) 2019-12-12 2021-08-31 Google Llc Adaptive public land mobile network management for varying network conditions

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300193A (en) * 2011-08-04 2011-12-28 华为终端有限公司 International mobile subscriber identifier (IMSI) automatic switching method and device
CN103024863A (en) * 2012-11-22 2013-04-03 中兴通讯股份有限公司 Method and device for realizing network access control of terminal
CN103763758A (en) * 2014-01-27 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Data service processing method and data service processing device
CN103813439A (en) * 2012-11-06 2014-05-21 中兴通讯股份有限公司 Method for terminal register and terminal
CN105873010A (en) * 2015-01-19 2016-08-17 北京三星通信技术研究有限公司 Method supporting user equipment to get access to wireless network, network equipment and user equipment
CN106454793A (en) * 2015-06-18 2017-02-22 三星电子株式会社 Method of controlling a timer in user equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9668183B2 (en) * 2014-09-02 2017-05-30 Samsung Electronics Co., Ltd. System and method for enabling quick recovery of services from a forbidden PLMN

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300193A (en) * 2011-08-04 2011-12-28 华为终端有限公司 International mobile subscriber identifier (IMSI) automatic switching method and device
CN103813439A (en) * 2012-11-06 2014-05-21 中兴通讯股份有限公司 Method for terminal register and terminal
CN103024863A (en) * 2012-11-22 2013-04-03 中兴通讯股份有限公司 Method and device for realizing network access control of terminal
CN103763758A (en) * 2014-01-27 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Data service processing method and data service processing device
CN105873010A (en) * 2015-01-19 2016-08-17 北京三星通信技术研究有限公司 Method supporting user equipment to get access to wireless network, network equipment and user equipment
CN106454793A (en) * 2015-06-18 2017-02-22 三星电子株式会社 Method of controlling a timer in user equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Introduction of handling of Emergency Call Number ANQP-element;BlackBerry UK Ltd.;《3GPP TSG-CT WG1 Meeting #101bis C1-170130》;20170130;全文 *

Also Published As

Publication number Publication date
CN109005568A (en) 2018-12-14

Similar Documents

Publication Publication Date Title
CN104186012B (en) Method and apparatus for selective access control with service continuity guarantees
EP3331285B1 (en) Wireless terminal, base station, and method thereof
EP2276294B1 (en) Method, system and device for network selection
CN109327883B (en) Method and device for transmitting information
CN105580399B (en) Transmitting an indicator extending an area range of system information
EP2822327B1 (en) Core network access control method und network device
EP2941059B1 (en) Method and device for network selection from shared network
CN111556589B (en) Communication method, terminal and access network equipment
JP7467661B2 (en) Improved selection of slice-supported PLMNs while roaming away from the home network
WO2014054916A2 (en) Method for operating based on delay-tolerance information handling in wireless communication system and apparatus supporting same
EP3525520B1 (en) Method and terminal for network switching
CA2862225C (en) Higher priority network scanning
KR102510207B1 (en) Method for handling attach reject message with #14 cause at user equipment
KR20130035346A (en) Method and apparatus for controlling system overload in wireless communication
US20220369110A1 (en) Methods and devices of detection of misbehaving ues using data analysis
CN108738093B (en) Method for preventing LTE terminal from having no service after multiple attach requests are rejected
US20110045830A1 (en) Method of managing home cell selection for a wireless communication system and related device
CN109005568B (en) Forbidden list processing method and device, storage medium, terminal and base station
CN114125972A (en) Network connection method and related device
CN106134237B (en) Method for determining cell coverage for device-to-device (D2D) operation performed by a terminal in a wireless communication system and terminal using the same
WO2016018021A1 (en) Method for access control in wireless communication system and apparatus supporting same
EP3110206B1 (en) Data processing method and device for user equipment
CN115866710A (en) UE-preferred network slice management
CN110167064B (en) Method, network element, terminal and system for controlling terminal access
CN114731576A (en) Link selection for idle or inactive user equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant