CN109246847B - Network access method and system - Google Patents
Network access method and system Download PDFInfo
- Publication number
- CN109246847B CN109246847B CN201710342592.9A CN201710342592A CN109246847B CN 109246847 B CN109246847 B CN 109246847B CN 201710342592 A CN201710342592 A CN 201710342592A CN 109246847 B CN109246847 B CN 109246847B
- Authority
- CN
- China
- Prior art keywords
- nas
- access
- user equipment
- core network
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The invention provides a network access method and a system, wherein the network access method comprises the following steps: the base station receives an NAS rejection message sent by core network equipment, wherein the NAS rejection message is generated by the core network equipment according to an NAS message of initial access, and the NAS rejection message carries a first cause value used for representing that user equipment is rejected to access the network; the base station modifies the first reason value into a second reason value according to a preset reason mapping relation, and the second reason value is used for representing that the user equipment is allowed to access the network; and the base station sends the NAS rejection message carrying the second reason value to the user equipment. The invention can ensure that the user equipment before R12 can try to access the network without manual intervention after being refused to access the network.
Description
Technical Field
The present invention relates to communications technologies, and in particular, to a network access method and system.
Background
With the development of communication technology, user equipment is widely applied to networks, such as cameras, smart phones, tablet computers, and the like.
When the user equipment accesses the network, the network access may be refused. In the prior art, if the user equipment before R12 is refused to access the network, the user equipment will continue to try to access the network after manual intervention is required.
However, the problems of untimely manual intervention, waste of human resources and the like exist. Therefore, how to enable the user equipment before R12 to continue trying to access the network without manual intervention after the user equipment is denied access to the network is a technical problem to be solved.
Disclosure of Invention
The invention provides a network access method and a system, so that user equipment before R12 can try to access a network without manual intervention after being refused to access the network.
In a first aspect, the present invention provides a network access method, including: a base station receives a non-access stratum (NAS) rejection message sent by core network equipment, wherein the NAS rejection message is generated by the core network equipment according to an NAS message of initial access, and the NAS rejection message carries a first cause value used for representing that user equipment is rejected to access the network; the base station modifies the first reason value into a second reason value according to a preset reason mapping relation, wherein the second reason value is used for representing that the user equipment is allowed to access the network; and the base station sends the NAS rejection message carrying the second reason value to the user equipment.
In one embodiment, the first cause value is #8 and the second cause value is # 17.
In an embodiment, after the receiving, by the base station, the NAS reject message sent by the core network device, the method further includes: the base station determines that the NAS rejection message is used for rejecting the access of the user equipment, and the NAS rejection message has no security context.
In an embodiment, before the base station receives the non-access stratum NAS reject message sent by the core network device, the method further includes: the base station receives a radio resource control RRC connection establishment completion message sent by the user equipment, wherein the RRC connection establishment completion message carries the NAS message of the initial access; and the base station sends the NAS information of the initial access to the core network equipment.
In an embodiment, before the sending, by the base station, the NAS message for initial access to the core network device, the method further includes: and the base station determines that the signed core network equipment of the user equipment is abnormal, wherein the signed core network equipment is different from the core network equipment.
In a second aspect, the present invention provides a system comprising: the core network device is used for generating an NAS rejection message according to the NAS message of initial access and sending the NAS rejection message to the base station, wherein the NAS rejection message carries a first cause value used for representing that the user equipment is rejected to access the network; the base station is used for modifying the first reason value into a second reason value according to a preset reason mapping relation, and the second reason value is used for representing that the user equipment is allowed to access the network; sending the NAS rejection message carrying the second reason value to the user equipment; and the user equipment is used for performing subsequent network access processing according to the second reason value.
In one embodiment, the base station is further configured to: after receiving a NAS reject message sent by core network equipment, determining that the NAS reject message is used for rejecting the access of the user equipment, and the NAS reject message has no security context.
In one embodiment, the base station is further configured to: before receiving an NAS reject message sent by core network equipment, receiving an RRC connection establishment completion message sent by the user equipment, wherein the RRC connection establishment completion message carries the NAS message of initial access; and sending the NAS information of the initial access to the core network equipment.
In one embodiment, the base station is further configured to: before sending the initial access NAS message to the core network equipment, determining that the signed core network equipment of the user equipment is abnormal, wherein the signed core network equipment is different from the core network equipment.
In an embodiment, the core network device is further configured to: after receiving the initial access NAS message, determining that the user equipment is non-subscribed user equipment of the core network equipment.
In the network access method and system, the base station modifies the first reason value for representing that the user equipment is refused to access the network into the second reason value according to the preset reason mapping relation, and the second reason value is used for representing that the user equipment is allowed to access the network, so that the user equipment before R12 can try to access the network without manual intervention after being refused to access the network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a first embodiment of a network access method according to the present invention;
fig. 2 is a flowchart of a second embodiment of a network access method according to the present invention;
fig. 3 is a signaling interaction diagram of a third embodiment of the network access method of the present invention;
fig. 4 is a schematic structural diagram of a system according to a first embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In a Long Term Evolution (LTE) system, a ranshaping scenario and a Dedicated Core Network (DCN) scenario exist. A base station, for example, an evolved Node B (eNB), connects to multiple core network devices, and serves user equipments of different core network devices. The adopted technology comprises two technologies: RanSharing is different Public Land Mobile Network (PLMN for short), and DCN is the same PLMN.
For the user equipment before R12, when the user equipment performs network access, the user equipment carries the selection of the core network equipment. The eNB routes the user equipment to the core network equipment corresponding to the user equipment according to the contracted core network equipment of the user equipment and the plurality of core network equipment connected with the eNB.
When the eNB routes the user equipment to the wrong core network device (i.e. the non-subscribed core network device), the user equipment has no authentication at the wrong core network device, and its service request is rejected, which is indicated by a specific cause value. After receiving the specific cause value, the user equipment does not attempt network access without human intervention. However, there are various drawbacks in manually intervening the user equipment for network access.
Based on the above technical problem, the present invention provides a network access method and system, so that a user equipment before R12 can still attempt to access a network without human intervention after being denied to access the network.
Fig. 1 is a flowchart of a network access method according to a first embodiment of the present invention. As shown in fig. 1, the network access method includes:
s101, the base station receives an NAS rejection message sent by the core network equipment.
The NAS (Chinese: Non-access stratum, English full name: Non-access stratum) rejection message is generated by the core network device according to the NAS message of initial access, and the NAS rejection message carries a first cause value used for representing that the user equipment is rejected to access the network.
It should be noted that the NAS message initially accessed may be an Attach request (Attach Req), a Tracking area update procedure (TAU) request or a Service request (Service Req).
Specifically, after receiving an initially accessed NAS message, the core network device determines that the core network device does not send subscription information of the user equipment that sends the initially accessed NAS message, and then feeds back an NAS reject message, where the NAS reject message carries a first cause value, and the first cause value is used to characterize a cause for rejecting the user equipment to access the network.
Correspondingly, the base station receives the NAS reject message.
S102, the base station modifies the first reason value into a second reason value according to a preset reason mapping relation, and the second reason value is used for representing that the user equipment is allowed to access the network.
And the base station is pre-configured with a preset reason mapping relation. The preset reason mapping relationship is a mapping relationship between reason values. For example, the cause value #8 (i.e., EPS services and non-EPS services not allowed) is mapped to the cause value #17 (i.e., Network failure) or other cause value.
For the second reason value used for characterizing that the user equipment is allowed to access the network, those skilled in the art can understand that the second reason value is not a reason value for rejecting the user equipment to access the network, that is, a reason value for allowing the user equipment to access the network. For example, the cause value #17 indicates a network failure, but it does not explicitly indicate that the user equipment is denied access to the network, and the user equipment may still attempt to access the network at the time of the network failure.
Illustratively, the first cause value may be #8, and the second cause value may be #17, but the embodiment of the present invention is not limited thereto.
S103, the base station sends the NAS rejecting information carrying the second reason value to the user equipment.
Correspondingly, after receiving the NAS reject message carrying the second cause value, the user equipment parses the NAS reject message to obtain the second cause value, and performs subsequent network access processing according to the second cause value, for example, the user equipment may continue to try to access the network, so as to avoid that the user equipment needs manual intervention to access the network when the core network device subscribed by the user equipment is normal.
In this embodiment, the base station modifies, according to a preset reason mapping relationship, a first reason value used for characterizing that the user equipment is rejected to access the network to a second reason value used for characterizing that the user equipment is allowed to access the network, so that the user equipment before R12 can try to access the network without manual intervention after being rejected to access the network.
Fig. 2 is a flowchart of a second embodiment of a network access method according to the present invention. Referring to fig. 2, the embodiment shown in fig. 2 is based on the embodiment shown in fig. 1, after S101, the network access method may further include:
s201, the base station determines that the NAS rejecting information is used for rejecting the access of the user equipment, and the NAS rejecting information has no security context.
Specifically, after receiving the NAS reject message, the base station determines, according to a message header of the NAS reject message, that the NAS reject message is used to reject access of the user equipment; and, according to the security header of the NAS reject message, determining that the NAS reject message has no security context, that is, no integrity protection, then S102 is executed.
The embodiment is used for further determining that the core network equipment rejects the network access of the user equipment on the base station side.
Fig. 3 is a signaling interaction diagram of a third embodiment of the network access method of the present invention. As shown in fig. 3, the network access method may include:
s301, the base station receives an RRC connection establishment completion message sent by the user equipment.
Wherein, the RRC connection setup complete message carries an initial access NAS message.
When the user equipment accesses the network, a completion message is established through RRC (Radio Resource Control, Chinese: Radio Resource Control), and the NAS message carrying initial access, such as Attach Req, TAU Req or Service Req, is sent to the base station.
Correspondingly, the base station receives the RRC connection setup complete message.
S302, the base station determines that the signed core network equipment of the user equipment is abnormal.
Wherein the contracted core network device is different from the core network device.
Specifically, the base station determines that the subscribed core network device of the user equipment is abnormal, for example, the subscribed core network device fails or other reasons, then S303 is executed to send the NAS message of the initial access to other non-subscribed core network devices.
S303, the base station sends the NAS information of initial access to the core network equipment.
S304, the core network equipment determines that the user equipment is the non-signed user equipment.
S305, the base station receives the NAS rejection message sent by the core network equipment.
S306, the base station determines that the NAS rejecting information is used for rejecting the access of the user equipment, and the NAS rejecting information has no security context.
S307, the base station modifies the first reason value into a second reason value according to the preset reason mapping relation.
Wherein the second cause value is used for characterizing that the user equipment is allowed to access the network.
S308, the base station sends the NAS rejecting information carrying the second reason value to the user equipment.
S305 may refer to S101 specifically, S306 may refer to S201, S307 may refer to S102, and S308 may refer to S103, which are not described herein again.
S309, the user equipment carries out subsequent network access processing according to the second reason value.
The network access method in the embodiment can enable the user equipment before R12 to try to access the network without human intervention after being refused to access the network.
The following are embodiments of the apparatus of the present invention that may be used to perform embodiments of the method of the present invention. For details which are not disclosed in the embodiments of the apparatus of the present invention, reference is made to the embodiments of the method of the present invention.
Fig. 4 is a schematic structural diagram of a system according to a first embodiment of the present invention. The embodiment provides a system for implementing the network access method. As shown in fig. 4, the system 40 includes: user equipment 41, base station 42 and core network equipment 43.
The core network device 43 is configured to generate an NAS reject message according to the NAS message of the initial access, and send the NAS reject message to the base station 42, where the NAS reject message carries a first cause value used for representing that the user equipment 41 is rejected to access the network. The base station 42 is configured to modify the first cause value into a second cause value according to a preset cause mapping relationship, where the second cause value is used to represent that the user equipment 41 is allowed to access the network; and, the NAS reject message carrying the second cause value is sent to the user equipment 41. The user equipment 41 is configured to perform subsequent network access processing according to the second cause value.
In the system of this embodiment, the base station modifies, according to a preset reason mapping relationship, the first reason value used for characterizing that the user equipment is rejected from accessing the network to the second reason value used for characterizing that the user equipment is allowed to access the network, so that the user equipment before R12 can try to access the network without manual intervention after being rejected from accessing the network.
Optionally, the base station 42 may be further configured to: after receiving the NAS reject message sent by the core network device 43, it is determined that the NAS reject message is used for rejecting the access of the user equipment 41, and the NAS reject message has no security context.
Further, the base station 42 may also be configured to: before receiving the NAS reject message sent by the core network device 43, receiving an RRC connection setup complete message sent by the user equipment 41, where the RRC connection setup complete message carries an initially accessed NAS message; the NAS message of the initial access is sent to the core network device 43.
Optionally, the base station 42 may be further configured to: before sending the NAS message for initial access to the core network device 43, it is determined that the subscribed core network device of the user device 41 is abnormal, and the subscribed core network device is different from the core network device 43.
Optionally, the core network device 43 may be further configured to: after receiving the NAS message for initial access, the user equipment 41 is determined to be a non-subscribed user equipment of the core network device 43.
The system of this embodiment may execute the technical solution of any one of the method embodiments in fig. 1 to fig. 3, and the implementation principle and the technical effect are similar, which are not described herein again.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (8)
1. A network access method, comprising:
a base station receives a non-access stratum (NAS) rejection message sent by core network equipment, wherein the NAS rejection message is generated by the core network equipment according to an NAS message of initial access, and the NAS rejection message carries a first cause value used for representing that user equipment is rejected to access the network;
the base station modifies the first reason value into a second reason value according to a preset reason mapping relation, wherein the second reason value is used for representing that the user equipment is allowed to access the network;
the base station sends an NAS rejection message carrying a second reason value to the user equipment;
after receiving the NAS reject message sent by the core network device, the base station further includes:
the base station determines that the NAS rejection message is used for rejecting the access of the user equipment, and the NAS rejection message has no security context.
2. The network access method of claim 1, wherein the first cause value is #8 and the second cause value is # 17.
3. The network access method according to claim 1 or 2, wherein before the base station receives the NAS reject message sent by the core network device, the method further comprises:
the base station receives a radio resource control RRC connection establishment completion message sent by the user equipment, wherein the RRC connection establishment completion message carries the NAS message of the initial access;
and the base station sends the NAS information of the initial access to the core network equipment.
4. The network access method according to claim 3, wherein before the base station sends the NAS message for initial access to the core network device, the method further comprises:
and the base station determines that the signed core network equipment of the user equipment is abnormal, wherein the signed core network equipment is different from the core network equipment.
5. A system, comprising:
the core network device is used for generating an NAS rejection message according to an NAS message initially accessed by a non-access stratum and sending the NAS rejection message to a base station, wherein the NAS rejection message carries a first cause value used for representing that the user equipment is rejected to access the network;
the base station is used for modifying the first reason value into a second reason value according to a preset reason mapping relation, and the second reason value is used for representing that the user equipment is allowed to access the network; sending the NAS rejection message carrying the second reason value to the user equipment;
the user equipment is used for carrying out subsequent network access processing according to the second reason value;
the base station is further configured to: after receiving a NAS reject message sent by core network equipment, determining that the NAS reject message is used for rejecting the access of the user equipment, and the NAS reject message has no security context.
6. The system of claim 5, wherein the base station is further configured to:
before receiving an NAS reject message sent by core network equipment, receiving a Radio Resource Control (RRC) connection establishment completion message sent by the user equipment, wherein the RRC connection establishment completion message carries the NAS message of initial access;
and sending the NAS information of the initial access to the core network equipment.
7. The system of claim 6, wherein the base station is further configured to:
before sending the initial access NAS message to the core network equipment, determining that the signed core network equipment of the user equipment is abnormal, wherein the signed core network equipment is different from the core network equipment.
8. The system of claim 6, wherein the core network device is further configured to:
after receiving the initial access NAS message, determining that the user equipment is non-subscribed user equipment of the core network equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710342592.9A CN109246847B (en) | 2017-05-16 | 2017-05-16 | Network access method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710342592.9A CN109246847B (en) | 2017-05-16 | 2017-05-16 | Network access method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109246847A CN109246847A (en) | 2019-01-18 |
CN109246847B true CN109246847B (en) | 2020-12-01 |
Family
ID=65082898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710342592.9A Active CN109246847B (en) | 2017-05-16 | 2017-05-16 | Network access method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246847B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109195217B (en) * | 2018-10-23 | 2021-06-04 | Oppo广东移动通信有限公司 | Method and device for processing LTE network rejection behavior |
CN114071787A (en) * | 2020-07-31 | 2022-02-18 | 维沃移动通信有限公司 | Method, device and equipment for establishing connection |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674635A (en) * | 2008-09-10 | 2010-03-17 | 中国移动通信集团公司 | Method and user device for solving call restriction between different systems |
CN102457831A (en) * | 2010-10-29 | 2012-05-16 | 中国移动通信集团公司 | Control method, device, terminal and system for terminal access |
CN102595390A (en) * | 2011-01-18 | 2012-07-18 | 中兴通讯股份有限公司 | Safe-mode configuration method and terminal |
WO2016095188A1 (en) * | 2014-12-19 | 2016-06-23 | 华为技术有限公司 | Method and terminal for restoring network service |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10111274B2 (en) * | 2015-10-27 | 2018-10-23 | Mediatek Singapore Pte. Ltd. | Handling of registration reject in mobile communications |
-
2017
- 2017-05-16 CN CN201710342592.9A patent/CN109246847B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674635A (en) * | 2008-09-10 | 2010-03-17 | 中国移动通信集团公司 | Method and user device for solving call restriction between different systems |
CN102457831A (en) * | 2010-10-29 | 2012-05-16 | 中国移动通信集团公司 | Control method, device, terminal and system for terminal access |
CN102595390A (en) * | 2011-01-18 | 2012-07-18 | 中兴通讯股份有限公司 | Safe-mode configuration method and terminal |
WO2016095188A1 (en) * | 2014-12-19 | 2016-06-23 | 华为技术有限公司 | Method and terminal for restoring network service |
Also Published As
Publication number | Publication date |
---|---|
CN109246847A (en) | 2019-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11736519B2 (en) | Mobile communication method, apparatus, and device | |
CN112203336B (en) | Wireless access control method, device and system | |
EP3541105A1 (en) | Communication method and related apparatus | |
US9432971B2 (en) | Method and system for radio resource control | |
EP3713372A1 (en) | Method and device for creating user group | |
RU2610422C2 (en) | Network controlled extended access barring for user devices with multiple services | |
CN108184208B (en) | Communication method and core network equipment in broadband cluster system | |
US11140737B2 (en) | Session processing method in wireless communications and terminal device | |
US10880744B2 (en) | Security negotiation method, security function entity, core network element, and user equipment | |
WO2018103658A1 (en) | Access processing method, base station and mobile communication terminal | |
US20210084496A1 (en) | Apparatus for validity verification of network | |
EP3079392A1 (en) | Method, apparatus and system for selecting authentication algorithm | |
CN109246847B (en) | Network access method and system | |
US11576097B2 (en) | Method and terminal for redirecting network | |
WO2019196963A1 (en) | Method and device for accessing network slice, storage medium, electronic device | |
WO2019095748A1 (en) | Communication management method, apparatus and system, and terminal, management entity and storage medium | |
JP2024506066A (en) | Disaster roaming methods, devices, and systems | |
CN113950121A (en) | Context recovery method and device | |
CN113079505B (en) | User authentication method, core network side device and computer readable storage medium | |
WO2023175666A1 (en) | Communication device, method for communication device, terminal device, method for terminal device, communication system, and non-transitory computer-readable medium | |
CN112689326B (en) | Method, terminal and network side equipment for indicating NSSAI carrying | |
CN110933591B (en) | Authentication method, equipment and system | |
CN108337693B (en) | Reset method of S1 interface and communication equipment | |
WO2020147509A1 (en) | Method and device for capability report and key negotiation, terminal, communication device and system | |
CN115915114A (en) | Registration method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |