CN109327882B - Access control method, communication equipment and equipment with storage function - Google Patents

Access control method, communication equipment and equipment with storage function Download PDF

Info

Publication number
CN109327882B
CN109327882B CN201710649243.1A CN201710649243A CN109327882B CN 109327882 B CN109327882 B CN 109327882B CN 201710649243 A CN201710649243 A CN 201710649243A CN 109327882 B CN109327882 B CN 109327882B
Authority
CN
China
Prior art keywords
access
state
user equipment
uplink message
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710649243.1A
Other languages
Chinese (zh)
Other versions
CN109327882A (en
Inventor
夏欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiekai Communications Shenzhen Co Ltd
Original Assignee
Jiekai Communications Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiekai Communications Shenzhen Co Ltd filed Critical Jiekai Communications Shenzhen Co Ltd
Priority to CN201710649243.1A priority Critical patent/CN109327882B/en
Priority to PCT/CN2017/107974 priority patent/WO2019024276A1/en
Publication of CN109327882A publication Critical patent/CN109327882A/en
Application granted granted Critical
Publication of CN109327882B publication Critical patent/CN109327882B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0268Traffic management, e.g. flow control or congestion control using specific QoS parameters for wireless networks, e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The invention discloses an access control method, communication equipment and equipment with a storage function, wherein the access control method comprises the following steps: the user equipment receives a downlink message from a base station, wherein the downlink message comprises an access control mapping relation, and the access control mapping relation comprises a mapping relation between an access parameter and an access category; matching access categories corresponding to access parameters of the uplink message to be sent in the access control mapping relation; and performing access control by using the access category obtained by matching. Through the mode, the invention can reduce the burden of the user equipment and improve the access control efficiency.

Description

Access control method, communication equipment and equipment with storage function
Technical Field
The present invention relates to the field of communications, and in particular, to an access control method, a communication device, and a device having a storage function.
Background
L TE (L ong Term Evolution ) Communication system, commonly used Access control mechanisms include ACB (Access Class Barred), SSAC (Service Specific Access control), EAB (Extended Access Barring), ACDC (Application Specific control for Data Communication), where the ACB mechanism mainly performs Access control according to the Access Class of the user equipment, the SSAC mainly performs Access control for multimedia voice and video services, the EAB mainly performs Access control for a large number of machines in the internet of things, and the c mainly performs Access control for Specific applications.
Disclosure of Invention
The invention mainly solves the technical problem of providing an access control method, communication equipment and equipment with a storage function, and can solve the problem that the burden of user equipment is easily increased by using an access control mechanism in a mixed mode.
In order to solve the technical problems, the first technical scheme adopted by the invention is as follows: an access control method is provided, which includes: the user equipment receives a downlink message from a base station, wherein the downlink message comprises an access control mapping relation, and the access control mapping relation comprises a mapping relation of access parameters and access categories; matching access categories corresponding to access parameters of the uplink message to be sent in the access control mapping relation; and performing access control by using the access category obtained by matching.
In order to solve the above technical problems, the second technical solution adopted by the present invention is: an access control method is provided, which includes: generating an access control mapping relation, wherein the access control mapping relation comprises a mapping relation between access parameters and access categories; and sending a downlink message to the user equipment, wherein the downlink message comprises an access control mapping relation, so that the user equipment performs access control by using an access category corresponding to the access parameter of the uplink message to be sent, which is matched in the access control mapping relation.
In order to solve the above technical problems, the third technical solution adopted by the present invention is: an access control method is provided, which includes: generating a mapping relation between the QoS service flow identification and/or at least one auxiliary factor and the service category; and sending a mapping notification message to the base station so that the base station generates the access control mapping relation, wherein the notification message comprises the mapping relation between the QoS service flow identification and/or the at least one auxiliary factor and the service class.
In order to solve the technical problems, the fourth technical scheme adopted by the invention is as follows: there is provided a communication device including: the processor is connected with the communication circuit; the processor is configured to execute instructions to implement the method as described above.
In order to solve the above technical problems, a fifth technical solution adopted by the present invention is: there is provided a device having a storage function, storing instructions which, when executed, implement the method as described above.
In order to solve the technical problems, the sixth technical scheme adopted by the invention is as follows: there is provided a communication device including: a communication module, configured to receive, by a user equipment, a downlink message from a base station, where the downlink message includes an access control mapping relationship, and the access control mapping relationship includes a mapping relationship between an access parameter and an access category; the matching module is used for matching the access category corresponding to the access parameter of the uplink message to be sent in the access control mapping relation; and the control module is used for performing access control by using the access category obtained by matching.
In order to solve the above technical problems, a seventh technical solution adopted by the present invention is: there is provided a communication device including: the mapping module is used for generating an access control mapping relation, and the access control mapping relation comprises a mapping relation of access parameters and access categories; and the communication module is used for sending a downlink message to the user equipment, wherein the downlink message comprises an access control mapping relation, so that the user equipment performs access control by using an access category corresponding to the access parameter of the uplink message to be sent, which is matched in the access control mapping relation.
In order to solve the above technical problems, an eighth technical solution adopted by the present invention is: there is provided a communication device including: the mapping module is used for generating a mapping relation between the QoS service flow identifier and/or at least one auxiliary factor and the service category; and the communication module is used for sending a mapping notification message to the base station so that the base station generates an access control mapping relation, wherein the notification message comprises the QoS service flow identification and/or the mapping relation between at least one auxiliary factor and the service class.
The invention has the beneficial effects that: different from the prior art, in the embodiment of the present invention, a ue receives a downlink message from a base station, where the downlink message includes an access control mapping relationship, and the access control mapping relationship includes a mapping relationship between an access parameter and an access category; and matching the access category corresponding to the access parameter of the uplink message to be sent in the access control mapping relation, and performing access control by using the access category obtained by matching, so that the user equipment can perform access control only by acquiring the access category corresponding to the uplink message to be sent in the access control mapping relation, and the base station uniformly considers the access control mapping relation, thereby reducing the burden of the user equipment and improving the access control efficiency.
Drawings
Fig. 1 is a schematic view of a QoS architecture of a conventional NR system;
fig. 2 is a flowchart illustrating a first embodiment of an access control method according to the present invention;
fig. 3 is a schematic diagram of a communication process between a base station and a user equipment in a first embodiment of an access control method of the present invention;
fig. 4 is a flowchart illustrating a second embodiment of the access control method of the present invention;
fig. 5 is a schematic diagram of an access control mapping relationship in a second embodiment of the access control method of the present invention;
fig. 6 is a flowchart illustrating an access control method according to a third embodiment of the present invention;
fig. 7 is a flowchart illustrating a fourth embodiment of the access control method of the present invention;
fig. 8 is a diagram illustrating an access control mapping relationship in a fourth embodiment of the access control method according to the present invention;
fig. 9 is a detailed flowchart of step S126 in fig. 7;
fig. 10 is a flowchart of a fifth embodiment of the access control method of the present invention;
fig. 11 is a flowchart illustrating a sixth embodiment of the access control method according to the present invention;
fig. 12 is a flowchart illustrating an access control method according to a seventh embodiment of the present invention;
fig. 13 is a detailed flowchart of step S134 in fig. 12;
fig. 14 is a flowchart illustrating an access control method according to an eighth embodiment of the present invention;
fig. 15 is a flowchart illustrating a ninth embodiment of the access control method according to the present invention;
fig. 16 is a diagram illustrating a mapping matrix in a ninth embodiment of the access control method according to the present invention;
fig. 17 is a flowchart illustrating a tenth embodiment of the access control method according to the present invention;
fig. 18 is a flowchart of an eleventh embodiment of the access control method of the present invention;
fig. 19 is a diagram of a mapping matrix in an eleventh embodiment of the access control method of the present invention;
fig. 20 is a flowchart illustrating an access control method according to a twelfth embodiment of the present invention;
fig. 21 is a flowchart illustrating a thirteenth embodiment of the access control method according to the present invention;
fig. 22 is a flowchart illustrating an access control method according to a fourteenth embodiment of the present invention;
fig. 23 is a flowchart illustrating an access control method according to a fifteenth embodiment of the present invention;
fig. 24 is a flowchart illustrating an access control method according to a sixteenth embodiment of the present invention;
fig. 25 is a schematic diagram of a communication process among a user equipment, a base station and a core network in a sixteenth embodiment of an access control method according to the present invention;
fig. 26 is a schematic diagram of a mapping relationship between QoS service flow identifiers and service classes in a sixteenth embodiment of the access control method of the present invention;
fig. 27 is a flowchart illustrating an access control method according to a seventeenth embodiment of the present invention;
fig. 28 is a detailed flowchart of step S213 in fig. 27;
fig. 29 is a schematic diagram of traffic classes generated by a base station in a seventeenth embodiment of the access control method of the present invention, and a mapping relationship between the traffic classes and combinations of the auxiliary factors and the access classes;
fig. 30 is a flowchart illustrating an access control method according to an eighteenth embodiment of the present invention;
fig. 31 is a detailed structural view of step S31 in fig. 30;
fig. 32 is a schematic structural diagram of a first embodiment of the communication device of the present invention;
fig. 33 is a schematic structural diagram of a second embodiment of the communication device of the present invention;
fig. 34 is a schematic structural diagram of a third embodiment of the communication device of the present invention;
fig. 35 is a schematic structural diagram of a fourth embodiment of the communication device of the present invention;
fig. 36 is a schematic configuration diagram of a fifth embodiment of the communication apparatus of the present invention;
fig. 37 is a schematic configuration diagram of a sixth embodiment of the communication apparatus of the present invention;
FIG. 38 is a block diagram of a first embodiment of an apparatus embodying memory functionality in accordance with the present invention;
FIG. 39 is a schematic block diagram of a second embodiment of an apparatus embodying memory functionality in accordance with the present invention;
fig. 40 is a schematic structural diagram of a third embodiment of the apparatus embodying the storage function of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
For a New Radio (NR) system of a 5G network, a QoS (Quality of Service) architecture is shown in fig. 1, where for each ue, a core network establishes at least one PDU (Protocol Data Unit) session, and for each ue, an access network establishes one or more Data Radio Bearers (DRBs) for each PDU session, and the access network establishes at least one default for each PDU session established by the core network. The access network maps packets belonging to different PDU sessions to different DRBs. Non-access-layer packet filters of the user equipment and the core network associate upstream and downstream packets with QoS traffic flows (QoS flows). Mapping association of Data Radio Bearers (DRBs) and uplink and downlink QoS traffic flows is implemented at the access layer in the user equipment and the access network. Wherein, in the downlink, the access network maps the QoS traffic Flow to the DRB according to the QoS traffic Flow identification (QoS Flow ID) and the associated QoS configuration file; in the uplink, the user equipment performs uplink grouping by using the QoS service flow identifier. In the NR system, the QoS traffic flow is the most basic QoS processing granularity, and therefore, in order to prevent overload and ensure quality of service, the system may perform access control based on the QoS traffic flow identifier.
As shown in fig. 2, the execution subject of the first embodiment of the access control method of the present invention is the user equipment. The user equipment may be fixed or mobile and may be a cellular phone, a Personal Digital Assistant (PDA), a desktop computer, a tablet computer, a laptop computer, a cordless phone, etc. The embodiment comprises the following steps:
s11: the user equipment receives a downlink message from a base station, wherein the downlink message comprises an access control mapping relation, and the access control mapping relation comprises a mapping relation between an access parameter and an access category;
the downlink message may be a radio resource control message or a system broadcast message, or may be other types of messages, the access category is a predefined category, and the number of the access categories and the specific access types may be determined according to actual needs, which is not specifically limited herein.
The access parameter is a relevant parameter required by the user equipment to make an access decision, and comprises a QoS service flow identification and/or at least one auxiliary factor. The auxiliary factor is a state parameter of the ue itself, including at least one of a priority, a call type, a service type, and a roaming state of the ue, and may further include other parameters related to the ue, which is not specifically limited herein.
Specifically, in an application example, as shown in fig. 3, a base station maps a QoS Flow identifier (QoS Flow ID, QFI) corresponding to at least one existing QoS Flow with an Access Category (AC) to generate an Access control mapping relationship, where the base station may map the QFI corresponding to QoS flows of the same type to the same AC based on a policy of an operator, for example, map a data Flow of a video service to the same AC, and the base station may send the downlink message to a user equipment according to a load condition of the base station to update the Access control mapping relationship. The base station may send the downlink message to the user equipment in a broadcast manner, or may send the downlink message to the user equipment through a certain idle channel, which is not limited specifically here. In other application examples, the access parameter may include only at least one auxiliary factor, and the base station may map the at least one auxiliary factor, for example, the priority of the user equipment is 1 and the service type is video, to the access category 2.
Of course, in other embodiments, the base station may perform mapping based on other mapping standards, for example, mapping QFIs corresponding to QoS service flows with the same QoS requirement to the same AC, and the like, and when the base station generates the access control mapping relationship, other factors (other metrics) such as the roaming state and the priority of the user equipment may also be considered, and one service class (TC) may also be added, and the QFIs are mapped to the TCs first, and then the TCs are mapped to the ACs, which is not specifically limited herein.
S12: matching access categories corresponding to access parameters of the uplink message to be sent in the access control mapping relation;
in the NR system, for the uplink, the user equipment may use uplink reflection QoS Mapping (UplinkReflective QoS Mapping) to obtain the same QoS traffic flow identification as the downlink, i.e., for each DRB, the user equipment monitors the QoS traffic flow identification of the downlink and applies the same Mapping in the uplink.
Specifically, in an application example, the user equipment may receive the downlink message when in an idle state and prepare to send a service request to the base station, or may receive the downlink message after successfully connecting with the base station, as shown in fig. 3, after receiving the downlink message, the user equipment obtains the QFI in the downlink message, and may map the QFI in the downlink message to the uplink message to be sent, where the QFI of the uplink message to be sent is the same as the QFI of the downlink message. Before sending the uplink message to the base station, for example, when sending a service request message to the base station, the user equipment searches for an access category corresponding to the QFI of the uplink message in an access control mapping relationship, that is, searches for an AC having a mapping relationship with the QFI of the uplink message, if a matched AC is found, performs a subsequent access control step, and if a matched AC is not found, directly limits sending of the uplink message, and waits for the base station to update the access control mapping relationship. Of course, in other application examples, if no matching AC is found, the user equipment may also directly map the QFI to the AC with the lowest priority, or to a certain AC, and then perform subsequent access control operation by using the AC, which is not specifically limited herein.
In other embodiments, the user equipment may also randomly select and allocate a QFI to the uplink message to be sent, which is not specifically limited herein.
In another application example, when the access parameter includes at least one auxiliary factor, for example, the priority of the user equipment is 1 and the service type is video, the corresponding access type is access type 2, the uplink message to be sent by the user equipment is a video message, and when the priority of the user equipment is 1, the user equipment may obtain, in the access control mapping relationship, that the access type matched with the access parameter of the uplink message to be sent is 2. Of course, in other application examples, the access parameter may also include a combination of the QoS traffic flow identifier and at least one auxiliary factor, which is not specifically limited herein.
S13: and performing access control by using the access category obtained by matching.
Specifically, in an application example, the access possibilities of different access categories are different, the access category with a higher priority has a higher possibility of accessing and can be accessed preferentially, and the access category with a lower priority has a lower possibility of accessing and has a higher difficulty of accessing; if the load of the base station is large, more QoS service flow identifications can be mapped to the access category with low priority, so that access control is realized, the overload is avoided, and when the load of the base station is light, more QoS service flow identifications can be mapped to the access category with high priority, so that the resource utilization rate is improved. The user equipment may directly set a part of access categories with higher priority as allowed access, and set other access categories with lower priority as restricted access, for example, allow uplink message access corresponding to the first 5 access categories, and restrict uplink message access corresponding to the remaining 5 access categories. Of course, the user equipment may also perform access control by using other methods such as calculating an access probability, and the like, which is not specifically limited herein.
In this embodiment, a user equipment receives a downlink message from a base station, where the downlink message includes an access control mapping relationship, and the access control mapping relationship includes a mapping relationship between an access parameter and an access category; and the base station uniformly considers the access mapping control relationship, thereby reducing the burden of the user equipment, improving the access control efficiency, being applicable to the idle state and the connection state of the user equipment, having wide application range and high compatibility.
As shown in fig. 4, the second embodiment of the access control method of the present invention is based on the first embodiment of the access control method of the present invention, and step S12 further includes:
s121: and searching an access category which has a mapping relation with the QoS service flow identifier of the uplink message to be sent and/or at least one auxiliary factor in the access control mapping relation.
When the user equipment generates the uplink message to be sent, the QoS service flow identifier of the uplink message may be obtained by mapping the QoS service flow identifier of the uplink, or may be a QoS service flow identifier randomly generated by the user equipment, which is not specifically limited herein. The auxiliary factor is a status parameter of the ue itself, including at least one of a priority, a call type, a service type of the ue and a roaming status of the ue, and may further include other parameters related to the ue, which is not specifically limited herein.
The access parameter includes a QoS traffic flow identifier and/or at least one cofactor, and the access control mapping relationship includes at least one of a mapping relationship of the QoS traffic flow identifier and the access category, a mapping relationship of the at least one cofactor and the access category, and a mapping relationship of a combination of the QoS traffic flow identifier and the at least one cofactor and the access category.
Specifically, in an application example, as shown in fig. 5, the Access control mapping relationship includes a mapping between at least one QoS service flow identifier (QFI) and one Access Category (Access Category), a mapping between at least one assistant factor (othermetric) and an Access Category, a combination of at least one QoS service flow identifier and at least one assistant factor, and a mapping between at least one Access Category; after acquiring the QoS service flow identifier and/or the at least one auxiliary factor of the uplink message to be sent, the user equipment searches for an access category to which the QoS service flow identifier and/or the at least one auxiliary factor are mapped in an access control mapping relationship.
For example, if the QoS service flow identifier of the uplink message to be sent, which is obtained by the user equipment, is 0x1a, the access category to which 0x1a is mapped can be found to be access category 1 according to the access control mapping relation table in fig. 5; if the QoS service flow identifier of the uplink message to be sent obtained by the UE is 0x2a and the priority of the UE is 1, according to the access control mapping relationship table in fig. 5, it may be found that the access Category to which the combination of 0x2a and the priority of the UE is 1(UE Category ═ 1) is mapped is access Category 2; if the uplink message to be sent acquired by the UE is a video Service stream and the priority of the UE is 2, according to the access control mapping relation table in fig. 5, it may be found that the access Category to which the video Service stream (Service) and the priority of the UE are 2(UE Category is 2) are mapped is access Category 4.
Of course, in other application examples, the access control mapping relationship may only include the mapping relationship between the QoS service flow identifier and the access category, or only include the mapping relationship between the combination of the QoS service flow identifier and the at least one auxiliary factor and the access category, or only include the mapping relationship between the at least one auxiliary factor and the access category, which is not limited herein.
In this embodiment, when the ue performs access control, the state of the ue is also considered, for example, the ue distinguishes roaming from non-roaming, so that the application range is wider and the access control efficiency is higher.
As shown in fig. 6, the third embodiment of the access control method of the present invention is based on the second embodiment of the access control method of the present invention, and step S12 further includes:
s122: and when the access category matched with the QoS service flow identification and/or the at least one auxiliary factor is not found in the access control mapping relation, the user equipment maps the QoS service flow identification and/or the at least one auxiliary factor to the access category with the lowest priority.
Specifically, in an application example, after the user equipment obtains the QoS service flow identifier of the uplink message to be sent, when the access class matched with the QoS service flow identifier is not found in the access control mapping relationship, the QoS service flow identifier may be directly mapped to the access class with the lowest priority, so as to perform access control operation subsequently by using the access class with the lowest priority, and save waiting time. In other application examples, the ue may further send the updated access mapping relationship to the base station, so that the base station updates data. In another application example, when the ue does not find the access category matching the at least one auxiliary factor in the access control mapping relationship, or does not find the access category matching the combination of the QoS service flow identifier and the at least one auxiliary factor, the ue may map the at least one auxiliary factor, or the combination of the QoS service flow identifier and the at least one auxiliary factor, to the access category with the lowest priority.
Of course, in other embodiments, if the ue does not find the matching access category in the access control mapping relationship, the ue may suspend sending the uplink message, and wait for the base station to update the access control mapping relationship; the user equipment may also map the QoS traffic flow identifier that does not match the access category to any access category, which is not specifically limited herein.
As shown in fig. 7, a fourth embodiment of the access control method of the present invention is based on the first embodiment of the access control method of the present invention, and step S12 further includes:
s123: searching the service category which has a mapping relation with the QoS service flow identifier and/or at least one auxiliary factor of the uplink message to be sent in the access control mapping relation;
when the user equipment generates the uplink message to be sent, the QoS service flow identifier of the uplink message may be obtained by mapping the QoS service flow identifier of the uplink, or may be a QoS service flow identifier randomly generated by the user equipment, which is not specifically limited herein. The access control mapping relationship at least comprises a mapping relationship between the QoS service flow identification and/or at least one auxiliary factor and the service class.
Specifically, in an application example, as shown in fig. 8, the access control mapping relationship includes at least one QoS service flow identifier and a mapping of one service class, and at least one service class and a mapping of one access class; after acquiring the QoS service stream identifier of the uplink message to be sent, the user equipment searches the service class mapped by the QoS service stream identifier in the access control mapping relation.
For example, if the QoS service flow identifier of the uplink message to be sent, which is obtained by the user equipment, is 0x2a, the service class to which 0x2a is mapped can be found to be service class 3 according to the access control mapping relation table in fig. 8.
Of course, in other application examples, the access parameter may include only at least one auxiliary factor, and the access control mapping relationship may also include only a mapping relationship between at least one auxiliary factor and a service class, and a mapping relationship between a service class and an access class, which is not specifically limited herein.
S124: and matching the access category corresponding to the service category in the access control mapping relation.
In the above application example, as shown in fig. 8, after the user equipment finds the service class to which the QoS service flow identifier is mapped in the access control mapping relationship, the user equipment continues to find the access class having a mapping relationship with the service class in the access control mapping relationship.
For example, if the user equipment finds that the service class is the service class 2 according to the access control mapping relationship table in fig. 8, the user equipment continues to find that the access class to which the service class 2 is mapped is the access class 1 according to the access control mapping relationship table.
In other application examples, the access control mapping relationship further includes a mapping relationship between a combination of a service class and at least one auxiliary factor and an access class.
Alternatively, as shown in fig. 9, step S124 includes:
s1241: and searching the access control mapping relation for the access category which has the mapping relation with the service category and/or at least one auxiliary factor.
Specifically, in the above application example, as shown in fig. 8, the access control mapping relationship includes at least one QoS service flow identifier and a mapping of one service class, a combination of at least one service class and at least one auxiliary factor, and a mapping of one access class; after finding the service class mapped by the QoS service flow identifier of the uplink message to be sent, the user equipment searches the access class mapped by the service class in the access control mapping relation, or searches the access class mapped by the combination of the service class and at least one auxiliary factor.
For example, when the UE finds that the service class is service class 3 and the priority of the UE is 1 according to the access control mapping relation table in fig. 8, it may find that the access class to which the combination of service class 3 and the UE with priority 1(UE Category is 1) is mapped is access class 2 according to the access control mapping relation table in fig. 8.
Of course, in other application examples, the access control mapping relationship may only include the mapping relationship between the QoS service flow identifier and the service class and the mapping relationship between the service class and the access class, or only include the mapping relationship between the QoS service flow identifier and the service class, and the mapping relationship between the service class and the combination of at least one auxiliary factor and the access class, or only include the mapping relationship between at least one auxiliary factor and the service class, and the mapping relationship between the service class and/or at least another auxiliary factor and the access class, which is not specifically limited herein.
In this embodiment, the QoS service flow identifier and/or at least one auxiliary factor is mapped to the service class, and more QoS service flow identifiers and/or auxiliary factors can be mapped to fewer service classes, so that the mapping relationship between the subsequent service flow identifiers and the access classes is reduced, the difficulty of searching the mapping relationship by the user equipment is reduced, and the searching rate is increased.
As shown in fig. 10, a fifth embodiment of the access control method of the present invention is based on the fourth embodiment of the access control method of the present invention, and step S12 further includes:
s125: and when the service class which has the mapping relation with the QoS service flow identification and/or at least one auxiliary factor is not found in the access control mapping relation, the user equipment maps the QoS service flow identification and/or at least one auxiliary factor to the service class with the lowest priority.
Specifically, in an application example, after the user equipment obtains the QoS service flow identifier of the uplink message to be sent, when the service class matched with the QoS service flow identifier is not found in the access control mapping relationship, the QoS service flow identifier may be directly mapped to the service class with the lowest priority, so as to perform access control operation subsequently by using the access class corresponding to the service class with the lowest priority, thereby saving waiting time. In other application examples, the ue may further send the updated access mapping relationship to the base station, so that the base station updates data. In other application examples, the user equipment may map at least one assistant factor of the service class that is not matched to the service class with the lowest priority, or map the QoS service flow identifier of the service class that is not matched to the service class with the lowest priority and the at least one assistant factor, which are not specifically limited herein.
Of course, in other embodiments, if the ue cannot find the matching service class in the access control mapping relationship, the ue may suspend sending the uplink message, and wait for the base station to update the access control mapping relationship; the user equipment may also map the QoS traffic flow identifier that does not match the traffic class into any traffic class, which is not specifically limited herein.
As shown in fig. 11, a sixth embodiment of the access control method of the present invention is based on the first embodiment of the access control method of the present invention, and step S13 includes:
s131: carrying out limit check on the uplink message to be sent, and acquiring the access probability of the uplink message;
the restriction check may adopt a restriction check method with the same formula as the ACDC mechanism of the L TE system, or may adopt other restriction check methods, which are not specifically limited herein.
Specifically, in an application example, the ue randomly generates a random number between 0 and 1 by using a random function, and uses the random number as the access probability of the uplink message, where the random function may be a uniformly distributed random function between 0 and 1, or may be another type of random function, and may be specifically set according to different access categories, and is not specifically limited herein.
S132: judging whether the access probability is larger than an access probability threshold value;
s133: and when the access probability is larger than the threshold value of the access probability, allowing the uplink message to be sent.
In the above application example, the downlink message further includes an access control parameter, where the access control parameter at least includes an access probability threshold corresponding to each access category; and the higher the priority is, the lower the access probability threshold value corresponding to the access category is, the higher the access possibility is. After the user equipment obtains the access probability (such as 0.5) of the uplink message, the access probability threshold (such as 0.3) corresponding to the access category can be obtained through the access category obtained by the previous matching, the access probability is compared with the access probability threshold, when the access probability is greater than the access probability threshold (such as 0.5 being greater than 0.3), the uplink message is allowed to be sent, and the user equipment can send the uplink message to the base station, that is, can initiate a service request, or can continue to send communication data to the base station.
Of course, in other embodiments, the access probability threshold may also be generated by the ue according to the priority of the access category, which is not specifically limited herein.
This embodiment can also be combined with any of the second to fifth embodiments of the access control method of the present invention and non-conflicting combinations thereof.
As shown in fig. 12, a seventh embodiment of the access control method of the present invention is based on the sixth embodiment of the access control method of the present invention, and step S13 further includes:
s134: and when the access probability of the uplink message is not greater than the access probability threshold value, the user equipment limits the transmission of the uplink message.
Specifically, in an application example, after obtaining the access probability (e.g., 0.2) of the uplink message to be sent, the user equipment may obtain an access probability threshold (e.g., 0.4) corresponding to the access category through the access category obtained by previous matching, compare the access probability with the access probability threshold, and when the access probability is not greater than the access probability threshold (e.g., 0.2 is less than 0.4), limit sending the uplink message, and the user equipment may not send the uplink message to the base station, that is, may not initiate a service request or may not continue sending communication data to the base station.
Alternatively, as shown in fig. 13, step S134 includes:
s1341: and storing the uplink message in a buffer area.
Specifically, in the above application example, when the ue restricts sending the uplink message, the uplink message may be temporarily stored in the buffer, and wait for the base station to update the access control mapping relationship, or wait for a period of time before performing restriction check again.
Of course, in other embodiments, the ue may also delete the uplink message directly, which is not limited herein.
As shown in fig. 14, an eighth embodiment of the access control method of the present invention is that, on the basis of the seventh embodiment of the access control method of the present invention, a user equipment is in an idle state, and step S134 further includes:
s1342: and starting an access waiting timer, and when the value of the timer is less than the access waiting time, the user equipment is not allowed to initiate the same service connection request.
When the ue is in an idle state, the uplink message to be sent is a service connection request message, such as a radio resource control signaling (RRC signaling), and the access control parameters further include access waiting time corresponding to each access category; the specific value of the access waiting time may be determined according to actual requirements, and is not specifically limited herein.
Specifically, in an application example, access waiting time corresponding to each access category is different, the access waiting time of the access category with a high priority is less than that of the access category with a low priority, the user equipment starts an access waiting timer of the access category corresponding to the uplink message while limiting the sending of the uplink message to be sent, and the user equipment does not initiate the same service request when the timing value of the access waiting timer is less than that of the access waiting time corresponding to the access category; when the timing value of the access waiting timer is equal to the access waiting time corresponding to the access category, the user equipment may initiate the same service request, and simultaneously, the timing value of the access waiting timer is cleared.
Of course, in other embodiments, the access waiting timer may not be cleared, and in the next time counting process, the access waiting time may be obtained by comparing the difference between the counted value and the value for starting counting with the access waiting time, and the access waiting time of each access category may also be changed according to the actual requirement, which is not specifically limited herein.
As shown in fig. 15, a ninth embodiment of the access control method of the present invention is based on the seventh embodiment of the access control method of the present invention, and further includes:
s14: the user equipment generates a mapping matrix, wherein the mapping matrix comprises an access category and an access state corresponding to the access category;
the access state comprises an allowed access state, a restricted access state and an unknown state, wherein the unknown state is an initial state of the access state, when the user equipment allows to send the uplink message to be sent, the access state corresponding to the access category matched with the QoS service flow identifier of the uplink message is set as the allowed access state, and when the user equipment restricts the sending of the uplink message to be sent, the access state is set as the restricted access state.
Specifically, in an application example, the user equipment generates a mapping matrix, as shown in fig. 16, the mapping matrix includes access statuses (Status) corresponding to access categories and each access category, wherein the access statuses include allowed access (Not Barred), restricted access (Barred), and unknown Status (N/a); in the initial state, the user equipment generates an access category including the access control mapping relation and an access state corresponding to the access category according to the received access control mapping relation, wherein the initial state of the access state, that is, the initial access state can be set to be null in an unknown state (N/a). When the user equipment allows to send the uplink message after checking the limitation of the uplink message to be sent, the access state corresponding to the access category matched with the QoS service flow identifier of the uplink message is set as the allowed access, and when the user equipment limits the sending of the uplink message, the access state corresponding to the access category matched with the QoS service flow identifier is set as the limited access.
Of course, in other embodiments, the initial access state may also be set to allow access or restrict access, and the mapping matrix further includes a service class corresponding to the access class and/or at least one auxiliary factor, and may further include a QoS service flow identifier corresponding to the service class and/or at least one auxiliary factor; or the mapping matrix further includes a QoS traffic flow identifier and/or at least one auxiliary factor corresponding to the access category, which is not specifically limited herein.
The steps of the present embodiment may be performed after step S131.
As shown in fig. 17, a tenth embodiment of the access control method of the present invention is that, on the basis of the ninth embodiment of the access control method of the present invention, the user equipment is in a connected state, and step S13 further includes:
s135: acquiring an access state corresponding to the access category from the mapping matrix;
s136: when the access state is the access permission state, the uplink message is sent;
s137: and when the access state is the access limit state, limiting the transmission of the uplink message.
The user equipment may limit the sending of the uplink message, store the uplink message in the buffer temporarily, wait for the access state to change to allow access, and then resend the uplink message, or directly discard the uplink message, which is not specifically limited herein.
Specifically, when the user equipment is in a connected state, after acquiring a QoS service flow identifier of an uplink message to be sent, the user equipment may find an access category matched with the QoS service flow identifier by using an access control mapping relationship, and then may directly acquire an access state corresponding to the access category from a stored mapping matrix, if the access state is allowed to be accessed, the user equipment sends the uplink message to the base station, and if the access state is restricted to be accessed, the user equipment restricts sending of the uplink message, thereby avoiding base station overload caused by excessive data sent by the user equipment.
In this embodiment, when the ue is in the connection state, the access state is directly obtained from the mapping matrix for access control, and it is not necessary to repeatedly perform the restriction check on each uplink message, which reduces the calculation amount of the ue, reduces the burden of the ue, and improves the access control efficiency.
In other embodiments, when the ue is in the connected state, the access control may still be performed by performing a restriction check on each uplink message, which is not specifically limited herein.
The step execution of the present embodiment may follow step S14.
As shown in fig. 18, an eleventh embodiment of the access control method according to the present invention is that, on the basis of the ninth embodiment of the access control method according to the present invention, the mapping matrix further includes an update period of each access status, and step S14 further includes:
s141: the user equipment judges whether the duration time of the access state is longer than the updating period of the access state;
specifically, as shown in fig. 19, the mapping matrix stored in the ue further includes an update period (Time Out) of each access state, and when the duration of each access state reaches the update period of the access state, the access state needs to be updated. The update period of each access status may be set according to actual requirements, and is not specifically limited herein.
S142: and when the duration of the access state is longer than the updating period of the access state, setting the access state to be an unknown state.
Specifically, when the ue sets each access status as allowed access/restricted access, for example, the Not Barred/Barred status shown in fig. 19 is to start a timer, and when the value of the timer is greater than the update period (e.g., 30 minutes) of the access status, it indicates that the duration of the access status needs to be updated, and the ue enters the access status as unknown status, for example, the N/a status shown in fig. 19, so as to perform restriction check on the next uplink message to be sent to implement status update.
Of course, in other embodiments, when the duration of the access state is longer than the update period of the access state, the ue may also set the access state to be null or clear the access state, and when receiving the message for updating the access control mapping relationship sent by the base station, the ue may also set the access state with the changed access category to be an unknown state, which is not specifically limited herein.
As shown in fig. 20, a twelfth embodiment of the access control method according to the present invention is based on the tenth embodiment of the access control method according to the present invention, and step S13 further includes:
s138: and when the access state is an unknown state, returning to the step of executing the limitation check on the uplink message and acquiring the access probability of the uplink message so as to set the access state corresponding to the uplink message as the allowed access or the limited access.
Specifically, in an application example, when the user equipment is in a connection state, after an access category matched with a QoS service flow identifier of an uplink message to be sent is acquired, and an access state corresponding to the access category obtained through matching is found to be an unknown state in a mapping matrix, the user equipment needs to perform restriction check on the uplink message, when the uplink message is allowed to be sent, the access state of the access category obtained through matching in the mapping matrix is set as allowed access, and when the sending of the uplink message is restricted, the access state of the access category obtained through matching is set as restricted access, so that updating of the access state in the mapping matrix is achieved.
This embodiment may be further combined with any one of the sixth, ninth, and eleventh embodiments of the access control method of the present invention, or a non-conflicting combination thereof.
As shown in fig. 21, the execution subject of the access control method according to the thirteenth embodiment of the present invention is a base station. The base station is connected with the core network and performs wireless communication with the user equipment to provide communication coverage for a corresponding geographic area. The base station may be a macro base station, a micro base station, a pico base station, or a home base station (femtocell). In some embodiments, a base station may also be referred to as a radio base station, access point, node B, evolved node B (eNodeB, eNB), gNB, or other suitable terminology. As shown in fig. 21, the present embodiment includes:
s21: generating an access control mapping relation, wherein the access control mapping relation comprises a mapping relation between access parameters and access categories;
the access parameter includes a QoS service flow identifier and/or at least one auxiliary factor, where the auxiliary factor is a state parameter of the ue itself, including at least one of a priority of the ue, a call type, a service type, and a roaming state of the ue, and may also include other ue-related parameters, which are not specifically limited herein.
Specifically, in an application example, as shown in fig. 3, a base station maps a QoS Flow identifier (QoS Flow ID, QFI) corresponding to at least one existing QoS Flow with an Access Category (AC) to generate an Access control mapping relationship, where the base station may map the QFI corresponding to QoS flows of the same type to the same AC based on a policy of an operator, for example, map a data Flow of a video service to the same AC, and the base station may send the downlink message to a user equipment according to a load condition of the base station to update the Access control mapping relationship. In other application examples, the access parameter may include only at least one auxiliary factor, and the base station may map the at least one auxiliary factor, for example, the priority of the user equipment is 1 and the service type is video, to the access category 2.
Of course, in other embodiments, the base station may perform mapping based on other mapping standards, for example, mapping QFIs corresponding to QoS service flows with the same QoS requirements to the same AC, and the like, and when the base station generates the access control mapping relationship, the base station may also consider other factors such as roaming state and priority of the user equipment, and may also add a service class (TC), and map the QFIs to the TCs first, and then map the TCs to the ACs, which is not limited herein.
S22: and sending a downlink message to the user equipment, wherein the downlink message comprises the access control mapping relation, so that the user equipment performs access control by using the access category corresponding to the access parameter of the uplink message to be sent, which is matched in the access control mapping relation.
The downlink message may be a radio resource control message or a system broadcast message, or may be other types of messages, the access category is a predefined category, and the number of the access categories and the specific access types may be determined according to actual needs, which is not specifically limited herein.
Specifically, as shown in fig. 3, the base station may send the downlink message to the user equipment in a broadcast manner, or may send the downlink message to the user equipment through a certain idle channel, which is not limited specifically here. After receiving the downlink message of the base station, before sending the uplink message to the base station, for example, when sending a service request uplink message to the base station, the user equipment searches for an access category corresponding to the QFI of the uplink message in the access control mapping relationship, that is, searches for an AC having a mapping relationship with the QFI of the uplink message, and if a matching AC is found, performs a subsequent access control step.
In this embodiment, the base station generates an access control mapping relationship and sends the access control mapping relationship to the user equipment, so that the user equipment can perform access decision according to the access control mapping relationship and execute corresponding access control, the user equipment can perform access control only by acquiring an access category corresponding to an uplink message to be sent in the access control mapping relationship, and the base station uniformly considers the access control mapping relationship, thereby reducing the burden of the user equipment and improving the access control efficiency, and the method can be applied to an idle state and a connection state of the user equipment, and has a wide application range and high compatibility.
As shown in fig. 22, a fourteenth embodiment of the access control method according to the present invention is an access control method according to the thirteenth embodiment of the present invention, and step S21 includes:
s211: a combination of at least one QoS traffic flow identification and/or at least one cofactor is mapped to an access class.
The auxiliary factor is a state parameter of the ue itself, including at least one of a priority, a call type, a service type, and a roaming state of the ue, and may further include other parameters related to the ue, which is not specifically limited herein.
Specifically, in an application example, the base station directly maps the QoS traffic flow identifiers to access categories, as shown in fig. 5, the base station may map at least one QoS traffic flow identifier to one access category, for example, 0x1a, 0x1b, and 0x1c to access category 1, and the base station may also map a combination of at least one QoS traffic flow identifier and at least one auxiliary factor to one access category, for example, 0x3a, 0x4d, and non-roaming user equipment (non-roaming UE) to access category 3.
Of course, in other application examples, when the base station generates the access control mapping relationship, only the mapping relationship between the QoS traffic stream identifier and the access category may be generated, or only the mapping relationship between the combination of the QoS traffic stream identifier and at least one auxiliary factor and the access category may be generated, or only the mapping relationship between at least one auxiliary factor and the access category may be generated, which is not specifically limited herein.
In this embodiment, when the base station generates the access control mapping relationship, the state of the user equipment is also considered, for example, the user equipment which is roaming and non-roaming is distinguished, so that the consideration is more comprehensive, the application range of the user equipment is wider, and the efficiency of the user equipment performing access control by using the access control mapping relationship is higher.
As shown in fig. 23, a fifteenth embodiment of the access control method of the present invention is based on the thirteenth embodiment of the access control method of the present invention, and step S21 further includes:
s212: setting access control parameters corresponding to each access category, wherein the access control parameters comprise an access probability threshold value and access waiting time; wherein, the downlink message also includes the access control parameter.
Specifically, in an application example, the higher the priority, the lower the access probability threshold corresponding to the access category is, the higher the access probability is. When the base station generates the access control mapping relation, the base station also sets corresponding access control parameters for each access category, and generates downlink messages by the access control mapping relation and the access control parameters and sends the downlink messages to the user equipment. When the user equipment receives the downlink message, the access control can be performed by using the obtained access control mapping relationship and the access control parameters, wherein the specific process of performing access control by the user equipment can refer to any one of the sixth to twelfth embodiments of the access control method of the present invention or a non-conflicting combination thereof, and the description is not repeated here.
Of course, in other embodiments, the access probability threshold may also be generated by the ue according to the priority of the access category, which is not specifically limited herein.
As shown in fig. 24, a sixteenth embodiment of the access control method according to the present invention is the access control method according to the thirteenth embodiment of the present invention, which further includes, before step S21:
s20: and receiving a mapping notification message from the core network equipment, wherein the mapping notification message comprises the QoS service flow identification and/or the mapping relation between at least one auxiliary factor and the service class.
The core network device may be a gateway, a router, or the like, such as a Mobility Management Entity (MME) in the L TE system or a Serving GPRS Support Node (SGSN) in the UMTS system, which is not limited herein.
Specifically, in an application example, as shown in fig. 25 and fig. 26, when there are many QoS traffic flows, the core network device may map at least one QoS traffic flow identifier to one traffic class, for example, mapping QoS traffic flow identifiers 0x1a and 0x1b to traffic class 1, mapping QoS traffic flow identifier 0x1c to traffic class 2, and generating a mapping notification message according to a mapping relationship between the QoS traffic flow identifier and the traffic class, and sending the mapping notification message to the base station, so that the base station generates an access control mapping relationship and sends the access control mapping relationship to the user equipment, so that the user equipment may perform access control by using the access class obtained by matching in the access control mapping relationship. In another application example, the core network device may map at least one auxiliary factor to a Service class, for example, as shown in fig. 26, map a Service type of video (Service) to a Service class 5, and send the mapping relationship to the base station, which is not limited in this embodiment.
In this embodiment, the core network device completes the mapping relationship between the QoS service stream identifier and/or the at least one auxiliary factor and the service class in advance, and sends the mapping relationship to the base station, and the base station receives the mapping relationship, and only needs to generate the mapping relationship between the service class and the access class, so that the load of the base station is reduced.
As shown in fig. 27, a seventeenth embodiment of the access control method according to the present invention is the sixteenth embodiment of the access control method according to the present invention, wherein step S21 further includes:
s213: and generating a mapping relation between the service class and/or at least one auxiliary factor and the access class.
The auxiliary factor is a state parameter of the ue itself, including at least one of a priority, a call type, a service type, and a roaming state of the ue, and may further include other parameters related to the ue, which is not specifically limited herein.
Alternatively, as shown in fig. 28, step S213 includes:
s2131: at least one traffic class and/or at least one helper factor is mapped to an access class.
For example, as shown in fig. 29, traffic class 1 and traffic class 2(TC ═ 1, 2) are mapped to access class 1, a combination of traffic class 3(TC ═ 3) and user equipment priority 1(UE Category ═ 1) is mapped to access class 2, and non-roaming user equipment (non-roaming UE) is mapped to access class 3.
Of course, in other application examples, the base station may map only at least one service class to one access class, or map only a combination of at least one service class and at least one auxiliary factor to one access class, or map only at least one auxiliary factor to one access class, which is not specifically limited herein.
In this embodiment, when the base station generates the access control mapping relationship, multiple factors such as the service type and the state of the user equipment are considered comprehensively, so that the application scenarios are more, and the effect is better when the user equipment performs access control by using the access control mapping relationship.
As shown in fig. 30, the execution main body of the access control method according to the eighteenth embodiment of the present invention is a core network device, where the core network mainly provides user connection, user management, and service completion bearer, and provides an interface to an external network as a bearer network, and the core network device includes a gateway, a router, and other devices, such as a Mobility Management Entity (MME) in the L TE system or a GPRS service support node (SGSN) in the UMTS system, and as shown in fig. 30, this embodiment includes:
s31: generating a mapping relation between the QoS service flow identifier and/or at least one auxiliary factor and the service category;
s32: and sending a mapping notification message to the base station to enable the base station to generate the access control mapping relation, wherein the notification message comprises the QoS service flow identification and/or the mapping relation between the at least one auxiliary factor and the service class.
Alternatively, as shown in fig. 31, step S31 includes:
s311: at least one QoS traffic flow identification and/or at least one cofactor is mapped to a traffic class.
Specifically, in an application example, as shown in fig. 25 and fig. 26, when there are many QoS traffic flows, the core network device may map at least one QoS traffic flow identifier to one traffic class, for example, mapping QoS traffic flow identifiers 0x1a and 0x1b to traffic class 1, mapping QoS traffic flow identifier 0x1c to traffic class 2, and generating a mapping notification message according to a mapping relationship between the QoS traffic flow identifier and the traffic class, and sending the mapping notification message to the base station, so that the base station generates an access control mapping relationship and sends the access control mapping relationship to the user equipment, so that the user equipment may perform access control by using the access class obtained by matching in the access control mapping relationship. The core network device may map QoS service flows of the same class to the same service class based on an operator policy, for example, map QoS service flows of video services to the same service class, and of course, the core network device may also map QoS service flow identifiers and service classes based on other factors, which is not specifically limited herein. In another application example, the core network device may also map at least one auxiliary factor to one Service class, for example, as shown in fig. 26, map a Service type video (Service) to a Service class 5, and send the mapping relationship to the base station, which is not limited herein.
In this embodiment, the core network device completes the mapping relationship between the QoS service stream identifier and/or the at least one auxiliary factor and the service class in advance, and sends the mapping relationship to the base station, and the base station receives the mapping relationship, and only needs to generate the mapping relationship between the service class and the access class, so that the load of the base station is reduced.
As shown in fig. 32, the first embodiment of the communication device 10 of the present invention includes: a processor 110 and a communication circuit 120, the processor 110 being connected to the communication circuit 120;
the communication circuit 120 is used for transmitting and receiving data, and is an interface for the communication device 10 to communicate with other communication devices.
The processor 110 controls the operation of the communication device, and the processor 110 may also be referred to as a Central Processing Unit (CPU). The processor 110 may be an integrated circuit chip having signal processing capabilities. The processor 110 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The processor 110 is operative to execute instructions to carry out the methods provided by any one of the first to twelfth embodiments of the communication method of the present invention and any non-conflicting combinations.
Of course, in other embodiments, the communication device 10 may further include other components such as a memory (not shown), which is not specifically limited herein.
The communication device in this embodiment may be a user equipment, such as a terminal, or may be a separate component, such as a baseband chip, that may be integrated in the terminal.
As shown in fig. 33, the second embodiment of the communication device 20 of the present invention includes: processor 210 and communication circuit 220, communication circuit 220 is connected to processor 210.
The communication circuit 220 is used for transmitting and receiving data, and is an interface for the communication device 20 to communicate with other communication devices.
The processor 210 controls the operation of the communication device, and the processor 210 may also be referred to as a Central Processing Unit (CPU). The processor 210 may be an integrated circuit chip having signal processing capabilities. The processor 210 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The processor 210 is adapted to execute instructions to carry out the method provided by any one of the thirteenth to seventeenth embodiments of the communication method of the present invention, as well as any non-conflicting combinations thereof.
Of course, in other embodiments, the communication device 20 may further include other components such as a memory (not shown), which is not specifically limited herein.
The communication device in this embodiment may be a base station, or may be a separate component, such as a baseband board, which may be integrated in the base station.
As shown in fig. 34, the third embodiment of the communication device 30 of the present invention includes: processor 310 and communication circuit 320, processor 310 is connected to communication circuit 320.
The communication circuit 320 is used for transmitting and receiving data, and is an interface for the communication device 30 to communicate with other communication devices.
The processor 310 controls the operation of the communication device, and the processor 310 may also be referred to as a CPU (Central processing unit). The processor 310 may be an integrated circuit chip having signal processing capabilities. The processor 310 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The processor 310 is used for executing instructions to implement the method provided by the eighteenth embodiment of the communication method of the present invention.
Of course, in other embodiments, the communication device 30 may further include other components such as a memory (not shown), which is not specifically limited herein.
The communication device in this embodiment may be a core network device, such as a gateway, a router, or an independent component that may be integrated in the core network device.
As shown in fig. 35, the fourth embodiment of the communication device 40 of the present invention includes:
a communication module 401, configured to receive, by a user equipment, a downlink message from a base station, where the downlink message includes an access control mapping relationship, and the access control mapping relationship includes a mapping relationship between an access parameter and an access category;
a matching module 402, configured to match, in the access control mapping relationship, an access category corresponding to an access parameter of an uplink message to be sent;
and a control module 403, configured to perform access control by using the access category obtained through matching.
Of course, in other embodiments, the communication device 40 may further include other modules such as a storage module (not shown), which is not limited herein.
The communication device in this embodiment may be a user equipment, such as a terminal, or may be a separate component, such as a baseband chip, that may be integrated in the terminal.
As shown in fig. 36, a fifth embodiment of the communication apparatus 50 of the present invention includes:
a mapping module 501, configured to generate an access control mapping relationship, where the access control mapping relationship includes a mapping relationship between an access parameter and an access category;
the communication module 502 is configured to send a downlink message to the ue, where the downlink message includes an access control mapping relationship, so that the ue performs access control by using an access category corresponding to an access parameter of an uplink message to be sent, which is matched in the access control mapping relationship.
Of course, in other embodiments, the communication device 40 may further include other modules such as a storage module (not shown), which is not limited herein.
The communication device in this embodiment may be a base station, or may be a separate component, such as a baseband board, which may be integrated in the base station.
As shown in fig. 37, the sixth embodiment of the communication device 60 of the present invention includes:
the mapping module 601 is configured to generate a mapping relationship between a QoS service flow identifier and/or at least one auxiliary factor and a service class;
a communication module 602, configured to send a mapping notification message to a base station to enable the base station to generate an access control mapping relationship, where the notification message includes a mapping relationship between a QoS traffic flow identifier and/or at least one auxiliary factor and a traffic class.
Of course, in other embodiments, the communication device 60 may further include other modules such as a storage module (not shown), which is not limited herein.
The communication device in this embodiment may be a core network device, such as a gateway, a router, or an independent component that may be integrated in the core network device.
As shown in fig. 38, in the first embodiment of the apparatus having a storage function according to the present invention, a program 701 is stored in the apparatus 70 having a storage function, and when the program 701 is executed, the method provided by any one of the first to twelfth embodiments of the communication method according to the present invention and any non-conflicting combinations is implemented.
The device 70 with storage function may be a portable storage medium such as a usb disk and an optical disk, or may be a base station, a server or a separate component which can be integrated in the base station, such as a baseband board.
As shown in fig. 39, in a second embodiment of the device with storage function of the present invention, a program 801 is stored in the device with storage function 80, and when the program 801 is executed, the method provided by any one of the thirteenth to seventeenth embodiments of the communication method of the present invention and any non-conflicting combination is implemented.
The device 80 with storage function may be a portable storage medium such as a usb disk and an optical disk, or may be a terminal, a server or a separate component which can be integrated in the terminal, such as a baseband chip.
As shown in fig. 40, in a third embodiment of the device with storage function according to the present invention, a program 901 is stored in a device 90 with storage function, and when the program 901 is executed, the method provided by any one of the eighteenth embodiment of the communication method according to the present invention and any non-conflicting combination is implemented.
The device 90 with storage function may be a portable storage medium such as a usb disk and an optical disk, or may be a terminal, a server or a separate component which can be integrated in the terminal, such as a baseband chip.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (29)

1. An access control method, comprising:
the method comprises the steps that user equipment receives downlink information from a base station, wherein the downlink information comprises an access control mapping relation and access control parameters, the access control mapping relation comprises an access parameter and an access category mapping relation, and the access control parameters at least comprise access probability threshold values corresponding to each access category;
matching access categories corresponding to access parameters of the uplink message to be sent in the access control mapping relation;
performing access control by using the access category obtained by matching;
the performing access control on the uplink message by using the access category obtained by matching includes:
acquiring the access probability of the uplink message;
judging whether the access probability is larger than the access probability threshold value; when the access probability is greater than the access probability threshold value, allowing the uplink message to be sent; when the access probability is not greater than the access probability threshold value, the user equipment limits the sending of the uplink message;
generating a mapping matrix based on a judgment result, wherein the mapping matrix comprises the access types and access states corresponding to the access types, the access states comprise an access permission state, an access restriction state and an unknown state, and the unknown state is an initial state of the access states; when the judgment result is that the uplink message is allowed to be sent, the access state corresponding to the access category of the uplink message is set as allowed access, and when the sending of the uplink message is limited, the access state is set as limited access;
the mapping matrix also comprises an updating period of each access state, and the user equipment judges whether the duration of the access state is longer than the updating period of the access state or not;
when the duration of the access state is longer than the update period of the access state, setting the access state to be an unknown state;
when the user equipment is in the connection state, the access state is directly obtained from the mapping matrix for access control, and the limitation check of each uplink message is not required to be repeated, so that the calculation amount of the user equipment is reduced, the burden of the user equipment is reduced, and the access control efficiency is improved.
2. The method of claim 1, wherein the access parameter comprises a QoS traffic flow identifier and/or at least one auxiliary factor;
the matching of the access category corresponding to the access parameter of the uplink message to be sent in the access control mapping relationship comprises:
searching for an access category having a mapping relation with the QoS service flow identifier of the uplink message to be sent and/or at least one auxiliary factor in the access control mapping relation;
wherein the secondary factor is a status parameter of the user equipment.
3. The method of claim 2, wherein matching, in the access control mapping relationship, the access category corresponding to the access parameter of the uplink message to be sent further comprises:
and when the access category matched with the QoS service flow identification and/or at least one auxiliary factor is not found in the access control mapping relation, the user equipment maps the QoS service flow identification and/or at least one auxiliary factor to the access category with the lowest priority.
4. The method of claim 1, wherein the access parameter comprises a QoS traffic flow identifier and/or at least one auxiliary factor;
the matching of the access category corresponding to the access parameter of the uplink message to be sent in the access control mapping relationship comprises:
searching the service category which has a mapping relation with the QoS service flow identifier and/or at least one auxiliary factor of the uplink message to be sent in the access control mapping relation;
matching the access category corresponding to the service category in the access control mapping relation;
wherein the secondary factor is a status parameter of the user equipment.
5. The method of claim 4, wherein matching the access category corresponding to the access parameter of the uplink message to be sent in the access control mapping relationship further comprises:
and when the service class which has the mapping relation with the QoS service flow identification and/or at least one auxiliary factor is not found in the access control mapping relation, the user equipment maps the QoS service flow identification and/or at least one auxiliary factor to the service class with the lowest priority.
6. The method of claim 4, wherein the matching the access category corresponding to the traffic category in the access control mapping relationship comprises:
and searching the access control mapping relation for the access category which has the mapping relation with the service category and/or at least one auxiliary factor.
7. The method of claim 1, wherein the uplink message is a service connection request message when the ue is in an idle state; the access control parameters further comprise access waiting time corresponding to each access category;
the limiting, by the ue, the sending of the uplink message further comprises:
and starting an access waiting timer, wherein the user equipment does not allow the same service connection request to be initiated when the value of the timer is less than the access waiting time.
8. The method of claim 1, wherein when the ue is in the connected state, directly obtaining the access state from the mapping matrix for access control comprises:
acquiring an access state corresponding to the access category in the mapping matrix;
when the access state is the access permission state, the uplink message is sent;
and when the access state is the access limit state, limiting the sending of the uplink message.
9. The method of claim 1 or 8, wherein the limiting the transmission of the uplink message comprises:
and storing the uplink message in a buffer area.
10. The method of claim 8, wherein after obtaining the access status corresponding to the access category in the mapping matrix, the method further comprises:
and when the access state is an unknown state, returning to the step of executing the limitation check on the uplink message and acquiring the access probability of the uplink message, so as to set the access state corresponding to the uplink message as an allowed access or a limited access.
11. The method according to claim 1, wherein the mapping matrix further comprises a traffic class and/or at least one auxiliary factor corresponding to the access class; or, the mapping matrix further includes a service class and/or at least one auxiliary factor corresponding to the access class, and a QoS service flow identifier and/or at least one auxiliary factor corresponding to the service class.
12. The method of claim 1, wherein the mapping matrix further comprises a QoS traffic flow identifier and/or at least one auxiliary factor corresponding to the access category.
13. The method according to any of claims 2-6 and 11-12, wherein the secondary factors comprise at least one of a priority of the user equipment, a call type, a service type and a roaming status of the user equipment.
14. The method of claim 1, wherein the downlink message is a radio resource control message or a system broadcast message.
15. An access control method, comprising:
generating an access control mapping relation, wherein the access control mapping relation comprises a mapping relation between access parameters and access categories;
sending a downlink message to a user equipment, where the downlink message includes the access control mapping relationship, so that the user equipment obtains an access probability of an uplink message to be sent corresponding to an access parameter of the uplink message to be sent, which is matched in the access control mapping relationship, based on the access category, and determines whether the access probability is greater than an access probability threshold, where the uplink message is allowed to be sent when the access probability is greater than the access probability threshold, the uplink message is limited to be sent when the access probability is not greater than the access probability threshold, and the user equipment generates a mapping matrix based on a determination result, where the mapping matrix includes access states corresponding to the access categories, and the access states include an allowed access state, an access state, a non-allowed state, and an, Restricting access and an unknown state, the unknown state being an initial state of the access state; when the judgment result is that the uplink message is allowed to be sent, the access state corresponding to the access category of the uplink message is set as allowed access, and when the sending of the uplink message is limited, the access state is set as limited access; and when the mapping matrix further comprises an update period of each access state, the user equipment is further enabled to judge whether the duration of the access state is longer than the update period of the access state; when the duration of the access state is longer than the update period of the access state, setting the access state to be an unknown state; and when the user equipment is in the connection state, the access state is directly acquired from the mapping matrix for access control, and the limitation check on each uplink message is not required to be repeated, so that the calculation amount of the user equipment is reduced, the burden of the user equipment is reduced, and the access control efficiency is improved.
16. The method of claim 15, wherein the access parameter comprises a QoS traffic flow identifier and/or at least one auxiliary factor;
the generating the access control mapping relationship comprises:
mapping at least one of the QoS traffic flow identification and/or at least one helper factor to an access class.
17. The method of claim 16, wherein the generating the access control mapping further comprises:
setting access control parameters corresponding to each access category, wherein the access control parameters comprise an access probability threshold value and access waiting time;
wherein the downlink message further includes the access control parameter.
18. The method of claim 15, wherein before generating the access control mapping relationship, the method further comprises:
receiving a mapping notification message from a core network device, wherein the mapping notification message comprises a QoS service flow identification and/or a mapping relation between at least one auxiliary factor and a service class.
19. The method of claim 18, wherein generating the access control mapping comprises:
and generating a mapping relation between the service category and/or at least one auxiliary factor and the access category.
20. The method of claim 19,
the generating of the mapping relationship between the traffic class and/or the at least one auxiliary factor and the access class includes:
mapping at least one of said traffic classes and/or at least one of said assistances to one of said access classes.
21. The method according to any of claims 16, 19-20, wherein the secondary factors comprise at least one of a priority of the user equipment, a call type, a service type, and a roaming status of the user equipment.
22. The method according to any of claims 15-20, wherein the downlink message is a radio resource control message or a system broadcast message.
23. An access control method, comprising:
generating a mapping relation between the QoS service flow identification and/or at least one auxiliary factor and the service category;
sending a mapping notification message to a base station to enable the base station to generate an access control mapping relation and send the mapping relation to a user equipment, wherein the notification message comprises the QoS service flow identification and/or the mapping relation between at least one auxiliary factor and a service class, enabling the user equipment to acquire an access probability of the uplink message based on the access class, and judging whether the access probability is greater than an access probability threshold value, wherein the uplink message is allowed to be sent when the access probability is greater than the access probability threshold value, the sending of the uplink message is limited when the access probability is not greater than the access probability threshold value, and the user equipment is further enabled to generate a mapping matrix based on a judgment result, wherein the mapping matrix comprises access states corresponding to the access classes and the access classes, and the access states comprise access allowed states, access control states and service class mapping relations, Restricting access and an unknown state, the unknown state being an initial state of the access state; when the judgment result is that the uplink message is allowed to be sent, the access state corresponding to the access category of the uplink message is set as allowed access, and when the sending of the uplink message is limited, the access state is set as limited access; and when the mapping matrix further comprises an update period of each access state, the user equipment is further enabled to judge whether the duration of the access state is longer than the update period of the access state; when the duration of the access state is longer than the update period of the access state, setting the access state to be an unknown state; and when the user equipment is in the connection state, the access state is directly acquired from the mapping matrix for access control, and the limitation check on each uplink message is not required to be repeated, so that the calculation amount of the user equipment is reduced, the burden of the user equipment is reduced, and the access control efficiency is improved.
24. The method of claim 23, wherein generating the mapping relationship between the QoS traffic flow identifier and/or the at least one auxiliary factor and the traffic class comprises:
mapping at least one said QoS traffic flow identification and/or at least one helper factor to one said traffic class.
25. A communication device, comprising: the processor is connected with the communication circuit;
the processor is configured to execute instructions to implement the method of any of claims 1-14, 15-22, 23-24.
26. A device having storage functionality storing instructions that, when executed, implement the method of any of claims 1-14, 15-22, 23-24.
27. A communication device, comprising:
a communication module, configured to receive, by a user equipment, a downlink message from a base station, where the downlink message includes an access control mapping relationship, and the access control mapping relationship includes a mapping relationship between an access parameter and an access category;
the matching module is used for matching the access category corresponding to the access parameter of the uplink message to be sent in the access control mapping relation;
the control module is used for performing access control by using the access category obtained by matching; wherein the performing access control on the uplink message by using the access category obtained by matching includes:
acquiring the access probability of the uplink message;
judging whether the access probability is larger than the access probability threshold value; when the access probability is greater than the access probability threshold value, allowing the uplink message to be sent; when the access probability is not greater than the access probability threshold value, the user equipment limits the sending of the uplink message;
generating a mapping matrix based on a judgment result, wherein the mapping matrix comprises the access types and access states corresponding to the access types, the access states comprise an access permission state, an access restriction state and an unknown state, and the unknown state is an initial state of the access states; when the judgment result is that the uplink message is allowed to be sent, the access state corresponding to the access category of the uplink message is set as allowed access, and when the sending of the uplink message is limited, the access state is set as limited access;
the mapping matrix also comprises an updating period of each access state, and the user equipment judges whether the duration of the access state is longer than the updating period of the access state or not;
when the duration of the access state is longer than the update period of the access state, setting the access state to be an unknown state;
when the user equipment is in the connection state, the access state is directly obtained from the mapping matrix for access control, and the limitation check of each uplink message is not required to be repeated, so that the calculation amount of the user equipment is reduced, the burden of the user equipment is reduced, and the access control efficiency is improved.
28. A communication device, comprising:
the mapping module is used for generating an access control mapping relation, and the access control mapping relation comprises a mapping relation of access parameters and access categories;
a communication module, configured to send a downlink message to a user equipment, where the downlink message includes the access control mapping relationship, so that the user equipment obtains an access probability of an uplink message to be sent, based on the access category, and determines whether the access probability is greater than an access probability threshold, where the uplink message is allowed to be sent when the access probability is greater than the access probability threshold, and the sending of the uplink message is limited when the access probability is not greater than the access probability threshold, and the user equipment generates a mapping matrix based on a determination result, where the mapping matrix includes access states corresponding to the access categories, and the access states include an allowed access state, a permitted access probability, and a maximum access probability, Restricting access and an unknown state, the unknown state being an initial state of the access state; when the judgment result is that the uplink message is allowed to be sent, the access state corresponding to the access category of the uplink message is set as allowed access, and when the sending of the uplink message is limited, the access state is set as limited access; and when the mapping matrix further comprises an update period of each access state, the user equipment is further enabled to judge whether the duration of the access state is longer than the update period of the access state; when the duration of the access state is longer than the update period of the access state, setting the access state to be an unknown state; and when the user equipment is in the connection state, the access state is directly acquired from the mapping matrix for access control, and the limitation check on each uplink message is not required to be repeated, so that the calculation amount of the user equipment is reduced, the burden of the user equipment is reduced, and the access control efficiency is improved.
29. A communication device, comprising:
the mapping module is used for generating a mapping relation between the QoS service flow identifier and/or at least one auxiliary factor and the service category;
a communication module, configured to send a mapping notification message to a base station, so that the base station generates an access control mapping relationship and sends the mapping relationship to a user equipment, where the notification message includes the QoS service flow identifier and/or a mapping relationship between at least one auxiliary factor and a service class, so that the user equipment obtains an access probability of the uplink message based on the access class, and determines whether the access probability is greater than an access probability threshold, where the uplink message is allowed to be sent when the access probability is greater than the access probability threshold, and the sending of the uplink message is limited when the access probability is not greater than the access probability threshold, and further, so that the user equipment generates a mapping matrix based on a determination result, where the mapping matrix includes access statuses corresponding to the access classes and the access classes, and the access statuses include an allowed access, a permitted access, a service class, Restricting access and an unknown state, the unknown state being an initial state of the access state; when the judgment result is that the uplink message is allowed to be sent, the access state corresponding to the access category of the uplink message is set as allowed access, and when the sending of the uplink message is limited, the access state is set as limited access; and when the mapping matrix further comprises an update period of each access state, the user equipment is further enabled to judge whether the duration of the access state is longer than the update period of the access state; when the duration of the access state is longer than the update period of the access state, setting the access state to be an unknown state; and when the user equipment is in the connection state, the access state is directly acquired from the mapping matrix for access control, and the limitation check on each uplink message is not required to be repeated, so that the calculation amount of the user equipment is reduced, the burden of the user equipment is reduced, and the access control efficiency is improved.
CN201710649243.1A 2017-08-01 2017-08-01 Access control method, communication equipment and equipment with storage function Active CN109327882B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710649243.1A CN109327882B (en) 2017-08-01 2017-08-01 Access control method, communication equipment and equipment with storage function
PCT/CN2017/107974 WO2019024276A1 (en) 2017-08-01 2017-10-27 Access control method, communication device, and device with storage function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710649243.1A CN109327882B (en) 2017-08-01 2017-08-01 Access control method, communication equipment and equipment with storage function

Publications (2)

Publication Number Publication Date
CN109327882A CN109327882A (en) 2019-02-12
CN109327882B true CN109327882B (en) 2020-07-31

Family

ID=65233155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710649243.1A Active CN109327882B (en) 2017-08-01 2017-08-01 Access control method, communication equipment and equipment with storage function

Country Status (2)

Country Link
CN (1) CN109327882B (en)
WO (1) WO2019024276A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3949520A4 (en) * 2019-03-28 2022-11-23 Nokia Technologies OY Access control barring based on cell quality
CN111866989A (en) * 2019-04-28 2020-10-30 华为技术有限公司 Communication method, device and system
CN110177391B (en) * 2019-06-06 2021-06-18 北京之乐时空科技有限公司 Control information transmission method and system for four-axis aircraft
CN113424639B (en) * 2019-06-27 2023-06-23 Oppo广东移动通信有限公司 Access control method, device and terminal
CN115104326A (en) * 2020-04-17 2022-09-23 Oppo广东移动通信有限公司 Connection establishing method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835473A (en) * 2005-03-17 2006-09-20 中兴通讯股份有限公司 Method of mapping scheduler priority level mark in high speed down packet access system
CN101969635A (en) * 2010-04-30 2011-02-09 中兴通讯股份有限公司 Access control method and system for machine communication
CN104322108A (en) * 2013-05-03 2015-01-28 华为技术有限公司 Access control method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938808A (en) * 2009-06-30 2011-01-05 中兴通讯股份有限公司 Information acquisition method and device
CN101674613B (en) * 2009-09-25 2012-07-04 中兴通讯股份有限公司 Access level control method and system
CN102118833A (en) * 2011-03-04 2011-07-06 电信科学技术研究院 Cell accessing indication method, cell selection method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835473A (en) * 2005-03-17 2006-09-20 中兴通讯股份有限公司 Method of mapping scheduler priority level mark in high speed down packet access system
CN101969635A (en) * 2010-04-30 2011-02-09 中兴通讯股份有限公司 Access control method and system for machine communication
CN104322108A (en) * 2013-05-03 2015-01-28 华为技术有限公司 Access control method and device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
5G access control mechanism;Intel Corporation;《3GPP TSG RAN WG2 AdHoc Meeting,R2-1707046》;20170617;1-3节 *
Access Control for NR;Ericsson;《3GPP TSG-RAN WG2 #97,R2-1700911》;20170204;1-3节 *
Ericsson.Access Control for NR.《3GPP TSG-RAN WG2 #97,R2-1700911》.2017,1-3节. *
Unified Access Control in different RRC Modes;Qualcomm Incorporated;《3GPP TSG-RAN2 Meeting NR Ad Hoc #2,R2-1706890》;20170617;1-3节 *

Also Published As

Publication number Publication date
CN109327882A (en) 2019-02-12
WO2019024276A1 (en) 2019-02-07

Similar Documents

Publication Publication Date Title
CN109327882B (en) Access control method, communication equipment and equipment with storage function
CN110809899B (en) Method and network device for transmitting data
CN109769269B (en) Communication method and network device
US8750213B2 (en) Providing a deny response that specifies a delay time
CN108605266B (en) Wireless access control method, device and system
WO2012146101A1 (en) Eab parameter processing method and apparatus, access processing method, apparatus and system
US11778591B2 (en) Method for selecting a plurality of carriers and related device
US20160095046A1 (en) Method and Apparatus for Use in Network Selection
WO2023130471A1 (en) Cell access method and apparatus, and device and readable storage medium
WO2018219253A1 (en) Access control method and apparatus
IL268179A (en) Access method, and terminal
WO2014205621A1 (en) Overload control method and apparatus
CN113950851A (en) Wireless communication method and apparatus
WO2020192387A1 (en) Request processing method, related apparatus and system
WO2022171119A1 (en) Communication method and device
US11388653B2 (en) Method and apparatus providing access control
WO2020082381A1 (en) Access control method, terminal, and storage medium
CN110662265A (en) Reselection access method, device and storage medium
WO2023213112A1 (en) Communication method and apparatus
CN116419310A (en) Slice access control method and device and network equipment
CN115314881A (en) Information processing method, device, communication equipment and readable storage medium
CN114342511A (en) Communication method and communication device
US9185596B2 (en) Apparatus and method for avoiding data loss associated with a QoS reservation failure
CN114980258A (en) Access control method, device and storage medium
CN114982284A (en) Communication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant