CN111786848B - Protocol consistency test method and system for 5G terminal unified access control - Google Patents

Protocol consistency test method and system for 5G terminal unified access control Download PDF

Info

Publication number
CN111786848B
CN111786848B CN202010491099.5A CN202010491099A CN111786848B CN 111786848 B CN111786848 B CN 111786848B CN 202010491099 A CN202010491099 A CN 202010491099A CN 111786848 B CN111786848 B CN 111786848B
Authority
CN
China
Prior art keywords
access
terminal
tested
host computer
cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010491099.5A
Other languages
Chinese (zh)
Other versions
CN111786848A (en
Inventor
王晰
李卫
王雨斐
赵健
袁俊崧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing telecommunication technology development industry association
Original Assignee
Beijing telecommunication technology development industry association
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing telecommunication technology development industry association filed Critical Beijing telecommunication technology development industry association
Priority to CN202010491099.5A priority Critical patent/CN111786848B/en
Publication of CN111786848A publication Critical patent/CN111786848A/en
Application granted granted Critical
Publication of CN111786848B publication Critical patent/CN111786848B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/18Protocol analysers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A protocol consistency test method and system for 5G terminal unified access control are disclosed. The method comprises the steps of establishing a first cell and a second cell through a main computer control system simulator, controlling a terminal to be tested to be registered in the first cell, modifying access limiting parameters of system information blocks of the first cell and the second cell through the control system simulator, detecting that the terminal to be tested initiates an access request of a service type AC matched with a limited access identifier, and detecting protocol consistency of unified access control of the terminal to be tested according to whether the terminal to be tested initiates the access request. Therefore, the protocol consistency test of the 5G terminal unified access control function can be completed, and the 5G terminal can make correct judgment to complete normal access, access restriction and waiting access restriction relieving operation when the 5G network controls the access of the 5G terminal.

Description

Protocol consistency test method and system for 5G terminal unified access control
Technical Field
The invention relates to the technical field of communication, in particular to a protocol consistency test method and a system for 5G terminal unified access control.
Background
Fifth generation mobile communication standard (5G), also known as fifth generation mobile communication technology. It is an extension of the fourth generation mobile communication standard (4G). The 5G has high speed, low time delay and multi-connection capacity, and can provide flexible system design to meet diversified requirements of the Internet of things, such as ultra-high definition videos, virtual reality, the Internet of things, the Internet of vehicles, the industrial Internet of things, smart homes, telemedicine, mobile clouds and the like. Therefore, the 5G core network introduces the concepts of network slice and QoS (Quality of Service) flow, and the design is more flexible. Accordingly, the access mechanism is also different from 4G. The Access Barring (Access Barring) mechanism of 4G includes a plurality of mechanisms such as ACB (Access Class Barring), EAB (Extended Access Barring), SSAC (Service Specific Access Control), ACDC (Application Specific Congestion Control for Data Communication), and AC for CSFB (Access Control for CSFB, circuit domain fallback Access Control). On the other hand, in the 5G network, on the basis of the 4G network, factors such as a network slice and an RNA Update (radio Access network Notification Area Update) need to be considered, and thus, the 5G network controls Access of the terminal by using a UAC (Unified Access Control) mechanism.
At present, a method for testing the consistency of UAC functions of a 5G terminal is lacked.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method and a system for testing protocol consistency of 5G terminal unified access control, which can complete a protocol consistency test on a 5G terminal unified access control function, and ensure that when a 5G network controls access of a 5G terminal, the 5G terminal can make a correct judgment, and complete normal access, access restriction, and operation of waiting for release of the access restriction.
In a first aspect, an embodiment of the present invention provides a method for testing protocol consistency of 5G terminal unified access control, where the method includes:
the method comprises the steps that a main computer control system simulator establishes a first cell of a first tracking area and a second cell of a second tracking area, wherein the first cell and the second cell are Home Public Land Mobile Network (HPLMN) cells;
when the test access identifiers are AI1, AI2, AI11, AI12, AI13, AI14 and AI15, the host computer controls the terminal to be tested to configure basic file EF parameters of the universal subscriber identity card USIM, wherein the parameters comprise an international mobile subscriber identity EF codeIMSIParameter, access technology based user controlled public land mobile network PLMN selection EFPLMNwAcTParameter, equivalent home network EFEHPLMNParameter, home public land mobile network, HPLMN, selection of EF based on access technologyHPLMNwAcTParameter, USIM service table EFUSTConfiguration EF of parameter and unified access control access identifierUAC_AICParameters and access control class EFACCParameter(s);
The host computer controls the terminal to be tested to register in the first cell, wherein if the test service type is AC32-AC63, the control system simulator sets an access type definition parameter defined by an operator in a registration acceptance message;
the main computer control system simulator activates a test data loop mode, releases the RRC connection of the radio resource control layer, and the terminal to be tested returns to an RRC idle state or an RRC non-activated state;
the main computer controls a system simulator to modify access limiting parameters of a system information block SIB1 of the first cell and the second cell and informs a terminal to be tested, wherein the access limiting parameters comprise an access type AC, a limited access identifier, a limiting factor and a limiting time;
the host computer controls the terminal to be tested to initiate an access request matched with the service type AC of the access limiting identification, wherein the service type AC comprises AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC 63; and
if the limiting factor is 0, the terminal to be tested does not initiate an access request within the time of the access limiting timer T390, or if the limiting factor is not 0, the terminal to be tested probabilistically initiates an access request within the time of the access limiting timer T390, and then the access limitations of the access types AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 are determined to conform to the protocol consistency test of unified access control.
In a second aspect, an embodiment of the present invention provides a system for testing protocol consistency of 5G terminal unified access control, where the system includes:
a terminal to be tested;
a system simulator; and
a host computer connected to the terminal under test and the system simulator and adapted to perform the method of the first aspect.
The technical scheme of the embodiment of the invention establishes a first cell and a second cell through a host computer control system simulator, controls the terminal to be tested to be registered in the first cell, controls the control system simulator to modify the access limiting parameters of the system information blocks of the first cell and the second cell, detects that the terminal to be tested initiates an access request of a service type AC matched with a limited access identifier, and detects the protocol consistency of the uniform access control of the terminal to be tested according to whether the terminal to be tested initiates the access request. Therefore, the protocol consistency test of the 5G terminal unified access control function can be completed, and the 5G terminal can make correct judgment to complete normal access, access restriction and waiting access restriction relieving operation when the 5G network controls the access of the 5G terminal.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent from the following description of the embodiments of the present invention with reference to the accompanying drawings, in which:
fig. 1 is a schematic illustration of access classes and access attempts of an embodiment of the present invention;
fig. 2 is a schematic diagram of an access identity and UE configuration according to an embodiment of the present invention;
fig. 3 to 11 are schematic diagrams of a protocol conformance testing system for 5G terminal unified access control according to an embodiment of the present invention.
Detailed Description
The present invention will be described below based on examples, but the present invention is not limited to only these examples. In the following detailed description of the present invention, certain specific details are set forth. It will be apparent to one skilled in the art that the present invention may be practiced without these specific details. Well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention.
Further, those of ordinary skill in the art will appreciate that the drawings provided herein are for illustrative purposes and are not necessarily drawn to scale.
Unless the context clearly requires otherwise, throughout the description, the words "comprise", "comprising", and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is, what is meant is "including, but not limited to".
In the description of the present invention, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present invention, "a plurality" means two or more unless otherwise specified.
The following explains the English abbreviation, English full name and Chinese explanation of the professional terms related to the embodiment of the invention:
QoS (Quality of Service);
ACB (Access Class Barring );
EAB (Extended Access Barring );
SSAC (Service Specific Access Control);
ACDC (Application specific Congestion control for Data Communication);
AC for CSFB (Access control for CSFB, circuit switched fallback Access control);
RNA Update (RAN-based Notification Area Update);
UAC (Unified Access Control, Unified Control mechanism);
MPS (Multimedia priority service);
MCS (Mission critical service);
TA (Tracking Area);
PLMN (Public Land Mobile Network);
HPLMN (Home Public Land Mobile Network );
USIM (Universal Subscriber Identity Module);
SIM (Subscriber Identity Module);
EF (Elementary File);
IMSI (International Mobile Subscriber Identity);
EHPLMN (Equivalent Home PLMN, Equivalent Home network);
PLMNwAcT (User controlled PLMN selector with Access Technology, User controlled PLMN selection based on Access Technology);
HPLMNwAcT (HPLMN selector with Access Technology, HPLMN selection based on Access Technology);
UST (USIM Service Table);
UAC _ AIC (UAC Access Identities Configuration, UAC Access identity Configuration);
ACC (Access Control Class);
SIB (System Information Block);
AT (AT command), an instruction for connection and communication between the terminal device and the PC application.
AC (Access Category);
AI (Access Identity);
RRC (Radio Resource Control);
MO (Mobile Original, terminal initiated);
MT (Mobile Terminated, terminal received);
NAS (Non-Access-Stratum, Non Access Stratum);
MMTEL (Multi Media Telephony);
IMS (IP Multimedia Subsystem);
RTT (Real-time text );
5GC (5G core network);
5GS (5G system);
RPLMN (Registered Public Land Mobile Network);
SMS (Short Messaging Service);
IE (Information element);
SS (System Simulator);
UE (User Equipment, terminal to be tested);
MCC (Mobile Country Code);
TTCN (Testing and Test Control Notification, Test and Test Control expression).
In unified access control, each access is classified using one access category AC and one or more access identities AI. And the terminal to be tested judges whether the terminal can be accessed or not based on the information of the applicable AC and AI. The unified access control may support extensions, flexibly supporting operator-defined access categories (e.g., network slices, applications, and application servers) in addition to standard-defined access identities and access categories. When the access is judged, the terminal to be tested firstly checks the AC and then checks the AI according to the protocol.
Fig. 1 is a schematic diagram of access classes and access attempts of an embodiment of the present invention. As shown in fig. 1, in the 5G system, there are 64 access categories AC in total for distinguishing the traffic types corresponding to the access attempts. Specifically, the correspondence relationship between the Access Category number (Access Category number) and the Access attempt Type (Type of Access attempt) and the condition (condition related to UE) related to the UE (User Equipment, terminal to be tested) is as follows:
AC0 denotes paging induced MO signaling.
AC1 denotes that the UE is configured as delay tolerant service, except for all access categories for emergency calls or MO special data; and performing access control on the access category 1, and judging according to the relation between the HPLMN of the UE and the selected PLMN.
AC2 represents an emergency call.
AC3 denotes non-paging induced NAS level MO signaling; the UE applies to all other cases except for the set conditions in AC 1.
AC4 represents MMTEL voice; the UE applies to all other cases except for the set conditions in AC 1.
AC5 represents MMTEL video; the UE applies to all other cases except for the set conditions in AC 1.
AC6 represents a short message; the UE applies to all other cases except for the set conditions in AC 1.
AC7 represents MO data that does not belong to other access categories; the UE applies to all other cases except for the set conditions in AC 1.
AC8 denotes non-paging induced RRC level MO signaling; the UE applies to all other cases except for the set conditions in AC 1.
AC9 denotes MO IMS registration related signaling; the UE applies to all other cases except for the set conditions in AC 1.
AC10 represents MO specific data.
AC11-AC31 are ACs reserved for later standard extensions.
AC32-AC63 represents the operator's own defined AC.
Fig. 2 is a schematic diagram of an access identity and a UE configuration according to an embodiment of the present invention. As shown in fig. 2, the Access identities AI have 16 types, and the correspondence between the Access identity number (Access identity number) and the UE configuration (UE configuration) is as follows:
the AI0 does not configure any of the parameters in this table for the UE.
The AI1 configures the UE with a Multimedia Priority Service (MPS).
The AI2 configures the UE with a Mission Critical Service (MCS).
AI3-AI10 extend reservations.
AI11 is configured in the UE for access class 11 (PLMN usage).
AI12 is configured in the UE for access class 12 (security services).
The AI13 is configured in the UE for access class 13 (utility, e.g. water/gas).
AI14 is configured in the UE for access class 14 (emergency service).
AI15 is configured in the UE for access class 15 (PLMN employee).
Further, for NOTE1-NOTE3 referred to in FIG. 2, the explanation is as follows:
NOTE 1: AI1 is valid under the following conditions:
a) USIM document EFUAC_AICIndicating that the UE is configured as AI1 and if a new PLMN is selected, the selected PLMN or RPLMN is HPLMN (if EHPLMN list does not exist or is empty) or EHPLMN (if EHPLMN list exists), or is a home country (home country) visited PLMN; or
b) The MPS indicator bit is indicated as "Access identity 1 valid" in the 5GS network feature support IE received by the UE from the RPLMN.
NOTE 2: AI2 is used by a UE configured for MCS and is valid if:
a) USIM document EFUAC_AICIndicating that the UE is configured as AI2 and if a new PLMN is selected, the selected PLMN or RPLMN is HPLMN (if EHPLMN list does not exist or is empty) or EHPLMN (if EHPLMN list exists), or is a visited PLMN of the country; or
b) The MCS indicator bit is indicated as "Access identity 2 valid" in the 5GS network feature support IE received by the UE from the RPLMN.
NOTE 3: AI11 and AI15 are valid in HPLMN (if EHPLMN list does not exist or is empty) or EHPLMN (if EHPLMN list exists). AI12, AI13 and AI14 are valid in the HPLMN and the visited PLMN of the country of residence.
In this embodiment, the testing system tests the protocol consistency through ttcn (testing and Test Control notification). Specifically, TTCN-3 is widely accepted in the industry as a universal language for TD-LTE and subsequent 4G wireless mobile communication terminal conformance tests, and the reliability and maturity of the terminal protocol stack signaling conformance test implemented by using script control thereof are widely accepted in the industry. TTCN-3 test case code clearly defines parameters such as test conditions, test flow, configuration message content and the like of all test cases in the terminal consistency test, and tests whether the interpretation and implementation of the core protocol of the tested terminals (chips) of different manufacturers are consistent or not by running the script on the terminal consistency test instrument platform, thereby finally ensuring that the commercial terminals passing the authentication are interconnected and communicated with network equipment of different manufacturers in the current network.
Further, fig. 3 is a schematic diagram of a protocol conformance testing system for 5G terminal unified access control according to an embodiment of the present invention. As shown in fig. 3, the test system includes a Host computer Host-PC, a system simulator ss (system simulator), and a terminal ue (user equipment) to be tested.
The Host computer Host-PC bears TTCN3 codes, generates compiling codes required by the operation of TTCN-3 and is used for controlling the system simulator SS to execute the test flow.
The system simulator SS may simulate an SDAP (Service Data Adaptation Protocol) Layer, a PDCP (Packet Data Convergence Protocol) Layer, an RLC (Radio Link Control) Layer, an MAC (Media Access Control) Layer, a Physical Layer (PHY), and a Radio frequency part of a 5G network side, and is connected to the terminal UE to be tested through a Radio frequency.
Therefore, the Host computer Host-PC control system simulator SS simulates the network side to send and receive the 5G-based signaling, and the consistency test of the UAC function of the 5G terminal can be realized.
Further, fig. 4 is a flowchart of a protocol consistency testing method for 5G terminal unified access control according to an embodiment of the present invention. As shown in fig. 4, the consistency testing method according to the embodiment of the present invention includes the following steps:
step S101, a main computer control system simulator establishes a first cell of a first tracking area and a second cell of a second tracking area, wherein the first cell and the second cell are Home Public Land Mobile Network (HPLMN) cells.
In this embodiment, the controlling SS establishes 2 HPLMN cells of different TAs.
Step S102, when the test access identification is AI1, AI2, AI11, AI12, AI13, AI14 and AI15, the host computer controls the terminal to be tested to configure basic file EF parameters of the USIM, wherein the parameters include the international mobile subscriber identity EFIMSIParameter, access technology based user controlled public land mobile network PLMN selection EFPLMNwAcTParameter, equivalent home network EFEHPLMNParameter, home public land mobile network, HPLMN, selection of EF based on access technologyHPLMNwAcTParameter, USIM service table EFUSTConfiguration EF of parameter and unified access control access identifierUAC_AICParameters and access control class EFACCAnd (4) parameters.
In this embodiment, if the Access Identity 1/2/11/12/13/14/15 is tested, EF in the USIM card is configuredIMSI、EFPLMNwAcT、EFEHPLMN、EFHPLMNwAcT、EFUST、EFUAC_AICAnd EFACCAnd the like.
And S103, the host computer controls the terminal to be tested to register in the first cell, wherein if the test service type is AC32-AC63, the control system simulator sets the access type definition parameters defined by the operator in the registration acceptance message.
In this embodiment, the control terminal registers on the first cell, wherein if an Operator Defined Access Category is tested, a sub-field Operator-Defined Access Category definition parameter of the REGISTRATION Access is set.
And step S104, activating a test data loop mode by the main computer control system simulator, releasing the RRC connection of the radio resource control layer, and returning the RRC idle state or the RRC non-activated state to the terminal to be tested.
In this embodiment, after the test data loopback mode is activated, the RRC connection is released, and the terminal to be tested returns to the RRC _ IDLE or RRC _ INACTIVE state.
Step S105, the main computer controls the system simulator to modify the access limiting parameters of the system information block SIB1 of the first cell and the second cell, and notifies the terminal to be tested, wherein the access limiting parameters include an access type AC, a limited access identifier, a limiting factor and a limiting time.
In this embodiment, the control SS modifies the sub-fields UAC-barringpercatetlist and UAC-BarringInfoSetList in the SIB1 field UAC-BarringInfo of the first and second cells, sets the accessCategory, UAC-barringforessidentity, UAC-BarringFactor, UAC-BarringTime parameters corresponding to the access control to be tested, and notifies the terminal SIB1 of the modification.
And S106, the host computer controls the terminal to be tested to initiate an access request matched with the service type AC of the access limiting identifier, wherein the service type AC comprises AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC 63.
In this embodiment, the controlling of the terminal to be tested to initiate the service matching the access identifier restricted in the uac-BarringForAccessIdentity includes initiating an emergency call by using an AT command (AC2), an MMTel voice/video (AC4/5), an SMS (AC6), and data transmission defined by an operator (AC32-63), initiating data transmission by using an AT command or a data loopback method (AC7), and modifying power to enable the terminal to initiate a mobility registration signaling transmission request (AC 3).
Step S107, if the limiting factor is 0, the terminal to be tested does not initiate the access request within the time of the access limiting timer T390, or if the limiting factor is not 0, the terminal to be tested probabilistically initiates the access request within the time of the access limiting timer T390, and then the access limitations of the access types AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 are determined to accord with the protocol consistency test of unified access control.
In this embodiment, if uac-BarringFactor is set to 0%, it is checked that the terminal to be tested does not initiate a service request within the time of the access limit timer T390, or if uac-BarringFactor is not set to 0%, it is checked that the terminal to be tested initiates a service request probabilistically within the time of the access limit timer T390, it is determined that the access limits of the access types AC2, AC3, AC4, AC5, AC6, AC7, and AC32-AC63 conform to the protocol conformance test of unified access control.
Further, after the access restrictions of the access types AC2, AC3, AC4, AC5, AC6, AC7, and AC32-AC63 conform to the protocol conformance test of the unified access control, other functional tests are performed, as shown in fig. 5 in detail, including the following steps:
and S108, the host computer controls the terminal to be tested to return to an RRC idle state or an RRC non-activated state.
In this embodiment, if the terminal under test initiates the access request in step S107, the computer controls the terminal under test to return to the RRC idle state or the RRC inactive state. This step may be omitted if no access request is initiated.
Step S109, the host computer controls the system simulator to transmit a Paging message.
In this embodiment, the controlling SS sends a paging message, checks the terminal response call access (AC0), and establishes an RRC connection.
Step S110, if the host computer detects that the terminal to be tested initiates an access request of the service type AC0, the host computer determines that the access type AC0 conforms to the protocol consistency test of the unified access control.
In this embodiment, if the host computer detects that the terminal under test initiates an access request of the service class AC0, it determines that the access type AC0 conforms to the protocol conformance test of the unified access control.
Further, after the access type AC0 conforms to the protocol conformance test of the unified access control, another function test is performed, specifically as shown in fig. 6, including the following steps:
and S111, controlling a system simulator to send an RRC release message to suspend RRC connection and controlling a terminal to be tested to enter an RRC non-activated state, wherein a subfield timer T380 of the RRC release message is set to be a non-zero value.
In this embodiment, the SS is controlled to send an rrcreelease message to suspend the RRC connection, where a sub-field suspendConfig in the rrcreelease message sets the timer t380 to a non-zero value, and the terminal enters an RRC _ INACTIVE state.
After step S112 and the timer T380 is out of time, if the restriction factor is 0, the terminal to be tested does not initiate an access request of the service class AC8 within the time of accessing the restriction timer T390, or if the restriction factor is not 0, the terminal to be tested probabilistically initiates an access request of the service class AC8 within the time of accessing the restriction timer T390, the host computer controls the system simulator to release and suspend the RRC connection of the radio resource control layer, sets the timer T380 to a non-zero value, and controls the terminal to return to the RRC non-activated state.
In this embodiment, when the timer T380 is out of time, if uac-BarringFactor is set to 0%, it is checked that the terminal to be tested does not initiate an RNA Update request within the time of the access restriction timer T390 (AC8), or, if uac-BarringFactor is set to 0%, it is detected that the terminal to be tested probabilistically initiates an RNA Update request within the time of the access restriction timer T390 (AC8), and it is determined that the access restriction of the access type AC8 conforms to the protocol conformance test of the unified access control.
In this embodiment, T380 is a timer for periodic RNA updates and T390 is an access restriction timer.
Further, if the connection is established, the suspended RRC connection is released, the timer T380 is set to a non-zero value, and the terminal to be tested returns to the RRC _ INACTIVE state.
Step S113, the host computer controls the system simulator to modify the SIB1 of the first cell to not include the access restriction parameter.
In this embodiment, the control SS modifies the first cell SIB1 to not include the field uac-BarringInfo.
Step S114, the host computer detects that the terminal to be tested initiates an access request of the service type AC8, and then determines that the access restriction and the access restriction mitigation of the access type AC8 conform to the protocol consistency test of the unified access control.
In this embodiment, the host computer checks whether the terminal under test considers that the access restriction is relaxed, initiates an RNA Update request (AC8), and establishes an RRC connection. And if the host computer detects that the terminal to be tested initiates an access request of the service type AC8, confirming that the access restriction and the access restriction mitigation of the access type AC8 conform to the protocol consistency test of the unified access control.
Further, after the access type AC8 conforms to the protocol conformance test of the unified access control, another function test is performed, specifically as shown in fig. 7, including the following steps:
step S115, the host computer controls the system simulator to release the RRC connection, and the control terminal returns to the RRC idle state or the RRC inactive state.
In this embodiment, the controlling SS releases the RRC connection, and the terminal returns to the RRC _ IDLE or RRC _ INACTIVE state.
Step S116, the host computer controlling system simulator modifies the SIB1 of the second cell to not include the access restriction parameter.
In this embodiment, the SIB1 that controls the SS to modify the second cell does not contain the field uac-BarringInfo.
And step S117, the host computer controls the terminal to be tested to initiate an access request of the service type AC, wherein the service type AC comprises AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC 63.
In this embodiment, the controlling of the terminal to be tested to initiate the service matching the access identifier restricted in step S106 includes initiating an emergency call (AC2), an MMTel voice/video (AC4/5), an SMS (AC6), and data transmission defined by an operator (AC32-63) by using an AT (attention) command, initiating data transmission (AC7) by using an AT command or a data loopback method, and modifying power to make the terminal initiate a signaling transmission request (AC 3).
And S118, the host computer detects that the terminal to be tested initiates an access request of the service class, and then determines that the access restriction mitigation of the access classes AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 conforms to the protocol consistency test of unified access control.
In this embodiment, the host computer checks whether the terminal to be tested considers that the access restriction is released, and initiates a service request. And if the terminal to be tested is detected to initiate the access request of the service class, confirming that the access restriction mitigation of the access classes AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 conforms to the protocol consistency test of unified access control.
Therefore, the protocol consistency of the unified access control of the terminal to be tested, which conforms to the access identifier AI1 of the valid state specified by the NOTE1 a in fig. 2, the AI2, the AI11, the AI12, the AI13, the AI14 and the AI15 of the valid state specified by the NOTE2 a in fig. 2, and the access types AC0, AC2, AC3, AC4, AC5, AC6, AC7, AC8 and AC32-AC63, can be tested.
Further, since the terminal to be tested may also be the access identifier AI1 that meets the valid state specified by item b of NOTE1 in fig. 2, and the access identifier AI2 that meets the valid state specified by item b of NOTE2 in fig. 2, in order to further test the access identifiers AI1 and AI2, the test method in the embodiment of the present invention further includes the methods shown in fig. 8 to fig. 11.
Specifically, as shown in fig. 8, the method of the embodiment of the present invention further includes:
step S201, the host computer control system simulator establishes a first cell and a second cell, where the mobile country code MCC and the home public land mobile network HPLMN in the public land mobile network PLMN of the first cell and the second cell are different.
In this embodiment, the controlling SS establishes a 5G first cell and a second cell, where MCCs in PLMNs of the first cell and the second cell are different from the HPLMN.
Step S202, the host computer controls the terminal to be tested to configure basic document EF parameters of the USIM, wherein the parameters comprise an international mobile subscriber identity (EF)IMSIParameter, access technology based user controlled public land mobile network PLMN selection EFPLMNwAcTParameter, USIM service table EFUSTConfiguration EF of parameter and unified access control access identifierUAC_AICParameters and access control class EFACCParameter, wherein EFIMSI=HPLMN,EFPLMNwAcT=PLMN。
In this embodiment, to test the Access Identity 1/2, EF in the USIM card is configuredIMSI=HPLMN、EFPLMNwAcT=PLMN、EFUST、EFUAC_AIC、EFACCAnd the like.
And step S203, the host computer controls the terminal to be tested to register in the first cell, wherein AI1 effective parameters and AI2 effective parameters in a 5G network characteristic support field in the registration acceptance message are set, if the test service type is AC32-AC63, and the control system simulator sets access type definition parameters defined by an operator in the registration acceptance message.
In this embodiment, the terminal to be tested is controlled to register on the cell 1, where the Access identity 1 value/Access identity 2 value parameter in the subfield 5GS network feature support of the REGISTRATION ACCEPT is set, and if the service class AC32-AC63 is tested, the host computer control system simulator sets the Access class definition parameter defined by the operator in the REGISTRATION ACCEPT message.
Step S204, the main computer controls the system simulator to activate the test data loop mode, release the RRC connection of the radio resource control layer, and return to the RRC idle state or the RRC non-activated state.
In this embodiment, after the test data loopback mode is activated, the RRC connection is released and the RRC _ IDLE or RRC _ INACTIVE state is returned.
And step S205, the main computer controls the system simulator to modify access limiting parameters of a system information block SIB1 of the first cell and the second cell, and notifies the terminal to be tested, wherein the access limiting parameters include an access type AC, a limited access identifier, a limiting factor and a limiting time, and the limited access identifier is AI1 and/or AI 2.
In this embodiment, the control SS modifies the sub-fields UAC-barringpercatetlist and UAC-BarringInfoSetList in the SIB1 field UAC-BarringInfo of the first and second cells, sets the accessCategory, UAC-barringforessability (1/2), UAC-BarringFactor and UAC-BarringTime parameters corresponding to the access control to be tested, and notifies the terminal of the modification of SIB 1.
And S206, the host computer controls the terminal to be tested to initiate an access request matched with the service type AC of the access limiting identifier, wherein the service type AC comprises AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC 63.
In this embodiment, the host computer controls the terminal to be tested to initiate a service matching the uac-BarringForAccessIdentity (1/2), including initiating an emergency call (AC2), MMTel voice/video (AC4/5), SMS (AC6), and operator-defined data transmission (AC32-63) by using an AT (attention) command, initiating data transmission (AC7) by using an AT command or a data loopback method, and modifying power to enable the terminal to initiate a mobility registration signaling transmission request (AC 3).
Step S207, if the limiting factor is 0, the terminal to be tested does not initiate the access request within the time of the access limiting timer T390, or if the limiting factor is not 0, the terminal to be tested initiates the access request probabilistically within the time of the access limiting timer T390, and then the access limitations of the access types AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 are determined to accord with the protocol consistency test of unified access control.
In this embodiment, if uac-BarringFactor is set to 0%, it is checked that the terminal to be tested does not initiate a service request within the time of the access limit timer T390, or, if uac-BarringFactor is not set to 0%, it is checked that the terminal to be tested probabilistically initiates a service request within the time of the access limit timer T390, it is determined that the access limits of the access types AC2, AC3, AC4, AC5, AC6, AC7, and AC32-AC63 conform to the protocol conformance test of unified access control.
Further, after the access restrictions of the access types AC2, AC3, AC4, AC5, AC6, AC7, and AC32-AC63 conform to the protocol conformance test of the unified access control, another function test is performed, specifically as shown in fig. 9, including the following steps:
step S208, the host computer controls the terminal to be tested to return to an RRC idle state or an RRC inactive state.
In this embodiment, if the terminal to be tested initiates the access request in step S207, the computer controls the terminal to be tested to return to the RRC idle state or the RRC inactive state. This step may be omitted if no access request is initiated.
Step S209, the host computer controls the system simulator to transmit a Paging message.
In this embodiment, the controlling SS sends a paging message, checks the terminal response call access (AC0), and establishes an RRC connection.
Step S210, if the host computer detects that the terminal to be tested initiates an access request of the service type AC0, the host computer determines that the access type AC0 conforms to the protocol consistency test of the unified access control.
In this embodiment, if the host computer detects that the terminal under test initiates an access request of the service class AC0, it determines that the access type AC0 conforms to the protocol conformance test of the unified access control.
Further, after the access type AC0 conforms to the protocol conformance test of the unified access control, another function test is performed, specifically as shown in fig. 10, including the following steps:
step S211, the control system simulator sends an RRC release message to suspend RRC connection, and controls the terminal to be tested to enter an RRC non-activated state, wherein a subfield timer T380 of the RRC release message is set to be a non-zero value.
In this embodiment, the SS is controlled to send an rrcreelease message to suspend the RRC connection, where a sub-field suspendConfig in the rrcreelease message sets the timer t380 to a non-zero value, and the terminal enters an RRC _ INACTIVE state.
Step S212, after the timer T380 is overtime, if the limiting factor is 0, the terminal to be tested does not initiate the access request of the service type AC8 within the time of accessing the limiting timer T390, or if the limiting factor is not 0, the terminal to be tested probabilistically initiates the access request of the service type AC8 within the time of accessing the limiting timer T390, the host computer controls the system simulator to release and suspend the RRC connection of the radio resource control layer, the timer T380 is set to be a non-zero value, and the control terminal returns to the RRC non-activated state.
In this embodiment, when the timer T380 is out of time, if uac-BarringFactor is set to 0%, it is checked that the terminal to be tested does not initiate an RNA Update request within the time of the access restriction timer T390 (AC8), or, if uac-BarringFactor is set to 0%, it is detected that the terminal to be tested probabilistically initiates an RNA Update request within the time of the access restriction timer T390 (AC8), and it is determined that the access restriction of the access type AC8 conforms to the protocol conformance test of the unified access control.
In this embodiment, T380 is a timer for periodic RNA updates and T390 is an access-limited timer.
Further, if the connection is established, the suspended RRC connection is released, the timer T380 is set to a non-zero value, and the terminal to be tested returns to the RRC _ INACTIVE state.
Step S213, the host computer controls the system simulator to modify the SIB1 of the first cell to not include the access restriction parameter.
In this embodiment, the control SS modifies the first cell SIB1 to not include the field uac-BarringInfo.
Step S214, the host computer detects that the terminal to be tested initiates an access request of the service type AC8, and then determines that the access restriction and the access restriction mitigation of the access type AC8 conform to the protocol consistency test of the uniform access control.
In this embodiment, the host computer checks whether the terminal under test considers that the access restriction is relaxed, initiates an RNA Update request (AC8), and establishes an RRC connection. And if the host computer detects that the terminal to be tested initiates an access request of the service type AC8, confirming that the access restriction and the access restriction mitigation of the access type AC8 conform to the protocol consistency test of the unified access control.
Further, after the access type AC8 conforms to the protocol conformance test of the unified access control, another function test is performed, specifically as shown in fig. 11, including the following steps:
step S215, the host computer controls the system simulator to release the RRC connection, and controls the terminal to return to the RRC idle state or the RRC inactive state.
In this embodiment, the controlling SS releases the RRC connection, and the terminal returns to the RRC _ IDLE or RRC _ INACTIVE state.
Step S216, the main computer control system simulator modifies the SIB1 of the second cell to not contain the access restriction parameter.
In this embodiment, the SIB1 that controls the SS to modify the second cell does not contain the field uac-BarringInfo.
And S217, the host computer controls the terminal to be tested to initiate an access request of a service type AC, wherein the service type AC comprises AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC 63.
In this embodiment, the controlling of the terminal to be tested to initiate the service matching the access identifier restricted in step S206 includes initiating an emergency call (AC2), an MMTel voice/video (AC4/5), an SMS (AC6), and data transmission defined by an operator (AC32-63) by using an AT (attention) command, initiating data transmission (AC7) by using an AT command or a data loopback method, and modifying power to make the terminal initiate a signaling transmission request (AC 3).
And S218, the host computer detects that the terminal to be tested initiates an access request of the service class, and then determines that the access restriction mitigation of the access classes AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 conforms to the protocol consistency test of unified access control.
In this embodiment, the host computer checks whether the terminal to be tested considers that the access restriction is released, and initiates a service request. And if the terminal to be tested is detected to initiate the access request of the service class, confirming that the access restriction mitigation of the access classes AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 conforms to the protocol consistency test of unified access control.
Therefore, when the access identifier AI1 of the terminal to be tested conforms to the valid state defined by the b item of the NOTE1 in fig. 2 and the access identifier AI2 conforms to the valid state defined by the b item of the NOTE2 in fig. 2, the protocol consistency of the unified access control of the access identifiers AI1 and AI2 and the access types AC0, AC2, AC3, AC4, AC5, AC6, AC7, AC8 and AC32-AC63 of the terminal to be tested can be tested.
Thus, by the above steps S101-S118, the protocol consistency of the unified access control of AI1 (valid state specified by item a of NOTE 1), AI2 (valid state specified by item a of NOTE 2), AI11, AI12, AI13, AI14 and AI15, and access types AC0, AC2, AC3, AC4, AC5, AC6, AC7, AC8, and AC32-AC63 can be tested, and by the above steps S201-S218, the protocol consistency of the unified access control of AI1 (valid state specified by item b of NOTE 1), AI2 (valid state specified by item b of NOTE 2), and access types AC0, AC2, AC3, AC4, AC5, AC6, AC7, AC8, and AC32-AC63 can be tested, so as to test the consistency of the function of the UAC 5.
The method comprises the steps of establishing a first cell and a second cell through a main computer control system simulator, controlling the terminal to be tested to be registered in the first cell, modifying access limiting parameters of system information blocks of the first cell and the second cell through the control system simulator, detecting that the terminal to be tested initiates an access request of a service type AC matched with a limited access identifier, and detecting the protocol consistency of the uniform access control of the terminal to be tested according to whether the terminal to be tested initiates the access request. Therefore, the protocol consistency test of the 5G terminal unified access control function can be completed, and the 5G terminal can make correct judgment to complete normal access, access restriction and waiting access restriction relieving operation when the 5G network controls the access of the 5G terminal.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. A protocol consistency test method for 5G terminal unified access control is characterized in that the method comprises the following steps:
the method comprises the steps that a main computer control system simulator establishes a first cell of a first tracking area and a second cell of a second tracking area, wherein the first cell and the second cell are Home Public Land Mobile Network (HPLMN) cells;
when the test access identifier is AI1, AI2, AI11, AI12, AI13, AI14 and AI15, the host computer controls the terminal to be tested to configure basic file EF parameters of the universal subscriber identity card USIM, wherein the basic file EF parameters comprise an international mobile subscriber identity EFIMSI parameter, an access technology-based user control public land mobile network PLMN selection EFPLMNwAcT parameter, an equivalent home network EFEHPLMN parameter, an access technology-based home public land mobile network HPLMN selection EFHPLMNwAcT parameter, a USIM service table EFUST parameter, a unified access control access identifier configuration EFUAC _ AIC parameter and an access control level EFACC parameter;
the host computer controls the terminal to be tested to register in the first cell, wherein if the test access type is AC32-AC63, the control system simulator sets an access type definition parameter defined by an operator in a registration acceptance message;
the main computer control system simulator activates a test data loop mode, releases the RRC connection of the radio resource control layer, and the terminal to be tested returns to an RRC idle state or an RRC non-activated state;
the main computer controls a system simulator to modify access limiting parameters of a system information block SIB1 of the first cell and the second cell and informs a terminal to be tested, wherein the access limiting parameters comprise an access category AC, a limited access identifier, a limiting factor and a limiting time;
the host computer controls the terminal to be tested to initiate an access request matched with the access category AC of the limited access identifier, wherein the access category AC comprises AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC 63; and
if the limiting factor is 0, the terminal to be tested does not initiate an access request within the time of the access limiting timer T390, or if the limiting factor is not 0, the terminal to be tested probabilistically initiates an access request within the time of the access limiting timer T390, and then the access limitations of the access categories AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 are determined to accord with a protocol consistency test of unified access control;
wherein the method further comprises:
the host computer controls the terminal to be tested to return to an RRC idle state or an RRC non-activated state;
the main computer controls the system simulator to send Paging message; and
and if the host computer detects that the terminal to be tested initiates an access request of the access type AC0, the host computer determines that the access type AC0 conforms to the protocol consistency test of the unified access control.
2. The method of claim 1, further comprising:
a control system simulator sends an RRC release message to suspend RRC connection and controls a terminal to be tested to enter an RRC non-activated state, wherein a sub-field timer T380 of the RRC release message is set to be a non-zero value;
after the timer T380 is overtime, if the restriction factor is 0, the terminal to be tested does not initiate an access request of the access category AC8 within the time of the access restriction timer T390, or if the restriction factor is not 0, the terminal to be tested probabilistically initiates an access request of the access category AC8 within the time of the access restriction timer T390, the host computer controls the system simulator to release and suspend the RRC connection of the radio resource control layer, sets the timer T380 to be a non-zero value, and controls the terminal to be tested to return to the RRC non-activated state;
the host computer controls the system simulator to modify the SIB1 for the first cell to not include the access restriction parameter; and
and when the host computer detects that the terminal to be tested initiates an access request of the access type AC8, the host computer determines that the access restriction and the access restriction mitigation of the access type AC8 conform to the protocol consistency test of the unified access control.
3. The method of claim 2, further comprising:
the main computer controls the system simulator to release RRC connection, and the control terminal returns to an RRC idle state or an RRC non-activated state;
the host computer controls the system simulator to modify the SIB1 of the second cell to not include the access restriction parameter;
the method comprises the steps that a host computer controls a terminal to be tested to initiate an access request of an access category AC, wherein the access category AC comprises AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC 63; and
and the host computer detects that the terminal to be tested initiates an access request of an access category, and then determines that the access restriction mitigation of the access categories of AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 conforms to the protocol consistency test of unified access control.
4. The method of claim 3, wherein when performing an access identity AI1, AI2 test, the method further comprises:
the method comprises the steps that a main computer control system simulator establishes a first cell and a second cell, wherein mobile country codes MCC and a home public land mobile network HPLMN in public land mobile network PLMN of the first cell and the second cell are different;
the method comprises the steps that a host computer controls a terminal to be tested to configure basic file EF parameters of a Universal Subscriber Identity Module (USIM), wherein the basic file EF parameters comprise an international mobile subscriber identity (EFIMSI) parameter, an access technology-based user control public land mobile communication network (PLMN) selection EFPLMNwAcT parameter, a USIM service table EFUST parameter, a unified access control access identifier configuration EFUAC _ AIC parameter and an access control grade EFACC parameter, wherein the EFIMSI is HPLMN, and the EFPLMNwAcT is PLMN;
the host computer controls the terminal to be tested to register in the first cell, wherein AI1 effective parameters and AI2 effective parameters in a 5G network characteristic support field in the registration acceptance message are set, if the test access type is AC32-AC63, the control system simulator sets the access type definition parameters defined by an operator in the registration acceptance message;
the main computer control system simulator activates a test data loop mode, releases the RRC connection of the radio resource control layer, and the terminal to be tested returns to an RRC idle state or an RRC non-activated state;
the main computer controls a system simulator to modify access limiting parameters of a system information block SIB1 of the first cell and the second cell and informs a terminal to be tested, wherein the access limiting parameters comprise an access category AC, a limited access identifier, a limiting factor and a limiting time, and the limited access identifier is AI1 and/or AI 2;
the host computer controls the terminal to be tested to initiate an access request matched with the access category AC of the limited access identifier, wherein the access category AC comprises AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC 63; and
if the limiting factor is 0, the terminal to be tested does not initiate an access request within the time of the access limiting timer T390, or if the limiting factor is not 0, the terminal to be tested probabilistically initiates an access request within the time of the access limiting timer T390, and then the access limitations of the access categories AC2, AC3, AC4, AC5, AC6, AC7 and AC32-AC63 are determined to conform to the protocol consistency test of unified access control.
5. The method of claim 4, further comprising:
a control system simulator sends an RRC release message to suspend RRC connection and controls a terminal to be tested to enter an RRC non-activated state, wherein a sub-field timer T380 of the RRC release message is set to be a non-zero value;
after the timer T380 is overtime, if the restriction factor is 0, the terminal to be tested does not initiate an access request of the access category AC8 within the time of the access restriction timer T390, or if the restriction factor is not 0, the terminal to be tested probabilistically initiates an access request of the access category AC8 within the time of the access restriction timer T390, the host computer controls the system simulator to release and suspend the RRC connection of the radio resource control layer, the timer T380 is set to a non-zero value, and the control terminal returns to the RRC non-activated state;
the host computer controls the system simulator to modify the SIB1 for the first cell to not include the access restriction parameter; and
and when the host computer detects that the terminal to be tested initiates an access request of the access type AC8, the host computer determines that the access restriction and the access restriction mitigation of the access type AC8 conform to the protocol consistency test of the unified access control.
6. The method of claim 1, wherein said host computer performs said configuring by loading a Test and Test Control Notation (TTCN) test program.
7. A protocol consistency test system for 5G terminal unified access control is characterized in that the system comprises:
a terminal to be tested;
a system simulator; and
a host computer, connected to the terminal under test and the system simulator, adapted to perform the method of any of claims 1-6.
CN202010491099.5A 2020-06-02 2020-06-02 Protocol consistency test method and system for 5G terminal unified access control Active CN111786848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010491099.5A CN111786848B (en) 2020-06-02 2020-06-02 Protocol consistency test method and system for 5G terminal unified access control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010491099.5A CN111786848B (en) 2020-06-02 2020-06-02 Protocol consistency test method and system for 5G terminal unified access control

Publications (2)

Publication Number Publication Date
CN111786848A CN111786848A (en) 2020-10-16
CN111786848B true CN111786848B (en) 2022-03-04

Family

ID=72753404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010491099.5A Active CN111786848B (en) 2020-06-02 2020-06-02 Protocol consistency test method and system for 5G terminal unified access control

Country Status (1)

Country Link
CN (1) CN111786848B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112954771B (en) * 2021-02-19 2023-04-14 Oppo广东移动通信有限公司 Access control method, terminal and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457831B (en) * 2010-10-29 2016-04-27 中国移动通信集团公司 Terminal access controlling method, device, terminal and system
CN109587812B (en) * 2017-09-28 2022-12-06 中兴通讯股份有限公司 Random access parameter determination method and device
CN107708150B (en) * 2017-11-24 2020-12-04 北京泰德东腾通信技术有限公司 Method and system for testing consistency of authentication function of non-access stratum of narrow-band internet of things terminal
CN107872828B (en) * 2017-12-15 2021-04-13 北京泰德东腾通信技术有限公司 eIMTA terminal consistency test method and device
CN110505672B (en) * 2018-05-17 2020-12-15 华为技术有限公司 Access control method, communication device and base station
EP3679740B8 (en) * 2018-09-19 2023-09-13 NEC Corporation Procedure to update the parameters related to unified access control

Also Published As

Publication number Publication date
CN111786848A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN100448325C (en) A data communication restriction method, data communication restriction system and mobile terminal
RU2388184C2 (en) Method of use in communication system
KR100742580B1 (en) Methods and device for preferably selecting a communication network which makes data service available
CN103262625A (en) IP-based paging for DSDS
KR20060103329A (en) Data-capable network prioritization with reject code handling
EP1890516B1 (en) Apparatus and method for providing service status information based on access class restriction list in mobile communication system
IL202955A (en) System and method for handshaking between wireless devices and servers
MX2009001847A (en) Selective control of user equipment capabilities.
KR20140089388A (en) Method, module and ue for network access control
EP1690205A1 (en) Configuration of a terminal
CN108901055A (en) A kind of method and apparatus carrying out access control
CN109963320B (en) Service access control method and device
US8787885B2 (en) System for controlling access to a service, and corresponding method, control device, and computer program
CN105637940B (en) The method of wireless telecom equipment and initiation and the session of radio network node
CN110915264B (en) Session processing method in wireless communication and terminal equipment
WO2005094107A1 (en) A method for implementing access control
CN110636537B (en) TTCN-3-based multi-card mobile terminal test system and method thereof
CN111786848B (en) Protocol consistency test method and system for 5G terminal unified access control
CN105635934B (en) Service opening method and device and HSS (home subscriber server)
CN101128055A (en) Apparatus and method of providing packet service status using access class barred list in mobile communication system
CN103109502A (en) Method and apparatus of load balancing femtocell cluster access
CN111479302A (en) Data service switching method and communication device
CN106657154B (en) Wireless access method, system, WiFi platform and operator number taking platform
CN102891900B (en) A kind of method, apparatus and system of the domain name mapping in flow unloading
CN101969449B (en) Automatic filling system for mobile communication equipment terminal browser and application method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Wang Xi

Inventor after: Li Wei

Inventor after: Wang Yufei

Inventor after: Zhao Jian

Inventor after: Yuan Junsong

Inventor before: Wang Xi

Inventor before: Li Wei

Inventor before: Wang Yufei

Inventor before: Zhao Jian

Inventor before: Yuan Junsong

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant