CN112020879B - Access control method and device and storage medium - Google Patents

Access control method and device and storage medium Download PDF

Info

Publication number
CN112020879B
CN112020879B CN202080001641.2A CN202080001641A CN112020879B CN 112020879 B CN112020879 B CN 112020879B CN 202080001641 A CN202080001641 A CN 202080001641A CN 112020879 B CN112020879 B CN 112020879B
Authority
CN
China
Prior art keywords
terminal
access control
access
limit
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202080001641.2A
Other languages
Chinese (zh)
Other versions
CN112020879A (en
Inventor
李艳华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Publication of CN112020879A publication Critical patent/CN112020879A/en
Application granted granted Critical
Publication of CN112020879B publication Critical patent/CN112020879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The embodiment of the disclosure provides an access control method and device, communication equipment and a storage medium. The access control method provided by the embodiment of the disclosure comprises the following steps: determining an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal; and controlling the terminal not to send an access request before receiving the paging message according to the access control limit parameter.

Description

Access control method and device and storage medium
Technical Field
The embodiment of the disclosure relates to the field of wireless communication, but is not limited to the field of wireless communication, in particular to an access control method, an access control device and a storage medium.
Background
In an LTE (Long Term Evolution ) communication system and an NR (New Radio) communication system of 5G, an AC (Access Control) limited working mechanism is: and acquiring corresponding AC (AC restriction) parameters according to the Access Class (Access Class) of the terminal and the call initiated by the terminal, and performing AC restriction judgment (AC restriction check).
For some functional terminals only having downlink transmission requirements, for example, some internet of things devices, an independent uplink mode is not required, or uplink data transmission only needs to be performed after downlink transmission. However, the related art access control method is temporarily unable to meet such special requirements.
Disclosure of Invention
The disclosure provides an access control method, an access control device and a storage medium.
According to a first aspect of an embodiment of the present disclosure, there is provided an access control method, applied to a terminal, including:
determining an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal;
and controlling the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
In some embodiments, the types of terminals include: and the terminal which does not perform uplink transmission before receiving downlink transmission.
In some embodiments, the access control limit parameter comprises at least one of:
limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
In some embodiments, the controlling the terminal not to send an access request includes:
starting a limit timer according to the access control limit parameter; within the timing duration of the limit timer, not sending the access request;
And/or, according to the access control limiting factor, not sending the access request.
In some embodiments, the timing duration is valued as: greater than or equal to a predetermined period duration of discontinuous reception mode DRX or extended discontinuous reception mode eDRX.
In some embodiments, the access control restriction factor for the terminal is the second value.
In some embodiments, the access control restriction parameters include:
and limiting the access to the limited call category.
In some embodiments, according to the access control restriction parameter, controlling the terminal not to send an access request until receiving a paging message includes:
and responding to the call category triggering access to limit the call category, and controlling the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
In some embodiments, the restricted call category is indicated by at least one of:
an access category;
accessing an identification;
and (5) identifying the terminal type.
In some embodiments, the method further comprises:
responding to the call category triggering access as an emergency call category, and sending an access request; wherein the emergency call category is different from the restricted call category.
In some embodiments, the method further comprises:
receiving the access control restriction parameter for the terminal;
or,
acquiring the default access control limit parameters of the terminal;
or,
and acquiring the access control limit parameters of the terminal according to a communication protocol.
In some embodiments, the obtaining the access control restriction parameter defaults to the terminal includes:
and responding to failure of receiving the access control limit parameters of the terminal, and acquiring the default access control limit parameters of the terminal.
In some embodiments, the default access control limit parameter is recorded at the terminal or specified by a communication protocol.
According to a second aspect of embodiments of the present disclosure, there is provided an access control method, applied to a base station, including:
determining access control limit parameters according to the type of the terminal;
and sending the access control limit parameter to the terminal, wherein the access control limit parameter is used for controlling the terminal not to send an access request before receiving the paging message.
In some embodiments, the types of terminals include: and the terminal which does not perform uplink transmission before receiving downlink transmission.
In some embodiments, the access control limit parameter comprises at least one of:
limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
In some embodiments, the timing duration is valued as: greater than or equal to a predetermined period duration of DRX or eDRX.
In some embodiments, the access control restriction factor for the terminal is the second value.
In some embodiments, the issuing access control restriction parameters according to the terminal type includes:
and transmitting access control limit parameters to the terminal by using a system message or a Radio Resource Control (RRC) message.
According to a third aspect of the embodiments of the present disclosure, there is provided an access control apparatus, applied to a terminal, including:
a first determination module configured to determine an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal;
and the control module is configured to control the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
In some embodiments, the types of terminals include: and the terminal which does not perform uplink transmission before receiving downlink transmission.
In some embodiments, the access control limit parameter comprises at least one of:
limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
In some embodiments, the control module includes:
the starting module is configured to start a limiting timer according to the access control limiting parameter; within the timing duration of the limit timer, not sending the access request;
and/or, according to the access control limiting factor, not sending the access request.
In some embodiments, the timing duration is valued as: greater than or equal to a predetermined period duration of discontinuous reception mode DRX or extended discontinuous reception mode eDRX.
In some embodiments, the access control restriction factor for the terminal is the second value.
In some embodiments, the access control restriction parameters include:
and limiting the access to the limited call category.
In some embodiments, the control module includes:
and the control sub-module is configured to respond to the call category triggering access to limit the call category, and control the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
In some embodiments, the restricted call category is indicated by at least one of:
an access category;
accessing an identification;
and (5) identifying the terminal type.
In some embodiments, the apparatus further comprises:
the sending module is configured to respond to the triggering access call category as an emergency call category and send an access request; wherein the emergency call category is different from the restricted call category.
In some embodiments, the apparatus further comprises:
a receiving module configured to receive the access control restriction parameter for the terminal;
or,
the first acquisition module is configured to acquire the access control limit parameters defaulted by the terminal;
or,
and the second acquisition module is configured to acquire the access control limit parameters of the terminal according to a communication protocol.
In some embodiments, the first acquisition module includes:
and the acquisition sub-module is configured to acquire the access control limiting parameters defaulted by the terminal in response to failure of receiving the access control limiting parameters of the terminal.
In some embodiments, the default access control limit parameter is recorded at the terminal or specified by a communication protocol.
According to a fourth aspect of embodiments of the present disclosure, there is provided an access control apparatus applied to a base station, including:
the second determining module is configured to determine an access control limit parameter according to the type of the terminal;
and the sending module is configured to send the access control limiting parameter to the terminal, wherein the access control limiting parameter is used for controlling the terminal not to send an access request before receiving the paging message.
In some embodiments, the types of terminals include: and the terminal which does not perform uplink transmission before receiving downlink transmission.
In some embodiments, the access control limit parameter comprises at least one of:
limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
An access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
In some embodiments, the timing duration is valued as: greater than or equal to a predetermined period duration of DRX or eDRX.
In some embodiments, the access control restriction factor for the terminal is the second value.
In some embodiments, the issuing module includes:
and the issuing sub-module is configured to issue the access control limit parameter to the terminal by utilizing the system message or the Radio Resource Control (RRC) message.
According to a fifth aspect of embodiments of the present disclosure, there is provided a communication device including at least: a processor and a memory for storing executable instructions capable of executing on the processor, wherein:
the processor is configured to execute the executable instructions to perform steps in any of the access control methods described above when the executable instructions are executed.
According to a sixth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium having stored therein computer-executable instructions that, when executed by a processor, implement the steps of any of the above-described access control methods.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the embodiment of the disclosure provides an implementation manner of access control, which utilizes access control limiting parameters to control a terminal to not send an access request for an uplink transmission limited terminal until a paging message is received. In this way, unnecessary uplink transmission requests of the terminal can be reduced by the access control. Therefore, the uplink transmission limited terminal can only carry out uplink data after meeting the limitation condition of uplink transmission, and can not have access requests triggered by sporadic uplink data to be transmitted, thereby occupying resources.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the embodiments of the invention.
Fig. 1 is a schematic diagram of a wireless communication system according to an exemplary embodiment;
fig. 2 is a flow diagram illustrating a method of access control according to an exemplary embodiment;
fig. 3 is a flow chart diagram ii of an access control method according to an exemplary embodiment;
fig. 4 is a flow diagram three illustrating an access control method according to an exemplary embodiment;
Fig. 5 is a flow diagram fourth illustrating an access control method according to an exemplary embodiment;
fig. 6 is a schematic structural diagram of an access control device according to an exemplary embodiment;
fig. 7 is a schematic diagram ii of an access control device according to an exemplary embodiment;
fig. 8 is a schematic diagram of a communication device shown in accordance with an exemplary embodiment;
fig. 9 is a schematic diagram of a communication device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with the embodiments of the present disclosure. Rather, they are merely examples of apparatus and methods consistent with aspects of embodiments of the present disclosure as detailed in the accompanying claims.
The terminology used in the embodiments of the disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the embodiments of the disclosure. As used in this disclosure of embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in embodiments of the present disclosure to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of embodiments of the present disclosure. The words "if" and "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination", depending on the context.
To better describe any embodiment of the present disclosure, an embodiment of the present disclosure is exemplified by an application scenario of access control.
Referring to fig. 1, a schematic structural diagram of a wireless communication system according to an embodiment of the disclosure is shown. As shown in fig. 1, the wireless communication system is a communication system based on a cellular mobile communication technology, and may include: a number of terminals 11 and a number of base stations 12.
Where the terminal 11 may be a device providing voice and/or data connectivity to a user. The terminal 11 may communicate with one or more core networks via a radio access network (Radio Access Network, RAN), and the terminal 11 may be an internet of things terminal such as a sensor device, a mobile phone (or "cellular" phone) and a computer with an internet of things terminal, for example, a stationary, portable, pocket, hand-held, computer-built-in or vehicle-mounted device. Such as a Station (STA), subscriber unit (subscriber unit), subscriber Station (subscriber Station), mobile Station (mobile), remote Station (remote Station), access point, remote terminal (remote terminal), access terminal (access terminal), user device (user terminal), user agent (user agent), user equipment (user device), or user terminal (user equipment). Alternatively, the terminal 11 may be an unmanned aerial vehicle device. Alternatively, the terminal 11 may be a vehicle-mounted device, for example, a car computer having a wireless communication function, or a wireless terminal externally connected to the car computer. Alternatively, the terminal 11 may be a roadside device, for example, a street lamp, a signal lamp, or other roadside devices having a wireless communication function.
The base station 12 may be a network-side device in a wireless communication system. Wherein the wireless communication system may be a fourth generation mobile communication technology (the 4th generation mobile communication,4G) system, also known as a long term evolution (Long Term Evolution, LTE) system; alternatively, the wireless communication system may be a 5G system, also known as a New Radio (NR) system or a 5G NR system. Alternatively, the wireless communication system may be a next generation system of the 5G system. Among them, the access network in the 5G system may be called NG-RAN (New Generation-Radio Access Network, new Generation radio access network).
Wherein the base station 12 may be an evolved base station (eNB) employed in a 4G system. Alternatively, the base station 12 may be a base station (gNB) in a 5G system employing a centralized and distributed architecture. When the base station 12 employs a centralized and distributed architecture, it typically includes a Centralized Unit (CU) and at least two Distributed Units (DUs). A protocol stack of a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, a radio link layer control protocol (Radio Link Control, RLC) layer, and a medium access control (Media Access Control, MAC) layer is provided in the centralized unit; a Physical (PHY) layer protocol stack is provided in the distribution unit, and the specific implementation of the base station 12 is not limited by the embodiment of the present disclosure.
A wireless connection may be established between the base station 12 and the terminal 11 over a wireless air interface. In various embodiments, the wireless air interface is a fourth generation mobile communication network technology (4G) standard-based wireless air interface; or, the wireless air interface is a wireless air interface based on a fifth generation mobile communication network technology (5G) standard, for example, the wireless air interface is a new air interface; alternatively, the wireless air interface may be a wireless air interface based on a 5G-based technology standard of a next generation mobile communication network.
In some embodiments, an E2E (End to End) connection may also be established between terminals 11. Such as V2V (vehicle to vehicle, vehicle-to-vehicle) communications, V2I (vehicle to Infrastructure, vehicle-to-road side equipment) communications, and V2P (vehicle to pedestrian, vehicle-to-person) communications among internet of vehicles communications (vehicle to everything, V2X).
In some embodiments, the above wireless communication system may further comprise a network management device 13.
Several base stations 12 are connected to a network management device 13, respectively. The network management device 13 may be a core network device in a wireless communication system, for example, the network management device 13 may be a mobility management entity (Mobility Management Entity, MME) in an evolved packet core network (Evolved Packet Core, EPC). Alternatively, the network management device may be other core network devices, such as a Serving GateWay (SGW), a public data network GateWay (Public Data Network GateWay, PGW), a policy and charging rules function (Policy and Charging Rules Function, PCRF) or a home subscriber server (Home Subscriber Server, HSS), etc. The embodiment of the present disclosure is not limited to the implementation form of the network management device 13.
The access control is a processing mechanism aiming at traffic congestion, and by limiting the connection request of the UE to the base station, the successful access of key communication such as emergency call and the like is ensured, network resources are reasonably allocated, and the congestion condition is reduced.
Based on the conclusion of the 5G system NR access control, the structure of the access control restriction parameters (AC barren parameters) is determined for each PLMN (Public Land Mobile Network ), access categories and access identities. An example of access control restriction parameters is given in table 1 below, where the maximum number of PLMNs is 6, the maximum number of access categories is 64, and the maximum number of access identities is 16.
TABLE 1
In table 1 above, access categories is an access class, which includes the following according to the 3gpp ts24 301 specification: "originating signalling (source signaling)", "emergency calls)", "originating MMTEL (multimedia telephony)", "originating MMTEL video (source multimedia video telephony)", "originating SMSoIP (Short Message Service over Internet Protocol, internet protocol based short message transmission)", "origin SMS", "terminating calls (terminal call)", "originating calls (source call)", and "mobile originating CS fallback (mobile source circuit domain fallback)".
In table 1 above, access identities is the access identifier. It is understood that the attributes or classes of UEs (User Equipment) such as 0 to 9 are low priority users, e.g. personal users, 11 to 15 are high priority users, e.g. users related to public safety and emergency services or PLMN management.
The definition of the access control limit parameters in the table may include the following ways: for low priority users, it can be defined according to random numbers and barren effective duration; for high priority users, bitmap (bitmap) forms may be employed. Wherein the low priority users include commercial users and the high priority users.
Therefore, the basic process of the access control limit detection (AC barreng check) is to obtain an access control limit parameter (AC barreng parameter) according to the access category and the access identifier, and perform the access control detection. The access control restriction parameters are typically random numbers for low priority users (0-9) and bitmap (bitmap) forms for high priority users (11-15). Typically this parameter will be defined in the system message and for the random number approach, if limited, a timer will need to be started, the time of which will be calculated by the AC limit time (AC-barrettime). For example, the limit duration is 512 seconds.
In some embodiments, the decision parameter of the access control is signaled to the UE using a system message. If the UE finds that the decision parameters of the access control are not acquired in the decision, the UE performs processing according to the non-restriction. For paging, neither the data packet sent by the core network nor the data packet sent by the RAN makes an access control decision.
For paging, the paging cycle employed is a maximum of 256 radio frames, i.e., 2.56 seconds, so the duration can be covered for a limited duration of 512 seconds. However, after eDRX (Extended Discontinuos Reception, extended discontinuous reception mode) is introduced, it is possible for the maximum paging cycle to extend to 2.56 x 1024= 2621.44s (seconds) or longer. However, for some terminals only having downlink transmission requirements, including the internet of things device or some electronic devices having specific functions, such as a terminal with a tracking and positioning function, an independent uplink mode is not required, i.e. the uplink data transmission only needs to be performed after the downlink transmission. Thus, the access control mechanism may be utilized to limit the uplink traffic demand of the portion of terminals until a paging message is received, and thus, embodiments of the present disclosure employ the following manner to enhance the access control mechanism.
As shown in fig. 2, an embodiment of the present disclosure provides an access control method, where the method is applied to a terminal, and includes:
step S101, determining an access control limit parameter, wherein the access control limit parameter is associated with the type of the terminal;
step S102, according to the access control limit parameter, the terminal is controlled not to send an access request before receiving the paging message.
In the embodiment of the present disclosure, the terminal may be an uplink transmission limited terminal, and uplink transmission is limited to a certain extent compared with a terminal whose uplink transmission is not limited. For example, the uplink transmission is not limited by the terminal, and when there is uplink transmission, an access request can be initiated to request uplink transmission; and when the uplink transmission is carried out by the uplink transmission limited terminal, the access request triggered by the uplink transmission is not directly initiated, and the access request is limited to a certain extent, for example, a limiting mechanism is introduced into the terminal to limit the sending of the access request.
On the other hand, the uplink requirement of the uplink limited terminal is generally smaller than that of the uplink unrestricted terminal in terms of statistical probability. The uplink data that the uplink transmission limited terminal needs to send by itself may be sporadic data, or may be generated based on the downlink data of the base station. For example, the uplink data generated by the uplink limited terminal may include: receiving feedback for downlink data, and the like.
In the embodiment of the present disclosure, the uplink limited terminal may perform uplink transmission, but the uplink transmission of the uplink limited terminal is limited to base station triggering, for example, the base station triggers the uplink transmission of the uplink limited terminal through paging, or the base station triggers the uplink transmission of the terminal through RRC signaling.
In the embodiment of the present disclosure, the terminal is an uplink transmission limited terminal, which does not need an independent uplink mode. For example, some internet of things devices have only downlink transmission requirements. For example, tracking a positioning type terminal, an independent uplink mode is not required, i.e. uplink data only needs to be transmitted after downlink.
Thus, in the embodiments of the present disclosure, the access control mechanism is utilized to limit the uplink traffic request of the uplink transmission limited terminal until a paging message is received.
In other embodiments, the terminal may be any type of terminal, based on the call type of the terminal, or the operation mode of the terminal, and the access control mechanism may be used to perform access control, and the call request of the terminal is limited by the access control limiting parameter until the paging message is received.
Here, the paging message is a specific message or the like in which the base station transmits common information and the mobile station to the terminal. The paging message may include: paging terminal ID list, system message change prompt identification, earthquake and tsunami warning system (Earthquake and Tsunami Warning System, ETWS) identification and other information. That is, the paging message is transmitted based on an emergency or notification message. Therefore, when the terminal receives the paging message, the access restriction state can be released.
And when the paging message is not received, the uplink access request of the terminal is limited by utilizing the access control limiting parameter, so that the terminal only uses a downlink transmission channel, and unnecessary uplink requests of the terminal are reduced. Therefore, the terminal sends the uplink data only when receiving the paging message, so that occupation of an uplink data link can be reduced, and the utilization rate of network resources is improved. Meanwhile, multiple uploading requests of sporadic data of the terminal can be reduced, and the transmission efficiency is improved. Alternatively, uplink transmission may be performed only when the base station allows, so as to reduce uplink congestion.
In some embodiments, the types of terminals include: and the terminal which does not perform uplink transmission before receiving downlink transmission.
In the embodiment of the disclosure, the terminal has a function of being able to receive the downlink transmission, and after receiving the downlink transmission, the terminal can generally report related information, so that after the downlink transmission, uplink transmission can be performed. For example, some internet of things devices, such as MTC (Machine typecommunication ) devices, some positioning terminals, redcap devices, or smart home devices, do not need to report messages in an independent uplink mode in a normal use process, and only provide corresponding services through downlink data or local data. And reporting a feedback response when the data needs to be updated, and the like, and carrying out uplink transmission.
In some embodiments, the access control limit parameter comprises at least one of:
limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
In the embodiment of the disclosure, the uplink transmission of the terminal is limited by using the access control mechanism, and the limitation of the uplink transmission can be realized by setting the timing duration of the limiting timer and/or the access control limiting factor. Thus, the access control restriction parameter may include a time duration of a restriction timer and an access control restriction factor. Of course, in practical applications, the access control limitation parameter is not limited to the timing duration of the limitation timer and the access control limitation factor, and may include any parameter that enables the terminal to stop uplink transmission.
In the embodiment of the present disclosure, to always limit uplink transmission of the terminal, the timing duration of the limit timer may be set to infinity, or the access control limit factor may be set to a second value for limiting access of the terminal. In addition, the timing duration of the limit timer is configured, and a triggering condition for starting the limit timer can be configured, for example, the terminal is configured to trigger the limit timer after receiving the paging message and sending the access request; or triggering a limit timer when the terminal acquires the access control limit parameter.
Here, the setting of the first value and the second value may be determined according to the actual requirement or the network condition. For example, the first value and the second value are determined according to the load capacity of the base station or the network congestion condition, when the network congestion condition is serious or the available network resources are less, the number of terminals corresponding to the first value is set to be less, and the number of terminals of the second value is set to be more; and when the network is not congested, the number of terminals corresponding to the first value can be set to be more, and the number of terminals corresponding to the second value is set to be less. In practical application, it may be agreed that a terminal with an access control restriction factor smaller than a predetermined threshold limits access, and a terminal with a value greater than or equal to the predetermined threshold allows access. If the network congestion is serious, the predetermined threshold is set to a larger value, for example, the predetermined threshold is 9, at this time, only the terminals with the access control limiting factors greater than or equal to 9 are allowed to access, and the terminals with the access control limiting factors less than 9 are limited to access. Since the uplink of the uplink limited terminal needs to be limited, the access control limitation factor of the uplink limited terminal may be set to a value smaller than a predetermined threshold. As another example, the access control restriction factor is a positive integer greater than or equal to 0, and the predetermined threshold is a positive integer greater than 0, and thus, when the access control restriction factor is 0, the access control restriction factor is always in a restricted state. Therefore, the access control restriction factor of the uplink transmission restricted terminal may be set to 0.
By setting the access control limit parameter, the access control of uplink transmission can be performed for the terminal limited by uplink transmission.
In some embodiments, the controlling the terminal not to send an access request includes:
starting a limit timer according to the access control limit parameter; within the timing duration of the limit timer, not sending the access request;
or, according to the access control limiting factor, not sending the access request.
In the embodiment of the disclosure, the terminal may start timing of the restriction timer by using the configured access control restriction parameter, and stop the uplink access request during the operation of the restriction timer until the timing of the restriction timer is stopped. Therefore, the time length of the limiting timer can be utilized to determine the time length of the uplink access request of the limiting terminal. For the uplink transmission limited terminal, the timing duration of the limiting timer can be set to infinity.
The access control limit parameters also include a timing parameter at which the terminal starts the limit timer. For example, the timing parameter may configure the terminal to start a restriction timer when the access control restriction parameter is acquired, or configure the terminal to start a restriction timer when the access request is initiated; for another example, the configuration terminal starts a restriction timer after receiving the paging message and sending the access request.
In another embodiment, the access control restriction parameter may not include a timing parameter specifically indicating a start timing of the restriction timer, and the terminal may default to start the timer for the first time after receiving the access control restriction parameter and then periodically start the restriction timer, or automatically start the restriction timer after completing the transmission of the last uplink transmission or the reception of the downlink transmission.
In addition, the uplink access request of the uplink transmission limited terminal can be limited by setting the access control limiting factor (AC Barring factor). Here, the value of the access control limiting factor can be understood as the probability of allowing access, and the base station can adjust the value of the access control limiting factor allowing access at any time according to the use condition of resources or the network congestion condition. For example, the base station allows the terminal having an access control restriction factor greater than 2 to access, and if the access control restriction factor of the terminal is 1, the access request is restricted.
In this way, the terminal may always restrict the access request for uplink transmission until the paging message is received.
In an embodiment, the restriction timer and the access control restriction factor may be set simultaneously, and the timing duration of the restriction timer is infinity while the value of the access control restriction factor is 0. Access is restricted according to any of the access control parameters.
In another embodiment, the restriction timer and the access control restriction factor may be set at the same time, and the timing duration of the restriction timer is small while the value of the access control restriction factor is 0, then, even if the timing of the restriction timer is finished, the access request of the terminal is restricted due to the value of the access control restriction factor being 0.
In another embodiment, the restriction timer and the access control restriction factor may be set at the same time, and the timing duration of the restriction timer is infinity, while the value of the access control restriction factor is not 0, then even if the access control restriction factor satisfies the adjustment of access, the restriction is performed due to the end of the timing of the restriction timer.
In yet another embodiment, the set restriction timer and the access control restriction factor may be set simultaneously, and the timing duration of the restriction timer is not infinite while the value of the access control restriction factor is not 0. At this time, if the timing of the restriction timer is ended, it may be determined whether to allow the access according to the value of the access control restriction factor. This situation may be applicable to situations where network resources are sufficient, or where the terminal needs to be debugged, updated, etc.
Thus, the access control parameters can be set to realize the access control of different conditions for the terminal.
In some embodiments, the timing duration is valued as: greater than or equal to a predetermined period duration of DRX or eDRX.
In the embodiment of the disclosure, the uplink transmission limited terminal can always keep the state of limiting the uplink transmission before receiving the paging message. Thus, the timing duration of the restriction timer may be set according to the paging cycle.
It should be noted that NB-IoT (narrowband internet of things) supports three reception modes, including PSM (Power Saving Mode ), DRX (Discontinuous Reception, discontinuous reception mode) and eDRX (Extended DRX). The DRX and eDRX have a larger paging cycle, for example, in the DRX mode, the terminal detects whether downlink traffic arrives sequentially every other DRX cycle. In eDRX mode, there is a paging time window (Paging Time Window, PTW) for each period, and the terminal listens to the paging channel in the PTW according to the DRX period (the DRX period is relatively short, and the terminal can be considered not to sleep) in order to receive downlink data, and the rest of the time the terminal is in sleep. Thus, the maximum paging cycle of eDRX may extend to 2621.44s.
Therefore, the timing duration of the uplink access restriction by the uplink transmission restricted terminal may be set according to the above-mentioned predetermined period duration of DRX or eDRX. For example, a terminal employing eDRX mode, the timing duration of the restriction timer may be set to a duration greater than or equal to the maximum paging cycle of eDRX. Of course, the limit timer may be set to infinity directly, so that the terminal stops the timing of the limit timer after receiving the paging message.
In some embodiments, the access control restriction factor for the uplink transmission limited terminal is the second value.
Here, the access control restriction parameter is used to restrict the uplink transmission request of the uplink transmission restricted terminal, and the value of the access control restriction factor may be set to restrict the second value of the uplink transmission. For example, the access control restriction factor of the uplink transmission restriction terminal is set to a value smaller than a predetermined threshold, and at this time, only the uplink transmission of the terminal having the access control restriction factor greater than or equal to the predetermined threshold is allowed, and the access is restricted for the uplink transmission restriction terminal having the access control restriction factor smaller than the predetermined threshold.
In some embodiments, the access control restriction parameters include:
and limiting the access to the limited call category.
Since many terminals have diversified functions, different kinds of data transmission and call can be realized. Thus, in the embodiments of the present disclosure, uplink access of a specified category may also be restricted by the method of access control based on the call category.
The call category comprises different types of access requests corresponding to the access categories of source signaling, emergency call, source multimedia voice call, source multimedia video call, short message transmission based on internet protocol, source short message, terminal call, source call, mobile source circuit domain fallback and the like. Or a call category determined based on the terminal type, access identification of the terminal, etc. For different call types, the access control restriction parameters can be used to respectively judge whether to restrict access.
Here, the access control restriction parameter may include a restricted call category to restrict access, so that the terminal selectively restricts call requests of a part of categories according to the restricted call category, and may allow call requests of other categories, thereby facilitating application in various scenarios and terminal types.
In another embodiment, the access control restriction parameter may not include the restricted call category. The terminal determines whether it belongs to a predetermined restricted call category based on the access category or user identification of its own access request. If the access control parameters belong to the restricted call category, the corresponding access control restriction parameters are used for access control.
In some embodiments, the controlling the terminal not to send an access request before receiving the paging message according to the access control restriction parameter includes:
and responding to the call category triggering access to limit the call category, and controlling the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
Here, based on the above access control restriction parameters, a restricted call category restricting access may be determined. When there is uplink data of the restricted call category, based on the configuration of the restricted access, the access request of the restricted call category is restricted to be sent before the paging message is received. Of course, for other call categories, if there is uplink data triggering access, it is necessary to allow or restrict transmission of an access request according to the corresponding access control restriction parameter.
In some embodiments, the restricted call category is indicated by at least one of:
an access category;
accessing an identification;
and (5) identifying the terminal type.
For the restricted call category described above, it may be indicated by an access category or access identity defined in the access control mechanism. For example, an access request indicating that the access class is "originating call" is a restricted call class. As another example, an access request issued by a user with an access identifier of 0 limits the call category.
In addition, the terminal type identifier may be used to identify, for example, when the configured terminal type is an internet of things device, the access request of the terminal corresponding to the internet of things device identifier inputs the restricted call category.
In some embodiments, as shown in fig. 3, the method further comprises:
step S201, responding to the call category triggering access as an emergency call category, and sending an access request; wherein the emergency call category is different from the restricted call category.
Unlike limiting the call category, the terminal may have some requirements for alarms, emergency calls, etc., for example, an alarm call initiated when the terminal fails, or an emergency call manually initiated by a user in an emergency, etc. For the emergency call category, a communication connection needs to be established in time, and thus the emergency call category may not be limited to the timing duration of the restriction timer of the access control mechanism or the setting of the access control restriction factor. That is, if the call category triggered by the interruption is an emergency call category, access is allowed, and the interruption may send an access request.
Thus, the access control mechanism does not limit the access of the emergency call category too much, thereby improving the safety performance of the terminal.
In some embodiments, the method further comprises:
receiving the access control restriction parameter for the uplink transmission restricted terminal;
or,
acquiring the default access control limit parameters of the uplink transmission limited terminal;
or,
and acquiring the access control limit parameters of the uplink transmission limited terminal according to a communication protocol.
In the embodiment of the disclosure, the access control limitation parameter of the uplink transmission limitation terminal may be obtained from the base station through the downlink, may be pre-stored locally in the terminal, and may also be determined according to a communication protocol. The terminal acquires the access control limit parameter, and then access control can be performed on the uplink data according to the access control limit parameter to determine whether to allow the uplink access request to be initiated.
In some embodiments, the obtaining the access control restriction parameter defaulted by the uplink transmission limited terminal includes:
and responding to failure of receiving the access control limit parameters of the uplink transmission limited terminal, and acquiring the default access control limit parameters of the uplink transmission limited terminal.
In the embodiment of the present disclosure, the access control limitation parameter is placed in other system messages, and at this time, the terminal itself can actively acquire other system messages to acquire. After the failure of acquiring other system information, the failure of receiving the access control limiting parameter can be realized by utilizing the default access control limiting parameter of the terminal.
In practical application, as shown in fig. 4, the method comprises the following steps:
step S301, requesting the base station to issue other system messages;
step S302, receiving access control limit parameters in other system messages;
step S303, obtaining default access control limit parameters.
Thus, when the terminal cannot acquire the effective access control limit parameter through the on-demand acquisition (ondemand) message, the terminal processes according to the default configuration.
In some embodiments, the default access control restriction parameter is recorded at the uplink limited terminal or specified by a communication protocol.
In embodiments of the present disclosure, the default access control limit parameter may be specified based on the communication protocol without receiving an indication of the base station. The method can also be written locally at the terminal in the form of firmware, and the terminal can directly perform access control judgment according to default access control limiting parameters when needed.
As shown in fig. 5, an embodiment of the present disclosure provides an access control method, which is applied to a base station, and includes:
step S401, determining access control limit parameters according to the type of the terminal;
step S402, the access control limiting parameter is sent to the terminal, wherein the access control limiting parameter is used for controlling the terminal not to send an access request before receiving the paging message.
In the embodiment of the disclosure, the base station may issue different access control restriction parameters for different types of terminals. For the terminal with limited uplink transmission in the above embodiment, the access control limiting parameter corresponding to the limited access is issued, so as to realize the control of the terminal with limited uplink transmission without independent uplink mode, and limit the terminal with limited uplink transmission to send the access request before receiving the paging message.
In some embodiments, the types of terminals include: and the terminal which does not perform uplink transmission before receiving downlink transmission.
The uplink transmission limited terminal is described in detail in the above embodiments, and will not be described here again.
In some embodiments, the access control limit parameter comprises at least one of:
Limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
Here, the base station may issue to the terminal an access control restriction parameter including a timing duration of the restriction timer and/or an access control restriction factor. The terminal limits the initiation of the access request based on the timing duration of the timer or determines whether to limit the initiation of the access request based on whether the control factor is a value allowing access.
If the terminal type is the uplink transmission limited terminal, the timing duration can be configured to be infinite or greater than the maximum paging cycle. The access control restriction factor may then be configured to restrict the second value of the terminal access.
In some embodiments, the timing duration is valued as: greater than or equal to a predetermined period duration of DRX or eDRX.
In the above embodiments, the DRX and eDRX have been described in detail, and will not be described here again.
The timing period is greater than or equal to a predetermined period duration of DRX or eDRX, the paging cycle may be covered, thereby enabling the terminal to restrict access until the paging message arrives.
In some embodiments, the access control restriction factor for the uplink transmission limited terminal is the second value.
Here, for the uplink transmission limited terminal, the base station may separately configure the value of its access control limiting factor to the second value, thereby limiting the access request of the uplink transmission limited terminal.
In some embodiments, the issuing access control restriction parameters according to the terminal type includes:
and transmitting access control limit parameters to the terminal by using a system message or an RRC message.
In the embodiment of the disclosure, the base station may send the access control restriction parameter to the terminal by using a system message or an RRC message. The system message may include a system message one (SIB 1), a system message two (SIB 2), etc., and the RRC message may be a dedicated message informing the terminal of suspension, for example: a "RRC connction release" (RRC connection release) message.
Embodiments of the present disclosure also provide examples of:
and secondly, expanding the access control duration in the access control mechanism.
In one embodiment, the expandable access control duration is infinite, for example, the timing duration of the restriction timer is set to infinity, the timing is stopped only when the paging message is received, and the timing is not stopped until the paging message is received, so that the access is always restricted.
In another embodiment, the access control duration may be set to be the maximum duration specified by the protocol of the eDRX cycle, for example, if the protocol specifies that the eDRX cycle is 2.56×1024 seconds, the timing duration of the restriction timer is set to be 2.56×1024 seconds.
In another embodiment, the access control time period may be set to be longer than the maximum time period specified by the protocol of the eDRX cycle.
Secondly, in the access control mechanism, default configuration is added for the designated call category, and parameters of the default configuration are limiting access parameters. That is, the UE may default not to send an access request specifying a call category based on a default configuration.
The manner of configuration may include the following:
(1) Configuring a default configuration for a specified call category includes limiting the timing duration of the timer to infinity;
(2) The default configuration for configuring the specified call class includes an access control restriction Factor (barren Factor) of 0, where the control Factor is an identification parameter indicating the access priority of the UE, the UE whose control Factor is less than a specified threshold is restricted to access, and the UE whose control Factor is greater than or equal to the specified threshold is permitted to access. Therefore, when the control factor is set to 0, the control factor is always smaller than the threshold value set by the access control judgment, so that the access state is always limited;
(3) The default configuration of the configuration-specific call class also includes limiting the timing duration of the timer to infinity and the access control limiting factor to 0.
Third, based on the second point, the specified call category is determined according to the following several ways.
(1) Based on the specified access category (Access Categories), for example, an access request corresponding to the access category of "originating calls (source call)" is specified as the specified call category of the default configuration;
(2) Based on a specified access identity (Access Identities), e.g. an access request for a UE with a specified access identity of 0, belonging to a specified call category of the above-mentioned default configuration;
(3) Based on the specified terminal type, for example, the identifier of the specified terminal type is a certain type of internet of things device, the access request of the type of internet of things device belongs to the specified call category configured by default.
Fourth, based on the second point, the default configuration may be sent to the UE using a system message or the UE may be notified using a dedicated message.
Wherein the system message includes, but is not limited to, system message one (SIB 1), the dedicated message may be an RRC (Radio Resource Control ) message, for example, a message informing the UE of suspension: a "RRC connection release (RRC connection release)" message.
Fifth, based on the second point, the default configuration may be further specified based on a protocol, or written in the UE in the form of firmware;
sixth, for the specific call category, the UE may actively acquire the decision parameter of the effective access control through the system message of "on demand (acquired when needed)", and automatically process according to the default configuration when the acquisition of the system message fails.
By the method, the uplink service initiation of the UE of the designated type or the designated call category of the UE is limited, namely, when uplink service data of the UE arrives, the access configuration which is subjected to default limitation after the access request starts is processed, and the timing time length of the access limitation timer is infinite at the moment, namely, the access limitation timer is in a suspension (Pending) state until a paging message is received.
As shown in fig. 6, the embodiment of the present disclosure further provides an access control apparatus 600, which is applied to a terminal and includes:
a first determining module 601 configured to determine an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal;
a control module 602, configured to control the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
In some embodiments, the types of terminals include: and the terminal which does not perform uplink transmission before receiving downlink transmission.
In some embodiments, the access control limit parameter comprises at least one of:
limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
In some embodiments, the control module includes:
the starting module is configured to start a limiting timer according to the access control limiting parameter; within the timing duration of the limit timer, not sending the access request;
and/or, according to the access control limiting factor, not sending the access request.
In some embodiments, the timing duration is valued as: greater than or equal to a predetermined period duration of discontinuous reception mode DRX or extended discontinuous reception mode eDRX.
In some embodiments, the access control restriction factor for the terminal is the second value.
In some embodiments, the access control restriction parameters include:
and limiting the access to the limited call category.
In some embodiments, the control module includes:
and the control sub-module is configured to respond to the call category triggering access to limit the call category, and control the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
In some embodiments, the restricted call category is indicated by at least one of:
an access category;
accessing an identification;
and (5) identifying the terminal type.
In some embodiments, the apparatus further comprises:
the sending module is configured to respond to the triggering access call category as an emergency call category and send an access request; wherein the emergency call category is different from the restricted call category.
In some embodiments, the apparatus further comprises:
a receiving module configured to receive the access control restriction parameter for the terminal;
or,
the first acquisition module is configured to acquire the access control limit parameters defaulted by the terminal;
or,
and the second acquisition module is configured to acquire the access control limit parameters of the terminal according to a communication protocol.
In some embodiments, the first acquisition module includes:
and the acquisition sub-module is configured to acquire the access control limiting parameters defaulted by the terminal in response to failure of receiving the access control limiting parameters of the terminal.
In some embodiments, the default access control limit parameter is recorded at the terminal or specified by a communication protocol.
As shown in fig. 7, the embodiment of the present disclosure further provides an access control apparatus 700, applied to a base station, including:
a second determining module 701 configured to determine an access control restriction parameter according to a type of the terminal;
a sending module 702, configured to send the access control limitation parameter to the terminal, where the access control limitation parameter is used to control the terminal not to send an access request before receiving the paging message.
In some embodiments, the types of terminals include: and the terminal which does not perform uplink transmission before receiving downlink transmission.
In some embodiments, the access control limit parameter comprises at least one of:
limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
An access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
In some embodiments, the timing duration is valued as: greater than or equal to a predetermined period duration of DRX or eDRX.
In some embodiments, the access control restriction factor for the terminal is the second value.
In some embodiments, the issuing module includes:
and the issuing sub-module is configured to issue the access control limit parameter to the terminal by utilizing the system message or the Radio Resource Control (RRC) message.
The embodiment of the disclosure provides a communication device, which comprises a processor, a transceiver, a memory and an executable program stored on the memory and capable of being operated by the processor, wherein the access control method provided by any technical scheme is executed when the executable program is operated by the processor.
The communication device may be a base station or a UE as described above.
The processor may include, among other things, various types of storage media, which are non-transitory computer storage media capable of continuing to memorize information stored thereon after a power down of the communication device. Here, the communication device includes a base station or a user equipment.
The processor may be coupled to the memory via a bus or the like for reading the executable program stored on the memory.
The disclosed embodiments provide a non-transitory computer-readable storage medium storing an executable program; the executable program, when executed by the processor, can implement the method shown in any technical scheme involved in the embodiments of the disclosure.
Fig. 8 is a block diagram of a communication device according to an embodiment of the present disclosure. The communication device may be a UE. For example, the communication device 800 may be a mobile phone, computer, digital broadcast user device, messaging device, game console, tablet device, medical device, exercise device, personal digital assistant, or the like.
Referring to fig. 8, a communication device 800 may include at least one of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the communication device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include at least one processor 820 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 802 can include at least one module that facilitates interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the communication device 800. Examples of such data include instructions for any application or method operating on the communication device 800, contact data, phonebook data, messages, pictures, video, and the like. The memory 804 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 806 provides power to the various components of the communication device 800. The power components 806 may include a power management system, at least one power source, and other components associated with generating, managing, and distributing power for the communication device 800.
The multimedia component 808 includes a screen between the communication device 800 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes at least one touch sensor to sense touch, swipe, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also a wake-up time and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front camera and/or a rear camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the communication device 800 is in an operational mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the communication device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 further includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 814 includes at least one sensor for providing status assessment of various aspects of the communication device 800. For example, the sensor assembly 814 may detect an on/off state of the device 800, a relative positioning of the components, such as a display and keypad of the communication device 800, the sensor assembly 814 may also detect a change in position of the communication device 800 or a component of the communication device 800, the presence or absence of a user's contact with the communication device 800, an orientation or acceleration/deceleration of the communication device 800, and a change in temperature of the communication device 800. The sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communication between the communication device 800 and other devices, either wired or wireless. The communication device 800 may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the communication device 800 may be implemented by at least one Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as memory 804 including instructions executable by processor 820 of communication device 800 to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
As shown in fig. 9, an embodiment of the present disclosure shows the structure of another communication device. The communication device may be a base station according to embodiments of the present disclosure. For example, the communication device 900 may be provided as a network device. Referring to fig. 12, communication device 900 includes a processing component 922 that further includes at least one processor, and memory resources represented by memory 932, for storing instructions, such as application programs, executable by processing component 922. The application programs stored in memory 932 may include one or more modules that each correspond to a set of instructions. Further, processing component 922 is configured to execute instructions to perform any of the methods described above as applied to the communication device.
The communication device 900 may also include a power supply component 926 configured to perform power management of the communication device 900, a wired or wireless network interface 950 configured to connect the communication device 900 to a network, and an input output (I/O) interface 958. The communication device 900 may operate based on an operating system stored in memory 932, such as Windows Server TM, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (36)

1. An access control method, which is applied to a terminal, comprises the following steps:
determining an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal; wherein the access control limit parameters include: limiting the timing duration of the timer; the limit timer is used for determining the time length of the limit access of the terminal; the timing duration has the following value: a predetermined period duration greater than or equal to discontinuous reception mode DRX or extended discontinuous reception mode eDRX;
And controlling the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
2. The method of claim 1, wherein the terminal is a terminal that does not transmit uplink until a downlink transmission is received.
3. The method of claim 1, wherein the access control restriction parameters comprise:
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
4. A method according to claim 3, wherein said controlling the terminal not to send an access request comprises:
starting a limit timer according to the access control limit parameter; within the timing duration of the limit timer, not sending the access request;
and/or, according to the access control limiting factor, not sending the access request.
5. A method according to claim 3, wherein the access control restriction factor for the terminal has the second value.
6. The method of claim 1, wherein the access control restriction parameters comprise:
and limiting the access to the limited call category.
7. The method of claim 6, wherein the controlling the terminal not to transmit an access request until receiving a paging message according to the access control restriction parameter comprises:
and responding to the call category triggering access to limit the call category, and controlling the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
8. The method of claim 7, wherein the restricted call category is indicated by at least one of:
an access category;
accessing an identification;
and (5) identifying the terminal type.
9. The method of claim 7, wherein the method further comprises:
responding to the call category triggering access as an emergency call category, and sending an access request; wherein the emergency call category is different from the restricted call category.
10. The method according to any one of claims 1 to 9, wherein the method further comprises:
receiving the access control restriction parameter for the terminal;
or,
acquiring the default access control limit parameters of the terminal;
or,
and acquiring the access control limit parameters of the terminal according to a communication protocol.
11. The method of claim 10, wherein the obtaining the access control restriction parameter by default for the terminal comprises:
and responding to failure of receiving the access control limit parameters of the terminal, and acquiring the default access control limit parameters of the terminal.
12. The method of claim 11, wherein the default access control restriction parameter is recorded at the terminal or specified by a communication protocol.
13. An access control method, applied to a base station, comprises:
determining access control limit parameters according to the type of the terminal; wherein the access control limit parameters include one of: limiting the timing duration of the timer; the limit timer is used for determining the time length of the limit access of the terminal; the timing duration has the following value: a predetermined period duration greater than or equal to discontinuous reception mode DRX or extended discontinuous reception mode eDRX;
and sending the access control limit parameter to the terminal, wherein the access control limit parameter is used for controlling the terminal not to send an access request before receiving the paging message.
14. The method of claim 13, wherein the type of terminal comprises: and the terminal which does not perform uplink transmission before receiving downlink transmission.
15. The method of claim 13, wherein the access control restriction parameters comprise:
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
16. The method of claim 15, wherein the access control restriction factor for the terminal has the second value.
17. The method according to any one of claims 13 to 16, wherein the issuing access control restriction parameters according to the terminal type includes:
and transmitting access control limit parameters to the terminal by using a system message or a Radio Resource Control (RRC) message.
18. An access control device, wherein, be applied to in the terminal, include:
a determining module configured to determine an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal; wherein the access control limit parameters include: limiting the timing duration of the timer; the limit timer is used for determining the time length of the limit access of the terminal; the timing duration has the following value: a predetermined period duration greater than or equal to discontinuous reception mode DRX or extended discontinuous reception mode eDRX;
And the control module is configured to control the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
19. The apparatus of claim 18, wherein the type of terminal comprises: and the terminal which does not perform uplink transmission before receiving downlink transmission.
20. The apparatus of claim 18, wherein the access control restriction parameters comprise:
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
21. The apparatus of claim 20, wherein the control module comprises:
the starting module is configured to start a limiting timer according to the access control limiting parameter; within the timing duration of the limit timer, not sending the access request;
and/or, according to the access control limiting factor, not sending the access request.
22. The apparatus of claim 20, wherein the access control restriction factor for the terminal is the second value.
23. The apparatus of claim 18, wherein the access control restriction parameters comprise:
And limiting the access to the limited call category.
24. The apparatus of claim 23, wherein the control module comprises:
and the control sub-module is configured to respond to the call category triggering access to limit the call category, and control the terminal not to send an access request before receiving the paging message according to the access control limit parameter.
25. The apparatus of claim 24, wherein the restricted call category is indicated by at least one of:
an access category;
accessing an identification;
and (5) identifying the terminal type.
26. The apparatus of claim 24, wherein the apparatus further comprises:
the sending module is configured to respond to the triggering access call category as an emergency call category and send an access request; wherein the emergency call category is different from the restricted call category.
27. The apparatus of any one of claims 18 to 26, wherein the apparatus further comprises:
a receiving module configured to receive the access control restriction parameter for the terminal;
or,
the first acquisition module is configured to acquire the access control limit parameters defaulted by the terminal;
or,
and the second acquisition module is configured to acquire the access control limit parameters of the terminal according to a communication protocol.
28. The apparatus of claim 27, wherein the first acquisition module comprises:
and the acquisition sub-module is configured to acquire the access control limiting parameters defaulted by the terminal in response to failure of receiving the access control limiting parameters of the terminal.
29. The apparatus of claim 28, wherein the default access control restriction parameter is recorded at the terminal or specified by a communication protocol.
30. An access control apparatus, applied to a base station, comprising:
the second determining module is configured to determine an access control limit parameter according to the type of the terminal; wherein the access control limit parameters include: limiting the timing duration of the timer; the limit timer is used for determining the time length of the limit access of the terminal; the timing duration has the following value: a predetermined period duration greater than or equal to discontinuous reception mode DRX or extended discontinuous reception mode eDRX;
and the sending module is configured to send the access control limit parameter to the terminal, wherein the access control limit parameter is used for controlling the terminal not to send the access request limit before receiving the paging message.
31. The apparatus of claim 30, wherein the type of terminal comprises: and the terminal which does not perform uplink transmission before receiving downlink transmission.
32. The apparatus of claim 30, wherein the access control restriction parameters comprise:
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing terminal access or a second value restricting terminal access.
33. The apparatus of claim 32, wherein the access control restriction factor for the terminal is the second value.
34. The apparatus of any of claims 30 to 33, wherein the transmitting module comprises:
and the issuing sub-module is configured to issue the access control limit parameter to the terminal by utilizing the system message or the Radio Resource Control (RRC) message.
35. A communication device, wherein the communication device comprises at least: a processor and a memory for storing executable instructions capable of executing on the processor, wherein:
the processor is configured to execute the executable instructions, when the executable instructions are executed, to perform the steps of the access control method provided in any of the preceding claims 1 to 12, or 13 to 17.
36. A non-transitory computer readable storage medium having stored therein computer executable instructions which when executed by a processor implement the steps in the access control method provided in any of the preceding claims 1 to 12, or 13 to 17.
CN202080001641.2A 2020-07-23 2020-07-23 Access control method and device and storage medium Active CN112020879B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/103894 WO2022016474A1 (en) 2020-07-23 2020-07-23 Access control method and apparatus, and storage medium

Publications (2)

Publication Number Publication Date
CN112020879A CN112020879A (en) 2020-12-01
CN112020879B true CN112020879B (en) 2023-12-05

Family

ID=73527503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080001641.2A Active CN112020879B (en) 2020-07-23 2020-07-23 Access control method and device and storage medium

Country Status (2)

Country Link
CN (1) CN112020879B (en)
WO (1) WO2022016474A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918359A (en) * 2020-07-03 2020-11-10 中兴通讯股份有限公司 Access control method, first network node, second network node, and storage medium
CN112640532A (en) * 2020-12-07 2021-04-09 北京小米移动软件有限公司 Communication method and device, wireless access network, terminal and storage medium
WO2022120751A1 (en) * 2020-12-10 2022-06-16 北京小米移动软件有限公司 Communication method and apparatus, access device, terminal, and storage medium
WO2023201724A1 (en) * 2022-04-22 2023-10-26 Oppo广东移动通信有限公司 Wireless communication method and apparatus, and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102204376A (en) * 2008-11-03 2011-09-28 高通股份有限公司 System and method to perform access control and paging using femto cells
CN102652446A (en) * 2009-12-11 2012-08-29 瑞典爱立信有限公司 Method and arrangement in telecommunication system
CN102932873A (en) * 2006-08-04 2013-02-13 捷讯研究有限公司 System and method for responding to a paging during a communication restriction
CN104126318A (en) * 2012-05-15 2014-10-29 华为技术有限公司 Access control method, terminal and access network device
CN109196917A (en) * 2018-08-29 2019-01-11 北京小米移动软件有限公司 Access control method for limiting and device
CN109451838A (en) * 2018-04-27 2019-03-08 北京小米移动软件有限公司 Obtain the method, apparatus and storage medium of access control parameter
CN110113731A (en) * 2013-08-09 2019-08-09 瑞典爱立信有限公司 System information for machine-type communication is broadcasted
CN111328462A (en) * 2020-02-10 2020-06-23 北京小米移动软件有限公司 Paging processing method, device, communication equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110310854A1 (en) * 2010-06-17 2011-12-22 Jialin Zou Method of determining access times for wireless communication devices
CN102469547B (en) * 2010-11-04 2014-07-02 中兴通讯股份有限公司 Method, terminal and system for controlling terminal access
CN103096495A (en) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 Access control method and system
US10630410B2 (en) * 2016-05-13 2020-04-21 Telefonaktiebolaget Lm Ericsson (Publ) Network architecture, methods, and devices for a wireless communications network
CN110351872A (en) * 2018-04-02 2019-10-18 夏普株式会社 Connection control method and user equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932873A (en) * 2006-08-04 2013-02-13 捷讯研究有限公司 System and method for responding to a paging during a communication restriction
CN102204376A (en) * 2008-11-03 2011-09-28 高通股份有限公司 System and method to perform access control and paging using femto cells
CN102652446A (en) * 2009-12-11 2012-08-29 瑞典爱立信有限公司 Method and arrangement in telecommunication system
CN104126318A (en) * 2012-05-15 2014-10-29 华为技术有限公司 Access control method, terminal and access network device
CN110113731A (en) * 2013-08-09 2019-08-09 瑞典爱立信有限公司 System information for machine-type communication is broadcasted
CN109451838A (en) * 2018-04-27 2019-03-08 北京小米移动软件有限公司 Obtain the method, apparatus and storage medium of access control parameter
CN109196917A (en) * 2018-08-29 2019-01-11 北京小米移动软件有限公司 Access control method for limiting and device
CN111328462A (en) * 2020-02-10 2020-06-23 北京小米移动软件有限公司 Paging processing method, device, communication equipment and storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"GP-110731".3GPP tsg_geran\TSG_GERAN.2011,全文. *
Access category based access barring for RRC_DLE and RRC INACTIVE;LG Electronics Inc.;《3GPP_ R2-1801375》;20180112;参见文章第1-3页 *
Access category based access barring for RRC_DLE and RRC INACTIVE;LG Electronics Inc.;3gpp_ R2-1801375;文章第2页 *
LG Electronics Inc..Access category based access barring for RRC_DLE and RRC INACTIVE.《3GPP_ R2-1801375》.2018, *
NB-IoT上行链路关键技术分析与性能仿真;陈刚;黄欣;王家诚;王慧倩;庞宇;;电子技术与软件工程(08);全文 *

Also Published As

Publication number Publication date
WO2022016474A1 (en) 2022-01-27
CN112020879A (en) 2020-12-01

Similar Documents

Publication Publication Date Title
CN113056951B (en) Information transmission method, apparatus, communication device and storage medium
CN112020879B (en) Access control method and device and storage medium
JP2023520478A (en) Configuration information transmission method and device, communication device and storage medium
EP4258744A1 (en) Communication method and device, and wireless access network, terminal and storage medium
CN111512657B (en) Information transmission method and device, communication equipment and storage medium
CN110622617B (en) Information processing method, device and computer storage medium
CN111727614B (en) Terminal state switching processing and control method and device, communication equipment and storage medium
CN111869274B (en) Data transmission processing method, device, user equipment and storage medium
CN110495196B (en) Capability parameter processing method and device, communication equipment and storage medium
CN112385270B (en) Access control information processing method and device, communication equipment and storage medium
CN111819905A (en) Method and device for determining random access configuration, communication equipment and storage medium
CN111602437B (en) Information processing method, device, user equipment and storage medium
KR20240019367A (en) Information transmission methods, devices, communication devices and storage media
EP4017040A1 (en) Data processing method and apparatus, communication device and storage medium
CN111149377A (en) Network access method and device, communication equipment and storage medium
WO2022047799A1 (en) Access control method and apparatus, and communication device and storage medium
CN111557102B (en) Information transmission method, device, communication equipment and storage medium
CN114208292B (en) Access control method and device and storage medium
CN112913182B (en) Signal configuration method, device, communication equipment and storage medium
WO2022205362A1 (en) Paging processing method and apparatus, communication device and storage medium
CN114503648A (en) Method, device, communication equipment and storage medium for early identification
CN112106425A (en) Resource processing method and device, communication equipment and storage medium
CN114365545B (en) Access control method and device, communication equipment and storage medium
CN114902755B (en) Paging message processing method and device, communication equipment and storage medium
WO2023010256A1 (en) Paging method and apparatus, communication device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant