CN112954771B - Access control method, terminal and storage medium - Google Patents

Access control method, terminal and storage medium Download PDF

Info

Publication number
CN112954771B
CN112954771B CN202110192258.6A CN202110192258A CN112954771B CN 112954771 B CN112954771 B CN 112954771B CN 202110192258 A CN202110192258 A CN 202110192258A CN 112954771 B CN112954771 B CN 112954771B
Authority
CN
China
Prior art keywords
access
timer
forbidding
period
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110192258.6A
Other languages
Chinese (zh)
Other versions
CN112954771A (en
Inventor
罗强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202110192258.6A priority Critical patent/CN112954771B/en
Publication of CN112954771A publication Critical patent/CN112954771A/en
Priority to PCT/CN2022/072602 priority patent/WO2022174709A1/en
Application granted granted Critical
Publication of CN112954771B publication Critical patent/CN112954771B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the application provides an access control method, a terminal and a storage medium, comprising the following steps: and controlling the timer for prohibiting access according to the first system message under the condition that the timer for prohibiting access runs and is in a state of prohibiting access to the network and the first system message is received so as to control the access operation to the network.

Description

Access control method, terminal and storage medium
Technical Field
The present application relates to the field of communications, and in particular, to an access control method, a terminal, and a storage medium.
Background
When a terminal initiates a service from an idle state, the terminal needs to enter a connected state from the idle state, at this time, the terminal needs to perform access admission control according to network configuration, an access class in a Universal Subscriber Identity Module (USIM) card and an access type configured by a terminal high layer, when the network is in a congestion state, the network configures some control parameters to control part of the terminal to forbid access to the network, at this time, an access forbidding period of a timer T390 needs to be calculated, and T390 is started. During the operation process of T390, the access is prohibited, and after T390 times out or stops, the access is allowed. Resulting in poor flexibility for network access.
Disclosure of Invention
The embodiment of the application provides an access control method, a terminal and a storage medium, which can improve the flexibility of network access.
The technical scheme of the application is realized as follows:
the embodiment of the application provides an access control method, which comprises the following steps:
and when the timer for forbidding access runs and is in a state of forbidding access to the network and a first system message is received, controlling the timer for forbidding access according to the first system message so as to control the access operation to the network.
The embodiment of the application provides a terminal, which comprises:
and the control unit is used for controlling the timer for prohibiting access according to the first system message under the condition that the timer for prohibiting access runs, is in a state of prohibiting access to a network and receives the first system message so as to control the access operation to the network.
The embodiment of the present application provides a terminal, the terminal includes: a processor, a memory, and a communication bus; the processor, when executing the operating program stored in the memory, implements the method of any of the above.
An embodiment of the application proposes a storage medium on which a computer program is stored, which computer program, when executed by a processor, implements a method as defined in any one of the above.
The embodiment of the application provides an access control method, a terminal and a storage medium, wherein the method comprises the following steps: and controlling the timer for prohibiting access according to the first system message under the condition that the timer for prohibiting access runs and is in a state of prohibiting access to the network and the first system message is received so as to control the access operation to the network. By adopting the implementation scheme, the network side can generate the first system message according to the change of the congestion state of the network and send the first system message to the terminal, and when the terminal receives the first system message in the running process of the timer for forbidding access, the timer for forbidding access is controlled according to the first system message so as to control the access operation of the network, so that the network side can adjust the forbidding access state of the terminal in real time according to the congestion state of the network so as to control the access of the terminal to the network, and further improve the flexibility of the network access.
Drawings
FIG. 1 is a diagram of access control parameters in an exemplary system message;
fig. 2 is a flowchart illustrating a network access determination performed by an exemplary terminal;
fig. 3 is a flowchart illustrating an exemplary process of a terminal performing access admission judgment;
fig. 4 is a flowchart of an access control method according to an embodiment of the present application;
fig. 5 is a first flowchart of an exemplary access control procedure provided in an embodiment of the present application;
fig. 6 is a second flowchart of an exemplary access control procedure provided in an embodiment of the present application;
fig. 7 is a third flowchart of an exemplary access control procedure provided in an embodiment of the present application;
fig. 8 is a fourth flowchart of an exemplary access control procedure provided in an embodiment of the present application;
fig. 9 is a first schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
It should be noted that the terminal high layer may read an access identifier from the USIM card, where the access identifier is set by an operator during card manufacturing, and as shown in table 1, different access identifiers correspond to different types of access configurations.
Access identification Terminal configuration
0 Used when no access identity is over-configured in USIM
1 The UE is configured as a Multimedia Priority Service (MPS).
2 The UE is configured as a Mission Critical Service (MCS).
3-10 Reserved for future use
11 Configuring access classes 11
12 Configuring access class 12
13 Configuring access class 13
14 Configuring an access class 14
15 Configuring access classes 15
The terminal high layer may also specify the access type according to the service type, as shown in table 2, different types of access attempts correspond to different access types.
Figure BDA0002944944120000031
Figure BDA0002944944120000041
After acquiring the access level and the access type, the high layer of the terminal sends the Public Land Mobile Network (PLMN), the access level and the access type used by the access to the access layer.
An access layer of a terminal reads an access control parameter configured in a system message SIB1 of a network, wherein an optional access control parameter is shown in FIG. 1, and the network can configure SIB1 according to the access control parameter in FIG. 1; meanwhile, the terminal judges the network access according to the parameters configured by the high layer and the access control parameters configured in the SIB1; the process of the terminal making the network access judgment is shown in fig. 2, specifically,
1. judging the access type of the current access;
2. when the access type is 0, executing 25;
3. when the access type is not 0, judging whether the SIB1 contains uac-BarringPerPLMN-List or not;
4. when judging that SIB1 contains UAC-BarringPerPLMN-List, judging whether a certain UAC-BarringPerPLMN entity under UAC-BarringPerPLMN-List contains the PLMN accessed this time;
5. when a certain UAC-BarringPerPLMN entity under the UAC-BarringPerPLMN-List is judged to contain the PLMN accessed at this time, the access parameter corresponding to the PLMN under the UAC-BarringPerPLMN-List is selected for carrying out access prohibition judgment;
6. judging whether the uac-ACBarringListType indicates to use the uac-ExplicitACBarringList or not;
7. when the uac-ACBarringList type does not indicate to use the uac-ExplicitACBarringList, judging whether the uac-ACBarringList type indicates to use the ImplicitACBarringList or not;
8. when it is judged that usage of ImplicititACBarringList is not instructed in the uac-ACBarringListType, 25 is performed;
9. when judging that the usage of ImpliciITACBarringList is indicated in the uac-ACBarringList type, selecting the uac-BarringInfoSetIndex corresponding to the access type in the uac-ImpliciITACBarringList;
10. judging whether the UAC-BarringInfSetList contains the UAC-BarringInfSet corresponding to the UAC-BarringInfSetIndex or not;
11. executing 25 when judging that the UAC-BarringInfoSetList does not contain UAC-barringinfosetcorresponding to the UAC-BarringInfoSetIndex;
12. 26-27 is executed when the UAC-BarringInfoSet corresponding to the UAC-BarringInfoSetIndex is judged to be contained in the UAC-BarringInfoSetList;
13. when judging that SIB1 does not contain uac-BarringPerPLMN-List, executing 15;
14. when judging that a certain UAC-BarringPerPLMN entity under the UAC-BarringPerPLMN-List does not contain the PLMN accessed this time, executing 15;
15. judging whether SIB1 contains uac-BarringForCommon;
16. when judging that the SIB1 contains the uac-BarringForCommon, selecting to use an access parameter of the uac-BarringForCommon in the SIB1 for access prohibition judgment, and executing 18;
17. executing 18 when the uac-ExplicitACBarringList is judged to indicate the use of the uac-ExplicitACBarringList in the uac-ACBarringListType;
18. judging whether the UAC-BarringPerCatList contains the access type at this time;
19. when the UAC-BarringPerCatList is judged not to contain the access type, 25 is executed;
20. when the UAC-BarringPerCatList is judged to contain the access type at this time, the UAC-BarringPerCat entity is selected;
21. judging whether the corresponding UAC-barringInfoSetIndex in the selected UAC-BarringPerCat entity exists in UAC-BarringPerCat;
22. 26-27 when the corresponding UAC-barringInfoSetIndex in the selected UAC-BarringPerCat entity is judged to exist in UAC-BarringPerCat;
23. executing 25 when the corresponding UAC-barringInfoSetIndex in the selected UAC-BarringPerCat entity does not exist in UAC-BarringPerCat;
24. when judging that the SIB1 does not contain uac-BarringForCommon, executing 25;
25. considering that the access is allowed;
26. selecting the UAC-BarringInfoSet;
27. and carrying out the access admission judgment of the current time by using the selected UAC-BarringInfoSet corresponding access parameters.
The implementation process based on fig. 2 and 27 is shown in fig. 3; in particular, the method comprises the following steps of,
1. under the condition that the terminal receives one or more access grades of a high layer, judging whether a relevant flag bit containing at least one access identifier in an access control parameter uac-BarringForAccessIdentity is set to be 0 or not;
2. when the access control parameter uac-BarringForAccessIdentity is judged to contain the relevant flag bit of at least one access identifier set to 0, the access attempt is considered to be allowed;
3. when judging that the relevant flag bit which does not contain at least one access identifier in the access control parameter uac-BarringForAccessIdentity is set to be 0, generating a random number between 0 and 1;
4. judging whether the random number is smaller than the value of an access control parameter uac-BarringFactor or not;
5. when the random number is judged to be smaller than the value of the access control parameter uac-BarringFactor, the access attempt is considered to be allowed;
6. when the random number is judged to be not less than the value of the access control parameter uac-BarringFactor, the access attempt is considered to be forbidden;
7. generating a random number between 0 and 1;
8. the prohibition period of the timer T390 is generated according to the formula (1), and T390 is started.
T390=(0.7+0.6*rand)*uac-BarringTime (1)
Wherein, T390 in the formula (1) is the prohibited duration of the timer T390, rand is a random number generated between 0 and 1 implemented in 7, and uac-BarringTime is the value of the access control parameter uac-BarringTime.
Through the implementation process, after the fact that the access is forbidden at this time is judged, the operation duration of the T390 is also set, the T390 is started, the terminal is in the access forbidden state in the operation process of the T390, and the terminal is forbidden to access the network at this time, so that the problem of network congestion can be greatly relieved.
Currently, in the process of T390 operation, T390 may be stopped in the following scenarios to link access to the forbidden state, such as: a terminal performs a cell reselection scene; the terminal enters a scene of a connection state; the terminal receives the wireless link reconfiguration and the wireless link reconfiguration message carries the scene of the reconfigurationWithSync; a scene that the Pcell changes in a connected state; a terminal receives a scene of a command for switching to Long Term Evolution (LTE); and the terminal receives the scene of the wireless link release message.
However, when the terminal receives a new system message and the new system message is used to indicate that the access class and the access identifier corresponding to the access barring are not barred, the barring access status and T390 are not processed in the current protocol; or when the terminal receives a new system message, and the access class and the access identifier corresponding to the access barring are still barred in the new system message, but the access control parameter changes, the current protocol does not process the barred access state and the T390. Therefore, for the current protocol, in the operation process of T390, the network side cannot control the terminal to change the access prohibition state and the T390 state, thereby causing the problem of poor flexibility of network access.
In order to solve the above problem, the present application provides an access control method, and specific embodiments are described below.
It should be understood that the specific embodiments described herein are merely illustrative of the present application. And are not intended to limit the present application.
An embodiment of the present application provides an access control method, as shown in fig. 4, the method may include:
s101, when the timer for prohibiting access runs and is in a state of prohibiting access to a network and the first system message is received, controlling the timer for prohibiting access according to the first system message so as to control the access operation to the network.
The access control method provided by the embodiment of the application is suitable for a scene that a terminal accesses a network in an access forbidden period.
In the embodiment of the present application, the terminal implementing access control may be any device having communication and storage functions, for example, including but not limited to: chips, tablet computers, mobile phones, personal Computers (PCs), notebook computers, cameras, wearable devices, and the like.
It should be noted that, when the terminal is triggered to enter the access prohibition state, the timer for prohibiting access is started, and the access prohibition is used for prohibiting the terminal from accessing the network during the running process of the timer; before the terminal enters the access prohibition state, an access prohibition period is set for the timer for prohibiting access, and the access prohibition period is the timing duration of the timer for prohibiting access.
The prohibit access timer is a timer such as a T390 timer for controlling the terminal to prohibit access to the network, and may be specifically selected according to the actual situation, and the embodiment of the present application is not specifically limited.
In the embodiment of the application, in the process of the operation of the timer for prohibiting access, a first system message sent by a network side is received, and at this time, the terminal can control the timer for prohibiting access according to parameters carried in the first system message so as to control the terminal to perform the operation of network access.
Specifically, whether a first system message carries a first access control parameter is judged, and under the condition that the first system message comprises the first access control parameter, a timer for forbidding access is controlled according to the first access control parameter; performing a network access operation under the condition that the first system message does not contain the first access control parameter; at this time, the terminal may send a data service access request to the network side.
In this embodiment of the present application, when the first system message includes the first access control parameter, a specific process of controlling the timer for barring access according to the first access control parameter is as follows: firstly searching for a received access grade when a timer for forbidding access is generated, judging whether a first access grade which is the same as the access grade received when the timer for forbidding access is generated can be searched from a first access control parameter, and controlling the timer for forbidding access according to the first access grade under the condition that the first access control parameter comprises the first access grade; and performing network access operation when the first access control parameter does not include the first access level.
In the embodiment of the present application, when the first access control parameter includes the first access class, a specific process of controlling the timer for barring access according to the first access class is as follows: acquiring an identification bit of an access mark corresponding to a first access grade from a first access control parameter; if the identification bit of the access mark is characterized as access permission, performing network access operation; and if the zone bit of the access identifier is characterized as access prohibition, acquiring a first prohibition time parameter from the first access control parameter, and controlling the timer for prohibiting access according to the first prohibition time parameter.
Illustratively, the first barring time parameter is a uac-BarringTime parameter, and when the flag bit of the access identifier is 0, the terminal notifies the high level of the terminal of the access barring status release and performs a network access operation; and when the identification bit of the access mark is 1, acquiring a parameter value of the uac-BarringTime from the first access control parameter, and controlling a timer for forbidding access according to the parameter value of the uac-BarringTime.
Specifically, the specific process of controlling the timer for barring access according to the first barring time parameter includes: and controlling the timer for forbidding access according to the first forbidding time parameter, the timing duration of the timer for forbidding access and the running time period of the timer for forbidding access.
In an alternative embodiment, the specific process of controlling the timer for barring access according to the first barring time parameter, the timing duration of the timer for barring access and the running period of the timer for barring access may be: determining a current prohibiting period maximum and a current prohibiting period minimum based on the first prohibiting time parameter; updating the timing duration of the timer for forbidding access under the condition that the timing duration of the timer for forbidding access is greater than the maximum value of the current forbidding period or the timing duration of the timer for forbidding access is less than the minimum value of the current forbidding period; and under the condition that the timing duration of the timer for prohibiting access is between the maximum value of the current prohibiting period and the minimum value of the current prohibiting period, the terminal continues to run the timer until the timer stops running and then performs network access operation.
It should be noted that, the process of determining the maximum value of the current prohibition period based on the first prohibition time parameter can be implemented by formula (2):
T max =uac-BarringTime×(0.7+0.6) (2)
wherein, T max Is the maximum value of the current forbidden time period; the uac-BarringTime is the first barring time parameter.
It should be noted that, the process of determining the minimum value of the current prohibition period based on the first prohibition time parameter can be implemented by equation (3):
T min =uac-BarringTime×0.7 (3)
wherein, T min A current forbidden time period minimum value; the uac-BarringTime is the first barring time parameter.
For an alternative embodiment, the process of updating the timing duration of the timer for prohibiting access may specifically be: under the condition that the timing duration of the timer for forbidding access is greater than the maximum value of the current forbidding time period, determining the updated forbidding access time period according to the running time period of the timer for forbidding access and the maximum value of the current forbidding time period; and under the condition that the timing duration of the timer for forbidding access is smaller than the minimum value of the current forbidding time period, determining the updated forbidding access time period according to the running time period of the timer for forbidding access and the minimum value of the current forbidding time period.
Illustratively, when T is determined max Then, the updated prohibited access time period is T max A difference value with an already running period of the timer for prohibiting access; when T is determined min Then, the updated prohibited access time period is T min And the running time period of the timer for forbidding access.
In another alternative embodiment, the specific process of controlling the timer for barring access according to the first barring time parameter, the timing duration of the timer for barring access, and the running period of the timer for barring access may be: firstly, generating a random number; then calculating a new access prohibition period based on the first prohibition time parameter and the random number; acquiring the running time of the timer in the access prohibition period; the terminal compares the new access prohibition time period with the running time period of the timer for prohibiting access, and updates the timing duration of the timer for prohibiting access under the condition that the new access prohibition time period is greater than the running time period of the timer for prohibiting access; and performing network access operation when the new access prohibition period is less than or equal to the running period of the timer for prohibiting access.
Illustratively, a random number rand is generated between 0-1, after which a new barred access period is calculated using equation (4).
T390_temp=(0.7+0.6×rand)×uac-BarringTime (4)
Wherein, T390_ temp is a new barring time period, and uac-BarringTime is a first barring time parameter.
It should be noted that, the process of comparing the new prohibited access period with the running period of the timer for prohibited access by the terminal may be directly comparing the new prohibited access period with the running period of the timer for prohibited access; or determining a difference value between the new access prohibition period and the running period of the timer for prohibiting access, and comparing the difference value with 0, for example, when the difference value between the new access prohibition period and the running period of the timer for prohibiting access is greater than 0, updating the timing duration of the timer for prohibiting access; when the difference value between the new access prohibition period and the running period of the timer for prohibiting access is not more than 0, performing network access operation; the specific comparison method may be selected according to actual situations, and is not limited specifically herein.
For the another alternative embodiment, the process of updating the timing duration of the timer for barring access may specifically be: firstly, determining the difference value of the new access prohibition period and the running period of the timer for prohibiting access; and determining the difference value as the updated access prohibition period.
It should be noted that, for the method of comparing the difference between the new prohibited access period and the running period of the timer for prohibited access with 0, when the difference between the new prohibited access period and the running period of the timer for prohibited access is greater than 0, the difference between the new prohibited access period and the running period of the timer for prohibited access is directly determined as the updated prohibited access period.
It is to be understood that, by the above-mentioned one alternative embodiment and the above-mentioned another alternative embodiment, the terminal may update the prohibited access period of the timer according to the first prohibited time parameter, set the timer according to the updated prohibited access period, and restart the timer. Therefore, when the congestion state of the network changes, such as the congestion state is relieved or the congestion state is aggravated, the network side can modify the access control parameters based on the change of the congestion state, further update the current access prohibition period, and shorten or prolong the access prohibition duration of the terminal according to the current congestion state.
Based on the foregoing embodiment, an embodiment of the present application provides a method for a terminal to perform access control according to a received first system message in an access barring state, where as shown in fig. 5, the method may include:
1. and judging whether the first system message contains the first access control parameter or not under the condition that the timer for forbidding access runs, is in a state of forbidding access to the network and receives the first system message.
2. And under the condition that the first system message does not contain the first access control parameter, performing network access operation.
3. Under the condition that the first system message contains the first access control parameter, judging whether the first access control parameter contains a first access level; wherein the first access class is the same as the access class received when the timer was generated.
It should be noted that, 2 and 3 are two parallel steps after 1, which are specifically executed according to actual situations and are not described herein again.
4. And under the condition that the first access control parameter does not comprise the first access grade, performing network access operation.
5. And under the condition that the first access control parameter comprises the first access grade, acquiring the zone bit of the access mark corresponding to the first access grade from the first access control parameter.
It should be noted that 4 and 5 are two parallel steps after 3, which are specifically executed according to actual situations and are not described herein again.
6. And performing network access operation under the condition that the zone bit of the access mark is characterized as access permission.
7. And under the condition that the identification bit of the access mark is characterized as access prohibition, acquiring a first prohibition time parameter from the first access control parameter.
8. A current inhibit period maximum and a current inhibit period minimum are determined based on the first inhibit time parameter.
9. And respectively comparing the timing duration of the timer for forbidding access with the maximum value of the current forbidding time interval and the minimum value of the current forbidding time interval.
10. And under the condition that the timing duration of the timer for prohibiting access is greater than the maximum value of the current prohibiting time period, determining the updated prohibiting access time period according to the running time period of the timer for prohibiting access and the maximum value of the current prohibiting time period.
11. And under the condition that the timing duration of the timer for forbidding access is less than the minimum value of the current forbidding time period, determining the updated forbidding access time period according to the running time period of the timer for forbidding access and the minimum value of the current forbidding time period.
12. And setting a timer according to the updated access prohibition period, and restarting the timer to prohibit the network from being accessed in the running process of the timer.
13. And under the condition that the timing duration of the timer for forbidding access is between the maximum value of the current forbidding period and the minimum value of the current forbidding period, continuing to run the timer until the timer stops running and then performing network access operation.
It should be noted that 10-12 and 13 are two parallel steps after 9, which are specifically executed according to actual situations and are not described herein again.
Based on the above embodiment, fig. 6, 14-20 may also be used to replace fig. 5, specifically, it may be:
14. a random number is generated.
15. A new barring time period is calculated based on the first barring time parameter and the random number.
16. And determining the difference value between the new access prohibition period and the running period of the timer for prohibiting access when the new access prohibition period is larger than the running period of the timer for prohibiting access.
17. And determining the difference value as the updated access prohibition period.
18. And setting a timer according to the updated access prohibition period, and restarting the timer to prohibit the network from being accessed in the running process of the timer.
19. And performing network access operation when the new access prohibition period is not larger than the running period of the timer for prohibiting access.
It should be noted that 16-18 and 19 are two parallel steps after 9, which are specifically executed according to actual situations and are not described herein again.
For example, in the running process of the T390 timer, after the terminal receives the system message SIB1, a process of the terminal performing network access control may be as shown in fig. 7, where:
1. the terminal determines whether the access control parameter 1 can be found from the SIB 1.
2. When access control parameter 1 is not found from SIB1, 12 is performed.
3. When the access control parameter 1 is found from the SIB1, it is determined whether the access class 1 that is the same as the access class received when the timer is generated can be found from the access control parameter 1.
4. When no access class 1 is found from the access control parameter 1, 12 is executed.
5. And when the access level 1 is searched from the access control parameter 1, determining an access zone bit corresponding to the access level 1.
6. When the value of the access flag bit is 0, 12 is executed.
7. And when the value of the access flag bit is 1, searching the uac-BarringTime from the access control parameter 1.
8. The access barring time period of T390 is compared to uac-BarringTime x (0.7 + 0.6) and uac-BarringTime x 0.7, respectively.
9. When the access prohibition period of T390 is greater than uac-BarringTime x (0.7 + 0.6), determining that the new access prohibition period of T390 is the operated time length of uac-BarringTime x (0.7 + 0.6) -T390; and restarts T390.
10. When the access prohibition period of T390 is less than uac-BarringTime multiplied by 0.7, determining that the new access prohibition period of T390 is the operated time length of uac-BarringTime multiplied by 0.6-T390; and T390 is restarted.
11. When the access barring period of T390 is between uac-BarringTime x (0.7 + 0.6) and uac-BarringTime x 0.7, T390 continues to run.
12. And informing the high layer of the release of the access forbidden state, stopping running T390 and initiating the process of accessing the network.
Further, fig. 8-11 in fig. 7 may also be replaced with fig. 8 13-16, specifically, it may be:
13. a random number rand is generated between 0 and 1.
14. Obtaining the difference value between (0.7 +0.6 + rand) uac-BarringTime and T390 running time;
15. when the difference is greater than 0, the difference is determined as a new access barring period of T390, and T390 is restarted.
16. When the difference is less than 0, 12 is performed.
It can be understood that the network side may generate a first system message according to a change of a congestion state of the network, and send the first system message to the terminal, and when the terminal receives the first system message in a running process of the timer, the terminal controls the timer for prohibiting access according to the first system message to control an access operation to the network, so that the network side may adjust the prohibited access state of the terminal in real time according to the congestion state of the network to control the terminal to access the network, thereby improving flexibility of network access.
The embodiment of the application provides a terminal. As shown in fig. 9, the terminal 1 includes:
a control unit 10, configured to, when the timer for barring access runs and is in a network barring access state and receives a first system message, control the timer for barring access according to the first system message to control an access operation to a network.
Optionally, the control unit 10 is configured to perform a network access operation when the first system message does not include the first access control parameter.
Optionally, the control unit 10 is configured to, when the first system message includes the first access control parameter, if the first access control parameter includes the first access class, control the timer for prohibiting access according to the first access class; and if the first access control parameter does not contain the first access grade, performing network access operation.
Optionally, the terminal further includes: an acquisition unit;
the obtaining unit is configured to obtain a first barring time parameter from the first access control parameter if the flag bit of the access identifier is characterized as access barring;
the control unit 10 is configured to perform a network access operation when the first access control parameter includes a flag bit of an access identifier, and if the flag bit of the access identifier is characterized as an access grant; and controlling the timer for forbidding access according to the first forbidding time parameter.
Optionally, the control unit 10 is further configured to control the access barring timer according to the first barring time parameter, the timing duration of the access barring timer, and the running period of the access barring timer.
Optionally, the terminal further includes: a determination unit;
the determination unit is used for determining a current inhibition time period maximum value and a current inhibition time period minimum value based on the first inhibition time parameter;
the control unit 10 is further configured to update the timing duration of the access barring timer when the timing duration of the access barring timer is greater than the maximum value of the current barring time period or when the timing duration of the access barring timer is less than the minimum value of the current barring time period; and under the condition that the timing duration of the timer for forbidding access is between the maximum value of the current forbidding time period and the minimum value of the current forbidding time period, continuing to operate the timer until the timer stops operating and then performing network access operation.
Optionally, the determining unit is further configured to determine, when the timing duration of the access barring timer is greater than the maximum value of the current barring time period, the updated access barring time period according to the running time period of the access barring timer and the maximum value of the current barring time period; and under the condition that the timing duration of the timer for forbidding access is smaller than the minimum value of the current forbidding time period, determining the updated forbidding access time period according to the running time period of the timer for forbidding access and the minimum value of the current forbidding time period.
Optionally, the terminal further includes: a generating unit, a calculating unit and an updating unit;
the generation unit is used for generating random numbers;
the calculating unit is used for calculating a new access prohibition period based on the first prohibition time parameter and the random number;
the updating unit is used for updating the timing duration of the timer for forbidding access under the condition that the new period of forbidding access is greater than the running period of the timer for forbidding access;
the control unit 10 is further configured to perform a network access operation when the new prohibited access period is less than or equal to an already-running period of the timer for prohibited access.
Optionally, the determining unit is further configured to determine a difference between the new prohibited access period and an already running period of the timer for prohibited access; determining the difference as the updated prohibited access period.
Optionally, the timer for prohibiting access is a T390 timer.
In the terminal provided in the embodiment of the present application, when the timer for barring access runs and is in a state of barring access to a network and a first system message is received, the timer for barring access is controlled according to the first system message to control an access operation to the network. Therefore, according to the terminal provided by this embodiment, the network side may generate the first system message according to the change of the congestion state of the network, and send the first system message to the terminal, and when the terminal receives the first system message in the running process of the timer for barring access, the terminal controls the timer for barring access according to the first system message to control the access operation to the network, so that the network side may adjust the barring access state of the terminal in real time according to the congestion state of the network to control the terminal to access the network, thereby improving the flexibility of network access.
Fig. 10 is a schematic diagram of a composition structure of a terminal 1 according to an embodiment of the present application, and in practical application, based on the same disclosure concept of the foregoing embodiment, as shown in fig. 10, the terminal 1 according to the present embodiment includes: a processor 11, a memory 12, and a communication bus 13.
In the process of the Specific embodiment, the determining unit, the controlling unit 10, the obtaining unit, the updating unit, the generating unit and the calculating unit may be implemented by a Processor 11 located on the terminal 1, and the Processor 11 may be at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic image Processing Device (PLD), a Field Programmable Gate Array (FPGA), a CPU, a controller, a microcontroller and a microprocessor. It is understood that the electronic device for implementing the above-mentioned processor function may be other devices, and the embodiment is not limited in particular.
In the embodiment of the present application, the communication bus 13 is used for realizing connection communication between the processor 11 and the memory 12; when the processor 11 executes the execution program stored in the memory 12, the following access control method is implemented:
and when the timer for forbidding access runs and is in a state of forbidding access to the network and a first system message is received, controlling the timer for forbidding access according to the first system message so as to control the access operation to the network.
Further, in the above embodiment, the processor 11 is further configured to perform a network access operation when the first system message does not include the first access control parameter.
Further, in the above embodiment, the processor 11 is further configured to, when the first system message includes the first access control parameter, if the first access control parameter includes the first access class, control the timer for prohibiting access according to the first access class; and if the first access control parameter does not contain the first access level, performing network access operation.
Further, in the above embodiment, the processor 11 is further configured to perform a network access operation when the first access control parameter includes a flag bit of an access identifier, and if the flag bit of the access identifier is characterized as an access grant; and if the flag bit of the access identifier is characterized as access prohibition, acquiring a first prohibition time parameter from the first access control parameter, and controlling the timer for prohibiting access according to the first prohibition time parameter.
Further, in the above embodiment, the processor 11 is further configured to control the prohibit access timer according to the first prohibit time parameter, a timing duration of the prohibit access timer, and an already running period of the prohibit access timer.
Further, in the above embodiment, the processor 11 is further configured to determine a current prohibiting period maximum and a current prohibiting period minimum based on the first prohibiting time parameter; updating the timing duration of the timer for forbidding access under the condition that the timing duration of the timer for forbidding access is greater than the maximum value of the current forbidding time period or the timing duration of the timer for forbidding access is less than the minimum value of the current forbidding time period; and under the condition that the timing duration of the timer for forbidding access is between the maximum value of the current forbidding time period and the minimum value of the current forbidding time period, continuing to operate the timer until the timer stops operating and then performing network access operation.
Further, in the above embodiment, the processor 11 is further configured to, in a case that a timing duration of the access barring timer is greater than the current barring time interval maximum value, determine the updated access barring time interval according to an already-running time interval of the access barring timer and the current barring time interval maximum value; and under the condition that the timing duration of the timer for forbidding access is smaller than the minimum value of the current forbidding time period, determining the updated forbidding access time period according to the running time period of the timer for forbidding access and the minimum value of the current forbidding time period.
Further, in the above embodiment, the processor 11 is further configured to generate a random number; calculating a new barring time period based on the first barring time parameter and the random number; updating the timing duration of the timer for prohibiting access when the new period of prohibiting access is greater than the running period of the timer for prohibiting access; and performing a network access operation when the new access barring time period is less than or equal to the running time period of the timer for access barring.
Further, in the above embodiment, the processor 12 is further configured to determine a difference between the new prohibited access period and the running period of the timer for prohibited access; determining the difference as the updated prohibited access period.
Further, in the above embodiment, the access barring timer is a T390 timer.
An embodiment of the present application provides a storage medium, on which a computer program is stored, where the computer readable storage medium stores one or more programs, and the one or more programs are executable by one or more processors and applied to a terminal, and the computer program implements the access control method as described above.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling an image display device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present disclosure.
The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application.

Claims (11)

1. An access control method, the method comprising:
when the timer for forbidding access runs and is in a state of forbidding access to a network and a first system message is received, controlling the timer for forbidding access according to the first system message so as to control the access operation to the network;
wherein the controlling the timer for prohibiting access according to the first system message to control an access operation to a network includes:
if the first access control parameter includes a first access class, controlling the timer for prohibiting access according to the first access class when the first system message includes the first access control parameter;
if the first access control parameter does not contain the first access level, performing network access operation;
wherein the controlling the timer for barring access according to the first access class comprises:
and under the condition that the first access control parameter comprises a flag bit of an access identifier, if the flag bit of the access identifier is characterized as access prohibition, acquiring a first prohibition time parameter from the first access control parameter, and controlling the timer for prohibiting access according to the first prohibition time parameter, the timing duration of the timer for prohibiting access and the running time period of the timer for prohibiting access.
2. The method of claim 1, comprising the steps of:
and under the condition that the first system message does not contain the first access control parameter, performing network access operation.
3. The method of claim 1, comprising the steps of:
and under the condition that the first access control parameter comprises a zone bit of an access identifier, if the zone bit of the access identifier is characterized as access permission, performing network access operation.
4. The method of claim 1, comprising the steps of:
determining a current inhibit period maximum and a current inhibit period minimum based on the first inhibit time parameter;
updating the timing duration of the timer for forbidding access under the condition that the timing duration of the timer for forbidding access is greater than the maximum value of the current forbidding period or the timing duration of the timer for forbidding access is less than the minimum value of the current forbidding period;
and under the condition that the timing duration of the timer for forbidding access is between the maximum value of the current forbidding time period and the minimum value of the current forbidding time period, continuing to operate the timer until the timer stops operating and then performing network access operation.
5. The method of claim 4, comprising the steps of:
under the condition that the timing duration of the timer for forbidding access is greater than the maximum value of the current forbidding time period, determining the updated forbidding access time period according to the running time period of the timer for forbidding access and the maximum value of the current forbidding time period;
and under the condition that the timing duration of the timer for forbidding access is smaller than the minimum value of the current forbidding time interval, determining the updated forbidding access time interval according to the running time interval of the timer for forbidding access and the minimum value of the current forbidding time interval.
6. The method of claim 1, comprising the steps of:
generating a random number;
calculating a new barring access period based on the first barring time parameter and the random number;
updating the timing duration of the timer for forbidding access under the condition that the new period of forbidding access is greater than the running period of the timer for forbidding access;
and performing network access operation when the new access prohibition period is less than or equal to the running period of the timer for prohibiting access.
7. The method of claim 6, comprising the steps of:
determining a difference value between the new access prohibition period and the running period of the timer for prohibiting access;
determining the difference as the updated prohibited access period.
8. The method according to any of claims 1 or 4-7, wherein the timer for barring access is a T390 timer.
9. A terminal, characterized in that the terminal comprises:
the control unit is used for controlling the timer for forbidding access according to the first system message under the conditions that the timer for forbidding access runs, is in a state of forbidding access to a network and receives the first system message so as to control the access operation to the network;
the control unit is configured to, when the first system message includes the first access control parameter, control the timer for prohibiting access according to the first access class if the first access control parameter includes the first access class: if the first access control parameter does not contain the first access level, performing network access operation;
the acquiring unit is configured to acquire a first barring time parameter from the first access control parameter when the first access control parameter includes a flag bit of an access identifier and when the flag bit of the access identifier is characterized as access barring;
the control unit is further configured to control the prohibit access timer according to the first prohibit time parameter, the timing duration of the prohibit access timer, and the running time period of the prohibit access timer.
10. A terminal, characterized in that the terminal comprises: a processor, a memory, and a communication bus; the processor, when executing the execution program stored in the memory, implements the method of any of claims 1-8.
11. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 8.
CN202110192258.6A 2021-02-19 2021-02-19 Access control method, terminal and storage medium Active CN112954771B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110192258.6A CN112954771B (en) 2021-02-19 2021-02-19 Access control method, terminal and storage medium
PCT/CN2022/072602 WO2022174709A1 (en) 2021-02-19 2022-01-18 Access control method, terminal, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110192258.6A CN112954771B (en) 2021-02-19 2021-02-19 Access control method, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN112954771A CN112954771A (en) 2021-06-11
CN112954771B true CN112954771B (en) 2023-04-14

Family

ID=76244687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110192258.6A Active CN112954771B (en) 2021-02-19 2021-02-19 Access control method, terminal and storage medium

Country Status (2)

Country Link
CN (1) CN112954771B (en)
WO (1) WO2022174709A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112954771B (en) * 2021-02-19 2023-04-14 Oppo广东移动通信有限公司 Access control method, terminal and storage medium
CN114342483A (en) * 2021-12-07 2022-04-12 北京小米移动软件有限公司 Access control method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019242447A1 (en) * 2018-06-21 2019-12-26 华为技术有限公司 Frequency spectrum scheduling method applied to multiple systems, and network device
CN111786848A (en) * 2020-06-02 2020-10-16 北京电信技术发展产业协会 Protocol consistency test method and system for 5G terminal unified access control

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219732A (en) * 2013-05-29 2014-12-17 中兴通讯股份有限公司 Network access control method and mobile terminal
CN111148263B (en) * 2017-05-05 2021-04-09 华为技术有限公司 Method and device for transmitting data
CN109982430B (en) * 2017-12-28 2021-07-13 大唐移动通信设备有限公司 Method and equipment for scheduling request
JP7115636B2 (en) * 2018-10-04 2022-08-09 日本電気株式会社 Instructions for updating parameters related to integrated access control
CN111107541B (en) * 2018-11-07 2022-02-11 维沃移动通信有限公司 Method and apparatus for wireless communication
WO2021030658A1 (en) * 2019-08-14 2021-02-18 Google Llc Systems and methods for preventing undesired access barring alleviation
CN112188558B (en) * 2020-10-20 2022-06-24 哲库科技(北京)有限公司 Network connection method, terminal and storage medium
CN112954771B (en) * 2021-02-19 2023-04-14 Oppo广东移动通信有限公司 Access control method, terminal and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019242447A1 (en) * 2018-06-21 2019-12-26 华为技术有限公司 Frequency spectrum scheduling method applied to multiple systems, and network device
CN111786848A (en) * 2020-06-02 2020-10-16 北京电信技术发展产业协会 Protocol consistency test method and system for 5G terminal unified access control

Also Published As

Publication number Publication date
CN112954771A (en) 2021-06-11
WO2022174709A1 (en) 2022-08-25

Similar Documents

Publication Publication Date Title
CN112954771B (en) Access control method, terminal and storage medium
JP5873184B2 (en) Access control method, module, and UE including the module
JP5584354B2 (en) Method and system for controlling a machine-type communication device for accessing a network
CN102300285B (en) Access control method and equipment
WO2021258842A1 (en) Network access control method, device, terminal, and readable storage medium
CN109151825B (en) Hotspot sharing method, device and system
CN113132968B (en) Indication method and device for private network, access method and device for private network, network side equipment and terminal
CN102892173A (en) Method for processing service barred for initiation or released and user terminal
EP3531619A1 (en) Method, device and system for function scheduling
CN110677890B (en) Multi-card multi-4G mobile terminal and network reselection method thereof
CN111065134B (en) Multi-card multi-4G mobile terminal and method for sharing 4G measuring capability thereof
CN106793004B (en) MTC terminal network access control method and device
CN113395681A (en) Method and device for setting terminal default paging DRX, electronic equipment and storage medium
CN109005568B (en) Forbidden list processing method and device, storage medium, terminal and base station
WO2011082668A1 (en) Admission method, apparatus and system
WO2021155588A1 (en) Method and apparatus for restricting access of devices
RU2767991C1 (en) Information processing method, terminal device and data medium
CN110167064B (en) Method, network element, terminal and system for controlling terminal access
CN109788525B (en) Admission control method and device, storage medium and terminal
CN114793353A (en) Network selection method, configuration method, terminal and network side equipment
CN114071654A (en) Access control method, terminal and network side equipment
CN114630325A (en) Network access method, electronic equipment and storage medium
CN114788357A (en) Method and apparatus for prioritized 5G NSA cell (re) selection
CN110022568B (en) Admission control method and device and user equipment
CN113038502B (en) Optimization method and device for VOLTE voice service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant