CN114071647A - Access control method and device - Google Patents

Access control method and device Download PDF

Info

Publication number
CN114071647A
CN114071647A CN202010763625.9A CN202010763625A CN114071647A CN 114071647 A CN114071647 A CN 114071647A CN 202010763625 A CN202010763625 A CN 202010763625A CN 114071647 A CN114071647 A CN 114071647A
Authority
CN
China
Prior art keywords
relay terminal
information
network
access
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010763625.9A
Other languages
Chinese (zh)
Inventor
刘进华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010763625.9A priority Critical patent/CN114071647A/en
Priority to PCT/CN2021/110010 priority patent/WO2022022736A1/en
Publication of CN114071647A publication Critical patent/CN114071647A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an access control method and device, and the method comprises the following steps: the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link; and the relay terminal performs access control on a remote terminal according to the access control indication information and/or the access control behavior of the side link. In the embodiment of the application, the relay terminal can perform access control on the remote terminal according to the determined access control indication information and/or the access control behavior of the sidelink, so that when the relay terminal provides a relay transmission service between the remote terminal and the network side equipment, network access control can be effectively performed, and network congestion is prevented from being aggravated or signaling overhead is prevented from being increased.

Description

Access control method and device
Technical Field
The present application belongs to the field of communications technologies, and in particular, to an access control method and apparatus.
Background
After the relay terminal is introduced to provide the relay service from the terminal to the network, the remote terminal accessing the network through the sidelink will directly affect the traffic load of the network, and therefore, the PC5 interface also needs a set of access control mechanism. If there is no access control mechanism of the PC5 interface, when the network is congested, the relay terminal may continue to allow the new terminal to access the network through the relay terminal, which may aggravate the network congestion, or the new terminal is rejected by the base station to provide service after passing through a complex signaling flow, and finally the new terminal must reselect another cell or relay terminal to provide service, which not only results in a large signaling overhead, but also causes a delay for the new terminal to reselect a cell/relay terminal.
Disclosure of Invention
The embodiment of the application aims to provide an access control method and an access control device, and solves the problems that network congestion is aggravated or signaling overhead is large when a relay terminal performs access control on a remote terminal.
In a first aspect, an access control method is provided, including:
the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link;
and the relay terminal performs access control on a remote terminal according to the access control indication information and/or the access control behavior of the side link.
In a second aspect, an access control method is provided, including:
the remote terminal acquires information related to the access control behavior of the sidelink of the relay terminal;
and the remote terminal determines to initiate the access request for accessing the network through the relay terminal or not to initiate the access request for accessing the network through the relay terminal according to the information.
In a third aspect, an access control method is provided, including:
and the network side equipment sends sixth information to the relay terminal, wherein the sixth information is used for configuring the access control indication information of the side link and/or the access control behavior of the side link.
In a fourth aspect, an access control apparatus is provided, which is applied to a relay terminal, and includes:
the determining module is used for determining the access control indication information of the side link and/or the access control behavior of the side link;
and the control module is used for carrying out access control on the remote terminal according to the access control indication information and/or the access control behavior of the side link.
In a fifth aspect, an access control apparatus is provided, which is applied to a remote terminal, and includes:
the acquisition module is used for acquiring information related to the access control behavior of the sidelink of the relay terminal;
and the determining module is used for determining whether to initiate the access request for accessing the network through the relay terminal or not according to the information.
In a sixth aspect, a terminal is provided, including: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor, performs the steps of the method according to the first or second aspect.
A seventh aspect provides an access control apparatus, applied to a network side device, including:
and the sending module is used for sending sixth information to the relay terminal, wherein the sixth information is used for configuring the access control indication information of the side link and/or the access control behavior of the side link.
In an eighth aspect, a network side device is provided, which includes: a processor, a memory and a program stored on the memory and executable on the processor, which program, when executed by the processor, carries out the steps of the method according to the third aspect.
A ninth aspect provides a readable storage medium, characterized in that the readable storage medium stores thereon a program or instructions which, when executed by a processor, implements the steps of the method according to the first, second or third aspect.
A tenth aspect provides a readable storage medium on which a program or instructions are stored, which program or instructions, when executed by a processor, implement the steps of the method according to the first, second or third aspect.
In an eleventh aspect, there is provided a program product stored in a non-volatile storage medium for execution by at least one processor to implement the steps of the method of the first, second or third aspect.
In a twelfth aspect, a chip is provided, the chip comprising a processor and a communication interface, the communication interface being coupled to the processor, the processor being configured to execute a program or instructions to implement the steps of the method according to the first, second or third aspect.
In the embodiment of the application, the relay terminal can perform access control on the remote terminal according to the determined access control indication information and/or the access control behavior of the sidelink, so that when the relay terminal provides a relay transmission service between the remote terminal and the network side equipment, network access control can be effectively performed, and network congestion is prevented from being aggravated or signaling overhead is prevented from being increased.
Drawings
FIG. 1 is a block diagram of a wireless communication system to which embodiments of the present application are applicable;
fig. 2 is a flowchart of an access control method according to an embodiment of the present application;
fig. 3 is a second flowchart of an access control method according to an embodiment of the present application;
fig. 4 is a third flowchart of an access control method according to an embodiment of the present application;
fig. 5 is a schematic diagram of an access control apparatus according to an embodiment of the present application;
fig. 6 is a second schematic diagram of an access control apparatus according to an embodiment of the present application;
fig. 7 is a schematic diagram of a terminal according to an embodiment of the present application;
fig. 8 is a third schematic diagram of an access control apparatus according to an embodiment of the present application;
fig. 9 is a schematic diagram of a network-side device according to an embodiment of the present application.
Detailed Description
For the convenience of understanding the embodiment of the present application, the following two technical points are introduced:
first, Sidelink (SL) profile:
SL is a Radio link between a terminal (e.g., User Equipment (UE)) and a UE in a New Radio, NR, Long Term Evolution (LTE), and the two UEs can realize direct data transmission through a sidelink. The wireless link between the sidelinks is also called a PC5 link, and runs through a PC5 protocol. In the third Generation Partnership (3 GPP) Release 17(Release 17, Rel-17), research is conducted on using a UE to provide a relay service between the UE and a network (as shown in fig. 1), wherein the UE providing the relay service is called a relay UE (or called a relay terminal, or called a relay UE), the UE provided with the relay service is called a remote UE (or called a remote terminal, or called a remote UE), a link between the relay UE and the remote UE is a PC5 link, a sidelink interface protocol is operated, a link between the relay UE and a base station is a Uu link, and the Uu interface protocol is operated.
The Radio interface Control plane of the sidelink has a PC5 Radio Resource Control (RRC) protocol, which operates above a Packet Data Convergence Protocol (PDCP) layer and a Radio Link Control (RLC) layer, and is located below a Media Access Control (MAC) layer and a physical layer. The radio interface user plane of the sidelink includes, from top to bottom, a Service Data Attachment Protocol (SDAP), a PDCP, an RLC, a MAC, and a physical layer.
A sidelink synchronization Signal (S-SSB) is provided between the sidelink radio interfaces that reuses Primary Synchronization Signal (PSS) and Secondary Synchronization Signal (SSS) signals of the Uu interface, while providing a 56bit (bit) sidelink Main Information Block (MIB) Signal. The 56bit information includes:
(1) direct Frame Number (DFN), sidelink radio frame number;
(2) time Division Duplex (TDD) configuration (configuration): the sidelink time division uplink and downlink configuration is used for indicating uplink and downlink time slot configuration and available sidelink transmission time slot;
(3) slot number (slot number): the remote UE is used for indicating the sequence number of the transmission time slot of the current S-MIB, and the remote UE can be used as a reference to determine the sequence number of the subsequent time slot;
(4) cell coverage indicator (In coverage indicator): indicating whether the UE broadcasting the S-MIB is within the coverage of the radio cell.
(5) And bit reservation: 2 bit.
(6) Cyclic Redundancy Check (CRC) bit: 24 bit.
In the corresponding LTE Device-to-Device (D2D) technology, S-MIB information is also defined, containing similar fields as described above.
II, access control of a Uu port:
there are indications that the following may be used for access control:
(1) cellBarred: the indication bit is in the MIB information and is used to indicate whether the cell is barred for access.
(2) cellreserveferoverore use: the indication bit is in a System Information Block (SIB) 1 message, and is used to indicate whether a current cell is reserved for an operator according to a Public Land Mobile Network (PLMN)/Stand-alone Non-Public Network (SNPN) of an independent Network.
(3) cellReservedForOtherUse: the indication bit is in the SIB1 message, and is applicable to all PLMN/Non-public networks (NPN), and is used to indicate whether the current cell is reserved, and when the cell indicates reservation, the normal UE may not access the cell.
(4) cellreservedforsutureuse: the indication bit is in the SIB1 message, is applicable to all PLMNs/NPN, and is used to indicate whether the current cell is reserved, and when the cell indicates reservation, the general UE may not access the cell.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a sequential or chronological order. It should be understood that the data so used are interchangeable under appropriate circumstances such that embodiments of the application can be practiced in sequences other than those illustrated or described herein, and the terms "first" and "second" used herein generally do not denote any order, nor do they denote any order, for example, the first object may be one or more. In addition, "and/or" in the specification and the claims means at least one of connected objects, and a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
It is noted that the techniques described in the embodiments of the present application are not limited to Long Term Evolution (LTE)/LTE Evolution (LTE-Advanced) systems, but may also be used in other wireless communication systems, such as Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Single-carrier Frequency-Division Multiple Access (SC-FDMA), and other systems. The terms "system" and "network" in the embodiments of the present application are often used interchangeably, and the described techniques can be used for both the above-mentioned systems and radio technologies, as well as for other systems and radio technologies. However, the following description describes a New Radio (NR) system for purposes of example, and NR terminology is used in much of the description below, although the techniques may also be applied to applications other than NR system applications, such as 6 th generation (6 th generation)thGeneration, 6G) communication system.
Fig. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a remote terminal 13, a relay terminal 12 and a network side Device 11, where the remote terminal 13 and the relay terminal 12 may be Mobile phones, Tablet Personal computers (Tablet Personal computers), Laptop computers (Laptop computers) or notebook computers, Personal Digital Assistants (PDAs), palm computers, netbooks, ultra-Mobile Personal computers (UMPCs), Mobile Internet Devices (MIDs), Wearable devices (Wearable devices) or vehicle-mounted devices (VUEs), pedestrian terminals (PUEs) and other terminal side devices, and the Wearable devices include: bracelets, earphones, glasses and the like. It should be noted that the embodiment of the present application does not limit the specific types of the remote terminal 13 and the relay terminal 12. The network-side device 11 may be a Base station or a core network, where the Base station may be referred to as a node B, an evolved node B, an access Point, a Base Transceiver Station (BTS), a radio Base station, a radio transceiver, a Basic Service Set (BSS), an Extended Service Set (ESS), a node B, an evolved node B (eNB), a home node B, a WLAN access Point, a WiFi node, a Transmit Receive Point (TRP), or some other suitable terminology in the field, as long as the same technical effect is achieved, the Base station is not limited to a specific technical vocabulary, and it should be noted that in the embodiment of the present application, only the Base station in the NR system is taken as an example, but the specific type of the Base station is not limited.
The access control method and apparatus provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Referring to fig. 2, an embodiment of the present application provides an access control method, which includes: step 201 and step 202.
Step 201: the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link;
step 202: and the relay terminal performs access control on the remote terminal according to the access control indication information and/or the access control behavior of the side link.
In an embodiment of the present application, the access control indication information may include one of:
(1) first information indicating that the relay terminal allows the remote terminal to access a network through the relay terminal;
(2) and second information, which indicates that the relay terminal does not allow the remote terminal to access the network through the relay terminal.
In an embodiment of the present application, the access control behavior of the sidelink may include one of:
(1) a first behavior representing that the relay terminal provides access network service for the remote terminal through the relay terminal;
(2) and a second behavior, which represents that the relay terminal does not access the network service for the remote terminal through the relay terminal.
Optionally, the second behavior may include one or more of the following in combination:
(1) the relay terminal sends third information, wherein the third information indicates that the remote terminal is not allowed to access the network through the relay terminal;
(2) the relay terminal does not respond to a first request, wherein the first request is used for the remote terminal to request to access the network through the relay terminal;
(3) the relay terminal sends fourth information, and the fourth information indicates that the relay terminal rejects the first request;
optionally, the fourth information may include: a reason why the relay terminal rejects the first request.
(4) The relay terminal stops broadcasting the application code indicating the relay service capability;
wherein the application code may be preconfigured by the network, and the remote terminal may determine whether the relay terminal has a capability of providing the relay service to the network according to the application code broadcasted by the relay terminal.
(5) And the relay terminal sends fifth information, wherein the fifth information represents that the remote terminal is delayed to access the network through the relay terminal.
Optionally, the fifth information may include: a first time period representing a length of time for which access of the remote terminal to a network through the relay terminal is delayed.
It is to be understood that the first time period is not particularly limited in the embodiments of the present application.
In some embodiments of the present application, step 202 may comprise: the relay terminal receives a system message of a service cell; and the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link according to the system message of the service cell.
In other embodiments of the present application, step 202 may comprise: receiving sixth information; and configuring the access control indication information of the side link and/or the access control behavior of the side link according to the sixth information.
For example, the sixth information may be RRC signaling, but is not limited thereto.
Optionally, the sixth information may indicate at least one of:
(1) before the relay terminal receives seventh information, not allowing the relay terminal to provide network access service for a remote terminal, wherein the seventh information indicates that the relay terminal is allowed to provide network access service for the remote terminal;
(2) and the relay terminal is not allowed to provide the service of the access network for the remote terminal in the second time period.
It is to be understood that the second time period is not particularly limited in the embodiments of the present application.
In some embodiments of the present application, step 201 may comprise: the relay terminal acquires eighth information, wherein the eighth information represents a network congestion state; and the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link according to the eighth information.
For example, the relay terminal acquires the eighth information through the Uu interface, that is, the relay terminal may determine whether to allow the new UE to access the network through the relay terminal by monitoring a congestion status of the Uu.
Optionally, the eighth information may include one or more of:
(1) uplink waiting for the amount of data to be sent to the serving base station;
(2) waiting time for uplink data to be sent to the serving base station;
(3) downlink waiting for the amount of data to be sent to the remote terminal;
(4) and descending the waiting time for waiting the data sent to the remote end.
In the embodiment of the application, the relay terminal can perform access control on the remote terminal according to the determined access control indication information and/or the access control behavior of the sidelink, so that when the relay terminal provides a relay transmission service between the remote terminal and the network side equipment, network access control can be effectively performed, and network congestion is prevented from being aggravated or signaling overhead is prevented from being increased.
Referring to fig. 3, an embodiment of the present application provides an access control method, which includes: step 301 and step 302.
Step 301: the remote terminal acquires information related to the access control behavior of the sidelink of the relay terminal;
step 302: and the remote terminal determines to initiate the access request for accessing the network through the relay terminal or not to initiate the access request for accessing the network through the relay terminal according to the information.
In this embodiment of the present application, the determining, by the remote terminal, not to initiate an access request for accessing the network through the relay terminal according to the information includes one of:
(1) if the remote terminal receives third information, and the third information indicates that the remote terminal is not allowed to access the network through the relay terminal, the remote terminal does not initiate an access request for accessing the network through the relay terminal in a third time period;
(2) if the remote terminal receives fourth information, the fourth information indicates that the relay terminal rejects a first request, and the first request is used for the remote terminal to request to access the network through the relay terminal, the remote terminal does not initiate an access request for accessing the network through the relay terminal in a fourth time period;
(3) and if the remote terminal does not monitor the application code indicating the relay service capability sent by the relay terminal, the remote terminal does not initiate an access request through the relay terminal.
In an embodiment of the present application, the method further includes:
and in the third time period, the remote terminal ignores the third information and initiates an access request of a specific service to access the network through the relay terminal.
It is to be understood that the third time period is not particularly limited in the embodiments of the present application.
The specific service may be an emergency service or public safety (public safety) service, that is, the remote terminal may initiate the emergency service or public safety service through the relay UE, and ignore an indication received from a sidelink of the relay UE that the remote terminal is not allowed to access the network through the relay UE.
In this embodiment of the present application, the determining, by the remote terminal, not to initiate an access request to access a network through the relay terminal according to the access control behavior of the sidelink includes:
and if the remote terminal receives fifth information which indicates that the remote terminal is delayed to access the network through the relay terminal, the remote terminal sends an access request for accessing the network through the relay terminal after the delay time is over.
In the embodiment of the application, the remote terminal access network is controlled by the relay terminal according to the access control indication information and/or the access control behavior of the sidelink, so that when the relay terminal provides the relay transmission service between the remote terminal and the network side equipment, the network access control can be effectively performed, and the network congestion is prevented from being aggravated or the signaling overhead is prevented from being increased.
Referring to fig. 4, an embodiment of the present application provides an access control method, which includes: step 401.
Step 401: and the network side equipment sends sixth information to the relay terminal, wherein the sixth information is used for configuring the access control indication information of the side link and/or the access control behavior of the side link.
For example, the sixth information may be RRC signaling, but is not limited thereto.
Optionally, the sixth information may indicate one of:
(1) before the relay terminal receives seventh information, not allowing the relay terminal to provide network access service for a remote terminal, wherein the seventh information indicates that the relay terminal is allowed to provide network access service for the remote terminal;
(2) and the relay terminal is not allowed to provide the service of the access network for the remote terminal in the second time period.
In an embodiment of the present application, the access control indication information may include one of:
(1) first information indicating that the relay terminal allows the remote terminal to access a network through the relay terminal;
(2) and second information, which indicates that the relay terminal does not allow the remote terminal to access the network through the relay terminal.
In an embodiment of the present application, the access control behavior of the sidelink may include one of:
(1) a first behavior representing that the relay terminal provides access network service for the remote terminal through the relay terminal;
(2) and a second behavior, which represents that the relay terminal does not access the network service for the remote terminal through the relay terminal.
Optionally, the second behavior may include one or more of the following in combination:
(1) the relay terminal sends third information, wherein the third information indicates that the remote terminal is not allowed to access the network through the relay terminal;
(2) the relay terminal does not respond to a first request, wherein the first request is used for the remote terminal to request to access the network through the relay terminal;
(3) the relay terminal sends fourth information, and the fourth information indicates that the relay terminal rejects the first request;
optionally, the fourth information may include: a reason why the relay terminal rejects the first request.
(4) The relay terminal stops broadcasting the application code indicating the relay service capability;
(5) and the relay terminal sends fifth information, wherein the fifth information represents that the remote terminal is delayed to access the network through the relay terminal.
Optionally, the fifth information may include: a first time period representing a length of time for which access of the remote terminal to a network through the relay terminal is delayed.
In the embodiment of the application, the network side device may configure the access control indication information of the relay terminal and/or the access control behavior of the sidelink, and the relay terminal may perform access control on the remote terminal according to the access control indication information and/or the access control behavior of the sidelink, so that when the relay terminal provides a relay transmission service between the remote terminal and the network side device, network admission control may be effectively performed, and network congestion is prevented from being aggravated or signaling overhead is prevented from being increased.
Examples of the present application will be described below with reference to examples 1 to 5.
Example 1: and access control in the sidelink.
When the relay UE determines that the sidelink no longer allows the new UE (or the remote UE) to access the network through the relay UE, the relay UE may perform access control through one or more of the following ways:
mode 1: the sidelink master information block (SL-MIB) message includes: and a sidelink access control indication bit, wherein when the indication bit is set to 'true', the relay UE does not accept the new UE to access the network through the relay UE.
For example, 1 or 2 reserved bits in the SL-MIB may be redefined as sidelink access control indication bits.
Mode 2: when receiving a request of a new UE for accessing a network through the relay UE, the relay UE does not respond or rejects the access request of the UE;
optionally, the relay UE may send a reason for rejecting access to the new UE;
for example, the relay UE may send the reason to the new UE through PC5 RRC signaling, a MAC Control Element (CE), or a Physical bypass Control Channel (PSCCH).
Mode 3: the relay UE stops broadcast transmission of an application code (application code) indicating relay service capability.
Because the new UE needs to judge whether the relay UE can provide the relay service through the application code, when the new UE cannot receive the application code sent by the relay UE, the new UE cannot access the network through the relay UE;
mode 4: the relay UE may send a notification message to the new UE through PSCCH, MAC CE, or PC5 RRC signaling to notify that the new UE is deferred to access the network through the relay UE.
Optionally, the notification message may indicate a time period for deferring the new UE from accessing the network through the relay UE, during which the new UE is prohibited from accessing the network through the relay UE.
Example 2: the new UE (alternatively referred to as a remote UE) accesses the network through the relay UE.
(1) Upon receiving an indication from the sidelink message that the relay UE is unable to access the network via its sidelink, the new UE may not initiate a request to access the network via the relay UE for a predetermined time (e.g., n seconds).
It is understood that the predetermined time period may be configured by the network side or agreed upon by the protocol.
In particular, when a new UE needs to initiate an emergency service or public safety (public safety) service, an indication received from a sidelink of the relay UE that does not allow access to the network through the relay UE may be ignored, i.e., the new UE may initiate the emergency service or public safety service through the relay UE.
(2) In the process that the new UE accesses the network through the sidelink of the relay UE, when the new UE receives the indication of the access refusal and/or the reason of the access refusal, the new UE cannot initiate a request for accessing the network through the relay UE within the preset time.
(3) When the new UE cannot monitor the application code sent by the relay UE, the new UE cannot initiate a request for accessing the network through the relay UE.
(4) After the new UE sends a request for accessing to the network to the relay UE, the new UE receives the notification message of delayed access, and the new UE can access to the network through the relay UE after the delay time indicated by the notification message is finished.
It is understood that the delay time may be configured or agreed by a protocol on the network side, or carried in the notification message.
Example 3: and the relay UE determines the access control of the sidelink according to the system message of the service cell.
The relay UE monitors the information of MIB, SIB and the like of the service cell and determines whether to allow the new UE to access the network through the relay UE.
The relay UE shall prohibit providing access service for the new UE in case of one or more of the following combinations of conditions:
(1) when the relay UE monitors that cellBarred set 'true' in the MIB from the serving cell;
(2) when the relay UE monitors cellReservedForOtheruse or cellReservedForFutureuse in a service cell SIB1 message to set 'true';
(3) when the relay UE monitors that cellReservedForOperatorUse set 'true' corresponding to a certain PLMN in a service cell SIB1 message, and the PLMN is a network which is currently providing access service for the relay UE;
(4) a special access control indication bit is introduced in a system message (such as SIB1) of the Uu port to indicate whether the relay UE is allowed to provide a relay service for the new UE to access the network, and when the access control indication bit from the serving cell is set to "true".
Example 4: the network configures the sidelink access control of the relay UE through proprietary signaling.
In this embodiment, to control the UE traffic load accessing to the network through one relay UE, the network may configure, through RRC dedicated signaling, whether to allow one relay UE to provide a relay service accessing to the network for a new UE through a sidelink.
The dedicated signaling may prohibit one relay UE from providing relay service access to the network until another signaling informs the relay UE that relay service access to the network can be provided for a new UE;
or
The dedicated signaling may inform the relay UE of a time period for prohibiting providing the relay service to the network, and after the time period is over, the relay UE may continue to provide the relay service to the network.
It is understood that the time period may be network-side configuration or agreed upon by a protocol.
Example 5: and the relay UE determines the access control of the side link according to the congestion condition of the Uu or the side link.
The relay UE monitors the congestion status of the Uu port to determine whether to allow the new UE to access the network through the relay UE.
For example, a relay UE may prohibit/deny a new UE from accessing the network through the relay UE in case of one or more of the following combinations of conditions;
(1) the data volume of the uplink waiting to be sent to the service base station exceeds a preset value;
(2) waiting time of data waiting to be sent to a service base station in an uplink exceeds a preset value;
(3) the data volume of the downlink waiting to be sent to the remote UE exceeds a preset value;
(4) the waiting time delay of the data which is sent to the remote UE in the downlink waiting mode exceeds a preset value.
It is understood that the preset value may be configured or agreed by the network side.
Referring to fig. 5, an access control apparatus provided in an embodiment of the present application is applied to a relay terminal, where the apparatus 500 includes:
a determining module 501, configured to determine access control indication information of a sidelink and/or an access control behavior of the sidelink;
a control module 502, configured to perform access control on the remote terminal according to the access control indication information and/or the access control behavior of the sidelink.
In an embodiment of the present application, the access control indication information includes:
first information indicating that the relay terminal allows the remote terminal to access a network through the relay terminal;
alternatively, the first and second electrodes may be,
and second information, which indicates that the relay terminal does not allow the remote terminal to access the network through the relay terminal.
In this embodiment of the present application, the access control behavior of the sidelink includes:
a first behavior representing that the relay terminal provides access network service for the remote terminal through the relay terminal;
alternatively, the first and second electrodes may be,
and a second behavior, which represents that the relay terminal does not access the network service for the remote terminal through the relay terminal.
In an embodiment of the application, the second behavior comprises one or more of the following in combination:
the relay terminal sends third information, wherein the third information indicates that the remote terminal is not allowed to access the network through the relay terminal;
the relay terminal does not respond to a first request, wherein the first request is used for the remote terminal to request to access the network through the relay terminal;
the relay terminal sends fourth information, and the fourth information indicates that the relay terminal rejects the first request;
the relay terminal stops broadcasting the application code indicating the relay service capability;
and the relay terminal sends fifth information, wherein the fifth information represents that the remote terminal is delayed to access the network through the relay terminal.
In an embodiment of the present application, the fourth information includes: a reason why the relay terminal rejects the first request.
In this embodiment of the present application, the fifth information includes: a first time period representing a length of time for which access of the remote terminal to a network through the relay terminal is delayed.
In this embodiment of the present application, the determining, by the relay terminal, access control indication information of the sidelink and/or an access control behavior of the sidelink includes:
the relay terminal receives a system message of a service cell;
and the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link according to the system message of the service cell.
In this embodiment of the application, the determining module 501 is further configured to: receiving sixth information; and configuring the access control indication information of the side link and/or the access control behavior of the side link according to the sixth information.
In an embodiment of the present application, the sixth information indicates:
before the relay terminal receives seventh information, not allowing the relay terminal to provide network access service for a remote terminal, wherein the seventh information indicates that the relay terminal is allowed to provide network access service for the remote terminal;
alternatively, the first and second electrodes may be,
and the relay terminal is not allowed to provide the service of the access network for the remote terminal in the second time period.
In this embodiment of the application, the determining module 501 is further configured to: the relay terminal acquires eighth information, wherein the eighth information represents a network congestion state;
and the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link according to the eighth information.
In an embodiment of the application, the eighth information includes one or more of:
uplink waiting for the amount of data to be sent to the serving base station;
waiting time for uplink data to be sent to the serving base station;
downlink waiting for the amount of data to be sent to the remote terminal;
and descending the waiting time for waiting the data sent to the remote end.
The access control device provided in the embodiment of the present application can implement each process implemented by the method embodiment shown in fig. 2, and achieve the same technical effect, and for avoiding repetition, details are not described here again.
Referring to fig. 6, an access control apparatus provided in an embodiment of the present application is applied to a remote terminal, where the apparatus 600 includes:
an obtaining module 601, configured to obtain information related to an access control behavior of a sidelink of a relay terminal;
a determining module 602, configured to determine, according to the access control behavior of the sidelink, to initiate an access request for accessing the network through the relay terminal or not initiate an access request for accessing the network through the relay terminal.
In an embodiment of the present application, the determining module 602 is further configured to: if the remote terminal receives third information which indicates that the relay terminal does not allow the remote terminal to access the network through the relay terminal, the remote terminal does not initiate an access request in a third time period;
alternatively, the first and second electrodes may be,
if the remote terminal receives fourth information, the fourth information indicates that the relay terminal rejects a first request, and the first request is used for the remote terminal to request to access the network through the relay terminal, an access request is not initiated through the relay terminal in a fourth time period;
alternatively, the first and second electrodes may be,
and if the remote terminal does not monitor the application code which is sent by the relay terminal and indicates the relay service capability, the remote terminal does not initiate an access request through the relay terminal.
In the embodiment of the present application, the apparatus 600 further includes: and the initiating module is used for the remote terminal to ignore the third information and initiate an access request of a specific service for accessing the network through the relay terminal in the third time period.
In an embodiment of the present application, the determining module 602 is further configured to: and if the remote end receives fifth information which indicates that the remote end is delayed to access the network through the relay terminal, after the delay time is over, an access request for accessing the network through the relay terminal is sent again.
The access control device provided in the embodiment of the present application can implement each process implemented by the method embodiment shown in fig. 3, and achieve the same technical effect, and for avoiding repetition, details are not described here again.
Fig. 7 is a schematic diagram of a hardware structure of a terminal for implementing the embodiment of the present application.
The terminal 700 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, and a processor 710.
Those skilled in the art will appreciate that the terminal 700 may further include a power supply (e.g., a battery) for supplying power to various components, which may be logically connected to the processor 710 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system. The terminal structure shown in fig. 7 does not constitute a limitation of the terminal, and the terminal may include more or less components than those shown, or combine some components, or have a different arrangement of components, and will not be described again here.
It should be understood that in the embodiment of the present application, the input Unit 704 may include a Graphics Processing Unit (GPU) 7041 and a microphone 7042, and the Graphics Processing Unit 7041 processes image data of still pictures or videos obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 706 may include a display panel 7061, and the display panel 7061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 707 includes a touch panel 7071 and other input devices 7072. The touch panel 7071 is also referred to as a touch screen. The touch panel 7071 may include two parts of a touch detection device and a touch controller. Other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
In the embodiment of the present application, the radio frequency unit 701 receives downlink data from a network side device and then processes the downlink data in the processor 710; in addition, the uplink data is sent to the network side equipment. In general, radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
The memory 709 may be used to store software programs or instructions as well as various data. The memory 709 may mainly include a storage program or instruction area and a storage data area, wherein the storage program or instruction area may store an operating system, an application program or instruction (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like. In addition, the Memory 709 may include a high-speed random access Memory and a nonvolatile Memory, where the nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
Processor 710 may include one or more processing units; alternatively, processor 710 may integrate an application processor that handles primarily the operating system, user interface, and application programs or instructions, etc. and a modem processor that handles primarily wireless communications, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into processor 710.
The terminal provided in the embodiment of the present application can implement each process implemented by the method embodiment shown in fig. 2 or fig. 3, and achieve the same technical effect, and is not described here again to avoid repetition.
Referring to fig. 8, an embodiment of the present application provides an access control apparatus, where the apparatus is applied to a network side device, and the apparatus 800 includes:
a sending module 801, configured to send sixth information to the relay terminal, where the sixth information is used to configure access control indication information of the sidelink and/or an access control behavior of the sidelink.
Optionally, the sixth information may indicate one of:
(1) before the relay terminal receives seventh information, not allowing the relay terminal to provide network access service for a remote terminal, wherein the seventh information indicates that the relay terminal is allowed to provide network access service for the remote terminal;
(2) and the relay terminal is not allowed to provide the service of the access network for the remote terminal in the second time period.
In an embodiment of the present application, the access control indication information may include one of:
(1) first information indicating that the relay terminal allows the remote terminal to access a network through the relay terminal;
(2) and second information, which indicates that the relay terminal does not allow the remote terminal to access the network through the relay terminal.
In an embodiment of the present application, the access control behavior of the sidelink may include one of:
(1) a first behavior representing that the relay terminal provides access network service for the remote terminal through the relay terminal;
(2) and a second behavior, which represents that the relay terminal does not access the network service for the remote terminal through the relay terminal.
Optionally, the second behavior may include one or more of the following in combination:
(1) the relay terminal sends third information, wherein the third information indicates that the remote terminal is not allowed to access the network through the relay terminal;
(2) the relay terminal does not respond to a first request, wherein the first request is used for the remote terminal to request to access the network through the relay terminal;
(3) the relay terminal sends fourth information, and the fourth information indicates that the relay terminal rejects the first request;
optionally, the fourth information may include: a reason why the relay terminal rejects the first request.
(4) The relay terminal stops broadcasting the application code indicating the relay service capability;
(5) and the relay terminal sends fifth information, wherein the fifth information represents that the remote terminal is delayed to access the network through the relay terminal.
Optionally, the fifth information may include: a first time period representing a length of time for which access of the remote terminal to a network through the relay terminal is delayed.
The access control device provided in the embodiment of the present application can implement each process implemented by the method embodiment shown in fig. 4, and achieve the same technical effect, and for avoiding repetition, details are not described here again.
The embodiment of the application also provides network side equipment. As shown in fig. 9, the network-side device 900 includes: antenna 901, radio frequency device 902, baseband device 903. The antenna 901 is connected to a radio frequency device 902. In the uplink direction, rf device 902 receives information via antenna 901 and sends the received information to baseband device 903 for processing. In the downlink direction, the baseband device 903 processes information to be transmitted and transmits the processed information to the radio frequency device 902, and the radio frequency device 902 processes the received information and transmits the processed information through the antenna 901.
The above-mentioned frequency band processing means may be located in the baseband apparatus 903, and the method performed by the network side device in the above embodiment may be implemented in the baseband apparatus 903, where the baseband apparatus 903 includes a processor 804 and a memory 905.
The baseband apparatus 803 may include, for example, at least one baseband board, on which a plurality of chips are disposed, as shown in fig. 9, where one of the chips, for example, the processor 904, is connected to the memory 905 to call up the program in the memory 905 to perform the network side device operation shown in the above method embodiment.
The baseband device 903 may further include a network interface 906 for exchanging information with the radio frequency device 902, for example, a Common Public Radio Interface (CPRI).
Specifically, the network side device of the embodiment of the present invention further includes: the instructions or programs stored in the memory 905 and capable of being executed on the processor 904, and the processor 904 calls the instructions or programs in the memory 905 to execute the method executed by each module shown in fig. 8, and achieve the same technical effect, which is not described herein for avoiding repetition.
Embodiments of the present application also provide a program product stored on a non-volatile storage medium for execution by at least one processor to implement the steps of a method of processing as described in fig. 2 or fig. 3 or fig. 4.
An embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the method embodiments shown in fig. 2, fig. 3, or fig. 4, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
Wherein, the processor is the processor in the terminal described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a network-side device program or an instruction, to implement each process of the method embodiment shown in fig. 2, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip or a system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (28)

1. An access control method, comprising:
the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link;
and the relay terminal performs access control on a remote terminal according to the access control indication information and/or the access control behavior of the side link.
2. The method of claim 1, wherein the access control indication information comprises:
first information indicating that the relay terminal allows the remote terminal to access a network through the relay terminal;
alternatively, the first and second electrodes may be,
and second information, which indicates that the relay terminal does not allow the remote terminal to access the network through the relay terminal.
3. The method of claim 1, wherein the access control behavior of the sidelink comprises:
a first behavior representing that the relay terminal provides access network service for the remote terminal through the relay terminal;
alternatively, the first and second electrodes may be,
and a second behavior, which represents that the relay terminal does not access the network service for the remote terminal through the relay terminal.
4. The method of claim 3, wherein the second behavior comprises one or more of the following in combination:
the relay terminal sends third information, wherein the third information indicates that the remote terminal is not allowed to access the network through the relay terminal;
the relay terminal does not respond to a first request, wherein the first request is used for the remote terminal to request to access the network through the relay terminal;
the relay terminal sends fourth information, and the fourth information indicates that the relay terminal rejects the first request;
the relay terminal stops broadcasting the application code indicating the relay service capability;
and the relay terminal sends fifth information, wherein the fifth information represents that the remote terminal is delayed to access the network through the relay terminal.
5. The method of claim 4, wherein the fourth information comprises: a reason why the relay terminal rejects the first request.
6. The method of claim 4, wherein the fifth information comprises: a first time period representing a length of time for which access of the remote terminal to a network through the relay terminal is delayed.
7. The method according to claim 1, 2 or 3, wherein the relay terminal determines the access control indication information of the sidelink and/or the access control behavior of the sidelink, and comprises:
the relay terminal receives a system message of a service cell;
and the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link according to the system message of the service cell.
8. The method according to claim 1, 2 or 3, wherein the relay terminal determines the access control indication information of the sidelink and/or the access control behavior of the sidelink, and comprises:
receiving sixth information;
and configuring the access control indication information of the side link and/or the access control behavior of the side link according to the sixth information.
9. The method of claim 8, wherein the sixth information indicates:
before the relay terminal receives seventh information, not allowing the relay terminal to provide network access service for a remote terminal, wherein the seventh information indicates that the relay terminal is allowed to provide network access service for the remote terminal;
alternatively, the first and second electrodes may be,
and the relay terminal is not allowed to provide the service of the access network for the remote terminal in the second time period.
10. The method according to claim 1, 2 or 3, wherein the relay terminal determines the access control indication information of the sidelink and/or the access control behavior of the sidelink, and comprises:
the relay terminal acquires eighth information, wherein the eighth information represents a network congestion state;
and the relay terminal determines the access control indication information of the side link and/or the access control behavior of the side link according to the eighth information.
11. The method of claim 10, wherein the eighth information comprises one or more of:
uplink waiting for the amount of data to be sent to the serving base station;
waiting time for uplink data to be sent to the serving base station;
downlink waiting for the amount of data to be sent to the remote terminal;
and descending the waiting time for waiting the data sent to the remote end.
12. An access control method, comprising:
the remote terminal acquires information related to the access control behavior of the sidelink of the relay terminal;
and the remote terminal determines to initiate the access request for accessing the network through the relay terminal or not to initiate the access request for accessing the network through the relay terminal according to the information.
13. The method of claim 12,
the remote terminal determines not to initiate an access request for accessing the network through the relay terminal according to the information, and the method comprises the following steps:
if the remote terminal receives third information, wherein the third information indicates that the relay terminal does not allow the remote terminal to access the network through the relay terminal, the remote terminal does not initiate an access request for accessing the network through the relay terminal in a third time period;
alternatively, the first and second electrodes may be,
if the remote terminal receives fourth information, the fourth information indicates that the relay terminal rejects the first request, and the first request is used for the remote terminal to request to access the network through the relay terminal, the remote terminal does not initiate an access request for accessing the network through the relay terminal in a fourth time period;
alternatively, the first and second electrodes may be,
and if the remote terminal does not monitor the application code which is sent by the relay terminal and indicates the relay service capability, the remote terminal does not initiate an access request for accessing the network through the relay terminal.
14. The method of claim 13, further comprising:
and in the third time period, the remote terminal ignores the third information and initiates an access request of a specific service to access the network through the relay terminal.
15. The method of claim 12, wherein the determining, by the remote terminal, to initiate the access request to the network through the relay terminal according to the information comprises:
and if the remote terminal receives fifth information which indicates that the remote terminal is delayed to access the network through the relay terminal, the remote terminal sends an access request for accessing the network through the relay terminal after the delay time is over.
16. An access control method, comprising:
and the network side equipment sends sixth information to the relay terminal, wherein the sixth information is used for configuring the access control indication information of the side link and/or the access control behavior of the side link.
17. The method of claim 16, wherein the sixth information indicates:
before the relay terminal receives seventh information, not allowing the relay terminal to provide network access service for a remote terminal, wherein the seventh information indicates that the relay terminal is allowed to provide network access service for the remote terminal;
alternatively, the first and second electrodes may be,
and the relay terminal is not allowed to provide the service of the access network for the remote terminal in the second time period.
18. The method of claim 16, wherein the access control indication information comprises:
first information indicating that the relay terminal allows a remote terminal to access a network through the relay terminal;
alternatively, the first and second electrodes may be,
and second information which indicates that the relay terminal does not allow the remote terminal to access the network through the relay terminal.
19. The method of claim 16, wherein the access control behavior of the sidelink comprises:
a first behavior representing that the relay terminal provides access network service for a remote terminal through the relay terminal;
alternatively, the first and second electrodes may be,
and the second behavior represents that the relay terminal does not access the network service for the remote terminal through the relay terminal.
20. The method of claim 19, wherein the second behavior comprises one or more of the following in combination:
the relay terminal sends third information, wherein the third information indicates that the remote terminal is not allowed to access the network through the relay terminal;
the relay terminal does not respond to a first request, wherein the first request is used for the remote terminal to request to access the network through the relay terminal;
the relay terminal sends fourth information, and the fourth information indicates that the relay terminal rejects the first request;
the relay terminal stops broadcasting the application code indicating the relay service capability;
and the relay terminal sends fifth information, wherein the fifth information represents that the remote terminal is delayed to access the network through the relay terminal.
21. The method of claim 20, wherein the fourth information comprises: a reason why the relay terminal rejects the first request.
22. The method of claim 20, wherein the fifth information comprises: a first time period representing a length of time for which access of the remote terminal to a network through the relay terminal is delayed.
23. An access control device applied to a relay terminal, comprising:
the determining module is used for determining the access control indication information of the side link and/or the access control behavior of the side link;
and the control module is used for carrying out access control on the remote terminal according to the access control indication information and/or the access control behavior of the side link.
24. An access control device applied to a remote terminal, comprising:
the acquisition module is used for acquiring information related to the access control behavior of the sidelink of the relay terminal;
and the determining module is used for determining whether to initiate the access request for accessing the network through the relay terminal or not according to the information.
25. A terminal, comprising: processor, memory and program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the method according to any one of claims 1 to 15.
26. An access control device applied to a network side device, comprising:
and the sending module is used for sending sixth information to the relay terminal, wherein the sixth information is used for configuring the access control indication information of the side link and/or the access control behavior of the side link.
27. A network-side device, comprising: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the method of any one of claims 16 to 22.
28. A readable storage medium, characterized in that it stores thereon a program or instructions which, when executed by a processor, implement the steps of the method according to any one of claims 1 to 22.
CN202010763625.9A 2020-07-31 2020-07-31 Access control method and device Pending CN114071647A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010763625.9A CN114071647A (en) 2020-07-31 2020-07-31 Access control method and device
PCT/CN2021/110010 WO2022022736A1 (en) 2020-07-31 2021-08-02 Access control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010763625.9A CN114071647A (en) 2020-07-31 2020-07-31 Access control method and device

Publications (1)

Publication Number Publication Date
CN114071647A true CN114071647A (en) 2022-02-18

Family

ID=80037642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010763625.9A Pending CN114071647A (en) 2020-07-31 2020-07-31 Access control method and device

Country Status (2)

Country Link
CN (1) CN114071647A (en)
WO (1) WO2022022736A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023185728A1 (en) * 2022-03-28 2023-10-05 维沃移动通信有限公司 Service processing method and apparatus, and terminal, network-side devices and readable storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB202204500D0 (en) * 2022-03-29 2022-05-11 Samsung Electronics Co Ltd 5G ProSe PC5 operations based on network procedures
WO2024016166A1 (en) * 2022-07-19 2024-01-25 Oppo广东移动通信有限公司 Wireless communication methods and communication devices

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307234A (en) * 2015-11-05 2016-02-03 东莞酷派软件技术有限公司 Access control method and access control device for remote terminals, terminals and base station
CN106162929A (en) * 2015-04-07 2016-11-23 中兴通讯股份有限公司 The communication means of user terminal and via node and device in equipment direct communication system
CN107690832A (en) * 2015-04-08 2018-02-13 交互数字专利控股公司 Realize the mobile relay for device-to-device (D2D) communication
US20180279195A1 (en) * 2017-03-21 2018-09-27 Lg Electronics Inc. Method for relay terminal to select remote terminal where access control is applied due to network congestion and relay terminal performing method
CN110235472A (en) * 2017-02-01 2019-09-13 华为技术有限公司 A kind of system and method for access barred

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018143763A1 (en) * 2017-02-06 2018-08-09 Lg Electronics Inc. Method for handling of a rrc connection request message of a remote ue by a relay ue in wireless communication system and a device therefor

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106162929A (en) * 2015-04-07 2016-11-23 中兴通讯股份有限公司 The communication means of user terminal and via node and device in equipment direct communication system
CN107690832A (en) * 2015-04-08 2018-02-13 交互数字专利控股公司 Realize the mobile relay for device-to-device (D2D) communication
CN105307234A (en) * 2015-11-05 2016-02-03 东莞酷派软件技术有限公司 Access control method and access control device for remote terminals, terminals and base station
CN110235472A (en) * 2017-02-01 2019-09-13 华为技术有限公司 A kind of system and method for access barred
US20180279195A1 (en) * 2017-03-21 2018-09-27 Lg Electronics Inc. Method for relay terminal to select remote terminal where access control is applied due to network congestion and relay terminal performing method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE: "R2-151169 "Considerations on the UE-to-Network Relays"", 《3GPP TSG_RAN\WG2_RL2》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023185728A1 (en) * 2022-03-28 2023-10-05 维沃移动通信有限公司 Service processing method and apparatus, and terminal, network-side devices and readable storage medium

Also Published As

Publication number Publication date
WO2022022736A1 (en) 2022-02-03

Similar Documents

Publication Publication Date Title
US11963132B2 (en) Paging method, base station and user equipment
EP3322220B1 (en) Method of selecting cell to be camped on and device utilizing same
TWI568305B (en) Systems, devices, and methods for long term evolution and wireless local area interworking
EP3108694B1 (en) Traffic steering between wlan and cellular networks
US11057824B2 (en) Access control method and device
WO2022022736A1 (en) Access control method and device
US20230164876A1 (en) Discontinuous Reception Processing Method and Apparatus, Terminal, and Network-Side Device
WO2022022636A1 (en) Initial access method and apparatus, terminal and network side device
US20230156750A1 (en) Sidelink resource selection method and terminal
US20230126936A1 (en) Measurement indication method, terminal, and network-side device
CN113890696A (en) Method and device for determining side link auxiliary information and electronic equipment
WO2022143657A1 (en) Network selection method and apparatus, and device and storage medium
US20230232268A1 (en) Measurement method, measurement apparatus, terminal, and network device
WO2022017466A1 (en) Message transmitting method and apparatus, message receiving method and apparatus, and communication device
US20230217529A1 (en) Methods and apparatus for inactive state initial uplink transmission using pre-configured grant at a user equipment in wireless communication
CN114640971A (en) Processing method and device for sidelink transmission, terminal and network equipment
CN114071654A (en) Access control method, terminal and network side equipment
CN113873547A (en) Resource allocation method and device
CN114342511A (en) Communication method and communication device
WO2023280068A1 (en) Sidelink resource recommendation method and apparatus, information receiving method and apparatus, and terminal
WO2024011468A1 (en) Link determination method and apparatus, and storage medium and chip
EP4216657A1 (en) Aggregation configuration method and apparatus, and terminal
WO2023274072A1 (en) Cell evaluation method and apparatus, terminal, relay, and storage medium
US20230217531A1 (en) Methods and apparatus for inactive state initial uplink transmission using pre-configured grant at a base station in wireless communication
WO2024120351A1 (en) Message transmission method and apparatus, ue, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination