CN114208292B - Access control method and device and storage medium - Google Patents

Access control method and device and storage medium Download PDF

Info

Publication number
CN114208292B
CN114208292B CN202080001391.2A CN202080001391A CN114208292B CN 114208292 B CN114208292 B CN 114208292B CN 202080001391 A CN202080001391 A CN 202080001391A CN 114208292 B CN114208292 B CN 114208292B
Authority
CN
China
Prior art keywords
service
service application
access
application scene
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202080001391.2A
Other languages
Chinese (zh)
Other versions
CN114208292A (en
Inventor
李艳华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Publication of CN114208292A publication Critical patent/CN114208292A/en
Application granted granted Critical
Publication of CN114208292B publication Critical patent/CN114208292B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Abstract

The embodiment of the disclosure provides an access control method and device, communication equipment and a storage medium. The access control method provided by the embodiment of the disclosure comprises the following steps: and issuing a first access control parameter according to a first service application scene, wherein the first access control parameter comprises a first access category of the first service application scene.

Description

Access control method and device and storage medium
Technical Field
The embodiment of the disclosure relates to the field of wireless communication, but is not limited to the field of wireless communication, in particular to an access control method, an access control device and a storage medium.
Background
In an LTE (Long Term Evolution ) communication system and an NR (New Radio) communication system of 5G, an AC (Access Control) limited working mechanism is: and acquiring corresponding AC (AC restriction) parameters according to the Access Class (Access Class) of the terminal and the call initiated by the terminal, and performing AC restriction judgment (AC restriction check).
However, different traffic types may have different resource requirements, such as radio resources, computing power resources, and storage resources, among others. The existing services of 3GPP (3 rd Generation Partnership Project, third generation partnership project) only consider the demand of radio resources, and may not be sufficient to meet the resource demands of services such as AI (Artificial Intelligence ) or ML (Machine Learning).
Disclosure of Invention
The disclosure provides an access control method, an access control device and a storage medium.
According to a first aspect of an embodiment of the present disclosure, there is provided an access control method, including:
and issuing a first access control parameter according to a first service application scene, wherein the first access control parameter comprises a first access category of the first service application scene.
In some embodiments, the method further comprises:
determining a first access identifier of the first business application scene in response to the existence of the first business application scene; wherein the first access control parameter further comprises: and the first access identifier corresponds to the first access category.
In some embodiments, the first business application scenario includes at least one of:
service application scenes taking AI service as call establishment reasons;
training a service application scene with the service as a call establishment cause at the terminal by using an AI model;
a service application scene taking an AI model in cloud training service as a call establishment cause;
and the AI model is used for training the service application scene of which the service is the call establishment cause together at the local and cloud sides.
In some embodiments, the first access control parameter further comprises: disabling parameters of the timer;
And the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
In some embodiments, the method further comprises:
and configuring a prohibition timer for the first service application scene according to the service type of the first service application scene.
In some embodiments, the configuring the prohibit timer for the first service application scenario according to the service type of the first service application scenario includes:
and in response to the service type of the first service application scene, configuring whether to stop the timing of the prohibit timer when detecting a release trigger event.
In some embodiments, the resource consumption attributes are different for different of the traffic types;
wherein the resource consumption attribute comprises at least one of:
an attribute indicating computing resource consumption;
an attribute indicating storage resource consumption;
an attribute indicating network resource consumption.
In some embodiments, the deactivation trigger event includes at least one of:
a called event;
emergency call event.
In some embodiments, the configuring, in response to the service type of the first service application scenario, whether to stop timing of the prohibit timer when the deactivation trigger event is detected includes:
In response to the service type of the first service application scenario being an AI-associated service type, configuring a timing of the prohibit timer to continue upon receipt of an RRC (Radio Resource Control ) connection setup message corresponding to the release trigger event;
and/or the number of the groups of groups,
and responding to the service type of the first service application scene as the service type associated with the AI, and configuring the timing of continuing the prohibition timer when receiving the RRC connection recovery message corresponding to the release trigger event.
In some embodiments, the configuring, in response to the service type of the first service application scenario, whether to stop timing of the prohibit timer when the deactivation trigger event is detected includes:
and responding to the service type of the first service application scene, and configuring whether to stop the timing of the prohibit timer when detecting the release trigger event through dedicated signaling or public signaling or communication protocol.
According to a second aspect of the embodiments of the present disclosure, there is provided an access control method, including:
and receiving a first access control parameter, wherein the first access control parameter is used for controlling access in a first service application scene, and the first access control parameter comprises a first access category of the first service application scene.
In some embodiments, the first access control parameter further comprises: and the first access identifier corresponding to the first access category in the first service application scene.
In some embodiments, the first access control parameter further comprises: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
In some embodiments, the method further comprises:
and starting the prohibit timer in response to the parameters of the prohibit timer.
In some embodiments, the method further comprises:
and determining the timing of stopping or continuing the prohibition timer when the release trigger time is detected according to the parameter.
In some embodiments, the deactivation trigger event includes at least one of:
a called event;
emergency call event.
In some embodiments, the determining, based on the parameter, a timing to stop or continue the prohibit timer when a release trigger time is detected comprises:
responding to the service type of the first service application scene as the service type associated with the AI, and continuing the timing of the prohibit timer according to the parameter when receiving the RRC connection setup message corresponding to the release trigger event;
And/or the number of the groups of groups,
and responding to the service type of the first service application scene as the service type associated with the AI, and continuing the timing of the prohibition timer according to the parameter when the RRC connection restoration message corresponding to the release trigger event is received.
In some embodiments, the method further comprises:
transmitting a notification message prohibiting Access to the first service application scenario at an AS (Access Stratum) to a NAS (Non Access Stratum, non-Access Stratum) in response to the first Access control parameter;
and stopping calling of the first service application scene according to the notification message at the NAS.
In some embodiments, the method further comprises:
transmitting the forbidden duration information of forbidden access to the first service application scene to the NAS at the AS; and the forbidden duration is used for re-initiating the call of the first service application scene at the NAS after the forbidden duration.
According to a third aspect of the embodiments of the present disclosure, there is provided an access control apparatus, including:
and the issuing module is configured to issue a first access control parameter according to a first service application scene, wherein the first access control parameter comprises a first access category of the first service application scene.
In some embodiments, the apparatus further comprises:
the first determining module is configured to determine a first access identifier of the first business application scene in response to the existence of the first business application scene; wherein the first access control parameter further comprises: and the first access identifier corresponds to the first access category.
In some embodiments, the first business application scenario includes at least one of:
service application scenes taking AI service as call establishment reasons;
training a service application scene with the service as a call establishment cause at the terminal by using an AI model;
a service application scene taking an AI model in cloud training service as a call establishment cause;
and the AI model is used for training the service application scene of which the service is the call establishment cause together at the local and cloud sides.
In some embodiments, the first access control parameter further comprises: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
In some embodiments, the apparatus further comprises:
the configuration module is configured to configure a prohibition timer for the first service application scene according to the service type of the first service application scene.
In some embodiments, the configuration module is configured to:
and in response to the service type of the first service application scene, configuring whether to stop the timing of the prohibit timer when detecting a release trigger event.
In some embodiments, the resource consumption attributes are different for different of the traffic types;
wherein the resource consumption attribute comprises at least one of:
an attribute indicating computing resource consumption;
an attribute indicating storage resource consumption;
an attribute indicating network resource consumption.
In some embodiments, the deactivation trigger event includes at least one of:
a called event;
emergency call event.
In some embodiments, the configuration module comprises:
a first configuration submodule, configured to respond to the service type of the first service application scene as the service type associated with the AI, and configured to continue the timing of the prohibit timer when receiving the RRC connection setup message corresponding to the release trigger event;
and/or the number of the groups of groups,
and the second configuration submodule is configured to respond to the service type of the first service application scene as the service type associated with the AI, and to configure the timing of the prohibit timer to be continued when the RRC connection recovery message corresponding to the release trigger event is received.
In some embodiments, the configuration module is configured to:
and responding to the service type of the first service application scene, and configuring whether to stop the timing of the prohibit timer when detecting the release trigger event through dedicated signaling or public signaling or communication protocol.
According to a fourth aspect of embodiments of the present disclosure, there is provided an access control apparatus, including:
and the receiving module is configured to receive a first access control parameter, wherein the first access control parameter is used for controlling access in a first service application scene, and the first access control parameter comprises a first access category of the first service application scene.
In some embodiments, the first access control parameter further comprises: and the first access identifier corresponding to the first access category in the first service application scene.
In some embodiments, the first access control parameter further comprises: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
In some embodiments, the apparatus further comprises:
and the starting module is configured to respond to the parameter of the prohibition timer and start the prohibition timer.
In some embodiments, the apparatus further comprises:
and a second determining module configured to determine to stop or continue timing of the prohibit timer when a release trigger event is detected.
In some embodiments, the deactivation trigger event includes at least one of:
a called event;
emergency call event.
In some embodiments, the second determining module includes:
the first timing submodule is configured to respond to the service type of the first service application scene as the service type associated with the AI, and when the RRC connection establishment message corresponding to the release trigger event is received, the timing of the prohibition timer is continued according to the configuration information;
and/or the number of the groups of groups,
and the second timing submodule is configured to respond to the service type of the first service application scene as the service type associated with the AI, and when the RRC connection recovery message corresponding to the release trigger event is received, the timing of the prohibition timer is continued according to the configuration information.
In some embodiments, the apparatus further comprises:
the transmission module is configured to respond to the first access control parameter and transmit a notification message for prohibiting access to the first service application scene to a non-access stratum (NAS) at an Access Stratum (AS);
And the stopping module is configured to stop the call of the first service application scene according to the notification message at the NAS.
In some embodiments, the apparatus further comprises:
the initiating module is configured to transmit the forbidden duration information of forbidden access to the first service application scene to the NAS at the AS; and the forbidden duration is used for re-initiating the call of the first service application scene at the NAS after the forbidden duration.
According to a fifth aspect of embodiments of the present disclosure, there is provided a communication device including at least: a processor and a memory for storing executable instructions capable of executing on the processor, wherein:
the processor is configured to execute the executable instructions that, when executed, perform the steps of any of the access control methods described above.
According to a sixth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium having stored therein computer-executable instructions that, when executed by a processor, implement the steps in any of the access control methods described above.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the embodiment of the disclosure provides an implementation manner of access control, which specifically issues corresponding first access control parameters according to a first service application scene, so as to facilitate the implementation of access control of the first service application scene. In this way, compared with the related art, a unified access control method is used for all service application scenarios, and the technical scheme of the embodiment of the disclosure can be distinguished from the access control methods of other service application scenarios according to the specific requirements of the first service application scenario, so that the requirements of the first service application scenario on resources such as bandwidth or processing capacity can be conveniently met.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the embodiments of the invention.
Fig. 1 is a schematic diagram of a wireless communication system according to an exemplary embodiment;
fig. 2 is a flow diagram illustrating a method of access control according to an exemplary embodiment;
fig. 3 is a flow chart diagram ii of an access control method according to an exemplary embodiment;
fig. 4 is a flow diagram three illustrating an access control method according to an exemplary embodiment;
fig. 5 is a flow diagram fourth illustrating an access control method according to an exemplary embodiment;
fig. 6 is a flow diagram five illustrating an access control method according to an example embodiment;
fig. 7 is a schematic diagram of an access control device according to an exemplary embodiment;
fig. 8 is a schematic diagram ii of an access control device according to an exemplary embodiment;
fig. 9 is a schematic diagram of a communication device shown in accordance with an exemplary embodiment;
fig. 10 is a schematic diagram of a communication device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with the embodiments of the present disclosure. Rather, they are merely examples of apparatus and methods consistent with aspects of embodiments of the present disclosure as detailed in the accompanying claims.
The terminology used in the embodiments of the disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the embodiments of the disclosure. As used in this disclosure of embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in embodiments of the present disclosure to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of embodiments of the present disclosure. The words "if" and "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination", depending on the context.
To better describe any embodiment of the present disclosure, an embodiment of the present disclosure is exemplified by an application scenario of access control.
Referring to fig. 1, a schematic structural diagram of a wireless communication system according to an embodiment of the disclosure is shown. As shown in fig. 1, the wireless communication system is a communication system based on a cellular mobile communication technology, and may include: a number of terminals 110 and a number of base stations 120.
Where terminal 110 may be a device that provides voice and/or data connectivity to a user. Terminal 110 may communicate with one or more core networks via a radio access network (Radio Access Network, RAN), and terminal 110 may be an internet of things terminal such as a sensor device, a mobile phone (or "cellular" phone), and a computer with an internet of things terminal, for example, a fixed, portable, pocket, hand-held, computer-built-in, or vehicle-mounted device. Such as a Station (STA), subscriber unit (subscriber unit), subscriber Station (subscriber Station), mobile Station (mobile), remote Station (remote Station), access point, remote terminal (remote terminal), access terminal (access terminal), user device (user terminal), user agent (user agent), user equipment (user device), or user terminal (user equipment). Alternatively, terminal 110 may be an unmanned aerial vehicle device. Alternatively, the terminal 110 may be a vehicle-mounted device, for example, a car computer with a wireless communication function, or a wireless terminal externally connected to the car computer. Alternatively, the terminal 110 may be a roadside device, for example, a street lamp, a signal lamp, or other roadside devices having a wireless communication function.
The base station 120 may be a network-side device in a wireless communication system. Wherein the wireless communication system may be a fourth generation mobile communication technology (the 4th generation mobile communication,4G) system, also known as a long term evolution (Long Term Evolution, LTE) system; alternatively, the wireless communication system may be a 5G system, also known as a New Radio (NR) system or a 5G NR system. Alternatively, the wireless communication system may be a next generation system of the 5G system. Among them, the access network in the 5G system may be called NG-RAN (New Generation-Radio Access Network, new Generation radio access network).
The base station 120 may be an evolved node b (eNB) used in a 4G system, or a base station (gNB) using a centralized and distributed architecture in a 5G system, or any type of base station of a next generation mobile communication network technology. When the base station 120 adopts a centralized and distributed architecture, it generally includes a Centralized Unit (CU) and at least two Distributed Units (DUs). A protocol stack of a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, a radio link layer control protocol (Radio Link Control, RLC) layer, and a medium access control (Media Access Control, MAC) layer is provided in the centralized unit; a Physical (PHY) layer protocol stack is provided in the distribution unit, and the specific implementation of the base station 120 is not limited in the embodiments of the present disclosure.
A wireless connection may be established between base station 120 and terminal 110 over a wireless air interface. In various embodiments, the wireless air interface is a fourth generation mobile communication network technology (4G) standard-based wireless air interface; or, the wireless air interface is a wireless air interface based on a fifth generation mobile communication network technology (5G) standard, for example, the wireless air interface is a new air interface; alternatively, the wireless air interface may be a wireless air interface based on a 5G-based technology standard of a next generation mobile communication network.
In some embodiments, an E2E (End to End) connection may also be established between terminals 110. Such as V2V (vehicle to vehicle, vehicle-to-vehicle) communications, V2I (vehicle to Infrastructure, vehicle-to-road side equipment) communications, and V2P (vehicle to pedestrian, vehicle-to-person) communications among internet of vehicles communications (vehicle to everything, V2X).
In some embodiments, the wireless communication system described above may also include a network management device 130.
Several base stations 120 are respectively connected to a network management device 130. The network management device 130 may be a core network device in a wireless communication system, for example, the network management device 130 may be a mobility management entity (Mobility Management Entity, MME) in an evolved packet core network (Evolved Packet Core, EPC). Alternatively, the network management device may be other core network devices, such as a Serving GateWay (SGW), a public data network GateWay (Public Data Network GateWay, PGW), a policy and charging rules function (Policy and Charging Rules Function, PCRF) or a home subscriber server (Home Subscriber Server, HSS), etc. The embodiment of the present disclosure is not limited to the implementation form of the network management device 130.
Based on the conclusion of the 5G system NR access control, the structure of access control parameters (AC barren parameters) for the access control is determined for each PLMN (Public Land Mobile Network ), access categories and access identities. An example of access control parameters is given in table 1 below, where the maximum number of PLMNs is 6, the maximum number of access categories is 64, and the maximum number of access identities is 16.
TABLE 1
In table 1 above, access categories is an access class, which includes the following according to the 3gpp ts24 301 specification: "originating signalling (source signaling)", "emergency calls)", "originating MMTEL (multimedia telephony)", "originating MMTEL video (source multimedia video telephony)", "originating SMSoIP (Short Message Service over Internet Protocol, internet protocol based short message transmission)", "origin SMS", "terminating calls (terminal call)", "originating calls (source call)", and "mobile originating CS fallback (mobile source circuit domain fallback)".
In table 1 above, access identities is the access identifier. It is understood that the attributes or classes of UEs (User Equipment) such as 0 to 9 are low priority users, e.g. personal users, 11 to 15 are high priority users, e.g. users related to public safety and emergency services or PLMN management.
The definition of access control parameters in the table may include the following ways: for low priority users, it can be defined according to random numbers and barren effective duration; for high priority users, bitmap (bitmap) forms may be employed. Wherein the low priority users include commercial users and the high priority users.
Therefore, the basic process of the access control detection (AC barreng check) is to obtain the AC barreng parameter according to the access category and the access identifier, and perform the access control detection. The access control parameters are typically random numbers for low priority users (0-9) and in bitmap form for high priority users (11-15). Typically this parameter will be defined in the system message and for the random number approach, if limited, a timer will need to be started, the time of which will be calculated by the AC limit time (AC-barrettime). For example, the limit duration is 512 seconds.
In the disclosed embodiments, AI and/or ML based mobile applications are computationally intensive, memory consuming and power consuming trends. Meanwhile, terminal devices often have stringent energy consumption, computational and memory cost constraints. Therefore, AI/ML needs to be separated on the device and network. I.e., compute-intensive, energy-intensive portions are offloaded to network endpoints, while privacy-sensitive and delay-sensitive portions are left on the end devices. The device executes the operation or model to a particular component or layer and sends intermediate data to the network endpoint. The network endpoint performs the rest of the process and feeds the reasoning results back to the device. The key to splitting AI and ML operations is to select the best splitting mode and splitting point to ensure that the required resources are below the upper limit of the resources available on the mobile device, and to optimize the computing, storage or memory, power consumption, and communication resources at the device and network sides. The resource requirements for the upstream and downstream are very different for the different splitting modes. For example, the training mode local to AI and/or ML operation requires a large amount of downstream bandwidth because of the downloading of AI and ML models, but is relatively small for upstream bandwidth; while for the training mode of AI and/or ML operation in the cloud, a large amount of uplink bandwidth is required because of the uploading of training data, only the result of reasoning after training is returned for the downlink, and the bandwidth for the downlink is smaller. For the user with the local training and the cloud training simultaneously, the uplink and the downlink are both required to have a large bandwidth. Thus when a user initiates an application of model training, the AC is too rough in terms of the AS layer flow according to the existing flow, because its access categories are "source call (originating calls)", and furthermore, the access identities are the same since they are initiated by the same terminal. That is, the granularity of distinction between access class and access identity is not fine enough, but in fact the resources that need to be consumed for different access classes are quite different, and the load imposed on the network is quite different, so that a finer granularity is required for processing. In addition, resources required for mobile applications of AI and ML include not only wireless resources but also resources such as computing power. Whereas the existing services of 3GPP only consider the requirements of radio resources, special handling is required in terms of access control for AI and ML mobility.
As shown in fig. 2, an embodiment of the present disclosure provides an access control method, including:
step S101, according to a first service application scene, a first access control parameter is issued, wherein the first access control parameter comprises a first access category of the first service application scene.
In the embodiment of the disclosure, the access control method can be applied to network equipment such as a base station, core network equipment and the like. Taking a base station as an example, the base station can configure different access control parameters for different service application scenarios, so that when the UE requests to access a corresponding service, it is convenient to determine whether to prohibit or allow the access of the service according to the corresponding access control parameters.
In all embodiments of the present disclosure, the first access control parameter may be an identifier for indicating the first access category of the first service application scenario, or may be the first access category for implying the first service application scenario. The first access category implying a first service application scenario means that the first access control parameter may be a length parameter of a signaling, so that the UE determines the first access control parameter according to the length of the signaling; and the first access control parameter can be coded sequence, so that the UE determines the first access control parameter according to the sequence. These are, of course, merely examples and are not intended to limit the scope of the disclosed embodiments. The first access control parameter may be explicit one or more bits to indicate the first access category of the first service application scenario, or may be some information determined according to a communication protocol or indicated by the base station for identifying the first access category of the first service application scenario.
In the embodiment of the disclosure, the first service application scenario may be distinguished by the first access category, and may be identified by a new access category different from the access category in the related art. Unlike an access request for a call or data communication of a UE, the first service application scenario may be a service application scenario having a resource requirement of a larger radio resource or network computing processing capability. Such as the related business scenarios of AI and ML described above. By issuing the first access control parameters corresponding to the first service application scene to the UE, the independent control of the access request of the first service application scene can be realized, so that the UE can access the related service of the first service application scene under the condition of network resource permission.
The access category is a category for establishing communication connection between the UE and the base station, and indicates different reasons for the UE to establish RRC connection. The base station can perform corresponding access control according to different access categories, provide different access authorities, and prohibit access timing rules, etc. For example, the reason for the UE to establish the RRC connection is an emergency call, and the access category is "emergency calls", i.e., an emergency call category. As another example, the UE may be used as a caller-originated RRC connection request, i.e., a UE-originated call request, and the access category may be "originating calls", i.e., an originating call.
Typical emergency calls include, but are not limited to: a distress call, an alarm call, a fire call, or a medical call.
In the embodiment of the disclosure, for a first service application scenario, a corresponding access category different from other service application scenarios may be determined. For example, if the first service application scenario is an AI and/or ML service scenario with a high demand for network bandwidth resources, operation resources and storage resources, the AI service class may be correspondingly determined as the access class corresponding to the first service application scenario. Here, the AI service class may be a specific access class different from the above-described "source signaling", "emergency call", "source multimedia voice call", "source multimedia video call", "short message transmission based on internet protocol", "source short message", "terminal call", "source call", and "mobile source circuit domain fallback", etc., which have been defined in the related art, and is a specific access class for defining the first service application scenario.
In the embodiment of the disclosure, the first service application scenario related to AI and/or ML is distinguished from the access category of "source call" corresponding to other calls originated by UE in the related art, so as to facilitate access control with the calls of other service applications respectively.
It may be appreciated that, for service types other than the first service application scenario defined in the embodiments of the present disclosure, such as other service application scenarios initiated by the UE, a second service application scenario may be included. And, the second access control parameter corresponding to the second service application scenario may be the same as or different from the first access control parameter.
Different access control parameters are distributed to different service scenes, so that the problem that the access control effect is poor due to the adoption of the uniform access control parameters is solved, and the different access control parameters are respectively issued, so that the access control of two service scenes is more flexible.
Thus, when the UE initiates an access request of the first service application scene to the base station, the first access control parameter for access control is determined according to the corresponding first service class, so that targeted access control is performed.
In some embodiments, as shown in fig. 3, the method further comprises:
step S102, determining a first access identifier of the first business application scene in response to the existence of the first business application scene; wherein the first access control parameter further comprises: and the first access identifier corresponds to the first access category.
The access identifier is an identifier indicating a user level or a user type corresponding to the UE and can be set corresponding to the SIM card. For example, the access identity of an individual user may be any one of 0 to 9.
In the embodiment of the present disclosure, the first access identifier may be set independently of an access identifier corresponding to a SIM card in the UE, for example, when the UE uses other service application scenarios, such as a call scenario or a web page data transmission scenario, the access identifier corresponding to the UE is an access identifier of a low priority user set corresponding to the SIM card, for example, 0-9. The first access identifier corresponding to the first service application scenario may be different from the access identifier of the low-priority user and different from the access identifier of the high-priority user. For example, the access identities of the low priority users are 0-9, the access identities of the high priority users are 11-15, and the access identities corresponding to the first service application scenario may be 16, etc.
Of course, in practical application, if there is an unused reserved access identifier in the access identifiers 0-9 of the low priority user, the first access identifier corresponding to the first service application scenario may also be defined as the reserved access identifier. For example, in practical application, the access identifier of the low priority user includes 0-8,9 as the reserved access identifier, and the first access identifier of the first service application scenario is defined as the reserved access identifier 9.
Therefore, the access identification can be distinguished in a finer manner at the level of the service application scene, so that the access control parameters can be configured correspondingly.
In some embodiments, the first business application scenario includes at least one of:
service application scenes taking AI service as call establishment reasons;
the AI model is used for locally training the service in the UE to serve as a service application scene of the call establishment cause;
a service application scene taking an AI model in cloud training service as a call establishment cause;
and the AI model is used for training the service application scene of which the service is the call establishment cause together at the local and cloud sides.
The service application scenario taking the AI service as the call establishment cause refers to related services using cloud and/or local data and models; the service application scenario using the AI model to train the service locally in the UE as the call establishment cause, the service application scenario using the AI model to train the service in the cloud as the call establishment cause, and the service application scenario using the AI model to train the service together in the local and cloud as the call establishment cause are: and (5) establishing a model and training related services of the process.
For example, AI services may include: the UE requests a service request for target identification or target tracking from the cloud based on the acquired image, such as a monitoring image, and the like, and needs to use a database and/or an AI model established in the cloud, so that the acquired image can be used as input data, and quick identification can be realized by using the cloud database and/or the AI model. The training traffic of the AI model may include: the UE transmits the collected data to the cloud to enable the cloud to train using the data as training data to determine and/or refine the AI model. For example, the neural network parameters of the AI model, etc. can be adjusted based on these data as a training model to obtain the AI model for use by the AI service.
Considering the specificity of AI business: AI business application scenarios require extensive data processing locally and/or in the cloud, such as: the local application uses a cloud model to process data, downloads data, uses the local model to process data, and the like; training of AI models, for example: local and/or cloud model training also requires a large amount of data uploading and downloading, and data operation processing. Therefore, AI-related services have high demands on wireless resources, computing processing power, storage power, and the like of the network. Here, a service application scenario in which the above-mentioned AI-related service (including application of the AI service and training of the AI model) is used as a call establishment cause is defined as the above-mentioned first service application scenario, so that the specific access control is conveniently performed on the related application of the AI service, and the AI service is conveniently accessed under the condition that the network state is suitable.
It will be appreciated that the above-described AI-related services include, but are not limited to, any of the following: model training, ML, model adjustment, model application.
In addition, the local training service and the cloud training service of the AI model can be further subdivided into corresponding different access control parameters. In some embodiments, the AI model requires a large amount of downlink bandwidth for UE local training traffic, and the processing operation of the data requires a high local capability, so that the access control parameters for prohibiting access when the downlink congestion or the UE processing capability is below a threshold can be configured. In some embodiments, in a traffic scenario of cloud training, the AI model needs a large amount of uplink bandwidth and requires a higher operation processing capability of the cloud, so that access control parameters of access prohibition can be configured when the cloud network is busy or uplink congestion or the cloud processing capability is lower than a threshold.
Thus, it can be determined whether the call initiated by the UE belongs to the first service application scenario according to the call establishment cause, and the corresponding first access control parameter is configured according to the first access category and the first access identifier.
In some embodiments, the first access control parameter includes: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
In all embodiments of the disclosure, the parameters of the prohibit timer and the first access category of the first service application scenario may be sent to the UE by the same signaling or different signaling.
And when the access control result corresponding to the first access control parameter is forbidden access, a forbidden timer can be configured for the service of the first service application scene. Parameters of the prohibit timer include, but are not limited to, any of the following: and prohibiting the condition that the timer is interrupted for the time length of the accessed call of the first service application scene. In some embodiments, the parameters of the prohibit timer may be: whether to interrupt the prohibit timer based on an emergency call event or an incoming call event, etc.
In the embodiment of the disclosure, with the access initiated by the service of the first service application scenario as the access request actively initiated by the UE, in response to the access request initiated by the UE as the initiator for the first time being inhibited, the UE may not re-initiate the access request as the initiator in the timing process of the inhibit timer. Of course, if the UE side is the called side, it may be determined whether to stop the timing of the prohibit timer according to a predetermined configuration.
The base station sends the parameter of the prohibit timer to the UE through the first access control parameter, so that the UE can determine the duration of the prohibit timer according to the parameter, and delay the initiation of the access request. Or when the UE needs to initiate the access request of the first service application scene, the UE can initiate the access request to the base station according to the determined interval duration of the parameters until the UE is successfully accessed. In this way, the UE does not initiate the access request in the process of prohibiting the timer, thereby reducing unnecessary repeated initiated access requests and improving the probability of successful access when the access request is initiated again.
It will be appreciated that the timing of the prohibit timer described above may be started if the UE is prohibited when the access request is first initiated. In this way, the UE does not initiate the access request again during the timing of the prohibit timer. Or, the UE starts the prohibit timer at any appropriate point in time; and the UE does not initiate an access request when the prohibit timer has not expired.
In some embodiments of the present disclosure, the method further comprises:
step S103, configuring a prohibition timer for the first service application scene according to the service type of the first service application scene.
Illustratively, as shown in FIG. 4, this step 103 may be implemented in conjunction with the foregoing steps 101, 102, or may be implemented separately, as the embodiments of the present disclosure are not limited in this respect; meanwhile, if the step 103 is implemented in combination with the aforementioned steps 101, 102, the execution order of the three steps is not limited to the execution order of the steps 101 to 103, but may be any possible execution order.
In the embodiment of the disclosure, when receiving an access request of a first service application scenario initiated by a UE, a base station may configure a corresponding prohibit timer according to a service type of the first service application scenario, and issue configured parameters to the UE. The prohibit timer configuration parameter for the first service application scenario may also be directly issued to the UE without receiving the UE-initiated access request.
In this way, the base station configures a specific prohibit timer for the service type different from other service application scenarios, so that the UE can operate the prohibit timer according to the requirement of the first service application scenario.
The other business application scenario may be a second business application scenario.
In some embodiments, the configuring the prohibit timer for the first service application scenario according to the service type of the first service application scenario includes:
and in response to the service type of the first service application scene, configuring whether to stop the timing of the prohibit timer when detecting a release trigger event.
The parameters of the prohibit timer may include a deactivation trigger event and/or a deactivation trigger event for the duration of the prohibit timer. The release trigger event is an event for triggering the UE to release the forbidden access, and according to the timing of whether the release trigger event is configured to stop the forbidden timer, the UE can determine whether the access request can be initiated when the release trigger event occurs. For example, if the above release trigger event is detected during the timer-prohibiting process, the timer-prohibiting process may be stopped so that the UE may initiate the access request; that is, the deactivation trigger event can directly initiate an access request regardless of whether the prohibit timer is still running.
The de-triggering event may include an emergency call event, an incoming call event, and so forth. However, since the first service application scenario may have a high requirement for network resources, computing resources and storage resources, when the prohibit timer is suspended due to the release trigger event, the UE reinitiates the access request, the UE may be prohibited again due to the deficiency of the network resources, or the requirement of the first service application scenario cannot be met after the access.
Therefore, in the embodiment of the present disclosure, according to the service type of the first service application scenario, the configuration may not stop timing when the release trigger event is detected, so that the access request of the first service application scenario continues to be delayed until the timing ends. Of course, for other service application scenarios (such as a second service application scenario different from the first service application scenario), the timing may be stopped when the release trigger event is detected, and the UE may initiate the access request again, that is, for the second service application scenario, the timing of the prohibit timer corresponding to the access request of the second service application scenario may be configured by the release trigger event.
In this way, for the access request of the first service application scenario, the timing of the prohibit timer is not stopped due to an emergency call, or an incoming call event, etc., so that in the process of prohibiting the timing of the timer, the timing is not interrupted and the access request is further initiated under the condition of unnecessary or non-conforming to the application requirement.
In some embodiments, the deactivation trigger event includes at least one of:
a called event;
emergency call event.
In the above embodiment, the called event is a communication connection request received by the UE, and because the called event is passively received, the called event can be used as a release trigger event, so that the communication connection can be successfully established with the UE when the opposite terminal initiates the connection request. The emergency call event is convenient for the UE itself to initiate the call in time, and the timeliness of the emergency call event is improved.
In some embodiments of the present disclosure, the called event is a connection request generated when the UE is called by other UEs or network devices, and the emergency call event is an access request of an emergency call or alarm phone based on a specific number, and the access request of the emergency call event is not limited to a vendor type and a telephone charge or a margin limit of the UE itself. In some embodiments of the present disclosure, the called event or the emergency call event may cause the timing of the prohibit timer corresponding to the various service requests to stop, so that the UE can re-initiate the call request of each service. Since a user may need to be able to quickly issue an access request for a communication service or the like upon detection of an emergency call event, the emergency call event may act as a de-triggering event. For example: during the period when the call request is prohibited, if an emergency call event is detected, the user may need to speak with a parent in an urgent manner, and thus, the prohibit timer corresponding to the call request may be released so that the UE re-initiates the call request.
For the first service application scenario in the embodiment of the present disclosure, since the service type may have a higher demand for network communication resources, computing resources and storage resources, the service is not required to quickly establish a connection when an emergency call event or a called event is detected. Therefore, in order to improve the probability of successful access after the first service application scenario sends the access request and reduce the probability of being forbidden after the UE sends the access request, the timer timing may be continuously forbidden according to the configuration even if the release trigger event is detected for the first service application scenario.
In some embodiments, the resource consumption attributes are different for different of the traffic types;
wherein the resource consumption attribute comprises at least one of:
an attribute indicating computing resource consumption;
an attribute indicating storage resource consumption;
an attribute indicating network resource consumption.
The resource consumption attribute is the requirement and consumption of different service types for network resources after accessing the network. The attribute of the computing resource consumption comprises the requirements of business on the capacity of cloud data processing, processing speed, calculated data quantity and the like; the attribute of the storage resource consumption comprises the requirement of the storage amount of cloud data required to be used by the service; attributes of network resource consumption include the traffic demand for network bandwidth, transmission rate, network stability, etc.
Due to different resource consumption attributes, the requirements on the access network are different, and different requirements cannot be met by adopting the same access control parameters, so that partial service with large resource consumption cannot be normally used after being accessed. For example, for the local training service of the AI model, a large amount of data needs to be downloaded, so that there is a high demand for network resource consumption such as downlink bandwidth; for the cloud training service of the AI model, a large amount of data is required to be uploaded, and meanwhile, the cloud is required to have higher operation processing capacity so as to realize model training, so that the cloud has higher requirements on network resource consumption such as uplink bandwidth and the like, and meanwhile, has higher requirements on computing resource consumption of a network end; for the application scene of the AI service, the data can be processed through the cloud storage model, so that the requirements on the computing resource consumption attribute and the storage resource consumption attribute of the network side are higher.
Therefore, the service type of the first service application scenario may be distinguished from the service types of other service application scenarios according to the resource consumption attribute.
Therefore, different service types are distinguished according to different resource consumption attributes, and further different access control parameters are defined for different service application scenes, so that access control meeting network requirements of respective scenes is conveniently realized for different scenes. The reduction of user experience caused by insufficient network resources due to service access is reduced.
In some embodiments, the configuring, in response to the service type of the first service application scenario, whether to stop timing of the prohibit timer when the deactivation trigger event is detected includes:
responding to the service type of the first service application scene as the service type associated with the AI, and configuring the timing of continuing the prohibit timer when receiving the RRC connection setup message corresponding to the release trigger event;
and/or the number of the groups of groups,
and responding to the service type of the first service application scene as the service type associated with the AI, and configuring the timing of continuing the prohibition timer when receiving the RRC connection recovery message corresponding to the release trigger event.
In the embodiment of the present disclosure, when the first service application scenario is an AI-associated service type, the first service application scenario may be considered to have a higher requirement for network capability, so that in the process of prohibiting the timer timing, the timer does not need to be stopped due to the release of the trigger event. Therefore, repeated access failure of the first service application scene can be reduced, and the situation that the service cannot be normally used due to mismatching of network resources after the access is performed due to the fact that the timer is forbidden to be timed out can be reduced. The UE can be accessed again when the network resources meet the requirements as far as possible.
Therefore, the base station can configure the timing of the continuous timer for the first service application scenario when the RRC connection establishment message and the RRC connection restoration message corresponding to the release trigger event are received, so that the UE does not initiate the access request again.
In some embodiments, the configuring, in response to the service type of the first service application scenario, whether to stop timing of the prohibit timer when the deactivation trigger event is detected includes:
in response to the traffic type of the first traffic application scenario, stopping the timing of the prohibit timer upon detection of a de-trigger event by dedicated signaling or common signaling or communication protocol configuration,
Or (b)
And responding to the service type of the first service application scene, and continuing the timing of the prohibition timer when the release trigger event is detected through dedicated signaling or public signaling or communication protocol configuration.
In the embodiment of the present disclosure, for the above configuration of whether to stop the timing of the prohibit timer when the release trigger event is detected, common signaling may be used to issue to the UE, or dedicated signaling dedicated to configuring the prohibit timer may be added to issue to the UE.
Common signaling is system messaging. In the embodiment of the disclosure, the base station may transmit the relevant information for configuring the prohibit timer, including the configuration information whether to stop the timing of the prohibit timer when the release trigger event is detected, as a channel of the communication signaling loaded on the common signaling. In addition, the configuration information for configuring whether the release trigger event is used to stop the timing of the prohibit timer may be transmitted as dedicated signaling different from the common signaling, and may be dedicated to configuring the prohibit timer corresponding to the first service application scenario.
As shown in fig. 5, there is provided an access control method, including:
step S201, a first access control parameter is received, where the first access control parameter is used for controlling access in a first service application scenario, and the first access control parameter includes a first access category of the first service application scenario.
In all embodiments of the present disclosure, the first access control parameter may be an identifier for indicating the first access category of the first service application scenario, or may be the first access category for implying the first service application scenario. The first access category implying a first service application scenario means that the first access control parameter may be a length parameter of a signaling, so that the UE determines the first access control parameter according to the length of the signaling; and the first access control parameter can be determined by the UE according to the code sequence. These are, of course, merely examples and are not intended to limit the scope of the disclosed embodiments. The first access control parameter may be explicit one or more bits to indicate the first access category of the first service application scenario, or may be some information determined according to a communication protocol or indicated by the base station for identifying the first access category of the first service application scenario.
In the embodiment of the present disclosure, the access control method may be applied to a terminal, a UE, and the like. After the base station configures the first access control parameter for the first service application scenario and issues the first access control parameter to the UE, the UE receives the first access control parameter, so as to determine whether to initiate an access request of the first service application scenario, or may determine an access opportunity for initiating the first service application scenario according to the first access control parameter, and so on.
Because the first access control parameter corresponds to the access control parameter of the first service application scene, the first access control parameter does not influence the access control of other services of the UE. Therefore, the method and the system can determine when to initiate the access request according to the characteristics of the access category corresponding to the first service application scene and whether the network meets the requirements of the first service application scene.
In some embodiments, the first access control parameter further comprises: and the first access identifier corresponding to the first access category in the first service application scene.
Here, the first access control parameter may further include a first access identifier corresponding to the first service application scenario. The UE may determine, according to the first access category and the first access control parameter corresponding to the first access identifier, whether to initiate an access request or whether to be prohibited from accessing after initiating the access request.
In some embodiments, the first access control parameter includes: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
In all embodiments of the present disclosure, the first access control parameter may include a parameter of a first access class and/or a prohibit timer of the first service application scenario.
In all embodiments of the disclosure, the parameters of the prohibit timer and the first access category of the first service application scenario may be sent to the UE by the same signaling or different signaling.
Here, the parameter of the prohibit timer may include a delay period for restarting the access request after the first service application scenario is prohibited from accessing, and may further include a provision for permitting the restarting of the access request when whether to stop the timing at the time of detecting an emergency call, an incoming event, or the like.
The UE may further determine, according to the parameter of the prohibit timer, the timing of initiating the access request, thereby reducing the access failure.
In some embodiments, as shown in fig. 6, the method further comprises:
step S202, responding to the parameter of the prohibit timer, and starting the prohibit timer.
When the UE initiates an access request of the first service application scene, if the access is forbidden, a forbidden timer can be started according to parameters of the forbidden timer, and timing is started. In the timing process, the UE does not reinitiate the access request until the timing of the prohibit timer is stopped, and then reinitiates the access request, thereby improving the probability of success of access and reducing unnecessary access requests.
It will be appreciated that the timing of the prohibit timer described above may be started if the UE is prohibited when the access request is first initiated. In this way, the UE does not initiate the access request again during the timing of the prohibit timer. Or, the UE starts the prohibit timer at any appropriate point in time; and the UE does not initiate an access request when the prohibit timer has not expired.
In some embodiments, the method further comprises:
upon detection of a release trigger event, it is determined to stop or continue the timing of the prohibit timer.
In some embodiments, the parameter of the prohibit timer may include a de-triggering event.
The UE may detect whether a release trigger event exists in the process of prohibiting the timer from timing according to the release trigger event specified in the parameter, and determine to stop or continue the timing of the prohibit timer according to the specification of the parameter.
In all embodiments of the present disclosure, the timing of the prohibit timer may be stopped or continued upon detection of a deactivation trigger event, as determined by the communication standard or configuration of the base station.
In some embodiments, the deactivation trigger event includes at least one of:
a called event;
Emergency call event.
In the embodiment at the base station side, each type of the first access control parameter and/or the deactivation event are explained in detail, which is not described herein.
In some embodiments, the determining to stop or continue the timing of the prohibit timer upon detection of a release trigger event comprises:
responding to the service type of the first service application scene as the service type associated with the AI, and continuing the timing of the prohibit timer according to the parameter when receiving the RRC connection setup message corresponding to the release trigger event;
and/or the number of the groups of groups,
and responding to the service type of the first service application scene as the service type associated with the AI, and continuing the timing of the prohibition timer according to the parameter when the RRC connection restoration message corresponding to the release trigger event is received.
In the embodiment of the present disclosure, when the first service application scenario is an AI-associated service type, the first service application scenario may be considered to have a higher requirement for network capability, so that in the process of prohibiting the timer timing, the timer does not need to be stopped due to the release of the trigger event. Therefore, repeated access failure of the first service application scene can be reduced, and the situation that the service cannot be normally used due to mismatching of network resources after the access is performed due to the fact that the timer is forbidden to be timed out can be reduced. The UE can be accessed again when the network resources meet the requirements as far as possible.
Therefore, the UE can determine, according to the parameter of the prohibit timer configured by the base station, to continue the timing of the timer when receiving the RRC connection establishment message and the RRC connection restoration message corresponding to the release trigger event, so that it is not necessary to re-initiate the access request during the timing of the prohibit timer.
In some embodiments, the method further comprises:
transmitting a notification message for prohibiting access to the first service application scenario to a non-access stratum (NAS) at an Access Stratum (AS) in response to the first access control parameter;
and stopping calling of the first service application scene according to the notification message at the NAS.
The communication link between the UE and the network terminal comprises a protocol stack of an access layer and a non-access layer, so that signaling transmission between the UE and the network terminal is realized. The access layer establishes a signaling transmission path between the UE and the network end, and the non-access layer can perform signaling transmission based on the access layer.
Therefore, in the embodiment of the disclosure, when the UE determines that the access request of the first service application scenario is prohibited according to the first access control parameter of the first service application scenario, the non-access stratum may be notified to prohibit access. At this time, the non-access layer may stop initiating the access request of the first service application scenario according to the access prohibition notification message, and further receive the access permission notification message, the access prohibition release notification message, or restart the access request after the access prohibition timing period is finished.
In some embodiments, the method further comprises:
transmitting the forbidden duration information of forbidden access to the first service application scene to the NAS at the AS; and the forbidden duration is used for re-initiating the call of the first service application scene at the NAS after the forbidden duration.
In the embodiment of the present disclosure, the access layer may also notify the non-access layer of the prohibition duration according to the parameter of the prohibition timer in the above embodiment, so that the non-access layer may reinitiate the access request after the prohibition duration is over.
In the embodiment of the disclosure, the finer access control can be realized by the access control parameters according to the newly added first service application scene in the network by the method.
In the embodiment of the present disclosure, the currently unused reserved access category may be used as the access category corresponding to the first service application scenario, and the currently undefined access category may be added as the access category corresponding to the first service application scenario. The base station can implement access control on the corresponding access request according to the access category corresponding to the first service application scene.
In the embodiment of the disclosure, the reserved access identifier which is not used at present can be used as the access identifier corresponding to the first service application scene, and the access identifier which is not defined at present can be added as the access identifier corresponding to the first service application scene. The base station can implement access control on the corresponding access request according to the access category and/or the access identifier corresponding to the first service application scene.
In the embodiment of the present disclosure, the call establishment cause of the first service application scenario includes the following several types:
first, the call setup cause is "AI business related";
second, the call setup cause is "AI local training";
thirdly, the call establishment cause is 'AI cloud training';
fourth, the call setup is due to "AI cloud and UE local co-training".
In the embodiment of the present disclosure, the forbidden access of the service type of the first service application scenario is not released due to the user equipment receiving the terminal service (MT service), i.e. the called service or the emergency call service, etc. I.e., the prohibit timer, e.g., the T390 timer, will continue to run.
For example, the forbidden access of the service type of the first service application scenario is not stopped by receiving the RRC connection setup message and the RRC connection resume message, i.e. the T390 timer continues to run.
In the embodiment of the present disclosure, whether the access prohibition of the service type of the first service application scenario can be released due to the user equipment receiving the terminal service (MT service), i.e., the called service or the emergency call service, may be agreed according to the network configuration or the protocol. And, the network side can inform the user equipment of the configured information through the private or public signaling.
In the embodiment of the disclosure, if the user equipment determines that the access is not allowed currently through the detection of the access control, the access layer may notify the non-access layer that the access request of the current user equipment to the AI/ML model is in a forbidden state. Further, the non-access stratum can be informed of the duration of prohibiting access, that is, the duration of informing the higher stratum that the lower stratum is blocked, so that the higher stratum initiates the access request again at a proper time.
As shown in fig. 7, the embodiment of the present disclosure further provides an access control apparatus 700, including:
the issuing module 701 is configured to issue a first access control parameter according to a first service application scenario, where the first access control parameter includes a first access category of the first service application scenario.
In some embodiments, the apparatus further comprises:
the first determining module is configured to determine a first access identifier of the first business application scene in response to the existence of the first business application scene; wherein the first access control parameter further comprises: and the first access identifier corresponds to the first access category.
In some embodiments, the first business application scenario includes at least one of:
Service application scenes taking AI service as call establishment reasons;
training a service application scene with the service as a call establishment cause at the terminal by using an AI model;
a service application scene taking an AI model in cloud training service as a call establishment cause;
and the AI model is used for training the service application scene of which the service is the call establishment cause together at the local and cloud sides.
In some embodiments, the first access control parameter further comprises: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
In some embodiments, the apparatus further comprises:
the configuration module is configured to configure a prohibition timer for the first service application scene according to the service type of the first service application scene.
In some embodiments, the configuration module is configured to:
and in response to the service type of the first service application scene, configuring whether to stop the timing of the prohibit timer when detecting a release trigger event.
In some embodiments, the resource consumption attributes are different for different of the traffic types;
wherein the resource consumption attribute comprises at least one of:
An attribute indicating computing resource consumption;
an attribute indicating storage resource consumption;
an attribute indicating network resource consumption.
In some embodiments, the deactivation trigger event includes at least one of:
a called event;
emergency call event.
In some embodiments, the configuration module comprises:
a first configuration submodule, configured to respond to the service type of the first service application scene as the service type associated with the AI, and configured to continue the timing of the prohibit timer when receiving the RRC connection setup message corresponding to the release trigger event;
and/or the number of the groups of groups,
and the second configuration submodule is configured to respond to the service type of the first service application scene as the service type associated with the AI, and to configure the timing of the prohibit timer to be continued when the RRC connection recovery message corresponding to the release trigger event is received.
In some embodiments, the configuration module is configured to:
and responding to the service type of the first service application scene, and configuring whether to stop the timing of the prohibit timer when detecting the release trigger event through dedicated signaling or public signaling or communication protocol.
As shown in fig. 8, the embodiment of the present disclosure further provides an access control apparatus 800, including:
The receiving module 801 is configured to receive a first access control parameter, where the first access control parameter is used for controlling access in a first service application scenario, and the first access control parameter includes a first access category of the first service application scenario.
In some embodiments, the first access control parameter further comprises: and the first access identifier corresponding to the first access category in the first service application scene.
In some embodiments, the first access control parameter further comprises: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
In some embodiments, the apparatus further comprises:
and the starting module is configured to respond to the parameter of the prohibition timer and start the prohibition timer.
In some embodiments, the apparatus further comprises:
and a second determining module configured to determine to stop or continue timing of the prohibit timer when a release trigger event is detected.
In some embodiments, the deactivation trigger event includes at least one of:
a called event;
Emergency call event.
In some embodiments, the second determining module includes:
the first timing submodule is configured to respond to the service type of the first service application scene as the service type associated with the AI, and when the RRC connection establishment message corresponding to the release trigger event is received, the timing of the prohibition timer is continued according to the configuration information;
and/or the number of the groups of groups,
and the second timing submodule is configured to respond to the service type of the first service application scene as the service type associated with the AI, and when the RRC connection recovery message corresponding to the release trigger event is received, the timing of the prohibition timer is continued according to the configuration information.
In some embodiments, the apparatus further comprises:
the transmission module is configured to respond to the first access control parameter and transmit a notification message for prohibiting access to the first service application scene to a non-access stratum (NAS) at an Access Stratum (AS);
and the stopping module is configured to stop the call of the first service application scene according to the notification message at the NAS.
In some embodiments, the apparatus further comprises:
the initiating module is configured to transmit the forbidden duration information of forbidden access to the first service application scene to the NAS at the AS; and the forbidden duration is used for re-initiating the call of the first service application scene at the NAS after the forbidden duration.
The embodiment of the disclosure provides a communication device, which comprises a processor, a transceiver, a memory and an executable program stored on the memory and capable of being operated by the processor, wherein the access control method provided by any technical scheme is executed when the executable program is operated by the processor.
The communication device may be a base station or a UE as described above.
The processor may include, among other things, various types of storage media, which are non-transitory computer storage media capable of continuing to memorize information stored thereon after a power down of the communication device. Here, the communication device includes a base station or a user equipment.
The processor may be coupled to the memory via a bus or the like for reading the executable program stored on the memory.
The disclosed embodiments provide a non-transitory computer-readable storage medium storing an executable program; the executable program, when executed by the processor, can implement the method shown in any technical scheme involved in the embodiments of the disclosure.
Fig. 9 is a block diagram of a communication device 900, according to an example embodiment. For example, the communication device 900 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, exercise device, personal digital assistant, or the like.
Referring to fig. 9, a communication device 900 may include one or more of the following components: a processing component 901, a memory 902, a power component 903, a multimedia component 904, an audio component 905, an input/output (I/O) interface 906, a sensor component 907, and a communications component 908.
The processing component 901 generally controls overall operation of the communication device 900, such as operations associated with display, telephone call, data communication, camera operation, and recording operation. The processing component 901 may include one or more processors 910 to execute instructions to perform all or part of the steps of the methods described above. In addition, the processing component 901 may also include one or more modules that facilitate interactions between the processing component 901 and other components. For example, the processing component 901 may include a multimedia module to facilitate interaction between the multimedia component 904 and the processing component 901.
The memory 910 is configured to store various types of data to support operations at the communication device 900. Examples of such data include instructions for any application or method operating on the communication device 900, contact data, phonebook data, messages, pictures, video, and so forth. The memory 902 may be implemented by any type of volatile or nonvolatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk, or optical disk.
The power supply component 903 provides power to the various components of the communication device 900. The power supply assembly 903 may include: a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for communication device 900.
The multimedia component 904 includes a screen that provides an output interface between the communication device 900 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 904 includes a front-facing camera and/or a rear-facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the communication device 900 is in an operational mode, such as a shooting mode or a video mode. Each front camera and/or rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 905 is configured to output and/or input an audio signal. For example, the audio component 905 includes a Microphone (MIC) configured to receive external audio signals when the communication device 900 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 910 or transmitted via the communication component 908. In some embodiments, the audio component 905 further comprises a speaker for outputting audio signals.
The I/O interface 906 provides an interface between the processing assembly 901 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 907 includes one or more sensors for providing status assessment of various aspects of the communications device 900. For example, the sensor component 907 may detect an on/off state of the communication device 900, a relative positioning of components, such as a display and keypad of the communication device 900, the sensor component 907 may also detect a change in position of the communication device 900 or a component of the communication device 900, the presence or absence of a user's contact with the communication device 900, an orientation or acceleration/deceleration of the communication device 900, and a change in temperature of the communication device 900. The sensor assembly 907 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. The sensor assembly 907 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 907 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 908 is configured to facilitate communication between the communication device 900 and other devices, either wired or wireless. The communication device 900 may access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof. In one exemplary embodiment, the communication component 908 receives broadcast signals or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 908 further comprises a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, or other technologies.
In an exemplary embodiment, the communication device 900 can be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for executing the methods described above.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as memory 902, comprising instructions executable by processor 910 of communication device 900 to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
As shown in fig. 10, an embodiment of the present disclosure shows the structure of another communication device. The communication device may be a base station according to embodiments of the present disclosure. For example, the communication device 1000 may be provided as a network device. Referring to fig. 12, the communication device 1000 includes a processing component 1022 that further includes at least one processor, and memory resources represented by memory 1032, for storing instructions, such as application programs, executable by the processing component 1022. The application programs stored in memory 1032 may include one or more modules each corresponding to a set of instructions. Further, the processing component 1022 is configured to execute instructions to perform any of the methods described above as applied to the communication device.
The communication device 1000 may also include a power supply component 1026 configured to perform power management of the communication device 1000, a wired or wireless network interface 1050 configured to connect the communication device 1000 to a network, and an input output (I/O) interface 1058. The communication device 1000 may operate based on an operating system stored in memory 1032, such as Windows Server TM, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (22)

1. An access control method, comprising:
issuing a first access control parameter according to a first service application scene, wherein the first access control parameter comprises a first access category of the first service application scene and is used for prohibiting or allowing UE to initiate access based on a service corresponding to the first service application scene;
wherein, the first business application scene at least comprises at least one of the following:
Service application scenes taking artificial intelligent AI service as call establishment reasons;
training a service application scene with the service as a call establishment cause at the terminal by using an AI model;
a service application scene taking an AI model in cloud training service as a call establishment cause;
and the AI model is used for training the service application scene of which the service is the call establishment cause together at the local and cloud sides.
2. The method of claim 1, wherein the method further comprises:
determining a first access identifier of the first business application scene in response to the existence of the first business application scene; wherein the first access control parameter further comprises: and the first access identifier corresponds to the first access category.
3. The method of claim 1 or 2, wherein the first access control parameter further comprises: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
4. A method according to claim 3, wherein the method further comprises:
and configuring a prohibition timer for the first service application scene according to the service type of the first service application scene.
5. The method of claim 4, wherein the configuring the prohibit timer for the first service application scenario according to the service type of the first service application scenario comprises:
and in response to the service type of the first service application scene, configuring whether to stop the timing of the prohibit timer when detecting a release trigger event.
6. The method of claim 5, wherein resource consumption attributes are different for different traffic types;
wherein the resource consumption attribute comprises at least one of:
an attribute indicating computing resource consumption;
an attribute indicating storage resource consumption;
an attribute indicating network resource consumption.
7. The method of claim 5 or 6, wherein the de-triggering event comprises at least one of:
a called event;
emergency call event.
8. The method of claim 7, wherein the configuring of the timing of whether to stop the prohibit timer upon detection of a de-trigger event in response to the traffic type of the first traffic application scenario comprises:
responding to the service type of the first service application scene as the service type associated with the AI, and configuring the timing of continuing the prohibit timer when receiving the RRC connection setup message corresponding to the release trigger event;
And/or the number of the groups of groups,
and responding to the service type of the first service application scene as the service type associated with the AI, and configuring the timing of continuing the prohibition timer when receiving the RRC connection recovery message corresponding to the release trigger event.
9. The method of claim 5, wherein configuring the timing of whether to stop the prohibit timer upon detection of a de-trigger event in response to the traffic type of the first traffic application scenario comprises:
and responding to the service type of the first service application scene, and configuring whether to stop the timing of the prohibit timer when detecting the release trigger event through dedicated signaling or public signaling or communication protocol.
10. An access control method, comprising:
receiving a first access control parameter, wherein the first access control parameter is used for access control of a first service application scene, and the first access control parameter comprises a first access category of the first service application scene and is used for prohibiting or allowing UE to initiate access based on a service corresponding to the first service application scene;
wherein, the first business application scene at least comprises at least one of the following:
Service application scenes taking artificial intelligent AI service as call establishment reasons;
training a service application scene with the service as a call establishment cause at the terminal by using an AI model;
a service application scene taking an AI model in cloud training service as a call establishment cause;
and the AI model is used for training the service application scene of which the service is the call establishment cause together at the local and cloud sides.
11. The method of claim 10, wherein the first access control parameter further comprises: and a first access identifier corresponding to the first access category in the first service application scene.
12. The method of claim 10 or 11, wherein the first access control parameter further comprises: disabling parameters of the timer;
and the prohibition timer is used for prohibiting access originated by the service of the first service application scene.
13. The method of claim 12, wherein the method further comprises:
and starting the prohibit timer in response to the parameters of the prohibit timer.
14. The method of claim 13, wherein the method further comprises:
and determining the timing of stopping or continuing the prohibition timer when the release trigger event is detected according to the parameter.
15. The method of claim 14, wherein the de-triggering event comprises at least one of:
a called event;
emergency call event.
16. The method of claim 14, wherein the determining, based on the parameter, a timing to stop or continue the prohibit timer when a de-trigger time is detected comprises:
responding to the service type of the first service application scene as the service type associated with the AI, and continuing the timing of the prohibit timer according to the parameter when receiving the RRC connection setup message corresponding to the release trigger event;
and/or the number of the groups of groups,
and responding to the service type of the first service application scene as the service type associated with the AI, and continuing the timing of the prohibition timer according to the parameter when the RRC connection restoration message corresponding to the release trigger event is received.
17. The method of claim 10, wherein the method further comprises:
transmitting a notification message for prohibiting access to the first service application scenario to a non-access stratum (NAS) at an Access Stratum (AS) in response to the first access control parameter;
and stopping calling of the first service application scene according to the notification message at the NAS.
18. The method of claim 17, wherein the method further comprises:
transmitting the forbidden duration information of forbidden access to the first service application scene to the NAS at the AS; and the forbidden duration is used for re-initiating the call of the first service application scene at the NAS after the forbidden duration.
19. An access control apparatus, comprising:
the system comprises a transmitting module, a receiving module and a receiving module, wherein the transmitting module is configured to transmit a first access control parameter according to a first service application scene, and the first access control parameter comprises a first access category of the first service application scene and is used for prohibiting or allowing UE to initiate access based on a service corresponding to the first service application scene;
wherein, the first business application scene at least comprises at least one of the following:
service application scenes taking artificial intelligent AI service as call establishment reasons;
training a service application scene with the service as a call establishment cause at the terminal by using an AI model;
a service application scene taking an AI model in cloud training service as a call establishment cause;
and the AI model is used for training the service application scene of which the service is the call establishment cause together at the local and cloud sides.
20. An access control apparatus, comprising:
the system comprises a receiving module, a receiving module and a control module, wherein the receiving module is configured to receive a first access control parameter, wherein the first access control parameter is used for access control of a first service application scene, and the first access control parameter comprises a first access category of the first service application scene and is used for prohibiting or allowing UE to initiate access based on a service corresponding to the first service application scene;
wherein, the first business application scene at least comprises at least one of the following:
service application scenes taking artificial intelligent AI service as call establishment reasons;
training a service application scene with the service as a call establishment cause at the terminal by using an AI model;
a service application scene taking an AI model in cloud training service as a call establishment cause;
and the AI model is used for training the service application scene of which the service is the call establishment cause together at the local and cloud sides.
21. A communication device, wherein the communication device comprises at least: a processor and a memory for storing executable instructions capable of executing on the processor, wherein:
the processor is configured to execute the executable instructions, when the executable instructions are executed, to perform the steps of the access control method provided in any of the preceding claims 1 to 9 or 10 to 18.
22. A non-transitory computer readable storage medium having stored therein computer executable instructions which when executed by a processor implement the steps in the access control method provided in any of the preceding claims 1 to 9 or 10 to 18.
CN202080001391.2A 2020-06-29 2020-06-29 Access control method and device and storage medium Active CN114208292B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/099027 WO2022000203A1 (en) 2020-06-29 2020-06-29 Access control method and apparatus, and storage medium

Publications (2)

Publication Number Publication Date
CN114208292A CN114208292A (en) 2022-03-18
CN114208292B true CN114208292B (en) 2024-01-30

Family

ID=79315070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080001391.2A Active CN114208292B (en) 2020-06-29 2020-06-29 Access control method and device and storage medium

Country Status (2)

Country Link
CN (1) CN114208292B (en)
WO (1) WO2022000203A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117692892A (en) * 2022-08-29 2024-03-12 华为技术有限公司 Wireless communication method and communication device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761933A (en) * 2011-04-29 2012-10-31 中兴通讯股份有限公司 Processing method and device for EAB (Extended Access Barring), access processing method, device and system
CN103379659A (en) * 2012-04-17 2013-10-30 电信科学技术研究院 Method and apparatus for realizing access request in dual priority scene
CN110351872A (en) * 2018-04-02 2019-10-18 夏普株式会社 Connection control method and user equipment
WO2020032702A1 (en) * 2018-08-09 2020-02-13 Samsung Electronics Co., Ltd. Method and apparatus for configuring network connection in mobile communication system
CN110891327A (en) * 2018-09-07 2020-03-17 苹果公司 Enhancements to connection rejection procedures
CN111278111A (en) * 2018-12-05 2020-06-12 中国移动通信集团浙江有限公司 Network resource differential scheduling method and device based on service scene

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104322108A (en) * 2013-05-03 2015-01-28 华为技术有限公司 Access control method and device
US11246183B2 (en) * 2017-08-03 2022-02-08 Samsung Electronics Co., Ltd. Method and apparatus for controlling access in next generation mobile communication system
CN110035474A (en) * 2018-01-11 2019-07-19 惠州Tcl移动通信有限公司 Connection control method, user equipment, base station and the device with store function
WO2019205113A1 (en) * 2018-04-27 2019-10-31 北京小米移动软件有限公司 Method and device for obtaining access control parameters, and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761933A (en) * 2011-04-29 2012-10-31 中兴通讯股份有限公司 Processing method and device for EAB (Extended Access Barring), access processing method, device and system
CN103379659A (en) * 2012-04-17 2013-10-30 电信科学技术研究院 Method and apparatus for realizing access request in dual priority scene
CN110351872A (en) * 2018-04-02 2019-10-18 夏普株式会社 Connection control method and user equipment
WO2020032702A1 (en) * 2018-08-09 2020-02-13 Samsung Electronics Co., Ltd. Method and apparatus for configuring network connection in mobile communication system
CN110891327A (en) * 2018-09-07 2020-03-17 苹果公司 Enhancements to connection rejection procedures
CN111278111A (en) * 2018-12-05 2020-06-12 中国移动通信集团浙江有限公司 Network resource differential scheduling method and device based on service scene

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SPREADTRUM COMMUNICATIONS.Barring information signalling for 5G unified access control.《3GPP TSG-RAN WG2 Meeting #101bis R2-1804476》.2018,第1-7页. *

Also Published As

Publication number Publication date
CN114208292A (en) 2022-03-18
WO2022000203A1 (en) 2022-01-06

Similar Documents

Publication Publication Date Title
JP2023520478A (en) Configuration information transmission method and device, communication device and storage medium
CN112020879B (en) Access control method and device and storage medium
CN111727614B (en) Terminal state switching processing and control method and device, communication equipment and storage medium
CN110495196B (en) Capability parameter processing method and device, communication equipment and storage medium
CN112385270B (en) Access control information processing method and device, communication equipment and storage medium
CN111149377A (en) Network access method and device, communication equipment and storage medium
CN114208292B (en) Access control method and device and storage medium
CN112237029A (en) Access control method and device, communication equipment and storage medium
CN112106425B (en) Resource processing method and device, communication equipment and storage medium
CN114503648A (en) Method, device, communication equipment and storage medium for early identification
CN114365545B (en) Access control method and device, communication equipment and storage medium
CN114145045B (en) Access control method, device, communication equipment and storage medium
WO2022077232A1 (en) Wireless communication method and apparatus, communication device, and storage medium
CN114631355B (en) Access control method, AC decision rule issuing method and device
WO2023283809A1 (en) Access control processing method and apparatus, and communication device and storage medium
CN113412638B (en) Data transmission method, device, communication equipment and storage medium
WO2023010348A1 (en) Paging method and apparatus, communication device and storage medium
WO2022032541A1 (en) Access control method and apparatus, communication device, and storage medium
WO2022266855A1 (en) Packet paging method and apparatus, communication device, and storage medium
CN117616856A (en) Information transmission method, device, communication equipment and storage medium
CN115088325A (en) Positioning configuration information processing method and device, communication equipment and storage medium
CN117616824A (en) Information transmission method, device, communication equipment and storage medium
CN114391297A (en) Random access method, device, communication equipment and storage medium
CN115804153A (en) Admission control method, admission control device, communication device, and storage medium
CN115968564A (en) Paging method, paging device, communication equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant