WO2012000271A1 - 终端接入方法和无线通信网络 - Google Patents

终端接入方法和无线通信网络 Download PDF

Info

Publication number
WO2012000271A1
WO2012000271A1 PCT/CN2010/078776 CN2010078776W WO2012000271A1 WO 2012000271 A1 WO2012000271 A1 WO 2012000271A1 CN 2010078776 W CN2010078776 W CN 2010078776W WO 2012000271 A1 WO2012000271 A1 WO 2012000271A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
terminal
wireless communication
communication network
context information
Prior art date
Application number
PCT/CN2010/078776
Other languages
English (en)
French (fr)
Inventor
谢峰
鲁照华
陈琳
祝建建
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP10853974.3A priority Critical patent/EP2590367B1/en
Priority to US13/806,284 priority patent/US9392530B2/en
Publication of WO2012000271A1 publication Critical patent/WO2012000271A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present invention relates to the field of communications, and in particular to a terminal access method and a wireless communication network.
  • BACKGROUND Wireless communication systems typically consist of a terminal, an access service network, and a content service network.
  • the access service network and the content service network may be collectively referred to as a wireless communication network, wherein the access service network includes a control station (or base station) and a gateway.
  • a wireless communication network can be regarded as a device that provides a service, and a terminal or user device refers to a device that enjoys a monthly service.
  • Wireless communication is performed between the control station and the terminal in the wireless communication network by electromagnetic waves.
  • the wireless communication network can provide wireless coverage for terminals of a certain geographical range through the control station, and this geographical range is called a cell.
  • a wireless communication system includes a terminal, a control station, a gateway, and a content service network, wherein the control station and the gateway belong to an access service network. Both the access service network and the content service network belong to the wireless communication network.
  • the terminal requests to access the network
  • the terminal requests access to the wireless communication network
  • the communication between the terminal and the wireless communication network is realized by communication between the terminal and the control station, and the processing of the terminal request is performed. It may be handled by different components of the wireless communication network, for example, possibly by the control station, possibly by the gateway, or by the content network (which has an authentication and authorization accounting server, the AAA server).
  • a common terminal such as a mobile phone corresponds to a user, that is, in the view of a wireless communication network, one terminal corresponds to one logical user.
  • various types of terminals can obtain the monthly service of the wireless communication network.
  • some terminals have a many-to-one relationship with the user, that is, a plurality of terminals correspond to one user.
  • the present invention has been made in view of the problem that a wireless communication network does not distinguish between performing a large non-data service overhead for each terminal.
  • the main purpose of the present invention is to provide a terminal access method and wireless. Communication network to solve the above problems.
  • a terminal access method is provided.
  • the terminal access method includes: after the first terminal accesses the wireless communication network, the wireless communication network saves first context information corresponding to the first identifier of the first terminal; and the wireless communication network receives the second context An access request message of the terminal, where the access request message carries the second identifier of the second terminal; the wireless communication network has the first identifier, the first context information, and the second identifier, and the second context information is established for the second terminal; The wireless communication network performs access of the second terminal according to the second context information.
  • the establishing, by the wireless communication network, the second context information for the second terminal according to the first identifier, the first context information, and the second identifier includes: the first identifier is a dynamic allocation of the wireless communication network in the first terminal access process In the case of identification, the dynamic identifier corresponds to the first context information, the wireless communication network itself stores the dynamic identifier; the second identifier includes a matching portion for matching the dynamic identifier; and the wireless communication network determines whether the matching portion is identical to the dynamic identifier saved by itself; If the determination result is yes, the wireless communication network uses the first context information corresponding to the dynamic identifier as the second context information.
  • the method further includes: acquiring, by the first terminal, a dynamic identifier allocated by the wireless communication network; and transmitting, by the first terminal, the dynamic indicator by broadcast, multicast, and/or unicast.
  • the method further includes: the second terminal receives the dynamic identifier; the second terminal uses the dynamic identifier as the matching part of the second identifier, and The second identifier is carried in the access request message and sent to the wireless communication network. Further, the second terminal is a subordinate terminal of the first terminal.
  • the establishing, by the wireless communication network, the second context information for the second terminal according to the first identifier, the first context information, and the second identifier includes: the first identifier is a first connection used by the first terminal to access the wireless communication network When the identifier is entered, the first access identifier corresponds to the first context information, the wireless communication network itself stores the first access identifier, and the second identifier is the second access identifier used by the second terminal to access the wireless communication network; The communication network acquires the first access identifier according to a preset rule.
  • the wireless communication network acquires the second shared identifier in the second access identifier according to the preset rule, where the second shared identifier corresponds to the second a second shared part in the context information; the wireless communication network determines whether the first shared identifier is the same as the second shared identifier; if the determination result is yes, the wireless communication network uses the first shared part as the second shared part, and according to the second share Partially establish second context information.
  • the wireless communication network establishes the second context information for the second terminal according to the first identifier, the first context information, and the second identifier, and further includes: The second difference identifier in the network establishes a second difference portion in the second context information; the wireless communication network combines the second shared portion and the second difference portion as the second context information.
  • the first terminal and the second terminal are in the same group, the first terminal uses the identifier of the group as the first shared identifier, and the second terminal uses the identifier of the group as the second shared identifier.
  • the establishing, by the wireless communication network, the second context information for the second terminal according to the first identifier, the first context information, and the second identifier further includes: if the first identifier and the second identifier do not satisfy the relationship between the dynamic identifier and the matching part And the first identifier and the second identifier do not satisfy the relationship between the first shared identifier and the second shared identifier, and the wireless communication network establishes second context information for the second terminal.
  • the wireless communication network includes at least one of the following: a control station, a gateway.
  • the first terminal and the second terminal each include: an Internet of Things terminal.
  • the wireless communication network includes: a saving module, configured to: after the first terminal accesses the wireless communication network, save first context information corresponding to the first identifier of the first terminal; and receive a module, configured to receive the An access request message of the second terminal, where the access request message carries the second identifier of the second terminal, and the establishing module is configured to use the first identifier, the first context information, and the second identifier, to establish the second terminal And the access module is configured to perform access of the second terminal by using the second context information.
  • the wireless communication network is used to establish context information for the new access terminal according to the context information of the accessed terminal, and access the new access terminal, thereby solving the problem that the wireless communication network does not distinguish
  • the problem that a terminal performs access causes a large non-data service overhead, which can be avoided. Repeated establishment of the same information in the context information, thereby reducing the non-data service overhead of the wireless communication network.
  • FIG. 2 is a flowchart of a terminal access method according to an embodiment of the present invention
  • FIG. 3 is an interaction flowchart 1 of a preferred embodiment 1 of the present invention
  • Figure 4 is an interaction flow chart 2 according to a preferred embodiment of the present invention
  • Figure 5 is an interaction flow chart 1 of the preferred embodiment 2 of the present invention
  • Figure 6 is an interaction flow chart 2 of the preferred embodiment 2 of the present invention
  • 7 is an interaction flowchart according to Example 3 of the present invention
  • FIG. 8 is an interaction flowchart of Example 4 of the present invention
  • FIG. 9 is a structural block diagram of a wireless communication network according to an embodiment of the present invention.
  • FIG. 2 is a flowchart of a terminal access method according to an embodiment of the present invention, which includes the following steps S202 to S208.
  • Step S202 After the first terminal accesses the wireless communication network, the wireless communication network saves first context information corresponding to the first identifier of the first terminal.
  • Step S204 The wireless communication network receives an access request message from the second terminal, where the access request message carries the second identifier of the second terminal.
  • Step S208 the wireless communication network performs access of the second terminal according to the second context information.
  • the wireless communication network performs a large non-data service overhead for each terminal without distinguishing.
  • the wireless communication network establishes the second context information according to the first context information, and can avoid the repeated establishment of the same information in the first context information and the second context information, thereby reducing non-data of the wireless communication network in the second terminal establishment process.
  • Business overhead when the first identifier of the first terminal is related to the second identifier of the second terminal, the first context information established for the first terminal is the same as or similar to the second context information established for the second terminal. Therefore, the wireless communication network establishes the second context information according to the first context information, and can avoid the repeated establishment of the same information in the first context information and the second context information, thereby reducing non-data of the wireless communication network in the second terminal establishment process.
  • Business overhead is the wireless communication network performs access of the second terminal according to the second context information.
  • the wireless communication network has the first identifier, the first context information, and the second identifier, and the establishing, by the second terminal, the second context information includes: the first identifier is a dynamic allocation of the wireless communication network in the first terminal access process In the case of identification, the dynamic identifier corresponds to the first context information, the wireless communication network itself stores the dynamic identifier; the second identifier includes a matching portion for matching the dynamic identifier; and the wireless communication network determines whether the matching portion is identical to the dynamic identifier saved by itself; The determination result is yes, the wireless communication network uses the first context information corresponding to the dynamic identifier as the second context information.
  • the first context information establishes second context information.
  • the method further includes: the first terminal acquiring the dynamic identifier allocated by the wireless communication network; and the first terminal sending the dynamic identifier by using broadcast and/or multicast and/or unicast.
  • the second context information it is necessary to implement the same for the matching part in the dynamic identifier and the second identifier.
  • the first terminal sends the first identifier through broadcast and/or multicast and/or unicast, so that the second terminal and more terminals can obtain the first identifier simply and conveniently, thereby acting as its own The identity is accessed. Therefore, the preferred embodiment can avoid the repeated establishment of the same information in the context information, thereby reducing the non-data service overhead of the wireless communication network during the terminal establishment process.
  • the method further includes: the second terminal receives the dynamic identifier; the second terminal uses the dynamic identifier as the matching part of the second identifier, and The second identifier is carried in the access request message and sent to the wireless communication network.
  • the second terminal is a subordinate terminal of the first terminal. It should be noted that when the second terminal is a subordinate terminal of the first terminal, the identifiers of the first terminal and the second terminal accessing the wireless communication network are the same, and the protocol pairs between the first terminal and the second terminal may be different from each other by accessing the wireless communication network.
  • the logo is negotiated.
  • the wireless communication network has the first identifier, the first context information, and the second identifier
  • the establishing, by the second terminal, the second context information includes: the first identifier is the first terminal used by the first terminal to access the wireless communication network
  • the wireless communication network itself stores the first access identifier
  • the second identifier is the second access identifier used by the second terminal to access the wireless communication network;
  • the communication network obtains the first shared identifier in the first access identifier according to the preset rule, where the first shared identifier corresponds to the first shared part in the first context information, and the wireless communication network acquires the second access according to the preset rule.
  • the wireless communication network determines whether the first shared identifier is the same as the second shared identifier; if the determination result is yes, the wireless communication network
  • the first shared part is used as the second shared part, and the second context information is established according to the second shared part.
  • a terminal shared identity ie, the shared identity described above.
  • These terminals sharing the same identity may belong to the same user (for example, an enterprise).
  • these terminals with the same terminal shared identity can be regarded as a group.
  • the terminal shared identifier can also be referred to as a group identifier.
  • the terminal distinguishing identifier is used to distinguish different terminals having the same terminal shared identifier (when the terminal shared identifier is a group identifier, the terminal distinguishing identifier may also be referred to as a member identifier;). That is to say, when it is necessary to uniquely determine a terminal, the terminal shared identifier plus the terminal distinguishing identifier can be used.
  • Implementation method 1 The terminal identifier 1 and the optional terminal identifier 2 are used in the wireless communication system.
  • the terminal identifier 1 For a part of the terminal, only the terminal identifier 1 (denoted as the A method) is used, and for the other part of the terminal, the terminal identifier 1 is used plus the terminal identifier 2 (Remarked as the B method), at this time, the terminal identifier 1 is the terminal shared identifier, and the terminal identifier 2 is the terminal distinguishing identifier.
  • the terminal identifier 1 in the A method and the B method may be specified to be different. For example, some bits of the terminal identifier 1 of the A method and the B method are used to distinguish between the method A and the method B. Alternatively, the A method and the B method can be distinguished by an explicit indication, for example, in the terminal request, a field is used to indicate whether the terminal uses the A method or the B method.
  • the second method is to use the unified terminal identifier to mark the terminal, but for some terminals, the identifier can be divided into the terminal shared identifier and the terminal distinguishing identifier. For example, for the terminal identifier 1 with a length of 48 bits, the first n bits are shared by the terminal. The identification, after (48-n) bits are the terminal identification. Therefore, in the preferred embodiment, considering the shared identifier and establishing the shared part in the context information according to the shared identifier, the second context information can be established more flexibly according to the first context information.
  • the wireless communication network establishes the second context information for the second terminal according to the first identifier, the first context information, and the second identifier, and further includes: the wireless communication network And establishing a second difference portion in the second context information according to the second difference identifier; the wireless communication network combining the second shared portion and the second difference portion as the second context information.
  • context information may be established by combining a shared portion and a distinct portion. Since the difference part considers the above difference identifier, the difference identifier can be used to distinguish a plurality of terminals. Therefore, the preferred embodiment is more suitable for practical applications.
  • the first terminal uses the identifier of the group as the first shared identifier
  • the second terminal uses the identifier of the group as the second shared identifier.
  • each terminal group includes a group identifier. Therefore, the group identifier is used as a shared identifier, which is simple and convenient to implement.
  • the wireless communication network has the first identifier, the first context information, and the second identifier
  • the establishing, by the second terminal, the second context information further includes: if the first identifier and the second identifier do not satisfy the relationship between the dynamic identifier and the matching part And the first identifier and the second identifier do not satisfy the relationship between the first shared identifier and the second shared identifier, and the wireless communication network establishes second context information for the second terminal.
  • the second context information is established for the second terminal according to a normal procedure to ensure that the second context information is correctly established.
  • the wireless communication network comprises at least one of the following: a control station, a gateway.
  • the first terminal and the second terminal each comprise one of the following: an Internet of Things terminal.
  • FIG. 3 is an interaction flow chart 1 according to a preferred embodiment of the present invention. As shown in FIG. 3, the following steps may be included: Step S302: The terminal requests to enter the network, where the pre-acquired identifier is carried. Step S304, the wireless communication network searches for the terminal context according to the received pre-acquired identifier. Step S306, the wireless communication network responds to the access request of the terminal, and instructs the terminal to perform a simplified network access process.
  • FIG. 3 is an interaction flow chart 1 according to a preferred embodiment of the present invention. As shown in FIG. 3, the following steps may be included: Step S302: The terminal requests to enter the network, where the pre-acquired identifier is carried. Step S304, the wireless communication network searches for the terminal context according to the received pre-acquired identifier. Step
  • Step S402 The terminal 1 accesses the wireless communication network and obtains the identifier a.
  • Step S404 the terminal 1 sends the identifier a to the terminal 2.
  • Step S406 the terminal 2 requests access to the wireless communication network by using the identifier a.
  • Step S408, the wireless communication network locates the terminal to find the terminal context.
  • Step S410 The wireless communication network responds to the access request, and instructs the terminal to perform a simplified network access procedure.
  • Example 1 Assume that terminals 1, 2, ..., ⁇ ( ⁇ > 1 ) belong to the same type of users, and they have some trust relationship (for example, they may belong to the same enterprise user). There is a subordinate relationship between these terminals.
  • the terminal 1 may be a superior node of other terminals (for example, the terminal 1 may play the role of a gateway in the group of terminals).
  • the upper node When there is a relationship between the terminals, the upper node first accesses the wireless communication network, and after successfully entering the network, obtains the identifier a, which is used by the wireless communication network to mark the monthly service user. Therefore, the identifier is also associated with the wireless communication network.
  • the context information associated with the terminal is maintained. Terminal 1 also maintains context information associated with ⁇ identifier a. After the terminal 1 receives the identifier a from the wireless communication network, the terminal 1 uses the communication protocol between the terminals.
  • the identification a and related context information are transmitted to other terminals, including the terminal 2.
  • the sending method may be broadcast, multicast, and/or unicast.
  • the terminal 2 After the terminal 2 receives the identifier a and the related context information, the terminal 2 sends a request access message to the wireless communication network, where the identifier a is carried.
  • the wireless communication network e.g., the control station
  • the wireless communication network notifies the terminal of the access failure and/or needs to re-execute the complete network access procedure (this complete network access procedure may be redone by terminal 1).
  • this complete network access procedure may be redone by terminal 1).
  • terminals 1 , 2 , ... , ⁇ ( ⁇ > 1 ) belong to the same type of users, and they have some kind of trust relationship (for example, they may belong to the same enterprise user;). These terminals are level between each other, and the processes they perform when accessing the wireless communication network differ depending on the order in which they are accessed.
  • the terminal 1 is first connected to the wireless communication network, and (after performing the complete network access process), the identifier a is obtained after successfully entering the network, and the identifier is used by the wireless communication network to mark the monthly service user. Therefore, the identifier is also associated with the wireless communication network.
  • the context information associated with the terminal is maintained.
  • Terminal 1 also maintains context information associated with ⁇ idental a. After the terminal 1 receives the identifier a from the wireless communication network, the terminal 1 uses the communication protocol between the terminals.
  • the identification a and related context information are transmitted to other terminals, including the terminal 2.
  • the sending method may be broadcast, multicast, and/or unicast.
  • the terminal 2 After the terminal 2 receives the identifier a and the related context information, the terminal 2 sends a request access message to the wireless communication network, where the identifier a is carried.
  • the wireless communication network eg, the control station
  • the wireless communication network notifies the terminal that the access fails and/or needs to re-execute the complete network access procedure.
  • the terminal 1 accesses the wireless communication network by using the terminal shared identifier (and the terminal distinguishing identifier), and the terminal shared identifier refers to an identifier commonly used by multiple terminals, including the group identifier. Then, the wireless communication network establishes terminal sharing context information according to the terminal sharing identifier, where the terminal sharing context information corresponds to multiple terminals or corresponds to the terminal group.
  • the terminals 1 and 2 also send a terminal difference identifier to the wireless communication network in the network access process, where the terminal difference identifier is used to distinguish different terminals having the same terminal shared identifier.
  • the wireless communication network establishes the terminal distinguishing context information according to the terminal distinguishing identifier (and/or the new assigned identifier associated with the identifier).
  • FIG. 5 is an interaction flowchart 1 of the preferred embodiment 2 of the present invention. As shown in FIG. 5, the method may include the following steps: Step 4: S502, the terminal requests to access the network, where the terminal carries the identifier. Step S504: The wireless communication network receives the terminal shared identifier to search for the terminal sharing context.
  • Step S506 The wireless communication network responds to the access request of the terminal, and instructs the terminal to perform a simplified network access process.
  • FIG. 6 is an interaction flow chart 2 according to a preferred embodiment 2 of the present invention. As shown in FIG. 6, the method may include the following steps: Step S602: The terminal requests to access the network, where the terminal sharing identifier and the terminal difference identifier are carried. Step S604: The wireless communication network receives the terminal shared identifier to search for the terminal sharing context. Step 4: S606. If there is no matching terminal sharing context information, the wireless communication network responds to the terminal's access request, instructing the terminal to perform the remaining part of the complete access procedure.
  • Step S608 if there is matching terminal context information, the wireless communication network responds to the terminal's access request, instructing the terminal to perform the remainder of the simplified network access procedure.
  • the implementation process of the above preferred embodiment 2 will be described in detail below with reference to the example 3 and the example 4.
  • Example 3 FIG. 7 is an interaction flowchart according to the third embodiment of the present invention. As shown in FIG. 7, the method may include the following steps: Step S702: The terminal 1 requests to enter the network, where the terminal sharing identifier a and the terminal distinguishing identifier are
  • step S704 the wireless communication network locates the terminal sharing context information, and has no matching information.
  • Step S706 the wireless communication network responds to the access request of the terminal 1, and instructs to perform a complete access procedure.
  • Step S708, the terminal 1 And the wireless communication network performs the complete part of the complete access procedure, and establishes the terminal sharing context information and the terminal distinguishing context information.
  • Step S710 The terminal 2 requests the network access, where the terminal sharing identifier a and the terminal distinguishing identifier
  • Step S712 the wireless communication network searches for the terminal sharing context information according to the terminal sharing identifier a, and has matching information.
  • Step S714 the wireless communication network responds to the access request of the terminal 2, and instructs to perform a simplified access procedure.
  • Step S716, the terminal 2 and the wireless communication network perform the remainder of the simplified access procedure, and establish terminal distinguishing context information. It is assumed that the terminals 1, 2, ..., ⁇ ( ⁇ > 1 ) belong to the same type of users, and they have some trust relationship (for example, they may belong to the same enterprise user).
  • the terminals may be level. The processes performed when they access the wireless communication network are different according to the order in which they are accessed. They may also be the relationship between the upper and lower levels.
  • the upper nodes first access the wireless communication network.
  • the terminal 1 first accesses the wireless communication network, and the terminal carries the terminal shared identifier a and the terminal distinguishing identifier 1 in the request access message, and the wireless communication network searches for the terminal sharing context according to the terminal shared identifier a, without matching information, then the wireless The communication network instructs the terminal 1 to perform a complete access procedure. After the terminal 1 (implementing the complete network access process) successfully enters the network, the terminal sharing context information and the terminal difference context information are established.
  • the terminal 2 requests to access the wireless communication network, wherein the terminal sharing identifier a and the terminal distinguishing identifier 2, the wireless communication network searches for the terminal sharing context information according to the terminal sharing identifier a, and has matching information.
  • the wireless communication network responds to the request of the terminal 2, indicating that the simplified network access process is performed.
  • the terminal 2 and the wireless communication network then establish terminal distinguishing context information through a simplified network access procedure.
  • the terminal 1 may still be connected to the wireless communication network, or may have exited the wireless communication network.
  • the wireless communication network needs to reserve the terminal sharing context information.
  • the terminal 2 may need to perform some form of communication with the terminal 1.
  • the communication protocol between the terminals may be different or the same as the protocol for the terminal to access the wireless communication network, and the terminal 1 may broadcast, multicast, and/or Or transmitting the terminal sharing context information to the terminal 2) in a unicast manner, so that the terminal 2 receives the terminal sharing context information (including the security related information) from the terminal 1, and the terminal 2 performs subsequent simplification according to the received terminal sharing context information.
  • FIG. 8 is an interaction flowchart according to the fourth embodiment of the present invention. As shown in FIG. 8, the following steps may be included: Step S802: The terminal 1 requests an access network, where the mobile terminal shares the identifier a.
  • Step S804 the wireless communication network searches for the terminal sharing context information in the terminal sharing identifier a, and there is no matching information.
  • Step S806 the wireless communication network responds to the access request of the terminal 1, and instructs to perform a complete access procedure.
  • Step S808, the terminal 1 and the wireless communication network perform the remaining part of the complete access procedure, and establish terminal sharing context information and terminal difference context information.
  • Step S810 the terminal 2 requests to enter the network, where the mobile terminal shares the identifier &.
  • Step S812 the wireless communication network searches for the terminal sharing context information according to the terminal sharing identifier a, and has matching information.
  • Step S814, the wireless communication network responds to the access request of the terminal 2, and instructs to perform a simplified access procedure.
  • Step S816, the terminal 2 and the wireless communication network perform the remainder of the simplified access procedure, and establish terminal distinguishing context information. It is assumed that the terminals 1, 2, ..., ⁇ ( ⁇ > 1 ) belong to the same type of users, and they have some trust relationship between them (for example, they may belong to the same enterprise user).
  • the terminals may be level. The processes performed when they access the wireless communication network are different according to the order in which they are accessed. They may also be the relationship between the upper and lower levels. Generally, the upper nodes first access the wireless communication network.
  • the terminal 1 first accesses the wireless communication network, and the terminal carries the terminal shared identifier a in the request access message, and the wireless communication network searches for the terminal shared context according to the terminal shared identifier a, and there is no matching information, and the wireless communication network instructs the terminal 1 to perform the complete operation. Access process. In the remaining process of the complete network access process, the wireless communication network establishes terminal sharing context information, and the terminal 1 transmits the terminal difference identifier 1 to the wireless communication network, and the wireless communication network associates the terminal identification identifier 1 (and/or is associated with the identifier) The new allocation identifier) establishes the terminal difference context information for the terminal. After the successful network access process is completed, the terminal sharing context information and the terminal difference context information are established.
  • the terminal 2 requests access to the wireless communication network, wherein the portable terminal shares the identifier a, and the wireless communication network searches for the terminal sharing context information according to the terminal shared identifier a, and has matching information. Then, the wireless communication network responds to the request of the terminal 2, indicating that the simplified network access process is performed. The terminal 2 then performs a simplified network access procedure with the wireless communication network. In the process, the terminal 2 transmits the terminal distinguishing identifier 2 to the wireless communication network, and the wireless communication network according to the terminal distinguishing identifier 2 (and/or the new assigned identifier associated with the identifier) ) Establish terminal difference context information.
  • the terminal 1 may still be connected to the wireless communication network, or may have exited the wireless communication network.
  • the wireless communication network needs to reserve the terminal sharing context information.
  • the terminal 2 may need to perform some form of communication with the terminal 1.
  • the communication protocol between the terminals may be different or the same as the protocol for the terminal to access the wireless communication network, and the terminal 1 may broadcast, multicast, and/or Or transmitting the terminal sharing context information to the terminal 2) in a unicast manner, so that the terminal 2 receives the terminal sharing context information (including the security related information) from the terminal 1, and the terminal 2 performs subsequent simplification according to the received terminal sharing context information. Processing of the network access process.
  • FIG. 9 is a structural block diagram of a wireless communication network according to an embodiment of the present invention, including a save module 92, a receiving module 94, an establishing module 96, and an access module 98.
  • the saving module 92 is configured to: after the first terminal accesses the wireless communication network with the first identifier, the first context information corresponding to the first identifier is established for the first terminal; the receiving module 94 is configured to receive the second terminal An access request message, where the access request message carries a second identifier of the second terminal, and the establishing module 96 is connected to the saving module 92 and the receiving module 94 for the first context saved by the first identifier and the saving module 92.
  • the second identifier received by the information and receiving module 94 establishes second context information for the second terminal.
  • the access module 98 is connected to the establishing module 96, and is configured to perform second terminal information establishment by the establishing module 96.
  • the wireless communication network performs a large non-data service overhead for each terminal without distinguishing.
  • the first context information established for the first terminal is the same as or similar to the second context information established for the second terminal.
  • the establishing module 96 establishes the second context information according to the first context information, which can avoid the repeated establishment of the same information in the first context information and the second context information, thereby reducing the non-data service overhead of the wireless communication network in the second terminal establishment process.
  • the wireless communication network described in the device embodiment corresponds to the foregoing method embodiment, and the specific implementation process has been described in detail in the method embodiment, and is not described herein.
  • the above embodiments of the present invention provide a terminal access method and a wireless communication network.
  • the wireless communication network establishes context information for the new access terminal according to the context information of the accessed terminal, and performs access of the new access terminal, thereby solving the problem that the wireless communication network is not differentiated for each terminal.
  • the problem of performing a large non-data service overhead caused by access can avoid the repeated establishment of the same information in the context information, thereby reducing the non-data service overhead of the wireless communication network.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种终端接入方法和无线通信网络,该方法包括:在第一终端接入无线通信网络之后,无线通信网络保存与第一终端的第一标识对应的第一上下文信息;无线通信网络接收到来自第二终端的接入请求消息,其中接入请求消息中携带有第二终端的第二标识;无线通信网络根据第一标识、第一上下文信息和第二标识,为第二终端建立第二上下文信息;无线通信网络根据第二上下文信息进行第二终端的接入。本发明可以避免上下文信息中相同信息的重复建立,从而降低无线通信网络的非数据业务开销。

Description

终端接入方法和无线通信网络 技术领域 本发明涉及通信领域, 具体而言, 涉及一种终端接入方法和无线通信网 络。 背景技术 无线通信系统通常由终端, 接入服务网和内容服务网组成。 接入服务网 和内容服务网可统称为无线通信网络, 其中, 接入服务网包括控制站 (或基 站) 和网关。 无线通信网络可视作提供服务的设备, 终端或者用户设备是指 享受月艮务的设备。 无线通信网络中的控制站与终端之间通过电磁波进行无线 通信。 无线通信网络通过控制站可以为一定地理范围的终端提供无线覆盖, 这个地理范围称为小区。 图 1是根据相关技术的无线通信系统的示意图, 如图 1所示, 无线通信 系统包括终端、 控制站、 网关和内容服务网, 其中控制站和网关属于接入服 务网。 接入服务网和内容服务网都属于无线通信网络, 终端请求入网即终端 请求接入无线通信网络, 终端与无线通信网络间的通信由终端与控制站间的 通信实现, 而对于终端请求的处理可能由无线通信网络的不同组成部分进行 处理, 例如, 可能由控制站处理, 可能由网关处理, 也可能由内容月艮务网(其 中有认证授权记账服务器即 AAA服务器)。 相关技术中, 普通的终端例如手机与用户——对应, 也就是在无线通信 网络看来, 一部终端对应于一个逻辑上的用户。 但是, 随着无线通信系统的 应用扩展到更广泛的领域, 各种类型的终端 (用户设备) 都能得到无线通信 网络的月艮务。 在这些终端中, 有一些终端与用户之间具有多对一关系, 也就 是说, 多部终端对应着一个用户。 例如, 在物联网领域, 可能出现几部、 几 十部、 甚至更多的终端都属于同一个用户。 因此, 在上述多个终端接入无线通信网络时, 如果不加区分的对每个终 端执行接入过程, 将给无线通信网络造成很大的非数据业务开销。 发明内容 针对无线通信网络不加区分的对每个终端执行接入造成很大的非数据业 务开销的问题而提出本发明, 为此, 本发明的主要目的在于提供一种终端接 入方法及无线通信网络, 以解决上述问题。 为了实现上述目的,才艮据本发明的一个方面,提供了一种终端接入方法。 才艮据本发明的终端接入方法包括: 在第一终端接入无线通信网络之后, 无线通信网络保存与第一终端的第一标识对应的第一上下文信息; 无线通信 网络接收到来自第二终端的接入请求消息, 其中接入请求消息中携带有第二 终端的第二标识; 无线通信网络 居第一标识、第一上下文信息和第二标识, 为第二终端建立第二上下文信息; 无线通信网络根据第二上下文信息进行第 二终端的接入。 进一步地, 无线通信网络 据第一标识、 第一上下文信息和第二标识, 为第二终端建立第二上下文信息包括: 在第一标识是无线通信网络在第一终 端接入过程中分配的动态标识时, 动态标识与第一上下文信息对应, 无线通 信网络自身保存有动态标识; 第二标识包括用于匹配动态标识的匹配部分; 无线通信网络判断匹配部分与自身保存的动态标识是否相同; 如果判断结果 为是,无线通信网络将动态标识对应的第一上下文信息作为第二上下文信息。 进一步地, 在第一终端接入无线通信网络的过程中, 还包括: 第一终端 获取无线通信网络分配的动态标识; 第一终端通过广播、 组播和 /或单播发送 动态标 i只。 进一步地, 在第一终端通过广播、 组播和 /或单播发送动态标识之后, 还 包括: 第二终端接收到动态标识; 第二终端将动态标识作为第二标识的匹配 部分, 并将第二标识携带在接入请求消息中发送给无线通信网络。 进一步地, 第二终端为第一终端的下属终端。 进一步地, 无线通信网络 据第一标识、 第一上下文信息和第二标识, 为第二终端建立第二上下文信息包括: 在第一标识是第一终端用于接入无线 通信网络的第一接入标识时, 第一接入标识对应于第一上下文信息, 无线通 信网络自身保存有第一接入标识; 第二标识是第二终端用于接入无线通信网 络的第二接入标识; 无线通信网络按照预设的规则获取第一接入标识中的第 一共享标识, 其中第一共享标识对应第一上下文信息中的第一共享部分; 无 线通信网络按照预设的规则获取第二接入标识中的第二共享标识, 其中第二 共享标识对应第二上下文信息中的第二共享部分; 无线通信网络判断第一共 享标识与第二共享标识是否相同; 如果判断结果为是, 无线通信网络将第一 共享部分作为第二共享部分, 并根据第二共享部分建立第二上下文信息。 进一步地, 在第二接入标识还包括第二区别标识时, 无线通信网络才艮据 第一标识、 第一上下文信息和第二标识, 为第二终端建立第二上下文信息还 包括: 无线通信网络 居第二区别标识建立第二上下文信息中的第二区别部 分;无线通信网络将第二共享部分和第二区别部分结合作为第二上下文信息。 进一步地, 在第一终端与第二终端处于相同的组时, 第一终端将组的标 识作为第一共享标识, 第二终端将组的标识作为第二共享标识。 进一步地, 无线通信网络 据第一标识、 第一上下文信息和第二标识, 为第二终端建立第二上下文信息还包括: 如果第一标识与第二标识不满足上 述动态标识与匹配部分的关系, 并且第一标识与第二标识不满足上述第一共 享标识与第二共享标识的关系, 无线通信网络为第二终端建立第二上下文信 息。 进一步地, 无线通信网络包括以下至少之一: 控制站、 网关。 进一步地, 第一终端和第二终端均包括: 物联网终端。 为了实现上述目的, 才艮据本发明的另一个方面, 提供了一种无线通信网 络。 才艮据本发明的无线通信网络包括: 保存模块, 用于在第一终端接入无线 通信网络之后, 保存与第一终端的第一标识对应的第一上下文信息; 接收模 块, 用于接收来自第二终端的接入请求消息, 其中接入请求消息中携带有第 二终端的第二标识; 建立模块, 用于 居第一标识、 第一上下文信息和第二 标识, 为第二终端建立第二上下文信息; 接入模块, 用于 居第二上下文信 息进行第二终端的接入。 通过本发明, 釆用无线通信网络才艮据已接入终端的上下文信息为新接入 终端建立上下文信息, 并进行该新接入终端的接入, 解决了无线通信网络不 加区分的对每个终端执行接入造成很大的非数据业务开销的问题, 可以避免 上下文信息中相同信息的重复建立, 从而降低无线通信网络的非数据业务开 销。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是根据相关技术的无线通信系统的示意图; 图 2是根据本发明实施例的终端接入方法的流程图; 图 3是 居本发明优选实施例一的交互流程图一; 图 4是才艮据本发明优选实施例一的交互流程图二; 图 5是 居本发明优选实施例二的交互流程图一; 图 6是 居本发明优选实施例二的交互流程图二; 图 7是根据本发明实例 3的交互流程图; 图 8是 居本发明实例 4的交互流程图; 图 9是 居本发明实施例的无线通信网络的结构框图。 具体实施方式 需要说明的是, 在不冲突的情况下, 本申请中的实施例及实施例中的特 征可以相互组合。 下面将参考附图并结合实施例来详细说明本发明。 根据本发明的实施例, 提供了一种终端接入方法, 图 2是根据本发明实 施例的终端接入方法的流程图, 包括如下的步骤 S202至步骤 S208。 步骤 S202, 在第一终端接入无线通信网络之后, 无线通信网络保存与第 一终端的第一标识对应的第一上下文信息。 步骤 S204, 无线通信网络接收到来自第二终端的接入请求消息, 其中接 入请求消息中携带有第二终端的第二标识。 步骤 S206, 无线通信网络 居第一标识、 第一上下文信息和第二标识, 为第二终端建立第二上下文信息。 步骤 S208, 无线通信网络根据第二上下文信息进行第二终端的接入。 相关技术中, 无线通信网络不加区分的对每个终端执行接入造成很大的 非数据业务开销。 本发明实施例中, 当第一终端的第一标识与第二终端的第 二标识相关时, 为第一终端建立的第一上下文信息与为第二终端建立的第二 上下文信息相同或相近, 因此, 无线通信网络才艮据第一上下文信息建立第二 上下文信息, 可以避免第一上下文信息与第二上下文信息中相同信息的重复 建立, 从而降低第二终端建立过程中无线通信网络的非数据业务开销。 优选地, 无线通信网络 居第一标识、 第一上下文信息和第二标识, 为 第二终端建立第二上下文信息包括: 在第一标识是无线通信网络在第一终端 接入过程中分配的动态标识时, 动态标识与第一上下文信息对应, 无线通信 网络自身保存有动态标识; 第二标识包括用于匹配动态标识的匹配部分; 无 线通信网络判断匹配部分与自身保存的动态标识是否相同; 如果判断结果为 是, 无线通信网络将动态标识对应的第一上下文信息作为第二上下文信息。 本优选实施例中, 由于对动态标识与第二标识中的匹配部分是否相同的 判断操作简单方便、 容易实现, 因此, 可以在避免给无线通信网络增加过大 负荷的情况下, 实现才艮据第一上下文信息建立第二上下文信息。 优选地, 在第一终端接入无线通信网络的过程中, 还包括: 第一终端获 取无线通信网络分配的动态标识; 第一终端通过广播和 /或组播和 /或单播发 送动态标识。 为了实现 居第一上下文信息建立第二上下文信息, 需要实现对动态标 识与第二标识中的匹配部分相同。 本优选实施例中, 通过第一终端通过广播 和 /或组播和 /或单播发送第一标识, 可以简单方便的使第二终端以及更多的 终端获得该第一标识, 从而作为自身的标识进行接入。 因此, 本优选实施例 可以避免上下文信息中相同信息的重复建立, 从而降氐终端建立过程中无线 通信网络的非数据业务开销。 优选地, 在第一终端通过广播和 /或组播和 /或单播发送动态标识之后, 还包括: 第二终端接收到动态标识; 第二终端将动态标识作为第二标识的匹 配部分, 并将第二标识携带在接入请求消息中发送给无线通信网络。 优选地, 第二终端为第一终端的下属终端。 需要说明的是, 在第二终端为第一终端的下属终端时, 第一终端和第二 终端接入无线通信网络的标识相同, 它们之间可以通过与接入该无线通信网 络不同的协议对该标识进行协商。 优选地, 无线通信网络 居第一标识、 第一上下文信息和第二标识, 为 第二终端建立第二上下文信息包括: 在第一标识是第一终端用于接入无线通 信网络的第一接入标识时, 第一接入标识对应于第一上下文信息, 无线通信 网络自身保存有第一接入标识; 第二标识是第二终端用于接入无线通信网络 的第二接入标识; 无线通信网络按照预设的规则获取第一接入标识中的第一 共享标识, 其中第一共享标识对应第一上下文信息中的第一共享部分; 无线 通信网络按照预设的规则获取第二接入标识中的第二共享标识, 其中第二共 享标识对应第二上下文信息中的第二共享部分; 无线通信网络判断第一共享 标识与第二共享标识是否相同; 如果判断结果为是, 无线通信网络将第一共 享部分作为第二共享部分, 并才艮据第二共享部分建立第二上下文信息。 由于在实际应用中, 多部终端可能共享一个标识, 该标识称为终端共享 标识(即上述共享标识)。这些共享同一个标识的终端可能属于同一个用户(例 如企业)。 有时, 这些具有相同的终端共享标识的终端可以视作一组, 这时, 终端共享标识也可称为组标识。 另外, 终端区分标识用于区分具有相同终端共享标识的不同终端 (在终 端共享标识为组标识时, 终端区分标识也可称为成员标识;)。 也就是说, 当需 要唯一的确定一个终端的时候, 可以使用终端共享标识加上终端区分标识。 具体实现时, 至少有如下的两种实现方法。 实现方法一: 无线通信系统中使用终端标识 1和可选的终端标识 2,对于一部分终端, 仅使用终端标识 1 (记为 A方法), 对于另一部分终端, 使用终端标识 1加上 终端标识 2 (记为 B方法), 这时, 终端标识 1即终端共享标识, 终端标识 2 即终端区别标识。 而 A方法和 B方法中的终端标识 1可以规定是不同的, 例 如规定 A方法和 B方法的终端标识 1的某几位用于区分方法 A和方法 B。 或者也可以通过明确的指示以区分 A方法和 B方法,例如在终端请求中通过 一个字段标明终端使用的是 A方法还是 B方法。 实现方法二 无线通信系统使用统一的终端标识标记终端, 不过对于一部分终端, 其 标识可划分为终端共享标识和终端区分标识, 例如, 对于长度为 48 比特的 终端标识 1 , 前 n位为终端共享标识, 后 (48-n ) 位为终端区分标识。 因此, 本优选实施例中, 考虑了共享标识并才艮据该共享标识建立上下文 信息中的共享部分, 可以更加灵活地才艮据第一上下文信息建立第二上下文信 息。 优选地, 在第二接入标识还包括第二区别标识时, 无线通信网络根据第 一标识、 第一上下文信息和第二标识, 为第二终端建立第二上下文信息还包 括:无线通信网络才艮据第二区别标识建立第二上下文信息中的第二区别部分; 无线通信网络将第二共享部分和第二区别部分结合作为第二上下文信息。 本优选实施例中,上下文信息可以由共享部分和区别部分相结合而建立。 由于区别部分考虑了上述区别标识, 而该区别标识可以用于区分多个终端。 因此, 本优选实施例更适宜实际的应用。 优选地, 在第一终端与第二终端处于相同的组时, 第一终端将组的标识 作为第一共享标识, 第二终端将组的标识作为第二共享标识。 本优选实施例中, 每一个终端组都包含组标识, 因此, 将该组标识作为 共享标识, 实现简单方便。 优选地, 无线通信网络 居第一标识、 第一上下文信息和第二标识, 为 第二终端建立第二上下文信息还包括: 如果第一标识与第二标识不满足上述 动态标识与匹配部分的关系, 并且第一标识与第二标识不满足上述第一共享 标识与第二共享标识的关系,无线通信网络为第二终端建立第二上下文信息。 本优选实施例中, 在第一标识与第二标识不具备相关性时, 按照正常的 流程为第二终端建立第二上下文信息可以保证, 可以保证第二上下文信息的 正确建立。 优选地, 无线通信网络包括以下至少之一: 控制站、 网关。 优选地, 第一终端和第二终端均包括以下之一: 物联网终端。 下面将结合实例对本发明实施例的实现过程进行详细描述。 优选实施例一 图 3是才艮据本发明优选实施例一的交互流程图一, 如图 3所示, 可以包 括以下步 4聚: 步骤 S302, 终端请求入网, 其中携带预先获取的标识。 步骤 S304, 无线通信网络才艮据接收的预先获取的标识查找终端上下文。 步骤 S306, 无线通信网络响应终端的接入请求, 指示终端执行简化的入 网流程。 图 4是才艮据本发明优选实施例一的交互流程图二, 如图 4所示, 可以包 括以下步 4聚: 步骤 S402, 终端 1接入无线通信网络并获取标识 a。 步骤 S404, 终端 1将标识 a发送给终端 2。 步骤 S406 , 终端 2以标识 a请求接入无线通信网络。 步骤 S408, 无线通信网络 居标识 a查找终端上下文。 步骤 S410,无线通信网络响应接入请求,指示终端执行简化的入网流程。 下面结合实例 1和实例 2, 对上述优选实施例二的实现过程进行详细说 明。 实例 1 假设终端 1 , 2, ... ... , η ( η>1 )属于同类用户, 它们之间具有某种可信 任关系(例如它们可能归属于同一企业用户)。这些终端之间是有上下级关系, 例如终端 1可能是其它终端的上级节点 (例如终端 1可能扮演这群终端中的 网关角色)。 当终端间有上下级关系时, 则上级节点先接入无线通信网络, 成 功入网后获取标识 a, 该标识是无线通信网络用于标记月艮务用户的, 因此, 该标识也与无线通信网络为终端维护的上下文 (context ) 信息关联。 终端 1 也维护 艮标识 a相关的上下文信息。 终端 1从无线通信网络接收标识 a之后, 终端 1使用终端间的通信协议
(可能与终端接入无线通信网络的协议不同或相同) 将标识 a以及相关的上 下文信息发送给其它终端, 其中包括终端 2。 发送方式可能为广播、 组播和 / 或单播。 终端 2接收到标识 a以及相关的上下文信息后, 终端 2向无线通信网络 发送请求接入消息, 其中携带标识 a。 无线通信网络 (例如控制站)接收到 该消息后才艮据标识 a查找匹配的上下文信息。 如果有匹配的上下文信息, 则 既可执行简化的入网流程 (此实例中, 由于在终端 1接入无线通信网络时已 经建立上下文信息, 因此, 其它终端即可执行简化的入网流程)。 如果没有匹 配的上下文信息或者上下文信息已过期, 则无线通信网络通知终端接入失败 和 /或需要重新执行完整的入网流程(该完整的入网流程可能由终端 1重做)。 实例 2 假设终端 1 , 2 , ... ... , η ( η>1 )属于同类用户, 它们之间具有某种可信 任关系 (例如它们可能归属于同一企业用户;)。 这些终端之间是平级的, 它们 接入无线通信网络时执行的流程由其接入的先后关系而不同。 個—设终端 1先 接入无线通信网络, (执行完整的入网流程)成功入网后获取标识 a, 该标识 是无线通信网络用于标记月艮务用户的, 因此, 该标识也与无线通信网络为终 端维护的上下文 (context ) 信息关联。 终端 1也维护 艮标识 a相关的上下文 信息。 终端 1从无线通信网络接收标识 a之后, 终端 1使用终端间的通信协议
(可能与终端接入无线通信网络的协议不同或相同) 将标识 a以及相关的上 下文信息发送给其它终端, 其中包括终端 2。 发送方式可能为广播、 组播和 / 或单播。 终端 2接收到标识 a以及相关的上下文信息后, 终端 2向无线通信网络 发送请求接入消息, 其中携带标识 a。 无线通信网络 (例如控制站)接收到 该消息后才艮据标识 a查找匹配的上下文信息。 如果有匹配的上下文信息, 则 既可执行简化的入网流程 (此实例中, 由于在终端 1接入无线通信网络时已 经建立上下文信息, 因此, 其它终端即可执行简化的入网流程)。 如果没有匹 配的上下文信息或者上下文信息已过期, 则无线通信网络通知终端接入失败 和 /或需要重新执行完整的入网流程。 在上述实例 1和实例 2中, 终端 1以终端共享标识 (和终端区别标识) 接入无线通信网络, 终端共享标识是指多部终端共同使用的标识, 其中包括 组标识。 然后, 无线通信网络才艮据终端共享标识建立终端共享上下文信息, 其中, 终端共享上下文信息与多部终端对应或者与终端组对应。 终端 1和 2 在入网流程中也向无线通信网络发送终端区别标识, 其中, 所述终端区别标 识用于区分具有相同终端共享标识的不同终端。 无线通信网络才艮据终端区别 标识 (和 /或与该标识关联的新分配标识) 建立终端区别上下文信息。 图 5是 居本发明优选实施例二的交互流程图一, 如图 5所示, 可以包 括以下步 4聚: 步 4聚 S502, 终端请求入网, 其中携带终端共享标识。 步骤 S504 , 无线通信网络 居接收的终端共享标识查找终端共享上下 文。 步骤 S506, 无线通信网络响应终端的接入请求, 指示终端执行简化的入 网流程。 图 6是才艮据本发明优选实施例二的交互流程图二, 如图 6所示, 可以包 括以下步 4聚: 步骤 S602, 终端请求入网, 其中携带终端共享标识加终端区别标识。 步骤 S604 , 无线通信网络 居接收的终端共享标识查找终端共享上下 文。 步 4聚 S606, 如果没有匹配的终端共享上下文信息, 则无线通信网络响应 终端的接入请求, 指示终端执行完整的接入流程的剩余部分。 步骤 S608, 如果有匹配的终端上下文信息, 则无线通信网络响应终端的 接入请求, 指示终端执行简化的入网流程的剩余部分。 下面结合实例 3和实例 4, 对上述优选实施例二的实现过程进行详细说 明。 实例 3 图 7是才艮据本发明实例 3的交互流程图, 如图 7所示, 可以包括以下步 骤: 步骤 S702 , 终端 1请求入网, 其中携带终端共享标识 a和终端区别标识
1„ 步骤 S704,无线通信网络 居终端共享标识 a查找终端共享上下文信息 , 无匹配信息。 步骤 S706, 无线通信网络响应终端 1的接入请求, 指示执行完整的接入 流程。 步骤 S708, 终端 1与无线通信网络执行完整的接入流程的剩余部分, 建 立终端共享上下文信息和终端区别上下文信息。 步骤 S710 , 终端 2请求入网, 其中携带终端共享标识 a和终端区别标识
2。 步骤 S712,无线通信网络才艮据终端共享标识 a查找终端共享上下文信息 , 有匹配信息。 步骤 S714, 无线通信网络响应终端 2的接入请求, 指示执行简化的接入 流程。 步骤 S716, 终端 2与无线通信网络执行简化的接入流程的剩余部分, 建 立终端区别上下文信息。 假设终端 1 , 2, ... ... , η ( η>1 )属于同类用户, 它们之间具有某种可信 任关系 (例如它们可能归属于同一企业用户)。 这些终端之间可能是平级的, 它们接入无线通信网络时执行的流程由其接入的先后关系而不同, 也可能是 上下级关系, 则通常是上级节点先接入无线通信网络。 支设终端 1先接入无 线通信网络, 终端在请求接入消息中携带终端共享标识 a和终端区别标识 1 , 无线通信网络才艮据终端共享标识 a查找终端共享上下文, 无匹配信息, 则无 线通信网络指示终端 1执行完整的接入流程。 终端 1 (执行完整的入网流程) 成功入网后, 则终端共享上下文信息与 终端区别上下文信息都已建立。 终端 2请求接入无线通信网络, 其中携带终端共享标识 a和终端区别标 识 2, 无线通信网络才艮据终端共享标识 a查找终端共享上下文信息, 有匹配 信息。 则无线通信网络响应终端 2的请求, 指示执行简化的入网流程。 于是 终端 2与无线通信网络通过简化的入网流程建立终端区别上下文信息。 补充说明, 终端 2请求入网时终端 1可能仍接入在无线通信网络中, 也 可能已经退出无线通信网络, 在终端 1退出时, 无线通信网络需保留终端共 享上下文信息。 在简化的入网流程中, 可能需要终端 2与终端 1进行某种形 式的联络 (终端间的通信协议可能与终端接入无线通信网络的协议不同或相 同, 终端 1可能通过广播、 组播和 /或单播的方式将终端共享上下文信息发给 终端 2 ), 以便终端 2从终端 1处接收终端共享上下文信息(其中包括安全相 关信息), 终端 2 根据接收到的终端共享上下文信息执行后续的简化入网流 程的处理。 实例 4 图 8是才艮据本发明实例 4的交互流程图, 如图 8所示, 可以包括以下步 骤: 步骤 S802, 终端 1请求入网, 其中携带终端共享标识 a。 步骤 S804,无线通信网络 居终端共享标识 a查找终端共享上下文信息 , 无匹配信息。 步骤 S806, 无线通信网络响应终端 1的接入请求, 指示执行完整的接入 流程。 步骤 S808, 终端 1与无线通信网络执行完整的接入流程的剩余部分, 建 立终端共享上下文信息和终端区别上下文信息。 步骤 S810, 终端 2请求入网, 其中携带终端共享标识&。 步骤 S812,无线通信网络才艮据终端共享标识 a查找终端共享上下文信息 , 有匹配信息。 步骤 S814, 无线通信网络响应终端 2的接入请求, 指示执行简化的接入 流程。 步骤 S816 , 终端 2与无线通信网络执行简化的接入流程的剩余部分, 建 立终端区别上下文信息。 假设终端 1 , 2 , ... ... , η ( η>1 )属于同类用户, 它们之间具有某种可信 任关系 (例如它们可能归属于同一企业用户)。 这些终端之间可能是平级的, 它们接入无线通信网络时执行的流程由其接入的先后关系而不同, 也可能是 上下级关系, 则通常是上级节点先接入无线通信网络。 支设终端 1先接入无 线通信网络, 终端在请求接入消息中携带终端共享标识 a, 无线通信网络根 据终端共享标识 a查找终端共享上下文, 无匹配信息, 则无线通信网络指示 终端 1执行完整的接入流程。 在完整的入网流程的剩余过程中, 无线通信网络建立终端共享上下文信 息, 并且终端 1发送终端区别标识 1给无线通信网络, 无线通信网络才艮据终 端区别标识 1 (和 /或与该标识关联的新分配标识) 为终端建立终端区别上下 文信息。 (执行完整的入网流程)成功入网后, 则终端共享上下文信息与终端 区别上下文信息都已建立。 终端 2请求接入无线通信网络, 其中携带终端共享标识 a, 无线通信网 络才艮据终端共享标识 a查找终端共享上下文信息, 有匹配信息。 则无线通信 网络响应终端 2的请求, 指示执行简化的入网流程。 于是终端 2与无线通信 网络执行简化的入网流程, 在这过程中, 终端 2发送终端区别标识 2给无线 通信网络, 无线通信网络根据终端区别标识 2 (和 /或与该标识关联的新分配 标识) 建立终端区别上下文信息。 补充说明, 终端 2请求入网时终端 1可能仍接入在无线通信网络中, 也 可能已经退出无线通信网络, 在终端 1退出时, 无线通信网络需保留终端共 享上下文信息。 在简化的入网流程中, 可能需要终端 2与终端 1进行某种形 式的联络 (终端间的通信协议可能与终端接入无线通信网络的协议不同或相 同, 终端 1可能通过广播、 组播和 /或单播的方式将终端共享上下文信息发给 终端 2 ), 以便终端 2从终端 1处接收终端共享上下文信息(其中包括安全相 关信息), 终端 2 根据接收到的终端共享上下文信息执行后续的简化入网流 程的处理。 以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在本 发明的精神和原则之内所作的任何修改、 等同替换和改进等, 均应包含在本 发明的保护范围之内。 需要说明的是, 在附图的流程图示出的步骤可以在诸如一组计算机可执 行指令的计算机系统中执行, 并且, 虽然在流程图中示出了逻辑顺序, 但是 在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤。 本发明实施例提供了一种, 该无线通信网络可以用于实现上述终端接入 方法。 图 9是 居本发明实施例的无线通信网络的结构框图, 包括保存模块 92 , 接收模块 94 , 建立模块 96和接入模块 98。 保存模块 92 , 用于在第一终端以其第一标识接入无线通信网络之后, 为 第一终端建立与第一标识对应的第一上下文信息; 接收模块 94 , 用于接收来 自第二终端的接入请求消息, 其中接入请求消息中携带有第二终端的第二标 识; 建立模块 96 , 连接至保存模块 92和接收模块 94 , 用于 居第一标识、 保存模块 92保存的第一上下文信息和接收模块 94接收的第二标识, 为第二 终端建立第二上下文信息; 接入模块 98 , 连接至建立模块 96 , 用于 居建 立模块 96建立的第二上下文信息进行第二终端的接入。 相关技术中, 无线通信网络不加区分的对每个终端执行接入造成很大的 非数据业务开销。 本发明实施例中, 当第一终端的第一标识与第二终端的第 二标识相关时, 为第一终端建立的第一上下文信息与为第二终端建立的第二 上下文信息相同或相近, 因此, 建立模块 96 根据第一上下文信息建立第二 上下文信息, 可以避免第一上下文信息与第二上下文信息中相同信息的重复 建立, 从而降低第二终端建立过程中无线通信网络的非数据业务开销。 需要说明的是, 装置实施例中描述的无线通信网络对应于上述的方法实 施例, 其具体的实现过程在方法实施例中已经进行过详细说明, 在此不再赞 述。 综上所述, 居本发明的上述实施例, 提供了一种终端接入方法和无线 通信网络。 通过本发明, 釆用无线通信网络根据已接入终端的上下文信息为 新接入终端建立上下文信息, 并进行该新接入终端的接入, 解决了无线通信 网络不加区分的对每个终端执行接入造成很大的非数据业务开销的问题, 可 以避免上下文信息中相同信息的重复建立, 从而降低无线通信网络的非数据 业务开销。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 或 者将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制 作成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软 件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的 ^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。

Claims

权 利 要 求 书
1. 一种终端接入方法, 其特征在于, 包括:
在第一终端接入无线通信网络之后, 所述无线通信网络保存与所述 第一终端的第一标识对应的第一上下文信息;
所述无线通信网络接收到来自第二终端的接入请求消息, 其中所述 接入请求消息中携带有所述第二终端的第二标识;
所述无线通信网络才艮据所述第一标识、 所述第一上下文信息和所述 第二标识, 为所述第二终端建立第二上下文信息; 所述无线通信网络根据所述第二上下文信息进行所述第二终端的接 入。
2. 根据权利要求 1所述的方法, 其特征在于, 所述无线通信网络根据所述 第一标识、 所述第一上下文信息和所述第二标识, 为所述第二终端建立 所述第二上下文信息包括:
在所述第一标识是所述无线通信网络在所述第一终端接入过程中分 配的动态标识时, 所述动态标识与所述第一上下文信息对应, 所述无线 通信网络自身保存有所述动态标识;
所述第二标识包括用于匹配所述动态标识的匹配部分; 所述无线通信网络判断所述匹配部分与自身保存的所述动态标识是 否相同;
如果判断结果为是, 所述无线通信网络将所述动态标识对应的第一 上下文信息作为所述第二上下文信息。
3. 根据权利要求 2所述的方法, 其特征在于, 在所述第一终端接入无线通 信网络的过程中, 还包括:
所述第一终端获取所述无线通信网络分配的所述动态标识; 所述第一终端通过广播、 组播和 /或单播发送所述动态标识。
4. 根据权利要求 3所述的方法, 其特征在于, 在所述第一终端通过广播、 组播和 /或单播发送所述动态标识之后, 还包括: 所述第二终端接收到所述动态标识;
所述第二终端将所述动态标识作为所述第二标识的匹配部分, 并将 所述第二标识携带在所述接入请求消息中发送给所述无线通信网络。
5. 根据权利要求 4所述的方法, 其特征在于, 所述第二终端为所述第一终 端的下属终端。
6. 居权利要求 1所述的方法, 其特征在于, 所述无线通信网络 居所述 第一标识、 所述第一上下文信息和所述第二标识, 为所述第二终端建立 所述第二上下文信息包括:
在所述第一标识是所述第一终端用于接入所述无线通信网络的第一 接入标识时, 所述第一接入标识对应于所述第一上下文信息, 所述无线 通信网络自身保存有所述第一接入标识;
所述第二标识是所述第二终端用于接入所述无线通信网络的第二接 入标识;
所述无线通信网络按照预设的规则获取所述第一接入标识中的第一 共享标识, 其中所述第一共享标识对应所述第一上下文信息中的第一共 享部分;
所述无线通信网络按照预设的规则获取所述第二接入标识中的第二 共享标识, 其中所述第二共享标识对应所述第二上下文信息中的第二共 享部分;
所述无线通信网络判断所述第一共享标识与所述第二共享标识是否 相同;
如果判断结果为是, 所述无线通信网络将所述第一共享部分作为所 述第二共享部分, 并 -据所述第二共享部分建立所述第二上下文信息。
7. 根据权利要求 6所述的方法, 其特征在于, 在所述第二接入标识还包括 第二区别标识时, 所述无线通信网络才艮据所述第一标识、 所述第一上下 文信息和所述第二标识, 为所述第二终端建立所述第二上下文信息还包 括:
所述无线通信网络 居所述第二区别标识建立所述第二上下文信息 中的第二区别部分; 所述无线通信网络将所述第二共享部分和所述第二区别部分结合作 为所述第二上下文信息。
8. 根据权利要求 7所述的方法, 其特征在于, 在所述第一终端与所述第二 终端处于相同的组时, 所述第一终端将所述组的标识作为所述第一共享 标识, 所述第二终端将所述组的标识作为所述第二共享标识。
9. 才艮据权利要求 1至 8中任一项所述的方法, 其特征在于, 所述无线通信 网络 居所述第一标识、 所述第一上下文信息和所述第二标识, 为所述 第二终端建立所述第二上下文信息还包括: 如果所述第一标识与所述第二标识不满足权利要求 2至 5中任一项 所述的关系, 并且所述第一标识与所述第二标识不满足权利要求 6至 8 中任一项所述的关系, 所述无线通信网络为所述第二终端建立第二上下 文信息。
10. 根据权利要求 9所述的方法, 其特征在于, 所述无线通信网络包括以下 至少之一: 控制站、 网关。
11. 根据权利要求 9所述的方法, 其特征在于, 所述第一终端和所述第二终 端均包括: 物联网终端。
12. 一种无线通信网络, 其特征在于, 包括:
保存模块, 用于在第一终端接入所述无线通信网络之后, 保存与所 述第一终端的第一标识对应的第一上下文信息;
接收模块, 用于接收来自第二终端的接入请求消息, 其中所述接入 请求消息中携带有所述第二终端的第二标识;
建立模块, 用于 居所述第一标识、 所述第一上下文信息和所述第 二标识, 为所述第二终端建立第二上下文信息;
接入模块,用于根据所述第二上下文信息进行所述第二终端的接入。
PCT/CN2010/078776 2010-06-29 2010-11-16 终端接入方法和无线通信网络 WO2012000271A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP10853974.3A EP2590367B1 (en) 2010-06-29 2010-11-16 Method for terminal access and wireless communication network
US13/806,284 US9392530B2 (en) 2010-06-29 2010-11-16 Terminal access method and radio communication network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010220405.8 2010-06-29
CN201010220405.8A CN102316416B (zh) 2010-06-29 2010-06-29 终端接入方法和无线通信网络

Publications (1)

Publication Number Publication Date
WO2012000271A1 true WO2012000271A1 (zh) 2012-01-05

Family

ID=45401350

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/078776 WO2012000271A1 (zh) 2010-06-29 2010-11-16 终端接入方法和无线通信网络

Country Status (4)

Country Link
US (1) US9392530B2 (zh)
EP (1) EP2590367B1 (zh)
CN (1) CN102316416B (zh)
WO (1) WO2012000271A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9392530B2 (en) 2010-06-29 2016-07-12 Zte Corporation Terminal access method and radio communication network

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9294423B2 (en) 2013-03-15 2016-03-22 Sorenson Communications, Inc. Communication systems and related methods for notifying devices having a plurality of unique identifiers about missed communications
US9325753B2 (en) 2013-03-15 2016-04-26 Sorenson Communications, Inc. User interface for creating and administering a user group, and methods of operating such
US9204088B2 (en) 2013-03-15 2015-12-01 Sorenson Communications, Inc. Systems including and methods of operating communication devices assigned individual and group identities
US9491205B2 (en) * 2013-03-15 2016-11-08 Sorenson Communications, Inc. Communication systems and related methods for communicating with devices having a plurality of unique identifiers
US9742711B2 (en) 2013-03-15 2017-08-22 Sorenson Ip Holdings, Llc Communication systems and related methods for notifying devices having a plurality of unique identifiers about missed communications
US10082934B2 (en) 2013-03-15 2018-09-25 Sorenson Ip Holdings Llc Systems, methods, and devices for replacing a contact entry corresponding to a communication device with a contact entry corresponding to a user group
CN104540119B (zh) * 2014-12-12 2017-12-26 京信通信系统(中国)有限公司 一种基于x2代理的基站间通信方法及装置
CN104918301B (zh) * 2015-05-20 2018-05-01 广东欧珀移动通信有限公司 一种mesh网络添加设备的方法及网格网络门户接入装置
JP6997707B2 (ja) * 2016-07-01 2022-01-18 株式会社Nttドコモ 無線通信システム及び無線通信方法
CN108617014A (zh) * 2017-01-23 2018-10-02 中国移动通信有限公司研究院 一种业务承载建立方法和网络设备
CN110268798B (zh) * 2018-01-05 2022-06-24 深圳市大疆创新科技有限公司 通信控制方法、控制系统、配件和计算机可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5239577A (en) * 1990-12-03 1993-08-24 Bell Communications Research, Inc. Network and method for providing cross-media connections
WO2006069479A1 (fr) * 2004-12-28 2006-07-06 Utstarcom Telecom Co., Ltd. Procede et systeme de realisation d'une convergence de plusieurs liaisons dans un systeme umts
CN1937828A (zh) * 2005-09-23 2007-03-28 展讯通信(上海)有限公司 移动通信系统中减小呼叫建立时延的方法
CN1964293A (zh) * 2005-11-10 2007-05-16 中兴通讯股份有限公司 一种终端无线接入方法及其系统

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2375261B (en) * 2001-04-30 2004-10-13 Nokia Corp Radiotelephone system
GB0421408D0 (en) * 2004-09-25 2004-10-27 Koninkl Philips Electronics Nv Registration of a mobile station in a communication network
JP4598494B2 (ja) * 2004-11-26 2010-12-15 富士通株式会社 利用者仮識別子を用いるネットワークサービスシステム
CN101855919B (zh) * 2007-09-10 2016-01-20 诺基亚通信公司 封闭订户组的访问控制
US8477811B2 (en) * 2008-02-02 2013-07-02 Qualcomm Incorporated Radio access network (RAN) level keep alive signaling
US8379512B2 (en) * 2008-09-18 2013-02-19 Qualcomm Incorporated Using identifier mapping to resolve access point identifier ambiguity
US8369281B2 (en) * 2008-11-24 2013-02-05 At&T Intellectual Property I, L.P. Cell-to-WiFi switcher
US8954077B2 (en) * 2009-05-04 2015-02-10 Qualcomm Incorporated Access mode-based access control
US10045198B2 (en) * 2009-06-25 2018-08-07 Telefonaktiebolaget Lm Ericsson (Publ) Core network node selection in radiocommunication systems having home gateways
US9307402B2 (en) * 2010-03-25 2016-04-05 Nokia Solutions And Networks Oy Method of protecting an identity of a mobile station in a communications network
CN102215474B (zh) * 2010-04-12 2014-11-05 华为技术有限公司 对通信设备进行认证的方法和装置
CN102244855B (zh) * 2010-05-10 2015-04-15 华为技术有限公司 一种基于位置的机器对机器通信方法、系统和装置
WO2011147462A1 (en) * 2010-05-28 2011-12-01 Nokia Siemens Networks Oy Method and apparatus for device-to-device communications
CN102316416B (zh) 2010-06-29 2016-07-27 中兴通讯股份有限公司 终端接入方法和无线通信网络

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5239577A (en) * 1990-12-03 1993-08-24 Bell Communications Research, Inc. Network and method for providing cross-media connections
WO2006069479A1 (fr) * 2004-12-28 2006-07-06 Utstarcom Telecom Co., Ltd. Procede et systeme de realisation d'une convergence de plusieurs liaisons dans un systeme umts
CN1937828A (zh) * 2005-09-23 2007-03-28 展讯通信(上海)有限公司 移动通信系统中减小呼叫建立时延的方法
CN1964293A (zh) * 2005-11-10 2007-05-16 中兴通讯股份有限公司 一种终端无线接入方法及其系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9392530B2 (en) 2010-06-29 2016-07-12 Zte Corporation Terminal access method and radio communication network

Also Published As

Publication number Publication date
EP2590367A1 (en) 2013-05-08
CN102316416A (zh) 2012-01-11
EP2590367A4 (en) 2016-12-07
CN102316416B (zh) 2016-07-27
US20130100870A1 (en) 2013-04-25
US9392530B2 (en) 2016-07-12
EP2590367B1 (en) 2019-09-18

Similar Documents

Publication Publication Date Title
WO2012000271A1 (zh) 终端接入方法和无线通信网络
CN109842906B (zh) 一种通信的方法、装置及系统
US10313997B2 (en) User equipment registration method for network slice selection and network controller and network communication system using the same
US20220124147A1 (en) Application relocation method and apparatus
CN110800331B (zh) 网络验证方法、相关设备及系统
US9848282B2 (en) Method for communicating with other devices, and communication device
CN110830925B (zh) 一种用户群组的会话管理方法及装置
US20230171618A1 (en) Communication method and apparatus
US20190014531A1 (en) Network Access Permission Management Method and Related Device
US8887253B2 (en) Method of assigning a user key in a convergence network
CN111901135A (zh) 一种数据分析方法及装置
US8665849B2 (en) Methods and systems for implementing inter-network roam, querying and attaching network
US9130823B2 (en) Apparatus and method for configuring personal network using PN routing table
CN108632307B (zh) 一种会话连接建立方法以及smf实体
EP2838250B1 (en) Method, device and system for allocating phone number
US20230164234A1 (en) Service continuity event notification method, and apparatus
JP2013175916A5 (zh)
US9705903B2 (en) Call control device, call control method, and call control system
US9338648B2 (en) Method and system for managing authentication of a mobile terminal
US8208902B2 (en) Communication system, authentication server, and communication method
US9420465B2 (en) Method and apparatus for device collaboration via a hybrid network
WO2011120365A1 (zh) 多穴终端建立连接的方法和系统
CN102209012A (zh) 一种终端实现连接建立的方法及系统
JP2014175826A (ja) 無線通信システム、無線通信方法および無線通信プログラム
CN107659673B (zh) 设备通信方法、装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10853974

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 13806284

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2010853974

Country of ref document: EP