WO2018165909A1 - 接入禁止方法、装置以及通信系统 - Google Patents

接入禁止方法、装置以及通信系统 Download PDF

Info

Publication number
WO2018165909A1
WO2018165909A1 PCT/CN2017/076790 CN2017076790W WO2018165909A1 WO 2018165909 A1 WO2018165909 A1 WO 2018165909A1 CN 2017076790 W CN2017076790 W CN 2017076790W WO 2018165909 A1 WO2018165909 A1 WO 2018165909A1
Authority
WO
WIPO (PCT)
Prior art keywords
parameters
parameter
access
check
access prohibition
Prior art date
Application number
PCT/CN2017/076790
Other languages
English (en)
French (fr)
Inventor
贾美艺
史玉龙
周华
Original Assignee
富士通株式会社
贾美艺
史玉龙
周华
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社, 贾美艺, 史玉龙, 周华 filed Critical 富士通株式会社
Priority to PCT/CN2017/076790 priority Critical patent/WO2018165909A1/zh
Priority to CN201780084770.0A priority patent/CN110249695A/zh
Priority to JP2019545782A priority patent/JP6798623B2/ja
Publication of WO2018165909A1 publication Critical patent/WO2018165909A1/zh
Priority to US16/393,429 priority patent/US11546834B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/02Hybrid access techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0215Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • the present invention relates to the field of communications, and in particular, to an access prohibition method, apparatus, and communication system.
  • the Access Class Barring (ACB) is based on the type of access attempt. (such as the data initiated by the terminal or the signaling initiated by the terminal) and the access prohibition mechanism of the access class (AC, Access Class) to which the UE (User Equipment) belongs; "ACB skip” is to allow the multimedia phone (MMTEL, Multi) Media Telephony) High-priority access barring mechanism for voice and/or video and Short Message Service (SMS); Service Specific Access Control (SSAC) is MMTEL voice and/or video The access prohibition mechanism of the initiated session; Extended Access Barring (EAB) is a specific access prohibition mechanism of Machine Type Communication (MTC); "AB for NB-IoT” is based on cellular Narrow Band Internet of Things (NB-IoT) specific access barring mechanism; application-specific data communication congestion control (ACDC, Application spec The ific Congestion control for Data Communication) is an access prohibition mechanism for
  • NR new radio
  • RAN2 Radio Access Network
  • RRC Radio Resource Control
  • RRC_IDLE idle state
  • RRC_CONNECTED connected state
  • RRC_INACTIVE inactive state
  • the embodiments of the present invention provide an access prohibition method, apparatus, and communication system.
  • an access barring device comprising:
  • An inspection unit that performs an access barring check or a determination of an access level using parameters defined for the new wireless system.
  • an access barring method wherein the method includes:
  • the user equipment performs an access barring check or a determination of the access level using parameters defined for the new radio system.
  • a communication system comprising a network device and a user equipment, the user equipment having the apparatus of the first aspect described above.
  • an optional parameter is provided for the unified access control mechanism defined by the NR, thereby simplifying the access mechanism and ensuring the omnidirectional state of the terminal. compatible.
  • FIG. 1 is a schematic diagram of an access barring technique in an LTE system
  • FIG. 2 is a schematic diagram of an access prohibition method of Embodiment 1;
  • FIG. 3 is a schematic diagram of an access prohibition apparatus of Embodiment 2;
  • FIG. 4 is a schematic diagram of a user equipment of Embodiment 2;
  • Fig. 5 is a schematic diagram of a communication system of the third embodiment.
  • a base station may be referred to as an access point, a broadcast transmitter, a Node B, an evolved Node B (eNB), etc., and may include some or all of their functions.
  • the term "base station” will be used herein. Each base station provides communication coverage for a particular geographic area.
  • a mobile station or device may be referred to as a "user equipment.”
  • a UE may be fixed or mobile and may also be referred to as a mobile station, terminal, access terminal, subscriber unit, station, and the like.
  • the UE may be a cellular telephone, a personal digital assistant (PDA), a wireless modem, a wireless communication device, a handheld device, a laptop computer, a cordless telephone, a car, and the like.
  • PDA personal digital assistant
  • FIG. 2 is a schematic diagram of the method. As shown in FIG. 2, the method includes:
  • Step 201 The user equipment performs an Access Barring check or an Access Category determination using parameters defined for the new wireless (NR) system.
  • the possible parameters are defined for the unified access control mechanism defined by RAN2 as NR. Therefore, the access prohibition control can be implemented by using only one parameter or two parameters, which simplifies the access control. The process is compatible with all the states of the UE.
  • the parameters defined for the NR system apply to all states of the UE, as described above. State, connected state, inactive state. Therefore, it is not necessary to consider the RRC state to select a specific access barring mechanism, that is, the control of the access barring is implemented.
  • different RRC states may use the same parameter, or different parameters may be used. For the same parameter, the same value may be set, or different values may be set.
  • the parameters are the same or different, and in the case of the same parameters, the parameter values may be the same or different. Therefore, different PLMNs and/or different network slices can be distinguished by different parameters as needed, and different PLMNs and/or network slices can be distinguished by different parameter values of the same parameter, thereby further simplifying the access process.
  • PLMNs Public Land Mobile Networks
  • network slices can be distinguished by different parameters as needed, and different PLMNs and/or network slices can be distinguished by different parameter values of the same parameter, thereby further simplifying the access process.
  • the parameter is defined from the perspective of a use case and a scenario.
  • the parameter may be a UE related parameter, or may be a service related parameter, or may be a UE related parameter and a service related parameter.
  • the combination that is, includes both UE related parameters and service related parameters.
  • the UE related parameters herein are, for example, parameters defined by considering factors such as, but not limited to, device types, such as low-cost devices, and the like, and contracted service types, such as global access, motion zones, and the like.
  • the service-related parameters herein are, for example, parameters defined by considering the following factors, including but not limited to: services, such as voice, video, etc.; applications, such as QQ initiation, Microsoft Network Service (MSN, Microsoft Service Network) initiation, WeChat (WeChat) initiation Etc.; call type, such as emergency call, terminal initiated signaling, etc.; quality of service (QoS) and/or flow identification (ID).
  • services such as voice, video, etc.
  • applications such as QQ initiation, Microsoft Network Service (MSN, Microsoft Service Network) initiation, WeChat (WeChat) initiation Etc.
  • call type such as emergency call, terminal initiated signaling, etc.
  • QoS quality of service
  • ID flow identification
  • parameters that may be used in the NR unified access control mechanism may be defined, and the UE may use the parameters.
  • the access prohibition check or the determination of the access level is performed, thereby simplifying the access mechanism.
  • the parameter is defined from the perspective of change and/or update, for example, the parameter may be a static parameter, a dynamic parameter, or a combination of static parameters and dynamic parameters. That is, it contains both static parameters and dynamic parameters.
  • the static parameters here refer to parameters that are statically changed, such as parameters written in the Subscriber Identification Module (SIM) and/or the Universal Subscriber Identity Module (USIM).
  • SIM Subscriber Identification Module
  • USIM Universal Subscriber Identity Module
  • OAM operation management and maintenance
  • Operation Administration and Maintenance indicates parameters that are changed and/or updated, such as parameters that are changed and/or updated only when the RRC state changes.
  • the dynamic parameters here are, for example, Internet Protocol (IP) flow level changes and/or updated parameters.
  • IP Internet Protocol
  • the parameters that may be used in the NR unified access control mechanism may be defined, and the UE may use the parameter to perform an access prohibition check or determine an access level, thereby simplifying the access mechanism.
  • the parameter is defined from the perspective of the model, for example, the parameter may be a parameter provided by an upper layer, or may be a parameter provided by an access layer (AS, Access Stratum), or It is a combination of the parameters provided by the upper layer and the parameters provided by the AS, that is, both the parameters provided by the upper layer and the parameters provided by the AS.
  • the parameters provided by the upper layer are, for example, parameters provided by the non-access stratum (NAC, non-access stratum) and/or the application layer
  • the parameters provided by the AS are, for example, parameters that the upper layer does not provide an indication.
  • the parameters that may be used in the NR unified access control mechanism can be defined.
  • the access prohibition check or the determination of the access level can be performed, thereby simplifying the access mechanism.
  • the parameter is defined from the perspective of prohibiting the check, for example, the parameter may be a bitmap-related parameter, or may be a factor-related parameter, or It is a combination of parameters related to the bit pattern and factors related to the factor, that is, both the parameters related to the bitmap and the parameters related to the factor.
  • the network device can inform the user equipment of the corresponding bitmap, for example, for each bit, "0" indicates prohibition and "1" indicates passage.
  • different RRC states may correspond to different bitmaps, but the embodiment is not limited thereto.
  • each bit in the bitmap, may correspond to one of the parameters listed in the above three embodiments, or a combination of multiple parameters, such as each UE related parameter or each service related parameter. For example, other parameters that are not listed may be used. This embodiment is not limited thereto, as long as the prohibition or passage of information corresponding to each bit can be indicated by the bitmap.
  • the network device may define a factor between 0 and 1 according to a predetermined policy, such as a network congestion condition, and notify the user equipment of the factor, and the user equipment acquires a random number by itself. If the random number is less than the factor, it is checked as "pass”, otherwise the check is "disabled".
  • a predetermined policy such as a network congestion condition
  • different UEs may be provided with a factor for use by these UEs, or a factor may be provided for different services for these services, but this embodiment is not limited thereto.
  • the network device can define a factor of 0.1 and inform the user
  • the user equipment generates a random number.
  • the random number is less than 0.1, the user equipment can access the network or send information and/or data to the network device, so that only up to 10% of the users can access the network device. Or send data to a network device.
  • the network device can define a factor of 0.9 and inform the user equipment; the user equipment generates a random number, and if the random number is less than 0.9, the user equipment can access the network or Data is transmitted to the network device, whereby up to 90% of the users are able to access or send information and/or data to the network device.
  • the above definition of the parameter from different angles through the four embodiments describes the parameters defined for the unified access control mechanism of the NR.
  • the above parameters may be used for inputting the access prohibition mechanism. That is, the access prohibition check can be performed by using the above parameters to determine whether the request is sent to the network (pass or disable); in another embodiment, the above parameters can be used as different dimensions of the access level, that is, through the above parameters. Any combination can determine the access level, and then decide whether the request is sent to the network (pass or disable) according to the access level or perform other processing according to the access level.
  • the access prohibition check is performed on how to use the parameters defined above.
  • the access prohibition check may be performed only according to the foregoing parameters, or the access prohibition check may be performed in combination with the system information, depending on Implementation, this embodiment does not limit this.
  • the access prohibition check using the parameters defined above only one of the parameters defined by the above four embodiments may be used, or the parameters defined by the above four embodiments may be used in combination, depending on Implementation, no restrictions here.
  • the parameters defined by the above four embodiments may be arbitrarily combined as a multi-dimensional parameter for determining the access level by determining the access level by using the parameters defined above.
  • the definition of the access level is not limited. For example, for the access level, the following considerations may be made: 1) each access attempt is mapped to an "access level" in different RRC states; 2) When performing an access barring check, only the "access level" is considered.
  • the definition of the access level can be the same as the existing standard or a possible definition of future development.
  • the user equipment may determine the next action according to the check result.
  • the user equipment can be immediately disabled, no request is sent to the network device, and a period of time can be prohibited. After the time The request is sent to the network device; the time may be defined by the protocol or may be configured by the network.
  • the user equipment may immediately pass the request to the network device, or may pass after a period of time, that is, After sending the request to the network device for a period of time, the request may also be sent when the certain conditions are met, that is, the network device is sent when the certain conditions are met; the time may be defined by the protocol or configured by the network; The conditions can be either protocol-defined or network-configured.
  • the user equipment may further check parameters of the same level or all remaining parameters or parameters specified by the network, thereby determining This access request is forbidden or allowed.
  • parameters that may be used in the NR unified access control mechanism may be defined, and the UE may use the parameter to perform an access prohibition check or determine an access level.
  • Simplified access mechanism using one or two parameters.
  • the embodiment of the present invention provides an access prohibition device.
  • the principle of the device is similar to that of the first embodiment. Therefore, the specific implementation may refer to the implementation of the method in the first embodiment. .
  • the apparatus 300 includes: an checking unit 301, which performs an access prohibition check or an access level using parameters defined for the NR system. Ok.
  • the parameters defined for the NR system are applicable to all RRC states, the different RRC states use the same parameters or different parameters, the same parameters set the same value or set different values, and, for different PLMNs And / or network slicing, the parameters can be the same or different, in the case of the same parameters, the parameter values are the same or different.
  • the parameter may be a UE related parameter and/or a service related parameter
  • the checking unit 301 may perform an access prohibition check or a determination of an access level using the UE related parameter and/or the service related parameter.
  • the UE related parameter is defined according to any one or any combination of the following: a device type and a subscription service type; the service related parameter is defined according to any one or any combination of the following: a service type and an application type. , call type, quality of service, and/or flow ID.
  • the parameter may be a static parameter and/or a dynamic parameter
  • the checking unit 301 may use the static parameter and/or the dynamic parameter to perform an access prohibition check or a determination of an access level.
  • the static parameter includes any one or any combination of the following: parameters written to the SIM and/or USIM, parameters that are changed and/or updated only when OAM is indicated, changes and/or updates only when the RRC state changes.
  • the parameter includes: a change in the IP flow level and/or an updated parameter.
  • the parameter may be a parameter provided by an upper layer and/or a parameter provided by an AS, and the checking unit 301 performs an access prohibition check or an access level using the parameter provided by the upper layer and/or the parameter provided by the AS. determine.
  • the parameters provided by the upper layer include any one or any combination of the following: parameters provided by the NAS, parameters provided by the application layer; and parameters provided by the AS include: parameters not provided by the upper layer.
  • the parameter may be a bitmap-related parameter and/or a factor-related parameter
  • the checking unit 301 performs an access prohibition check or access using the bitmap-related parameter and/or the factor-related parameter. The determination of the level.
  • the apparatus 300 may further include: a processing unit 302, which prohibits or prohibits a period of time immediately after the result of the access prohibition check of the checking unit 301 is prohibited or suspended; The result of the access prohibition check is passed immediately after passing or recovering, or passing after a certain period of time or when certain conditions are met.
  • the checking unit 301 may further perform an access prohibition check on parameters of the same level or all remaining parameters or parameters specified by the network after performing the access prohibition check of the corresponding parameter.
  • parameters that may be used in the NR unified access control mechanism may be defined, and the UE may use the parameter to perform an access prohibition check or determine an access level. Simplified access mechanism.
  • This embodiment provides a user equipment, where the user equipment includes the foregoing access prohibition apparatus.
  • FIG. 4 is a schematic diagram of a user equipment 400 in accordance with an embodiment of the present invention.
  • the user device 400 can include a processor 401 and a memory 402; the memory 402 is coupled to the processor 401.
  • the figure is exemplary; other types of structures may be used in addition to or in place of the structure to implement telecommunications functions or other functions.
  • the aforementioned functions of the access barring device may be integrated into the processor 401.
  • the processor 401 can be configured to: perform an access prohibition check using parameters defined for the new wireless system or Determine the access level.
  • the foregoing access barring device may be configured separately from the processor 401.
  • the foregoing access barring device may be configured as a chip connected to the processor 401, and the foregoing is implemented by the control of the processor 401. Access to the function of the prohibited device.
  • the user equipment 400 may further include: a communication module 403, an input unit 404, a display 405, and a power source 406. It should be noted that the user equipment 400 does not necessarily have to include all the components shown in FIG. 4; in addition, the user equipment 400 may further include components not shown in FIG. 4, and reference may be made to the prior art.
  • processor 401 may include a microprocessor or other processor device and/or logic device that receives input and controls various components of user device 400. operating.
  • the memory 402 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable medium, a volatile memory, a non-volatile memory, or other suitable device.
  • Various data can be stored, and programs for executing related information can be stored.
  • the processor 401 can execute the program stored by the memory 402 to implement information storage or processing and the like.
  • the functions of other components are similar to those of the existing ones and will not be described here.
  • the various components of user device 400 may be implemented by special purpose hardware, firmware, software, or a combination thereof without departing from the scope of the invention.
  • parameters that may be used in the NR unified access control mechanism may be defined, and the UE may use the parameter to perform an access prohibition check or determine an access level. This simplifies the access mechanism.
  • This embodiment provides a communication system, including a network device and a user equipment.
  • FIG. 5 is a schematic structural diagram of a communication system according to an embodiment of the present invention.
  • the communication system 500 includes a network device 501 and a user equipment 502.
  • the network device 501 may be a base station.
  • the combination and functions of the base station are not limited in this embodiment.
  • the user equipment 502 may be the user equipment 400 described in Embodiment 2.
  • parameters that may be used in the NR unified access control mechanism may be defined, and the UE may use the parameter to perform an access prohibition check or an access level. OK, thereby simplifying the access mechanism.
  • the embodiment of the present invention further provides a computer readable program, wherein when the program is executed in an access prohibiting device or a user equipment, the program causes the access prohibiting device or user equipment to perform the method described in Embodiment 1 Access barring method.
  • the embodiment of the present invention further provides a storage medium storing a computer readable program, wherein the computer readable program causes an access prohibition device or a user equipment to perform the access prohibition method described in Embodiment 1.
  • the above apparatus and method of the present invention may be implemented by hardware or by hardware in combination with software.
  • the present invention relates to a computer readable program that, when executed by a logic component, enables the logic component to implement the apparatus or components described above, or to cause the logic component to implement the various methods described above Or steps.
  • the present invention also relates to a storage medium for storing the above program, such as a hard disk, a magnetic disk, an optical disk, a DVD, a flash memory, or the like.
  • the access barring method in the access barring apparatus described in connection with the embodiment of the present invention may be directly embodied as hardware, a software module executed by the processor, or a combination of both.
  • one or more of the functional block diagrams shown in FIG. 3 and/or one or more combinations of functional block diagrams may correspond to individual software modules of a computer program flow, or to individual hardware modules.
  • These software modules may correspond to the respective steps shown in FIG. 1, respectively.
  • These hardware modules can be implemented, for example, by curing these software modules using a Field Programmable Gate Array (FPGA).
  • FPGA Field Programmable Gate Array
  • the software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art.
  • a storage medium can be coupled to the processor to enable the processor to read information from, and write information to, the storage medium; or the storage medium can be an integral part of the processor.
  • the processor and the storage medium can be located in an ASIC.
  • the software module can be stored in the memory of the mobile terminal or in a memory card that can be inserted into the mobile terminal.
  • the software module can be stored in the MEGA-SIM card or a large-capacity flash memory device.
  • One or more of the functional block diagrams described with respect to FIG. 3 and/or one or more combinations of functional block diagrams may be implemented as a general purpose processor, digital signal processor (DSP), dedicated for performing the functions described herein.
  • DSP digital signal processor
  • ASIC integrated circuit
  • FPGA field programmable gate array
  • One or more and/or one or more combinations of functional blocks may also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more in combination with DSP communications Microprocessor or any other such configuration.

Abstract

一种接入禁止方法、装置以及通信系统,该方法包括:用户设备使用为新无线(NR)系统定义的参数进行接入禁止检查或者进行接入等级的确定。所述参数适用于所有无线资源控制(RRC)状态。对于不同的公共陆地移动网络(PLMN)和/或网络切片,所述参数相同或不同。通过本发明实施例,为NR系统所定义的统一的接入控制机制提供了可选的参数,由此,简化了接入机制,并保证了终端状态的全向兼容。

Description

接入禁止方法、装置以及通信系统 技术领域
本发明涉及通信领域,特别涉及一种接入禁止方法、装置以及通信系统。
背景技术
在长期演进(LTE,Long Term Evolution)系统中,有多种接入禁止(AB,Access Barring)技术,如图1所示,接纳等级禁止(ACB,Access Class Barring)是基于接入尝试的类型(如终端发起的数据或终端发起的信令)和终端(UE,User Equipment)所属的接入等级(AC,Access Class)的接入禁止机制;“ACB skip”是允许多媒体电话(MMTEL,Multi Media Telephony)语音和/或视频以及短信息服务(SMS,Short Message Service)的高优先级的接入禁止机制;业务特定的接入控制(SSAC,Service Specific Access Control)是MMTEL语音和/或视频发起的会话的接入禁止机制;扩展的接入禁止(EAB,Extended Access Barring)是机器类型通信(MTC,Machine Type Communication)特定的接入禁止机制;“AB for NB-IoT”是基于蜂窝的窄带物联网(Narrow Band Internet of Things,NB-IoT)特定的接入禁止机制;应用特定的数据通信拥塞控制(ACDC,Application specific Congestion control for Data Communication)是终端内运营商确定的特定应用的接入禁止机制。
应该注意,上面对技术背景的介绍只是为了方便对本发明的技术方案进行清楚、完整的说明,并方便本领域技术人员的理解而阐述的。不能仅仅因为这些方案在本发明的背景技术部分进行了阐述而认为上述技术方案为本领域技术人员所公知。
发明内容
发明人发现,在新无线(NR,New Radio)系统里,无线接入网(RAN,Radio Access Network)第二工作组(RAN2)同意为NR定义一个统一的接入控制机制,用以处理LTE里定义的所有用例和场景,并能处理未来可能的用例和/或场景。此外,RAN2定义的这个统一的接入控制机制适用于NR的所有无线资源控制协议(RRC,Radio Resource Control)状态,例如,空闲态(RRC_IDLE)、连接态(RRC_CONNECTED),以及非活动态(RRC_INACTIVE)。因此,该接入控制机制所使用的参数是业界的研 究方向。
针对上述问题,本发明实施例提供一种接入禁止方法、装置以及通信系统。
根据本实施例的第一方面,提供了一种接入禁止装置,其中,所述装置包括:
检查单元,其使用为新无线系统定义的参数进行接入禁止检查或者进行接入等级的确定。
根据本实施例的第二方面,提供了一种接入禁止方法,其中,所述方法包括:
用户设备使用为新无线系统定义的参数进行接入禁止检查或者进行接入等级的确定。
根据本实施例的第三方面,提供了一种通信系统,所述通信系统包括网络设备和用户设备,所述用户设备具有前述第一方面所述的装置。
本发明实施例的有益效果在于:通过本发明实施例,为NR所定义的统一的接入控制机制提供了可选的参数,由此,简化了接入机制,并保证了终端状态的全向兼容。
参照后文的说明和附图,详细公开了本发明的特定实施方式,指明了本发明的原理可以被采用的方式。应该理解,本发明的实施方式在范围上并不因而受到限制。在所附权利要求的条款的范围内,本发明的实施方式包括许多改变、修改和等同。
针对一种实施方式描述和/或示出的特征可以以相同或类似的方式在一个或更多个其它实施方式中使用,与其它实施方式中的特征相组合,或替代其它实施方式中的特征。
应该强调,术语“包括/包含”在本文使用时指特征、整件、步骤或组件的存在,但并不排除一个或更多个其它特征、整件、步骤或组件的存在或附加。
附图说明
在本发明实施例的一个附图或一种实施方式中描述的元素和特征可以与一个或更多个其它附图或实施方式中示出的元素和特征相结合。此外,在附图中,类似的标号表示几个附图中对应的部件,并可用于指示多于一种实施方式中使用的对应部件。
所包括的附图用来提供对本发明实施例的进一步的理解,其构成了说明书的一部分,用于例示本发明的实施方式,并与文字描述一起来阐释本发明的原理。显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。在附图中:
图1是LTE系统中的接入禁止技术的示意图;
图2是实施例1的接入禁止方法的示意图;
图3是实施例2的接入禁止装置的示意图;
图4是实施例2的用户设备的示意图;
图5是实施例3的通信系统的示意图。
具体实施方式
参照附图,通过下面的说明书,本发明的前述以及其它特征将变得明显。在说明书和附图中,具体公开了本发明的特定实施方式,其表明了其中可以采用本发明的原则的部分实施方式,应了解的是,本发明不限于所描述的实施方式,相反,本发明包括落入所附权利要求的范围内的全部修改、变型以及等同物。下面结合附图对本发明的各种实施方式进行说明。这些实施方式只是示例性的,不是对本发明的限制。
在本申请中,基站可以被称为接入点、广播发射机、节点B、演进节点B(eNB)等,并且可以包括它们的一些或所有功能。在文中将使用术语“基站”。每个基站对特定的地理区域提供通信覆盖。
在本申请中,移动站或设备可以被称为“用户设备”。UE可以是固定的或移动的,并且也可以称为移动台、终端、接入终端、用户单元、站等。UE可以是蜂窝电话、个人数字助理(PDA)、无线调制解调器、无线通信设备、手持设备、膝上型计算机、无绳电话、汽车等。
下面结合附图对本发明实施例进行说明。
实施例1
本实施例提供了一种接入禁止方法,图2是该方法的示意图,如图2所示,该方法包括:
步骤201:用户设备使用为新无线(NR)系统定义的参数进行接入禁止(Access Barring)检查或者接入等级(Access Category)的确定。
在本实施例中,对RAN2为NR定义的统一的接入控制机制定义了可能的参数,由此,仅使用一个参数或两个参数即可实现接入禁止的控制,简化了接入控制的流程,且兼容了UE所有的状态。
在本实施例中,为NR系统定义的参数适用于UE的所有状态,如前所述的空闲 态、连接态、非活动态。由此,不需要考虑RRC状态来选择特定的接入禁止机制,即实现了接入禁止的控制。并且,在本实施例中,不同的RRC状态可以使用相同的参数,也可以使用不同的参数,对于相同的参数,可以设置相同的值,也可以设置不同的值。
在本实施例中,对于不同的公共陆地移动网络(PLMN,Public Land Mobile Network)和/或网络切片,所述参数相同或不同,在参数相同的情况下,参数值可以相同也可以不同。由此,可以根据需要通过不同的参数来区分不同的PLMN和/或不同的网络切片,也可以通过相同的参数不同的参数值来区分不同的PLMN和/或网络切片,进一步简化接入流程。
在本实施例的一个实施方式中,从用例和场景的角度对该参数进行了定义,例如,该参数可以是UE相关参数,也可以是业务相关参数,或者是UE相关参数和业务相关参数的组合,也即,既包含了UE相关参数,又包含了业务相关参数。这里的UE相关参数例如为考虑以下因素定义的参数,包括但不限于:设备类型,如低成本设备等;签约服务类型,如全球通、动感地带等。这里的业务相关参数例如为考虑以下因素定义的参数,包括但不限于:业务,如语音、视频等;应用,如QQ发起、微软网络服务(MSN,Microsoft Service Network)发起、微信(WeChat)发起等;通话类型,如紧急呼叫、终端发起的信令等;服务质量(QoS)和/或流标识(ID)等。
由此,使用上述一个(UE相关参数或业务相关参数)或两个(UE相关参数和业务相关参数)参数,可以定义NR统一的接入控制机制里可能用到的参数,UE利用该参数可以进行接入禁止检查或者进行接入等级的确定,由此简化了接入机制。
在本实施例的另一个实施方式中,从改变和/或更新的角度对该参数进行了定义,例如,该参数可以是静态参数,也可以是动态参数,或者是静态参数和动态参数的组合,也即,既包含了静态参数,又包含了动态参数。这里的静态参数是指静态变化的参数,例如写入客户识别模块(SIM,Subscriber Identification Module)和/或全球用户身份模块(USIM,Universal Subscriber Identity Module)的参数,再例如仅操作管理维护(OAM,Operation Administration and Maintenance)指示时改变和/或更新的参数,再例如仅RRC状态改变时改变和/或更新的参数等。这里的动态参数例如为互联网协议(IP,Internet Protocol)流级别的改变和/或更新的参数等。
由此,使用上述一个(静态参数或动态参数)或两个参数(静态参数和动态参数), 可以定义NR统一的接入控制机制里可能用到的参数,UE利用该参数可以进行接入禁止检查或者进行接入等级的确定,由此简化了接入机制。
在本实施例的另一个实施方式中,从模型的角度对该参数进行了定义,例如,该参数可以是上层提供的参数,也可以是接入层(AS,Access Stratum)提供的参数,或者是上层提供的参数和AS提供的参数的组合,也即,既包含了上层提供的参数又包含了AS提供的参数。这里,上层提供的参数例如为非接入层(NAC,Non-access stratum)和/或应用层提供的参数等,AS提供的参数例如为上层不提供指示的参数等。
由此,使用上述一个(上层提供的参数或AS提供的参数)或两个参数(上层提供的参数和AS提供的参数),可以定义NR统一的接入控制机制里可能用到的参数,UE利用该参数可以进行接入禁止检查或者进行接入等级的确定,由此简化了接入机制。
在本实施例的另一个实施方式中,从禁止检查的角度对该参数进行了定义,例如,该参数可以是比特图(bitmap)相关的参数,也可以是因数(factor)相关的参数,或者是比特图相关的参数和因数相关的参数的组合,也即,既包含了比特图相关的参数,又包含了因数相关的参数。
在本实施方式中,如果使用比特图相关的参数,则网络设备可以将相应的比特图告知用户设备,例如,对于每个比特位,“0”表示禁止,“1”表示通过。在本实施方式中,不同的RRC状态可以对应不同的比特图,但本实施例并不以此作为限制。在本实施方式中,在该比特图中,每个比特位可以对应上面三个实施例里列举的某一种参数,或多种参数的组合,例如每种UE相关参数或每种业务相关参数等,也可以是其他未列出的参数,本实施例并不以此作为限制,只要能通过该比特图指示对应各比特位的信息的禁止或通过即可。
在本实施方式中,如果使用因数相关的参数,则网络设备可以根据预定策略,例如网络拥塞情况定义一个0~1之间的因数,并将该因数告知用户设备,用户设备自己获取一个随机数,如果随机数小于该因数,则检查为“通过”,否则检查为“禁止”。在本实施方式中,可以为不同的UE提供一个因数供这些UE使用,也可以为不同的业务提供一个因数供这些业务使用,但本实施例并不以此作为限制。
在一个例子中,网络拥塞严重,则网络设备可以定义因数0.1并将其告知用户设 备;用户设备生成一个随机数,在该随机数小于0.1的情况下,该用户设备可以接入网络或向网络设备发送信息和/或数据,由此只有最多10%的用户能够接入网络设备或向网络设备发送数据。
在另一个例子中,网络拥塞不严重,则网络设备可以定义因数0.9并将其告知用户设备;用户设备生成一个随机数,在该随机数小于0.9的情况下,该用户设备可以接入网络或向网络设备发送数据,由此,有最多90%的用户能够接入网络设备或向网络设备发送信息和/或数据。
以上通过四个实施方式从不同角度对该参数进行定义对为NR的统一的接入控制机制定义的参数做了说明,在一个实施方式中,上述参数可以用于接入禁止机制的输入,也即利用上述参数可以进行接入禁止的检查,用于决定请求是否发送给网络(通过或禁止);在另一个实施方式中,上述参数可以用作接入等级的不同维度,也即通过上述参数的任意组合,可以确定接入等级,进而根据接入等级决定请求是否发送给网络(通过或禁止)或者根据接入等级进行其他处理。
在上述一个实施方式中,对于如何利用上述定义好的参数进行接入禁止检查不作限制,例如,可以仅根据上述参数进行接入禁止检查,也可以结合系统信息进行接入禁止检查,具体取决于实现,本实施例对此不作限制。并且,对于利用上述定义好的参数进行接入禁止检查,可以仅使用上述四个实施方式所定义的参数中的一种,也可以将上述四个实施方式所定义的参数结合使用,具体取决于实现,在此不作限制。
在上述另一个实施方式中,对于利用上述定义好的参数进行接入等级的确定,可以将上述四个实施方式所定义的参数进行任意组合,作为一个多维的参数,用来确定接入等级。在本实施例中,对接入等级的定义不作限制,例如,对于接入等级,可以有以下考虑:1)不同RRC状态下每个接入尝试都映射到一个“接入等级”;2)执行接入禁止检查时,仅考虑“接入等级”。关于接入等级的定义,可以与现有标准相同,也可以采用未来发展的可能的定义。
在本实施例中,在完成相应参数的接入禁止检查或接入等级确定之后,该用户设备可以根据检查结果决定下一步的动作。
例如,如果检查结果为禁止(对应连接态或空闲态)或挂起(对应非活动状态),则该用户设备可以立即禁止,不向网络设备发送任何请求,也可以禁止一段时间,该时间过后再向网络设备发送请求;该时间可以是协议定义的,也可以是网络配置的。
再例如,如果检查结果为通过(对应连接态或空闲态)或恢复(对应非活动状态),则该用户设备可以立即通过,向网络设备发送请求,也可以在一段时间之后通过,也即过一段时间再向网络设备发送请求,还可以在满足一定条件时通过,也即在满足一定条件的情况下向网络设备发送请求;这里的时间可以是协议定义的,也可以是网络配置的;这里的条件可以是协议定义的,也可以是网络配置的。
在本实施例中,在完成了相应参数的接入禁止检查或接入等级确定之后,该用户设备还可以继续检查相同等级的参数或所有余下的参数或网络指定的参数,由此,可以确定该接入请求被禁止或允许。
通过本实施例的方法,使用一个或两个参数,可以定义NR统一的接入控制机制里可能用到的参数,UE利用该参数可以进行接入禁止检查或者进行接入等级的确定,由此简化了接入机制。
实施例2
本实施例提供了一种接入禁止装置,由于该装置解决问题的原理与实施例1的方法类似,因此其具体的实施可以参考实施例1的方法的实施,内容相同之处不再重复说明。
图3是本实施例的接入禁止装置的示意图,如图3所示,该装置300包括:检查单元301,该检查单元301使用为NR系统定义的参数进行接入禁止检查或者进行接入等级的确定。
在本实施例中,为NR系统定义的参数适用于所有RRC状态,不同的RRC状态使用相同的参数或不同的参数,相同的参数设置相同的值或者设置不同的值,并且,对于不同的PLMN和/或网络切片,该参数可以相同,也可以不同,在参数相同的情况下,参数值相同或不同。
在一个实施方式中,该参数可以是UE相关参数和/或业务相关参数,检查单元301可以使用该UE相关参数和/或业务相关参数进行接入禁止检查或者进行接入等级的确定。
在本实施方式中,该UE相关参数是根据以下任意一种或任意组合定义的:设备类型、签约服务类型;该业务相关参数是根据以下任意一种或任意组合定义的:业务类型、应用类型、通话类型、服务质量和/或流ID。
在另一个实施方式中,该参数可以是静态参数和/或动态参数,检查单元301可以使用该静态参数和/或动态参数进行接入禁止检查或者进行接入等级的确定。
在本实施方式中,该静态参数包括以下任意一种或任意组合:写入SIM和/或USIM的参数、仅OAM指示时改变和/或更新的参数、仅RRC状态改变时改变和/或更新的参数;该动态参数包括:IP流级别的改变和/或更新的参数。
在另一个实施方式中,该参数可以是上层提供的参数和/或AS提供的参数,检查单元301使用该上层提供的参数和/或AS提供的参数进行接入禁止检查或者进行接入等级的确定。
在本实施方式中,上层提供的参数包括以下任意一种或任意组合:NAS提供的参数,应用层提供的参数;AS提供的参数包括:上层不提供指示的参数。
在另一个实施方式中,该参数可以是比特图相关的参数和/或因数相关的参数,检查单元301使用该比特图相关的参数和/或因数相关的参数进行接入禁止检查或者进行接入等级的确定。
在本实施例中,如图3所示,该装置300还可以包括:处理单元302,其在检查单元301的接入禁止检查的结果为禁止或挂起后,立即禁止或禁止一段时间;在接入禁止检查的结果为通过或恢复后,立即通过或经过一段时间后通过或满足一定条件时通过。
在本实施例中,该检查单元301还可以在进行了相应参数的接入禁止检查后,继续对相同等级的参数或所有余下的参数或网络指定的参数进行接入禁止检查。
通过本实施例的装置,使用一个或两个参数,可以定义NR统一的接入控制机制里可能用到的参数,UE利用该参数可以进行接入禁止检查或者进行接入等级的确定,由此简化了接入机制。
本实施例提供了一种用户设备,该用户设备包括前述的接入禁止装置。
图4是本发明实施例的用户设备400的示意图。如图4所示,该用户设备400可以包括处理器(processor)401和存储器402;存储器402耦合到处理器401。值得注意的是,该图是示例性的;还可以使用其他类型的结构,来补充或代替该结构,以实现电信功能或其他功能。
在一个实施方式中,前述的接入禁止装置的功能可以被集成到处理器401中。其中,处理器401可以被配置为:使用为新无线系统定义的参数进行接入禁止检查或者 进行接入等级的确定。
在另一个实施方式中,前述的接入禁止装置可以与处理器401分开配置,例如可以将前述的接入禁止装置配置为与处理器401连接的芯片,通过处理器401的控制来实现前述的接入禁止装置的功能。
如图4所示,该用户设备400还可以包括:通信模块403、输入单元404、显示器405、电源406。值得注意的是,用户设备400也并不是必须要包括图4中所示的所有部件;此外,用户设备400还可以包括图4中没有示出的部件,可以参考现有技术。
如图4所示,处理器401有时也称为控制器或操作控件,可以包括微处理器或其他处理器装置和/或逻辑装置,该处理器401接收输入并控制用户设备400的各个部件的操作。
其中,存储器402,例如可以是缓存器、闪存、硬驱、可移动介质、易失性存储器、非易失性存储器或其它合适装置中的一种或更多种。可储存各种数据,此外还可存储执行有关信息的程序。并且处理器401可执行该存储器402存储的该程序,以实现信息存储或处理等。其他部件的功能与现有类似,此处不再赘述。用户设备400的各部件可以通过专用硬件、固件、软件或其结合来实现,而不偏离本发明的范围。
通过本实施例的用户设备,使用一个或两个参数,可以定义NR统一的接入控制机制里可能用到的参数,UE利用该参数可以进行接入禁止检查或者进行接入等级的确定,由此简化了接入机制。
实施例3
本实施例提供一种通信系统,包括网络设备以及用户设备。
图5是本发明实施例的通信系统的构成示意图,如图5所示,该通信系统500包括网络设备501以及用户设备502。其中,网络设备501可以是基站,本实施例对该基站的组合和功能不作限制;用户设备502可以是实施例2中所述的用户设备400。
由于在前述实施例中,已经对用户设备400进行了详细说明,其内容被合并于此,此处不再赘述。
通过本实施例的通信系统,使用一个或两个参数,可以定义NR统一的接入控制机制里可能用到的参数,UE利用该参数可以进行接入禁止检查或者进行接入等级的 确定,由此简化了接入机制。
本发明实施例还提供一种计算机可读程序,其中当在接入禁止装置或用户设备中执行所述程序时,所述程序使得所述接入禁止装置或用户设备执行实施例1所述的接入禁止方法。
本发明实施例还提供一种存储有计算机可读程序的存储介质,其中所述计算机可读程序使得接入禁止装置或用户设备执行实施例1所述的接入禁止方法。
本发明以上的装置和方法可以由硬件实现,也可以由硬件结合软件实现。本发明涉及这样的计算机可读程序,当该程序被逻辑部件所执行时,能够使该逻辑部件实现上文所述的装置或构成部件,或使该逻辑部件实现上文所述的各种方法或步骤。本发明还涉及用于存储以上程序的存储介质,如硬盘、磁盘、光盘、DVD、flash存储器等。
结合本发明实施例描述的在接入禁止装置中的接入禁止方法可直接体现为硬件、由处理器执行的软件模块或二者组合。例如,图3中所示的功能框图中的一个或多个和/或功能框图的一个或多个组合,既可以对应于计算机程序流程的各个软件模块,亦可以对应于各个硬件模块。这些软件模块,可以分别对应于图1所示的各个步骤。这些硬件模块例如可利用现场可编程门阵列(FPGA)将这些软件模块固化而实现。
软件模块可以位于RAM存储器、闪存、ROM存储器、EPROM存储器、EEPROM存储器、寄存器、硬盘、移动磁盘、CD-ROM或者本领域已知的任何其它形式的存储介质。可以将一种存储介质耦接至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息;或者该存储介质可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。该软件模块可以存储在移动终端的存储器中,也可以存储在可插入移动终端的存储卡中。例如,若设备(例如移动终端)采用的是较大容量的MEGA-SIM卡或者大容量的闪存装置,则该软件模块可存储在该MEGA-SIM卡或者大容量的闪存装置中。
针对图3描述的功能框图中的一个或多个和/或功能框图的一个或多个组合,可以实现为用于执行本申请所描述功能的通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或其它可编程逻辑器件、分立门或晶体管逻辑器件、分立硬件组件、或者其任意适当组合。针对图3描述的功能框图中 的一个或多个和/或功能框图的一个或多个组合,还可以实现为计算设备的组合,例如,DSP和微处理器的组合、多个微处理器、与DSP通信结合的一个或多个微处理器或者任何其它这种配置。
以上结合具体的实施方式对本发明进行了描述,但本领域技术人员应该清楚,这些描述都是示例性的,并不是对本发明保护范围的限制。本领域技术人员可以根据本发明的原理对本发明做出各种变型和修改,这些变型和修改也在本发明的范围内。

Claims (20)

  1. 一种接入禁止装置,其中,所述装置包括:
    检查单元,其使用为新无线系统定义的参数进行接入禁止检查或者进行接入等级的确定。
  2. 根据权利要求1所述的装置,其中,所述参数适用于所有无线资源控制(RRC)状态,不同的RRC状态使用相同的参数或不同的参数,相同的参数设置相同的值或者设置不同的值。
  3. 根据权利要求1所述的装置,其中,对于不同的公共陆地移动网络(PLMN)和/或网络切片,所述参数相同或不同,在参数相同的情况下,参数值相同或不同。
  4. 根据权利要求1所述的装置,其中,所述参数为用户设备(UE)相关参数和/或业务相关参数,所述检查单元使用UE相关参数和/或业务相关参数进行接入禁止检查或者进行接入等级的确定。
  5. 根据权利要求4所述的装置,其中,
    所述UE相关参数是根据以下任意一种或任意组合定义的:设备类型、签约服务类型;
    所述业务相关参数是根据以下任意一种或任意组合定义的:业务类型、应用类型、通话类型、服务质量和/或流标识。
  6. 根据权利要求1所述的装置,其中,所述参数为静态参数和/或动态参数,所述检查单元使用静态参数和/或动态参数进行接入禁止检查或者进行接入等级的确定。
  7. 根据权利要求6所述的装置,其中,
    所述静态参数包括以下任意一种或任意组合:写入客户识别模块(SIM)和/或全球用户身份模块(USIM)的参数、仅操作管理维护(OAM)指示时改变和/或更新的参数、仅无线资源控制(RRC)状态改变时改变和/或更新的参数;
    所述动态参数包括:互联网协议(IP)流级别的改变和/或更新的参数。
  8. 根据权利要求1所述的装置,其中,所述参数为上层提供的参数和/或接入层(AS)提供的参数,所述检查单元使用上层提供的参数和/或AS提供的参数进行接入禁止检查或者进行接入等级的确定。
  9. 根据权利要求8所述的装置,其中,
    上层提供的参数包括以下任意一种或任意组合:NAS提供的参数,应用层提供的参数;
    AS提供的参数包括:上层不提供指示的参数。
  10. 根据权利要求1所述的装置,其中,所述参数为比特图相关的参数和/或因数相关的参数,所述检查单元使用比特图相关的参数和/或因数相关的参数进行接入禁止检查或者进行接入等级的确定。
  11. 根据权利要求1所述的装置,其中,所述装置还包括:
    处理单元,其在所述检查单元的接入禁止检查的结果为禁止或挂起后,立即禁止或禁止一段时间;在接入禁止检查的结果为通过或恢复后,立即通过或经过一段时间后通过或满足一定条件时通过。
  12. 根据权利要求1所述的装置,其中,所述检查单元在进行了相应参数的接入禁止检查后,继续对相同等级的参数或所有余下的参数或网络指定的参数进行接入禁止检查。
  13. 一种接入禁止方法,其中,所述方法包括:
    用户设备使用为新无线系统定义的参数进行接入禁止检查或者进行接入等级的确定。
  14. 根据权利要求13所述的方法,其中,所述参数为用户设备(UE)相关参数和/或业务相关参数,使用为新无线系统定义的参数进行接入禁止检查或者进行接入等级的确定,包括:
    使用UE相关参数和/或业务相关参数进行接入禁止检查或者进行接入等级的确定。
  15. 根据权利要求13所述的方法,其中,所述参数为静态参数和/或动态参数,使用为新无线系统定义的参数进行接入禁止检查或者进行接入等级的确定,包括:
    使用静态参数和/或动态参数进行接入禁止检查或者进行接入等级的确定。
  16. 根据权利要求13所述的方法,其中,所述参数为上层提供的参数和/或接入层(AS)提供的参数,使用为新无线系统定义的参数进行接入禁止检查或者进行接入等级的确定,包括:
    使用上层提供的参数和/或AS提供的参数进行接入禁止检查或者进行接入等级 的确定。
  17. 根据权利要求13所述的方法,其中,所述参数为比特图相关的参数和/或因数相关的参数,使用为新无线系统定义的参数进行接入禁止检查或者进行接入等级的确定,包括:
    使用比特图相关的参数和/或因数相关的参数进行接入禁止检查或者进行接入等级的确定。
  18. 根据权利要求13所述的方法,其中,所述方法还包括:
    所述用户设备在接入禁止检查的结果为禁止或挂起后,立即禁止或禁止一段时间;在接入禁止检查的结果为通过或恢复后,立即通过或经过一段时间后通过或满足一定条件时通过。
  19. 根据权利要求13所述的方法,其中,所述方法还包括:
    所述用户设备在进行了相应参数的接入禁止检查后,继续对相同等级的参数或所有余下的参数或网络指定的参数进行接入禁止检查。
  20. 一种通信系统,所述通信系统包括网络设备和用户设备,所述用户设备具有权利要求1-12任一项所述的装置。
PCT/CN2017/076790 2017-03-15 2017-03-15 接入禁止方法、装置以及通信系统 WO2018165909A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2017/076790 WO2018165909A1 (zh) 2017-03-15 2017-03-15 接入禁止方法、装置以及通信系统
CN201780084770.0A CN110249695A (zh) 2017-03-15 2017-03-15 接入禁止方法、装置以及通信系统
JP2019545782A JP6798623B2 (ja) 2017-03-15 2017-03-15 アクセス禁止方法、装置及び通信システム
US16/393,429 US11546834B2 (en) 2017-03-15 2019-04-24 Access barring method and apparatus and communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076790 WO2018165909A1 (zh) 2017-03-15 2017-03-15 接入禁止方法、装置以及通信系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/393,429 Continuation US11546834B2 (en) 2017-03-15 2019-04-24 Access barring method and apparatus and communication system

Publications (1)

Publication Number Publication Date
WO2018165909A1 true WO2018165909A1 (zh) 2018-09-20

Family

ID=63522697

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076790 WO2018165909A1 (zh) 2017-03-15 2017-03-15 接入禁止方法、装置以及通信系统

Country Status (4)

Country Link
US (1) US11546834B2 (zh)
JP (1) JP6798623B2 (zh)
CN (1) CN110249695A (zh)
WO (1) WO2018165909A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210076303A1 (en) * 2018-05-17 2021-03-11 Huawei Technologies Co., Ltd. Access control method, communications device, and base station

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10863415B2 (en) * 2017-05-06 2020-12-08 Qualcomm Incorporated Unified access control

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103096495A (zh) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法和系统
WO2013176121A1 (ja) * 2012-05-22 2013-11-28 株式会社エヌ・ティ・ティ・ドコモ ネットワークアクセス規制方法、移動機及びプロセッサ

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3478286A (en) 1965-07-01 1969-11-11 Ibm System for automatically testing computer memories
US20090029698A1 (en) * 2007-07-25 2009-01-29 Research In Motion Limited Apparatus, and associated method, for facilitating mobile network selection by a gan-connected wireless device
CN102761933B (zh) * 2011-04-29 2018-04-10 中兴通讯股份有限公司 Eab处理方法及装置、接入处理方法、装置及系统
CN102892173B (zh) * 2011-07-22 2018-01-05 中兴通讯股份有限公司 一种业务被禁止发起或被释放后的处理方法及用户终端
CN103096416A (zh) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法、装置及系统
GB2499189B (en) * 2012-01-31 2014-02-12 Broadcom Corp Method and apparatus for informing UE about access barring
EP2901759B1 (en) * 2012-05-14 2020-04-01 Nokia Solutions and Networks Oy Extended access barring for csg cells
CN105165065B (zh) * 2013-05-03 2019-11-12 华为技术有限公司 接入控制方法及装置
CN105519167B (zh) * 2013-07-04 2020-01-14 韩国电子通信研究院 移动通信系统中用于支持多连接的控制方法和用于支持多连接的设备
US9538540B2 (en) * 2014-03-06 2017-01-03 Mediatek Inc. Smart congestion control for RRC connected mode in LTE systems
US9980299B2 (en) 2014-03-24 2018-05-22 Intel IP Corporation Use of an OMA management object to support application-specific congestion control in mobile networks
US10111166B2 (en) * 2014-07-30 2018-10-23 Lg Electronics Inc. Method and apparatus for performing access control for WLAN interworking in wireless communication system
CN105813134B (zh) * 2014-12-30 2020-01-03 杭州华为数字技术有限公司 频率优先级调整方法和装置
US10362510B2 (en) * 2015-03-12 2019-07-23 Lg Electronics Inc. Method and terminal for controlling network traffic in wireless communication system
US10306688B2 (en) * 2015-03-24 2019-05-28 Lg Electronics Inc. Method and MTC device for performing MMTEL service
KR102394199B1 (ko) * 2015-05-26 2022-05-04 삼성전자주식회사 무선 통신 시스템에서 랜덤 액세스를 수행하기 위한 방법 및 장치
CN110235470B (zh) * 2016-11-25 2022-03-11 瑞典爱立信有限公司 用于控制到电信网络的无线电接入连接的方法和设备
KR20190108117A (ko) * 2017-01-23 2019-09-23 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 접속 방법 및 단말

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103096495A (zh) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法和系统
WO2013176121A1 (ja) * 2012-05-22 2013-11-28 株式会社エヌ・ティ・ティ・ドコモ ネットワークアクセス規制方法、移動機及びプロセッサ

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CATT: "Consideration on Access Control Mechanism", 3GPP TSG RAN WG2 MEETING AD HOC R2-1700216, 19 January 2017 (2017-01-19), XP051202719 *
INTEL CORPORATION: "Considerations on the design aspects for NR access control", 3GPP TSG RAN WG2 MEETING #97 R2-1701740, 17 February 2017 (2017-02-17), XP051212313 *
ZTE: "Consideration on the access control in NR", 3GPP TSG-RAN WG2 NR AD HOC R2-1700151, 19 January 2017 (2017-01-19), XP051203858 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210076303A1 (en) * 2018-05-17 2021-03-11 Huawei Technologies Co., Ltd. Access control method, communications device, and base station
US11641616B2 (en) * 2018-05-17 2023-05-02 Huawei Technologies Co., Ltd. Access control method, communications device, and base station

Also Published As

Publication number Publication date
CN110249695A (zh) 2019-09-17
US20190253953A1 (en) 2019-08-15
JP2020509692A (ja) 2020-03-26
JP6798623B2 (ja) 2020-12-09
US11546834B2 (en) 2023-01-03

Similar Documents

Publication Publication Date Title
US11678259B2 (en) Network slice selection method, terminal device, and network device
JP5767326B2 (ja) セルラネットワークにおけるセル・バーリングのための方法及びプログラム
CN102300285B (zh) 接入控制方法和设备
US9432971B2 (en) Method and system for radio resource control
CN110519709B (zh) 上下文管理方法及装置
AU2017413023A1 (en) Communication method and related apparatus
EP3823345A1 (en) Granular network access control and methods thereof
RU2610422C2 (ru) Расширенный запрет доступа, управляемый сетью, для пользовательских устройств с множеством услуг
KR20180031821A (ko) 모바일 네트워크에서 애플리케이션 특정 혼잡 제어를 지원하기 위한 oma 관리 오브젝트의 사용
US20200084613A1 (en) Status switching method and apparatus
US11057824B2 (en) Access control method and device
US11778591B2 (en) Method for selecting a plurality of carriers and related device
EP2561708A1 (en) Method and apparatus for determining access point service capabilities
US10034197B2 (en) Method and apparatus for performing congestion mitigation and barring
CN109327882B (zh) 接入控制方法、通信设备和具有存储功能的设备
WO2018219253A1 (zh) 一种接入控制方法及装置
JP7389225B2 (ja) セキュリティ保護モードを決定するための方法および装置
CN113055972B (zh) 无线通信中的会话处理方法及终端设备
WO2019232757A1 (zh) 一种发送业务请求的方法、装置及系统
TWI751265B (zh) 接入方法和終端
TWI700957B (zh) 一種確定建立原因的方法和終端
WO2018165909A1 (zh) 接入禁止方法、装置以及通信系统
EP3791508A1 (en) Determining whether a cell can guarantee at least one data transmission parameter
CN116711458A (zh) 信息传输方法及通信装置
CN117377065A (zh) 无线通信方法、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17900658

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019545782

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17900658

Country of ref document: EP

Kind code of ref document: A1