WO2019024276A1 - Access control method, communication device, and device with storage function - Google Patents

Access control method, communication device, and device with storage function Download PDF

Info

Publication number
WO2019024276A1
WO2019024276A1 PCT/CN2017/107974 CN2017107974W WO2019024276A1 WO 2019024276 A1 WO2019024276 A1 WO 2019024276A1 CN 2017107974 W CN2017107974 W CN 2017107974W WO 2019024276 A1 WO2019024276 A1 WO 2019024276A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
category
access control
mapping relationship
status
Prior art date
Application number
PCT/CN2017/107974
Other languages
French (fr)
Inventor
Xin XIA
Original Assignee
Jrd Communication (Shenzhen) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jrd Communication (Shenzhen) Ltd filed Critical Jrd Communication (Shenzhen) Ltd
Publication of WO2019024276A1 publication Critical patent/WO2019024276A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0268Traffic management, e.g. flow control or congestion control using specific QoS parameters for wireless networks, e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • Embodiments of the present disclosure generally relate to communication technology, and in particular relate to an access control method, a communication device, and a device with a storage function.
  • a user equipment When accessing a network, a user equipment needs to execute an access decision to determine whether to allow a service request to be initiated and to avoid overloading the network end.
  • the commonly used access control mechanisms include ACB (Access Class Barred) , SSAC (Service Specific Access Control) , EAB (Extended Access Barring) , and ACDC (Application Specific Congestion Control for Data Communication) .
  • ACB mechanism performs the access control mainly based on the access class of the user equipment
  • SSAC is mainly for the access control of multimedia voice and video services
  • EAB is mainly for the access control of a large number of machine type equipment in an Internet of things
  • ACDC is mainly for the access control of specific applications.
  • the application scenarios of the above-mentioned access control mechanisms are limited, and the hybrid access control mechanism in the existing communication system is liable to increase the burden on the user equipment.
  • the technical problem to be solved by the present disclosure is to provide an access control method, a communication device, and a device with a storage function, which can solve the problem that the hybrid access control mechanism is liable to increase the burden on the user equipment.
  • the first technical solution adopted by the present disclosure is to provide an access control method, including: receiving a downlink message from a base station through an user equipment, the downlink message including an access control mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship; and performing an access control utilizing the access category obtained by matching.
  • the second technical solution adopted by the present disclosure is to provide an access control method, including: generating an access control mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; and sending a downlink message to an user equipment, the downlink message including the access control mapping relationship such that the user equipment utilizes an access category corresponded by an access parameter of an uplink message to be sent matched in the access control mapping relationship to perform an access control.
  • the third technical solution adopted by the present disclosure is to provide an access control method, including: generating a mapping relationship between a QoS flow ID and /or at least one auxiliary factor and a service category; and sending a mapping notification message to a base station to cause the base station to generate an access control mapping relationship, wherein the notification message includes the mapping relationship between the QoS flow ID and /or at least one auxiliary factor and the service category.
  • the fourth technical solution adopted by the present disclosure is to provide a communication device, including: a processor and a communication circuit, the processor connects the communication circuit; the processor is configured to execute instructions so as to implement the method as described above.
  • the fifth technical solution adopted by the present disclosure is to provide a device with a storage function, storing instructions, wherein the instructions are executed to implement the method as described above.
  • the sixth technical solution adopted by the present disclosure is to provide a communication device, including: a communication module configured to receive a downlink message from a base station through an user equipment, the downlink message including an access control mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; a matching module configured to match the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship; and a control module configured to perform an access control utilizing the access category obtained by matching.
  • the seventh technical solution adopted by the present disclosure is to provide a communication device, including: a mapping module configured to generate an access control mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; and a communication module configured to send a downlink message to an user equipment, the downlink message including the access control mapping relationship such that the user equipment utilizes an access category corresponded by an access parameter of an uplink message to be sent matched in the access control mapping relationship to perform an access control.
  • the eighth technical solution adopted by the present disclosure is to provide a communication device, including: a mapping module configured to generate a mapping relationship between a QoS flow ID and /or at least one auxiliary factor and a service category; and a communication module configured to send a mapping notification message to a base station to cause the base station to generate an access control mapping relationship, wherein the notification message includes the mapping relationship between the QoS flow ID and /or at least one auxiliary factor and the service category.
  • the user equipment receives a downlink message from the base station, where the downlink message includes a mapping relationship between an access parameter and an access category; matching the access category corresponded by the access parameter of the uplink message to be sent in the access control mapping relation, and performing an access control utilizing the access category obtained by matching.
  • the user equipment can perform the access control by merely obtaining the access category corresponded by the uplink message to be sent in the access control mapping relationship.
  • the embodiment of the present disclosure could reduce the burden of the user equipment and improve the access control efficiency.
  • FIG. 1 is a schematic diagram of a QoS architecture of an NR system according to the prior art.
  • FIG. 2 is a flow chart of a first embodiment of an access control method according to the present disclosure.
  • FIG. 3 is a schematic diagram of a communication process between a base station and a user equipment in the first embodiment of the access control method according to the present disclosure.
  • FIG. 4 is a flow chart of a second embodiment of an access control method according to the present disclosure.
  • FIG. 5 is a schematic diagram of an access control mapping relationship in the second embodiment of the access control method according to the present disclosure.
  • FIG. 6 is a flow chart of a third embodiment of an access control method according to the present disclosure.
  • FIG. 7 is a flow chart of a fourth embodiment of an access control method according to the present disclosure.
  • FIG. 8 is a schematic diagram of an access control mapping relationship in the fourth embodiment of the access control method according to the present disclosure.
  • FIG. 9 is a detailed flow chart of block S126 in FIG. 7.
  • FIG. 10 is a flow chart of a fifth embodiment of an access control method according to the present disclosure.
  • FIG. 11 is a flow chart of a sixth embodiment of an access control method according to the present disclosure.
  • FIG. 12 is a flow chart of a seventh embodiment of an access control method according to the present disclosure.
  • FIG. 13 is a detailed flow chart of block S134 in FIG. 12.
  • FIG. 14 is a flow chart of an eighth embodiment of an access control method according to the present disclosure.
  • FIG. 15 is a flow chart of a ninth embodiment of an access control method according to the present disclosure.
  • FIG. 16 is a schematic diagram of a mapping matrix in the ninth embodiment of the access control method according to the present disclosure.
  • FIG. 17 is a flow chart of a tenth embodiment of an access control method according to the present disclosure.
  • FIG. 18 is a flow chart of an eleventh embodiment of an access control method according to the present disclosure.
  • FIG. 19 is a schematic diagram of a mapping matrix in the eleventh embodiment of the access control method according to the present disclosure.
  • FIG. 20 is a flow chart of a twelfth embodiment of an access control method according to the present disclosure.
  • FIG. 21 is a flow chart of a thirteenth embodiment of an access control method according to the present disclosure.
  • FIG. 22 is a flow chart of a fourteenth embodiment of an access control method according to the present disclosure.
  • FIG. 23 is a flow chart of a fifteenth embodiment of an access control method according to the present disclosure.
  • FIG. 24 is a flow chart of a sixteenth embodiment of an access control method according to the present disclosure.
  • FIG. 25 is a schematic diagram of a communication process between a user equipment, a base station, and a core network in the sixteenth embodiment of the access control method according to the present disclosure.
  • FIG. 26 is a schematic diagram of a mapping relationship between a QoS flow ID and a service category in the sixteenth embodiment of the access control method according to the present disclosure.
  • FIG. 27 is a flow chart of a seventeenth embodiment of an access control method according to the present disclosure.
  • FIG. 28 is a detailed flow chart of block S213 in FIG. 27.
  • FIG. 29 is a schematic diagram of a mapping relationship between a service category generated by a base station, a combination of a service category and an auxiliary factor, and an access category in the seventeenth embodiment of the access control method according to the present disclosure.
  • FIG. 30 is a flow chart of an eighteenth embodiment of an access control method according to the present disclosure.
  • FIG. 31 is a detailed flow chart of block S31 in FIG. 30.
  • FIG. 32 is a schematic diagram of the structure of a first embodiment of a communication device according to the present disclosure.
  • FIG. 33 is a schematic diagram of the structure of a second embodiment of a communication device according to the present disclosure.
  • FIG. 34 is a schematic diagram of the structure of a third embodiment of a communication device according to the present disclosure.
  • FIG. 35 is a schematic diagram of the structure of a fourth embodiment of a communication device according to the present disclosure.
  • FIG. 36 is a schematic diagram of the structure of a fifth embodiment of a communication device according to the present disclosure.
  • FIG. 37 is a schematic diagram of the structure of a sixth embodiment of a communication device according to the present disclosure.
  • FIG. 38 is a schematic diagram of a first embodiment of a device with a storage function according to the present disclosure.
  • FIG. 39 is a schematic diagram of a second embodiment of a device with a storage function according to the present disclosure.
  • FIG. 40 is a schematic diagram of a third embodiment of a device with a storage function according to the present disclosure.
  • a core network establishes at least one PDU (Protocol Data Unit) session for each user equipment.
  • An access network establishes one or more data radio bearer (DRB) for each PDU session, and establishes at least one default DRB for each PDU session established by the core network.
  • DRB data radio bearer
  • the access network maps packets belonging to different PDU sessions to different DRBs.
  • the non-access layer packet filters of the user equipment and the core network associate the uplink and downlink packets with a QoS flow.
  • the access layer in the user equipment and the access network implement a mapping relation between the data radio bearer (DRB) as well as the uplink and downlink QoS flow.
  • DRB data radio bearer
  • the access network maps the QoS flow to the DRB according to a QoS flow ID and an associated QoS configuration file
  • the user equipment utilizes the QoS flow ID to perform an uplink grouping.
  • the QoS flow is the most basic QoS granularity. Therefore, the system can perform an access control basing on the QoS flow ID in order to prevent overload and ensure the service quality.
  • an execution main body of the first embodiment of the access control method of the present disclosure is a user equipment.
  • the user equipment may be fixed or portable, and may be a cell phone, a personal digital assistant (PDA) , a desktop computer, a tablet computer, a notebook computer, a cordless telephone, or the like.
  • the method may include the following blocks.
  • the downlink message may be a radio resource control message or a system broadcast message, or other type of message
  • the access category may be pre-defined, the amount of the access categories and the specific access category may be defined basing on actual needs, which is not specifically limited herein.
  • the access parameter is a relevant parameter required for the user equipment to perform an access decision, which includes a QoS flow ID and /or at least one auxiliary factor.
  • the auxiliary factor is a status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
  • the base station maps the QoS flow ID (QFI) and the access category (AC) corresponded by at least one existing QoS flow, thereby generating the access control mapping relationship.
  • the base station can map the QFI corresponded by a same type of QoS flow to a same AC basing on an operator's strategy, for example, mapping the data flow of a video service to the same AC, and so on.
  • the base station may send the downlink message to the user equipment according to its own load condition so as to update the access control mapping relationship.
  • the base station may send the downlink message to the user equipment through broadcast manner, or may send the downlink message to the user equipment through a certain idle channel, which is not specifically limited herein.
  • the access parameter may also only include at least one auxiliary factor, and the base station may map at least one auxiliary factor, such as the user equipment priority of 1 and the service category of video, to an access category 2.
  • the base station may also perform mapping basing on other mapping criteria, for example, mapping the QFI corresponded by the QoS flow with a same QoS requirement to a same AC, or the like, and when the base station generates the access control mapping relationship, other factors (metrics) such as the roaming status and the priority of the user equipment can also be considered, or a traffic category (TC) can be added to map the QFI to the TC first, and then map the TC to the AC, which is not specifically limited herein.
  • mapping criteria for example, mapping the QFI corresponded by the QoS flow with a same QoS requirement to a same AC, or the like, and when the base station generates the access control mapping relationship, other factors (metrics) such as the roaming status and the priority of the user equipment can also be considered, or a traffic category (TC) can be added to map the QFI to the TC first, and then map the TC to the AC, which is not specifically limited herein.
  • TC traffic category
  • the user equipment can utilize an uplink reflective QoS mapping to obtain the same QoS flow ID as the downlink, that is, the user equipment monitors the QoS flow ID of the downlink and applies the same mapping in the uplink, for each DRB.
  • the user equipment can be in an idle status, in which the downlink message is received when it is ready to send a service request to the base station, or the downlink message may be received after the connection with the base station becomes successful.
  • the QFI in the downlink message is obtained, which can be mapped to the uplink message to be sent, where the QFI of the uplink message to be sent is the same as the QFI of the downlink message.
  • the access category corresponded by the QFI of the uplink message in the access control mapping relationship is searched first, that is, the AC having the mapping relationship with the QFI of the uplink message is searched. If the matching AC is searched out, the subsequent access control steps are performed; if the matching AC is not searched out, the sending of the uplink message is directly restricted, and to wait the base station to update the access control mapping relationship.
  • the matching AC is not searched out, the user equipment can directly map the QFI to the AC of the lowest priority, or map to a certain AC and utilize the AC to perform the subsequent access control operation, which is not specifically limited herein.
  • the user equipment may also randomly assign a QFI to the uplink message to be sent, which is not specifically limited herein.
  • the access parameter when the access parameter only includes at least one auxiliary factor, for example, when the priority of the user equipment is 1 and the service category is video, the corresponding access category is the access category 2.
  • the access parameter may also include a combination of a QoS flow ID and at least one auxiliary factor, which is not specifically limited herein.
  • the access categories with higher priority are more likely to be accessed and can be accessed with priority, and the access categories with lower priority are more difficult to be accessed.
  • the load of the base station is heavy, it can map more QoS flow IDs to the access categories of low priorities, thereby realizing the access control and avoiding the heavy load.
  • the load of the base station is light, it can map more QoS flow IDs to the access categories of high priorities, thereby improving the resource utilization.
  • the user equipment can directly set a part of the access categories with higher priority to not barred (allowed access) , and set the other part of the access categories with lower priority to barred (restricted access) , for example, allowing the uplink message corresponded by the first five access categories to access, and restricting the uplink message corresponded by the remaining five access categories to access.
  • the user equipment can also utilize other methods such as calculating the access probability to perform the access control, which is not specifically limited herein.
  • the user equipment receives the downlink message from the base station, where the downlink message includes the access control mapping relationship including a mapping relationship between the access parameter and the access category.
  • the access control mapping relationship the access category corresponded by the access parameter of the uplink message to be sent is matched, and the access control is performed utilizing the access category obtained by matching.
  • the user equipment can perform the access control by merely obtaining the access category corresponded by the uplink message to be sent in the access control mapping relationship.
  • the embodiment of the present disclosure could reduce the burden of the user equipment and improve the access control efficiency, which can be applied to the idle status and a connected status of the user equipment, while having a wide application scope and a high compatibility.
  • Block S12 may further include the following block.
  • the QoS flow ID of the uplink message can be obtained by mapping the QoS flow ID of the uplink, or can be a QoS flow ID generated randomly by the user equipment, which is not specifically limited herein.
  • the auxiliary factor is the status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
  • the access parameter includes a QoS flow ID and /or at least one auxiliary factor
  • the access control mapping relationship includes at least one of a mapping relationship between a QoS flow ID and an access category, a mapping relationship between at least one auxiliary factor and an access category, and a mapping relationship between a combination of a QoS flow ID and at least one auxiliary factor as well as an access category.
  • the access control mapping relationship includes a mapping relationship between at least one QoS flow ID (QFI) and an access category, a mapping relationship between at least one auxiliary factor (other metric) and an access category, and a mapping relationship between a combination of at least one QoS flow ID and at least one auxiliary factor as well as an access category.
  • QFI QoS flow ID
  • auxiliary factor other metric
  • the access category to which the QoS flow ID and /or at least one auxiliary factor maps is searched in the access control mapping relationship.
  • the access category to which 0x1a maps is the access category 1, according to an access control mapping relationship table of FIG. 5.
  • the access control mapping relationship may also only include a mapping relationship between a QoS flow ID and an access category, or only include a mapping relationship between a combination of a QoS flow ID and at least one auxiliary factor as well as an access category, which is not specifically limited herein.
  • the status of the user equipment is also considered, for example, distinguishing between roaming and non-roaming user equipment, etc., which has a wider application scope and is more efficient in the access control.
  • Block S12 may further include the following block.
  • the QoS flow ID can be directly mapped to the access category of the lowest priority, so that the access control operation can be performed by utilizing the access category of the lowest priority, thereby saving the waiting time.
  • the user equipment may also send the updated access mapping relationship to the base station, so that the base station can update the data.
  • the user equipment may map the at least one auxiliary factor or a combination of the QoS flow ID and at least one auxiliary factor to the access category of the lowest priority.
  • the user equipment when the user equipment does not search out a matching access category in the access control mapping relationship, the user equipment may suspend the sending of the uplink message and wait for the base station to update the access control mapping relationship, and the user equipment may also map the QoS flow ID which does not match to an access category to any access category, which is not specifically limited herein.
  • Block S12 may further include the following blocks.
  • the QoS flow ID of the uplink message can be obtained by mapping the QoS flow ID of the uplink message, or a QoS flow ID generated randomly by the user equipment, which is not specifically limited herein.
  • the access control mapping relationship at least includes a mapping relationship between a QoS flow ID and /or at least one auxiliary factor and the service category.
  • the access control mapping relationship includes a mapping of at least one QoS flow ID and a service (traffic) category, and a mapping of at least one service category and an access category.
  • an access category to which 0x2a maps is an access category 3, according to an access control mapping relationship table of FIG. 8.
  • the access parameter may only include at least one auxiliary factor
  • the access control mapping relationship may also only include a mapping relationship between at least one auxiliary factor and a service category, and a mapping relationship between a service category and an access category, which is not specifically limited herein.
  • the access category mapped by the service category 2 which can be searched out according to the access control mapping relationship table again is the access category 1.
  • the access control mapping relationship further includes a mapping relationship between a combination of a service category and at least one auxiliary factor as well as an access category.
  • block S124 includes the following block.
  • the access control mapping relationship includes a mapping of at least one QoS flow ID and one service category, and a mapping of a combination of at least one service category and at least one auxiliary factor as well as one access category.
  • the user equipment searches out the service category to which the QoS flow ID of the uplink message to be sent maps, it searches an access category to which the service category maps in the access control mapping relationship, or searches an access category to which a combination of the service category and at least one auxiliary factor maps.
  • the service category searched out by the user equipment according to the access control mapping relationship table of FIG. 8 is the service category 3
  • the access control mapping relationship may only include a mapping relationship between a QoS flow ID and a service category, and a mapping relationship between a service category and an access category; or only include a mapping relationship between a QoS flow ID and a service category, and a mapping relationship between a combination of a service category and at least one auxiliary factor as well as an access category; or only include a mapping relationship between at least one auxiliary factor and a service category, and a mapping relationship between a service category and /or at least another auxiliary factor as well as an access category, which is not specifically limited herein.
  • a QoS flow ID and /or at least one auxiliary factor is mapped to a service category first, and more QoS flow IDs and /or auxiliary factors can be mapped to fewer service categories, thereby reducing the subsequent mapping relationship with respect to the access category and reducing the difficulty of the user equipment to search the mapping relationship so as to improve the efficiency of search.
  • Block S12 may further include the following block.
  • the QoS flow ID can be directly mapped to the service category of the lowest priority, so that the access control operation can be performed by utilizing the access category corresponded by the service category of the lowest priority, thereby saving the waiting time.
  • the user equipment may also send the updated access mapping relationship to the base station, so that the base station can update the data.
  • the user equipment may map at least one auxiliary factor which does not match to a service category to a service category of the lowest priority, or map a QoS flow ID and at least one auxiliary factor which do not match to a service category to a service category of the lowest priority, which is not specifically limited herein.
  • the user equipment may suspend the sending of the uplink message and wait for the base station to update the access control mapping relationship, and the user equipment may also map the QoS flow ID which does not match to a service category to any service category, which is not specifically limited herein.
  • Block S13 may include the following blocks.
  • barring check method which has a same formula with the ACDC mechanism of the LTE system can be adopted as the barring check, and other barring check method can also be adopted, which is not specifically limited herein.
  • the user equipment randomly generates a random number between 0-1 utilizing a random function, takes the random number as the access probability of the uplink message, in which the random function can be an even distributed random function between 0-1, and can be other type of random function, which can be specifically set basing on different access categories, and is not specifically limited herein.
  • the downlink message further includes an access control parameter at least including the access probability threshold corresponded by each access category; where, the access categories of the higher priorities correspond to the lower access probability thresholds, which have higher access probabilities.
  • the access probability threshold e.g., 0.3
  • the access probability threshold corresponded by the access category can be obtained through the access category obtained by the previous matching.
  • the access probability and the access probability threshold are compared, and when the access probability is greater than the access probability threshold (e.g., 0.5 is greater than 0.3) , the uplink message is allowed to send, and the user equipment can send the uplink message to the base station, that is, a service request can be initiated, or the sending of communication data to the base station may be continued.
  • the access probability threshold e.g., 0.5 is greater than 0.3
  • the access probability threshold may also be generated by the user equipment according to the priority of the access category, which is not specifically limited herein.
  • This embodiment may also be combined with any of the second to the fifth embodiments of the access control method of the present disclosure and their non-conflicting combination.
  • Block S13 may further include the following block.
  • the access probability threshold (e.g., 0.4) corresponded by the access category can be obtained through the access category obtained by the previous matching.
  • the access probability and the access probability threshold are compared, and when the access probability is not greater than the access probability threshold (e.g., 0.2 is smaller than 0.4) , the uplink message is restricted to send, and the user equipment can’t send the uplink message to the base station, that is, a service request can’t be initiated, or the sending of communication data to the base station may not be continued.
  • block S134 includes the following block.
  • the uplink message may be temporarily stored in the buffer, and to wait the base station to update the access control mapping relationship, or wait for a period of time to redo the barring check.
  • the user equipment may also directly delete the uplink message, which is not specifically limited herein.
  • Block S134 may further include the following block.
  • At S1342 turning on an access standby timer and disallowing the same service connection request to be initiated when the value of the timer is smaller than the access waiting time through the user equipment.
  • the uplink message to be sent is a service connection request message, such as radio resource control signaling (RRC signaling)
  • RRC signaling radio resource control signaling
  • the access control parameter further includes an access waiting time corresponded by each access category, and the specific value of the access waiting time can be defined basing on actual needs, which is not specifically limited herein.
  • each access category corresponds to an individual access waiting time
  • the access waiting time of the access category of a higher priority is less than the access waiting time of the access category of a lower priority.
  • An access waiting timer corresponded by the access category of the uplink message is enabled while the user equipment restricts the sending of the uplink message to be sent.
  • the timing value of the access waiting timer is smaller than the access waiting time corresponded by the access category, the user equipment does not initiate the same service request, and when the timing value of the access waiting timer is equal to the access waiting time corresponded by the access category, the user equipment can initiate the same service request and clear the timing value of the access waiting timer simultaneously.
  • the access waiting timer may not be cleared, instead, the differentiate between the current timing value and the initial timing value as well as the access waiting time can be compared in the next timing process.
  • the access waiting time of each access category can also be changed according to actual needs, which is not specifically limited herein.
  • FIG. 15 a flow chart of a ninth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 15, the ninth embodiment of the access control method of the present disclosure is based on the seventh embodiment of the access control method of the present disclosure. The method may further include the following block.
  • the access status includes a not barred status, a barred status, and an unknown status, in which the unknown status is an initial status of the access status.
  • the access status corresponded by the access category which matches a QoS flow ID of the uplink message is set to the not barred status.
  • the access status is set to the barred status.
  • the user equipment generates the mapping matrix.
  • the mapping matrix includes an access category and an access status corresponded by each access category, in which the access status includes a not barred status (Not barred) , a barred status (Barred) , and an unknown status (N/A) .
  • the user equipment In an initial status, the user equipment generates the access category included in the access control mapping relationship and the access status corresponded by the access category, according to the received access control mapping relationship. Where, in the initial status of the access status, i.e., the initial access status, may set to the unknown status (N/A) .
  • the access status corresponded by the access category matched by the QoS flow ID of the uplink message is set to the not barred status while the uplink message is allowed to be sent, and the access status corresponded by the access category matched by the QoS flow ID is set to the barred status while the user equipment restricts the sending of the uplink message.
  • the initial access status may also be set to the not barred status or the barred status, in which the mapping matrix further includes a service category and /or at least one auxiliary factor corresponded by an access category, and may also include a QoS flow ID and /or at least one auxiliary factor corresponded by a service category, or the mapping matrix further includes a QoS flow ID and /or at least one auxiliary factor corresponded by an access category, which is not specifically limited herein.
  • the execution of the block of this embodiment may be performed after block S131.
  • Block S13 may further include the following blocks.
  • the user equipment may restrict the sending of the uplink message by temporarily storing the uplink message in the buffer and resending after waiting for the access status to become to the not barred status, or by discarding the uplink message directly, which is not specifically limited herein.
  • the access category matching the QoS flow ID can be searched out by utilizing the access control mapping relationship after the user equipment obtains the QoS flow ID of the uplink message to be sent. Thereafter, the access status corresponded by the access category can be obtained directly from the stored mapping matrix.
  • the access status is the not barred status
  • the user equipment sends the uplink message to the base station.
  • the access status is the barred status
  • the user equipment restricts the sending of the uplink message, thereby avoiding the overload of the base station due to the excessive data sending by the user equipment.
  • the access status is directly obtained from the mapping matrix for access control, and it is not necessary to repeat the barring check for each uplink message, which reduces the calculations of the user equipment, reduces the burden of the user equipment, and improves the access control efficiency.
  • Block S14 may further include the following blocks.
  • the mapping matrix stored by the user equipment further includes a timeout period of each access status, and the access status needs to be updated when the duration of each access status reaches the timeout period of the access status.
  • the timeout period of each access status can be set according to actual needs, which is not specifically limited herein.
  • S142 setting the access status to the unknown status when the duration of the access status is greater than the update period of the access status.
  • a timer is enabled.
  • the timeout period e.g., 30 minutes
  • the access status is greater than the timeout period (e.g., 30 minutes) of the access status, which indicates that the duration of the access status needs to be updated, and the user equipment sets the access status to the unknown status, as N/Astatus shown in FIG. 19, so as to perform the barring check subsequently to realize the status update with respect to the next uplink message to be sent.
  • the user equipment may also set the access status to null or clear the access status when the duration of the access status is greater than the timeout period of the access status, and the access status of the changed access category may also be set to the unknown status when the user equipment receives a message of updating the access control mapping relationship which is sent by the base station, which is not specifically limited herein.
  • Block S13 may further include the following block.
  • At S138 returning to the performing the barring check to the uplink message to obtain the access probability of the uplink message when the access status is the unknown status, so as to set the access status corresponded by the uplink message to the not barred status or the barred status.
  • the user equipment when the user equipment is in the connected status, after the access category matching the QoS flow ID of the uplink message to be sent is obtained, and the access status corresponded by the access category obtained by matching which is searched out from the mapping matrix is the unknown status, the user equipment needs to perform the barring check to the uplink message.
  • the uplink message is allowed to be sent, the access status of the access category obtained by matching in the mapping matrix is set to the not barred status.
  • the sending of the uplink message is restricted, the access status of the access category obtained by matching is set to the barred status, thereby realizing the update of the access status in the mapping matrix.
  • This embodiment may also be combined with any of the sixth, the ninth, and the eleventh embodiments of the access control method of the present disclosure or their non-conflicting combination.
  • an execution main body of the thirteenth embodiment of the access control method of the present disclosure is a base station.
  • the base station is connected to the core network and performs wireless communication with the user equipment, and provides communication coverage for a corresponding geographical area.
  • the base station may be a macro base station, a micro base station, a pico base station, or a femtocell.
  • the base station may also be referred to as a radio base station, an access point, a Node B, an evolved Node B (eNodeB, eNB) , a gNB, or other suitable terminology.
  • the method may include the following blocks.
  • the access parameter includes a QoS flow ID and /or at least one auxiliary factor, where the auxiliary factor is a status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
  • the base station maps a QoS flow ID (QFI) and an access category (AC) corresponded by at least one existing QoS flow, thereby generating the access control mapping relationship.
  • the base station can map the QFI corresponded by a same type of QoS flow to a same AC basing on an operator's strategy such as mapping the data flow of a video service to the same AC.
  • the base station may send the downlink message to the user equipment according to its own load condition so as to update the access control mapping relationship.
  • the access parameter may also only include at least one auxiliary factor, and the base station may map at least one auxiliary factor such as the user equipment priority of 1 and the service category of video, to the access category 2.
  • the base station may also perform mapping basing on other mapping criteria, for example, mapping the QFI corresponded by the QoS flow with a same QoS requirement to a same AC, and so on, and when the base station generates the access control mapping relationship, other metrics such as roaming status, priority, etc. of the user equipment can also be considered, or a Traffic Category (TC) can be added to map the QFI to the TC first, and then map the TC to the AC, which is not specifically limited herein.
  • TC Traffic Category
  • the downlink message may be a radio resource control message or a system broadcast message, or other type of message
  • the access category may be pre-defined, the amount of access categories and the specific access category may be defined basing on actual needs, which is not specifically limited herein.
  • the base station may send the downlink message to the user equipment in a broadcast manner, or may send the downlink message to the user equipment through a certain idle channel, which is not specifically limited herein.
  • the user equipment After the user equipment receives the downlink message of the base station, and before sending the uplink message to the base station, for instance, when sending the uplink message of a service request, it searches the access category corresponded by the QFI of the uplink message in the access control mapping relationship first, that is, searching the AC having the mapping relationship with the QFI of the uplink message, and performing the subsequent access control blocks when the matching AC is searched out.
  • the specific access control block may refer to the first to the twelfth embodiments of the access control method of the present disclosure, which is not repeated herein.
  • the base station generates the access control mapping relationship, and sends the access control mapping relationship to the user equipment so that the user equipment can perform an access decision basing on the access control mapping relationship and execute the corresponding access control.
  • the user equipment can perform the access control by merely obtaining the access category corresponded by the uplink message to be sent in the access control mapping relationship.
  • the embodiment of the present disclosure could reduce the burden of the user equipment and improve the access control efficiency, which can be applied to the idle status and the connected status of the user equipment, while having a wide application scope and a high compatibility.
  • Block S21 may include the following block.
  • At S211 mapping a combination of at least one QoS flow ID and /or at least one auxiliary factor to an access category.
  • the auxiliary factor is a status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
  • the base station directly maps a QoS flow ID to an access category.
  • the base station may map at least one QoS flow ID to an access category, for example, mapping 0x1a, 0x1b, and 0x1c to the access category 1, and the base station may further map a combination of at least one QoS flow ID and at least one auxiliary factor to an access category, for example, mapping 0x3a, 0x4d, and a non-roaming user equipment (non-roaming UE) to the access category 3.
  • mapping 0x1a, 0x1b, and 0x1c to the access category 1
  • the base station may further map a combination of at least one QoS flow ID and at least one auxiliary factor to an access category, for example, mapping 0x3a, 0x4d, and a non-roaming user equipment (non-roaming UE) to the access category 3.
  • non-roaming UE non-roam
  • the base station when the base station generates the access control mapping relationship, it is possible to generate only a mapping relationship between a QoS flow ID and an access category, or only a mapping relationship between a combination of a QoS flow ID and at least one auxiliary factor as well as an access category, or only generate a mapping relationship between at least one auxiliary factor and an access category, which is not specifically limited herein.
  • the status of the user equipment is also considered, for example, to distinguish between roaming and non-roaming user equipment, in which the consideration factors are more full-scale such that the application scope can be wider and it is more efficient for the user equipment to utilize the access control mapping relationship to perform the access control.
  • Block S21 may further include the following block.
  • the access categories of the higher priorities correspond to the lower access probability thresholds, which have higher access probabilities.
  • the base station When the base station generates the access control mapping relationship, it also sets the corresponding access control parameter for each access category, and generates the downlink message utilizing the access control mapping relationship and the access control parameter to send to the user equipment.
  • the user equipment receives the downlink message, it is possible to utilize the obtained access control mapping relationship and access control parameter to perform the access control.
  • the specific flow of the user equipment to perform the access control may refer to any of the sixth to the twelfth embodiments of the access control method of the present disclosure and their non-conflicting combination, which is not repeated herein.
  • the access probability threshold may also be generated by the user equipment according to the priority of the access category, which is not specifically limited herein.
  • FIG. 24 a flow chart of a sixteenth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 24, the sixteenth embodiment of the access control method of the present disclosure is based on the thirteenth embodiment of the access control method of the present disclosure. The method may further include the following block before block S21.
  • mapping notification message includes a mapping relationship between the QoS flow ID and /or at least one auxiliary factor as well as a service category.
  • the core network device may be a gateway, a router, etc., for example, a mobile management entity (MME) in an LTE system, or a serving GPRS support node (SGSN) in a UMTS system, which is not specifically limited herein.
  • MME mobile management entity
  • SGSN serving GPRS support node
  • the core network device may first map at least one QoS flow ID to a service (traffic) category, for example, mapping the QoS flow IDs 0x1a and 0x1b to the service category 1, mapping the QoS flow ID 0x1c to the service category 2, and utilizing a mapping relationship between the QoS flow ID and service category to generate the mapping notification message to send to the base station, so that the base station generates the access control mapping relationship to send to the user equipment, and the user equipment can utilize the access category obtained by matching in the access control mapping relationship to perform the access control.
  • a service traffic
  • the core network device completes a mapping relationship between a QoS flow ID and /or at least one auxiliary factor as well as a service category in advance and sends it to the base station.
  • the access control mapping relationship can be generated by merely generating a mapping relationship between a service category and an access category, thereby reducing the burden on the base station.
  • Block S21 may further include the following block.
  • At S213 generating the mapping relationship between the service category and /or at least one auxiliary factor as well as the access category.
  • the auxiliary factor is a status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
  • block S213 includes the following block.
  • At S2131 mapping at least one service category and /or at least one auxiliary factor to an access category.
  • the non-roaming user equipment non-roaming UE
  • the base station may only map at least one service category to an access category, or only map a combination of at least one service category and at least one auxiliary factor to an access category, or only map at least one auxiliary factor to an access category, which is not specifically limited herein.
  • an execution main body of the eighteenth embodiment of the access control method of the present disclosure is a core network device.
  • the core network mainly provides the user connection and the user management, and carries the services.
  • the core network device includes gateways, routers, etc., for example, a mobile management entity (MME) in an LTE system, or a serving GPRS support node (SGSN) in a UMTS system, etc.
  • MME mobile management entity
  • SGSN serving GPRS support node
  • the method may include the following blocks.
  • block S31 includes the following block.
  • At S311 mapping at least one QoS flow and /or at least one auxiliary factor to a service category.
  • the core network device may first map at least one QoS flow ID to a service category, for example, mapping the QoS flow IDs 0x1a and 0x1b to the service category 1, mapping the QoS flow ID 0x1c to the service category 2, and utilizing the mapping relationship between the QoS flow ID and the service category to generate the mapping notification message and send to the base station, so that the base station generates the access control mapping relationship to send to the user equipment, and the user equipment can utilize the access category obtained by matching in the access control mapping relationship to perform the access control.
  • a service category for example, mapping the QoS flow IDs 0x1a and 0x1b to the service category 1, mapping the QoS flow ID 0x1c to the service category 2, and utilizing the mapping relationship between the QoS flow ID and the service category to generate the mapping notification message and send to the base station, so that the base station generates the access control mapping relationship to send to the user equipment, and the user equipment can utilize the access category obtained by matching in the access control mapping
  • the core network device can map a same type of QoS flow to a same service category basing on an operator's strategy, for example, mapping a QoS flow of a video service to the same service category.
  • the core network device may also perform the mapping of a QoS flow ID and a service category basing on other factors, which is not specifically limited herein.
  • the core network device completes a mapping relationship between a QoS flow ID and /or at least one auxiliary factor as well as a service category in advance and sends it to the base station.
  • the access control mapping relationship can be generated by merely generating a mapping relationship between a service category and an access category, thereby reducing the burden on the base station.
  • a first embodiment of a communication device 10 of the present disclosure includes a processor 110 and a communication circuit 120, in which the processor 110 connects the communication circuit 120.
  • the communication circuit 120 is configured to send and receive data, and is an interface for the communication device 10 to communicate with other communication devices.
  • the processor 110 controls the operation of the communication device 10, which may also be referred to as a CPU (Central Processing Unit) .
  • the processor 110 may be an integrated circuit chip having signal processing capability.
  • the processor 110 may also be a general purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) , or be other programmable logic device, a discrete gate, a transistor logic device, and a discrete hardware component.
  • the general purpose processor may be a microprocessor, or the processor 110 may also be any conventional processor.
  • the processor 110 is configured to execute instructions to implement any of the first to the twelfth embodiments of the access control method of the present disclosure and their non-conflicting combination.
  • the communication device 10 may also include other components such as a memory (not shown) , which is not specifically limited herein.
  • the communication device 10 in this embodiment may be a user equipment such as a terminal, or a separate component which can be integrated into the terminal, such as a baseband chip.
  • a second embodiment of a communication device 20 of the present disclosure includes a processor 210 and a communication circuit 220, where the processor 210 is connected to the communication circuit 220.
  • the communication circuit 220 is send and receive data, and is an interface for the communication device 20 to communicate with other communication devices.
  • the processor 210 controls the operation of the communication device 20, which may also be referred to as a CPU (Central Processing Unit) .
  • the processor 210 may be an integrated circuit chip having signal processing capability.
  • the processor 210 may also be a general purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) , or be other programmable logic device, a discrete gate, a transistor logic device, and a discrete hardware component.
  • the general purpose processor may be a microprocessor, or the processor 210 may also be any conventional processor.
  • the processor 210 is configured to execute instructions to implement any of the thirteenth to the seventeenth embodiments of the access control method of the present disclosure and their non-conflicting combination.
  • the communication device 20 may also include other components such as a memory (not shown) , which is not specifically limited herein.
  • the communication device 20 in this embodiment may be a base station, or an independent component integrated in the base station, such as a baseband board.
  • a third embodiment of a communication device 30 of the present disclosure includes a processor 310 and a communication circuit 320, where the processor 310 is connected to the communication circuit 320.
  • the communication circuit 320 is send and receive data, and is an interface for the communication device 30 to communicate with other communication devices.
  • the processor 310 controls the operation of the communication device 30, which may also be referred to as a CPU (Central Processing Unit) .
  • the processor 210 may be an integrated circuit chip having signal processing capability.
  • the processor 310 may also be a general purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) , or be other programmable logic device, a discrete gate, a transistor logic device, and a discrete hardware component.
  • the general purpose processor may be a microprocessor, or the processor 310 may also be any conventional processor.
  • the processor 310 is configured to execute instructions to implement any of the eighteenth embodiments of the access control method of the present disclosure.
  • the communication device 30 may also include other components such as a memory (not shown) , which is not specifically limited herein.
  • the communication device 30 in this embodiment may be a core network device, such as a gateway, a router, or the like, or a separate component which can be integrated into the core network device.
  • a core network device such as a gateway, a router, or the like, or a separate component which can be integrated into the core network device.
  • a fourth embodiment of a communication device 40 of the present disclosure includes:
  • a communication module 401 configured to receive a downlink message from a base station through an user equipment, where the downlink message includes an access control mapping relationship, the access control mapping relationship includes a mapping relationship between an access parameter and an access category.
  • a matching module 402 configured to match the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship.
  • a control module 403 is configured to perform an access control utilizing the access category obtained by matching.
  • the communication device 40 may also include other components such as a memory (not shown) , which is not specifically limited herein.
  • the communication device 40 in this embodiment may be a user equipment such as a terminal, or a separate component which can be integrated into the terminal, such as a baseband chip.
  • a fifth embodiment of a communication device 50 of the present disclosure includes:
  • a mapping module 501 configured to generate an access control mapping relationship, the access control mapping relationship comprising a mapping relationship between an access parameter and an access category.
  • a communication module 502 configured to send a downlink message to an user equipment, the downlink message comprising the access control mapping relationship such that the user equipment utilizes an access category corresponded by an access parameter of an uplink message to be sent matched in the access control mapping relationship to perform an access control.
  • the communication device 50 may also include other components such as a memory (not shown) , which is not specifically limited herein.
  • the communication device 50 in this embodiment may be a base station, or an independent component integrated in the base station, such as a baseband board.
  • a sixth embodiment of a communication device 60 of the present disclosure includes:
  • a mapping module 601 configured to generate a mapping relationship between a QoS flow ID and /or at least one auxiliary factor and a service category.
  • a communication module 602 configured to send a mapping notification message to a base station to cause the base station to generate an access control mapping relationship, wherein the notification message comprises the mapping relationship between the QoS flow ID and /or at least one auxiliary factor and the service category.
  • the communication device 60 may also include other components such as a memory (not shown) , which is not specifically limited herein.
  • the communication device 60 in this embodiment may be a core network device, such as a gateway, a router, or the like, or a separate component which can be integrated into the core network device.
  • a core network device such as a gateway, a router, or the like, or a separate component which can be integrated into the core network device.
  • the device 70 has a program 701 stored therein.
  • the program 701 is executed, any of the first to the twelfth embodiments of the access control method of the present disclosure and their non-conflicting combination is implemented.
  • the device 70 with the storage function may be a portable storage medium such as a USB disk and an optical disk, or be a base station, a server, or be a separate component integrated into the base station such as a baseband board.
  • the device 80 has a program 801 stored therein.
  • the program 801 is executed, any of the thirteenth to the seventeenth embodiments of the access control method of the present disclosure and their non-conflicting combination is implemented.
  • the device 80 with the storage function may be a portable storage medium such as a USB disk and an optical disk, or be a terminal, a server, or be a separate component integrated into the base station such as a baseband chip.
  • the device 90 has a program 901 stored therein.
  • the program 901 When the program 901 is executed, the eighteenth embodiment of the access control method of the present disclosure is implemented.
  • the device 90 with the storage function may be a portable storage medium such as a USB disk and an optical disk, or be a base station, a server, or be a separate component integrated into the base station such as a baseband chip.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present disclosure discloses an access control method, a communication device, and a device with a storage function. The access control method includes: receiving a downlink message from a base station through an user equipment, the downlink message including an access control mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship; and performing an access control utilizing the access category obtained by matching. In the above-mentioned manner, the present disclosure can reduce the burden on the user equipment and improve the access control efficiency.

Description

ACCESS CONTROL METHOD, COMMUNICATION DEVICE, AND DEVICE WITH STORAGE FUNCTION TECHNICAL FIELD
Embodiments of the present disclosure generally relate to communication technology, and in particular relate to an access control method, a communication device, and a device with a storage function.
BACKGROUND
When accessing a network, a user equipment needs to execute an access decision to determine whether to allow a service request to be initiated and to avoid overloading the network end. In an LTE (Long Term Evolution) communication system, the commonly used access control mechanisms include ACB (Access Class Barred) , SSAC (Service Specific Access Control) , EAB (Extended Access Barring) , and ACDC (Application Specific Congestion Control for Data Communication) . In which, ACB mechanism performs the access control mainly based on the access class of the user equipment, SSAC is mainly for the access control of multimedia voice and video services, EAB is mainly for the access control of a large number of machine type equipment in an Internet of things, ACDC is mainly for the access control of specific applications. However, the application scenarios of the above-mentioned access control mechanisms are limited, and the hybrid access control mechanism in the existing communication system is liable to increase the burden on the user equipment.
SUMMARY
The technical problem to be solved by the present disclosure is to provide an access control method, a communication device, and a device with a storage function, which can solve the problem that the hybrid access control mechanism is liable to increase the burden on the user equipment.
In order to solve the above technical problems, the first technical solution adopted by the present disclosure is to provide an access control method, including: receiving a downlink message from a base station through an user equipment, the downlink message including an access control mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship; and performing an access control utilizing the access category obtained by matching.
In order to solve the above technical problem, the second technical solution adopted by the present disclosure is to provide an access control method, including: generating an access control  mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; and sending a downlink message to an user equipment, the downlink message including the access control mapping relationship such that the user equipment utilizes an access category corresponded by an access parameter of an uplink message to be sent matched in the access control mapping relationship to perform an access control.
In order to solve the above technical problem, the third technical solution adopted by the present disclosure is to provide an access control method, including: generating a mapping relationship between a QoS flow ID and /or at least one auxiliary factor and a service category; and sending a mapping notification message to a base station to cause the base station to generate an access control mapping relationship, wherein the notification message includes the mapping relationship between the QoS flow ID and /or at least one auxiliary factor and the service category.
In order to solve the above technical problem, the fourth technical solution adopted by the present disclosure is to provide a communication device, including: a processor and a communication circuit, the processor connects the communication circuit; the processor is configured to execute instructions so as to implement the method as described above.
In order to solve the above technical problem, the fifth technical solution adopted by the present disclosure is to provide a device with a storage function, storing instructions, wherein the instructions are executed to implement the method as described above.
In order to solve the above technical problem, the sixth technical solution adopted by the present disclosure is to provide a communication device, including: a communication module configured to receive a downlink message from a base station through an user equipment, the downlink message including an access control mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; a matching module configured to match the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship; and a control module configured to perform an access control utilizing the access category obtained by matching.
In order to solve the above technical problem, the seventh technical solution adopted by the present disclosure is to provide a communication device, including: a mapping module configured to generate an access control mapping relationship, the access control mapping relationship including a mapping relationship between an access parameter and an access category; and a communication module configured to send a downlink message to an user equipment, the downlink message including the access control mapping relationship such that the user equipment utilizes an access category corresponded by an access parameter of an uplink message to be sent matched in the access control mapping relationship to perform an access control.
In order to solve the above technical problem, the eighth technical solution adopted by the  present disclosure is to provide a communication device, including: a mapping module configured to generate a mapping relationship between a QoS flow ID and /or at least one auxiliary factor and a service category; and a communication module configured to send a mapping notification message to a base station to cause the base station to generate an access control mapping relationship, wherein the notification message includes the mapping relationship between the QoS flow ID and /or at least one auxiliary factor and the service category.
The benefit of the present disclosure is that, in contrary to the prior art, in the embodiment of the present disclosure, the user equipment receives a downlink message from the base station, where the downlink message includes a mapping relationship between an access parameter and an access category; matching the access category corresponded by the access parameter of the uplink message to be sent in the access control mapping relation, and performing an access control utilizing the access category obtained by matching. As a result, the user equipment can perform the access control by merely obtaining the access category corresponded by the uplink message to be sent in the access control mapping relationship. As the access control mapping relationship is considered unifiedly by the base station, the embodiment of the present disclosure could reduce the burden of the user equipment and improve the access control efficiency.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic diagram of a QoS architecture of an NR system according to the prior art.
FIG. 2 is a flow chart of a first embodiment of an access control method according to the present disclosure.
FIG. 3 is a schematic diagram of a communication process between a base station and a user equipment in the first embodiment of the access control method according to the present disclosure.
FIG. 4 is a flow chart of a second embodiment of an access control method according to the present disclosure.
FIG. 5 is a schematic diagram of an access control mapping relationship in the second embodiment of the access control method according to the present disclosure.
FIG. 6 is a flow chart of a third embodiment of an access control method according to the present disclosure.
FIG. 7 is a flow chart of a fourth embodiment of an access control method according to the present disclosure.
FIG. 8 is a schematic diagram of an access control mapping relationship in the fourth embodiment of the access control method according to the present disclosure.
FIG. 9 is a detailed flow chart of block S126 in FIG. 7.
FIG. 10 is a flow chart of a fifth embodiment of an access control method according to the present disclosure.
FIG. 11 is a flow chart of a sixth embodiment of an access control method according to the present disclosure.
FIG. 12 is a flow chart of a seventh embodiment of an access control method according to the present disclosure.
FIG. 13 is a detailed flow chart of block S134 in FIG. 12.
FIG. 14 is a flow chart of an eighth embodiment of an access control method according to the present disclosure.
FIG. 15 is a flow chart of a ninth embodiment of an access control method according to the present disclosure.
FIG. 16 is a schematic diagram of a mapping matrix in the ninth embodiment of the access control method according to the present disclosure.
FIG. 17 is a flow chart of a tenth embodiment of an access control method according to the present disclosure.
FIG. 18 is a flow chart of an eleventh embodiment of an access control method according to the present disclosure.
FIG. 19 is a schematic diagram of a mapping matrix in the eleventh embodiment of the access control method according to the present disclosure.
FIG. 20 is a flow chart of a twelfth embodiment of an access control method according to the present disclosure.
FIG. 21 is a flow chart of a thirteenth embodiment of an access control method according to the present disclosure.
FIG. 22 is a flow chart of a fourteenth embodiment of an access control method according to the present disclosure.
FIG. 23 is a flow chart of a fifteenth embodiment of an access control method according to the present disclosure.
FIG. 24 is a flow chart of a sixteenth embodiment of an access control method according to the present disclosure.
FIG. 25 is a schematic diagram of a communication process between a user equipment, a base station, and a core network in the sixteenth embodiment of the access control method according to the present disclosure.
FIG. 26 is a schematic diagram of a mapping relationship between a QoS flow ID and a service category in the sixteenth embodiment of the access control method according to the present  disclosure.
FIG. 27 is a flow chart of a seventeenth embodiment of an access control method according to the present disclosure.
FIG. 28 is a detailed flow chart of block S213 in FIG. 27.
FIG. 29 is a schematic diagram of a mapping relationship between a service category generated by a base station, a combination of a service category and an auxiliary factor, and an access category in the seventeenth embodiment of the access control method according to the present disclosure.
FIG. 30 is a flow chart of an eighteenth embodiment of an access control method according to the present disclosure.
FIG. 31 is a detailed flow chart of block S31 in FIG. 30.
FIG. 32 is a schematic diagram of the structure of a first embodiment of a communication device according to the present disclosure.
FIG. 33 is a schematic diagram of the structure of a second embodiment of a communication device according to the present disclosure.
FIG. 34 is a schematic diagram of the structure of a third embodiment of a communication device according to the present disclosure.
FIG. 35 is a schematic diagram of the structure of a fourth embodiment of a communication device according to the present disclosure.
FIG. 36 is a schematic diagram of the structure of a fifth embodiment of a communication device according to the present disclosure.
FIG. 37 is a schematic diagram of the structure of a sixth embodiment of a communication device according to the present disclosure.
FIG. 38 is a schematic diagram of a first embodiment of a device with a storage function according to the present disclosure.
FIG. 39 is a schematic diagram of a second embodiment of a device with a storage function according to the present disclosure.
FIG. 40 is a schematic diagram of a third embodiment of a device with a storage function according to the present disclosure.
DETAILED DESCRIPTION
The technical schemes in the embodiments of the present disclosure will now be described in conjunction with the accompanying drawings in the embodiments of the present disclosure. It will be apparent that the described embodiments are only part of the embodiments of the present disclosure, not all embodiments. Basing on the embodiments in the present disclosure, all other  embodiments obtained by those of ordinary skilled in the art without making creative work are within the scope of the present disclosure.
With respect to a NR (New Radio) system for 5G networks, which has a QoS (Quality of Service) architecture as shown in FIG. 1. A core network establishes at least one PDU (Protocol Data Unit) session for each user equipment. An access network establishes one or more data radio bearer (DRB) for each PDU session, and establishes at least one default DRB for each PDU session established by the core network. The access network maps packets belonging to different PDU sessions to different DRBs. The non-access layer packet filters of the user equipment and the core network associate the uplink and downlink packets with a QoS flow. The access layer in the user equipment and the access network implement a mapping relation between the data radio bearer (DRB) as well as the uplink and downlink QoS flow. Where, in the downlink, the access network maps the QoS flow to the DRB according to a QoS flow ID and an associated QoS configuration file; in the uplink, the user equipment utilizes the QoS flow ID to perform an uplink grouping. In the NR system, the QoS flow is the most basic QoS granularity. Therefore, the system can perform an access control basing on the QoS flow ID in order to prevent overload and ensure the service quality.
Referring to FIG. 2, a flow chart of a first embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 2, an execution main body of the first embodiment of the access control method of the present disclosure is a user equipment. The user equipment may be fixed or portable, and may be a cell phone, a personal digital assistant (PDA) , a desktop computer, a tablet computer, a notebook computer, a cordless telephone, or the like. The method may include the following blocks.
At S11: receiving a downlink message from a base station through an user equipment, where the downlink message includes an access control mapping relationship, the access control mapping relationship includes a mapping relationship between an access parameter and an access category.
Where, the downlink message may be a radio resource control message or a system broadcast message, or other type of message, and the access category may be pre-defined, the amount of the access categories and the specific access category may be defined basing on actual needs, which is not specifically limited herein.
The access parameter is a relevant parameter required for the user equipment to perform an access decision, which includes a QoS flow ID and /or at least one auxiliary factor. Where, the auxiliary factor is a status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
Specifically, in an application case, as shown in FIG. 3, the base station maps the QoS flow ID (QFI) and the access category (AC) corresponded by at least one existing QoS flow, thereby generating the access control mapping relationship. Where, the base station can map the QFI corresponded by a same type of QoS flow to a same AC basing on an operator's strategy, for example, mapping the data flow of a video service to the same AC, and so on. The base station may send the downlink message to the user equipment according to its own load condition so as to update the access control mapping relationship. The base station may send the downlink message to the user equipment through broadcast manner, or may send the downlink message to the user equipment through a certain idle channel, which is not specifically limited herein. In other application cases, the access parameter may also only include at least one auxiliary factor, and the base station may map at least one auxiliary factor, such as the user equipment priority of 1 and the service category of video, to an access category 2.
Of course, in other embodiments, the base station may also perform mapping basing on other mapping criteria, for example, mapping the QFI corresponded by the QoS flow with a same QoS requirement to a same AC, or the like, and when the base station generates the access control mapping relationship, other factors (metrics) such as the roaming status and the priority of the user equipment can also be considered, or a traffic category (TC) can be added to map the QFI to the TC first, and then map the TC to the AC, which is not specifically limited herein.
At S12: matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship.
In the NR system, for the uplink, the user equipment can utilize an uplink reflective QoS mapping to obtain the same QoS flow ID as the downlink, that is, the user equipment monitors the QoS flow ID of the downlink and applies the same mapping in the uplink, for each DRB.
Specifically, in an application case, the user equipment can be in an idle status, in which the downlink message is received when it is ready to send a service request to the base station, or the downlink message may be received after the connection with the base station becomes successful. As shown in FIG. 3, after the user equipment receives the downlink message, the QFI in the downlink message is obtained, which can be mapped to the uplink message to be sent, where the QFI of the uplink message to be sent is the same as the QFI of the downlink message. Before the user equipment sends the uplink message to the base station, for example, when sending the service request message to the base station, the access category corresponded by the QFI of the uplink message in the access control mapping relationship is searched first, that is, the AC having the mapping relationship with the QFI of the uplink message is searched. If the matching AC is searched out, the subsequent access control steps are performed; if the matching AC is not searched out, the sending of the uplink message is directly restricted, and to wait the base station to update  the access control mapping relationship. Of course, in other application cases, if the matching AC is not searched out, the user equipment can directly map the QFI to the AC of the lowest priority, or map to a certain AC and utilize the AC to perform the subsequent access control operation, which is not specifically limited herein.
In other embodiments, the user equipment may also randomly assign a QFI to the uplink message to be sent, which is not specifically limited herein.
In another application case, when the access parameter only includes at least one auxiliary factor, for example, when the priority of the user equipment is 1 and the service category is video, the corresponding access category is the access category 2. When the uplink message to be sent of the user equipment is a video message, and the priority of the user equipment is 1, the user equipment can obtain that the access category of 2 which matches the access parameter of the uplink message to be sent in the access control mapping relationship. Of course, in other application cases, the access parameter may also include a combination of a QoS flow ID and at least one auxiliary factor, which is not specifically limited herein.
At S13: performing an access control utilizing the access category obtained by matching.
Specifically, in an application case, different access categories has different access possibilities, the access categories with higher priority are more likely to be accessed and can be accessed with priority, and the access categories with lower priority are more difficult to be accessed. When the load of the base station is heavy, it can map more QoS flow IDs to the access categories of low priorities, thereby realizing the access control and avoiding the heavy load. When the load of the base station is light, it can map more QoS flow IDs to the access categories of high priorities, thereby improving the resource utilization. The user equipment can directly set a part of the access categories with higher priority to not barred (allowed access) , and set the other part of the access categories with lower priority to barred (restricted access) , for example, allowing the uplink message corresponded by the first five access categories to access, and restricting the uplink message corresponded by the remaining five access categories to access. Of course, the user equipment can also utilize other methods such as calculating the access probability to perform the access control, which is not specifically limited herein.
In this embodiment, the user equipment receives the downlink message from the base station, where the downlink message includes the access control mapping relationship including a mapping relationship between the access parameter and the access category. In the access control mapping relationship, the access category corresponded by the access parameter of the uplink message to be sent is matched, and the access control is performed utilizing the access category obtained by matching. As a result, the user equipment can perform the access control by merely obtaining the access category corresponded by the uplink message to be sent in the access control  mapping relationship. As the access control mapping relationship is considered unifiedly by the base station, the embodiment of the present disclosure could reduce the burden of the user equipment and improve the access control efficiency, which can be applied to the idle status and a connected status of the user equipment, while having a wide application scope and a high compatibility.
Referring to FIG. 4, a flow chart of a second embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 4, the second embodiment of the access control method of the present disclosure is based on the first embodiment of the access control method of the present disclosure. Block S12 may further include the following block.
At S121: searching the access category having a mapping relationship with the QoS flow ID and /or at least one auxiliary factor of the uplink message to be sent in the access control mapping relationship.
Where, when the user equipment generates the uplink message to be sent, the QoS flow ID of the uplink message can be obtained by mapping the QoS flow ID of the uplink, or can be a QoS flow ID generated randomly by the user equipment, which is not specifically limited herein. The auxiliary factor is the status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
The access parameter includes a QoS flow ID and /or at least one auxiliary factor, and the access control mapping relationship includes at least one of a mapping relationship between a QoS flow ID and an access category, a mapping relationship between at least one auxiliary factor and an access category, and a mapping relationship between a combination of a QoS flow ID and at least one auxiliary factor as well as an access category.
Specifically, in an application case, as shown in FIG. 5, the access control mapping relationship includes a mapping relationship between at least one QoS flow ID (QFI) and an access category, a mapping relationship between at least one auxiliary factor (other metric) and an access category, and a mapping relationship between a combination of at least one QoS flow ID and at least one auxiliary factor as well as an access category. After the user equipment obtains the QoS flow ID and /or at least one auxiliary factor of the uplink message to be sent, the access category to which the QoS flow ID and /or at least one auxiliary factor maps is searched in the access control mapping relationship.
For instance, when the QoS flow ID of the uplink message to be sent which is obtained by the user equipment is 0x1a, it can be searched out that the access category to which 0x1a maps is the access category 1, according to an access control mapping relationship table of FIG. 5. When the QoS flow ID of the uplink message to be sent which is obtained by the user equipment is 0x2a  and the priority of the user equipment is 1, it can be searched out that an access category to which a combination of 0x2a and the priority 1 (UE Category = 1) of the user equipment maps is an access category 2, according to the access control mapping relationship table of FIG. 5. When the uplink message to be sent which is obtained by the user equipment is a video service flow and the priority of the user equipment is 2, it can be searched out that an access category to which the video service flow (Service = video) and the priority 2 (UE Category = 2) of the user equipment maps is an access category 4.
Of course, in other application cases, the access control mapping relationship may also only include a mapping relationship between a QoS flow ID and an access category, or only include a mapping relationship between a combination of a QoS flow ID and at least one auxiliary factor as well as an access category, which is not specifically limited herein.
In this embodiment, when the user equipment performs the access control, the status of the user equipment is also considered, for example, distinguishing between roaming and non-roaming user equipment, etc., which has a wider application scope and is more efficient in the access control.
Referring to FIG. 6, a flow chart of a third embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 6, the third embodiment of the access control method of the present disclosure is based on the second embodiment of the access control method of the present disclosure. Block S12 may further include the following block.
At S122: mapping the QoS flow ID and /or at least one auxiliary factor to the access category of the lowest priority through the user equipment, when an access category matching the QoS flow ID and /or at least one auxiliary factor in the access control mapping relationship is not searched out.
Specifically, in an application case, after the user equipment obtains the QoS flow ID of the uplink message to be sent, and the access category matching the QoS flow ID is not searched out in the access control mapping relationship, the QoS flow ID can be directly mapped to the access category of the lowest priority, so that the access control operation can be performed by utilizing the access category of the lowest priority, thereby saving the waiting time. In other application cases, the user equipment may also send the updated access mapping relationship to the base station, so that the base station can update the data. In other application cases, when the user equipment does not search out an access category matching the at least one auxiliary factor in the access control mapping relationship, or does not search out an access category matching a combination of the QoS flow ID and at least one auxiliary factor, the user equipment may map the at least one auxiliary factor or a combination of the QoS flow ID and at least one auxiliary factor to the access category of the lowest priority.
Of course, in other embodiments, when the user equipment does not search out a matching  access category in the access control mapping relationship, the user equipment may suspend the sending of the uplink message and wait for the base station to update the access control mapping relationship, and the user equipment may also map the QoS flow ID which does not match to an access category to any access category, which is not specifically limited herein.
Referring to FIG. 7, a flow chart of a fourth embodiment of an access control method according to the present disclosure. As shown in FIG. 7, the fourth embodiment of the access control method of the present disclosure is based on the first embodiment of the access control method of the present disclosure. Block S12 may further include the following blocks.
At S123: searching a service category having a mapping relationship with the QoS flow ID and /or at least one auxiliary factor of the uplink message to be sent in the access control mapping relationship.
Where, when the user equipment generates the uplink message to be sent, the QoS flow ID of the uplink message can be obtained by mapping the QoS flow ID of the uplink message, or a QoS flow ID generated randomly by the user equipment, which is not specifically limited herein. The access control mapping relationship at least includes a mapping relationship between a QoS flow ID and /or at least one auxiliary factor and the service category.
Specifically, in an application case, as shown in FIG. 8, the access control mapping relationship includes a mapping of at least one QoS flow ID and a service (traffic) category, and a mapping of at least one service category and an access category. After the user equipment obtains the QoS flow ID of the uplink message to be sent, the service category to which the QoS flow ID maps is searched in the access control mapping relationship.
For instance, when the QoS flow ID of the uplink message to be sent which is obtained by the user equipment is 0x2a, it can be searched out that an access category to which 0x2a maps is an access category 3, according to an access control mapping relationship table of FIG. 8.
Of course, in other application cases, the access parameter may only include at least one auxiliary factor, and the access control mapping relationship may also only include a mapping relationship between at least one auxiliary factor and a service category, and a mapping relationship between a service category and an access category, which is not specifically limited herein.
S124: matching the access category corresponded by the service category in the access control mapping relationship.
In the above-mentioned application case, as shown in FIG. 8, after the user equipment searches out the service category to which the QoS flow ID maps in the access control mapping relationship, it continues to search the access category having the mapping relationship with the service category in the access control mapping relationship.
For instance, when the service category searched out by the user equipment according to  the access control mapping relationship table of FIG. 8 is the service category 2, the access category mapped by the service category 2 which can be searched out according to the access control mapping relationship table again is the access category 1.
In other application cases, the access control mapping relationship further includes a mapping relationship between a combination of a service category and at least one auxiliary factor as well as an access category.
Optionally, as shown in FIG. 9, block S124 includes the following block.
At S1241: searching the access category having the mapping relationship with the service category and /or at least one auxiliary factor in the access control mapping relationship.
Specifically, in the above-mentioned application case, as shown in FIG. 8, the access control mapping relationship includes a mapping of at least one QoS flow ID and one service category, and a mapping of a combination of at least one service category and at least one auxiliary factor as well as one access category. After the user equipment searches out the service category to which the QoS flow ID of the uplink message to be sent maps, it searches an access category to which the service category maps in the access control mapping relationship, or searches an access category to which a combination of the service category and at least one auxiliary factor maps.
For instance, when the service category searched out by the user equipment according to the access control mapping relationship table of FIG. 8 is the service category 3, and the priority of the user equipment is 1, which can search out that the access category to which a combination of the service category 3 and the priority 1 (UE Category = 1) of the user equipment maps is the access category 2, according to the access control mapping relationship table of FIG. 8.
Of course, in other application cases, the access control mapping relationship may only include a mapping relationship between a QoS flow ID and a service category, and a mapping relationship between a service category and an access category; or only include a mapping relationship between a QoS flow ID and a service category, and a mapping relationship between a combination of a service category and at least one auxiliary factor as well as an access category; or only include a mapping relationship between at least one auxiliary factor and a service category, and a mapping relationship between a service category and /or at least another auxiliary factor as well as an access category, which is not specifically limited herein.
In this embodiment, a QoS flow ID and /or at least one auxiliary factor is mapped to a service category first, and more QoS flow IDs and /or auxiliary factors can be mapped to fewer service categories, thereby reducing the subsequent mapping relationship with respect to the access category and reducing the difficulty of the user equipment to search the mapping relationship so as to improve the efficiency of search.
Referring to FIG. 10, a flow chart of a fifth embodiment of an access control method  according to the present disclosure is depicted. As shown in FIG. 10, the fifth embodiment of the access control method of the present disclosure is based on the fourth embodiment of the access control method of the present disclosure. Block S12 may further include the following block.
At S125: mapping the QoS flow ID and /or at least one auxiliary factor to the service category of the lowest priority through the user equipment, when a service category having a mapping relationship with the QoS flow ID and /or at least one auxiliary factor does not searched out in the access control mapping relationship.
Specifically, in an application case, after the user equipment obtains the QoS flow ID of the uplink message to be sent, and the service category matching the QoS flow ID is not searched out in the access control mapping relationship, the QoS flow ID can be directly mapped to the service category of the lowest priority, so that the access control operation can be performed by utilizing the access category corresponded by the service category of the lowest priority, thereby saving the waiting time. In other application cases, the user equipment may also send the updated access mapping relationship to the base station, so that the base station can update the data. In other application cases, the user equipment may map at least one auxiliary factor which does not match to a service category to a service category of the lowest priority, or map a QoS flow ID and at least one auxiliary factor which do not match to a service category to a service category of the lowest priority, which is not specifically limited herein.
Of course, in other embodiments, if the user equipment does not search out a matching service category in the access control mapping relationship, the user equipment may suspend the sending of the uplink message and wait for the base station to update the access control mapping relationship, and the user equipment may also map the QoS flow ID which does not match to a service category to any service category, which is not specifically limited herein.
Referring to FIG. 11, a flow chart of a sixth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 11, the sixth embodiment of the access control method of the present disclosure is based on the first embodiment of the access control method of the present disclosure. Block S13 may include the following blocks.
At S131: performing a barring check to the uplink message to obtain an access probability of the uplink message.
Where, a barring check method which has a same formula with the ACDC mechanism of the LTE system can be adopted as the barring check, and other barring check method can also be adopted, which is not specifically limited herein.
Specifically, in an application case, the user equipment randomly generates a random number between 0-1 utilizing a random function, takes the random number as the access probability of the uplink message, in which the random function can be an even distributed random function  between 0-1, and can be other type of random function, which can be specifically set basing on different access categories, and is not specifically limited herein.
At S132: determining whether the access probability is greater than an access probability threshold.
At S133: allowing the sending of the uplink message when the access probability is greater than the access probability threshold.
In the above-mentioned application case, the downlink message further includes an access control parameter at least including the access probability threshold corresponded by each access category; where, the access categories of the higher priorities correspond to the lower access probability thresholds, which have higher access probabilities. After the user equipment obtains the access probability (e.g., 0.5) of the uplink message, the access probability threshold (e.g., 0.3) corresponded by the access category can be obtained through the access category obtained by the previous matching. The access probability and the access probability threshold are compared, and when the access probability is greater than the access probability threshold (e.g., 0.5 is greater than 0.3) , the uplink message is allowed to send, and the user equipment can send the uplink message to the base station, that is, a service request can be initiated, or the sending of communication data to the base station may be continued.
Of course, in other embodiments, the access probability threshold may also be generated by the user equipment according to the priority of the access category, which is not specifically limited herein.
This embodiment may also be combined with any of the second to the fifth embodiments of the access control method of the present disclosure and their non-conflicting combination.
Referring to FIG. 12, a flow chart of a seventh embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 12, the seventh embodiment of the access control method of the present disclosure is based on the sixth embodiment of the access control method of the present disclosure. Block S13 may further include the following block.
At S134: restricting the sending of the uplink message through the user equipment, when the access probability of the uplink message is not greater than the access probability threshold.
Specifically, in an application case, after the user equipment obtains the access probability (e.g., 0.2) of the uplink message to be sent, the access probability threshold (e.g., 0.4) corresponded by the access category can be obtained through the access category obtained by the previous matching. The access probability and the access probability threshold are compared, and when the access probability is not greater than the access probability threshold (e.g., 0.2 is smaller than 0.4) , the uplink message is restricted to send, and the user equipment can’t send the uplink message to the base station, that is, a service request can’t be initiated, or the sending of communication data to  the base station may not be continued.
Optionally, as shown in FIG. 13, block S134 includes the following block.
At S1341: storing the uplink message in a buffer.
Specifically, in the above-mentioned application case, when the user equipment restricts the sending of the uplink message, the uplink message may be temporarily stored in the buffer, and to wait the base station to update the access control mapping relationship, or wait for a period of time to redo the barring check.
Of course, in other embodiments, the user equipment may also directly delete the uplink message, which is not specifically limited herein.
Referring to FIG. 14, a flow chart of an eighth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 14, the eighth embodiment of the access control method of the present disclosure is based on the seventh embodiment of the access control method of the present disclosure, in which the user equipment is in the idle status. Block S134 may further include the following block.
At S1342: turning on an access standby timer and disallowing the same service connection request to be initiated when the value of the timer is smaller than the access waiting time through the user equipment.
Where, when the user equipment is in the idle status, the uplink message to be sent is a service connection request message, such as radio resource control signaling (RRC signaling) , and the access control parameter further includes an access waiting time corresponded by each access category, and the specific value of the access waiting time can be defined basing on actual needs, which is not specifically limited herein.
Specifically, in an application case, each access category corresponds to an individual access waiting time, and the access waiting time of the access category of a higher priority is less than the access waiting time of the access category of a lower priority. An access waiting timer corresponded by the access category of the uplink message is enabled while the user equipment restricts the sending of the uplink message to be sent. When the timing value of the access waiting timer is smaller than the access waiting time corresponded by the access category, the user equipment does not initiate the same service request, and when the timing value of the access waiting timer is equal to the access waiting time corresponded by the access category, the user equipment can initiate the same service request and clear the timing value of the access waiting timer simultaneously.
Of course, in other embodiments, the access waiting timer may not be cleared, instead, the differentiate between the current timing value and the initial timing value as well as the access waiting time can be compared in the next timing process. In addition, the access waiting time of  each access category can also be changed according to actual needs, which is not specifically limited herein.
Referring to FIG. 15, a flow chart of a ninth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 15, the ninth embodiment of the access control method of the present disclosure is based on the seventh embodiment of the access control method of the present disclosure. The method may further include the following block.
At S14: generating a mapping matrix including the access category and an access status corresponded by the access category through the user equipment.
Where, the access status includes a not barred status, a barred status, and an unknown status, in which the unknown status is an initial status of the access status. When the user equipment allows the sending of the uplink message to be sent, the access status corresponded by the access category which matches a QoS flow ID of the uplink message is set to the not barred status. When the user equipment restricts the sending of the uplink message to be sent, the access status is set to the barred status.
Specifically, in an application case, the user equipment generates the mapping matrix. As shown in FIG. 16, the mapping matrix includes an access category and an access status corresponded by each access category, in which the access status includes a not barred status (Not barred) , a barred status (Barred) , and an unknown status (N/A) . In an initial status, the user equipment generates the access category included in the access control mapping relationship and the access status corresponded by the access category, according to the received access control mapping relationship. Where, in the initial status of the access status, i.e., the initial access status, may set to the unknown status (N/A) . After the user equipment performs the barring check to the uplink message to be sent, the access status corresponded by the access category matched by the QoS flow ID of the uplink message is set to the not barred status while the uplink message is allowed to be sent, and the access status corresponded by the access category matched by the QoS flow ID is set to the barred status while the user equipment restricts the sending of the uplink message.
Of course, in other embodiments, the initial access status may also be set to the not barred status or the barred status, in which the mapping matrix further includes a service category and /or at least one auxiliary factor corresponded by an access category, and may also include a QoS flow ID and /or at least one auxiliary factor corresponded by a service category, or the mapping matrix further includes a QoS flow ID and /or at least one auxiliary factor corresponded by an access category, which is not specifically limited herein.
The execution of the block of this embodiment may be performed after block S131.
Referring to FIG. 17, a flow chart of a tenth embodiment of an access control method  according to the present disclosure is depicted. As shown in FIG. 17, the tenth embodiment of the access control method of the present disclosure is based on the ninth embodiment of the access control method of the present disclosure, in which the user equipment is in the connected status. Block S13 may further include the following blocks.
At S135: obtaining the access status corresponded by the access category in the mapping matrix.
At S136: sending the uplink message when the access status is the not barred status.
At S137: restricting the sending of the uplink message when the access status is the barred status.
Where, the user equipment may restrict the sending of the uplink message by temporarily storing the uplink message in the buffer and resending after waiting for the access status to become to the not barred status, or by discarding the uplink message directly, which is not specifically limited herein.
Specifically, when the user equipment is in the connected status, the access category matching the QoS flow ID can be searched out by utilizing the access control mapping relationship after the user equipment obtains the QoS flow ID of the uplink message to be sent. Thereafter, the access status corresponded by the access category can be obtained directly from the stored mapping matrix. When the access status is the not barred status, the user equipment sends the uplink message to the base station. When the access status is the barred status, the user equipment restricts the sending of the uplink message, thereby avoiding the overload of the base station due to the excessive data sending by the user equipment.
In this embodiment, when the user equipment is in the connected status, the access status is directly obtained from the mapping matrix for access control, and it is not necessary to repeat the barring check for each uplink message, which reduces the calculations of the user equipment, reduces the burden of the user equipment, and improves the access control efficiency.
In other embodiments, when the user equipment is in the connected status, it is also possible to perform the access control by adopting the method of performing the barring check for each uplink message, which is not specifically limited herein.
The execution of the blocks of this embodiment may be performed after block S14.
Referring to FIG. 18, a flow chart of an eleventh embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 18, the eleventh embodiment of the access control method of the present disclosure is based on the ninth embodiment of the access control method of the present disclosure, in which the mapping matrix further includes a timeout period for each access status. Block S14 may further include the following blocks.
At S141: determining whether a duration of the access status is greater than the update  period of the access status through the user equipment.
Specifically, as shown in FIG. 19, the mapping matrix stored by the user equipment further includes a timeout period of each access status, and the access status needs to be updated when the duration of each access status reaches the timeout period of the access status. The timeout period of each access status can be set according to actual needs, which is not specifically limited herein.
S142: setting the access status to the unknown status when the duration of the access status is greater than the update period of the access status.
Specifically, when the user equipment sets each access status to the not barred /the barred status, as Not Barred/Barred status shown in FIG. 19, a timer is enabled. When the value of the timer is greater than the timeout period (e.g., 30 minutes) of the access status, which indicates that the duration of the access status needs to be updated, and the user equipment sets the access status to the unknown status, as N/Astatus shown in FIG. 19, so as to perform the barring check subsequently to realize the status update with respect to the next uplink message to be sent.
Of course, in other embodiments, the user equipment may also set the access status to null or clear the access status when the duration of the access status is greater than the timeout period of the access status, and the access status of the changed access category may also be set to the unknown status when the user equipment receives a message of updating the access control mapping relationship which is sent by the base station, which is not specifically limited herein.
Referring to FIG. 20, a flow chart of a twelfth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 20, the twelfth embodiment of the access control method of the present disclosure is based on the tenth embodiment of the access control method of the present disclosure. Block S13 may further include the following block.
At S138: returning to the performing the barring check to the uplink message to obtain the access probability of the uplink message when the access status is the unknown status, so as to set the access status corresponded by the uplink message to the not barred status or the barred status.
Specifically, in an application case, when the user equipment is in the connected status, after the access category matching the QoS flow ID of the uplink message to be sent is obtained, and the access status corresponded by the access category obtained by matching which is searched out from the mapping matrix is the unknown status, the user equipment needs to perform the barring check to the uplink message. When the uplink message is allowed to be sent, the access status of the access category obtained by matching in the mapping matrix is set to the not barred status. When the sending of the uplink message is restricted, the access status of the access category obtained by matching is set to the barred status, thereby realizing the update of the access status in the mapping matrix.
This embodiment may also be combined with any of the sixth, the ninth, and the eleventh  embodiments of the access control method of the present disclosure or their non-conflicting combination.
Referring to FIG. 21, a flow chart of a thirteenth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 21, an execution main body of the thirteenth embodiment of the access control method of the present disclosure is a base station. The base station is connected to the core network and performs wireless communication with the user equipment, and provides communication coverage for a corresponding geographical area. The base station may be a macro base station, a micro base station, a pico base station, or a femtocell. In some embodiments, the base station may also be referred to as a radio base station, an access point, a Node B, an evolved Node B (eNodeB, eNB) , a gNB, or other suitable terminology. The method may include the following blocks.
At S21: generating an access control mapping relationship, where the access control mapping relationship includes a mapping relationship between an access parameter and an access category.
The access parameter includes a QoS flow ID and /or at least one auxiliary factor, where the auxiliary factor is a status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
Specifically, in an application case, as shown in FIG. 3, the base station maps a QoS flow ID (QFI) and an access category (AC) corresponded by at least one existing QoS flow, thereby generating the access control mapping relationship. Where, the base station can map the QFI corresponded by a same type of QoS flow to a same AC basing on an operator's strategy such as mapping the data flow of a video service to the same AC. The base station may send the downlink message to the user equipment according to its own load condition so as to update the access control mapping relationship. In other application cases, the access parameter may also only include at least one auxiliary factor, and the base station may map at least one auxiliary factor such as the user equipment priority of 1 and the service category of video, to the access category 2.
Of course, in other embodiments, the base station may also perform mapping basing on other mapping criteria, for example, mapping the QFI corresponded by the QoS flow with a same QoS requirement to a same AC, and so on, and when the base station generates the access control mapping relationship, other metrics such as roaming status, priority, etc. of the user equipment can also be considered, or a Traffic Category (TC) can be added to map the QFI to the TC first, and then map the TC to the AC, which is not specifically limited herein.
At S22: sending a downlink message to an user equipment, where the downlink message includes the access control mapping relationship such that the user equipment utilizes an access  category corresponded by an access parameter of an uplink message to be sent matched in the access control mapping relationship to perform an access control.
Where, the downlink message may be a radio resource control message or a system broadcast message, or other type of message, and the access category may be pre-defined, the amount of access categories and the specific access category may be defined basing on actual needs, which is not specifically limited herein.
Specifically, as shown in FIG. 3, the base station may send the downlink message to the user equipment in a broadcast manner, or may send the downlink message to the user equipment through a certain idle channel, which is not specifically limited herein. After the user equipment receives the downlink message of the base station, and before sending the uplink message to the base station, for instance, when sending the uplink message of a service request, it searches the access category corresponded by the QFI of the uplink message in the access control mapping relationship first, that is, searching the AC having the mapping relationship with the QFI of the uplink message, and performing the subsequent access control blocks when the matching AC is searched out. The specific access control block may refer to the first to the twelfth embodiments of the access control method of the present disclosure, which is not repeated herein.
In this embodiment, the base station generates the access control mapping relationship, and sends the access control mapping relationship to the user equipment so that the user equipment can perform an access decision basing on the access control mapping relationship and execute the corresponding access control. The user equipment can perform the access control by merely obtaining the access category corresponded by the uplink message to be sent in the access control mapping relationship. As the access control mapping relationship is considered unifiedly by the base station, the embodiment of the present disclosure could reduce the burden of the user equipment and improve the access control efficiency, which can be applied to the idle status and the connected status of the user equipment, while having a wide application scope and a high compatibility.
Referring to FIG. 22, a flow chart of a fourteenth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 22, the fourteenth embodiment of the access control method of the present disclosure is based on the thirteenth embodiment of the access control method of the present disclosure. Block S21 may include the following block.
At S211: mapping a combination of at least one QoS flow ID and /or at least one auxiliary factor to an access category.
Where, the auxiliary factor is a status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not  specifically limited herein.
Specifically, in an application case, the base station directly maps a QoS flow ID to an access category. As shown in FIG. 5, the base station may map at least one QoS flow ID to an access category, for example, mapping 0x1a, 0x1b, and 0x1c to the access category 1, and the base station may further map a combination of at least one QoS flow ID and at least one auxiliary factor to an access category, for example, mapping 0x3a, 0x4d, and a non-roaming user equipment (non-roaming UE) to the access category 3.
Of course, in other application cases, when the base station generates the access control mapping relationship, it is possible to generate only a mapping relationship between a QoS flow ID and an access category, or only a mapping relationship between a combination of a QoS flow ID and at least one auxiliary factor as well as an access category, or only generate a mapping relationship between at least one auxiliary factor and an access category, which is not specifically limited herein.
In this embodiment, when the base station generates the access control mapping relationship, the status of the user equipment is also considered, for example, to distinguish between roaming and non-roaming user equipment, in which the consideration factors are more full-scale such that the application scope can be wider and it is more efficient for the user equipment to utilize the access control mapping relationship to perform the access control.
Referring to FIG. 23, a flow chart of a fifteenth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 23, the fifteenth embodiment of the access control method of the present disclosure is based on the thirteenth embodiment of the access control method of the present disclosure. Block S21 may further include the following block.
At S212: setting an access control parameter corresponded by each access category, in which the access control parameter includes an access probability threshold and an access waiting time; where, the downlink message further includes the access control parameter.
Specifically, in an application case, the access categories of the higher priorities correspond to the lower access probability thresholds, which have higher access probabilities. When the base station generates the access control mapping relationship, it also sets the corresponding access control parameter for each access category, and generates the downlink message utilizing the access control mapping relationship and the access control parameter to send to the user equipment. When the user equipment receives the downlink message, it is possible to utilize the obtained access control mapping relationship and access control parameter to perform the access control. Where, the specific flow of the user equipment to perform the access control may refer to any of the sixth to the twelfth embodiments of the access control method of the present disclosure and their  non-conflicting combination, which is not repeated herein.
Of course, in other embodiments, the access probability threshold may also be generated by the user equipment according to the priority of the access category, which is not specifically limited herein.
Referring to FIG. 24, a flow chart of a sixteenth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 24, the sixteenth embodiment of the access control method of the present disclosure is based on the thirteenth embodiment of the access control method of the present disclosure. The method may further include the following block before block S21.
At S20: receiving a mapping notification message from a core network device, in which the mapping notification message includes a mapping relationship between the QoS flow ID and /or at least one auxiliary factor as well as a service category.
Where, the core network device may be a gateway, a router, etc., for example, a mobile management entity (MME) in an LTE system, or a serving GPRS support node (SGSN) in a UMTS system, which is not specifically limited herein.
Specifically, in an application case, as shown in a combination of FIG. 25 and FIG. 26, when there has the larger QoS flows, the core network device may first map at least one QoS flow ID to a service (traffic) category, for example, mapping the QoS flow IDs 0x1a and 0x1b to the service category 1, mapping the QoS flow ID 0x1c to the service category 2, and utilizing a mapping relationship between the QoS flow ID and service category to generate the mapping notification message to send to the base station, so that the base station generates the access control mapping relationship to send to the user equipment, and the user equipment can utilize the access category obtained by matching in the access control mapping relationship to perform the access control. In other application cases, the core network device may map at least one auxiliary factor to a service category. For example, as shown in FIG. 26, the service category of video (Service =video) is mapped to a service category 5, and the mapping relationship is sent to the base station, which is not specifically limited herein.
In this embodiment, the core network device completes a mapping relationship between a QoS flow ID and /or at least one auxiliary factor as well as a service category in advance and sends it to the base station. When the base station receives the mapping relationship, the access control mapping relationship can be generated by merely generating a mapping relationship between a service category and an access category, thereby reducing the burden on the base station.
Referring to FIG. 27, a flow chart of a seventeenth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 27, the seventeenth embodiment of the access control method of the present disclosure is based on the sixteenth  embodiment of the access control method of the present disclosure. Block S21 may further include the following block.
At S213: generating the mapping relationship between the service category and /or at least one auxiliary factor as well as the access category.
Where, the auxiliary factor is a status parameter of the user equipment itself, which includes at least one of a priority, a call type, a service category, and a roaming status of the user equipment, and may include other parameters related to the user equipment, which is not specifically limited herein.
Optionally, as shown in FIG. 28, block S213 includes the following block.
At S2131: mapping at least one service category and /or at least one auxiliary factor to an access category.
For example, as shown in FIG. 29, the service category 1 and the service category 2 (TC = 1, 2) are mapped to the access category 1, and a combination of the service category 3 (TC = 3) and the user equipment priority of 1 (UE Category = 1) are mapped to the access category 2, and the non-roaming user equipment (non-roaming UE) is mapped to the access category 3.
Of course, in other application cases, the base station may only map at least one service category to an access category, or only map a combination of at least one service category and at least one auxiliary factor to an access category, or only map at least one auxiliary factor to an access category, which is not specifically limited herein.
In this embodiment, since various factors such as service categories and the status of the user equipment are considered comprehensively when the base station generates the access control mapping relationship, which has more application scenarios, and is more efficient for the user equipment to utilize the access control mapping relationship to perform the access control.
Referring to FIG. 30, a flow chart of an eighteenth embodiment of an access control method according to the present disclosure is depicted. As shown in FIG. 30, an execution main body of the eighteenth embodiment of the access control method of the present disclosure is a core network device. The core network mainly provides the user connection and the user management, and carries the services. As an interface of the carrier network which is provided to the external network, the core network device includes gateways, routers, etc., for example, a mobile management entity (MME) in an LTE system, or a serving GPRS support node (SGSN) in a UMTS system, etc. The method may include the following blocks.
At S31: generating a mapping relationship between a QoS flow ID and /or at least one auxiliary factor as well as a service category.
At S32: sending a mapping notification message to a base station to cause the base station to generate an access control mapping relationship, where the notification message includes the  mapping relationship between the QoS flow ID and /or at least one auxiliary factor as well as the service category.
Optionally, as shown in FIG. 31, block S31 includes the following block.
At S311: mapping at least one QoS flow and /or at least one auxiliary factor to a service category.
Specifically, in an application case, as shown in a combination of FIG. 25 and FIG. 26, when there has the larger QoS flows, the core network device may first map at least one QoS flow ID to a service category, for example, mapping the QoS flow IDs 0x1a and 0x1b to the service category 1, mapping the QoS flow ID 0x1c to the service category 2, and utilizing the mapping relationship between the QoS flow ID and the service category to generate the mapping notification message and send to the base station, so that the base station generates the access control mapping relationship to send to the user equipment, and the user equipment can utilize the access category obtained by matching in the access control mapping relationship to perform the access control. Where, the core network device can map a same type of QoS flow to a same service category basing on an operator's strategy, for example, mapping a QoS flow of a video service to the same service category. Of course, the core network device may also perform the mapping of a QoS flow ID and a service category basing on other factors, which is not specifically limited herein. In other application cases, the core network device may also map at least one auxiliary factor to a service category, for example, as shown in FIG. 26, the service category of video (Service = video) is mapped to the service category 5, and the mapping relationship is sent to the base station, which is not specifically limited herein.
In this embodiment, the core network device completes a mapping relationship between a QoS flow ID and /or at least one auxiliary factor as well as a service category in advance and sends it to the base station. When the base station receives the mapping relationship, the access control mapping relationship can be generated by merely generating a mapping relationship between a service category and an access category, thereby reducing the burden on the base station.
As shown in FIG. 32, a first embodiment of a communication device 10 of the present disclosure includes a processor 110 and a communication circuit 120, in which the processor 110 connects the communication circuit 120.
The communication circuit 120 is configured to send and receive data, and is an interface for the communication device 10 to communicate with other communication devices.
The processor 110 controls the operation of the communication device 10, which may also be referred to as a CPU (Central Processing Unit) . The processor 110 may be an integrated circuit chip having signal processing capability. The processor 110 may also be a general purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field  programmable gate array (FPGA) , or be other programmable logic device, a discrete gate, a transistor logic device, and a discrete hardware component. The general purpose processor may be a microprocessor, or the processor 110 may also be any conventional processor.
The processor 110 is configured to execute instructions to implement any of the first to the twelfth embodiments of the access control method of the present disclosure and their non-conflicting combination.
Of course, in other embodiments, the communication device 10 may also include other components such as a memory (not shown) , which is not specifically limited herein.
The communication device 10 in this embodiment may be a user equipment such as a terminal, or a separate component which can be integrated into the terminal, such as a baseband chip.
As shown in FIG. 33, a second embodiment of a communication device 20 of the present disclosure includes a processor 210 and a communication circuit 220, where the processor 210 is connected to the communication circuit 220.
The communication circuit 220 is send and receive data, and is an interface for the communication device 20 to communicate with other communication devices.
The processor 210 controls the operation of the communication device 20, which may also be referred to as a CPU (Central Processing Unit) . The processor 210 may be an integrated circuit chip having signal processing capability. The processor 210 may also be a general purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) , or be other programmable logic device, a discrete gate, a transistor logic device, and a discrete hardware component. The general purpose processor may be a microprocessor, or the processor 210 may also be any conventional processor.
The processor 210 is configured to execute instructions to implement any of the thirteenth to the seventeenth embodiments of the access control method of the present disclosure and their non-conflicting combination.
Of course, in other embodiments, the communication device 20 may also include other components such as a memory (not shown) , which is not specifically limited herein.
The communication device 20 in this embodiment may be a base station, or an independent component integrated in the base station, such as a baseband board.
As shown in FIG. 34, a third embodiment of a communication device 30 of the present disclosure includes a processor 310 and a communication circuit 320, where the processor 310 is connected to the communication circuit 320.
The communication circuit 320 is send and receive data, and is an interface for the communication device 30 to communicate with other communication devices.
The processor 310 controls the operation of the communication device 30, which may also be referred to as a CPU (Central Processing Unit) . The processor 210 may be an integrated circuit chip having signal processing capability. The processor 310 may also be a general purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) , or be other programmable logic device, a discrete gate, a transistor logic device, and a discrete hardware component. The general purpose processor may be a microprocessor, or the processor 310 may also be any conventional processor.
The processor 310 is configured to execute instructions to implement any of the eighteenth embodiments of the access control method of the present disclosure.
Of course, in other embodiments, the communication device 30 may also include other components such as a memory (not shown) , which is not specifically limited herein.
The communication device 30 in this embodiment may be a core network device, such as a gateway, a router, or the like, or a separate component which can be integrated into the core network device.
As shown in FIG. 35, a fourth embodiment of a communication device 40 of the present disclosure includes:
communication module 401 configured to receive a downlink message from a base station through an user equipment, where the downlink message includes an access control mapping relationship, the access control mapping relationship includes a mapping relationship between an access parameter and an access category.
matching module 402 configured to match the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship.
control module 403 is configured to perform an access control utilizing the access category obtained by matching.
Of course, in other embodiments, the communication device 40 may also include other components such as a memory (not shown) , which is not specifically limited herein.
The communication device 40 in this embodiment may be a user equipment such as a terminal, or a separate component which can be integrated into the terminal, such as a baseband chip.
As shown in FIG. 36, a fifth embodiment of a communication device 50 of the present disclosure includes:
mapping module 501 configured to generate an access control mapping relationship, the access control mapping relationship comprising a mapping relationship between an access parameter and an access category.
communication module 502 configured to send a downlink message to an user  equipment, the downlink message comprising the access control mapping relationship such that the user equipment utilizes an access category corresponded by an access parameter of an uplink message to be sent matched in the access control mapping relationship to perform an access control.
Of course, in other embodiments, the communication device 50 may also include other components such as a memory (not shown) , which is not specifically limited herein.
The communication device 50 in this embodiment may be a base station, or an independent component integrated in the base station, such as a baseband board.
As shown in FIG. 37, a sixth embodiment of a communication device 60 of the present disclosure includes:
mapping module 601 configured to generate a mapping relationship between a QoS flow ID and /or at least one auxiliary factor and a service category.
communication module 602 configured to send a mapping notification message to a base station to cause the base station to generate an access control mapping relationship, wherein the notification message comprises the mapping relationship between the QoS flow ID and /or at least one auxiliary factor and the service category.
Of course, in other embodiments, the communication device 60 may also include other components such as a memory (not shown) , which is not specifically limited herein.
The communication device 60 in this embodiment may be a core network device, such as a gateway, a router, or the like, or a separate component which can be integrated into the core network device.
As shown in FIG. 38, in a first embodiment of a device 70 with a storage function of the present disclosure, the device 70 has a program 701 stored therein. When the program 701 is executed, any of the first to the twelfth embodiments of the access control method of the present disclosure and their non-conflicting combination is implemented.
Where, the device 70 with the storage function may be a portable storage medium such as a USB disk and an optical disk, or be a base station, a server, or be a separate component integrated into the base station such as a baseband board.
As shown in FIG. 39, in a second embodiment of a device 80 with a storage function of the present disclosure, the device 80 has a program 801 stored therein. When the program 801 is executed, any of the thirteenth to the seventeenth embodiments of the access control method of the present disclosure and their non-conflicting combination is implemented.
Where, the device 80 with the storage function may be a portable storage medium such as a USB disk and an optical disk, or be a terminal, a server, or be a separate component integrated into the base station such as a baseband chip.
As shown in FIG. 40, in a third embodiment of a device 90 with a storage function of the  present disclosure, the device 90 has a program 901 stored therein. When the program 901 is executed, the eighteenth embodiment of the access control method of the present disclosure is implemented.
Where, the device 90 with the storage function may be a portable storage medium such as a USB disk and an optical disk, or be a base station, a server, or be a separate component integrated into the base station such as a baseband chip.
The foregoing are merely embodiments of the present disclosure, which are not for limiting the scope of the present disclosure. Any equivalent structure or process transformation based on the specification and the drawings of the present disclosure, or direct or indirect applications in other related arts, are all included in the protection scope of the present disclosure.

Claims (30)

  1. An access control method, comprising:
    receiving a downlink message from a base station through an user equipment, the downlink message comprising an access control mapping relationship, the access control mapping relationship comprising a mapping relationship between an access parameter and an access category;
    matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship; and
    performing an access control utilizing the access category obtained by matching.
  2. The method of claim 1, wherein the access parameter comprises at least one of a QoS flow ID and at least one auxiliary factor;
    wherein the matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship comprises:
    searching for the access category having the mapping relationship with at least one of the QoS flow ID and at least one auxiliary factor of the uplink message to be sent;
    wherein the auxiliary factor is a status parameter of the user equipment.
  3. The method of claim 2, wherein the matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship further comprises:
    mapping at least one of the QoS flow ID and at least one auxiliary factor to the access category of the lowest priority, when the access category matching at least one of the QoS flow ID and at least one auxiliary factor is not searched out in the access control mapping relationship.
  4. The method of claim 1, wherein the access parameter comprises at least one of a QoS flow ID and at least one auxiliary factor;
    wherein the matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship comprises:
    searching for a service category having the mapping relationship with at least one of the QoS flow ID and at least one auxiliary factor of the uplink message to be sent;
    matching the access category corresponded by the service category in the access control mapping relationship;
    wherein, the auxiliary factor is a status parameter of the user equipment.
  5. The method of claim 4, wherein the matching the access category corresponded by the access parameter of an uplink message to be sent in the access control mapping relationship further comprises:
    mapping at least one of the QoS flow ID and at least one auxiliary factor to the service category of the lowest priority, when the service category having the mapping relationship with at least one of the QoS flow ID and at least one auxiliary factor is not searched out in the access control mapping relationship.
  6. The method of claim 4, wherein the matching the access category corresponded by the service category in the access control mapping relationship comprises:
    searching the access category having the mapping relationship with at least one of the service category and at least one auxiliary factor in the access control mapping relationship.
  7. The method of one of claims 1 to 6, wherein the downlink message further comprising an access control parameter, the access control parameter at least comprises an access probability threshold corresponding to each access category;
    wherein the performing the access control utilizing the access category obtained by matching comprises:
    performing a barring check to the uplink message to obtain an access probability of the uplink message;
    determining whether the access probability is greater than the access probability threshold; and
    allowing the sending of the uplink message when the access probability is greater than the access probability threshold.
  8. The method of claim 7, wherein the performing the access control utilizing the access category obtained by matching further comprises:
    restricting the sending of the uplink message through the user equipment when the access probability is not greater than the access probability threshold.
  9. The method of claim 8, wherein the uplink message is a service connection request message when the user equipment is in an idle status; the access control parameter further comprises an access waiting time corresponded by each of the access category;
    wherein the restricting the sending of the uplink message through the user equipment further comprises:
    turning on the access standby timer and disallowing the same service connection request to be initiated when the value of the timer is smaller than the access waiting time through the user equipment.
  10. The method of claim 8, further comprising:
    generating a mapping matrix comprising the access category and an access status corresponded by the access category through the user equipment;
    wherein the access status comprises a not barred status, a barred status, and an unknown status, the unknown status is an initial status of the access status, the access status corresponded by the  access category which matches a QoS flow ID of the uplink message is set to the not barred status when the user equipment allows the sending of the uplink message, the access status is set to the barred status when the user equipment restricts the sending of the uplink message.
  11. The method of claim 10, wherein when the user equipment is in a connected status, the performing the access control utilizing the access category obtained by matching comprises:
    obtaining the access status corresponded by the access category in the mapping matrix;
    sending the uplink message when the access status is the not barred status; and
    restricting the sending of the uplink message when the access status is the barred status.
  12. The method of claim 8 or 11, wherein the restricting the sending of the uplink message comprises:
    storing the uplink message in a buffer.
  13. The method of claim 11, wherein the mapping matrix further comprises an update period for each access status;
    wherein the method further comprises:
    determining whether a duration of the access status is greater than the update period of the access status through the user equipment;
    setting the access status to the unknown status when the duration of the access status is greater than the update period of the access status.
  14. The method of claim 11, wherein after the obtaining the access status corresponded by the access category in the mapping matrix, further comprises:
    returning to the performing the barring check to the uplink message to obtain the access probability of the uplink message when the access status is the unknown status, so as to set the access status corresponded by the uplink message to the not barred status or the barred status.
  15. The method of claim 10, wherein the mapping matrix further comprises at least one of a service category and at least one auxiliary factor corresponded by the access category; or the mapping matrix further comprises at least one of a service category and at least one auxiliary factor corresponded by the access category, and at least one of a QoS flow ID and at least one auxiliary factor corresponded by the service category.
  16. The method of claim 10, wherein the mapping matrix further comprises at least one of a QoS flow ID and at least one auxiliary factor corresponded by the access category.
  17. The method of one of claims 2-6 and 15-16, wherein the auxiliary factor comprises at least one of a priority, a call type, a service category, and a roaming status of the user equipment.
  18. The method of claim 1, wherein the downlink message is a radio resource control message or a system broadcast message.
  19. An access control method, comprising:
    generating an access control mapping relationship, the access control mapping relationship comprising a mapping relationship between an access parameter and an access category; and
    sending a downlink message to an user equipment, the downlink message comprising the access control mapping relationship such that the user equipment utilizes an access category corresponded by an access parameter of an uplink message to be sent matched in the access control mapping relationship to perform an access control.
  20. The method of claim 19, wherein the access parameter comprises at least one of a QoS flow ID and at least one auxiliary factor;
    wherein the generating the access control mapping relationship comprises:
    mapping at least one of the QoS flow ID and at least one auxiliary factor to an access category.
  21. The method of claim 20, wherein the generating the access control mapping relationship further comprises:
    setting an access control parameter corresponded by each access category, the access control parameter comprising an access probability threshold and an access waiting time;
    wherein, the downlink message further comprises the access control parameter.
  22. The method of claim 19, wherein before the generating the access control mapping relationship further comprises:
    receiving a mapping notification message from a core network device, the mapping notification message comprising a mapping relationship between a service category and at least one of a QoS flow ID and at least one auxiliary factor.
  23. The method of claim 22, wherein the generating the access control mapping relationship comprises:
    generating a mapping relationship between the access category and at least one of the service category and at least one auxiliary factor.
  24. The method of claim 23, wherein the generating a mapping relationship between the access category and at least one of the service category and at least one auxiliary factor comprises:
    mapping at least one of the service categories and at least one auxiliary factor to one access category; or
    mapping at least one of the service categories or at least one auxiliary factor to one access category.
  25. The method of one of claims 20 and 23-24, wherein the auxiliary factor comprises at least one of a priority, a call type, a service category, and a roaming status of the user equipment.
  26. A method of one of claims 19-24, wherein the downlink message is a radio resource control message or a system broadcast message.
  27. An access control method, comprising:
    generating a mapping relationship between a service category and at least one of a QoS flow ID and at least one auxiliary factor; and
    sending a mapping notification message to a base station to cause the base station to generate an access control mapping relationship, wherein the notification message comprises the mapping relationship between the service category and at least one of the QoS flow ID and at least one auxiliary factor.
  28. The method of claim 27, wherein the generating the mapping relationship between the service category and at least one of the QoS flow ID and at least one auxiliary factor comprises:
    mapping the at least one QoS flow ID and at least one auxiliary factor to one service category; or
    mapping the at least one QoS flow ID or at least one auxiliary factor to one service category.
  29. A communication device, comprising: a processor and a communication circuit, the processor connects the communication circuit;
    the processor is configured to execute instructions to implement the method as claimed in any of claims 1-18, 19-26, and 27-28.
  30. A device with a storage function, storing instructions, wherein the instructions are executed to implement the method as claimed in any of claims 1-18, 19-26, and 27-28.
PCT/CN2017/107974 2017-08-01 2017-10-27 Access control method, communication device, and device with storage function WO2019024276A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710649243.1 2017-08-01
CN201710649243.1A CN109327882B (en) 2017-08-01 2017-08-01 Access control method, communication equipment and equipment with storage function

Publications (1)

Publication Number Publication Date
WO2019024276A1 true WO2019024276A1 (en) 2019-02-07

Family

ID=65233155

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/107974 WO2019024276A1 (en) 2017-08-01 2017-10-27 Access control method, communication device, and device with storage function

Country Status (2)

Country Link
CN (1) CN109327882B (en)
WO (1) WO2019024276A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3949520A4 (en) * 2019-03-28 2022-11-23 Nokia Technologies OY Access control barring based on cell quality

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866989B (en) * 2019-04-28 2024-08-27 华为技术有限公司 Communication method, device and system
CN110177391B (en) * 2019-06-06 2021-06-18 北京之乐时空科技有限公司 Control information transmission method and system for four-axis aircraft
CN113424639B (en) * 2019-06-27 2023-06-23 Oppo广东移动通信有限公司 Access control method, device and terminal
WO2021208059A1 (en) * 2020-04-17 2021-10-21 Oppo广东移动通信有限公司 Connection establishment method and apparatus, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674613A (en) * 2009-09-25 2010-03-17 中兴通讯股份有限公司 Access level control method and system
CN101938808A (en) * 2009-06-30 2011-01-05 中兴通讯股份有限公司 Information acquisition method and device
CN102118833A (en) * 2011-03-04 2011-07-06 电信科学技术研究院 Cell accessing indication method, cell selection method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100433705C (en) * 2005-03-17 2008-11-12 中兴通讯股份有限公司 Method of mapping scheduler priority level mark in high speed down packet access system
CN105635944A (en) * 2010-04-30 2016-06-01 中兴通讯股份有限公司 Machine communication access control method and system and system
CN104322108A (en) * 2013-05-03 2015-01-28 华为技术有限公司 Access control method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938808A (en) * 2009-06-30 2011-01-05 中兴通讯股份有限公司 Information acquisition method and device
CN101674613A (en) * 2009-09-25 2010-03-17 中兴通讯股份有限公司 Access level control method and system
CN102118833A (en) * 2011-03-04 2011-07-06 电信科学技术研究院 Cell accessing indication method, cell selection method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3949520A4 (en) * 2019-03-28 2022-11-23 Nokia Technologies OY Access control barring based on cell quality
US11617125B2 (en) 2019-03-28 2023-03-28 Nokia Technologies Oy Access control barring based on cell quality

Also Published As

Publication number Publication date
CN109327882A (en) 2019-02-12
CN109327882B (en) 2020-07-31

Similar Documents

Publication Publication Date Title
US20230093339A1 (en) Session Management Method, Apparatus, and System
US11558770B2 (en) Method for determining QoS description information and apparatus
WO2019024276A1 (en) Access control method, communication device, and device with storage function
US20210282053A1 (en) Transfer policy determining method, and apparatus
US8750213B2 (en) Providing a deny response that specifies a delay time
WO2022199371A1 (en) Cell handover method and apparatus, and storage medium, user equipment and base station device
WO2022171051A1 (en) Communication method and device
WO2012146101A1 (en) Eab parameter processing method and apparatus, access processing method, apparatus and system
US20230199550A1 (en) Relay Management Method and Communication Apparatus
WO2009046663A1 (en) A method, system and device of mapping system information block
WO2019024816A1 (en) Method and apparatus for transmitting information
WO2022152329A1 (en) Psfch transmission method and device for sidelink, and storage medium
WO2020102989A1 (en) Method, terminal device and network device for registration
WO2014047912A1 (en) User grouping method and apparatus
WO2018219253A1 (en) Access control method and apparatus
WO2019029568A1 (en) Communication method, terminal device, and network device
US20240163714A1 (en) Communication method and communication apparatus
WO2015143763A1 (en) Load information transfer method, system, network elements and computer storage medium
WO2020192387A1 (en) Request processing method, related apparatus and system
WO2014205621A1 (en) Overload control method and apparatus
WO2022171119A1 (en) Communication method and device
WO2022206007A1 (en) Relay communication method and apparatus, and storage medium and relay
WO2020024611A1 (en) Information transmission method and device, and computer storage medium
WO2018227564A1 (en) Communication method, terminal device, and network device
US20220201789A1 (en) Redirection Method And Related Device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17919886

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17919886

Country of ref document: EP

Kind code of ref document: A1