WO2019136880A1 - Access control method, user equipment, base station and storage apparatus - Google Patents

Access control method, user equipment, base station and storage apparatus Download PDF

Info

Publication number
WO2019136880A1
WO2019136880A1 PCT/CN2018/084469 CN2018084469W WO2019136880A1 WO 2019136880 A1 WO2019136880 A1 WO 2019136880A1 CN 2018084469 W CN2018084469 W CN 2018084469W WO 2019136880 A1 WO2019136880 A1 WO 2019136880A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
trigger event
user equipment
access stratum
event
Prior art date
Application number
PCT/CN2018/084469
Other languages
French (fr)
Inventor
Xin XIA
Original Assignee
Jrd Communication (Shenzhen) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jrd Communication (Shenzhen) Ltd filed Critical Jrd Communication (Shenzhen) Ltd
Publication of WO2019136880A1 publication Critical patent/WO2019136880A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel

Definitions

  • the embodiments of the present disclosure generally relate to wireless communication technology, and in particular relate to an access control method, a user equipment, a base station and a storage apparatus.
  • an inactive state (INACTIVE) is introduced in addition to an idle state (IDLE) and a connected state (CONNECTED) .
  • an access control needs to be performed when a user equipment (UE, also called as terminal) tries to access a network, in order to determine whether a service request may be initiated, and avoid overload problems at a network side (including an access network and a core network) .
  • UE user equipment
  • a network side including an access network and a core network
  • the technical problem to be solved by the present disclosure is to provide an access control method, a user equipment, a base station and a storage apparatus, which provides a unified access control mechanism applicable to the user equipment in all states for the 5G-NR system.
  • a first aspect of the present disclosure provides an access control method used in a new radio system of the fifth generation mobile communication technology.
  • the method includes: when a user equipment is in a connected state or an inactive state, detecting whether there is a trigger event, wherein the trigger event is an access stratum trigger event or a non-access stratum trigger event; when the trigger event is detected, mapping the trigger event to an access category, and the access stratum or the non-access stratum making an access control decision on the access category; when the access control decision is passed, the user equipment sending an access request corresponding to the trigger event.
  • the method includes: sending a decide parameter with which an access stratum or a non-access stratum of a user equipment makes the access control decision; detecting whether the access request sent by the user equipment is received, wherein the access request is acquired based on the decide parameter and an trigger event; the trigger event is an access stratum trigger event or a non-access stratum trigger event detected when the user equipment is in a connected state or an inactive state; when the access request sent by the user equipment is received, processing the access request.
  • a third aspect of the present disclosure provides a user equipment.
  • the user equipment includes a processor, a storage and a communication circuit; wherein the processor is respectively coupled to the storage and the communication circuit; the storage has programs stored therein, the processor is configured to execute the programs to perform the access control methods described above.
  • a fourth aspect of the present disclosure provides a base station.
  • the base station includes: a processor, a storage and a communication circuit; wherein the processor is respectively coupled to the storage and the communication circuit; the storage has programs stored therein, the processor is configured to execute the programs to perform the access control methods described above.
  • a fifth aspect of the present disclosure provides an apparatus having a storage function.
  • the apparatus has programs stored therein, wherein the programs are executable to perform any access control method described above.
  • the access control method provided in the embodiment of the present disclosure may be applicable to the UE in the connected state or the inactive state. Based on the existing access stratum and the non-access stratum event, the access control method is flexible and easy to realize.
  • the access control method provided in the embodiment of the present disclosure may be applicable to UE in the idle state, and provide the unified access control mechanism applicable to the UE in all states for the 5G-NR system.
  • mapping rule between the trigger event and the access category provided may be determined jointly by the types of the trigger event and the parameters of the UE (such as the flow identifier of the QoS of the data flow, the five-tuple of the data flow, and the like) . In this way, the operator may control the access of the specific application or the service type.
  • FIG. 1 is a flow chart of an embodiment of an access control method of the present disclosure.
  • FIG. 2 is a flow chart of an embodiment of the block S102 shown in FIG. 1.
  • FIG. 3 is a flow chart of another embodiment of the block S102 shown in FIG. 1.
  • FIG. 4 is a flow chart of a further embodiment of the block S102 shown in FIG. 1.
  • FIG. 5 is a flow chart of a further embodiment of the block S102 shown in FIG. 1.
  • FIG. 6 is a flow chart of a further embodiment of the block S102 shown in FIG. 1.
  • FIG. 7 is a flow chart of a further embodiment of the block S102 shown in FIG. 1.
  • FIG. 8 is a flow chart of another embodiment of an access control method of the present disclosure.
  • FIG. 9 is a flow chart of a further embodiment of an access control method of the present disclosure.
  • FIG. 10 is a schematic view of an embodiment of a user equipment of the present disclosure.
  • FIG. 11 is a schematic view of an embodiment of a base station of the present disclosure.
  • FIG. 12 is a schematic view of an embodiment of a storage apparatus of the present disclosure.
  • a 5G-NR network may include a UE, and an access network and a core network located at a network side.
  • An interface between the UE and the access network is an air interface.
  • a protocol stack of the air interface may have two parts including a non-access stratum (NAS) and an access stratum (AS) .
  • NAS non-access stratum
  • AS access stratum
  • the method may be applicable to a new radio system of the fifth generation mobile communication technology (5G-NR system) .
  • the method may be the one based on the UE side, and may include the following blocks.
  • the UE may be in a connected state or an inactive state, and whether there is a trigger event may be detected; wherein the trigger event is an access stratum trigger event or a non-access stratum trigger event.
  • the access stratum trigger event may be selected from a group including but not limit to:an event that the UE tries to set up a new data radio bearer or a signaling radio bearer, an event that the UE tries to modify an attribute of an existing radio bearer, an event that the UE tries to remap a quality of service (QoS) flow from one radio bearer to another radio bearer, an event that the UE tries to remap the QoS flow from a default radio bearer to a specific radio bearer, an event that the UE tries to delete the existing data or signaling radio bearer, an event that the UE tries to set up the new data radio bearer to transmit data, an event that the UE tries to perform a type conversion on the data radio bearer, and an event that the UE tries the UE trying to activate/deactivate a packet duplication and transmission functionality.
  • QoS quality of service
  • the access stratum trigger event may also be selected from a group including: an event that the UE in the inactive state tries to transmit the data, and an event that the UE in the inactive state tries to initiate a notification area update procedure.
  • the non-access stratum trigger event may include but not limit to: requesting to start a voice, a video or a session initial protocol (SIP) call; sending a mobile originated short messaging service (SMS) ; establishing a new protocol data unit (PDU) session; modifying an existing PDU session; releasing the PDU session; re-establishing a user plane for the existing PDU session; or establishing a new emergency PDU session.
  • SIP session initial protocol
  • SMS mobile originated short messaging service
  • PDU protocol data unit
  • the trigger event when the trigger event is detected, the trigger event may be mapped to an access category, and the access stratum or the non-access stratum may make an access control decision on the access category.
  • the method may further include: pre-receiving the mapping rule.
  • the block S102 may include: invoking the mapping rule, and in turn acquiring the access category corresponding to the trigger event.
  • the mapping rule may be sent to the UE via a system broadcast message or a radio resource control (RRC) signaling of a base station.
  • RRC radio resource control
  • the access category in the mapping rule may be determined by a trigger event type and/or a parameter of the UE.
  • the parameter of the UE may be selected from a group including but not limit to: a flow identifier (also called as QFI below) of the QoS of data flow, a five-tuple (also called as 5QI below) of the data flow, an access class of the UE, a roaming status of the UE, an operating system identifier (OS ID) configured to trigger data access, or an operating system application identifier (OS AP ID) configured to trigger the data access.
  • OS ID operating system identifier
  • OS AP ID operating system application identifier
  • the trigger events of the UE may be divided into a plurality of access categories, for example, the trigger events of the UE may be divided into 12, 14, 16 access categories or the like.
  • One access category may correspond to one or more trigger event, and the present disclosure may not be limited thereto.
  • the access category in the mapping rule may be determined by the trigger event type, as shown in Table 1 provided below. Different trigger event types correspond to different access categories. Certainly, in another embodiment, two or more trigger event types may correspond to the same access category, and the present disclosure may not be limited thereto.
  • the access category in the mapping rule may be determined by both the trigger event type and the parameter of the UE. In this way, an operator may control an access of a specific application or a service type, as shown in FIG. 2 provided below.
  • the rigger event types are the same, however, different data services establishing requests may be treated under a same access category, or may also be treated under different access categories.
  • the access stratum or the non-access stratum may make the access control decision on the trigger event.
  • the decision may be implemented by the following three methods.
  • the block S102 may specifically include: A) the access stratum may map the trigger event to a first access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. B) The access stratum may transmit the first access category to the non-access stratum. C) The non-access stratum may make the access control decision on the first access category. More specifically, in one embodiment, the non-access stratum may use several mechanisms to make the access control decision on the first access category. The mechanisms may include but not limit to: an access class barring (ACB) mechanism, and an application-specific congestion control mechanism for data communication (ACDC) .
  • ARB access class barring
  • ACDC application-specific congestion control mechanism for data communication
  • the present disclosure may not be limited thereto.
  • the system broadcast message or the RRC signaling of the base station may provide a decide parameter, such as an access barring factor (ac-BarringFactor) .
  • the access stratum may acquire the decide parameter, and transmit the decide parameter to the non-access stratum via inter-layer communications between the access stratum and the non-access stratum.
  • the non-access stratum may feed back a decision result to the access stratum.
  • the block S102 may specifically include: A) the access stratum may transmit the trigger event to the non-access stratum. B) The non-access stratum may map the trigger event to the first access category access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. C) The non-access stratum may make the access control decision on the first access category. More specifically, in one embodiment, the non-access stratum may use several mechanisms to make the access control decision on the first access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) .
  • ACDC application-specific congestion control mechanism for data communication
  • the system broadcast message or the RRC signaling of the base station may provide the decide parameter, such as the access barring factor (ac-BarringFactor) .
  • the access stratum may acquire the decide parameter, and transmit the decide parameter to the non-access stratum via the inter-layer communications between the access stratum and the non-access stratum. D) the non-access stratum may feed back the decision result to the access stratum.
  • the block S102 may specifically include: A) the access stratum may map the trigger event to the first access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more.
  • B) The access stratum may make the access control decision on the first access category, and further acquire the decision result. More specifically, in one embodiment, the access stratum may use several mechanisms to make the access control decision on the first access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) . In another embodiment, it is also possible to use other mechanisms to make the access control decision on the first access category, and the present disclosure may not be limited thereto.
  • the system broadcast message or the RRC signaling of the base station may provide the decide parameter, such as the access barring factor (ac-BarringFactor) .
  • the access stratum may acquire the decide parameter.
  • the access stratum or the non-access stratum may make the access control decision on the trigger event.
  • the decision may be implemented by the following three methods.
  • the block S102 may specifically include: A) the non-access stratum may map the trigger event to a second access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. B) The non-access stratum may transmit the second access category to the access stratum. C) The access stratum may make the access control decision on the second access category. More specifically, in one embodiment, the access stratum may use several mechanisms to make the access control decision on the second access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) .
  • ACDC application-specific congestion control mechanism for data communication
  • the present disclosure may not be limited thereto.
  • the system broadcast message or the RRC signaling of the base station may provide the decide parameter, such as the access barring factor (ac-BarringFactor) .
  • the access stratum may acquire the decide parameter.
  • the access stratum may feed back the decision result to the non-access stratum.
  • the block S102 may specifically include: A) the non-access stratum may transmit the trigger event to the access stratum. B) The access stratum may map the trigger event to the second access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. C) The access stratum may make the access control decision on the second access category. More specifically, in one embodiment, the access stratum may use several mechanisms to make the access control decision on the second access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) .
  • ACDC application-specific congestion control mechanism for data communication
  • the present disclosure may not be limited thereto.
  • the system broadcast message or the RRC signaling of the base station may provide the decide parameter, such as the access barring factor (ac-BarringFactor) .
  • the access stratum may acquire the decide parameter.
  • the access stratum may feed back the decision result to non-access stratum.
  • the block S102 may specifically include: A) the non-access stratum may map the trigger event to the second access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. B) The non-access stratum may make the access control decision on the second access category, and further acquire the decision result. More specifically, in one embodiment, the non-access stratum may use several mechanisms to make the access control decision on the second access category.
  • the mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) .
  • ACB access class barring
  • ACDC application-specific congestion control mechanism for data communication
  • the system broadcast message or the RRC signaling of the base station may provide the decide parameter corresponding to the second access category, such as the access barring factor (ac-BarringFactor) .
  • the access stratum may acquire the decide parameter, and transmit the decide parameter to the non-access stratum via the inter-layer communications between the access stratum and the non-access stratum.
  • the UE may send an access request corresponding to the trigger event.
  • a prohibiting timer may start, within which the UE cannot re-start access attempts of the same type.
  • the access control method may include the following blocks: A) whether there is a trigger event may be detected, wherein the trigger event is a control trigger event of the access stratum.
  • the control trigger event may include: the UE trying to switch from the idle state to the connected state.
  • the specific mapping rule and the access control decision method is described in the above embodiment, and will not be described in detail any more.
  • the UE may send the access request corresponding to the trigger event. It can be understood that, the method provided in the present disclosure may be further applicable to the UE in all states. Therefore, it is possible to provide a unified access control mechanism applicable to the UE in all states for the 5G-NR system.
  • FIG. 8 a flow chart of another embodiment of an access control method of the present disclosure is depicted.
  • the method may be based on the UE side, and may include the following blocks.
  • the UE may be in the connected state or the inactive state, and whether there is a trigger event may be detected; wherein the trigger event may be the access stratum trigger event or the non-access stratum trigger event. More specifically, the block S201 may be the same as the block S101 in the above embodiment, and will not be described in detail any more.
  • the trigger event when the access control functionality is activated, the trigger event may be mapped to the access category, and the access stratum or the non-access stratum may make the access control decision on the access category. More specifically, the block S203 may be the same as the block S102 in the above embodiment, and will not be described in detail any more.
  • the UE may send the access request corresponding to the trigger event. More specifically, the block S204 may be the same as the block S103 in the above embodiment, and will not be described in detail any more.
  • the method may be based on the network side (such as the base station) , and may include the following blocks.
  • a decide parameter with which the access stratum or the non-access stratum of the UE makes the access control decision may be sent.
  • the network side may send the decide parameter via the system broadcast message or the RRC signaling when the access stratum or the non-access stratum of the UE makes the access control decision on the access category.
  • the access stratum or the non-access stratum may use several mechanisms to make the access control decision on the access category.
  • the mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) .
  • the decide parameter may include the access barring factor (ac-BarringFactor) .
  • whether the access request sent by the UE is received may be detected.
  • the access request may be acquired based on the decide parameter and the trigger event.
  • the trigger event may be the access stratum trigger event or the non-access stratum trigger event detected by the UE when the UE is in the connected state or the inactive state.
  • the event types respectively of the access stratum trigger event and the non-access stratum trigger event may refer to the description in the above embodiment, and will not be described in detail any more.
  • the access request when the access request sent by the UE is received, the access request may be processed.
  • the method may further include the following blocks before the block S30: the mapping rule is pre-provided, and the mapping rule may be further sent via the broadcast message or the RRC message. More specifically, the mapping rule is described in the above embodiment, and will not be described in detail any more.
  • the access control method provided in the embodiments of the present disclosure may be further described below using a specific application scenario and combining with the network side and the UE.
  • the access control method may include the following blocks: A) the network side, such as the base station, may pre-provide the mapping rule in advance, and send the mapping rule to the UE via the system broadcast message or the RRC signaling; the UE may receive the mapping rule. B) When the access stratum trigger event or the non-access stratum trigger event is detected by the UE, the UE may invoke the mapping rule, and in turn acquire the access category corresponding to the current trigger event.
  • the access stratum or the non-access stratum of the UE may use the access class barring (ACB) mechanism or the application-specific congestion control mechanism for data communication to make the access control decision on the current access category.
  • the decide parameter such as the access barring factor (ac-BarringFactor)
  • the UE may send the access request corresponding to the current trigger event. More specifically, in one embodiment, the UE may generate a number RAND between 0 and 1 randomly.
  • the UE may determine that the access control decision is passed; otherwise, the UE may determine that the access control decision is rejected.
  • the access request may be processed.
  • the UE may substantially include: a processor 1, a storage 2 and a communication circuit 3.
  • the processor 1 is respectively coupled to the storage 2 and the communication circuit 3.
  • Access control methods respectively of the connected state and the inactive state may be preset in the UE.
  • the processor 1, the storage 2 and the communication circuit 3 may be executable to perform the blocks of the above access control methods during the operation.
  • the details for the corresponding contents may refer to the description in the above methods, and will not be described in detail any more.
  • the communication circuit 3 may be configured to achieve the communication connection between these components, and achieve the communication connection between the UE and the network side.
  • the storage 2 is preset with programs or the instructions executable to perform the access control methods of the UE in the idle state, the inactive state and the connected state.
  • the processor 1 and the communication circuit 3 may specifically be able to execute the following functions.
  • the communication circuit 3 may pre-receive a mapping rule at the network side and further transmit the mapping rule to the storage 2.
  • the processor 1 may detect whether there is a trigger event, wherein the trigger event is the access stratum trigger event or the non-access stratum trigger event. When the trigger event is detected, the processor 1 may invoke the mapping rule in the storage 2, map the trigger event to an access category, and make an access control decision on the access category. When the processor 1 determines that the access control decision is passed, the communication circuit 3 of the UE may send an access request corresponding to the trigger event.
  • the base station may substantially include: a processor 4, a storage 5 and a communication circuit 6.
  • the processor 4 is respectively coupled to the storage 5 and the communication circuit 6.
  • the processor 4, the storage 5 and the communication circuit 6 may be executable to perform the blocks of the above access control methods during the operation.
  • the details for the corresponding contents may refer to the description in the above methods, and will not be described in detail any more.
  • the communication circuit 6 may be configured to achieve the communication connection between these components, and achieve the communication connection between the base station and the UE.
  • the processor 4 and the communication circuit 6 may specifically be able to execute the following functions.
  • the processor 4 may pre-provide a mapping rule of an access category, and transmit the mapping rule to the communication circuit 6.
  • the communication circuit 6 may send the mapping rule.
  • the communication circuit 6 may send a decide parameter.
  • the processor 4 may process the access request.
  • the apparatus 10 may have programs 100 stored therein.
  • the programs 100 may be executable by the processor to perform the blocks of any communication method described above.
  • the details for the corresponding contents may refer to the description in the above methods, and will not be described in detail any more.
  • the access control method provided in the embodiment of the present disclosure may be applicable to the UE in the connected state or the inactive state. Based on the existing access stratum and the non-access stratum event, the access control method is flexible and easy to realize. Besides, the access control method provided in the embodiment of the present disclosure may be applicable to UE in the idle state, and provide the unified access control mechanism applicable to the UE in all states for the 5G-NR system. In addition, the mapping rule between the trigger event and the access category provided may be determined jointly by the types of the trigger event and the parameters of the UE (such as the flow identifier of the QoS of the data flow, the five-tuple of the data flow, and the like) . In this way, the operator may control the access of the specific application or the service type.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An access control method includes: when a user equipment is in a connected state or an inactive state, detecting whether there is a trigger event, wherein the trigger event is an access stratum trigger event or a non-access stratum trigger event; when the trigger event is detected, mapping the trigger event to an access category, and the access stratum or the non-access stratum making an access control decision on the access category; when the access control decision is passed, the user equipment sending an access request corresponding to the trigger event. The method may provide a unified access control mechanism applicable to the user equipment in all states for the 5G-NR system. A user equipment, a base station and a storage apparatus are also provided.

Description

[Corrected under Rule 26, 31.05.2018] ACCESS CONTROL METHOD, USER EQUIPMENT, BASE STATION AND STORAGE APPARATUS TECHNICAL FIELD
The embodiments of the present disclosure generally relate to wireless communication technology, and in particular relate to an access control method, a user equipment, a base station and a storage apparatus.
BACKGROUND
In order to satisfy demands for the continuously increasing of the mobile data services, a new radio system of the fifth generation mobile communication technology (5G-NR system) is developed. In order to reduce signaling and power consumption, in the 5G-NR system, an inactive state (INACTIVE) is introduced in addition to an idle state (IDLE) and a connected state (CONNECTED) .
During a long-term research, the applicant of the present disclosure finds that, an access control needs to be performed when a user equipment (UE, also called as terminal) tries to access a network, in order to determine whether a service request may be initiated, and avoid overload problems at a network side (including an access network and a core network) . At present, several goals with respect to the access control of the 5G-NR system, such as defining a unified access control method applicable to the connected state or the inactive state, was put forward. However, no specific solution is provided.
SUMMARY
The technical problem to be solved by the present disclosure is to provide an access control method, a user equipment, a base station and a storage apparatus, which provides a unified access control mechanism applicable to the user equipment in all states for the 5G-NR system. In order to solve the above technical problem, a  first aspect of the present disclosure provides an access control method used in a new radio system of the fifth generation mobile communication technology. The method includes: when a user equipment is in a connected state or an inactive state, detecting whether there is a trigger event, wherein the trigger event is an access stratum trigger event or a non-access stratum trigger event; when the trigger event is detected, mapping the trigger event to an access category, and the access stratum or the non-access stratum making an access control decision on the access category; when the access control decision is passed, the user equipment sending an access request corresponding to the trigger event In order to solve the above technical problem, a second aspect of the present disclosure provides a communication method. The method includes: sending a decide parameter with which an access stratum or a non-access stratum of a user equipment makes the access control decision; detecting whether the access request sent by the user equipment is received, wherein the access request is acquired based on the decide parameter and an trigger event; the trigger event is an access stratum trigger event or a non-access stratum trigger event detected when the user equipment is in a connected state or an inactive state; when the access request sent by the user equipment is received, processing the access request.
In order to solve the above technical problem, a third aspect of the present disclosure provides a user equipment. The user equipment includes a processor, a storage and a communication circuit; wherein the processor is respectively coupled to the storage and the communication circuit; the storage has programs stored therein, the processor is configured to execute the programs to perform the access control methods described above.
In order to solve the above technical problem, a fourth aspect of the present disclosure provides a base station. The base station includes: a processor, a storage and a communication circuit; wherein the processor is respectively coupled to the storage and the communication circuit; the storage has programs stored therein, the processor is configured to execute the programs to perform the access control methods described above.
In order to solve the above technical problem, a fifth aspect of the present  disclosure provides an apparatus having a storage function. The apparatus has programs stored therein, wherein the programs are executable to perform any access control method described above.
The present disclosure has the following advantages: compared with the related art, the access control method provided in the embodiment of the present disclosure may be applicable to the UE in the connected state or the inactive state. Based on the existing access stratum and the non-access stratum event, the access control method is flexible and easy to realize.
Besides, the access control method provided in the embodiment of the present disclosure may be applicable to UE in the idle state, and provide the unified access control mechanism applicable to the UE in all states for the 5G-NR system.
In addition, the mapping rule between the trigger event and the access category provided may be determined jointly by the types of the trigger event and the parameters of the UE (such as the flow identifier of the QoS of the data flow, the five-tuple of the data flow, and the like) . In this way, the operator may control the access of the specific application or the service type.
BRIEF DESCRIPTION OF THE DRAWINGS
In order to make the technical solution of embodiments of the present disclosure more clearly, drawings used for the description of the embodiments will be briefly described. Apparently, the drawings described above are only some exemplary embodiments of the present disclosure. One skilled in the art may acquire other drawings based on these drawings without any inventive work. In the drawings:
FIG. 1 is a flow chart of an embodiment of an access control method of the present disclosure.
FIG. 2 is a flow chart of an embodiment of the block S102 shown in FIG. 1.
FIG. 3 is a flow chart of another embodiment of the block S102 shown in FIG. 1.
FIG. 4 is a flow chart of a further embodiment of the block S102 shown in  FIG. 1.
FIG. 5 is a flow chart of a further embodiment of the block S102 shown in FIG. 1.
FIG. 6 is a flow chart of a further embodiment of the block S102 shown in FIG. 1.
FIG. 7 is a flow chart of a further embodiment of the block S102 shown in FIG. 1.
FIG. 8 is a flow chart of another embodiment of an access control method of the present disclosure.
FIG. 9 is a flow chart of a further embodiment of an access control method of the present disclosure.
FIG. 10 is a schematic view of an embodiment of a user equipment of the present disclosure.
FIG. 11 is a schematic view of an embodiment of a base station of the present disclosure.
FIG. 12 is a schematic view of an embodiment of a storage apparatus of the present disclosure.
DETAILED DESCRIPTION
The technical schemes in the embodiments of the present disclosure will now be described in conjunction with the accompanying drawings in the embodiments of the present disclosure, and it will be apparent that the described embodiments are merely parts of the embodiments of the disclosure, and are not all embodiments. All other embodiments obtained based on the embodiments in the present disclosure by those of ordinary skill in the art without making creative work are within the scope of the present disclosure.
A 5G-NR network may include a UE, and an access network and a core network located at a network side. An interface between the UE and the access network is an air interface. A protocol stack of the air interface may have two parts including a non-access stratum (NAS) and an access stratum (AS) . When  establishing communication services between the UE and the network side, it needs to perform an access control, in order to determine whether a service request can be initiated, and avoid overload problems at the network side (including the access network and the core network) .
Referring to FIG. 1, a flow chart of an embodiment of an access control method of the present disclosure is depicted. The method may be applicable to a new radio system of the fifth generation mobile communication technology (5G-NR system) . The method may be the one based on the UE side, and may include the following blocks.
At block S101: the UE may be in a connected state or an inactive state, and whether there is a trigger event may be detected; wherein the trigger event is an access stratum trigger event or a non-access stratum trigger event.
More specifically, when the UE is in the connected state or the inactive state, the access stratum trigger event may be selected from a group including but not limit to:an event that the UE tries to set up a new data radio bearer or a signaling radio bearer, an event that the UE tries to modify an attribute of an existing radio bearer, an event that the UE tries to remap a quality of service (QoS) flow from one radio bearer to another radio bearer, an event that the UE tries to remap the QoS flow from a default radio bearer to a specific radio bearer, an event that the UE tries to delete the existing data or signaling radio bearer, an event that the UE tries to set up the new data radio bearer to transmit data, an event that the UE tries to perform a type conversion on the data radio bearer, and an event that the UE tries the UE trying to activate/deactivate a packet duplication and transmission functionality. When the UE is in the inactive state, the access stratum trigger event may also be selected from a group including: an event that the UE in the inactive state tries to transmit the data, and an event that the UE in the inactive state tries to initiate a notification area update procedure. When the UE is in the connected state or the inactive state, the non-access stratum trigger event may include but not limit to: requesting to start a voice, a video or a session initial protocol (SIP) call; sending a mobile originated short messaging service (SMS) ; establishing a new protocol data unit (PDU) session;  modifying an existing PDU session; releasing the PDU session; re-establishing a user plane for the existing PDU session; or establishing a new emergency PDU session.
At block S102: when the trigger event is detected, the trigger event may be mapped to an access category, and the access stratum or the non-access stratum may make an access control decision on the access category.
More specifically, in one embodiment, before the block S102, the method may further include: pre-receiving the mapping rule. The block S102 may include: invoking the mapping rule, and in turn acquiring the access category corresponding to the trigger event. The mapping rule may be sent to the UE via a system broadcast message or a radio resource control (RRC) signaling of a base station.
The access category in the mapping rule may be determined by a trigger event type and/or a parameter of the UE. The parameter of the UE may be selected from a group including but not limit to: a flow identifier (also called as QFI below) of the QoS of data flow, a five-tuple (also called as 5QI below) of the data flow, an access class of the UE, a roaming status of the UE, an operating system identifier (OS ID) configured to trigger data access, or an operating system application identifier (OS AP ID) configured to trigger the data access.
In one embodiment, the trigger events of the UE may be divided into a plurality of access categories, for example, the trigger events of the UE may be divided into 12, 14, 16 access categories or the like. One access category may correspond to one or more trigger event, and the present disclosure may not be limited thereto. When the UE needs to initiate the service request, the UE may first need to check whether the access category that the UE itself belongs to is barred by a cell to be accessed. If the access category that the UE itself belongs to is barred by the cell to be accessed, the UE cannot initiate the service request. Otherwise, the UE may initiate the service request.
In one application scenario, the access category in the mapping rule may be determined by the trigger event type, as shown in Table 1 provided below. Different trigger event types correspond to different access categories. Certainly, in another embodiment, two or more trigger event types may correspond to the same access  category, and the present disclosure may not be limited thereto.
Table 1 Mapping rule diagram
Figure PCTCN2018084469-appb-000001
In another application scenario, as shown in FIG. 2 provided below, the access category in the mapping rule may be determined by both the trigger event type and the parameter of the UE. In this way, an operator may control an access of a specific application or a service type, as shown in FIG. 2 provided below. Although the rigger event types are the same, however, different data services establishing requests may be treated under a same access category, or may also be treated under different access categories.
Table 2 Mapping rule diagram
Figure PCTCN2018084469-appb-000002
More specifically, in another embodiment, when the trigger event is detected, and the trigger event is the access stratum trigger event, then the access stratum or the non-access stratum may make the access control decision on the trigger event. The decision may be implemented by the following three methods.
In one application scenario, referring to FIG. 2, the block S102 may specifically include: A) the access stratum may map the trigger event to a first access  category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. B) The access stratum may transmit the first access category to the non-access stratum. C) The non-access stratum may make the access control decision on the first access category. More specifically, in one embodiment, the non-access stratum may use several mechanisms to make the access control decision on the first access category. The mechanisms may include but not limit to: an access class barring (ACB) mechanism, and an application-specific congestion control mechanism for data communication (ACDC) . In another embodiment, it is also possible to use other mechanisms to make the access control decision on the first access category, and the present disclosure may not be limited thereto. When making the access control decision, the system broadcast message or the RRC signaling of the base station may provide a decide parameter, such as an access barring factor (ac-BarringFactor) . The access stratum may acquire the decide parameter, and transmit the decide parameter to the non-access stratum via inter-layer communications between the access stratum and the non-access stratum. D) The non-access stratum may feed back a decision result to the access stratum.
In another application scenario, referring to FIG. 3, the block S102 may specifically include: A) the access stratum may transmit the trigger event to the non-access stratum. B) The non-access stratum may map the trigger event to the first access category access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. C) The non-access stratum may make the access control decision on the first access category. More specifically, in one embodiment, the non-access stratum may use several mechanisms to make the access control decision on the first access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) . In another embodiment, it is also possible to use other mechanisms to make the access control decision on the first access category, and the present disclosure may not be limited thereto. When making the access control decision, the system broadcast message or the RRC signaling of the base station may provide the  decide parameter, such as the access barring factor (ac-BarringFactor) . The access stratum may acquire the decide parameter, and transmit the decide parameter to the non-access stratum via the inter-layer communications between the access stratum and the non-access stratum. D) the non-access stratum may feed back the decision result to the access stratum.
In a further application scenario, referring to FIG. 4, the block S102 may specifically include: A) the access stratum may map the trigger event to the first access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. B) The access stratum may make the access control decision on the first access category, and further acquire the decision result. More specifically, in one embodiment, the access stratum may use several mechanisms to make the access control decision on the first access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) . In another embodiment, it is also possible to use other mechanisms to make the access control decision on the first access category, and the present disclosure may not be limited thereto. When making the access control decision, the system broadcast message or the RRC signaling of the base station may provide the decide parameter, such as the access barring factor (ac-BarringFactor) . The access stratum may acquire the decide parameter.
In another embodiment, when the trigger event is detected, and the trigger event is the non-access stratum trigger event, then the access stratum or the non-access stratum may make the access control decision on the trigger event. The decision may be implemented by the following three methods.
In one application scenario, referring to FIG. 5, the block S102 may specifically include: A) the non-access stratum may map the trigger event to a second access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. B) The non-access stratum may transmit the second access category to the access stratum. C) The access stratum may make the access control decision on the second access category.  More specifically, in one embodiment, the access stratum may use several mechanisms to make the access control decision on the second access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) . In another embodiment, it is also possible to use other mechanisms to make the access control decision on the second access category, and the present disclosure may not be limited thereto. When making the access control decision, the system broadcast message or the RRC signaling of the base station may provide the decide parameter, such as the access barring factor (ac-BarringFactor) . The access stratum may acquire the decide parameter. D) The access stratum may feed back the decision result to the non-access stratum.
In another application scenario, referring to FIG. 6, the block S102 may specifically include: A) the non-access stratum may transmit the trigger event to the access stratum. B) The access stratum may map the trigger event to the second access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. C) The access stratum may make the access control decision on the second access category. More specifically, in one embodiment, the access stratum may use several mechanisms to make the access control decision on the second access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) . In another embodiment, it is also possible to use other mechanisms to make the access control decision on the second access category, and the present disclosure may not be limited thereto. When making the access control decision, the system broadcast message or the RRC signaling of the base station may provide the decide parameter, such as the access barring factor (ac-BarringFactor) . The access stratum may acquire the decide parameter. D) The access stratum may feed back the decision result to non-access stratum.
In a further application scenario, referring to FIG. 7, the block S102 may specifically include: A) the non-access stratum may map the trigger event to the  second access category; wherein the specific mapping rule is described in the above embodiment, and will not be described in detail any more. B) The non-access stratum may make the access control decision on the second access category, and further acquire the decision result. More specifically, in one embodiment, the non-access stratum may use several mechanisms to make the access control decision on the second access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) . In another embodiment, it is also possible to use other mechanisms to make the access control decision on the second access category, and the present disclosure may not be limited thereto. When making the access control decision, the system broadcast message or the RRC signaling of the base station may provide the decide parameter corresponding to the second access category, such as the access barring factor (ac-BarringFactor) . The access stratum may acquire the decide parameter, and transmit the decide parameter to the non-access stratum via the inter-layer communications between the access stratum and the non-access stratum.
At block S103: when the access control decision is passed, the UE may send an access request corresponding to the trigger event. In one application scenario, when the current access control decision is rejected, a prohibiting timer may start, within which the UE cannot re-start access attempts of the same type.
In the above embodiment, the UE is in the connected state or the inactive state. However, when the UE is in the idle state, the method described in the above embodiments is still applicable. The access control method may include the following blocks: A) whether there is a trigger event may be detected, wherein the trigger event is a control trigger event of the access stratum. In one application scenario, the control trigger event may include: the UE trying to switch from the idle state to the connected state. B) When the trigger event is detected, the first trigger event may be mapped to a third access category, and the access stratum or the non-access stratum may make an access control decision on the third access category. The specific mapping rule and the access control decision method is described in the  above embodiment, and will not be described in detail any more. C) When the access control decision is passed, the UE may send the access request corresponding to the trigger event. It can be understood that, the method provided in the present disclosure may be further applicable to the UE in all states. Therefore, it is possible to provide a unified access control mechanism applicable to the UE in all states for the 5G-NR system.
Referring to FIG. 8, a flow chart of another embodiment of an access control method of the present disclosure is depicted. The method may be based on the UE side, and may include the following blocks.
At block S201: the UE may be in the connected state or the inactive state, and whether there is a trigger event may be detected; wherein the trigger event may be the access stratum trigger event or the non-access stratum trigger event. More specifically, the block S201 may be the same as the block S101 in the above embodiment, and will not be described in detail any more.
At block S202: when the trigger event is detected, whether the access control functionality is activated may be determined. More specifically, when the access control functionality of the network side is non-activated, the UE may directly send the access request corresponding to the trigger event.
At block S203: when the access control functionality is activated, the trigger event may be mapped to the access category, and the access stratum or the non-access stratum may make the access control decision on the access category. More specifically, the block S203 may be the same as the block S102 in the above embodiment, and will not be described in detail any more.
At block S204: when the access control decision is passed, the UE may send the access request corresponding to the trigger event. More specifically, the block S204 may be the same as the block S103 in the above embodiment, and will not be described in detail any more.
Referring to FIG. 9, a flow chart of a further embodiment of an access control method of the present disclosure is depicted. The method may be based on the network side (such as the base station) , and may include the following blocks.
At block S301: a decide parameter with which the access stratum or the non-access stratum of the UE makes the access control decision may be sent.
More specifically, the network side, such as the base station, may send the decide parameter via the system broadcast message or the RRC signaling when the access stratum or the non-access stratum of the UE makes the access control decision on the access category. In one application scenario, the access stratum or the non-access stratum may use several mechanisms to make the access control decision on the access category. The mechanisms may include but not limit to: the access class barring (ACB) mechanism, and the application-specific congestion control mechanism for data communication (ACDC) . The decide parameter may include the access barring factor (ac-BarringFactor) .
At block S302: whether the access request sent by the UE is received may be detected. Wherein the access request may be acquired based on the decide parameter and the trigger event. The trigger event may be the access stratum trigger event or the non-access stratum trigger event detected by the UE when the UE is in the connected state or the inactive state.
More specifically, the event types respectively of the access stratum trigger event and the non-access stratum trigger event may refer to the description in the above embodiment, and will not be described in detail any more.
At block S303: when the access request sent by the UE is received, the access request may be processed.
In another embodiment, the method may further include the following blocks before the block S30: the mapping rule is pre-provided, and the mapping rule may be further sent via the broadcast message or the RRC message. More specifically, the mapping rule is described in the above embodiment, and will not be described in detail any more.
The access control method provided in the embodiments of the present disclosure may be further described below using a specific application scenario and combining with the network side and the UE. The access control method may include the following blocks: A) the network side, such as the base station, may  pre-provide the mapping rule in advance, and send the mapping rule to the UE via the system broadcast message or the RRC signaling; the UE may receive the mapping rule. B) When the access stratum trigger event or the non-access stratum trigger event is detected by the UE, the UE may invoke the mapping rule, and in turn acquire the access category corresponding to the current trigger event. C) The access stratum or the non-access stratum of the UE may use the access class barring (ACB) mechanism or the application-specific congestion control mechanism for data communication to make the access control decision on the current access category. Wherein the decide parameter, such as the access barring factor (ac-BarringFactor) , corresponding to the current access category and used in the access control decision may be sent from the network side (such as the base station) to the access stratum of the UE via the system broadcast message or the RRC signaling. D) When the UE determines that the access control decision is passed, the UE may send the access request corresponding to the current trigger event. More specifically, in one embodiment, the UE may generate a number RAND between 0 and 1 randomly. When the number RAND is less than the access barring factor, the UE may determine that the access control decision is passed; otherwise, the UE may determine that the access control decision is rejected. E) When the network side receives the access request of the UE, the access request may be processed.
Referring to FIG. 10, a schematic view of an embodiment of a user equipment of the present disclosure is depicted. The UE may substantially include: a processor 1, a storage 2 and a communication circuit 3. The processor 1 is respectively coupled to the storage 2 and the communication circuit 3. Access control methods respectively of the connected state and the inactive state may be preset in the UE. The processor 1, the storage 2 and the communication circuit 3 may be executable to perform the blocks of the above access control methods during the operation. The details for the corresponding contents may refer to the description in the above methods, and will not be described in detail any more.
In this embodiment, the communication circuit 3 may be configured to achieve the communication connection between these components, and achieve the  communication connection between the UE and the network side. The storage 2 is preset with programs or the instructions executable to perform the access control methods of the UE in the idle state, the inactive state and the connected state.
In this embodiment, by invoking the programs or the instructions stored in the storage 2, the processor 1 and the communication circuit 3 may specifically be able to execute the following functions. The communication circuit 3 may pre-receive a mapping rule at the network side and further transmit the mapping rule to the storage 2. The processor 1 may detect whether there is a trigger event, wherein the trigger event is the access stratum trigger event or the non-access stratum trigger event. When the trigger event is detected, the processor 1 may invoke the mapping rule in the storage 2, map the trigger event to an access category, and make an access control decision on the access category. When the processor 1 determines that the access control decision is passed, the communication circuit 3 of the UE may send an access request corresponding to the trigger event.
Referring to FIG. 11, a schematic view of an embodiment of a base station of the present disclosure is depicted. The base station may substantially include: a processor 4, a storage 5 and a communication circuit 6. The processor 4 is respectively coupled to the storage 5 and the communication circuit 6. The processor 4, the storage 5 and the communication circuit 6 may be executable to perform the blocks of the above access control methods during the operation. The details for the corresponding contents may refer to the description in the above methods, and will not be described in detail any more.
In this embodiment, the communication circuit 6 may be configured to achieve the communication connection between these components, and achieve the communication connection between the base station and the UE. In this embodiment, by invoking programs or the instructions stored in the storage 5, the processor 4 and the communication circuit 6 may specifically be able to execute the following functions. The processor 4 may pre-provide a mapping rule of an access category, and transmit the mapping rule to the communication circuit 6. The communication circuit 6 may send the mapping rule. When the UE is making an access control  decision, the communication circuit 6 may send a decide parameter. When the communication circuit 6 receives an access request sent by the UE, the processor 4 may process the access request.
Referring to FIG. 12, a schematic view of an embodiment of a storage apparatus of the present disclosure is depicted. The apparatus 10 may have programs 100 stored therein. The programs 100 may be executable by the processor to perform the blocks of any communication method described above. The details for the corresponding contents may refer to the description in the above methods, and will not be described in detail any more.
In conclusion, compared with the related art, the access control method provided in the embodiment of the present disclosure may be applicable to the UE in the connected state or the inactive state. Based on the existing access stratum and the non-access stratum event, the access control method is flexible and easy to realize. Besides, the access control method provided in the embodiment of the present disclosure may be applicable to UE in the idle state, and provide the unified access control mechanism applicable to the UE in all states for the 5G-NR system. In addition, the mapping rule between the trigger event and the access category provided may be determined jointly by the types of the trigger event and the parameters of the UE (such as the flow identifier of the QoS of the data flow, the five-tuple of the data flow, and the like) . In this way, the operator may control the access of the specific application or the service type.
The foregoing is merely embodiments of the present disclosure, and is not intended to limit the scope of the present disclosure. Any equivalent structure or flow transformation made based on the specification and the accompanying drawings of the present disclosure, or any direct or indirect applications of the present disclosure on other related fields, shall all be covered within the protection of the present disclosure.

Claims (19)

  1. An access control method, used in a new radio system of the fifth generation mobile communication technology, comprising:
    when a user equipment is in a connected state or an inactive state, detecting whether there is a trigger event, wherein the trigger event is an access stratum trigger event or a non-access stratum trigger event;
    when the trigger event is detected, mapping the trigger event to an access category, and the access stratum or the non-access stratum making an access control decision on the access category;
    when the access control decision is passed, the user equipment sending an access request corresponding to the trigger event.
  2. The method of claim 1, before detecting whether there is the trigger event, further comprising:
    determining whether the user equipment is in an idle state;
    when the user equipment is in the idle state, detecting whether there is a control trigger event; wherein the control trigger event comprises an event that the user equipment tries to switch from the idle state to the connected state;
    when the control trigger event is detected, mapping the control trigger event to a third access category, and the access stratum or the non-access stratum making an access control decision on the third access category;
    when the access control decision is passed, the user equipment sending the access request corresponding to the trigger event.
  3. The method of claim 1, wherein the trigger event is selected from a group comprising: an event that the user equipment tries to set up a new data radio bearer or a signaling radio bearer, an event that the user equipment tries to modify an attribute of an existing radio bearer, an event that the user equipment tries to remap a quality of service flow from one radio bearer to another radio bearer, an event that the user equipment tries to remap the quality of service flow from a default radio bearer to a specific radio bearer, an event that the user equipment tries to delete the existing radio  bearer, an event that the user equipment tries to set up the new data radio bearer to transmit data, an event that the user equipment tries to perform a type conversion on the data radio bearer, an event that the user equipment tries to activate/deactivate a packet duplication and transmission functionality, an event that the user equipment in the inactive state tries to transmit the data, and an event that the user equipment in the inactive state tries to initiate a notification area update procedure.
  4. The method of claim 1, wherein the non-access stratum trigger event comprises: requesting to start a voice, a video or a session initial protocol call, sending a mobile originated short messaging service, establishing a new protocol data unit session, modifying an existing protocol data unit session, releasing the protocol data unit session, re-establishing a user plane for the existing protocol data unit session, or establishing a new emergency protocol data unit session.
  5. The method of claim 1, wherein when the trigger event is detected, and the trigger event is the access stratum trigger event, the access stratum or the non-access stratum making the access control decision on the access category comprises:
    the access stratum mapping the trigger event to a first access category, the access stratum transmitting the first access category to the non-access stratum, and the non-access stratum making the access control decision on the first access category and feeding back a decision result to the access stratum; or
    the access stratum transmitting the trigger event to the non-access stratum, the non-access stratum mapping the trigger event to the first access category access category, and the non-access stratum making the access control decision on the first access category and feeding back the decision result to the access stratum; or
    the access stratum mapping the trigger event to the first access category, and the access stratum making the access control decision on the first access category and further acquiring the decision result.
  6. The method of claim 1, wherein when the trigger event is detected, and the trigger event is the non-access stratum trigger event, the access stratum or the non-access stratum making the access control decision on the access category comprises:
    the non-access stratum mapping the trigger event to a second access category, the non-access stratum transmitting the second access category to the access stratum, and the access stratum making the access control decision on the second access category and feeding back a decision result to the non-access stratum; or
    the non-access stratum transmitting the trigger event to the access stratum, the access stratum mapping the trigger event to the second access category, and the access stratum making the access control decision on the second access category and feeding back the decision result to the non-access stratum; or
    the non-access stratum mapping the trigger event to the second access category, and the non-access stratum making the access control decision on the second access category and further acquiring the decision result.
  7. The method of claim 1, wherein the access stratum or the non-access stratum makes the access control decision on the access category by using an access class barring mechanism or an application-specific congestion control mechanism for data communication.
  8. The method of claim 1, further comprising: pre-receiving a mapping rule, wherein the mapping rule is sent via a system broadcast message or a radio resource control signaling of a base station;
    mapping the trigger event to the access category comprises: invoking the mapping rule, and acquiring the access category corresponding to the current trigger event.
  9. The method of claim 8, wherein the access category in the mapping rule is determined by a trigger event type and/or a parameter of the user equipment; the parameter of the user equipment is selected from a group comprising a flow identifier of the quality of service of data flow, a five-tuple of the data flow, an access class of the user equipment, a roaming status of the user equipment, an operating system identifier configured to trigger data access, and an operating system application identifier configured to trigger the data access.
  10. The method of claim 1, wherein when the trigger event is detected, mapping the trigger event to the access category, and the access stratum or the non-access stratum making the access control decision on the access category comprises:
    determining whether the access control functionality is activated; when the access control functionality is activated, mapping the trigger event to the access category, and the access stratum or the non-access stratum making the access control decision on the access category.
  11. An access control method, used in a new radio system of the fifth generation mobile communication technology, comprising:
    sending a decide parameter with which an access stratum or a non-access stratum of a user equipment makes the access control decision;
    detecting whether the access request sent by the user equipment is received, wherein the access request is acquired based on the decide parameter and an trigger event; the trigger event is an access stratum trigger event or a non-access stratum trigger event detected when the user equipment is in a connected state or an inactive state;
    when the access request sent by the user equipment is received, processing the access request.
  12. The method of claim 11, wherein the trigger event is selected from a group comprising an event that the user equipment tries to set up a new data radio bearer or a signaling radio bearer, an event that the user equipment tries to modify an attribute of an existing radio bearer, an event that the user equipment tries to remap a quality of service flow from one radio bearer to another radio bearer, an event that the user equipment tries to remap the quality of service flow from a default radio bearer to a specific radio bearer, an event that the user equipment tries to delete the existing radio bearer, an event that the user equipment tries to set up the new data radio bearer to transmit data, an event that the user equipment tries to perform a type conversion on the data radio bearer, an event that the user equipment tries to activate/deactivate a packet duplication and transmission functionality, an event that the user equipment in  the inactive state tries to transmit the data, and an event that the user equipment in the inactive state tries to initiate a notification area update procedure.
  13. The method of claim 11, wherein the non-access stratum trigger event comprises: requesting to start a voice, a video or a session initial protocol call, sending a mobile originated short messaging service, establishing a new protocol data unit session, modifying an existing protocol data unit session, releasing the protocol data unit session, re-establishing a user plane for the existing protocol data unit session, or establishing a new emergency protocol data unit session.
  14. The method of claim 11, further comprising: pre-receiving a mapping rule, wherein the mapping rule is sent via a system broadcast message or a radio resource control signaling;
    wherein the access category in the mapping rule is determined by a trigger event type and/or a parameter of the user equipment; the parameter of the user equipment is selected from a group comprising a flow identifier of the quality of service of data flow, a five-tuple of the data flow, an access class of the user equipment, a roaming status of the user equipment, an operating system identifier configured to trigger data access, and an operating system application identifier configured to trigger the data access.
  15. The method of claim 11, wherein the access stratum or the non-access stratum of the user equipment makes the access control decision on the access category by using an access class barring mechanism or an application-specific congestion control mechanism for data communication;
    the decide parameter comprises an access barring factor.
  16. A user equipment, comprising a processor, a storage and a communication circuit; wherein the processor is respectively coupled to the storage and the communication circuit; the storage has programs stored therein, the processor is configured to execute the programs to perform the access control method of any one of claims 1-10.
  17. The user equipment of claim 16, wherein the processor is further configured to:
    when the user equipment is in an idle state, detect whether there is an access stratum control trigger event; the control trigger event comprises an event that the user equipment tries to switch from the idle state to the connected state;
    when the trigger event is detected, map the control trigger event to a third access category, and make the access control decision on the third access category;
    when the access control decision is passed, control the communication circuit to send the access request corresponding to the control trigger event.
  18. A base station, comprising a processor, a storage and a communication circuit; wherein the processor is respectively coupled to the storage and the communication circuit; the storage has programs stored therein, the processor is configured to execute the programs to perform the access control method of any one of claims 11-15.
  19. A storage apparatus, having programs stored therein, wherein the programs are executable to perform the access control method of any one of claims 1-9 and 11-15.
PCT/CN2018/084469 2018-01-11 2018-04-25 Access control method, user equipment, base station and storage apparatus WO2019136880A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810033953.6A CN110035474A (en) 2018-01-11 2018-01-11 Connection control method, user equipment, base station and the device with store function
CN201810033953.6 2018-01-11

Publications (1)

Publication Number Publication Date
WO2019136880A1 true WO2019136880A1 (en) 2019-07-18

Family

ID=67218171

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/084469 WO2019136880A1 (en) 2018-01-11 2018-04-25 Access control method, user equipment, base station and storage apparatus

Country Status (2)

Country Link
CN (1) CN110035474A (en)
WO (1) WO2019136880A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11595879B2 (en) 2021-02-19 2023-02-28 At&T Intellectual Property I, L.P. Fine grained access barring of aggressive cellular devices

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113259985B (en) * 2020-02-07 2023-04-25 维沃移动通信有限公司 Access control method and equipment
WO2022000203A1 (en) * 2020-06-29 2022-01-06 北京小米移动软件有限公司 Access control method and apparatus, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104244450A (en) * 2013-06-21 2014-12-24 中兴通讯股份有限公司 Rebuilding method used for concurrence of long term evolution service and cluster service, base station and user equipment
WO2015035880A1 (en) * 2013-09-11 2015-03-19 华为技术有限公司 Access control method and apparatus
US20170367116A1 (en) * 2016-06-15 2017-12-21 Convida Wireless, Llc Grant-less Operations

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104244450A (en) * 2013-06-21 2014-12-24 中兴通讯股份有限公司 Rebuilding method used for concurrence of long term evolution service and cluster service, base station and user equipment
WO2015035880A1 (en) * 2013-09-11 2015-03-19 华为技术有限公司 Access control method and apparatus
US20170367116A1 (en) * 2016-06-15 2017-12-21 Convida Wireless, Llc Grant-less Operations

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
QUALCOMM INCORPORATED: "Unified Access Control in different RRC Modes", 3GPP TSG-RAN2 MEETING #98, R2-1705739, 19 May 2017 (2017-05-19), XP051265145 *
SAMSUNG: "Overview of the NR RRC state machine and modelling of the INACTIVE state", 3GPP TSG-RAN WG2 MEETING #98, R2-1704147, 19 May 2017 (2017-05-19), XP051274749 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11595879B2 (en) 2021-02-19 2023-02-28 At&T Intellectual Property I, L.P. Fine grained access barring of aggressive cellular devices

Also Published As

Publication number Publication date
CN110035474A (en) 2019-07-19

Similar Documents

Publication Publication Date Title
US11528770B2 (en) Session management method, apparatus, and system
US12075277B2 (en) Method of processing network slice based congestion, device and system thereof
EP3826422A1 (en) Resume request followed by release and redirect
KR101833841B1 (en) Method for distributing data to wireless local area network, terminal, and network device
US9860715B2 (en) Data transmission method, apparatus, and system
JP6473458B2 (en) Adaptive cutoff control method and apparatus for MO-SMS in wireless communication system
WO2017193293A1 (en) Method and device for data transmission
US11310658B2 (en) Method and apparatus for determining status of terminal device, and device
US10212048B2 (en) Service offloading method, device, and system
WO2019136880A1 (en) Access control method, user equipment, base station and storage apparatus
US10390278B2 (en) Method for automatic switching between access points, and wireless routing device
US20220330100A1 (en) Service switching method, terminal, and network device
US20240224104A1 (en) Measurement method and apparatus, measurement configuration method and apparatus, terminal, and network-side device
US20200351951A1 (en) Random access method and device
US20220272577A1 (en) Communication method and communication apparatus
KR20220038103A (en) Handover method and device
US11122494B2 (en) Access method, and terminal
WO2021259358A1 (en) Bandwidth part switching method and apparatus
JP2019532594A (en) Wireless telecommunication device and method
CN113133063A (en) Session release method, electronic device and storage medium
US20240129830A1 (en) Communication mode switching method and related apparatus
US20200322858A1 (en) Method and terminal for redirecting network
WO2023125201A1 (en) Communication method and apparatus
TW202015482A (en) Method and device for communication
KR20220107031A (en) Method and apparatus for implementing multicast service, and communication equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18899934

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18899934

Country of ref document: EP

Kind code of ref document: A1