WO2021253341A1 - Wireless communication method, terminal device, and network device - Google Patents

Wireless communication method, terminal device, and network device Download PDF

Info

Publication number
WO2021253341A1
WO2021253341A1 PCT/CN2020/096871 CN2020096871W WO2021253341A1 WO 2021253341 A1 WO2021253341 A1 WO 2021253341A1 CN 2020096871 W CN2020096871 W CN 2020096871W WO 2021253341 A1 WO2021253341 A1 WO 2021253341A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
access control
control information
identifier
terminal device
Prior art date
Application number
PCT/CN2020/096871
Other languages
French (fr)
Chinese (zh)
Inventor
李海涛
胡奕
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202080100748.2A priority Critical patent/CN115516963A/en
Priority to PCT/CN2020/096871 priority patent/WO2021253341A1/en
Publication of WO2021253341A1 publication Critical patent/WO2021253341A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation

Definitions

  • the embodiments of the present application relate to the communication field, and more specifically, to a wireless communication method, terminal device, and network device.
  • unified access control In the communication system, in order to control the load of network equipment, unified access control (UAC) is introduced.
  • Network equipment can broadcast access control information (or access restriction information), and terminal equipment can perform access control (Access Control Barring, ACB) detection according to the broadcast access control information to determine whether to allow access to the network.
  • access control Access Control Barring, ACB
  • Reduced Capbility (RedCap) terminals are introduced for use in scenarios with low performance requirements such as delay, reliability, bandwidth, coverage, and throughput. In this case, how to perform access control on such terminal devices is a problem that needs to be solved urgently.
  • RedCap Reduced Capbility
  • the embodiments of the present application provide a wireless communication method, terminal equipment, and network equipment.
  • a specific access identifier for the terminal By configuring a specific access identifier for the terminal with reduced capability, it is possible to realize individual access control for the terminal with reduced capability, thereby improving network performance.
  • a wireless communication method includes: a terminal device receives first information broadcast by a network device, the first information includes a first access control information set list, and the first access control The information set list includes N first access control information sets, and the first access control information sets are used for access control of a terminal device with a specific access identifier, where N is a positive integer, and the specific access
  • the terminal equipment that enters the mark includes a terminal with reduced capability.
  • a wireless communication method includes: a network device broadcasting first information, where the first information includes a first access control information set list, and the first access control information set list includes N first access control information sets, the first access control information sets are used for access control of terminal devices with a specific access identifier, where N is a positive integer, and the terminal with the specific access identifier Equipment includes reduced capacity terminals.
  • a terminal device which is used to execute the method in the above-mentioned first aspect or each of its implementation manners.
  • the terminal device includes a functional module for executing the method in the foregoing first aspect or each of its implementation manners.
  • a network device is provided, which is used to execute the method in the second aspect or its implementation manners.
  • the network device includes a functional module for executing the method in the foregoing second aspect or each of its implementation manners.
  • a terminal device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned first aspect or each of its implementation modes.
  • a network device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory, and execute the method in the second aspect or its implementation manners.
  • a chip for implementing any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
  • the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes any one of the above-mentioned first aspect to the second aspect or any of the implementations thereof method.
  • a computer-readable storage medium for storing a computer program that enables a computer to execute any one of the first aspect to the second aspect or the method in each implementation manner thereof.
  • a computer program product which includes computer program instructions that cause a computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
  • a computer program which when running on a computer, causes the computer to execute any one of the above-mentioned first to second aspects or the method in each of its implementation modes.
  • a specific access identifier is configured for the terminal with reduced capability, and the access control information applicable to the terminal device of the specific access identifier is further configured, so that the terminal device with the specific access identifier can be based on the corresponding Performing access control on the access control information is beneficial to realize differentiated management of access control for terminal devices with different performance requirements, improve network performance, and further enhance user experience.
  • Fig. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
  • Fig. 2 is a schematic interaction diagram of a wireless communication method provided according to an embodiment of the present application.
  • Fig. 3 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • Fig. 4 is a schematic block diagram of a network device provided according to an embodiment of the present application.
  • Fig. 5 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • Fig. 6 is a schematic block diagram of a chip provided according to an embodiment of the present application.
  • Fig. 7 is a schematic block diagram of a communication system provided according to an embodiment of the present application.
  • GSM Global System of Mobile Communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • LTE-A Advanced Long Term Evolution
  • New Air Interface New Radio, NR
  • NR system evolution system LTE (LTE-based access to unlicensed spectrum, LTE-U) system on unlicensed spectrum
  • WLAN Wireless Fidelity
  • WiFi next-generation communication systems or other communication systems, etc.
  • D2D Device to Device
  • M2M Machine to Machine
  • MTC machine type communication
  • V2V vehicle to vehicle
  • the communication system in the embodiments of the present application can be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, can also be applied to a dual connectivity (Dual Connectivity, DC) scenario, and can also be applied to a standalone (SA) deployment.
  • CA Carrier Aggregation
  • DC Dual Connectivity
  • SA standalone
  • the embodiment of the application does not limit the applied frequency spectrum.
  • the embodiments of this application may be applied to licensed spectrum, or unlicensed spectrum, or shared spectrum.
  • the communication system 100 applied in the embodiment of the present application is shown in FIG. 1.
  • the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or called a communication terminal or a terminal).
  • the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located in the coverage area.
  • Figure 1 exemplarily shows one network device and two terminal devices.
  • the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
  • the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • a device with a communication function in the network/system in the embodiment of the present application may be referred to as a communication device.
  • the communication device may include a network device 110 and a terminal device 120 with communication functions, and the network device 110 and the terminal device 120 may be the specific devices described above, which will not be repeated here.
  • the communication device may also include other devices in the communication system 100, such as network controllers, mobility management entities, and other network entities, which are not limited in the embodiment of the present application.
  • the "indication" mentioned in the embodiments of the present application may be a direct indication, an indirect indication, or an association relationship.
  • a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association between A and B relation.
  • correlate can mean that there is a direct correspondence or an indirect correspondence between the two, or that there is an association relationship between the two, or indicating and being instructed, configuring and being Configuration and other relationships.
  • the embodiments of this application describe various embodiments in combination with terminal equipment and network equipment.
  • the terminal equipment may also be referred to as User Equipment (UE), access terminal, user unit, user station, mobile station, mobile station, and remote station. Station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc.
  • the terminal device can be a station (ST) in a WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, and a personal digital processing unit.
  • SIP Session Initiation Protocol
  • WLL wireless Local Loop
  • PDA Personal Digital Assistant
  • handheld devices with wireless communication capabilities computing devices or other processing devices connected to wireless modems
  • vehicle-mounted devices wearable devices
  • next-generation communication systems such as terminal devices in the NR network or Terminal equipment in the public land mobile network (PLMN) network that will evolve in the future.
  • PLMN public land mobile network
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices. It is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which need to cooperate with other devices such as smart phones.
  • Use such as all kinds of smart bracelets and smart jewelry for physical sign monitoring.
  • a network device can be a device used to communicate with mobile devices.
  • the network device can be an access point (AP) in WLAN, a base station (BTS) in GSM or CDMA, or a device in WCDMA.
  • a base station (NodeB, NB) can also be an Evolutional Node B (eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and a network device or base station in the NR network (gNB) or network equipment in the future evolved PLMN network.
  • the network device may have mobile characteristics, for example, the network device may be a mobile device.
  • the network equipment may be a satellite or a balloon station.
  • the satellite may be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geostationary earth orbit (GEO) satellite, or a high elliptical orbit (High Elliptical Orbit, HEO). ) Satellite etc.
  • the network device may also be a base station installed in a location such as land or water.
  • the network equipment provides services for the cell
  • the terminal equipment communicates with the network equipment through the transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell
  • the cell may be a network equipment (for example, The cell corresponding to the base station.
  • the cell can belong to a macro base station or a base station corresponding to a small cell.
  • the small cell here can include: Metro cell, Micro cell, Pico Cells, Femto cells, etc. These small cells have the characteristics of small coverage and low transmit power, and are suitable for providing high-rate data transmission services.
  • RedCap terminals In version 17 (R17), RedCap terminals, or RedCap devices, are introduced for scenarios with lower performance requirements. For example, but not limited to the following scenarios:
  • Scenario 1 Industrial Wireless Sensors. Compared with Ultra-Reliable and Low Latency Communication (URLLC) terminals, industrial wireless sensors have relatively low latency and reliability. In addition, the equipment cost and power consumption are also lower than URLLC terminals and Enhanced Mobile Broadband (eMBB) terminals.
  • URLLC Ultra-Reliable and Low Latency Communication
  • eMBB Enhanced Mobile Broadband
  • Scenario 2 Video surveillance, which can be used for video surveillance in scenarios such as smart cities and industrial processes.
  • the equipment is mainly used for data collection and processing, which can realize more effective monitoring and control of urban resources, and provide more effective services to urban residents.
  • Scenario 3 Wearables. Examples include but are not limited to smart watches, rings, electronic health equipment, medical monitoring equipment, etc. The size of these devices is usually small.
  • the bandwidth of the device and the receiving antenna can be reduced.
  • Coverage which requires coverage equivalent to or similar to that of R15/16 eMBB terminals. In this case, if the receiving antenna is lowered, the bandwidth is lowered, the power level is lowered, or the complexity of the UE is reduced to cause coverage loss, corresponding compensation is required.
  • the reliability requirement is 99.99%
  • the end-to-end delay is 100ms
  • the bit rate requirement is 2Mbps
  • the device is stationary
  • the battery life is several years.
  • the delay requirement can be 5-10 ms.
  • the bit rate requirement is 2-4Mbps
  • the delay requirement is less than 500ms
  • the reliability requirement is 99.-99.9%.
  • the high-end video rate is required to be 2-4 Mbps.
  • the network device can broadcast the access control information related to the access category (Access Caegory) and the access identifier (Access Identify). Further, the terminal device can broadcast the access control information according to the broadcast access control information and its own access category. Perform ACB detection with the access identifier to determine whether to allow access to the network.
  • Access Caegory access category
  • Access Identify access identifier
  • access identifier and access category are shown in Table 1 and Table 2.
  • the RedCap terminal since the RedCap terminal has lower performance requirements, in this case, if the terminal device is indiscriminately restricted from accessing the network through a broadcast message, the network performance will be reduced and the user experience will be affected.
  • this application proposes an access control scheme, which can configure a specific access identifier for the RedCap terminal, and further configure corresponding access control information for the RedCap terminal through a broadcast message, thereby enabling independent access to the RedCap terminal Control, in other words, can achieve differentiated access control for terminals with different performance requirements, thereby improving network performance and thus improving user experience.
  • FIG. 2 is a schematic interaction diagram of a wireless communication method 200 according to an embodiment of the present application. As shown in FIG. 2, the method 200 may include but is not limited to the following content:
  • the network device broadcasts first information, where the first information includes a first access control information set list, the first access control information set list includes N first access control information sets, and the first access The access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability;
  • S220 The terminal device receives the first information.
  • the first information may be carried in Master Information Block (MIB) or System Information Block (System Information Block, SIB) information, for example, may be carried in SIB1.
  • MIB Master Information Block
  • SIB System Information Block
  • the first information may also be carried in other messages or signaling, such as Radio Resource Control (RRC) signaling, Media Access Control Element (MAC) CE), etc.
  • RRC Radio Resource Control
  • MAC Media Access Control Control Element
  • SIB1 SIB1 as an example for description, but the present application is not limited to this.
  • the terminal device with the specific access identifier may include a terminal that requires differentiated (or independent) access control, for example, a terminal with reduced capability, or a terminal with enhanced capability.
  • the terminal with enhanced capability may, for example, For terminals with higher performance requirements compared to ordinary terminals, or terminals suitable for other new scenarios or new services, the following takes the specific access identification terminal device as a terminal with reduced capabilities as an example. The application is not limited to this.
  • the reduced-capacity terminal is a terminal relative to a normal terminal, and the network device may perform unified access control (UAC) on the normal terminal.
  • the normal terminal may be a table Terminals whose access identifiers in 1 are 1, 2, 11, 12, 13, 14, and 15.
  • the reduced-capacity terminals have lower performance requirements, and some networks may not provide services for such terminals. Therefore, differentiated access control can be performed on them to improve network performance.
  • the reduced capability terminal may include the terminals in the foregoing three scenarios, or may also include machine type of communication (MTC) or evolved machine type of communication (eMTC). ), terminals in the Narrow Band Internet of Things (NB-IoT), etc.
  • MTC machine type of communication
  • eMTC evolved machine type of communication
  • NB-IoT Narrow Band Internet of Things
  • the terminals compared with these technologies greatly reduce the hardware complexity, data throughput and processing speed of the terminal. It is also suitable for some low-demand smart homes, smart cities, smart factories, remote monitoring, and smart transportation application scenarios. This application is not limited to this.
  • the enhanced capability terminal may be, for example, a terminal with higher performance requirements, for example, a terminal applied to a key communication technology.
  • This type of terminal may be, for example, NR high-reliability low-latency communication (Ultra- Reliable and Low Latency Communication (URLLC) terminals, used in some IoT scenarios that require extremely low latency and extremely high communication reliability, such as video surveillance in smart security, low latency industrial implementation control, smart driving, etc. , This application is not limited to this.
  • URLLC Ultra- Reliable and Low Latency Communication
  • the specific access identifier may be represented by a reserved value of the access identifier.
  • the access identifiers 3-10 are reserved values. Therefore, one or more of the values can be selected to represent the specific access identifier.
  • the specific access identifier may also be expressed by other values that do not conflict with the existing access identifier, and the present application is not limited to this.
  • it can be expressed by other values than 0-15, such as 16, 20, etc. In this case, the number of bits occupied by the access identifier needs to be increased.
  • the number of the specific access identifier is one, that is, all terminals with reduced capabilities use the same specific access identifier, for example, any one of the reserved access identifier values 3-10 The value is used as the specific access identifier.
  • the number of the specific access identifiers is multiple, and the multiple specific access identifiers may correspond to multiple types of reduced-capacity terminals, and each specific access identifier corresponds to A type of reduced capacity terminal.
  • the multiple types of reduced-capability terminals may be divided based on different performance requirements or based on different scenarios, which is not limited in this application.
  • configuring corresponding access identifiers for different types of terminals with reduced capabilities, and further configuring corresponding access control information respectively more refined access control for terminals with reduced capabilities can be achieved.
  • the multiple types of reduced-capacity terminals include three types of reduced-capacity terminals, respectively corresponding to the three scenarios described above, or corresponding to three levels of performance requirements, and so on.
  • the multiple access identifiers may include three access identifiers, respectively indicating the three types of reduced-capability terminals.
  • the three access identifiers may include any three of the access identifier reserved values 3-10, for example, 3, 4, and 5.
  • the network device may broadcast the first information, and the first information may include access control information used for access control of a terminal device with a specific access identifier, that is, the first access
  • the control information set list is marked as UAC-BarringInfoSetList-v17xy for easy distinction.
  • the network device may also broadcast access control information used for access control of terminal devices with no specific access identification, that is, a second access control information set list, which is denoted as UAC-BarringInfoSetList for easy distinction. .
  • the network device may also broadcast more lists of access control information sets, or if terminal devices with no specific access identification also require more refined access For access control, the network device may also configure multiple second access control information set lists, etc., and the application is not limited to this.
  • the first access control information set list includes N first access control information sets, which are denoted as UAC-BarringInfoSet-v17xy for easy distinction, where each first access control information set It includes a set of access control parameters, and the set of access control parameters is used to determine whether the terminal device with the specific access identifier is allowed to access.
  • the first access control information set list is the access control information applicable to the terminal equipment of the specific access identifier, and the terminal equipment of the specific access identifier is configured with special access control information It can realize individual access control to such terminal equipment. For example, a higher restriction probability, a longer restriction duration, etc. can be configured for such terminal devices, so that the access requirements of ordinary terminals or terminals with higher performance requirements can be guaranteed first, and network performance can be improved.
  • the N first access control information sets may be applicable to different situations, for example, different access categories, or different PLMNs.
  • network equipment can configure corresponding access control information sets for different access categories or PLMNs, which is beneficial to meet the needs of different situations.
  • the first access control information set includes first indication information (for easy distinction, it is recorded as uac-BarringForAccessIdentity-v17xy), and the first indication information is used to indicate the status of the specific access identifier The control information of the access attempt of the terminal device.
  • the first indication information is used to indicate whether the access attempt of the terminal device of the specific access identifier is restricted.
  • the first access control information set further includes a restriction factor (denoted as uac-BarringFactor-v17xy for ease of distinction) and/or restriction duration (denoted as uac-BarringTime-v17xy for ease of distinction), so
  • the first indication information is used to indicate whether the access attempt of the terminal device with the specific access identifier is allowed or restricted by the restriction factor.
  • the restriction factor is used to indicate the probability of being restricted, or the probability of being allowed, and so on.
  • the restricted duration is the duration during which the terminal device is restricted from accessing.
  • the first indication information may use a bitmap to indicate whether the access attempt of the terminal device with the specific access identifier is allowed or restricted, or is allowed or subject to the Restriction factor restriction.
  • the number of the specific access identifier is one.
  • the first indication information includes one bit, and the value of the one bit is used to indicate the status of a terminal device of the specific access identifier. Whether the access attempt is allowed or restricted by the restriction factor.
  • the first indication information includes multiple bits, and each bit corresponds to one specific access identifier.
  • the value is used to indicate whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
  • the foregoing operation is performed when neither the first timer (or T309) nor the second timer (or T302) timer is running, and the access type of the terminal device is not 0.
  • the first timer is an access prohibition timer.
  • the first timer may be configured for each access type, that is, each The access type can be configured with the corresponding first timer.
  • the second timer is started when the terminal device is denied access by the network. When the second timer is running, the terminal device is not allowed to initiate an access attempt.
  • the terminal device may also generate a random number greater than or equal to 0 and less than 1 (denoted as rand), start the first timer, and set the The timing of the first timer is set to (0.7+0.6*rand)*limiting factor, and an access attempt is initiated after the first timer expires.
  • the first indication information may include three bits to indicate the terminal devices of the access identifiers 3, 4, and 5, respectively. Whether the access attempts are restricted. If the first indication information is 011, the restriction factor is 0.8, and the access identifier of the terminal device is 5, the terminal device determines that the access attempt is restricted, and then generates a random value. When the random number is greater than 0.8, access Attempts are forbidden, and when the random number is less than or equal to 0.8, the access attempt of the terminal device is allowed.
  • the content of the second access control information set in the second access control information set list may refer to the content of the first access control information set, and the difference lies in the terminals corresponding to different access identifiers.
  • the equipment, for the sake of brevity, will not be repeated here.
  • the first information further includes a first access control configuration list (denoted as UAC-BarringPerCatList) and/or a second access control configuration list (denoted as UAC-BarringPerPLMN-List) .
  • the first access control configuration list is used to indicate the access control information set corresponding to each access category in the multiple access categories
  • the second access control configuration list is used to indicate multiple public land mobile networks
  • each access category can be configured with a corresponding access control information set
  • each PLMN can be configured with a corresponding access control information set.
  • the first access control configuration list includes multiple first access control configurations (denoted as UAC-BarringPerCat), and each first access control configuration corresponds to one of the multiple access categories For one access category, each first access control configuration includes at least one access control information set index.
  • the second access control configuration list includes multiple second access control configurations (denoted as UAC-BarringPerPLMN), and each second access control configuration corresponds to one PLMN of the multiple PLMNs ,
  • Each second access control configuration includes at least one access control information set index.
  • the terminal device may determine whether it is in the first access control information set list or the second access control information list according to the first access control configuration list in combination with the access identifier and the access category of the terminal device.
  • the target access control information is determined in the set list.
  • the access identifier of the terminal device is the specific access identifier, that is, the terminal device is a reduced-capacity terminal.
  • the terminal device may search for the target access control information set in the first access control information set list.
  • the terminal device may determine in the first access control configuration list that the first access control configuration corresponding to the access category of the terminal device is the target access control configuration, and further may be based on the target access control configuration.
  • Access control information set index included in the control configuration search for N access control information sets corresponding to the access control information set index in the first access control information set list in the first access control information set list, Determine it as the target access control information set.
  • the access control information corresponding to the access identifier can be searched in the target access control information set according to the access identifier of the terminal device (the first indication information, restriction factor, restriction duration as described above) And other parameters), and determine whether the terminal device is allowed or restricted to access the network device according to the access control information.
  • the first information may further include access type 1 selection auxiliary information, which is used to assist in determining whether to perform ACB detection for an access attempt of access type 1.
  • the above-mentioned information included in the first information may be carried by the same first information, or may also be carried by different first information, which is not limited in this application.
  • the first access control configuration list and the first access control configuration list may be carried by the same first information as the first access control information set list, or may also be carried by different first information. .
  • the format of the above information in SIB1 is as follows:
  • the SIB1-v17xy-IEs are used to carry the first access control information set list in the embodiment of this application
  • UAC-BarringInfoSetList-v17xy represents the first access control information set list
  • UAC-BarringInfoSet- v17xy represents the first access control information set
  • uac-BarringFactor represents the barring factor
  • uac-BarringTime represents the barring duration
  • uac-BarringForAccessIdentity-v17xy represents the first indication information, it is a bitmap of K bits
  • K is a specific access The number of identifiers.
  • the access identifier of the terminal device may be obtained from the non-access stratum (NAS) layer of the terminal device.
  • the access category of the terminal device may be obtained from the NAS layer or the access stratum (Access Stratum, AS) layer of the terminal device.
  • the access identifier of the terminal device is not the specific access identifier, that is, the terminal device is not a reduced-capacity terminal.
  • the terminal device may search for the target access control information set in the second access control information set list.
  • the specific implementation is similar to case 1, and will not be repeated here.
  • the terminal device with the specific access identifier can perform access control based on the corresponding access control information. It is helpful to realize differentiated management of access control for terminal devices with different performance requirements, improve network performance, and further enhance user experience.
  • FIG. 3 shows a schematic block diagram of a terminal device 300 according to an embodiment of the present application.
  • the terminal device 300 includes:
  • the communication unit 310 is configured to receive first information broadcast by a network device, where the first information includes a first access control information set list, and the first access control information set list includes N first access control information sets
  • the first access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability.
  • the number of the specific access identifier is one, and each of the terminals with reduced capability corresponds to one specific access identifier;
  • the reduced capability terminal includes multiple types of terminals, the number of the specific access identifiers is multiple, and each specific access identifier is used to indicate one of the multiple types.
  • the multiple types of terminals include at least one of the following:
  • the first access control information set includes first indication information, and the first indication information is used to indicate control information of an access attempt of a terminal device of the specific access identifier .
  • the first access control information set further includes a restriction factor and/or restriction duration
  • the first indication information is used to indicate the access of the terminal device with the specific access identifier Whether the attempt is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
  • the number of the specific access identifier is one
  • the first indication information includes one bit
  • the value of the one bit is used to indicate a terminal of the specific access identifier Whether the access attempt of the device is allowed or restricted by the restriction factor;
  • the number of the specific access identifiers is multiple, the first indication information includes multiple bits, each bit corresponds to one of the multiple specific access identifiers, and the value of each bit is used to indicate Whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
  • the first information further includes a first access control configuration list and/or a second access control configuration list, where the first access control configuration list is used to indicate multiple The access control information set corresponding to each access category in the two access categories, and the second access control configuration list is used to indicate the access control information set corresponding to each PLMN in the multiple public land mobile network PLMNs .
  • the first access control configuration list includes multiple first access control configurations, and each first access control configuration corresponds to one access in the multiple access categories.
  • each first access control configuration includes at least one access control information set index;
  • the second access control configuration list includes multiple second access control configurations, each second access control configuration corresponds to one PLMN of the multiple PLMNs, and each second access control configuration includes at least one access control configuration.
  • Incoming control information set index is included in the second access control configuration list.
  • each first access control information set in the N first access control information sets corresponds to an access control information set index
  • the terminal device 300 further includes:
  • the processing unit 320 is configured to, if the access identifier of the terminal device is the specific access identifier, determine the first access control corresponding to the access category of the terminal device in the first access control configuration list Configure as target access control configuration;
  • the access identifier of the terminal device and the target access control information set it is determined whether the terminal device is allowed or restricted to access the network device.
  • the processing unit 320 is specifically configured to:
  • the information is used to indicate whether the access attempt of the terminal device with the specific access identifier is allowed or restricted.
  • the specific access identifier is represented by a reserved value of the access identification number.
  • the specific access identifier is a value in the access identifier number 3-10.
  • the first information is main information block MIB information or system information block SIB information.
  • the first information further includes a second access control information set list
  • the second access control information set list includes M second access control information sets. 2.
  • the list of access control information sets is used for access control of terminal devices other than the specific access identifier, where the M is a positive integer.
  • the second access control information set includes second indication information, and the second indication information is used to indicate control of an access attempt of a terminal device that is not the specific access identifier information.
  • the second access control information set further includes a restriction factor and/or restriction duration
  • the second indication information is used to indicate the access of a terminal device that is not the specific access identifier. Whether the access attempt is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
  • the aforementioned communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system-on-chip.
  • the aforementioned processing unit may be one or more processors.
  • terminal device 300 may correspond to the terminal device in the method embodiment of the present application, and the above-mentioned and other operations and/or functions of each unit in the terminal device 300 are to implement the method shown in FIG. 2 respectively.
  • the corresponding process of the terminal equipment in 200 will not be repeated here.
  • Fig. 4 shows a schematic block diagram of a network device 400 according to an embodiment of the present application.
  • the network device 400 belongs to a network, and the network device 400 includes:
  • the communication unit 410 is configured to broadcast first information, where the first information includes a first access control information set list, and the first access control information set list includes N first access control information sets.
  • An access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability.
  • the number of the specific access identifier is one, and each of the terminals with reduced capability corresponds to one specific access identifier;
  • the reduced capability terminal includes multiple types of terminals, the number of the specific access identifiers is multiple, and each specific access identifier is used to indicate one of the multiple types.
  • the multiple types of terminals include at least one of the following:
  • the first access control information set includes first indication information, and the first indication information is used to indicate control information of an access attempt of a terminal device of the specific access identifier .
  • the first access control information set further includes a restriction factor and/or restriction duration
  • the first indication information is used to indicate the access of the terminal device with the specific access identifier Whether the attempt is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
  • the number of the specific access identifier is one
  • the first indication information includes one bit
  • the value of the one bit is used to indicate a terminal of the specific access identifier Whether the access attempt of the device is allowed or restricted by the restriction factor;
  • the number of the specific access identifiers is multiple, the first indication information includes multiple bits, each bit corresponds to one of the multiple specific access identifiers, and the value of each bit is used to indicate Whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
  • the first information further includes a first access control configuration list and/or a second access control configuration list, where the first access control configuration list is used to indicate multiple The access control information set corresponding to each access category in the two access categories, and the second access control configuration list is used to indicate the access control information set corresponding to each PLMN in the multiple public land mobile network PLMNs .
  • the first access control configuration list includes multiple first access control configurations, and each first access control configuration corresponds to one access in the multiple access categories.
  • each first access control configuration includes at least one access control information set index;
  • the second access control configuration list includes multiple second access control configurations, each second access control configuration corresponds to one PLMN of the multiple PLMNs, and each second access control configuration includes at least one access control configuration.
  • Incoming control information set index is included in the second access control configuration list.
  • the specific access identifier is represented by a reserved value of the access identification number.
  • the specific access identifier is a value in the access identifier number 3-10.
  • the first information is main information block MIB information or system information block SIB information.
  • the first information further includes a second access control information set list, and the second access control information set list includes M second access control information sets.
  • the second access control information set is used for access control of terminal devices other than the specific access identifier, where the M is a positive integer.
  • the second access control information set includes second indication information, and the second indication information is used to indicate control of an access attempt of a terminal device that is not the specific access identifier information.
  • the second access control information set further includes a restriction factor and/or restriction duration
  • the second indication information is used to indicate the access of a terminal device that is not the specific access identifier. Whether the access attempt is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
  • the aforementioned communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system-on-chip.
  • the network device 400 may correspond to the network device in the method embodiment of the present application, and the foregoing and other operations and/or functions of each unit in the network device 400 are to implement the method shown in FIG. 2 respectively.
  • the corresponding process of the network equipment in 200 will not be repeated here.
  • FIG. 5 is a schematic structural diagram of a communication device 800 provided by an embodiment of the present application.
  • the communication device 800 shown in FIG. 5 includes a processor 810, and the processor 810 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the communication device 800 may further include a memory 820.
  • the processor 810 may call and run a computer program from the memory 820 to implement the method in the embodiment of the present application.
  • the memory 820 may be a separate device independent of the processor 810, or may be integrated in the processor 810.
  • the communication device 800 may further include a transceiver 830, and the processor 810 may control the transceiver 830 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
  • the transceiver 830 may include a transmitter and a receiver.
  • the transceiver 830 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 800 may specifically be a network device of an embodiment of the application, and the communication device 800 may implement the corresponding process implemented by the network device in each method of the embodiment of the application. For the sake of brevity, it will not be repeated here. .
  • the communication device 800 may specifically be a mobile terminal/terminal device of an embodiment of the present application, and the communication device 800 may implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • I won’t repeat it here.
  • Fig. 6 is a schematic structural diagram of a chip of an embodiment of the present application.
  • the chip 900 shown in FIG. 6 includes a processor 910, and the processor 910 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the chip 900 may further include a memory 920.
  • the processor 910 can call and run a computer program from the memory 920 to implement the method in the embodiment of the present application.
  • the memory 920 may be a separate device independent of the processor 910, or may be integrated in the processor 910.
  • the chip 900 may further include an input interface 930.
  • the processor 910 can control the input interface 930 to communicate with other devices or chips, and specifically, can obtain information or data sent by other devices or chips.
  • the chip 900 may further include an output interface 940.
  • the processor 910 can control the output interface 940 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
  • the chip 900 can be applied to the network device in the embodiment of the present application, and the chip 900 can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application. For the sake of brevity, details are not described herein again.
  • the chip 900 may be applied to the mobile terminal/terminal device in the embodiment of the present application, and the chip 900 may implement the corresponding process implemented by the mobile terminal/terminal device in the various methods of the embodiment of the present application. For the sake of brevity, I won't repeat it here.
  • the device mentioned in the embodiment of the present application may also be a chip.
  • it can be a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip.
  • FIG. 7 is a schematic block diagram of a communication system 1000 according to an embodiment of the present application. As shown in FIG. 7, the communication system 1000 includes a terminal device 1010 and a network device 1020.
  • the terminal device 1010 can be used to implement the corresponding function implemented by the terminal device in the above method
  • the network device 1020 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
  • the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • DDR SDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM, ESDRAM Enhanced Synchronous Dynamic Random Access Memory
  • Synchronous Link Dynamic Random Access Memory Synchronous Link Dynamic Random Access Memory
  • DR RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is to say, the memory in the embodiments of the present application is intended to include, but is not limited to, these and any other suitable types of memory.
  • the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application For the sake of brevity, I won’t repeat it here.
  • the embodiments of the present application also provide a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • it is not here. Repeat it again.
  • the computer program product can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application, For the sake of brevity, I will not repeat them here.
  • the embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network device in the embodiment of the present application.
  • the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • I won’t repeat it here.
  • the computer program can be applied to the mobile terminal/terminal device in the embodiment of the present application.
  • the computer program runs on the computer, the computer executes each method in the embodiment of the present application. For the sake of brevity, the corresponding process will not be repeated here.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided are a wireless communication method, a terminal device, and a network device. The method comprises: a terminal device receiving first information broadcast by a network device, the first information comprising a first access control information set list, wherein the first access control information set list comprises N first access control information sets, and each of the first access control information sets is used for access control barring of a terminal device of a specific access identifier, where N is a positive integer, and the terminal device of the specific access identifier comprises a reduced-capability terminal.

Description

无线通信的方法、终端设备和网络设备Wireless communication method, terminal equipment and network equipment 技术领域Technical field
本申请实施例涉及通信领域,并且更具体地,涉及一种无线通信的方法、终端设备和网络设备。The embodiments of the present application relate to the communication field, and more specifically, to a wireless communication method, terminal device, and network device.
背景技术Background technique
在通信系统中,为了控制网络设备的负荷,引入了统一接入控制(Unified Access Control,UAC)。网络设备可以广播接入控制信息(或称,接入限制信息),终端设备可以根据广播的接入控制信息进行接入控制(Access Control Barring,ACB)检测,以确定是否允许接入网络。In the communication system, in order to control the load of network equipment, unified access control (UAC) is introduced. Network equipment can broadcast access control information (or access restriction information), and terminal equipment can perform access control (Access Control Barring, ACB) detection according to the broadcast access control information to determine whether to allow access to the network.
在一些场景中,引入了降低能力(Reduced Capbility,RedCap)终端,用于对时延、可靠性、带宽、覆盖、吞吐量等性能要求较低的场景。此情况下,如何对此类终端设备进行接入控制是一项急需解决的问题。In some scenarios, Reduced Capbility (RedCap) terminals are introduced for use in scenarios with low performance requirements such as delay, reliability, bandwidth, coverage, and throughput. In this case, how to perform access control on such terminal devices is a problem that needs to be solved urgently.
发明内容Summary of the invention
本申请实施例提供了一种无线通信的方法、终端设备和网络设备,通过对降低能力终端配置特定接入标识,能够实现对降低能力终端的单独的接入控制,从而提升网络性能。The embodiments of the present application provide a wireless communication method, terminal equipment, and network equipment. By configuring a specific access identifier for the terminal with reduced capability, it is possible to realize individual access control for the terminal with reduced capability, thereby improving network performance.
第一方面,提供了一种无线通信的方法,该方法包括:终端设备接收网络设备广播的第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端。In a first aspect, a wireless communication method is provided, the method includes: a terminal device receives first information broadcast by a network device, the first information includes a first access control information set list, and the first access control The information set list includes N first access control information sets, and the first access control information sets are used for access control of a terminal device with a specific access identifier, where N is a positive integer, and the specific access The terminal equipment that enters the mark includes a terminal with reduced capability.
第二方面,提供了一种无线通信的方法,该方法包括:网络设备广播第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端。In a second aspect, a wireless communication method is provided. The method includes: a network device broadcasting first information, where the first information includes a first access control information set list, and the first access control information set list includes N first access control information sets, the first access control information sets are used for access control of terminal devices with a specific access identifier, where N is a positive integer, and the terminal with the specific access identifier Equipment includes reduced capacity terminals.
第三方面,提供了一种终端设备,用于执行上述第一方面或其各实现方式中的方法。In a third aspect, a terminal device is provided, which is used to execute the method in the above-mentioned first aspect or each of its implementation manners.
具体地,该终端设备包括用于执行上述第一方面或其各实现方式中的方法的功能模块。Specifically, the terminal device includes a functional module for executing the method in the foregoing first aspect or each of its implementation manners.
第四方面,提供了一种网络设备,用于执行上述第二方面或其各实现方式中的方法。In a fourth aspect, a network device is provided, which is used to execute the method in the second aspect or its implementation manners.
具体地,该网络设备包括用于执行上述第二方面或其各实现方式中的方法的功能模块。Specifically, the network device includes a functional module for executing the method in the foregoing second aspect or each of its implementation manners.
第五方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第一方面或其各实现方式中的方法。In a fifth aspect, a terminal device is provided, including a processor and a memory. The memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned first aspect or each of its implementation modes.
第六方面,提供了一种网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第二方面或其各实现方式中的方法。In a sixth aspect, a network device is provided, including a processor and a memory. The memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory, and execute the method in the second aspect or its implementation manners.
第七方面,提供了一种芯片,用于实现上述第一方面至第二方面中的任一方面或其各实现方式中的方法。具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行如上述第一方面至第二方面中的任一方面或其各实现方式中的方法。In a seventh aspect, a chip is provided for implementing any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof. Specifically, the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes any one of the above-mentioned first aspect to the second aspect or any of the implementations thereof method.
第八方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第一方面至第二方面中的任一方面或其各实现方式中的方法。In an eighth aspect, a computer-readable storage medium is provided for storing a computer program that enables a computer to execute any one of the first aspect to the second aspect or the method in each implementation manner thereof.
第九方面,提供了一种计算机程序产品,包括计算机程序指令,所述计算机程序指令使得计算机执行上述第一方面至第二方面中的任一方面或其各实现方式中的方法。In a ninth aspect, a computer program product is provided, which includes computer program instructions that cause a computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
第十方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第 二方面中的任一方面或其各实现方式中的方法。In a tenth aspect, a computer program is provided, which when running on a computer, causes the computer to execute any one of the above-mentioned first to second aspects or the method in each of its implementation modes.
本申请实施例通过对降低能力终端配置特定接入标识,进一步配配置适用于所述特定接入标识的终端设备的接入控制信息,从而具有所述特定接入标识的终端设备可以基于相应的所述接入控制信息进行接入控制,有利于实现对不同性能需求的终端设备的接入控制的差异化管理,提升网络性能,进一步提升用户体验。In the embodiment of the present application, a specific access identifier is configured for the terminal with reduced capability, and the access control information applicable to the terminal device of the specific access identifier is further configured, so that the terminal device with the specific access identifier can be based on the corresponding Performing access control on the access control information is beneficial to realize differentiated management of access control for terminal devices with different performance requirements, improve network performance, and further enhance user experience.
附图说明Description of the drawings
图1是本申请实施例提供的一种通信系统架构的示意性图。Fig. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
图2是根据本申请实施例提供的一种无线通信的方法的示意性交互图。Fig. 2 is a schematic interaction diagram of a wireless communication method provided according to an embodiment of the present application.
图3是根据本申请实施例提供的一种终端设备的示意性框图。Fig. 3 is a schematic block diagram of a terminal device according to an embodiment of the present application.
图4是根据本申请实施例提供的一种网络设备的示意性框图。Fig. 4 is a schematic block diagram of a network device provided according to an embodiment of the present application.
图5是根据本申请实施例提供的一种通信设备的示意性框图。Fig. 5 is a schematic block diagram of a communication device according to an embodiment of the present application.
图6是根据本申请实施例提供的一种芯片的示意性框图。Fig. 6 is a schematic block diagram of a chip provided according to an embodiment of the present application.
图7是根据本申请实施例提供的一种通信系统的示意性框图。Fig. 7 is a schematic block diagram of a communication system provided according to an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。针对本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of the embodiments. Regarding the embodiments in this application, all other embodiments obtained by a person of ordinary skill in the art without creative work shall fall within the protection scope of this application.
本申请实施例可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新空口(New Radio,NR)系统、NR系统的演进系统、非授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、下一代通信系统或其他通信系统等。The embodiments of this application can be applied to various communication systems, such as: Global System of Mobile Communication (GSM) system, Code Division Multiple Access (CDMA) system, Wideband Code Division Multiple Access (Wideband Code) Division Multiple Access (WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, Advanced Long Term Evolution (LTE-A) system, New Air Interface (New Radio, NR) system, NR system evolution system, LTE (LTE-based access to unlicensed spectrum, LTE-U) system on unlicensed spectrum, NR (NR-based access to unlicensed spectrum, on unlicensed spectrum, NR-U) system, Universal Mobile Telecommunication System (UMTS), Wireless Local Area Networks (WLAN), Wireless Fidelity (WiFi), next-generation communication systems or other communication systems, etc.
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),以及车辆间(Vehicle to Vehicle,V2V)通信等,本申请实施例也可以应用于这些通信系统。Generally speaking, traditional communication systems support a limited number of connections and are easy to implement. However, with the development of communication technology, mobile communication systems will not only support traditional communication, but also support, for example, Device to Device (Device to Device, D2D) communication, machine to machine (Machine to Machine, M2M) communication, machine type communication (MTC), and vehicle to vehicle (V2V) communication, etc. The embodiments of this application can also be applied to these communications system.
可选地,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。Optionally, the communication system in the embodiments of the present application can be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, can also be applied to a dual connectivity (Dual Connectivity, DC) scenario, and can also be applied to a standalone (SA) deployment. Network scene.
本申请实施例对应用的频谱并不限定。例如,本申请实施例可以应用于授权频谱,也可以应用于非授权频谱,或者说共享频谱。The embodiment of the application does not limit the applied frequency spectrum. For example, the embodiments of this application may be applied to licensed spectrum, or unlicensed spectrum, or shared spectrum.
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端设备120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。Exemplarily, the communication system 100 applied in the embodiment of the present application is shown in FIG. 1. The communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or called a communication terminal or a terminal). The network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located in the coverage area.
图1示例性地示出了一个网络设备和两个终端设备,可选地,该通信系统100可以包括多个网络 设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。Figure 1 exemplarily shows one network device and two terminal devices. Optionally, the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。Optionally, the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端设备120,网络设备110和终端设备120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。It should be understood that a device with a communication function in the network/system in the embodiment of the present application may be referred to as a communication device. Taking the communication system 100 shown in FIG. 1 as an example, the communication device may include a network device 110 and a terminal device 120 with communication functions, and the network device 110 and the terminal device 120 may be the specific devices described above, which will not be repeated here. The communication device may also include other devices in the communication system 100, such as network controllers, mobility management entities, and other network entities, which are not limited in the embodiment of the present application.
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the terms "system" and "network" in this article are often used interchangeably in this article. The term "and/or" in this article is only an association relationship that describes the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone B these three situations. In addition, the character "/" in this text generally indicates that the associated objects before and after are in an "or" relationship.
应理解,在本申请实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。It should be understood that the "indication" mentioned in the embodiments of the present application may be a direct indication, an indirect indication, or an association relationship. For example, A indicates B, which can mean that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association between A and B relation.
在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。In the description of the embodiments of the present application, the term "correspondence" can mean that there is a direct correspondence or an indirect correspondence between the two, or that there is an association relationship between the two, or indicating and being instructed, configuring and being Configuration and other relationships.
本申请实施例结合终端设备和网络设备描述了各个实施例,其中:终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。终端设备可以是WLAN中的站点(STATION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备以及下一代通信系统,例如,NR网络中的终端设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端设备等。The embodiments of this application describe various embodiments in combination with terminal equipment and network equipment. The terminal equipment may also be referred to as User Equipment (UE), access terminal, user unit, user station, mobile station, mobile station, and remote station. Station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc. The terminal device can be a station (ST) in a WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, and a personal digital processing unit. (Personal Digital Assistant, PDA) devices, handheld devices with wireless communication capabilities, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, and next-generation communication systems, such as terminal devices in the NR network or Terminal equipment in the public land mobile network (PLMN) network that will evolve in the future.
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。As an example and not a limitation, in the embodiment of the present application, the terminal device may also be a wearable device. Wearable devices can also be called wearable smart devices. It is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes. A wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction. In a broad sense, wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which need to cooperate with other devices such as smart phones. Use, such as all kinds of smart bracelets and smart jewelry for physical sign monitoring.
网络设备可以是用于与移动设备通信的设备,网络设备可以是WLAN中的接入点(Access Point,AP),GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA中的基站(NodeB,NB),还可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的网络设备或者基站(gNB)或者未来演进的PLMN网络中的网络设备等。A network device can be a device used to communicate with mobile devices. The network device can be an access point (AP) in WLAN, a base station (BTS) in GSM or CDMA, or a device in WCDMA. A base station (NodeB, NB) can also be an Evolutional Node B (eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and a network device or base station in the NR network ( gNB) or network equipment in the future evolved PLMN network.
在本申请实施例中,网络设备可以具有移动特性,例如,网络设备可以为移动的设备。可选地,网络设备可以为卫星、气球站。例如,卫星可以为低地球轨道(low earth orbit,LEO)卫星、中地球轨道(medium earth orbit,MEO)卫星、地球同步轨道(geostationary earth orbit,GEO)卫星、高椭圆轨道(High Elliptical Orbit,HEO)卫星等。可选地,网络设备还可以为设置在陆地、水域等位置 的基站。In the embodiment of the present application, the network device may have mobile characteristics, for example, the network device may be a mobile device. Optionally, the network equipment may be a satellite or a balloon station. For example, the satellite may be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geostationary earth orbit (GEO) satellite, or a high elliptical orbit (High Elliptical Orbit, HEO). ) Satellite etc. Optionally, the network device may also be a base station installed in a location such as land or water.
在本申请实施例中,网络设备为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。In the embodiment of the present application, the network equipment provides services for the cell, and the terminal equipment communicates with the network equipment through the transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell, and the cell may be a network equipment (for example, The cell corresponding to the base station. The cell can belong to a macro base station or a base station corresponding to a small cell. The small cell here can include: Metro cell, Micro cell, Pico Cells, Femto cells, etc. These small cells have the characteristics of small coverage and low transmit power, and are suitable for providing high-rate data transmission services.
在版本17(R17)中,引入了RedCap终端,或称RedCap设备,用于性能要求较低的场景。例如但不限于如下场景:In version 17 (R17), RedCap terminals, or RedCap devices, are introduced for scenarios with lower performance requirements. For example, but not limited to the following scenarios:
场景1:工业无线传感器(Industrial Wireless Sensors),与高可靠低时延通信(Ultra-Reliable and Low Latency Communication,URLLC)终端相比,工业无线传感器具有相对低要求的时延和可靠性。并且,设备成本和功耗也比URLLC终端和增强移动超宽带(Enhance Mobile Broadband,eMBB)终端低。Scenario 1: Industrial Wireless Sensors. Compared with Ultra-Reliable and Low Latency Communication (URLLC) terminals, industrial wireless sensors have relatively low latency and reliability. In addition, the equipment cost and power consumption are also lower than URLLC terminals and Enhanced Mobile Broadband (eMBB) terminals.
场景2:视频监控(Video surveillance),可以用在智慧城市、工业过程等场景下的视频监控。在智能城市场景中,设备主要用于数据收集和处理,从而能够实现更有效的进行城市资源的监测和控制,给城市居民提供更有效的服务。Scenario 2: Video surveillance, which can be used for video surveillance in scenarios such as smart cities and industrial processes. In the smart city scenario, the equipment is mainly used for data collection and processing, which can realize more effective monitoring and control of urban resources, and provide more effective services to urban residents.
场景3:可穿戴设备(Wearables)。例如包括但不限于智能手表,戒指,电子健康设备、医疗监测设备等。这些设备的尺寸通常较小。Scenario 3: Wearables. Examples include but are not limited to smart watches, rings, electronic health equipment, medical monitoring equipment, etc. The size of these devices is usually small.
因此,上述场景可以具有如下共性需求:Therefore, the above scenarios can have the following common requirements:
1、设备成本,和版本15/16(R15/16)的eMBB终端相比,对设备成本和复杂度的要求更低。1. Equipment cost. Compared with version 15/16 (R15/16) eMBB terminals, the requirements for equipment cost and complexity are lower.
在一种可能实现中,可以降低设备的带宽和接收天线。In one possible implementation, the bandwidth of the device and the receiving antenna can be reduced.
2、设备尺寸,要求较小的设备尺寸。2. Equipment size, smaller equipment size is required.
3、覆盖,要求达到与R15/16的eMBB终端相当或相近的覆盖。此情况下,如果降低接收天线,降低带宽,降低功率等级或者其他降低UE复杂度导致覆盖损失,则需要进行相应的补偿。3. Coverage, which requires coverage equivalent to or similar to that of R15/16 eMBB terminals. In this case, if the receiving antenna is lowered, the bandwidth is lowered, the power level is lowered, or the complexity of the UE is reduced to cause coverage loss, corresponding compensation is required.
对于上述三种场景,作为示例而非限定,对性能的要求如下:For the above three scenarios, as an example and not a limitation, the performance requirements are as follows:
对于场景1:可靠性要求为99.99%,端到端时延为100ms,Bit速率需求为2Mbps,设备静止不动,电池寿命是几年。可选地,对于安全相关的传感器,时延需求可以为5-10ms。For scenario 1: The reliability requirement is 99.99%, the end-to-end delay is 100ms, the bit rate requirement is 2Mbps, the device is stationary, and the battery life is several years. Optionally, for safety-related sensors, the delay requirement can be 5-10 ms.
对于场景2:Bit速率需求为2-4Mbps,时延需求小于500ms,可靠性需求为99.-99.9%。可选地,由于上行业务量比较大,对于高端视频速率要求为2-4Mbps。For scenario 2: The bit rate requirement is 2-4Mbps, the delay requirement is less than 500ms, and the reliability requirement is 99.-99.9%. Optionally, since the uplink traffic is relatively large, the high-end video rate is required to be 2-4 Mbps.
对于场景3:可以参考LTE系统中接入类别4的要求,速率要求为150Mbps/50Mbps。For scenario 3: You can refer to the requirements of access category 4 in the LTE system, and the rate requirement is 150Mbps/50Mbps.
为了进行网络侧的负荷控制,引入了UAC。具体地,网络设备可以广播广播与接入类别(Access Caegory)和接入标识(Access Identify)相关的接入控制信息,进一步地,则终端设备根据广播的接入控制信息和自身的接入类别和接入标识执行ACB检测,以确定是否允许接入网络。In order to perform load control on the network side, UAC is introduced. Specifically, the network device can broadcast the access control information related to the access category (Access Caegory) and the access identifier (Access Identify). Further, the terminal device can broadcast the access control information according to the broadcast access control information and its own access category. Perform ACB detection with the access identifier to determine whether to allow access to the network.
在一些情况下,接入标识和接入类别的定义如表1和表2所示。In some cases, the definitions of access identifier and access category are shown in Table 1 and Table 2.
表1Table 1
Figure PCTCN2020096871-appb-000001
Figure PCTCN2020096871-appb-000001
Figure PCTCN2020096871-appb-000002
Figure PCTCN2020096871-appb-000002
表2Table 2
Figure PCTCN2020096871-appb-000003
Figure PCTCN2020096871-appb-000003
Figure PCTCN2020096871-appb-000004
Figure PCTCN2020096871-appb-000004
应理解,表1和表2所示例的接入标识和接入类别的配置仅为示例,随着标准的发展,业务的多样化,场景的多元化等因素的影响,也可以对上述示例进行修改,增加或删除,本申请对此不作限定。It should be understood that the configuration of access identifiers and access categories illustrated in Table 1 and Table 2 are only examples. With the development of standards, the diversification of services, the diversification of scenarios and other factors, the above examples can also be performed. Modifications, additions or deletions are not limited in this application.
在引入RedCap终端的情况下,由于RedCap终端对性能的要求更低,此情况下,如果通过广播消息无差别限制终端设备接入网络,会降低网络性能,影响用户体验。In the case of the introduction of the RedCap terminal, since the RedCap terminal has lower performance requirements, in this case, if the terminal device is indiscriminately restricted from accessing the network through a broadcast message, the network performance will be reduced and the user experience will be affected.
有鉴于此,本申请提出一种接入控制方案,可以为RedCap终端配置特定的接入标识,进一步通过广播消息为RedCap终端配置相应的接入控制信息,从而能够实现对RedCap终端独立的接入控制,换言之,可以实现对不同性能需求的终端的差异化接入控制,从而能够提升网络性能,进而提升用户体验。In view of this, this application proposes an access control scheme, which can configure a specific access identifier for the RedCap terminal, and further configure corresponding access control information for the RedCap terminal through a broadcast message, thereby enabling independent access to the RedCap terminal Control, in other words, can achieve differentiated access control for terminals with different performance requirements, thereby improving network performance and thus improving user experience.
图2是根据本申请实施例的无线通信的方法200的示意性交互图,如图2所示,该方法200可以包括但不限于如下内容:FIG. 2 is a schematic interaction diagram of a wireless communication method 200 according to an embodiment of the present application. As shown in FIG. 2, the method 200 may include but is not limited to the following content:
S210,网络设备广播第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端;S210. The network device broadcasts first information, where the first information includes a first access control information set list, the first access control information set list includes N first access control information sets, and the first access The access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability;
S220,终端设备接收所述第一信息。S220: The terminal device receives the first information.
可选地,在一些实施例中,所述第一信息可以承载在主信息块(Master Information Block,MIB)或者系统信息块(System Information Block,SIB)信息中,例如,可以承载在SIB1中。Optionally, in some embodiments, the first information may be carried in Master Information Block (MIB) or System Information Block (System Information Block, SIB) information, for example, may be carried in SIB1.
在另一些实施例中,所述第一信息也可以承载在其他消息或信令中,例如无线资源控制(Radio Resource Control,RRC)信令、媒体接入控制单元(Media Access Control Control Element,MAC CE)等,以下,以通过SIB1承载所述第一信息为例进行说明,但本申请并不限于此。In other embodiments, the first information may also be carried in other messages or signaling, such as Radio Resource Control (RRC) signaling, Media Access Control Control Element (MAC) CE), etc., in the following, the first information is carried through SIB1 as an example for description, but the present application is not limited to this.
在一些实施例中,所述特定接入标识的终端设备可以包括需要差异化(或者说,独立)接入控制的终端,例如,降低能力终端,或者增强能力终端,所述增强能力终端例如可以为相对于普通终端对性能要求更高的终端,或者适用于其他新增场景或新增业务的终端等,以下,以所述特定接入标识终端设备为降低能力终端为例进行说明,但本申请并不限于此。In some embodiments, the terminal device with the specific access identifier may include a terminal that requires differentiated (or independent) access control, for example, a terminal with reduced capability, or a terminal with enhanced capability. The terminal with enhanced capability may, for example, For terminals with higher performance requirements compared to ordinary terminals, or terminals suitable for other new scenarios or new services, the following takes the specific access identification terminal device as a terminal with reduced capabilities as an example. The application is not limited to this.
在本申请实施例中,所述降低能力终端是相对于普通终端而言的终端,所述网络设备可以对所述普通终端进行统一接入控制(UAC),例如,所述普通终端可以为表1中的接入标识为1,2,11,12,13,14,15的终端。相对于所述普通终端而言,所述降低能力终端对性能的要求更低,一部分网路可能不为这类终端提供服务,因此,可以对其进行差异化接入控制,以提升网络性能。In the embodiment of the present application, the reduced-capacity terminal is a terminal relative to a normal terminal, and the network device may perform unified access control (UAC) on the normal terminal. For example, the normal terminal may be a table Terminals whose access identifiers in 1 are 1, 2, 11, 12, 13, 14, and 15. Compared with the ordinary terminals, the reduced-capacity terminals have lower performance requirements, and some networks may not provide services for such terminals. Therefore, differentiated access control can be performed on them to improve network performance.
在一些实施例中,所述降低能力终端可以包括前述三种场景中的终端,或者也可以包括机器类通 信(machine type of communication,MTC)或者演进的机器类通信(evolved machine type of communication,eMTC),窄带物联网(Narrow Band Internet of Things,NB-IoT)中的终端等,这些技术对照的终端极大地降低了终端的硬件复杂度,数据吞吐量和处理速度。也适用于一些较低要求的智能家居,智慧城市,智慧工厂、远程监测、智慧交通应用场景。本申请并不限于此。In some embodiments, the reduced capability terminal may include the terminals in the foregoing three scenarios, or may also include machine type of communication (MTC) or evolved machine type of communication (eMTC). ), terminals in the Narrow Band Internet of Things (NB-IoT), etc. The terminals compared with these technologies greatly reduce the hardware complexity, data throughput and processing speed of the terminal. It is also suitable for some low-demand smart homes, smart cities, smart factories, remote monitoring, and smart transportation application scenarios. This application is not limited to this.
在一些实施例中,所述增强能力终端例如可以为对性能需求较高的终端,例如,应用于关键通信技术中的终端,该类型的终端例如可以为NR高可靠低时延通信(Ultra-Reliable and Low Latency Communication,URLLC)终端,应用于一些需要具有极低的时延以及极高的通讯可靠性的物联网场景,如智能安防中的视频监控、低时延工业实施控制、智能驾驶等,本申请并不限于此。In some embodiments, the enhanced capability terminal may be, for example, a terminal with higher performance requirements, for example, a terminal applied to a key communication technology. This type of terminal may be, for example, NR high-reliability low-latency communication (Ultra- Reliable and Low Latency Communication (URLLC) terminals, used in some IoT scenarios that require extremely low latency and extremely high communication reliability, such as video surveillance in smart security, low latency industrial implementation control, smart driving, etc. , This application is not limited to this.
可选地,在一些实施例中,所述特定接入标识可以通过接入标识的预留值表示,采用此方式,不需要增加接入标识所占的比特数。例如,如表1中所示,接入标识3-10为预留值,因此,可以选择其中的一个或多个值表示所述特定接入标识。Optionally, in some embodiments, the specific access identifier may be represented by a reserved value of the access identifier. In this manner, there is no need to increase the number of bits occupied by the access identifier. For example, as shown in Table 1, the access identifiers 3-10 are reserved values. Therefore, one or more of the values can be selected to represent the specific access identifier.
在另一些实施例中,所述特定接入标识也可以采用其他与现有的接入标识不相冲突的取值表示,本申请并不限于此。例如,可以0-15之外的其他数值表示,例如,16,20等,此情况下,需要增加接入标识所占的比特数。In other embodiments, the specific access identifier may also be expressed by other values that do not conflict with the existing access identifier, and the present application is not limited to this. For example, it can be expressed by other values than 0-15, such as 16, 20, etc. In this case, the number of bits occupied by the access identifier needs to be increased.
可选地,在一些实施例中,所述特定接入标识的数量为一个,即所有的降低能力终端均采用同一特定接入标识,例如采用接入标识预留值3-10中的任意一个值作为所述特定接入标识。Optionally, in some embodiments, the number of the specific access identifier is one, that is, all terminals with reduced capabilities use the same specific access identifier, for example, any one of the reserved access identifier values 3-10 The value is used as the specific access identifier.
可选地,在另一些实施例中,所述特定接入标识的数量为多个,多个所述特定接入标识可以对应多种类型的降低能力终端,每个所述特定接入标识对应一种类型的降低能力终端。Optionally, in other embodiments, the number of the specific access identifiers is multiple, and the multiple specific access identifiers may correspond to multiple types of reduced-capacity terminals, and each specific access identifier corresponds to A type of reduced capacity terminal.
可选地,所述多种类型的降低能力终端可以是基于不同的性能需求或者基于不同的场景划分的,本申请对此不作限定。通过为不同类型的降低能力终端分别配置对应的接入标识,进一步分别配置对应的接入控制信息,能够实现对降低能力终端的更加精细化的接入控制。Optionally, the multiple types of reduced-capability terminals may be divided based on different performance requirements or based on different scenarios, which is not limited in this application. By configuring corresponding access identifiers for different types of terminals with reduced capabilities, and further configuring corresponding access control information respectively, more refined access control for terminals with reduced capabilities can be achieved.
作为一个示例,所述多种类型的降低能力终端包括三种类型的降低能力终端,分别对应前文所述的三种场景,或者对应三种等级的性能需求等。As an example, the multiple types of reduced-capacity terminals include three types of reduced-capacity terminals, respectively corresponding to the three scenarios described above, or corresponding to three levels of performance requirements, and so on.
此情况下,所述多个接入标识可以包括三个接入标识,分别指示所述三种类型的降低能力终端。作为一个示例,所述三个接入标识可以包括接入标识预留值3-10中的任意三个值,例如,3,4和5。In this case, the multiple access identifiers may include three access identifiers, respectively indicating the three types of reduced-capability terminals. As an example, the three access identifiers may include any three of the access identifier reserved values 3-10, for example, 3, 4, and 5.
在本申请实施例中,所述网络设备可以广播所述第一信息,所述第一信息可以包括用于特定接入标识的终端设备的接入控制的接入控制信息,即第一接入控制信息集列表,为便于区分,记为UAC-BarringInfoSetList-v17xy。可选地,所述网络设备也可以广播用于非特定接入标识的终端设备的接入控制的接入控制信息,即第二接入控制信息集列表,为便于区分,记为UAC-BarringInfoSetList。In the embodiment of the present application, the network device may broadcast the first information, and the first information may include access control information used for access control of a terminal device with a specific access identifier, that is, the first access The control information set list is marked as UAC-BarringInfoSetList-v17xy for easy distinction. Optionally, the network device may also broadcast access control information used for access control of terminal devices with no specific access identification, that is, a second access control information set list, which is denoted as UAC-BarringInfoSetList for easy distinction. .
应理解,若存在更多种需要单独接入控制的终端设备,所述网络设备还可以广播更多个接入控制信息集列表,或者若非特定接入标识的终端设备也需要更加精细化的接入控制,所述网络设备也可以为其配置多个第二接入控制信息集列表等,本申请并不限于此。It should be understood that if there are more types of terminal devices that require separate access control, the network device may also broadcast more lists of access control information sets, or if terminal devices with no specific access identification also require more refined access For access control, the network device may also configure multiple second access control information set lists, etc., and the application is not limited to this.
在一些实施例中,所述第一接入控制信息集列表包括N个第一接入控制信息集,为便于区分,记为UAC-BarringInfoSet-v17xy,其中,每个第一接入控制信息集包括一组接入控制参数,所述一组接入控制参数用于确定所述特定接入标识的终端设备是否被允许接入。In some embodiments, the first access control information set list includes N first access control information sets, which are denoted as UAC-BarringInfoSet-v17xy for easy distinction, where each first access control information set It includes a set of access control parameters, and the set of access control parameters is used to determine whether the terminal device with the specific access identifier is allowed to access.
也就是说,所述第一接入控制信息集列表为适用于所述特定接入标识的终端设备的接入控制信息,通过为所述特定接入标识的终端设备配置专门的接入控制信息能够实现对此类终端设备的单独接入控制。例如可以为此类终端设备配置较高的限制概率,较长的限制时长等,从而能够优先保证普通终端或对性能要求更高的终端的接入需求,提升网络性能。That is, the first access control information set list is the access control information applicable to the terminal equipment of the specific access identifier, and the terminal equipment of the specific access identifier is configured with special access control information It can realize individual access control to such terminal equipment. For example, a higher restriction probability, a longer restriction duration, etc. can be configured for such terminal devices, so that the access requirements of ordinary terminals or terminals with higher performance requirements can be guaranteed first, and network performance can be improved.
可选地,所述N个第一接入控制信息集可以适用于不同的情况,例如,不同的接入类别,或不同 的PLMN等。也就是说,网络设备可以给不同的接入类别或PLMN等配置相应的接入控制信息集,有利于满足不同情况的需求。Optionally, the N first access control information sets may be applicable to different situations, for example, different access categories, or different PLMNs. In other words, network equipment can configure corresponding access control information sets for different access categories or PLMNs, which is beneficial to meet the needs of different situations.
在一些实施例中,所述第一接入控制信息集包括第一指示信息(为便于区分,记为uac-BarringForAccessIdentity-v17xy),所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试(Access Attempt)的控制信息。作为一个示例,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试是否被限制。In some embodiments, the first access control information set includes first indication information (for easy distinction, it is recorded as uac-BarringForAccessIdentity-v17xy), and the first indication information is used to indicate the status of the specific access identifier The control information of the access attempt of the terminal device. As an example, the first indication information is used to indicate whether the access attempt of the terminal device of the specific access identifier is restricted.
可选地,所述第一接入控制信息集还包括限制因子(为便于区分,记为uac-BarringFactor-v17xy)和/或限制时长(为便于区分,记为uac-BarringTime-v17xy),所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。所述限制因子用于指示被限制的概率,或者被允许的概率等。所述限制时长为终端设备被限制接入的时长。Optionally, the first access control information set further includes a restriction factor (denoted as uac-BarringFactor-v17xy for ease of distinction) and/or restriction duration (denoted as uac-BarringTime-v17xy for ease of distinction), so The first indication information is used to indicate whether the access attempt of the terminal device with the specific access identifier is allowed or restricted by the restriction factor. The restriction factor is used to indicate the probability of being restricted, or the probability of being allowed, and so on. The restricted duration is the duration during which the terminal device is restricted from accessing.
在一些实施例中,所述第一指示信息可以采用比特图的方式指示所述特定接入标识的终端设备的接入尝试是否被允许,或者是否被限制,或者,是被允许还是受所述限制因子限制。In some embodiments, the first indication information may use a bitmap to indicate whether the access attempt of the terminal device with the specific access identifier is allowed or restricted, or is allowed or subject to the Restriction factor restriction.
作为一个示例,所述特定接入标识的数量为一个,此情况下,所述第一指示信息包括一个比特,所述一个比特的取值用于指示一个所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。As an example, the number of the specific access identifier is one. In this case, the first indication information includes one bit, and the value of the one bit is used to indicate the status of a terminal device of the specific access identifier. Whether the access attempt is allowed or restricted by the restriction factor.
作为另一个示例,所述特定接入标识的数量为多个,此情况下,所述第一指示信息包括多个比特,每个比特对应一个所述特定接入标识,所述每个比特的取值用于指示对应的特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。As another example, there are multiple specific access identifiers. In this case, the first indication information includes multiple bits, and each bit corresponds to one specific access identifier. The value is used to indicate whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
例如,在每个比特的取值为0时表示接入尝试被允许,取值为1表示被限制,需要进一步结合限制因子判断。本申请对于具体的判断方式不作限定。作为一种实现方式,可以产生一个大于等于0并且小于1的随机数,如果该随机数小于限制因子,则表示允许接入,否则表示禁止接入。For example, when the value of each bit is 0, it means that the access attempt is allowed, and the value of 1 is that it is restricted, and it needs to be further combined with restriction factor judgment. This application does not limit the specific judgment method. As an implementation manner, a random number greater than or equal to 0 and less than 1 can be generated. If the random number is less than the restriction factor, it means that access is allowed, otherwise it means that access is prohibited.
应理解,上述操作是在第一定时器(或称T309)和第二定时器(或称T302)定时器均没有运行,并且终端设备的接入类型不是0的情况下执行的。其中,所述第一定时器是接入禁止定时器,在该第一定时器运行时,终端设备不能发起接入尝试,该第一定时器可以是每个接入类型配置的,即每个接入类型可以配置对应的第一定时器。第二定时器是在终端设备被网络拒绝接入时启动的,在该第二定时器运行时,终端设备不允许再发起接入尝试。It should be understood that the foregoing operation is performed when neither the first timer (or T309) nor the second timer (or T302) timer is running, and the access type of the terminal device is not 0. Wherein, the first timer is an access prohibition timer. When the first timer is running, the terminal device cannot initiate an access attempt. The first timer may be configured for each access type, that is, each The access type can be configured with the corresponding first timer. The second timer is started when the terminal device is denied access by the network. When the second timer is running, the terminal device is not allowed to initiate an access attempt.
可选地,在判断接入尝试被禁止接入时,所述终端设备还可以产生一个大于等于0并且小于1的随机数(记为rand),启动所述第一定时器,并将所述第一定时器的定时设置为(0.7+0.6*rand)*限制因子,在第一定时器超时后,再发起接入尝试。Optionally, when judging that the access attempt is barred from access, the terminal device may also generate a random number greater than or equal to 0 and less than 1 (denoted as rand), start the first timer, and set the The timing of the first timer is set to (0.7+0.6*rand)*limiting factor, and an access attempt is initiated after the first timer expires.
举例说明,假设所述特定接入标识的数量为三个,分别为3、4、5,则所述第一指示信息可以包括三个比特,分别指示接入标识3、4、5的终端设备的接入尝试是否被限制。若第一指示信息为011,限制因子为0.8,所述终端设备的接入标识为5,所述终端设备确定接入尝试被限制,则生成一个随机值,当随机数大于0.8时,接入尝试被禁止,当随机数小于等于0.8时,所述终端设备的接入尝试被允许。For example, assuming that the number of the specific access identifiers is three, namely 3, 4, and 5, the first indication information may include three bits to indicate the terminal devices of the access identifiers 3, 4, and 5, respectively. Whether the access attempts are restricted. If the first indication information is 011, the restriction factor is 0.8, and the access identifier of the terminal device is 5, the terminal device determines that the access attempt is restricted, and then generates a random value. When the random number is greater than 0.8, access Attempts are forbidden, and when the random number is less than or equal to 0.8, the access attempt of the terminal device is allowed.
可选地,所述第二接入控制信息集列表中的所述第二接入控制信息集的内容可以参考所述第一接入控制信息集的内容,区别在于对应不同接入标识的终端设备,为了简洁,这里不再赘述。Optionally, the content of the second access control information set in the second access control information set list may refer to the content of the first access control information set, and the difference lies in the terminals corresponding to different access identifiers. The equipment, for the sake of brevity, will not be repeated here.
可选地,在一些实施例中,所述第一信息还包括第一接入控制配置列表(记为UAC-BarringPerCatList)和/或第二接入控制配置列表(记为UAC-BarringPerPLMN-List)。所述第一接入控制配置列表用于指示多个接入类别中的每个接入类别对应的接入控制信息集,所述第二接入控制配置列表用于指示多个公共陆地移动网络PLMN中的每个PLMN对应的接入控制信息集。也就是 说,可以是每个接入类别配置相应的接入控制信息集,或者也可以是每个PLMN配置相应的接入控制信息集。Optionally, in some embodiments, the first information further includes a first access control configuration list (denoted as UAC-BarringPerCatList) and/or a second access control configuration list (denoted as UAC-BarringPerPLMN-List) . The first access control configuration list is used to indicate the access control information set corresponding to each access category in the multiple access categories, and the second access control configuration list is used to indicate multiple public land mobile networks The access control information set corresponding to each PLMN in the PLMN. In other words, each access category can be configured with a corresponding access control information set, or each PLMN can be configured with a corresponding access control information set.
在一些实施例中,所述第一接入控制配置列表包括多个第一接入控制配置(记为UAC-BarringPerCat),每个第一接入控制配置对应所述多个接入类别中的一个接入类别,每个第一接入控制配置包括至少一个接入控制信息集索引。In some embodiments, the first access control configuration list includes multiple first access control configurations (denoted as UAC-BarringPerCat), and each first access control configuration corresponds to one of the multiple access categories For one access category, each first access control configuration includes at least one access control information set index.
在一些实施例中,所述第二接入控制配置列表包括多个第二接入控制配置(记为UAC-BarringPerPLMN),每个第二接入控制配置对应所述多个PLMN中的一个PLMN,每个第二接入控制配置包括至少一个接入控制信息集索引。In some embodiments, the second access control configuration list includes multiple second access control configurations (denoted as UAC-BarringPerPLMN), and each second access control configuration corresponds to one PLMN of the multiple PLMNs , Each second access control configuration includes at least one access control information set index.
以下,以根据所述第一接入控制配置列表确定终端设备的目标接入控制信息为例进行说明,根据所述第二接入控制配置列表,确定终端设备的目标接入控制信息的方式类似,这里不再赘述。Hereinafter, the description will be given by taking the determination of the target access control information of the terminal device according to the first access control configuration list as an example, and the manner of determining the target access control information of the terminal device according to the second access control configuration list is similar , I won’t repeat it here.
具体地,所述终端设备可以根据第一接入控制配置列表,结合所述终端设备的接入标识和接入类别,确定在所述第一接入控制信息集列表还是第二接入控制信息集列表中确定目标接入控制信息。Specifically, the terminal device may determine whether it is in the first access control information set list or the second access control information list according to the first access control configuration list in combination with the access identifier and the access category of the terminal device. The target access control information is determined in the set list.
情况1:所述终端设备的接入标识是所述特定接入标识,即所述终端设备为降低能力终端。Case 1: The access identifier of the terminal device is the specific access identifier, that is, the terminal device is a reduced-capacity terminal.
此情况下,所述终端设备可以在第一接入控制信息集列表中查找目标接入控制信息集。In this case, the terminal device may search for the target access control information set in the first access control information set list.
具体地,所述终端设备可以在所述第一接入控制配置列表中确定所述终端设备的接入类别对应的第一接入控制配置为目标接入控制配置,进一步可以根据所述目标接入控制配置包括的接入控制信息集索引,查找所述第一接入控制信息集列表中的N个第一接入控制信息集中所述接入控制信息集索引对应的接入控制信息集,将其确定为目标接入控制信息集。Specifically, the terminal device may determine in the first access control configuration list that the first access control configuration corresponding to the access category of the terminal device is the target access control configuration, and further may be based on the target access control configuration. Access control information set index included in the control configuration, search for N access control information sets corresponding to the access control information set index in the first access control information set list in the first access control information set list, Determine it as the target access control information set.
进一步地,可以根据所述终端设备的接入标识在所述目标接入控制信息集中查找所述接入标识对应地接入控制信息(如上文所述地第一指示信息,限制因子,限制时长等参数),根据这些接入控制信息确定所述终端设备接入所述网络设备被允许还是受限制。具体判断方式参考前文的相关描述。Further, the access control information corresponding to the access identifier can be searched in the target access control information set according to the access identifier of the terminal device (the first indication information, restriction factor, restriction duration as described above) And other parameters), and determine whether the terminal device is allowed or restricted to access the network device according to the access control information. Refer to the previous description for the specific judgment method.
可选地,在一些实施例中,所述第一信息还可以包括接入类型1选择辅助信息,用于辅助判断是否对于接入类型1的接入尝试执行ACB检测。Optionally, in some embodiments, the first information may further include access type 1 selection auxiliary information, which is used to assist in determining whether to perform ACB detection for an access attempt of access type 1.
应理解,在本申请实施例中,所述第一信息中包括的上述信息可以是通过同一第一信息承载的,或者也可以是通过不同的第一信息承载的,本申请对此不作限定。例如,所述第一接入控制配置列表和所述第一接入控制配置列表可以与所述第一接入控制信息集列表通过同一第一信息承载,或者也可以通过不同的第一信息承载。It should be understood that, in the embodiment of the present application, the above-mentioned information included in the first information may be carried by the same first information, or may also be carried by different first information, which is not limited in this application. For example, the first access control configuration list and the first access control configuration list may be carried by the same first information as the first access control information set list, or may also be carried by different first information. .
作为一个示例,上述信息在SIB1中的格式如下:As an example, the format of the above information in SIB1 is as follows:
Figure PCTCN2020096871-appb-000005
Figure PCTCN2020096871-appb-000005
Figure PCTCN2020096871-appb-000006
Figure PCTCN2020096871-appb-000006
Figure PCTCN2020096871-appb-000007
Figure PCTCN2020096871-appb-000007
其中,所述SIB1-v17xy-IEs用于承载本申请实施例中的所述第一接入控制信息集列表,UAC-BarringInfoSetList-v17xy表示所述第一接入控制信息集列表,UAC-BarringInfoSet-v17xy表示第一接入控制信息集,uac-BarringFactor表示限制因子,uac-BarringTime表示限制时长,uac-BarringForAccessIdentity-v17xy表示所述第一指示信息,为K个比特的比特图,K为特定接入标识的个数。Wherein, the SIB1-v17xy-IEs are used to carry the first access control information set list in the embodiment of this application, UAC-BarringInfoSetList-v17xy represents the first access control information set list, UAC-BarringInfoSet- v17xy represents the first access control information set, uac-BarringFactor represents the barring factor, uac-BarringTime represents the barring duration, uac-BarringForAccessIdentity-v17xy represents the first indication information, it is a bitmap of K bits, and K is a specific access The number of identifiers.
可选地,在本申请实施例中,所述终端设备的接入标识可以是从所述终端设备的非接入层(Non-Access Stratum,NAS)层获取的。所述终端设备的接入类别可以是从终端设备的NAS层或接入层(Access Stratum,AS)层获取的。Optionally, in the embodiment of the present application, the access identifier of the terminal device may be obtained from the non-access stratum (NAS) layer of the terminal device. The access category of the terminal device may be obtained from the NAS layer or the access stratum (Access Stratum, AS) layer of the terminal device.
情况2:所述终端设备的接入标识不是所述特定接入标识,即所述终端设备不为降低能力终端。Case 2: The access identifier of the terminal device is not the specific access identifier, that is, the terminal device is not a reduced-capacity terminal.
此情况下,所述终端设备可以在第二接入控制信息集列表中查找目标接入控制信息集。具体实现方式和情况1类似,这里不再赘述。In this case, the terminal device may search for the target access control information set in the second access control information set list. The specific implementation is similar to case 1, and will not be repeated here.
因此,本申请实施例通过配置适用于特定接入标识的终端设备的接入控制信息,从而具有所述特 定接入标识的终端设备可以基于相应的所述接入控制信息进行接入控制,有利于实现对不同性能需求的终端设备的接入控制的差异化管理,提升网络性能,进一步提升用户体验。Therefore, in the embodiment of the present application, by configuring the access control information applicable to the terminal device with the specific access identifier, the terminal device with the specific access identifier can perform access control based on the corresponding access control information. It is helpful to realize differentiated management of access control for terminal devices with different performance requirements, improve network performance, and further enhance user experience.
上文结合图2,详细描述了本申请的方法实施例,下文结合图3至图7,详细描述本申请的装置实施例,应理解,装置实施例与方法实施例相互对应,类似的描述可以参照方法实施例。The method embodiment of the present application is described in detail above in conjunction with FIG. 2, and the device embodiment of the present application is described in detail below in conjunction with FIG. 3 to FIG. 7. It should be understood that the device embodiment and the method embodiment correspond to each other, and similar descriptions can be Refer to the method embodiment.
图3示出了根据本申请实施例的终端设备300的示意性框图。如图3所示,该终端设备300包括:FIG. 3 shows a schematic block diagram of a terminal device 300 according to an embodiment of the present application. As shown in FIG. 3, the terminal device 300 includes:
通信单元310,用于接收网络设备广播的第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端。The communication unit 310 is configured to receive first information broadcast by a network device, where the first information includes a first access control information set list, and the first access control information set list includes N first access control information sets The first access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability.
可选地,在一些实施例中,所述特定接入标识的数量为一个,所述降低能力终端均对应一个所述特定接入标识;或者Optionally, in some embodiments, the number of the specific access identifier is one, and each of the terminals with reduced capability corresponds to one specific access identifier; or
所述降低能力终端包括多种类型的终端,所述特定接入标识的数量为多个,每个所述特定接入标识用于指示所述多种类型中的一种。The reduced capability terminal includes multiple types of terminals, the number of the specific access identifiers is multiple, and each specific access identifier is used to indicate one of the multiple types.
可选地,在一些实施例中,所述多种类型的终端包括以下中的至少一种:Optionally, in some embodiments, the multiple types of terminals include at least one of the following:
工业无线传感器、用于视频监控的设备、可穿戴设备。Industrial wireless sensors, equipment for video surveillance, and wearable devices.
可选地,在一些实施例中,所述第一接入控制信息集包括第一指示信息,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试的控制信息。Optionally, in some embodiments, the first access control information set includes first indication information, and the first indication information is used to indicate control information of an access attempt of a terminal device of the specific access identifier .
可选地,在一些实施例中,所述第一接入控制信息集还包括限制因子和/或限制时长,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。Optionally, in some embodiments, the first access control information set further includes a restriction factor and/or restriction duration, and the first indication information is used to indicate the access of the terminal device with the specific access identifier Whether the attempt is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
可选地,在一些实施例中,所述特定接入标识的数量为一个,所述第一指示信息包括一个比特,所述一个比特的取值用于指示一个所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制;或者Optionally, in some embodiments, the number of the specific access identifier is one, the first indication information includes one bit, and the value of the one bit is used to indicate a terminal of the specific access identifier Whether the access attempt of the device is allowed or restricted by the restriction factor; or
所述特定接入标识的数量为多个,所述第一指示信息包括多个比特,每个比特对应多个所述特定接入标识中的一个,所述每个比特的取值用于指示对应的特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。The number of the specific access identifiers is multiple, the first indication information includes multiple bits, each bit corresponds to one of the multiple specific access identifiers, and the value of each bit is used to indicate Whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
可选地,在一些实施例中,所述第一信息还包括第一接入控制配置列表和/或第二接入控制配置列表,其中,所述第一接入控制配置列表用于指示多个接入类别中的每个接入类别对应的接入控制信息集,所述第二接入控制配置列表用于指示多个公共陆地移动网络PLMN中的每个PLMN对应的接入控制信息集。Optionally, in some embodiments, the first information further includes a first access control configuration list and/or a second access control configuration list, where the first access control configuration list is used to indicate multiple The access control information set corresponding to each access category in the two access categories, and the second access control configuration list is used to indicate the access control information set corresponding to each PLMN in the multiple public land mobile network PLMNs .
可选地,在一些实施例中,所述第一接入控制配置列表包括多个第一接入控制配置,每个第一接入控制配置对应所述多个接入类别中的一个接入类别,每个第一接入控制配置包括至少一个接入控制信息集索引;Optionally, in some embodiments, the first access control configuration list includes multiple first access control configurations, and each first access control configuration corresponds to one access in the multiple access categories. Category, each first access control configuration includes at least one access control information set index;
所述第二接入控制配置列表包括多个第二接入控制配置,每个第二接入控制配置对应所述多个PLMN中的一个PLMN,每个第二接入控制配置包括至少一个接入控制信息集索引。The second access control configuration list includes multiple second access control configurations, each second access control configuration corresponds to one PLMN of the multiple PLMNs, and each second access control configuration includes at least one access control configuration. Incoming control information set index.
可选地,在一些实施例中,所述N个第一接入控制信息集中的每个第一接入控制信息集对应一个接入控制信息集索引,所述终端设备300还包括:Optionally, in some embodiments, each first access control information set in the N first access control information sets corresponds to an access control information set index, and the terminal device 300 further includes:
处理单元320,用于若所述终端设备的接入标识是所述特定接入标识,在所述第一接入控制配置列表中确定所述终端设备的接入类别对应的第一接入控制配置为目标接入控制配置;The processing unit 320 is configured to, if the access identifier of the terminal device is the specific access identifier, determine the first access control corresponding to the access category of the terminal device in the first access control configuration list Configure as target access control configuration;
根据所述目标接入控制配置包括的接入控制信息集索引,确定所述N个第一接入控制信息集中的 目标接入控制信息集;Determine the target access control information set in the N first access control information sets according to the access control information set index included in the target access control configuration;
根据所述终端设备的接入标识和所述目标接入控制信息集,确定所述终端设备接入所述网络设备被允许还是受限制。According to the access identifier of the terminal device and the target access control information set, it is determined whether the terminal device is allowed or restricted to access the network device.
可选地,在一些实施例中,所述处理单元320具体用于:Optionally, in some embodiments, the processing unit 320 is specifically configured to:
根据所述终端设备的接入标识和所述目标接入控制信息集中的第一指示信息,确定所述所述终端设备接入所述网络设备被允许还是受限制,其中,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受限制。Determine whether the terminal device is allowed or restricted to access the network device according to the access identifier of the terminal device and the first indication information in the target access control information set, wherein the first indication The information is used to indicate whether the access attempt of the terminal device with the specific access identifier is allowed or restricted.
可选地,在一些实施例中,所述特定接入标识通过接入标识号的预留值表示。Optionally, in some embodiments, the specific access identifier is represented by a reserved value of the access identification number.
可选地,在一些实施例中,所述特定接入标识为接入标识号3至10中的取值。Optionally, in some embodiments, the specific access identifier is a value in the access identifier number 3-10.
可选地,在一些实施例中,所述第一信息为主信息块MIB信息或者系统信息块SIB信息。Optionally, in some embodiments, the first information is main information block MIB information or system information block SIB information.
可选地,在一些实施例中,所述第一信息还包括第二接入控制信息集列表,所述第二接入控制信息集列表包括M个第二接入控制信息集,所述第二接入控制信息集列表用于非所述特定接入标识的终端设备的接入控制,其中,所述M为正整数。Optionally, in some embodiments, the first information further includes a second access control information set list, and the second access control information set list includes M second access control information sets. 2. The list of access control information sets is used for access control of terminal devices other than the specific access identifier, where the M is a positive integer.
可选地,在一些实施例中,所述第二接入控制信息集包括第二指示信息,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试的控制信息。Optionally, in some embodiments, the second access control information set includes second indication information, and the second indication information is used to indicate control of an access attempt of a terminal device that is not the specific access identifier information.
可选地,在一些实施例中,所述第二接入控制信息集还包括限制因子和/或限制时长,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。Optionally, in some embodiments, the second access control information set further includes a restriction factor and/or restriction duration, and the second indication information is used to indicate the access of a terminal device that is not the specific access identifier. Whether the access attempt is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
可选地,在一些实施例中,上述通信单元可以是通信接口或收发器,或者是通信芯片或者片上系统的输入输出接口。上述处理单元可以是一个或多个处理器。Optionally, in some embodiments, the aforementioned communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system-on-chip. The aforementioned processing unit may be one or more processors.
应理解,根据本申请实施例的终端设备300可对应于本申请方法实施例中的终端设备,并且终端设备300中的各个单元的上述和其它操作和/或功能分别为了实现图2所示方法200中终端设备的相应流程,为了简洁,在此不再赘述。It should be understood that the terminal device 300 according to the embodiment of the present application may correspond to the terminal device in the method embodiment of the present application, and the above-mentioned and other operations and/or functions of each unit in the terminal device 300 are to implement the method shown in FIG. 2 respectively. For the sake of brevity, the corresponding process of the terminal equipment in 200 will not be repeated here.
图4示出了根据本申请实施例的网络设备400的示意性框图。如图4所示,该网络设备400属于网络,该网络设备400包括:Fig. 4 shows a schematic block diagram of a network device 400 according to an embodiment of the present application. As shown in FIG. 4, the network device 400 belongs to a network, and the network device 400 includes:
通信单元410,用于广播第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端。The communication unit 410 is configured to broadcast first information, where the first information includes a first access control information set list, and the first access control information set list includes N first access control information sets. An access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability.
可选地,在一些实施例中,所述特定接入标识的数量为一个,所述降低能力终端均对应一个所述特定接入标识;或者Optionally, in some embodiments, the number of the specific access identifier is one, and each of the terminals with reduced capability corresponds to one specific access identifier; or
所述降低能力终端包括多种类型的终端,所述特定接入标识的数量为多个,每个所述特定接入标识用于指示所述多种类型中的一种。The reduced capability terminal includes multiple types of terminals, the number of the specific access identifiers is multiple, and each specific access identifier is used to indicate one of the multiple types.
可选地,在一些实施例中,所述多种类型的终端包括以下中的至少一种:Optionally, in some embodiments, the multiple types of terminals include at least one of the following:
工业无线传感器、用于视频监控的设备、可穿戴设备。Industrial wireless sensors, equipment for video surveillance, and wearable devices.
可选地,在一些实施例中,所述第一接入控制信息集包括第一指示信息,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试的控制信息。Optionally, in some embodiments, the first access control information set includes first indication information, and the first indication information is used to indicate control information of an access attempt of a terminal device of the specific access identifier .
可选地,在一些实施例中,所述第一接入控制信息集还包括限制因子和/或限制时长,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。Optionally, in some embodiments, the first access control information set further includes a restriction factor and/or restriction duration, and the first indication information is used to indicate the access of the terminal device with the specific access identifier Whether the attempt is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
可选地,在一些实施例中,所述特定接入标识的数量为一个,所述第一指示信息包括一个比特, 所述一个比特的取值用于指示一个所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制;或者Optionally, in some embodiments, the number of the specific access identifier is one, the first indication information includes one bit, and the value of the one bit is used to indicate a terminal of the specific access identifier Whether the access attempt of the device is allowed or restricted by the restriction factor; or
所述特定接入标识的数量为多个,所述第一指示信息包括多个比特,每个比特对应多个所述特定接入标识中的一个,所述每个比特的取值用于指示对应的特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。The number of the specific access identifiers is multiple, the first indication information includes multiple bits, each bit corresponds to one of the multiple specific access identifiers, and the value of each bit is used to indicate Whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
可选地,在一些实施例中,所述第一信息还包括第一接入控制配置列表和/或第二接入控制配置列表,其中,所述第一接入控制配置列表用于指示多个接入类别中的每个接入类别对应的接入控制信息集,所述第二接入控制配置列表用于指示多个公共陆地移动网络PLMN中的每个PLMN对应的接入控制信息集。Optionally, in some embodiments, the first information further includes a first access control configuration list and/or a second access control configuration list, where the first access control configuration list is used to indicate multiple The access control information set corresponding to each access category in the two access categories, and the second access control configuration list is used to indicate the access control information set corresponding to each PLMN in the multiple public land mobile network PLMNs .
可选地,在一些实施例中,所述第一接入控制配置列表包括多个第一接入控制配置,每个第一接入控制配置对应所述多个接入类别中的一个接入类别,每个第一接入控制配置包括至少一个接入控制信息集索引;Optionally, in some embodiments, the first access control configuration list includes multiple first access control configurations, and each first access control configuration corresponds to one access in the multiple access categories. Category, each first access control configuration includes at least one access control information set index;
所述第二接入控制配置列表包括多个第二接入控制配置,每个第二接入控制配置对应所述多个PLMN中的一个PLMN,每个第二接入控制配置包括至少一个接入控制信息集索引。The second access control configuration list includes multiple second access control configurations, each second access control configuration corresponds to one PLMN of the multiple PLMNs, and each second access control configuration includes at least one access control configuration. Incoming control information set index.
可选地,在一些实施例中,所述特定接入标识通过接入标识号的预留值表示。Optionally, in some embodiments, the specific access identifier is represented by a reserved value of the access identification number.
可选地,在一些实施例中,所述特定接入标识为接入标识号3至10中的取值。Optionally, in some embodiments, the specific access identifier is a value in the access identifier number 3-10.
可选地,在一些实施例中,所述第一信息为主信息块MIB信息或者系统信息块SIB信息。Optionally, in some embodiments, the first information is main information block MIB information or system information block SIB information.
可选地,在一些实施例中,所述第一信息还包括第二接入控制信息集列表,所述第二接入控制信息集列表包括M个第二接入控制信息集,所述第二接入控制信息集用于非所述特定接入标识的终端设备的接入控制,其中,所述M为正整数。Optionally, in some embodiments, the first information further includes a second access control information set list, and the second access control information set list includes M second access control information sets. The second access control information set is used for access control of terminal devices other than the specific access identifier, where the M is a positive integer.
可选地,在一些实施例中,所述第二接入控制信息集包括第二指示信息,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试的控制信息。Optionally, in some embodiments, the second access control information set includes second indication information, and the second indication information is used to indicate control of an access attempt of a terminal device that is not the specific access identifier information.
可选地,在一些实施例中,所述第二接入控制信息集还包括限制因子和/或限制时长,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。Optionally, in some embodiments, the second access control information set further includes a restriction factor and/or restriction duration, and the second indication information is used to indicate the access of a terminal device that is not the specific access identifier. Whether the access attempt is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
可选地,在一些实施例中,上述通信单元可以是通信接口或收发器,或者是通信芯片或者片上系统的输入输出接口。Optionally, in some embodiments, the aforementioned communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system-on-chip.
应理解,根据本申请实施例的网络设备400可对应于本申请方法实施例中的网络设备,并且网络设备400中的各个单元的上述和其它操作和/或功能分别为了实现图2所示方法200中网络设备的相应流程,为了简洁,在此不再赘述。It should be understood that the network device 400 according to the embodiment of the present application may correspond to the network device in the method embodiment of the present application, and the foregoing and other operations and/or functions of each unit in the network device 400 are to implement the method shown in FIG. 2 respectively. For the sake of brevity, the corresponding process of the network equipment in 200 will not be repeated here.
图5是本申请实施例提供的一种通信设备800示意性结构图。图5所示的通信设备800包括处理器810,处理器810可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。FIG. 5 is a schematic structural diagram of a communication device 800 provided by an embodiment of the present application. The communication device 800 shown in FIG. 5 includes a processor 810, and the processor 810 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
可选地,如图5所示,通信设备800还可以包括存储器820。其中,处理器810可以从存储器820中调用并运行计算机程序,以实现本申请实施例中的方法。Optionally, as shown in FIG. 5, the communication device 800 may further include a memory 820. The processor 810 may call and run a computer program from the memory 820 to implement the method in the embodiment of the present application.
其中,存储器820可以是独立于处理器810的一个单独的器件,也可以集成在处理器810中。The memory 820 may be a separate device independent of the processor 810, or may be integrated in the processor 810.
可选地,如图5所示,通信设备800还可以包括收发器830,处理器810可以控制该收发器830与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。Optionally, as shown in FIG. 5, the communication device 800 may further include a transceiver 830, and the processor 810 may control the transceiver 830 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
其中,收发器830可以包括发射机和接收机。收发器830还可以进一步包括天线,天线的数量可以为一个或多个。Wherein, the transceiver 830 may include a transmitter and a receiver. The transceiver 830 may further include an antenna, and the number of antennas may be one or more.
可选地,该通信设备800具体可为本申请实施例的网络设备,并且该通信设备800可以实现本申 请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the communication device 800 may specifically be a network device of an embodiment of the application, and the communication device 800 may implement the corresponding process implemented by the network device in each method of the embodiment of the application. For the sake of brevity, it will not be repeated here. .
可选地,该通信设备800具体可为本申请实施例的移动终端/终端设备,并且该通信设备800可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the communication device 800 may specifically be a mobile terminal/terminal device of an embodiment of the present application, and the communication device 800 may implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application. For the sake of brevity , I won’t repeat it here.
图6是本申请实施例的芯片的示意性结构图。图6所示的芯片900包括处理器910,处理器910可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。Fig. 6 is a schematic structural diagram of a chip of an embodiment of the present application. The chip 900 shown in FIG. 6 includes a processor 910, and the processor 910 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
可选地,如图6所示,芯片900还可以包括存储器920。其中,处理器910可以从存储器920中调用并运行计算机程序,以实现本申请实施例中的方法。Optionally, as shown in FIG. 6, the chip 900 may further include a memory 920. The processor 910 can call and run a computer program from the memory 920 to implement the method in the embodiment of the present application.
其中,存储器920可以是独立于处理器910的一个单独的器件,也可以集成在处理器910中。The memory 920 may be a separate device independent of the processor 910, or may be integrated in the processor 910.
可选地,该芯片900还可以包括输入接口930。其中,处理器910可以控制该输入接口930与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。Optionally, the chip 900 may further include an input interface 930. The processor 910 can control the input interface 930 to communicate with other devices or chips, and specifically, can obtain information or data sent by other devices or chips.
可选地,该芯片900还可以包括输出接口940。其中,处理器910可以控制该输出接口940与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。Optionally, the chip 900 may further include an output interface 940. The processor 910 can control the output interface 940 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
可选地,该芯片900可应用于本申请实施例中的网络设备,并且该芯片900可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the chip 900 can be applied to the network device in the embodiment of the present application, and the chip 900 can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application. For the sake of brevity, details are not described herein again.
可选地,该芯片900可应用于本申请实施例中的移动终端/终端设备,并且该芯片900可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the chip 900 may be applied to the mobile terminal/terminal device in the embodiment of the present application, and the chip 900 may implement the corresponding process implemented by the mobile terminal/terminal device in the various methods of the embodiment of the present application. For the sake of brevity, I won't repeat it here.
可选地,本申请实施例提到的装置也可以是芯片。例如可以是系统级芯片,系统芯片,芯片系统或片上系统芯片等。Optionally, the device mentioned in the embodiment of the present application may also be a chip. For example, it can be a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip.
图7是本申请实施例提供的一种通信系统1000的示意性框图。如图7所示,该通信系统1000包括终端设备1010和网络设备1020。FIG. 7 is a schematic block diagram of a communication system 1000 according to an embodiment of the present application. As shown in FIG. 7, the communication system 1000 includes a terminal device 1010 and a network device 1020.
其中,该终端设备1010可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备1020可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。Wherein, the terminal device 1010 can be used to implement the corresponding function implemented by the terminal device in the above method, and the network device 1020 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。It should be understood that the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software. The above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers. The storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存 取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. The volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, DDR SDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), Synchronous Link Dynamic Random Access Memory (Synchlink DRAM, SLDRAM) ) And Direct Rambus RAM (DR RAM). It should be noted that the memories of the systems and methods described herein are intended to include, but are not limited to, these and any other suitable types of memories.
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should be understood that the foregoing memory is exemplary but not restrictive. For example, the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is to say, the memory in the embodiments of the present application is intended to include, but is not limited to, these and any other suitable types of memory.
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。The embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. For the sake of brevity, here No longer.
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application For the sake of brevity, I won’t repeat it here.
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。The embodiments of the present application also provide a computer program product, including computer program instructions.
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. For the sake of brevity, it is not here. Repeat it again.
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program product can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application, For the sake of brevity, I will not repeat them here.
本申请实施例还提供了一种计算机程序。The embodiment of the present application also provides a computer program.
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program can be applied to the network device in the embodiment of the present application. When the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. For the sake of brevity , I won’t repeat it here.
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program can be applied to the mobile terminal/terminal device in the embodiment of the present application. When the computer program runs on the computer, the computer executes each method in the embodiment of the present application. For the sake of brevity, the corresponding process will not be repeated here.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。A person of ordinary skill in the art may be aware that the units and algorithm steps of the examples described in combination with the embodiments disclosed herein can be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of description, the specific working process of the above-described system, device, and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed system, device, and method can be implemented in other ways. For example, the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是 或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。针对这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium. In response to this understanding, the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in this application. Should be covered within the scope of protection of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.

Claims (70)

  1. 一种无线通信的方法,其特征在于,包括:A method of wireless communication, characterized in that it comprises:
    终端设备接收网络设备广播的第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端。The terminal device receives first information broadcast by the network device, where the first information includes a first access control information set list, and the first access control information set list includes N first access control information sets. An access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability.
  2. 根据权利要求1所述的方法,其特征在于,所述特定接入标识的数量为一个,所述降低能力终端均对应一个所述特定接入标识;或者The method according to claim 1, wherein the number of the specific access identifier is one, and each of the terminals with reduced capability corresponds to one specific access identifier; or
    所述降低能力终端包括多种类型的终端,所述特定接入标识的数量为多个,每个所述特定接入标识用于指示所述多种类型中的一种。The reduced capability terminal includes multiple types of terminals, the number of the specific access identifiers is multiple, and each specific access identifier is used to indicate one of the multiple types.
  3. 根据权利要求2所述的方法,其特征在于,所述多种类型的终端包括以下中的至少一种:The method according to claim 2, wherein the multiple types of terminals include at least one of the following:
    工业无线传感器、用于视频监控的设备、可穿戴设备。Industrial wireless sensors, equipment for video surveillance, and wearable devices.
  4. 根据权利要求1-3中任一项所述的方法,其特征在于,所述第一接入控制信息集包括第一指示信息,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试的控制信息。The method according to any one of claims 1-3, wherein the first access control information set includes first indication information, and the first indication information is used to indicate the status of the specific access identifier. The control information of the terminal device's access attempt.
  5. 根据权利要求4所述的方法,其特征在于,所述第一接入控制信息集还包括限制因子和/或限制时长,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。The method according to claim 4, wherein the first access control information set further includes a restriction factor and/or restriction duration, and the first indication information is used to indicate the terminal equipment of the specific access identifier Whether the access attempt of is allowed or restricted by the restriction factor, where the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
  6. 根据权利要求5所述的方法,其特征在于,所述特定接入标识的数量为一个,所述第一指示信息包括一个比特,所述一个比特的取值用于指示一个所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制;或者The method according to claim 5, wherein the number of the specific access identifier is one, the first indication information includes one bit, and the value of the one bit is used to indicate one of the specific access identifiers. Whether the access attempt of the identified terminal device is allowed or restricted by the restriction factor; or
    所述特定接入标识的数量为多个,所述第一指示信息包括多个比特,每个比特对应多个所述特定接入标识中的一个,所述每个比特的取值用于指示对应的特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。The number of the specific access identifiers is multiple, the first indication information includes multiple bits, each bit corresponds to one of the multiple specific access identifiers, and the value of each bit is used to indicate Whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,所述第一信息还包括第一接入控制配置列表和/或第二接入控制配置列表,其中,所述第一接入控制配置列表用于指示多个接入类别中的每个接入类别对应的接入控制信息集,所述第二接入控制配置列表用于指示多个公共陆地移动网络PLMN中的每个PLMN对应的接入控制信息集。The method according to any one of claims 1 to 6, wherein the first information further includes a first access control configuration list and/or a second access control configuration list, wherein the first The access control configuration list is used to indicate the access control information set corresponding to each of the multiple access categories, and the second access control configuration list is used to indicate each of the multiple public land mobile network PLMNs. Access control information set corresponding to each PLMN.
  8. 根据权利要求7所述的方法,其特征在于,所述第一接入控制配置列表包括多个第一接入控制配置,每个第一接入控制配置对应所述多个接入类别中的一个接入类别,每个第一接入控制配置包括至少一个接入控制信息集索引;The method according to claim 7, wherein the first access control configuration list includes a plurality of first access control configurations, and each first access control configuration corresponds to one of the plurality of access categories One access category, and each first access control configuration includes at least one access control information set index;
    所述第二接入控制配置列表包括多个第二接入控制配置,每个第二接入控制配置对应所述多个PLMN中的一个PLMN,每个第二接入控制配置包括至少一个接入控制信息集索引。The second access control configuration list includes multiple second access control configurations, each second access control configuration corresponds to one PLMN of the multiple PLMNs, and each second access control configuration includes at least one access control configuration. Incoming control information set index.
  9. 根据权利要求8所述的方法,其特征在于,所述N个第一接入控制信息集中的每个第一接入控制信息集对应一个接入控制信息集索引,所述方法还包括:The method according to claim 8, wherein each first access control information set in the N first access control information sets corresponds to an access control information set index, and the method further comprises:
    若所述终端设备的接入标识是所述特定接入标识,在所述第一接入控制配置列表中确定所述终端设备的接入类别对应的第一接入控制配置为目标接入控制配置;If the access identifier of the terminal device is the specific access identifier, it is determined in the first access control configuration list that the first access control configuration corresponding to the access category of the terminal device is the target access control Configuration
    根据所述目标接入控制配置包括的接入控制信息集索引,确定所述N个第一接入控制信息集中的目标接入控制信息集;Determine the target access control information set in the N first access control information sets according to the access control information set index included in the target access control configuration;
    根据所述终端设备的接入标识和所述目标接入控制信息集,确定所述终端设备接入所述网络设备被允许还是受限制。According to the access identifier of the terminal device and the target access control information set, it is determined whether the terminal device is allowed or restricted to access the network device.
  10. 根据权利要求1-9中任一项所述的方法,其特征在于,所述根据所述终端设备的接入标识和所述目标接入控制信息集,确定接入所述网络设备被允许还是受限制,包括:The method according to any one of claims 1-9, wherein the determining whether access to the network device is allowed or not based on the access identifier of the terminal device and the target access control information set Restricted, including:
    根据所述终端设备的接入标识和所述目标接入控制信息集中的第一指示信息,确定所述所述终端设备接入所述网络设备被允许还是受限制,其中,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受限制。Determine whether the terminal device is allowed or restricted to access the network device according to the access identifier of the terminal device and the first indication information in the target access control information set, wherein the first indication The information is used to indicate whether the access attempt of the terminal device with the specific access identifier is allowed or restricted.
  11. 根据权利要求1-10中任一项所述的方法,其特征在于,所述特定接入标识通过接入标识号的预留值表示。The method according to any one of claims 1-10, wherein the specific access identifier is represented by a reserved value of an access identification number.
  12. 根据权利要求1-11中任一项所述的方法,其特征在于,所述特定接入标识为接入标识号3至10中的取值。The method according to any one of claims 1-11, wherein the specific access identifier is a value of access identifier numbers 3-10.
  13. 根据权利要求1至12中任一项所述的方法,其特征在于,所述第一信息为主信息块MIB信息或者系统信息块SIB信息。The method according to any one of claims 1 to 12, wherein the first information is main information block MIB information or system information block SIB information.
  14. 根据权利要求1-13中任一项所述的方法,其特征在于,所述第一信息还包括第二接入控制信息集列表,所述第二接入控制信息集列表包括M个第二接入控制信息集,所述第二接入控制信息集列表用于非所述特定接入标识的终端设备的接入控制,其中,所述M为正整数。The method according to any one of claims 1-13, wherein the first information further includes a second access control information set list, and the second access control information set list includes M second access control information sets. Access control information set, the second access control information set list is used for access control of terminal devices other than the specific access identifier, where the M is a positive integer.
  15. 根据权利要求14所述的方法,其特征在于,所述第二接入控制信息集包括第二指示信息,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试的控制信息。The method according to claim 14, wherein the second set of access control information includes second indication information, and the second indication information is used to indicate the access of a terminal device that is not the specific access identifier. Try the control information.
  16. 根据权利要求15所述的方法,其特征在于,所述第二接入控制信息集还包括限制因子和/或限制时长,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。The method according to claim 15, wherein the second access control information set further includes a restriction factor and/or restriction duration, and the second indication information is used to indicate a terminal that is not the specific access identifier Whether the access attempt of the device is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the restriction of the access attempt.
  17. 一种无线通信的方法,其特征在于,包括:A method of wireless communication, characterized in that it comprises:
    网络设备广播第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端。The network device broadcasts first information, the first information includes a first access control information set list, the first access control information set list includes N first access control information sets, the first access control information The information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability.
  18. 根据权利要求17所述的方法,其特征在于,所述特定接入标识的数量为一个,所述降低能力终端均对应一个所述特定接入标识;或者The method according to claim 17, wherein the number of the specific access identifier is one, and each of the terminals with reduced capability corresponds to one specific access identifier; or
    所述降低能力终端包括多种类型的终端,所述特定接入标识的数量为多个,每个所述特定接入标识用于指示所述多种类型中的一种。The reduced capability terminal includes multiple types of terminals, the number of the specific access identifiers is multiple, and each specific access identifier is used to indicate one of the multiple types.
  19. 根据权利要求17所述的方法,其特征在于,所述多种类型的终端包括以下中的至少一种:The method according to claim 17, wherein the multiple types of terminals include at least one of the following:
    工业无线传感器、用于视频监控的设备、可穿戴设备。Industrial wireless sensors, equipment for video surveillance, and wearable devices.
  20. 根据权利要求17-19中任一项所述的方法,其特征在于,所述第一接入控制信息集包括第一指示信息,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试的控制信息。The method according to any one of claims 17-19, wherein the first access control information set includes first indication information, and the first indication information is used to indicate the status of the specific access identifier. The control information of the terminal device's access attempt.
  21. 根据权利要求20所述的方法,其特征在于,所述第一接入控制信息集还包括限制因子和/或限制时长,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。The method according to claim 20, wherein the first access control information set further includes a restriction factor and/or restriction duration, and the first indication information is used to indicate the terminal equipment of the specific access identifier Whether the access attempt of is allowed or restricted by the restriction factor, where the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the access attempt being restricted.
  22. 根据权利要求21所述的方法,其特征在于,所述特定接入标识的数量为一个,所述第一指示信息包括一个比特,所述一个比特的取值用于指示一个所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制;或者The method according to claim 21, wherein the number of the specific access identifier is one, the first indication information includes one bit, and the value of the one bit is used to indicate one of the specific access identifiers. Whether the access attempt of the identified terminal device is allowed or restricted by the restriction factor; or
    所述特定接入标识的数量为多个,所述第一指示信息包括多个比特,每个比特对应多个所述特定 接入标识中的一个,所述每个比特的取值用于指示对应的特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。The number of the specific access identifiers is multiple, the first indication information includes multiple bits, each bit corresponds to one of the multiple specific access identifiers, and the value of each bit is used to indicate Whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
  23. 根据权利要求17至22中任一项所述的方法,其特征在于,所述第一信息还包括第一接入控制配置列表和/或第二接入控制配置列表,其中,所述第一接入控制配置列表用于指示多个接入类别中的每个接入类别对应的接入控制信息集,所述第二接入控制配置列表用于指示多个公共陆地移动网络PLMN中的每个PLMN对应的接入控制信息集。The method according to any one of claims 17 to 22, wherein the first information further comprises a first access control configuration list and/or a second access control configuration list, wherein the first The access control configuration list is used to indicate the access control information set corresponding to each of the multiple access categories, and the second access control configuration list is used to indicate each of the multiple public land mobile network PLMNs. Access control information set corresponding to each PLMN.
  24. 根据权利要求23所述的方法,其特征在于,所述第一接入控制配置列表包括多个第一接入控制配置,每个第一接入控制配置对应所述多个接入类别中的一个接入类别,每个第一接入控制配置包括至少一个接入控制信息集索引;The method according to claim 23, wherein the first access control configuration list includes a plurality of first access control configurations, and each first access control configuration corresponds to one of the plurality of access categories One access category, and each first access control configuration includes at least one access control information set index;
    所述第二接入控制配置列表包括多个第二接入控制配置,每个第二接入控制配置对应所述多个PLMN中的一个PLMN,每个第二接入控制配置包括至少一个接入控制信息集索引。The second access control configuration list includes multiple second access control configurations, each second access control configuration corresponds to one PLMN of the multiple PLMNs, and each second access control configuration includes at least one access control configuration. Incoming control information set index.
  25. 根据权利要求17-24中任一项所述的方法,其特征在于,所述特定接入标识通过接入标识号的预留值表示。The method according to any one of claims 17-24, wherein the specific access identifier is represented by a reserved value of an access identification number.
  26. 根据权利要求17-25中任一项所述的方法,其特征在于,所述特定接入标识为接入标识号3至10中的取值。The method according to any one of claims 17-25, wherein the specific access identifier is a value in the access identifier number 3-10.
  27. 根据权利要求17至26中任一项所述的方法,其特征在于,所述第一信息为主信息块MIB信息或者系统信息块SIB信息。The method according to any one of claims 17 to 26, wherein the first information is main information block MIB information or system information block SIB information.
  28. 根据权利要求17-27中任一项所述的方法,其特征在于,所述第一信息还包括第二接入控制信息集列表,所述第二接入控制信息集列表包括M个第二接入控制信息集,所述第二接入控制信息集用于非特定接入标识的终端设备的接入控制,其中,所述M为正整数。The method according to any one of claims 17-27, wherein the first information further includes a second access control information set list, and the second access control information set list includes M second access control information sets. An access control information set, where the second access control information set is used for access control of a terminal device with a non-specific access identifier, where the M is a positive integer.
  29. 根据权利要求28所述的方法,其特征在于,所述第二接入控制信息集包括第二指示信息,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试的控制信息。The method according to claim 28, wherein the second set of access control information includes second indication information, and the second indication information is used to indicate the access of a terminal device that is not the specific access identifier. Try the control information.
  30. 根据权利要求29所述的方法,其特征在于,所述第二接入控制信息集还包括限制因子和/或限制时长,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。The method according to claim 29, wherein the second access control information set further includes a restriction factor and/or restriction duration, and the second indication information is used to indicate a terminal that is not the specific access identifier Whether the access attempt of the device is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the restriction of the access attempt.
  31. 一种终端设备,其特征在于,包括:A terminal device, characterized in that it comprises:
    通信单元,用于接收网络设备广播的第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端。A communication unit, configured to receive first information broadcast by a network device, where the first information includes a first access control information set list, and the first access control information set list includes N first access control information sets, The first access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability.
  32. 根据权利要求31所述的终端设备,其特征在于,所述特定接入标识的数量为一个,所述降低能力终端均对应一个所述特定接入标识;或者The terminal device according to claim 31, wherein the number of the specific access identifier is one, and each of the terminals with reduced capability corresponds to one specific access identifier; or
    所述降低能力终端包括多种类型的终端,所述特定接入标识的数量为多个,每个所述特定接入标识用于指示所述多种类型中的一种。The reduced capability terminal includes multiple types of terminals, the number of the specific access identifiers is multiple, and each specific access identifier is used to indicate one of the multiple types.
  33. 根据权利要求31所述的终端设备,其特征在于,所述多种类型的终端包括以下中的至少一种:The terminal device according to claim 31, wherein the multiple types of terminals include at least one of the following:
    工业无线传感器、用于视频监控的设备、可穿戴设备。Industrial wireless sensors, equipment for video surveillance, and wearable devices.
  34. 根据权利要求31-33中任一项所述的终端设备,其特征在于,所述第一接入控制信息集包括第一指示信息,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试的控制信息。The terminal device according to any one of claims 31-33, wherein the first access control information set includes first indication information, and the first indication information is used to indicate the specific access identifier The control information of the access attempt of the terminal device.
  35. 根据权利要求34所述的终端设备,其特征在于,所述第一接入控制信息集还包括限制因子 和/或限制时长,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。The terminal device according to claim 34, wherein the first access control information set further includes a restriction factor and/or restriction duration, and the first indication information is used to indicate the terminal of the specific access identifier Whether the access attempt of the device is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the restriction of the access attempt.
  36. 根据权利要求35所述的终端设备,其特征在于,所述特定接入标识的数量为一个,所述第一指示信息包括一个比特,所述一个比特的取值用于指示一个所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制;或者The terminal device according to claim 35, wherein the number of the specific access identifier is one, the first indication information includes one bit, and the value of the one bit is used to indicate one of the specific access identifiers. Whether the access attempt of the terminal device with the incoming identifier is allowed or restricted by the restriction factor; or
    所述特定接入标识的数量为多个,所述第一指示信息包括多个比特,每个比特对应多个所述特定接入标识中的一个,所述每个比特的取值用于指示对应的特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。The number of the specific access identifiers is multiple, the first indication information includes multiple bits, each bit corresponds to one of the multiple specific access identifiers, and the value of each bit is used to indicate Whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
  37. 根据权利要求31至36中任一项所述的终端设备,其特征在于,所述第一信息还包括第一接入控制配置列表和/或第二接入控制配置列表,其中,所述第一接入控制配置列表用于指示多个接入类别中的每个接入类别对应的接入控制信息集,所述第二接入控制配置列表用于指示多个公共陆地移动网络PLMN中的每个PLMN对应的接入控制信息集。The terminal device according to any one of claims 31 to 36, wherein the first information further comprises a first access control configuration list and/or a second access control configuration list, wherein the first information An access control configuration list is used to indicate the access control information set corresponding to each access category in the multiple access categories, and the second access control configuration list is used to indicate the access control information set in the multiple public land mobile network PLMNs. Access control information set corresponding to each PLMN.
  38. 根据权利要求37所述的终端设备,其特征在于,所述第一接入控制配置列表包括多个第一接入控制配置,每个第一接入控制配置对应所述多个接入类别中的一个接入类别,每个第一接入控制配置包括至少一个接入控制信息集索引;The terminal device according to claim 37, wherein the first access control configuration list includes multiple first access control configurations, and each first access control configuration corresponds to one of the multiple access categories Each access control configuration includes at least one access control information set index;
    所述第二接入控制配置列表包括多个第二接入控制配置,每个第二接入控制配置对应所述多个PLMN中的一个PLMN,每个第二接入控制配置包括至少一个接入控制信息集索引。The second access control configuration list includes multiple second access control configurations, each second access control configuration corresponds to one PLMN of the multiple PLMNs, and each second access control configuration includes at least one access control configuration. Incoming control information set index.
  39. 根据权利要求38所述的终端设备,其特征在于,所述N个第一接入控制信息集中的每个第一接入控制信息集对应一个接入控制信息集索引,所述终端设备还包括:The terminal device according to claim 38, wherein each first access control information set in the N first access control information sets corresponds to an access control information set index, and the terminal device further comprises :
    处理单元,用于若所述终端设备的接入标识是所述特定接入标识,在所述第一接入控制配置列表中确定所述终端设备的接入类别对应的第一接入控制配置为目标接入控制配置;A processing unit, configured to, if the access identifier of the terminal device is the specific access identifier, determine the first access control configuration corresponding to the access category of the terminal device in the first access control configuration list Configure for target access control;
    根据所述目标接入控制配置包括的接入控制信息集索引,确定所述N个第一接入控制信息集中的目标接入控制信息集;Determine the target access control information set in the N first access control information sets according to the access control information set index included in the target access control configuration;
    根据所述终端设备的接入标识和所述目标接入控制信息集,确定所述终端设备接入所述网络设备被允许还是受限制。According to the access identifier of the terminal device and the target access control information set, it is determined whether the terminal device is allowed or restricted to access the network device.
  40. 根据权利要求31-39中任一项所述的终端设备,其特征在于,所述处理单元具体用于:The terminal device according to any one of claims 31-39, wherein the processing unit is specifically configured to:
    根据所述终端设备的接入标识和所述目标接入控制信息集中的第一指示信息,确定所述所述终端设备接入所述网络设备被允许还是受限制,其中,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受限制。Determine whether the terminal device is allowed or restricted to access the network device according to the access identifier of the terminal device and the first indication information in the target access control information set, wherein the first indication The information is used to indicate whether the access attempt of the terminal device with the specific access identifier is allowed or restricted.
  41. 根据权利要求31-40中任一项所述的终端设备,其特征在于,所述特定接入标识通过接入标识号的预留值表示。The terminal device according to any one of claims 31-40, wherein the specific access identifier is represented by a reserved value of an access identification number.
  42. 根据权利要求31-41中任一项所述的终端设备,其特征在于,所述特定接入标识为接入标识号3至10中的取值。The terminal device according to any one of claims 31-41, wherein the specific access identifier is a value in the access identifier number 3-10.
  43. 根据权利要求31至42中任一项所述的终端设备,其特征在于,所述第一信息为主信息块MIB信息或者系统信息块SIB信息。The terminal device according to any one of claims 31 to 42, wherein the first information is main information block MIB information or system information block SIB information.
  44. 根据权利要求31-43中任一项所述的终端设备,其特征在于,所述第一信息还包括第二接入控制信息集列表,所述第二接入控制信息集列表包括M个第二接入控制信息集,所述第二接入控制信息集列表用于非所述特定接入标识的终端设备的接入控制,其中,所述M为正整数。The terminal device according to any one of claims 31-43, wherein the first information further includes a second access control information set list, and the second access control information set list includes M-th 2. Access control information set. The second access control information set list is used for access control of terminal devices other than the specific access identifier, where the M is a positive integer.
  45. 根据权利要求44所述的终端设备,其特征在于,所述第二接入控制信息集包括第二指示信 息,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试的控制信息。The terminal device according to claim 44, wherein the second access control information set includes second indication information, and the second indication information is used to indicate the access of the terminal device that is not the specific access identifier. Control information for the entry attempt.
  46. 根据权利要求45所述的终端设备,其特征在于,所述第二接入控制信息集还包括限制因子和/或限制时长,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。The terminal device according to claim 45, wherein the second access control information set further includes a restriction factor and/or restriction duration, and the second indication information is used to indicate information other than the specific access identifier Whether the access attempt of the terminal device is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the restriction of the access attempt.
  47. 一种网络设备,其特征在于,包括:A network device, characterized in that it comprises:
    通信单元,用于广播第一信息,所述第一信息包括第一接入控制信息集列表,所述第一接入控制信息集列表包括N个第一接入控制信息集,所述第一接入控制信息集用于特定接入标识的终端设备的接入控制,其中,所述N为正整数,所述特定接入标识的终端设备包括降低能力终端。The communication unit is configured to broadcast first information, where the first information includes a first access control information set list, the first access control information set list includes N first access control information sets, and the first The access control information set is used for access control of terminal equipment with a specific access identifier, where the N is a positive integer, and the terminal equipment with the specific access identifier includes a terminal with reduced capability.
  48. 根据权利要求47所述的网络设备,其特征在于,所述特定接入标识的数量为一个,所述降低能力终端均对应一个所述特定接入标识;或者The network device according to claim 47, wherein the number of the specific access identifier is one, and each of the terminals with reduced capability corresponds to one specific access identifier; or
    所述降低能力终端包括多种类型的终端,所述特定接入标识的数量为多个,每个所述特定接入标识用于指示所述多种类型中的一种。The reduced capability terminal includes multiple types of terminals, the number of the specific access identifiers is multiple, and each specific access identifier is used to indicate one of the multiple types.
  49. 根据权利要求47所述的网络设备,其特征在于,所述多种类型包括以下中的至少一种:The network device according to claim 47, wherein the multiple types include at least one of the following:
    工业无线传感器、用于视频监控的设备、可穿戴设备。Industrial wireless sensors, equipment for video surveillance, and wearable devices.
  50. 根据权利要求47-49中任一项所述的网络设备,其特征在于,所述第一接入控制信息集包括第一指示信息,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试的控制信息。The network device according to any one of claims 47-49, wherein the first access control information set includes first indication information, and the first indication information is used to indicate the specific access identifier The control information of the terminal device’s access attempt.
  51. 根据权利要求50所述的网络设备,其特征在于,所述第一接入控制信息集还包括限制因子和/或限制时长,所述第一指示信息用于指示所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。The network device according to claim 50, wherein the first access control information set further includes a restriction factor and/or restriction duration, and the first indication information is used to indicate the terminal of the specific access identifier Whether the access attempt of the device is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the restriction of the access attempt.
  52. 根据权利要求51所述的网络设备,其特征在于,所述特定接入标识的数量为一个,所述第一指示信息包括一个比特,所述一个比特的取值用于指示一个所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制;或者The network device according to claim 51, wherein the number of the specific access identifier is one, the first indication information includes one bit, and the value of the one bit is used to indicate one of the specific access identifiers. Whether the access attempt of the terminal device with the incoming identifier is allowed or restricted by the restriction factor; or
    所述特定接入标识的数量为多个,所述第一指示信息包括多个比特,每个比特对应多个所述特定接入标识中的一个,所述每个比特的取值用于指示对应的特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制。The number of the specific access identifiers is multiple, the first indication information includes multiple bits, each bit corresponds to one of the multiple specific access identifiers, and the value of each bit is used to indicate Whether the access attempt of the terminal device corresponding to the specific access identifier is allowed or restricted by the restriction factor.
  53. 根据权利要求47至52中任一项所述的网络设备,其特征在于,所述第一信息还包括第一接入控制配置列表和/或第二接入控制配置列表,其中,所述第一接入控制配置列表用于指示多个接入类别中的每个接入类别对应的接入控制信息集,所述第二接入控制配置列表用于指示多个公共陆地移动网络PLMN中的每个PLMN对应的接入控制信息集。The network device according to any one of claims 47 to 52, wherein the first information further comprises a first access control configuration list and/or a second access control configuration list, wherein the first information An access control configuration list is used to indicate the access control information set corresponding to each access category in the multiple access categories, and the second access control configuration list is used to indicate the access control information set in the multiple public land mobile network PLMNs. Access control information set corresponding to each PLMN.
  54. 根据权利要求53所述的网络设备,其特征在于,所述第一接入控制配置列表包括多个第一接入控制配置,每个第一接入控制配置对应所述多个接入类别中的一个接入类别,每个第一接入控制配置包括至少一个接入控制信息集索引;The network device according to claim 53, wherein the first access control configuration list includes multiple first access control configurations, and each first access control configuration corresponds to one of the multiple access categories Each access control configuration includes at least one access control information set index;
    所述第二接入控制配置列表包括多个第二接入控制配置,每个第二接入控制配置对应所述多个PLMN中的一个PLMN,每个第二接入控制配置包括至少一个接入控制信息集索引。The second access control configuration list includes multiple second access control configurations, each second access control configuration corresponds to one PLMN of the multiple PLMNs, and each second access control configuration includes at least one access control configuration. Incoming control information set index.
  55. 根据权利要求47-54中任一项所述的网络设备,其特征在于,所述特定接入标识通过接入标识号的预留值表示。The network device according to any one of claims 47-54, wherein the specific access identifier is represented by a reserved value of an access identification number.
  56. 根据权利要求47-55中任一项所述的网络设备,其特征在于,所述特定接入标识为接入标识号3至10中的取值。The network device according to any one of claims 47-55, wherein the specific access identifier is a value in the access identifier number 3-10.
  57. 根据权利要求47至56中任一项所述的网络设备,其特征在于,所述第一信息为主信息块MIB信息或者系统信息块SIB信息。The network device according to any one of claims 47 to 56, wherein the first information is main information block MIB information or system information block SIB information.
  58. 根据权利要求47-57中任一项所述的网络设备,其特征在于,所述第一信息还包括第二接入控制信息集列表,所述第二接入控制信息集列表包括M个第二接入控制信息集,所述第二接入控制信息集用于非特定接入标识的终端设备的接入控制,其中,所述M为正整数。The network device according to any one of claims 47-57, wherein the first information further includes a second access control information set list, and the second access control information set list includes M 2. Access control information set. The second access control information set is used for access control of terminal devices with non-specific access identifiers, where the M is a positive integer.
  59. 根据权利要求58所述的网络设备,其特征在于,所述第二接入控制信息集包括第二指示信息,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试的控制信息。The network device according to claim 58, wherein the second set of access control information includes second indication information, and the second indication information is used to indicate the access of a terminal device that is not the specific access identifier. Control information for the entry attempt.
  60. 根据权利要求59所述的网络设备,其特征在于,所述第二接入控制信息集还包括限制因子和/或限制时长,所述第二指示信息用于指示非所述特定接入标识的终端设备的接入尝试被允许还是受所述限制因子限制,其中,所述限制因子用于指示接入尝试被限制的概率,所述限制时长用于指示接入尝试被限制的时长。The network device according to claim 59, wherein the second access control information set further includes a restriction factor and/or restriction duration, and the second indication information is used to indicate information other than the specific access identifier Whether the access attempt of the terminal device is allowed or restricted by the restriction factor, wherein the restriction factor is used to indicate the probability of the access attempt being restricted, and the restriction duration is used to indicate the duration of the restriction of the access attempt.
  61. 一种终端设备,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至16中任一项所述的方法。A terminal device, characterized by comprising: a processor and a memory, the memory is used to store a computer program, the processor is used to call and run the computer program stored in the memory, and execute any of claims 1 to 16 The method described in one item.
  62. 一种网络设备,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求17至30中任一项所述的方法。A network device, comprising: a processor and a memory, the memory is used to store a computer program, the processor is used to call and run the computer program stored in the memory, and execute any of claims 17 to 30 The method described in one item.
  63. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至16中任一项所述的方法。A chip, characterized by comprising: a processor, configured to call and run a computer program from a memory, so that a device installed with the chip executes the method according to any one of claims 1 to 16.
  64. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求17至30中任一项所述的方法。A chip, characterized by comprising: a processor, configured to call and run a computer program from a memory, so that a device installed with the chip executes the method according to any one of claims 17 to 30.
  65. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至16中任一项所述的方法。A computer-readable storage medium, characterized in that it is used to store a computer program that enables a computer to execute the method according to any one of claims 1 to 16.
  66. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求17至30中任一项所述的方法。A computer-readable storage medium, characterized in that it is used to store a computer program that enables a computer to execute the method according to any one of claims 17 to 30.
  67. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至16中任一项所述的方法。A computer program product, characterized by comprising computer program instructions, which cause a computer to execute the method according to any one of claims 1 to 16.
  68. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求17至30中任一项所述的方法。A computer program product, characterized by comprising computer program instructions, which cause a computer to execute the method according to any one of claims 17 to 30.
  69. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求1至16中任一项所述的方法。A computer program, wherein the computer program causes a computer to execute the method according to any one of claims 1 to 16.
  70. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求17至30中任一项所述的方法。A computer program, wherein the computer program causes a computer to execute the method according to any one of claims 17 to 30.
PCT/CN2020/096871 2020-06-18 2020-06-18 Wireless communication method, terminal device, and network device WO2021253341A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080100748.2A CN115516963A (en) 2020-06-18 2020-06-18 Wireless communication method, terminal equipment and network equipment
PCT/CN2020/096871 WO2021253341A1 (en) 2020-06-18 2020-06-18 Wireless communication method, terminal device, and network device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/096871 WO2021253341A1 (en) 2020-06-18 2020-06-18 Wireless communication method, terminal device, and network device

Publications (1)

Publication Number Publication Date
WO2021253341A1 true WO2021253341A1 (en) 2021-12-23

Family

ID=79269060

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/096871 WO2021253341A1 (en) 2020-06-18 2020-06-18 Wireless communication method, terminal device, and network device

Country Status (2)

Country Link
CN (1) CN115516963A (en)
WO (1) WO2021253341A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114830736A (en) * 2022-03-24 2022-07-29 北京小米移动软件有限公司 Access control method, device, communication equipment and storage medium
CN114830736B (en) * 2022-03-24 2024-06-11 北京小米移动软件有限公司 Access control method, device, communication equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104956752A (en) * 2013-01-24 2015-09-30 索尼公司 Mobile communication device and method for allocating resources outside of a virtual carrier based on UE capabilities

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104956752A (en) * 2013-01-24 2015-09-30 索尼公司 Mobile communication device and method for allocating resources outside of a virtual carrier based on UE capabilities

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "Other aspects for reduced capability devices", 3GPP DRAFT; R1-2004612, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. E-meeting; 20200525 - 20200605, 16 May 2020 (2020-05-16), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051886328 *
HUAWEI, HISILICON: "Potential UE complexity reduction features", 3GPP DRAFT; R1-2003301, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. E-meeting; 20200525 - 20200605, 16 May 2020 (2020-05-16), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051885095 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114830736A (en) * 2022-03-24 2022-07-29 北京小米移动软件有限公司 Access control method, device, communication equipment and storage medium
CN114830736B (en) * 2022-03-24 2024-06-11 北京小米移动软件有限公司 Access control method, device, communication equipment and storage medium

Also Published As

Publication number Publication date
CN115516963A (en) 2022-12-23

Similar Documents

Publication Publication Date Title
EP4033799A1 (en) Relay transmission method, relay terminal and remote terminal
CN113169848B (en) Wireless communication method, terminal equipment and network equipment
US20230224797A1 (en) Network access method, terminal device, and network device
WO2020073257A1 (en) Wireless communication method and terminal device
WO2020082395A1 (en) Signal transmission method, transmitting terminal device, and receiving terminal device
WO2021189461A1 (en) Method for determining paging group, terminal device and network device
WO2021062578A1 (en) Wireless communication method, network device and terminal device
WO2021184224A1 (en) Sidelink capability sending method and terminal device
WO2019218126A1 (en) Method for controlling network congestion, terminal device, and network device
WO2021253341A1 (en) Wireless communication method, terminal device, and network device
WO2022067532A1 (en) Wireless communication method, terminal device and network device
CN110351744B (en) Communication method, network device and communication device
WO2021120009A1 (en) Signal detection method, signal transmission method, terminal device, and network device
WO2022213779A1 (en) Parameter configuration method, terminal device and network device
WO2022067568A1 (en) Method for determining relay scheme, and device
WO2022205391A1 (en) Paging method and terminal device
WO2023279258A1 (en) Resource selection method and terminal device
US20220353882A1 (en) Transmission priority determination method and terminal device
WO2022193240A1 (en) Network selection method, terminal device, and network device
WO2023133685A1 (en) Wireless communication method, and terminal device
WO2022061838A1 (en) Method for enabling reverse mapping mechanism, and terminal device and network device
WO2022147796A1 (en) Wireless communication method and terminal device
WO2022213264A1 (en) Terminal capability notification method, terminal device, and network device
CN111479256B (en) Information transmission method, terminal equipment and network equipment
WO2021203370A1 (en) Wireless communication method, terminal device, and network device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20941248

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20941248

Country of ref document: EP

Kind code of ref document: A1