WO2022016474A1 - Procédé et appareil de commande d'accès, et support de stockage - Google Patents

Procédé et appareil de commande d'accès, et support de stockage Download PDF

Info

Publication number
WO2022016474A1
WO2022016474A1 PCT/CN2020/103894 CN2020103894W WO2022016474A1 WO 2022016474 A1 WO2022016474 A1 WO 2022016474A1 CN 2020103894 W CN2020103894 W CN 2020103894W WO 2022016474 A1 WO2022016474 A1 WO 2022016474A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
access control
access
control restriction
restriction
Prior art date
Application number
PCT/CN2020/103894
Other languages
English (en)
Chinese (zh)
Inventor
李艳华
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2020/103894 priority Critical patent/WO2022016474A1/fr
Priority to CN202080001641.2A priority patent/CN112020879B/zh
Publication of WO2022016474A1 publication Critical patent/WO2022016474A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • the embodiments of the present disclosure relate to the field of wireless communication, but are not limited to the field of wireless communication, and in particular, relate to an access control method and device, and a storage medium.
  • the working mechanism of AC (Access Control, Access Control) restriction is: according to the access level (Access Control) of the terminal Class) and the call initiated by the terminal to obtain the corresponding AC barring (AC barring) parameters, and perform AC barring check (AC barring check).
  • the present disclosure provides an access control method and device, and a storage medium.
  • an access control method is provided, applied in a terminal, including:
  • the access control restriction parameter being associated with the type of the terminal
  • the terminal is controlled not to send an access request before receiving the paging message.
  • the types of terminals include: terminals that do not perform uplink transmissions until receiving downlink transmissions.
  • the access control restriction parameter includes at least one of the following:
  • Timing duration of the restriction timer wherein the restriction timer is used to determine the duration of restricted access of the terminal
  • Access control restriction factor includes: a first value for allowing terminal access or a second value for restricting terminal access.
  • the controlling the terminal not to send an access request includes:
  • the access request is not sent.
  • the value of the timing duration is: greater than or equal to the predetermined period duration of the discontinuous reception mode DRX or the extended discontinuous reception mode eDRX.
  • the value of the access control restriction factor for the terminal is the second value.
  • the access control restriction parameters include:
  • the restricted call category for which access is restricted is restricted.
  • controlling the terminal not to send an access request before receiving the paging message includes:
  • the terminal In response to the call type that triggers access being a restricted call type, the terminal is controlled not to send an access request before receiving a paging message according to the access control restriction parameter.
  • the restricted call category is indicated by at least one of the following:
  • Terminal type identifier Terminal type identifier
  • the method further includes:
  • an access request is sent, wherein the emergency call type is different from the restricted call type.
  • the method further includes:
  • the acquiring the default access control restriction parameter of the terminal includes:
  • the default access control restriction parameter of the terminal is acquired.
  • the default access control restriction parameters are recorded at the terminal or specified by a communication protocol.
  • an access control method is provided, applied to a base station, including:
  • the types of terminals include: terminals that do not perform uplink transmissions until receiving downlink transmissions.
  • the access control restriction parameter includes at least one of the following:
  • Timing duration of the restriction timer wherein the restriction timer is used to determine the duration of restricted access of the terminal
  • Access control restriction factor includes: a first value for allowing terminal access or a second value for restricting terminal access.
  • the value of the timing duration is greater than or equal to the predetermined period duration of DRX or eDRX.
  • the value of the access control restriction factor for the terminal is the second value.
  • the delivering access control restriction parameters according to the terminal type includes:
  • the access control restriction parameter is delivered to the terminal by using a system message or a radio resource control RRC message.
  • an access control apparatus which is applied to a terminal and includes:
  • a first determining module configured to determine an access control restriction parameter, where the access control restriction parameter is associated with the type of the terminal
  • the control module is configured to control the terminal not to send an access request before receiving the paging message according to the access control restriction parameter.
  • the types of terminals include: terminals that do not perform uplink transmissions until receiving downlink transmissions.
  • the access control restriction parameter includes at least one of the following:
  • Timing duration of the restriction timer wherein the restriction timer is used to determine the duration of restricted access of the terminal
  • Access control restriction factor includes: a first value for allowing terminal access or a second value for restricting terminal access.
  • control module includes:
  • a starting module configured to start a restriction timer according to the access control restriction parameter; within the timing period of the restriction timer, not to send the access request;
  • the access request is not sent.
  • the value of the timing duration is: greater than or equal to the predetermined period duration of the discontinuous reception mode DRX or the extended discontinuous reception mode eDRX.
  • the value of the access control restriction factor for the terminal is the second value.
  • the access control restriction parameters include:
  • the restricted call category for which access is restricted is restricted.
  • control module includes:
  • the control submodule is configured to control the terminal not to send an access request before receiving the paging message according to the access control restriction parameter in response to the call type that triggers access being a restricted call type.
  • the restricted call category is indicated by at least one of the following:
  • Terminal type identifier Terminal type identifier
  • the apparatus further includes:
  • a sending module configured to send an access request in response to a call type that triggers access being an emergency call type, wherein the emergency call type is different from the restricted call type.
  • the apparatus further includes:
  • a receiving module configured to receive the access control restriction parameter for the terminal
  • a first obtaining module configured to obtain the default access control restriction parameter of the terminal
  • the second obtaining module is configured to obtain the access control restriction parameter of the terminal according to the communication protocol.
  • the first obtaining module includes:
  • the acquiring submodule is configured to acquire the default access control and restriction parameters of the terminal in response to the failure to receive the access control restriction parameters of the terminal.
  • the default access control restriction parameters are recorded at the terminal or specified by a communication protocol.
  • an access control apparatus applied to a base station, including:
  • the second determining module is configured to determine the access control restriction parameter according to the type of the terminal
  • the sending module is configured to send the access control restriction parameter to the terminal, wherein the access control restriction parameter is used to control the terminal not to send an access request before receiving the paging message.
  • the types of terminals include: terminals that do not perform uplink transmissions until receiving downlink transmissions.
  • the access control restriction parameter includes at least one of the following:
  • Timing duration of the restriction timer wherein the restriction timer is used to determine the duration of restricted access of the terminal
  • Access control restriction factor includes: a first value for allowing terminal access or a second value for restricting terminal access.
  • the value of the timing duration is greater than or equal to the predetermined period duration of DRX or eDRX.
  • the value of the access control restriction factor for the terminal is the second value.
  • the sending module includes:
  • the sending sub-module is configured to use a system message or a radio resource control RRC message to send the access control restriction parameter to the terminal.
  • a communication device including at least: a processor and a memory for storing executable instructions that can be executed on the processor, wherein:
  • the executable instructions execute the steps in any of the above access control methods.
  • a non-transitory computer-readable storage medium wherein computer-executable instructions are stored in the computer-readable storage medium, and the computer-executable instructions are implemented when executed by a processor Steps in any one of the above access control methods.
  • the technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects:
  • the embodiments of the present disclosure provide an implementation manner of access control.
  • the access control restriction parameter is used to control the terminal not to send an access request , until a paging message is received.
  • unnecessary uplink transmission requests of the terminal can be reduced through access control. Therefore, the uplink transmission-restricted terminal will only perform uplink data after satisfying the restriction conditions of uplink transmission, and will not trigger an access request when it has sporadic uplink data to be transmitted, thereby occupying resources.
  • FIG. 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment
  • FIG. 2 is a schematic flowchart 1 of an access control method according to an exemplary embodiment
  • FIG. 3 is a second schematic flowchart of an access control method according to an exemplary embodiment
  • Fig. 4 is a schematic flow chart 3 of an access control method according to an exemplary embodiment
  • FIG. 5 is a fourth schematic flowchart of an access control method according to an exemplary embodiment
  • FIG. 6 is a schematic structural diagram 1 of an access control apparatus according to an exemplary embodiment
  • FIG. 7 is a second schematic structural diagram of an access control apparatus according to an exemplary embodiment
  • FIG. 8 is a schematic structural diagram 1 of a communication device according to an exemplary embodiment
  • FIG. 9 is a second schematic structural diagram of a communication device according to an exemplary embodiment.
  • first, second, third, etc. may be used in embodiments of the present disclosure to describe various pieces of information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • the first information may also be referred to as the second information, and similarly, the second information may also be referred to as the first information.
  • the words "if” and “if” as used herein can be interpreted as "at the time of” or "when” or "in response to determining.”
  • an embodiment of the present disclosure takes an application scenario of access control as an example for illustrative description.
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on cellular mobile communication technology, and the wireless communication system may include: several terminals 11 and several base stations 12 .
  • the terminal 11 may be a device that provides voice and/or data connectivity to the user.
  • the terminal 11 may communicate with one or more core networks via a radio access network (RAN), and the terminal 11 may be an IoT terminal such as a sensor device, a mobile phone (or "cellular" phone) and a
  • RAN radio access network
  • the computer of the IoT terminal for example, may be a fixed, portable, pocket, hand-held, built-in computer or a vehicle-mounted device.
  • a station For example, a station (Station, STA), a subscriber unit (subscriber unit), a subscriber station (subscriber station), a mobile station (mobile station), a mobile station (mobile), a remote station (remote station), an access point, a remote terminal ( remote terminal), access terminal, user terminal, user agent, user device, or user equipment (terminal).
  • the terminal 11 may also be a device of an unmanned aerial vehicle.
  • the terminal 11 may also be a vehicle-mounted device, for example, a trip computer with a wireless communication function, or a wireless terminal connected to an external trip computer.
  • the terminal 11 may also be a roadside device, for example, a street light, a signal light, or other roadside devices with a wireless communication function.
  • the base station 12 may be a network-side device in a wireless communication system.
  • the wireless communication system may be a fourth generation mobile communication (the 4th generation mobile communication, 4G) system, also known as a long term evolution (Long Term Evolution, LTE) system; or, the wireless communication system may also be a 5G system, Also known as new radio (NR) system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called NG-RAN (New Generation-Radio Access Network, a new generation of radio access network).
  • the base station 12 may be an evolved base station (eNB) used in the 4G system.
  • the base station 12 may also be a base station (gNB) that adopts a centralized distributed architecture in a 5G system.
  • eNB evolved base station
  • gNB base station
  • the base station 12 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is provided with a protocol stack of a Packet Data Convergence Protocol (PDCP) layer, a Radio Link Control Protocol (Radio Link Control, RLC) layer, and a Media Access Control (Media Access Control, MAC) layer; distribution A physical (Physical, PHY) layer protocol stack is set in the unit, and the specific implementation manner of the base station 12 is not limited in this embodiment of the present disclosure.
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control Protocol
  • MAC Media Access Control
  • distribution A physical (Physical, PHY) layer protocol stack is set in the unit, and the specific implementation manner of the base station 12 is not limited in this embodiment of the present disclosure.
  • a wireless connection can be established between the base station 12 and the terminal 11 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth generation mobile communication network technology (4G) standard; or, the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on a 5G next-generation mobile communication network technology standard.
  • an E2E (End to End, end-to-end) connection may also be established between the terminals 11 .
  • V2V vehicle to vehicle, vehicle-to-vehicle
  • V2I vehicle to Infrastructure, vehicle-to-roadside equipment
  • V2P vehicle to pedestrian, vehicle-to-person communication in vehicle-to-everything (V2X) communication etc. scene.
  • the above wireless communication system may further include a network management device 13 .
  • the network management device 13 may be a core network device in a wireless communication system, for example, the network management device 13 may be a mobility management entity (Mobility Management Entity) in an evolved packet core network (Evolved Packet Core, EPC). MME).
  • the network management device may also be other core network devices, such as a serving gateway (Serving GateWay, SGW), a public data network gateway (Public Data Network GateWay, PGW), a policy and charging rules functional unit (Policy and Charging Rules) Function, PCRF) or home subscriber server (Home Subscriber Server, HSS), etc.
  • the implementation form of the network management device 13 is not limited in this embodiment of the present disclosure.
  • Access control is a processing mechanism for traffic congestion. By limiting the connection request of UE to the base station, it ensures the successful access of key communications such as emergency calls, and allocates network resources reasonably to reduce congestion.
  • the structure of the access control restriction parameter (AC Barring parameter) of the access control is for each PLMN (Public Land Mobile Network, public land mobile network), each access category and each access type.
  • the entry ID is determined.
  • Table 1 below gives examples of access control restriction parameters, wherein the maximum number of PLMNs is 6, the maximum number of access categories is 64, and the maximum number of access identities is 16.
  • Access categories are access categories. According to the provisions of 3GPP TS24 301, access categories include the following: “originating signaling (source signaling)”, “emergency calls (emergency calls)”, “originating MMTEL” (MultiMediaTelephony, multimedia telephony) voice (source multimedia voice call)”, “originating MMTEL video (source multimedia video call)”, “originating SMSoIP (Short Message Service over Internet Protocol, Internet Protocol-based SMS transmission)”, “ “originating SMS”, “terminating calls”, “originating calls” and “mobile originating CS fallback”.
  • originating signaling source signaling
  • emergency calls emergency calls
  • originating MMTEL MultiMediaTelephony, multimedia telephony voice
  • originating MMTEL video source multimedia video call
  • originating SMSoIP Short Message Service over Internet Protocol, Internet Protocol-based SMS transmission
  • Access identities refers to access identities. It can be understood as the attribute or level of UE (User Equipment, user equipment). For example, 0 to 9 are low-priority users, such as individual users, and 11 to 15 are high-priority users, such as those related to public safety and emergency services or PLMN management. user.
  • UE User Equipment
  • the definition of the access control restriction parameters in the table may include the following methods: for low-priority users, it may be defined according to a random number and the barring effective duration; for high-priority users, it may be in the form of a bitmap.
  • the low-priority users include commercial users and high-priority users.
  • the basic process of access control barring check is to obtain access control barring parameters (AC barring parameters) according to the access type and access identifier, and perform access control check.
  • the access control restriction parameter usually adopts random numbers for low-priority users (0-9), and adopts the form of bitmap for high-priority users (11-15). Usually, this parameter will be defined in the system message. For the random number mode, if it is restricted, a timer needs to be started, and its time will be calculated from the AC barring time (AC-BarringTime). For example, the limit duration is 512 seconds.
  • the decision parameters for access control are notified to the UE using system messages. If the UE finds that the decision parameters of the access control have not been obtained during the decision, it will be processed as unrestricted. For paging, neither the data packets sent by the core network nor the data packets sent by the RAN are subject to access control decision.
  • the maximum used paging cycle is 256 radio frames, that is, 2.56 seconds, so the limited duration of 512 seconds can be covered.
  • no independent uplink mode is required, that is, the transmission of uplink data only needs to be transmitted in the downlink. after. Therefore, the access control mechanism can be used to limit the uplink service requirements of the part of the terminals until the paging message is received. Therefore, the embodiment of the present disclosure adopts the following methods to enhance the access control mechanism.
  • an embodiment of the present disclosure provides an access control method, which is applied to a terminal, including:
  • Step S101 determining an access control restriction parameter, where the access control restriction parameter is associated with the type of the terminal;
  • Step S102 Control the terminal not to send an access request before receiving the paging message according to the access control restriction parameter.
  • the terminal may be a terminal with limited uplink transmission.
  • the terminal with limited uplink transmission is subject to certain restrictions on uplink transmission.
  • a terminal with unlimited uplink transmission can initiate an access request to request uplink transmission when there is uplink transmission; while a terminal with restricted uplink transmission does not directly initiate an access request when there is uplink transmission, and the uplink transmission triggers an access request.
  • the access request is subject to certain restrictions, for example, the sending of the access request is restricted by introducing a restriction mechanism in the terminal.
  • the uplink transmission requirement of a terminal with limited uplink transmission is smaller than that of a terminal with unlimited uplink transmission in terms of statistical probability.
  • the uplink data that the terminal needs to send by itself with limited uplink transmission may be sporadic data, or it may be generated based on the downlink transmission data of the base station.
  • the uplink data generated by the uplink-restricted terminal may include: receiving feedback on downlink data, and the like.
  • the uplink-restricted terminal may perform uplink transmission, but the uplink transmission of the uplink-transmission-restricted terminal is restricted to be triggered by the base station.
  • the base station triggers the uplink transmission of the uplink-transmission-restricted terminal through paging, Or, the base station triggers the uplink transmission of the terminal through RRC signaling.
  • the terminal is a terminal with limited uplink transmission, which does not require an independent uplink mode.
  • some IoT devices only need downlink transmission.
  • a terminal for tracking and positioning does not need an independent uplink mode, that is, the uplink data only needs to be transmitted after the downlink.
  • the access control mechanism is used to restrict the uplink service request of the uplink transmission-restricted terminal until the paging message is received.
  • the terminal may be any type of terminal. Based on the call type of the terminal or the working mode of the terminal, the above-mentioned access control mechanism may be used to perform access control, and the terminal may be restricted through access control restriction parameters. call request until a paging message is received.
  • the paging message is a message that the base station transmits to the terminal, such as common information and a specific message of the mobile station.
  • the paging message may include: a list of paging terminal IDs, a system message change prompt identifier, an Earthquake and Tsunami Warning System (Earthquake and Tsunami Warning System, ETWS) identifier and other information. That is, the paging message is sent based on an emergency or a notification message. Therefore, when the terminal receives the paging message, the state of restricted access can be released.
  • the access control restriction parameter is used to restrict the terminal's uplink access request, so that the terminal only uses the downlink transmission channel and reduces unnecessary uplink requests of the terminal.
  • the terminal sends the uplink data only when it receives the paging message, thereby reducing the occupation of the uplink data link and improving the utilization rate of the network resources.
  • multiple upload requests for sporadic data of the terminal can be reduced, and the transmission efficiency can be improved.
  • uplink transmission can also be performed only when the base station allows it, thereby reducing uplink data link congestion.
  • the types of terminals include: terminals that do not perform uplink transmissions until receiving downlink transmissions.
  • the terminal has the function of being able to receive downlink transmission.
  • the terminal can generally report relevant information, so that the uplink transmission can be performed after the downlink transmission.
  • IoT devices such as MTC (Machine type communication) devices, some positioning terminals, Redcap devices or smart home devices, etc.
  • MTC Machine type communication
  • some positioning terminals such as MTC (Machine type communication) devices, some positioning terminals, Redcap devices or smart home devices, etc.
  • do not need to report messages in an independent uplink mode during normal use and only use downlink data to report messages.
  • local data provides corresponding services.
  • a feedback response is reported, and then uplink transmission is performed.
  • the access control restriction parameter includes at least one of the following:
  • the timing length of the restriction timer wherein the restriction timer is used to determine the time length of restricted access of the terminal;
  • Access control restriction factor includes: a first value for allowing terminal access or a second value for restricting terminal access.
  • the access control mechanism is used to restrict the uplink transmission of the terminal, and the restriction on the uplink transmission can be realized by setting the timing duration of the restriction timer and/or the access control restriction factor. Therefore, the above-mentioned access control restriction parameters may include the timing duration of the restriction timer and the access control restriction factor.
  • the access control restriction parameter is not limited to the above-mentioned timing duration of the restriction timer and the access control restriction factor, but may also include any parameters that can cause the terminal to stop uplink transmission.
  • the timing duration of the restriction timer may be set to infinity, or the access control restriction factor may be set to a second value for restricting terminal access.
  • the timing duration of the barring timer you can also configure the triggering conditions for starting the barring timer. For example, configure the terminal to trigger the barring timer after receiving the paging message and sending the access request; or, when the terminal obtains the The barring timer is triggered when the access control barring parameter is set.
  • the settings of the first value and the second value may be determined according to actual requirements or network conditions.
  • the above-mentioned first value and second value are determined according to the load capacity of the base station or the network congestion condition.
  • the number of terminals corresponding to the first value is set to be larger. If the number of terminals is less, the number of terminals with the second value is more; and when the network is not congested, the number of terminals corresponding to the first value can be set to be more, and the number of terminals with the second value is less.
  • the terminal whose access control restriction factor is less than the predetermined threshold is restricted from accessing, and the terminal whose access control restriction factor is greater than or equal to the predetermined threshold is allowed to access.
  • the above predetermined threshold is set to a larger value.
  • the predetermined threshold is 9.
  • the access control restriction factor of the uplink transmission-restricted terminal may be set to a value smaller than a predetermined threshold.
  • the access control restriction factor is a positive integer greater than or equal to 0, and the predetermined threshold is a positive integer greater than 0. Therefore, when the access control restriction factor is 0, it is always in a restricted state. Therefore, the access control restriction factor of the uplink transmission-restricted terminal may be set to 0.
  • the access control of uplink transmission can be performed on the uplink transmission-restricted terminal.
  • the controlling the terminal not to send an access request includes:
  • the access request is not sent.
  • the terminal can use the configured access control restriction parameter to start the timing of the restriction timer.
  • the terminal stops the access request for uplink transmission until the timing of the restriction timer stops. . Therefore, the timing duration of the restriction timer can be used to determine the duration for restricting the uplink access request of the terminal.
  • the timing duration of the restriction timer can be set to be infinite.
  • the access control restriction parameter further includes a timing parameter for the terminal to start the restriction timer.
  • the timing parameter can configure the terminal to start the restriction timer when it acquires the access control restriction parameters, or configure the terminal to start the restriction timer when initiating an access request; for another example, configure the terminal to start the restriction timer after receiving the paging message and send After the access request, the barring timer is started.
  • the access control restriction parameter may not include a timing parameter that specifically indicates the start timing of the restriction timer, and the terminal may start the timer for the first time after receiving the access control restriction parameter by default, and then periodically start the restriction timer, or, after the last uplink transmission sending or downlink transmission reception is completed, the limit timer is automatically started.
  • the setting of the above-mentioned access control restriction factor can also be used to realize the restriction on the uplink access request of the uplink transmission-restricted terminal.
  • the value of the access control restriction factor can be understood as the probability of allowing access, and the base station can adjust the value of the access control restriction factor to allow access at any time according to resource usage or network congestion. For example, if the base station allows a terminal with an access control restriction factor greater than 2 to access, if the access control restriction factor of the terminal is 1, the access request will be restricted.
  • the terminal before receiving the paging message, the terminal can always restrict the access request for uplink transmission.
  • the barring timer and the access control barring factor can be set at the same time, and the timing duration of the barring timer is infinite and the value of the access control barring factor is 0. Access is restricted according to any of the access control parameters.
  • the barring timer and the access control barring factor can be set at the same time, and the timing duration of the barring timer is small, and the value of the access control barring factor is 0, then even if the value of the barring timer is 0 When the timing ends, the access request of the terminal is also restricted because the value of the access control restriction factor is 0.
  • the barring timer and the access control barring factor can be set at the same time, and the timing duration of the barring timer is infinite, and the value of the access control barring factor is not 0, then, even if the access control bar
  • the restriction factor satisfies the adjustment of the access, and is also restricted because the timing of the restriction timer expires.
  • the setting barring timer and the access control barring factor may be set at the same time, and the timing duration of the barring timer is not infinite, and the value of the access control barring factor is not 0 at the same time. At this time, if the timing of the barring timer expires, it may be determined whether or not to allow access according to the value of the access control barring factor. This situation may be applicable to situations where network resources are sufficient, or the terminal needs to be debugged or updated.
  • the access control in different situations can be implemented for the terminal by using the setting of the access control parameters.
  • the value of the timing duration is greater than or equal to the predetermined period duration of DRX or eDRX.
  • the terminal can always keep the uplink transmission restricted state before receiving the paging message. Therefore, the timing duration of the restriction timer can be set according to the paging cycle.
  • NB-IoT Nearband Internet of Things
  • PSM Power Saving Mode, power saving mode
  • DRX Discontinuous Reception, discontinuous reception mode
  • eDRX Extended DRX, extended discontinuous mode
  • DRX and eDRX have larger paging cycles. For example, in DRX mode, in every DRX cycle, the terminal detects whether downlink services arrive in sequence.
  • the terminal monitors the paging channel according to the DRX cycle (the DRX cycle is relatively short, it can be considered that the terminal does not sleep) in the PTW.
  • the maximum paging cycle of eDRX may be extended to 2621.44s.
  • the timing duration for which the uplink transmission restricted terminal restricts the uplink access may be set according to the predetermined period duration of the above-mentioned DRX or eDRX.
  • the timing duration of the restriction timer may be set to be greater than or equal to the duration of the maximum paging cycle of the eDRX.
  • it can also be directly set to infinity, so that the terminal stops the timing of the limiting timer only after receiving the paging message.
  • the value of the access control restriction factor for the uplink transmission restricted terminal is the second value.
  • the access control restriction parameter is used to restrict the uplink transmission request of the uplink transmission restricted terminal, and the value of the access control restriction factor may be set as the second value for restricting the uplink transmission.
  • the value of the access control restriction factor of the uplink transmission restricted terminal is set to a value smaller than a predetermined threshold. At this time, only the uplink transmission of the terminal whose value of the access control restriction factor is greater than or equal to the predetermined threshold is allowed. For the uplink transmission restricted terminal whose value of the access control restriction factor is less than the predetermined threshold, the access is restricted.
  • the access control restriction parameters include:
  • the restricted call category for which access is restricted is restricted.
  • the uplink access of the specified category can also be restricted by the method of access control based on the call category.
  • Call categories include the above-mentioned “source signaling”, “emergency call”, “source multimedia voice call”, “source multimedia video call”, “Internet Protocol-based SMS transmission”, “source short message”, “terminal
  • source signaling emergency call
  • source multimedia voice call emergency multimedia voice call
  • source multimedia video call emergency multimedia video call
  • Internet Protocol-based SMS transmission e.g., Internet Protocol-based SMS transmission
  • source short message e.g., a call type determined based on the terminal type and the access identifier of the terminal.
  • access control restriction parameters can be used to determine whether or not to restrict access.
  • the access control restriction parameter may include a restricted call category that restricts access.
  • the terminal can specifically restrict some categories of call requests, and may allow other categories of call requests, so that it is convenient to use in various application in scenarios and terminal types.
  • the access control barring parameters may not include the barring call category.
  • the terminal determines whether it belongs to a predetermined restricted call category based on the access category or user identity of the access request of the terminal. If it belongs to the restricted call category, the corresponding access control restriction parameters are used for access control.
  • the controlling the terminal not to send an access request before receiving the paging message according to the access control restriction parameter includes:
  • the terminal In response to the call type that triggers access being a restricted call type, the terminal is controlled not to send an access request before receiving a paging message according to the access control restriction parameter.
  • a restricted call type for which access is restricted may be determined.
  • the sending of the access request of the restricted call category is restricted before the paging message is received.
  • the restricted call category is indicated by at least one of the following:
  • Terminal type identifier Terminal type identifier
  • the above-mentioned restricted call category can be indicated by the access category or the access identifier defined in the access control mechanism.
  • an access request indicating that the access class is "source call” is a restricted call class.
  • the access request sent by the user whose access identifier is 0 is of the restricted call category.
  • the above-mentioned terminal type identifier can also be used for identification.
  • the terminal type is configured as an IoT device
  • the access request of the terminal corresponding to the IoT device identifier is input into the above-mentioned restricted call category.
  • the method further includes:
  • Step S201 in response to the call type that triggers access being an emergency call type, send an access request; wherein the emergency call type is different from the restricted call type.
  • the terminal may have some requirements for alarms, emergency calls, etc., for example, an alarm call initiated when the terminal fails, or an emergency call manually initiated by a user in an emergency, and so on.
  • the emergency call category a communication connection needs to be established in time. Therefore, the emergency call category may not be limited to the time duration of the restriction timer of the access control mechanism or the setting of the access control restriction factor. That is to say, if the call type triggered by the interruption is an emergency call type, the access is allowed, and the interruption can send an access request.
  • the access control mechanism will not limit the access of the emergency call category too much, thereby improving the security performance of the terminal.
  • the method further includes:
  • the access control restriction parameter of the uplink transmission restricted terminal may be acquired from the base station through the downlink, may also be pre-stored locally in the terminal, and may also be determined according to a communication protocol. After acquiring the above-mentioned access control restriction parameters, the terminal can perform access control on uplink data according to the access control restriction parameters, and determine whether to allow an uplink access request to be initiated.
  • the acquiring the default access control restriction parameter of the uplink transmission restricted terminal includes:
  • the default access control restriction parameter of the uplink transmission restricted terminal is acquired.
  • the access control restriction parameter is placed in other system messages, and at this time, the terminal itself can actively acquire other system messages to obtain it. After failing to acquire other system messages, the receiving of the access control restriction parameters fails, and the access control determination can be implemented by using the terminal's own default access control restriction parameters.
  • the method includes the following steps:
  • Step S301 requesting the base station to deliver other system messages
  • Step S302 failure to receive access control restriction parameters in other system messages
  • Step S303 Acquire default access control restriction parameters.
  • the default access control restriction parameters are recorded at the uplink restricted terminal or specified by a communication protocol.
  • the default access control restriction parameters may be specified based on the communication protocol, and there is no need to receive an indication from the base station. It can also be written locally in the terminal in the form of firmware, and the terminal can directly make an access control decision according to the default access control restriction parameters when needed.
  • an embodiment of the present disclosure provides an access control method, which is applied to a base station and includes:
  • Step S401 according to the type of the terminal, determine the access control restriction parameter
  • Step S402 Send the access control restriction parameter to the terminal, where the access control restriction parameter is used to control the terminal not to send an access request before receiving the paging message.
  • the base station may deliver different access control restriction parameters for different types of terminals.
  • the corresponding access control restriction parameters for restricting access are issued, so as to realize the control of the terminal with limited uplink transmission that does not require an independent uplink mode, and restrict the uplink transmission by Restrict the terminal to send an access request before receiving the paging message.
  • the types of terminals include: terminals that do not perform uplink transmissions until receiving downlink transmissions.
  • the uplink transmission-restricted terminal has been described in detail in the above embodiments, and will not be repeated here.
  • the access control restriction parameter includes at least one of the following:
  • Timing duration of the restriction timer wherein the restriction timer is used to determine the duration of restricted access of the terminal
  • Access control restriction factor includes: a first value for allowing terminal access or a second value for restricting terminal access.
  • the base station may deliver the access control restriction parameter including the timing duration of the restriction timer and/or the access control restriction factor to the terminal.
  • the terminal restricts initiating an access request based on the timing duration of the timer or determines whether to restrict initiating an access request based on whether the control factor is a value that allows access.
  • the timing duration may be configured to be infinite, or greater than the maximum paging cycle, or the like.
  • the access control restriction factor may be configured as a second value for restricting terminal access.
  • the value of the timing duration is greater than or equal to the predetermined period duration of DRX or eDRX.
  • the paging cycle can be covered, so that the terminal can restrict access before the paging message arrives.
  • the value of the access control restriction factor for the uplink transmission restricted terminal is the second value.
  • the base station may independently configure the access control restriction factor to be the second value, thereby restricting the access request of the uplink transmission-restricted terminal.
  • the delivering access control restriction parameters according to the terminal type includes:
  • the access control restriction parameter is delivered to the terminal.
  • the base station may use a system message or an RRC message to deliver the access control restriction parameter to the terminal.
  • the system message may include system message one (SIB1), system message two (SIB2), etc.
  • the RRC message may be a dedicated message notifying the terminal to suspend, for example: "RRC connection release" (RRC connection release) message.
  • the access control duration in the access control mechanism is extended.
  • the extensible access control duration is infinite, for example, the timing duration of the restriction timer is set to be infinite, and the timing is only stopped when a paging message is received, but not before a paging message is received. timing so that access is always restricted.
  • the access control duration can be set to be the maximum duration specified by the protocol of the eDRX cycle. For example, if the protocol specifies that the eDRX cycle is 2.56*1024 seconds, the timing duration of the restriction timer is set to 2.56* 1024 seconds.
  • the access control duration may be set to be greater than the maximum duration specified in the protocol of the eDRX cycle.
  • a default configuration is added for a designated call type, and the default configuration parameter is an access restriction parameter. That is to say, based on the default configuration, the UE may not send an access request specifying a call category by default.
  • the configuration methods can include the following:
  • the default configuration of configuring the specified call category includes limiting the timing duration of the timer to infinity
  • the default configuration of configuring the specified call category includes that the access control barring factor (Barring Factor) is 0, where the control factor is an identification parameter indicating the access priority of the UE, and the UE with the control factor less than the specified threshold is barring access, UEs greater than or equal to the specified threshold are allowed access. Therefore, when the control factor is set to 0, it is always smaller than the threshold set by the access control decision, so it is always in a state of restricted access;
  • Barring Factor the access control barring factor
  • the above designated call category is determined according to the following methods.
  • Access Categories For example, specify that the access request corresponding to the access category of the above-mentioned "originating calls" is the specified call category of the above default configuration;
  • the access request of the UE whose specified access identity is 0 belongs to the specified call category of the above-mentioned default configuration
  • the access request of this type of IoT device belongs to the specified call category of the above default configuration.
  • the above default configuration can be sent to the UE by using a system message or notified to the UE by using a dedicated message.
  • system message includes but is not limited to system message one (SIB1)
  • the dedicated message can be an RRC (Radio Resource Control, radio resource control) message, for example, a message notifying the UE of suspension: "RRC connection release (RRC connection release)" information.
  • RRC Radio Resource Control, radio resource control
  • the above-mentioned default configuration can also be based on protocol regulations, or be written in the UE in the form of firmware;
  • the UE can also actively obtain the effective access control decision parameters through the system message of "on demand (obtain when needed)", and when the system message fails to be obtained, it will automatically according to the above.
  • the default configuration is processed.
  • the initiation of uplink services of a specified type of UE or a call category specified by the UE is restricted, that is, when the uplink service data of the UE arrives, the access request is processed through the default restricted access configuration after it is initiated.
  • the time duration of the incoming limit timer is infinite, that is, it is in a pending (Pending) state until a paging message is received.
  • an embodiment of the present disclosure further provides an access control apparatus 600, which is applied to a terminal and includes:
  • a first determining module 601 configured to determine an access control restriction parameter, where the access control restriction parameter is associated with the type of the terminal;
  • the control module 602 is configured to control the terminal not to send an access request before receiving the paging message according to the access control restriction parameter.
  • the types of terminals include: terminals that do not perform uplink transmissions until receiving downlink transmissions.
  • the access control restriction parameter includes at least one of the following:
  • Timing duration of the restriction timer wherein the restriction timer is used to determine the duration of restricted access of the terminal
  • Access control restriction factor includes: a first value for allowing terminal access or a second value for restricting terminal access.
  • control module includes:
  • a starting module configured to start a restriction timer according to the access control restriction parameter; within the timing period of the restriction timer, not to send the access request;
  • the access request is not sent.
  • the value of the timing duration is: greater than or equal to the predetermined period duration of the discontinuous reception mode DRX or the extended discontinuous reception mode eDRX.
  • the value of the access control restriction factor for the terminal is the second value.
  • the access control restriction parameters include:
  • the restricted call category for which access is restricted is restricted.
  • control module includes:
  • the control submodule is configured to control the terminal not to send an access request before receiving the paging message according to the access control restriction parameter in response to the call type that triggers access being a restricted call type.
  • the restricted call category is indicated by at least one of the following:
  • Terminal type identifier Terminal type identifier
  • the apparatus further includes:
  • a sending module configured to send an access request in response to a call type that triggers access being an emergency call type, wherein the emergency call type is different from the restricted call type.
  • the apparatus further includes:
  • a receiving module configured to receive the access control restriction parameter for the terminal
  • a first obtaining module configured to obtain the default access control restriction parameter of the terminal
  • the second obtaining module is configured to obtain the access control restriction parameter of the terminal according to the communication protocol.
  • the first obtaining module includes:
  • the acquiring submodule is configured to acquire the default access control and restriction parameters of the terminal in response to the failure to receive the access control restriction parameters of the terminal.
  • the default access control restriction parameters are recorded at the terminal or specified by a communication protocol.
  • an embodiment of the present disclosure further provides an access control apparatus 700, which is applied to a base station and includes:
  • the second determining module 701 is configured to determine the access control restriction parameter according to the type of the terminal;
  • the sending module 702 is configured to send the access control restriction parameter to the terminal, wherein the access control restriction parameter is used to control the terminal not to send an access request before receiving the paging message.
  • the types of terminals include: terminals that do not perform uplink transmissions until receiving downlink transmissions.
  • the access control restriction parameter includes at least one of the following:
  • Timing duration of the restriction timer wherein the restriction timer is used to determine the duration of restricted access of the terminal
  • Access control restriction factor includes: a first value for allowing terminal access or a second value for restricting terminal access.
  • the value of the timing duration is greater than or equal to the predetermined period duration of DRX or eDRX.
  • the value of the access control restriction factor for the terminal is the second value.
  • the sending module includes:
  • the sending sub-module is configured to use a system message or a radio resource control RRC message to send the access control restriction parameter to the terminal.
  • Embodiments of the present disclosure provide a communication device, including a processor, a transceiver, a memory, and an executable program stored in the memory and capable of being run by the processor, wherein the processor executes the execution of any of the foregoing technical solutions when running the executable program. Access control method.
  • the communication device may be the aforementioned base station or UE.
  • the processor may include various types of storage media, which are non-transitory computer storage media that can continue to memorize and store information on the communication device after the power is turned off.
  • the communication device includes a base station or a user equipment.
  • the processor may be connected to the memory through a bus or the like, and is used to read the executable program stored on the memory.
  • Embodiments of the present disclosure provide a non-transitory computer-readable storage medium, where an executable program is stored in the computer storage medium; after the executable program is executed by a processor, any technology involved in the embodiments of the present disclosure can be implemented method shown in the scheme.
  • FIG. 8 is a structural block diagram of a communication device provided by an embodiment of the present disclosure.
  • the communication device may be a UE.
  • communication device 800 may be a mobile phone, computer, digital broadcast user equipment, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, and the like.
  • the communication device 800 may include at least one of the following components: a processing component 802, a memory 804, a power supply component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and Communication component 816.
  • the processing component 802 generally controls the overall operation of the communication device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include at least one processor 820 to execute instructions to perform all or part of the steps of the above-described methods. Additionally, processing component 802 may include at least one module that facilitates interaction between processing component 802 and other components. For example, processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operation of communication device 800 . Examples of such data include instructions for any application or method operating on the communication device 800, contact data, phonebook data, messages, pictures, videos, and the like. Memory 804 may be implemented by any type of volatile or nonvolatile storage device or combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • Power supply component 806 provides power to various components of communication device 800 .
  • Power supply components 806 may include a power management system, at least one power supply, and other components associated with generating, managing, and distributing power to communication device 800 .
  • Multimedia component 808 includes a screen that provides an output interface between the communication device 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes at least one touch sensor to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense the boundaries of a touch or swipe action, but also detect wake-up time and pressure associated with the touch or swipe action.
  • the multimedia component 808 includes a front-facing camera and/or a rear-facing camera. When the communication device 800 is in an operating mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each of the front and rear cameras can be a fixed optical lens system or have focal length and optical zoom capability.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) that is configured to receive external audio signals when communication device 800 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or transmitted via communication component 816 .
  • audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to: home button, volume buttons, start button, and lock button.
  • Sensor assembly 814 includes at least one sensor for providing status assessment of various aspects of communication device 800 .
  • the sensor assembly 814 can detect the open/closed state of the device 800, the relative positioning of the components, such as the display and keypad of the communication device 800, the sensor assembly 814 can also detect the communication device 800 or a component of the communication device 800
  • the position of the communication device 800 changes, the presence or absence of user contact with the communication device 800, the orientation or acceleration/deceleration of the communication device 800, and the temperature change of the communication device 800.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 816 is configured to facilitate wired or wireless communication between communication device 800 and other devices.
  • Communication device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication.
  • NFC near field communication
  • the NFC module may be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • the communication device 800 may be implemented by at least one application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), field programmable gate An array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above method.
  • ASIC application specific integrated circuit
  • DSP digital signal processor
  • DSPD digital signal processing device
  • PLD programmable logic device
  • FPGA field programmable gate An array
  • controller microcontroller, microprocessor, or other electronic component implementation for performing the above method.
  • non-transitory computer-readable storage medium including instructions, such as a memory 804 including instructions, executable by the processor 820 of the communication device 800 to perform the method described above.
  • the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
  • an embodiment of the present disclosure shows the structure of another communication device.
  • the communication device may be the base station involved in the embodiment of the present disclosure.
  • the communication device 900 may be provided as a network device. 12
  • the communication device 900 includes a processing component 922, which further includes at least one processor, and a memory resource, represented by memory 932, for storing instructions executable by the processing component 922, such as an application program.
  • An application program stored in memory 932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to perform any of the aforementioned methods applied to the communication device.
  • the communication device 900 may also include a power supply assembly 926 configured to perform power management of the communication device 900, a wired or wireless network interface 950 configured to connect the communication device 900 to a network, and an input output (I/O) interface 958 .
  • Communication device 900 may operate based on an operating system stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Des modes de réalisation de la présente divulgation concernent un procédé et un appareil de commande d'accès, ainsi qu'un dispositif de communication et un support de stockage. Les modes de réalisation de la présente divulgation concernent un procédé de commande d'accès consistant à : déterminer un paramètre de restriction de commande d'accès, le paramètre de restriction de commande d'accès étant associé au type d'un terminal ; et amener le terminal à ne pas envoyer une demande d'accès avant de recevoir un message de radiomessagerie selon le paramètre de restriction de commande d'accès.
PCT/CN2020/103894 2020-07-23 2020-07-23 Procédé et appareil de commande d'accès, et support de stockage WO2022016474A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/103894 WO2022016474A1 (fr) 2020-07-23 2020-07-23 Procédé et appareil de commande d'accès, et support de stockage
CN202080001641.2A CN112020879B (zh) 2020-07-23 2020-07-23 接入控制方法及装置、存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/103894 WO2022016474A1 (fr) 2020-07-23 2020-07-23 Procédé et appareil de commande d'accès, et support de stockage

Publications (1)

Publication Number Publication Date
WO2022016474A1 true WO2022016474A1 (fr) 2022-01-27

Family

ID=73527503

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/103894 WO2022016474A1 (fr) 2020-07-23 2020-07-23 Procédé et appareil de commande d'accès, et support de stockage

Country Status (2)

Country Link
CN (1) CN112020879B (fr)
WO (1) WO2022016474A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918359A (zh) * 2020-07-03 2020-11-10 中兴通讯股份有限公司 接入控制方法、第一网络节点、第二网络节点及存储介质
US20240040477A1 (en) * 2020-12-07 2024-02-01 Beijing Xiaomi Mobile Software Co., Ltd. Communication methods, and user equipment
WO2022120751A1 (fr) * 2020-12-10 2022-06-16 北京小米移动软件有限公司 Procédé et appareil de communication, dispositif d'accès, terminal et support de stockage
KR20240090529A (ko) * 2021-10-19 2024-06-21 베이징 시아오미 모바일 소프트웨어 컴퍼니 리미티드 페이징 파라미터 결정 방법, 장치, 통신 기기 및 저장 매체
WO2023201724A1 (fr) * 2022-04-22 2023-10-26 Oppo广东移动通信有限公司 Procédé et appareil de communication sans fil, et dispositif

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469547A (zh) * 2010-11-04 2012-05-23 中兴通讯股份有限公司 终端接入的控制方法、终端和系统
CN103096495A (zh) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法和系统
CN110351872A (zh) * 2018-04-02 2019-10-18 夏普株式会社 接入控制方法及用户设备

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1885143A1 (fr) * 2006-08-04 2008-02-06 Research In Motion Limited Système et méthode pour répondre à un message d'appel pendant une restriction de communication
US20100112982A1 (en) * 2008-11-03 2010-05-06 Qualcomm Incorporated System and method to perform access control and paging using femto cells
EP3035737A1 (fr) * 2009-12-11 2016-06-22 Telefonaktiebolaget LM Ericsson (publ) Procédé et agencement dans un système de télécommunication
US20110310854A1 (en) * 2010-06-17 2011-12-22 Jialin Zou Method of determining access times for wireless communication devices
CN104126318A (zh) * 2012-05-15 2014-10-29 华为技术有限公司 接入控制方法及终端、接入网设备
CN105637957B (zh) * 2013-08-09 2019-05-17 瑞典爱立信有限公司 用于机器型通信的系统信息广播
US10630410B2 (en) * 2016-05-13 2020-04-21 Telefonaktiebolaget Lm Ericsson (Publ) Network architecture, methods, and devices for a wireless communications network
WO2019205113A1 (fr) * 2018-04-27 2019-10-31 北京小米移动软件有限公司 Procédé et dispositif pour obtenir un certificat de transaction électronique, et support de stockage
WO2020042009A1 (fr) * 2018-08-29 2020-03-05 北京小米移动软件有限公司 Procédé et appareil d'interdiction de contrôle d'accès
CN111328462A (zh) * 2020-02-10 2020-06-23 北京小米移动软件有限公司 一种寻呼处理方法、装置、通信设备及存储介质

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469547A (zh) * 2010-11-04 2012-05-23 中兴通讯股份有限公司 终端接入的控制方法、终端和系统
CN103096495A (zh) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法和系统
CN110351872A (zh) * 2018-04-02 2019-10-18 夏普株式会社 接入控制方法及用户设备

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LG ELECTRONICS INC.: "Access category based access barring for RRC_IDLE and RRC_INACTIVE", 3GPP TSG-RAN WG2 #100; R2-1713694, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 17 November 2017 (2017-11-17), Reno, USA; 20171127 - 20171201, XP051372357 *
LG ELECTRONICS INC.: "Access category based access barring for RRC_IDLE and RRC_INACTIVE", 3GPP TSG-RAN WG2 #99BIS; R2-1711385, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Prague, Czech Republic; 20171009 - 20171013, 29 September 2017 (2017-09-29), Prague, Czech Republic; 20171009 - 20171013, XP051355542 *
LG ELECTRONICS INC.: "Access category based access barring for RRC_IDLE and RRC_INACTIVE", 3GPP TSG-RAN WG2 AD HOC 0118; R2-1801375, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 12 January 2018 (2018-01-12), Vancouver, Canada; 20180122 - 20180126, XP051386785 *

Also Published As

Publication number Publication date
CN112020879A (zh) 2020-12-01
CN112020879B (zh) 2023-12-05

Similar Documents

Publication Publication Date Title
WO2022016474A1 (fr) Procédé et appareil de commande d'accès, et support de stockage
WO2022178832A1 (fr) Procédé et appareil de transmission d'informations et dispositif de communication et support de stockage
CN111727614B (zh) 终端状态切换处理、控制方法及装置、通信设备及存储介质
CN110622617B (zh) 信息处理方法、装置及计算机存储介质
WO2022104657A1 (fr) Procédé et appareil de brouillage d'informations de commande de liaison descendante, dispositif de communication et support de stockage
WO2021179130A1 (fr) Procédé et dispositif de traitement de communication
WO2022077372A1 (fr) Procédé et appareil de traitement d'informations de contrôle d'accès, et dispositif de communication et support de stockage
CN110495196B (zh) 能力参数处理方法及装置、通信设备及存储介质
WO2020237446A1 (fr) Procédé et appareil de surveillance, procédé et appareil d'émission de signalisation, dispositif de communication et support de stockage
WO2022032482A1 (fr) Procédé et appareil de gestion de ressources, dispositif de communication et support de stockage
EP4017040A1 (fr) Procédé et appareil de traitement de données, dispositif électronique et support d'informations
WO2022047799A1 (fr) Appareil et procédé de commande d'accès, et dispositif de communication et support de stockage
WO2022236498A1 (fr) Procédé et appareil de détection de défaillance de connexion, dispositif de communication et support de stockage
WO2022032581A1 (fr) Procédé et appareil d'envoi de transmission en liaison montante, procédé et appareil de réception de transmission en liaison montante, dispositif de communication et support
WO2022000203A1 (fr) Procédé et appareil de contrôle d'accès, et support de stockage
WO2023050362A1 (fr) Configuration de transmission en liaison descendante, procédé et appareil de réception, dispositif de communication et support de stockage
WO2023087151A1 (fr) Appareil et procédé de traitement d'information, dispositif de communication et support de stockage
WO2022205362A1 (fr) Procédé et appareil de traitement de radiomessagerie, dispositif de communication et support d'enregistrement
WO2022165778A1 (fr) Procédé et appareil de configuration de signal, dispositif de communication, et support de stockage
WO2022041016A1 (fr) Procédé et appareil de traitement de message de téléavertissement, et dispositif de communication et support de stockage
WO2022032693A1 (fr) Procédé et appareil de commande d'accès, dispositif de communication et support de stockage
WO2022236692A1 (fr) Procédé et appareil de traitement d'informations, dispositif de communication et support de stockage
WO2022213330A1 (fr) Procédé et appareil de transmission d'informations, dispositif de communication et support de stockage
WO2024138474A1 (fr) Procédé et appareil de radiomessagerie, dispositif de communication et support de stockage
WO2022000514A1 (fr) Procédé et appareil de contrôle d'accès, dispositif de communication et support de stockage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20946412

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20946412

Country of ref document: EP

Kind code of ref document: A1