WO2022022635A1 - 接入控制方法、装置、终端及网络设备 - Google Patents
接入控制方法、装置、终端及网络设备 Download PDFInfo
- Publication number
- WO2022022635A1 WO2022022635A1 PCT/CN2021/109231 CN2021109231W WO2022022635A1 WO 2022022635 A1 WO2022022635 A1 WO 2022022635A1 CN 2021109231 W CN2021109231 W CN 2021109231W WO 2022022635 A1 WO2022022635 A1 WO 2022022635A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access control
- terminal
- control parameter
- type
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 105
- 238000005259 measurement Methods 0.000 claims description 39
- 230000006870 function Effects 0.000 claims description 25
- 101150096310 SIB1 gene Proteins 0.000 claims description 24
- 238000004891 communication Methods 0.000 claims description 22
- 230000008569 process Effects 0.000 description 19
- 238000012545 processing Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 101150039363 SIB2 gene Proteins 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 2
- 238000004220 aggregation Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 102100031786 Adiponectin Human genes 0.000 description 1
- 101000775469 Homo sapiens Adiponectin Proteins 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/10—Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0048—Allocation of pilot signals, i.e. of signals known to the receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
Definitions
- the present application belongs to the field of communication technologies, and in particular, relates to an access control method, apparatus, terminal, and network equipment.
- NR New Radio
- NR New Radio
- the purpose of the embodiments of the present application is to provide an access control method, apparatus, terminal and network device, which can solve the problem of poor flexibility of current terminal access control.
- an access control method applied to a terminal, including:
- an access control method applied to a network device, including:
- an access control device including:
- a receiving module configured to receive the first access control parameter
- a determining module configured to determine a second access control parameter corresponding to the terminal based on the first access control parameter and a preset rule
- An executing module configured to execute an access control related operation according to the second access control parameter.
- an access control device including:
- a sending module for sending a first access control parameter and configuration information, where the configuration information is used to configure a preset rule, and the preset rule and the first access control parameter are used to determine the terminal the corresponding second access control parameter.
- a terminal in a fifth aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, when the program or instruction is executed by the processor.
- a network device comprising a processor, a memory, and a program or instruction stored on the memory and executable on the processor, the program or instruction being executed by the processor.
- a readable storage medium is provided, and a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the steps of the method described in the first aspect, or the The steps of the method of the second aspect.
- a chip in an eighth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a network device program or instruction, and the implementation is as described in the second aspect Methods.
- a computer software product is provided, the computer software product is stored in a non-volatile storage medium, the software product is configured to be executed by at least one processor to implement the first aspect The steps of the method, or the steps of implementing the method according to the second aspect.
- a communication device configured to perform the method of the first aspect, or to perform the method of the second aspect.
- the first access control parameter is received; the second access control parameter corresponding to the terminal is determined based on the first access control parameter and the preset rule; according to the second access control parameter
- the parameters perform access control related operations.
- the access control parameter corresponding to the terminal is determined based on the preset rule, so that the flexibility of terminal access control can be improved.
- FIG. 1 is a structural diagram of a network system to which an embodiment of the present application can be applied;
- FIG. 4 is one of the flowcharts of an access control apparatus provided by an embodiment of the present application.
- FIG. 5 is the second flowchart of an access control apparatus provided by an embodiment of the present application.
- FIG. 6 is a structural diagram of a communication device provided by an embodiment of the present application.
- FIG. 7 is a structural diagram of a terminal provided by an embodiment of the present application.
- FIG. 8 is a structural diagram of a network device provided by an embodiment of the present application.
- first, second and the like in the description and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and "first”, “second” distinguishes Usually it is a class, and the number of objects is not limited.
- the first object may be one or multiple.
- “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the associated objects are in an "or” relationship.
- LTE Long Term Evolution
- LTE-Advanced LTE-Advanced
- LTE-A Long Term Evolution
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- FDMA Frequency Division Multiple Access
- OFDMA Orthogonal Frequency Division Multiple Access
- SC-FDMA Single-carrier Frequency-Division Multiple Access
- system and “network” in the embodiments of the present application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies.
- NR New Radio
- NR terminology is used in most of the following description, although these techniques are also applicable to applications other than NR system applications, such as 6th generation ( 6th Generation, 6G) communication system.
- FIG. 1 shows a block diagram of a wireless communication system to which the embodiments of the present application can be applied.
- the wireless communication system includes a terminal 11 and a network device 12 .
- the terminal 11 may also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital computer Assistant (Personal Digital Assistant, PDA), handheld computer, netbook, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), mobile Internet device (Mobile Internet Device, MID), wearable device (Wearable Device) or vehicle-mounted device (Vehicle user equipment, VUE), pedestrian terminal (pedestrian user equipment, PUE) and other terminal-side equipment, wearable devices include: bracelets, headphones, glasses, etc.
- the network device 12 may be a base station or a core network, where the base station may be referred to as a Node B, an evolved Node B, an access point, a Base Transceiver Station (BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), Extended Service Set (Extended Service Set, ESS), Node B, Evolved Node B (evolved Node B, eNB), Home Node B, Home Evolved Node B, Wireless Local Area network, WLAN) access point, wireless fidelity (wireless fidelity, WiFi) node, transmitting and receiving point (Transmitting Receiving Point, TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the said The base station is not limited to specific technical vocabulary. It should be noted that, in the embodiments of the present application, only the base station in the NR system is used as
- a lightweight terminal can be called a reduced capability terminal (reduced capability UE, RedCap UE), or a lightweight terminal (light/lite UE). It is mainly suitable for wearable devices, industrial sensor terminals in factory environments, or video surveillance equipment. The following embodiments are referred to as the second type of terminal.
- Such terminals usually refer to devices with limited capabilities. Its reduced capability is reflected in many aspects, such as lower device complexity, smaller device size, weaker processing power, and smaller or fewer supportable features.
- the supported performance can be understood as at least one of the following: The number of supported carrier aggregation (Carrier Aggregation, CA), the number of supported receiving antennas, the maximum supported bandwidth and the supported peak rate, etc.
- a common terminal can be understood as a non-lightweight terminal, or a common type of terminal defined in Rel15 or Rel16. In the following embodiments, it is referred to as the first type of terminal.
- Initial network search including synchronization signal block (Synchronization Signal and PBCH block, SSB) synchronization and reception of system information. Specifically, receive the primary synchronization information (Primary Synchronization Signal, PSS) first, then receive the secondary synchronization information (Secondary Synchronization Signal, SSS), and then receive the physical broadcast channel (Physical broadcast channel, PBCH): obtain the SSB index, and PBCH demodulation The information in the reference signal (Demodulation Reference Signal, DMRS) and the master information block (Master Information Block, MIB).
- PSS Primary Synchronization Signal
- SSS Secondary Synchronization Signal
- SSS Secondary Synchronization Signal
- PBCH Physical broadcast channel
- PBCH Physical broadcast channel
- PBCH Physical broadcast channel
- PBCH Physical broadcast channel
- PBCH Physical broadcast channel
- DMRS Demodulation Reference Signal
- MIB Master Information Block
- a variety of access control schemes are defined in LTE, including: Access Class Barring (ACB), Extended Access Barring (EAB), Service Specific Access Control (Service specific access control) , SSAC) and application-specific congestion control for data communication (Application-specific congestion control for data communication, ACDC).
- ACDC Access Class Barring
- EAB Extended Access Barring
- SSAC Service Specific Access Control
- ACDC Application-specific congestion control for data communication
- a unified access control (UAC) is standardized.
- the access control of the terminal is realized by configuring the access control information corresponding to an ID on the network.
- FIG. 2 is a flowchart of an access control method provided by an embodiment of the present application. The method is applied to a terminal, as shown in FIG. 2, and includes the following steps:
- Step 201 receiving a first access control parameter
- the above-mentioned first access control parameter may be understood as access control parameter information, that is, a specific parameter value of the access control parameter.
- the access control of the terminal may include N access control parameters, the N access control parameters form a set of access control parameters, where the value of N may be a positive integer.
- the above-mentioned first access control parameter configures M sets of access control parameters for the terminal, where M is a positive integer.
- the first access control parameter is a set of access control parameters.
- the first access control parameter includes at least some access control parameters with at least two values.
- at least two sets of access control parameters are configured for the terminal through the first access control parameter.
- the first access control parameter may be M sets of access control parameters, wherein at least some of the access control parameters in the two different sets of access control parameters have different values (other access control parameters may exist depending on the same);
- the first access control parameter may include a set of access control parameters and at least one of the access control parameters (for example, there are L parameters) has two or more values. M sets of access control parameters can be obtained by replacing the values with the values of some of the access control parameters in the set of access control parameters.
- the terminal can obtain two sets of access control parameters based on the first access control parameter: A1, B1 and C1, and the other set is A1, B2 and C1.
- the above-mentioned first access control parameter includes at least one of the following:
- Radio Resource Control (RRC) connection establishment reason value
- Event information corresponding to access control is Event information corresponding to access control.
- Step 202 based on the first access control parameter and the preset rule, determine the second access control parameter corresponding to the terminal;
- the above-mentioned second access control parameter may be understood as access control parameter information, that is, a specific parameter value of the access control parameter. Further, the above-mentioned second access control parameter may be understood as a set of access control parameters.
- the above-mentioned preset rules may be configured by a network device, or may be stipulated by a protocol, which is not further limited herein. The above preset rules are used to determine the access control parameters corresponding to the terminal based on the relevant information of the terminal, so that the flexibility of the terminal access control can be improved.
- Step 203 Perform access control related operations according to the second access control parameter.
- the above-mentioned related operations may be set according to actual conditions. For example, in an embodiment, it may include but not limited to at least one of the following: whether to allow camping in the first cell; whether to prohibit access to the first cell or Forbid access to the first cell within a preset time; whether to access the first cell or not allow access attempts for the first cell; whether to perform cell selection or reselection.
- the cell where the cell is located may be understood as the above-mentioned first cell and may be understood as a neighboring cell or a serving cell.
- the first access control parameter is sent through a broadcast message, and the terminal may acquire the first access control parameter in the process of receiving the broadcasted system information.
- the first access control parameter may be sent through a broadcast message or an RRC message. That is to say, in this embodiment of the present application, the above-mentioned first access control parameter may be carried by at least one of the following: a system of a physical broadcast channel PBCH, a master information block MIB, and a first system information block (System Information Block, SIB). information, extended system information and dedicated RRC messages;
- SIB System Information Block
- the first SIB is the SIB corresponding to the first type of terminal.
- the first access control parameter is received; the second access control parameter corresponding to the terminal is determined based on the first access control parameter and the preset rule; according to the second access control parameter
- the parameters perform access control related operations.
- the access control parameter corresponding to the terminal is determined based on the preset rule, so that the flexibility of terminal access control can be improved.
- the access control method may be applied to the second type of terminals, to flexibly control the access of the second type of terminals, so as to avoid the access of a large number of second terminals to the first type of terminals. performance has an impact.
- the corresponding second access control parameter of the terminal is determined, including at least one of the following:
- the first access control parameter includes a set of access control parameters, adjust at least some parameters in the first access control parameter according to the preset rule to obtain the second access control parameter;
- the first access control parameter includes at least some of the access control parameters with at least two values
- the value of the parameter is used as the second access control parameter.
- the first access control parameter includes a set of access control parameters: the first cell configures a set of access control parameters for the terminal through the first access control parameter. It may be understood that the first access control parameter includes at least some of the access control parameters having at least two values: the first cell configures at least two sets of access control parameters for the terminal through the first access control parameter.
- the terminal corresponds to one set of access control parameters in state 1, and the terminal corresponds to another set of access control parameters in state 2; or the terminal with the first attribute corresponds to one set of access control parameters parameter, the terminal with the second attribute corresponds to another set of access control parameters.
- the terminal when the above-mentioned first access control parameter is used to indicate a set of access control parameters, assuming that the first access control parameter corresponds to state 1, when the current state of the terminal is state 1 , the terminal can determine that the first access control parameter is the second access control parameter, and when the current state of the terminal is state 2, adjust some or all of the control parameters in the first access control parameter to obtain the second access control parameter .
- first access control parameter when the above-mentioned first access control parameter is used to indicate the first set of access control parameters and the second set of access control parameters, it is assumed that the first access control parameter corresponds to state 1, and the terminal is currently When the state of the terminal is state 1, the terminal can determine that the first set of access control parameters is the second access control parameter, and when the current state of the terminal is state 2, the terminal can determine that the second set of access control parameters is the second access control parameter parameter.
- the first access control parameter when the above-mentioned first access control parameter is used to indicate a set of access control parameters, it is assumed that the first access control parameter corresponds to a terminal of the first attribute, then the first attribute of the The terminal may determine that the first access control parameter is the second access control parameter, and the terminal of the second attribute adjusts some or all of the control parameters in the first access control parameter to obtain the second access control parameter.
- the terminal of the first attribute may determine that the first set of access control parameters is the second access control parameter, and the terminal of the first attribute may determine that the second set of access control parameters is the second access control parameter.
- the above state can be understood as current state information of the terminal, for example, it can be represented by a reference signal measurement value or a change amount or the like.
- the above-mentioned attributes of a terminal can be understood as a certain type of terminal, and specific attribute-related information can be represented by measurement performance, type, category, application scenario, registration information, capability attribute, and supported slices.
- the preset rules include: determining the second access according to target information of the terminal and related parameters corresponding to the target information Control parameters; the target information includes at least one of the following: measurement performance, type, category, application scenario, registration information, capability attributes, and supported slices.
- the access control parameters of the terminal are determined by setting the target information and the relevant parameters corresponding to the target information, so that the access of the terminal can be flexibly controlled, so as to ensure that a large number of access systems of one type of terminal will not control the access of another terminal. The access performance of such terminals is affected.
- the above measurement performance includes a measurement value of a preset reference signal, or a measurement change value of the preset reference signal within a preset time period.
- the preset reference signal may include a synchronization signal block SSB, a channel state information reference signal (Channel State Information Reference Signal, CSI-RS), a positioning reference signal (Positioning Reference Signals, PRS), and a demodulation reference signal DMRS.
- CSI-RS Channel State Information Reference Signal
- PRS Positioning Reference Signals
- DMRS demodulation reference signal
- RSRP Reference Signal Received Power
- RSRQ Reference Signal Received Quality
- SINR Signal to Interference plus Noise Ratio
- RSSI RSRQ Signal Strength Indication
- the aforementioned capability attribute includes at least one of the following: capability (capability), capability set (capability set), function (feature), and feature set (feature set).
- At least one of the above target information and the related parameters is agreed by a protocol or configured by a network device.
- the information included in the above target information may be specified by a protocol or configured by a network device, and at the same time, relevant parameters corresponding to the specified information may also be specified by a protocol or by the network device.
- the relevant parameters may include at least one of the following: the comparison value of the measurement performance, the comparison value of the type, the comparison value of the category, the comparison value of the application scenario, the comparison value of the registration information, The contrast value of the capability attribute and the contrast value of the slice.
- the preset rules include at least one of the following:
- the category of the terminal is compared with the second reference value to determine the second access control parameter
- the application scenario of the terminal is compared with the fourth reference value, and the second access control parameter is determined;
- the registration information of the terminal is compared with the fifth reference value to determine the second access control parameter
- the capability attribute of the terminal is compared with a preset reference threshold to determine the second access control parameter
- the supported slice of the terminal is compared with the sixth reference value to determine the second access control parameter.
- the above-mentioned first reference value may be a reference threshold value, or one or more comparison values.
- the measurement value and/or measurement variation value of the reference signal corresponding to the measurement attribute may be compared with the first reference value.
- the measured value and/or the measured variation value of the signal is greater than the first reference value, it corresponds to a set of access control parameters; when the measured value and/or the measured variation value of the reference signal corresponding to the measurement attribute is less than or equal to the first reference signal In the case of a reference value, it corresponds to another set of access control parameters.
- different types correspond to different type values, for example, it can be an identification value or an index value of the type, the above-mentioned second reference value can be understood as a comparison value of types, and the type value corresponding to the type of the terminal is compared with the second reference value. The comparison is performed to determine the access control parameter corresponding to the current type of the terminal.
- the type value of the current type of the terminal is the first value, which corresponds to a set of access control parameters; the type value of the current type of the terminal is the second value, which corresponds to another set of access control parameters.
- one set of access control parameters may correspond to one or more types of comparison values, and the comparison value corresponding to one set of access control parameters is different from the comparison value corresponding to another set of access control parameters.
- different categories correspond to different category values, which can be, for example, the identification value or index value of the category.
- the third reference value can be understood as the comparison value of the category.
- the category value corresponding to the category of the terminal is compared with the third reference value.
- the comparison is performed to determine the access control parameter corresponding to the current category of the terminal.
- the category value of the current category of the terminal is the first value, which corresponds to a set of access control parameters; the category value of the current category of the terminal is the second value, which corresponds to another set of access control parameters.
- one set of access control parameters may correspond to one or more types of comparison values, and the comparison value corresponding to one set of access control parameters is different from the comparison value corresponding to another set of access control parameters.
- different application scenarios correspond to different application scenario values, for example, the identification value or index value of the application scenario, and the fourth reference value can be understood as the comparison value of the application scenario, and the application scenario corresponding to the application scenario of the terminal The value is compared with the fourth reference value to determine the access control parameter corresponding to the current application scenario of the terminal.
- the application scenario value of the current application scenario of the terminal is the first value, corresponding to a set of access control parameters; the application scenario value of the current application scenario of the terminal is the second value, corresponding to another set of access control parameters.
- a set of access control parameters may correspond to a comparison value of one or more application scenarios, and a comparison value corresponding to one set of access control parameters is different from a comparison value corresponding to another set of access control parameters.
- different contract information corresponds to different contract information values, for example, it can be an identification value or an index value of the contract information, and the fifth reference value can be understood as the comparison value of the contract information, and the contract information corresponding to the contract information of the terminal The value is compared with the fifth reference value to determine the access control parameter corresponding to the current subscription information of the terminal.
- the subscription information value of the terminal's current subscription information is a first value, corresponding to a set of access control parameters; the subscription information value of the terminal's current subscription information is a second value, corresponding to another set of access control parameters.
- one set of access control parameters may correspond to one or more comparison values of subscription information, and the comparison value corresponding to one set of access control parameters is different from the comparison value corresponding to another set of access control parameters.
- the above preset reference threshold may be understood as a comparison value of capability attributes. Comparing the value corresponding to the capability attribute with the preset reference threshold, when the value corresponding to the capability attribute is greater than the preset reference threshold, it corresponds to a set of access control parameters; when the value corresponding to the capability attribute is less than or equal to In the case of the preset reference threshold, it corresponds to another set of access control parameters.
- the preset condition when the preset condition is satisfied, it corresponds to one set of access control parameters, otherwise, it corresponds to another access control parameter.
- the preset condition includes at least one of the following:
- the bandwidth capability is less than 100MHz
- Antenna number capability is less than 4, equal to 2 or equal to 1;
- Peak rate capability is less than 100Mbps
- the processing delay capability is less than the preset time
- the number of supported carriers is less than a certain value
- the transmit power capability is less than a certain value.
- the above category may be defined according to feature set or capability set or different data rates.
- Different UE types can be defined according to feature set or capability set or different data rates.
- even the same category may correspond to different types, such as high-end terminals (high end UE) and low-end terminals (low end UE).
- high end UE high-end terminals
- low end UE low-end terminals
- it may be different categories or different types corresponding to different application scenarios, or terminals of the same type or the same type may be used in different application scenarios, such as wearable devices for personal business. and industrial sensors in the industrial field.
- low end UEs a distinction can also be made between low end wearables and low end industrial sensors.
- the above-mentioned subscription information generally refers to the subscription information (subscription information) of the UE, such as the corresponding subscription information of the operator in the subscriber identity module (subscriber identity module, SIM) card, including at least one of the following: SIM card type, SIM card Service type, SIM card tariff information, SIM card priority and operator's customer level, etc.
- SIM card type the subscription information of the operator in the subscriber identity module (subscriber identity module, SIM) card
- SIM card type subscriber identity module
- SIM card Service type subscriber identity module
- SIM card tariff information Ses identity module
- SIM card priority Ses customer level
- Operator's customer level etc.
- Different initial access resources can be configured to correspond to different subscription information.
- the above-mentioned sixth reference value can be understood as the comparison value of the slice, and the identifier of the slice can be compared with the comparison value, so that the second access corresponding to the terminal can be determined based on the slices supported by the current terminal control parameter.
- the slice supported by the terminal is slice 1, which corresponds to a set of access control parameters; the slice supported by the terminal is slice 2, which corresponds to another set of access control parameters.
- a set of access control parameters may correspond to a comparison value of one or more slices, and a comparison value corresponding to one set of access control parameters is different from a comparison value corresponding to another set of access control parameters.
- the second access control parameter may be independently determined through one type of information in the above target information, or the second access control parameter may be jointly determined through multiple types of information in the above target information.
- each type of information is used to determine a value corresponding to one or more access control parameters in a set of access control parameters, and different information is used to determine a value corresponding to different access control parameters.
- the extended system information includes at least one of the following:
- SIBx System information corresponding to the second type of terminal in SIBx, x is an integer greater than 1, the SIBx belongs to the second SIB, and the second SIB is the SIB corresponding to the second type of terminal; in this example , SIBx is the newly added SIB based on the existing SIB;
- SIBy System information corresponding to the second type of terminal in SIBy, y is an integer greater than 1, and the SIBy belongs to the first SIB.
- SIBy is a new SIB in an existing SIB.
- An extended information field (IE) the extended information field includes system information related to the second type of terminal.
- SIB1-extend the above-mentioned first SIB1 may be referred to as SIB1-extend, which means that the traditional SIB1 is extended on the basis of adding additional extras used to indicate that the second type of terminal is allowed to be supported or the second type of terminal is allowed to access.
- SIB1 system message the system information corresponding to the second type of terminal in the first SIB1 is used to indicate any of the following:
- the terminal may determine at least one of the following based on the system information corresponding to the second type of terminal: whether the first cell supports the second type of terminal; whether the first cell allows the second type of terminal to access or camp on .
- the above-mentioned SIBx may be understood as other SIBs except the second SIB1 in the newly added second SIB, which may be used to carry system information corresponding to the second type of terminal.
- system information at least one of the following may be displayed or implicitly indicated: whether the first cell supports terminals of the second type; whether the first cell allows access or camping of terminals of the second type.
- the above SIBy can be understood as the SIB obtained based on the SIB extension after the traditional first SIB1, for example, the SIB obtained based on the extension of a certain SIB in the traditional SIB2, SIB3, SIB4... SIBn, the SIBy can be called SIB2 -light, SIB3-light, SIB4-light... SIBn-light.
- the SIBy includes system information required by the first cell for the second type of terminal, through which the system information can implicitly or explicitly indicate at least one of the following: whether the first cell supports the second type of terminal; the first Whether the cell allows access or camping of the second type of terminal.
- the system information corresponding to the second type of terminal in the SIBx and the SIBy is used to indicate: the system information required by the second type of terminal to access or camp on the cell where the terminal is located.
- the terminal when SIBx or SIBy indicates the system information required by the second type of terminal to access or camp on the cell, the terminal may understand that the first cell is a second type of terminal; The first cell allows access or camping of terminals of the second type, and an access or camping process may be performed at this time.
- the SIBx or SIBy may also include other indications, which are used to indicate at least one of the following: whether the first cell supports the second type of terminal; whether the first cell allows the second type of terminal access or stay.
- x and y may be indicated by some information elements (Information element, IE) of the traditional SIB1 message.
- Information element Information element
- the performing an access control-related operation according to the second access control parameter includes at least one of the following:
- the first operation includes at least one of the following:
- the second operation includes at least one of the following:
- An access attempt is permitted for the first cell.
- FIG. 3 is a flowchart of another access control method provided by an embodiment of the present application. The method is applied to a network device. As shown in FIG. 3, the method includes the following steps:
- Step 301 Send a first access control parameter and configuration information, where the configuration information is used to configure a preset rule, and the preset rule and the first access control parameter are used to determine a second access control corresponding to the terminal parameter.
- the first access control parameter satisfies any of the following:
- the first access control parameter includes a set of access control parameters
- At least some of the first access control parameters have at least two values.
- the preset rule includes: determining the second access control parameter according to target information of the terminal and related parameters corresponding to the target information; the target information includes at least one of the following: measurement performance, Types, categories, application scenarios, registration information, capability attributes, and supported slices.
- the measurement performance includes a measurement value of a preset reference signal, or a measurement variation value of the preset reference signal within a preset time period.
- the preset reference signal includes at least one of the following: a synchronization signal block SSB, a channel state information reference signal CSI-RS, a positioning reference signal PRS, and a demodulation reference signal DMRS.
- the capability attribute includes at least one of the following: capability, capability set, function, and function set.
- At least one of the target information and the related parameters is agreed by a protocol or configured by a network device.
- the relevant parameters include at least one of the following: the comparison value of the measurement performance, the comparison value of the type, the comparison value of the category, the comparison value of the application scenario, the comparison value of the registration information , the threshold value of the capability attribute, and the contrast value of the slice.
- the first access control parameter is carried by at least one of the following: a physical broadcast channel PBCH, a master information block MIB, system information of the first SIB, extended system information, and a dedicated RRC message;
- the first SIB is the SIB corresponding to the first type of terminal.
- the extended system information includes at least one of the following:
- System information corresponding to the second type of terminal in the SIBx where x is an integer greater than 1, the SIBx belongs to the second SIB, and the second SIB is the SIB corresponding to the second type of terminal;
- y is an integer greater than 1, and the SIBy belongs to the first SIB.
- system information corresponding to the second type of terminal in the first SIB1 is used to indicate any of the following:
- the system information corresponding to the second type of terminal in the SIBx and the SIBy is used to indicate: the system information required by the second type of terminal to access or camp on the cell where the terminal is located.
- the second type of terminal is a lightweight terminal.
- this embodiment is an implementation of the network device corresponding to the embodiment shown in FIG. 2 .
- the execution body may be an access control apparatus, or a control module in the access control apparatus for executing the access control method.
- the access control device provided by the embodiment of the present application is described by taking an access control device executing an access control method as an example.
- FIG. 4 is a structural diagram of an access control apparatus provided by an embodiment of the present application. As shown in FIG. 4, the access control apparatus 400 includes:
- a receiving module 401 configured to receive a first access control parameter
- a determination module 402 configured to determine a second access control parameter corresponding to the terminal based on the first access control parameter and a preset rule
- the executing module 403 is configured to execute an access control related operation according to the second access control parameter.
- the determining module 403 is specifically configured to perform at least one of the following:
- the first access control parameter includes a set of access control parameters, adjust at least some parameters in the first access control parameter according to the preset rule to obtain the second access control parameter;
- the first access control parameter includes at least some of the access control parameters with at least two values
- the value of the parameter is used as the second access control parameter.
- the preset rule includes: determining the second access control parameter according to target information of the terminal and related parameters corresponding to the target information; the target information includes at least one of the following: measurement performance, Types, categories, application scenarios, registration information, capability attributes, and supported slices.
- the measurement performance includes a measurement value of a preset reference signal, or a measurement variation value of the preset reference signal within a preset time period.
- the preset reference signal includes at least one of the following: a synchronization signal block SSB, a channel state information reference signal CSI-RS, a positioning reference signal PRS, and a demodulation reference signal DMRS.
- the capability attribute includes at least one of the following: capability, capability set, function, and function set.
- At least one of the target information and the related parameters is agreed by a protocol or configured by a network device.
- the relevant parameters include at least one of the following: the comparison value of the measurement performance, the comparison value of the type, the comparison value of the category, the comparison value of the application scenario, the comparison value of the registration information , the threshold value of the capability attribute, and the contrast value of the slice.
- the first access control parameter is carried by at least one of the following: a physical broadcast channel PBCH, a master information block MIB, system information of the first SIB, extended system information, and a dedicated RRC message;
- the first SIB is the SIB corresponding to the first type of terminal.
- the extended system information includes at least one of the following:
- System information corresponding to the second type of terminal in the SIBx where x is an integer greater than 1, the SIBx belongs to the second SIB, and the second SIB is the SIB corresponding to the second type of terminal;
- y is an integer greater than 1, and the SIBy belongs to the first SIB.
- system information corresponding to the second type of terminal in the first SIB1 is used to indicate any of the following:
- the system information corresponding to the second type of terminal in the SIBx and the SIBy is used to indicate: the system information required by the second type of terminal to access or camp on the cell where the terminal is located.
- the second type of terminal is a lightweight terminal.
- the first access control parameter includes at least one of the following:
- Event information corresponding to access control is Event information corresponding to access control.
- the executing module 403 is specifically configured to execute at least one of the following:
- the first operation includes at least one of the following:
- the second operation includes at least one of the following:
- An access attempt is permitted for the first cell.
- the access control apparatus provided in this embodiment of the present application can implement each process of the method embodiment in FIG. 2 , and to avoid repetition, details are not described here.
- FIG. 5 is a structural diagram of an access control apparatus provided by an embodiment of the present application. As shown in FIG. 5, the access control apparatus 500 includes:
- the sending module 501 is configured to send a first access control parameter and configuration information, where the configuration information is used to configure a preset rule, and the preset rule and the first access control parameter are used to determine the second access control parameter corresponding to the terminal. Access control parameters.
- the first access control parameter satisfies any of the following:
- the first access control parameter includes a set of access control parameters
- At least some of the first access control parameters have at least two values.
- the preset rule includes: determining the second access control parameter according to target information of the terminal and related parameters corresponding to the target information; the target information includes at least one of the following: measurement performance, Types, categories, application scenarios, registration information, capability attributes, and supported slices.
- the measurement performance includes a measurement value of a preset reference signal, or a measurement variation value of the preset reference signal within a preset time period.
- the preset reference signal includes at least one of the following: a synchronization signal block SSB, a channel state information reference signal CSI-RS, a positioning reference signal PRS, and a demodulation reference signal DMRS.
- the capability attribute includes at least one of the following: capability, capability set, function, and function set.
- At least one of the target information and the related parameters is agreed by a protocol or configured by a network device.
- the relevant parameters include at least one of the following: the comparison value of the measurement performance, the comparison value of the type, the comparison value of the category, the comparison value of the application scenario, the comparison value of the registration information , the threshold value of the capability attribute, and the contrast value of the slice.
- the first access control parameter is carried by at least one of the following: a physical broadcast channel PBCH, a master information block MIB, system information of the first SIB, extended system information, and a dedicated RRC message;
- the first SIB is the SIB corresponding to the first type of terminal.
- the extended system information includes at least one of the following:
- System information corresponding to the second type of terminal in the SIBx where x is an integer greater than 1, the SIBx belongs to the second SIB, and the second SIB is the SIB corresponding to the second type of terminal;
- y is an integer greater than 1, and the SIBy belongs to the first SIB.
- system information corresponding to the second type of terminal in the first SIB1 is used to indicate any of the following:
- the system information corresponding to the second type of terminal in the SIBx and the SIBy is used to indicate: the system information required by the second type of terminal to access or camp on the cell where the terminal is located.
- the second type of terminal is a lightweight terminal.
- the access control apparatus provided in this embodiment of the present application can implement each process of the method embodiment in FIG. 3 , which is not repeated here to avoid repetition.
- the access control apparatus in this embodiment of the present application may be an apparatus, or may be a component, an integrated circuit, or a chip in a terminal.
- the device may be a mobile terminal or a non-mobile terminal.
- the mobile terminal may include, but is not limited to, the types of terminals 11 listed above, and the non-mobile terminal may be a server, a network attached storage (NAS), a personal computer (personal computer, PC), a television ( television, TV), teller machine, or self-service machine, etc., which are not specifically limited in the embodiments of the present application.
- the access control device in this embodiment of the present application may be a device with an operating system.
- the operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
- the access control apparatus provided in the embodiments of the present application can implement the various processes implemented by the method embodiments in FIG. 2 to FIG. 3 , and achieve the same technical effect. To avoid repetition, details are not described here.
- an embodiment of the present application further provides a communication device 600, including a processor 601, a memory 602, a program or instruction stored in the memory 602 and executable on the processor 601,
- a communication device 600 including a processor 601, a memory 602, a program or instruction stored in the memory 602 and executable on the processor 601,
- the program or instruction is executed by the processor 601
- each process of the foregoing access control method embodiment is implemented, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
- FIG. 7 is a schematic diagram of a hardware structure of a terminal implementing various embodiments of the present application.
- the terminal 700 includes but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, and a processor 710.
- the terminal 700 may also include a power supply (such as a battery) for supplying power to various components, and the power supply may be logically connected to the processor 710 through a power management system, so as to manage charging, discharging, and power consumption through the power management system management and other functions.
- a power supply such as a battery
- the terminal structure shown in FIG. 7 does not constitute a limitation on the terminal, and the terminal may include more or less components than those shown in the figure, or combine some components, or arrange different components, which will not be repeated here.
- the input unit 704 may include a graphics processor (Graphics Processing Unit, GPU) 7041 and a microphone 7042. Such as camera) to obtain still pictures or video image data for processing.
- the display unit 706 may include a display panel 7061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
- the user input unit 707 includes a touch panel 7071 and other input devices 7072 .
- the touch panel 7071 is also called a touch screen.
- the touch panel 7071 may include two parts, a touch detection device and a touch controller.
- Other input devices 7072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which are not described herein again.
- the radio frequency unit 701 receives the downlink data from the network device, and then processes it to the processor 710; in addition, sends the uplink data to the network device.
- the radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
- Memory 709 may be used to store software programs or instructions as well as various data.
- the memory 709 may mainly include a storage program or instruction area and a storage data area, wherein the stored program or instruction area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.) and the like.
- the memory 709 may include a high-speed random access memory, and may also include a non-volatile memory, wherein the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM) , PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- ROM Read-Only Memory
- PROM programmable read-only memory
- PROM erasable programmable read-only memory
- Erasable PROM Erasable PROM
- EPROM electrically erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- flash memory for example at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
- the processor 710 may include one or more processing units; optionally, the processor 710 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, application programs or instructions, etc., Modem processors mainly deal with wireless communications, such as baseband processors. It can be understood that, the above-mentioned modulation and demodulation processor may not be integrated into the processor 710.
- the radio frequency unit 701 is configured to receive the first access control parameter
- the processor 710 is configured to determine a second access control parameter corresponding to the terminal based on the first access control parameter and a preset rule; and perform an access control related operation according to the second access control parameter.
- the above-mentioned processor 710 and the radio frequency unit 701 can implement each process implemented by the terminal in the method embodiment of FIG. 2 , which is not repeated here to avoid repetition.
- the embodiment of the present application further provides a network device.
- the network device 800 includes: an antenna 801 , a radio frequency device 802 , and a baseband device 803 .
- the antenna 801 is connected to the radio frequency device 802 .
- the radio frequency device 802 receives information through the antenna 801, and sends the received information to the baseband device 803 for processing.
- the baseband device 803 processes the information to be sent and sends it to the radio frequency device 802
- the radio frequency device 802 processes the received information and sends it out through the antenna 801 .
- the above-mentioned frequency band processing apparatus may be located in the baseband apparatus 803, and the method performed by the network device in the above embodiment may be implemented in the baseband apparatus 803, where the baseband apparatus 803 includes a processor 804 and a memory 805.
- the baseband device 803 may include, for example, at least one baseband board on which multiple chips are arranged. As shown in FIG. 8 , one of the chips is, for example, the processor 804 , which is connected to the memory 805 to call the program in the memory 805 to execute The network devices shown in the above method embodiments operate.
- the baseband device 803 may further include a network interface 806 for exchanging information with the radio frequency device 802, and the interface is, for example, a common public radio interface (CPRI).
- CPRI common public radio interface
- the network device in the embodiment of the present invention further includes: instructions or programs stored in the memory 805 and executable on the processor 804, and the processor 804 invokes the instructions or programs in the memory 805 to execute the modules shown in FIG. 5 to execute method, and achieve the same technical effect, in order to avoid repetition, it is not repeated here.
- Embodiments of the present application further provide a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, each process of the foregoing access control method embodiment is implemented, and can achieve The same technical effect, in order to avoid repetition, will not be repeated here.
- the processor is the processor in the electronic device described in the foregoing embodiments.
- the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
- An embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a network device program or instruction to implement the above access control method
- the chip includes a processor and a communication interface
- the communication interface is coupled to the processor
- the processor is configured to run a network device program or instruction to implement the above access control method
- the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip, or the like.
- the disclosed apparatus and method may be implemented in other manners.
- the apparatus embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present disclosure may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- modules, units, and subunits can be implemented in one or more Application Specific Integrated Circuits (ASIC), Digital Signal Processor (DSP), Digital Signal Processing Device (DSP Device, DSPD) ), Programmable Logic Device (PLD), Field-Programmable Gate Array (FPGA), general-purpose processor, controller, microcontroller, microprocessor, in other electronic units or combinations thereof.
- ASIC Application Specific Integrated Circuits
- DSP Digital Signal Processor
- DSP Device Digital Signal Processing Device
- DSPD Digital Signal Processing Device
- PLD Programmable Logic Device
- FPGA Field-Programmable Gate Array
- the technologies described in the embodiments of the present disclosure may be implemented through modules (eg, procedures, functions, etc.) that perform the functions described in the embodiments of the present disclosure.
- Software codes may be stored in memory and executed by a processor.
- the memory can be implemented in the processor or external to the processor.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (39)
- 一种接入控制方法,应用于终端,包括:接收第一接入控制参数;基于所述第一接入控制参数和预设规则,确定所述终端对应的第二接入控制参数;根据所述第二接入控制参数执行接入控制相关操作。
- 根据权利要求1所述的方法,其中,基于所述第一接入控制参数和预设规则,确定所述终端的对应的第二接入控制参数,包括以下至少一项:在所述第一接入控制参数包括一套接入控制参数的情况下,按照所述预设规则对所述第一接入控制参数中的至少部分参数进行调整,获得所述第二接入控制参数;在所述第一接入控制参数包括至少部分接入控制参数有至少两个取值的情况下,按照所述预设规则在所述第一接入控制参数中选择所述终端的接入控制参数的取值,作为所述第二接入控制参数。
- 根据权利要求2所述的方法,其中,所述预设规则包括:根据所述终端的目标信息以及所述目标信息对应的相关参数确定所述第二接入控制参数;所述目标信息包括以下至少一项:测量性能、类型、类别、应用场景、注册信息、能力属性和支持的切片。
- 根据权利要求3所述的方法,其中,所述测量性能包括预设参考信号的测量值,或者在预设时间段内所述预设参考信号的测量变化值。
- 根据权利要求4所述的方法,其中,所述预设参考信号包括以下至少一项:同步信号块SSB、信道状态信息参考信号CSI-RS、定位参考信号PRS和解调参考信号DMRS。
- 根据权利要求3所述的方法,其中,所述能力属性包括以下至少一项:能力、能力集、功能和功能集。
- 根据权利要求3所述的方法,其中,所述目标信息和所述相关参数中的至少一者由协议约定或者网络设备配置。
- 根据权利要求7所述的方法,其中,所述相关参数包括以下至少一项: 所述测量性能的对比值、所述类型的对比值、所述类别对比值、所述应用场景的对比值、所述注册信息的对比值、能力属性的门限值和所述切片的对比值。
- 根据权利要求1所述的方法,其中,所述第一接入控制参数通过以下至少一项承载:物理广播信道PBCH、主信息块MIB、第一系统信息块SIB的系统信息、扩展的系统信息和专用无线资源控制RRC消息;其中,所述第一SIB为第一类终端对应的SIB。
- 根据权利要求9所述的方法,其中,所述扩展的系统信息包括以下至少一项:第一SIB1中与第二类终端对应的系统信息,所述第一SIB1归属于所述第一SIB;SIBx中与所述第二类终端对应的系统信息,x为大于1的整数,所述SIBx归属于第二SIB,所述第二SIB为所述第二类终端对应的SIB;SIBy中与所述第二类终端对应的系统信息,y为大于1的整数,所述SIBy归属于所述第一SIB。
- 根据权利要求10所述的方法,其中,所述第一SIB1中与所述第二类终端对应的系统信息用于指示以下任一项:支持所述第二类终端的系统信息;允许所述第二类终端驻留或接入的系统信息。
- 根据权利要求10所述的方法,其中,所述SIBx和所述SIBy中与所述第二类终端对应的系统信息用于指示:所述第二类终端接入或驻留所在小区所需系统信息。
- 根据权利要求10所述的方法,其中,所述第二类终端为轻量级终端。
- 根据权利要求1所述的方法,其中,所述第一接入控制参数包括以下至少一项:接入控制类型;接入控制公共陆地移动网络信息;接入控制的概率参数;接入控制禁止接入因子;接入控制的时长相关信息;接入控制对应的标识信息;接入控制对应的类别信息;接入控制等级信息;无线资源控制RRC连接建立原因值;接入尝试类型;接入控制对应的事件信息。
- 根据权利要求1所述的方法,其中,所述根据所述第二接入控制参数执行接入控制相关操作包括以下至少一项:在根据所述第二接入控制参数确定第一小区禁止接入的情况下,执行第一操作;在根据所述第二接入控制参数确定所述第一小区不被禁止接入的情况下,执行第二操作;其中,所述第一操作包括以下至少一项:不允许在所述第一小区驻留;禁止接入所述第一小区或在预设时间内禁止接入所述第一小区;不接入所述第一小区或者针对所述第一小区不允许进行接入尝试;进行小区选择或重选;所述第二操作包括以下至少一项:允许在所述第一小区驻留;不禁止接入所述第一小区;允许接入所述第一小区;针对所述第一小区允许进行接入尝试。
- 一种接入控制方法,应用于网络设备,包括:发送第一接入控制参数和配置信息,所述配置信息用于配置预设规则,所述预设规则和所述第一接入控制参数用于确定终端对应的第二接入控制参数。
- 根据权利要求16所述的方法,其中,所述第一接入控制参数满足以下任一项:所述第一接入控制参数包括一套接入控制参数;所述第一接入控制参数至少部分接入控制参数有至少两个取值。
- 根据权利要求16所述的方法,其中,所述预设规则包括:根据所述终端的目标信息以及所述目标信息对应的相关参数确定所述第二接入控制参数;所述目标信息包括以下至少一项:测量性能、类型、类别、应用场景、注册信息、能力属性和支持的切片。
- 根据权利要求18所述的方法,其中,所述测量性能包括预设参考信号的测量值,或者在预设时间段内所述预设参考信号的测量变化值。
- 根据权利要求19所述的方法,其中,所述预设参考信号包括以下至少一项:同步信号块SSB、信道状态信息参考信号CSI-RS、定位参考信号PRS和解调参考信号DMRS。
- 根据权利要求18所述的方法,其中,所述能力属性包括以下至少一项:能力、能力集、功能和功能集。
- 根据权利要求18所述的方法,其中,所述目标信息和所述相关参数中的至少一者由协议约定或者网络设备配置。
- 根据权利要求22所述的方法,其中,所述相关参数包括以下至少一项:所述测量性能的对比值、所述类型的对比值、所述类别对比值、所述应用场景的对比值、所述注册信息的对比值、能力属性的门限值和所述切片的对比值。
- 根据权利要求16所述的方法,其中,所述第一接入控制参数通过以下至少一项承载:物理广播信道PBCH、主信息块MIB、第一系统信息块SIB的系统信息、扩展的系统信息和专用RRC消息;其中,所述第一SIB为第一类终端对应的SIB。
- 根据权利要求24所述的方法,其中,所述扩展的系统信息包括以下至少一项:第一SIB1中与第二类终端对应的系统信息,所述第一SIB1归属于所述第一SIB;SIBx中与所述第二类终端对应的系统信息,x为大于1的整数,所述SIBx归属于第二SIB,所述第二SIB为所述第二类终端对应的SIB;SIBy中与所述第二类终端对应的系统信息,y为大于1的整数,所述SIBy归属于所述第一SIB。
- 根据权利要求25所述的方法,其中,所述第一SIB1中与所述第二类终端对应的系统信息用于指示以下任一项:支持所述第二类终端的系统信息;允许所述第二类终端驻留或接入的系统信息。
- 根据权利要求25所述的方法,其中,所述SIBx和所述SIBy中与所述第二类终端对应的系统信息用于指示:所述第二类终端接入或驻留所在小区所需系统信息。
- 根据权利要求25所述的方法,其中,所述第二类终端为轻量级终端。
- 一种接入控制装置,包括:接收模块,用于接收第一接入控制参数;确定模块,用于基于所述第一接入控制参数和预设规则,确定所述终端对应的第二接入控制参数;执行模块,用于根据所述第二接入控制参数执行接入控制相关操作。
- 根据权利要求29所述的装置,其中,所述确定模块具体用于执行以下至少一项:在所述第一接入控制参数包括一套接入控制参数的情况下,按照所述预设规则对所述第一接入控制参数中的至少部分参数进行调整,获得所述第二接入控制参数;在所述第一接入控制参数包括至少部分接入控制参数有至少两个取值的情况下,按照所述预设规则在所述第一接入控制参数中选择所述终端的接入控制参数的取值,作为所述第二接入控制参数。
- 根据权利要求30所述的装置,其中,所述预设规则包括:根据所述终端的目标信息以及所述目标信息对应的相关参数确定所述第二接入控制参数;所述目标信息包括以下至少一项:测量性能、类型、类别、应用场景、注册信息、能力属性和支持的切片。
- 一种接入控制装置,包括:发送模块,用于发送第一接入控制参数和配置信息,所述配置信息用于 配置预设规则,所述预设规则和所述第一接入控制参数用于确定终端对应的第二接入控制参数。
- 根据权利要求32所述的装置,其中,所述第一接入控制参数满足以下任一项:所述第一接入控制参数包括一套接入控制参数;所述第一接入控制参数至少部分接入控制参数有至少两个取值。
- 根据权利要求32所述的装置,其中,所述预设规则包括:根据所述终端的目标信息以及所述目标信息对应的相关参数确定所述第二接入控制参数;所述目标信息包括以下至少一项:测量性能、类型、类别、应用场景、注册信息、能力属性和支持的切片。
- 一种通信设备,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至28中任一项所述的接入控制方法中的步骤。
- 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至28中任一项所述的接入控制方法中的步骤。
- 一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行网络设备程序或指令,实现如权利要求16至28中任一项所述的接入控制方法。
- 一种计算机软件产品,所述计算机软件产品被存储在非易失的存储介质中,所述软件产品被配置成被至少一个处理器执行以实现如权利要求1至28中任一项所述的接入控制方法中的步骤。
- 一种通信设备,所述通信设备被配置成用于执行如权利要求1至28中任一项所述的接入控制方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020237006685A KR20230045035A (ko) | 2020-07-31 | 2021-07-29 | 접근 제어 방법, 장치, 단말 및 네트워크 기기 |
EP21850025.4A EP4192182A4 (en) | 2020-07-31 | 2021-07-29 | ACCESS CONTROL METHOD AND APPARATUS, AND NETWORK TERMINAL AND DEVICE |
US18/159,409 US20230164681A1 (en) | 2020-07-31 | 2023-01-25 | Access control method and apparatus, terminal, and network device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010763505.9A CN114071646B (zh) | 2020-07-31 | 2020-07-31 | 接入控制方法、装置、终端及网络设备 |
CN202010763505.9 | 2020-07-31 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/159,409 Continuation US20230164681A1 (en) | 2020-07-31 | 2023-01-25 | Access control method and apparatus, terminal, and network device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022022635A1 true WO2022022635A1 (zh) | 2022-02-03 |
Family
ID=80037665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/109231 WO2022022635A1 (zh) | 2020-07-31 | 2021-07-29 | 接入控制方法、装置、终端及网络设备 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230164681A1 (zh) |
EP (1) | EP4192182A4 (zh) |
KR (1) | KR20230045035A (zh) |
CN (1) | CN114071646B (zh) |
WO (1) | WO2022022635A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117812752A (zh) * | 2022-09-29 | 2024-04-02 | 华为技术有限公司 | 一种随机接入的参数选择方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761933A (zh) * | 2011-04-29 | 2012-10-31 | 中兴通讯股份有限公司 | Eab处理方法及装置、接入处理方法、装置及系统 |
CN107018555A (zh) * | 2016-01-28 | 2017-08-04 | 展讯通信(上海)有限公司 | 网络接入方法、网络接入控制方法、用户终端及基站 |
CN107018556A (zh) * | 2016-01-28 | 2017-08-04 | 展讯通信(上海)有限公司 | 业务处理方法及基站 |
CN108271213A (zh) * | 2017-01-04 | 2018-07-10 | 华为技术有限公司 | 通信控制方法、非授权传输方法及装置 |
US20190261261A1 (en) * | 2018-02-22 | 2019-08-22 | Sharp Laboratories Of America, Inc. | Access control methods and apparatus for radio systems |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103392372B (zh) * | 2011-02-23 | 2018-02-06 | 瑞典爱立信有限公司 | 无线电网络节点和用户设备之间的接入限制信息的传送 |
WO2014106334A1 (zh) * | 2013-01-05 | 2014-07-10 | 华为技术有限公司 | 小区接入控制方法、基站、终端及系统 |
WO2017166221A1 (zh) * | 2016-03-31 | 2017-10-05 | 华为技术有限公司 | 无线接入控制方法、装置及系统 |
WO2018012904A1 (en) * | 2016-07-13 | 2018-01-18 | Samsung Electronics Co., Ltd. | Access control method and apparatus for use in mobile communication |
CN108282751A (zh) * | 2017-01-06 | 2018-07-13 | 电信科学技术研究院 | 一种接入控制方法及装置 |
CN108347746B (zh) * | 2017-01-23 | 2024-05-03 | 中兴通讯股份有限公司 | 接入控制方法、接入网网元及用户设备 |
CN109151802B (zh) * | 2017-06-15 | 2020-10-16 | 维沃移动通信有限公司 | 一种接入控制方法、基站和终端 |
CN111066346B (zh) * | 2017-09-28 | 2022-03-29 | 华为技术有限公司 | 接入控制方法和装置 |
CN109803317B (zh) * | 2017-11-17 | 2022-06-24 | 华为技术有限公司 | 一种通信方法和装置 |
WO2021159492A1 (zh) * | 2020-02-14 | 2021-08-19 | 北京小米移动软件有限公司 | 接入控制方法、装置、通信设备及存储介质 |
-
2020
- 2020-07-31 CN CN202010763505.9A patent/CN114071646B/zh active Active
-
2021
- 2021-07-29 EP EP21850025.4A patent/EP4192182A4/en active Pending
- 2021-07-29 KR KR1020237006685A patent/KR20230045035A/ko active Search and Examination
- 2021-07-29 WO PCT/CN2021/109231 patent/WO2022022635A1/zh active Application Filing
-
2023
- 2023-01-25 US US18/159,409 patent/US20230164681A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761933A (zh) * | 2011-04-29 | 2012-10-31 | 中兴通讯股份有限公司 | Eab处理方法及装置、接入处理方法、装置及系统 |
CN107018555A (zh) * | 2016-01-28 | 2017-08-04 | 展讯通信(上海)有限公司 | 网络接入方法、网络接入控制方法、用户终端及基站 |
CN107018556A (zh) * | 2016-01-28 | 2017-08-04 | 展讯通信(上海)有限公司 | 业务处理方法及基站 |
CN108271213A (zh) * | 2017-01-04 | 2018-07-10 | 华为技术有限公司 | 通信控制方法、非授权传输方法及装置 |
US20190261261A1 (en) * | 2018-02-22 | 2019-08-22 | Sharp Laboratories Of America, Inc. | Access control methods and apparatus for radio systems |
Non-Patent Citations (1)
Title |
---|
See also references of EP4192182A4 * |
Also Published As
Publication number | Publication date |
---|---|
KR20230045035A (ko) | 2023-04-04 |
US20230164681A1 (en) | 2023-05-25 |
CN114071646B (zh) | 2023-04-07 |
EP4192182A1 (en) | 2023-06-07 |
EP4192182A4 (en) | 2023-11-29 |
CN114071646A (zh) | 2022-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190379469A1 (en) | Network symbol display in dual connectivity regions | |
US11032770B2 (en) | Wake-up-radio discovery frame | |
WO2022022634A1 (zh) | 接入控制方法、装置及通信设备 | |
WO2022022636A1 (zh) | 初始接入方法及装置、终端及网络侧设备 | |
WO2012127279A1 (en) | Switching cells on and off on a need basis in a wireless communications system | |
WO2022228526A1 (zh) | 移动性管理的配置方法、装置、终端、网络侧设备及介质 | |
WO2022028475A1 (zh) | 参考信号测量方法、终端及网络侧设备 | |
US20230164681A1 (en) | Access control method and apparatus, terminal, and network device | |
US11368859B2 (en) | Remote management of displayed network technology symbols | |
US20230232268A1 (en) | Measurement method, measurement apparatus, terminal, and network device | |
WO2022022685A1 (zh) | 接入控制方法、终端及网络侧设备 | |
WO2023029031A1 (en) | New radio low power wakeup radio | |
US20220303973A1 (en) | SRS Antenna Switching Enhancement | |
WO2023025015A1 (zh) | 随机接入资源选择、配置方法、装置、终端及网络侧设备 | |
WO2022007928A1 (zh) | 辅助信息处理方法、辅助信息发送方法及相关设备 | |
US20240163730A1 (en) | Initial bandwidth part determining method and apparatus, and related device | |
WO2022068727A1 (zh) | 传输处理方法、终端及网络侧设备 | |
WO2024055298A1 (en) | Technologies for cell selection and reselection in network energy saving networks | |
WO2022068866A1 (zh) | 工作区域变更方法、终端及网络侧设备 | |
WO2023274072A1 (zh) | 小区评估方法、装置、终端、中继和存储介质 | |
WO2023078251A1 (zh) | 信息获取方法、装置及终端 | |
US20240205761A1 (en) | User equipment mobility based on network slice considerations | |
WO2023011535A1 (zh) | 低移动性状态的确定方法、装置、终端及网络侧设备 | |
WO2022068728A1 (zh) | 配置方法及装置、终端及网络侧设备 | |
JP2024516908A (ja) | 要求情報の送信方法、ue及びネットワーク側機器 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21850025 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20237006685 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021850025 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2021850025 Country of ref document: EP Effective date: 20230228 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |