WO2022022685A1 - 接入控制方法、终端及网络侧设备 - Google Patents
接入控制方法、终端及网络侧设备 Download PDFInfo
- Publication number
- WO2022022685A1 WO2022022685A1 PCT/CN2021/109635 CN2021109635W WO2022022685A1 WO 2022022685 A1 WO2022022685 A1 WO 2022022685A1 CN 2021109635 W CN2021109635 W CN 2021109635W WO 2022022685 A1 WO2022022685 A1 WO 2022022685A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- type
- access control
- sib
- access
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 97
- 101150096310 SIB1 gene Proteins 0.000 claims description 40
- 230000006870 function Effects 0.000 claims description 26
- 238000004891 communication Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 10
- 230000000694 effects Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 101150039363 SIB2 gene Proteins 0.000 description 4
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Definitions
- the present application belongs to the field of communication technologies, and in particular relates to an access control method, a terminal and a network side device.
- the current New Radio (NR) system access control does not distinguish between different types of user terminals (User Equipment, UE), and all UEs share the same set of access control information. When a large number of lightweight terminals are accessed, it will affect the access control of ordinary UEs, such as problems such as long access delay.
- UE User Equipment
- the purpose of the embodiments of this application is to provide an access control method, a terminal, and a network-side device, which can solve the problem that in the prior art, all terminals of different types share the same set of access control parameters, resulting in a large number of terminals of a certain type accessing Afterwards, it will affect the access control of another type of terminal.
- an access control method including: obtaining a first access control parameter for a first type of terminal, wherein the first access control parameter is different from a second access control parameter corresponding to a second type of terminal ; the first type of terminal performs access control according to the first access control parameter.
- an access control apparatus applied to a first type of terminal, including: an acquisition module configured to acquire a first access control parameter, wherein the first access control parameter is different from the second type a second access control parameter corresponding to the terminal; an access control module configured to perform access control according to the first access control parameter.
- an access control method is provided, applied to a network side device, including: configuring corresponding access control parameters for different types of terminals.
- an access control apparatus which is applied to a network side device and includes: a configuration module configured to configure corresponding access control parameters for different types of terminals.
- a terminal in a fifth aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, when the program or instruction is executed by the processor.
- a network side device in a sixth aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, the program or instruction being executed by the The processor implements the steps of the method as described in the third aspect when executed.
- a readable storage medium is provided, and a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the steps of the method described in the first aspect, or the The steps of the method described in the third aspect.
- a chip in an eighth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a network-side device program or instruction, and implements the method described in the first aspect. the method described above, or implement the method described in the third aspect.
- the first type of terminal may obtain the corresponding first access control parameter to perform access control, and the first access control parameter is different from the second access control parameter corresponding to the second type of terminal, That is, different types of terminals can obtain corresponding access control parameters, which solves the problem that all terminals of different types share a set of the same access control parameters in the prior art, resulting in a large number of terminals of one type having access to another type of terminals. access control issues.
- FIG. 1 shows a block diagram of a wireless communication system to which an embodiment of the present application can be applied
- FIG. 2 is a flowchart 1 of an access control method according to an embodiment of the present application.
- FIG. 3 is a second flowchart of an access control method according to an embodiment of the present application.
- FIG. 4 is a schematic structural diagram 1 of an access control apparatus according to an embodiment of the present application.
- FIG. 5 is a second schematic structural diagram of an access control apparatus according to an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a communication device according to an embodiment of the present application.
- FIG. 7 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
- FIG. 8 is a schematic diagram of a hardware structure of a network side device implementing an embodiment of the present application.
- second the terms “second”, “second” and the like in the description and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It is to be understood that data so used may be interchanged under appropriate circumstances so that embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and "second", “second” distinguishes Usually it is one type, and the number of objects is not limited. For example, the second object may be one or multiple.
- “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the associated objects are in an "or” relationship.
- LTE Long Term Evolution
- LTE-Advanced LTE-Advanced
- LTE-A Long Term Evolution-Advanced
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- FDMA Frequency Division Multiple Access
- OFDMA Orthogonal Frequency Division Multiple Access
- SC-FDMA Single-carrier Frequency-Division Multiple Access
- system and “network” in the embodiments of the present application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies.
- NR New Radio
- the following description describes a New Radio (NR) system for example purposes, and NR terminology is used in most of the description below, although these techniques are also applicable to applications other than NR system applications, such as 6th generation ( 6th Generation , 6G) communication system.
- 6th generation 6th Generation
- FIG. 1 shows a block diagram of a wireless communication system to which the embodiments of the present application can be applied.
- the wireless communication system includes a terminal 11 and a network-side device 12 .
- the terminal 11 may also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital computer Assistant (Personal Digital Assistant, PDA), PDA, Netbook, Ultra-mobile Personal Computer (UMPC), Mobile Internet Device (MID), Wearable Device (Wearable Device) or vehicle-mounted device (VUE), pedestrian terminal (PUE) and other terminal-side devices, wearable devices include: bracelets, headphones, glasses, etc.
- PDA Personal Digital Assistant
- MID Mobile Internet Device
- MID Wearable Device
- VUE vehicle-mounted device
- PUE pedestrian terminal
- wearable devices include: bracelets, headphones, glasses, etc.
- the network side device 12 may be a base station or a core network, wherein the base station may be referred to as a Node B, an evolved Node B, an access point, a Base Transceiver Station (BTS), a radio base station, a radio transceiver, a basic service Set (Basic Service Set, BSS), Extended Service Set (Extended Service Set, ESS), Node B, Evolved Node B (eNB), Home Node B, Home Evolved Node B, WLAN Access Point, WiFi Node, Send Transmitting Receiving Point (TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms.
- the base station in the NR system is taken as an example, but the specific type of the base station is not limited.
- FIG. 2 is a flow chart 1 of the access control method according to the embodiment of the present application. As shown in FIG. 2 , the steps of the method include:
- Step S202 the first type of terminal acquires a first access control parameter, wherein the first access control parameter is different from the second access control parameter corresponding to the second type of terminal;
- Step S204 the first type of terminal performs access control according to the first access control parameter.
- the first type of terminal can obtain the corresponding first access control parameter for access control, and the first access control parameter is different from the second access control parameter corresponding to the second type of terminal , that is, different types of terminals can obtain the corresponding access control parameters, thus solving the problem that all terminals of different types in the prior art share a set of the same access control parameters, resulting in a large number of terminals of one type having access to another type of terminal.
- the problem that the access control of the terminal affects.
- the first type of terminal in the embodiment of the present application is a lightweight terminal
- the second type of terminal is an ordinary terminal
- a common terminal can be understood as a non-lightweight terminal, or a common type of terminal defined in Rel15 or Rel16.
- Lightweight terminal (light/lite UE, reduced capability UE, referred to as NR-light/Lite or RedCap UE), mainly suitable for wearable device (Wearable Device) or industrial sensor terminal (Industry Sensor) or video surveillance in the factory environment equipment.
- This type of terminal refers to devices with limited capabilities, such as lower device complexity, smaller device size, weaker processing capabilities, and fewer or fewer features that can be supported.
- first access control parameter and/or the second access control parameter in this embodiment of the present application may be configured by the network side or stipulated by a protocol. Further, the first access control parameter or the second access control parameter in this embodiment of the present application may include at least one of the following:
- Access control type for example, Unified Access Control (UAC), Access Class Barring (ACB), Access Barring (AB), applications for data communication Application Specific Congestion Control for Data Communication (ACDC).
- UAC Unified Access Control
- ACB Access Class Barring
- AB Access Barring
- ACDC Application Specific Congestion Control for Data Communication
- Access control prohibits the access factor, for example: AC_BarringFactor;
- Access identification information corresponding to access control for example: access ID;
- Access category information corresponding to access control for example: access category;
- Access control level information for example: AC_Barring forSpecialAC;
- Radio resource control RRC connection establishment cause (RRC establishment Cause);
- the first access control parameter and the second access control parameter include the above-mentioned various situations, but in a specific application scenario, since the first access control parameter corresponds to the first type of terminal, the first access control parameter corresponds to the first type of terminal.
- the second access control parameter corresponds to the second type of terminal, so the first access control parameter and the second access control parameter are different.
- the manner of performing access control for the first type of terminal involved in the foregoing step S204 according to the first access control parameter includes:
- Manner 1 Perform the first target operation when it is determined according to the first access control parameter that the cell in which the cell resides is prohibited from accessing or not allowed to access or does not support the first type of terminal;
- the first target operation includes at least one of the following: not allowed to camp on the cell; prohibited from accessing the cell or prohibited from accessing the cell within a preset time; not accessing the cell; not allowing an access attempt for the cell; select or reselect.
- the second target operation includes at least one of the following: allowing camping on the cell; not prohibiting access to the cell; allowing access to the cell; allowing an access attempt for the cell; and not performing cell selection or reselection.
- the access to the random access channel (RACH) initiated by the first type of terminal can be controlled through the first access control parameter, without being connected with the first type of terminal.
- Type II terminal rushes in, reducing the probability of RACH collision.
- the manner in which the first type of terminal involved in step S202 in the embodiment of the present application acquires the first access control parameter may include at least one of the following:
- the first type of terminal acquires a first access control parameter corresponding to the attribute of the first type of terminal; wherein the attribute of the first type of terminal includes at least one item: the capability of the first type of terminal, the first type of terminal capability set, the first type of terminal function (feature/functionality), the first type of terminal function set (feature/functionality set), the first type of terminal type category, the first type of terminal type type, The application scenario (use case) of the first type of terminal, and the subscription information of the first type of terminal;
- the above terminal type generally corresponds to the category (type) defined in the protocol, which may be defined according to feature set or capability set or different data rates (for example, data rate), such as cat.1, cat. 2,....
- Different types may also be defined according to feature set or capability set or different data rates, or for different types, even the same category may correspond to different types, such as high end UE and low end terminal (low end UE).
- different categories or different types may correspond to different application scenarios, or terminals of the same type or the same category may be used in different application scenarios (use cases), such as for personal business.
- the above-mentioned subscription information generally refers to the subscription information of the UE, such as the corresponding subscription information of the operator in the SIM card, including at least one of the following: SIM card type, SIM card service type, SIM card tariff information, SIM card priority Or the operator's customer level, etc., different initial access resources can be configured to correspond to different subscription information.
- the first type of terminal may be: the bandwidth capability is less than 700MHz, or the antenna quantity capability is less than 4/equal to 2/equal to 1, or the peak rate capability is less than 700Mbps, or the processing delay capability is less than the preset time, or support A terminal whose carrier quantity capability is less than the preset value, or whose transmit power capability is less than the preset value.
- the attributes of the first type of terminal are only examples, and the above-mentioned attribute values of the first type of terminal can be set or adjusted accordingly as required. That is, for a terminal of the same type, the corresponding initial access resource can also be selected according to its attribute value.
- the first type of terminal acquires the first access control parameter corresponding to the slice or the corresponding slice supported by the first type of terminal;
- the first type of terminal acquires the first access control parameter corresponding to the identification information of the first type of terminal, wherein the identification information includes at least one item: the identification of the first type of terminal, the identification group of the first type of terminal, the first The number segment of the terminal, the core network identifier corresponding to the terminal of the first type, and the identification group of the core network corresponding to the terminal of the first type;
- the first type of terminal acquires the first access control parameter corresponding to the type of the first type of terminal
- the first type of terminal acquires the first access control parameter corresponding to the type of the first type of terminal
- the first type of terminal acquires the first access control parameter corresponding to the application scenario of the first type of terminal.
- the attributes of the first type of terminal, the slices or corresponding slices supported by the first type of terminal, and the identification information of the first type of terminal may be configured by the network side or agreed by a protocol.
- the first type of terminal may obtain the first access control parameter through at least one of the following configuration messages:
- PBCH Physical Broadcast Channel
- MIB Master Information Block
- RRC Radio Resource Control
- the first SIB is a system information block SIB corresponding to the second type of terminal.
- the extended system information in this embodiment of the present application may further include at least one of the following:
- System information corresponding to the first type of terminal in the first SIB1, the first SIB1 is the SIB in the first SIB, and the first SIB is the SIB corresponding to the second type of terminal; that is, the extended system information may be: On the basis of SIB1, an additional SIB1 system message for indicating that the first type of terminal is allowed to be supported or the first type of terminal is allowed to be accessed is extended.
- SIBy is an integer greater than 1
- SIBy is the SIB in the first SIB
- the first SIB is the SIB corresponding to the second type of terminal.
- SIBy is a new extension information field (IE) in an existing SIB
- the extension information field includes system information related to the first type of terminal.
- SIBx System information corresponding to the first type of terminal in SIBx, where x is an integer greater than 1, SIBx is the SIB in the second SIB, and the second SIB is the SIB corresponding to the first type of terminal.
- SIBx is a newly added SIB based on the existing SIB.
- the above-mentioned first SIB1 may be referred to as SIB1-extend, which means that the traditional SIB1 is extended on the basis of adding an indication that supports the second type of terminal or allows the second type of terminal.
- Additional SIB1 system messages for access In other words, the system information corresponding to the first type of terminal in the first SIB1 is used to indicate any of the following: system information for supporting the first type of terminal; system information for allowing the first type of terminal to access or camp.
- the above-mentioned SIBx can be understood as other SIBs except the second SIB1 in the newly added second SIB, which can be used to carry system information corresponding to the first type of terminal.
- system information at least one of the following may be displayed or implicitly indicated: whether the first cell supports terminals of the first type; whether the first cell allows access or camping of terminals of the first type.
- the first cell is the terminal where the terminal of the first type is currently located.
- the above SIBy can be understood as the SIB obtained based on the SIB extension after the traditional first SIB1, for example, the SIB obtained based on the extension of a certain SIB in the traditional SIB2, SIB3, SIB4... SIBn, the SIBy can be called SIB2 -light, SIB3-light, SIB4-light... SIBn-light.
- the SIBy includes system information required for the cell where the first type of terminal is located, through which the system information can implicitly or explicitly indicate at least one of the following: whether the first cell supports the first type of terminal; whether the first cell allows the first type of terminal access or residency of the terminal.
- the system information corresponding to the first type of terminal in the SIBx and SIBy is used to indicate: the system information required by the first type of terminal to access or camp on the cell.
- the terminal when SIBx or SIBy indicates the system information required by the first type of terminal to access or camp on the cell, the terminal can be understood as the first cell to hold the first type of terminal; it can also be understood that the first cell allows For the access or residency of the first type of terminal, the access or residency process may be performed at this time.
- the SIBx or SIBy may also include other indications, which are used to indicate at least one of the following: whether the first cell supports the first type of terminals; whether the first cell allows the first type of terminals to be accessed or reside.
- x and y may be indicated by some information elements (Information element, IE) of the traditional SIB1 message.
- Information element Information element
- FIG. 2 describes the access control method of the present application from the terminal side, and the following describes the access control method of the present application from the network side.
- FIG. 3 is a second flowchart of an access control method according to an embodiment of the present application. The method is applied to a network side device. As shown in FIG. 3 , the steps of the method include:
- Step S302 configure corresponding access control parameters for different types of terminals.
- the method of configuring corresponding access control parameters for different types of terminals involved in the above step S302 may further include: configuring a first access control parameter for a first type of terminal, and configuring a second access control parameter for a second type of terminal.
- the terminal of the type configures the second access control parameter; wherein the terminal of the first type and the terminal of the second type are terminals of different types, and the first access control parameter is different from the second access control parameter.
- the first type of terminal in the embodiment of the present application is a lightweight terminal
- the second type of terminal is an ordinary terminal
- a common terminal can be understood as a non-lightweight terminal, or a common type of terminal defined in Rel15 or Rel16.
- Lightweight terminal (light/lite UE, reduced capability UE, referred to as NR-light/Lite or RedCap UE), mainly suitable for wearable device (Wearable Device) or industrial sensor terminal (Industry Sensor) or video surveillance in the factory environment equipment.
- This type of terminal refers to devices with limited capabilities, such as lower device complexity, smaller device size, weaker processing capabilities, and fewer or fewer features that can be supported.
- configuring the first access control parameter for the first type of terminal includes at least one of the following:
- the attribute of the first type of terminal includes at least one item: the capability of the first type of terminal, the first type of terminal The capability set of the terminal, the function of the first type of terminal (feature/functionality), the function set of the first type of terminal (feature/functionality set), the type of the first type of terminal, the type of the first type of terminal , the application scenario (use case) of the first type of terminal, and the subscription information of the first type of terminal;
- the above terminal type generally corresponds to the category (type) defined in the protocol, which may be defined according to feature set or capability set or different data rates (for example, data rate), such as cat.1, cat. 2,....
- Different types may also be defined according to feature set or capability set or different data rates, or for different types, even the same category may correspond to different types, such as high end UE and low end terminal (low end UE).
- different categories or different types may correspond to different application scenarios, or terminals of the same type or the same category may be used in different application scenarios (use cases), such as for personal business.
- the above-mentioned subscription information generally refers to the subscription information of the UE, such as the corresponding subscription information of the operator in the SIM card, including at least one of the following: SIM card type, SIM card service type, SIM card tariff information, SIM card priority Or the operator's customer level, etc., different initial access resources can be configured to correspond to different subscription information.
- the first type of terminal may be: the bandwidth capability is less than 700MHz, or the antenna quantity capability is less than 4/equal to 2/equal to 1, or the peak rate capability is less than 700Mbps, or the processing delay capability is less than the preset time, or support A terminal whose carrier quantity capability is less than the preset value, or whose transmit power capability is less than the preset value.
- the attributes of the first type of terminal are only examples, and the above-mentioned attribute values of the first type of terminal can be set or adjusted accordingly as required. That is, for a terminal of the same type, the corresponding initial access resource can also be selected according to its attribute value.
- the identification information includes at least one item: the identification of the first type of terminal, the identification group of the first type of terminal, the first type of terminal.
- the access control parameter in this embodiment of the present application includes at least one of the following:
- Access control type for example, Unified Access Control (UAC), Access Class Barring (ACB), Access Barring (AB), applications for data communication Application Specific Congestion Control for Data Communication (ACDC).
- UAC Unified Access Control
- ACB Access Class Barring
- AB Access Barring
- ACDC Application Specific Congestion Control for Data Communication
- Access control prohibits the access factor, for example: AC_BarringFactor;
- Access identification information corresponding to access control for example: access ID;
- Access category information corresponding to access control for example: access category;
- Access control level information for example: AC_Barring forSpecialAC;
- the following configuration messages may be used to configure corresponding access control parameters for terminals of different types:
- PBCH Physical Broadcast Channel
- MIB Master Information Block
- RRC Radio Resource Control
- the first SIB is the SIB corresponding to the second type of terminal.
- the extended system information in this embodiment of the present application may further include at least one of the following:
- System information corresponding to the first type of terminal in the first SIB1, the first SIB1 is the SIB in the first SIB, and the first SIB is the SIB corresponding to the second type of terminal; that is, the extended system information may be: On the basis of SIB1, an additional SIB1 system message for indicating that the first type of terminal is allowed to be supported or the first type of terminal is allowed to be accessed is extended.
- SIBy is an integer greater than 1
- SIBy is the SIB in the first SIB
- the first SIB is the SIB corresponding to the second type of terminal.
- SIBy is a new extension information field (IE) in an existing SIB
- the extension information field includes system information related to the first type of terminal.
- SIBx System information corresponding to the first type of terminal in SIBx, where x is an integer greater than 1, SIBx is the SIB in the second SIB, and the second SIB is the SIB corresponding to the first type of terminal.
- SIBx is a newly added SIB based on the existing SIB.
- the above-mentioned first SIB1 may be referred to as SIB1-extend, which means that the traditional SIB1 is extended on the basis of adding an indication that supports the second type of terminal or allows the second type of terminal.
- Additional SIB1 system messages for access In other words, the system information corresponding to the first type of terminal in the first SIB1 is used to indicate any of the following: system information for supporting the first type of terminal; system information for allowing the first type of terminal to access or camp.
- the above-mentioned SIBx can be understood as other SIBs except the second SIB1 in the newly added second SIB, which can be used to carry system information corresponding to the first type of terminal.
- system information at least one of the following may be displayed or implicitly indicated: whether the first cell supports terminals of the first type; whether the first cell allows access or camping of terminals of the first type.
- the first cell is the terminal where the terminal of the first type is currently located.
- the above SIBy can be understood as the SIB obtained based on the SIB extension after the traditional first SIB1, for example, the SIB obtained based on the extension of a certain SIB in the traditional SIB2, SIB3, SIB4... SIBn, the SIBy can be called SIB2 -light, SIB3-light, SIB4-light... SIBn-light.
- the SIBy includes system information required for the cell where the first type of terminal is located, through which the system information can implicitly or explicitly indicate at least one of the following: whether the first cell supports the first type of terminal; whether the first cell allows the first type of terminal access or residency of the terminal.
- the system information corresponding to the first type of terminal in the SIBx and SIBy is used to indicate: the system information required by the first type of terminal to access or camp on the cell.
- the terminal when SIBx or SIBy indicates the system information required by the first type of terminal to access or camp on the cell, the terminal can be understood as the first cell to hold the first type of terminal; it can also be understood that the first cell allows For the access or residency of the first type of terminal, the access or residency process may be performed at this time.
- the SIBx or SIBy may also include other indications, which are used to indicate at least one of the following: whether the first cell supports the first type of terminals; whether the first cell allows the first type of terminals to be accessed or reside.
- x and y may be indicated by some information elements (Information element, IE) of the traditional SIB1 message.
- Information element Information element
- the network-side device can configure corresponding access control parameters for different types of terminals, for example, configure the corresponding first access control parameters for the first type of terminals to perform access control , configure the corresponding second access control parameters for the second type of terminals, so that different types of terminals can obtain the corresponding access control parameters during the access control process, without causing a large number of accesses of a certain type of terminals. Affects the access of other types of terminals, and solves the problem that in the prior art, all terminals of different types share the same set of access control parameters, which causes a large number of terminals of one type to access the access control of another type of terminals. problem.
- the execution body may be an access control apparatus, or a control module in the access control apparatus for executing the access control method.
- an access control apparatus provided by the embodiments of the present application is described by taking an access control apparatus executing an access control method as an example.
- FIG. 4 is a schematic structural diagram 1 of an access control apparatus according to an embodiment of the present application. As shown in FIG. 4 , the apparatus includes:
- an obtaining module 42 configured to obtain a first access control parameter, wherein the first access control parameter is different from the second access control parameter corresponding to the second type of terminal;
- the access control module 44 is configured to perform access control according to the first access control parameter.
- the first access control parameter in the embodiment of the present application is configured by the network side or stipulated by the protocol.
- the first type of terminal in the embodiment of the present application is a lightweight terminal, and the second type of terminal is an ordinary terminal.
- the access control module 44 in this embodiment of the present application may further include: a first access control unit, configured to determine, according to the first access control parameter, that access is prohibited or not allowed or not supported by the cell where the cell is located. In the case of the first type of terminal, execute the first target operation;
- the first target operation includes at least one of the following: not allowed to camp on the cell; prohibited from accessing the cell or prohibited from accessing the cell within a preset time; not accessing the cell; not allowing an access attempt for the cell; select or reselect.
- the access control module 44 in this embodiment of the present application may further include: a second access control unit, configured to determine whether the cell where the cell is located is allowed to access or is not prohibited from accessing or supports the first access control unit according to the access control parameter. In the case of a class terminal, execute the second target operation;
- the second target operation includes at least one of the following: allowing camping on the cell; not prohibiting access to the cell; allowing access to the cell; allowing an access attempt for the cell; and not performing cell selection or reselection.
- the obtaining module 42 in this embodiment of the present application may further include at least one of the following:
- a first obtaining unit configured to obtain a first access control parameter corresponding to the attribute of the first type of terminal; wherein the attribute of the first type of terminal includes at least one item: the capability of the first type of terminal, the first type of terminal The capability set of the first type of terminal, the function of the first type of terminal, the function set of the first type of terminal, the type of the first type of terminal, the type of the first type of terminal, the application scenario of the first type of terminal, and the subscription information of the first type of terminal;
- a second obtaining unit configured to obtain a first access control parameter corresponding to a slice or a corresponding slice supported by the first type of terminal
- a third acquisition unit configured to acquire the first access control parameter corresponding to the identification information of the first type of terminal, wherein the identification information includes at least one item: the identification of the first type of terminal, the identification group of the first type of terminal , the number segment of the first type of terminal, the core network identifier corresponding to the first type of terminal, and the identification group of the core network corresponding to the first type of terminal;
- a fourth obtaining unit configured to obtain the first access control parameter corresponding to the type of the first type of terminal
- the fifth acquisition unit used for acquiring the first access control parameter corresponding to the category of the first type of terminal
- a sixth obtaining unit configured to obtain the first access control parameter corresponding to the application scenario of the first type of terminal.
- the attributes of the first type of terminal involved in the embodiments of this application, the slices or corresponding slices supported by the first type of terminal, and the identification information of the first type of terminal are configured by the network side or stipulated by the protocol.
- the first access control parameter in this embodiment of the present application includes at least one of the following: access control type; access control public land mobile network information; access control probability parameter; access control prohibition access factor ; information about the duration of access control; access identification information corresponding to access control; access category information corresponding to access control; access control level information; radio resource control RRC connection establishment reason; access attempt type; access Control the corresponding event information.
- the obtaining module 42 in this embodiment of the present application may obtain the first access control parameter through at least one of the following configuration messages: a physical broadcast channel PBCH message, a master information block MIB message, a first system information block SIB, an extension system information, dedicated radio resource control RRC message;
- the first SIB is the SIB corresponding to the second type of terminal.
- the extended system information in this embodiment of the present application includes at least one of the following:
- SIBx System information corresponding to the first type of terminal in the SIBx, where x is an integer greater than 1, SIBx is the SIB in the second SIB, and the second SIB is the SIB corresponding to the first type of terminal;
- SIBy System information corresponding to the first type of terminal in SIBy
- y is an integer greater than 1
- SIBy is the SIB in the first SIB
- the first SIB is the SIB corresponding to the second type of terminal.
- the system information corresponding to the first type of terminal in the first SIB1 is used to indicate any of the following: system information for supporting the first type of terminal; system information for supporting the access or camping of the first type of terminal; allowing the first type of terminal A type of system information that a terminal accesses or camps on.
- the system information corresponding to the first type of terminal in the SIBx and SIBy is used to indicate: the system information required by the first type of terminal to access or camp on the cell.
- the corresponding first access control parameter can be obtained for access control, and the first access control parameter is different from the second access control corresponding to the second type of terminal.
- parameters that is, different types of terminals can obtain corresponding access control parameters, which solves the problem that all terminals of different types share a set of the same access control parameters in the prior art, resulting in a large number of terminals of one type having access to another type of terminal. Access control of such terminals affects the problem.
- FIG. 5 is a second structural diagram of an access control apparatus according to an embodiment of the present application. As shown in FIG. 5 , the apparatus includes:
- the configuration module 52 is configured to configure corresponding access control parameters for different types of terminals.
- the configuration module 52 in this embodiment of the present application may further include: a configuration unit, configured to configure the first access control parameter for the first type of terminal, and configure the second access control parameter for the second type of terminal; wherein , the terminals of the first type and the terminals of the second type are terminals of different types, and the first access control parameter is different from the second access control parameter.
- a configuration unit configured to configure the first access control parameter for the first type of terminal, and configure the second access control parameter for the second type of terminal; wherein , the terminals of the first type and the terminals of the second type are terminals of different types, and the first access control parameter is different from the second access control parameter.
- the configuration unit may further include at least one of the following:
- a first configuration subunit configured to configure a corresponding first access control parameter for the first type of terminal according to the attribute of the first type of terminal; wherein, the attribute of the first type of terminal includes at least one item: capability, capability set of the first type of terminal, function of the first type of terminal, function set of the first type of terminal;
- a second configuration subunit configured to configure the corresponding first access control parameter for the first type of terminal according to the slice Slice or the corresponding slice supported by the first type of terminal;
- a third configuration subunit configured to configure corresponding first access control information for the first type of terminal according to the identification information of the first type of terminal, wherein the identification information includes at least one item: the identification of the first type of terminal, the first access control information The identification group of the first type of terminal, the number segment of the first type of terminal, the core network identification corresponding to the first type of terminal, and the identification group of the core network corresponding to the first type of terminal;
- a fourth configuration subunit configured to configure the corresponding first access control information for the first type of terminal according to the type of the first type of terminal;
- a fifth configuration subunit configured to configure the corresponding first access control information for the first type of terminal according to the type of the first type of terminal;
- a sixth configuration subunit configured to configure the corresponding first access control information for the first type of terminal according to the application scenario of the first type of terminal.
- the access control parameter in this embodiment of the present application includes at least one of the following: access control type; access control public land mobile network information; access control probability parameter; access control prohibition access factor; Access control duration related information; access identification information corresponding to access control; classification information corresponding to access control; access control level information; RRC connection establishment reason; access attempt type; event information corresponding to access control.
- the configuration module 52 in this embodiment of the present application may configure corresponding access control parameters for different types of terminals through the following configuration messages: physical broadcast channel PBCH message, main information block MIB message, first system information block SIB, Extended system information, dedicated radio resource control RRC message;
- the first SIB is the SIB corresponding to the second type of terminal.
- the extended system information in the first SIB in this embodiment of the present application includes at least one of the following:
- SIBx System information corresponding to the first type of terminal in the SIBx, where x is an integer greater than 1, SIBx is the SIB in the second SIB, and the second SIB is the SIB corresponding to the first type of terminal;
- SIBy System information corresponding to the first type of terminal in SIBy
- y is an integer greater than 1
- SIBy is the SIB in the first SIB
- the first SIB is the SIB corresponding to the second type of terminal.
- system information corresponding to the first type of terminal in the first SIB1 in this embodiment of the present application is used to indicate any of the following: system information supporting the first type of terminal, support for the first type of terminal to reside or intervene System information; system information that allows the first type of terminal to access or camp on.
- system information corresponding to the first type of terminal in the SIBx and SIBy in the embodiment of the present application is used to indicate: system information required by the first type of terminal to access or camp on the cell where the terminal is located.
- the first type of terminal in the embodiment of the present application is a lightweight terminal
- the second type of terminal in the embodiment of the present application is an ordinary terminal
- corresponding access control parameters can be configured for different types of terminals, for example, the corresponding first access control parameters can be configured for the first type of terminals to perform access control , configure the corresponding second access control parameters for the second type of terminals, so that different types of terminals can obtain the corresponding access control parameters during the access control process, without causing a large number of accesses of a certain type of terminals. Affects the access of other types of terminals, and solves the problem that in the prior art, all terminals of different types share the same set of access control parameters, which causes a large number of terminals of one type to access the access control of another type of terminals. problem.
- the access control apparatus in this embodiment of the present application may be an apparatus, or may be a component, an integrated circuit, or a chip in a terminal.
- the device may be a mobile terminal or a non-mobile terminal.
- the mobile terminal may include, but is not limited to, the types of terminals 11 listed above, and the non-mobile terminal may be a server, a network attached storage (NAS), a personal computer (personal computer, PC), a television ( television, TV), teller machine, or self-service machine, etc., which are not specifically limited in the embodiments of the present application.
- the access control device in this embodiment of the present application may be a device with an operating system.
- the operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
- the access control apparatus provided in the embodiments of the present application can implement the various processes implemented by the method embodiments in FIG. 2 to FIG. 3 , and achieve the same technical effect. To avoid repetition, details are not described here.
- an embodiment of the present application further provides a communication device 600, including a processor 601, a memory 602, a program or instruction stored in the memory 602 and executable on the processor 601,
- a communication device 600 including a processor 601, a memory 602, a program or instruction stored in the memory 602 and executable on the processor 601
- the communication device 600 is a terminal
- the program or instruction is executed by the processor 701
- each process of the foregoing access control method embodiment is implemented, and the same technical effect can be achieved.
- the communication device 600 is a network-side device, when the program or instruction is executed by the processor 701, each process of the foregoing access control method embodiment can be implemented, and the same technical effect can be achieved. To avoid repetition, details are not described here.
- FIG. 7 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
- the terminal 700 includes but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, a processor 710 and other components .
- the terminal 700 may also include a power supply (such as a battery) for supplying power to various components, and the power supply may be logically connected to the processor 710 through a power management system, so as to manage charging, discharging, and power consumption through the power management system management and other functions.
- a power supply such as a battery
- the terminal structure shown in FIG. 7 does not constitute a limitation on the terminal, and the terminal may include more or less components than those shown in FIG. 7 , or combine some components, or arrange different components, which will not be repeated here.
- the input unit 704 may include a graphics processor (Graphics Processing Unit, GPU) 7041 and a microphone 7042. Such as camera) to obtain still pictures or video image data for processing.
- the display unit 706 may include a display panel 7061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
- the user input unit 707 includes a touch panel 7071 and other input devices 7072 .
- the touch panel 7071 is also called a touch screen.
- the touch panel 7071 may include two parts, a touch detection device and a touch controller.
- Other input devices 7072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be repeated here.
- the radio frequency unit 701 receives the downlink data from the network side device, and then processes it to the processor 710; in addition, sends the uplink data to the network side device.
- the radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
- Memory 709 may be used to store software programs or instructions as well as various data.
- the memory 709 may mainly include a storage program or instruction area and a storage data area, wherein the storage program or instruction area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.) and the like.
- the memory 709 may include a high-speed random access memory, and may also include a non-volatile memory, wherein the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM) , PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- ROM Read-Only Memory
- PROM programmable read-only memory
- PROM erasable programmable read-only memory
- Erasable PROM Erasable PROM
- EPROM electrically erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- flash memory for example at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
- the processor 710 may include one or more processing units; optionally, the processor 710 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, application programs or instructions, etc., Modem processors mainly deal with wireless communications, such as baseband processors. It can be understood that, the above-mentioned modulation and demodulation processor may not be integrated into the processor 710.
- the radio frequency unit 701 is used for the terminal to obtain the first access control parameter, wherein the first access control parameter is different from the second access control parameter corresponding to the second type of terminal;
- the processor 710 is configured to perform access control according to the first access control parameter.
- Access control is performed by obtaining the corresponding first access control parameter in the embodiment of the present application, and the first access control parameter is different from the second access control parameter corresponding to the second type of terminal, that is, a different type of terminal.
- the terminal can obtain the corresponding access control parameters, thereby solving the problem that all terminals of different types in the prior art share a set of the same access control parameters, which leads to the access control of another type of terminals after a large number of terminals of one type access. affecting issues.
- the network device 800 includes: an antenna 81 , a radio frequency device 82 , and a baseband device 83 .
- the antenna 81 is connected to the radio frequency device 82 .
- the radio frequency device 82 receives information through the antenna 81, and sends the received information to the baseband device 83 for processing.
- the baseband device 83 processes the information to be sent and sends it to the radio frequency device 82
- the radio frequency device 82 processes the received information and sends it out through the antenna 81 .
- the above-mentioned frequency band processing apparatus may be located in the baseband apparatus 83 , and the method performed by the network side device in the above embodiments may be implemented in the baseband apparatus 83 .
- the baseband apparatus 83 includes a processor 84 and a memory 85 .
- the baseband device 83 may include, for example, at least one baseband board on which a plurality of chips are arranged. As shown in FIG. 8 , one of the chips is, for example, the processor 84 and is connected to the memory 85 to call the program in the memory 85 to execute The network devices shown in the above method embodiments operate.
- the baseband device 83 may further include a network interface 86 for exchanging information with the radio frequency device 82, and the interface is, for example, a common public radio interface (CPRI).
- CPRI common public radio interface
- the network-side device in the embodiment of the present invention further includes: instructions or programs stored on the memory 85 and executable on the processor 84, and the processor 84 invokes the instructions or programs in the memory 85 to execute the modules shown in FIG. 5 .
- Embodiments of the present application further provide a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, each process of the foregoing access control method embodiment is implemented, and can achieve The same technical effect, in order to avoid repetition, will not be repeated here.
- the processor is the processor in the terminal described in the foregoing embodiment.
- the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
- An embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used for running network-side device programs or instructions to implement the above access control
- the chip includes a processor and a communication interface
- the communication interface is coupled to the processor
- the processor is used for running network-side device programs or instructions to implement the above access control
- the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.
- An embodiment of the present application further provides a computer program product, where the computer program product is stored in a non-volatile storage medium, and the computer program product is configured to be executed by at least one processor to implement the above access control method
- modules, units, sub-modules, sub-units, etc. can be implemented in one or more Application Specific Integrated Circuits (ASIC), Digital Signal Processing (DSP), digital signal processing equipment ( DSP Device, DSPD), Programmable Logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processor, controller, microcontroller, microprocessor, for in other electronic units or combinations thereof that perform the functions described herein.
- ASIC Application Specific Integrated Circuits
- DSP Digital Signal Processing
- DSP Device digital signal processing equipment
- PLD Programmable Logic Device
- Field-Programmable Gate Array Field-Programmable Gate Array
- FPGA Field-Programmable Gate Array
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (47)
- 一种接入控制方法,包括:第一类终端获取第一接入控制参数,其中,所述第一接入控制参数不同于第二类终端对应的第二接入控制参数;第一类终端根据所述第一接入控制参数进行接入控制。
- 根据权利要求1所述的方法,其中,根据所述第一接入控制参数进行接入控制包括:在根据所述第一接入控制参数确定所在小区禁止接入或不允许接入或不支持所述第一类终端的情况下,执行第一目标操作;其中,所述第一目标操作包括以下至少一项:不允许在所述小区驻留;禁止接入所述小区或在预设时间内禁止接入所述小区;不接入所述小区;针对所述小区不允许进行接入尝试;进行小区选择或重选。
- 根据权利要求1所述的方法,其中,所述第一类终端根据所述第一接入控制参数进行接入控制包括:在根据所述接入控制参数确定所在小区允许接入或不被禁止接入或支持所述第一类终端的情况下,执行第二目标操作;其中,所述第二目标操作包括以下至少一项:允许在所述小区驻留;不禁止接入所述小区;允许接入所述小区;针对所述小区允许进行接入尝试;不进行小区选择或重选。
- 根据权利要求1所述的方法,其中,所述第一类终端获取第一接入控制参数包括以下至少之一:所述第一类终端获取与所述第一类终端的属性对应的第一接入控制参数;其中,所述第一类终端的属性包括至少一项:所述第一类终端的能力、所述第一类终端的能力集、所述第一类终端的功能、所述第一类终端的功能集、所述第一类终端的类型、所述第一类终端的类别、所述第一类终端的应用场景、所述第一类终端的签约信息;所述第一类终端获取与所述第一类终端所支持的切片或对应的切片对应的第一接入控制参数;所述第一类终端获取与所述第一类终端的标识信息对应的第一接入控制参数,其中,所述标识信息包括至少一项:所述第一类终端的标识、所述第一类终端的标识组、所述第一类终端的号段、所述第一类终端对应的核心网标识、所述第一类终端对应的核心网的标识组;所述第一类终端获取与所述第一类终端的类型对应的第一接入控制参数;所述第一类终端获取与所述第一类终端的类别对应的第一接入控制参数;所述第一类终端获取与所述第一类终端的应用场景对应的第一接入控制参数。
- 根据权利要求4所述的方法,其中,所述第一类终端的属性、所述第一类终端所支持的切片或对应的切片、所述第一类终端的标识信息由网络侧配置或者协议约定。
- 根据权利要求1所述的方法,其中,所述第一接入控制参数包括以下至少一项:接入控制类型;接入控制公共陆地移动网络信息;接入控制的概率参数;接入控制禁止接入因子;接入控制的时长相关信息;接入控制对应的接入标识信息;接入控制对应的接入类别信息;接入控制等级信息;无线资源控制RRC连接建立原因;接入尝试类型;接入控制对应的事件信息。
- 根据权利要求1所述的方法,其中,第一类终端通过以下至少之一的配置消息获取所述第一接入控制参数:物理广播信道PBCH消息、主信息块MIB消息、第一系统信息块SIB、扩展的系统信息、专用无线资源控制RRC消息;其中,所述第一SIB为第二类终端对应的SIB。
- 根据权利要求7所述的方法,其中,所述扩展的系统信息包括以下至少一项:第一SIB1中与所述第一类终端对应的系统信息,所述第一SIB1为所述第一SIB中的SIB,所述第一SIB为第二类终端对应的SIB;SIBx中与所述第一类终端对应的系统信息,x为大于1的整数,所述SIBx为第二SIB中的SIB,所述第二SIB为第一类终端对应的SIB;SIBy中与所述第一类终端对应的系统信息,y为大于1的整数,所述SIBy 为所述第一SIB中的SIB,所述第一SIB为第二类终端对应的SIB。
- 根据权利要求7所述的方法,其中,所述第一SIB1中与所述第一类终端对应的系统信息用于指示以下任一项:支持所述第一类终端的系统信息;允许所述第一类终端接入或驻留的系统信息。
- 根据权利要求8所述的方法,其中,所述SIBx和所述SIBy中与所述第一类终端对应的系统信息用于指示:所述第一类终端接入或驻留所在小区所需系统信息。
- 根据权利要求1所述的方法,其中,所述第一接入控制参数由网络侧配置或者协议约定。
- 根据权利要求1所述的方法,其中,所述第一类终端为轻量化终端,所述第二类终端为普通终端。
- 一种接入控制方法,应用于网络侧设备,包括:为不同类型的终端配置对应的接入控制参数。
- 根据权利要求13所述的方法,其中,为不同类型的终端配置对应的接入控制参数,包括:为第一类终端配置第一接入控制参数,以及为第二类终端配置第二接入控制参数;其中,所述第一类终端和所述第二类终端为不同类型的终端,所述第一接入控制参数不同于所述第二接入控制参数。
- 根据权利要求14所述的方法,其中,为所述第一类终端配置第一接入控制参数包括以下至少之一:根据所述第一类终端的属性为所述第一类终端配置对应的第一接入控制参数;其中,所述第一类终端的属性包括至少一项:所述第一类终端的能力、所述第一类终端的能力集、所述第一类终端的功能、所述第一类终端的功能集;根据所述第一类终端所支持的切片Slice或对应的切片为所述第一类终端配置对应的第一接入控制参数;根据所述第一类终端的标识信息为所述第一类终端配置对应的第一接入控制信息,其中,所述标识信息包括至少一项:所述第一类终端的标识、所述 第一类终端的标识组、所述第一类终端的号段、所述第一类终端对应的核心网标识、所述第一类终端对应的核心网的标识组;根据所述第一类终端的类型为所述第一类终端配置对应的第一接入控制信息;根据所述第一类终端的类别为所述第一类终端配置对应的第一接入控制信息;根据所述第一类终端的应用场景为所述第一类终端配置对应的第一接入控制信息。
- 根据权利要求13所述的方法,其中,所述接入控制参数包括以下至少一项:接入控制类型;接入控制公共陆地移动网络信息;接入控制的概率参数;接入控制禁止接入因子;接入控制的时长相关信息;接入控制对应的访问标识信息;接入控制对应的分类别信息;接入控制等级信息;RRC连接建立原因;接入尝试类型;接入控制对应的事件信息。
- 根据权利要求14所述的方法,其中,通过以下配置消息为不同类型的终端配置对应的接入控制参数:物理广播信道PBCH消息、主信息块MIB消息、第一系统信息块SIB、扩展的系统信息、专用无线资源控制RRC消息;其中,所述第一SIB为第二类终端对应的SIB。
- 根据权利要求17所述的方法,其中,所述第一SIB中扩展的系统信息包括以下至少一项:第一SIB1中与所述第一类终端对应的系统信息,所述第一SIB1为所述第一SIB中的SIB,所述第一SIB为第二类终端对应的SIB;SIBx中与所述第一类终端对应的系统信息,x为大于1的整数,所述SIBx为第二SIB中的SIB,所述第二SIB为第一类终端对应的SIB;SIBy中与所述第一类终端对应的系统信息,y为大于1的整数,所述SIBy为所述第一SIB中的SIB,所述第一SIB为第二类终端对应的SIB。
- 根据权利要求17所述的方法,其中,所述第一SIB1中与所述第一类终端对应的系统信息用于指示以下任一项:支持所述第一类终端的系统信息;允许所述第一类终端接入或驻留的系统信息。
- 根据权利要求18所述的方法,其中,所述SIBx和SIBy中与所述第一类终端对应的系统信息用于指示:所述第一类终端接入或驻留所在小区所需系统信息。
- 根据权利要求14所述的方法,其中,所述第一类终端为轻量化终端,所述第二类终端为普通终端。
- 一种接入控制装置,应用于第一类终端,包括:获取模块,用于获取第一接入控制参数,其中,所述第一接入控制参数不同于第二类终端对应的第二接入控制参数;接入控制模块,用于根据所述第一接入控制参数进行接入控制。
- 根据权利要求22所述的装置,其中,所述接入控制模块包括:第一接入控制单元,用于在根据所述第一接入控制参数确定所在小区禁止接入或不允许接入或不支持所述第一类终端的情况下,执行第一目标操作;其中,所述第一目标操作包括以下至少一项:不允许在所述小区驻留;禁止接入所述小区或在预设时间内禁止接入所述小区;不接入所述小区;针对所述小区不允许进行接入尝试;进行小区选择或重选。
- 根据权利要求22所述的装置,其中,所述接入控制模块包括:第二接入控制单元,用于在根据所述接入控制参数确定所在小区允许接入或不被禁止接入或支持所述第一类终端的情况下,执行第二目标操作;其中,所述第二目标操作包括以下至少一项:允许在所述小区驻留;不禁止接入所述小区;允许接入所述小区;针对所述小区允许进行接入尝试;不进行小区选择或重选。
- 根据权利要求22所述的装置,其中,所述获取模块包括以下至少之一:第一获取单元,用于获取与所述第一类终端的属性对应的第一接入控制参数;其中,所述第一类终端的属性包括至少一项:所述第一类终端的能力、所述第一类终端的能力集、所述第一类终端的功能、所述第一类终端的功能集、所述第一类终端的类型、所述第一类终端的类别、所述第一类终端的应 用场景、所述第一类终端的签约信息;第二获取单元,用于获取与所述第一类终端所支持的切片或对应的切片对应的第一接入控制参数;第三获取单元,用于获取与所述第一类终端的标识信息对应的第一接入控制参数,其中,所述标识信息包括至少一项:所述第一类终端的标识、所述第一类终端的标识组、所述第一类终端的号段、所述第一类终端对应的核心网标识、所述第一类终端对应的核心网的标识组;第四获取单元,用于获取与所述第一类终端的类型对应的第一接入控制参数;第五获取单元,用于获取与所述第一类终端的类别对应的第一接入控制参数;第六获取单元,用于获取与所述第一类终端的应用场景对应的第一接入控制参数。
- 根据权利要求25所述的装置,其中,所述第一类终端的属性、所述第一类终端所支持的切片或对应的切片、所述第一类终端的标识信息由网络侧配置或者协议约定。
- 根据权利要求22所述的装置,其中,所述第一接入控制参数包括以下至少一项:接入控制类型;接入控制公共陆地移动网络信息;接入控制的概率参数;接入控制禁止接入因子;接入控制的时长相关信息;接入控制对应的接入标识信息;接入控制对应的接入类别信息;接入控制等级信息;无线资源控制RRC连接建立原因;接入尝试类型;接入控制对应的事件信息。
- 根据权利要求22所述的装置,其中,所述获取模块通过以下至少之一的配置消息获取所述第一接入控制参数:物理广播信道PBCH消息、主信息块MIB消息、第一系统信息块SIB、扩展的系统信息、专用无线资源控制RRC消息;其中,所述第一SIB为第二类终端对应的SIB。
- 根据权利要求28所述的装置,其中,所述扩展的系统信息包括以下至少一项:第一SIB1中与所述第一类终端对应的系统信息,所述第一SIB1为所述第一SIB中的SIB,所述第一SIB为第二类终端对应的SIB;SIBx中与所述第一类终端对应的系统信息,x为大于1的整数,所述SIBx为第二SIB中的SIB,所述第二SIB为第一类终端对应的SIB;SIBy中与所述第一类终端对应的系统信息,y为大于1的整数,所述SIBy为所述第一SIB中的SIB,所述第一SIB为第二类终端对应的SIB。
- 根据权利要求28所述的装置,其中,所述第一SIB1中与所述第一类终端对应的系统信息用于指示以下任一项:支持所述第一类终端的系统信息;允许所述第一类终端接入或驻留的系统信息。
- 根据权利要求29所述的装置,其中,所述SIBx和所述SIBy中与所述第一类终端对应的系统信息用于指示:所述第一类终端接入或驻留所在小区所需系统信息。
- 根据权利要求22所述的装置,其中,所述第一接入控制参数由网络侧配置或者协议约定。
- 根据权利要求22所述的装置,其中,所述第一类终端为轻量化终端,所述第二类终端为普通终端。
- 一种接入控制装置,应用于网络侧设备,包括:配置模块,用于为不同类型的终端配置对应的接入控制参数。
- 根据权利要求34所述的装置,其中,所述配置模块包括:配置单元,用于为第一类终端配置第一接入控制参数,以及为第二类终端配置第二接入控制参数;其中,所述第一类终端和所述第二类终端为不同类型的终端,所述第一接入控制参数不同于所述第二接入控制参数。
- 根据权利要求35所述的装置,其中,所述配置单元包括以下至少之一:第一配置子单元,用于根据所述第一类终端的属性为所述第一类终端配置对应的第一接入控制参数;其中,所述第一类终端的属性包括至少一项:所述第一类终端的能力、所述第一类终端的能力集、所述第一类终端的功能、所述第一类终端的功能集;第二配置子单元,用于根据所述第一类终端所支持的切片Slice或对应的切片为所述第一类终端配置对应的第一接入控制参数;第三配置子单元,用于根据所述第一类终端的标识信息为所述第一类终端配置对应的第一接入控制信息,其中,所述标识信息包括至少一项:所述第一类终端的标识、所述第一类终端的标识组、所述第一类终端的号段、所述第一类终端对应的核心网标识、所述第一类终端对应的核心网的标识组;第四配置子单元,用于根据所述第一类终端的类型为所述第一类终端配置对应的第一接入控制信息;第五配置子单元,用于根据所述第一类终端的类别为所述第一类终端配置对应的第一接入控制信息;第六配置子单元,用于根据所述第一类终端的应用场景为所述第一类终端配置对应的第一接入控制信息。
- 根据权利要求34所述的装置,其中,所述接入控制参数包括以下至少一项:接入控制类型;接入控制公共陆地移动网络信息;接入控制的概率参数;接入控制禁止接入因子;接入控制的时长相关信息;接入控制对应的访问标识信息;接入控制对应的分类别信息;接入控制等级信息;RRC连接建立原因;接入尝试类型;接入控制对应的事件信息。
- 根据权利要求35所述的装置,其中,所述配置模块通过以下配置消息为不同类型的终端配置对应的接入控制参数:物理广播信道PBCH消息、主信息块MIB消息、第一系统信息块SIB、扩展的系统信息、专用无线资源控制RRC消息;其中,所述第一SIB为第二类终端对应的SIB。
- 根据权利要求38所述的装置,其中,所述第一SIB中扩展的系统信息包括以下至少一项:第一SIB1中与所述第一类终端对应的系统信息,所述第一SIB1为所述第一SIB中的SIB,所述第一SIB为第二类终端对应的SIB;SIBx中与所述第一类终端对应的系统信息,x为大于1的整数,所述SIBx为第二SIB中的SIB,所述第二SIB为第一类终端对应的SIB;SIBy中与所述第一类终端对应的系统信息,y为大于1的整数,所述SIBy为所述第一SIB中的SIB,所述第一SIB为第二类终端对应的SIB。
- 根据权利要求38所述的装置,其中,所述第一SIB1中与所述第一类终端对应的系统信息用于指示以下任一项:支持所述第一类终端的系统信息;允许所述第一类终端接入或驻留的系统信息。
- 根据权利要求39所述的装置,其中,所述SIBx和所述SIBy中与所述第一类终端对应的系统信息用于指示:所述第一类终端接入或驻留所在小区所需系统信息。
- 根据权利要求35所述的装置,其中,所述第一类终端为轻量化终端,所述第二类终端为普通终端。
- 一种终端,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至12任一项所述的接入控制方法的步骤。
- 一种网络侧设备,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求13至21任一项所述的接入控制方法的步骤。
- 一种可读存储介质,其中,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-12任一项所述的接入控制方法,或者实现如权利要求13至21任一项所述的接入控制方法的步骤。
- 一种芯片,包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1-12任一项所述的接入控制方法,或者实现如权利要求13至21任一项所述的接入控制方法。
- 一种计算机程序产品,所述计算机程序产品被存储在非易失的存储介质中,所述计算机程序产品被配置成被至少一个处理器执行以实现如权利要求1-12任一项所述的接入控制方法,或者实现如权利要求13至21任一项所述的接入控制方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21849543.0A EP4192118A4 (en) | 2020-07-31 | 2021-07-30 | ACCESS CONTROL METHOD, TERMINAL AND NETWORK SIDE DEVICE |
JP2023504094A JP2023535392A (ja) | 2020-07-31 | 2021-07-30 | アクセス制御方法、端末及びネットワーク側機器 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010761986.XA CN114071654A (zh) | 2020-07-31 | 2020-07-31 | 接入控制方法、终端及网络侧设备 |
CN202010761986.X | 2020-07-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022022685A1 true WO2022022685A1 (zh) | 2022-02-03 |
Family
ID=80037661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/109635 WO2022022685A1 (zh) | 2020-07-31 | 2021-07-30 | 接入控制方法、终端及网络侧设备 |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP4192118A4 (zh) |
JP (1) | JP2023535392A (zh) |
CN (1) | CN114071654A (zh) |
WO (1) | WO2022022685A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023201743A1 (zh) * | 2022-04-22 | 2023-10-26 | 北京小米移动软件有限公司 | 一种接入控制方法、装置、设备及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761933A (zh) * | 2011-04-29 | 2012-10-31 | 中兴通讯股份有限公司 | Eab处理方法及装置、接入处理方法、装置及系统 |
CN109104736A (zh) * | 2017-06-21 | 2018-12-28 | 中兴通讯股份有限公司 | 一种接入控制的方法、装置及基站 |
CN111918359A (zh) * | 2020-07-03 | 2020-11-10 | 中兴通讯股份有限公司 | 接入控制方法、第一网络节点、第二网络节点及存储介质 |
CN112640532A (zh) * | 2020-12-07 | 2021-04-09 | 北京小米移动软件有限公司 | 通信方法及装置、无线接入网、终端及存储介质 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110201307A1 (en) * | 2010-02-15 | 2011-08-18 | Telefonaktiebolaget L M Ericsson (Publ) | Access control for m2m devices |
US8462722B2 (en) * | 2010-03-26 | 2013-06-11 | Telefonaktiebolaget L M Ericsson (Publ) | Access control for machine-type communication devices |
CN102892180B (zh) * | 2011-07-21 | 2017-05-24 | 中兴通讯股份有限公司 | 混合模式家庭基站的接入控制方法及用户终端及家庭基站 |
US8938233B2 (en) * | 2011-08-16 | 2015-01-20 | Mediatek Inc. | Enhanced access control in LTE advanced systems |
CN103096495A (zh) * | 2011-11-03 | 2013-05-08 | 中兴通讯股份有限公司 | 一种接入控制方法和系统 |
WO2014106334A1 (zh) * | 2013-01-05 | 2014-07-10 | 华为技术有限公司 | 小区接入控制方法、基站、终端及系统 |
CN106454999B (zh) * | 2015-08-13 | 2019-10-08 | 中国移动通信集团公司 | 一种接入控制方法及装置 |
-
2020
- 2020-07-31 CN CN202010761986.XA patent/CN114071654A/zh active Pending
-
2021
- 2021-07-30 EP EP21849543.0A patent/EP4192118A4/en active Pending
- 2021-07-30 JP JP2023504094A patent/JP2023535392A/ja active Pending
- 2021-07-30 WO PCT/CN2021/109635 patent/WO2022022685A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761933A (zh) * | 2011-04-29 | 2012-10-31 | 中兴通讯股份有限公司 | Eab处理方法及装置、接入处理方法、装置及系统 |
CN109104736A (zh) * | 2017-06-21 | 2018-12-28 | 中兴通讯股份有限公司 | 一种接入控制的方法、装置及基站 |
CN111918359A (zh) * | 2020-07-03 | 2020-11-10 | 中兴通讯股份有限公司 | 接入控制方法、第一网络节点、第二网络节点及存储介质 |
CN112640532A (zh) * | 2020-12-07 | 2021-04-09 | 北京小米移动软件有限公司 | 通信方法及装置、无线接入网、终端及存储介质 |
Non-Patent Citations (2)
Title |
---|
OPPO: "Discussion on RedCap UE’s identification and access control", 3GPP DRAFT; R2-2006786, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Electronic; 20200817 - 20200828, 7 August 2020 (2020-08-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051911693 * |
See also references of EP4192118A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN114071654A (zh) | 2022-02-18 |
EP4192118A4 (en) | 2024-01-03 |
EP4192118A1 (en) | 2023-06-07 |
JP2023535392A (ja) | 2023-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9872232B2 (en) | Methods and apparatus for neighborhood area network detection | |
WO2022022634A1 (zh) | 接入控制方法、装置及通信设备 | |
WO2022022636A1 (zh) | 初始接入方法及装置、终端及网络侧设备 | |
WO2022089565A1 (zh) | 辅小区组信息的配置、获取方法及通信设备 | |
WO2022007930A1 (zh) | 一种载波切换处理方法、装置及终端 | |
WO2022174777A1 (zh) | 状态的切换方法及装置、信标信号的发送及装置 | |
WO2022143657A1 (zh) | 网络选择方法、装置、设备及存储介质 | |
WO2022022685A1 (zh) | 接入控制方法、终端及网络侧设备 | |
US20230164681A1 (en) | Access control method and apparatus, terminal, and network device | |
WO2023280138A1 (zh) | 初始带宽部分配置的获取方法、终端及网络侧设备 | |
WO2022057828A1 (zh) | 测量方法、测量装置、终端及网络设备 | |
WO2022068903A1 (zh) | 网络选择方法、信息发送方法、信息获取方法及装置 | |
WO2022007928A1 (zh) | 辅助信息处理方法、辅助信息发送方法及相关设备 | |
WO2023025015A1 (zh) | 随机接入资源选择、配置方法、装置、终端及网络侧设备 | |
WO2022068866A1 (zh) | 工作区域变更方法、终端及网络侧设备 | |
WO2022007927A1 (zh) | 获取紧急服务的控制方法及装置、终端及可读存储介质 | |
WO2023274072A1 (zh) | 小区评估方法、装置、终端、中继和存储介质 | |
WO2022022711A1 (zh) | 接入控制方法、装置、终端及网络侧设备 | |
WO2022068727A1 (zh) | 传输处理方法、终端及网络侧设备 | |
US20230164016A1 (en) | Method and apparatus for determining synchronization signal and pbch block search information and communications device | |
CN114258011B (zh) | 信息发送方法、信息接收方法、装置及终端 | |
WO2023143413A1 (zh) | 同步信号块接收方法、同步信号块发送方法及相关设备 | |
WO2022257934A1 (zh) | Pdcch监听方法、终端及网络侧设备 | |
US20240015611A1 (en) | Cell Reselection Method, Terminal, and Non-Transitory Readable Storage Medium | |
WO2023236994A1 (zh) | 信息确定方法、装置及终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21849543 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2023504094 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021849543 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2021849543 Country of ref document: EP Effective date: 20230228 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |