WO2022022711A1 - Procédé et appareil de contrôle d'accès, terminal et dispositif côté réseau - Google Patents

Procédé et appareil de contrôle d'accès, terminal et dispositif côté réseau Download PDF

Info

Publication number
WO2022022711A1
WO2022022711A1 PCT/CN2021/109830 CN2021109830W WO2022022711A1 WO 2022022711 A1 WO2022022711 A1 WO 2022022711A1 CN 2021109830 W CN2021109830 W CN 2021109830W WO 2022022711 A1 WO2022022711 A1 WO 2022022711A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
terminal
access
side device
network side
Prior art date
Application number
PCT/CN2021/109830
Other languages
English (en)
Chinese (zh)
Inventor
金巴·迪·阿达姆布巴卡
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2022022711A1 publication Critical patent/WO2022022711A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link

Definitions

  • the present application belongs to the field of communication technologies, and in particular relates to an access control method, apparatus, terminal and network side equipment.
  • Network slicing technology enables operators to use software to segment multiple virtual end-to-end networks on a hardware infrastructure. Each segmented virtual network ranges from the device to the access network and from the access network to the core network. , from the core network to the transmission network are logically completely isolated, and are adapted to the technical requirements of their respective services. That is to say, network slicing technology can virtualize multiple logical sub-networks with different characteristics. Through differentiated settings and optimization, it can meet the different needs of business in different scenarios (such as industrial control, autonomous driving, telemedicine, etc.).
  • the network access control function is based on the cell level, and the access of the terminal is not flexible enough.
  • the purpose of the embodiments of the present application is to provide an access control method, apparatus, terminal and network side equipment, which can solve the problem that the current network access control function is based on the cell level, which leads to the inflexibility of terminal access.
  • an access control method applied to a terminal, and the method includes:
  • an access control method is provided, applied to a network side device, including:
  • an access control apparatus applied to a terminal, including:
  • a first sending module configured to send an access request for accessing the target radio access network slice RS to the network side device
  • a first receiving module configured to receive a response message from the network side device based on the access request.
  • an access control apparatus applied to a network side device, including:
  • a first receiving module configured to receive an access request sent by the terminal for accessing the target radio access network slice RS
  • a response module configured to respond to the access request.
  • a terminal in a fifth aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, when the program or instruction is executed by the processor Implement the steps of the access control method according to the first aspect.
  • a network side device in a sixth aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, the program or instruction being executed by the The processor implements the steps of the access control method according to the second aspect when executed.
  • a readable storage medium is provided, and a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the steps of the access control method described in the first aspect are implemented, Or implement the steps of the access control method according to the second aspect.
  • a chip in an eighth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a network-side device program or instruction, and implements the method described in the first aspect.
  • the access control method described above, or the access control method described in the second aspect is implemented.
  • the terminal sends an access request for accessing the target RS to the network-side device, and receives a response message from the network-side device based on the access request, so that network access control can be based on the access request.
  • the network slicing level the granularity of network access control is finer, and the network access of terminals is more flexible.
  • FIG. 1 is a structural diagram of a network system provided by an embodiment of the present application.
  • FIG. 3 is another flowchart of an access control method provided by an embodiment of the present application.
  • FIG. 4 is a structural diagram of an access control apparatus provided by an embodiment of the present application.
  • FIG 5 is another structural diagram of an access control apparatus provided by an embodiment of the present application.
  • FIG. 6 is a structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 7 is another structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 8 is a structural diagram of a network side device provided by an embodiment of the present application.
  • first, second and the like in the description and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and "first”, “second” distinguishes Usually it is a class, and the number of objects is not limited.
  • the first object may be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the associated objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced LTE-Advanced
  • LTE-A Long Term Evolution-Advanced
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • system and “network” in the embodiments of the present application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies.
  • NR New Radio
  • the following description describes a New Radio (NR) system for example purposes, and uses NR terminology in most of the description below, although these techniques are also applicable to applications other than NR system applications, such as 6th generation ( 6th Generation , 6G) communication system.
  • 6th generation 6th Generation
  • FIG. 1 shows a block diagram of a wireless communication system to which the embodiments of the present application can be applied.
  • the wireless communication system includes a terminal 11 and a network-side device 12 .
  • the terminal 11 may also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital computer Assistant (Personal Digital Assistant, PDA), PDA, Netbook, Ultra-mobile Personal Computer (UMPC), Mobile Internet Device (MID), Wearable Device (Wearable Device) or vehicle-mounted device (Vehicle User Equipment, VUE), pedestrian terminal (Pedestrian User Equipment, PUE) and other terminal-side devices, wearable devices include: bracelets, headphones, glasses, etc.
  • the network side device 12 may be a base station or a core network, wherein the base station may be referred to as a Node B, an evolved Node B, an access point, a Base Transceiver Station (BTS), a radio base station, a radio transceiver, a basic service Set (Basic Service Set, BSS), Extended Service Set (Extended Service Set, ESS), Node B, Evolved Node B (eNB), Home Node B, Home Evolved Node B, WLAN Access Point, WiFi Node, Send Transmitting Receiving Point (TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms.
  • the base station in the NR system is taken as an example, but the specific type of the base station is not limited.
  • FIG. 2 is a flowchart of an access control method provided by an embodiment of the present application.
  • the access control method is applied to a terminal and includes the following steps:
  • Step 201 Send an access request for accessing the target radio access network slice RS to the network side device.
  • a target radio access network (Radio Access Network, RAN) slice (slice) may include one or more RSs.
  • Step 202 Receive a response message from the network side device based on the access request.
  • the response message may be a response message from the network side device accepting the terminal's access to the target RS. If the target RS includes multiple RSs, the network side device selects one of the multiple RSs to accept the terminal's access, or it may be rejected by the network side device. The response message of the terminal accessing the target RS, if the target RS includes multiple RSs, the network side device denies the terminal to access any one of the target RSs.
  • the terminal sends an access request for accessing the target RS to the network-side device, and receives a response message from the network-side device based on the access request, so that network access control can be based on access network slices level, the granularity of network access control is finer, and the network access of terminals is more flexible.
  • the access control method further includes:
  • step 201 may be performed before step 201, or may be performed after step 201, which is not limited herein. If the above steps are performed before step 201, before sending the access request for accessing the target RS to the network side device, the terminal receives the slice information and access control information of the RS supported by the network side device broadcast by the network side device, and may Based on the access control information of the RS supported by the network side device, select an appropriate RS to initiate an access request to improve access efficiency.
  • the terminal may select an appropriate RS to initiate an access request based on the access control information of the RS supported by the network side device in the next access request to improve access efficiency.
  • the network side device broadcasts the slice information and access control information of the RS it supports through the system message block, for example, broadcasts the slice information and access control information of the supported RS in the system message block (System Information Blocks, SIB) 1, and the terminal After the system message block is received, the slice information and access control information of the RS supported by the network side device are obtained.
  • the RS supported by the network side device may be one or more RSs.
  • the slice information of the RS may include: public land mobile network (Public Land Mobile Network, PLMN) identity (Identity Document, ID), tracking area (Tracking area) information, RAN notification area (notification area) information, frequency information, service information, One or more of the cell information.
  • PLMN Public Land Mobile Network
  • ID Identity Document
  • Tracking area tracking area
  • RAN notification area notification area
  • frequency information frequency information
  • service information One or more of the cell information.
  • the access control information of the RSs supported by the network side device may include access control information of one or more RSs.
  • the network side device may broadcast the slice information (ie, Slice information) of the supported RSs in SIB1, and the access control information of each RS, where the access control information may be:
  • timer T39X (Timer T39X) is defined as shown in Table 1 below:
  • the terminal can flexibly select an appropriate RS to initiate an access request to the network-side device according to the slice information and access control information of the supported RSs sent by the network-side device, for example, select that both the terminal and the network-side device support
  • the RS can be used for access to avoid network access failures and improve network access efficiency.
  • step 201 Send to the network side device a connection for accessing the target radio access network slice RS incoming requests, including:
  • an access request for accessing the target RS is sent to the network side device.
  • the access control information of the RS supported by the network side device includes the access control information of one or more RSs, wherein the access control information of the one or more RSs includes the access control information of the target RS.
  • the terminal Before initiating an access request to access the target RS, if the terminal determines that the access control information of the target RS is prohibited according to the access control information of the RS, it will start a timer, and after the timer expires, send a notification to the network side. The device sends an access request for accessing the target RS.
  • the terminal Before the user equipment (User Equipment, UE) (that is, the terminal) initiates an access request, it performs the relevant access control process. If the UAC-BarringPerSlice contains the RS that the terminal wants to initiate access to, the terminal checks the UAC-BarringPerSlice configuration. If configured as barred (Barred), start the timer (Start timer T39x). By setting this timer, the network can protect itself from being overloaded by barring access attempts by certain UEs when the network is under high load.
  • UAC-BarringPerSlice contains the RS that the terminal wants to initiate access to
  • the terminal checks the UAC-BarringPerSlice configuration. If configured as barred (Barred), start the timer (Start timer T39x). By setting this timer, the network can protect itself from being overloaded by barring access attempts by certain UEs when the network is under high load.
  • the access control method further includes:
  • the above steps may be performed before step 201, or may be performed after step 201 and before step 202, which is not limited herein.
  • the network side device may determine whether the RS set includes the target RS based on the first indication information sent by the terminal, so as to further determine to send the access resource to the terminal, or send an indication of denying access to the terminal.
  • the RS set may include one or more RSs that the terminal supports or desires to access.
  • the network-side device may learn one or more RSs that the terminal supports or expects to access based on the first indication information, so as to determine whether to accept the terminal to access the target RS.
  • the terminal sends the first indication information under the condition that at least one of the following is satisfied:
  • step 202 receiving a response message from the network side device based on the access request, includes:
  • the RS set includes the target RS
  • a response message of the network side device accepting that the terminal accesses the target RS is received, where the response message includes the access resources of the target RS.
  • the network side device accepts the terminal to access the target RS.
  • the network side device accepts the terminal to access the target RS, it provides the terminal with access resources to access the target RS, and the response message includes the access resources of the target RS.
  • step 202 receiving a response message from the network side device based on the access request, includes:
  • the RS set includes the target RS
  • the target RS has reached the maximum number of connectable terminals
  • the target RS has reached the maximum number of connections
  • the target RS has reached the maximum number of downlink connections
  • the target RS has reached the maximum number of uplink connections
  • the target RS is out of service.
  • the RS set may include one or more RSs. If the RS set includes a target RS, and the target RS satisfies: the target RS has reached the maximum number of connectable terminals, the target RS has reached the maximum number of connected terminals When at least one of the number, the target RS has reached the maximum number of downlink connections, the target RS has reached the maximum uplink connection number, the target RS has been overloaded or congested, and the target RS is not serving, the network
  • the side device denies the terminal access to the target RS, and sends a response message to the terminal for denying the terminal access to the target RS, for example, refusing the terminal to access the target RS through radio resource control (Radio Resource Control, RRC) signaling. Describe the access request of the target RS.
  • the response message is used to indicate at least one of the above, so as to inform the terminal of the reason for refusing access.
  • the terminal receives a response message that the network side device denies the terminal to access the target RS, where the response message includes second indication information for indicating a preset time period to wait.
  • the network-side device may send the second indication information to the terminal, instructing the terminal to wait for a preset time period, that is, in the case of refusing the terminal to access the target RS, the network-side device may send a message to the terminal using the second indication information. Based on the second indication information indicating to wait for the preset duration, further, after receiving the second indication information, the terminal waits for the preset duration, and after the waiting time expires, the terminal may re-request to access the target RS.
  • the response message includes access resources of a first RS, and the first RS belongs to the RS set.
  • the first RS belongs to the RS set, that is, the first RS is an RS that the terminal supports or desires to access. If the network-side device does not support the target RS or the current period does not support the target RS, the network-side device may select a first RS supported by the terminal and also supported by the network-side device for the terminal according to the RS set reported by the terminal, and report to the terminal. Sending the access resource for accessing the first RS, that is, the response message including the access resource of the first RS, can improve the efficiency of the terminal accessing the network.
  • step 202 receiving a response message from the network side device based on the access request, includes:
  • the third indication information sent by the network side device and used to indicate that the access is rejected is received.
  • the network-side device rejects the access request of the terminal. In this case, the terminal receives the third indication information sent by the network-side device to indicate access rejection.
  • the third indication information is used to indicate at least one of the following:
  • the target RS is not the serving RS of the terminal
  • the terminal does not subscribe to the target RS.
  • At least one of the above is also the reason for the network side device to reject the terminal access request.
  • the terminal reports the first indication information that supports or expects to access RS1, RS4' and RS4 to the network side device, that is, the RS set includes RS1 information, RS4' information and RS4 information;
  • the terminal initiates an access request for accessing the target RS to the network side device, where the target RS includes RS1, RS4' and RS4;
  • the network side device selects the RS supported by both the network side device and the terminal according to the RS set and the RS supported by itself, that is, RS1, and issues access resources for accessing RS1 to the terminal, such as a random access channel (Random Access Channel). , RACH) resources.
  • RS1 Random Access Channel
  • RACH Random Access Channel
  • FIG. 3 is a flowchart of an access control method provided by an embodiment of the present application.
  • the access control method is applied to a network side device and includes the following steps:
  • Step 301 Receive an access request sent by a terminal for accessing a target radio access network slice RS.
  • a first radio access network (Radio Access Network, RAN) slice (slice) may include one or more RSs.
  • Step 302 responding to the access request.
  • the response may be a response from the network side device accepting the terminal's access to the target RS. If the target RS includes multiple RSs, the network side device selects one of the multiple RSs to accept the terminal's access, or it may be the network side device rejects. In response to the terminal accessing the target RS, if the target RS includes multiple RSs, the network side device denies the terminal to access any one of the target RSs.
  • the access request for accessing the target RS sent by the terminal is received, and the access request is responded to, so that the network access control can be based on the access network slice level, and the granularity of the network access control is finer. , the network access of the terminal is more flexible.
  • the access control method further includes:
  • the slice information and access control information of the RS supported by the network side device are broadcast through the system message block.
  • the above steps may be performed before step 301, or may be performed after step 301, which is not limited herein. If the above steps are performed before step 301, before sending the access request for accessing the target RS to the network side device, the terminal receives the slice information and access control information of the RS supported by the network side device broadcast by the network side device, and may Based on the access control information of the RS supported by the network side device, select an appropriate RS to initiate an access request to improve access efficiency.
  • the terminal can select an appropriate RS to initiate an access request based on the access control information of the RS supported by the network side device in the next access request, thereby improving access efficiency.
  • the network side device broadcasts the slice information and access control information of the RSs it supports through the system message block, and the terminal receives the system message block and learns the RS slice information and access control information supported by the network side device.
  • the system message block there may be one or more RSs supported by the network side device.
  • the slice information of the RS may include: public land mobile network (Public Land Mobile Network, PLMN) identity (Identity Document, ID), tracking area (Tracking area) information, RAN notification area (notification area) information, frequency information, service information, One or more of the cell information.
  • PLMN Public Land Mobile Network
  • ID Identity Document
  • Tracking area tracking area
  • RAN notification area notification area
  • frequency information frequency information
  • service information One or more of the cell information.
  • the access control information of the RSs supported by the network side device may include access control information of one or more RSs.
  • the network side device broadcasts the supported RS slice information and access control information to the terminal, so that the terminal can flexibly select an appropriate RS to initiate an access request to the network side device, thereby improving network access efficiency.
  • the network side device can broadcast the supported RS slice information (that is, the Slice information) in SIB1, and the access control information of each RS, wherein the access control information can refer to the record in the embodiment shown in FIG. 2, here I won't go into details.
  • the access control method further includes: receiving first indication information sent by the terminal, where the first indication information is used to indicate an RS set that the terminal supports or expects to access.
  • the above steps may be performed before step 301, or may be performed after step 301 and before step 302, which is not limited herein.
  • the network side device may determine whether the RS set includes the target RS based on the first indication information sent by the terminal, so as to further determine to send the access resource to the terminal, or send an indication of denying access to the terminal.
  • the RS set may include information of RSs supported or desired to be accessed by one or more terminals, and the information of the RSs may be the identifiers of the RSs.
  • the network-side device may acquire information of one or more RSs that the terminal supports or expects to access based on the first indication information, so as to determine whether to accept the terminal to access the target RS.
  • the terminal sends the first indication information under the condition that at least one of the following is satisfied:
  • step 302, responding to the access request includes:
  • the terminal is provided with access resources for accessing the target RS.
  • the network side device accepts the terminal to access the target RS, and provides the terminal with access resources for accessing the target RS.
  • step 302, responding to the access request includes:
  • the RS set includes the target RS, send a response message to the terminal for denying the terminal access to the target RS, where the response message is used to indicate at least one of the following:
  • the target RS has reached the maximum number of connectable terminals
  • the target RS has reached the maximum number of connections
  • the target RS has reached the maximum number of downlink connections
  • the target RS has reached the maximum number of uplink connections
  • the target RS is out of service.
  • the network side device rejects the terminal to access the target RS.
  • the response message includes second indication information for indicating waiting for a preset duration.
  • the network-side device may send indication information to the terminal, instructing the terminal to wait for a preset time period, that is, in the case of refusing the terminal to access the target RS, the network-side device may send an indication message to the terminal. Waiting for the second indication information of the preset duration, further, after receiving the second indication information, the terminal waits for the preset duration, and after the waiting time expires, the terminal may re-request to access the target RS.
  • step 302, responding to the access request includes:
  • the third indication information for indicating rejection of access is sent to the terminal.
  • the network side device rejects the access request of the terminal. In this case, the network side device sends third indication information to the terminal for indicating access rejection.
  • the third indication information is used to indicate at least one of the following:
  • the target RS is not the serving RS of the terminal
  • the terminal does not subscribe to the target RS.
  • At least one of the above is also the reason for the network side device to reject the terminal access request.
  • the terminal reports the first indication information that supports or expects to access RS1, RS4' and RS4 to the network side device, that is, the RS set includes RS1 information, RS4' information and RS4 information;
  • the terminal initiates an access request for accessing the target RS to the network side device, where the target RS includes RS1, RS4' and RS4;
  • the network-side device selects the RS supported by both the network-side device and the terminal according to the RS set and the RSs it supports, ie RS1, and delivers access resources for accessing RS1, such as RACH resources, to the terminal.
  • the execution body may be an access control apparatus, or a control module in the access control apparatus for executing the access control method.
  • the access control device provided by the embodiment of the present application is described by taking an access control device executing an access control method as an example.
  • FIG. 4 is a structural diagram of an access control apparatus provided by an embodiment of the present application.
  • the access control apparatus 400 applied to a terminal, includes:
  • a first sending module 401 configured to send an access request for accessing a target radio access network slice RS to a network side device
  • the first receiving module 402 is configured to receive a response message from the network side device based on the access request.
  • the access control apparatus 400 further includes:
  • the second receiving module is configured to receive the slice information and access control information of the RS supported by the network-side device broadcast by the network-side device through the system message block.
  • the access control apparatus 400 further includes:
  • the second sending module is configured to send first indication information to the network side device, where the first indication information is used to indicate the RS set supported or expected to be accessed by the terminal.
  • the response message includes access resources of a first RS, and the first RS belongs to the RS set.
  • the first indication information is sent:
  • the first receiving module 402 is further configured to receive, in the case that the RS set includes the target RS, a response message from the network side device for accepting that the terminal accesses the target RS, the response message Including the access resources of the target RS.
  • the first receiving module 402 is further configured to receive, if the RS set includes the target RS, receive a response message from the network-side device refusing the terminal to access the target RS, the response The message is used to indicate at least one of the following:
  • the target RS has reached the maximum number of connectable terminals
  • the target RS has reached the maximum number of connections
  • the target RS has reached the maximum number of downlink connections
  • the target RS has reached the maximum number of uplink connections
  • the target RS is out of service.
  • the response message includes second indication information for indicating waiting for a preset duration.
  • the first receiving module 402 is further configured to receive, in the case that the RS set does not include the target RS, receiving third indication information sent by the network-side device and used to indicate access refusal.
  • the third indication information is used to indicate at least one of the following:
  • the target RS is not the serving RS of the terminal
  • the terminal does not subscribe to the target RS.
  • the first sending module 401 includes:
  • a starter submodule configured to start a timer if it is determined according to the access control information of the RS supported by the network side device that the access control information of the target RS is prohibited;
  • a sending submodule configured to send an access request for accessing the target RS to the network side device if the timer times out.
  • the access control apparatus in this embodiment of the present application may be an apparatus, or may be a component, an integrated circuit, or a chip in a terminal.
  • the device may be a mobile terminal or a non-mobile terminal.
  • the mobile terminal may include, but is not limited to, the types of terminals 11 listed above, and the non-mobile terminal may be a server, a network attached storage (NAS), a personal computer (personal computer, PC), a television ( television, TV), teller machine, or self-service machine, etc., which are not specifically limited in the embodiments of the present application.
  • the access control device in this embodiment of the present application may be a device with an operating system.
  • the operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
  • the access control apparatus 400 provided in this embodiment of the present application can implement each process implemented by the method embodiment in FIG. 2 , and achieve the same technical effect. To avoid repetition, details are not described here.
  • FIG. 5 is a structural diagram of an access control apparatus provided by an embodiment of the present application.
  • the access control apparatus 500 applied to a network side device, includes:
  • a receiving module 501 configured to receive an access request sent by a terminal for accessing a target radio access network slice RS;
  • the access control apparatus 500 further includes a broadcasting module, configured to broadcast the slice information and access control information of the RS supported by the network side device through a system message block.
  • the access control apparatus 500 further includes a second receiving module, configured to receive first indication information sent by the terminal, where the first indication information is used to indicate an RS set that the terminal supports or expects to access.
  • the response module is configured to send a response message for accessing the first RS to the terminal, where the response message includes access resources of the first RS, and the first RS belongs to the RS set.
  • the first indication information is received under the condition that at least one of the following is satisfied:
  • the terminal initiates the connection process or restores the connection process
  • the response module 502 is configured to, if the RS set includes the target RS, send a response message for accessing the target RS to the terminal, where the response message includes the access resource of the target RS.
  • the response module 502 is configured to send, to the terminal, a response message for refusing the terminal to access the target RS when the RS set includes the target RS, where the response message is used to indicate At least one of the following:
  • the target RS has reached the maximum number of connectable terminals
  • the target RS has reached the maximum number of connections
  • the target RS has reached the maximum number of downlink connections
  • the target RS has reached the maximum number of uplink connections
  • the target RS is out of service.
  • the response message includes second indication information for indicating waiting for a preset duration.
  • the response module 502 is configured to send, to the terminal, third indication information for indicating rejection of access when the RS set does not include the target RS.
  • the third indication information is used to indicate at least one of the following:
  • the target RS is not the serving RS of the terminal
  • the terminal does not subscribe to the target RS.
  • the access control apparatus 500 provided in this embodiment of the present application can implement each process implemented by the method embodiment in FIG. 3 , and achieve the same technical effect. To avoid repetition, details are not described here.
  • an embodiment of the present application further provides a terminal 600, including a processor 601, a memory 602, a program or instruction stored in the memory 602 and executable on the processor 601,
  • a terminal 600 including a processor 601, a memory 602, a program or instruction stored in the memory 602 and executable on the processor 601
  • the program or instruction is executed by the processor 601
  • each process of the embodiment of the access control method shown in FIG. 2 is implemented, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
  • FIG. 7 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
  • the terminal 1000 includes but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, a processor 1010 and other components .
  • the terminal 1000 may also include a power supply (such as a battery) for supplying power to various components, and the power supply may be logically connected to the processor 1010 through a power management system, so as to manage charging, discharging, and power consumption through the power management system management and other functions.
  • a power supply such as a battery
  • the terminal structure shown in FIG. 7 does not constitute a limitation on the terminal, and the terminal may include more or less components than shown, or combine some components, or arrange different components, which will not be repeated here.
  • the input unit 1004 may include a graphics processor (Graphics Processing Unit, GPU) 10041 and a microphone 10042. Such as camera) to obtain still pictures or video image data for processing.
  • the display unit 1006 may include a display panel 10061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 1007 includes a touch panel 10071 and other input devices 10072 .
  • the touch panel 10071 is also called a touch screen.
  • the touch panel 10071 may include two parts, a touch detection device and a touch controller.
  • Other input devices 10072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be repeated here.
  • the radio frequency unit 1001 receives the downlink data from the network side device, and then processes it to the processor 1010; in addition, sends the uplink data to the base station.
  • the radio frequency unit 1001 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • Memory 1009 may be used to store software programs or instructions as well as various data.
  • the memory 1009 may mainly include a stored program or instruction area and a storage data area, wherein the stored program or instruction area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.) and the like.
  • the memory 1009 may include a high-speed random access memory, and may also include a non-volatile memory, wherein the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM) , PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • ROM Read-Only Memory
  • PROM programmable read-only memory
  • PROM erasable programmable read-only memory
  • Erasable PROM Erasable PROM
  • EPROM electrically erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory for example at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
  • the processor 1010 may include one or more processing units; optionally, the processor 1010 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, and application programs or instructions, etc. Modem processors mainly deal with wireless communications, such as baseband processors. It can be understood that, the above-mentioned modulation and demodulation processor may not be integrated into the processor 1010.
  • the radio frequency unit 1001 is configured to send an access request for accessing the target radio access network slice RS to a network side device, and receive a response message from the network side device based on the access request.
  • the radio frequency unit 1001 is further configured to receive the slice information and access control information of the RS supported by the network side device broadcast by the network side device through the system message block.
  • the radio frequency unit 1001 is further configured to send first indication information to the network side device, where the first indication information is used to indicate the RS set supported or expected to be accessed by the terminal.
  • the response message includes access resources of a first RS, and the first RS belongs to the RS set.
  • the first indication information is sent:
  • the radio frequency unit 1001 is further configured to, in the case that the RS set includes the target RS, receive a response message from the network side device accepting that the terminal accesses the target RS, where the response message includes the target RS RS access resources.
  • the radio frequency unit 1001 is further configured to receive a response message from the network side device refusing the terminal to access the target RS when the RS set includes the target RS, and the response message uses To indicate at least one of the following:
  • the target RS has reached the maximum number of connectable terminals
  • the target RS has reached the maximum number of connections
  • the target RS has reached the maximum number of downlink connections
  • the target RS has reached the maximum number of uplink connections
  • the target RS is out of service.
  • the response message includes second indication information for indicating waiting for a preset duration.
  • the radio frequency unit 1001 is further configured to receive, if the RS set does not include the target RS, receive third indication information that is sent by the network side device and used to indicate that access is refused.
  • the third indication information is used to indicate at least one of the following:
  • the target RS is not the serving RS of the terminal
  • the terminal does not subscribe to the target RS.
  • the processor 1010 is configured to start a timer if it is determined according to the access control information of the RS supported by the network side device that the access control information of the target RS is prohibited, and when the timer times out , the radio frequency unit 1001 is controlled to send an access request for accessing the target RS to the network side device.
  • the terminal provided in the embodiment of the present application can implement each process implemented by the method embodiment in FIG. 2 and achieve the same technical effect, and to avoid repetition, details are not described here.
  • the network side device 700 includes: an antenna 71 , a radio frequency device 72 , and a baseband device 73 .
  • the antenna 71 is connected to the radio frequency device 72 .
  • the radio frequency device 72 receives information through the antenna 71, and sends the received information to the baseband device 73 for processing.
  • the baseband device 73 processes the information to be sent and sends it to the radio frequency device 72
  • the radio frequency device 72 processes the received information and sends it out through the antenna 71 .
  • the above-mentioned frequency band processing apparatus may be located in the baseband apparatus 73 , and the method performed by the network side device in the above embodiments may be implemented in the baseband apparatus 73 .
  • the baseband apparatus 73 includes a processor 74 and a memory 75 .
  • the baseband device 73 may include, for example, at least one baseband board on which multiple chips are arranged. As shown in FIG. 8 , one of the chips is, for example, the processor 74 and is connected to the memory 75 to call the program in the memory 75 to execute The network-side device shown in the above method embodiments operates.
  • the baseband device 73 may further include a network interface 76 for exchanging information with the radio frequency device 72, and the interface is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network-side device in the embodiment of the present invention further includes: instructions or programs stored in the memory 75 and executable on the processor 74, and the processor 74 invokes the instructions or programs in the memory 75 to execute the modules shown in FIG. 5 .
  • An embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, each process of the access control method embodiment shown in FIG. 3 is implemented, And can achieve the same technical effect, in order to avoid repetition, it is not repeated here.
  • the processor is the processor in the terminal described in the foregoing embodiment.
  • the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
  • An embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a network-side device program or instruction to implement the above-mentioned Figure 2,
  • the chip includes a processor and a communication interface
  • the communication interface is coupled to the processor
  • the processor is used to run a network-side device program or instruction to implement the above-mentioned Figure 2
  • the various processes of the embodiment of the access control method shown in FIG. 3 can achieve the same technical effect. In order to avoid repetition, details are not repeated here.
  • the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Sont divulgués dans la présente invention un procédé et un appareil de contrôle d'accès, un terminal et un dispositif côté réseau. Au cours du procédé de contrôle d'accès, un terminal envoie à un dispositif côté réseau une demande d'accès utilisée pour accéder à une RS cible et, sur la base de la demande d'accès, reçoit un message de réponse du dispositif côté réseau.
PCT/CN2021/109830 2020-07-31 2021-07-30 Procédé et appareil de contrôle d'accès, terminal et dispositif côté réseau WO2022022711A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010763102.4 2020-07-31
CN202010763102.4A CN114071645B (zh) 2020-07-31 2020-07-31 接入控制方法、装置、终端及网络侧设备

Publications (1)

Publication Number Publication Date
WO2022022711A1 true WO2022022711A1 (fr) 2022-02-03

Family

ID=80037635

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/109830 WO2022022711A1 (fr) 2020-07-31 2021-07-30 Procédé et appareil de contrôle d'accès, terminal et dispositif côté réseau

Country Status (2)

Country Link
CN (1) CN114071645B (fr)
WO (1) WO2022022711A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106851589A (zh) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 无线网络接入方法、装置及系统
CN107155187A (zh) * 2016-03-03 2017-09-12 华为技术有限公司 通信方法、终端设备和网络侧设备
WO2018045511A1 (fr) * 2016-09-07 2018-03-15 华为技术有限公司 Procédé et appareil de contrôle d'accès
CN110391926A (zh) * 2018-04-20 2019-10-29 中国移动通信有限公司研究院 网络切片应用控制方法及装置、通信设备及存储介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6479989B2 (ja) * 2016-07-04 2019-03-06 アップル インコーポレイテッドApple Inc. ネットワークスライス選択
CN108243483A (zh) * 2016-12-23 2018-07-03 大唐移动通信设备有限公司 一种通信方法、装置及系统
CN109474967B (zh) * 2017-01-25 2019-11-19 华为技术有限公司 通信方法和通信装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107155187A (zh) * 2016-03-03 2017-09-12 华为技术有限公司 通信方法、终端设备和网络侧设备
WO2018045511A1 (fr) * 2016-09-07 2018-03-15 华为技术有限公司 Procédé et appareil de contrôle d'accès
CN106851589A (zh) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 无线网络接入方法、装置及系统
CN110391926A (zh) * 2018-04-20 2019-10-29 中国移动通信有限公司研究院 网络切片应用控制方法及装置、通信设备及存储介质

Also Published As

Publication number Publication date
CN114071645B (zh) 2023-07-21
CN114071645A (zh) 2022-02-18

Similar Documents

Publication Publication Date Title
WO2022089565A1 (fr) Configuration d'informations de groupe de cellules secondaires, procédé d'acquisition et dispositif de communication
WO2022007930A1 (fr) Procédé et appareil de traitement de transfert de porteuse, et terminal
WO2021239021A1 (fr) Procédé et appareil d'acquisition d'informations de configuration, équipement utilisateur et système
WO2022037489A1 (fr) Procédé et appareil de gestion de réception discontinue, terminal et dispositif côté réseau
WO2022068874A1 (fr) Procédé et appareil de traitement de rapport, terminal et dispositif de réseau
WO2022022636A1 (fr) Procédé et appareil d'accès initial, terminal et dispositif côté réseau
WO2022017359A1 (fr) Procédé de commande de démarrage de communication directe et dispositif associé
CN113746876A (zh) 通信代理的建立方法、装置及终端
WO2022143657A1 (fr) Procédé et appareil de sélection de réseau, dispositif et support de stockage
WO2022017481A1 (fr) Procédé de mise à jour d'une ressource de transmission de service, terminal et dispositif côté réseau
US20230328789A1 (en) Busy indication transmission method and apparatus
US20230262654A1 (en) Paging message receiving method, paging configuration method, terminal, and network side device
CN115134797B (zh) 紧急服务的处理方法、网络侧设备及终端
WO2022068813A1 (fr) Procédé et appareil de commande de congestion, terminal et dispositif côté réseau
WO2022068903A1 (fr) Procédé et appareil de sélection de réseau, procédé et appareil de transmission d'informations, et procédé et appareil d'acquisition d'informations
WO2022022711A1 (fr) Procédé et appareil de contrôle d'accès, terminal et dispositif côté réseau
WO2022022685A1 (fr) Procédé de contrôle d'accès, terminal et dispositif côté réseau
WO2022033429A1 (fr) Procédé de traitement de transmission de données, procédé de configuration de ressource et dispositif associé
WO2022017466A1 (fr) Procédé et appareil de transmission de message, procédé et appareil de réception de message, et dispositif de communication
CN114302492A (zh) 切片请求方法、终端及网络侧设备
WO2022017480A1 (fr) Procédé et appareil de gestion de service cible et dispositif de communication
WO2023051507A1 (fr) Procédé de changement de capacité d'équipement utilisateur (ue), terminal et dispositif côté réseau
WO2022068902A1 (fr) Procédé et appareil permettant à un terminal d'accéder à un réseau, dispositif et support de stockage lisible
WO2022083630A1 (fr) Procédé et appareil de radiomessagerie, terminal, dispositif de réseau et support de stockage lisible
WO2022206552A1 (fr) Procédé et appareil de transfert intercellulaire, dispositif côté réseau et terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21849057

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21849057

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 21849057

Country of ref document: EP

Kind code of ref document: A1