WO2022068902A1 - 终端接入网络的方法、装置、设备及可读存储介质 - Google Patents
终端接入网络的方法、装置、设备及可读存储介质 Download PDFInfo
- Publication number
- WO2022068902A1 WO2022068902A1 PCT/CN2021/121832 CN2021121832W WO2022068902A1 WO 2022068902 A1 WO2022068902 A1 WO 2022068902A1 CN 2021121832 W CN2021121832 W CN 2021121832W WO 2022068902 A1 WO2022068902 A1 WO 2022068902A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- access
- mint
- function
- terminal
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 91
- 230000001960 triggered effect Effects 0.000 claims abstract description 62
- 235000006679 Mentha X verticillata Nutrition 0.000 claims abstract 67
- 235000002899 Mentha suaveolens Nutrition 0.000 claims abstract 67
- 235000001636 Mentha x rotundifolia Nutrition 0.000 claims abstract 67
- 230000006870 function Effects 0.000 claims description 232
- 238000004891 communication Methods 0.000 claims description 15
- 230000003111 delayed effect Effects 0.000 claims description 10
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 16
- 238000004364 calculation method Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 230000011664 signaling Effects 0.000 description 6
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 206010033799 Paralysis Diseases 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/10—Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
- H04W36/144—Reselecting a network or an air interface over a different radio air interface technology
- H04W36/1443—Reselecting a network or an air interface over a different radio air interface technology between licensed networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/50—Connection management for emergency connections
Definitions
- the present application belongs to the field of communication technologies, and specifically relates to a method, apparatus, device, and readable storage medium for a terminal to access a network.
- a network may not be able to provide normal services when certain disaster events occur (for example, fire, earthquake, tsunami, etc.), the terminals in the network cannot obtain normal services in the network where the disaster occurs, and a large number of terminals in the network may simultaneously Attempting to access in a certain second network will cause network resources of the second network to be strained, congested, or even paralyzed.
- certain disaster events for example, fire, earthquake, tsunami, etc.
- the purpose of the embodiments of the present application is to provide a method, apparatus, device, and readable storage medium for a terminal to access a network, so as to solve the problem of how to avoid a large number of terminals attempting to access a second network at the same time when an event corresponding to the MINT function occurs in the first network. network and cause the second network to be congested.
- a first aspect provides a method for a terminal to access a network, applied to a terminal, including:
- a second aspect provides a method for a terminal to access a network, which is applied to a network side device, including:
- the access control information related to the MINT function of the second network and/or the configuration related to the MINT function of the terminal is used to assist the terminal in the MINT function when an event corresponding to the MINT function occurs in the first network.
- An access request to the second network triggered by the function performs access control.
- an apparatus for a terminal to access a network including:
- the first processing module is configured to perform access control on an access request to the second network triggered by the MINT function when an event corresponding to the MINT function occurs in the first network.
- a device for a terminal to access a network is provided, which is applied to a network side device, including:
- a sending module configured to send access control information related to the MINT function of the second network to the terminal;
- the access control information related to the MINT function of the second network and/or the configuration related to the MINT function of the terminal is used to assist the terminal in the MINT function when an event corresponding to the MINT function occurs in the first network.
- An access request to the second network triggered by the function performs access control.
- a terminal including: a processor, a memory, and a program stored on the memory and executable on the processor, the program being executed by the processor as described in the first aspect steps of the method described.
- a network-side device comprising: a processor, a memory, and a program stored on the memory and executable on the processor, the program being executed by the processor to achieve the second The steps of the method of the aspect.
- a readable storage medium stores programs or instructions, and when the programs or instructions are executed by a processor, implement the steps of the method according to the first aspect or the second aspect.
- a program product is provided, the program product is stored in a non-volatile storage medium, the program product is executed by at least one processor to implement the method according to the first aspect or the second aspect step.
- a chip in a ninth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement the first aspect or the second aspect the method described.
- a tenth aspect provides a terminal configured to perform the method of the first aspect.
- a network-side device is provided, and the network-side device is configured to perform the method of the second aspect.
- the terminal when an event corresponding to the MINT function occurs in the first network, the terminal will determine whether the second network allows it to access, so as to avoid congestion of the second network caused by a large number of terminals attempting to access the second network at the same time.
- FIG. 1 is a block diagram of a wireless communication system to which an embodiment of the present application can be applied;
- FIG. 2 is one of the schematic diagrams of a method for a terminal to access a network according to an embodiment of the present application
- FIG. 3 is the second schematic diagram of a method for a terminal to access a network according to an embodiment of the present application
- FIG. 4 is a third schematic diagram of a method for a terminal to access a network according to an embodiment of the present application
- FIG. 5a and FIG. 5b are schematic diagrams of the access identifier configuration in Embodiment 1 of the embodiments of the present application;
- FIG. 6 is a schematic diagram of a fifth generation (5th Generation , 5G) system network function support information element in Embodiment 2 of an embodiment of the present application;
- FIG. 7 is a schematic diagram of indicating whether the second network supports the MINT function in Embodiment 2 of the embodiments of the present application;
- FIG. 9 is the second schematic diagram of the access class definition information element defined by the operator in Embodiment 4 of the embodiment of the present application.
- FIG. 10 is the third schematic diagram of the access class definition information element defined by the operator in Embodiment 4 of the embodiments of the present application.
- FIG. 11 is a flowchart of an access restriction check in Embodiment 5 of the embodiments of the present application.
- FIG. 12 is one of the schematic diagrams of apparatuses for accessing a network by a terminal according to an embodiment of the present application.
- FIG. 13 is the second schematic diagram of an apparatus for accessing a network by a terminal according to an embodiment of the present application.
- FIG. 14 is a schematic diagram of a terminal according to an embodiment of the present application.
- FIG. 15 is a schematic diagram of a network side device according to an embodiment of the present application.
- first, second, etc. in the description and claims of this application are used to distinguish similar objects, and are not used to describe a specified order or precedence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and "first”, “second” distinguishes Usually it is a class, and the number of objects is not limited.
- the first object may be one or multiple.
- “and” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the associated objects are in an "or” relationship.
- LTE Long Term Evolution
- LTE-Advanced LTE-Advanced
- LTE-A Long Term Evolution-Advanced
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- FDMA Frequency Division Multiple Access
- OFDMA Orthogonal Frequency Division Multiple Access
- SC-FDMA Single-carrier Frequency-Division Multiple Access
- system and “network” in the embodiments of the present application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies.
- NR New Radio
- the following description describes a New Radio (NR) system for example purposes, and NR terminology is used in most of the description below, although these techniques are also applicable to applications other than NR system applications, such as 6th generation ( 6th Generation , 6G) communication system.
- 6th generation 6th Generation
- FIG. 1 shows a block diagram of a wireless communication system to which the embodiments of the present application can be applied.
- the wireless communication system includes a terminal 11 and a network-side device 12 .
- the terminal 11 may also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital computer Assistant (Personal Digital Assistant, PDA), handheld computer, netbook, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), mobile Internet device (Mobile Internet Device, MID), wearable device (Wearable Device) or vehicle-mounted device (Vehicle user equipment, VUE), pedestrian terminal (pedestrian user equipment, PUE) and other terminal-side equipment, wearable devices include: bracelets, headphones, glasses, etc.
- the network side device 12 may be a base station or a core network, wherein the base station may be referred to as a Node B, an evolved Node B, an access point, a Base Transceiver Station (BTS), a radio base station, a radio transceiver, a basic service Set (Basic Service Set, BSS), Extended Service Set (Extended Service Set, ESS), Node B, Evolved Node B (evolved Node B, eNB), Home Node B, Home Evolved Node B, Wireless Local Area Network (wireless local area network) area network, WLAN) access point, wireless fidelity (WiFi) node, Transmitting Receiving Point (TRP) or some other appropriate term in the field, as long as the same technical effect is achieved, all
- the base station described above is not limited to the specified technical vocabulary. It should be noted that, in the embodiments of this application, only the base station in the NR system
- the terminal when the first network may not be able to provide normal services when certain disaster events occur (for example, fire, earthquake, tsunami, etc.), the terminal attempts to access other networks that support its access.
- the function is called the Minimization of Service Interruption (MINT) function, and the disaster event is called the Disaster event corresponding to MINT.
- MINT Minimization of Service Interruption
- the terminal executing the MINT function determines the access identity and/or access type corresponding to the access. (access category), and/or, MINT access control information sent by the network for access control.
- the first parameter in the terminal indicates the access identity corresponding to the MINT function, and the first parameter is stored in, for example, the Universal Subscriber Identity Module (USIM) or the non-Volatile Memory of the terminal. middle.
- the terminal checks whether the terminal can access in the second network according to the configuration of the MINT function by the terminal, one or more of the access identity, access category corresponding to the MINT function, and MINT access control information of the second network.
- USIM Universal Subscriber Identity Module
- the network-side equipment can send access control information corresponding to the MINT function to the terminal, for example: when the operator defines the MINT function to attempt to access the corresponding Access Category, and the access probability of the access category execution ; If access is disabled due to the MINT function, I hope the UE will wait for a long time and then try again.
- an embodiment of the present application provides a method for a terminal to access a network, where the execution subject of the method may be a terminal, and the specific steps include: step 201.
- Step 201 When an event corresponding to the MINT function (such as a disaster event, such as fire, earthquake, tsunami, etc.) occurs in the first network, access control is performed on the access request to the second network triggered by the MINT function.
- an event corresponding to the MINT function such as a disaster event, such as fire, earthquake, tsunami, etc.
- the method further includes: if the second network allows the terminal to access, initiating the access request to the second network; or, if the The second network currently does not allow the terminal to access, then retry to access the second network.
- the retrying to access the second network includes: determining access restriction conditions according to access control information of the second network; starting a timer according to the access restriction conditions; After the timer expires, retry to access the second network.
- the terminal when an event corresponding to the MINT function occurs in the first network, the terminal will determine whether the second network allows it to access, so as to avoid congestion of the second network caused by a large number of terminals attempting to access the second network at the same time.
- an embodiment of the present application provides a method for a terminal to access a network, where the execution subject of the method may be a terminal, and the specific steps include: step 301 .
- Step 301 When an event corresponding to the MINT function occurs in the first network, according to the first information, determine whether the second network allows the access request triggered by the MINT function of the terminal to access the second network;
- the first information includes one or more of the following:
- an access identifier For example, an access identifier, an access type, and the like.
- step 301 according to the access identifier corresponding to the MINT function selected by the terminal and the received access identifier corresponding to the MINT function of the second network, determine the Whether the second network allows the access request triggered by the MINT function of the terminal to access the second network.
- the method further includes: judging whether the second network supports the MINT function; if the second network supports the MINT function, selecting the The access identifier corresponding to the MINT function indicated by the second network (eg, indicated by broadcasting).
- determining whether the second network supports the MINT function includes: acquiring a function list supported by the second network; and determining whether the second network supports the MINT function according to the function list supported by the second network.
- a Universal Subscriber Identity Module (USIM) of the terminal or a retentive memory stores a first parameter, where the first parameter indicates an access identifier corresponding to the MINT function.
- USIM Universal Subscriber Identity Module
- the second network is determined according to the access type corresponding to the MINT function selected by the terminal and the access type corresponding to the MINT function of the second network. Whether the network allows the access request triggered by the MINT function of the terminal to access the second network.
- the method may further include: acquiring, through the first network or the second network, an access category corresponding to the MINT function defined by the operator.
- the method further includes:
- Access control information related to the MINT function of the second network is received.
- the access control information includes one or more of the following:
- the network broadcasts the access probability corresponding to the MINT access category, for example, 0.9.
- the terminal locally generates a random number ranging from 0 to 1. If the random number is less than 0.9, it is allowed to initiate access, otherwise, Access is temporarily not allowed.
- the first type of access request that is not prohibited, the first type of access request is triggered by the MINT function
- the MINT function is triggered when access to some specific networks is triggered.
- the second type of access request that is not prohibited, the second type of access request is triggered by users of some specific networks (such as the first network) due to the MINT function; for example, the second network may broadcast information In indicates that a terminal of some networks (such as the first network) can access the second network.
- a delayed third type of access request where the third type of access request is triggered by the MINT function or a user of a specific network (such as the first network) is triggered by the MINT function;
- the method further includes: if the second network allows the terminal to access, initiating the access request to the second network; or, if the The second network currently does not allow the terminal to access, then retry to access the second network.
- the retrying to access the second network includes: determining access restriction conditions according to access control information of the second network; starting a timer according to the access restriction conditions; After the timer expires, retry to access the second network.
- the first network may not be able to provide normal services when certain disaster events (such as fire, earthquake, tsunami, etc.) occur (when the terminal attempts to access the second network that supports its access, according to the terminal's
- the configuration related to the MINT function and/or the access control information related to the MINT function of the second network determines whether the second network allows the terminal to access, so as to improve the probability of the terminal accessing the second network due to the MINT function, and to improve the network when a MINT-related event occurs. Efficiency in the use of access resources.
- an embodiment of the present application provides a method for a terminal to access a network, where the execution subject of the method is a network side device, and the specific steps include: step 401 .
- Step 401 Send access control information related to the MINT function of the second network to the terminal;
- the access control information related to the MINT function of the second network and/or the configuration related to the MINT function of the terminal is used to assist the terminal in the MINT function when an event corresponding to the MINT function occurs in the first network.
- An access request to the second network triggered by the function performs access control.
- the access control information includes one or more of the following:
- the first type of access request that is not prohibited, the first type of access request is triggered by the MINT function
- the second type of access request that is not prohibited, the second type of access request is triggered by a user of a specific network (such as the first network) due to the MINT function;
- the delayed access request of the third type is triggered by the MINT function or the user of a specific network (such as the first network) is triggered by the MINT function;
- the network-side device sends access control information related to the MINT function of the second network to the terminal.
- the terminal attempts to support its access control.
- the access identity configuration information corresponding to the MINT function is added in the embodiment 1-USIM:
- the configuration information of the access identity of the terminal for the function MINT can be added in the file EFUAC_AIC of the USIM.
- the access identity information corresponding to the MINT function is indicated by the value of one or more bits (for example, whether it is valid, and/or the value).
- the UE executing the MINT function selects the access identity used when attempting to access.
- the process of selecting the access identity used when trying to access may be related to whether the second network supports the MINT function. For example, when the second network supports the MINT function, the access identity corresponding to the MINT function is selected, and further The access identity informs the access layer.
- the UE may also decide whether to select the access identity corresponding to the MINT function when trying to access the second network according to whether the second network supports the MINT function, for example, reading the list of functions supported by the second network from the signaling of the second network (for example 5GS network feature support IE):
- the second network does not support the MINT function, do not select the access identity corresponding to the MINT function when attempting to access in the second network;
- the second network supports the MINT function, select the access identity corresponding to the MINT function when trying to access in the second network;
- the access control inspection process related to access identity is an example:
- the terminal checks the access identity corresponding to the terminal performing the MINT function broadcast by the second network, and if it finds that access is allowed, it initiates access; if it is found that the access of the access identity is restricted by certain conditions (such as probability), the Calculation of access conditions (such as probability); if the calculation result of the condition needs to delay the access, the timer is started, and the access is attempted after the timeout; if the result of the condition calculation allows the access, the access is initiated.
- certain conditions such as probability
- the Calculation of access conditions such as probability
- the signaling of the second network carries the MINT function information supported by the second network.
- the access category corresponding to the MINT function can include the standard access category, that is, the unified access category of each network, and the access category defined by the operator.
- the terminal specifies the access category corresponding to MINT according to the standard access category and the access category defined by the operator, and then uses the access category to perform access barring check.
- the access category that can allow the terminal to access with the greatest probability is selected to perform the access barring check based on various access reasons. .
- the network can send the access category and access identity corresponding to the access request related to the MINT function, information indicating the access probability, parameter information such as the calculation delay time, etc., see Table 2, and send it to the terminal through air interface signaling.
- the terminal checks the access category corresponding to the UE performing the MINT function broadcast by the second network, and if it finds that access is allowed, it initiates access; if it finds that the access of the access category is restricted by certain conditions (such as probability) Calculation of access conditions (such as probability); if the calculation result of the condition needs to delay the access, the timer is started, and the access is attempted after the timeout; if the result of the condition calculation allows the access, the access is initiated.
- certain conditions such as probability
- Example 4 The network notifies the operator-defined MINT access category.
- the network can send the access category corresponding to the access request related to the MINT function defined by the operator to the terminal through air interface signaling.
- the first network sends the access categories of the first network itself and/or other networks (such as the second network) to the terminal through signaling; or
- the second network sends the access category of the second network itself and/or other networks (such as the first network) to the terminal through signaling.
- the terminal uses the access category to attempt to access in the network at this time.
- the network may indicate the access category of the operator-defined MINT in the operator-defined access category definition information element (Operator-defined access category definitions IE), see FIG. 8 .
- Operator-defined access category definitions IE operator-defined access category definitions IE
- the Operator-defined access category definitions IE can be sent to the terminal in the NAS air interface message CONFIGURATION UPDATE COMMAND and registration result (success, failure) message.
- Embodiment 5- The access barring check process corresponding to the MINT function.
- step 1101 to step 1107 the specific steps include: step 1101 to step 1107 .
- Step 1101 When an event corresponding to the MINT function occurs in the first network, the UE decides to attempt access in the second network;
- Step 1102 The second network indicates the access control information related to the MINT function in its air interface information according to information such as load and subscription, for example: not prohibiting access requests triggered by the MINT function; (For example, some private networks, or public land mobile networks (Public Land Mobile Network, PLMN) with designated country codes) access requests triggered by the MINT function; or, according to the current load, etc., decide whether and how to delay The access request triggered by the UE due to the MINT function, such as calculating the delay time;
- PLMN Public Land Mobile Network
- Step 1103 The UE receives MINT-related access control information of the second network, for example, the second network broadcasts MINT-related UAC information;
- Step 1104 The UE performing the MINT function selects the corresponding access identity and/or access category when attempting to access in the second network;
- Step 1105 The UE checks whether access is possible according to the access identity, and/or the access category, and/or the MINT-related access control information sent by the air interface of the network, and if yes, executes step 1106; otherwise, executes step 1107;
- Step 1106 initiate an access request
- Step 1107 Start the timer, and try to access again after timeout.
- an embodiment of the present application provides an apparatus for a terminal to access a network, which is applied to a terminal.
- the apparatus 1200 includes:
- the first processing module 1201 is configured to perform access control on the access request to the second network triggered by the MINT function when an event corresponding to the MINT function occurs in the first network.
- the first processing module 1201 is further configured to: according to the first information, determine whether the second network allows the access request triggered by the MINT function of the terminal to access the second network; wherein , the first information includes one or more of the following: configuration related to the MINT function of the terminal, and access control information related to the MINT function of the second network.
- the first processing module 1201 is further configured to: determine the Whether the second network allows the access request triggered by the MINT function of the terminal to access the second network.
- the apparatus 1200 further includes: a first judgment module, configured to judge whether the second network supports the MINT function; if the second network supports the MINT function, then try to connect to the second network in the second network. When entering, select the access identifier corresponding to the MINT function of the second network.
- the judging module is further configured to: obtain a list of functions supported by the second network; and judge whether the second network supports the MINT function according to the list of functions supported by the second network.
- the global subscriber identity card of the terminal or the retentive memory stores a first parameter, and the first parameter indicates the access identifier corresponding to the MINT function.
- the apparatus 1200 further includes: a second judgment module, configured to judge the Whether the second network allows the access request triggered by the MINT function of the terminal to access the second network.
- the apparatus 1200 further includes: an obtaining module, configured to obtain, through the first network or the second network, an access category corresponding to the MINT function defined by the operator.
- the apparatus 1200 further includes: a second processing module, configured to initiate the access request to the second network if the second network allows the terminal to access; If the network currently does not allow the terminal to access, retry to access the second network.
- a second processing module configured to initiate the access request to the second network if the second network allows the terminal to access; If the network currently does not allow the terminal to access, retry to access the second network.
- the second processing module is further configured to: determine access restriction conditions according to the access control information of the second network; start a timer according to the access restriction conditions; After the timeout, access to the second network is retried.
- the apparatus 1200 further includes: a receiving module, configured to receive access control information related to the MINT function of the second network.
- the access control information includes one or more of the following:
- the first type of access request that is not prohibited, the first type of access request is triggered by the MINT function
- the second type of access request that is not prohibited, the second type of access request is triggered by a user of a specific network due to the MINT function;
- a delayed third type of access request is triggered by the MINT function or a user of a specific network is triggered by the MINT function;
- the apparatus provided in this embodiment of the present application can implement each process implemented by the method embodiment shown in FIG. 2 or 3, and achieve the same technical effect. To avoid repetition, details are not described here.
- an embodiment of the present application provides an apparatus for a terminal to access a network, which is applied to a network-side device.
- the apparatus 1300 includes:
- a sending module 1301, configured to send access control information related to the MINT function of the second network to the terminal;
- the access control information related to the MINT function of the second network and/or the configuration related to the MINT function of the terminal is used to assist the terminal in the MINT function when an event corresponding to the MINT function occurs in the first network.
- An access request to the second network triggered by the function performs access control.
- the access control information includes one or more of the following:
- the first type of access request that is not prohibited, the first type of access request is triggered by the MINT function
- the second type of access request that is not prohibited, the second type of access request is triggered by a user of a specific network due to the MINT function;
- a delayed third type of access request is triggered by the MINT function or a user of a specific network is triggered by the MINT function;
- the apparatus provided in this embodiment of the present application can implement each process implemented by the method embodiment shown in FIG. 4 , and achieve the same technical effect. To avoid repetition, details are not repeated here.
- FIG. 14 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
- the terminal 1400 includes but is not limited to: a radio frequency unit 1401, a network module 1402, an audio output unit 1403, an input unit 1404, a sensor 1405, a display unit 1406, a user input unit 1407, an interface unit 1408, a memory 1409, and a processing 1410 and other components.
- the terminal 1400 may also include a power supply (such as a battery) for supplying power to various components, and the power supply may be logically connected to the processor 1410 through a power management system, so as to manage charging, discharging, and power consumption through the power management system management and other functions.
- a power supply such as a battery
- the terminal structure shown in FIG. 14 does not constitute a limitation on the terminal, and the terminal may include more or less components than shown, or combine some components, or arrange different components, which will not be repeated here.
- the input unit 1404 may include a graphics processor (Graphics Processing Unit, GPU) 14041 and a microphone 14042. Such as camera) to obtain still pictures or video image data for processing.
- the display unit 1406 may include a display panel 14061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
- the user input unit 1407 includes a touch panel 14071 and other input devices 14072 .
- the touch panel 14071 is also called a touch screen.
- the touch panel 14071 may include two parts, a touch detection device and a touch controller.
- Other input devices 14072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described herein again.
- the radio frequency unit 1401 receives the downlink data from the network side device, and then processes it to the processing 1410; in addition, sends the uplink data to the network side device.
- the radio frequency unit 1401 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
- Memory 1409 may be used to store software programs or instructions as well as various data.
- the memory 1409 may mainly include a storage program or instruction area and a storage data area, wherein the stored program or instruction area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.) and the like.
- the memory 1409 may include a high-speed random access memory, and may also include a non-volatile memory, wherein the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM) , PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- ROM Read-Only Memory
- PROM programmable read-only memory
- PROM erasable programmable read-only memory
- Erasable PROM Erasable PROM
- EPROM electrically erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- flash memory for example at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
- the processing 1410 may include one or more processing units; optionally, the processing 1410 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, and application programs or instructions, etc.
- the modulation processor mainly deals with wireless communication, such as the baseband processor. It can be understood that the above-mentioned modem processor may not be integrated into the process 1410.
- the terminal provided in this embodiment of the present application can implement each process implemented by the method embodiment shown in FIG. 2 or 3, and achieve the same technical effect. To avoid repetition, details are not repeated here.
- the network side device 1500 includes: an antenna 1501 , a radio frequency device 1502 , and a baseband device 1503 .
- the antenna 1501 is connected to the radio frequency device 1502 .
- the radio frequency device 1502 receives information through the antenna 1501, and sends the received information to the baseband device 1503 for processing.
- the baseband device 1503 processes the information to be sent and sends it to the radio frequency device 1502
- the radio frequency device 1502 processes the received information and sends it out through the antenna 1501 .
- the above-mentioned frequency band processing apparatus may be located in the baseband apparatus 1503 , and the method performed by the network side device in the above embodiments may be implemented in the baseband apparatus 1503 .
- the baseband apparatus 1503 includes a processor 1504 and a memory 1505 .
- the baseband device 1503 may include, for example, at least one baseband board on which multiple chips are arranged, as shown in FIG. 15 , one of the chips is, for example, the processor 1504 , which is connected to the memory 1505 to call the program in the memory 1505 to execute The network devices shown in the above method embodiments operate.
- the baseband device 1503 may further include a network interface 1506 for exchanging information with the radio frequency device 1502, and the interface is, for example, a common public radio interface (CPRI).
- CPRI common public radio interface
- the network-side device in this embodiment of the present application further includes: instructions or programs that are stored in the memory 1505 and run on the processor 1504, and the processor 1504 invokes the instructions or programs in the memory 1505 to execute the modules shown in FIG. 4 .
- the embodiment of the present application further provides a program product, the program product is stored in a non-volatile storage medium, and the program product is executed by at least one processor to implement the steps of the processing method as described in FIG. 5 .
- An embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, each process of the method embodiment shown in FIG. To achieve the same technical effect, in order to avoid repetition, details are not repeated here.
- the processor is the processor in the terminal described in the foregoing embodiment.
- the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
- An embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a network-side device program or instruction to implement the above-mentioned FIG. 2
- the chip includes a processor and a communication interface
- the communication interface is coupled to the processor
- the processor is used to run a network-side device program or instruction to implement the above-mentioned FIG. 2
- the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.
- the disclosed apparatus and method may be implemented in other manners.
- the apparatus embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present disclosure may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the method of the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course can also be implemented by hardware, but in many cases the former is better implementation.
- the technical solution of the present application can be embodied in the form of a software product in essence or in a part that contributes to the prior art, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, CD-ROM), including several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of this application.
- a storage medium such as ROM/RAM, magnetic disk, CD-ROM
- modules, units, and subunits can be implemented in one or more Application Specific Integrated Circuits (ASIC), Digital Signal Processor (DSP), Digital Signal Processing Device (DSP Device, DSPD) ), Programmable Logic Device (PLD), Field-Programmable Gate Array (FPGA), general-purpose processor, controller, microcontroller, microprocessor, in other electronic units or combinations thereof.
- ASIC Application Specific Integrated Circuits
- DSP Digital Signal Processor
- DSP Device Digital Signal Processing Device
- DSPD Digital Signal Processing Device
- PLD Programmable Logic Device
- FPGA Field-Programmable Gate Array
- the technologies described in the embodiments of the present disclosure may be implemented through modules (eg, procedures, functions, etc.) that perform the functions described in the embodiments of the present disclosure.
- Software codes may be stored in memory and executed by a processor.
- the memory can be implemented in the processor or external to the processor.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Emergency Management (AREA)
- Environmental & Geological Engineering (AREA)
- Public Health (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (33)
- 一种终端接入网络的方法,应用于终端,包括:在第一网络发生服务中断的最小化MINT功能对应的事件时,对所述MINT功能触发的接入到第二网络的接入请求进行接入控制。
- 根据权利要求1所述的方法,其中,对所述MINT功能触发的接入到第二网络的接入请求进行接入控制,包括:根据第一信息,判断所述第二网络是否允许所述终端的MINT功能触发的接入请求接入到所述第二网络;其中,所述第一信息包括以下一项或多项:所述终端的MINT功能相关的配置、所述第二网络的MINT功能相关的接入控制信息。
- 根据权利要求2所述的方法,其中,所述根据第一信息,判断所述第二网络是否允许所述终端的MINT功能触发的接入请求接入到所述第二网络,包括:根据所述终端选择的MINT功能对应的接入标识和接收到的所述第二网络的MINT功能对应的接入标识,判断所述第二网络是否允许所述终端的MINT功能触发的接入请求接入到所述第二网络。
- 根据权利要求3所述的方法,还包括:判断所述第二网络是否支持MINT功能;如果所述第二网络支持MINT功能,则在所述第二网络中尝试接入时选择所述第二网络的MINT功能对应的接入标识。
- 根据权利要求4所述的方法,其中,所述判断所述第二网络是否支持MINT功能,包括:获取所述第二网络支持的功能列表;根据所述第二网络支持的功能列表,判断所述第二网络是否支持MINT功能。
- 根据权利要求4所述的方法,其中,所述终端的全球用户识别卡或者可保持存储器存储有第一参数,所述第一参数指示所述MINT功能对应的接入标识。
- 根据权利要求2所述的方法,其中,所述根据第一信息,判断所述第二网络是否允许所述终端的MINT功能触发的接入请求接入到所述第二网络,包括:根据所述终端选择的MINT功能对应的接入类别和所述第二网络的MINT功能对应的接入类别,判断所述第二网络是否允许所述终端的MINT功能触发的接入请求接入到所述第二网络。
- 根据权利要求7所述的方法,还包括:通过所述第一网络或第二网络获取运营商定义的MINT功能对应的接入类别。
- 根据权利要求2、3或7所述的方法,还包括:如果所述第二网络允许所述终端接入,则向所述第二网络发起所述接入请求;如果所述第二网络当前不允许所述终端接入,则重新尝试接入到所述第二网络。
- 根据权利要求9所述的方法,其中,所述重新尝试接入到所述第二网络,包括:根据所述第二网络的接入控制信息,确定限制接入条件;根据所述限制接入条件,启动定时器;在所述定时器超时之后,重新尝试接入到所述第二网络。
- 根据权利要求2所述的方法,还包括:接收所述第二网络的MINT功能相关的接入控制信息。
- 根据权利要求2或11所述的方法,其中,所述接入控制信息包括以下一项或多项:所述第二网络的MINT功能对应的接入标识;所述第二网络的MINT功能对应的接入类别;所述接入类别和/或接入标识对应的接入概率;不禁止的第一类接入请求,所述第一类接入请求是MINT功能触发的;不禁止的第二类接入请求,所述第二类接入请求是特定网络的用户因MINT功能触发的;推迟的第三类接入请求,所述第三类接入请求是MINT功能触发或者特定网络的用户因MINT功能触发的;推迟接入的时间。
- 一种终端接入网络的方法,应用于网络侧设备,包括:向终端发送第二网络的MINT功能相关的接入控制信息;其中,所述第二网络的MINT功能相关的接入控制信息和/或所述终端的MINT功能相关的配置用于辅助所述终端在第一网络发生MINT功能对应的事件时,对所述MINT功能触发的接入到第二网络的接入请求进行接入控制。
- 根据权利要求13所述的方法,其中,所述接入控制信息包括以下一项或多项:所述第二网络的MINT功能对应的接入标识;所述第二网络的MINT功能对应的接入类别;所述接入类别和/或接入标识对应的接入概率;不禁止的第一类接入请求,所述第一类接入请求是MINT功能触发的;不禁止的第二类接入请求,所述第二类接入请求是特定网络的用户因MINT功能触发的;推迟的第三类接入请求,所述第三类接入请求是MINT功能触发或者特定网络的用户因MINT功能触发的;推迟接入的时间。
- 一种终端接入网络的装置,应用于终端,包括:第一处理模块,用于在第一网络发生MINT功能对应的事件时,对所述MINT功能触发的接入到第二网络的接入请求进行接入控制。
- 根据权利要求15所述的装置,其中,所述第一处理模块进一步用于:根据第一信息,判断所述第二网络是否允许所述终端的MINT功能触发的接入请求接入到所述第二网络;其中,所述第一信息包括以下一项或多项:所述终端的MINT功能相关的配置、所述第二网络的MINT功能相关的接入控制信息。
- 根据权利要求16所述的装置,其中,所述第一处理模块进一步用于:根据所述终端选择的MINT功能对应的接入标识和接收到的所述第二网络的 MINT功能对应的接入标识,判断所述第二网络是否允许所述终端的MINT功能触发的接入请求接入到所述第二网络。
- 根据权利要求17所述的装置,还包括:第一判断模块,用于判断所述第二网络是否支持MINT功能;如果所述第二网络支持MINT功能,则在所述第二网络中尝试接入时选择所述第二网络的MINT功能对应的接入标识。
- 根据权利要求18所述的装置,其中,所述判断模块进一步用于:获取所述第二网络支持的功能列表;根据所述第二网络支持的功能列表,判断所述第二网络是否支持MINT功能。
- 根据权利要求16所述的装置,还包括:第二判断模块,用于根据所述终端选择的MINT功能对应的接入类别和所述第二网络的MINT功能对应的接入类别,判断所述第二网络是否允许所述终端的MINT功能触发的接入请求接入到所述第二网络。
- 根据权利要求20所述的装置,还包括:获取模块,用于通过所述第一网络或第二网络获取运营商定义的MINT功能对应的接入类别。
- 根据权利要求16、17或20所述的装置,还包括:第二处理模块,用如果所述第二网络允许所述终端接入,则向所述第二网络发起所述接入请求;如果所述第二网络当前不允许所述终端接入,则重新尝试接入到所述第二网络。
- 根据权利要求22所述的装置,其中,所述第二处理模块进一步用于:根据所述第二网络的接入控制信息,确定限制接入条件;根据所述限制接入条件,启动定时器;在所述定时器超时之后,重新尝试接入到所述第二网络。
- 根据权利要求16所述的装置,还包括:接收模块,用于接收所述第二网络的MINT功能相关的接入控制信息。
- 一种终端接入网络的装置,应用于网络侧设备,包括:发送模块,用于向终端发送第二网络的MINT功能相关的接入控制信息;其中,所述第二网络的MINT功能相关的接入控制信息和/或所述终端的MINT功能相关的配置用于辅助所述终端在第一网络发生MINT功能对应的事件时,对所述MINT功能触发的接入到第二网络的接入请求进行接入控制。
- 根据权利要求25所述的装置,其中,所述接入控制信息包括以下一 项或多项:所述第二网络的MINT功能对应的接入标识;所述第二网络的MINT功能对应的接入类别;所述接入类别和/或接入标识对应的接入概率;不禁止的第一类接入请求,所述第一类接入请求是MINT功能触发的;不禁止的第二类接入请求,所述第二类接入请求是特定网络的用户因MINT功能触发的;推迟的第三类接入请求,所述第三类接入请求是MINT功能触发或者特定网络的用户因MINT功能触发的;推迟接入的时间。
- 一种终端,包括:处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序,所述程序被所述处理器执行时实现如权利要求1至12中任一项所述的方法的步骤。
- 一种网络侧设备,包括:处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序,所述程序被所述处理器执行时实现如权利要求13至14中任一项所述的方法的步骤。
- 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至14中任一项所述的方法的步骤。
- 一种程序产品,所述程序产品被存储在非易失的存储介质中,所述程序产品被至少一个处理器执行以实现如权利要求1至14中任一项所述的方法的步骤。
- 一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1至14中任一项所述的方法。
- 一种终端,所述终端被配置成用于执行如权利要求1至12中任一项所述的方法。
- 一种网络侧设备,所述网络侧设备被配置成用于执行如权利要求13至14中任一项所述的方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023513766A JP2023542822A (ja) | 2020-09-30 | 2021-09-29 | ネットワークへの端末のアクセス方法、装置、機器及び可読記憶媒体 |
EP21874557.8A EP4224921A4 (en) | 2020-09-30 | 2021-09-29 | METHOD AND DEVICE FOR A TERMINAL FOR ACCESSING A NETWORK, DEVICE AND READABLE STORAGE MEDIUM |
US18/127,615 US20230239766A1 (en) | 2020-09-30 | 2023-03-28 | Method and apparatus for terminal to access network, device, and readable storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011066450.2A CN114339876A (zh) | 2020-09-30 | 2020-09-30 | 终端接入网络的方法、装置、设备及可读存储介质 |
CN202011066450.2 | 2020-09-30 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/127,615 Continuation US20230239766A1 (en) | 2020-09-30 | 2023-03-28 | Method and apparatus for terminal to access network, device, and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022068902A1 true WO2022068902A1 (zh) | 2022-04-07 |
Family
ID=80951225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/121832 WO2022068902A1 (zh) | 2020-09-30 | 2021-09-29 | 终端接入网络的方法、装置、设备及可读存储介质 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230239766A1 (zh) |
EP (1) | EP4224921A4 (zh) |
JP (1) | JP2023542822A (zh) |
CN (1) | CN114339876A (zh) |
WO (1) | WO2022068902A1 (zh) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140051379A1 (en) * | 2012-08-14 | 2014-02-20 | Shriram Ganesh | Methods, systems and devices for prioritizing access to wireless networks |
US20180199273A1 (en) * | 2017-01-12 | 2018-07-12 | Lg Electronics Inc. | Access attempt method and user equipment, and access control method and base station |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2826309B1 (en) * | 2012-03-12 | 2020-12-16 | Samsung Electronics Co., Ltd. | Method and user equipment for selective access control with ensured service continuity guarantees |
KR101542414B1 (ko) * | 2012-03-16 | 2015-08-07 | 엘지전자 주식회사 | 무선 통신 시스템에서 nas 시그널링 요청 처리 방법 및 장치 |
-
2020
- 2020-09-30 CN CN202011066450.2A patent/CN114339876A/zh active Pending
-
2021
- 2021-09-29 EP EP21874557.8A patent/EP4224921A4/en active Pending
- 2021-09-29 JP JP2023513766A patent/JP2023542822A/ja active Pending
- 2021-09-29 WO PCT/CN2021/121832 patent/WO2022068902A1/zh active Application Filing
-
2023
- 2023-03-28 US US18/127,615 patent/US20230239766A1/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140051379A1 (en) * | 2012-08-14 | 2014-02-20 | Shriram Ganesh | Methods, systems and devices for prioritizing access to wireless networks |
US20180199273A1 (en) * | 2017-01-12 | 2018-07-12 | Lg Electronics Inc. | Access attempt method and user equipment, and access control method and base station |
Non-Patent Citations (3)
Title |
---|
ANONYMOUS: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Support for Minimization of Service Interruption(Release 17)", 3GPP TR 22.831 V0.1.1, 31 August 2019 (2019-08-31), XP051776067 * |
LG ELECTRONICS, SAMSUNG, LG UPLUS: "On Access control for MINT", 3GPP DRAFT; S1-193018, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG1, no. Reno, USA; 20191118 - 20191122, 8 November 2019 (2019-11-08), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051822329 * |
See also references of EP4224921A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN114339876A (zh) | 2022-04-12 |
EP4224921A1 (en) | 2023-08-09 |
US20230239766A1 (en) | 2023-07-27 |
EP4224921A4 (en) | 2024-03-27 |
JP2023542822A (ja) | 2023-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018082673A1 (zh) | 一种选择网络的方法及装置 | |
WO2022037489A1 (zh) | 非连续接收的处理方法、装置、终端及网络侧设备 | |
CN109246720B (zh) | 一种确定建立原因的方法和终端 | |
WO2022068874A1 (zh) | 报告的处理方法及装置、终端及网络侧设备 | |
WO2022022736A1 (zh) | 接入控制方法及装置 | |
WO2022017359A1 (zh) | 直接通信启动控制方法及相关设备 | |
WO2022143657A1 (zh) | 网络选择方法、装置、设备及存储介质 | |
CN112514446A (zh) | 用于处理网络切片过载的方法 | |
WO2022166743A1 (zh) | 连接建立方法、装置和用户设备 | |
WO2022095850A1 (zh) | 策略关联的建立方法及装置、终端及网络侧设备 | |
EP4197225A1 (en) | Preserving emergency call during failure to transfer subsequent to registration with the target network | |
US20230199633A1 (en) | Network selection method, information sending method, information obtaining method, and apparatus | |
WO2022068902A1 (zh) | 终端接入网络的方法、装置、设备及可读存储介质 | |
WO2022033429A1 (zh) | 数据发送处理方法、资源配置方法及相关设备 | |
WO2022068813A1 (zh) | 拥塞控制方法、装置、终端及网络侧设备 | |
CN115209492B (zh) | 通信处理方法、装置及相关设备 | |
WO2022127878A1 (zh) | 繁忙指示的传输方法及装置 | |
WO2022022685A1 (zh) | 接入控制方法、终端及网络侧设备 | |
WO2023078198A1 (zh) | 网络拥塞控制方法、网络侧设备及终端 | |
WO2022161313A1 (zh) | 连接保持方法、装置及电子设备 | |
WO2018059397A1 (zh) | 接入控制方法、终端设备和无线接入网设备 | |
WO2022214064A1 (zh) | 接入网络的方法、网络侧设备及终端 | |
WO2022022711A1 (zh) | 接入控制方法、装置、终端及网络侧设备 | |
WO2022218189A1 (zh) | 消息处理方法、装置、设备和存储介质 | |
JP7557058B2 (ja) | ネットワーク選択方法、情報送信方法、情報取得方法及び装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21874557 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2023513766 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202327023739 Country of ref document: IN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021874557 Country of ref document: EP Effective date: 20230502 |