Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method, system and network element

An access control and network element technology, applied in the field of communication, can solve problems such as inability to initiate emergency services, failure to meet the requirements of emergency services, and inability to receive callbacks from emergency centers.

Active Publication Date: 2010-06-16
HUAWEI TECH CO LTD
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When the UE moves from a normal area to a prohibited area, the network will delete other non-emergency service bearers of the UE. If the UE does not have a signaling bearer (in the prior art, the signaling can be transmitted through a default bearer, etc.), due to The UE's non-emergency service bearers are all deleted, which will cause the UE's emergency service to be terminated through signaling control. In addition, when the emergency service ends, the UE will not be able to use the network side due to the deletion of the bearers between the UE and the network side. It is forbidden to initiate emergency business again in the area, nor can it receive the call back from the emergency center, which does not meet the requirements of emergency business
[0005] In addition, when the UE makes an emergency call in a prohibited area, how to restrict the UE from receiving other service establishment requests, or when the user ends the emergency call, the user will continue to It is also possible to make another emergency call, or receive a call back from the emergency call center. How to ensure that the UE can accept the service establishment request and only accept the service establishment request of the emergency service, and reject the establishment request of other services. At present, there is no mechanism to solve this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, system and network element
  • Access control method, system and network element
  • Access control method, system and network element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The network system applied in the embodiment of the present invention is mainly based on a brand-new evolution network being researched by 3GPP, such as figure 1 As shown, the embodiment of the present invention provides an architecture diagram of an evolved network, including:

[0034]Evolved UMTS Terrestrial Radio Access Network (E-UTRAN, Evolved UMTS Terrestrial RadioAccess Network), used to realize all functions related to the wireless of the evolved network;

[0035] Mobility Management Entity (MME, Mobility Management Entity), responsible for mobility management of the control plane, including user context and mobility status management, assigning user temporary identities, etc.;

[0036] Serving Gateway (SGW, Serving Gateway) is the user plane anchor point between 3GPP access networks and terminates the interface of E-TURAN;

[0037] The packet data network gateway (PGW, Packet Data Network Gateway) is the user plane anchor point between the 3GPP access network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication, in particular to an access control method, an access control system and an access control network element. The invention aims to solve the problem that part of emergency service demands cannot be satisfied due to the deletion of other non-emergency service bearers when User Equipment (UE) moves from a normal region to a forbidden region and does not have a signaling bearer. The access control method provided by the invention comprises the following steps of: receiving an access request from the UE; determining that the current access region of the UE is the forbidden region and a user needs an emergency service; and initiating a signaling bearer establishing process to establish the signaling bearer when the UE does not has the signaling bearer. The invention also provides an access control system and an access control network element. The access control method provided by the invention ensures the satisfaction of a user emergency calling service demand when the UE moves from the normal region to the forbidden region.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an access control method, system and access control network element. Background technique [0002] Currently, the 3GPP organization is studying the Emergency Call (EMC) service of the IP Multimedia Subsystem (IMS). The so-called emergency call service is beneficial to the IP-Connectivity Access Network (IP-CAN, Networks such as GPRS / UMTS / E-UTRAN / WLAN / Wimax) and IMS systems provide users with emergency call services (such as alarm services and fire alarm services, etc.). [0003] For the emergency call service, even if the user is in a forbidden area (such as a roaming forbidden area (forbidden location areas for roaming) or a service forbidden area (forbidden location areas for regional provision of service) or a CSG (closed subscriber group, Closed Subscriber Group) restricted area, etc., That is, users need to be allowed to use normal services in these areas (al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/22H04W48/04H04W4/90
Inventor 吴问付朱奋勤
Owner HUAWEI TECH CO LTD