User equipment (UE) access restriction method and system thereof

A terminal access and terminal technology, applied in access restrictions, electrical components, wireless communications, etc., can solve problems such as high network maintenance costs and no restrictions on low-mobility areas

Inactive Publication Date: 2012-05-16
ZTE CORP
View PDF5 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0046] combine image 3 and Figure 4 The existing GPRS and LTE networks currently only support corresponding restrictions on specific areas, such as restrictions on roaming areas, etc., without the ability to restrict low mobility areas
The industry is also discussing that the low mobility restriction should be implemented by SGSN / MME. The resulting defect is that all network elements need to be optimized, and the initial maintenance cost of the network is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User equipment (UE) access restriction method and system thereof
  • User equipment (UE) access restriction method and system thereof
  • User equipment (UE) access restriction method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] When the terminal attaches to the EPS network for the first time, it carries the location information of the terminal, and the MME (control plane network element) selects a PDN GW (user plane network element) serving M2M for it, and sends a request to the PDN GW to create a default bearer. The PDN GW initiates a policy request to the PCRF, carrying the location information of the terminal. The PCRF can learn the low mobility characteristics of its subscription from the SPR, and download the differentiated PCC policies corresponding to different areas of the terminal's allowed access area information (also available in the PCRF static configuration), PCRF finds that its location is outside the scope of the allowed location area, and rejects the policy request, and carries the value of the cause (cause) of the area restriction. After receiving the policy request rejection message, the PDNGW rejects the creation of the default bearer, and the MME rejects the terminal Attach...

Embodiment 2

[0113] When the terminal initiates to attach to the EPS network for the first time, there is no location area restriction, and it attaches to the EPS network normally. When the location of the terminal changes, a location update request needs to be initiated, carrying the location information of the terminal, and the MME notifies the PDN GW of the updated location information of the terminal through the bearer modification request. The PDNGW initiates a policy request to the PCRF, carrying the updated location information of the terminal. When the PCRF finds that its location is outside the allowed location area, it rejects the policy request and carries the cause value of the restricted area. After the PDN GW receives the policy request rejection message, it All PDN connections of the terminal are deleted, and access of the terminal in the network is restricted. Figure 6 It is a flow chart of the MTC UE with low mobility characteristics in the present invention performing lo...

Embodiment 3

[0136] When the terminal attaches to the GPRS network and carries the location information of the terminal in the activate PDP context message, the SGSN selects a GGSN serving M2M for it, and initiates a PDP context creation request to the GGSN. The GGSN initiates a policy request to the PCRF, carrying the location information of the terminal. The PCRF can learn the low-mobility characteristics of its subscription from the SPR, and download the terminal's allowed access area information corresponding to the differentiated PCC strategy for different areas (also can be statically configured in the PCRF). PCRF finds that its location is outside the range of the allowed location area, Just reject the policy request and carry the cause value of the restricted area. After receiving the policy request rejection message, the GGSN rejects the establishment of the PDP context. The SGSN rejects the terminal to activate the PDP context in the GPRS network and restricts the terminal's acces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user equipment (UE) access restriction method. The method comprises the following steps that: after receiving an access request of the UE, a network side carries position information of the UE when requesting policy and charging control (PCC) from a policy and charging rules function (PCRF); the PCRF determines whether the UE is in an allowable position area scope according to the position information of the UE and notifies the network side when the user equipment is not in an allowable position area scope; then the network side restricts the access of the UE. The invention also discloses a UE access restriction system for realizing the above method. In the invention, through carrying out access restriction management to the UE with a low mobility by a user plane network element, problems of mobility management and charging chaos caused by abnormal moving of the UE with the low mobility can be avoided. Simultaneously, the position information of the UE can be timely reported to a machine type communication (MTC) Server. And the MTC Server can timely process an abnormal mobile event of the UE.

Description

technical field [0001] The present invention relates to a terminal access restriction technology, in particular to a machine-to-machine (M2M, Machine to Machine) communication service for a low-mobility machine type communication (MTC, Machine Type Communication) terminal (User Equipment) Method and system for access restriction. Background technique [0002] In recent years, M2M communication services are mainly used in logistics systems, remote meter reading, smart homes and other occasions. An M2M service provider uses an existing wireless network such as a General Packet Radio Service (GPRS, General Packet Radio service) network, an Evolved Packet System (EPS, Evolved Packet System) network, and a packet switching (PS, Packet Switching) network to carry out M2M services. Due to the obvious difference between the M2M service and the human-to-human (H2H, Human to Human) communication service, it is necessary to optimize the existing network to obtain the best network mana...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/04
CPCH04W48/04
Inventor 谢宝国吴瑟李志军
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products