A method and user equipment for performing access control

A technology for user equipment and access control, which is applied in the directions of access restriction, wireless communication, electrical components, etc., and can solve the problem of no UE access judgment scheme.

Active Publication Date: 2018-03-20
ZTE CORP
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no access decision scheme for this type of UE in existing protocols

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and user equipment for performing access control
  • A method and user equipment for performing access control
  • A method and user equipment for performing access control

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0038] In the LTE system, UE1 resides in cell 1 under the jurisdiction of base station 1 and is in an idle state. A valid EAB is configured in the USIM card of UE1, and the EAB configuration may be set to True. In addition, the USIM card of UE1 indicates that the access class (Access Class) of the UE is 11.

[0039] When UE1 needs to initiate a delay tolerant (Delay Tolerant) service or a low priority (LowPriority) service, the non-access stratum NAS (non-Access Stratus, NAS for short) layer of UE1 sends the establishment reason ( Establishment Cause) is the cause of delay tolerance or low priority. The AS layer of UE1 implements the access decision process as follows: figure 2 Shown:

[0040] Step 101: UE1 judges whether the waiting time timer (T302) or the access restriction timer set for delay tolerance or low-priority services is running, and if it is running, UE1 judges that access to the current cell is prohibited; If neither of the two timers is running, step 102 is...

specific Embodiment 2

[0050] In the LTE system, UE2 resides in cell 2 under the jurisdiction of base station 2 and is in an idle state. A valid EAB is configured in the USIM card of UE2. In addition, the USIM card of UE2 indicates that the access class of the UE is 12, that is, the Access Class is 12.

[0051] When UE2 needs to initiate a delay tolerant (Delay Tolerant) service or a low priority (LowPriority) service, the NAS layer (non-Access Stratus, non-access stratum) of UE2 sends the establishment reason (Establishment Cause) to the AS layer of UE1 ) for delay tolerance, or low priority reasons. The AS layer of UE2 implements the access decision process as follows: image 3 Shown:

[0052] Step 201: UE2 judges whether the waiting time timer (T302) or the access restriction timer set for delay tolerance or low priority services is running. If it is running, UE2 judges that accessing the current cell is forbidden (consider access to the cell as barred); if the two timers are not running, go t...

specific Embodiment 3

[0061] In the LTE system, the UE3 resides in the cell 3 under the jurisdiction of the base station 3 and is in an idle state. A valid EAB is configured in the USIM card of UE3. In addition, the USIM card of UE3 indicates that the access class of the UE is 13, that is, the Access Class is 13.

[0062] When UE3 needs to initiate a delay tolerant (Delay Tolerant) service or a low priority (LowPriority) service, the NAS layer (non-Access Stratus, non-access stratum) of UE3 finds that UE3 has an effective access class AC 13, Therefore, the establishment reason sent by the NAS layer of UE3 to the AS layer of UE3 is the data service (MO-Data) initiated by the user, or the signaling service (MO-Signalling) initiated by the user. After receiving the establishment reason of the new service, the NAS layer of UE3 performs access judgment according to the corresponding access restriction parameters in the system message, and judges whether the UE can initiate random access and establish an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for performing access control and user equipment. The method includes: when a user equipment suitable for extended access and having an access level of a non-ordinary level initiates a delay-tolerant service, according to the user equipment of an ordinary level in a system message, The access level restriction parameter corresponding to the data service initiated by the device, or the access level restriction parameter corresponding to the signaling service initiated by the common level user equipment in the system message, or the cell access decision based on the extended access level parameter in the system message . This solution is suitable for extended access control (EAB) user equipment with non-ordinary access levels. When initiating delay-tolerant services, the network side can implement access control for it, which solves the problem of such user equipment access The problem of uncertain access decision when accessing the network.

Description

technical field [0001] The present invention relates to mobile communication technology, in particular to a method for performing access control and user equipment. Background technique [0002] User equipment (User Equipment, UE) needs to perform access control when accessing the network, which is used to determine whether the UE can initiate a service request, and avoid causing network-side overload such as random access overload or signaling overload. In Universal Mobile Telecommunications System (UMTS for short) and Long Term Evolution (LTE for short), user equipment can be divided into 16 access classes (Access Class, AC), where AC0-9 belong to Ordinary level, randomly allocated to terminals; AC 10 means emergency calls, which will not be allocated to terminals; AC 11 is used for network operations; AC 12 is for security services; AC 13 is for public service categories, such as water and gas suppliers; AC 14 means emergency business; AC 15 indicates operator staff. A ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W48/02H04W74/08
Inventor 邓云戴谦毛磊
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products