Access control method and system, network side network element

An access control and access network technology, applied in access restriction, electrical components, wireless communication, etc., can solve the problems of inability to set EAB parameters correctly, and inability to learn the load information of different types of UEs, so as to improve user experience, The effect of ensuring the quality of business services

Inactive Publication Date: 2017-12-15
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, the problem with the above access technology is that according to the existing protocol, the network side cannot obtain the load information of different types of UEs, and thus cannot correctly set the EAB parameters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system, network side network element
  • Access control method and system, network side network element
  • Access control method and system, network side network element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] This embodiment describes a method for configuring extended access control parameters on the network side in an LTE system.

[0073] In this embodiment, UE1 and UE2 reside in cell 1 under the jurisdiction of base station 1, and are in an idle state. Both UE1 and UE2 are configured as EAB-compliant UEs. In addition, the USIM card of UE1 indicates that the access class of the UE is 2, that is, the Access Class is 2. The USIM cards of UE1 and UE2 also store HPLMN identifiers, and may also include EHPLMN identifiers and preferred public land mobile network identifiers (preferred PLMN). In this embodiment, the HPLMN stored in the USIM card of UE1 is PLMN1, EHPLMN is PLMN2 and PLMN3, and the preferred PLMN is PLMN4. The PLMN broadcast in the system message of cell 1 is PLMN4. The HPLMN saved in the USIM card of UE2 is PLMN2, EHPLMN is PLMN4, and the Preferred PLMN is not set.

[0074] According to the classification criteria of user equipment:

[0075] Category A (Category A): ...

Embodiment 2

[0101] This embodiment describes a method for configuring extended access control parameters on the network side in a universal mobile communication system.

[0102] In this embodiment, UE3 and UE4 reside in a cell 2 under the jurisdiction of base station 2 and are in an idle state, and base station 2 is under the jurisdiction of a radio network controller (RNC, Radio Network Controller). Both UE3 and UE4 are configured as EAB-compliant UEs. In addition, the USIM card of UE3 indicates that the access class of the UE is 4, that is, the Access Class is 4. The USIM cards of UE3 and UE4 also store HPLMN identifiers, and may also include EHPLMN identifiers and preferred public land mobile network identifiers (preferred PLMN). The HPLMN stored in the USIM card of UE3 is PLMN1, EHPLMN is PLMN2 and PLMN3, and the preferred PLMN is PLMN4. The HPLMN stored in the USIM card of UE4 is PLMN2, and EHPLMN is PLMN4, and the Preferred PLMN is not set. In this embodiment, the PLMN broadcast in ...

Embodiment 3

[0122] In this embodiment, the UE5 resides in the cell 3 under the jurisdiction of the base station 3 and is in an idle state. UE5 is configured as an EAB-compliant UE. The HPLMN stored in the USIM card of UE5 is PLMN1, EHPLMN is PLMN2, and the preferred PLMN is PLMN3. The PLMN of cell 3 is PLMN3, and UE5 belongs to Category B at this time.

[0123] The UE5 needs to initiate a service, and the UE5 needs to determine whether to allow access to the network to initiate a service request based on the EAB parameters or ACB parameters broadcast by the cell 3 (transmitted through system messages). At this time, the system message of cell 3 contains EAB parameters; UE5 uses EAB parameters to implement access decision. If the decision result is not barred, UE5 needs to implement access decision based on ACB parameters. Random access can be initiated only when the entry decision is successful, and an RRC connection request is sent to the network side when the random access is successful;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a method for access barring. The method includes: the network side acquiring, via a core network network element, type information about extended access barring (EAB) of user equipment (UE) accessing a network, and implementing access barring according to the type information about the EAB of the UE. Disclosed at the same time is a system for access barring implementing the method above, and a network side network element. The present invention ensures that no network congestion will occur in a communication system by way of performing access barring on terminals with different relevant EAB types, guaranteeing quality of service when there are too many terminals trying to gain access, and improving the user experience of the users of the terminals trying to gain access.

Description

Technical field [0001] The present invention relates to EAB-based access control technology in wireless communication, and in particular to an access control method and system, and network side network elements. Background technique [0002] When a user equipment (UE, User Equipment, also known as a terminal) accesses the network, it needs to perform access control to determine whether the UE can initiate a service request and avoid causing network side overload such as random access overload or signaling overload . In the Universal Mobile Telecommunications System (UMTS, Universal Mobile Telecommunications System) and Long Term Evolution (LTE, Long Term Evolution) systems, user equipment can be divided into 16 access classes (AC, Access Class), among which AC 0-9 are common Level, randomly assigned to UE; AC 10 means emergency call (not configured to terminal); AC 11 is used for network operation; AC 12 is security service; AC 13 is public service category (such as water and ga...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W74/08
CPCH04W48/02
Inventor 邓云
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products