A method for minimizing drive test-related information transmission and wireless access network
A wireless access network and related information technology, applied in the field of wireless access network, can solve the problems of lack of user permission range indication information, inability to choose, etc., to achieve the effect of ensuring security and privacy security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] This embodiment implements a method for processing user permission information in an LTE network, such as Figure 5 shown, including the following steps:
[0060] Step 1. The UE initiates a radio resource control (RRC, Radio Resource Control) connection establishment process in cell a under the eNB to complete the establishment of the wireless connection, wherein the UE's current serving PLMN (Serving PLMN, or RPLMN) is PLMN1;
[0061] Step 2, eNB sends initial UE message (Initial UE Message) to MME;
[0062] Step 3. The MME sends an Initial UE Context Setup Request message (Initial UE Context SetupRequest) to the eNB. The message carries the Management based MDT Allowed (Management based MDT Allowed) indication, and the indication is allowed, and also carries the UE user permission range indication Information, the information includes the PLMN list information that the UE supports MDT measurement; the eNB stores the user permission range indication information of the U...
Embodiment 2
[0080] This embodiment realizes the processing method of user permission information when switching (or redirecting) in the network, taking UTRAN as an example, such as Image 6 shown, including the following steps:
[0081] Step 1. For a UE in a normal connection state in UTRAN cell a, the serving PLMN is PLMN1, and the user permission range of the UE includes PLMN1 and PLMN2. The RNC performs a handover decision based on the UE's measurement report or other factors (such as load overload), and decides to handover the UE to UTRAN cell b, where the serving PLMN of the UE in cell b is changed to PLMN2, which is within the scope of user permission.
[0082] Step 2, the source side RNC judges that the serving PLMN of the target cell b belongs to the PLMN indicated by the user permission range indication information of the UE, then the eNB sends a relocation required (Relocation Required) message to the core network, and the source RNC in the message reaches the target PLMN. The ...
Embodiment 3
[0099]This embodiment realizes the processing method of user permission information when handover (or redirection) is performed in the network, taking the inter-RAT Handover (inter-RAT Handover) from EUTRAN to UTRAN as an example, as Figure 7 shown, including the following steps:
[0100] Step 1. For a UE in a normal connection state in LTE cell a, the serving PLMN is PLMN1, and the user permission range of the UE includes PLMN1, PLMN2 and PLMN3. The eNB performs a handover decision based on the UE's measurement report or other factors (such as load overload), and decides to handover the UE to UTRAN cell b, where the serving PLMN of the UE in cell b is changed to PLMN2, which is within the scope of user permission.
[0101] Step 2. The eNB judges that the serving PLMN of the target cell b belongs to the PLMN indicated by the UE's user permission range indication information, and then the eNB sends a Handover Required (Handover Required) message to the MME. In the message, the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



