Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method of access control, module and user device

A user equipment and access control technology, applied in access restriction, security device, network traffic/resource management, etc., can solve the problem that access control scheme cannot be applied

Active Publication Date: 2013-05-08
ALCATEL LUCENT SHANGHAI BELL CO LTD
View PDF1 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no ready-made solution for the specific flow of user equipment performing access control, because the existing method of performing access control based on ACB does not need to consider factors such as the access type of the user equipment and the handling of the reasons for access failure. Existing access control schemes cannot be applied to schemes that perform access control based on EAB

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of access control, module and user device
  • Method of access control, module and user device
  • Method of access control, module and user device

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0052] In the LTE system, the UE is in an idle state. A valid EAB is configured in the USIM card of the UE, which may be that the EAB configuration is set to True. In addition, the USIM card of the UE indicates that the access class (Access Class) of the UE is 8 and 11.

[0053] When the UE needs to initiate a delay tolerant (Delay Tolerant) service or a low priority (LowPriority) service, the non-access stratum NAS (non-Access Stratus, NAS for short) layer of the UE sends the establishment reason ( Establishment Cause) is the cause of delay tolerance or low priority. The AS layer of the UE implements the access decision process as follows: figure 1 Shown:

[0054] Step 101: the AS of the UE receives a service request from its upper layer (NAS), and the reason for establishing the service is delay tolerance.

[0055] Step 102: The UE judges whether the waiting time timer (T302) is running, if it is running, the UE judges that access to the current cell is prohibited (Consid...

specific Embodiment 2

[0082] In an LTE system, a UE resides in a cell under the jurisdiction of a base station and is in an idle state. A valid EAB is configured in the USIM card of the UE. In addition, the USIM card of the UE indicates that the access class of the UE is 5, that is, the Access Class is 5.

[0083] When the UE needs to initiate a delay tolerant (Delay Tolerant) service, the NAS layer of the UE sends the establishment reason to the AS layer of the UE as a delay tolerant reason. The AS layer of the UE implements the access decision process as follows: image 3 Shown:

[0084] Step 201: the AS of the UE receives a service request from its upper layer (NAS), and the reason for establishing the service is delay tolerance.

[0085] Step 202: The UE judges whether the waiting time timer (T302) or the access restriction timer (T303) set for the data service initiated by the user is running. If it is running, the UE judges that accessing the current cell is prohibited (consider access to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An expanding access control embedded array block (EAB) is not utilized for access control in the prior art. The invention provides a method of access control, a module and a user device. The method includes the flowing steps that b. whether the user device has effective and permitted special access grades (104 and 105) is judged, and when the special access grades (104 and 105) exist, current areas capable of being accessed are judged; d. whether a system message comprises the expand access control EVB parameters (103) of the user device is judged, when the expand access control EVB parameters (103) are comprised; and e. according to the expand access control EVB parameters (103) of the user device, whether access current areas (106-110) are controlled based on expanding access is judged. The invention provides a method controlling the EAB to conduct access based on expanding access.

Description

technical field [0001] The present invention relates to mobile communication technology, in particular to a method for performing access control and user equipment. Background technique [0002] User Equipment (UE) must perform access control when accessing the network, which is used to determine whether the UE can initiate a service request, and avoid causing network-side overload such as random access overload or signaling overload. In Universal Mobile Telecommunications System (UMTS for short) and Long Term Evolution (LTE for short), user equipment can be divided into 16 access classes (Access Class, AC), among which, AC 0~ 9 belongs to the general level and is randomly allocated to terminals; AC 10 means emergency calls and will not be allocated to terminals; AC 11 is used for network operations; AC 12 is for security services; AC 13 is for public service categories, such as water and gas suppliers; AC 14 Indicates emergency business; AC 15 indicates operator staff. A ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/16
CPCH04W12/08H04L63/105H04W28/18H04W48/00H04W28/00H04W48/02H04W48/08
Inventor 邓云
Owner ALCATEL LUCENT SHANGHAI BELL CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products