D2D terminal access control method, D2D terminal, eNB and MME

A D2D and terminal technology, applied in the field of communication, can solve the problem of not reducing the traffic load of the base station, and achieve the effect of network robustness and processing capacity enhancement, and user experience improvement

Active Publication Date: 2013-10-30
ZTE CORP
View PDF6 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] IP data distribution through the base station reduces the load on the core network packet data gateway, but does not reduce the traffic load on the base station side. Therefore, it is necessary for terminals in the adjacent area to communicate directly to reduce the traffic load on the base station side.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • D2D terminal access control method, D2D terminal, eNB and MME
  • D2D terminal access control method, D2D terminal, eNB and MME
  • D2D terminal access control method, D2D terminal, eNB and MME

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Figure 7 It is a flowchart of a network sending a D2D supporting capability to a terminal according to an embodiment of the present invention. This embodiment mainly describes how the D2D terminal obtains the eNB address supporting the D2D capability. For example: 1) carry the eNB address supporting D2D capability in the broadcast message; 2) carry the eNB address supporting D2D capability in the access response message; 3) carry the eNB address supporting D2D capability in the initial configuration parameters by OAM.

[0073] The D2D terminal can choose a common eNB for access, or an eNB supporting D2D capability for access. After a D2D terminal selects a common eNB for access, if it wants to initiate a D2D session, it needs to re-select an eNB that supports D2D capabilities for access. Specific steps are as follows:

[0074]Step S702: Statically configure whether to support D2D capability on the eNB. When the eNB broadcasts the system, it carries the indication of...

Embodiment 2

[0082] Figure 8 It is a flow chart of an eNB performing access control on a D2D terminal according to Embodiment 2 of the present invention. This embodiment mainly describes the scheme of eNB performing D2D control. The eNB requests the D2D subscription data from the MME, and decides whether to allow the D2D session according to the D2D subscription data, the network's ability to support D2D, and the operator's policy. Specific steps are as follows:

[0083] Step S802: the D2D terminal initiates an access request to the eNB, and carries a D2D indication in the request message. The D2D indication may be one of D2D type or D2D capability.

[0084] Step S804: the eNB sends an access request to the MME, and carries a D2D subscription request indication in the access request. The D2D subscription request indication may be one of D2D type, D2D capability or D2D subscription request.

[0085] Step S806: The MME initiates a location update request to the HSS to request subscript...

Embodiment 3

[0091] Figure 9 It is a flow chart of an eNB performing access control on a D2D terminal in an ATTACH process according to Embodiment 3 of the present invention. This embodiment mainly describes the solution of eNB performing D2D control during the ATTACH process. The eNB requests the D2D subscription data from the MME in the Attach request message, and the MME sends the D2D subscription parameters to the eNB. The eNB decides whether to allow the D2D session according to the D2D subscription data, the network's ability to support D2D, and the operator's policy. Specific steps are as follows:

[0092] Step S902: the D2D terminal initiates an ATTACH request to the eNB, and carries a D2D type or D2D capability indication in the request message.

[0093] Step S904: the eNB sends an ATTACH request to the MME, and carries one of D2D type, D2D capability or D2D subscription request indication in the ATTACH request.

[0094] Step S906: The MME initiates a location update request t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an access control method for a D2D terminal, a D2D terminal, an evolved node B, and a mobility management entity (MME). The access control method comprises: a network side receiving an access request carrying a D2D indication and sent by a terminal; and the network side performing access authentication on the terminal according to the D2D indication to decide whether to allow the terminal to initiate a D2D session. In the present invention, before a terminal initiates D2D session, a network side performs access authentication on a D2D terminal, so as to implement access control and D2D access authentication for a terminal having direct link communication in accessing a 3GPP network, thereby guaranteeing that IP communications of direct data links are achieved between adjacent terminals under network control.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to an access control method for a D2D (Direct to Direct communication) terminal, a D2D terminal, an eNB (evolved NodeB, evolved base station) and an MME (Mobile Management Entity, mobility management entity). Background technique [0002] In mobile communication, communication can occur between a user equipment (UE for short) (or also called a terminal, or a user terminal) and an application server (Application Server, AS for short), or between two user equipments. between. The communication between two user equipments may be relayed through AS, or may be carried out through end-to-end IP data flow between two user equipments. [0003] In mobile communication, packet (PacketService, PS) network provides IP-based data communication. The IP address of the UE is in charge of the IP allocation entity in the network, and all IP data flows need to pass through the IP alloc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W74/00H04W76/02
CPCH04W74/00H04W92/18H04W4/70H04W12/08
Inventor 谢宝国李志军邹常乐
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products