Access control method and device

A technology of access control and congestion control, which is applied in the field of wireless communication, and can solve the problems of broken applications and unfavorable applications, etc.

Active Publication Date: 2017-02-22
CHINA MOBILE COMM GRP CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0030] The technical problem to be solved by the present invention is to provide an access control method and device to solve the problem that the existing ACDC only makes an admission decision when the terminal is in an idle state. Before it is opened, no ACDC judgment will be made, and other low-priority applications can bypass the ACDC judgment and directly access the network. This method is not conducive to separate control of different applications and destroys the priority relationship between applications. question of fairness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0173] The implementation method in Embodiment 1 makes it necessary for each new application to make an ACDC decision when accessing the network. This method is more suitable when the priority of the new application is not lower than that of the application that has established a network connection. This way, it does not take advantage of the priority of the new application when it is lower priority than the application with established network connection, so if the figure 2 As shown, on the basis of Embodiment 1, Embodiment 2 of the present invention provides an access control method, including:

[0174] Step 100, after the first connection of the first application is established between the terminal and the network, before the ACDC decision of the second application is made, the identification information of the second application is acquired;

[0175] Step 200, according to the identification information, obtain the blocking parameters of the second application;

[0176] ...

Embodiment 3

[0194] In the third embodiment, by comparing the ACDC category of the second application with the preset ACDC category, it is determined whether the second application directly accesses the network. This method can reasonably control the number of ACDC decisions made by the application.

[0195] It should be noted that the access control method may be applied to a terminal (UE), may be applied to a base station (eNB), and may also be applied to a core network (MME) side.

[0196] When the access control method is applied to the LTE network, the above-mentioned applications are divided according to the category of the application software, and the specific implementation of the access control method on different application objects is described in detail as follows.

[0197] 1. When the access control method is applied to a terminal

[0198] When the terminal is performing network communication, the data will be transmitted from the upper layer to the lower layer in turn, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method and device. The access control method comprises the steps that identification information of a second application is acquired after first connection of a first application is established between a terminal and a network and before ACDC judgment of the second application is performed; the block parameters of the second application are acquired according to the identification information; ACDC judgment of the second application is performed according to the block parameters and the judgment result of allowing the second application to perform network communication or not is obtained; and when the judgment result indicates allowing the second application to perform network communication, second connection between the terminal and the network is established for the second application or the second application is allowed to transmit information on the first connection. According to the scheme, ACDC access judgment of each application is performed when each application is accessed to the network so that the problem of free riding of the low-priority applications can be avoided by the method, separate control of different applications is facilitated and the fairness of the priority between the applications can be guaranteed.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to an access control method and device. Background technique [0002] ACDC stands for "Application specific Congestion control for Data Communication" (Application specific Congestion control for Data Communication). It is an access control mechanism. Operators can allow or prevent specific application software access requests when the UE (terminal) is idle. . ACDC is only applicable to UEs in idle state, not UEs in connected state. The role of ACDC is to reduce the load overload of the access network or core network. [0003] The basic characteristics are as follows: [0004] 1) ACDC is applicable to UTRAN (UMTS Terrestrial Radio Access Network, UMTS Terrestrial Radio Access Network (URAN)) and E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS Terrestrial Radio Access Network); [0005] 2) The home network configures at least 4 ACDC cat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/06H04W48/08
CPCH04W48/06H04W48/08H04W28/02H04W76/10
Inventor 陈宁宇胡南陈卓
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products