Method and device for accessing network by terminal, and terminal thereof

A terminal access and network technology, applied in the field of communications, can solve problems such as heavy network signaling burden and affect network performance, and achieve the effects of improving network performance, avoiding authentication and bearer establishment/release, and reducing network signaling burden

Active Publication Date: 2017-09-26
BAICELLS TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to provide a method, device and terminal for a terminal to access the network, which solves the problem of excessive network signaling burden caused by a large number of signaling processes related to authentication and registration caused by frequent attachment of terminals in the prior art. Large, serious problems affecting network performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for accessing network by terminal, and terminal thereof
  • Method and device for accessing network by terminal, and terminal thereof
  • Method and device for accessing network by terminal, and terminal thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0042] Such as figure 2 As shown, the first embodiment of the present invention provides a method for a terminal to access a network, including:

[0043] Step 11, when the terminal switches from the first cell to the second cell, obtain the second network identifier of the second network where the second cell is located and the second service provided by the terminal selected from the service providers supported by the second network Merchant's logo.

[0044] In this step, the terminal may perform cell reselection during the moving process. The terminal first performs cell reselection in a cell that is the same as the first network ID of the first network where the first cell is located. For example, the signal of the cell does not meet the requirements or the system broadcasts an indication that the cell is a prohibited access cell or a blocked cell; then the terminal can only select a cell that is different from the first network ID. When the terminal selects a suitable I...

no. 2 example

[0050] Such as image 3 , Figure 4 As shown, the second embodiment of the present invention provides a method for a terminal to access a network, including:

[0051] Step 21 is the same as Step 11 above.

[0052] Step 22, when the second network identifier is different from the first network identifier, and the second service provider's identifier is the same as the first service provider's identifier, send a message carrying the terminal to the second network The access request of the globally unique temporary identifier GUTI; or,

[0053] Step 23, when the second network ID is different from the first network ID, and the second network ID is in the set of network IDs of the network equivalent to the first network ID, and the ID of the second service provider is the same as the first network ID When the identifiers of the service providers are different, and the identifier of the second service provider is in the identifier set of the equivalent service provider of the fi...

no. 3 example

[0059] Such as Figure 5 As shown, the third embodiment of the present invention provides a method for a terminal to access a network, including:

[0060] Step 31 is the same as Step 11 above.

[0061] Step 32: When the second network identifier is different from the first network identifier, and the second service provider's identifier is the same as the first service provider's identifier, determine whether the terminal is currently located in the terminal saved Within the location area in the tracking area list (TA list).

[0062] Step 33, if the terminal is located in the location area in the tracking area list, send a service request carrying the globally unique temporary identifier GUTI of the terminal to the second network;

[0063] Step 34: If the terminal is located in a location area outside the tracking area list, send a location area update request or an attach request carrying the terminal's globally unique temporary identifier GUTI to the second network.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for accessing a network by a terminal, and a terminal thereof. The method comprises the steps of when the terminal switches from a first cell to a second cell, acquiring a second network identification of a second network in which the second cell exists and the identification of a second service provider that is selected from the service providers that are supported by the second network; and when the second network identification is different from the first network identification of a first network in which the first cell exists, or the identification of the second service provider is different from the identification of a first service provider which is registered in the service provider that is supported by the first network, transmitting an accessing request which carries a global unique temporary identification (GUTI) of the terminal to the second network for accessing the second network, so that the network side can acquire context information of the terminal in the network according to the GUTI, thereby preventing terminal verification, bearing establishing/releasing, reducing network signaling load and improving network performance.

Description

technical field [0001] The present invention relates to the field of communication technologies, in particular to a method, device and terminal for terminal access to a network. Background technique [0002] MulteFire is a new LTE (Long Term Evolution)-based wireless access technology that can operate independently in unlicensed spectrum without the use of licensed band carriers. MulteFire extends LTE to unlicensed spectrum. The physical layer introduces a Listen Before Talk (LBT, Listen Before Talk) mechanism similar to WiFi carrier sense technology to achieve fair competition for air interface resources with unlicensed band devices. [0003] MulteFire can be used in the existing 3GPP network architecture and interface with the existing 3GPP core network to provide traditional mobile network operators with the capacity, coverage and data offload brought by unlicensed spectrum, and improve traditional operators' service life by supplementing licensed spectrum or hotspots se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W36/00H04W36/14
CPCH04W36/0033H04W36/0066H04W36/14H04W8/12H04W8/26H04W48/18H04W60/04H04W12/06H04L63/0892H04W12/08H04L63/102H04W8/16H04W76/11H04W36/0069H04W36/0038H04W60/00
Inventor 路杨
Owner BAICELLS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products