Method, device and terminal for terminal access network

A terminal access and network technology, applied in the field of communication, can solve problems such as affecting network performance and heavy network signaling burden, and achieve the effects of improving network performance, reducing network signaling burden, avoiding authentication and bearer establishment/release

Active Publication Date: 2020-03-06
BAICELLS TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to provide a method, device and terminal for a terminal to access the network, which solves the problem of excessive network signaling burden caused by a large number of signaling processes related to authentication and registration caused by frequent attachment of terminals in the prior art. Large, serious problems affecting network performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and terminal for terminal access network
  • Method, device and terminal for terminal access network
  • Method, device and terminal for terminal access network

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0042] Such as figure 2 As shown, the first embodiment of the present invention provides a method for a terminal to access a network, including:

[0043] Step 11, when the terminal switches from the first cell to the second cell, obtain the second network identifier of the second network where the second cell is located and the second service provided by the terminal selected from the service providers supported by the second network Merchant's logo.

[0044] In this step, the terminal may perform cell reselection during the moving process. The terminal first performs cell reselection in a cell that is the same as the first network ID of the first network where the first cell is located. For example, the signal of the cell does not meet the requirements or the system broadcasts an indication that the cell is a prohibited access cell or a blocked cell; then the terminal can only select a cell that is different from the first network ID. When the terminal selects a suitable I...

no. 2 example

[0050] Such as image 3 , Figure 4 As shown, the second embodiment of the present invention provides a method for a terminal to access a network, including:

[0051] Step 21 is the same as Step 11 above.

[0052] Step 22, when the second network identifier is different from the first network identifier, and the second service provider's identifier is the same as the first service provider's identifier, send a message carrying the terminal to the second network The access request of the globally unique temporary identifier GUTI; or,

[0053] Step 23, when the second network ID is different from the first network ID, and the second network ID is in the set of network IDs of the network equivalent to the first network ID, and the ID of the second service provider is the same as the first network ID When the identifiers of the service providers are different, and the identifier of the second service provider is in the identifier set of the equivalent service provider of the fi...

no. 3 example

[0059] Such as Figure 5 As shown, the third embodiment of the present invention provides a method for a terminal to access a network, including:

[0060] Step 31 is the same as Step 11 above.

[0061] Step 32: When the second network identifier is different from the first network identifier, and the second service provider's identifier is the same as the first service provider's identifier, determine whether the terminal is currently located in the terminal saved Within the location area in the tracking area list (TA list).

[0062] Step 33, if the terminal is located in the location area in the tracking area list, send a service request carrying the globally unique temporary identifier GUTI of the terminal to the second network;

[0063] Step 34: If the terminal is located in a location area outside the tracking area list, send a location area update request or an attach request carrying the terminal's globally unique temporary identifier GUTI to the second network.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method, device, and terminal for a terminal to access a network. The method includes: when a terminal switches from a first cell to a second cell, acquiring the second network identifier of the second network where the second cell is located and the An identifier of a second service provider selected by the terminal among service providers supported by the second network; if the second network identifier is different from the first network identifier of the first network where the first cell is located, or the second When the identifier of the service provider is different from the identifier of the first service provider registered by the terminal in the service provider supported by the first network, sending a message carrying the globally unique temporary identifier GUTI of the terminal to the second network The access request is used to access the second network, so that the network side can obtain the context information of the terminal in the network according to the GUTI, so as to avoid authentication of the terminal and bearer establishment / release, reduce network signaling burden, and improve network performance.

Description

technical field [0001] The present invention relates to the field of communication technologies, in particular to a method, device and terminal for terminal access to a network. Background technique [0002] MulteFire is a new LTE (Long Term Evolution)-based wireless access technology that can operate independently in unlicensed spectrum without the use of licensed band carriers. MulteFire extends LTE to unlicensed spectrum. The physical layer introduces a Listen Before Talk (LBT, Listen Before Talk) mechanism similar to WiFi carrier sense technology to achieve fair competition for air interface resources with unlicensed band devices. [0003] MulteFire can be used in the existing 3GPP network architecture and interface with the existing 3GPP core network to provide traditional mobile network operators with the capacity, coverage and data offload brought by unlicensed spectrum, and improve traditional operators' service life by supplementing licensed spectrum or hotspots se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W36/00H04W36/14
CPCH04W36/0033H04W36/0066H04W36/14H04W8/12H04W8/26H04W48/18H04W60/04H04W12/06H04L63/0892H04W12/08H04L63/102H04W8/16H04W76/11H04W36/0069H04W36/0038H04W60/00
Inventor 路杨
Owner BAICELLS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products