Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and device

An access control and access layer technology, applied in the field of communication, can solve problems such as poor scalability

Inactive Publication Date: 2018-07-13
CHINA ACAD OF TELECOMM TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] To sum up, in the prior art, with the development of wireless communication systems, terminal types and service types are diversified, and more and more methods and types of access control are required, but the existing access control mechanism poor scalability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0158] Embodiment 1: The high layer of the UE provides the access control group index number to the AS layer of the UE.

[0159] In this embodiment, only the access control packet index number is included in the access control packet set;

[0160] The definition or situation corresponding to each access control group index number is stipulated in the high-level protocol, that is, the access control object corresponding to each access control group index number. for example:

[0161] Defined in the high-level protocol: index number index 0 indicates that the terminal is paged; index 1 indicates that the terminal initiates an emergency call; index 2 indicates that the terminal initiates ordinary data; index 3 indicates that the terminal initiates a Non-Access Stratum (NAS) message command; index 4 is for the terminal to initiate the MMTEL voice service; index 5 is for the terminal to initiate the MMTEL video service, and index 6 is the default index;…

[0162] The high-level p...

Embodiment 2

[0184] Embodiment 2: The AS layer of the UE determines the index number of the access control group according to the rules.

[0185] In this embodiment, the access control group set includes the access control group index number, the PLMN to which the UE belongs, and the RRC state to which the UE belongs. There are two PLMNs (PLMN1 and PLMN2) in the network, and the RRC state to which the UE belongs includes three states: idle state, inactive state and connected state.

[0186] The AS layer of the UE obtains the access control group index number corresponding to the current access control object according to the definition corresponding to each access control group index number stipulated in the protocol, or through interaction with the network side.

[0187] The access control method in this embodiment includes:

[0188] Step 1: The AS layer of the UE receives and stores the access control parameter configuration sent by the eNB.

[0189] In the access control parameter con...

Embodiment 3

[0202] Embodiment 3: The upper layer of the UE and the AS layer determine the index number of the access control group according to the rules.

[0203] In this embodiment, the access control packet set includes an access control packet index number and a corresponding network slice (network slice). Assume that the current network has two network slices.

[0204] The access control method in this embodiment includes:

[0205] Step 1: The AS layer of the UE receives and stores the access control parameter configuration sent by the eNB.

[0206] In the access control parameter configuration sent by the eNB, each access control parameter set may correspond to a set of access control group set lists, for example:

[0207] The set of access control groups corresponding to bar is {(index 3, all network slice);

[0208] {bar factor is 0.3, bar timer is 8s} and the corresponding access control group index number list is {(index2, all network slice), (index4, network slice 1)};

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an access control method and device which are used for improving extendibility of an access control mechanism, so that the access control method and device can be more convenient for extension of a mode and a type of access control and helpful for diversified development of a terminal type and a service type. The access control method provided by the application comprisesthe steps that: UE (User Equipment) determines an access control packet set comprising access control object information; the UE determines access control parameters corresponding to the access control packet set; and the UE carries out access control according to the access control parameters.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to an access control method and device. Background technique [0002] The long term evolution (Long Term Evolution, LTE) access control mechanism in the prior art includes: [0003] 1. Access Class Barring (ACB), the ACB mechanism is based on the type of access (such as mobile originating data mobile terminal originating data or mobile originating signaling mobile terminal originating signaling) and user equipment (User Equipment, UE ) to the access class (Access Class, AC) to perform access control; [0004] 2. ACB skip (skip): For the voice (voice), video (video) and short message service (Short Message Service, SMS) of the multimedia telephony service standard (Multi Media Telephony, MMTEL), the access control mechanism is skipped, thereby Prioritize voice (voice), video (video) and short message service (Short Message Service, SMS) access; [0005] 3. S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/08H04W28/02H04W48/16
CPCH04W4/08H04W28/0215H04W28/0289H04W48/16H04W28/02H04W48/12H04W48/02H04W48/10H04W84/042H04W88/12
Inventor 傅婧梁靖张元
Owner CHINA ACAD OF TELECOMM TECH