Access control method and device
A technology of access control and user equipment, applied in access restriction, electrical components, wireless communication, etc., can solve the problem that BWP cannot control access independently
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0094] The implementation manners of the embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0095] The access control method provided by the embodiment of the present invention can be applied to any communication system that supports multi-beam and large-bandwidth access control. For example, it can be applied to 5G communication system, future evolution system, multiple communication fusion systems, LTE communication system, etc. It can include a variety of application scenarios, such as machine to machine (M2M), D2M, macro and micro communication, enhanced mobile Internet (enhance mobile broadband, eMBB), ultra-high reliability and ultra-low latency communication (ultra reliable&low latency communication (uRLLC) and massive machine type communication (mMTC) and other scenarios. These scenarios may include but not limited to: communication scenarios between the base station and the user equipment, and the lik...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


