Unlock instant, AI-driven research and patent intelligence for your innovation.

Service access control method and equipment

A control method and service access technology, applied in the field of communications, can solve problems such as no solutions, and achieve the effects of ensuring access, saving network resources, and enhancing processing capabilities

Active Publication Date: 2019-07-02
HUAWEI TECH CO LTD
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there is no mechanism that can allow or restrict specific services, so it is necessary to provide a mechanism to allow specific services to access the network when access control is implemented.
Based on the above requirements, the 3GPP standard organization also proposed a service-based data connection and congestion control (Application specific Congestion control for Data Connectivity, ACDC) research project to discuss the above application scenarios and requirements, but no corresponding solutions have been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service access control method and equipment
  • Service access control method and equipment
  • Service access control method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0167] refer to figure 1 , figure 1 It is a flowchart of a method for controlling service access provided by Embodiment 1 of the present invention. like figure 1 As shown, the method includes the following steps:

[0168] Step 101, the terminal acquires service list information or service level index information, the service list information includes identification information of permitted and / or prohibited services, and the service level index information includes identification and level information of permitted and / or prohibited services ;

[0169] In this step, the terminal may obtain service list information or service level index information in a preconfigured manner. The pre-configuration method can pre-store the service list information or service level index information on the SIM card of the mobile phone. The service list information can be in the form of a black or white list, and the list includes the service identification of the permitted or prohibited servic...

Embodiment 2

[0204] refer to figure 2 , figure 2 It is a flowchart of a method for controlling service access provided in Embodiment 2 of the present invention. Such as figure 2 As shown, the method includes:

[0205] Step 201, the terminal obtains service list information or service level index information, the service list information includes identification information of permitted and / or prohibited services, and the service level index information includes identification and level information of permitted and / or prohibited services ;

[0206] Step 202: After the terminal receives the instruction issued by the network, it judges whether the service to be initiated by the terminal is allowed to be accessed according to the service list information or the service level index information, and if so, initiates the service to the network. A service access request to be initiated by the terminal, if not, prohibiting the service access request to be initiated by the terminal from being ...

Embodiment 3

[0218] refer to image 3 , image 3 It is a flowchart of a method for controlling service access provided by Embodiment 3 of the present invention. The methods include:

[0219] Step 301, the network configures service list information or service level index information to the terminal;

[0220] Preferably, the network configuration service list information or service level index information to the terminal is specifically:

[0221] The network configures service list information or configures service level index information to the terminal through OMA DM.

[0222] In this step, refer to Figure 5 or Figure 10 Step 501 or Step 1001 of . The network configures service list information or configures service level index information to the terminal through OMA DM.

[0223] Wherein, the network can configure service list information or service level index information for a single user by way of OMA DM.

[0224] Preferably, the network configuration service list information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a service access control method. The method comprises the steps that service list information or service level index information is obtained from a network through pre-configuration or from the network by a terminal, the service list information comprises identification information of services allowed and / or forbidden, and the service level index information comprises identification and level information of the services allowed and / or forbidden; after the terminal receives an instruction issued by the network, the terminal sends the instruction to the server; and if yes, judging whether the service to be initiated by the terminal is allowed to be accessed according to the service list information or the service level index information, if yes, initiating a service access request to be initiated by the terminal to the network, and if not, forbidding initiating the service access request to be initiated by the terminal to the network. Therefore, under the condition of a specific scene or network congestion, network resources can be saved, access of allowed services is guaranteed, and the service control and emergency processing capability of an operator is enhanced.

Description

technical field [0001] The invention belongs to the communication field, and in particular relates to a service access control method and equipment. Background technique [0002] In recent years, mobile Internet applications have developed rapidly, and mobile terminals can easily download and install various applications. However, in the case of network congestion, these applications will aggravate the congestion on the radio access network (Radio Access Network, RAN) or core network (Core Network, CN) side. When the network is congested, certain applications should be prohibited from accessing the network to save network resources. In addition, some applications can cause problems, such as some applications will leak the user's personal information without the user's permission or violate local laws. Therefore, a mechanism should be provided to allow the network to prohibit certain applications from accessing the network. On the other hand, certain applications are very ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/10H04W48/16
CPCH04W48/10
Inventor 张万强赵旸弗兰克马德曼
Owner HUAWEI TECH CO LTD