Service access control method and equipment
A control method and service access technology, applied in the field of communications, can solve problems such as no solutions, and achieve the effects of ensuring access, saving network resources, and enhancing processing capabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0167] refer to figure 1 , figure 1 It is a flowchart of a method for controlling service access provided by Embodiment 1 of the present invention. like figure 1 As shown, the method includes the following steps:
[0168] Step 101, the terminal acquires service list information or service level index information, the service list information includes identification information of permitted and / or prohibited services, and the service level index information includes identification and level information of permitted and / or prohibited services ;
[0169] In this step, the terminal may obtain service list information or service level index information in a preconfigured manner. The pre-configuration method can pre-store the service list information or service level index information on the SIM card of the mobile phone. The service list information can be in the form of a black or white list, and the list includes the service identification of the permitted or prohibited servic...
Embodiment 2
[0204] refer to figure 2 , figure 2 It is a flowchart of a method for controlling service access provided in Embodiment 2 of the present invention. Such as figure 2 As shown, the method includes:
[0205] Step 201, the terminal obtains service list information or service level index information, the service list information includes identification information of permitted and / or prohibited services, and the service level index information includes identification and level information of permitted and / or prohibited services ;
[0206] Step 202: After the terminal receives the instruction issued by the network, it judges whether the service to be initiated by the terminal is allowed to be accessed according to the service list information or the service level index information, and if so, initiates the service to the network. A service access request to be initiated by the terminal, if not, prohibiting the service access request to be initiated by the terminal from being ...
Embodiment 3
[0218] refer to image 3 , image 3 It is a flowchart of a method for controlling service access provided by Embodiment 3 of the present invention. The methods include:
[0219] Step 301, the network configures service list information or service level index information to the terminal;
[0220] Preferably, the network configuration service list information or service level index information to the terminal is specifically:
[0221] The network configures service list information or configures service level index information to the terminal through OMA DM.
[0222] In this step, refer to Figure 5 or Figure 10 Step 501 or Step 1001 of . The network configures service list information or configures service level index information to the terminal through OMA DM.
[0223] Wherein, the network can configure service list information or service level index information for a single user by way of OMA DM.
[0224] Preferably, the network configuration service list information...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


