Access control method and user equipment

A technology of access control and user equipment, applied in access restriction, connection management, wireless communication, etc., can solve problems such as meaninglessness and non-belonging, and achieve the effect of improving utilization efficiency

Pending Publication Date: 2019-12-27
SHARP KK +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For another example, when the UE undergoes cell reselection, the barring timer is stopped, and the selected cell still belongs to the RNA maintained by the UE side, then it is meaningless to initiate an RNAU connection request at this time, because one of the triggers for RNAU is the UE The location of the UE has changed, and the cell it resides in does not belong to the saved RNA list, and the cell where the UE is now still belongs to the RNA saved on the UE side, that is, the UE's location has not changed significantly, and the RNAU performed at this time is useless. meaningful

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and user equipment
  • Access control method and user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] When the barring timer stops running, determine whether the UE is in the INACTIVE state,

[0058] - If the UE is not in the INACTIVE state or the UE is in the connected state, the UE does not trigger RNAU;

[0059] - If the UE is in the INACTIVE state, further determine whether the T380 is in the running state;

[0060] - Trigger RNAU if T380 is not running;

[0061] - If T380 is running, further determine whether the cell where the UE is currently camping belongs to the RNA area;

[0062] - If the cell where the UE is currently camping does not belong to the RNA area, trigger RNAU;

[0063] -If the cell where the UE is currently camping on belongs to the RNA area, RNAU is not triggered.

[0064] Wherein, the barring timer refers to a timer related to barring, which can be understood as a timer started when an access check result of a certain access category (access category) is barring access. The stopping of the barring timer can be caused by the timeout of the ba...

Embodiment 2

[0087] The difference from Embodiment 1 is that a corresponding operation is triggered through an intermediate indication process.

[0088] When the barring timer stops running, indicate to the RRC layer or generate an indication to the UE: the access barring of the access category (access category) corresponding to the barring timer is released.

[0089] Based on or considering the indication, the RRC layer further performs the following operations:

[0090] - If the UE is not in the INACTIVE state or the UE is in the connected state, RNAU is not triggered;

[0091] - If the UE is in the INACTIVE state, further determine whether the T380 is in the running state;

[0092] - Trigger RNAU if T380 is not running;

[0093] - If T380 is running, further determine whether the cell where the UE is currently camping belongs to the RNA area;

[0094] - If the cell where the UE is currently camping does not belong to the RNA area, trigger RNAU;

[0095] -If the cell where the UE is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided are an access control method in a user equipment, and a user equipment, which can avoid a meaningless RNAU connection request, thereby improving the utilization efficiency of communication resources. The access control method in the user equipment comprises the following steps: starting an access forbidding timer under the condition that an access control check result is access forbidding; when it is judged that the access forbidding timer is in the running stopping state, the timer is started; determining whether to trigger the access network notification area to update the RNAU according to at least one of the following conditions; wherein the conditions comprise whether the current connection state of the UE is in an inactive state, whether an RNAU timer started when the UE enters the inactive state is in a running state, and whether a cell where the UE currently resides belongs to an access network notification area RNA.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, and more specifically, the present invention relates to an access control method in user equipment related to an access network notification area update, and a corresponding base station and user equipment. Background technique [0002] With the rapid growth of mobile communication and the great advancement of technology, the world will move towards a fully interconnected network society, that is, anyone or anything can obtain information and share data at any time and anywhere. It is estimated that by 2020, the number of connected devices will reach 50 billion, of which only about 10 billion may be mobile phones and tablet computers, and the rest are not machines that talk to people, but machines that talk to each other. Therefore, how to design a system to better support the Internet of Everything is a topic that requires in-depth research. [0003] To this end, at the 3...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W74/00H04W76/18H04W76/19H04W76/27
CPCH04W74/002H04W76/18H04W76/19H04W76/27H04W48/02H04W68/00H04W48/16H04W36/08H04W68/005
Inventor 张崇铭刘仁茂
Owner SHARP KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products