Method and apparatus for controlling access in next generation mobile communication system
A wireless communication system and access type technology, which is applied in security devices, access restrictions, wireless communication, etc., can solve problems such as failure to make a determination, and achieve the effect of improving system throughput
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0110] Example 1
[0111] Figure 1A Is a diagram showing the architecture of a next-generation mobile communication system according to an embodiment of the present disclosure.
[0112] reference Figure 1A The radio access network 1a-20 of the next-generation mobile communication system includes a New Radio Node B (NRNB) 1a-10 and a New Radio Core Network (NR CN) 1a-05. New radio user equipment (hereinafter referred to as New Radio User Equipment (NR UE) or UE for short) 1a-15 is connected to an external network via NR NB 1a-10 and NR CN1a-05.
[0113] in Figure 1A Among them, NR NB 1a-10 corresponds to the evolved Node B (evolved Node B, eNB) in the traditional LTE system. The NR UE 1a-15 is connected to an NR NB that can provide services better than traditional eNBs. In the next-generation mobile communication system where all user services are served through shared channels, entities are required to collect UE-specific status information (such as buffer status, power headroom s...
Example Embodiment
[0125] Example 1-1
[0126] The present disclosure proposes a method for mapping access triggered by UE NAS to a specific category. In Embodiment 1-1, the UE NAS maps the access to a category.
[0127] In Embodiment 1-1, the access is mapped to at least one standardized access category. In addition, access may not be mapped to any subcategory of the non-standardized access category provided by the network. In the present disclosure, the category provided by the network for mapping access to it is assigned at least one predetermined priority. The triggered access is mapped to the category with the highest priority among the categories to which the access can be mapped. In the present disclosure, the category corresponding to "urgent" belongs to the category set with the highest priority. The category corresponding to "high priority access" may belong to the set of categories with the highest priority. High-priority access means dedicated access for mobile communication operato...
Example Embodiment
[0146] Example 1-2
[0147] In Embodiment 1-2, the UE NAS maps the access to a standardized access category, and additionally, maps to a non-standardized access category to which the access can be mapped. In this disclosure, the service request sent by the UE NAS to the UE AS includes information indicating the standardized access category, because the triggered access should be mapped to a standardized access category. At operation 1f-05, the UE AS does not provide an access category list. Therefore, the operation of determining whether an access can be mapped to one of the non-standardized access categories at operation 1f-25 is not performed based on the non-standardized access category included in the list. For example, UENAS only determines whether there is a non-standardized access category based on information about non-standardized access categories that the network can support provided through NAS signaling or application layer signaling.
[0148] In Embodiment 1-2, the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap