Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method, terminal and storage medium

An access control and terminal technology, applied in the field of communication, can solve problems such as poor network access flexibility, and achieve the effect of improving flexibility

Active Publication Date: 2021-06-11
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Poor network access flexibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, terminal and storage medium
  • Access control method, terminal and storage medium
  • Access control method, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] It should be noted that the upper layer of the terminal can read the access identifier from the USIM card, where the access identifier is set by the operator when making the card. As shown in Table 1, different access identifiers correspond to different types of access configurations .

[0023] Access ID terminal configuration 0 Used when no access identifier is configured in USIM 1 The UE is configured as Multimedia Priority Service (MPS). 2 UE is configured as Mission Critical Service (MCS). 3-10 reserved for future use 11 Configure access level 11 12 Configure Access Class 12 13 Configure access level 13 14 Configure Access Level 14 15 Configure access level 15

[0024] The upper layer of the terminal can also specify the access type according to the service type. As shown in Table 2, different types of access attempts correspond to different access types.

[0025]

[0026]

[0027] After obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an access control method, a terminal and a storage medium, and the method comprises the steps: controlling an access forbidding timer according to a first system message when the access forbidding timer operates, is in a network access forbidding state, and receives the first system message, so as to control the access operation of a network.

Description

technical field [0001] The present application relates to the communication field, and in particular to an access control method, a terminal, and a storage medium. Background technique [0002] When the terminal initiates a service from the idle state, the terminal needs to enter the connected state from the idle state. At this time, the terminal needs to be based on the network configuration, the access level in the Universal Subscriber Identity Module (Universal Subscriber Identity Module, USIM) card and the high-level configuration of the terminal. The access type performs access control. When the network is in a congested state, the network will configure some control parameters to control some terminals from accessing the network. At this time, it is necessary to calculate the access prohibition period of the timer T390 and start T390. During the operation of T390, this access is prohibited, and after T390 times out or stops, this access is allowed. The flexibility of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/08H04W28/02
CPCH04W48/08H04W28/0289Y02D30/70
Inventor 罗强
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD