Supercharge Your Innovation With Domain-Expert AI Agents!

Network access method, device and terminal

A network access and network technology, applied in the field of communications, can solve problems such as the terminal's long time to search the network, and achieve the effects of reducing air interface signaling, saving network resources, and shortening the duration.

Pending Publication Date: 2022-07-01
VIVO MOBILE COMM CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present application provides a network access method, device and terminal, which can solve the problem that the terminal needs a long time to search the network when the registered network of the terminal cannot provide normal services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access method, device and terminal
  • Network access method, device and terminal
  • Network access method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] Embodiment 1: The first information is disaster identification information.

[0064] like image 3 As shown, the network access method of the present application includes:

[0065] Step 301: In the case of a disaster in the first network, the terminal records the disaster identification information.

[0066] Here, if the UE learns from the network side that the first network is back to normal, the terminal updates the disaster identification information or deletes the disaster identification information.

[0067] Step 302: The terminal receives normal services in the second network.

[0068] Step 303: When the terminal needs to select a network, read the disaster identification information.

[0069] For example, the disaster identification information is read when the system is powered on, or after the coverage area is restored, or when the background searches and selects the network.

[0070] Step 304: Determine whether a disaster has occurred in the first network ...

Embodiment 2

[0102]Embodiment 2: The first information is the time duration or the running state of the timer.

[0103] like Figure 4 As shown, the network access method includes:

[0104] Step 401: In the case of network selection, determine whether the timer has timed out. In the case that the above-mentioned timer has timed out, go to step 4021, and / or 4022, and / or 4023, and in the case that the above-mentioned timer has not timed out, go to step 4031, and / or 4032.

[0105] Step 4021: When the timer expires, obtain disaster state information of the first network from the network, and the disaster state information indicates that the first network is back to normal.

[0106] If the disaster information indicates that the first network has not recovered to normal, it is considered that the first network is still in disaster, and an attempt is made to access the second network.

[0107] Step 4022: Determine that the first network is back to normal.

[0108] Step 4023: Attempt to acces...

Embodiment 3

[0122] Embodiment 3: The first information is a first location range, and the first location range is a location range where a disaster occurs in the first network.

[0123] like Figure 5 As shown, the network access method includes:

[0124] Step 501: Acquire the location range where the disaster occurs in the first network.

[0125] Optionally, the first network or the second network sends, through signaling, the effective location range of the disaster in the first network, such as which TA areas, which latitude and longitude locations, and which satellite coverage areas.

[0126] Alternatively, the UE estimates the location information through other means, for example, the location information obtained through satellite or Wireless Local Area Network (WLAN), or estimates the location information from the air interface information of the first network or the second network, for example, according to the first network The TA information in the registration success message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network access method, a network access device and a terminal, and belongs to the technical field of communication. The method comprises the steps that under the condition that network selection needs to be carried out, a terminal obtains first information, and the first information is information related to the disaster state of a first network; the terminal tries to access the first network under the condition of determining that the first network does not have a disaster according to the first information; or, trying to access the second network under the condition that it is determined that the disaster occurs in the first network according to the first information. According to the embodiment of the invention, under the condition that network selection needs to be carried out, if it is determined that the first network has a disaster, the second network is tried to be accessed, so that the time length for the terminal to obtain normal service can be effectively shortened, air interface signaling is reduced, and network resources are saved.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular, to a network access method, device and terminal. Background technique [0002] Currently, when a user equipment (UE) selects a network, for example, when powering on or restoring coverage, or when the coverage area is restored, the UE preferentially tries to access a previously registered network, such as a registered Public Land Mobile Network (RPLMN) network , in the idle state, the UE may periodically try to access a higher priority network, such as the Home Public Land Mobile Network (HPLMN), the Equivalent Home Public Land Mobile Network (Equivalent Home Public Land Mobile Network) , EHPLMN). However, when the previously registered network cannot provide normal services, if the terminal continues to search for the registered network, it will take a long time for the UE to find a network that can provide normal services. SUMMARY OF THE INVENTION [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W48/08H04W48/18
CPCH04W48/08H04W48/18
Inventor 韩鲁峰康艳超刘选兵
Owner VIVO MOBILE COMM CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More