Restriction control apparatus, restriction control system, and restriction control method

Inactive Publication Date: 2017-01-05
NTT DOCOMO INC
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0020]According to one or more embodiments of the present invention, there is provided a technique that enables f

Problems solved by technology

However, all of M2M terminals do not necessarily support LAPI, so restriction control for M2M may not be able to be performed for LAPI-not-supported terminals that do not set LAPI.
Also, in the conventional technique, only uniform r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Restriction control apparatus, restriction control system, and restriction control method
  • Restriction control apparatus, restriction control system, and restriction control method
  • Restriction control apparatus, restriction control system, and restriction control method

Examples

Experimental program
Comparison scheme
Effect test

first example

[0038]In one or more embodiments of the first example, the restriction control apparatus 10 holds correspondence information (to be referred to as user information, hereinafter) between a user ID and an M2M group ID, and determines whether to reject or permit a communication request from a user apparatus UE based on the user information so as to realize restriction control for each group.

[0039]Outline of processing in one or more embodiments of the first example is described with reference to FIG. 2. First, an M2M group ID is set for each user ID from the customer system 40 to the user information management apparatus 30 (step 1). In the example of FIG. 2, it is shown that M2M group ID1 is set to a user A (A-san), and M2M group ID2 is set to a user B (B-san).

[0040]The user information (profile) including the M2M group ID is downloaded to the restriction control apparatus 10 that accommodates the user apparatus UE of the corresponding user, and the restriction control apparatus 10 ho...

second example

[0074]Next, one or more embodiments of the second example is described. In one or more embodiments of the second example, each user is assigned an M2M group ID, the user apparatus UE holds the M2M group ID, the user apparatus UE transmits a connection request including the M2M group ID to the radio access control apparatus 20 when establishing a radio connection with the radio access control apparatus 20, so that the radio access control apparatus 20 performs restriction determination based on the M2M group ID. In one or more embodiments, although it is not necessary that the user information management apparatus 30 has M2M group IDs for the purpose of restriction control, the M2M group IDs may be held. However, the customer system 40 or the operation system 50 holds information in which a user ID (arbitrary ID for identifying user or user apparatus UE) is associated with an M2M group ID for the purpose of determining which user apparatus UE to select as a restriction target.

[0075]T...

first example and second example

COMBINATION OF FIRST EXAMPLE AND SECOND EXAMPLE

[0094]Although the first example and the second example have been described separately so far, the communication system shown in FIG. 1 may have functions of both of the function of the first example and the function of the second example.

[0095]In this case, for a user apparatus UE that does not have an M2M group ID, restriction control can be performed by the method described in the first example. Also, for a user apparatus UE that has an M2M group ID, restriction control may be performed by the method described in the second example, or may be performed by the method described in the first example.

[0096]In the combination of the first example and the second example, for example, there is provided a restriction control system including the restriction control apparatus 10 in the first example and the radio access control apparatus 20 in the second example.

[0097]The user apparatus UE described in one or more embodiments may include a CP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A restriction control apparatus configured to perform restriction control of communication of a user apparatus in a mobile communication system includes an information obtaining unit configured to obtain, from a user information management apparatus in the mobile communication system, group identification information indicating a group to which the user apparatus belongs, and a restriction determination unit configured, when receiving a communication request from the user apparatus, to determine whether the group to which the user apparatus belongs is a control target or not based on the group identification information and group identification information of a control target determined by the restriction control apparatus.

Description

TECHNICAL FIELD[0001]The present invention relates to a technique for restricting communication of a user apparatus (terminal) in a mobile communication.BACKGROUND ART[0002]In recent years, study of M2M (Machine-to-Machine) communication is progressing in which communication is executed between machines that are connected to a communication network without operation by a human so that proper control of machines and the like are automatically performed. For example, in 3GPP, standardization of a communication standard on M2M is progressing as a name of MTC (Machine Type Communication) (for example: non-patent document 1).[0003]From now, it is predicted that M2M terminals and the like will become widespread at an accelerated pace. In a network accommodating these large amount of terminals, for example, since there is a possibility in that congestion may occur due to re-connection, caused by network apparatus failure or server failure or the like, that is simultaneously performed by th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W48/02H04W8/18H04W4/08H04W4/70
CPCH04W4/08H04W8/186H04W4/70H04W48/02
Inventor NISHIMURA, MASAKISUZUKI, KEISUKEHIGA, REIKASASADA, KEISUKESTAEHLE, DIRKTHAKOLSRI, SRISAKUL
Owner NTT DOCOMO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products