CN112020879A - Access control method and device and storage medium - Google Patents

Access control method and device and storage medium Download PDF

Info

Publication number
CN112020879A
CN112020879A CN202080001641.2A CN202080001641A CN112020879A CN 112020879 A CN112020879 A CN 112020879A CN 202080001641 A CN202080001641 A CN 202080001641A CN 112020879 A CN112020879 A CN 112020879A
Authority
CN
China
Prior art keywords
terminal
access control
access
limiting
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202080001641.2A
Other languages
Chinese (zh)
Other versions
CN112020879B (en
Inventor
李艳华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Publication of CN112020879A publication Critical patent/CN112020879A/en
Application granted granted Critical
Publication of CN112020879B publication Critical patent/CN112020879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the disclosure provides an access control method and device, communication equipment and a storage medium. The access control method provided by the embodiment of the disclosure comprises the following steps: determining an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal; and controlling the terminal not to send an access request before receiving a paging message according to the access control limiting parameter.

Description

Access control method and device and storage medium
Technical Field
The embodiments of the present disclosure relate to the field of wireless communications, but not limited to the field of wireless communications, and in particular, to an access control method and apparatus, and a storage medium.
Background
In an LTE (Long Term Evolution ) communication system and a 5G NR (New Radio, New air interface) communication system, an Access Control (AC) restriction operating mechanism is: and acquiring corresponding AC barring (AC barring) parameters according to the Access Class (Access Class) of the terminal and the call initiated by the terminal, and performing AC barring decision (AC barring check).
For some functional terminals with only downlink transmission requirements, for example, some internet of things devices, an independent uplink mode is not needed, or transmission of uplink data only needs to be performed after downlink transmission. However, the related art access control method cannot meet this special requirement for a while.
Disclosure of Invention
The disclosure provides an access control method and device and a storage medium.
According to a first aspect of the embodiments of the present disclosure, an access control method is provided, which is applied to a terminal, and includes:
determining an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal;
and controlling the terminal not to send an access request before receiving a paging message according to the access control limiting parameter.
In some embodiments, the types of terminals include: a terminal that does not perform uplink transmission until receiving downlink transmission.
In some embodiments, the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
In some embodiments, the controlling the terminal not to send an access request includes:
starting a limit timer according to the access control limit parameter; within the timing duration of the limiting timer, not sending the access request;
and/or, not sending the access request according to the access control limiting factor.
In some embodiments, the timing duration takes the following values: greater than or equal to a predetermined cycle duration of discontinuous reception mode DRX or extended discontinuous reception mode eDRX.
In some embodiments, the value of the access control restriction factor for the terminal is the second value.
In some embodiments, the access control restriction parameter comprises:
restricting the restricted call category of access.
In some embodiments, controlling the terminal not to send an access request until receiving a paging message according to the access control restriction parameter comprises:
and in response to the fact that the call type triggering access is the call type limitation, controlling the terminal not to send an access request before receiving the paging message according to the access control limitation parameter.
In some embodiments, the restricted call category is indicated by at least one of:
an access category;
accessing the identifier;
and identifying the terminal type.
In some embodiments, the method further comprises:
responding to the call type triggering access as an emergency call type, and sending an access request; wherein the emergency call category is different from the restricted call category.
In some embodiments, the method further comprises:
receiving the access control restriction parameter for the terminal;
or,
acquiring the default access control limiting parameter of the terminal;
or,
and acquiring the access control limiting parameter of the terminal according to a communication protocol.
In some embodiments, the obtaining the default access control restriction parameter of the terminal includes:
and acquiring the default access control limiting parameters of the terminal in response to failure of receiving the access control limiting parameters of the terminal.
In some embodiments, the default access control restriction parameter is recorded at the terminal or specified by a communication protocol.
According to a second aspect of the embodiments of the present disclosure, there is provided an access control method applied to a base station, including:
determining access control limiting parameters according to the type of the terminal;
and sending the access control limiting parameter to the terminal, wherein the access control limiting parameter is used for controlling the terminal not to send an access request before receiving the paging message.
In some embodiments, the types of terminals include: a terminal that does not perform uplink transmission until receiving downlink transmission.
In some embodiments, the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
In some embodiments, the timing duration takes the following values: greater than or equal to a predetermined cycle duration of DRX or eDRX.
In some embodiments, the value of the access control restriction factor for the terminal is the second value.
In some embodiments, the issuing, according to the terminal type, an access control restriction parameter includes:
and issuing access control limiting parameters to the terminal by using system messages or Radio Resource Control (RRC) messages.
According to a third aspect of the embodiments of the present disclosure, there is provided an access control apparatus, applied in a terminal, including:
a first determining module configured to determine an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal;
and the control module is configured to control the terminal not to send the access request before not receiving the paging message according to the access control limiting parameter.
In some embodiments, the types of terminals include: a terminal that does not perform uplink transmission until receiving downlink transmission.
In some embodiments, the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
In some embodiments, the control module comprises:
a starting module configured to start a limit timer according to the access control limit parameter; within the timing duration of the limiting timer, not sending the access request;
and/or, not sending the access request according to the access control limiting factor.
In some embodiments, the timing duration takes the following values: greater than or equal to a predetermined cycle duration of discontinuous reception mode DRX or extended discontinuous reception mode eDRX.
In some embodiments, the value of the access control restriction factor for the terminal is the second value.
In some embodiments, the access control restriction parameter comprises:
restricting the restricted call category of access.
In some embodiments, the control module comprises:
and the control submodule is configured to respond to the fact that the call type triggering access is the call limiting type, and control the terminal not to send an access request before receiving the paging message according to the access control limiting parameter.
In some embodiments, the restricted call category is indicated by at least one of:
an access category;
accessing the identifier;
and identifying the terminal type.
In some embodiments, the apparatus further comprises:
the sending module is configured to respond to the fact that the call type triggering access is an emergency call type and send an access request; wherein the emergency call category is different from the restricted call category.
In some embodiments, the apparatus further comprises:
a receiving module configured to receive the access control restriction parameter for the terminal;
or,
a first obtaining module configured to obtain the default access control restriction parameter of the terminal;
or,
a second obtaining module configured to obtain the access control restriction parameter of the terminal according to a communication protocol.
In some embodiments, the first obtaining module includes:
an obtaining sub-module configured to obtain the access control restriction parameter default for the terminal in response to failure of receiving the access control restriction parameter for the terminal.
In some embodiments, the default access control restriction parameter is recorded at the terminal or specified by a communication protocol.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an access control apparatus, applied to a base station, including:
a second determining module configured to determine an access control restriction parameter according to the type of the terminal;
a sending module configured to send the access control restriction parameter to the terminal, wherein the access control restriction parameter is used to control the terminal not to send an access request before receiving a paging message.
In some embodiments, the types of terminals include: a terminal that does not perform uplink transmission until receiving downlink transmission.
In some embodiments, the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
In some embodiments, the timing duration takes the following values: greater than or equal to a predetermined cycle duration of DRX or eDRX.
In some embodiments, the value of the access control restriction factor for the terminal is the second value.
In some embodiments, the issuing module includes:
and the issuing sub-module is configured to issue the access control limiting parameter to the terminal by using a system message or a Radio Resource Control (RRC) message.
According to a fifth aspect of embodiments of the present disclosure, there is provided a communication apparatus including at least: a processor and a memory for storing executable instructions operable on the processor, wherein:
the processor is configured to execute the executable instructions, and the executable instructions perform the steps of any of the above access control methods.
According to a sixth aspect of the embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium, wherein the computer-readable storage medium stores therein computer-executable instructions, which when executed by a processor, implement the steps in any one of the above-mentioned access control methods.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: the embodiment of the disclosure provides an implementation manner of access control, for an uplink transmission limited terminal, controlling the terminal not to send an access request by using an access control limiting parameter until a paging message is received. In this way, unnecessary uplink transmission requests of the terminal can be reduced through access control. Therefore, the uplink transmission limited terminal carries out uplink data only after meeting the limitation condition of uplink transmission, and an access request triggered by sporadic uplink data to be transmitted does not exist, so that resources are occupied.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the embodiments.
Fig. 1 is a block diagram illustrating a wireless communication system in accordance with an exemplary embodiment;
fig. 2 is a first flowchart illustrating an access control method according to an exemplary embodiment;
fig. 3 is a flowchart illustrating an access control method according to an exemplary embodiment;
fig. 4 is a third flowchart illustrating an access control method according to an exemplary embodiment;
fig. 5 is a fourth flowchart illustrating an access control method according to an exemplary embodiment;
fig. 6 is a first schematic structural diagram of an access control device according to an exemplary embodiment;
fig. 7 is a schematic structural diagram of an access control apparatus according to an exemplary embodiment;
FIG. 8 is a first block diagram illustrating a communications device in accordance with an exemplary embodiment;
fig. 9 is a schematic structural diagram of a communication device shown in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with embodiments of the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the disclosed embodiments, as detailed in the appended claims.
The terminology used in the embodiments of the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the embodiments of the present disclosure. As used in the disclosed embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information in the embodiments of the present disclosure, such information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of embodiments of the present disclosure. The words "if" and "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination", depending on the context.
In order to better describe any embodiment of the present disclosure, an embodiment of the present disclosure is exemplarily illustrated by taking an application scenario of access control as an example.
Referring to fig. 1, a schematic structural diagram of a wireless communication system according to an embodiment of the present disclosure is shown. As shown in fig. 1, the wireless communication system is a communication system based on a cellular mobile communication technology, and may include: several terminals 11 and several base stations 12.
Terminal 11 may refer to, among other things, a device that provides voice and/or data connectivity to a user. The terminal 11 may communicate with one or more core networks via a Radio Access Network (RAN), and the terminal 11 may be an internet of things terminal, such as a sensor device, a mobile phone (or referred to as a "cellular" phone), and a computer having the internet of things terminal, and may be a fixed, portable, pocket, handheld, computer-included, or vehicle-mounted device, for example. For example, a Station (STA), a subscriber unit (subscriber unit), a subscriber Station (subscriber Station), a mobile Station (mobile), a remote Station (remote Station), an access point (ap), a remote terminal (remote terminal), an access terminal (access terminal), a user equipment (user terminal), a user agent (user agent), a user equipment (user device), or a user terminal (user equipment, terminal). Alternatively, the terminal 11 may be a device of an unmanned aerial vehicle. Alternatively, the terminal 11 may also be a vehicle-mounted device, for example, a vehicle computer with a wireless communication function, or a wireless terminal externally connected to the vehicle computer. Alternatively, the terminal 11 may be a roadside device, for example, a street lamp, a signal lamp or other roadside device with a wireless communication function.
The base station 12 may be a network side device in a wireless communication system. The wireless communication system may be a fourth generation mobile communication (4G) system, which is also called a Long Term Evolution (LTE) system; alternatively, the wireless communication system can be a 5G system, which is also called a New Radio (NR) system or a 5G NR system. Alternatively, the wireless communication system may be a next-generation system of a 5G system. Among them, the Access Network in the 5G system may be referred to as NG-RAN (New Generation-Radio Access Network, New Generation Radio Access Network).
The base station 12 may be an evolved node b (eNB) used in a 4G system. Alternatively, the base station 12 may be a base station (gNB) adopting a centralized distributed architecture in the 5G system. When the base station 12 adopts a centralized distributed architecture, it generally includes a Centralized Unit (CU) and at least two Distributed Units (DU). A Packet Data Convergence Protocol (PDCP) layer, a Radio Link layer Control Protocol (RLC) layer, and a Media Access Control (MAC) layer are provided in the central unit; a Physical (PHY) layer protocol stack is disposed in the distribution unit, and the embodiment of the present disclosure does not limit the specific implementation manner of the base station 12.
The base station 12 and the terminal 11 may establish a wireless connection over a wireless air interface. In various embodiments, the wireless air interface is based on a fourth generation mobile communication network technology (4G) standard; or the wireless air interface is based on a fifth generation mobile communication network technology (5G) standard, for example, the wireless air interface is a new air interface; alternatively, the wireless air interface may be a wireless air interface based on a 5G next generation mobile communication network technology standard.
In some embodiments, an E2E (End to End) connection may also be established between terminals 11. Scenarios such as V2V (vehicle to vehicle) communication, V2I (vehicle to Infrastructure) communication, and V2P (vehicle to vehicle) communication in vehicle networking communication (V2X).
In some embodiments, the wireless communication system may further include a network management device 13.
Several base stations 12 are connected to a network management device 13, respectively. The network Management device 13 may be a Core network device in a wireless communication system, for example, the network Management device 13 may be a Mobility Management Entity (MME) in an Evolved Packet Core (EPC). Alternatively, the Network management device may also be other core Network devices, such as a Serving GateWay (SGW), a Public Data Network GateWay (PGW), a Policy and Charging Rules Function (PCRF), a Home Subscriber Server (HSS), or the like. The implementation form of the network management device 13 is not limited in the embodiment of the present disclosure.
The access control is a processing mechanism aiming at traffic congestion, and ensures the successful access of critical communication such as emergency call and the like by limiting the connection request of the UE to the base station, reasonably distributes network resources and reduces the congestion condition.
According to the conclusion of NR access control of the 5G system, the structure of the access control restriction parameter (AC Barring parameter) of the access control is determined for each PLMN (Public Land Mobile Network), each access category, and each access identity. Table 1 below gives an example of access control restriction parameters, where the maximum number of PLMNs is 6, the maximum number of access categories is 64, and the maximum number of access identities is 16.
TABLE 1
Figure BDA0002644042850000081
In table 1 above, Access categories are Access categories, and according to the specification of 3GPP TS 24301, the Access categories include the following: "originating signaling", "emergency calls", "originating MMTEL (multimedia telephony) voice (originating multimedia voice call)", "originating MMTEL video (originating multimedia video call)", "originating SMS (Short Message Service over Internet Protocol)" Short Message transmission over Internet Protocol "," originating SMS (originating SMS) "," terminating calls "," originating calls ", and" mobile originating CS call drop ".
In table 1 above, Access identities are Access identities. It is understood that the attributes or classes of the UE (User Equipment) are, for example, 0 to 9 for low priority users, such as personal users, and 11 to 15 for high priority users, such as users related to public safety and emergency services or PLMN management.
The definition of the access control restriction parameters in the table may include the following: the user with low priority can be defined according to the random number and the barring effective time; a bitmap (bitmap) format may then be employed for high priority users. The low-priority users comprise commercial users and high-priority users.
Therefore, the basic access control restriction detection (AC barring check) process is to obtain an access control restriction parameter (AC barring parameter) according to the access type and the access identifier, and perform access control detection. The access control restriction parameter is typically a random number for low priority users (0-9) and a bitmap (bitmap) for high priority users (11-15). Usually, the parameter will be defined in the system message, and for the random number mode, if it is limited, a timer is started, and its time will be calculated by AC-BarringTime (AC-BarringTime). For example, the limit time period is 512 seconds.
In some embodiments, the decision parameter for access control is signaled to the UE using a system message. And if the UE finds that the judgment parameters of the access control are not acquired during judgment, the UE carries out processing according to the non-restriction. For paging, no access control decision is made whether the data packet is sent by the core network or the data packet is sent by the RAN.
For paging, the paging cycle employed is a maximum of 256 radio frames, i.e., 2.56 seconds, so that the limited duration of 512 seconds can be covered. However, after eDRX (Extended discontinuous Reception) introduction, the maximum paging cycle may be Extended to 2.56 × 1024 — 2621.44s (seconds) or longer. However, for some terminals that only have a downlink transmission requirement, including internet of things devices or some electronic devices with specific functions, such as terminals with a tracking and positioning function, an independent uplink mode is not needed, that is, transmission of uplink data only needs to be after downlink transmission. Therefore, the uplink traffic demand of the terminal in this part may be limited by using the access control mechanism until the paging message is received, and therefore, the access control mechanism is enhanced in the following manner in the embodiment of the present disclosure.
As shown in fig. 2, an embodiment of the present disclosure provides an access control method, where the method is applied in a terminal, and includes:
step S101, determining access control limiting parameters, wherein the access control limiting parameters are associated with the type of the terminal;
and step S102, controlling the terminal not to send an access request before receiving the paging message according to the access control limiting parameter.
In the embodiment of the present disclosure, the terminal may be an uplink transmission limited terminal, and uplink transmission of the uplink transmission limited terminal is limited to a certain extent compared with the terminal whose uplink transmission is not limited. For example, when there is uplink transmission, the uplink transmission-unlimited terminal may initiate an access request to request uplink transmission; when there is uplink transmission, the terminal with limited uplink transmission does not directly initiate an access request, and the access request triggered by the uplink transmission is limited to a certain extent, for example, by introducing a limiting mechanism in the terminal to limit the sending of the access request.
On the other hand, the uplink transmission requirement of the terminal with limited uplink transmission is smaller than that of the terminal without limited uplink transmission in terms of statistical probability. The uplink data that the uplink transmission limited terminal needs to send by itself may be sporadic data, or generated based on the downlink transmission data of the base station. For example, the uplink data generated by the uplink limited terminal may include: feedback on the reception of downlink data, and the like.
In this disclosure, the uplink-limited terminal may perform uplink transmission, but the uplink transmission of the uplink-limited terminal is limited to be triggered by the base station, for example, the base station triggers the uplink transmission of the uplink-limited terminal through paging, or the base station triggers the uplink transmission of the terminal through RRC signaling.
In the embodiments of the present disclosure, the terminal is a terminal with limited uplink transmission, and does not need an independent uplink mode. For example, some internet of things devices have only downlink transmission requirements. For example, a terminal of tracking and positioning class does not need an independent uplink mode, i.e., uplink data only needs to be transmitted after downlink.
Therefore, in the embodiment of the present disclosure, the access control mechanism is utilized to limit the uplink service request of the uplink transmission limited terminal until the paging message is received.
In other embodiments, the terminal may be any type of terminal, and based on the call type of the terminal or the operating mode of the terminal, the access control mechanism may be used to perform access control, and limit the call request of the terminal through the access control limiting parameter until receiving the paging message.
Here, the paging message is a message, etc., in which the base station transmits common information and a mobile station to the terminal. The paging message may include: a terminal ID list for paging, a System message change prompt identifier, and an Earthquake and Tsunami Warning System (ETWS) identifier. That is, the paging message is transmitted based on an emergency or notification message. Therefore, when the terminal receives the paging message, the state of restricting access can be released.
And when the paging message is not received, the access control limiting parameter is utilized to limit the uplink access request of the terminal, so that the terminal only uses a downlink transmission channel, and unnecessary uplink requests of the terminal are reduced. Therefore, the terminal sends the uplink data when receiving the paging message, thereby reducing the occupation of the uplink data link and improving the utilization rate of network resources. Meanwhile, repeated uploading requests of sporadic data of the terminal can be reduced, and transmission efficiency is improved. Alternatively, uplink transmission may be performed only when the base station allows it, thereby reducing uplink congestion.
In some embodiments, the types of terminals include: a terminal that does not perform uplink transmission until receiving downlink transmission.
In the embodiment of the present disclosure, the terminal has a function of receiving downlink transmission, and after receiving downlink transmission, the terminal may generally report related information, so that uplink transmission may be performed after downlink transmission. For example, some internet of things devices, such as MTC (Machine type communication) devices, some positioning terminals, Redcap devices, smart home devices, and the like, do not need an independent uplink mode to report messages in a normal use process, and provide corresponding services only through downlink data or local data. And reporting the feedback response when the data needs to be updated and the like, and performing uplink transmission.
In some embodiments, the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
In the embodiment of the present disclosure, the access control mechanism is used to limit the uplink transmission of the terminal, and the limitation on the uplink transmission can be realized by setting the timing duration of the limitation timer and/or the access control limitation factor. Accordingly, the access control restriction parameter may include a timing duration of the restriction timer and an access control restriction factor. Of course, in various practical applications, the access control restriction parameter is not limited to the above-mentioned timing duration of the restriction timer and the access control restriction factor, and may also include any parameter that enables the terminal to stop uplink transmission.
In the embodiment of the present disclosure, to always limit the uplink transmission of the terminal, the timing duration of the limitation timer may be set to infinity, or the access control limitation factor may be set to the second value for limiting the access of the terminal. In addition, while configuring the timing duration of the restriction timer, it may also configure a trigger condition for starting the restriction timer, for example, configure the terminal to trigger the restriction timer after receiving the paging message and sending the access request; or, triggering the limitation timer when the terminal acquires the access control limitation parameter.
Here, the setting of the first value and the second value may be determined according to an actual requirement or a network condition. For example, the first value and the second value are determined according to the load capacity of the base station or the network congestion condition, and when the network congestion condition is serious or available network resources are less, the number of terminals corresponding to the first value is set to be less, and the number of terminals corresponding to the second value is set to be more; when the network is not congested, the number of terminals corresponding to the first value is set to be larger, and the number of terminals corresponding to the second value is set to be smaller. In practical applications, it may be defined that the access control restriction factor is smaller than a predetermined threshold for terminals restricting access, and larger than or equal to the predetermined threshold for terminals allowing access. If the network congestion is serious, the predetermined threshold is set to be a larger value, if the predetermined threshold is 9, only the terminal with the access control limiting factor being greater than or equal to 9 is allowed to access, and the terminal with the access control limiting factor being less than 9 is limited to access. Since the uplink transmission of the uplink transmission limited terminal needs to be limited, the access control limitation factor of the uplink transmission limited terminal may be set to a value smaller than a predetermined threshold. For another example, since the access control restriction factor is a positive integer greater than or equal to 0 and the predetermined threshold is a positive integer greater than 0, the access control restriction factor is always restricted when the access control restriction factor is 0. Therefore, the access control restriction factor of the uplink transmission restricted terminal can be set to 0.
In this way, the access control of the uplink transmission can be performed on the uplink transmission limited terminal by setting the access control limitation parameter.
In some embodiments, the controlling the terminal not to send an access request includes:
starting a limit timer according to the access control limit parameter; within the timing duration of the limiting timer, not sending the access request;
or, according to the access control limiting factor, not sending the access request.
In the embodiment of the disclosure, the terminal may start the timing of the restriction timer by using the configured access control restriction parameter, and in the operation process of the restriction timer, the terminal stops the access request of uplink transmission until the timing of the restriction timer stops. Therefore, the time length of the uplink access request of the terminal can be determined by utilizing the timing time length of the limiting timer. For the uplink transmission limited terminal, the timing duration of the limitation timer can be set to infinity.
The access control restriction parameters also include an opportunity parameter for the terminal to start a restriction timer. For example, the opportunity parameter configurable terminal starts a restriction timer when acquiring the access control restriction parameter, or starts the restriction timer when the configuration terminal initiates an access request; for another example, the terminal is configured to start the restriction timer after receiving the paging message and sending the access request.
In another embodiment, the access control restriction parameter may not include an opportunity parameter specifically indicating a start opportunity of the restriction timer, and the terminal may default to start the timer for the first time after receiving the access control restriction parameter and then start the restriction timer periodically, or automatically start the restriction timer after completing the last uplink transmission or the reception of the downlink transmission.
In addition, the limitation of the uplink access request of the uplink transmission limited terminal can be realized by setting the access control limiting factor (AC Barring factor). Here, the value of the access control restriction factor may be understood as a probability of allowing access, and the base station may adjust the value of the access control restriction factor allowing access at any time according to the use condition of the resource or the network congestion condition. For example, if the base station allows the access of the terminal with the access control restriction factor larger than 2, the access request is restricted if the access control restriction factor of the terminal is 1.
In this way, the terminal may always restrict access requests for uplink transmissions until receiving a paging message.
In one embodiment, the restriction timer and the access control restriction factor may be set simultaneously, and the timing duration of the restriction timer is infinite while the value of the access control restriction factor is 0. Access is restricted based on any of the access control parameters.
In another embodiment, the restriction timer and the access control restriction factor may be set at the same time, and the timing duration of the restriction timer is small while the value of the access control restriction factor is 0, then even if the timing of the restriction timer ends, the access request of the terminal is restricted due to the value of the access control restriction factor being 0.
In another embodiment, the restriction timer and the access control restriction factor may be set simultaneously, and the timing duration of the restriction timer is infinite while the value of the access control restriction factor is not 0, then even if the access control restriction factor satisfies the adjustment of the access, the restriction timer is restricted because the timing of the restriction timer is over.
In yet another embodiment, the set restriction timer and the access control restriction factor may be set simultaneously, and the timing duration of the restriction timer is not infinite while the value of the access control restriction factor is not 0. At this time, if the timing of the restriction timer is ended, whether to allow access may be determined according to the value of the access control restriction factor. The situation can be suitable for the situation that network resources are sufficient, or the terminal needs debugging, updating and the like.
Therefore, the access control of different conditions can be realized for the terminal by utilizing the setting of the access control parameters.
In some embodiments, the timing duration takes the following values: greater than or equal to a predetermined cycle duration of DRX or eDRX.
In the embodiment of the present disclosure, since the uplink transmission limited terminal may always maintain the state of limiting uplink transmission before receiving the paging message. Therefore, the timing duration of the limit timer can be set according to the paging cycle.
Note that the NB-IoT (narrowband internet of things) supports three Reception modes, including PSM (Power Saving Mode), DRX (Discontinuous Reception) and eDRX (Extended DRX). The DRX and eDRX have a larger paging cycle, for example, in the DRX mode, the terminal detects whether downlink traffic arrives in sequence every DRX cycle. In eDRX mode, for each period, there is a Paging Time Window (PTW), and the terminal monitors a Paging channel according to the DRX period (the DRX period is relatively short, and the terminal may be considered not to be dormant) in the PTW, so as to receive downlink data, and the terminal is in a dormant state in the rest of Time. Therefore, the maximum paging cycle for eDRX may extend to 2621.44 s.
Therefore, the timing duration for the uplink transmission restricted terminal to restrict uplink access may be set according to the predetermined cycle duration of the aforementioned DRX or eDRX. For example, for a terminal in eDRX mode, the timing duration of the restriction timer may be set to be greater than or equal to the duration of the maximum paging cycle for eDRX. Of course, it can also be set to infinity directly, so that the terminal stops the timing of the restriction timer after receiving the paging message.
In some embodiments, the value of the access control restriction factor for the uplink transmission restricted terminal is the second value.
Here, the access control restriction parameter is used to restrict the uplink transmission request of the uplink transmission restricted terminal, and the value of the access control restriction factor may be set as a second value for restricting uplink transmission. For example, the value of the access control restriction factor of the uplink transmission restricted terminal is set to be a value smaller than a predetermined threshold, at this time, only uplink transmission of a terminal whose value of the access control restriction factor is greater than or equal to the predetermined threshold is allowed, and for an uplink transmission restricted terminal whose value of the access control restriction factor is smaller than the predetermined threshold, access is restricted.
In some embodiments, the access control restriction parameter comprises:
restricting the restricted call category of access.
Since many terminals have diversified functions, different kinds of data transmission and calls can be realized. Therefore, in the embodiment of the present disclosure, the uplink access of the specified category may also be limited by an access control method based on the call category.
The call types include different types of access requests corresponding to the access types of 'source end signaling', 'emergency call', 'source end multimedia voice call', 'source end multimedia video call', 'short message transmission based on internet protocol', 'source end short message', 'terminal call', 'source end call' and 'mobile source end circuit domain fallback', etc. Or a call class determined based on the terminal type and the access identity of the terminal, etc. For different call types, the judgment of whether to limit access can be respectively carried out by utilizing the access control limiting parameters.
Here, the access control restriction parameter may include a restriction call category restricting access, such that the terminal may restrict a part of the categories of call requests in a targeted manner according to the restriction call category and may allow other categories of call requests, thereby facilitating application in various scenarios and terminal types.
In another embodiment, the access control restriction parameter may not include the restricted call category. The terminal determines whether the terminal belongs to a predetermined restricted call category based on an access category or a user identification of its own access request. And if the call belongs to the call restriction category, performing access control by using the corresponding access control restriction parameter.
In some embodiments, said controlling the terminal not to send an access request until receiving a paging message according to the access control restriction parameter comprises:
and in response to the fact that the call type triggering access is the call type limitation, controlling the terminal not to send an access request before receiving the paging message according to the access control limitation parameter.
Here, based on the above access control restriction parameter, a restricted call category for restricting access can be determined. And when the uplink data of the call restriction type exists, limiting to send the access request of the call restriction type before receiving the paging message based on the configuration of the access restriction. Of course, for other call categories, if there is uplink data triggering access, it is necessary to allow sending the access request or restrict sending the access request according to the corresponding access control restriction parameter.
In some embodiments, the restricted call category is indicated by at least one of:
an access category;
accessing the identifier;
and identifying the terminal type.
For the restricted call class mentioned above, it may be indicated by means of an access class or access identity defined in the access control mechanism. For example, an access request indicating an access category of "originating call" is a restricted call category. As another example, the access request sent by the user with access identifier 0 is a restricted call category.
In addition, the terminal type identifier may also be used for identification, for example, when the terminal type is configured as an internet of things device, the access request of the terminal corresponding to the internet of things device identifier is input into the restricted call category.
In some embodiments, as shown in fig. 3, the method further comprises:
step S201, responding to the fact that the call type of the triggered access is an emergency call type, and sending an access request; wherein the emergency call category is different from the restricted call category.
Instead of limiting the call category, the terminal may have some requirements for alerts, emergency calls, etc., e.g., an alert call initiated when the terminal fails, or an emergency call manually initiated by the user in case of an emergency, etc. For the emergency call category, the communication connection needs to be established in time, and therefore, the emergency call category may not be limited to the timing duration of the restriction timer of the access control mechanism or the setting of the access control restriction factor. That is, if the call category triggered by the interruption is the emergency call category, access is allowed and the interruption may send an access request.
Therefore, the access control mechanism does not excessively limit the access of the emergency call category, thereby improving the safety performance of the terminal.
In some embodiments, the method further comprises:
receiving the access control restriction parameter for the uplink transmission restricted terminal;
or,
acquiring the default access control limiting parameter of the uplink transmission limited terminal;
or,
and acquiring the access control limiting parameter of the uplink transmission limited terminal according to a communication protocol.
In the embodiment of the present disclosure, the access control restriction parameter of the uplink transmission restricted terminal may be acquired from the base station through the downlink, may also be pre-stored locally in the terminal, and may also be determined according to a communication protocol. And if the terminal acquires the access control limiting parameter, access control can be performed on the uplink data according to the access control limiting parameter, and whether the uplink access request is allowed to be initiated is determined.
In some embodiments, the obtaining the default access control restriction parameter of the uplink transmission restricted terminal includes:
and in response to failure of receiving the access control limiting parameter of the uplink transmission limited terminal, acquiring the default access control limiting parameter of the uplink transmission limited terminal.
In the embodiment of the present disclosure, the access control restriction parameter is placed in other system messages, and at this time, other system messages can be actively acquired through the terminal itself. And after the acquisition of other system messages fails, the access control limiting parameter is received unsuccessfully, and the access control judgment can be realized by using the default access control limiting parameter of the terminal.
In practical application, as shown in fig. 4, the method comprises the following steps:
step S301, requesting a base station to send other system messages;
step S302, the access control limiting parameter in the other system information is received unsuccessfully;
step S303, obtaining the default access control limiting parameter.
In this way, when the terminal cannot acquire the valid access control restriction parameter through the on demand (on demand) message, the terminal performs processing according to the default configuration.
In some embodiments, the default access control restriction parameter is recorded at the uplink transmission restricted terminal or specified by a communication protocol.
In the disclosed embodiments, the default access control restriction parameter may be specified based on the communication protocol without receiving an indication from the base station. Or written locally in the terminal in the form of firmware, and the terminal can directly make access control judgment according to default access control limiting parameters when needed.
As shown in fig. 5, an embodiment of the present disclosure provides an access control method, where the method is applied in a base station, and includes:
step S401, determining access control limiting parameters according to the type of the terminal;
step S402, sending the access control limiting parameter to the terminal, wherein the access control limiting parameter is used for controlling the terminal not to send an access request before receiving the paging message.
In the embodiment of the disclosure, the base station may issue different access control restriction parameters for different types of terminals. For the terminal with limited uplink transmission in the above embodiment, the corresponding access control limitation parameter for limiting access is issued, so as to control the terminal with limited uplink transmission without independent uplink mode, and limit the terminal with limited uplink transmission to send an access request before receiving the paging message.
In some embodiments, the types of terminals include: a terminal that does not perform uplink transmission until receiving downlink transmission.
The uplink transmission limited terminal has been described in detail in the above embodiments, and is not described herein again.
In some embodiments, the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
Here, the base station may issue an access control restriction parameter including a timing duration of the aforementioned restriction timer and/or an access control restriction factor to the terminal. The terminal limits the initiation of the access request based on the timing duration of the timer or determines whether to limit the initiation of the access request based on whether the control factor is a value allowing access.
If the type of the terminal is the uplink transmission limited terminal, the timing duration may be configured to be infinite, or greater than the maximum paging cycle, and the like. The access control restriction factor may be configured to restrict a second value of the terminal access.
In some embodiments, the timing duration takes the following values: greater than or equal to a predetermined cycle duration of DRX or eDRX.
In the above embodiments, the DRX and eDRX have been described in detail, and are not described herein again.
The timing duration is greater than or equal to the predetermined cycle duration of DRX or eDRX, the paging cycle may be covered, thereby enabling the terminal to restrict access before the paging message arrives.
In some embodiments, the value of the access control restriction factor for the uplink transmission restricted terminal is the second value.
Here, for the uplink transmission limited terminal, the base station may configure the value of the access control limiting factor thereof as the second value separately, so as to limit the access request of the uplink transmission limited terminal.
In some embodiments, the issuing, according to the terminal type, an access control restriction parameter includes:
and issuing access control limiting parameters to the terminal by using system messages or RRC messages.
In the embodiment of the disclosure, the base station may issue the access control restriction parameter to the terminal by using a system message or an RRC message. The system message may include system message one (SIB1), system message two (SIB2), etc., and the RRC message may be a dedicated message notifying the terminal of suspension, for example: an "RRC connection release" (RRC connection release) message.
The disclosed embodiments also provide the following examples:
and secondly, expanding the access control duration in the access control mechanism.
In one embodiment, the extendable access control duration is infinite, e.g., the timing duration of the restriction timer is set to infinity, and the timing is stopped only when the paging message is received, but not until the paging message is received, so that access is always restricted.
In another embodiment, the access control duration may be set to the maximum duration specified by the protocol of the eDRX cycle, for example, if the protocol specifies an eDRX cycle of 2.56 × 1024 seconds, the timing duration of the restriction timer is set to 2.56 × 1024 seconds.
In another embodiment, the access control duration may be set to be greater than the maximum duration specified by the protocol of the eDRX cycle described above.
Secondly, in the access control mechanism, a default configuration is added for the specified call type, and the parameters of the default configuration are access limiting parameters. That is, the UE may not send an access request for a specified call category by default based on a default configuration.
The configuration mode can comprise the following modes:
(1) configuring a default configuration for the specified call category includes limiting a timing duration of a timer to infinity;
(2) the default configuration for configuring the designated call class includes setting a Barring Factor (Barring Factor) to 0, where the Barring Factor is an identification parameter indicating the UE access priority, the UEs whose Barring factors are smaller than the designated threshold are Barring accesses, and the UEs whose Barring factors are greater than or equal to the designated threshold are allowing accesses. Therefore, when the control factor is set to be 0, the control factor is always smaller than the threshold set by the access control judgment, so that the control factor is always in the state of limiting access;
(3) configuring a default configuration for a given call class also includes limiting the timing duration of the timer to infinity and the access control restriction factor to 0.
Thirdly, based on the second point, the specified call category is determined according to the following modes.
(1) Based on the specified Access Categories (Access Categories), for example, the Access request corresponding to the Access category of the "originating calls" is specified as the specified call category of the default configuration;
(2) based on the specified Access Identities (Access Identities), for example, the Access request of the UE with the specified Access identity of 0 belongs to the specified call category of the default configuration;
(3) based on a specified terminal type, for example, if the identifier of the specified terminal type is a certain type of internet of things device, the access request of the type of internet of things device belongs to the specified call category of the default configuration.
And fourthly, based on the second point, the default configuration can be sent to the UE by using a system message or the UE can be informed by using a dedicated message.
The system message includes, but is not limited to, a system message one (SIB1), and the dedicated message may be a RRC (Radio Resource Control) message, for example, a message notifying the UE of suspension: an "RRC connection release" message.
Fifthly, based on the second point, the default configuration may be further defined based on a protocol or written in the UE in the form of firmware;
sixth, for the specific call category, the UE may also actively acquire an effective decision parameter for access control through an "on demand" system message, and when the acquisition of the system message fails, automatically perform processing according to the default configuration.
By the method, the UE of the specified type or the uplink service initiation of the call type specified by the UE is limited, namely when the uplink service data of the UE arrives, the access request is processed through the default limited access configuration after the access request starts, and the timing duration of the access limit timer is infinite, namely, the access limit timer is in a suspension (Pending) state until the paging message is received.
As shown in fig. 6, an access control apparatus 600 according to an embodiment of the present disclosure is applied to a terminal, and includes:
a first determining module 601 configured to determine an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal;
a control module 602, configured to control the terminal not to send an access request until a paging message is not received according to the access control restriction parameter.
In some embodiments, the types of terminals include: a terminal that does not perform uplink transmission until receiving downlink transmission.
In some embodiments, the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
In some embodiments, the control module comprises:
a starting module configured to start a limit timer according to the access control limit parameter; within the timing duration of the limiting timer, not sending the access request;
and/or, not sending the access request according to the access control limiting factor.
In some embodiments, the timing duration takes the following values: greater than or equal to a predetermined cycle duration of discontinuous reception mode DRX or extended discontinuous reception mode eDRX.
In some embodiments, the value of the access control restriction factor for the terminal is the second value.
In some embodiments, the access control restriction parameter comprises:
restricting the restricted call category of access.
In some embodiments, the control module comprises:
and the control submodule is configured to respond to the fact that the call type triggering access is the call limiting type, and control the terminal not to send an access request before receiving the paging message according to the access control limiting parameter.
In some embodiments, the restricted call category is indicated by at least one of:
an access category;
accessing the identifier;
and identifying the terminal type.
In some embodiments, the apparatus further comprises:
the sending module is configured to respond to the fact that the call type triggering access is an emergency call type and send an access request; wherein the emergency call category is different from the restricted call category.
In some embodiments, the apparatus further comprises:
a receiving module configured to receive the access control restriction parameter for the terminal;
or,
a first obtaining module configured to obtain the default access control restriction parameter of the terminal;
or,
a second obtaining module configured to obtain the access control restriction parameter of the terminal according to a communication protocol.
In some embodiments, the first obtaining module includes:
an obtaining sub-module configured to obtain the access control restriction parameter default for the terminal in response to failure of receiving the access control restriction parameter for the terminal.
In some embodiments, the default access control restriction parameter is recorded at the terminal or specified by a communication protocol.
As shown in fig. 7, an access control apparatus 700 is further provided in an embodiment of the present disclosure, which is applied to a base station, and includes:
a second determining module 701 configured to determine an access control restriction parameter according to the type of the terminal;
a sending module 702, configured to send the access control restriction parameter to the terminal, where the access control restriction parameter is used to control the terminal not to send an access request before receiving a paging message.
In some embodiments, the types of terminals include: a terminal that does not perform uplink transmission until receiving downlink transmission.
In some embodiments, the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
In some embodiments, the timing duration takes the following values: greater than or equal to a predetermined cycle duration of DRX or eDRX.
In some embodiments, the value of the access control restriction factor for the terminal is the second value.
In some embodiments, the issuing module includes:
and the issuing sub-module is configured to issue the access control limiting parameter to the terminal by using a system message or a Radio Resource Control (RRC) message.
The embodiment of the present disclosure provides a communication device, which includes a processor, a transceiver, a memory, and an executable program stored on the memory and capable of being executed by the processor, wherein the access control method provided by any of the foregoing technical solutions is executed when the processor executes the executable program.
The communication device may be the aforementioned base station or UE.
The processor may include, among other things, various types of storage media, which are non-transitory computer storage media capable of continuing to remember the information stored thereon after a power loss to the communication device. Here, the communication apparatus includes a base station or a user equipment.
The processor may be connected to the memory via a bus or the like for reading the executable program stored on the memory.
The disclosed embodiments provide a non-transitory computer-readable storage medium having an executable program stored thereon; the executable program can implement the method shown in any technical scheme involved in the embodiments of the present disclosure after being executed by the processor.
Fig. 8 is a block diagram of a communication device according to an embodiment of the present disclosure. The communication device may be a UE. For example, the communication device 800 may be a mobile phone, a computer, a digital broadcast user device, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 8, a communication device 800 may include at least one of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the communication device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include at least one processor 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include at least one module that facilitates interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operation at the communication device 800. Examples of such data include instructions for any application or method operating on the communication device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power component 806 provides power to the various components of the communication device 800. The power components 806 may include a power management system, at least one power source, and other components associated with generating, managing, and distributing power for the communication device 800.
The multimedia component 808 includes a screen that provides an output interface between the communication device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes at least one touch sensor to sense touch, slide, and gesture on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect a wake-up time and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the communication device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the communication device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes at least one sensor for providing various aspects of state assessment for the communication device 800. For example, the sensor assembly 814 can detect the open/closed state of the device 800, the relative positioning of components, such as a display and keypad of the communication device 800, the sensor assembly 814 can also detect a change in the position of the communication device 800 or a component of the communication device 800, the presence or absence of user contact with the communication device 800, orientation or acceleration/deceleration of the communication device 800, and a change in the temperature of the communication device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the communication device 800 and other devices. The communication device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the communication device 800 may be implemented by at least one Application Specific Integrated Circuit (ASIC), Digital Signal Processor (DSP), Digital Signal Processing Device (DSPD), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), controller, microcontroller, microprocessor or other electronic component for performing the above-described method.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the communication device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
As shown in fig. 9, an embodiment of the present disclosure shows a structure of another communication device. The communication device may be a base station according to embodiments of the present disclosure. For example, the communication device 900 may be provided as a network device. Referring to fig. 12, communications device 900 includes a processing component 922, which further includes at least one processor, and memory resources, represented by memory 932, for storing instructions, such as applications, that are executable by processing component 922. The application programs stored in memory 932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 922 is configured to execute instructions to perform any of the methods described above for the above-described methods applied to the communication device.
The communication device 900 may also include a power component 926 configured to perform power management of the communication device 900, a wired or wireless network interface 950 configured to connect the communication device 900 to a network, and an input/output (I/O) interface 958. The communication device 900 may operate based on an operating system stored in memory 932, such as Windows Server (TM), Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (40)

1. An access control method, applied to a terminal, includes:
determining an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal;
and controlling the terminal not to send an access request before receiving a paging message according to the access control limiting parameter.
2. The method of claim 1, wherein the terminal is a terminal that does not perform uplink transmission until receiving downlink transmission.
3. The method of claim 1, wherein the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
4. The method of claim 3, wherein the controlling the terminal not to send an access request comprises:
starting a limit timer according to the access control limit parameter; within the timing duration of the limiting timer, not sending the access request;
and/or, not sending the access request according to the access control limiting factor.
5. The method of claim 3, wherein the timing duration takes on the following values: greater than or equal to a predetermined cycle duration of discontinuous reception mode DRX or extended discontinuous reception mode eDRX.
6. The method of claim 3, wherein the value of the access control restriction factor for the terminal is the second value.
7. The method of any of claims 1 to 6, wherein the access control restriction parameter comprises:
restricting the restricted call category of access.
8. The method of claim 7, wherein the controlling the terminal not to send an access request until receiving a paging message according to the access control restriction parameter comprises:
and in response to the fact that the call type triggering access is the call type limitation, controlling the terminal not to send an access request before receiving the paging message according to the access control limitation parameter.
9. The method of claim 8, wherein the restricted call category is indicated by at least one of:
an access category;
accessing the identifier;
and identifying the terminal type.
10. The method of claim 8, wherein the method further comprises:
responding to the call type triggering access as an emergency call type, and sending an access request; wherein the emergency call category is different from the restricted call category.
11. The method of any of claims 1 to 10, wherein the method further comprises:
receiving the access control restriction parameter for the terminal;
or,
acquiring the default access control limiting parameter of the terminal;
or,
and acquiring the access control limiting parameter of the terminal according to a communication protocol.
12. The method of claim 11, wherein the obtaining the access control restriction parameter default for the terminal comprises:
and acquiring the default access control limiting parameters of the terminal in response to failure of receiving the access control limiting parameters of the terminal.
13. The method of claim 12, wherein the default access control restriction parameter is recorded at the terminal or specified by a communication protocol.
14. An access control method, applied to a base station, includes:
determining access control limiting parameters according to the type of the terminal;
and sending the access control limiting parameter to the terminal, wherein the access control limiting parameter is used for controlling the terminal not to send an access request before receiving the paging message.
15. The method of claim 14, wherein the type of the terminal comprises: a terminal that does not perform uplink transmission until receiving downlink transmission.
16. The method of claim 14, wherein the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
17. The method of claim 16, wherein the timing duration takes on the following values: greater than or equal to a predetermined cycle duration of DRX or eDRX.
18. The method of claim 16, wherein the value of the access control restriction factor for the terminal is the second value.
19. The method according to any one of claims 14 to 18, wherein the issuing access control restriction parameters according to the terminal type includes:
and issuing access control limiting parameters to the terminal by using system messages or Radio Resource Control (RRC) messages.
20. An access control device, applied to a terminal, includes:
a determining module configured to determine an access control restriction parameter, the access control restriction parameter being associated with a type of the terminal;
and the control module is configured to control the terminal not to send the access request before not receiving the paging message according to the access control limiting parameter.
21. The apparatus of claim 20, wherein the type of the terminal comprises: a terminal that does not perform uplink transmission until receiving downlink transmission.
22. The apparatus of claim 20, wherein the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
23. The apparatus of claim 22, wherein the control module comprises:
a starting module configured to start a limit timer according to the access control limit parameter; within the timing duration of the limiting timer, not sending the access request;
and/or, not sending the access request according to the access control limiting factor.
24. The apparatus of claim 22, wherein the timing duration takes on the following values: greater than or equal to a predetermined cycle duration of discontinuous reception mode DRX or extended discontinuous reception mode eDRX.
25. The apparatus of claim 22, wherein the value of the access control restriction factor for the terminal is the second value.
26. The apparatus of any of claims 20 to 25, wherein the access control restriction parameter comprises:
restricting the restricted call category of access.
27. The apparatus of claim 26, wherein the control module comprises:
and the control submodule is configured to respond to the fact that the call type triggering access is the call limiting type, and control the terminal not to send an access request before receiving the paging message according to the access control limiting parameter.
28. The apparatus of claim 27, wherein the restricted call category is indicated by at least one of:
an access category;
accessing the identifier;
and identifying the terminal type.
29. The apparatus of claim 27, wherein the apparatus further comprises:
the sending module is configured to respond to the fact that the call type triggering access is an emergency call type and send an access request; wherein the emergency call category is different from the restricted call category.
30. The apparatus of any one of claims 20 to 29, wherein the apparatus further comprises:
a receiving module configured to receive the access control restriction parameter for the terminal;
or,
a first obtaining module configured to obtain the default access control restriction parameter of the terminal;
or,
a second obtaining module configured to obtain the access control restriction parameter of the terminal according to a communication protocol.
31. The apparatus of claim 30, wherein the first obtaining means comprises:
an obtaining sub-module configured to obtain the access control restriction parameter default for the terminal in response to failure of receiving the access control restriction parameter for the terminal.
32. The apparatus of claim 31, wherein the default access control restriction parameter is recorded at the terminal or specified by a communication protocol.
33. An access control device, applied to a base station, comprises:
determining access control limiting parameters according to the type of the terminal;
and sending the access control limitation parameter to the terminal, wherein the access control limitation parameter is used for controlling the terminal not to send access request limitation before receiving the paging message.
34. The apparatus of claim 33, wherein the type of the terminal comprises: a terminal that does not perform uplink transmission until receiving downlink transmission.
35. The apparatus of claim 33, wherein the access control restriction parameter comprises at least one of:
the method comprises the steps of limiting the timing duration of a timer, wherein the limiting timer is used for determining the time length of limiting access of a terminal;
an access control restriction factor, wherein the access control restriction factor comprises: a first value allowing the terminal access or a second value restricting the terminal access.
36. The apparatus of claim 35, wherein the timing duration takes on the following values: greater than or equal to a predetermined cycle duration of DRX or eDRX.
37. The apparatus of claim 35, wherein the value of the access control restriction factor for the terminal is the second value.
38. The apparatus according to any one of claims 33 to 37, wherein the issuing module comprises:
and the issuing sub-module is configured to issue the access control limiting parameter to the terminal by using a system message or a Radio Resource Control (RRC) message.
39. A communication device, wherein the communication device comprises at least: a processor and a memory for storing executable instructions operable on the processor, wherein:
the processor is configured to execute the executable instructions, and the executable instructions perform the steps of the access control method as claimed in any one of claims 1 to 13 or 14 to 19.
40. A non-transitory computer readable storage medium having stored therein computer executable instructions which, when executed by a processor, implement the steps in the access control method as provided in any of claims 1 to 13 or 14 to 19.
CN202080001641.2A 2020-07-23 2020-07-23 Access control method and device and storage medium Active CN112020879B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/103894 WO2022016474A1 (en) 2020-07-23 2020-07-23 Access control method and apparatus, and storage medium

Publications (2)

Publication Number Publication Date
CN112020879A true CN112020879A (en) 2020-12-01
CN112020879B CN112020879B (en) 2023-12-05

Family

ID=73527503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080001641.2A Active CN112020879B (en) 2020-07-23 2020-07-23 Access control method and device and storage medium

Country Status (2)

Country Link
CN (1) CN112020879B (en)
WO (1) WO2022016474A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022001632A1 (en) * 2020-07-03 2022-01-06 中兴通讯股份有限公司 Access control method, first network node, second network node, and storage medium
CN114128366A (en) * 2021-10-19 2022-03-01 北京小米移动软件有限公司 Paging parameter determination method, device, communication equipment and storage medium
WO2022120544A1 (en) * 2020-12-07 2022-06-16 北京小米移动软件有限公司 Communication method and device, and wireless access network, terminal and storage medium
WO2022120751A1 (en) * 2020-12-10 2022-06-16 北京小米移动软件有限公司 Communication method and apparatus, access device, terminal, and storage medium
WO2023201724A1 (en) * 2022-04-22 2023-10-26 Oppo广东移动通信有限公司 Wireless communication method and apparatus, and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102204376A (en) * 2008-11-03 2011-09-28 高通股份有限公司 System and method to perform access control and paging using femto cells
US20110310854A1 (en) * 2010-06-17 2011-12-22 Jialin Zou Method of determining access times for wireless communication devices
CN102652446A (en) * 2009-12-11 2012-08-29 瑞典爱立信有限公司 Method and arrangement in telecommunication system
CN102932873A (en) * 2006-08-04 2013-02-13 捷讯研究有限公司 System and method for responding to a paging during a communication restriction
CN104126318A (en) * 2012-05-15 2014-10-29 华为技术有限公司 Access control method, terminal and access network device
US20170331577A1 (en) * 2016-05-13 2017-11-16 Telefonaktiebolaget Lm Ericsson (Publ) Network Architecture, Methods, and Devices for a Wireless Communications Network
CN109196917A (en) * 2018-08-29 2019-01-11 北京小米移动软件有限公司 Access control method for limiting and device
CN109451838A (en) * 2018-04-27 2019-03-08 北京小米移动软件有限公司 Obtain the method, apparatus and storage medium of access control parameter
CN110113731A (en) * 2013-08-09 2019-08-09 瑞典爱立信有限公司 System information for machine-type communication is broadcasted
CN111328462A (en) * 2020-02-10 2020-06-23 北京小米移动软件有限公司 Paging processing method, device, communication equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469547B (en) * 2010-11-04 2014-07-02 中兴通讯股份有限公司 Method, terminal and system for controlling terminal access
CN103096495A (en) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 Access control method and system
CN110351872B (en) * 2018-04-02 2024-04-30 夏普株式会社 Access control method and user equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932873A (en) * 2006-08-04 2013-02-13 捷讯研究有限公司 System and method for responding to a paging during a communication restriction
CN102204376A (en) * 2008-11-03 2011-09-28 高通股份有限公司 System and method to perform access control and paging using femto cells
CN102652446A (en) * 2009-12-11 2012-08-29 瑞典爱立信有限公司 Method and arrangement in telecommunication system
US20110310854A1 (en) * 2010-06-17 2011-12-22 Jialin Zou Method of determining access times for wireless communication devices
CN104126318A (en) * 2012-05-15 2014-10-29 华为技术有限公司 Access control method, terminal and access network device
CN110113731A (en) * 2013-08-09 2019-08-09 瑞典爱立信有限公司 System information for machine-type communication is broadcasted
US20170331577A1 (en) * 2016-05-13 2017-11-16 Telefonaktiebolaget Lm Ericsson (Publ) Network Architecture, Methods, and Devices for a Wireless Communications Network
CN109451838A (en) * 2018-04-27 2019-03-08 北京小米移动软件有限公司 Obtain the method, apparatus and storage medium of access control parameter
CN109196917A (en) * 2018-08-29 2019-01-11 北京小米移动软件有限公司 Access control method for limiting and device
CN111328462A (en) * 2020-02-10 2020-06-23 北京小米移动软件有限公司 Paging processing method, device, communication equipment and storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
""GP-110731"", 3GPP TSG_GERAN\\TSG_GERAN *
LG ELECTRONICS INC.: "Access category based access barring for RRC_DLE and RRC INACTIVE", 《3GPP_ R2-1801375》 *
LG ELECTRONICS INC.: "Access category based access barring for RRC_DLE and RRC INACTIVE", 《3GPP_ R2-1801375》, 12 January 2018 (2018-01-12), pages 1 - 3 *
LG ELECTRONICS INC.: "Access category based access barring for RRC_DLE and RRC INACTIVE", 3GPP_ R2-1801375, pages 2 *
陈刚;黄欣;王家诚;王慧倩;庞宇;: "NB-IoT上行链路关键技术分析与性能仿真", 电子技术与软件工程, no. 08 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022001632A1 (en) * 2020-07-03 2022-01-06 中兴通讯股份有限公司 Access control method, first network node, second network node, and storage medium
WO2022120544A1 (en) * 2020-12-07 2022-06-16 北京小米移动软件有限公司 Communication method and device, and wireless access network, terminal and storage medium
WO2022120751A1 (en) * 2020-12-10 2022-06-16 北京小米移动软件有限公司 Communication method and apparatus, access device, terminal, and storage medium
CN114916251A (en) * 2020-12-10 2022-08-16 北京小米移动软件有限公司 Communication method and device, access equipment, terminal and storage medium
CN114916251B (en) * 2020-12-10 2023-10-31 北京小米移动软件有限公司 Communication method and device, access equipment, terminal and storage medium
CN114128366A (en) * 2021-10-19 2022-03-01 北京小米移动软件有限公司 Paging parameter determination method, device, communication equipment and storage medium
CN114128366B (en) * 2021-10-19 2024-04-19 北京小米移动软件有限公司 Paging parameter determining method, device, communication equipment and storage medium
WO2023201724A1 (en) * 2022-04-22 2023-10-26 Oppo广东移动通信有限公司 Wireless communication method and apparatus, and device

Also Published As

Publication number Publication date
WO2022016474A1 (en) 2022-01-27
CN112020879B (en) 2023-12-05

Similar Documents

Publication Publication Date Title
CN111567126B (en) Configuration information transmission method and device, communication equipment and storage medium
CN113056951B (en) Information transmission method, apparatus, communication device and storage medium
CN112020879B (en) Access control method and device and storage medium
CN111512657B (en) Information transmission method and device, communication equipment and storage medium
EP4258744A1 (en) Communication method and device, and wireless access network, terminal and storage medium
CN110771222B (en) Paging configuration method, device, communication equipment and storage medium
CN110495196B (en) Capability parameter processing method and device, communication equipment and storage medium
CN111727614B (en) Terminal state switching processing and control method and device, communication equipment and storage medium
CN112385270B (en) Access control information processing method and device, communication equipment and storage medium
CN111819905A (en) Method and device for determining random access configuration, communication equipment and storage medium
KR20240019367A (en) Information transmission methods, devices, communication devices and storage media
CN111149377B (en) Network access method and device, communication equipment and storage medium
US12035354B2 (en) Method for processing data, communication device and storage medium
WO2022047799A1 (en) Access control method and apparatus, and communication device and storage medium
CN112106425A (en) Resource processing method and device, communication equipment and storage medium
WO2023050362A1 (en) Downlink transmission configuration, receiving method and apparatus, communication device and storage medium
CN114208292B (en) Access control method and device and storage medium
CN114503648A (en) Method, device, communication equipment and storage medium for early identification
CN113228764A (en) Paging processing method and device, communication equipment and storage medium
CN114365545B (en) Access control method and device, communication equipment and storage medium
CN113383589B (en) Data transmission method, device and computer storage medium
CN115836547A (en) Access control processing method, device, communication equipment and storage medium
KR20240117125A (en) Information processing methods and devices, communication devices and storage media
CN115804176A (en) Information processing apparatus, communication device, and storage medium
CN116250307A (en) Paging method, paging device, communication equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant