WO2016161772A1 - 一种频段锁定的方法、装置及*** - Google Patents

一种频段锁定的方法、装置及*** Download PDF

Info

Publication number
WO2016161772A1
WO2016161772A1 PCT/CN2015/089805 CN2015089805W WO2016161772A1 WO 2016161772 A1 WO2016161772 A1 WO 2016161772A1 CN 2015089805 W CN2015089805 W CN 2015089805W WO 2016161772 A1 WO2016161772 A1 WO 2016161772A1
Authority
WO
WIPO (PCT)
Prior art keywords
lock
network
band
mobile terminal
frequency band
Prior art date
Application number
PCT/CN2015/089805
Other languages
English (en)
French (fr)
Inventor
相海涛
钟建东
张娜
吴萍
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016161772A1 publication Critical patent/WO2016161772A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/02Resource partitioning among network components, e.g. reuse partitioning
    • H04W16/12Fixed resource partitioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a method, device and system for frequency band locking.
  • LTE Long Term Evolution
  • the purpose of the embodiments of the present invention is to provide a method, a device, and a system for locking a frequency band, which can save network resources, load balance the network system, and improve user experience.
  • an embodiment of the present invention provides a method for band locking, which is applied to a network side, and the method includes:
  • the band lock command is sent to the mobile terminal, so that the mobile terminal locks the frequency band that the registered network desires to lock according to the band lock command.
  • the step of generating a band locking instruction by using an equalization policy according to the IMEI number includes:
  • a static equalization policy pre-configured for the mobile terminal is queried, and a frequency band lock instruction is generated according to the static equalization policy.
  • the step of querying the static equalization policy pre-configured for the mobile terminal according to the device information, and generating the frequency band lock command according to the static equalization policy includes:
  • the mobile terminal uses the preset desired locked band
  • the band lock command is directly generated.
  • the band lock command includes a desired lock band, a network identifier of the desired lock band, a band lock flag, and a frequency lock persistence flag.
  • the frequency band lock instruction is generated according to the dynamic equalization policy.
  • the step of generating a band locking instruction according to the dynamic balancing policy includes:
  • a band lock command is generated according to the network load parameter.
  • the current network load parameter includes the number of mobile terminals currently accessing the network and the number of available resource blocks of the current network.
  • the band lock command includes a desired lock band, a network identifier of a desired lock band, a band lock flag, a frequency lock persistence flag, a traffic monitoring period, and a traffic monitoring threshold.
  • the step of transmitting the band lock command to the mobile terminal includes:
  • the encrypted band lock command is sent to the mobile terminal by means of a short message.
  • An embodiment of the present invention further provides a frequency band locking device, which is applied to a network side, and the device includes:
  • An acquiring module configured to obtain an international identification code IMEI number of the mobile terminal that is reported by the mobile terminal when registering to the network side;
  • Generating a module configured to generate a band locking instruction by using an equalization policy according to the IMEI number
  • the first sending module is configured to send the band lock command to the mobile terminal, so that the mobile terminal locks the frequency band that the registered network desires to lock according to the band lock command.
  • the generating module includes:
  • Query unit configured to query device information in the home location register and the visit location register according to the IMEI number
  • the first processing unit is configured to query a static equalization policy pre-configured for the mobile terminal according to the device information, and generate a frequency band lock instruction according to the static equalization policy.
  • the second processing unit is configured to generate a frequency band lock instruction according to the dynamic equalization policy when the static equalization policy configured for the mobile terminal is not queried according to the device information.
  • the second processing unit includes:
  • a third subunit configured to obtain a current network load parameter
  • the fourth subunit is configured to generate a band lock command according to the network load parameter.
  • An embodiment of the present invention further provides a method for frequency band locking, which is applied to a mobile terminal, and the method includes:
  • the frequency band desired to be locked by the target registration network is locked according to the band lock command.
  • the step of sending a registration request to the target registration network on the network side includes:
  • a registration request is sent to the target registration network on the network side according to the identity of the target registration network.
  • the method further includes:
  • the frequency band that the network of the desired locked band is desired to lock is locked.
  • the step of receiving the band lock command sent by the network side includes:
  • the band lock command sent by the network side is received through the short message.
  • the step of locking the frequency band desired to be locked by the target registration network according to the band lock command includes:
  • the frequency band desired to be locked by the target registration network is locked according to the band lock command after decryption processing.
  • the band lock command includes a desired lock band, a network identifier of the desired lock band, a band lock flag, a frequency lock persistence flag, a traffic monitoring period, and a traffic monitoring threshold.
  • the step of locking the frequency band desired to be locked by the target registration network according to the band lock command includes:
  • the frequency band that the target registration network desires to lock is locked.
  • the step of locking the frequency band desired to be locked by the target registration network according to the band lock command includes:
  • the frequency band that the target registration network desires to lock is locked, and the time of locking the frequency band is checked by the first timer to exceed the first cycle time set by the second flag;
  • the frequency band is restored to the initial value when the mobile terminal is powered on, and the desired locked frequency band in the SIM card, the network identifier of the desired locked frequency band, the frequency band lock flag, the frequency lock persistence flag, and the traffic monitoring Both the cycle and the traffic monitoring threshold are restored to their initial values at power-on.
  • the step of locking the frequency band desired to be locked by the target registration network according to the band lock command includes:
  • the traffic of the mobile terminal is monitored by the second timer in a traffic monitoring period
  • the number of times that the traffic is less than the traffic monitoring threshold during the traffic monitoring period is further counted
  • the frequency band that the target registration network desires to lock is locked, and the desired locked frequency band corresponding to the target registration network, the network identifier of the desired locked frequency band, the frequency band lock flag, and the frequency lock persistence flag are locked.
  • the traffic monitoring period and the traffic monitoring threshold are saved to the SIM card;
  • the second timer is executed to monitor the traffic of the mobile terminal by using the traffic monitoring period.
  • the method further includes:
  • the network identifier of the desired locked frequency band in the SIM card of the mobile terminal is the same as the identifier of the other network
  • the frequency band is restored to the initial value when the mobile terminal is powered on, and the SIM card is The expected lock band, the network identifier of the desired lock band, the band lock flag, the lock frequency persistence flag, the traffic monitoring period, and the traffic monitoring threshold are restored to the initial values at power on.
  • An embodiment of the present invention further provides a frequency band locking apparatus, which is applied to a mobile terminal, and the apparatus includes:
  • the second sending module is configured to send a registration request to the target registration network on the network side, where the registration request carries the international identification code IMEI number of the mobile terminal, so that the network side generates a frequency band lock instruction according to the IMEI number;
  • a receiving module configured to receive a frequency band locking instruction sent by the network side
  • the locking module is configured to lock the frequency band desired to be locked by the target registration network according to the band lock command.
  • Embodiments of the present invention also provide a frequency band locking system including the above-described device for frequency band locking applied to the network side and the above-described device for frequency band locking applied to a mobile terminal.
  • the network side generates a band lock command according to the IMEI number reported by the mobile terminal, and sends the band lock command to the corresponding mobile terminal. Then, the mobile terminal locks the specific frequency band according to the received frequency band locking instruction, thereby effectively improving the access success rate and the throughput rate of the network side mobile terminal, so that the network system load is balanced, thereby improving the user experience.
  • FIG. 1 is a flow chart of steps of a method for applying frequency band locking applied to a network side according to an embodiment of the present invention
  • FIG. 2 is a flowchart of specific steps of step 12 in FIG. 1 according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of an apparatus for frequency band locking applied to a network side according to an embodiment of the present invention
  • FIG. 4 is a flow chart showing the steps of a method for applying frequency band lock to a mobile terminal according to an embodiment of the present invention
  • FIG. 5 is a flowchart of a specific step of step 43 in FIG. 4 according to an embodiment of the present invention.
  • FIG. 6 is a second flowchart of the specific steps of step 43 in Figure 4 in the embodiment of the present invention.
  • FIG. 7 is a third flowchart of the specific steps of step 43 in Figure 4 in the embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of an apparatus for frequency band locking applied to a mobile terminal according to an embodiment of the present invention.
  • the present invention provides a method, a device and a system for locking a frequency band in a prior art, in which the network system has an unbalanced load and a poor user experience, which can save network resources, load balance the network system, and improve user experience.
  • an embodiment of the present invention provides a method for band locking, which is applied to a network side, and the method includes:
  • Step 11 Acquire an international identification code IMEI number of the mobile terminal that is reported by the mobile terminal when registering to the network side.
  • the mobile terminal reports its own IMEI number and frequency band capability to the network side when registering to the network side, so that the network side performs subsequent operations.
  • the IMEI is a unique identifier for distinguishing mobile terminals. It is stored in the mobile terminal and cannot be rewritten and erased. It is usually distributed by the standard organization.
  • Step 12 Generate a band lock instruction by using an equalization policy according to the IMEI number.
  • Step 13 Send a band lock command to the mobile terminal, so that the mobile terminal locks the frequency band that the registered network desires to lock according to the band lock command.
  • the specific step of the step 13 is: performing encryption processing on the generated band lock command; and transmitting the encrypted band lock command to the mobile terminal by using a short message.
  • the network side encrypts the generated band lock instruction code according to the format negotiated with the mobile terminal, and sends the message to the corresponding mobile terminal by using a short message. As a preferred example, it can be sent to the mobile terminal through the CLASS0 short message. It can be understood that the specific manner in which the network side transmits the band lock command is not limited in the embodiment of the present invention.
  • the network side after acquiring the IMEI number and the frequency band capability of the mobile terminal, the network side generates a frequency band lock instruction by using the equalization policy, and sends the encrypted band lock command to the corresponding mobile terminal, so that The mobile terminal locks the frequency band assigned to the network side to load balance the network system, thereby improving the user experience.
  • the band locking instruction is generated by the equalization strategy The body process will be elaborated later.
  • step 12 the specific steps of the foregoing step 12 are:
  • Step 21 Query device information in the home location register and the visit location register according to the IMEI number.
  • the device information includes information such as a manufacturer model of the mobile terminal.
  • Step 22 Query a static equalization policy pre-configured for the mobile terminal according to the device information, and generate a frequency band lock instruction according to the static equalization policy.
  • the specific step of the foregoing step 22 is: setting the static frequency band lock table of the equalization policy to set the mobile terminal to use the preset desired lock frequency band; if the lock frequency band is expected to be valid, directly generating the frequency band Lock the instruction.
  • the network side further queries, according to the queried device information, whether the mobile terminal uses a certain frequency band (ie, a preset desired locked frequency band) in the static frequency band lock table of the equalization policy. If the mobile terminal uses a certain frequency band in the static band lock table, it further detects whether the desired lock band is valid, and if so, directly generates a band lock command, wherein the band lock command includes a desired lock band, It is desirable to lock the network identification of the frequency band, the band lock flag, and the frequency lock persistence flag.
  • a certain frequency band ie, a preset desired locked frequency band
  • the network side generates a band lock command according to the dynamic equalization policy, and the band lock command generated according to the dynamic equalization policy includes a desired lock band and a desired lock band.
  • Network identification, band lock flag, frequency lock persistence flag, traffic monitoring period, and traffic monitoring threshold are included in the dynamic equalization policy.
  • the step of generating a frequency band lock instruction according to the dynamic equalization policy is: acquiring a current network load parameter; and generating a frequency band lock instruction according to the network load parameter.
  • the current network load parameter includes the number of mobile terminals currently accessing the network, the number of available resource blocks of the current network, and the utilization of the bandwidth of the current network.
  • the network side calculates the current network load parameter, and then allocates the corresponding frequency band to the mobile terminal, and according to This generates a band lock command. In this way, it is possible to avoid that the mobile terminal that has no traffic or low traffic on the LTE network occupies network resources for a long time, so that the mobile terminal that needs to use the network resource cannot use the network resource conveniently and quickly.
  • the network side also allocates frequency bands to the mobile terminal according to the network parameters.
  • an embodiment of the present invention further provides a device for band locking, which is applied to a network side, and the device includes:
  • the obtaining module 31 is configured to obtain an international identification code IMEI number of the mobile terminal that is reported when the mobile terminal registers with the network side;
  • the generating module 32 is configured to generate a band locking instruction by using an equalization policy according to the IMEI number;
  • the first sending module 33 is configured to send the band lock command to the mobile terminal, so that the mobile terminal locks the frequency band that the registered network desires to lock according to the band lock command.
  • the generating module 32 includes:
  • Query unit configured to query device information in the home location register and the visit location register according to the IMEI number
  • the first processing unit is configured to query a static equalization policy pre-configured for the mobile terminal according to the device information, and generate a frequency band lock instruction according to the static equalization policy.
  • the first processing unit includes:
  • the first subunit is configured to obtain a setting in the static band lock table of the equalization policy, and the mobile terminal uses the preset desired locked band;
  • the second subunit is configured to directly generate a band lock command when the desired lock band is valid.
  • the band lock command includes a desired lock band, a network identifier of the desired lock band, a band lock flag, and a frequency lock persistence flag.
  • the second processing unit is configured to generate a frequency band lock instruction according to the dynamic equalization policy when the static equalization policy configured for the mobile terminal is not queried according to the device information.
  • the second processing unit includes:
  • a third subunit configured to obtain a current network load parameter
  • the fourth subunit is configured to generate a band lock command according to the network load parameter.
  • the current network load parameter includes the number of mobile terminals currently accessing the network and the number of available resource blocks of the current network.
  • the band lock command includes a desired lock band, a network identifier of a desired lock band, a band lock flag, a frequency lock persistence flag, a traffic monitoring period, and a traffic monitoring threshold.
  • the first sending module 33 includes:
  • An encryption unit configured to encrypt the generated band lock instruction
  • the first unit is configured to send the encrypted band lock command to the mobile terminal by using a short message.
  • the apparatus for applying the frequency band lock applied to the network side is the apparatus for applying the method for applying the frequency band lock applied to the network side, that is, all the embodiments of the method for applying the frequency band lock applied to the network side. Both are suitable for the device and all achieve the same or similar benefits.
  • an embodiment of the present invention further provides a method for frequency band locking, which is applied to a mobile terminal, and the method includes:
  • Step 41 Send a registration request to the target registration network on the network side, where the registration request carries the international identification code IMEI number of the mobile terminal, so that the network side generates a frequency band lock instruction according to the IMEI number.
  • Step 42 Receive a frequency band lock instruction sent by the network side.
  • the band lock command includes a desired lock band, a network identifier of a desired lock band, a band lock flag, a frequency lock persistence flag, a traffic monitoring period, and a traffic monitoring threshold.
  • the mobile terminal receives the band lock command sent by the network side through the short message. It can be understood that, in the embodiment of the present invention, the specific manner in which the mobile terminal receives the band lock instruction is not limited, and the specific manner is determined by the transmission mode of the network side.
  • Step 43 Lock the frequency band that the target registration network desires to lock according to the band lock command.
  • the specific step of the foregoing step 43 is: performing decryption processing on the received band lock command; and locking the frequency band desired to be locked by the target registration network according to the band lock command after the decryption process.
  • the mobile terminal if the network side sends a frequency band lock instruction to the mobile terminal by using a short message, the mobile terminal first determines whether the frequency band lock instruction is after receiving the short message. If it is a band lock command, it will be decrypted and locked according to it; if it is not a band lock command, it will receive the message normally. Of course, even if the network side does not send the band lock command to the mobile terminal by means of short message, after receiving the band lock command, the mobile terminal will decrypt the frequency band according to the frequency lock operation.
  • the specific step of the above step 41 is: according to the shift The hardware situation of the mobile terminal, scanning the available network information in the surrounding environment and obtaining the operator information of the available network; according to the subscription information of the SIM (Subscriber Identity Module) card and the operator, the available network Searching for the identifier of the target registration network in the information; determining that the identifier of the target registration network is different from the network identifier of the desired locked frequency band in the SIM card of the mobile terminal; sending the registration to the target registration network on the network side according to the identifier of the target registration network request.
  • SIM Subscriber Identity Module
  • the SIM card of the mobile terminal stores the country code, the network code, the desired locked frequency band, the network identifier of the desired locked frequency band, the frequency band lock flag, the frequency lock persistence flag, the traffic monitoring period, and the traffic monitoring.
  • Information such as threshold values, and this information can only be updated by the internal editing of the terminal or SMS of the operator, and the initial value is set when the SIM card is issued by the operator.
  • the band lock flag indicates whether the current band lock command is valid; the lock frequency persistence flag identifies the valid time of the most recent network band lock command, and its value may include the current boot valid, permanent valid, valid for a certain period of time, and on-demand. Persistent; the traffic monitoring period indicates the standard cycle time interval of traffic monitoring; the traffic monitoring threshold indicates the minimum threshold of the mobile terminal periodic detection low traffic criterion
  • the SIM card initializes the information in the SIM card.
  • the available network information in the surrounding environment is scanned and the operator information of the available network is obtained, and then the subscription information of the SIM card of the mobile terminal and the operator is searched for from the available network information.
  • the identity of the target registration network is a specific embodiment of the present invention.
  • the target is The registration network sends a registration request, and the registration request carries its own IMEI number and frequency band capability. If the mobile terminal is found to have performed the frequency-locked operation on the target registration network, that is, the identifier of the target registration network is determined to be the same as the network identifier of the desired locked frequency band in the SIM card of the mobile terminal, the SIM card is further determined.
  • band lock flag corresponding to the network of the desired lock band is valid; and when the band lock flag is valid, further determining whether the lock frequency persistence flag corresponding to the network of the desired lock band is the first flag; if it is the first flag, The frequency band desired to be locked by the network of the desired locked frequency band is locked, wherein the first flag refers to permanent validity.
  • the foregoing step 43 may have multiple specific execution manners due to different values of the frequency lock persistence flag.
  • the first implementation manner is: checking whether the lock frequency persistence flag is the first flag; if the first flag, locking the target registration network is expected Locked band. Specifically, after receiving the band lock command, the mobile terminal checks whether the lock frequency persistence flag is the first flag, that is, permanent, and if so, locks the frequency band that the target registration network desires to lock; otherwise, continues to monitor whether there is a new one. Band lock command.
  • the second implementation manner of the foregoing step 43 is: checking whether the lock frequency persistence flag is the second flag, the second flag is valid for a certain period of time, and if the second flag is, locking the target registration network.
  • the mobile terminal After receiving the band lock instruction, the mobile terminal checks whether the value of the lock frequency persistence flag is valid for a certain period of time. If the value of the lock frequency persistence flag is valid for a certain period of time, the target registration is locked.
  • the third implementation manner of the foregoing step 43 is: after receiving the band lock command, the mobile terminal checks whether the lock frequency persistence flag is the third flag, and the third flag refers to persistent on demand; The third flag is used to monitor the traffic of the mobile terminal by using the second timer in the traffic monitoring period; if the traffic of the mobile terminal is less than the traffic monitoring threshold during the traffic monitoring period, the statistics are further collected during the traffic monitoring period. The number of times that the traffic is less than the traffic monitoring threshold; if the number of times is greater than the first preset value (for example, three times), the frequency band that the target registration network desires to lock is locked, and the desired locked frequency band and expectation corresponding to the target registration network are locked.
  • the first preset value for example, three times
  • the network identifier of the locked band, the band lock flag, the frequency lock persistence flag, the traffic monitoring period, and the traffic monitoring threshold are saved to the SIM card; if the number of times is less than the first preset value, the second timer is executed to monitor the cycle The step of monitoring the traffic of the mobile terminal until the number of times is less than the first preset value.
  • check frequency lock persistence flag is not the third flag, then continue Monitor for new band lock commands.
  • the mobile terminal if it is detected that the traffic of the mobile terminal is greater than the traffic monitoring threshold during the traffic monitoring period or the network connection request is detected by the mobile terminal, determining the expected locking in the SIM card of the mobile terminal Whether the network identifier of the frequency band is the same as the identifier of the other network, that is, whether the mobile terminal has previously performed the frequency-locked operation on other networks; if the same, that is, the mobile terminal has previously performed the frequency-locked operation on other networks, the first execution is performed.
  • the second timer monitors the traffic of the mobile terminal by using the traffic monitoring period; if the mobile terminal does not perform the frequency locking operation on other networks before, the frequency band is restored to the initial value of the mobile terminal when the mobile terminal is powered on. And restore the information in the SIM card (including the desired lock band, the network identifier of the desired lock band, the band lock flag, the lock frequency persistence flag, the traffic monitoring period, and the traffic monitoring threshold) to the initial value at power on.
  • an embodiment of the present invention further provides a frequency band locking apparatus, which is applied to a mobile terminal, and the apparatus includes:
  • the second sending module 81 is configured to send a registration request to the target registration network on the network side, where the registration request carries the international identification code IMEI number of the mobile terminal, so that the network side generates a frequency band lock instruction according to the IMEI number;
  • the receiving module 82 is configured to receive a frequency band lock instruction sent by the network side;
  • the locking module 83 is configured to lock the frequency band desired to be locked by the target registration network according to the band lock command.
  • the second sending module 81 includes:
  • a scanning unit configured to scan available network information in the surrounding environment according to the hardware condition of the mobile terminal, and obtain operator information of the available network
  • a search unit configured to search for an identifier of the target registration network from the available network information according to the subscription information of the SIM card of the mobile terminal and the operator;
  • a first determining unit configured to determine that the identifier of the target registration network is different from the network identifier of the desired locked frequency band in the SIM card of the mobile terminal;
  • the second unit is configured to send a registration request to the target registration network on the network side according to the identifier of the target registration network.
  • the device further comprises:
  • a first module configured to determine an identifier of the target registration network and a SIM card in the mobile terminal It is expected that the network identifier of the locked band is the same;
  • the first determining module is configured to determine whether the frequency band lock flag corresponding to the network of the desired lock frequency band in the SIM card is valid, and when the frequency band lock flag is valid, triggering the second determining module;
  • the second judging module is configured to further determine, according to the triggering of the first judging module, whether the lock frequency persistence flag corresponding to the network of the desired lock band is the first flag, and when the lock frequency persistence flag is the first flag, Triggering the second module;
  • the second module is configured to lock the frequency band desired to be locked by the network of the desired locked frequency band according to the triggering of the second determining module.
  • the receiving module 82 includes:
  • the third unit is configured to receive the frequency band lock instruction sent by the network side through the short message.
  • the locking module 83 includes:
  • the fourth unit is configured to decrypt the received band lock instruction
  • the fifth unit is configured to lock the frequency band that the target registration network desires to lock according to the band lock command after the decryption process.
  • the band lock command includes a desired lock band, a network identifier of the desired lock band, a band lock flag, a frequency lock persistence flag, a traffic monitoring period, and a traffic monitoring threshold.
  • the locking module 83 includes:
  • a first checking unit configured to check whether the lock frequency persistence flag is the first flag, and trigger the sixth unit when the frequency lock persistence flag is the first flag;
  • the sixth unit is configured to lock the frequency band that the target registration network desires to lock according to the trigger of the first inspection unit.
  • the locking module 83 includes:
  • a second checking unit configured to check whether the lock frequency persistence flag is a second flag, and trigger the seventh unit when the frequency lock persistence flag is the second flag
  • the seventh unit is configured to: according to the trigger of the second checking unit, lock the frequency band that the target registration network desires to lock, and check whether the time for locking the frequency band exceeds the first cycle time set by the second flag by using the first timer, And when the time of locking the frequency band exceeds the first cycle time, the eighth unit is triggered;
  • the eighth unit is configured to restore the frequency band to the initial value when the mobile terminal is powered on according to the trigger of the seventh unit, and to set the desired locked frequency band in the SIM card, the network identifier of the desired locked frequency band, and the frequency band.
  • the lock flag, the lock frequency persistence flag, the traffic monitoring period, and the traffic monitoring threshold are all restored to the initial values at power-on.
  • the locking module 83 includes:
  • a third checking unit configured to check whether the lock frequency persistence flag is a third flag, and trigger the ninth unit when the frequency lock persistence flag is the third flag
  • the ninth unit is configured to monitor, according to the triggering of the third checking unit, the traffic of the mobile terminal by using the second timer by the traffic monitoring period;
  • the eleventh unit when the traffic of the mobile terminal is less than the traffic monitoring threshold during the traffic monitoring period, the number of times that the traffic is less than the traffic monitoring threshold during the traffic monitoring period is further calculated, and the number of times is greater than the first When the preset value is used, the eleventh unit is triggered; when the number of times is less than the first preset value, the ninth unit is triggered to perform the step of monitoring the traffic of the mobile terminal by using the second timer in the traffic monitoring period;
  • the eleventh unit is configured to lock the frequency band that the target registration network desires to lock according to the trigger of the tenth unit, and the desired lock frequency band corresponding to the target registration network, the network identifier of the desired lock frequency band, the frequency band lock flag, and the lock
  • the frequency persistence flag, the traffic monitoring period, and the traffic monitoring threshold are saved to the SIM card.
  • the locking module 83 further includes:
  • the twelfth unit is configured to determine, when the traffic of the mobile terminal is greater than the traffic monitoring threshold in the traffic monitoring period, whether the network identifier of the desired locked frequency band in the SIM card of the mobile terminal is the same as the identifier of the other network, And when the network identifier of the desired locked frequency band in the SIM card is the same as the identifier of the other network, triggering the ninth unit to perform the step of monitoring the traffic of the mobile terminal by using the second timer in the traffic monitoring period; when the expectation in the SIM card
  • the thirteenth unit is triggered when the network identifier of the locked band is different from the identifier of the other network;
  • the thirteenth unit is configured to restore the frequency band to the initial value when the mobile terminal is powered on according to the trigger of the twelfth unit, and to set the desired locked frequency band in the SIM card, the network identifier of the desired locked frequency band, the frequency band lock flag, and the lock.
  • the frequency persistence flag, the traffic monitoring period, and the traffic monitoring threshold are restored to the initial values at power-on.
  • the apparatus for applying the frequency band lock of a mobile terminal is the apparatus for applying the frequency band locking method applied to a mobile terminal, that is, the foregoing is applied to a mobile device. All embodiments of the method of band locking of the terminal are applicable to the device and both achieve the same or similar benefits.
  • Embodiments of the present invention also provide a frequency band locking system including the above-described device for frequency band locking applied to the network side and the above-described device for frequency band locking applied to a mobile terminal.
  • the frequency band locking system provided by the embodiment of the present invention includes the foregoing device for frequency band locking applied to the network side and the device for frequency band locking applied to a mobile terminal, that is, the device for applying frequency band locking applied to the network side. All embodiments of the device for band lock applied to a mobile terminal are applicable to the device and all achieve the same or similar benefits.
  • the method, device, and system for band locking provided by the embodiments of the present invention have the following beneficial effects: the access success rate and the throughput rate of the mobile terminal on the network side can be effectively improved, and the load balance of the network system is balanced, thereby improving user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种频段锁定的方法、装置及***,该方法包括:获取移动终端在注册到网络侧时上报的该移动终端的国际识别码(IMEI)号;根据IMEI号,通过均衡策略生成频段锁定指令;将频段锁定指令发送给移动终端,使移动终端依据频段锁定指令锁定所注册网络所期望锁定的频段,本发明的方法能节约网络资源,使网络***负载均衡,进而提高用户体验。

Description

一种频段锁定的方法、装置及*** 技术领域
本发明涉及无线通信技术领域,特别涉及一种频段锁定的方法、装置及***。
背景技术
随着移动通信技术的发展,以通用分组无线服务技术(GPRS,General Packet Radio Service)、3G为基础的移动通信网络能够提供大规模的网络覆盖,长期演进(LTE,Long Term Evolution)作为***移动通信标准也已经开始了大规模的部署,LTE相对于第三代和第二代通信标准在传输速率上有大幅提升,是未来移动宽带技术的目标和演进方向。同时具有LTE功能多模移动宽带终端也越来越普及。
但是目前随着频谱资源的短缺,全球移动数据用户爆发式增长,如何提供网络***的负载以及提高网络资源利用率,提供更好的用户体验成为运营商亟待解决的问题。传统的网络资源优化成本高,耗时较长,同时灵活性较差,很难应答现有业务发展需求,例如以下场景如果单单从网络侧实现则很难满足:某些运营商有多个LTE频段网络覆盖,但是其需要将某个特定频段作为某类设备的主承载,例如苹果用户,一方面因为这类用户拥有庞大的数量群体;另一方面这类用户的月均消费关键绩效指标较高,属于高端用户,运营商期望为这类群体更好的用户体验,从而获得更好的市场效应或者口碑效应,以扩展其市场占有率以及用户规模。或者运营商希望用户在空闲时或者无流量时终端能短暂地将某些终端自动切换到其他某个频段覆盖,一方面可以节约无线资源给使用用户,另一方面可以有效提高***负载,提高接入成功率与吞吐率。
因此越来越多运营商考虑不单单从网络侧进行网络优化,因为靠优化网络切换、重选需要一方面耗时较长,另一方面成本较高,尤其对于虚拟运营商基本不可行,因为网络基础设施不属于他们自己,优化基本不太可能。所以基于 终端配合进行网络资源优化配置与利用变得尤为重要。
发明内容
本发明实施例的目的在于提供一种频段锁定的方法、装置及***,能节约网络资源,使网络***负载均衡,进而提高用户体验。
为了达到上述目的,本发明的实施例提供了一种频段锁定的方法,应用于网络侧,该方法包括:
获取移动终端在注册到网络侧时上报的该移动终端的国际识别码IMEI号;
根据IMEI号,通过均衡策略生成频段锁定指令;
将频段锁定指令发送给移动终端,使移动终端依据频段锁定指令锁定所注册网络所期望锁定的频段。
其中,根据IMEI号,通过均衡策略生成频段锁定指令的步骤包括:
根据IMEI号,在归属位置寄存器和拜访位置寄存器中查询设备信息;
根据设备信息,查询到为该移动终端预先配置的静态均衡策略,并根据静态均衡策略生成频段锁定指令。
其中,根据设备信息,查询到为该移动终端预先配置的静态均衡策略,并根据静态均衡策略生成频段锁定指令的步骤包括:
获取均衡策略的静态频段锁定表中的设置移动终端使用预设的期望锁定频段;
若期望锁定频段有效,则直接生成频段锁定指令。
其中,该频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志以及锁频持久性标志。
其中,还包括:
根据设备信息,查询不到为该移动终端预先配置的静态均衡策略时,根据动态均衡策略生成频段锁定指令。
其中,根据动态均衡策略生成频段锁定指令的步骤包括:
获取当前网络负载参数;
根据网络负载参数,生成频段锁定指令。
其中,当前网络负载参数包括当前接入该网络的移动终端数量和当前网络的可用资源块数量。
其中,该频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值。
其中,将频段锁定指令发送给移动终端的步骤包括:
对生成的频段锁定指令进行加密处理;
将加密处理后的频段锁定指令通过短信的方式发送给移动终端。
本发明的实施例还提供了一种频段锁定的装置,应用于网络侧,该装置包括:
获取模块,设置为获取移动终端在注册到网络侧时上报的该移动终端的国际识别码IMEI号;
生成模块,设置为根据IMEI号,通过均衡策略生成频段锁定指令;
第一发送模块,设置为将频段锁定指令发送给移动终端,使移动终端依据频段锁定指令锁定所注册网络所期望锁定的频段。
其中,生成模块包括:
查询单元,设置为根据IMEI号,在归属位置寄存器和拜访位置寄存器中查询设备信息;
第一处理单元,设置为根据设备信息,查询到为该移动终端预先配置的静态均衡策略,并根据静态均衡策略生成频段锁定指令。
其中,还包括:
第二处理单元,设置为根据设备信息,查询不到为该移动终端预先配置的静态均衡策略时,根据动态均衡策略生成频段锁定指令。
其中,第二处理单元包括:
第三子单元,设置为获取当前网络负载参数;
第四子单元,设置为根据网络负载参数,生成频段锁定指令。
本发明的实施例还提供了一种频段锁定的方法,应用于一移动终端,该方法包括:
向网络侧的目标注册网络发送注册请求,注册请求中携带本移动终端的国际识别码IMEI号,使网络侧根据IMEI号生成频段锁定指令;
接收网络侧发送的频段锁定指令;
根据频段锁定指令锁定目标注册网络所期望锁定的频段。
其中,向网络侧的目标注册网络发送注册请求的步骤包括:
根据本移动终端的硬件情况,扫描其周围环境中的可用网络信息并获取该可用网络的运营商信息;
根据本移动终端SIM卡与运营商的签约信息,从可用网络信息中搜索出目标注册网络的标识;
确定该目标注册网络的标识与本移动终端SIM卡中的期望锁定频段的网络标识不相同;
根据目标注册网络的标识,向网络侧的目标注册网络发送注册请求。
其中,根据本移动终端SIM卡与运营商的签约信息,从可用网络信息中搜索出目标注册网络的标识的步骤之后,还包括:
确定该目标注册网络的标识与本移动终端SIM卡中的期望锁定频段的网络标识相同;
判断该SIM卡中的期望锁定频段的网络对应的频段锁定标志是否有效;
若有效,则进一步判断该期望锁定频段的网络对应的锁频持久性标志是否为第一标志;
若为第一标志,则锁定该期望锁定频段的网络所期望锁定的频段。
其中,接收网络侧发送的频段锁定指令的步骤包括:
通过短信接收网络侧发送的频段锁定指令。
其中,根据频段锁定指令锁定目标注册网络所期望锁定的频段的步骤包括:
对接收到的频段锁定指令进行解密处理;
根据解密处理后的频段锁定指令,锁定目标注册网络所期望锁定的频段。
其中,频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值。
其中,根据频段锁定指令锁定目标注册网络所期望锁定的频段的步骤包括:
检查锁频持久性标志是否为第一标志;
若是第一标志,则锁定该目标注册网络所期望锁定的频段。
其中,根据频段锁定指令锁定目标注册网络所期望锁定的频段的步骤包括:
检查锁频持久性标志是否为第二标志;
若是第二标志,则锁定该目标注册网络所期望锁定的频段,并通过第一定时器检查锁定该频段的时间是否超过第二标志设定的第一周期时间;
若超过第一周期时间,则将频段恢复至本移动终端开机时的初始值,并将SIM卡中的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值均恢复到开机时的初始值。
其中,根据频段锁定指令锁定目标注册网络所期望锁定的频段的步骤包括:
检查锁频持久性标志是否为第三标志;
若是第三标志,则通过第二定时器以流量监控周期对本移动终端的流量进行监测;
若监测到在流量监控周期内本移动终端的流量小于流量监控门限值,则进一步统计在流量监控周期内流量小于流量监控门限值的次数;
若次数大于第一预设值,则锁定该目标注册网络所期望锁定的频段,并将与该目标注册网络对应的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值保存至SIM卡中;
若次数小于第一预设值,则执行第二定时器以流量监控周期对本移动终端的流量进行监测的步骤。
其中,通过第二定时器以流量监控周期对本移动终端的流量进行监测的步骤之后,还包括:
若监测到在流量监控周期内本移动终端的流量大于流量监控门限值,则判断本移动终端SIM卡中的期望锁定频段的网络标识是否与其它网络的标识相同;
若相同,则执行第二定时器以流量监控周期对本移动终端的流量进行监测的步骤;
若不相同,则将频段恢复至本移动终端开机时的初始值,并将SIM卡中 的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值恢复到开机时的初始值。
本发明的实施例还提供了一种频段锁定的装置,应用于一移动终端,该装置包括:
第二发送模块,设置为向网络侧的目标注册网络发送注册请求,注册请求中携带本移动终端的国际识别码IMEI号,使网络侧根据IMEI号生成频段锁定指令;
接收模块,设置为接收网络侧发送的频段锁定指令;
锁定模块,设置为根据频段锁定指令锁定目标注册网络所期望锁定的频段。
本发明的实施例还提供了一种频段锁定的***,该***包括上述的应用于网络侧的频段锁定的装置以及上述的应用于一移动终端的频段锁定的装置。
本发明的上述方案至少包括以下有益效果:
在本发明的实施例中,网络侧根据移动终端上报的IMEI号,通过均衡策略生成频段锁定指令,并将该频段锁定指令发送给对应的移动终端。紧接着移动终端会根据接收到的频段锁定指令锁定特定频段,从而有效地提高网络侧移动终端的接入成功率与吞吐率,使网络***负载均衡,进而提高用户体验。
附图说明
图1为本发明实施例中应用于网络侧的频段锁定的方法的步骤流程图;
图2为本发明实施例中图1中的步骤12的具体步骤流程图;
图3为本发明实施例中应用于网络侧的频段锁定的装置的结构示意图;
图4为本发明实施例中应用于一移动终端的频段锁定的方法的步骤流程图;
图5为本发明实施例中图4中的步骤43的具体步骤流程图之一;
图6为本发明实施例中图4中的步骤43的具体步骤流程图之二;
图7为本发明实施例中图4中的步骤43的具体步骤流程图之三;
图8为本发明实施例中应用于一移动终端的频段锁定的装置的结构示意图。
具体实施方式
为使本发明要解决的技术问题、技术方案和优点更加清楚,下面将结合附图及具体实施例进行详细描述。
本发明针对现有技术中网络***负载不均衡,用户体验较差的问题,提供了一种频段锁定的方法、装置及***,能节约网络资源,使网络***负载均衡,提高用户体验。
如图1所示,本发明的实施例提供了一种频段锁定的方法,应用于网络侧,该方法包括:
步骤11,获取移动终端在注册到网络侧时上报的该移动终端的国际识别码IMEI号。
在本发明的具体实施例中,移动终端在注册到网络侧时会将自身的IMEI号和频段能力上报给网络侧,以便网络侧执行后续操作。其中IMEI是是区别移动终端的唯一标志,储存在移动终端中,不能被改写以及擦除,通常由标准组织统一分配。
步骤12,根据IMEI号,通过均衡策略生成频段锁定指令。
步骤13,将频段锁定指令发送给移动终端,使移动终端依据频段锁定指令锁定所注册网络所期望锁定的频段。
在本发明的上述实施例中,步骤13的具体步骤为:对生成的频段锁定指令进行加密处理;将加密处理后的频段锁定指令通过短信的方式发送给移动终端。
在本发明的具体实施例中,网络侧会根据其与移动终端协商的格式,对生成的频段锁定指令编码加密,并通过短信发送给对应的移动终端。作为一个优选的示例,可以通过CLASS0短信发送给移动终端。可以理解的是,在本发明的实施例中并不限定网络侧发送频段锁定指令的具体方式。
在本发明的具体实施例中,网络侧在获取到移动终端的IMEI号和频段能力后,会通过均衡策略生成频段锁定指令,并将经过加密处理的频段锁定指令发送给对应的移动终端,以便移动终端锁定网络侧给其指定的频段,使网络***负载均衡,进而提高用户体验。其中,通过均衡策略生成频段锁定指令的具 体过程会在后文详细阐述。
如图2所示,在本发明的上述实施例中,上述步骤12的具体步骤为:
步骤21,根据IMEI号,在归属位置寄存器和拜访位置寄存器中查询设备信息。
在本发明的具体实施例中,设备信息包括移动终端的厂家型号等信息。
步骤22,根据设备信息,查询到为该移动终端预先配置的静态均衡策略,并根据静态均衡策略生成频段锁定指令。
其中,在本发明的上述实施例中,上述步骤22的具体步骤为:获取均衡策略的静态频段锁定表中的设置移动终端使用预设的期望锁定频段;若期望锁定频段有效,则直接生成频段锁定指令。
在本发明的具体实施例中,网络侧会根据查询到的设备信息,进一步在均衡策略的静态频段锁定表中查询是否规定该移动终端使用某个特定频段(即预设的期望锁定频段),若在静态频段锁定表中规定了该移动终端使用某个特定频段,则进一步检测该期望锁定频段是否有效,若有效地话,直接生成频段锁定指令,其中,该频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志以及锁频持久性标志等。当然如果在静态频段锁定表中没有规定该移动终端使用某个特定频段的话,网络侧会根据动态均衡策略生成频段锁定指令,且根据动态均衡策略生成的频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值等。
其中,在本发明的上述实施例中,根据动态均衡策略生成频段锁定指令的步骤为:获取当前网络负载参数;根据网络负载参数,生成频段锁定指令。其中,当前网络负载参数包括当前接入该网络的移动终端数量、当前网络的可用资源块数量以及当前网络的带宽的利用率等。
在本发明的具体实施例中,若在静态频段锁定表中没有规定该移动终端使用某个特定频段的话,网络侧会通过计算当前网络负载参数,然后再给移动终端分配相应的频段,并依此生成频段锁定指令。这样就可以避免长时间在LTE网络无流量或流量较低的移动终端占用网络资源,使得需要使用网络资源的移动终端却不能方便、快速的使用网络资源的情况发生。当然在当网络负载达到 一定程度时,网络侧也会根据网络参数合理的为移动终端分配频段。
如图3所示,本发明的实施例还提供了一种频段锁定的装置,应用于网络侧,该装置包括:
获取模块31,设置为获取移动终端在注册到网络侧时上报的该移动终端的国际识别码IMEI号;
生成模块32,设置为根据IMEI号,通过均衡策略生成频段锁定指令;
第一发送模块33,设置为将频段锁定指令发送给移动终端,使移动终端依据频段锁定指令锁定所注册网络所期望锁定的频段。
其中,生成模块32包括:
查询单元,设置为根据IMEI号,在归属位置寄存器和拜访位置寄存器中查询设备信息;
第一处理单元,设置为根据设备信息,查询到为该移动终端预先配置的静态均衡策略,并根据静态均衡策略生成频段锁定指令。
其中,第一处理单元包括:
第一子单元,设置为获取均衡策略的静态频段锁定表中的设置移动终端使用预设的期望锁定频段;
第二子单元,设置为当期望锁定频段有效时,直接生成频段锁定指令。
其中,该频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志以及锁频持久性标志。
其中,还包括:
第二处理单元,设置为根据设备信息,查询不到为该移动终端预先配置的静态均衡策略时,根据动态均衡策略生成频段锁定指令。
其中,第二处理单元包括:
第三子单元,设置为获取当前网络负载参数;
第四子单元,设置为根据网络负载参数,生成频段锁定指令。
其中,当前网络负载参数包括当前接入该网络的移动终端数量和当前网络的可用资源块数量。
其中,该频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值。
其中,第一发送模块33包括:
加密单元,设置为对生成的频段锁定指令进行加密处理;
第一单元,设置为将加密处理后的频段锁定指令通过短信的方式发送给移动终端。
需要说明的是,本发明实施例提供的应用于网络侧的频段锁定的装置是应用上述应用于网络侧的频段锁定的方法的装置,即上述应用于网络侧的频段锁定的方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
如图4所示,本发明的实施例还提供了一种频段锁定的方法,应用于一移动终端,该方法包括:
步骤41,向网络侧的目标注册网络发送注册请求,注册请求中携带本移动终端的国际识别码IMEI号,使网络侧根据IMEI号生成频段锁定指令。
步骤42,接收网络侧发送的频段锁定指令。
其中,在本发明的上述实施例中,频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值等。
其中,在本发明的上述实施例中,移动终端通过短信接收网络侧发送的频段锁定指令。可以理解的是,在本发明的实施例中,并不限定移动终端接收频段锁定指令的具体方式,其具体方式由网络侧的发送方式决定。
步骤43,根据频段锁定指令锁定目标注册网络所期望锁定的频段。
其中,在本发明的上述实施例中,上述步骤43的具体步骤为:对接收到的频段锁定指令进行解密处理;根据解密处理后的频段锁定指令,锁定目标注册网络所期望锁定的频段。
在本发明的具体实施例中,若网络侧是以短信的方式给移动终端发送频段锁定指令的话,移动终端在接收到短信后,会先判断一下是不是频段锁定指令。如果是频段锁定指令的话,会接着对其进行解密并根据其进行锁频操作;如果不是频段锁定指令的话,会正常接收短信。当然即使网络侧不是以短信的方式给移动终端发送频段锁定指令,移动终端在接收到频段锁定指令后,也会在对其进行解密后再根据其进行锁频操作。
其中,在本发明的上述实施例中,上述步骤41的具体步骤为:根据本移 动终端的硬件情况,扫描其周围环境中的可用网络信息并获取该可用网络的运营商信息;根据本移动终端客户识别模块(SIM,Subscriber Identity Module)卡与运营商的签约信息,从可用网络信息中搜索出目标注册网络的标识;确定该目标注册网络的标识与本移动终端SIM卡中的期望锁定频段的网络标识不相同;根据目标注册网络的标识,向网络侧的目标注册网络发送注册请求。
在本发明的具体实施例中,移动终端的SIM卡中储存有国家码、网络码、期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值等信息,且这些信息只能由终端内部编辑或者运营商短信更新,且初始值由运营商发行SIM卡时设定。其中,频段锁定标志表示当前频段锁定指令是否有效;锁频持久性标志标识最近一次某网络频段锁定指令有效时间,它的取值可以包含本次开机有效、永久有效、某时间段有效以及按需持久;流量监控周期表示流量监控的标准周期时间间隔;流量监控门限值表示移动终端周期检测低流量准则的最低门限
在本发明的具体实施例中,移动终端启动开机后,SIM卡会初始化获取SIM卡中的信息。同时会根据本移动终端的硬件情况,扫描其周围环境中的可用网络信息并获取该可用网络的运营商信息,进而根据本移动终端SIM卡与运营商的签约信息,从可用网络信息中搜索出目标注册网络的标识。
此时,若发现本移动终端之前没有对该目标注册网络进行过锁频操作,即,该目标注册网络的标识与本移动终端SIM卡中的期望锁定频段的网络标识不相同,则向该目标注册网络发送注册请求,且该注册请求中携带自身的IMEI号和频段能力。而若发现本移动终端之前对该目标注册网络进行过锁频操作,即,确定出该目标注册网络的标识与本移动终端SIM卡中的期望锁定频段的网络标识相同;则进一步判断该SIM卡中的期望锁定频段的网络对应的频段锁定标志是否有效;且当频段锁定标志有效时,进一步判断该期望锁定频段的网络对应的锁频持久性标志是否为第一标志;若为第一标志,则锁定该期望锁定频段的网络所期望锁定的频段,其中,第一标志指的是永久有效。
其中,在本发明的上述实施例中,上述步骤43会由于锁频持久性标志的取值不同而有多种具体执行方式。如图5所示,其第一种执行方式为:检查锁频持久性标志是否为第一标志;若是第一标志,则锁定该目标注册网络所期望 锁定的频段。具体地,移动终端接收到频段锁定指令后,会检查锁频持久性标志是否为第一标志即永久有效,若是,则锁定该目标注册网络所期望锁定的频段;否则,继续监听是否有新的频段锁定指令。
如图6所示,上述步骤43的第二种执行方式为:检查锁频持久性标志是否为第二标志,第二标志是指某时间段有效;若是第二标志,则锁定该目标注册网络所期望锁定的频段,并通过第一定时器检查锁定该频段的时间是否超过第二标志设定的第一周期时间;若超过第一周期时间,则将频段恢复至本移动终端开机时的初始值,并将SIM卡中的信息(包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值)均恢复到开机时的初始值。具体地,移动终端在接收到频段锁定指令后,会检查锁频持久性标志的取值是否为某时间段有效,如果锁频持久性标志的取值是某时间段有效,则锁定该目标注册网络所期望锁定的频段,并通过第一定时器检查锁定该频段的时间是否超过第二标志设定的第一周期时间,若锁定该频段的时间超过第一周期时间,则将移动终端的频段恢复至开机时的初始值,并将SIM卡中的信息恢复到开机时的初始值;若锁定该频段的时间未超过第一周期时间,则第一定时器检查锁定该频段的时间是否超过第二标志设定的第一周期时间,直至锁定该频段的时间超过第一周期时间;如果锁频持久性标志的取值不是某时间段有效,则继续监听是否有新的频段锁定指令。
如图7所示,上述步骤43的第三种执行方式为:移动终端在接收到频段锁定指令后,会检查锁频持久性标志是否为第三标志,第三标志是指按需持久;若是第三标志,则通过第二定时器以流量监控周期对本移动终端的流量进行监测;若监测到在流量监控周期内本移动终端的流量小于流量监控门限值,则进一步统计在流量监控周期内流量小于流量监控门限值的次数;若次数大于第一预设值(例如3次),则锁定该目标注册网络所期望锁定的频段,并将与该目标注册网络对应的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值保存至SIM卡中;若次数小于第一预设值,则执行第二定时器以流量监控周期对本移动终端的流量进行监测的步骤,直至次数小于第一预设值。
在本发明的具体实施例中,若检查锁频持久性标志不是第三标志,则继续 监听是否有新的频段锁定指令。
在本发明的具体实施例中,若监测到在流量监控周期内本移动终端的流量大于流量监控门限值或者检查到本移动终端有联网请求的话,则判断本移动终端SIM卡中的期望锁定频段的网络标识是否与其它网络的标识相同,即,判断本移动终端之前是否对其它网络进行过锁频操作;若相同,即,本移动终端之前对其它网络进行过锁频操作,则执行第二定时器以流量监控周期对本移动终端的流量进行监测的步骤;若不相同,即,本移动终端之前未对其它网络进行过锁频操作,则将频段恢复至本移动终端开机时的初始值,并将SIM卡中的信息(包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值)恢复到开机时的初始值。
如图8所示,本发明的实施例还提供了一种频段锁定的装置,应用于一移动终端,该装置包括:
第二发送模块81,设置为向网络侧的目标注册网络发送注册请求,注册请求中携带本移动终端的国际识别码IMEI号,使网络侧根据IMEI号生成频段锁定指令;
接收模块82,设置为接收网络侧发送的频段锁定指令;
锁定模块83,设置为根据频段锁定指令锁定目标注册网络所期望锁定的频段。
其中,第二发送模块81包括:
扫描单元,设置为根据本移动终端的硬件情况,扫描其周围环境中的可用网络信息并获取该可用网络的运营商信息;
搜索单元,设置为根据本移动终端SIM卡与运营商的签约信息,从可用网络信息中搜索出目标注册网络的标识;
第一确定单元,设置为确定该目标注册网络的标识与本移动终端SIM卡中的期望锁定频段的网络标识不相同;
第二单元,设置为根据目标注册网络的标识,向网络侧的目标注册网络发送注册请求。
其中,装置还包括:
第一模块,设置为确定该目标注册网络的标识与本移动终端SIM卡中的 期望锁定频段的网络标识相同;
第一判断模块,设置为判断该SIM卡中的期望锁定频段的网络对应的频段锁定标志是否有效,并当该频段锁定标志有效时,触发第二判断模块;
第二判断模块,设置为根据第一判断模块的触发,进一步判断该期望锁定频段的网络对应的锁频持久性标志是否为第一标志,并当该锁频持久性标志为第一标志时,触发第二模块;
第二模块,设置为根据第二判断模块的触发,锁定该期望锁定频段的网络所期望锁定的频段。
其中,接收模块82包括:
第三单元,设置为通过短信接收网络侧发送的频段锁定指令。
其中,锁定模块83包括:
第四单元,设置为对接收到的频段锁定指令进行解密处理;
第五单元,设置为根据解密处理后的频段锁定指令,锁定目标注册网络所期望锁定的频段。
其中,频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值。
其中,锁定模块83包括:
第一检查单元,设置为检查锁频持久性标志是否为第一标志,并当锁频持久性标志是第一标志时,触发第六单元;
第六单元,设置为根据第一检查单元的触发,锁定该目标注册网络所期望锁定的频段。
其中,锁定模块83包括:
第二检查单元,设置为检查锁频持久性标志是否为第二标志,并当锁频持久性标志是第二标志时,触发第七单元;
第七单元,设置为根据第二检查单元的触发,锁定该目标注册网络所期望锁定的频段,并通过第一定时器检查锁定该频段的时间是否超过第二标志设定的第一周期时间,且当锁定该频段的时间超过第一周期时间时,触发第八单元;
第八单元,设置为根据第七单元的触发,将频段恢复至本移动终端开机时的初始值,并将SIM卡中的期望锁定频段、期望锁定频段的网络标识、频段 锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值均恢复到开机时的初始值。
其中,锁定模块83包括:
第三检查单元,设置为检查锁频持久性标志是否为第三标志,并当锁频持久性标志是第三标志时,触发第九单元;
第九单元,设置为根据第三检查单元的触发,通过第二定时器以流量监控周期对本移动终端的流量进行监测;
第十单元,设置为当监测到在流量监控周期内本移动终端的流量小于流量监控门限值时,进一步统计在流量监控周期内流量小于流量监控门限值的次数,并当次数大于第一预设值时,触发第十一单元;当次数小于第一预设值时,触发第九单元执行通过第二定时器以流量监控周期对本移动终端的流量进行监测的步骤;
第十一单元,设置为根据第十单元的触发,锁定该目标注册网络所期望锁定的频段,并将与该目标注册网络对应的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值保存至SIM卡中。
其中,锁定模块83还包括:
第十二单元,设置为当监测到在流量监控周期内本移动终端的流量大于流量监控门限值时,判断本移动终端SIM卡中的期望锁定频段的网络标识是否与其它网络的标识相同,并当SIM卡中的期望锁定频段的网络标识与其它网络的标识相同时,触发第九单元执行通过第二定时器以流量监控周期对本移动终端的流量进行监测的步骤;当SIM卡中的期望锁定频段的网络标识与其它网络的标识不相同时,触发第十三单元;
第十三单元,设置为根据第十二单元的触发,将频段恢复至本移动终端开机时的初始值,并将SIM卡中的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值恢复到开机时的初始值。
需要说明的是,本发明实施例提供的应用于一移动终端的频段锁定的装置是应用上述应用于一移动终端的频段锁定的方法的装置,即上述应用于一移动 终端的频段锁定的方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
本发明的实施例还提供了一种频段锁定的***,该***包括上述的应用于网络侧的频段锁定的装置以及上述的应用于一移动终端的频段锁定的装置。
需要说明的是,本发明实施例提供的频段锁定的***包括上述应用于网络侧的频段锁定的装置和应用于一移动终端的频段锁定的装置,即上述应用于网络侧的频段锁定的装置和应用于一移动终端的频段锁定的装置的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
以上所述是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明所述原理的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。
工业实用性
如上所述,本发明实施例提供的一种频段锁定的方法、装置及***具有以下有益效果:能够有效地提高网络侧移动终端的接入成功率与吞吐率,使网络***负载均衡,进而提高用户体验。

Claims (25)

  1. 一种频段锁定的方法,应用于网络侧,所述方法包括:
    获取移动终端在注册到网络侧时上报的该移动终端的国际识别码IMEI号;
    根据所述IMEI号,通过均衡策略生成频段锁定指令;
    将所述频段锁定指令发送给所述移动终端,使所述移动终端依据所述频段锁定指令锁定所注册网络所期望锁定的频段。
  2. 如权利要求1所述的方法,其中,所述根据所述IMEI号,通过均衡策略生成频段锁定指令的步骤包括:
    根据所述IMEI号,在归属位置寄存器和拜访位置寄存器中查询设备信息;
    根据所述设备信息,查询到为该移动终端预先配置的静态均衡策略,并根据静态均衡策略生成频段锁定指令。
  3. 如权利要求2所述的方法,其中,所述根据所述设备信息,查询到为该移动终端预先配置的静态均衡策略,并根据静态均衡策略生成频段锁定指令的步骤包括:
    获取均衡策略的静态频段锁定表中的设置所述移动终端使用预设的期望锁定频段;
    若所述期望锁定频段有效,则直接生成频段锁定指令。
  4. 如权利要求3所述的方法,其中,该频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志以及锁频持久性标志。
  5. 如权利要求2所述的方法,其中,还包括:
    根据所述设备信息,查询不到为该移动终端预先配置的静态均衡策略时,根据动态均衡策略生成频段锁定指令。
  6. 如权利要求5所述的方法,其中,所述根据动态均衡策略生成频段锁定指令的步骤包括:
    获取当前网络负载参数;
    根据所述网络负载参数,生成频段锁定指令。
  7. 如权利要求6所述的方法,其中,所述当前网络负载参数包括当前接 入该网络的移动终端数量和当前网络的可用资源块数量。
  8. 如权利要求6所述的方法,其中,该频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值。
  9. 如权利要求1所述的方法,其中,所述将所述频段锁定指令发送给所述移动终端的步骤包括:
    对生成的频段锁定指令进行加密处理;
    将加密处理后的频段锁定指令通过短信的方式发送给所述移动终端。
  10. 一种频段锁定的装置,应用于网络侧,所述装置包括:
    获取模块,设置为获取移动终端在注册到网络侧时上报的该移动终端的国际识别码IMEI号;
    生成模块,设置为根据所述IMEI号,通过均衡策略生成频段锁定指令;
    第一发送模块,设置为将所述频段锁定指令发送给所述移动终端,使所述移动终端依据所述频段锁定指令锁定所注册网络所期望锁定的频段。
  11. 如权利要求10所述的装置,其中,所述生成模块包括:
    查询单元,设置为根据所述IMEI号,在归属位置寄存器和拜访位置寄存器中查询设备信息;
    第一处理单元,设置为根据所述设备信息,查询到为该移动终端预先配置的静态均衡策略,并根据静态均衡策略生成频段锁定指令。
  12. 如权利要求11所述的装置,其中,还包括:
    第二处理单元,设置为根据所述设备信息,查询不到为该移动终端预先配置的静态均衡策略时,根据动态均衡策略生成频段锁定指令。
  13. 如权利要求12所述的装置,其中,所述第二处理单元包括:
    第三子单元,设置为获取当前网络负载参数;
    第四子单元,设置为根据所述网络负载参数,生成频段锁定指令。
  14. 一种频段锁定的方法,应用于一移动终端,所述方法包括:
    向网络侧的目标注册网络发送注册请求,所述注册请求中携带本移动终端的国际识别码IMEI号,使网络侧根据IMEI号生成频段锁定指令;
    接收网络侧发送的频段锁定指令;
    根据所述频段锁定指令锁定目标注册网络所期望锁定的频段。
  15. 如权利要求14所述的方法,其中,所述向网络侧的目标注册网络发送注册请求的步骤包括:
    根据本移动终端的硬件情况,扫描其周围环境中的可用网络信息并获取该可用网络的运营商信息;
    根据本移动终端SIM卡与运营商的签约信息,从可用网络信息中搜索出目标注册网络的标识;
    确定该目标注册网络的标识与本移动终端SIM卡中的期望锁定频段的网络标识不相同;
    根据目标注册网络的标识,向网络侧的目标注册网络发送注册请求。
  16. 如权利要求15所述的方法,其中,所述根据本移动终端SIM卡与运营商的签约信息,从可用网络信息中搜索出目标注册网络的标识的步骤之后,还包括:
    确定该目标注册网络的标识与本移动终端SIM卡中的期望锁定频段的网络标识相同;
    判断该SIM卡中的期望锁定频段的网络对应的频段锁定标志是否有效;
    若有效,则进一步判断该期望锁定频段的网络对应的锁频持久性标志是否为第一标志;
    若为第一标志,则锁定该期望锁定频段的网络所期望锁定的频段。
  17. 如权利要求14所述的方法,其中,所述接收网络侧发送的频段锁定指令的步骤包括:
    通过短信接收网络侧发送的频段锁定指令。
  18. 如权利要求17所述的方法,其中,所述根据所述频段锁定指令锁定目标注册网络所期望锁定的频段的步骤包括:
    对接收到的频段锁定指令进行解密处理;
    根据解密处理后的频段锁定指令,锁定目标注册网络所期望锁定的频段。
  19. 如权利要求14所述的方法,其中,所述频段锁定指令包括期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值。
  20. 如权利要求19所述的方法,其中,所述根据所述频段锁定指令锁定目标注册网络所期望锁定的频段的步骤包括:
    检查锁频持久性标志是否为第一标志;
    若是第一标志,则锁定该目标注册网络所期望锁定的频段。
  21. 如权利要求19所述的方法,其中,所述根据所述频段锁定指令锁定目标注册网络所期望锁定的频段的步骤包括:
    检查锁频持久性标志是否为第二标志;
    若是第二标志,则锁定该目标注册网络所期望锁定的频段,并通过第一定时器检查锁定该频段的时间是否超过所述第二标志设定的第一周期时间;
    若超过所述第一周期时间,则将频段恢复至本移动终端开机时的初始值,并将SIM卡中的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值均恢复到开机时的初始值。
  22. 如权利要求19所述的方法,其中,所述根据所述频段锁定指令锁定目标注册网络所期望锁定的频段的步骤包括:
    检查锁频持久性标志是否为第三标志;
    若是第三标志,则通过第二定时器以流量监控周期对本移动终端的流量进行监测;
    若监测到在流量监控周期内本移动终端的流量小于流量监控门限值,则进一步统计在流量监控周期内流量小于流量监控门限值的次数;
    若次数大于第一预设值,则锁定该目标注册网络所期望锁定的频段,并将与该目标注册网络对应的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值保存至SIM卡中;
    若次数小于第一预设值,则执行所述第二定时器以流量监控周期对本移动终端的流量进行监测的步骤。
  23. 如权利要求22所述的方法,其中,所述通过第二定时器以流量监控周期对本移动终端的流量进行监测的步骤之后,还包括:
    若监测到在流量监控周期内本移动终端的流量大于流量监控门限值,则判断本移动终端SIM卡中的期望锁定频段的网络标识是否与其它网络的标识相 同;
    若相同,则执行所述第二定时器以流量监控周期对本移动终端的流量进行监测的步骤;
    若不相同,则将频段恢复至本移动终端开机时的初始值,并将SIM卡中的期望锁定频段、期望锁定频段的网络标识、频段锁定标志、锁频持久性标志、流量监控周期以及流量监控门限值恢复到开机时的初始值。
  24. 一种频段锁定的装置,应用于一移动终端,所述装置包括:
    第二发送模块,设置为向网络侧的目标注册网络发送注册请求,所述注册请求中携带本移动终端的国际识别码IMEI号,使网络侧根据IMEI号生成频段锁定指令;
    接收模块,设置为接收网络侧发送的频段锁定指令;
    锁定模块,设置为根据所述频段锁定指令锁定目标注册网络所期望锁定的频段。
  25. 一种频段锁定的***,包括如权利要求10~13任一项所述的应用于网络侧的频段锁定的装置以及如权利要求24所述的应用于一移动终端的频段锁定的装置。
PCT/CN2015/089805 2015-04-07 2015-09-16 一种频段锁定的方法、装置及*** WO2016161772A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510160201.2 2015-04-07
CN201510160201.2A CN106162655A (zh) 2015-04-07 2015-04-07 一种频段锁定的方法、装置及***

Publications (1)

Publication Number Publication Date
WO2016161772A1 true WO2016161772A1 (zh) 2016-10-13

Family

ID=57073025

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/089805 WO2016161772A1 (zh) 2015-04-07 2015-09-16 一种频段锁定的方法、装置及***

Country Status (2)

Country Link
CN (1) CN106162655A (zh)
WO (1) WO2016161772A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113873598A (zh) * 2021-10-15 2021-12-31 迈普通信技术股份有限公司 网络切换方法、装置、网络设备及存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110139297B (zh) * 2019-05-05 2022-11-04 深圳市万普拉斯科技有限公司 频段锁定方法、装置、计算机设备和存储介质
CN116095843A (zh) * 2022-12-20 2023-05-09 合肥途鸽科技有限公司 一种上行链路优化方法和***

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937824A (zh) * 2005-09-20 2007-03-28 华为技术有限公司 一种移动通信***的频率分配方法
CN101137223A (zh) * 2007-09-21 2008-03-05 华为技术有限公司 一种基站、多频段网络中的频段负荷的调整方法及***
CN102547860A (zh) * 2012-03-02 2012-07-04 中兴通讯股份有限公司 一种多频段网络的负荷均衡方法和***
CN102835140A (zh) * 2010-04-08 2012-12-19 高通股份有限公司 用于确定和指派用于无线通信的频谱的方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937824A (zh) * 2005-09-20 2007-03-28 华为技术有限公司 一种移动通信***的频率分配方法
CN101137223A (zh) * 2007-09-21 2008-03-05 华为技术有限公司 一种基站、多频段网络中的频段负荷的调整方法及***
CN102835140A (zh) * 2010-04-08 2012-12-19 高通股份有限公司 用于确定和指派用于无线通信的频谱的方法和装置
CN102547860A (zh) * 2012-03-02 2012-07-04 中兴通讯股份有限公司 一种多频段网络的负荷均衡方法和***

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113873598A (zh) * 2021-10-15 2021-12-31 迈普通信技术股份有限公司 网络切换方法、装置、网络设备及存储介质
CN113873598B (zh) * 2021-10-15 2024-04-12 迈普通信技术股份有限公司 网络切换方法、装置、网络设备及存储介质

Also Published As

Publication number Publication date
CN106162655A (zh) 2016-11-23

Similar Documents

Publication Publication Date Title
US10880747B2 (en) Network slice allocation method, device, and system
US11451950B2 (en) Indirect registration method and apparatus
US10798082B2 (en) Network authentication triggering method and related device
US11510052B2 (en) Identity information processing method, device, and system
KR20180030034A (ko) 암호화된 클라이언트 디바이스 컨텍스트들에 의한 네트워크 아키텍처 및 보안
US9191771B2 (en) Convenient use of push button mode of WPS (Wi-Fi protected setup) for provisioning wireless devices
US7653036B2 (en) Method and system for automatic registration security
CN107094127B (zh) 安全信息的处理方法及装置、获取方法及装置
EP4099733A1 (en) Security authentication method and apparatus, and electronic device
EP3177076B1 (en) Wireless network access control method, device and system
AU2019383599B9 (en) Method, apparatus, and system for obtaining capability information of terminal
US9930556B2 (en) Method for detecting coverage of target network, and apparatus
US20140082728A1 (en) Dongle device for wireless intrusion prevention
US20190215690A1 (en) Processing Method for Terminal Access to 3GPP Network and Apparatus
CN107295511B (zh) Wlan终端、基站及lte网络向wlan网络的切换控制方法
CN105744596B (zh) 一种WiFi设备入网的方法和装置
US9948628B2 (en) Method for enabling lawful interception by providing security information
WO2016161772A1 (zh) 一种频段锁定的方法、装置及***
WO2016209382A1 (en) Reducing re-association time for sta connected to ap
US11323282B2 (en) Apparatus, system, method, and computer-readable recording media for onboarding of a wireless extender in a wireless network
CN107371197B (zh) 一种切换方法和基站
US7996664B2 (en) Method and system for improved communication network setup
CN107548058B (zh) 设备接入方法和智能终端
CN111770488B (zh) Ehplmn更新方法、相关设备及存储介质
CN111132167B (zh) 5g用户终端接入5g网络的方法、用户终端设备及介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15888324

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15888324

Country of ref document: EP

Kind code of ref document: A1