WO2020042009A1 - 接入控制限制方法及装置 - Google Patents

接入控制限制方法及装置 Download PDF

Info

Publication number
WO2020042009A1
WO2020042009A1 PCT/CN2018/102941 CN2018102941W WO2020042009A1 WO 2020042009 A1 WO2020042009 A1 WO 2020042009A1 CN 2018102941 W CN2018102941 W CN 2018102941W WO 2020042009 A1 WO2020042009 A1 WO 2020042009A1
Authority
WO
WIPO (PCT)
Prior art keywords
restriction
call category
call
access control
access
Prior art date
Application number
PCT/CN2018/102941
Other languages
English (en)
French (fr)
Inventor
李艳华
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2018/102941 priority Critical patent/WO2020042009A1/zh
Priority to CN201880001858.6A priority patent/CN109196917B/zh
Priority to US17/270,420 priority patent/US11924744B2/en
Priority to CN202111212071.4A priority patent/CN113873614B/zh
Publication of WO2020042009A1 publication Critical patent/WO2020042009A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • H04B17/327Received signal code power [RSCP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0215Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices
    • H04W28/0221Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices power availability or consumption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular, to an access control restriction method and device.
  • the working mechanism of AC (Access Control) restriction is based on the access level (Access Class) of the terminal and the type of call (Call Type) initiated by the terminal. Obtain the corresponding access control restriction parameters, and make an access control restriction decision (AC check).
  • NB-IOT Nearband Internet of Things
  • eMTC enhanced Machine Type of Communication
  • embodiments of the present disclosure provide an access control restriction method and device.
  • an access control restriction method is provided.
  • the method is used for a terminal, and the method includes:
  • the specified call category restriction includes a first call category that is allowed to access and / or a second call category that is not allowed to access.
  • the first call category and / or the second call category are determined based on at least one of the following:
  • the determining the specified call category restriction for the access control restriction includes:
  • the specified call category restrictions for access control restrictions are determined according to the set rules.
  • the setting rule is prescribed by a communication protocol or written in the terminal in a form of firmware.
  • the setting rule is notified by the base station to the terminal through a system message or dedicated signaling;
  • the determining a specified call category restriction for access control restriction according to a set rule includes:
  • the terminal determines a designated call category restriction for access control restriction according to the setting rule included in the dedicated signaling;
  • the terminal determines a specified call category restriction for access control restriction according to the setting rule included in the system message.
  • system message or dedicated signaling further includes a valid time and / or a valid area using the set rule
  • the determining a specified call category restriction for access control restriction according to a set rule includes:
  • the designated call category restriction for the access control restriction is determined according to the setting rule.
  • the dedicated signaling includes a message used to notify the terminal to suspend.
  • the specified call category restriction includes one or more first call categories that are allowed to access;
  • the performing access control restriction according to the specified call category restriction includes:
  • the specified call category restriction includes one or more second call categories for which access is prohibited;
  • the performing access control restriction according to the specified call category restriction includes:
  • Access to the second call category is prohibited, and access to other call categories than the second call category is allowed.
  • the specified call category restriction includes one or more first call categories that are allowed to access and one or more second call categories that are prohibited from being accessed;
  • the performing access control restriction according to the specified call category restriction includes:
  • the performing access control restriction according to the specified call category restriction further includes:
  • the reference signal received power RSRP decision is not required for the first call category and is directly regarded as passed.
  • the performing access control restriction according to the specified call category restriction further includes:
  • an access control restriction device is provided.
  • the device is used for a terminal.
  • the device includes:
  • a determining module configured to determine a designated call category restriction for access control restrictions
  • the restriction module is configured to perform access control restriction according to the specified call category restriction.
  • the specified call category restriction includes a first call category that is allowed to access and / or a second call category that is not allowed to access.
  • the first call category and / or the second call category are determined based on at least one of the following:
  • the determining module includes:
  • the first determining submodule is configured to determine a specified call category restriction for access control restriction according to a set rule.
  • the setting rule is prescribed by a communication protocol or written in the terminal in a form of firmware.
  • the setting rule is notified by the base station to the terminal through a system message or dedicated signaling;
  • the first determining submodule includes:
  • the second determining submodule is configured to determine, when the dedicated signaling includes the setting rule, the terminal determines an access control restriction according to the setting rule included in the dedicated signaling. Specify call category restrictions;
  • the third determining submodule is configured to determine, when the dedicated signaling does not include the setting rule, the terminal determines, according to the setting rule included in the system message, the access control restriction Specify call category restrictions.
  • system message or dedicated signaling further includes a valid time and / or a valid area using the set rule;
  • the first determining submodule includes:
  • a fourth determining sub-module is configured to determine a specified call category restriction for access control restriction according to the setting rule within an effective time and / or effective area of the setting rule.
  • the dedicated signaling includes a message used to notify the terminal to suspend.
  • the specified call category restriction includes one or more first call categories allowed to be accessed; the restriction module includes:
  • the first restriction sub-module is configured to allow access to the first call category and prohibit access to other call categories than the first call category.
  • the designated call category restriction includes one or more second call categories for which access is prohibited; the restriction module includes:
  • the second restriction submodule is configured to prohibit access to the second call category and allow access to other call categories than the second call category.
  • the specified call category restriction includes one or more first call categories that are allowed to access and one or more second call categories that are forbidden to access;
  • the restriction module includes:
  • a third restriction sub-module is configured to allow access to the first call category and prohibit access to the second call category.
  • the restriction module further includes:
  • the fourth restriction sub-module is configured to directly pass the reference signal received power RSRP decision for the first call category without being judged.
  • the restriction module further includes:
  • a fifth restriction sub-module is configured to directly treat the second call category as being prohibited without an RSRP decision.
  • a non-transitory computer-readable storage medium stores a computer program, and the computer program is configured to execute the access control restriction method according to the first aspect .
  • an access control restriction device is provided.
  • the device is used for a terminal.
  • the device includes:
  • Memory for storing processor-executable instructions
  • the processor is configured to:
  • the terminal of the present disclosure may first determine the designated call category restriction for the access control restriction, and then perform the access control restriction according to the designated call category restriction, so that the designated call category restriction may be added to the access control restriction mechanism in the enhanced coverage scenario. Therefore, the granularity of the access control restriction is refined, and the accuracy of the access control restriction is also improved.
  • Fig. 1 is a flow chart showing a method for restricting access control according to an exemplary embodiment
  • Fig. 2 is an application scenario diagram of an access control restriction method according to an exemplary embodiment
  • Fig. 3 is a flow chart showing another method for restricting access control according to an exemplary embodiment
  • Fig. 4 is a flow chart showing another method for restricting access control according to an exemplary embodiment
  • Fig. 5 is a flow chart showing another method for restricting access control according to an exemplary embodiment
  • Fig. 6 is a flow chart showing another method for restricting access control according to an exemplary embodiment
  • Fig. 7 is a block diagram showing an access control restriction device according to an exemplary embodiment
  • Fig. 8 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 9 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment.
  • Fig. 10 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 11 is a block diagram of another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 12 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 13 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 14 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 15 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 16 is a schematic structural diagram of an access control restriction device according to an exemplary embodiment.
  • the terms first, second, third, etc. may be used in this disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • the indication information may also be referred to as second information, and similarly, the second information may also be referred to as indication information.
  • the word “if” as used herein can be interpreted as “at” or "when” or "in response to determination”.
  • Fig. 1 is a flowchart illustrating an access control restriction method according to an exemplary embodiment
  • Fig. 2 is an application scenario diagram of an access control restriction method according to an exemplary embodiment
  • the access control restriction The method may be applied to a terminal, and the terminal may be a UE (User Equipment); as shown in FIG. 1, the access control restriction method may include the following steps 110-120:
  • step 110 a designated call category restriction for access control restrictions is determined.
  • the AC restriction mechanism is introduced for enhanced coverage scenarios such as NB-IOT and eMTC.
  • the purpose is to limit users whose cell edges are in enhanced coverage.
  • AC restriction mechanisms in enhanced coverage scenarios are restricted from coverage enhancement level (CE level).
  • the AC restriction mechanism in the enhanced coverage scenario is restricted from a certain RSRP threshold (bar). That is, if the terminal is below the RSRP threshold, it will be barred.
  • the disclosure also needs to consider a finer AC restriction granularity when restricting (bar) from an RSRP threshold, that is, to add a specified call category to the AC restriction mechanism in the enhanced coverage scenario. limit.
  • determining the designated call category restriction may refer to determining which call categories are allowed call categories and which call categories are prohibited call categories.
  • the designated call category restriction may include a first call category that is allowed to access and / or a second call category that is not allowed to access. That is, the specified call category restrictions can include any of the following situations:
  • Case 1 the first call category
  • Case 2 The second call category
  • Case 3 First call category and second call category.
  • the first call category and / or the second call category may be determined based on at least one of the following:
  • the first call category may be determined based on the first designated call category
  • the second call category may be determined based on the second designated call category.
  • the first designated call category is originating signaling
  • the second designated call category is originating callings.
  • the designated access level may be AC0-9 or AC11-15.
  • AC0-9 can be ordinary users
  • AC11-15 can be high-priority users.
  • the prohibition of all call categories may refer to: all call categories will be set to a second category of calls that are prohibited, that is, no first call category that is allowed to access.
  • step 120 the access control is restricted according to the designated call category restriction.
  • the restriction of the designated call category may include only the first call category, or only the second call category, and may also include the first call category and the second call category
  • the terminal is performing access control When restricted, the corresponding access control restrictions can be made according to the different content included in the specified call category restriction.
  • a base station and a terminal are included.
  • enhanced coverage scenarios such as: NB-IOT or eMTC
  • the terminal when the terminal performs access control restrictions, it can first determine the specified call category restrictions for the access control restrictions, and then perform the access control restrictions based on the specified call category restrictions. That is, the corresponding access control restriction may be performed according to different contents included in the specified call category restriction.
  • the specified call category restriction for access control restriction can be determined first, and then the access control restriction is performed according to the specified call category restriction, so that the specified call can be added to the access control restriction mechanism in the enhanced coverage scenario.
  • Category restriction which refines the granularity of access control restrictions and improves the accuracy of access control restrictions.
  • Fig. 3 is a flowchart illustrating another access control restriction method according to an exemplary embodiment.
  • the access control restriction method may be applied to a terminal, and based on the method shown in Fig. 1, when step 110 is performed, As shown in FIG. 3, it may include the following steps 310:
  • a designated call category restriction for access control restriction is determined according to a set rule.
  • the setting rule may be a rule for determining a specified call category restriction for access control restriction. That is, the terminal can determine which call types are allowed call types and which call types are prohibited access types according to the setting rule.
  • the setting rules including but not limited to the following three ways:
  • Manner 1 The setting rule is prescribed by a communication protocol or written in the terminal in the form of firmware.
  • Manner 2 The setting rule is notified by the base station to the terminal through a system message or dedicated signaling.
  • the dedicated signaling may include signaling for notifying the terminal to suspend, such as an RRC (Radio Resource Control) connection release message.
  • RRC Radio Resource Control
  • step 310 the method may include:
  • the terminal determines a designated call category restriction for access control restriction according to the setting rule included in the dedicated signaling ;
  • the terminal determines a specified call category restriction for access control restriction according to the setting rule included in the system message .
  • Manner 3 In addition to the contents in Manner 2, the system message or the dedicated signaling may further include a valid time and / or a valid area using the setting rule.
  • step 310 the method may include:
  • a designated call category restriction for access control restriction is determined according to the setting rule.
  • the valid time may be a system appointment or a network configuration, for example, within 300 seconds.
  • the effective area can also be system-approved or network-configured. If it is system-approved, it can be limited to the cell and / or RAN-based Notification Area (RNA) and / or tracking area ( Tracking Area (TA); if configured by the network, a cell list and / or a RAN-based notification area list and / or a tracking area list may be configured.
  • RNA RAN-based Notification Area
  • TA Tracking Area
  • RAN is an abbreviation for Radio Access Network (Radio Access Network).
  • the designated call category restriction for access control restriction can be determined according to the setting rule, and then the access control restriction is performed according to the designated call category restriction, thereby improving the reliability of determining the designated call category restriction.
  • Fig. 4 is a flowchart illustrating another access control restriction method according to an exemplary embodiment.
  • the access control restriction method may be applied to a terminal, and based on the method shown in Fig. 1, the specified call category
  • the restriction includes one or more first call categories that are allowed to access; when step 120 is performed, as shown in FIG. 4, the following step 410 may be included:
  • step 410 access to the first call category is permitted, and access to other call categories than the first call category is prohibited.
  • step 410 the method may further include the following step 420:
  • step 420 no RSRP decision is required for the first call category, and it is directly regarded as passing.
  • the first call category is a call type that is allowed to be accessed, there is no need to perform subsequent RSRP judgment and it is directly regarded as passing.
  • access to the first call category can be allowed, access to other call categories other than the first call category can be prohibited, and the first call category is directly regarded as passing without the need for an RSRP decision, thereby improving access.
  • Access control limits the accuracy and efficiency.
  • Fig. 5 is a flowchart illustrating another access control restriction method according to an exemplary embodiment.
  • the access control restriction method may be applied to a terminal, and based on the method shown in Fig. 1, the specified call category is shown.
  • the restriction includes one or more second call categories for which access is forbidden.
  • step 120 is performed, as shown in FIG. 5, the following step 510 may be included:
  • step 510 access to the second call category is prohibited, and access to call categories other than the second call category is allowed.
  • the method may further include the following step 520:
  • step 520 RSRP judgment is not required for the second call category and is directly regarded as prohibited.
  • the second call category is a call type for which access is prohibited, it is not necessary to perform subsequent RSRP judgments, and it is directly regarded as prohibited.
  • access to the second call category can be prohibited, access to other call categories other than the second call category can be allowed, and the second call category can be directly regarded as barred without RSRP judgment, thereby improving access.
  • Access control limits the accuracy and efficiency.
  • Fig. 6 is a flowchart illustrating another access control restriction method according to an exemplary embodiment.
  • the access control restriction method may be applied to a terminal, and based on the method shown in Fig. 1, the specified call category is shown.
  • the restriction includes one or more first call categories that are allowed to access and one or more second call categories that are forbidden to access; when step 120 is performed, as shown in FIG. 6, the following step 610 may be included:
  • step 610 access to the first call category is permitted, and access to the second call category is prohibited.
  • steps 620-630 may be further included:
  • step 620 the first call category does not need to be subjected to RSRP judgment and is directly regarded as passing.
  • the first call category is a call type that is allowed to be accessed, there is no need to perform subsequent RSRP judgment and it is directly regarded as passing.
  • step 630 the RSRP decision is not required for the second call category and is directly regarded as prohibited.
  • the second call category is a call type for which access is prohibited, it is not necessary to perform subsequent RSRP judgments, and it is directly regarded as prohibited.
  • the present disclosure also provides an embodiment of the access control restriction device.
  • Fig. 7 is a block diagram of an access control restriction device according to an exemplary embodiment.
  • the device is used for a terminal and is used to execute the access control restriction method shown in Fig. 1.
  • the access The control limitation device may include:
  • a determining module 71 configured to determine a designated call category restriction for access control restrictions
  • the restriction module 72 is configured to perform access control restriction according to the specified call category restriction.
  • the designated call category restriction for access control restriction can be determined first, and then the access control restriction is performed according to the designated call category restriction, so that the designated control can be added to the access control restriction mechanism in the enhanced coverage scenario.
  • Call category restrictions which refine the granularity of access control restrictions and improve the accuracy of access control restrictions.
  • the specified call category restriction includes a first call category that is allowed to access and / or a second call category that is not allowed to access.
  • the first call category and / or the second call category are determined based on at least one of the following:
  • the determining module 71 may include:
  • the first determination sub-module 81 is configured to determine a specified call category restriction for access control restriction according to a set rule.
  • the designated call category restriction for access control restriction can be determined according to the setting rule, and then the access control restriction is performed according to the designated call category restriction, thereby improving the reliability of determining the designated call category restriction.
  • the setting rule is specified by a communication protocol or written in the terminal in the form of firmware.
  • the setting rule is notified by the base station to the terminal through a system message or dedicated signaling; as shown in FIG. 9, the first determining sub-module 81 Can include:
  • the second determining submodule 91 is configured to, when the dedicated signaling includes the setting rule, the terminal determines to be used for the access control restriction according to the setting rule included in the dedicated signaling. Restrictions on the specified call categories;
  • the third determining sub-module 92 is configured to, when the dedicated signaling does not include the setting rule, the terminal determines to use the access control restriction according to the setting rule included in the system message. Restrictions for the specified call category.
  • the system message or dedicated signaling further includes a valid time and / or valid area using the setting rule; as shown in FIG. 10, the The first determining sub-module 81 includes:
  • the fourth determining sub-module 101 is configured to determine a specified call category restriction for access control restriction according to the setting rule within the valid time and / or valid area of the setting rule.
  • the dedicated signaling may include a message for notifying the terminal to suspend.
  • the specified call category restriction includes one or more first call categories that are allowed to access; as shown in FIG. 11, the restriction module 72 may include:
  • the first restriction submodule 111 is configured to allow access to the first call category and prohibit access to other call categories than the first call category.
  • access to the first call category can be allowed, access to other call categories other than the first call category can be prohibited, and the first call category is directly regarded as passing without the need for an RSRP decision, thereby improving access.
  • Access control limits the accuracy and efficiency.
  • the designated call category restriction includes one or more second call categories for which access is prohibited; as shown in FIG. 12, the restriction module 72 may include:
  • the second restriction sub-module 121 is configured to prohibit access to the second call category and allow access to call categories other than the second call category.
  • access to the second call category can be prohibited, access to other call categories other than the second call category can be allowed, and the second call category can be directly regarded as barred without RSRP judgment, thereby improving access.
  • Access control limits the accuracy and efficiency.
  • the specified call category restriction includes one or more first call categories that are allowed to access and one or more second call categories that are forbidden to access.
  • Call category as shown in FIG. 13, the restriction module 72 may include:
  • the third restriction sub-module 131 is configured to allow access to the first call category and prohibit access to the second call category.
  • the restriction module 72 may further include:
  • the fourth restriction sub-module 141 is configured to directly pass the reference signal received power RSRP decision for the first call category without passing.
  • the restriction module 72 may further include:
  • the fifth restriction sub-module 151 is configured to directly treat the second call category as a prohibition without an RSRP decision.
  • the relevant part may refer to the description of the method embodiment.
  • the device embodiments described above are only schematic, in which the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, may be located in one Place, or can be distributed across multiple network elements. Some or all of the modules can be selected according to actual needs to achieve the objectives of the solution of the present disclosure. Those of ordinary skill in the art can understand and implement without creative efforts.
  • the present disclosure also provides a non-transitory computer-readable storage medium.
  • a computer program is stored on the storage medium, and the computer program is used to execute the access control restriction method described in any one of FIG.
  • the present disclosure also provides an access control restriction device.
  • the device is used for a terminal.
  • the device includes:
  • Memory for storing processor-executable instructions
  • the processor is configured to:
  • Fig. 16 is a schematic structural diagram of an access control restriction device according to an exemplary embodiment.
  • an access control restriction device 1600 is shown according to an exemplary embodiment.
  • the device 1600 may be a computer, a mobile phone, a digital broadcast terminal, a messaging device, a game console, a tablet device, or a medical device. , Fitness equipment, personal digital assistants and other terminals.
  • the device 1600 may include one or more of the following components: a processing component 1601, a memory 1602, a power component 1603, a multimedia component 1604, an audio component 1605, an input / output (I / O) interface 1606, a sensor component 1607, And communication component 1608.
  • a processing component 1601 a memory 1602, a power component 1603, a multimedia component 1604, an audio component 1605, an input / output (I / O) interface 1606, a sensor component 1607, And communication component 1608.
  • the processing component 1601 generally controls overall operations of the device 1600, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • the processing component 1601 may include one or more processors 1609 to execute instructions to complete all or part of the steps of the method described above.
  • the processing component 1601 may include one or more modules to facilitate interaction between the processing component 1601 and other components.
  • the processing component 1601 may include a multimedia module to facilitate the interaction between the multimedia component 1604 and the processing component 1601.
  • the memory 1602 is configured to store various types of data to support operation at the device 1600. Examples of such data include instructions for any application or method operating on the device 1600, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 1602 may be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), Programming read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM Programming read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory
  • flash memory magnetic disk or optical disk.
  • the power supply component 1603 provides power to various components of the device 1600.
  • the power supply component 1603 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the device 1600.
  • the multimedia component 1604 includes a screen that provides an output interface between the device 1600 and a user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user.
  • the touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or slide action, but also detect duration and pressure related to the touch or slide operation.
  • the multimedia component 1604 includes a front camera and / or a rear camera. When the device 1600 is in an operation mode, such as a shooting mode or a video mode, the front camera and / or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 1605 is configured to output and / or input audio signals.
  • the audio component 1605 includes a microphone (MIC) that is configured to receive an external audio signal when the device 1600 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in the memory 1602 or transmitted via the communication component 1608.
  • the audio component 1605 further includes a speaker for outputting audio signals.
  • the I / O interface 1606 provides an interface between the processing component 1601 and a peripheral interface module.
  • the peripheral interface module may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
  • the sensor assembly 1607 includes one or more sensors for providing status assessment of various aspects of the device 1600.
  • the sensor component 1607 can detect the on / off state of the device 1600 and the relative positioning of the components, such as the display and keypad of the device 1600.
  • the sensor component 1607 can also detect the change in the position of the device 1600 or a component of the device 1600 , The presence or absence of the user's contact with the device 1600, the orientation or acceleration / deceleration of the device 1600, and the temperature change of the device 1600.
  • the sensor component 1607 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • the sensor component 1607 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1607 may further include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • the communication component 1608 is configured to facilitate wired or wireless communication between the device 1600 and other devices.
  • the device 1600 can access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof.
  • the communication component 1608 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel.
  • the communication component 1608 further includes a near field communication (NFC) module to facilitate short-range communication.
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra wideband
  • Bluetooth Bluetooth
  • the device 1600 may be implemented by one or more application-specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component is implemented to perform the above method.
  • ASICs application-specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor, or other electronic component is implemented to perform the above method.
  • a non-transitory computer-readable storage medium including instructions such as a memory 1602 including instructions, may be executed by the processor 1609 of the device 1600 to complete the foregoing method.
  • the non-transitory computer-readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
  • the device 1600 when the instructions in the storage medium are executed by the processor, the device 1600 is enabled to execute any one of the access control restriction methods described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

本公开提供一种接入控制限制方法及装置,所述方法用于终端,所述方法包括:确定用于接入控制限制的指定呼叫类别限制;根据所述指定呼叫类别限制进行接入控制限制。因此,本公开可以为增强覆盖场景下的接入控制限制机制附加指定的呼叫类别限制,从而细化了接入控制限制粒度,还提高了接入控制限制的准确性。

Description

接入控制限制方法及装置 技术领域
本公开涉及通信技术领域,尤其涉及一种接入控制限制方法及装置。
背景技术
在LTE(Long Term Evolution,长期演进)通信***中,AC(Access Control,接入控制)限制的工作机制是:根据终端的接入等级(Access Class)以及终端发起的呼叫类型(Call Type)来获取相应的接入控制限制参数,进行接入控制限制判决(AC barring check)。
对于NB-IOT(窄带物联网Narrow Band Internet of Things,NB-IoT)和eMTC(enhanced Machine Type of Communication,增强的机器类型通信)的增强覆盖场景中,也引入了AC限制机制,但还没有针对该增强覆盖场景进行接入控制限制的优化方案。
发明内容
为克服相关技术中存在的问题,本公开实施例提供一种接入控制限制方法及装置。
根据本公开实施例的第一方面,提供一种接入控制限制方法,所述方法用于终端,所述方法包括:
确定用于接入控制限制的指定呼叫类别限制;
根据所述指定呼叫类别限制进行接入控制限制。
可选地,所述指定呼叫类别限制中包括被允许接入的第一呼叫类别和/或被禁止接入的第二呼叫类别。
可选地,所述第一呼叫类别和/或所述第二呼叫类别是基于以下至少一项进行确定的:
指定呼叫类别;
指定接入等级;
所有呼叫类别被禁止。
可选地,所述确定用于接入控制限制的指定呼叫类别限制,包括:
按照设定规则确定用于接入控制限制的指定呼叫类别限制。
可选地,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
可选地,所述设定规则是基站通过***消息或专用信令通知所述终端的;
所述按照设定规则确定用于接入控制限制的指定呼叫类别限制,包括:
当所述专用信令中包括所述设定规则时,则所述终端根据所述专用信令中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制;
当所述专用信令中不包括所述设定规则时,则所述终端根据所述***消息中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制。
可选地,所述***消息或专用信令中还包括使用所述设定规则的有效时间和/或有效地区;
所述按照设定规则确定用于接入控制限制的指定呼叫类别限制,包括:
在所述设定规则的有效时间和/或有效地区内,按照设定规则确定用于接入控制限制的指定呼叫类别限制。
可选地,所述专用信令包括用于通知所述终端挂起的消息。
可选地,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别;
所述根据所述指定呼叫类别限制进行接入控制限制,包括:
允许接入所述第一呼叫类别,禁止接入所述第一呼叫类别之外的其他呼叫类别。
可选地,所述指定呼叫类别限制中包括一个或多个被禁止接入的第二呼叫类别;
所述根据所述指定呼叫类别限制进行接入控制限制,包括:
禁止接入所述第二呼叫类别,允许接入所述第二呼叫类别之外的其他呼叫类别。
可选地,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别、和一个或多个被禁止接入的第二呼叫类别;
所述根据所述指定呼叫类别限制进行接入控制限制,包括:
允许接入所述第一呼叫类别,禁止接入所述第二呼叫类别。
可选地,所述根据所述指定呼叫类别限制进行接入控制限制,还包括:
对所述第一呼叫类别不需要进行参考信号接收功率RSRP判决而直接视为通过。
可选地,所述根据所述指定呼叫类别限制进行接入控制限制,还包括:
对所述第二呼叫类别不需要进行RSRP判决而直接视为禁止。
根据本公开实施例的第二方面,提供一种接入控制限制装置,所述装置用于终端,所述装置包括:
确定模块,被配置为确定用于接入控制限制的指定呼叫类别限制;
限制模块,被配置为根据所述指定呼叫类别限制进行接入控制限制。
可选地,所述指定呼叫类别限制中包括被允许接入的第一呼叫类别和/或被禁止接入的第二呼叫类别。
可选地,所述第一呼叫类别和/或所述第二呼叫类别是基于以下至少一项进行确定的:
指定呼叫类别;
指定接入等级;
所有呼叫类别被禁止。
可选地,所述确定模块包括:
第一确定子模块,被配置为按照设定规则确定用于接入控制限制的指定呼叫类别限制。
可选地,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
可选地,所述设定规则是基站通过***消息或专用信令通知所述终端的;所述第一确定子模块包括:
第二确定子模块,被配置为当所述专用信令中包括所述设定规则时,则所述终端根据所述专用信令中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限 制;
第三确定子模块,被配置为当所述专用信令中不包括所述设定规则时,则所述终端根据所述***消息中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制。
可选地,所述***消息或专用信令中还包括使用所述设定规则的有效时间和/或有效地区;所述第一确定子模块包括:
第四确定子模块,被配置为在所述设定规则的有效时间和/或有效地区内,按照设定规则确定用于接入控制限制的指定呼叫类别限制。
可选地,所述专用信令包括用于通知所述终端挂起的消息。
可选地,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别;所述限制模块包括:
第一限制子模块,被配置为允许接入所述第一呼叫类别,禁止接入所述第一呼叫类别之外的其他呼叫类别。
可选地,所述指定呼叫类别限制中包括一个或多个被禁止接入的第二呼叫类别;所述限制模块包括:
第二限制子模块,被配置为禁止接入所述第二呼叫类别,允许接入所述第二呼叫类别之外的其他呼叫类别。
可选地,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别、和一个或多个被禁止接入的第二呼叫类别;所述限制模块包括:
第三限制子模块,被配置为允许接入所述第一呼叫类别,禁止接入所述第二呼叫类别。
可选地,所述限制模块还包括:
第四限制子模块,被配置为对所述第一呼叫类别不需要进行参考信号接收功率RSRP判决而直接视为通过。
可选地,所述限制模块还包括:
第五限制子模块,被配置为对所述第二呼叫类别不需要进行RSRP判决而直接视为禁止。
根据本公开实施例的第三方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第一方面所述的接入控制限制方法。
根据本公开实施例的第四方面,提供一种接入控制限制装置,所述装置用于终端,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
确定用于接入控制限制的指定呼叫类别限制;
根据所述指定呼叫类别限制进行接入控制限制。
本公开的实施例提供的技术方案可以包括以下有益效果:
本公开的终端可以先确定用于接入控制限制的指定呼叫类别限制,再根据指定呼叫类别限制进行接入控制限制,这样可以为增强覆盖场景下的接入控制限制机制附加指定的呼叫类别限制,从而细化了接入控制限制粒度,还提高了接入控制限制的准确性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1是根据一示例性实施例示出的一种接入控制限制方法的流程图;
图2是根据一示例性实施例示出的一种接入控制限制方法的应用场景图;
图3是根据一示例性实施例示出的另一种接入控制限制方法的流程图;
图4是根据一示例性实施例示出的另一种接入控制限制方法的流程图;
图5是根据一示例性实施例示出的另一种接入控制限制方法的流程图;
图6是根据一示例性实施例示出的另一种接入控制限制方法的流程图;
图7是根据一示例性实施例示出的一种接入控制限制装置的框图;
图8是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图9是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图10是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图11是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图12是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图13是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图14是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图15是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图16是根据一示例性实施例示出的一种接入控制限制装置的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法。
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,指示信息也可以被称为第二信息,类似地,第二信息也可以被称为指示信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
图1是根据一示例性实施例示出的一种接入控制限制方法的流程图,图2是根据一示例性实施例示出的一种接入控制限制方法的应用场景图;该接入控制限制方法可以用于终端,该终端可以为UE(User Equipment,用户设备);如图1所示,该接入 控制限制方法可以包括以下步骤110-120:
在步骤110中,确定用于接入控制限制的指定呼叫类别限制。
在新一代通信***中,对于NB-IOT、eMTC等增强覆盖场景引入AC限制机制,其目的是限制小区边缘处于覆盖增强的用户。并且,增强覆盖场景下的AC限制机制都是从覆盖增强等级(Coverage Enhancement Level,CE level)进行限制(bar)。
由于覆盖增强等级的划分是和RSRP(Reference Signal Receiving Power,参考信号接收功率)相关的,因此可以理解为,增强覆盖场景下的AC限制机制都是从某个RSRP门限进行限制(bar)。也就是说,若终端低于该RSRP门限,则将会被限制(bar)。为了优化增强覆盖场景的AC限制机制,本公开在从某个RSRP门限进行限制(bar)时,还需要考虑更细的AC限制粒度,即为增强覆盖场景下的AC限制机制附加指定的呼叫类别限制。
本公开实施例中,确定指定呼叫类别限制可以指的是确定哪些呼叫类别为允许接入的呼叫类别,哪些呼叫类别为禁止接入的呼叫类别。
在一实施例中,指定呼叫类别限制中可以包括被允许接入的第一呼叫类别和/或被禁止接入的第二呼叫类别。也就是说,指定呼叫类别限制中可以包括以下任意一种情形:
情形一:第一呼叫类别;
情形二:第二呼叫类别;
情形三:第一呼叫类别和第二呼叫类别。
在一实施例中,所述第一呼叫类别和/或所述第二呼叫类别可以是基于以下至少一项进行确定的:
(1-1)指定呼叫类别(Call Type);
(1-2)指定接入等级(Access Class);
(1-3)所有呼叫类别被禁止。
上述(1-1)中,第一呼叫类别可以基于第一指定呼叫类别进行确定、第二呼叫类别可以基于第二指定呼叫类别进行确定。比如:第一指定呼叫类别为主叫信令(originating signalling),第二指定呼叫类别为主叫话音(originating calls)。
上述(1-2)中,指定接入等级可以为AC0-9或AC11-15。其中,AC0-9可以为普通用户,AC11-15可以为高优先级用户。
上述(1-3)中,所有呼叫类别被禁止可以指的是:所有呼叫类别都将被设置为被禁止的第二呼叫类别,即没有允许接入的第一呼叫类别。
在步骤120中,根据指定呼叫类别限制进行接入控制限制。
本公开实施例中,由于指定呼叫类别限制中可能只包括第一呼叫类别,也可能只包括第二呼叫类别,还可能包括第一呼叫类别和第二呼叫类别,所以,终端在进行接入控制限制时,可以根据指定呼叫类别限制中包括的不同内容进行对应的接入控制限制。
在一实例性场景中,如图2所示,包括基站和终端。在增强覆盖场景下,比如:NB-IOT或eMTC,终端在进行接入控制限制时,可以先确定用于接入控制限制的指定呼叫类别限制,再根据指定呼叫类别限制进行接入控制限制,也就是说,可以根据指定呼叫类别限制中包括的不同内容进行对应的接入控制限制。
由上述实施例可见,可以先确定用于接入控制限制的指定呼叫类别限制,再根据指定呼叫类别限制进行接入控制限制,这样可以为增强覆盖场景下的接入控制限制机制附加指定的呼叫类别限制,从而细化了接入控制限制粒度,还提高了接入控制限制的准确性。
图3是根据一示例性实施例示出的另一种接入控制限制方法的流程图,该接入控制限制方法可以用于终端,并建立图1所示方法的基础上,在执行步骤110时,如图3所示,可以包括以下步骤310:
在步骤310中,按照设定规则确定用于接入控制限制的指定呼叫类别限制。
本公开实施例中,设定规则可以是确定用于接入控制限制的指定呼叫类别限制的一个规则。也就是说,终端可以根据该设定规则确定哪些呼叫类别为允许接入的呼叫类别,哪些呼叫类别为禁止接入的呼叫类别。另外,获取设定规则的方式很多,包括但不限于以下三种方式:
方式一:所述设定规则是通信协议规定的、或以固件形式写在终端中的。
方式二:所述设定规则是基站通过***消息或专用信令通知所述终端的。在一实施例中,专用信令可以包括用于通知所述终端挂起的信令,比如:RRC(Radio  Resource Control,无线资源控制)连接释放消息。
此种方式下,在执行步骤310时,可以包括:
(2-1)当所述专用信令中包括所述设定规则时,则所述终端根据所述专用信令中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制;
(2-2)当所述专用信令中不包括所述设定规则时,则所述终端根据所述***消息中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制。
方式三:除了包括方式二中的内容之外,所述***消息或专用信令中还可以包括使用所述设定规则的有效时间和/或有效地区。
此种方式下,在执行步骤310时,可以包括:
(3-1)在所述设定规则的有效时间和/或有效地区内,按照所述设定规则确定用于接入控制限制的指定呼叫类别限制。
本公开实施例中,有效时间可以是***约定的或网络配置的,比如:300秒内。有效地区也可以是***约定的或网络配置的,若是***约定的,可以仅限定于连接释放时的小区和/或基于RAN的通知区域(RAN-based Notification Area,RNA)和/或跟踪区域(Tracking Area,TA);若是网络配置的,可以配置小区列表和/或基于RAN的通知区域列表和/或跟踪区域列表。其中,RAN为无线接入网(Radio Access Network)的简称。
由上述实施例可见,可以按照设定规则确定用于接入控制限制的指定呼叫类别限制,再根据指定呼叫类别限制进行接入控制限制,从而提高了确定指定呼叫类别限制的可靠性。
图4是根据一示例性实施例示出的另一种接入控制限制方法的流程图,该接入控制限制方法可以用于终端,并建立图1所示方法的基础上,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别;在执行步骤120时,如图4所示,可以包括以下步骤410:
在步骤410中,允许接入第一呼叫类别,禁止接入第一呼叫类别之外的其他呼叫类别。
在一实施例中,执行上述步骤410之后,还可以包括以下步骤420:
在步骤420中,对第一呼叫类别不需要进行RSRP判决而直接视为通过。
本公开实施例中,由于第一呼叫类别是被允许接入的呼叫类型,所以无需再进行后续的RSRP判决而直接视为通过。
由上述实施例可见,可以允许接入第一呼叫类别,禁止接入第一呼叫类别之外的其他呼叫类别,并对第一呼叫类别不需要进行RSRP判决而直接视为通过,从而提高了接入控制限制的准确性和效率。
图5是根据一示例性实施例示出的另一种接入控制限制方法的流程图,该接入控制限制方法可以用于终端,并建立图1所示方法的基础上,所述指定呼叫类别限制中包括一个或多个被禁止接入的第二呼叫类别;在执行步骤120时,如图5所示,可以包括以下步骤510:
在步骤510中,禁止接入第二呼叫类别,允许接入第二呼叫类别之外的其他呼叫类别。
在一实施例中,执行上述步骤510之后,还可以包括以下步骤520:
在步骤520中,对第二呼叫类别不需要进行RSRP判决而直接视为禁止。
本公开实施例中,由于第二呼叫类别是被禁止接入的呼叫类型,所以无需再进行后续的RSRP判决而直接视为禁止。
由上述实施例可见,可以禁止接入第二呼叫类别,允许接入第二呼叫类别之外的其他呼叫类别,并对第二呼叫类别不需要进行RSRP判决而直接视为禁止,从而提高了接入控制限制的准确性和效率。
图6是根据一示例性实施例示出的另一种接入控制限制方法的流程图,该接入控制限制方法可以用于终端,并建立图1所示方法的基础上,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别、和一个或多个被禁止接入的第二呼叫类别;在执行步骤120时,如图6所示,可以包括以下步骤610:
在步骤610中,允许接入第一呼叫类别,禁止接入第二呼叫类别。
在一实施例中,执行上述步骤610之后,还可以包括以下步骤620-630:
在步骤620中,对第一呼叫类别不需要进行RSRP判决而直接视为通过。
本公开实施例中,由于第一呼叫类别是被允许接入的呼叫类型,所以无需再进行后续的RSRP判决而直接视为通过。
在步骤630中,对第二呼叫类别不需要进行RSRP判决而直接视为禁止。
本公开实施例中,由于第二呼叫类别是被禁止接入的呼叫类型,所以无需再进行后续的RSRP判决而直接视为禁止。
由上述实施例可见,可以允许接入第一呼叫类别,禁止接入第二呼叫类别,并对第一呼叫类别不需要进行RSRP判决而直接视为通过,以及对第二呼叫类别不需要进行RSRP判决而直接视为禁止,从而提高了接入控制限制的准确性和效率。
与前述接入控制限制方法的实施例相对应,本公开还提供了接入控制限制装置的实施例。
图7是根据一示例性实施例示出的一种接入控制限制装置的框图,该装置用于终端,并用于执行图1所示的接入控制限制方法,如图7所示,该接入控制限制装置可以包括:
确定模块71,被配置为确定用于接入控制限制的指定呼叫类别限制;
限制模块72,被配置为根据所述指定呼叫类别限制进行接入控制限制。
由上述实施例可见,可以先确定用于接入控制限制的指定呼叫类别限制,再根据指定呼叫类别限制进行接入控制限制,这样可以为增强覆盖场景下的接入控制限制机制附加了指定的呼叫类别限制,从而细化了接入控制限制粒度,还提高了接入控制限制的准确性。
在一实施例中,建立图7所示装置的基础上,所述指定呼叫类别限制中包括被允许接入的第一呼叫类别和/或被禁止接入的第二呼叫类别。
在一实施例中,所述第一呼叫类别和/或所述第二呼叫类别是基于以下至少一项进行确定的:
指定呼叫类别;
指定接入等级;
所有呼叫类别被禁止。
在一实施例中,建立图7所示装置的基础上,如图8所示,所述确定模块71可以包括:
第一确定子模块81,被配置为按照设定规则确定用于接入控制限制的指定呼叫类别限制。
由上述实施例可见,可以按照设定规则确定用于接入控制限制的指定呼叫类别限制,再根据指定呼叫类别限制进行接入控制限制,从而提高了确定指定呼叫类别限制的可靠性。
在一实施例中,建立图8所示装置的基础上,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
在一实施例中,建立图8所示装置的基础上,所述设定规则是基站通过***消息或专用信令通知所述终端的;如图9所示,所述第一确定子模块81可以包括:
第二确定子模块91,被配置为当所述专用信令中包括所述设定规则时,则所述终端根据所述专用信令中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制;
第三确定子模块92,被配置为当所述专用信令中不包括所述设定规则时,则所述终端根据所述***消息中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制。
在一实施例中,建立图9所示装置的基础上,所述***消息或专用信令中还包括使用所述设定规则的有效时间和/或有效地区;如图10所示,所述第一确定子模块81包括:
第四确定子模块101,被配置为在所述设定规则的有效时间和/或有效地区内,按照设定规则确定用于接入控制限制的指定呼叫类别限制。
在一实施例中,建立图9或图10所示装置的基础上,所述专用信令可以包括用于通知所述终端挂起的消息。
在一实施例中,建立图7所示装置的基础上,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别;如图11所示,所述限制模块72可以包括:
第一限制子模块111,被配置为允许接入所述第一呼叫类别,禁止接入所述第一呼叫类别之外的其他呼叫类别。
由上述实施例可见,可以允许接入第一呼叫类别,禁止接入第一呼叫类别之外的其他呼叫类别,并对第一呼叫类别不需要进行RSRP判决而直接视为通过,从而提高了接入控制限制的准确性和效率。
在一实施例中,建立图7所示装置的基础上,所述指定呼叫类别限制中包括一 个或多个被禁止接入的第二呼叫类别;如图12所示,所述限制模块72可以包括:
第二限制子模块121,被配置为禁止接入所述第二呼叫类别,允许接入所述第二呼叫类别之外的其他呼叫类别。
由上述实施例可见,可以禁止接入第二呼叫类别,允许接入第二呼叫类别之外的其他呼叫类别,并对第二呼叫类别不需要进行RSRP判决而直接视为禁止,从而提高了接入控制限制的准确性和效率。
在一实施例中,建立图7所示装置的基础上,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别、和一个或多个被禁止接入的第二呼叫类别;如图13所示,所述限制模块72可以包括:
第三限制子模块131,被配置为允许接入所述第一呼叫类别,禁止接入所述第二呼叫类别。
由上述实施例可见,可以允许接入第一呼叫类别,禁止接入第二呼叫类别,并对第一呼叫类别不需要进行RSRP判决而直接视为通过,以及对第二呼叫类别不需要进行RSRP判决而直接视为禁止,从而提高了接入控制限制的准确性和效率。
在一实施例中,建立图11或图13所示装置的基础上,如图14所示,所述限制模块72还可以包括:
第四限制子模块141,被配置为对所述第一呼叫类别不需要进行参考信号接收功率RSRP判决而直接视为通过。
在一实施例中,建立图12或图13所示装置的基础上,如图15所示,所述限制模块72还可以包括:
第五限制子模块151,被配置为对所述第二呼叫类别不需要进行RSRP判决而直接视为禁止。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述图1至图6任一所述的接入控制限制方法。
本公开还提供了一种接入控制限制装置,所述装置用于终端,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
确定用于接入控制限制的指定呼叫类别限制;
根据所述指定呼叫类别限制进行接入控制限制。
图16是根据一示例性实施例示出的一种接入控制限制装置的结构示意图。如图16所示,根据一示例性实施例示出的一种接入控制限制装置1600,该装置1600可以是计算机,移动电话,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等终端。
参照图16,装置1600可以包括以下一个或多个组件:处理组件1601,存储器1602,电源组件1603,多媒体组件1604,音频组件1605,输入/输出(I/O)的接口1606,传感器组件1607,以及通信组件1608。
处理组件1601通常控制装置1600的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1601可以包括一个或多个处理器1609来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1601可以包括一个或多个模块,便于处理组件1601和其它组件之间的交互。例如,处理组件1601可以包括多媒体模块,以方便多媒体组件1604和处理组件1601之间的交互。
存储器1602被配置为存储各种类型的数据以支持在装置1600的操作。这些数据的示例包括用于在装置1600上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1602可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1603为装置1600的各种组件提供电力。电源组件1603可以包括电源管理***,一个或多个电源,及其它与为装置1600生成、管理和分配电力相关联的 组件。
多媒体组件1604包括在所述装置1600和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1604包括一个前置摄像头和/或后置摄像头。当装置1600处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜***或具有焦距和光学变焦能力。
音频组件1605被配置为输出和/或输入音频信号。例如,音频组件1605包括一个麦克风(MIC),当装置1600处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1602或经由通信组件1608发送。在一些实施例中,音频组件1605还包括一个扬声器,用于输出音频信号。
I/O接口1606为处理组件1601和***接口模块之间提供接口,上述***接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1607包括一个或多个传感器,用于为装置1600提供各个方面的状态评估。例如,传感器组件1607可以检测到装置1600的打开/关闭状态,组件的相对定位,例如所述组件为装置1600的显示器和小键盘,传感器组件1607还可以检测装置1600或装置1600一个组件的位置改变,用户与装置1600接触的存在或不存在,装置1600方位或加速/减速和装置1600的温度变化。传感器组件1607可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1607还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1607还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1608被配置为便于装置1600和其它设备之间有线或无线方式的通信。装置1600可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1608经由广播信道接收来自外部广播管理*** 的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1608还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其它技术来实现。
在示例性实施例中,装置1600可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其它电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1602,上述指令可由装置1600的处理器1609执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
其中,当所述存储介质中的指令由所述处理器执行时,使得装置1600能够执行上述任一所述的接入控制限制方法。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (28)

  1. 一种接入控制限制方法,其特征在于,所述方法用于终端,所述方法包括:
    确定用于接入控制限制的指定呼叫类别限制;
    根据所述指定呼叫类别限制进行接入控制限制。
  2. 根据权利要求1所述的方法,其特征在于,所述指定呼叫类别限制中包括被允许接入的第一呼叫类别和/或被禁止接入的第二呼叫类别。
  3. 根据权利要求2所述的方法,其特征在于,所述第一呼叫类别和/或所述第二呼叫类别是基于以下至少一项进行确定的:
    指定呼叫类别;
    指定接入等级;
    所有呼叫类别被禁止。
  4. 根据权利要求1所述的方法,其特征在于,所述确定用于接入控制限制的指定呼叫类别限制,包括:
    按照设定规则确定用于接入控制限制的指定呼叫类别限制。
  5. 根据权利要求4所述的方法,其特征在于,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
  6. 根据权利要求4所述的方法,其特征在于,所述设定规则是基站通过***消息或专用信令通知所述终端的;
    所述按照设定规则确定用于接入控制限制的指定呼叫类别限制,包括:
    当所述专用信令中包括所述设定规则时,则所述终端根据所述专用信令中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制;
    当所述专用信令中不包括所述设定规则时,则所述终端根据所述***消息中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制。
  7. 根据权利要求6所述的方法,其特征在于,所述***消息或专用信令中还包括使用所述设定规则的有效时间和/或有效地区;
    所述按照设定规则确定用于接入控制限制的指定呼叫类别限制,包括:
    在所述设定规则的有效时间和/或有效地区内,按照设定规则确定用于接入控制限制的指定呼叫类别限制。
  8. 根据权利要求6或7所述的方法,其特征在于,所述专用信令包括用于通知所述终端挂起的消息。
  9. 根据权利要求1所述的方法,其特征在于,所述指定呼叫类别限制中包括一个 或多个被允许接入的第一呼叫类别;
    所述根据所述指定呼叫类别限制进行接入控制限制,包括:
    允许接入所述第一呼叫类别,禁止接入所述第一呼叫类别之外的其他呼叫类别。
  10. 根据权利要求1所述的方法,其特征在于,所述指定呼叫类别限制中包括一个或多个被禁止接入的第二呼叫类别;
    所述根据所述指定呼叫类别限制进行接入控制限制,包括:
    禁止接入所述第二呼叫类别,允许接入所述第二呼叫类别之外的其他呼叫类别。
  11. 根据权利要求1所述的方法,其特征在于,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别、和一个或多个被禁止接入的第二呼叫类别;
    所述根据所述指定呼叫类别限制进行接入控制限制,包括:
    允许接入所述第一呼叫类别,禁止接入所述第二呼叫类别。
  12. 根据权利要求9或11所述的方法,其特征在于,所述根据所述指定呼叫类别限制进行接入控制限制,还包括:
    对所述第一呼叫类别不需要进行参考信号接收功率RSRP判决而直接视为通过。
  13. 根据权利要求10或11所述的方法,其特征在于,所述根据所述指定呼叫类别限制进行接入控制限制,还包括:
    对所述第二呼叫类别不需要进行RSRP判决而直接视为禁止。
  14. 一种接入控制限制装置,其特征在于,所述装置用于终端,所述装置包括:
    确定模块,被配置为确定用于接入控制限制的指定呼叫类别限制;
    限制模块,被配置为根据所述指定呼叫类别限制进行接入控制限制。
  15. 根据权利要求14所述的装置,其特征在于,所述指定呼叫类别限制中包括被允许接入的第一呼叫类别和/或被禁止接入的第二呼叫类别。
  16. 根据权利要求15所述的装置,其特征在于,所述第一呼叫类别和/或所述第二呼叫类别是基于以下至少一项进行确定的:
    指定呼叫类别;
    指定接入等级;
    所有呼叫类别被禁止。
  17. 根据权利要求14所述的装置,其特征在于,所述确定模块包括:
    第一确定子模块,被配置为按照设定规则确定用于接入控制限制的指定呼叫类别限制。
  18. 根据权利要求17所述的装置,其特征在于,所述设定规则是通信协议规定的、 或以固件形式写在所述终端中的。
  19. 根据权利要求17所述的装置,其特征在于,所述设定规则是基站通过***消息或专用信令通知所述终端的;所述第一确定子模块包括:
    第二确定子模块,被配置为当所述专用信令中包括所述设定规则时,则所述终端根据所述专用信令中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制;
    第三确定子模块,被配置为当所述专用信令中不包括所述设定规则时,则所述终端根据所述***消息中包括的所述设定规则确定用于接入控制限制的指定呼叫类别限制。
  20. 根据权利要求19所述的装置,其特征在于,所述***消息或专用信令中还包括使用所述设定规则的有效时间和/或有效地区;所述第一确定子模块包括:
    第四确定子模块,被配置为在所述设定规则的有效时间和/或有效地区内,按照设定规则确定用于接入控制限制的指定呼叫类别限制。
  21. 根据权利要求19或20所述的装置,其特征在于,所述专用信令包括用于通知所述终端挂起的消息。
  22. 根据权利要求14所述的装置,其特征在于,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别;所述限制模块包括:
    第一限制子模块,被配置为允许接入所述第一呼叫类别,禁止接入所述第一呼叫类别之外的其他呼叫类别。
  23. 根据权利要求14所述的装置,其特征在于,所述指定呼叫类别限制中包括一个或多个被禁止接入的第二呼叫类别;所述限制模块包括:
    第二限制子模块,被配置为禁止接入所述第二呼叫类别,允许接入所述第二呼叫类别之外的其他呼叫类别。
  24. 根据权利要求14所述的装置,其特征在于,所述指定呼叫类别限制中包括一个或多个被允许接入的第一呼叫类别、和一个或多个被禁止接入的第二呼叫类别;所述限制模块包括:
    第三限制子模块,被配置为允许接入所述第一呼叫类别,禁止接入所述第二呼叫类别。
  25. 根据权利要求22或24所述的装置,其特征在于,所述限制模块还包括:
    第四限制子模块,被配置为对所述第一呼叫类别不需要进行参考信号接收功率RSRP判决而直接视为通过。
  26. 根据权利要求23或24所述的装置,其特征在于,所述限制模块还包括:
    第五限制子模块,被配置为对所述第二呼叫类别不需要进行RSRP判决而直接视为禁止。
  27. 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述权利要求1-13所述的接入控制限制方法。
  28. 一种接入控制限制装置,其特征在于,所述装置用于终端,所述装置包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    确定用于接入控制限制的指定呼叫类别限制;
    根据所述指定呼叫类别限制进行接入控制限制。
PCT/CN2018/102941 2018-08-29 2018-08-29 接入控制限制方法及装置 WO2020042009A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2018/102941 WO2020042009A1 (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置
CN201880001858.6A CN109196917B (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置
US17/270,420 US11924744B2 (en) 2018-08-29 2018-08-29 Access control barring method and device
CN202111212071.4A CN113873614B (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/102941 WO2020042009A1 (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置

Publications (1)

Publication Number Publication Date
WO2020042009A1 true WO2020042009A1 (zh) 2020-03-05

Family

ID=64938209

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/102941 WO2020042009A1 (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置

Country Status (3)

Country Link
US (1) US11924744B2 (zh)
CN (2) CN113873614B (zh)
WO (1) WO2020042009A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112020879B (zh) * 2020-07-23 2023-12-05 北京小米移动软件有限公司 接入控制方法及装置、存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102612112A (zh) * 2011-01-21 2012-07-25 中兴通讯股份有限公司 一种终端接入方法及装置
WO2012146101A1 (zh) * 2011-04-29 2012-11-01 中兴通讯股份有限公司 Eab参数处理方法及装置、接入处理方法、装置及***
CN103220749A (zh) * 2012-01-18 2013-07-24 中兴通讯股份有限公司 接入等级检查方法和装置
CN103733688A (zh) * 2011-08-10 2014-04-16 诺基亚通信公司 用于在ue中应用扩展接入等级禁止的方法和装置

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007096522A (ja) * 2005-09-27 2007-04-12 Fujitsu Ltd 無線接続方式
CN100461921C (zh) * 2006-12-14 2009-02-11 华为技术有限公司 呼叫禁止标志设置的处理方法
CN101925153B (zh) * 2009-06-16 2012-10-17 华为技术有限公司 接入控制方法、设备和***
CN101998479A (zh) * 2009-08-11 2011-03-30 中兴通讯股份有限公司 一种切换的优化方法及***
EP2462775B1 (en) * 2009-10-08 2018-08-22 LG Electronics Inc. Channel-occupancy-status based early collision avoidance
CN102612113B (zh) * 2011-01-21 2017-08-25 中兴通讯股份有限公司 一种终端接入方法及装置
JP5388234B2 (ja) * 2011-02-21 2014-01-15 株式会社Nttドコモ ネットワークアクセス規制方法及び該方法のための移動機並びに移動機に用いられるプロセッサ
CN102118833A (zh) * 2011-03-04 2011-07-06 电信科学技术研究院 一种小区接入指示方法、小区选择方法和设备
US8942091B2 (en) * 2011-11-09 2015-01-27 Industrial Technology Research Institute Method and apparatus for notifying access control information
US9107183B2 (en) * 2012-08-31 2015-08-11 Qualcomm Incorporated Providing group call priority access in LTE and priority access for user equipments with dual access classes
WO2017023307A1 (en) * 2015-08-05 2017-02-09 Nokia Solutions And Networks Oy Prioritization and overload control for public safety services
US11019556B2 (en) * 2017-05-05 2021-05-25 Lg Electronics Inc. Method and apparatus for performing access to cell

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102612112A (zh) * 2011-01-21 2012-07-25 中兴通讯股份有限公司 一种终端接入方法及装置
WO2012146101A1 (zh) * 2011-04-29 2012-11-01 中兴通讯股份有限公司 Eab参数处理方法及装置、接入处理方法、装置及***
CN103733688A (zh) * 2011-08-10 2014-04-16 诺基亚通信公司 用于在ue中应用扩展接入等级禁止的方法和装置
CN103220749A (zh) * 2012-01-18 2013-07-24 中兴通讯股份有限公司 接入等级检查方法和装置

Also Published As

Publication number Publication date
CN113873614A (zh) 2021-12-31
US11924744B2 (en) 2024-03-05
CN109196917A (zh) 2019-01-11
CN113873614B (zh) 2023-09-26
CN109196917B (zh) 2021-11-02
US20210185593A1 (en) 2021-06-17

Similar Documents

Publication Publication Date Title
US9860844B2 (en) Method and apparatus of temperature control
JP6101866B2 (ja) こどもモード処理方法、装置、プログラム、及び記録媒体
US9588805B2 (en) Method and terminal device for controlling background application
CN109314913B (zh) 接入控制限制方法及装置
CN109451880B (zh) 网络连接方法及装置
WO2020097783A1 (zh) 资源配置方法及装置
CN107094094B (zh) 应用程序的连网方法、装置及终端
CN108702763B (zh) 前导码和调度请求的发送方法及装置
CN109451838B (zh) 获取接入控制参数的方法、装置及存储介质
WO2018176230A1 (zh) 通知区域的更新方法及装置
US20220007394A1 (en) Method and apparatus for sending scheduling request
CN109314902B (zh) 接入控制方法、装置及存储介质
EP2985697A1 (en) Method and device for controlling router plug-in
CN107371222B (zh) 虚拟卡禁用方法及装置
CN106201738B (zh) ***广播调用方法及装置
WO2020042010A1 (zh) 接入控制限制方法及装置
WO2020042009A1 (zh) 接入控制限制方法及装置
WO2019227446A1 (zh) Ac限制方法及装置
EP3239856A1 (en) Information acquisition method, device and system
CN108702682B (zh) Ac限制方法及装置
US20200413372A1 (en) Method and device for extending pbch
CN116489778A (zh) 直连链路数据发送和直连链路资源配置方法以及装置
US9703662B2 (en) Method for controlling plug-in by a router and the router thereof
CN107027110B (zh) 流量控制方法及装置
CN111654894B (zh) 接入控制ac限制方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18931745

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18931745

Country of ref document: EP

Kind code of ref document: A1