WO2021092865A1 - 一种接入控制方法及装置、终端设备 - Google Patents

一种接入控制方法及装置、终端设备 Download PDF

Info

Publication number
WO2021092865A1
WO2021092865A1 PCT/CN2019/118572 CN2019118572W WO2021092865A1 WO 2021092865 A1 WO2021092865 A1 WO 2021092865A1 CN 2019118572 W CN2019118572 W CN 2019118572W WO 2021092865 A1 WO2021092865 A1 WO 2021092865A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
access control
parameter set
control parameter
configuration information
Prior art date
Application number
PCT/CN2019/118572
Other languages
English (en)
French (fr)
Inventor
王淑坤
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to EP19952542.9A priority Critical patent/EP4017120A4/en
Priority to CN201980102267.2A priority patent/CN114731573A/zh
Priority to PCT/CN2019/118572 priority patent/WO2021092865A1/zh
Publication of WO2021092865A1 publication Critical patent/WO2021092865A1/zh
Priority to US17/741,361 priority patent/US20220272606A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release

Definitions

  • the embodiments of the present application relate to the field of mobile communication technology, and specifically relate to an access control method and device, and terminal equipment.
  • New Radio (NR) version 17 (R17) introduced NR-light type terminal devices, such as Internet of Things (IOT) devices.
  • IOT Internet of Things
  • the embodiments of the present application provide an access control method and device, and terminal equipment.
  • the terminal device receives first configuration information sent by the network device, where the first configuration information includes at least one access control parameter set;
  • the terminal device determines the first access category and the first access identifier corresponding to the first type of service, and determines the first access control parameter set corresponding to the first access category from the first configuration information Execute an access control operation corresponding to the first type of service according to the first access identifier and the first access control parameter set;
  • the first type of service is a service for IOT devices.
  • the terminal device receives first configuration information and second configuration information sent by the network device, where the first configuration information includes a first access control parameter set, and the second configuration information includes the correspondence between the number of times that access is prohibited and the scaling factor relationship;
  • the terminal device determines the first scaling factor corresponding to the first number of prohibited access attempts to access the first cell according to the corresponding relationship, and executes it according to the first scaling factor and the first access control parameter set An access control operation for the first cell.
  • the terminal device receives first configuration information and second configuration information sent by the network device, where the first configuration information includes a first access control parameter set, and the second configuration information includes an access category and/or an access identifier and scaling Correspondence between factors;
  • the terminal device determines the first scaling factor corresponding to the first access category and/or the first access identifier according to the corresponding relationship, and according to the first scaling factor and the first access control parameter set Perform access control operations.
  • the terminal device receives a radio resource control (Radio Resource Control, RRC) release message sent by the first cell, where the RRC release message carries first configuration information, and the first configuration information includes a first access control parameter set;
  • RRC Radio Resource Control
  • the terminal device Before initiating RRC connection establishment or RRC connection recovery to the first cell, the terminal device uses the first access control parameter set to perform an access control operation for the first cell.
  • a receiving unit configured to receive first configuration information sent by a network device, where the first configuration information includes at least one access control parameter set;
  • a processing unit configured to determine a first access category and a first access identifier corresponding to the first type of service, and determine a first access control parameter corresponding to the first access category from the first configuration information Set, execute an access control operation corresponding to the first type of service according to the first access identifier and the first access control parameter set;
  • the first type of service is a service for IOT devices.
  • the receiving unit is configured to receive first configuration information and second configuration information sent by a network device, where the first configuration information includes a first access control parameter set, and the second configuration information includes the number of forbidden access and a scaling factor. Correspondence between;
  • a processing unit configured to determine, according to the corresponding relationship, a first scaling factor corresponding to the first number of prohibited access attempts to access the first cell, and according to the first scaling factor and the first access control parameter set Perform an access control operation for the first cell.
  • the receiving unit is configured to receive first configuration information and second configuration information sent by a network device, where the first configuration information includes a first access control parameter set, and the second configuration information includes an access category and/or access Correspondence between identification and scaling factor;
  • a processing unit configured to determine a first scaling factor corresponding to the first access category and/or the first access identifier according to the corresponding relationship, and according to the first scaling factor and the first access control parameter Set to perform access control operations.
  • a receiving unit configured to receive an RRC release message sent by a first cell, where the RRC release message carries first configuration information, and the first configuration information includes a first access control parameter set;
  • the processing unit is configured to use the first access control parameter set to perform an access control operation for the first cell before initiating RRC connection establishment or RRC connection recovery to the first cell.
  • the terminal device provided in the embodiment of the present application includes a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the aforementioned access control method.
  • the chip provided in the embodiment of the present application is used to implement the above-mentioned access control method.
  • the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes the above-mentioned access control method.
  • the computer-readable storage medium provided by the embodiment of the present application is used to store a computer program, and the computer program enables a computer to execute the above-mentioned access control method.
  • the computer program product provided by the embodiment of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the above-mentioned access control method.
  • the computer program provided by the embodiment of the present application when it runs on a computer, causes the computer to execute the aforementioned access control method.
  • the access control of IOT devices in the existing network is realized, and at the same time, it will not cause too much impact on the existing network and enhanced Mobile Broadband (eMBB) users, and ensure the access control of all users. fair and just.
  • eMBB enhanced Mobile Broadband
  • FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of UAC-BarringInfoSet provided by an embodiment of the present application
  • FIG. 3 is a schematic diagram 1 of the flow of an access control method provided by an embodiment of this application.
  • FIG. 4 is a schematic diagram 2 of the flow of an access control method provided by an embodiment of this application.
  • FIG. 5 is a third schematic flowchart of an access control method provided by an embodiment of this application.
  • FIG. 6 is a fourth schematic flowchart of an access control method provided by an embodiment of this application.
  • FIG. 7 is a schematic diagram 1 of the structural composition of an access control apparatus provided by an embodiment of the application.
  • FIG. 8 is a second schematic diagram of the structural composition of an access control apparatus provided by an embodiment of the application.
  • FIG. 9 is a third schematic diagram of the structural composition of an access control apparatus provided by an embodiment of the application.
  • FIG. 10 is a fourth schematic diagram of the structural composition of an access control apparatus provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a chip of an embodiment of the present application.
  • FIG. 13 is a schematic block diagram of a communication system provided by an embodiment of the present application.
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • 5G communication system 5G communication system or future communication system.
  • the communication system 100 applied in the embodiment of the present application is shown in FIG. 1.
  • the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal 120 (or called a communication terminal or terminal).
  • the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminals located in the coverage area.
  • the network device 110 may be an evolved base station (Evolutional Node B, eNB, or eNodeB) in an LTE system, or a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN), or
  • the network equipment can be a mobile switching center, a relay station, an access point, an in-vehicle device, a wearable device, a hub, a switch, a bridge, a router, a network side device in a 5G network, or a network device in a future communication system, etc.
  • the communication system 100 also includes at least one terminal 120 located within the coverage area of the network device 110.
  • the "terminal” used here includes, but is not limited to, connection via a wired line, such as via a public switched telephone network (PSTN), digital subscriber line (Digital Subscriber Line, DSL), digital cable, and direct cable connection; And/or another data connection/network; and/or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM-FM Broadcast transmitter; and/or another terminal's device configured to receive/send communication signals; and/or Internet of Things (IoT) equipment.
  • PSTN public switched telephone network
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • a terminal set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal” or a “mobile terminal”.
  • mobile terminals include, but are not limited to, satellite or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet PDA with internet access, web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or others including radio telephone transceivers Electronic device.
  • PCS Personal Communications System
  • GPS Global Positioning System
  • Terminal can refer to access terminal, user equipment (UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user Device.
  • the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminals in 5G networks, or terminals in the future evolution of PLMN, etc.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • direct terminal connection (Device to Device, D2D) communication may be performed between the terminals 120.
  • the 5G communication system or 5G network may also be referred to as a New Radio (NR) system or NR network.
  • NR New Radio
  • FIG. 1 exemplarily shows one network device and two terminals.
  • the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminals. This embodiment of the present application There is no restriction on this.
  • the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices.
  • the communication device may include a network device 110 and a terminal 120 with communication functions, and the network device 110 and the terminal 120 may be the specific devices described above, which will not be repeated here; communication
  • the device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • 5G Enhanced Mobile Broadband
  • URLLC Ultra-Reliable Low-Latency Communications
  • mMTC Massive Machine-Type Communications
  • eMBB is still targeting users to obtain multimedia content, services and data, and its demand is growing very rapidly.
  • eMBB may be deployed in different scenarios, such as indoors, urban areas, rural areas, etc., its capabilities and requirements are also quite different, so it cannot be generalized and must be analyzed in detail in conjunction with specific deployment scenarios.
  • Typical applications of URLLC include: industrial automation, power automation, telemedicine operations (surgery), traffic safety protection, etc.
  • the typical characteristics of mMTC include: high connection density, small data volume, delay-insensitive services, low cost and long service life of the module.
  • NR R17 introduces NR-light type terminal equipment.
  • NR-light type terminal equipment mainly has the following three scenarios:
  • Industrial Wireless Sensors Compared with URLLC type terminal devices, industrial wireless sensors have relatively low latency and reliability. At the same time, the cost and power consumption of industrial wireless sensors are also lower than URLLC-type terminal equipment and eMBB-type terminal equipment.
  • Video surveillance Mainly used in video surveillance scenarios such as smart cities and industrial factories. Collect and process data in smart cities to facilitate more effective monitoring and control of urban resources and provide more effective services to urban residents.
  • Wearables including smart watches, electronic health equipment, and some medical monitoring equipment.
  • One common feature of these devices is their small size.
  • NR-light type terminal equipment requires lower equipment cost and complexity.
  • the basic consensus is to reduce the bandwidth and receiving antenna.
  • the size of NR-light type terminal equipment is relatively small.
  • NR-light type terminal equipment is required to achieve coverage equivalent to that of R15/16 eMBB type terminal equipment. If the coverage loss needs to be caused by reducing the receiving antenna, lowering bandwidth, lowering power level, or reducing the complexity of the terminal equipment make up.
  • each scenario has the following individual requirements: 1) The reliability requirement of industrial wireless sensors is 99.99%, and the end-to-end delay requirement is 100ms. The bit rate requires 2Mbps. The device stands still. The battery life is several years. For safety-related sensors, the time delay requirement is 5-10ms. 2) The bit rate requirement of video surveillance is 2-4Mbps, the delay requirement is less than 500ms, and the reliability requirement is 99-99.9%. For some high-end video rates, the demand is 2-4Mbps. The upstream business volume is relatively large. 3) Wearable devices can refer to LTE Cat 4, and the rate requirement is 150Mbps/50Mbps.
  • a unified access control (UAC) mechanism (referred to as an access control mechanism for short) is introduced in NR.
  • UAC unified access control
  • an access category (Access Category)
  • an access identity (Access identity) are defined. Its meaning is shown in Table 1 and Table 2 below.
  • the access network elements (such as base stations) broadcast access control information related to the access category and access identifier, and the access layer (Access Stratum, AS) of the terminal equipment is based on the access control information and the AS layer or non-access
  • the access category and access identifier provided by the layer (Non Access Stratum, NAS) perform access control operations (ie, ACB checking).
  • the access control information broadcast by the access network elements includes UAC parameters (or access control parameter sets).
  • UAC parameters are based on the access category as the granularity (per access category) and/or the public land mobile network (Public Land Mobile).
  • Network (PLMN) is configured for granularity (per PLMN).
  • UAC parameters are specifically UAC parameters (ie UAC-BarringInfoSet).
  • the network side is configured with a maximum of 8 UAC-BarringInfoSets, and each access category is associated with a UAC-BarringInfoSet, for a total of 64 access categories (access category 0 does not need to be configured).
  • Each PLMN can also be associated with one UAC-BarringPerCatList. Further, if the per PLMN information is not configured, the above configuration is applicable to all PLMNs.
  • auxiliary information For access category 1, configure an auxiliary information to assist in determining whether an access control operation (that is, ACB checking) is used for access category 1, and the auxiliary information is uac-AccessCategory1-SelectionAssistanceInfo.
  • the UAC mechanism refers to an access control operation (that is, ACB checking).
  • the access control operation is performed based on UAC parameters (that is, UAC-BarringInfoSet).
  • UAC-BarringInfoSet The specific content of UAC-BarringInfoSet is shown in Figure 2.
  • step 1) If the bit corresponding to the access identifier in uac-BarringForAccessIdentity is set to 0, it means that access is allowed. If the corresponding bit is set to 1, then the following step 2) needs to be further judged;
  • the NAS layer determines the access identifier, access category, and access reason (or called cause value).
  • the NAS layer provides the access identifier and access category to the AS layer, and the AS layer is responsible for performing access control operations. If access is allowed, the AS layer informs the NAS layer, and the NAS layer provides the reason for the access to the AS layer. Based on the feedback of the access control operation of the AS layer, the NAS layer is responsible for stopping or allowing service transmission.
  • Events triggered by the AS layer include events triggered by paging or events triggered by RAN Notification Area Update (RNAU). Among them,
  • the access category is access category 0, which is not controlled by access control operations.
  • the cause value is overwritten, the NAS layer and the AS layer interact, and the NAS layer provides the cause value.
  • the access category is access category 8.
  • the access identifier needs to be provided by the NAS layer to the AS layer, and the information exchange between the NAS layer and the AS layer belongs to the implementation of the terminal device.
  • the reason value is determined by the AS layer as rna-Update.
  • Fig. 3 is a schematic flowchart 1 of the access control method provided by an embodiment of the application. As shown in Fig. 3, the access control method includes the following steps:
  • Step 301 The terminal device receives first configuration information sent by the network device, where the first configuration information includes at least one access control parameter set.
  • the network device may be a base station, such as a gNB.
  • the terminal receives first configuration information sent by a network device, where the first configuration information includes at least one access control parameter set.
  • the first configuration information is carried in a system broadcast message.
  • the base station sends a system broadcast message
  • the system broadcast message carries first configuration information
  • the terminal obtains the first configuration information from the system broadcast message.
  • the first configuration information includes at least one access control parameter set.
  • Step 302 The terminal device determines the first access category and the first access identifier corresponding to the first type of service, and determines the first access corresponding to the first access category from the first configuration information A control parameter set, which executes an access control operation corresponding to the first type of service according to the first access identifier and the first access control parameter set.
  • the terminal device is an IOT device
  • the first type of service is a service for the IOT device.
  • a new access category ie, the first access category
  • a new access identifier ie, the first access identifier
  • the first type of service is defined for the first type of service. That is: the first access category is an access category defined for the first type of service; and/or, the first access identifier is an access identifier defined for the first type of service.
  • the number of new access categories defined for the first type of service may be one or more.
  • the number of new access identifiers defined for the first type of service may be one or more.
  • the access category in the embodiment of the present application may also be referred to as UE access category.
  • the access identity in the embodiment of the present application may also be referred to as UE access identity.
  • the network side may configure a corresponding access control parameter set (ie, the first access control parameter set) for the new access category, so
  • the first access control parameter set includes at least one of the following: a first parameter, where the first parameter is used to determine an access identifier for allowing access and/or an access identifier for prohibiting access; a second parameter, the The second parameter is used to determine the barring factor (BarringFactor); the third parameter is used to determine the barring time (BarringTime).
  • the access control parameter set can be UAC-BarringInfoSet. Refer to Figure 2 for the content of UAC-BarringInfoSet.
  • UAC-BarringInfoSet includes the following parameters: uac-BarringForAccessIdentity (the first parameter), uac-BarringFactor (the second parameter) Parameter), uac-BarringTime (that is, the third parameter).
  • the NAS layer of the terminal determines that there is data transmission of the first type of service, and sends first indication information to the AS layer of the terminal, and the first indication information is used to indicate the first The first access category and the first access identifier corresponding to the class of service; the AS layer of the terminal determines the first access control parameter set corresponding to the first access category from the first configuration information, and Perform an access control operation according to the first access identifier and the first access control parameter set. Further, the performing an access control operation according to the first access identifier and the first access control parameter set includes: determining whether to allow access according to the first access identifier; if it is determined to allow access , Then perform an access control operation according to the first access control parameter set.
  • the NAS layer sends the first access category and the first access identifier to the AS layer, and the AS layer obtains the first access corresponding to the first access category from the system broadcast message.
  • Enter the control parameter set and determine the following parameters according to the first access control parameter set: uac-BarringForAccessIdentity, uac-BarringFactor, uac-BarringTime. Then, it is determined whether to allow access according to the first access identifier and uac-BarringForAccessIdentity. If access is allowed, the access control operation (that is, the UAC process) is performed according to the two parameters of uac-BarringFactor and uac-BarringTime.
  • access control parameter set in the embodiment of the present application may also be referred to as UAC parameters.
  • FIG. 4 is a schematic diagram 2 of the flow of an access control method provided by an embodiment of this application. As shown in FIG. 4, the access control method includes the following steps:
  • Step 401 The terminal device receives the first configuration information and the second configuration information sent by the network device, where the first configuration information includes a first access control parameter set, and the second configuration information includes the number of prohibited access times and the scaling factor. Correspondence between.
  • the network device may be a base station, such as a gNB.
  • the terminal receives first configuration information and second configuration information sent by a network device, the first configuration information includes a first access control parameter set, and the second configuration information includes the number of times that access is prohibited Correspondence with zoom factor.
  • the first configuration information and the second configuration information are carried in a system broadcast message.
  • the base station sends a system broadcast message
  • the system broadcast message carries the first configuration information and the second configuration information
  • the terminal obtains the first configuration information and the second configuration information from the system broadcast message.
  • the terminal device is an IOT device.
  • the first access control parameter set is an access control parameter set configured for the service initiated by the IOT device.
  • the first access control parameter set includes at least one of the following: a first parameter, the first parameter is used to determine an access identifier for allowing access and/or an access identifier for prohibiting access; a second parameter, The second parameter is used to determine the barring factor (BarringFactor); the third parameter is used to determine the barring time (BarringTime).
  • the access control parameter set can be UAC-BarringInfoSet. Refer to Figure 2 for the content of UAC-BarringInfoSet.
  • UAC-BarringInfoSet includes the following parameters: uac-BarringForAccessIdentity (the first parameter), uac-BarringFactor (the second parameter) Parameter), uac-BarringTime (that is, the third parameter).
  • the corresponding relationship between the number of prohibited access times and the scaling factor can be referred to as shown in Table 3 below. It should be noted that the number of prohibited access times can be a value or a value range:
  • Step 402 The terminal device determines the first scaling factor corresponding to the first number of barred access attempts to access the first cell according to the corresponding relationship, and according to the first scaling factor and the first access control The parameter set performs an access control operation for the first cell.
  • the terminal device counts the number of times of barring access to the first cell through a first counter; wherein, if the terminal device determines that the first cell is barred, then The first counter is incremented by 1; the terminal device determines the first number of times of barring access according to the value of the first counter.
  • the terminal device if the terminal device undergoes cell reselection or the terminal device can access the first cell, the terminal device resets the first counter to zero.
  • the corresponding scaling factor is determined according to the value of the counter1, and the execution is performed according to the scaling factor and the first access control parameter set. An access control operation for the first cell.
  • the terminal device performs scaling processing on at least one parameter in the first access control parameter set according to the first scaling factor, and performs access to the first cell by using the at least one parameter after the scaling processing Control operation.
  • the terminal device performs scaling processing on at least one parameter in the first access control parameter set according to the first scaling factor, which may be implemented in, but not limited to, the following manners:
  • access control parameter set in the embodiment of the present application may also be referred to as UAC parameters.
  • Fig. 5 is a schematic diagram of the third flow of the access control method provided by an embodiment of the application. As shown in Fig. 5, the access control method includes the following steps:
  • Step 501 A terminal device receives first configuration information and second configuration information sent by a network device, where the first configuration information includes a first access control parameter set, and the second configuration information includes an access category and/or access The corresponding relationship between the logo and the zoom factor.
  • the network device may be a base station, such as a gNB.
  • the terminal receives first configuration information and second configuration information sent by a network device, the first configuration information includes a first access control parameter set, and the second configuration information includes an access category and /Or the corresponding relationship between the access identifier and the scaling factor.
  • the first configuration information and the second configuration information are carried in a system broadcast message.
  • the base station sends a system broadcast message
  • the system broadcast message carries the first configuration information and the second configuration information
  • the terminal obtains the first configuration information and the second configuration information from the system broadcast message.
  • the terminal device is an IOT device.
  • the first access control parameter set is an access control parameter set configured for the service initiated by the IOT device.
  • the first access control parameter set includes at least one of the following: a first parameter, the first parameter is used to determine an access identifier for allowing access and/or an access identifier for prohibiting access; a second parameter, The second parameter is used to determine the barring factor (BarringFactor); the third parameter is used to determine the barring time (BarringTime).
  • the access control parameter set can be UAC-BarringInfoSet. Refer to Figure 2 for the content of UAC-BarringInfoSet.
  • UAC-BarringInfoSet includes the following parameters: uac-BarringForAccessIdentity (the first parameter), uac-BarringFactor (the second parameter) Parameter), uac-BarringTime (that is, the third parameter).
  • the corresponding relationship between the access category and/or the access identifier and the scaling factor can be realized through a scaling factor list, and each scaling factor in the list corresponds to an access category and/or An access identifier. If the value of the scaling factor is 0, it means that scaling is not supported.
  • Step 502 The terminal device determines the first scaling factor corresponding to the first access category and/or the first access identifier according to the corresponding relationship, and according to the first scaling factor and the first access
  • the control parameter set performs access control operations.
  • the NAS layer of the terminal determines that there is data transmission of the first type of service, and sends first indication information to the AS layer of the terminal, where the first indication information is used to indicate the first type of service Corresponding first access category and first access identifier; the AS layer of the terminal determines the first access control parameter set corresponding to the first access category from the first configuration information, and obtains the The first scaling factor corresponding to the first access category and/or the first access identifier is determined in the second configuration information, and according to the first scaling factor and the first access control parameter set Perform access control operations.
  • the terminal device performs scaling processing on at least one parameter in the first access control parameter set according to the first scaling factor, and performs an access control operation by using the at least one parameter after the scaling processing.
  • the terminal device performs scaling processing on at least one parameter in the first access control parameter set according to the first scaling factor, which may be implemented in, but not limited to, the following manners:
  • access control parameter set in the embodiment of the present application may also be referred to as UAC parameters.
  • Fig. 6 is a schematic flow chart 4 of the access control method provided by an embodiment of the application. As shown in Fig. 6, the access control method includes the following steps:
  • Step 601 The terminal device receives an RRC release message sent by the first cell, where the RRC release message carries first configuration information, and the first configuration information includes a first access control parameter set.
  • the network side when the network side releases the terminal device to enter the idle state or the inactive state, the network side configures the first access control parameter set for the terminal device to access the network next time through an RRC release message.
  • the terminal device is an IOT device.
  • the first access control parameter set is an access control parameter set configured for the service initiated by the IOT device.
  • the first access control parameter set includes at least one of the following: a first parameter, the first parameter is used to determine an access identifier for allowing access and/or an access identifier for prohibiting access; a second parameter, The second parameter is used to determine the barring factor (BarringFactor); the third parameter is used to determine the barring time (BarringTime).
  • the access control parameter set can be UAC-BarringInfoSet. Refer to Figure 2 for the content of UAC-BarringInfoSet.
  • UAC-BarringInfoSet includes the following parameters: uac-BarringForAccessIdentity (the first parameter), uac-BarringFactor (the second parameter) Parameter), uac-BarringTime (that is, the third parameter).
  • the RRC release message further carries at least one of the following:
  • First indication information where the first indication information is used to indicate the effective time of the first access control parameter set
  • Second indication information where the second indication information is used to indicate a valid area range (such as a cell list) of the first access control parameter set.
  • the terminal device After receiving the first access control parameter set, the terminal device starts a first timer, and the duration of the first timer is determined based on the first indication information; if the first timer expires , The terminal device releases the first access control parameter set.
  • the terminal device After the terminal device receives the first access control parameter set, if cell reselection is performed outside the valid area range indicated by the second indication information, the terminal device releases the first access Control parameter set.
  • the terminal device after the terminal device releases the first access control parameter set, if it tries to access the first cell again, it uses the access control parameter set configured in the system broadcast message to execute the Access control operation of the first cell.
  • Step 602 Before initiating RRC connection establishment or RRC connection recovery to the first cell, the terminal device uses the first access control parameter set to perform an access control operation for the first cell.
  • the terminal device after the terminal device obtains the first access control parameter set through the RRC release cell, before initiating the RRC connection establishment or the RRC connection recovery to the first cell, the first access The control parameter set performs an access control operation for the first cell and ignores the access control parameter set in the system broadcast message.
  • access control parameter set in the embodiment of the present application may also be referred to as UAC parameters.
  • FIG. 7 is a schematic diagram 1 of the structural composition of an access control device provided by an embodiment of the application. As shown in FIG. 7, the access control device includes:
  • the receiving unit 701 is configured to receive first configuration information sent by a network device, where the first configuration information includes at least one access control parameter set;
  • the processing unit 702 is configured to determine the first access category and the first access identifier corresponding to the first type of service, and determine the first access control corresponding to the first access category from the first configuration information A parameter set, performing an access control operation corresponding to the first type of service according to the first access identifier and the first access control parameter set;
  • the first type of service is a service for IOT devices.
  • the processing unit 702 is configured to determine that there is data transmission of the first type of service through the NAS layer of the terminal, and send first indication information to the AS layer of the terminal.
  • the indication information is used to indicate the first access category and the first access identifier corresponding to the first type of service; the AS layer of the terminal determines from the first configuration information the one corresponding to the first access category A first access control parameter set, and execute an access control operation according to the first access identifier and the first access control parameter set.
  • the processing unit 702 is configured to determine whether to allow access according to the first access identifier; if it is determined to allow access, perform access according to the first access control parameter set Control operation.
  • the first access category is an access category defined for the first type of service.
  • the first access identifier is an access identifier defined for the first type of service.
  • the first access control parameter set includes at least one of the following:
  • a first parameter where the first parameter is used to determine an access identifier for allowing access and/or an access identifier for prohibiting access
  • the second parameter, the second parameter is used to determine the limiting factor BarringFactor
  • the third parameter is used to determine the barring time BarringTime.
  • Fig. 8 is a second schematic diagram of the structural composition of the access control device provided by an embodiment of the application. As shown in Fig. 8, the access control device includes:
  • the receiving unit 801 is configured to receive first configuration information and second configuration information sent by a network device, where the first configuration information includes a first access control parameter set, and the second configuration information includes the number of times that access is prohibited and a scaling factor Correspondence between;
  • the processing unit 802 is configured to determine, according to the corresponding relationship, a first scaling factor corresponding to the first number of prohibited access attempts to access the first cell, and according to the first scaling factor and the first access control parameter The set performs an access control operation for the first cell.
  • the processing unit 802 is further configured to count the number of times of barring access to the first cell through a first counter; wherein, if it is determined that the first cell is barred from access , The first counter is incremented by 1; the first number of access barring is determined according to the value of the first counter.
  • the processing unit 802 is further configured to reset the first counter to 0 if the terminal device undergoes cell reselection or the terminal device can access the first cell.
  • the processing unit 802 is configured to perform scaling processing on at least one parameter in the first access control parameter set according to the first scaling factor, and using the at least one parameter after the scaling processing The parameter performs an access control operation for the first cell.
  • the first access control parameter set includes at least one of the following:
  • a first parameter where the first parameter is used to determine an access identifier for allowing access and/or an access identifier for prohibiting access
  • the second parameter, the second parameter is used to determine the limiting factor BarringFactor
  • the third parameter is used to determine the barring time BarringTime.
  • the terminal device is an IOT device.
  • Fig. 9 is a schematic diagram 3 of the structural composition of an access control device provided by an embodiment of the application. As shown in Fig. 9, the access control device includes:
  • the receiving unit 901 is configured to receive first configuration information and second configuration information sent by a network device, where the first configuration information includes a first access control parameter set, and the second configuration information includes an access category and/or access Correspondence between the input identifier and the zoom factor;
  • the processing unit 902 is configured to determine a first scaling factor corresponding to the first access category and/or the first access identifier according to the corresponding relationship, and according to the first scaling factor and the first access control
  • the parameter set performs access control operations.
  • the processing unit 902 is configured to determine through the NAS layer of the terminal that there is data transmission of the first type of service, and send first indication information to the AS layer of the terminal, and the first indication information It is used to indicate the first access category and the first access identifier corresponding to the first type of service; the AS layer of the terminal determines the first access category corresponding to the first access category from the first configuration information. An access control parameter set, and a first scaling factor corresponding to the first access category and/or the first access identifier is determined from the second configuration information.
  • the processing unit 902 is configured to perform scaling processing on at least one parameter in the first access control parameter set according to the first scaling factor, and use the at least one parameter after the scaling processing. Parameters perform access control operations.
  • the first access control parameter set includes at least one of the following:
  • a first parameter where the first parameter is used to determine an access identifier for allowing access and/or an access identifier for prohibiting access
  • the second parameter, the second parameter is used to determine the limiting factor BarringFactor
  • the third parameter is used to determine the barring time BarringTime.
  • the terminal device is an IOT device.
  • FIG. 10 is a schematic diagram 4 of the structural composition of the access control apparatus provided by an embodiment of the application. As shown in FIG. 10, the access control apparatus includes:
  • the receiving unit 1001 is configured to receive an RRC release message sent by a first cell, where the RRC release message carries first configuration information, and the first configuration information includes a first access control parameter set;
  • the processing unit 1002 is configured to use the first access control parameter set to perform an access control operation for the first cell before initiating RRC connection establishment or RRC connection recovery to the first cell.
  • the RRC release message further carries at least one of the following:
  • First indication information where the first indication information is used to indicate the effective time of the first access control parameter set
  • Second indication information where the second indication information is used to indicate the effective area range of the first access control parameter set.
  • the processing unit 1002 is further configured to start a first timer after receiving the first access control parameter set, and the duration of the first timer is based on the first access control parameter set.
  • the indication information is determined; if the first timer expires, the first access control parameter set is released.
  • the processing unit 1002 is further configured to, after receiving the first access control parameter set, perform cell reselection beyond the valid area range indicated by the second indication information, Then the first access control parameter set is released.
  • the processing unit 1002 is further configured to, after releasing the first access control parameter set, if attempting to access the first cell again, use the access configured in the system broadcast message.
  • the access control parameter set performs an access control operation for the first cell.
  • the first access control parameter set includes at least one of the following:
  • a first parameter where the first parameter is used to determine an access identifier for allowing access and/or an access identifier for prohibiting access
  • the second parameter, the second parameter is used to determine the limiting factor BarringFactor
  • the third parameter is used to determine the barring time BarringTime.
  • the terminal device is an IOT device.
  • FIG. 11 is a schematic structural diagram of a communication device 1100 according to an embodiment of the present application.
  • the communication device may be a terminal device or a network device.
  • the communication device 1100 shown in FIG. 11 includes a processor 1110.
  • the processor 1110 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the communication device 1100 may further include a memory 1120.
  • the processor 1110 can call and run a computer program from the memory 1120 to implement the method in the embodiment of the present application.
  • the memory 1120 may be a separate device independent of the processor 1110, or may be integrated in the processor 1110.
  • the communication device 1100 may further include a transceiver 1130, and the processor 1110 may control the transceiver 1130 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
  • the transceiver 1130 may include a transmitter and a receiver.
  • the transceiver 1130 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 1100 may specifically be a network device of an embodiment of the present application, and the communication device 1100 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not repeated here. .
  • the communication device 1100 may specifically be a mobile terminal/terminal device of an embodiment of the application, and the communication device 1100 may implement the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the application.
  • I won’t repeat it here.
  • FIG. 12 is a schematic structural diagram of a chip of an embodiment of the present application.
  • the chip 1200 shown in FIG. 12 includes a processor 1210, and the processor 1210 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 1200 may further include a memory 1220.
  • the processor 1210 can call and run a computer program from the memory 1220 to implement the method in the embodiment of the present application.
  • the memory 1220 may be a separate device independent of the processor 1210, or may be integrated in the processor 1210.
  • the chip 1200 may further include an input interface 1230.
  • the processor 1210 can control the input interface 1230 to communicate with other devices or chips, and specifically, can obtain information or data sent by other devices or chips.
  • the chip 1200 may further include an output interface 1240.
  • the processor 1210 can control the output interface 1240 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip mentioned in the embodiment of the present application may also be referred to as a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip.
  • FIG. 13 is a schematic block diagram of a communication system 1300 according to an embodiment of the present application. As shown in FIG. 13, the communication system 1300 includes a terminal device 1310 and a network device 1320.
  • the terminal device 1310 can be used to implement the corresponding function implemented by the terminal device in the above method
  • the network device 1320 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
  • the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application can be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • DDR SDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM, ESDRAM Enhanced Synchronous Dynamic Random Access Memory
  • Synchronous Link Dynamic Random Access Memory Synchronous Link Dynamic Random Access Memory
  • DR RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is to say, the memory in the embodiments of the present application is intended to include but not limited to these and any other suitable types of memory.
  • the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application For the sake of brevity, I won’t repeat it here.
  • the embodiments of the present application also provide a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program product can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application, For the sake of brevity, I will not repeat them here.
  • the embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network device in the embodiment of the present application.
  • the computer program runs on the computer, it causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • I won’t repeat it here.
  • the computer program can be applied to the mobile terminal/terminal device in the embodiment of the present application.
  • the computer program runs on the computer, the computer executes each method in the embodiment of the present application. For the sake of brevity, the corresponding process will not be repeated here.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种接入控制方法及装置、终端设备,该方法包括:终端设备接收网络设备发送的第一配置信息,所述第一配置信息包括至少一个接入控制参数集;所述终端设备确定第一类业务对应的第一接入类别和第一接入标识,并从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,根据所述第一接入标识和所述第一接入控制参数集执行所述第一类业务对应的接入控制操作;其中,所述第一类业务为针对物联网IOT设备的业务。

Description

一种接入控制方法及装置、终端设备 技术领域
本申请实施例涉及移动通信技术领域,具体涉及一种接入控制方法及装置、终端设备。
背景技术
新无线(New Radio,NR)版本17(R17)中引入了NR-light类型的终端设备,如物联网(Internet of Things,IOT)设备。大量的IOT设备进入现有网络中,对于现有网络的信令和负荷造成了冲击。所以针对IOT设备在现网的接入控制需要重新定义。
发明内容
本申请实施例提供一种接入控制方法及装置、终端设备。
本申请实施例提供的接入控制方法,包括:
终端设备接收网络设备发送的第一配置信息,所述第一配置信息包括至少一个接入控制参数集;
所述终端设备确定第一类业务对应的第一接入类别和第一接入标识,并从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,根据所述第一接入标识和所述第一接入控制参数集执行所述第一类业务对应的接入控制操作;
其中,所述第一类业务为针对IOT设备的业务。
本申请实施例提供的接入控制方法,包括:
终端设备接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括禁止接入次数与缩放因子之间的对应关系;
所述终端设备根据所述对应关系,确定尝试接入第一小区的第一禁止接入次数对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
本申请实施例提供的接入控制方法,包括:
终端设备接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括接入类别和/或接入标识与缩放因子之间的对应关系;
所述终端设备根据所述对应关系,确定与第一接入类别和/或第一接入标识对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行接入控制操作。
本申请实施例提供的接入控制方法,包括:
终端设备接收第一小区发送的无线资源控制(Radio Resource Control,RRC)释放消息,所述RRC释放消息携带第一配置信息,所述第一配置信息包括第一接入控制参数集;
所述终端设备在向所述第一小区发起RRC连接建立或RRC连接恢复之前,使用 所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
本申请实施例提供的接入控制装置,包括:
接收单元,用于接收网络设备发送的第一配置信息,所述第一配置信息包括至少一个接入控制参数集;
处理单元,用于确定第一类业务对应的第一接入类别和第一接入标识,并从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,根据所述第一接入标识和所述第一接入控制参数集执行所述第一类业务对应的接入控制操作;
其中,所述第一类业务为针对IOT设备的业务。
本申请实施例提供的接入控制装置,包括:
接收单元,用于接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括禁止接入次数与缩放因子之间的对应关系;
处理单元,用于根据所述对应关系,确定尝试接入第一小区的第一禁止接入次数对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
本申请实施例提供的接入控制装置,包括:
接收单元,用于接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括接入类别和/或接入标识与缩放因子之间的对应关系;
处理单元,用于根据所述对应关系,确定与第一接入类别和/或第一接入标识对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行接入控制操作。
本申请实施例提供的接入控制装置,包括:
接收单元,用于接收第一小区发送的RRC释放消息,所述RRC释放消息携带第一配置信息,所述第一配置信息包括第一接入控制参数集;
处理单元,用于在向所述第一小区发起RRC连接建立或RRC连接恢复之前,使用所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
本申请实施例提供的终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的接入控制方法。
本申请实施例提供的芯片,用于实现上述的接入控制方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的接入控制方法。
本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的接入控制方法。
本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的接入控制方法。
本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的接入控制方法。
通过上述技术方案,实现了IOT设备在现网的接入控制,同时不会对现网以及增强移动超宽带(enhanced Mobile Broadband,eMBB)用户造成太大的影响,保证了所有用户接入控制的公平公正。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1是本申请实施例提供的一种通信***架构的示意性图;
图2是本申请实施例提供的UAC-BarringInfoSet的示意图;
图3为本申请实施例提供的接入控制方法的流程示意图一;
图4为本申请实施例提供的接入控制方法的流程示意图二;
图5为本申请实施例提供的接入控制方法的流程示意图三;
图6为本申请实施例提供的接入控制方法的流程示意图四;
图7为本申请实施例提供的接入控制装置的结构组成示意图一;
图8为本申请实施例提供的接入控制装置的结构组成示意图二;
图9为本申请实施例提供的接入控制装置的结构组成示意图三;
图10为本申请实施例提供的接入控制装置的结构组成示意图四;
图11是本申请实施例提供的一种通信设备示意性结构图;
图12是本申请实施例的芯片的示意性结构图;
图13是本申请实施例提供的一种通信***的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信***,例如:长期演进(Long Term Evolution,LTE)***、LTE频分双工(Frequency Division Duplex,FDD)***、LTE时分双工(Time Division Duplex,TDD)、***、5G通信***或未来的通信***等。
示例性的,本申请实施例应用的通信***100如图1所示。该通信***100可以包括网络设备110,网络设备110可以是与终端120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端进行通信。可选地,该网络设备110可以是LTE***中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来通信***中的网络设备等。
该通信***100还包括位于网络设备110覆盖范围内的至少一个终端120。作为在此使用的“终端”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信***(Personal Communications System,PCS)终端;可以包括无线电电 话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位***(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端或者未来演进的PLMN中的终端等。
可选地,终端120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G通信***或5G网络还可以称为新无线(New Radio,NR)***或NR网络。
图1示例性地示出了一个网络设备和两个终端,可选地,该通信***100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端,本申请实施例对此不做限定。
可选地,该通信***100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
应理解,本申请实施例中网络/***中具有通信功能的设备可称为通信设备。以图1示出的通信***100为例,通信设备可包括具有通信功能的网络设备110和终端120,网络设备110和终端120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信***100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“***”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例相关的技术方案进行说明。
随着人们对速率、延迟、高速移动性、能效的追求以及未来生活中业务的多样性、复杂性,为此第三代合作伙伴计划(3 rd Generation Partnership Project,3GPP)国际标准组织开始研发5G。5G的主要应用场景为:增强移动超宽带(enhanced Mobile Broadband,eMBB)、低时延高可靠通信(Ultra-Reliable Low-Latency Communications,URLLC)、大规模机器类通信(massive Machine-Type Communications,mMTC)。
一方面,eMBB仍然以用户获得多媒体内容、服务和数据为目标,其需求增长十分迅速。另一方面,由于eMBB可能部署在不同的场景中,例如室内,市区,农村等,其能力和需求的差别也比较大,所以不能一概而论,必须结合具体的部署场景详细分析。URLLC的典型应用包括:工业自动化,电力自动化,远程医疗操作(手术),交通安全保障等。mMTC的典型特点包括:高连接密度,小数据量,时延不敏感业务,模块的低成本和长使用寿命等。
NR R17中引入了NR-light类型的终端设备,NR-light类型的终端设备主要有以下三个场景:
工业无线传感器(Industrial Wireless Sensors):和URLLC类型的终端设备相比,工业无线传感器具有相对低要求的时延和可靠性。同时,工业无线传感器的成本和功耗也比URLLC类型的终端设备和eMBB类型的终端设备要低。
视频监控(Video surveillance):主要用在智能城市、工业工厂等视讯监控的场景。对智能城市中的数据收集和处理,以便于更有效的进行城市资源的监测和控制,给城市居民提供更有效的服务。
可穿戴设备(Wearables):包括智能手表、电子健康设备以及一些医疗监测设备等。这些设备的一个共性就是尺寸小。
上述三种场景的共性需求为:1)NR-light类型的终端设备和R15/16的eMBB类型的终端设备相比,要求更低的设备成本和复杂度。基本共识是降低带宽和接收天线。2)NR-light类型的终端设备尺寸比较小。3)NR-light类型的终端设备要求达到与R15/16的eMBB类型的终端设备相当的覆盖,如果由于降低接收天线、降低带宽、降低功率等级或者其他降低终端设备复杂度带来的覆盖损失需要补偿。
针对上述三种场景,每个场景还有以下个性需求:1)工业无线传感器的可靠性需求为99.99%,端到端时延需求为100ms。比特速率需求2Mbps。设备静止不动。电池寿命是若干年。对于安全相关的传感器,时延需求为5-10ms。2)视频监控的比特速率需求为2-4Mbps,时延需求小于500ms,可靠性需求为99-99.9%。对于某些高端视频速率需求为2-4Mbps。上行业务量比较大。3)可穿戴设备可以参考LTE Cat 4,速率需求为150Mbps/50Mbps。
为了网络侧的负荷控制,NR中引入了统一接入控制(Unified Access Control,UAC)机制(简称为接入控制机制)。在UAC机制中,定义了接入类别(Access Category)和接入标识(Access identity)。其含义如下表1和表2所示。
Figure PCTCN2019118572-appb-000001
表1
Figure PCTCN2019118572-appb-000002
Figure PCTCN2019118572-appb-000003
表2
接入网网元(如基站)广播与接入类别和接入标识相关的接入控制信息,终端设备的接入层(Access Stratum,AS)则根据接入控制信息和AS层或非接入层(Non Access Stratum,NAS)提供的接入类别和接入标识执行接入控制操作(即ACB checking)。
接入网网元广播的接入控制信息包括UAC参数(或者说接入控制参数集),UAC参数是以接入类别为粒度(per access category)和/或以公共陆地移动网络(Public Land Mobile Network,PLMN)为粒度(per PLMN)进行配置的。UAC参数具体为UAC参数(即UAC-BarringInfoSet),网络侧最多配置8个UAC-BarringInfoSet,每个接入类别关联一个UAC-BarringInfoSet,总共64个接入类别(其中access category 0不需要配置)。也可以每个PLMN关联一个UAC-BarringPerCatList,进一步如果per PLMN信息不配置,则上述配置是对所有PLMN适用。
针对access category 1,配置一个辅助信息来辅助判断是否接入控制操作(即ACB checking)用于针对access category 1,该辅助信息为uac-AccessCategory1-SelectionAssistanceInfo。
UAC机制是指接入控制操作(即ACB checking),接入控制操作基于UAC参数(即UAC-BarringInfoSet)执行,UAC-BarringInfoSet具体包含的内容如图2所示。在T390和T302都没有运行且接入类别不是access category 0的前提下,接入控制操作的执行包括如下步骤:
1)如果接入标识在uac-BarringForAccessIdentity中对应的比特(bit)设为0,表示允许接入,如果对应的bit设为1,则需要通过如下步骤2)进一步判决;
2)产生随机数(rand),rand的范围为0≤rand<1,如果随机数低于uac-BarringFactor,则表示允许接入,否则表示禁止接入。如果禁止接入,则产生随机数(rand),rand的范围为0≤rand<1,启动T390且T390=(0.7+0.6×rand)×uac-BarringTime。
对于NAS层触发的事件,NAS层决定接入标识、接入类别以及接入原因(或称为原因值)。NAS层提供接入标识和接入类别给AS层,AS层负责执行接入控制操作。如果允许接入,则AS层通知NAS层,NAS层提供接入原因给AS层。基于AS层的接入控制操作的反馈,NAS层负责执行停止或允许业务传输。
对于AS层触发的事件,包括寻呼(paging)触发的事件、或者RAN通知区域更新(RAN Notification Area Update,RNAU)触发的事件,其中,
对于Paging触发的事件:接入类别为access category 0,不受接入控制操作的控制。此外,原因值被覆盖,NAS层和AS层之间交互,NAS层提供原因值。
对于RNAU触发的事件:接入类别为access category 8,接入标识需要NAS层给AS层提供,NAS层和AS层之间交互信息属于终端设备实现行为。原因值AS层决定为rna-Update。
由于NR-light类型的终端设备的引入,导致大量的IOT设备进入现有网络,对于现有网络的信令和负荷造成了冲击。所以针对IOT设备在现网的接入控制需要重新定义。为此,提出了本申请实施例的以下技术方案。
图3为本申请实施例提供的接入控制方法的流程示意图一,如图3所示,所述接入控制方法包括以下步骤:
步骤301:终端设备接收网络设备发送的第一配置信息,所述第一配置信息包括至少一个接入控制参数集。
本申请实施例中,所述网络设备可以是基站,例如gNB。
本申请实施例中,所述终端接收网络设备发送的第一配置信息,所述第一配置信息包括至少一个接入控制参数集。在一可选实施方式中,所述第一配置信息携带在***广播消息中。举个例子:基站发送***广播消息,该***广播消息携带第一配置信息,终端从***广播消息中获取第一配置信息,这里,第一配置信息包括至少一个接入控制参数集。
步骤302:所述终端设备确定第一类业务对应的第一接入类别和第一接入标识,并从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,根据所述第一接入标识和所述第一接入控制参数集执行所述第一类业务对应的接入控制操作。
在一可选实施方式中,所述终端设备为IOT设备,所述第一类业务为针对IOT设备的业务。
本申请实施例中,为所述第一类业务定义一个新的接入类别(即第一接入类别)和/或新的接入标识(即第一接入标识)。即:所述第一接入类别为针对所述第一类业务定义的接入类别;和/或,所述第一接入标识为针对所述第一类业务定义的接入标识。
需要说明的是,为所述第一类业务定义的新的接入类别的个数可以是一个或多个。为所述第一类业务定义的新的接入标识的个数可以是一个或多个。
需要说明的是,本申请实施例中的接入类别也可以称为UE access category。本申请实施例中的接入标识也可以称为UE access identity。
进一步,对于为所述第一类业务定义一个新的接入类别的情况,网络侧可以针对该新的接入类别配置对应的接入控制参数集(即第一接入控制参数集),所述第一接入控制参数集包括以下至少之一:第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;第二参数,所述第二参数用于确定限制因素(BarringFactor);第三参数,所述第三参数用于确定限制时长(BarringTime)。具体实现时,接入控制参数集可以是UAC-BarringInfoSet,UAC-BarringInfoSet的内容参照图2所示,UAC-BarringInfoSet包括如下参数:uac-BarringForAccessIdentity(即第一参数)、uac-BarringFactor(即第二参数)、uac-BarringTime(即第三参数)。
本申请实施例中,所述终端的NAS层确定有所述第一类业务的数据传输,向所述终端的AS层发送第一指示信息,所述第一指示信息用于指示所述第一类业务对应的第一接入类别和第一接入标识;所述终端的AS层从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,并根据所述第一接入标识以及所述第一接入控制参数集,执行接入控制操作。进一步,所述根据所述第一接入标识以及所述第一接入控制参数集,执行接入控制操作,包括:根据所述第一接入标识确定是否允许接入;若确定允许接入,则根据所述第一接入控制参数集执行接入控制操作。
具体实现时,当终端设备发起业务时,NAS层会将第一接入类别和第一接入标识发送给AS层,AS层从***广播消息中获取与第一接入类别对于的第一接入控制参数集,根据第一接入控制参数集确定以下参数:uac-BarringForAccessIdentity,uac-BarringFactor,uac-BarringTime。然后,根据第一接入标识和uac-BarringForAccessIdentity确定是否允许接入,如果允许接入,则根据uac-BarringFactor和uac-BarringTime这两个参数执行接入控制操作(即UAC过程)。
需要说明的是,本申请实施例中的接入控制参数集也可以称为UAC参数。
图4为本申请实施例提供的接入控制方法的流程示意图二,如图4所示,所述接入控制方法包括以下步骤:
步骤401:终端设备接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括禁止接入次数与缩放因子之 间的对应关系。
本申请实施例中,所述网络设备可以是基站,例如gNB。
本申请实施例中,所述终端接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括禁止接入次数与缩放因子之间的对应关系。在一可选实施方式中,所述第一配置信息和所述第二配置信息携带在***广播消息中。举个例子:基站发送***广播消息,该***广播消息携带第一配置信息和第二配置信息,终端从***广播消息中获取第一配置信息和第二配置信息。
在一可选实施方式中,所述终端设备为IOT设备。所述第一接入控制参数集为针对所述IOT设备发起的业务所配置的接入控制参数集。所述第一接入控制参数集包括以下至少之一:第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;第二参数,所述第二参数用于确定限制因素(BarringFactor);第三参数,所述第三参数用于确定限制时长(BarringTime)。具体实现时,接入控制参数集可以是UAC-BarringInfoSet,UAC-BarringInfoSet的内容参照图2所示,UAC-BarringInfoSet包括如下参数:uac-BarringForAccessIdentity(即第一参数)、uac-BarringFactor(即第二参数)、uac-BarringTime(即第三参数)。
在一可选实施方式中,禁止接入次数与缩放因子之间的对应关系可以参照如下表3所示,需要说明的是,禁止接入次数可以是一个取值或一个取值范围:
禁止接入次数 缩放因子(k)
1或者1到3 0.8或者0.2
2或者4到6 0.5或者0.4
…… ……
表3
步骤402:所述终端设备根据所述对应关系,确定尝试接入第一小区的第一禁止接入次数对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
本申请实施例中,所述终端设备通过第一计数器对接入所述第一小区的禁止接入次数进行计数;其中,若所述终端设备判断所述第一小区为禁止接入,则所述第一计数器加1;所述终端设备根据所述第一计数器的数值确定所述第一禁止接入次数。
具体实现时,在一次接入尝试过程中,终端设备设置计数器Couner1=0,若判断接入当前小区为禁止接入时,则计数器自动加1;若禁止接入解除,则终端设备在该小区再次尝试接入还被禁止时,计数器counter1再加1,以此类推。
在一可选实施方式中,若所述终端设备发生小区重选或者所述终端设备能够接入所述第一小区,则所述终端设备重置所述第一计数器为0。
本申请实施例中,若计数器counter1不等于0,则终端设备再次尝试接入第一小区时,根据计数器counter1的值确定对应的缩放因子,并根据该缩放因子和第一接入控制参数集执行针对所述第一小区的接入控制操作。
具体地,终端设备根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,利用缩放处理后的所述至少一个参数执行针对所述第一小区的接入控制操作。
上述方案中,所述终端设备根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,可以通过但不局限于以下方式实现:
方式1)uac-BarringFactor和/或uac-BarringTime乘以缩放因子。
方式2)uac-BarringFactor和/或uac-BarringTime除以缩放因子。
方式3)uac-BarringFactor和/或uac-BarringTime加上缩放因子。
方式4)uac-BarringFactor和/或uac-BarringTime减去缩放因子。
需要说明的是,利用缩放处理后的所述至少一个参数执行针对所述第一小区的接入控制操作,与普通的接入控制操作一致,不同之处在于参数的大小进行了缩放调整。
需要说明的是,本申请实施例中的接入控制参数集也可以称为UAC参数。
图5为本申请实施例提供的接入控制方法的流程示意图三,如图5所示,所述接入控制方法包括以下步骤:
步骤501:终端设备接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括接入类别和/或接入标识与缩放因子之间的对应关系。
本申请实施例中,所述网络设备可以是基站,例如gNB。
本申请实施例中,所述终端接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括接入类别和/或接入标识与缩放因子之间的对应关系。在一可选实施方式中,所述第一配置信息和所述第二配置信息携带在***广播消息中。举个例子:基站发送***广播消息,该***广播消息携带第一配置信息和第二配置信息,终端从***广播消息中获取第一配置信息和第二配置信息。
在一可选实施方式中,所述终端设备为IOT设备。所述第一接入控制参数集为针对所述IOT设备发起的业务所配置的接入控制参数集。所述第一接入控制参数集包括以下至少之一:第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;第二参数,所述第二参数用于确定限制因素(BarringFactor);第三参数,所述第三参数用于确定限制时长(BarringTime)。具体实现时,接入控制参数集可以是UAC-BarringInfoSet,UAC-BarringInfoSet的内容参照图2所示,UAC-BarringInfoSet包括如下参数:uac-BarringForAccessIdentity(即第一参数)、uac-BarringFactor(即第二参数)、uac-BarringTime(即第三参数)。
在一可选实施方式中,接入类别和/或接入标识与缩放因子之间的对应关系可以通过一个缩放因子列表来实现,该列表中每个缩放因子分别对应一个接入类别和/或一个接入标识。如果缩放因子的取值为0,则表示不支持缩放。
步骤502:所述终端设备根据所述对应关系,确定与第一接入类别和/或第一接入标识对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行接入控制操作。
本申请实施例中,所述终端的NAS层确定有第一类业务的数据传输,向所述终端的AS层发送第一指示信息,所述第一指示信息用于指示所述第一类业务对应的第一接入类别和第一接入标识;所述终端的AS层从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,以及从所述第二配置信息中确定与所述第一接入类别和/或所述第一接入标识对应的第一缩放因子,并据所述第一缩放因子和所述第一接入控制参数集执行接入控制操作。
具体地,终端设备根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,利用缩放处理后的所述至少一个参数执行接入控制操作。
上述方案中,所述终端设备根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,可以通过但不局限于以下方式实现:
方式1)uac-BarringFactor和/或uac-BarringTime乘以缩放因子。
方式2)uac-BarringFactor和/或uac-BarringTime除以缩放因子。
方式3)uac-BarringFactor和/或uac-BarringTime加上缩放因子。
方式4)uac-BarringFactor和/或uac-BarringTime减去缩放因子。
需要说明的是,利用缩放处理后的所述至少一个参数执行针对所述第一小区的接入控制操作,与普通的接入控制操作一致,不同之处在于参数的大小进行了缩放调整。
需要说明的是,本申请实施例中的接入控制参数集也可以称为UAC参数。
图6为本申请实施例提供的接入控制方法的流程示意图四,如图6所示,所述接入控制方法包括以下步骤:
步骤601:终端设备接收第一小区发送的RRC释放消息,所述RRC释放消息携带第一配置信息,所述第一配置信息包括第一接入控制参数集。
本申请实施例中,当网络侧释放终端设备进入空闲态或者非激活态时,网络侧通过RRC释放消息给终端设备配置下次接入网络的第一接入控制参数集。
在一可选实施方式中,所述终端设备为IOT设备。所述第一接入控制参数集为针对所述IOT设备发起的业务所配置的接入控制参数集。所述第一接入控制参数集包括以下至少之一:第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;第二参数,所述第二参数用于确定限制因素(BarringFactor);第三参数,所述第三参数用于确定限制时长(BarringTime)。具体实现时,接入控制参数集可以是UAC-BarringInfoSet,UAC-BarringInfoSet的内容参照图2所示,UAC-BarringInfoSet包括如下参数:uac-BarringForAccessIdentity(即第一参数)、uac-BarringFactor(即第二参数)、uac-BarringTime(即第三参数)。
在一可选实施方式中,所述RRC释放消息还携带以下至少之一:
第一指示信息,所述第一指示信息用于指示所述第一接入控制参数集的有效时间;
第二指示信息,所述第二指示信息用于指示所述第一接入控制参数集的有效区域范围(如一个小区列表)。
进一步,所述终端设备接收到所述第一接入控制参数集后,启动第一定时器,所述第一定时器的时长基于所述第一指示信息确定;若所述第一定时器超时,则所述终端设备释放所述第一接入控制参数集。
进一步,所述终端设备接收到所述第一接入控制参数集后,若执行小区重选到所述第二指示信息指示的有效区域范围以外,则所述终端设备释放所述第一接入控制参数集。
本申请实施例中,所述终端设备释放所述第一接入控制参数集后,若再次尝试接入所述第一小区,则使用***广播消息中配置的接入控制参数集执行针对所述第一小区的接入控制操作。
步骤602:所述终端设备在向所述第一小区发起RRC连接建立或RRC连接恢复之前,使用所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
本申请实施例中,所述终端设备通过RRC释放小区获取所述第一接入控制参数集后,在向所述第一小区发起RRC连接建立或RRC连接恢复之前,使用所述第一接入控制参数集执行针对所述第一小区的接入控制操作,并忽略***广播消息中的接入控制参数集。
需要说明的是,本申请实施例中的接入控制参数集也可以称为UAC参数。
图7为本申请实施例提供的接入控制装置的结构组成示意图一,如图7所示,所述接入控制装置包括:
接收单元701,用于接收网络设备发送的第一配置信息,所述第一配置信息包括至少一个接入控制参数集;
处理单元702,用于确定第一类业务对应的第一接入类别和第一接入标识,并从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,根据所述第一接入标识和所述第一接入控制参数集执行所述第一类业务对应的接入控制操作;
其中,所述第一类业务为针对IOT设备的业务。
在一可选实施方式中,所述处理单元702,用于通过终端的NAS层确定有所述第一类业务的数据传输,向所述终端的AS层发送第一指示信息,所述第一指示信息用于指示所述第一类业务对应的第一接入类别和第一接入标识;所述终端的AS层从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,并根据所述第一接入标识以及所述第一接入控制参数集,执行接入控制操作。
在一可选实施方式中,所述处理单元702,用于根据所述第一接入标识确定是否允许接入;若确定允许接入,则根据所述第一接入控制参数集执行接入控制操作。
在一可选实施方式中,所述第一接入类别为针对所述第一类业务定义的接入类别;和/或,
所述第一接入标识为针对所述第一类业务定义的接入标识。
在一可选实施方式中,所述第一接入控制参数集包括以下至少之一:
第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二参数,所述第二参数用于确定限制因素BarringFactor;
第三参数,所述第三参数用于确定限制时长BarringTime。
本领域技术人员应当理解,本申请实施例的上述接入控制装置的相关描述可以参照本申请实施例的接入控制方法的相关描述进行理解。
图8为本申请实施例提供的接入控制装置的结构组成示意图二,如图8所示,所述接入控制装置包括:
接收单元801,用于接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括禁止接入次数与缩放因子之间的对应关系;
处理单元802,用于根据所述对应关系,确定尝试接入第一小区的第一禁止接入次数对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
在一可选实施方式中,所述处理单元802,还用于通过第一计数器对接入所述第一小区的禁止接入次数进行计数;其中,若判断所述第一小区为禁止接入,则所述第一计数器加1;根据所述第一计数器的数值确定所述第一禁止接入次数。
在一可选实施方式中,所述处理单元802,还用于若终端设备发生小区重选或者终端设备能够接入所述第一小区,则重置所述第一计数器为0。
在一可选实施方式中,所述处理单元802,用于根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,利用缩放处理后的所述至少一个参数执行针对所述第一小区的接入控制操作。
在一可选实施方式中,所述第一接入控制参数集包括以下至少之一:
第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二参数,所述第二参数用于确定限制因素BarringFactor;
第三参数,所述第三参数用于确定限制时长BarringTime。
在一可选实施方式中,所述终端设备为IOT设备。
本领域技术人员应当理解,本申请实施例的上述接入控制装置的相关描述可以参照 本申请实施例的接入控制方法的相关描述进行理解。
图9为本申请实施例提供的接入控制装置的结构组成示意图三,如图9所示,所述接入控制装置包括:
接收单元901,用于接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括接入类别和/或接入标识与缩放因子之间的对应关系;
处理单元902,用于根据所述对应关系,确定与第一接入类别和/或第一接入标识对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行接入控制操作。
在一可选实施方式中,所述处理单元902,用于通过终端的NAS层确定有第一类业务的数据传输,向所述终端的AS层发送第一指示信息,所述第一指示信息用于指示所述第一类业务对应的第一接入类别和第一接入标识;所述终端的AS层从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,以及从所述第二配置信息中确定与所述第一接入类别和/或所述第一接入标识对应的第一缩放因子。
在一可选实施方式中,所述处理单元902,用于根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,利用缩放处理后的所述至少一个参数执行接入控制操作。
在一可选实施方式中,所述第一接入控制参数集包括以下至少之一:
第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二参数,所述第二参数用于确定限制因素BarringFactor;
第三参数,所述第三参数用于确定限制时长BarringTime。
在一可选实施方式中,所述终端设备为IOT设备。
本领域技术人员应当理解,本申请实施例的上述接入控制装置的相关描述可以参照本申请实施例的接入控制方法的相关描述进行理解。
图10为本申请实施例提供的接入控制装置的结构组成示意图四,如图10所示,所述接入控制装置包括:
接收单元1001,用于接收第一小区发送的RRC释放消息,所述RRC释放消息携带第一配置信息,所述第一配置信息包括第一接入控制参数集;
处理单元1002,用于在向所述第一小区发起RRC连接建立或RRC连接恢复之前,使用所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
在一可选实施方式中,所述RRC释放消息还携带以下至少之一:
第一指示信息,所述第一指示信息用于指示所述第一接入控制参数集的有效时间;
第二指示信息,所述第二指示信息用于指示所述第一接入控制参数集的有效区域范围。
在一可选实施方式中,所述处理单元1002,还用于在接收到所述第一接入控制参数集后,启动第一定时器,所述第一定时器的时长基于所述第一指示信息确定;若所述第一定时器超时,则释放所述第一接入控制参数集。
在一可选实施方式中,所述处理单元1002,还用于在接收到所述第一接入控制参数集后,若执行小区重选到所述第二指示信息指示的有效区域范围以外,则释放所述第一接入控制参数集。
在一可选实施方式中,所述处理单元1002,还用于在释放所述第一接入控制参 数集后,若再次尝试接入所述第一小区,则使用***广播消息中配置的接入控制参数集执行针对所述第一小区的接入控制操作。
在一可选实施方式中,所述第一接入控制参数集包括以下至少之一:
第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二参数,所述第二参数用于确定限制因素BarringFactor;
第三参数,所述第三参数用于确定限制时长BarringTime。
在一可选实施方式中,所述终端设备为IOT设备。
本领域技术人员应当理解,本申请实施例的上述接入控制装置的相关描述可以参照本申请实施例的接入控制方法的相关描述进行理解。
图11是本申请实施例提供的一种通信设备1100示意性结构图。该通信设备可以是终端设备,也可以是网络设备,图11所示的通信设备1100包括处理器1110,处理器1110可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图11所示,通信设备1100还可以包括存储器1120。其中,处理器1110可以从存储器1120中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1120可以是独立于处理器1110的一个单独的器件,也可以集成在处理器1110中。
可选地,如图11所示,通信设备1100还可以包括收发器1130,处理器1110可以控制该收发器1130与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器1130可以包括发射机和接收机。收发器1130还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备1100具体可为本申请实施例的网络设备,并且该通信设备1100可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备1100具体可为本申请实施例的移动终端/终端设备,并且该通信设备1100可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
图12是本申请实施例的芯片的示意性结构图。图12所示的芯片1200包括处理器1210,处理器1210可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图12所示,芯片1200还可以包括存储器1220。其中,处理器1210可以从存储器1220中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1220可以是独立于处理器1210的一个单独的器件,也可以集成在处理器1210中。
可选地,该芯片1200还可以包括输入接口1230。其中,处理器1210可以控制该输入接口1230与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片1200还可以包括输出接口1240。其中,处理器1210可以控制该输出接口1240与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的移动终端/终端设备,并且该芯片可以实 现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为***级芯片,***芯片,芯片***或片上***芯片等。
图13是本申请实施例提供的一种通信***1300的示意性框图。如图13所示,该通信***1300包括终端设备1310和网络设备1320。
其中,该终端设备1310可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备1320可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的***和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算 机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的***、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的***、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,) ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (51)

  1. 一种接入控制方法,所述方法包括:
    终端设备接收网络设备发送的第一配置信息,所述第一配置信息包括至少一个接入控制参数集;
    所述终端设备确定第一类业务对应的第一接入类别和第一接入标识,并从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,根据所述第一接入标识和所述第一接入控制参数集执行所述第一类业务对应的接入控制操作;
    其中,所述第一类业务为针对物联网IOT设备的业务。
  2. 根据权利要求1所述的方法,其中,所述终端设备确定第一类业务对应的第一接入类别和第一接入标识,并从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,根据所述第一接入标识和所述第一接入控制参数集执行所述第一类业务对应的接入控制操作,包括:
    所述终端的非接入NAS层确定有所述第一类业务的数据传输,向所述终端的接入AS层发送第一指示信息,所述第一指示信息用于指示所述第一类业务对应的第一接入类别和第一接入标识;
    所述终端的AS层从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,并根据所述第一接入标识以及所述第一接入控制参数集,执行接入控制操作。
  3. 根据权利要求1或2所述的方法,其中,所述根据所述第一接入标识以及所述第一接入控制参数集,执行接入控制操作,包括:
    根据所述第一接入标识确定是否允许接入;
    若确定允许接入,则根据所述第一接入控制参数集执行接入控制操作。
  4. 根据权利要求1至3中任一项所述的方法,其中,
    所述第一接入类别为针对所述第一类业务定义的接入类别;和/或,
    所述第一接入标识为针对所述第一类业务定义的接入标识。
  5. 根据权利要求1至4中任一项所述的方法,其中,所述第一接入控制参数集包括以下至少之一:
    第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
    第二参数,所述第二参数用于确定限制因素BarringFactor;
    第三参数,所述第三参数用于确定限制时长BarringTime。
  6. 一种接入控制方法,所述方法包括:
    终端设备接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括禁止接入次数与缩放因子之间的对应关系;
    所述终端设备根据所述对应关系,确定尝试接入第一小区的第一禁止接入次数对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
  7. 根据权利要求6所述的方法,其中,所述方法还包括:
    所述终端设备通过第一计数器对接入所述第一小区的禁止接入次数进行计数;其中,若所述终端设备判断所述第一小区为禁止接入,则所述第一计数器加1;
    所述终端设备根据所述第一计数器的数值确定所述第一禁止接入次数。
  8. 根据权利要求7所述的方法,其中,所述方法还包括:
    若所述终端设备发生小区重选或者所述终端设备能够接入所述第一小区,则所述终端设备重置所述第一计数器为0。
  9. 根据权利要求6至8中任一项所述的方法,其中,所述根据所述第一缩放因子和所述第一接入控制参数集执行针对所述第一小区的接入控制操作,包括:
    根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,利用缩放处理后的所述至少一个参数执行针对所述第一小区的接入控制操作。
  10. 根据权利要求6至9中任一项所述的方法,其中,所述第一接入控制参数集包括以下至少之一:
    第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
    第二参数,所述第二参数用于确定限制因素BarringFactor;
    第三参数,所述第三参数用于确定限制时长BarringTime。
  11. 根据权利要求6至10中任一项所述的方法,其中,所述终端设备为IOT设备。
  12. 一种接入控制方法,所述方法包括:
    终端设备接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括接入类别和/或接入标识与缩放因子之间的对应关系;
    所述终端设备根据所述对应关系,确定与第一接入类别和/或第一接入标识对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行接入控制操作。
  13. 根据权利要求12所述的方法,其中,所述方法还包括:
    所述终端的NAS层确定有第一类业务的数据传输,向所述终端的AS层发送第一指示信息,所述第一指示信息用于指示所述第一类业务对应的第一接入类别和第一接入标识;
    所述终端的AS层从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,以及从所述第二配置信息中确定与所述第一接入类别和/或所述第一接入标识对应的第一缩放因子。
  14. 根据权利要求12或13所述的方法,其中,所述根据所述第一缩放因子和所述第一接入控制参数集执行接入控制操作,包括:
    根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,利用缩放处理后的所述至少一个参数执行接入控制操作。
  15. 根据权利要求12至14中任一项所述的方法,其中,所述第一接入控制参数集包括以下至少之一:
    第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
    第二参数,所述第二参数用于确定限制因素BarringFactor;
    第三参数,所述第三参数用于确定限制时长BarringTime。
  16. 根据权利要求12至15中任一项所述的方法,其中,所述终端设备为IOT设备。
  17. 一种接入控制方法,所述方法包括:
    终端设备接收第一小区发送的无线资源控制RRC释放消息,所述RRC释放消息携带第一配置信息,所述第一配置信息包括第一接入控制参数集;
    所述终端设备在向所述第一小区发起RRC连接建立或RRC连接恢复之前,使用所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
  18. 根据权利要求17所述的方法,其中,所述RRC释放消息还携带以下至少之一:
    第一指示信息,所述第一指示信息用于指示所述第一接入控制参数集的有效时间;
    第二指示信息,所述第二指示信息用于指示所述第一接入控制参数集的有效区域范围。
  19. 根据权利要求18所述的方法,其中,所述方法还包括:
    所述终端设备接收到所述第一接入控制参数集后,启动第一定时器,所述第一定时器的时长基于所述第一指示信息确定;
    若所述第一定时器超时,则所述终端设备释放所述第一接入控制参数集。
  20. 根据权利要求18所述的方法,其中,所述方法还包括:
    所述终端设备接收到所述第一接入控制参数集后,若执行小区重选到所述第二指示信息指示的有效区域范围以外,则所述终端设备释放所述第一接入控制参数集。
  21. 根据权利要求19或20所述的方法,其中,所述方法还包括:
    所述终端设备释放所述第一接入控制参数集后,若再次尝试接入所述第一小区,则使用***广播消息中配置的接入控制参数集执行针对所述第一小区的接入控制操作。
  22. 根据权利要求17至21中任一项所述的方法,其中,所述第一接入控制参数集包括以下至少之一:
    第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
    第二参数,所述第二参数用于确定限制因素BarringFactor;
    第三参数,所述第三参数用于确定限制时长BarringTime。
  23. 根据权利要求17至22中任一项所述的方法,其中,所述终端设备为IOT设备。
  24. 一种接入控制装置,所述装置包括:
    接收单元,用于接收网络设备发送的第一配置信息,所述第一配置信息包括至少一个接入控制参数集;
    处理单元,用于确定第一类业务对应的第一接入类别和第一接入标识,并从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,根据所述第一接入标识和所述第一接入控制参数集执行所述第一类业务对应的接入控制操作;
    其中,所述第一类业务为针对IOT设备的业务。
  25. 根据权利要求24所述的装置,其中,所述处理单元,用于通过终端的NAS层确定有所述第一类业务的数据传输,向所述终端的AS层发送第一指示信息,所述第一指示信息用于指示所述第一类业务对应的第一接入类别和第一接入标识;所述终端的AS层从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,并根据所述第一接入标识以及所述第一接入控制参数集,执行接入控制操作。
  26. 根据权利要求24或25所述的装置,其中,所述处理单元,用于根据所述第一接入标识确定是否允许接入;若确定允许接入,则根据所述第一接入控制参数集执行接入控制操作。
  27. 根据权利要求24至26中任一项所述的装置,其中,
    所述第一接入类别为针对所述第一类业务定义的接入类别;和/或,
    所述第一接入标识为针对所述第一类业务定义的接入标识。
  28. 根据权利要求24至27中任一项所述的装置,其中,所述第一接入控制参数集包括以下至少之一:
    第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
    第二参数,所述第二参数用于确定限制因素BarringFactor;
    第三参数,所述第三参数用于确定限制时长BarringTime。
  29. 一种接入控制装置,所述装置包括:
    接收单元,用于接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括禁止接入次数与缩放因子之间的对应关系;
    处理单元,用于根据所述对应关系,确定尝试接入第一小区的第一禁止接入次数对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
  30. 根据权利要求29所述的装置,其中,所述处理单元,还用于通过第一计数器对接入所述第一小区的禁止接入次数进行计数;其中,若判断所述第一小区为禁止接入,则所述第一计数器加1;根据所述第一计数器的数值确定所述第一禁止接入次数。
  31. 根据权利要求30所述的装置,其中,所述处理单元,还用于若终端设备发生小区重选或者终端设备能够接入所述第一小区,则重置所述第一计数器为0。
  32. 根据权利要求29至31中任一项所述的装置,其中,所述处理单元,用于根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,利用缩放处理后的所述至少一个参数执行针对所述第一小区的接入控制操作。
  33. 根据权利要求29至32中任一项所述的装置,其中,所述第一接入控制参数集包括以下至少之一:
    第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
    第二参数,所述第二参数用于确定限制因素BarringFactor;
    第三参数,所述第三参数用于确定限制时长BarringTime。
  34. 根据权利要求29至33中任一项所述的装置,其中,所述终端设备为IOT设备。
  35. 一种接入控制装置,所述装置包括:
    接收单元,用于接收网络设备发送的第一配置信息和第二配置信息,所述第一配置信息包括第一接入控制参数集,所述第二配置信息包括接入类别和/或接入标识与缩放因子之间的对应关系;
    处理单元,用于根据所述对应关系,确定与第一接入类别和/或第一接入标识对应的第一缩放因子,并根据所述第一缩放因子和所述第一接入控制参数集执行接入控制操作。
  36. 根据权利要求35所述的装置,其中,所述处理单元,用于通过终端的NAS层确定有第一类业务的数据传输,向所述终端的AS层发送第一指示信息,所述第一指示信息用于指示所述第一类业务对应的第一接入类别和第一接入标识;所述终端的AS层从所述第一配置信息中确定与所述第一接入类别对应的第一接入控制参数集,以及从所述第二配置信息中确定与所述第一接入类别和/或所述第一接入标识对应的第一缩放因子。
  37. 根据权利要求35或36所述的装置,其中,所述处理单元,用于根据所述第一缩放因子对所述第一接入控制参数集中的至少一个参数进行缩放处理,利用缩放处理后的所述至少一个参数执行接入控制操作。
  38. 根据权利要求35至37中任一项所述的装置,其中,所述第一接入控制参数集包括以下至少之一:
    第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
    第二参数,所述第二参数用于确定限制因素BarringFactor;
    第三参数,所述第三参数用于确定限制时长BarringTime。
  39. 根据权利要求35至38中任一项所述的装置,其中,所述终端设备为IOT设备。
  40. 一种接入控制装置,所述装置包括:
    接收单元,用于接收第一小区发送的RRC释放消息,所述RRC释放消息携带第一配置信息,所述第一配置信息包括第一接入控制参数集;
    处理单元,用于在向所述第一小区发起RRC连接建立或RRC连接恢复之前,使用所述第一接入控制参数集执行针对所述第一小区的接入控制操作。
  41. 根据权利要求40所述的装置,其中,所述RRC释放消息还携带以下至少之一:
    第一指示信息,所述第一指示信息用于指示所述第一接入控制参数集的有效时间;
    第二指示信息,所述第二指示信息用于指示所述第一接入控制参数集的有效区域范围。
  42. 根据权利要求41所述的装置,其中,所述处理单元,还用于在接收到所述第一接入控制参数集后,启动第一定时器,所述第一定时器的时长基于所述第一指示信息确定;若所述第一定时器超时,则释放所述第一接入控制参数集。
  43. 根据权利要求41所述的装置,其中,所述处理单元,还用于在接收到所述第一接入控制参数集后,若执行小区重选到所述第二指示信息指示的有效区域范围以外,则释放所述第一接入控制参数集。
  44. 根据权利要求42或43所述的装置,其中,所述处理单元,还用于在释放所述第一接入控制参数集后,若再次尝试接入所述第一小区,则使用***广播消息中配置的接入控制参数集执行针对所述第一小区的接入控制操作。
  45. 根据权利要求40至44中任一项所述的装置,其中,所述第一接入控制参数集包括以下至少之一:
    第一参数,所述第一参数用于确定允许接入的接入标识和/或禁止接入的接入标识;
    第二参数,所述第二参数用于确定限制因素BarringFactor;
    第三参数,所述第三参数用于确定限制时长BarringTime。
  46. 根据权利要求40至45中任一项所述的装置,其中,所述终端设备为IOT设备。
  47. 一种终端设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至23中任一项所述的方法。
  48. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至23中任一项所述的方法。
  49. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至23中任一项所述的方法。
  50. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至23中任一项所述的方法。
  51. 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至23中任一项所述的方法。
PCT/CN2019/118572 2019-11-14 2019-11-14 一种接入控制方法及装置、终端设备 WO2021092865A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP19952542.9A EP4017120A4 (en) 2019-11-14 2019-11-14 ACCESS CONTROL METHOD AND APPARATUS, AND TERMINAL DEVICE
CN201980102267.2A CN114731573A (zh) 2019-11-14 2019-11-14 一种接入控制方法及装置、终端设备
PCT/CN2019/118572 WO2021092865A1 (zh) 2019-11-14 2019-11-14 一种接入控制方法及装置、终端设备
US17/741,361 US20220272606A1 (en) 2019-11-14 2022-05-10 Access control method and apparatus, and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/118572 WO2021092865A1 (zh) 2019-11-14 2019-11-14 一种接入控制方法及装置、终端设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/741,361 Continuation US20220272606A1 (en) 2019-11-14 2022-05-10 Access control method and apparatus, and terminal device

Publications (1)

Publication Number Publication Date
WO2021092865A1 true WO2021092865A1 (zh) 2021-05-20

Family

ID=75911608

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/118572 WO2021092865A1 (zh) 2019-11-14 2019-11-14 一种接入控制方法及装置、终端设备

Country Status (4)

Country Link
US (1) US20220272606A1 (zh)
EP (1) EP4017120A4 (zh)
CN (1) CN114731573A (zh)
WO (1) WO2021092865A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113891391A (zh) * 2021-09-14 2022-01-04 哲库科技(北京)有限公司 搜网方法、装置、终端设备及存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114698061A (zh) * 2020-12-31 2022-07-01 展讯通信(上海)有限公司 一种网络接入的方法、通信装置、芯片及模组设备
WO2024035117A1 (en) * 2022-08-09 2024-02-15 Samsung Electronics Co., Ltd. Method and apparatus for handling slice based cell reselection priorities

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873653A (zh) * 2009-04-21 2010-10-27 大唐移动通信设备有限公司 一种小区重定向的方法和***
WO2019032798A1 (en) * 2017-08-09 2019-02-14 Convida Wireless, Llc ACCESS CONTROL IN NR 5G
WO2019142104A1 (en) * 2018-01-18 2019-07-25 Telefonaktiebolaget Lm Ericsson (Publ) Methods of determining access categories and/or establishment causes and related devices
WO2019194605A1 (en) * 2018-04-05 2019-10-10 Samsung Electronics Co., Ltd. Method and apparatus for efficiently providing access control configuration information in next-generation wireless communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3497980B1 (en) * 2017-06-23 2020-10-28 LG Electronics Inc. -1- Method and apparatus for performing access barring check

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873653A (zh) * 2009-04-21 2010-10-27 大唐移动通信设备有限公司 一种小区重定向的方法和***
WO2019032798A1 (en) * 2017-08-09 2019-02-14 Convida Wireless, Llc ACCESS CONTROL IN NR 5G
WO2019142104A1 (en) * 2018-01-18 2019-07-25 Telefonaktiebolaget Lm Ericsson (Publ) Methods of determining access categories and/or establishment causes and related devices
WO2019194605A1 (en) * 2018-04-05 2019-10-10 Samsung Electronics Co., Ltd. Method and apparatus for efficiently providing access control configuration information in next-generation wireless communication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113891391A (zh) * 2021-09-14 2022-01-04 哲库科技(北京)有限公司 搜网方法、装置、终端设备及存储介质

Also Published As

Publication number Publication date
CN114731573A (zh) 2022-07-08
EP4017120A4 (en) 2023-01-04
US20220272606A1 (en) 2022-08-25
EP4017120A1 (en) 2022-06-22

Similar Documents

Publication Publication Date Title
WO2021203310A1 (zh) 一种数据传输方法及装置、终端设备
US20160212728A1 (en) Paging method, network device and communication system
WO2018112871A1 (zh) 数据发送/接收装置、方法以及通信***
WO2021092865A1 (zh) 一种接入控制方法及装置、终端设备
WO2020223978A1 (zh) 无线通信方法、网络设备和终端设备
WO2021232245A1 (zh) 一种测量方法及装置、终端设备、网络设备
CA3064969C (en) State switching method, network device and terminal device
WO2021189235A1 (zh) 一种数据传输方法及装置、通信设备
WO2020258191A1 (zh) 一种接入控制方法及装置、终端
CN110784942B (zh) 一种连接建立方法及装置
WO2020082248A1 (zh) 一种控制终端移动性的方法及装置、终端
WO2022061872A1 (zh) 一种小数据传输方法及装置、终端设备
WO2021142797A1 (zh) 一种信息上报方法、信息获取方法、终端及网络设备
WO2021114206A1 (zh) 一种cli测量的方法及装置、终端设备、网络设备
WO2021056335A1 (zh) 一种接入控制方法及装置、终端设备、网络设备
WO2021026717A1 (zh) 一种资源协调方法及装置、终端设备
WO2020258192A1 (zh) 一种数据传输方法及装置、终端
WO2021000320A1 (zh) 一种数据传输方法及装置、网络设备、终端
WO2021248506A1 (zh) 一种bwp配置方法及装置、终端设备、网络设备
WO2022236835A1 (zh) 确定终端设备行为的方法及装置、终端设备、网络设备
WO2021023185A1 (zh) 一种接入限制检测方法和装置
WO2021092755A1 (zh) 一种上报辅助信息的方法及装置、终端设备、网络设备
WO2021195928A1 (zh) 上报功率回退信息的方法及装置、终端设备、网络设备
WO2022021413A1 (zh) 一种密钥生成方法及装置、终端设备、网络设备
WO2022052004A1 (zh) 一种通信方法及装置、终端设备、网络设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19952542

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019952542

Country of ref document: EP

Effective date: 20220317

NENP Non-entry into the national phase

Ref country code: DE