CN110312323B - Control method, control device and storage medium - Google Patents
Control method, control device and storage medium Download PDFInfo
- Publication number
- CN110312323B CN110312323B CN201910424408.4A CN201910424408A CN110312323B CN 110312323 B CN110312323 B CN 110312323B CN 201910424408 A CN201910424408 A CN 201910424408A CN 110312323 B CN110312323 B CN 110312323B
- Authority
- CN
- China
- Prior art keywords
- network side
- bearer
- reactivate
- user equipment
- ims bearer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000009849 deactivation Effects 0.000 claims description 18
- 230000005540 biological transmission Effects 0.000 claims description 11
- 230000004913 activation Effects 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 10
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 230000007420 reactivation Effects 0.000 claims description 4
- 238000012423 maintenance Methods 0.000 claims 1
- 238000004891 communication Methods 0.000 abstract description 14
- 238000010586 diagram Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 5
- 230000005236 sound signal Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/25—Maintenance of established connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/50—Connection management for emergency connections
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present disclosure relates to a control method, apparatus, and storage medium, including: the user equipment is under the condition that an emergency bearer is established with a network side, the established data bearer is deactivated, and the established IP multimedia subsystem IMS bearer is deactivated by the network side, and whether the network side desires to reactivate the IMS bearer is judged; and maintaining the current normal service state of the user equipment under the condition of judging that the network side desires to reactivate the IMS bearer. And the normal operation of the communication system is facilitated.
Description
Technical Field
The present disclosure relates to the field of mobile communications technologies, and in particular, to a control method, an apparatus, and a storage medium.
Background
In the related art, when an emergency bearer is established between a UE (User Equipment) and a network side, and at this time, a data bearer established between the UE and the network side is deactivated by the network side or the User Equipment, and an IMS (IP Multimedia Subsystem) bearer established between the UE and the network side is deactivated by the network side, the UE switches from a normal service state to a service restriction state. If the purpose of the network side deactivating the IMS bearer is to indicate the user equipment to request to activate the IMS bearer again, and the user equipment cannot activate the IMS bearer when the user equipment is in the service restriction state, this violates the intention of the network side to reactivate the IMS bearer, and causes that the user equipment cannot provide a normal service but can only provide an emergency call service, which seriously affects the normal operation of the communication system.
Disclosure of Invention
In view of the above, the present disclosure provides a control method, an apparatus, and a storage medium.
According to an aspect of the present disclosure, there is provided a control method, the method being applied to a user equipment, the method including:
the user equipment is under the condition that an emergency bearer is established with a network side, the established data bearer is deactivated, and the established IP multimedia subsystem IMS bearer is deactivated by the network side, and whether the network side desires to reactivate the IMS bearer is judged;
and maintaining the current normal service state of the user equipment under the condition of judging that the network side desires to reactivate the IMS bearer.
In a possible implementation manner, when it is determined that a network side desires to reactivate the IMS bearer, maintaining a normal service state in which the user equipment is currently located includes:
and when the network side is judged to expect to reactivate the IMS bearer, initiating an activation request to reactivate the IMS bearer and maintaining the service state of the corresponding IMS bearer data transmission.
In one possible implementation, the method further includes: and when the number of times of the IMS bearer reactivation request failure meets a preset condition, switching the normal service state into a service limiting state, and the user equipment cannot activate the non-emergency bearer when in the service limiting state.
In one possible implementation, the method further includes:
and when the network side does not expect to reactivate the IMS bearer, switching the normal service state into a service restriction state.
In a possible implementation manner, the determining that a network side desires to reactivate the IMS bearer includes:
acquiring a deactivation request sent to user equipment by a network side;
and under the condition that the parameter value analyzed from the deactivation request is used for indicating the IMS bearer to be reactivated, judging that the network side expects to reactivate the IMS bearer.
According to another aspect of the present disclosure, there is provided a control apparatus, the apparatus being applied to a user equipment, the apparatus including:
a judging module, configured to judge whether the network side desires to reactivate the IMS bearer when the user equipment is in a state of establishing an emergency bearer with the network side, the established data bearer is deactivated, and the established IP multimedia subsystem IMS bearer is deactivated by the network side;
and the maintaining module is used for maintaining the current normal service state of the user equipment under the condition that the network side is expected to reactivate the IMS bearer.
In one possible implementation, the maintaining module includes:
and the request submodule is used for initiating an activation request to reactivate the IMS bearer and maintaining a service state corresponding to IMS bearer data transmission when judging that the network side expects to reactivate the IMS bearer.
In one possible implementation, the apparatus further includes:
the first switching module is configured to switch the normal service state to a service-restricted state when the number of times of failure to request to reactivate the IMS bearer meets a preset condition, and the user equipment cannot activate a non-emergency bearer when the user equipment is in the service-restricted state.
In one possible implementation, the apparatus further includes:
and the second switching module is used for switching the normal service state into the service-limited state when the IMS bearer is judged not to be expected to be reactivated by the network side.
In one possible implementation manner, the determining module includes:
the acquisition submodule is used for acquiring a deactivation request sent to the user equipment by a network side;
and the judging submodule is used for judging that the network side expects to reactivate the IMS bearer under the condition that the parameter value analyzed from the deactivation request is used for indicating the IMS bearer to be reactivated.
According to another aspect of the present disclosure, there is provided a control apparatus including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to perform the above method.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having computer program instructions stored thereon, wherein the computer program instructions, when executed by a processor, implement the above-described method.
The method and the device can maintain the current normal service state of the user equipment according to the intention of the network side expecting to reactivate the IMS bearer under the conflict scene that the user equipment establishes an emergency bearer with the network side, the established data bearer is deactivated, and the established IMS bearer is deactivated by the network side. The method effectively avoids the vulnerability that the user equipment enters a service limiting state against the intention of a network to reactivate the IMS bearer in the conflict scenario, and is beneficial to normal operation of a communication system.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features, and aspects of the disclosure and, together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating a control method according to an exemplary embodiment.
FIG. 2 is a flow chart illustrating a control method according to an exemplary embodiment.
FIG. 3 is a flow chart illustrating a control method according to an exemplary embodiment.
Fig. 4 is a flow chart illustrating a control method according to an application example.
Fig. 5 is a block diagram illustrating a wireless control device according to an example embodiment.
FIG. 6 is a block diagram illustrating a wireless control device according to an example embodiment.
Fig. 7 is a block diagram illustrating a wireless control device according to an example embodiment.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
FIG. 1 is a flow chart illustrating a control method according to an exemplary embodiment. The method may be applied to a user equipment, as shown in fig. 1, and may include:
In the embodiment of the present disclosure, the network side may include, for example, a BS (Base Station) or a Radio remote Station (Radio remote), and the embodiment of the present disclosure does not limit the type of the network side. The user equipment may be, for example, an electronic device with a mobile communication function, such as a mobile phone, a tablet computer, a smart watch, or a notebook, and the type of the user equipment is not limited in the embodiments of the present disclosure.
The data bearer may be used to carry internet data services, the IMS bearer may be used to carry Voice services in a VoLTE (Voice over Long-Term Evolution) control plane and a media plane, and the emergency bearer may be used to carry emergency call services.
As an example of the embodiment of the present disclosure, the ue may establish an emergency bearer with the network side (for example, when the user uses the ue to make an emergency call, the ue establishes the emergency bearer with the network side); if the data bearer established between the ue and the network side is deactivated (for example, the data bearer is actively deactivated by the ue, or the data bearer is actively deactivated by the network side) under the condition that the emergency bearer is established between the ue and the network side; and the IMS bearer established by the ue and the network side is deactivated by the network side, the ue may determine whether the network side desires to reactivate the IMS bearer, and in a possible implementation manner, the ue may obtain a deactivation request sent by the network side to the ue, and determine whether a parameter value analyzed from the deactivation request is a parameter (e.g., a cause value 39) for indicating that the IMS bearer is reactivated, and when the parameter value analyzed from the deactivation request is a parameter for indicating that the IMS bearer is reactivated, the ue may determine that the network side desires to reactivate the IMS bearer. It should be noted that the user equipment may also determine, in other ways, whether the network side desires to reactivate the IMS bearer, which is not limited in this disclosure.
The user equipment can maintain the current normal service state of the user equipment under the condition that the network side is expected to reactivate the IMS bearer. When the user is in a normal service state, any one or more of a data bearer, an IMS bearer, or an emergency bearer may be established with the network side.
FIG. 2 is a flow chart illustrating a control method according to an exemplary embodiment. As shown in fig. 2, the difference between fig. 2 and fig. 1 is that step 101 may include:
For example, the user equipment may send an activation request for activating the IMS bearer to the network side when it is determined that the network side desires to reactivate the IMS bearer, and the network side may establish a service state corresponding to IMS bearer data transmission with the user equipment in response to the activation request. In this way, the user equipment can respond to the request of the network side for reactivating the IMS when the emergency bearer is currently established only with the network side, and establish the IMS bearer with the network side, thereby maintaining the normal service state of the user equipment.
In a possible implementation manner, when the number of times of failure to request to reactivate the IMS bearer meets a preset condition, the normal service state is switched to a service restriction state, and the user equipment cannot activate a non-emergency bearer when the user equipment is in the service restriction state.
For example, the user equipment may preset the maximum number of times of failure requesting to establish the IMS bearer (for example, the preset condition may also be an interval value), and when determining that the number of times of failure requesting to establish the IMS bearer is greater than the maximum number of times, the user equipment may control the user equipment to switch from the normal service state to the service restriction state, and the user equipment may not activate the non-emergency bearer when in the service restriction state.
Therefore, when the user equipment fails to request the establishment of the IMS bearer for multiple times, the network side may not have the condition of establishing the IMS bearer with the user equipment, and at the moment, the user equipment can be controlled to be switched from the normal service state to the service-limited state, so that the waste of more resources by the user equipment is effectively avoided.
FIG. 3 is a flow chart illustrating a control method according to an exemplary embodiment. As shown in fig. 3, the difference between fig. 3 and fig. 1 is that the method further comprises: the method further comprises the following steps:
For example, when the user equipment does not analyze the parameter indicating the network side to reactivate the IMS bearer in the deactivation request issued from the network side, the user equipment may be switched from the current normal service state to the limited service state. Therefore, the user equipment can judge whether the current normal service state is switched to the service limiting state by judging whether the network side desires to reactivate the IMS bearer or not under the conflict scene that the emergency bearer is established with the network side, the established data bearer is deactivated, and the established IMS bearer is deactivated by the network side, so that the service state switching of the user equipment is more consistent with the real intention of the network side, and the normal operation of a communication system is facilitated.
Fig. 4 is a flow chart illustrating a control method according to an application example. As shown in figure 4 of the drawings,
in an initial state, the ue may be in a normal service state, and in step 400, the ue may establish a data bearer with the network side. In step 401, the user equipment may establish an IMS bearer with the network side. In step 402, the user equipment may, for example, perform an emergency call, establishing an emergency bearer with the network side. In step 403, the user equipment may e.g. actively deactivate the data bearer. In step 404, the ue may receive a deactivation request issued by the network side for deactivating the IMS bearer, so that the IMS bearer may be deactivated by the network side. In step 405, the user equipment may determine whether the deactivation request includes a cause value 39 for instructing the user equipment to reactivate the IMS bearer. The user equipment may execute step 406 to send an activation request for reactivating the IMS bearer when determining that the reason value 39 is included in the deactivation request. And then execute step 407, determine whether the IMS bearer is successfully reactivated, e.g., the ue may establish an IMS bearer with the network side when receiving an indication allowing the IMS bearer to be established, which is issued by the network side in response to the activation request, and determine that the IMS bearer is successfully reactivated; the user equipment may determine that the IMS bearer is failed to be reactivated when the network side response is not received within a preset time period. The user equipment may execute step 408 to maintain the current normal service state when determining that the IMS bearer is successfully reactivated. The user equipment may execute step 409 when determining that the IMS bearer reactivation fails, to determine whether the number of times of the IMS bearer reactivation failure exceeds a maximum value. The user equipment may execute step 410 when determining that the number of times of failure to reactivate the IMS bearer exceeds the maximum value, and switch from the normal service state to the limited service state. The user equipment may execute step 406 when determining that the number of times of failure to reactivate the IMS bearer does not exceed the maximum value.
Returning to step 405, the user equipment may execute step 410 when determining that the reason value 39 is not included in the deactivation request.
Fig. 5 is a block diagram illustrating a wireless control device according to an example embodiment. The apparatus may be applied to a user equipment, and as shown in fig. 5, the apparatus may include:
a determining module 51, configured to determine whether the network side desires to reactivate the IMS bearer when the user equipment is in a state of establishing an emergency bearer with the network side, the established data bearer is deactivated, and the established IP multimedia subsystem IMS bearer is deactivated by the network side;
a maintaining module 52, configured to maintain a current normal service state of the ue when it is determined that the network side desires to reactivate the IMS bearer.
FIG. 6 is a block diagram illustrating a wireless control device according to an example embodiment. For convenience of explanation, only the portions related to the present embodiment are shown in fig. 6. Components in fig. 6 that are numbered the same as those in fig. 5 have the same functions, and detailed descriptions of these components are omitted for the sake of brevity. As shown in fig. 6
In one possible implementation, the maintaining module 52 may include:
the request submodule 521 is configured to initiate an activation request to reactivate the IMS bearer when it is determined that the network side desires to reactivate the IMS bearer, and maintain a service state of data transmission of the corresponding IMS bearer.
In one possible implementation, the apparatus further includes:
a first switching module 53, configured to switch the normal service state to a service-restricted state when the number of times of failure of requesting to reactivate the IMS bearer meets a preset condition, where the user equipment cannot activate a non-emergency bearer when the user equipment is in the service-restricted state.
In one possible implementation, the apparatus further includes:
a second switching module 54, configured to switch the normal service state to a service-restricted state when it is determined that the network side does not expect to reactivate the IMS bearer.
In a possible implementation manner, the determining module 51 includes:
the obtaining sub-module 511 is configured to obtain a deactivation request sent by a network side to the user equipment;
the determining sub-module 512 is configured to determine that the network side desires to reactivate the IMS bearer under the condition that the parameter value analyzed from the deactivation request is used to indicate that the IMS bearer is reactivated.
Fig. 7 is a block diagram illustrating a wireless control device according to an example embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 7, the apparatus 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium, such as the memory 804, is also provided that includes computer program instructions executable by the processor 820 of the device 800 to perform the above-described methods.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terms used herein were chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the techniques in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
Claims (10)
1. A control method, the method is applied to user equipment, and the method comprises the following steps:
the user equipment is under the condition that an emergency bearer is established with a network side, the established data bearer is deactivated, and the established IP multimedia subsystem IMS bearer is deactivated by the network side, and whether the network side desires to reactivate the IMS bearer is judged;
under the condition that the network side is expected to reactivate the IMS bearer, maintaining the current normal service state of the user equipment;
the maintaining the current normal service state of the user equipment under the condition of judging that the network side desires to reactivate the IMS bearer includes:
and when the network side is judged to expect to reactivate the IMS bearer, initiating an activation request to reactivate the IMS bearer and maintaining the service state of the corresponding IMS bearer data transmission.
2. The method of claim 1, further comprising: and when the number of times of the IMS bearer reactivation request failure meets a preset condition, switching the normal service state into a service limiting state, and the user equipment cannot activate the non-emergency bearer when in the service limiting state.
3. The method of claim 1, further comprising:
and when the network side does not expect to reactivate the IMS bearer, switching the normal service state into a service restriction state.
4. The method of claim 1, wherein determining that a network side desires to reactivate the IMS bearer comprises:
acquiring a deactivation request sent to user equipment by a network side;
and under the condition that the parameter value analyzed from the deactivation request is used for indicating the IMS bearer to be reactivated, judging that the network side expects to reactivate the IMS bearer.
5. A control apparatus, the apparatus being applied to a user equipment, the apparatus comprising:
a judging module, configured to judge whether the network side desires to reactivate the IMS bearer when the user equipment is in a state of establishing an emergency bearer with the network side, the established data bearer is deactivated, and the established IP multimedia subsystem IMS bearer is deactivated by the network side;
a maintaining module, configured to maintain a normal service state of the ue when it is determined that a network side desires to reactivate the IMS bearer;
the maintenance module includes:
and the request submodule is used for initiating an activation request to reactivate the IMS bearer and maintaining a service state corresponding to IMS bearer data transmission when judging that the network side expects to reactivate the IMS bearer.
6. The apparatus of claim 5, further comprising:
the first switching module is configured to switch the normal service state to a service-restricted state when the number of times of failure to request to reactivate the IMS bearer meets a preset condition, and the user equipment cannot activate a non-emergency bearer when the user equipment is in the service-restricted state.
7. The apparatus of claim 5, further comprising:
and the second switching module is used for switching the normal service state into the service-limited state when the IMS bearer is judged not to be expected to be reactivated by the network side.
8. The apparatus of claim 5, wherein the determining module comprises:
the acquisition submodule is used for acquiring a deactivation request sent to the user equipment by a network side;
and the judging submodule is used for judging that the network side expects to reactivate the IMS bearer under the condition that the parameter value analyzed from the deactivation request is used for indicating the IMS bearer to be reactivated.
9. A control device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
performing the method of any one of claims 1 to 4.
10. A non-transitory computer readable storage medium having computer program instructions stored thereon, wherein the computer program instructions, when executed by a processor, implement the method of any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910424408.4A CN110312323B (en) | 2019-05-21 | 2019-05-21 | Control method, control device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910424408.4A CN110312323B (en) | 2019-05-21 | 2019-05-21 | Control method, control device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110312323A CN110312323A (en) | 2019-10-08 |
CN110312323B true CN110312323B (en) | 2021-01-08 |
Family
ID=68075492
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910424408.4A Active CN110312323B (en) | 2019-05-21 | 2019-05-21 | Control method, control device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110312323B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101742452A (en) * | 2008-11-10 | 2010-06-16 | 华为技术有限公司 | Load bearing management method, relevant equipment and network system |
CN101932026A (en) * | 2009-06-26 | 2010-12-29 | 华为终端有限公司 | Business processing method, communication equipment and communication system |
CN101998331A (en) * | 2009-08-21 | 2011-03-30 | 大唐移动通信设备有限公司 | Identification method and equipment for user equipment registration status |
CN104936310A (en) * | 2010-04-27 | 2015-09-23 | 日本电气株式会社 | Communication method, mobile network system and device |
CN105765933A (en) * | 2013-09-24 | 2016-07-13 | 日本电气株式会社 | P-cscf restoration |
WO2017139130A1 (en) * | 2016-02-10 | 2017-08-17 | Intel IP Corporation | Attach without pdn connectivity |
CN107124745A (en) * | 2016-02-24 | 2017-09-01 | 中国移动通信集团广东有限公司 | VoLTE traffics method for routing, apparatus and system |
CN109600829A (en) * | 2017-09-30 | 2019-04-09 | 深圳市海思半导体有限公司 | A kind of method and apparatus restoring network |
-
2019
- 2019-05-21 CN CN201910424408.4A patent/CN110312323B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101742452A (en) * | 2008-11-10 | 2010-06-16 | 华为技术有限公司 | Load bearing management method, relevant equipment and network system |
CN101932026A (en) * | 2009-06-26 | 2010-12-29 | 华为终端有限公司 | Business processing method, communication equipment and communication system |
CN101998331A (en) * | 2009-08-21 | 2011-03-30 | 大唐移动通信设备有限公司 | Identification method and equipment for user equipment registration status |
CN104936310A (en) * | 2010-04-27 | 2015-09-23 | 日本电气株式会社 | Communication method, mobile network system and device |
CN105765933A (en) * | 2013-09-24 | 2016-07-13 | 日本电气株式会社 | P-cscf restoration |
WO2017139130A1 (en) * | 2016-02-10 | 2017-08-17 | Intel IP Corporation | Attach without pdn connectivity |
CN107124745A (en) * | 2016-02-24 | 2017-09-01 | 中国移动通信集团广东有限公司 | VoLTE traffics method for routing, apparatus and system |
CN109600829A (en) * | 2017-09-30 | 2019-04-09 | 深圳市海思半导体有限公司 | A kind of method and apparatus restoring network |
Also Published As
Publication number | Publication date |
---|---|
CN110312323A (en) | 2019-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3745790B1 (en) | Information configuration method and device, method and device for determining time-frequency location, and base station | |
EP3188066B1 (en) | A method and an apparatus for managing an application | |
WO2016192323A1 (en) | Video communication method and device | |
US20160255521A1 (en) | Method and apparatus for testing a smart device | |
EP3136699A1 (en) | Method and device for connecting external equipment | |
CN106792937B (en) | Method and device for processing call request | |
CN108702763B (en) | Method and device for sending lead code and scheduling request | |
US20180091328A1 (en) | Prompting method, prompting device and prompting system | |
CN105163290B (en) | roaming prompting method and device | |
EP3565374B1 (en) | Region configuration methods and devices | |
CN106790018B (en) | Resource sharing playing method and device | |
CN111294850B (en) | Measurement reporting method and device, and terminal equipment information acquisition method and device | |
CN110750226A (en) | Central control equipment management method and device, computer equipment and storage medium | |
CN111262941B (en) | Method for reconnecting cloud server and electronic equipment | |
CN109922465B (en) | Network configuration method and device | |
CN105227426B (en) | Application interface switching method and device and terminal equipment | |
CN105376318A (en) | File transmission method, device and system | |
CN110311692B (en) | User equipment, control method and storage medium | |
CN110233927B (en) | Call request access interface display method and device | |
CN110312323B (en) | Control method, control device and storage medium | |
CN111290843A (en) | Process management method and device | |
US11997542B2 (en) | Method and device for message transmission | |
CN111294230B (en) | Parameter acquisition method and device | |
US11895659B2 (en) | Control instruction transmission method, base station, terminal and storage medium | |
CN111343272B (en) | Cross-node request retry method of star network architecture and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |