[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113424639B - Access control method, device and terminal - Google Patents

Access control method, device and terminal Download PDF

Info

Publication number
CN113424639B
CN113424639B CN201980091414.0A CN201980091414A CN113424639B CN 113424639 B CN113424639 B CN 113424639B CN 201980091414 A CN201980091414 A CN 201980091414A CN 113424639 B CN113424639 B CN 113424639B
Authority
CN
China
Prior art keywords
access
data transmission
access control
edt
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201980091414.0A
Other languages
Chinese (zh)
Other versions
CN113424639A (en
Inventor
王淑坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN113424639A publication Critical patent/CN113424639A/en
Application granted granted Critical
Publication of CN113424639B publication Critical patent/CN113424639B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/02Hybrid access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides an access control method, an access control device and a terminal, wherein the method comprises the following steps: the method comprises the steps that a terminal receives first configuration information sent by network equipment, wherein the first configuration information comprises at least one access control parameter set; the terminal determines a first access category corresponding to EDT data transmission, determines a first access control parameter set corresponding to the first access category from the first configuration information, and executes access control operation corresponding to the EDT data transmission according to the first access control parameter set.

Description

Access control method, device and terminal
Technical Field
The embodiment of the application relates to the technical field of mobile communication, in particular to an access control method, an access control device and a terminal.
Background
In long term evolution (Long Term Evolution, LTE), early data transmission (Early Data Transmission, EDT) is introduced. EDT data transmission is also called small data transmission or small data packet transmission or small packet data transmission, and unlike caller (Mobile Origination call, MO) data transmission of Mobile Broadband (MBB) service, EDT data transmission does not occupy a lot of radio resources, but wireless access of EDT data transmission adopts the same access control requirement as normal MO data transmission, resulting in lower efficiency of EDT data transmission.
Disclosure of Invention
The embodiment of the application provides an access control method, an access control device and a terminal.
The access control method provided by the embodiment of the application comprises the following steps:
the method comprises the steps that a terminal receives first configuration information sent by network equipment, wherein the first configuration information comprises at least one access control parameter set;
the terminal determines a first access category corresponding to EDT data transmission, determines a first access control parameter set corresponding to the first access category from the first configuration information, and executes access control operation corresponding to the EDT data transmission according to the first access control parameter set.
The access control method provided by the embodiment of the application comprises the following steps:
the terminal determines whether the EDT data transmission performs an access control operation based on the first information.
The access control device provided by the embodiment of the application comprises:
a receiving unit, configured to receive first configuration information sent by a network device, where the first configuration information includes at least one access control parameter set;
a determining unit, configured to determine a first access category corresponding to EDT data transmission, and determine a first access control parameter set corresponding to the first access category from the first configuration information;
And the access control unit is used for executing the access control operation corresponding to the EDT data transmission according to the first access control parameter set.
The access control device provided by the embodiment of the application comprises:
and a determining unit for determining whether the EDT data transmission performs an access control operation based on the first information.
The terminal provided by the embodiment of the application comprises a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory to execute the access control method.
The chip provided by the embodiment of the application is used for realizing the access control method.
Specifically, the chip includes: and a processor for calling and running the computer program from the memory, so that the device mounted with the chip executes the access control method.
The computer readable storage medium provided in the embodiments of the present application is configured to store a computer program, where the computer program causes a computer to execute the above-mentioned access control method.
The computer program product provided by the embodiment of the application comprises computer program instructions, wherein the computer program instructions enable a computer to execute the access control method.
The computer program provided in the embodiments of the present application, when executed on a computer, causes the computer to execute the above-described access control method.
By the technical scheme, how to execute access control operation in the EDT data transmission scene is clear, so that the access control is reasonable and effective, and the EDT data transmission is ensured to be timely and effective.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a schematic diagram of a communication system architecture provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of a UAC-BarringInfoset provided in an embodiment of the present application;
FIG. 3-1 is a flow chart of a control plane transmitting EDT data provided by an embodiment of the present application;
fig. 3-2 is a flowchart of a user plane transmitting EDT data according to an embodiment of the present application;
fig. 4 is a flowchart of an access control method according to an embodiment of the present application;
fig. 5 is a second flow chart of an access control method provided in the embodiment of the present application;
fig. 6 is a schematic diagram of the structural components of an access control device according to an embodiment of the present application;
Fig. 7 is a schematic diagram II of the structural composition of the access control device provided in the embodiment of the present application;
fig. 8 is a schematic structural diagram of a communication device provided in an embodiment of the present application;
FIG. 9 is a schematic block diagram of a chip of an embodiment of the present application;
fig. 10 is a schematic block diagram of a communication system provided in an embodiment of the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be made with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The technical solution of the embodiment of the application can be applied to various communication systems, for example: global system for mobile communications (Global System of Mobile communication, GSM), code division multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) systems, general packet radio service (General Packet Radio Service, GPRS), long term evolution (Long Term Evolution, LTE) systems, LTE frequency division duplex (Frequency Division Duplex, FDD) systems, LTE time division duplex (Time Division Duplex, TDD), universal mobile telecommunications system (Universal Mobile Telecommunication System, UMTS), worldwide interoperability for microwave access (Worldwide Interoperability for Microwave Access, wiMAX) communication systems, or 5G systems, and the like.
Exemplary, a communication system 100 to which embodiments of the present application apply is shown in fig. 1. The communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal 120 (or referred to as a communication terminal, terminal). Network device 110 may provide communication coverage for a particular geographic area and may communicate with terminals located within the coverage area. Alternatively, the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, an evolved base station (Evolutional Node B, eNB or eNodeB) in an LTE system, or a radio controller in a cloud radio access network (Cloud Radio Access Network, CRAN), or the network device may be a mobile switching center, a relay station, an access point, a vehicle device, a wearable device, a hub, a switch, a bridge, a router, a network-side device in a 5G network, or a network device in a future evolved public land mobile network (Public Land Mobile Network, PLMN), etc.
The communication system 100 further includes at least one terminal 120 located within the coverage area of the network device 110. "terminal" as used herein includes, but is not limited to, connection via wireline, such as via public-switched telephone network (Public Switched Telephone Networks, PSTN), digital subscriber line (Digital Subscriber Line, DSL), digital cable, direct cable connection; and/or another data connection/network; and/or via a wireless interface, e.g., for a cellular network, a wireless local area network (Wireless Local Area Network, WLAN), a digital television network such as a DVB-H network, a satellite network, an AM-FM broadcast transmitter; and/or means of the other terminal arranged to receive/transmit communication signals; and/or internet of things (Internet of Things, ioT) devices. Terminals arranged to communicate over a wireless interface may be referred to as "wireless communication terminals", "wireless terminals" or "mobile terminals". Examples of mobile terminals include, but are not limited to, satellites or cellular telephones; a personal communications system (Personal Communications System, PCS) terminal that may combine a cellular radiotelephone with data processing, facsimile and data communications capabilities; a PDA that can include a radiotelephone, pager, internet/intranet access, web browser, organizer, calendar, and/or a global positioning system (Global Positioning System, GPS) receiver; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. A terminal may refer to an access terminal, user Equipment (UE), subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital assistant (Personal Digital Assistant, PDA), a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, an in-vehicle device, a wearable device, a terminal in a 5G network or a terminal in a future evolved PLMN, etc.
Alternatively, direct to Device (D2D) communication may be performed between the terminals 120.
Alternatively, the 5G system or 5G network may also be referred to as a New Radio (NR) system or NR network.
Fig. 1 illustrates one network device and two terminals, alternatively, the communication system 100 may include multiple network devices and each network device may include other numbers of terminals within a coverage area, which is not limited in this embodiment.
Optionally, the communication system 100 may further include a network controller, a mobility management entity, and other network entities, which are not limited in this embodiment of the present application.
It should be understood that a device having a communication function in a network/system in an embodiment of the present application may be referred to as a communication device. Taking the communication system 100 shown in fig. 1 as an example, the communication device may include a network device 110 and a terminal 120 with communication functions, where the network device 110 and the terminal 120 may be specific devices described above, and are not described herein again; the communication device may also include other devices in the communication system 100, such as a network controller, a mobility management entity, and other network entities, which are not limited in this embodiment of the present application.
It should be understood that the terms "system" and "network" are used interchangeably herein. The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In order to facilitate understanding of the technical solutions of the embodiments of the present application, the following describes the technical solutions related to the embodiments of the present application.
Figure GPA0000308713680000081
Unified access control (Unified Access Control, UAC)
For load control at the network side, a UAC mechanism is introduced in the NR. In the UAC mechanism, an Access Category (Access Category) and an Access identity (Access identity) are defined. The meanings are shown in tables 1 and 2 below.
Figure GPA0000308713680000082
TABLE 1
Figure GPA0000308713680000091
TABLE 2
● UAC parameter configuration
An Access network element (e.g., a base station) broadcasts Access control information related to an Access category and an Access identifier, and an Access Stratum (AS) of the UE performs an Access control operation (i.e., ACB checking) according to the Access control information and the Access category and the Access identifier provided by the AS layer or the non-Access Stratum (Non Access Stratum, NAS).
The access control information broadcast by the access network element comprises UAC parameters configured with access class granularity (per access category) and/or with public land mobile network (Public Land Mobile Network, PLMN) granularity (per PLMN). The UAC parameter is specifically a UAC restriction information set (UAC-barrecinnfoset), and the network side configures at most 8 UAC-barrecinnfoset, and each access category is associated with one UAC-barrecinnfoset, for a total of 64 access categories (where access category 0 does not need to be configured). It is also possible to associate one UAC-barrengpercatlist per PLMN, further if the per PLMN information is not configured, the above configuration is applicable for all PLMNs.
For the access category1, an auxiliary information is configured to assist in judging whether to access the control operation (i.e., ACB checking) for the access category1, and the auxiliary information is uac-access category1-SelectionAssistanceInfo.
● UAC mechanism: access control operation (i.e. ACB checking)
The access control operation is performed based on a UAC parameter (i.e., UAC-barrecinfoset), which is specifically included in fig. 2. On the premise that neither T390 nor T302 is running and the access class is not access category 0, the execution of the access control operation includes the steps of:
1) If the corresponding bit (bit) of the access identifier in uac-barrengForAccess identity is set to 0, which indicates that the access is allowed, if the corresponding bit is set to 1, further decision is needed through the following step 2);
2) A random number (rand) is generated, the range of rand is 0.ltoreq.rand < 1, if the random number is lower than uac-barrenfactor, access is allowed, otherwise access is forbidden. If access is forbidden, a random number (rand) is generated, the range of rand is 0.ltoreq.rand < 1, T390 is enabled and T390= (0.7+0.6Xrand). Times. uac-BarringTime.
For NAS layer triggered events, the NAS layer decides the access identity, access class, and access cause (or cause value). The NAS layer provides access identities and access categories to the AS layer, which is responsible for performing access control operations. If access is allowed, the AS layer informs the NAS layer that the NAS layer provides the access cause to the AS layer. Based on the feedback of the access control operation of the AS layer, the NAS layer is responsible for performing a stop or allowing traffic transmission.
For AS layer triggered events, including paging (paging) triggered events, or RAN notification area update (RAN Notification Area Update, RNAU) triggered events, where,
for Paging triggered events: the access category is access category 0, which is not controlled by the access control operation. In addition, the cause value is overridden, interaction between NAS layer and AS layer, NAS layer provides the cause value.
For RNAU triggered events: the access category is access category 8, the access identifier needs to be provided for the AS layer by the NAS layer, and interaction information between the NAS layer and the AS layer belongs to UE realization behaviors. The cause value AS layer is determined AS a rn-Update.
Figure GPA0000308713680000101
EDT data transmission
EDT data transmission is introduced in LTE, and in the EDT data transmission process, the UE may always remain in an idle (idle) state, a suspended (suspended) state, or an inactive (inactive) state, so as to complete the EDT data transmission in uplink and/or downlink.
The EDT data transmission may employ a control plane transmission scheme, as shown in fig. 3-1, comprising the steps of:
1. the UE sends an RRC early data request (RRCEarlyDataRequest) message to the eNB.
Here, the RRCEarlyDataRequest message may also be referred to as an EDT data transmission request message, or a small data packet transmission request message, or a small packet data transmission request message.
Here, the RRCEarlyDataRequest message carries the following information: S-TMSI, establishmentCause, dedicatedInfoNAS. The dediedbnfonas is EDT data (or referred to as small data, or small data packets, or small packet data).
2. The eNB sends an initial UE message (Initial UE message) to the MME, the initial UE message carrying a NAS message (NAS message).
3. The Bearer (modified Bearer) is modified between the MME and the S-GW.
4. The MME transmits Uplink data (Uplink data) to the S-GW.
5. The S-GW sends Downlink data (Downlink data) to the MME.
6a, downlink NAS TRANSPORT (DLNAS TRANSPORT).
6b, establishing a CONNECTION (CONNECTION).
7. The eNB sends an RRC early data complete (RRCEarlyDataComplete) message to the UE.
Here, the RRCEarlyDataComplete message bearer dedicatedInfoNAS, dedicatedInfoNAS is EDT data (alternatively referred to as small data, or small data packets, or small packet data).
8. The Bearer (modification Bearer) is modified between the MME and the S-GW, and an S1 release procedure is performed between the eNB and the MME (S1 release procedure).
The EDT data transmission may also employ a user plane transmission scheme, as shown in fig. 3-2, comprising the steps of:
1. the UE transmits an RRC connection resume request (RRCConnectionResumeRequest) message to the eNB, and Uplink data (Uplink data).
Here, the RRCConnectionResumeRequest carries the following information: resumeID, resumeCause, shortResumeMAC-I.
2. The eNB sends a UE context restoration request (UE Context Resume Request) message to the MME.
3. The Bearer (modified Bearer) is modified between the MME and the S-GW.
4. The MME sends a UE context restore response (UE Context Resume Response) message to the eNB.
5. The eNB transmits Uplink data (Uplink data) to the S-GW.
6. The S-GW transmits Downlink data to the eNB.
7. The Bearer (modification Bearer) is modified between the MME and the S-GW, and an S1 suspension procedure is performed between the eNB and the MME (S1 Suspend procedure).
8. The eNB transmits an RRC connection release (RRCConnectionRelease) message and Downlink data (Downlink data) to the UE.
Here, the RRCConnectionRelease message carries the following information: releaseCause, releaseID, NCC.
Fig. 3-1 and fig. 3-2 are an illustration of LTE, and NR is the same as LTE, except that for NR, eNB needs to be replaced with gNB, mobility management function entity (MME, mobility Management Entity) is replaced with an access and mobility management function entity (AMF, access and Mobility Management Function), and Serving Gateway (S-GW) is replaced with a user plane function entity (UPF, user Plane Function).
For the EDT data transmission of the two schemes, the UE completes the EDT data transmission without entering the connected state, and such transmission is different from the data transmission entering the connected state. For EDT data transmission, it does not occupy a lot of radio resources, unlike the radio resources occupied by RRC access for MO data transmission of MBB traffic. Therefore, an access control requirement is required to be defined for the EDT data transmission, and an access control mode for the EDT data transmission is provided in the embodiment of the application, so that the access control is reasonable and effective, and the data transmission and time effectiveness are ensured.
Fig. 4 is a flowchart of an access control method provided in an embodiment of the present application, as shown in fig. 4, where the access control method includes the following steps:
step 401: the terminal receives first configuration information sent by the network equipment, wherein the first configuration information comprises at least one access control parameter set.
In this embodiment of the present application, the terminal may be any device capable of communicating with a network, such as a mobile phone, a tablet computer, a notebook, a vehicle-mounted terminal, and a wearable device.
In the embodiment of the present application, the network device may be a base station, for example, a 5G base station (i.e., gNB), and a 4G base station (i.e., eNB).
In this embodiment of the present application, the terminal receives first configuration information sent by a network device, where the first configuration information includes at least one access control parameter set. In an alternative embodiment, the first configuration information is carried in a system broadcast message. For example: the base station sends a system broadcast message, the system broadcast message carries first configuration information, and the terminal obtains the first configuration information from the system broadcast message, wherein the first configuration information is specifically UAC parameter configuration, the first configuration information comprises at least one access control parameter set, the access control parameter set can be UAC-BarringInfoSet, UAC-BarringInfoset, the content of which is shown in fig. 2, and the UAC-BarringInfoset comprises the following parameters: uac-BarringForAccessIdentity, uac-BarringFactor, uac-BarringTime.
In the first configuration information, access control parameter sets (i.e., UAC-barrenninfoset) are configured with access categories as granularity, and each access category is associated with one access control parameter set.
Step 402: the terminal determines a first access category corresponding to EDT data transmission, determines a first access control parameter set corresponding to the first access category from the first configuration information, and executes access control operation corresponding to the EDT data transmission according to the first access control parameter set.
EDT data transmission is also referred to herein as small data transmission or small data packet transmission or small packet data transmission. The embodiment of the present application defines one or more new access categories for wireless access of EDT data transmission, which are described in detail below.
Figure GPA0000308713680000141
Mode one: the wireless access of the EDT data transmission is associated with an access class.
1) The NAS layer of the terminal determines that EDT data transmission exists, and sends first indication information to the AS layer of the terminal, wherein the first indication information is used for indicating a first access category and a first access identifier corresponding to the EDT data transmission;
2) And the AS layer of the terminal determines a first access control parameter set corresponding to the first access category from the first configuration information, and executes access control operation according to the first access identifier and the first access control parameter set.
Specifically, a new access class is defined for the wireless access of EDT data transmission, and the new access class coexist with the access class corresponding to the existing MO data transmission, for example, the new access class is defined as the access class of MO small data (MO small data). The UE NAS (i.e., NAS layer of the terminal) determines that if one EDT data transmission is to be performed, the UE NAS indicates a first access class and a first access identifier corresponding to the EDT data transmission of the UE AS (i.e., AS layer of the terminal). And the UE AS executes access control operation according to the first access category, the first access identifier and the first configuration information acquired from the system broadcast message provided by the UE NAS. Specifically, the UE AS determines a first access control parameter set corresponding to the first access category from the first configuration information according to the access category provided by the UE NAS, and executes an access control operation according to the first access identifier and the first access control parameter set. The access control operation may refer to the related description of the aforementioned UAC mechanism, and will not be described in detail.
It should be noted that, in the first configuration information, an access control parameter set (i.e., UAC-barrenninfoset) corresponding to a first access class and a first access identifier needs to be added, where the first access class and the first access identifier correspond to EDT data transmission.
Figure GPA0000308713680000151
Mode two: and the wireless access of the EDT data transmission is associated with a plurality of access categories, and different access categories correspond to different EDT access reasons.
1) The NAS layer of the terminal determines that EDT data transmission and an EDT access reason corresponding to the EDT data transmission are available, and sends first indication information to the AS layer of the terminal, wherein the first indication information is used for indicating a first access category and a first access identifier corresponding to the EDT data transmission and the EDT access reason;
2) And the AS layer of the terminal determines a first access control parameter set corresponding to the first access category from the first configuration information, and executes access control operation according to the first access identifier and the first access control parameter set.
Specifically, at least two new access categories are defined for wireless access of EDT Data transmission, i.e. each EDT access cause corresponds to one access category, and the EDT access cause may be mo-Data or delayotolerantaccess, etc. At least two new access categories coexist with the access category corresponding to the existing MO data transfer. The UE NAS (i.e., NAS layer of the terminal) determines that if an EDT data transmission and an EDT access cause are to be executed, the UE NAS indicates a first access category and a first access identifier corresponding to the EDT data transmission of the UE AS (i.e., AS layer of the terminal). And the UE AS executes access control operation according to the first access category, the first access identifier and the first configuration information acquired from the system broadcast message provided by the UE NAS. Specifically, the UE AS determines a first access control parameter set corresponding to the first access category from the first configuration information according to the access category provided by the UE NAS, and executes an access control operation according to the first access identifier and the first access control parameter set. The access control operation may refer to the related description of the aforementioned UAC mechanism, and will not be described in detail.
It should be noted that, in the first configuration information, an access control parameter set (i.e., UAC-barrenninfoset) corresponding to a first access category and a first access identifier needs to be added, where the first access category and the first access identifier correspond to EDT data transmission and EDT access reasons.
In this embodiment of the present application, for the above two modes, if the access control parameter set corresponding to the first access category provided by the NAS layer of the terminal is not configured in the system broadcast message, the terminal does not perform the access control operation.
Further, in some optional embodiments of the present application, the method further comprises:
the terminal determines the data transmission type;
if the data transmission type belongs to EDT data transmission, the terminal determines a first access control parameter set corresponding to a first access category from the first configuration information according to the first access category corresponding to the EDT data transmission;
if the data transmission type belongs to multi-packet data transmission, the terminal determines a second access control parameter set corresponding to a second access category from the first configuration information according to the second access category corresponding to the multi-packet data transmission;
Wherein the number of data packets corresponding to the multi-packet data transmission is greater than the number of data packets corresponding to the EDT data transmission.
For example: assuming that the data transmission of one packet belongs to EDT data transmission, the data transmission of a plurality of packets belongs to multi-packet data transmission, the terminal determines whether the EDT data transmission needs to be executed or the multi-packet data transmission needs to be executed, and if the EDT data transmission needs to be executed, a corresponding first access control parameter set is selected from the first configuration information; if multi-packet data transmission is performed, a corresponding second set of access control parameters is selected from the first configuration information.
In this embodiment of the present application, the terminal determines, according to a data transmission type (that is, EDT data transmission or multi-packet data transmission), a type of a first RRC message (hereinafter referred to as a first RRC message) sent to a network side, and specifically, if the data transmission type belongs to EDT data transmission, the first RRC message sent by the terminal in wireless access is an EDT data transmission request message; if the data transmission type belongs to multi-packet data transmission, the first RRC message sent by the terminal in the wireless access is an RRC connection establishment request message. It should be noted that the EDT data transmission request message may also be referred to as a small data transmission request message, or a small data packet transmission request message, or a small packet data transmission request message. The EDT data transmission request message is an uplink RRC message carrying EDT data (or referred to as small data, or small data packets, or small packet data).
Fig. 5 is a second flow chart of an access control method provided in an embodiment of the present application, as shown in fig. 5, where the access control method includes the following steps:
step 501: the terminal determines whether the EDT data transmission performs an access control operation based on the first information.
In this embodiment of the present application, the terminal may be any device capable of communicating with a network, such as a mobile phone, a tablet computer, a notebook, a vehicle-mounted terminal, and a wearable device.
In this embodiment of the present application, the implementation of the first information may adopt any one of the following manners:
Figure GPA0000308713680000171
mode one: the first information is second indication information sent by the network equipment, and the second indication information is used for indicating whether the EDT data transmission executes access control operation or not.
In an alternative embodiment, the second indication information is carried in a system broadcast message. Specifically, the base station transmits a system broadcast message carrying second indication information for indicating whether EDT data transmission performs an access control operation.
Figure GPA0000308713680000172
Mode two: the first mentionedThe information is preconfigured information, and the first information indicates that the EDT data transmission does not execute access control operation.
Here, the EDT data transmission may be agreed by a protocol not to perform an access control operation.
Figure GPA0000308713680000173
Mode three: the first information is a data transmission type; if the data transmission type belongs to EDT data transmission, the terminal determines that the access control operation is not executed; and if the data transmission type does not belong to EDT data transmission, the terminal determines to execute access control operation.
In this embodiment of the present application, when the terminal determines to perform the access control operation, the access control operation may be performed with reference to the method in fig. 4, specifically, the NAS layer of the terminal sends first indication information to the AS layer of the terminal, where the first indication information is used to indicate a target access class and a target access identifier; and the AS layer of the terminal determines a target access control parameter set corresponding to the target access category from the first configuration information, and executes access control operation according to the target access identifier and the target access control parameter set.
The technical scheme of the embodiment of the application is suitable for the LTE EDT scene and also suitable for the NR EDT scene. On the other hand, the method is suitable for EDT data transmission in a 4-step random access process and also suitable for EDT data transmission in a 2-step random access process.
Fig. 6 is a schematic structural diagram of an access control device provided in an embodiment of the present application, where the access control device is applied to a terminal side, as shown in fig. 6, and the access control device includes:
a receiving unit 601, configured to receive first configuration information sent by a network device, where the first configuration information includes at least one access control parameter set;
a determining unit 602, configured to determine a first access category corresponding to EDT data transmission, and determine a first access control parameter set corresponding to the first access category from the first configuration information;
an access control unit 603, configured to perform an access control operation corresponding to the EDT data transmission according to the first access control parameter set.
In one embodiment, the wireless access for the EDT data transmission is associated with an access class.
In an embodiment, the determining unit 602 is configured to determine that there is EDT data transmission through a NAS layer of the terminal, and send first indication information to an AS layer of the terminal, where the first indication information is used to indicate a first access category and a first access identifier corresponding to the EDT data transmission; the AS layer of the terminal determines a first access control parameter set corresponding to the first access category from the first configuration information;
The access control unit 603 is configured to perform an access control operation according to the first access identifier and the first access control parameter set.
In an embodiment, the wireless access of the EDT data transmission is associated with a plurality of access categories, and different access categories correspond to different EDT access reasons.
In an embodiment, the determining unit 602 is configured to determine, by using a NAS layer of the terminal, that there is EDT data transmission and an EDT access cause corresponding to the EDT data transmission, and send first indication information to an AS layer of the terminal, where the first indication information is used to indicate a first access category and a first access identifier corresponding to the EDT data transmission and the EDT access cause; the AS layer of the terminal determines a first access control parameter set corresponding to the first access category from the first configuration information;
the access control unit 603 is configured to perform an access control operation according to the first access identifier and the first access control parameter set.
In an embodiment, the determining unit 602 is configured to determine a data transmission type; if the data transmission type belongs to EDT data transmission, determining a first access control parameter set corresponding to a first access category from the first configuration information according to the first access category corresponding to the EDT data transmission; if the data transmission type belongs to multi-packet data transmission, determining a second access control parameter set corresponding to a second access category from the first configuration information according to the second access category corresponding to the multi-packet data transmission;
Wherein the number of data packets corresponding to the multi-packet data transmission is greater than the number of data packets corresponding to the EDT data transmission.
In one embodiment, the apparatus further comprises: a transmitting unit (not shown in the figure);
if the data transmission type belongs to EDT data transmission, the first RRC message sent by the sending unit in the wireless access is an EDT data transmission request message;
and if the data transmission type belongs to multi-packet data transmission, the first RRC message sent by the sending unit in the wireless access is an RRC connection establishment request message.
In an embodiment, the first configuration information is carried in a system broadcast message.
Those skilled in the art will appreciate that the above description of the access control apparatus according to the embodiments of the present application may be understood with reference to the description of the access control method according to the embodiments of the present application.
Fig. 7 is a schematic diagram ii of the structural composition of an access control device provided in the embodiment of the present application, where the access control device is applied to a terminal side, as shown in fig. 7, and the access control device includes:
a determining unit 701 for determining whether the EDT data transmission performs an access control operation based on the first information.
In an embodiment, the first information is second indication information sent by the network device, where the second indication information is used to indicate whether the EDT data transmission performs an access control operation.
In an embodiment, the first information is preconfigured information, and the first information indicates that EDT data transmission does not perform an access control operation.
In an embodiment, the first information is a data transmission type;
the determining unit 701 is configured to determine not to perform an access control operation if the data transmission type belongs to EDT data transmission; and if the data transmission type does not belong to EDT data transmission, determining to execute access control operation.
In one embodiment, the apparatus further comprises:
an access control unit 702, configured to send, by using a NAS layer of the terminal, first indication information to an AS layer of the terminal, where the first indication information is used to indicate a target access category and a target access identifier; and the AS layer of the terminal determines a target access control parameter set corresponding to the target access category from the first configuration information, and executes access control operation according to the target access identifier and the target access control parameter set.
Those skilled in the art will appreciate that the above description of the access control apparatus according to the embodiments of the present application may be understood with reference to the description of the access control method according to the embodiments of the present application.
Fig. 8 is a schematic structural diagram of a communication device 800 provided in an embodiment of the present application. The communication device may be a terminal or a network device, and the communication device 800 shown in fig. 8 includes a processor 810, where the processor 810 may call and execute a computer program from a memory to implement the methods in the embodiments of the present application.
Optionally, as shown in fig. 8, the communication device 800 may also include a memory 820. Wherein the processor 810 may call and run a computer program from the memory 820 to implement the methods in embodiments of the present application.
Wherein the memory 820 may be a separate device from the processor 810 or may be integrated into the processor 810.
Optionally, as shown in fig. 8, the communication device 800 may further include a transceiver 830, and the processor 810 may control the transceiver 830 to communicate with other devices, and in particular, may send information or data to other devices, or receive information or data sent by other devices.
Among other things, transceiver 830 may include a transmitter and a receiver. Transceiver 830 may further include antennas, the number of which may be one or more.
Optionally, the communication device 800 may be specifically a network device in the embodiment of the present application, and the communication device 800 may implement a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the communication device 800 may be specifically a mobile terminal/terminal in the embodiment of the present application, and the communication device 800 may implement a corresponding flow implemented by the mobile terminal/terminal in each method in the embodiment of the present application, which is not described herein for brevity.
Fig. 9 is a schematic structural diagram of a chip of an embodiment of the present application. The chip 900 shown in fig. 9 includes a processor 910, and the processor 910 may call and execute a computer program from a memory to implement the method in the embodiments of the present application.
Optionally, as shown in fig. 9, the chip 900 may further include a memory 920. Wherein the processor 910 may invoke and run a computer program from the memory 920 to implement the methods in the embodiments of the present application.
Wherein the memory 920 may be a separate device from the processor 910 or may be integrated in the processor 910.
Optionally, the chip 900 may also include an input interface 930. The processor 910 may control the input interface 930 to communicate with other devices or chips, and in particular, may acquire information or data sent by the other devices or chips.
Optionally, the chip 900 may also include an output interface 940. Wherein the processor 910 may control the output interface 940 to communicate with other devices or chips, and in particular, may output information or data to the other devices or chips.
Optionally, the chip may be applied to a network device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the chip may be applied to a mobile terminal/terminal in the embodiments of the present application, and the chip may implement a corresponding flow implemented by the mobile terminal/terminal in each method in the embodiments of the present application, which is not described herein for brevity.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
Fig. 10 is a schematic block diagram of a communication system 1000 provided in an embodiment of the present application. As shown in fig. 10, the communication system 1000 includes a terminal 1010 and a network device 1020.
The terminal 1010 may be used to implement the corresponding functions implemented by the terminal in the above method, and the network device 1020 may be used to implement the corresponding functions implemented by the network device in the above method, which are not described herein for brevity.
It should be appreciated that the processor of an embodiment of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be implemented by integrated logic circuits of hardware in a processor or instructions in software form. The processor may be a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in hardware, in a decoded processor, or in a combination of hardware and software modules in a decoded processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
It will be appreciated that the memory in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (Double Data Rate SDRAM), enhanced SDRAM (ESDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the above memory is exemplary but not limiting, and for example, the memory in the embodiments of the present application may be Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), direct RAM (DR RAM), and the like. That is, the memory in embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Embodiments of the present application also provide a computer-readable storage medium for storing a computer program.
Optionally, the computer readable storage medium may be applied to a network device in the embodiments of the present application, and the computer program causes a computer to execute a corresponding flow implemented by the network device in each method in the embodiments of the present application, which is not described herein for brevity.
Optionally, the computer readable storage medium may be applied to a mobile terminal/terminal in the embodiments of the present application, and the computer program causes a computer to execute a corresponding procedure implemented by the mobile terminal/terminal in each method of the embodiments of the present application, which is not described herein for brevity.
Embodiments of the present application also provide a computer program product comprising computer program instructions.
Optionally, the computer program product may be applied to a network device in the embodiments of the present application, and the computer program instructions cause the computer to execute corresponding flows implemented by the network device in the methods in the embodiments of the present application, which are not described herein for brevity.
Optionally, the computer program product may be applied to a mobile terminal/terminal in the embodiments of the present application, and the computer program instructions cause the computer to execute corresponding processes implemented by the mobile terminal/terminal in the methods in the embodiments of the present application, which are not described herein for brevity.
The embodiment of the application also provides a computer program.
Optionally, the computer program may be applied to a network device in the embodiments of the present application, and when the computer program runs on a computer, the computer is caused to execute a corresponding flow implemented by the network device in each method in the embodiments of the present application, which is not described herein for brevity.
Optionally, the computer program may be applied to a mobile terminal/terminal in the embodiments of the present application, where the computer program when run on a computer causes the computer to execute corresponding processes implemented by the mobile terminal/terminal in the methods in the embodiments of the present application, and for brevity, will not be described in detail herein.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (23)

1. An access control method, the method comprising:
the method comprises the steps that a terminal receives first configuration information sent by network equipment, wherein the first configuration information comprises at least one access control parameter set;
the terminal determines a first access category corresponding to the EDT data transmission of early data transmission, determines a first access control parameter set corresponding to the first access category from the first configuration information, and executes access control operation corresponding to the EDT data transmission according to the first access control parameter set;
the method further comprises the steps of:
the terminal determines the data transmission type;
if the data transmission type belongs to EDT data transmission, the terminal determines a first access control parameter set corresponding to a first access category from the first configuration information according to the first access category corresponding to the EDT data transmission;
If the data transmission type belongs to multi-packet data transmission, the terminal determines a second access control parameter set corresponding to a second access category from the first configuration information according to the second access category corresponding to the multi-packet data transmission;
wherein the number of data packets corresponding to the multi-packet data transmission is greater than the number of data packets corresponding to the EDT data transmission;
the method further comprises the steps of:
if the data transmission type belongs to EDT data transmission, the first Radio Resource Control (RRC) message sent by the terminal in wireless access is an EDT data transmission request message;
if the data transmission type belongs to multi-packet data transmission, the first RRC message sent by the terminal in the wireless access is an RRC connection establishment request message.
2. The method of claim 1, wherein the wireless access of the EDT data transmission is associated with an access class.
3. The method of claim 2, wherein the terminal determines a first access category corresponding to EDT data transmission, determines a first access control parameter set corresponding to the first access category from the first configuration information, and performs an access control operation corresponding to the EDT data transmission according to the first access control parameter set, including:
The non-access NAS layer of the terminal determines that EDT data transmission exists, and sends first indication information to the access AS layer of the terminal, wherein the first indication information is used for indicating a first access category and a first access identifier corresponding to the EDT data transmission;
and the AS layer of the terminal determines a first access control parameter set corresponding to the first access category from the first configuration information, and executes access control operation according to the first access identifier and the first access control parameter set.
4. The method of claim 1, wherein the wireless access of the EDT data transmission is associated with a plurality of access categories, different access categories corresponding to different EDT access reasons.
5. The method of claim 4, wherein the terminal determines a first access category corresponding to EDT data transmission, determines a first access control parameter set corresponding to the first access category from the first configuration information, and performs an access control operation corresponding to the EDT data transmission according to the first access control parameter set, comprising:
the NAS layer of the terminal determines that EDT data transmission and an EDT access reason corresponding to the EDT data transmission are available, and sends first indication information to the AS layer of the terminal, wherein the first indication information is used for indicating a first access category and a first access identifier corresponding to the EDT data transmission and the EDT access reason;
And the AS layer of the terminal determines a first access control parameter set corresponding to the first access category from the first configuration information, and executes access control operation according to the first access identifier and the first access control parameter set.
6. The method of any of claims 1-5, wherein the first configuration information is carried in a system broadcast message.
7. An access control method, the method comprising:
the terminal determines whether the EDT data transmission executes access control operation or not based on the first information;
the first information is a data transmission type;
if the data transmission type belongs to EDT data transmission, the terminal determines that the access control operation is not executed, and a first Radio Resource Control (RRC) message sent by the terminal in wireless access is an EDT data transmission request message;
if the data transmission type does not belong to EDT data transmission, the terminal determines to execute access control operation, and the first RRC message sent by the terminal in wireless access is an RRC connection establishment request message.
8. The method of claim 7, wherein the first information is second indication information sent by a network device, the second indication information being used to indicate whether EDT data transmission performs an access control operation.
9. The method of claim 7, wherein the first information is predefined information defining that EDT data transmission does not perform access control operations.
10. The method of claim 7, wherein in case the terminal determines to perform an access control operation, the method further comprises:
the NAS layer of the terminal sends first indication information to the AS layer of the terminal, wherein the first indication information is used for indicating a target access category and a target access identifier;
and the AS layer of the terminal determines a target access control parameter set corresponding to the target access category from the first configuration information, and executes access control operation according to the target access identifier and the target access control parameter set.
11. An access control apparatus, the apparatus comprising:
a receiving unit, configured to receive first configuration information sent by a network device, where the first configuration information includes at least one access control parameter set;
a determining unit, configured to determine a first access category corresponding to EDT data transmission, and determine a first access control parameter set corresponding to the first access category from the first configuration information;
An access control unit, configured to execute an access control operation corresponding to the EDT data transmission according to the first access control parameter set;
the determining unit is used for determining the data transmission type; if the data transmission type belongs to EDT data transmission, determining a first access control parameter set corresponding to a first access category from the first configuration information according to the first access category corresponding to the EDT data transmission; if the data transmission type belongs to multi-packet data transmission, determining a second access control parameter set corresponding to a second access category from the first configuration information according to the second access category corresponding to the multi-packet data transmission;
wherein the number of data packets corresponding to the multi-packet data transmission is greater than the number of data packets corresponding to the EDT data transmission;
a transmitting unit; if the data transmission type belongs to EDT data transmission, the first RRC message sent by the sending unit in the wireless access is an EDT data transmission request message;
and if the data transmission type belongs to multi-packet data transmission, the first RRC message sent by the sending unit in the wireless access is an RRC connection establishment request message.
12. The apparatus of claim 11, wherein the wireless access of the EDT data transmission is associated with an access class.
13. The apparatus of claim 12, wherein,
the determining unit is used for determining that EDT data transmission exists through an NAS layer of the terminal, and sending first indication information to an AS layer of the terminal, wherein the first indication information is used for indicating a first access category and a first access identifier corresponding to the EDT data transmission; the AS layer of the terminal determines a first access control parameter set corresponding to the first access category from the first configuration information;
the access control unit is configured to perform an access control operation according to the first access identifier and the first access control parameter set.
14. The apparatus of claim 11, wherein the wireless access for EDT data transmissions is associated with a plurality of access categories, different access categories corresponding to different EDT access causes.
15. The apparatus of claim 14, wherein,
the determining unit is configured to determine, through a NAS layer of a terminal, that there is EDT data transmission and an EDT access cause corresponding to the EDT data transmission, and send first indication information to an AS layer of the terminal, where the first indication information is used to indicate a first access category and a first access identifier corresponding to the EDT data transmission and the EDT access cause; the AS layer of the terminal determines a first access control parameter set corresponding to the first access category from the first configuration information;
The access control unit is configured to perform an access control operation according to the first access identifier and the first access control parameter set.
16. The apparatus of any of claims 11 to 15, wherein the first configuration information is carried in a system broadcast message.
17. An access control apparatus, the apparatus comprising:
a determining unit configured to determine whether or not EDT data transmission performs an access control operation based on the first information;
wherein the first information is a data transmission type;
the determining unit is configured to determine that the access control operation is not performed if the data transmission type belongs to EDT data transmission, where the first radio resource control RRC message sent by the device in radio access is an EDT data transmission request message; and if the data transmission type does not belong to EDT data transmission, determining to execute access control operation, wherein the first RRC message sent by the device in wireless access is an RRC connection establishment request message.
18. The apparatus of claim 17, wherein the first information is second indication information sent by a network device, the second indication information being used to indicate whether EDT data transmission performs an access control operation.
19. The apparatus of claim 17, wherein the first information is preconfigured information indicating that EDT data transmission does not perform an access control operation.
20. The apparatus of claim 17, wherein the apparatus further comprises:
an access control unit, configured to send first indication information to an AS layer of a terminal through an NAS layer of the terminal, where the first indication information is used to indicate a target access category and a target access identifier; and the AS layer of the terminal determines a target access control parameter set corresponding to the target access category from the first configuration information, and executes access control operation according to the target access identifier and the target access control parameter set.
21. A terminal, comprising: a processor and a memory for storing a computer program, the processor being adapted to invoke and run the computer program stored in the memory, to perform the method according to any of claims 1 to 6, or the method according to any of claims 7 to 10.
22. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the method of any one of claims 1 to 6 or the method of any one of claims 7 to 10.
23. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 1 to 6 or the method of any one of claims 7 to 10.
CN201980091414.0A 2019-06-27 2019-06-27 Access control method, device and terminal Active CN113424639B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/093393 WO2020258191A1 (en) 2019-06-27 2019-06-27 Access control method and apparatus and terminal

Publications (2)

Publication Number Publication Date
CN113424639A CN113424639A (en) 2021-09-21
CN113424639B true CN113424639B (en) 2023-06-23

Family

ID=74061429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980091414.0A Active CN113424639B (en) 2019-06-27 2019-06-27 Access control method, device and terminal

Country Status (2)

Country Link
CN (1) CN113424639B (en)
WO (1) WO2020258191A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112351470B (en) * 2019-08-07 2022-04-05 华为技术有限公司 Access restriction detection method and device
CN115175270A (en) * 2021-04-02 2022-10-11 北京紫光展锐通信技术有限公司 Communication method, communication device, readable storage medium and computer equipment
CN115277814A (en) * 2022-07-26 2022-11-01 深圳证券通信有限公司 Data transmission method and related device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103096495A (en) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 Access control method and system
CN105706519A (en) * 2013-10-25 2016-06-22 日本电气株式会社 Control of small data transmission in a mobile radio communications network
WO2018143631A1 (en) * 2017-02-02 2018-08-09 주식회사 케이티 Access control method and device
CN109327882A (en) * 2017-08-01 2019-02-12 捷开通讯(深圳)有限公司 Connection control method, communication equipment and the equipment with store function
CN109548077A (en) * 2017-08-11 2019-03-29 华为技术有限公司 Communication means, terminal device and the network equipment
WO2019082122A1 (en) * 2017-10-26 2019-05-02 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for enabling and disabling early data transmission

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016000097A1 (en) * 2014-06-10 2016-01-07 华为技术有限公司 Handover method, evolved base station and mobility management entity

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103096495A (en) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 Access control method and system
CN105706519A (en) * 2013-10-25 2016-06-22 日本电气株式会社 Control of small data transmission in a mobile radio communications network
WO2018143631A1 (en) * 2017-02-02 2018-08-09 주식회사 케이티 Access control method and device
CN109327882A (en) * 2017-08-01 2019-02-12 捷开通讯(深圳)有限公司 Connection control method, communication equipment and the equipment with store function
CN109548077A (en) * 2017-08-11 2019-03-29 华为技术有限公司 Communication means, terminal device and the network equipment
WO2019082122A1 (en) * 2017-10-26 2019-05-02 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for enabling and disabling early data transmission

Also Published As

Publication number Publication date
CN113424639A (en) 2021-09-21
WO2020258191A1 (en) 2020-12-30

Similar Documents

Publication Publication Date Title
WO2020034229A1 (en) Information transmission method and apparatus, and communication device
CN111741479B (en) Strategy determination method and device, terminal, chip and computer storage medium
CN113475160A (en) Data transmission method and device and communication equipment
CN111885640B (en) Control data transmission method, network equipment and storage medium
CN113396605B (en) Data transmission method and device and terminal
CN112673687A (en) Registration method, terminal equipment and network equipment
CN113424639B (en) Access control method, device and terminal
CN112715038B (en) Parameter configuration method and device and network equipment
CN116326111A (en) Small data transmission method and device and terminal equipment
US20220061075A1 (en) Information transmission method and apparatus, and network device
CN110741681B (en) Method for establishing connection, network equipment and terminal equipment
CN112313979B (en) Information transmission method and device and network equipment
CN113207153B (en) Method and device for controlling terminal mobility and terminal
CN112205060A (en) Wireless communication method, access network equipment, terminal equipment and core network equipment
CN113455042B (en) Wireless communication method, terminal equipment and network equipment
CN115767783A (en) Data transmission method and device, network equipment and terminal
CN113574936A (en) Wireless communication method, terminal equipment and network equipment
CN112385271A (en) Network information transmission method, network information acquisition method, network equipment and terminal equipment
CN111869266A (en) Core network selection method and device, terminal equipment and network equipment
CN112703805A (en) Wireless communication method and base station
CN113329396B (en) Data transmission method and network equipment
CN114342485B (en) Method and device for reporting auxiliary information, terminal equipment and network equipment
CN116097801A (en) Communication method and device, terminal equipment and network equipment
CN112400304B (en) Information transmission method and device and network equipment
CN112889257A (en) Wireless communication method, terminal equipment and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant