Access control method and system for a shared network

一种接入控制、共享网络的技术,应用在通信领域,能够解决没有区分PLMN接入控制、不能保证终端接入控制公平性等问题,达到保证公平性的效果

Active Publication Date: 2017-05-03
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above technology does not distinguish between PLMNs for access control, and treats the terminals of operators that do not cause overload of shared network nodes, and cannot guarantee the fairness of terminal access control of all PLMNs sharing the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system for a shared network
  • Access control method and system for a shared network
  • Access control method and system for a shared network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] like figure 2 As shown, in the EPS shared network, the specific implementation process of the shared eNB using the EAB mechanism to perform access control is as follows:

[0062] 1. When the shared MME is overloaded, determine which PLMNs need to perform access control, and optionally formulate corresponding access control parameters.

[0063] 2. The shared MME sends an overload start message to the shared eNB, where the message carries the identity of the PLMN requiring access control and the corresponding access control parameters (optional).

[0064] 3. The shared eNB formulates corresponding EAB parameters for each PLMN requiring access control according to the current load condition and the received information.

[0065] 4. The shared eNB broadcasts to the UE the EAB parameters corresponding to the PLMN that needs to perform access control.

[0066] 5. The shared MME overload condition has ended, and the load returns to normal.

[0067] 6. The shared MME sends ...

Embodiment 2

[0070] like image 3 As shown, in the UMTS shared network, the specific implementation process of the shared RNC using the EAB mechanism to perform access control is as follows:

[0071] 1. When the shared SGSN is overloaded, determine which PLMNs need to perform access control, and optionally formulate corresponding access control parameters.

[0072] 2. The shared SGSN sends an overload message to the shared RNC, where the message carries the PLMN identity that needs access control and the corresponding access control parameters (optional).

[0073] 3. The shared RNC formulates corresponding EAB parameters for each PLMN requiring access control according to the current load condition and the received information.

[0074] 4. The shared RNC broadcasts to the MS the EAB parameters corresponding to the PLMN that needs to perform access control.

[0075] 5. The shared SGSN overload condition has ended, and the load returns to normal.

[0076] 6. The shared SGSN sends an overl...

Embodiment 3

[0079] like Figure 4 As shown, in the EPS shared network, the specific implementation process for the shared eNB to perform access control by releasing the wireless connection of the UE is as follows:

[0080] 1. When the shared MME is overloaded, determine which PLMNs need to perform access control, and optionally formulate corresponding access control parameters.

[0081] 2. The shared MME sends an overload start message to the shared eNB, where the message carries the identity of the PLMN requiring access control and the corresponding access control parameters (optional).

[0082] 3. The shared eNB stores the identity of the PLMN that needs to perform access control.

[0083] 4. The shared eNB obtains the PLMN identity selected by the UE.

[0084] 5. If the acquired PLMN identifier selected by the UE is one or one of the PLMN identifiers that are stored by the shared eNB and require access control, the eNB determines to release the RRC connection of the UE.

[0085] 6. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method and system for a shared network. When a core network node is overloaded, it can send an overload indication capable of distinguishing PLMNs to an access network node; PLMNs requiring access control. The method and system of the present invention, according to the actual situation that the network nodes are overloaded by the PLMNs of the shared network, differentiates the PLMNs for access control, and ensures the fairness of the access control for all PLMN terminals of the shared network. Therefore, the problem of unfairness in performing access control on terminals of different PLMNs in a shared network scenario is solved.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method and system for access control of a shared network. Background technique [0002] With the development of mobile network services and automation control technology, a machine-type communication method has emerged, also known as a machine-to-machine (M2M) communication method. In this communication method, at least one party participating in the communication is mechanical equipment. [0003] In a narrow sense, M2M is defined as machine-to-machine communication, but in a broad sense, M2M includes networked applications and services centered on the intelligent interaction of machine terminals. M2M is based on intelligent machine terminals and uses a variety of communication methods as access means, which can provide customers with information solutions to meet customers' informatization needs for monitoring, command and dispatch, data collection and measurement. M2M ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W48/06H04W48/08H04W68/00H04W76/00
CPCH04W74/00H04W92/02H04W28/0247H04W76/36H04W76/10H04W36/0016H04W48/14H04W80/04H04W28/10H04W28/0284H04W48/06H04W84/042
Inventor 支春霞邓云谢宝国
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products