Access control method, access network node and core network node

A core network node and access network node technology, applied in the field of communication, can solve problems such as UE access failure, achieve the effect of avoiding access failure and ensuring reliability

Active Publication Date: 2021-10-29
VIVO MOBILE COMM CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide an access control method, an access network node, and a core network node, which can solve the problem that the network side may misjudge an access network node that can be accessed when the PLMN is shared with the PNI-NPN or the PLMN is shared with the SNPN and the PNI-NPN. The UE that enters the network cannot access the network, resulting in the problem of UE access failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, access network node and core network node
  • Access control method, access network node and core network node
  • Access control method, access network node and core network node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0041] When describing the embodiments of the present invention, some concepts used in the following description are explained first.

[0042] 1. Introduction to non-public network (NPN)

[0043] In the industrial environment, many applications (such as manufacturing, automation control, etc.) have high performance requirements, such as low latency, high reliability, etc. Under the local network, with the increase of equipment density, these performance requirements are difficult to meet, but wireless links can be used instead of traditional wired links, and the fifth generation (5Generation, 5G) communication network can be used for such vertical industries Provide a local area network (LAN) type private communication service to meet the communica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method, an access network node and a core network node, and relates to the technical field of communication. The access control method is applied to an access network node, and comprises the following steps: sending related information of a first cell to a core network node; wherein the related information of the first cell is used for the core network node to perform access control of the terminal; the related information of the first cell comprises first indication information that the first cell supports access of at least one network type; or the related information of the first cell comprises the information of the first cell corresponding to the network type access tendency of the terminal. According to the scheme, the condition of terminal access failure can be avoided, so that the reliability of terminal access is ensured.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an access control method, an access network node and a core network node. Background technique [0002] In R16, the radio access network (RAN, also called access network node) side is not responsible for judging whether a user equipment (User Equipment, UE, referred to as terminal) can access a certain cell, but the core network judges whether the UE passes through a certain cell. The legality of community access to the network. When the UE requests to access the network through a non-public network (NPN) cell, the RAN will provide the core network node with the NPN information supported by the cell, and the core network will provide the NPN information supported by the cell based on the RAN and the UE's The subscription information determines whether the UE can access the network through the cell. [0003] In R17, if there is a public land mobile network (Public...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/18H04W48/08
CPCH04W48/18H04W48/08
Inventor 张艳霞
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products