Access control method and device, terminal and network node

An access control and network node technology, applied in the field of communications, can solve problems such as unreasonable access control schemes, and achieve the effect of solving unreasonable access control schemes

Pending Publication Date: 2022-01-25
DATANG MOBILE COMM EQUIP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide an access control method, device, terminal and network node to solve the problem of unreasonable access control schemes in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device, terminal and network node
  • Access control method and device, terminal and network node
  • Access control method and device, terminal and network node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0273] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0274] First, the relevant content of this program is introduced as follows:

[0275] (1) About NR slices

[0276] Network slicing is a business-oriented resource encapsulation concept. A network slice is uniquely identified by NSSAI (NetworkSlice Selection Assistant Identity, Network Slice Selection Assistant Identity), and also corresponds to a type of resource configuration. Different core networks can support different types of network slices according to requirements. Unlike LTE (Long Term Evolution) system registration, terminals need to register a certain slice before using it in the network. The terminal only needs to register the slice after the slice is successfully registered. Only then can the session establishment process corresponding to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method and device, a terminal and a network node, and the method comprises the steps: transmitting preset access control related information related to an access attempt request to the network node; receiving a current access attempt result sent by the network node, wherein the preset access control related information comprises at least one of the following information: at least one piece of access category information, at least one piece of access identification information, at least one slice identifies index information, at least one piece of slice identification information, sorting index information of the slice identification information under the target access category, the access reason value information associated with the target access attempt type information, wherein the target access attempt type information refers to the access attempt type information corresponding to the access identification information and the access type information. According to the scheme, the network side can realize the slice access control management strategy of the slice granularity according to the preset access control related information reported by the terminal, so that a reasonable access control decision is made.

Description

technical field [0001] The present invention relates to the technical field of communication, and in particular to an access control method, device, terminal and network node. Background technique [0002] Slice (Slice) is a newly introduced concept of NR (New RAT, new radio access technology) system. However, when the slice service is initiated, most of the access reason values ​​corresponding to different slice services are mo-Data (Mobile Station Originated Data; data initiated by the mobile station). For example, four terminals initiate eMBB (enhanced mobile Broadband), URLLC (ultra-high reliability and ultra-low latency communication), MIoT (Massive Internet of Things, large-scale Internet of Things), V2X (vehicle-to-external) slicing services, the urgency of these four slicing services is different, and the network The network side should adopt different access policies, but the access reason values ​​filled in by these terminals in MSG3 (message 3) are all mo-Data, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W48/08H04W48/16H04W48/18
CPCH04W48/08H04W48/16H04W48/18
Inventor 范江胜
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products