[go: up one dir, main page]

CN102340821B - A kind of connection control method of MTC device and system - Google Patents

A kind of connection control method of MTC device and system Download PDF

Info

Publication number
CN102340821B
CN102340821B CN201010233548.2A CN201010233548A CN102340821B CN 102340821 B CN102340821 B CN 102340821B CN 201010233548 A CN201010233548 A CN 201010233548A CN 102340821 B CN102340821 B CN 102340821B
Authority
CN
China
Prior art keywords
mtc
equipment
information
network side
ran node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010233548.2A
Other languages
Chinese (zh)
Other versions
CN102340821A (en
Inventor
支春霞
李志军
吴昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010233548.2A priority Critical patent/CN102340821B/en
Priority to PCT/CN2011/076319 priority patent/WO2012010040A1/en
Publication of CN102340821A publication Critical patent/CN102340821A/en
Application granted granted Critical
Publication of CN102340821B publication Critical patent/CN102340821B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses the connection control method of a kind of machine type communication (MTC) equipment, comprising: network equipment carries out compression process to the MTC mark of forbidding accessing, and the information after compression process is sent to MTC device; MTC device is according to the information after compression process, and the MTC mark of self preserving, and determines self whether to allow to initiate access request.The invention also discloses a kind of access control system of MTC device.By the present invention, solve because MTC identifies the problem taking a large amount of broadcast resource.

Description

Access control method and system of MTC (machine type communication) equipment
Technical Field
The present invention relates to Machine Type Communication (MTC) technology in network communication, and in particular, to an access control method and system for MTC devices.
Background
With the development of mobile network services and automation control technologies, a Machine-based communication system, also called Machine To Machine (M2M) communication system, has appeared, in which at least one party participating in communication is a Machine device.
M2M in the narrow sense is defined as machine-to-machine communication, but in a broad sense, M2M includes networked applications and services that are core to machine-terminal intelligent interactions. The M2M is based on the intelligent machine terminal, and takes a plurality of communication modes as access means, and can provide an informatization solution for the customer, so as to meet the informatization requirements of the customer on monitoring, commanding and scheduling, data acquisition, measurement and the like. M2M may be used in industrial applications (e.g., traffic monitoring, alarm systems, rescue at sea, vending machines, pay-per-view), home applications (e.g., automatic meter reading, temperature control), and personal applications (e.g., life detection, remote diagnostics), among others.
The communication object of M2M is a machine, and the communication behavior is automatically controlled, that is, the control of the initiation and termination of communication and some admission and restriction in the communication process are all automatic behaviors. This behavior is dependent on the constraints and controls on the behavior of the machines (i.e., terminals in M2M communication) in M2M communication, the behavior of the terminals in M2M communication is constrained by the service subscription data, and the network manages the terminals in M2M communication according to the service subscription data.
The most typical communication method in machine-type communication is communication between a terminal and an application Server, where the terminal is called an MTC device (MTC device) and the application Server is called an MTC Server (MTC Server).
Under 2G/3G/LTE access, M2M communication mainly uses a Packet Service (PS) network as a bottom bearer network, and implements Service layer communication between MTC devices and MTC servers. Fig. 1 is a schematic structural diagram of an M2M communication entity accessing an Evolved Packet System (EPS) in the prior art, and as shown in fig. 1, an underlying bearer network includes: an Evolved Universal mobile telecommunications system Terrestrial Radio access network (E-UTRAN), a Mobility Management Entity (MME), a Serving Gateway (S-GW), a Packet Data network Gateway (P-GW), a Home Subscriber Server (HSS), and a Policy and Charging Rules Function (PCRF). Wherein, the main network element of the E-UTRAN is an Evolved NodeB (eNodeB).
In fig. 1, an MME is responsible for operations related to a control plane, such as mobility management, processing of non-access stratum signaling, and management of context in user mobility management; the S-GW is an access gateway device connected with the E-UTRAN and is responsible for forwarding data between the E-UTRAN and the P-GW and caching paging waiting data; the P-GW is a border gateway between the EPS and a Packet Data Network (PDN), and is responsible for accessing the PDN and forwarding Data between the EPS and the PDN; the PCRF is a policy and charging rule function entity, and is connected to an operator network Protocol (IP, Internet Protocol) Service network through a receiving interface Rx to acquire Service information, and in addition, it may be connected to a gateway device in the network through a Gx interface to be responsible for initiating establishment of an IP bearer, ensuring quality of Service (QoS) of Service data, and performing charging control; the HSS is used to provide management of subscription data for the user, as well as management of important context information for the user's access to the network.
In addition, the MTC Server may serve as an Application Function entity (AF) and is connected to the PCRF through an Rx interface to implement bearer control; the MTC Server may also function AS a Session Initiation Protocol application Server (SIP AS) and connect with the HSS through an Sh interface to access application service data.
In fig. 1, the MTC UE accesses to the EPS network through E-utran (enodeb), and after being assigned with an IP address, an IP channel may be established between the MTC UE and the MTC Server, thereby implementing upper layer service communication with the MTC Server. The IP channel established between the MTC UE and the MTC Server is a logical IP channel, and the physical path of the IP channel passes through: eNodeB, S-GW, P-GW.
At present, one way to implement M2M communication is to establish a service layer interface protocol on an IP channel between the MTC UE and the MTC Server, where the MTC UE and the MTCServer interact with each other for service data through the service layer interface protocol, and the MTC Server also implements control over the MTC UE through the service layer protocol.
Through the IP connection between the MTC UE and the MTC Server, data communication between the MTC UE and the MTCServer can be achieved, however, the MTC monitoring requirement is difficult to be achieved on the IP connection: the MTCServer needs to monitor the operating state of the MTC UE, dynamically acquire the current state of the MTC UE in time, and obtain a notification in time when the current state of the MTC UE changes. The status changes of the mtues may include: the MTC UE is detached from the network, the MTC UE enters a non-connection state, the MTC UE releases wireless connection, the current position of the MTC UE is changed, and the like. These changes in the status of MTC UEs, referred to as MTC events, may generally define which MTC events need to be monitored in MTC subscription data of a Home Location Register (HLR)/HSS, and are issued by the HLR/HSS to a Serving GPRS Support Node (SGSN)/MME through a procedure of the MTC UE attaching to a network. For the detection of the MTC event, a network entity of the core network is usually required to detect the MTC event, for example, the network element in the EPS network responsible for detecting the MTC event may be: MME/S-GW/P-GW, etc., and a network element in charge of detecting an MTC event in a General Packet Radio Service (GPRS) network may be an SGSN/Gateway GPRS Support Node (GGSN), etc. When the MTC event is detected, the MTC event is usually reported to the MTC Server, so that the MTC Server can timely know the operation status of the MTC UE.
When congestion occurs on the network side, the existing congestion control flow is shown in fig. 2, and mainly includes the following steps:
step 201, the MME/SGSN sends an OVERLOAD START message to a Radio Access Network (RAN) node according to a load condition of a current Network, and triggers an Access control process for the MTC device.
According to different access control granularities, the message carries different access control information. When Access control is for an MTC Group (MTC Group), the OVERLOAD START message carries an associated Group identity (Group ID) or Access Point Name (APN).
Step 202, after receiving the information, the RAN node broadcasts a Group ID or an APN over the air interface to prohibit access.
The MTC devices receiving the broadcast will not subsequently initiate access requests to these Group IDs or APNs, step 203, to avoid further congestion.
However, when multiple Group accesses need to be prohibited, the prior art needs to broadcast the Group ID list or APN list in a broadcast message, which occupies a large amount of broadcast message resources and is unacceptable for the network.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide an access control method and system for MTC devices, so as to solve the problem that a large amount of broadcast message resources are occupied by broadcasting a Group ID list or an APN list.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides an access control method of Machine Type Communication (MTC) equipment, which comprises the following steps:
the network side equipment compresses the MTC identification which is forbidden to be accessed and sends the compressed information to the MTC equipment;
and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the compressed information and the MTC identification stored by the MTC equipment.
The network side equipment compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the MTC equipment, and the method specifically comprises the following steps:
the network side equipment determines the same bit information of the MTC identification which is forbidden to be accessed, and sends the same bit information to the MTC equipment through a broadcast message;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
the MTC equipment matches the received same bit information with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
The method further comprises the following steps: and the network side equipment sends the same bit information to the MTC equipment in a wildcard form through a broadcast message.
The network side equipment compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the MTC equipment, and the method specifically comprises the following steps:
the network side equipment encodes and compresses the MTC identification which is forbidden to be accessed, and sends the MTC identification after encoding and compression to the MTC equipment through a broadcast message;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
and the MTC equipment decompresses the information in the broadcast message, matches the decompressed MTC identification with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
The network side equipment compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the MTC equipment, and the method specifically comprises the following steps:
the network side equipment performs modular operation on the MTC identification which is forbidden to be accessed, and sends the information after the modular operation to the MTC equipment;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the information after the modulus operation and the MTC identification stored by the MTC equipment.
The network side device includes: a mobility management network element and a Radio Access Network (RAN) node;
correspondingly, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device, which specifically includes:
the mobility management network element compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the RAN node, and the RAN node sends the compressed information to MTC equipment through a broadcast message;
or, the mobility management network element sends the access-forbidden MTC identifier to the RAN node, and the RAN node compresses the access-forbidden MTC identifier and sends the compressed information to the MTC device through a broadcast message.
The network side device includes: a RAN node;
correspondingly, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device, which specifically includes:
and the RAN node compresses the MTC identification which is stored by the RAN node and is forbidden to access, and sends the compressed information to the MTC equipment through a broadcast message.
The invention also provides an access control system of the MTC equipment, which comprises the following components: a network side device and an MTC device, wherein,
the network side equipment is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment;
and the MTC equipment is used for determining whether the MTC equipment allows to initiate an access request according to the compressed information and the MTC identification stored by the MTC equipment.
The network side equipment is further used for determining the same bit information of the MTC identification which is forbidden to be accessed, and sending the same bit information to the MTC equipment through a broadcast message;
correspondingly, the MTC device is further configured to match the received same bit information with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result.
The network side device is further configured to send the same bit information to the MTC device in a wildcard format through a broadcast message.
The network side equipment is further used for coding and compressing the MTC identification which is forbidden to be accessed and sending the coded and compressed MTC identification to the MTC equipment through a broadcast message;
correspondingly, the MTC device is further configured to decompress the information in the broadcast message, match the decompressed MTC identifier with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result.
The network side equipment is further used for carrying out modular operation on the MTC identification which is forbidden to be accessed and sending the information after the modular operation to the MTC equipment;
correspondingly, the MTC device is further configured to determine whether to allow itself to initiate an access request according to the information obtained after the modulo operation and the MTC identifier stored in itself.
The network side device includes: a mobility management network element and a RAN node; wherein,
the mobility management network element is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the RAN node; the RAN node is used for sending the compressed information to MTC equipment through a broadcast message;
or, the mobility management network element is configured to send the MTC identifier prohibited from being accessed to the RAN node; and the RAN node is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment through a broadcast message.
The network side device includes: and the RAN node is used for compressing the MTC identifier which is stored by the RAN node and forbidden to access, and sending the compressed information to the MTC equipment through a broadcast message.
According to the access control method and system of the MTC equipment, the network side equipment compresses the MTC identification which is forbidden to be accessed (including the steps of taking the same bit information, coding compression, modular operation and the like), and broadcasts the compressed information to the MTC equipment, so that a large amount of empty broadcast resources are avoided being occupied.
Drawings
Fig. 1 is a schematic diagram illustrating an architecture of an M2M communication entity accessing an EPS in the prior art;
fig. 2 is a flow chart of congestion control in the prior art;
fig. 3 is a flowchart of an access control method of an MTC device according to the present invention;
fig. 4 is a flowchart of an access control method of an MTC device according to an embodiment of the present invention;
fig. 5 is a flowchart of an access control method of MTC devices according to a second embodiment of the present invention;
fig. 6 is a flowchart of an access control method of MTC devices according to a third embodiment of the present invention;
fig. 7 is a flowchart of an access control method of an MTC device according to a fourth embodiment of the present invention;
fig. 8 is a flowchart of an access control method of an MTC device according to a fifth embodiment of the present invention;
fig. 9 is a flowchart of an access control method of an MTC device according to a sixth embodiment of the present invention;
fig. 10 is a flowchart of an access control method of an MTC device according to a seventh embodiment of the present invention;
fig. 11 is a flowchart of an access control method of an MTC device according to an eighth embodiment of the present invention;
fig. 12 is a flowchart of an access control method of an MTC device according to a ninth embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further elaborated below with reference to the drawings and the specific embodiments.
In order to solve the problem that a broadcast Group ID list or APN list occupies a large amount of broadcast message resources, an access control method for MTC devices provided in the present invention, as shown in fig. 3, includes the following steps:
step 301, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device.
Step 302, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identity stored in itself. Wherein, the MTC identity includes, but is not limited to, a Group ID or an APN.
Based on the above method, a feasible access control method for MTC devices in the embodiments of the present invention is: the network side equipment determines the same bit information of the MTC identification which is forbidden to be accessed, and sends the same bit information to the MTC equipment through a broadcast message; the MTC equipment matches the received same bit information with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
Taking the MTC identifier as a Group ID or an APN as an example, since the Group IDs or APNs allocated by the operator have some similarities, that is, multiple Group IDs or APNs have some same bits, when broadcasting the Group ID list or the APN list, the RAN node may only broadcast the same bits of the Group IDs or APNs to identify multiple groups that need to be restricted from access. After receiving the broadcasted bit, the MTC device judges whether an access request can be initiated or not by comparing with the Group ID or APN stored by the MTC device.
In addition, the network side device of this embodiment is composed of a mobility management network element and a RAN node on the network side, where the mobility management network element in a Long Term Evolution (LTE) system is an MME, and the RAN node is an eNodeB; a mobility management Network element in a Universal mobile telecommunications System (UTMS) is an SGSN, and a RAN node is a Radio Network Controller (RNC).
As shown in fig. 4, the specific access control procedure mainly includes the following steps:
step 401, the MME/SGSN determines the same bit information of the Group ID or APN that needs to be barred from accessing according to the current network load condition and the similarity of the Group ID or APN.
Step 402, MME/SGSN sends OVERLOAD START message to RAN node, the message carries the same bit information of Group ID or APN which is forbidden to access.
In step 403, the RAN node broadcasts the same bit information of the Group ID or APN for which access is forbidden.
Step 404, after receiving the same bit information in the broadcast message, the MTC device compares the same bit information with a Group ID or APN stored in the MTC device, and if the same bit information matches the received same bit information, does not initiate an access request; otherwise, an access request may be initiated.
For example: the Group ID is composed of a Mobile Country Code (MCC), a Mobile Country Code (MNC), a Mobile Network Code (MNC), a regional identifier (mnd), and a Group identifier (cid). If a plurality of groups needing to be prohibited from accessing belong to the same area of the same operator, the MME/SGSN carries an MCC + MNC + area identity in an OVERLOAD START message sent to the RAN node, instead of the GroupID list. Likewise, the RAN node broadcasts only the MCC + MNC + area identity in a broadcast message. After the MTC equipment receives the broadcast message, comparing the Group ID stored by the MTC equipment, if the MCC + MNC + area identification in the Group ID stored by the MTC equipment is matched with the area identification carried in the broadcast message, not initiating an access request; otherwise, an access request may be initiated.
For another example: the Group ID contains an identification bit of an MTC feature (MTC feature) indicating the MTC feature or MTC feature combination the MTC Group is currently subscribed to. When access control is carried out on a plurality of groups with certain MTC features or MTC feature combinations, an MME/SGSN carries an identification bit of the MTC features or the MTC feature combinations in OVERLOAD START messages sent to RAN nodes; similarly, the RAN node broadcasts only the identification bit of the MTC feature or the MTC feature combination in the broadcast message. After the MTC equipment receives the broadcast message, comparing the Group ID stored by the MTC equipment, if the identification bit of the MTC feature or the MTC feature combination in the Group ID stored by the MTC equipment is matched with that carried in the broadcast message, not initiating an access request; otherwise, an access request may be initiated. Assuming that 3 bits in the Group ID are used to identify the subscribed MTC feature or MTC feature combination, 001 identifies Low Mobility (Low Mobility), and 010 identifies that Only the originating caller (MO Only) and Time control (Time Controlled) can be performed. If the network needs to forbid the Group access of the Low Mobility characteristic, the RAN node broadcasts the MTC feature for forbidding the access to be 001, the MTC equipment checks whether the MTC feature bit of the Group ID stored by the MTC equipment is the same as the received MTC feature bit, and if the MTC feature bit is the same as the received MTC feature bit, the MTC equipment does not initiate an access request; otherwise, an access request may be initiated.
It should be noted that, in the embodiment of sending the same bit information, the network side device needs to agree in advance with the MTC device where the same bit information is located in the MTC identifier, and only after receiving the same bit information, the MTC device can know which information in the MTC identifier stored in the MTC device is matched with the MTC device. Of course, if the network side device sends the same bit information in the form of a wildcard, it is not necessary to agree in advance with the MTC device about the location of the same bit information in the MTC identity. Taking the above "MCC + MNC + region id + group id" as an example, if the same bit information is "MCC + MNC + region id", the structure of the same bit information sent in the wildcard form is "MCC + MNC + region id + -; the structure of the information carried by the ". star" is the same as the data structure of the MTC identifier, and the information carried by the information except the information of the same bit is null; under the condition of the same data structure, the matching operation of the MTC equipment to the MTC identification becomes relatively simple.
Another possible access control procedure of MTC devices, as shown in fig. 5, mainly includes the following steps:
step 501, the MME/SGSN determines the GroupID or APN to be barred from access according to the current network load condition.
Step 502, the MME/SGSN sends an OVERLOAD START message to the RAN node, where the message carries the Group ID or APN to which access is prohibited.
Step 503-504, the RAN node determines the same bit information of the Group ID or the APN which is forbidden to access, and broadcasts the same bit information of the Group ID or the APN which is forbidden to access.
Step 505, after receiving the same bit information in the broadcast message, the MTC device compares the same bit information with a Group ID or APN stored in the MTC device, and if the same bit information matches the received same bit information, does not initiate an access request; otherwise, an access request may be initiated.
The embodiment shown in fig. 5 is different from fig. 4 in that the extraction operation of the same bit information is performed on the RAN node (the RAN node obtains the Group ID or APN that needs to be barred from the MME/SGSN), and other operations are basically similar.
In addition, the network side device in this embodiment may also include only a RAN node, and then an access control procedure of a corresponding MTC device is as follows: and the RAN node extracts the same bit information from the access-forbidden MTC identification stored by the RAN node and sends the same bit information to the MTC equipment through a broadcast message. The specific operation flow is shown in fig. 6, and mainly includes the following steps:
step 601, the RAN node extracts the same bit information from the Group ID or APN which is stored by itself and is forbidden to access.
The Group ID or APN for barring access stored in the RAN node itself is usually obtained in a mobility management procedure or a session management procedure.
In step 602, the RAN node broadcasts the same bit information to the MTC devices.
Step 603, after receiving the same bit information in the broadcast message, the MTC device compares the same bit information with a Group ID or APN stored in the MTC device, and if the same bit information matches the received same bit information, does not initiate an access request; otherwise, an access request may be initiated.
The embodiment shown in fig. 6 differs from fig. 5 in that the Group ID or APN for which access is barred is no longer provided by the mobility management element but is obtained and stored by the RAN node in the mobility management procedure or session management procedure. In this embodiment, the RAN node may also send the same bit information to the MTC devices in the form of a wildcard.
Another feasible access control method for the MTC devices according to the embodiments of the present invention is: the network side equipment encodes and compresses the MTC identification which is forbidden to be accessed, and sends the MTC identification after encoding and compression to the MTC equipment through a broadcast message; the MTC equipment decompresses the information in the broadcast message, matches the decompressed MTC identification with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
Taking MTC identity as Group ID or APN as an example, the network side device of this embodiment is composed of a mobility management network element and a RAN node on the network side, where the mobility management network element in the LTE system is MME and the RAN node is eNodeB; the mobile management network element in the UTMS is SGSN, and the RAN node is RNC.
The common encoding compression algorithm can be a Hash (Hash) algorithm, and the Hash algorithm is used for compressing the Group ID or APN which needs to be prohibited from being accessed, so that the information quantity which needs to be broadcasted can be reduced. However, the encoding compression algorithm described in the embodiment of the present invention is not limited to the Hash algorithm, and any algorithm capable of implementing data compression should be applicable to the embodiment of the present invention.
Based on the above coding compression algorithm, a feasible access control procedure of the MTC device is: and performing Message Digest (MD5, Message Digest5) coding on the Group ID or APN to be broadcasted on the network side, wherein the MD5 coding of the Group ID or APN to be prohibited is sent in the broadcast Message. After the MTC device receives the codes, the MTC device locally restores the Group ID or APN, and then judges whether the access request can be initiated according to the Group ID or APN stored by the MTC device. One possible operational flow is shown in fig. 7, which mainly includes the following steps:
step 701, the MME/SGSN determines the Group ID or APN that needs to be barred from accessing according to the load condition of the current network, and performs MD5 encoding on the Group ID or APN that needs to be barred from accessing.
Step 702, the MME/SGSN sends an OVERLOAD START message to the RAN node, where the message carries the Group ID or APN encoded by MD 5.
In step 703, the MME/SGSN broadcasts the Group ID or APN encoded by MD 5.
Step 704, the MTC device performs MD5 decoding, locally restores the Group ID or APN that needs to be barred from accessing, and determines whether to initiate an access request by referring to the Group ID or APN stored in the MTC device.
Another possible operation flow is shown in fig. 8, and mainly includes the following steps:
step 801, the MME/SGSN determines a Group ID or APN to be barred from access according to the load condition of the current network.
Step 802, the MME/SGSN sends OVERLOAD START information to the RAN node, and the information carries the Group ID or APN which is forbidden to be accessed.
And 803-804, the RAN node carries out MD5 coding on the Group ID or APN which needs to be prohibited from accessing, and broadcasts the Group ID or APN coded by MD 5.
Step 805, the MTC device performs MD5 decoding, locally restores the Group ID or APN that needs to be prohibited from accessing, and determines whether to initiate an access request by referring to the Group ID or APN stored in the MTC device.
The embodiment shown in fig. 8 is different from that shown in fig. 7 in that the MD5 encoding operation is performed on the RAN node (the RAN node obtains a Group ID or APN that needs to be barred from the MME/SGSN), and other operations are basically similar.
In addition, the network side device in this embodiment may also include only a RAN node, and then an access control procedure of a corresponding MTC device is as follows: the RAN node directly carries out MD5 coding on the Group ID or APN which is stored by the RAN node and is forbidden to access, and carries the Group ID or APN coded by the MD5 in a broadcast message and sends the broadcast message to the MTC equipment; the MTC device carries out MD5 decoding, locally restores the Group ID or APN which needs to be forbidden to access, and judges whether an access request can be initiated or not according to the Group ID or APN stored by the MTC device. The specific operation flow is shown in fig. 9, and mainly includes the following steps:
in step 901, the RAN node performs MD5 encoding on the Group ID or APN of the prohibited access stored in the RAN node itself.
The Group ID or APN for barring access stored in the RAN node itself is usually obtained in a mobility management procedure or a session management procedure.
Step 902, the RAN node sends the Group ID or APN encoded by MD5 to the MTC device in a broadcast message.
Step 903, after receiving the broadcast message, the MTC device performs MD5 decoding, locally restores the Group ID or APN that needs to be prohibited from accessing, and compares the Group ID or APN with the Group ID or APN stored in the MTC device, and if the Group ID or APN stored in the MTC device can be matched with the Group ID or APN stored in the MTC device, does not initiate an access request; otherwise, an access request may be initiated.
The embodiment shown in fig. 9 differs from fig. 8 in that the Group ID or APN for barred access is no longer provided by the mobility management element but is instead saved by the RAN node in the mobility management procedure or session management procedure.
Another feasible access control method for the MTC devices in the embodiments of the present invention is: the network side equipment performs modular operation on the MTC identification which is forbidden to be accessed, and sends the information after the modular operation to the MTC equipment; and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the information after the modulo operation and the MTC identification stored by the MTC equipment.
Taking MTC identity as Group ID or APN as an example, the network side device of this embodiment is composed of a mobility management network element and a RAN node on the network side, where the mobility management network element in the LTE system is MME and the RAN node is eNodeB; the mobile management network element in the UTMS is SGSN, and the RAN node is RNC.
Based on the above modulo operation method, a feasible operation flow is shown in fig. 10, which mainly includes the following steps:
step 1001, the MME/SGSN determines a Group ID or an APN to which access barring is required according to a load condition of a current network, and performs a modulo operation on each determined Group ID or APN, where information after each modulo operation is mapped to one bit, and the plurality of bits form a character string.
Step 1002, the MME/SGSN sends an OVERLOAD START message to the RAN node, where the message carries the character string (including the information after the modulo operation).
In step 1003, the RAN node broadcasts the string (containing the modulo information).
And step 1004, the MTC device determines whether to allow itself to initiate an access request according to the received character string and the MTC identity stored in itself.
Specifically, the method comprises the following steps: the MTC equipment can also perform the same modular operation as the MME/SGSN on the MTC identification stored in the MTC equipment, then match the information of the MTC equipment after the modular operation with the character string, and if the information of the MTC equipment after the modular operation exists in the character string, the MTC equipment does not initiate an access request; otherwise, an access request may be initiated;
or the MTC equipment performs inverse operation of modular operation according to the received character string, then matches the obtained information with the MTC identification stored by the MTC equipment, and does not initiate an access request if the MTC identification stored by the MTC equipment exists in the information after the inverse operation; otherwise, an access request may be initiated.
Another possible operation flow is shown in fig. 11, which mainly includes the following steps:
step 1101, the MME/SGSN determines the Group ID or APN which needs to be forbidden to access according to the load condition of the current network.
Step 1102, MME/SGSN sends an OVERLOAD START message to RAN node, where the message carries a Group ID or APN to which access is prohibited.
1103-1104, the RAN node performs a modulus operation on the Group ID or APN to which access is prohibited, wherein information after each modulus operation is mapped to a bit, and the bits form a character string; the RAN node broadcasts the string (containing the modulo information).
Step 1105, the MTC device determines whether it is allowed to initiate an access request according to the received character string and the MTC identity stored in itself. The detailed operation is the same as the foregoing step 1004, and is not described herein again.
The embodiment shown in fig. 11 is different from fig. 10 in that the operation of the modulo operation is performed on the RAN node (the RAN node obtains the Group ID or APN that needs to be barred from the MME/SGSN), and other operations are basically similar.
In addition, the network side device in this embodiment may also include only a RAN node, and then an access control procedure of a corresponding MTC device is as follows: the RAN node directly performs the modulus operation on the Group ID or APN which is stored by the RAN node and is forbidden to access, and carries the information after the modulus operation in the broadcast message and sends the information to the MTC equipment; and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the information after the modulo operation and the MTC identification stored by the MTC equipment. The specific operation flow is shown in fig. 12, and mainly includes the following steps:
step 1201, the RAN node performs a modular operation on the Group ID or APN which is stored in the RAN node and is prohibited from accessing, information after each modular operation is mapped to a bit, and the plurality of bits form a character string.
The Group ID or APN for barring access stored in the RAN node itself is usually obtained in a mobility management procedure or a session management procedure.
At step 1202, the RAN node broadcasts the string (containing the modulo information).
Step 1203, the MTC device determines whether it is allowed to initiate an access request according to the received character string and the MTC identity stored in the MTC device. The detailed operation is the same as the foregoing step 1004, and is not described herein again.
The embodiment shown in fig. 12 differs from fig. 11 in that the Group ID or APN for barred access is no longer provided by the mobility management element but is instead maintained by the RAN node in the mobility management procedure or session management procedure.
Corresponding to the access control method of the MTC device, the present invention further provides an access control system of the MTC device, including: network side equipment and MTC equipment. And the network side equipment is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment. And the MTC equipment is used for determining whether the MTC equipment allows to initiate the access request according to the information after the compression processing and the MTC identification stored by the MTC equipment.
Preferably, the network side device is further configured to determine the same bit information of the MTC identity to which access is prohibited, and send the same bit information to the MTC device through a broadcast message; correspondingly, the MTC device is further configured to match the received same bit information with the MTC identity stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result. The network side device may also send the same bit information to the MTC device in the form of a wildcard through a broadcast message.
Preferably, the network side device is further configured to encode and compress the MTC identifier prohibited from being accessed, and send the encoded and compressed MTC identifier to the MTC device through a broadcast message; correspondingly, the MTC device is further configured to decompress the information in the broadcast message, match the decompressed MTC identifier with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to the matching result.
Preferably, the network side device is further configured to perform a modular operation on the MTC identifier to which access is prohibited, and send information after the modular operation to the MTC device; correspondingly, the MTC device is further configured to determine whether to allow itself to initiate an access request according to the information obtained after the modulo operation and the MTC identifier stored in itself.
Preferably, the network side device may include: the system comprises a mobility management network element and a RAN node, wherein the mobility management network element is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the RAN node; the RAN node is used for sending the compressed information to the MTC equipment through a broadcast message;
or, the mobility management network element is configured to send the access-prohibited MTC identifier to the RAN node; and the RAN node is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment through a broadcast message.
The network side device may include only: and the RAN node is used for compressing the MTC identifier which is stored by the RAN node and forbidden to access, and sending the compressed information to the MTC equipment through a broadcast message.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (14)

1. An access control method for Machine Type Communication (MTC) equipment is characterized by comprising the following steps:
the network side equipment compresses the MTC identification which is forbidden to be accessed and sends the compressed information to the MTC equipment; wherein the compression process is: taking the same bit information, coding compression or modular operation;
and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the compressed information and the MTC identification stored by the MTC equipment.
2. The access control method of the MTC device according to claim 1, wherein the network side device compresses the MTC identity which is prohibited from being accessed, and sends the compressed information to the MTC device, specifically:
the network side equipment determines the same bit information of the MTC identification which is forbidden to be accessed, and sends the same bit information to the MTC equipment through a broadcast message;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
the MTC equipment matches the received same bit information with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
3. The access control method of the MTC device according to claim 2, wherein the method further comprises: and the network side equipment sends the same bit information to the MTC equipment in a wildcard form through a broadcast message.
4. The access control method of the MTC device according to claim 1, wherein the network side device compresses the MTC identity which is prohibited from being accessed, and sends the compressed information to the MTC device, specifically:
the network side equipment encodes and compresses the MTC identification which is forbidden to be accessed, and sends the MTC identification after encoding and compression to the MTC equipment through a broadcast message;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
and the MTC equipment decompresses the information in the broadcast message, matches the decompressed MTC identification with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
5. The access control method of the MTC device according to claim 1, wherein the network side device compresses the MTC identity which is prohibited from being accessed, and sends the compressed information to the MTC device, specifically:
the network side equipment performs modular operation on the MTC identification which is forbidden to be accessed, and sends the information after the modular operation to the MTC equipment;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the information after the modulus operation and the MTC identification stored by the MTC equipment.
6. The access control method of the MTC device according to any one of claims 1 to 5, wherein the network side device comprises: a mobility management network element and a radio access network, RAN, node;
correspondingly, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device, which specifically includes:
the mobility management network element compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the RAN node, and the RAN node sends the compressed information to MTC equipment through a broadcast message;
or, the mobility management network element sends the access-forbidden MTC identifier to the RAN node, and the RAN node compresses the access-forbidden MTC identifier and sends the compressed information to the MTC device through a broadcast message.
7. The access control method of the MTC device according to any one of claims 1 to 5, wherein the network side device comprises: a RAN node;
correspondingly, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device, which specifically includes:
and the RAN node compresses the MTC identification which is stored by the RAN node and is forbidden to access, and sends the compressed information to the MTC equipment through a broadcast message.
8. An access control system of a Machine Type Communication (MTC) device, the system comprising: a network side device and an MTC device, wherein,
the network side equipment is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment; wherein the compression process is: taking the same bit information, coding compression or modular operation;
and the MTC equipment is used for determining whether the MTC equipment allows to initiate an access request according to the compressed information and the MTC identification stored by the MTC equipment.
9. The access control system of the MTC device according to claim 8, wherein the network side device is further configured to determine the same bit information of the MTC identity which is prohibited from being accessed, and send the same bit information to the MTC device through a broadcast message;
correspondingly, the MTC device is further configured to match the received same bit information with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result.
10. The access control system of the MTC device according to claim 9, wherein the network side device is further configured to send the same bit information to the MTC device in a broadcast message in a form of a wildcard.
11. The access control system of the MTC device according to claim 8, wherein the network side device is further configured to encode and compress the MTC identifier which is prohibited from being accessed, and send the encoded and compressed MTC identifier to the MTC device through a broadcast message;
correspondingly, the MTC device is further configured to decompress the information in the broadcast message, match the decompressed MTC identifier with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result.
12. The access control system of the MTC device according to claim 8, wherein the network side device is further configured to perform a modulo operation on an MTC identifier that is prohibited from being accessed, and send information after the modulo operation to the MTC device;
correspondingly, the MTC device is further configured to determine whether to allow itself to initiate an access request according to the information obtained after the modulo operation and the MTC identifier stored in itself.
13. The access control system of the MTC equipment according to any one of claims 8 to 12, wherein the network side equipment comprises: a mobility management network element and a RAN node; wherein,
the mobility management network element is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the RAN node; the RAN node is used for sending the compressed information to MTC equipment through a broadcast message;
or, the mobility management network element is configured to send the MTC identifier prohibited from being accessed to the RAN node; and the RAN node is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment through a broadcast message.
14. The access control system of the MTC equipment according to any one of claims 8 to 12, wherein the network side equipment comprises: and the RAN node is used for compressing the MTC identifier which is stored by the RAN node and forbidden to access, and sending the compressed information to the MTC equipment through a broadcast message.
CN201010233548.2A 2010-07-20 2010-07-20 A kind of connection control method of MTC device and system Expired - Fee Related CN102340821B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010233548.2A CN102340821B (en) 2010-07-20 2010-07-20 A kind of connection control method of MTC device and system
PCT/CN2011/076319 WO2012010040A1 (en) 2010-07-20 2011-06-24 Control method and system for accessing of machine type communication mtc device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010233548.2A CN102340821B (en) 2010-07-20 2010-07-20 A kind of connection control method of MTC device and system

Publications (2)

Publication Number Publication Date
CN102340821A CN102340821A (en) 2012-02-01
CN102340821B true CN102340821B (en) 2015-09-16

Family

ID=45496509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010233548.2A Expired - Fee Related CN102340821B (en) 2010-07-20 2010-07-20 A kind of connection control method of MTC device and system

Country Status (2)

Country Link
CN (1) CN102340821B (en)
WO (1) WO2012010040A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404792A (en) * 2010-09-14 2012-04-04 中兴通讯股份有限公司 Overload control method and system
CN109963320B (en) * 2012-10-26 2021-03-23 华为技术有限公司 Service access control method and device
CN104469884B (en) * 2013-09-23 2018-06-26 中国移动通信集团公司 A kind of connection control method and equipment
CN105636156B (en) * 2014-11-07 2019-11-29 上海诺基亚贝尔股份有限公司 The method for controlling MTC UE access

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756405A (en) * 2004-09-27 2006-04-05 华为技术有限公司 Mobile network over loading control method
CN101494925A (en) * 2008-01-21 2009-07-29 联芯科技有限公司 Access method and apparatus for multi-model terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1435749A1 (en) * 2002-12-30 2004-07-07 Evolium S.A.S. Location based call barring
US7471951B2 (en) * 2003-04-04 2008-12-30 Alcatel-Lucent Usa, Inc. Signaling of multi-task calls carried by a hybrid circuit/packet network
US9167505B2 (en) * 2007-10-08 2015-10-20 Qualcomm Incorporated Access management for wireless communication
CN102045810B (en) * 2009-10-09 2014-01-08 华为技术有限公司 Method, device and system for accessing machine type communication terminal equipment to network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756405A (en) * 2004-09-27 2006-04-05 华为技术有限公司 Mobile network over loading control method
CN101494925A (en) * 2008-01-21 2009-07-29 联芯科技有限公司 Access method and apparatus for multi-model terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
3GPP.3GPP TS 22.368 V10.0.0.《3GPP TS 22.368 V10.0.0》.2010,全文. *
Sierra Wireless.MTC Device Access Control.《3GPP TSG-SA1 #46,S1-091120,MTC Device Access Control》.3GPP,2009,全文. *

Also Published As

Publication number Publication date
WO2012010040A1 (en) 2012-01-26
CN102340821A (en) 2012-02-01

Similar Documents

Publication Publication Date Title
EP2498526B1 (en) Method and system for obtaining information of machine type communication terminal
CN101977416B (en) A kind of overload controlling method of MTC device and system
KR101824987B1 (en) Method for efficiently transmitting downlink small data of machine type communication in mobile communications system
KR101655693B1 (en) Access Control Method and Apparatus for Machine Type Communication Devices with Dual Priority Applications
US9491591B2 (en) Method and apparatus for reliably transmitting group multicast using a cell broadcasting technique in a mobile communication system
EP2665310A1 (en) Access control method and device
JP5718484B2 (en) Shared network access control method, access network node, and core network node
CN108347746B (en) Access control method, access network element and user equipment
CN101969635A (en) Access control method and system for machine communication
US8804621B2 (en) Data transmitting method using machine type communication group based tunneling, and mobile communication system using the same
CN110915264B (en) Session processing method in wireless communication and terminal equipment
CN102404792A (en) Overload control method and system
CN102340821B (en) A kind of connection control method of MTC device and system
CN102056128B (en) Information acquisition method and system of machinery communication terminals
CN102625271B (en) A kind of signaling optimization method and system setting MTC device altogether
US11129229B2 (en) Method and apparatus for wireless device connectivity management
Taleb et al. An efficient scheme for MTC overload control based on signaling message compression
CN103188728B (en) A kind of method for controlling network congestion and system
CN103108358B (en) A kind of small data transmission method and device, system
CN102625418A (en) Method and device for selecting public land mobile communication network access network
CN102480799A (en) Wireless communication network and method for informing machine-type communication equipment to be in off-line state
US12231393B2 (en) IP address allocation in a wireless communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150916

Termination date: 20190720

CF01 Termination of patent right due to non-payment of annual fee