Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Management method for terminal equipment starting service in radio communication network

A technology of wireless communication network and terminal equipment, which is applied in the field of management for the safe use of network resources by mobile terminals

Inactive Publication Date: 2010-10-27
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no solution that can guarantee that terminals other than mobile terminals will not pose a threat to the mobile communication network during the course of conducting business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management method for terminal equipment starting service in radio communication network
  • Management method for terminal equipment starting service in radio communication network
  • Management method for terminal equipment starting service in radio communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] In the embodiment provided by the present invention, when the identification system detects a terminal with a threat, its specific implementation is as follows:

[0089] When the system detects a terminal device with threats, the HPLMN management interface will store the restricted services of the terminal in the MS database in the form of a list, generate a forbidden list in the MS database, and then the MS database will send this list through the OTA server to the (U)SIM card.

[0090] The process of this implementation is as follows figure 1 As shown, the detailed steps are as follows:

[0091] Step 11: Identify the terminal that the system detects a threat. The terminal may be a mobile phone or a non-mobile terminal. If it is a mobile phone, it can be processed according to the existing technology, or it can be processed by other settings. Of course, it can also be executed. Step 12, adopt the processing method provided by the present invention, if it is a non-mob...

Embodiment 2

[0118] In this embodiment, the non-mobile terminal utilizes (U)SIM card information to access the network through the mobile communication system for authentication, thereby accessing the mobile network. The corresponding processing flow is as follows: image 3 As shown, it specifically includes the following steps:

[0119] Step 31, the TE periodically detects the forbidden list information in the (U)SIM card, and timely updates the forbidden list information stored in the TE according to the forbidden list in the (U)SIM card.

[0120] Step 32, TE initiates a service request carrying a device unique identification number via SGSN (Serving General Packet Radio Service Support Node) / VLR (Visitor Location Register) according to the forbidden list, and the service is not a restricted service in the forbidden list after detection;

[0121] This detection can perform preliminary detection on services initiated by non-mobile terminals, and can effectively prevent some prohibited ser...

Embodiment 3

[0136] In this embodiment, the WLAN UE (equipment for wireless local area network) uses the information of the (U)SIM card to still authenticate through the WLAN access network, so that the detailed implementation process of accessing the mobile communication network is as follows: Figure 4 As shown, the details are as follows:

[0137] Step 41, the WLAN UE periodically detects the information of the forbidden list in the (U)SIM card, and updates the forbidden list information in the WLAN UE in time;

[0138] Step 42, the WLAN UE initiates a service to the PDG (Packet Data Gateway) according to the forbidden list, and initially detects the service initiated by the WLAN UE;

[0139] Through the initial detection process, if the service initiated by the WLAN UE is a prohibited service in the prohibited list, it will be restricted and cannot be initiated, otherwise, the corresponding service can be initiated normally;

[0140] If there is no corresponding forbidden list in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for managing service launched onto terminal device in radio communication network includes carrying out once detection according to forbidden listing in non-mobile phone terminal when service request is launched by non-mobile phone terminal, judging whether said service request is existed with threats or not and forbidding to use service with threats, carrying out said detection once more on service request launched by non-mobile phone terminal according to forbidden listing in system at network side and forbidding service with threats to be used in system.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, and in particular to a management technology aimed at the safe use of network resources by mobile terminals. Background technique [0002] With the continuous development of the third generation mobile communication system, data services have been widely used in mobile communication. In the process of carrying out data services, it is necessary to occupy a large amount of wireless resources of the mobile communication network. In order to ensure the smooth development of data services and other services in the entire system, it is necessary to provide corresponding management mechanisms for terminals carrying out data services to avoid terminal interference. The wireless resources of the mobile communication network are maliciously preempted or the network is attacked. [0003] At present, in the mobile communication network, the terminals that can be used to carry out dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 黄迎新曹淑华杨艳梅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products