Access control method for prepaid users in cluster communication system

A trunking communication and prepaid technology, applied in access restriction, prepaid telephone system, telephone communication, etc.

Inactive Publication Date: 2010-07-14
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The technical problem to be solved by the present invention is to provide a method for controlling the access of prepaid users in the trunking communication system, so that the prepaid users only have the prepaid ability access to the dispatching server, and solve the problem of access control of prepaid users when the dispatching servers that support prepayment and those that do not support prepayment coexist in the cluster system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method for prepaid users in cluster communication system
  • Access control method for prepaid users in cluster communication system
  • Access control method for prepaid users in cluster communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Embodiment 1: The access control process when a prepaid user acts as a calling party, such as figure 2 As shown, it mainly includes the following steps:

[0067] Step 201: The calling party initiates a call.

[0068] Step 202: The dispatching server at the caller's current location sends a call authentication request to the authentication server at the caller's home location, and the request includes the authentication information of the caller; The message exchange between the dispatching server of the caller and the authentication server at the caller's home location needs to be forwarded through the authentication server at the current location of the caller, and even needs to be forwarded through other authentication servers in the middle.

[0069] Step 203: The authentication server in the caller's place of origin authenticates the caller. After the caller has passed the basic call authentication process, the authentication server also checks whether the caller i...

Embodiment 2

[0074] Embodiment 2: Called access control under single call (one call one) situation, such as image 3 As shown, it mainly includes the following steps:

[0075] Step 301: If the origin of the calling party and the called party are the same, the authentication server in the originating area of ​​the calling party will authenticate the called party when completing the authentication of the calling party; The authentication server at the origin of the calling party needs to notify the authentication server at the origin of the called party to authenticate the called party.

[0076] Step 302: The authentication server in the called home region authenticates the called party. After the called party passes through the basic call authentication process, the authentication server will judge whether the called party is a prepaid subscriber. If not, the called party will authenticate the called party. If yes, the authentication server will further judge whether the dispatch server at...

Embodiment 3

[0082] Embodiment 3: Called access control under the situation of group call (one call with multiple), such as Figure 4 As shown, it mainly includes the following steps:

[0083] Step 401: If the origin of the calling group and the called group are the same, the authentication server in the calling place will authenticate the called group when completing the calling authentication. If the calling and called groups If the attributions are inconsistent, the authentication server at the calling location needs to notify the authentication server at the called location to authenticate the called group.

[0084] Step 402: The authentication server at the place where the called group belongs authenticates the group and group members. After the group and group members have passed the basic authentication process, the authentication server needs to determine the Whether it is a prepaid user, if not, the corresponding group member has passed the authentication, if yes, it is necessary...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: in the trunking communication system, the pre-paid user can only make access via the scheduling server with pre-paid capability; the prepaid user sends the message which indicates if the currently-used scheduling server has the prepaid capability to the user's home location authentication server by using location update message; when making access, the home location authentication server authenticates the prepaid user; if the user passes the authentication, and his currently-used scheduling server has the prepaid capability, then the home location authentication server returns the message containing the prepaid account information to the user's currently-used scheduling server; said currently-used scheduling server applies the prepaid quota to the home location authentication server; if the application succeeds, the currently-used server allows said prepaid user to access; otherwise, ending the current access.

Description

technical field [0001] The invention relates to a trunking communication system, in particular to an access control method for prepaid users in the digital trunking communication system. Background technique [0002] When users use trunking communication services, they can choose different payment methods, such as prepayment, postpayment, etc. For users with different payment methods, the trunking system needs to adopt different access control procedures. [0003] Since operators usually upgrade the existing network in stages to provide new services, such as prepaid services, in this way, there may be devices with different service capabilities in the same trunking communication network. For example, some The dispatch server supports the access of prepaid users, but some dispatch servers do not support the access of prepaid users. Since the system needs to monitor the account balance of prepaid users, we need to ensure that prepaid users are only connected to the cluster s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W76/02H04L12/06H04M17/00H04W8/18H04W4/24H04W48/02H04W84/08
Inventor 卢熙源李永奇高菊辉
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products