Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method of private base station

An access control, private base station technology, applied in the direction of communication between multiple stations, selection device, radio/induction link selection arrangement, etc., can solve the problem of unable to prevent wireless access services, unable to judge, unable to effectively control User access rights and other issues to achieve the effect of facilitating real-time maintenance

Inactive Publication Date: 2008-11-26
ZTE CORP
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] However, in this case, image 3 The above-mentioned processing flow cannot meet the needs of private base station users, because in the above-mentioned processing, it is only through authentication processing that it is judged whether the user requesting access is a legal subscriber, but it cannot be judged whether the user is It is the user that the equipment owner of the private base station expects to access. Therefore, the access of other legal subscribers cannot be rejected based on the actual needs of the private base station user, that is, the access authority of the user cannot be effectively controlled, so it cannot prevent illegal Intended users use private cells to provide wireless access services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method of private base station
  • Access control method of private base station
  • Access control method of private base station

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0048] Example 1: Allow terminal access

[0049] Specifically, in the case that the radio access network allows the terminal to access, after step S406, the following processing is further included: the radio access network returns an access control success indication message to the core network. And in this instance, after the access control operation, the user is authenticated.

[0050] Such as Figure 5 As shown, it specifically includes the following processing:

[0051] 501: The terminal sends a wireless access request to the wireless access network;

[0052] 502: The base station or controller processes the access request, allocates corresponding wireless resources to the terminal, and establishes a communication connection between the terminal and the wireless access network;

[0053] 503: The terminal requests the core network to establish a service, which carries a user ID, that is, a core network user ID;

[0054] 504: The wireless access network forwards the ser...

example 2

[0065] Example 2: Deny terminal access

[0066] The access control operation and the operations before the access control operation in this example are similar to steps 501-507 of Example 1, and repeated descriptions of the same parts are omitted in order to unnecessarily obscure the present invention.

[0067] In the case that the wireless access network rejects terminal access, if Image 6 As shown, the access control process is executed during the terminal access service process (corresponding to Figure 4 In step S406), and after rejecting the user access (601), further include the following processing:

[0068] Step 602, the core network notifies the terminal to reject the service request;

[0069] Step 603, the core network commands the radio access network to release the connection; and

[0070] Step 604, the radio access network releases the radio resource allocated to the terminal before establishing the communication connection.

[0071] Wherein, optionally, in s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An access control method of private base station comprises steps that: S402, building a communication connection between a terminal and a wireless access network, the terminal sends a service request message to the core network, wherein the service request message carries a core network user label of the user; S404, responding to the service request message, the core network inquires a database according to the core network user label, to attain the wireless access network user label of the user; S406, the core network transmits the attained wireless access network user label to the wireless access network, and the wireless access network controls the access of the terminal according to the wireless access network user label. Adopting the invention, the owner of the private base station can directly control the access authorities of users at the side of wireless access network, to prevent non-predicted users from using the wireless access service provided by the private region. The data record needed by the access control is arranged in the private base station, to support the real-time maintenance of the owners of the private base station on the access authority of the users.

Description

technical field [0001] The present invention relates to a distributed cellular wireless communication system, and in particular relates to an access control method of a private base station. Background technique [0002] A distributed cellular wireless communication system is composed of terminals, base stations, and a core network (CN) (see figure 1 ), there may also be a base station controller or a distributed network controller between the base station and the core network (see figure 2 ), used to manage the base station and aggregate the connection between the base station and the core network. The network composed of base stations and network controllers is called the radio access network (RAN), which is responsible for access layer affairs, such as the management of radio resources. Each base station or network controller can be connected to one or more core networks. The core network is responsible for non-access stratum affairs, such as mobility management. A t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04B7/26
Inventor 王继承
Owner ZTE CORP