Access control method for private base station
A technology of access control and private base station, which is applied in communication between multiple stations, wireless communication, electrical components, etc. It can solve the problem of inability to judge users, satisfy private base station users, and prevent unexpected users from providing wireless access. Incoming services and other issues to achieve the effect of easy real-time maintenance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0048] Example 1: Allow terminal access
[0049] Specifically, in the case that the radio access network allows the terminal to access, after step S406, the following processing is further included: the radio access network returns an access control success indication message to the core network. And in this instance, after the access control operation, the user is authenticated.
[0050] Such as Figure 5 As shown, it specifically includes the following processing:
[0051] 501: The terminal sends a wireless access request to the wireless access network;
[0052] 502: The base station or controller processes the access request, allocates corresponding wireless resources to the terminal, and establishes a communication connection between the terminal and the wireless access network;
[0053] 503: The terminal requests the core network to establish a service, which carries a user ID, that is, a core network user ID;
[0054] 504: The wireless access network forwards the ser...
example 2
[0065] Example 2: Deny terminal access
[0066] The access control operation and the operations before the access control operation in this example are similar to steps 501-507 of Example 1, and repeated descriptions of the same parts are omitted in order to unnecessarily obscure the present invention.
[0067] In the case that the wireless access network rejects terminal access, if Image 6 As shown, the access control process is executed during the terminal access service process (corresponding to Figure 4 In step S406), and after rejecting the user access (601), further include the following processing:
[0068] Step 602, the core network notifies the terminal to reject the service request;
[0069] Step 603, the core network commands the radio access network to release the connection; and
[0070] Step 604, the radio access network releases the radio resource allocated to the terminal before establishing the communication connection.
[0071] Wherein, optionally, in s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 