Access control method of private base station
A private base station and access control technology, applied in access restriction, electrical components, wireless communication, etc., can solve problems such as rejection, failure to prevent unintended users from providing wireless access services, failure to satisfy private base station users, etc., to achieve Realize the effect of unified management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0048] Example 1: The core network allows terminal access
[0049] In this example, the authentication is performed after the access control operation as an example, that is, after the above step S406, the following processing is further included: the core network authenticates the user according to the core network user identifier, and after the authentication If successful, establish a service for the terminal.
[0050] Such as Figure 5 As shown, it specifically includes the following processing:
[0051] Step 501: the terminal sends a wireless access request to the wireless access network;
[0052] Step 502: the base station (or controller) processes the access request, allocates corresponding wireless resources to the terminal, and establishes a communication connection between the terminal and the wireless access network;
[0053] Step 503: The terminal requests the core network to establish a service, which will carry its own user ID;
[0054] Step 504: The wireless...
example 2
[0062] Example 2: The core network rejects terminal access
[0063] At this time, after the above step S406, the following processing is further included: the core network notifies the terminal to reject the service request, and further notifies the terminal that the reason for the rejection is access control failure; the core network orders the radio access network to release the connection; and the radio access network releases the connection. The radio resource allocated to the terminal before the communication connection is established.
[0064] Such as Image 6 As shown, the specific process is as follows:
[0065] Step 601: the terminal sends a wireless access request to the wireless access network;
[0066] Step 602: the base station or the controller processes the access request, allocates corresponding wireless resources to the terminal, and establishes a communication connection between the terminal and the wireless access network;
[0067] Step 603: The terminal ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 